0% found this document useful (0 votes)
11 views

Computer Science Notes of important.pdf

The document provides tips for answering case study-based questions, including layout suggestions, communication media options, and network protocols. It covers various aspects of networking, mobile technologies, cybercrime, and database management systems. Additionally, it discusses security measures, intellectual property rights, and the evolution of web technologies.

Uploaded by

Priyanka Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views

Computer Science Notes of important.pdf

The document provides tips for answering case study-based questions, including layout suggestions, communication media options, and network protocols. It covers various aspects of networking, mobile technologies, cybercrime, and database management systems. Additionally, it discusses security measures, intellectual property rights, and the evolution of web technologies.

Uploaded by

Priyanka Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
‘Tips for CASE STUDY BASED questions. [Question Hint for Answering layout Draw block diagram interconnecting blocks, prefer the block or unit with maximum devices as main to connect other blocks Topology Write name of topology ~ Star / Bus / Ring etc. Placement of Server In the unit/block with maximum number of computers Placement of Hub/Switch In every block / unit Placement of Repeater ‘As per layout diagram, ifdistance between two blocks is above 90 meter Cost-effective medium for internet Broadband / connection over telephone lines Communication media for LAN Ethernet (upto 100 meter) / Co-axial cable for high speed within LAN Cost/Budget NOT an issue inLAN | Optical Fiber Communication media for Hills Radio wave / Microwave Communication media for Desert Radio wave Very fast communication between two cities / countries Satellite (avoid it in case economical / budget is mentioned) Device / software to prevent Firewall (Hardware and/or Software ) unauthorized access NETWORK PROTOCOLS : Set of rules for communication among networked devices. These include h and when a device can send and receive data, how it is packaged, how it reaches its destination, TCP/IP - Transmission Control Protocol/Internet Protocol. A two-layer protocol TCP - divides the data into packets for transmitting and re-assembling received packets at the destinati« IP - responsible for routing the data packets ( to find route/way ) PPP Point-to-Point Protocol - Used for direct communication between two devices, like a compu connected via phone line to a server (other examples - cellular telephone, fibre optic links ctc) FTP File Transfer Protocol -Used for transfer of files (upload/download) to or from a remote server. HTTP HyperText Transfer Protocol- transfer data from one device to another on the world wide web. HTTP defines how the data is formatted and transmitted over the network. { HTTPS - Hypertext Transfer Protocol Secure: advanced and secure version of HTTP. } Wireless / Mobile Communication protocol: [1 mark case study/ full forms] GSM = Global System for Mobile Communication. GSM technology is used for transmitting mobile vo and data services, {With GSM, all subscriber and wireless provider information is stored on interchangeable modules kno as SIM (Subscriber Identification Module) cards. } GPRS = General Packet Radio Service - transmission of IP packets over existing cellular networ Applications = Multi-media Message Service (MMS), Internet Access via Mobiles and Data Communicati WLL= Wireless Local Loop is a generic term for an access system that uses wireless links rather tk conventional copper wires to connect subscribers to the local telephone company’s switch. MOBILE TELECOMMUNICATION TECHNOLOGIE: [1 mark full form / feature ] Mobile is a device which is portable. Mobile communication is based on cellular networks. {A cellular network is radio network - land is divided into areas called cells. The network of cells enab the mobile devices to communicate even if they are moving from one cell to another via base stations.} Mobile Systems ( G = Generation) 1G jo __ | 2G _ 2.56 [| 3G introduced in late | introduced in early 1990s; | using packet | Adds multi-media facility to 1970s and early | based on GSM technology; | switched domain —_| 2G - allowing video, audio, 1980s; analog | by swapping out the SIM and graphics applications ; cellular technology | card, users can _ switch {Year 2000 - 2010 } phones or providers. used circuit switching ; Both Only voice facility used GPRS (General | Watching streaming video available ; based on | voice and data | Packet Radio Service) | or video telephony became circuit-switched conversations were digitally | in addition to GSM. _ | a reality ( Mobile TV) ; technology encrypted Low capacity , poor | Known for paging, SMS, | Services like MMS, | Data rates up to 2 Mbps; voice links and no | voicemail and fax services | sending _ pictures | Technologies used ~ UMTS, security through e-mail | EDGE, CDMA possible ‘Threats and prevention from - Viruses - Vital Information Resource Under Siege; Viruses are small programs that are written intentionally to damage the data and files on a system; computer slows down; programs malfunction; files destroyed Worms - a self-replicating program that runs independently and travels across network connections. Worms cause more damage. ‘Trojan horse - a kind of virus that looks safe but has hidden effects. Spam - unwanted bulk mail which is sent by an unauthorized or unidentified person in order to eat the entire disk space. PREVENTION - Use anti-virus software; keep computer software updated ; use firewall ; follow safe browsing practices - using authorization , authentication, keeping passwords safe. COOKIE = A cookie is a small text file sent by web server to a web browser when a user browses a website. FIREWALL = A hardware or software or both that is used to prevent unauthorized access to or from a computer network; CYBER CRIME Cybercrime, or computer-oriented crime, is a crime in which a computer and internet is used. Cybercrimes can be against persons or against property or against the government Legal system of laws and regulatory aspects of issues of the internet and World Wide Web India IT Act - "INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] - to protect the field of e-commerce, e- governance, e-banking as well as penalties and punishments in the field of Cyber Crimes. ‘The above Act was further amended in the form of IT Amendment Act, 2008 [ITAA-2008] in December 2008, Major aspects covered in IT AA-2008 include new sections on offences like cyber terrorism, data protection, digital signatures, e-Documents (e-governance) etc. INTELLECTUAL PROPERTY RIGHTS - Intellectual property rights are the rights given to persons over the creations of their minds. Intellectual Property can be - Industrial Property ( Patents , Trademarks) and Copyright. For example, an invention and an original work of authorship are intellectual property and protected by the intellectual property right called "patent" and "copyright" Other examples of Intellectual Property with a view of IPR - Patents , Trademarks, Plant Varieties, Copyrights, Trade secrets, Industrial Design rights ete. HACKING CRACKING Engaging in harmless technical experiments and _| A method by which a person gains fun learning activities, using computer unauthorized access to a computer with the programming skills to intentionally access a intention of causing damage. computer without authorization. ‘Types of Hackers - Black Hat Hackers (also known as crackers), White Hat Hackers, Grey Hat Hackers WEB SERVICES : WWW : World Wide Web is a combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) ; Sir Tim Berners -Lee (Born in London, UK) is the inventor of WWW. Website Collection of webpages Webpage Webpage is part of website Each website has specific internet address (URL) by which we can access the website Webpages have hyperlinks to connect one web page to another in the website Example - http://cbseacademicnicin/ More examples - amazon.com, flipkart.com, google.com Example ~ curriculum_2021.html is a webpage of the CBSE website. hitp://cbseacademic.nicin/curriculum 202,.htmi | All publicly accessible websites collectively constitute the World Wide Web Some terms we need to be familiar with ~ FDMA - Frequency Division Multiple Access. CDMA - Code Division Multiple Access. TDMA - Time Division Multiple Access. 4G Mobile Systems Bandwidth - 100Mh: jased on packet switching only (IP based), { Year 2010 -2020 }; rm used for 4G is MAGIC Mobile Anytime, anywhere Global mobile | Integrated wireless Customized IRimedia | fast transmission support solutions personal service multimedia | j99Mbps - 1Gbps (uses LTE and Wi-Max) (4G LTE = Fourth Generation Long Term Evolution} 4G can provide better-than-TV quality images an video-links , supports interactive multimedia, voice and video 5G Mobile Systems = uses orthogonal frequency-division multiplexing (OFDM) framework; radio millimeter bands in the 30 GHz to 300 GHz range. More faster data transmission than 4G, data rate from 1 Gb and above {From year 2020 onwards }. Highly interactive multi-media, voice streaming, me efficient. Mobile processors = Like CPU in a computer system, mobile processor receives and executes every command, perform billions of calculations per second. Components of Mobile Processors - Mainly the following three - 1. Application Processing Unit = Has the Control Unit of the mobile’s GPU ( Central Processing Unit) 2. GPU (Graphics Processing Unit) = Assists the CPU for handling the graphics. 3. Communications Processing Unit = for calling and call receiving via the phone's middleware A few more components in smartphone’s processors - a. Camera ISP ( Image Signal Processing) b. Radio and 3G / 4G Modem c. Memory Controller d. Audio / Video Engine £-Mail- [1 mark - case study / application ] e-Mail or email, short for "electronic mail,” is the transmission of messages electronically over compu networks. ¢-Mail PROTOCOLS: Email uses multiple protocols within the TCP/IP suite, Some common e-mail protocols are - SMTP - Simple Mail Transfer Protocol - used to send emails on the internet POP3 - Post Office Protocol Version 3 - to receive emails from a remote server to a local email client IMAP - Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email ona remote web server from a local client. { Example - We use MS-Outlook} Telnet - Used to connect to remote computers over a TCP/IP network (interactive , text- based) PROTOCOLS FOR CHAT AND VIDEO CONFERENCING: Online conversations in which you are immediately able to send messages back and forth to one anothe) called "chat". Avideo conference is a telecommunication technology, which permits two or more people in different locations to interact via mutual video or audio transmission simultaneously. VoIP - voice over Internet Protocol, which is a base for all internet communications. WIRELESS TECHNOLOGIES - Wi-Fi {"WiFiis a short name for Wireless Fidelity" } Wi-Fi is a wireless networking technology that uses radio waves to allow computers and other devices communicate over a wireless signal WiMax WiMAX (Worldwide Interoperability for Microwave Access) is a family of wireless broadba communication standards. WiMAX systems are expected to deliver broadband access services to residential and enterprise customers in an economical way. { WiFi's range is approx. 30 m. WiMAX range is a radius of 50 km } NETWORK SECURITY CONCEPTS ~ WEB BROWSER = Web browser is software program to navigate the web pages on the internet. Examples - Google Chrome , Mozilla Firefox, Internet Explorer etc. WEB HOSTING WEB SERVER Web hosting is the process of uploading/saving the web content on a web server to make it available on WWW (World Wide Web) ‘Aweb server is a computer or a group of computers that hosts or stores content of website. Examples - Apache Tomeat, IIS Web 2.0 =Web 2.0 refers to new generation of dynamic and interactive websites. HTML (Hyper Text Markup Language) XML(eXtensible Markup Language) HTML is used to display the data, text and images ofa webpage on web browser and focus ison the format of data displayed. XML is used to describe the data and focus is on the content of the data. XML is recommended by the World Wide Web Consortium (W3C). Itisa free open standard HTML tags are predefined XML tags are not predefined. We can create our own tags. XML code can also contain HTML tags. HTML tags are not case sensitive, Example - or are the same XML tags are case-sensitive URL (Uniform Resource Locator) DOMAIN NAME URL is unique identifier ofa web page Domain name is your website name The most general form of a URL syntax is as follows: Protocol:// / / For example - https://www.example-site.com/sql/sql_intro.asp (Domain Name System / Domain Name Resolution - when the user types a domain name, the domain names are translated into Internet Protocol (IP) addresses. The computers or machines, access websites based on IP addresses ) UNIT Il - DATABASE MANGEMENT (20 Marks ) A DBMS or database management system is | Database = Collection of inter-related tables and asoftware used to create and manage databases {manage = insert new records, display, modify, delete , provide access control etc. ) RDBMS = other objects. DBMS = DB+MS, DataBase + software to handle the DB RDBMS = database is Examples of popular RDBMS — Relational Database organised in the form of MySQL, Oracle, Sybase, DB2 [Management System relations (i.e.tables) — a TERMINOLGY ( RDBMS) [imark/ 2marks] Table : CUSTOMER CustId__| CNAME AADHAR_NO ADDRESS PHONE coi ANUJ KUMAR 345612348912 GAUTAM VIHAR 8765432190 cO3 NEHA SINGH 367823458904 RANI BAGH 7722334673 co4 NAREN GARG 453627980423 MAHESH NAGAR 6345612566 CO7, BHARAT VERMA | 516782245679 __| MALVIYA NAGAR 9818624567 Primary Key - An attribute or ‘set of attributes that uniquely identify a record ina table/relation eg. - in table customer(cust id, cname, aadhar_no, address, phone) , the attribute cust_id is primary key table/relation (Candidate Key- Anattribute or set of attributes that can become primary key of the Jeg. - customer(cust_id, cname, aadhar_no, address, phone), the attribute cust_id and jaadhar_no are candidate keys [Alternate Key - The candidate key which is not chosen as primary key eg. in table customer(cust id, cname, aadhar_no, address, phone), the attribute cust id is chosen as primary key, then aadhar_no will be alternate key [TERMS USED IN DATA COMMUNICATION [1 mark - application | | CHANNEL medium of data transmission from one device/point to another. { Example - you view different TV Channels ( broadcast on different frequencies) , YouTube Channels} BAND WIDTH Difference between the highest and lowest frequencies ( measured in { terms of "Hertz" like Hz, KHz, MHz etc) I DATATRANSFER RATE amount of data transferred per second measuring unit for di —_bps (Bits Per Second), Bps By ete second) ad )_ kbps, Kbps ete, yo gue (Kbps, mbps psec} TRANSMISSION MEDIA eae = case study based] WIRED (Guided) WIRELESS (Unguided) ‘Twisted Pair Cable (Ethernet Cable) | Infrared - Are electromagnetic radiation for line-of-sight; Economical and Easy to use Frequency 300 GHz - 400 THz; Range 10-30 meters | stp (shielded twisted pair) , Bluetooth - standard wireless (radio wave) communication | utp (un- shielded twisted pair} | protocol uses 2.4 GHz frequency; max range 100 meter__ Co-axial Cable Radio wave (frequency range 30 Hz - 300 GHz ) Example = cable TV wire . _ . _| ‘Optical Fiber Cable ‘Satellite (downlink frequency 1.5 - 20 GHz) Most reliable, fast transmission, | (Uplink frequency 1.6 GHz - 30 GHz) expensive VERY FAST, EXPENSIVE Microwave { frequency range 300 Miz ~ 300 Giiz) Allunguided media = transmitter, receiver and atmosphere NETWORK DEVICES [i mark- case study) MODEM enables a computer to transmit data over telephone (MODulator DEModulator) lines ; Used to convert digital signals into analog External modem , Internal modem signals and vice versa. RJ45 connector Eight-wire connector used to connect computers (Registered Jack - 45) on LANs, especially Ethernets. ETHERNET CARD Hardware device that helps in the connection of (NIC - Network Interface Card) nodes within a network. Physical address of a NIC is (NIU - Network Interface Unit ) known as MAC address MAC Address = Media Access Control (6-bytes long > Example 10 : BS :03 :63:2E:FC) Address GATEWAY _ establishes intelligent connection between a local network and external networks that are completely different. ‘connects local networks wi ‘thaving different types of cables _| ‘connects multiple networks with different protocols ROUTER v/s BRIDGE Can handle multiple protocols and works Cannot manage multiple protocols and works using that are completely different SWITCH v/s HUB An intelligent device that connects several | An electronic device which connects several nodes nodes for forma network. __ to forma network. __ Sends information only to intended nodes Redirects the information to all the nodes in | [WiFi Card > For wireless communication to send and receive signals between devices

You might also like