Professional Documents
Culture Documents
COMPUTER AWARENESS 2018 Part 2
COMPUTER AWARENESS 2018 Part 2
COMPUTER AWARENESS 2018 Part 2
COMPUTER
AWARENESS
PART II
WWW.ANUJJINDAL.IN
PART II COMPUTER AWARENESS
Components:
1. Server- A computer designed to process requests and deliver data to other (client)
computers over a local network or the internet.
2. Receiver- Hardware module or device used to receive signals.
3. Channel- A physical connection between server and receiver.
Transmission channel
Simplex Channels- Simplex is a communication channel that operates in one direction at a time.
Half Duplex Channel- A Half duplex channel can send and receive data, but not at the same
time.
Full Duplex Channel- Refers to the transmission of data in two directions simultaneously.
Network devices
1. Network adaptor is a device that enables a computer to connect with the other
computer/using MAC Address.
2. Hub is a device that splits a network connection into multiple computers.
3. Switch is a telecommunication device grouped as one of computer network components.
4. Cable is one way of transmission medium which can transmit communication signals.
5. Repeaters are used to re generate or replicate signals that are weekend or distorted by
transmission over long distances.
6. Bridge is used to connect two LANs with the same standard but using different types of
cables.
7. Routers are used to join multiple computer networks together via either wired or wireless
connections.
8. Gateways are a key stopping point for data on its way to or from other networks.
9. MODEM - Modulator-Demodulator electronic device that allows computers to communicate
over telephone wires or cable-TV cable.
PART II COMPUTER AWARENESS
TYPES OF NETWORK
1. Local Area Network (LAN) - A computer network that link devices within a building or group
of adjacent building. Example star line, ring LAN, bus LAN.
2. Wide Area Network (WAN) - A computer network in which the computers connected may be
far apart.
3. Metropolitan Area Network (MAN) - A Metropolitan Area Network (MAN) is a network that
interconnects users with computer resources in Geographic area or region larger than that
covered by even a LAN but smaller than the area covered by WAN. Example- Public Networks,
Public Switched Telephone Networks (PSTN), Public Service Digital Network (PSDN).
Integrated Services Digital Network (ISDN) is a set of communication standards of simultaneous
digital transmission of voice, video, data.
NETWORK TOPOLOGY
1. Mesh Topology- Mesh is a network topology in which devices are connected with many
redundant interconnections between network notes.
2. Star Topology- Star topology is a network topology where each individual piece of a network
is attached to a central node.
3. Ring Topology- Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to each other according to their adjacent in the ring
structure.
4. Bus Topology- Bus topology is a specific kind of network topology in which all of the various
devices in the network are connected to a single cable or line.
OSI MODEL
OSI: The open system interconnection model (OSI Model) is a conceptual model that
characterizes and standardizes the communication functions of a telecommunication of
computing system without regard of their underlying internal structure and Technology.
2. Data Link Layer- The data link layer is the second layer of OSI model. This layer is the
protocol layer that transfers the data in the form of frames between adjacent network nodes in
a wide area network or between nodes on the same Local area network segment.
3. Network Layer- The network layer is the third level of the OSI model and the layer that
provide the data routing paths for network communication. Data is transferred in the form of
packets biological network path in an ordered format controlled by the network layer.
4. Transport Layer- The transport layer is the layer in the OSI model responsible for end-to-end
communication (in the form of segments) over a network. It provides logical communication
between application processes running on different host within a layered architecture of
protocols and other network components.
5. Session Layer- In the OSI model, the session layer is the fifth layer which controls the
connections between multiple computers. The session layer tracks the dialogues between
computers, which are also called sessions.
6. Presentation Layer- The presentation layer is the 6 layer in OSI model. It is used to present
data to the application layer (layer 7) in an accurate, well defined and standardized format. The
presentation layer is sometimes called the syntax layer.
7. Application Layer- The application layer is a layer in the OSI model and in the TCP/IP protocol
suite. It consists of protocols that focus on process-to-process communication across an IP
Network and provides a firm communicate and end-user services.
DATA TRANSMISSION
1. NIC-Network Interface Card: Network Interface Card (NIC) is a computer circuit board or card
that is installed in a computer so that it can be connected to a network.
• Nodes- It is a connect point where data transmission and redistribution of data starts.
• File Transfer Protocol (FTP) is a standard network protocol used to transfer computer
files between a client and server on a computer network.
• Internet Service Provider (ISP) is an organization that provides services for accessing
and using the internet.
• Web server is a program that uses HTTP (Hyper Text Transfer Protocol) to serve the files
that form web pages to the users in response to their requests which are forwarded by
their computers' HTTP clients.
• Hyperlink is a word, phrase or image that you can click on to jump to a new document
or a new section within the current document.
INTERNET
1. Internet- A global computer network providing a variety of Information and Communication
facilities. Consisting of interconnected networks using standardized Communication protocols.
2. Modem- A combined device for modulation and demodulation, for example, between the
digital data of a computer and the analogue signal of a telephone line.
3. Web browser- Web browser is a software application used to locate, retrieve and display
content on the World Wide Web including web pages, images and video.
SOFTWARE
Software- The programs and other operating information used by a computer.
Types of Software
SYSTEM SOFTWARE APPLICATION SOFTWARE PROGRAMMING SOFTWARE
Operating Software Educational Software Text Editor
Loader Spreadsheet Software Compiler
Data Driver Word Processors Interpreter
Firmware
• Operating System Software- An Operating System (OS) is system software that manages
computer hardware and software resources and provides common service programs.
The operating system is a component of the system software in a computer system.
• Word Processors- The program of machine for storing, manipulating and formatting
from a keyboard and providing a printout.
• Interpreter- A program that can analyze and execute a program line by line.
• Database Management System- Software that handles the storage, retrieval and
updating of data in a computer system.
• Antivirus Software- Antivirus software prime all set of programs that are designed to
prevent, search for, and remove software viruses and other malicious software like
worms, Trojans, adware and more.
• Boot- The boot process is the name for the various steps the computer takes after you
turn it on, all the way until the operating system is loaded.
• Cold Boot- The startup of a computer from a power down or off state, also called a hard
boot.
MICROSOFT OFFICE
MS Office: Microsoft office or Microsoft office system is a collection of computer programs
made by Microsoft. The programs are created for all users. There are different versions of the
software for home users and for business users.
• It was first announced by Bill Gates of Microsoft on August 1, 1988 at COMDEX in Las
Vegas.
• MS Office primarily includes Word, Excel, PowerPoint, Access and Outlook. It also
includes OneNote, Groove, InfoPath and Publisher.
MS WORD
• Microsoft word is a word processor developed by Microsoft.
• It is used for creating, editing, formatting, storing, retrieving and printing of a text
document.
• Microsoft word's native file formats are denoted either by a .doc or.docx file extension.
ü Title Bar- A bar at the top of the window that bears the name of the window.
ü Menu Bar- A screen element of MS word that is usually located below the title bar that
provides categorized option.
ü Open- Displays the open dialogue box so that you can retrieve existing document.
ü Save, Print, Print Preview- Saves the active document to a specified location, prints
active document and displays what the document will look like when you print it.
ü Cut, Copy, Paste- Cuts the selected text and places it on the clipboard then copies
selected text and paste the contents of the clipboard to a new location.
MICROSOFT EXCEL
• Microsoft Excel is software developed by Microsoft Corporation that allows user to
organize, format and calculate data with formulas using a spreadsheet. The exact
number of rows and columns are 1,048,576 rows and 16,384 columns.
• It features calculation, graphing tools, pivot tables, and a macro programming language
called Visual Basic for applications.
ü Cell Address- The cell address is the location of a Cell on a worksheet and is defined by
the column letter and the row number.
ü Formula Bar- The formula bar is located under the toolbars at the top of the working
screen. It contains the edit line for working with formulas and provides information
regarding cell addresses.
ü Functions- A function is a preset formula. Functions consist of the function name and its
arguments. The function name tells Excel what calculation you want it to perform.
ü Pivot Table Wizard- Pivot table Wizard is a series of dialogue boxes that guides you step
by step through the process of creating a pivot table.
ü Spreadsheet- Spreadsheet is the generic term for applications, such as Excel, that you
can use to enter, analyze and calculate data. It performs mathematical calculations and
projections based on data entered. Common spreadsheet uses include analysis, charting
and budgeting.
ü Syntax- The syntax of the function refers to the order of the functions arguments. In
some functions, the order of the arguments determines how Excel solves the function.
ü Worksheet- A worksheet is an electronic spreadsheet that lets you enter, analyze and
calculate data. Within a workbook, worksheets can share information and calculations
pertaining to several worksheets can be performed at one time. Default number of
worksheets in a new workbook is three.
PART II COMPUTER AWARENESS
MS POWERPOINT
• The application software that can create professional looking visual aids is called
presentation graphics software.
• MS PowerPoint can be started by clicking at start - program - Microsoft PowerPoint.
• A slide can contain one or more of these components: Titles, Graphs, Drawing Objects,
Clipart and Pictures.
• The slide components that are used for reference are: Handouts, Notes, and Outlines.
ü Auto ClipArt- Use the auto ClipArt command to begin a concept keyword search of your
slideshow. PowerPoint searches your slideshow for keywords that relate to the
keywords associated with the clip art images from the clip gallery.
ü Background- the background dialogue box provides various options that let you change
the background look of a single slide or every slide in the presentation.
ü Slide Sorter Toolbar- the slide sorter toolbar is available only in slide sorter view and
allows quick access to special PowerPoint effects such as transitions, builds, rehearse
timing, and hide slides.
ü Slide Sorter View- slide sorter view displays a reduced image of all the slides in a grid-
like fashion. This view makes it easier to rearrange the slides in a presentation and add
transitions and special effects.
ü Slide View- slide view allows you to work on all slide at a time. While in slide view, you
can add any element to a slide, including text, graphics, shapes and graphs.
PART II COMPUTER AWARENESS
COMPUTER SECURITY
Computer security is the process of preventing and detecting unauthorized use of your
computer.
1. Virus is a type of malicious software program (malware) that, when executed, replicates by
reproducing itself (copying its own source code) or infecting other computer programs by
modifying them. Example Code Red, Nimba, SirCam, Ripper, Melissa, MDMA, One Half.
v Boot Virus (Trojans) affect the disc operating system, thereby corrupting the booting
files in spite of the operating system used. The main distinction is that they don't
replicate but spread on opening and email attachment specifically.
v Macro Virus (Worms) are intended to affect data files specifically by finding
vulnerabilities in word or Excel documents. They infect by replicating to other systems in
the network. They don't require a host file to replicate themselves.
v Virus Hoax is a message warning the recipient of a non-existent computer virus threat.
2. Spyware: It is software that secretly collects user information while on the Internet. Spyware
can capture information like web browsing habits, address messages, usernames and
passwords and credit card information.
3. Adware: This program launches the advertisements in the form of pop-ups. Usually the add
Words are based on the Internet behaviour of the user.
4. Spam: These are unwanted email. In other words we can call them as unsolicited
promotional mail.
5. Pharming: More advanced method of phishing in which the attackers create duplicate or
similar looking website of other companies, to attract customers and steal the data.
usually monitor the browsing nature of a person so that the companies can create better
marketing strategies.
7. Mail Bomb: An excessively large email (typically many thousands of messages) or one large
message send to a user's email account. This is done to crash the system and prevent genuine
messages from being recovered.
8. Scareware: A common trick cyber criminals use to make users think that their Computer has
become infected with malware to get them to purchase a fake application.
9. Sniffers: A software program used to monitor the traffic in a network. The hacker’s main use
the sniffed data to access important confidential data.
10. Rootkit: A program designed to hide objects such as processes, files or Windows registry
entries (often including its own).
11. Phishing: This is acquiring the personal and sensitive information of a person through
official looking emails. Users of online banking and e-commerce websites are more prone to
this attack.
12. Spoofing: It is a type of scam where an Intruder attempts to gain unauthorized access to a
user's system or information by pretending to be the user.
Firewall is a network security system that monitors and controls the incoming and outgoing
network traffic based on predetermined security rules.
Anti-virus software is a program or set of programs that are designed to prevent, search for,
detect and remove software viruses and other malicious software like worms, Trojans, and
adware.
Zombie is a computer connected to the internet that has been compromised by a hacker,
computer virus or Trojan horse program and can be used to perform malicious task of one sort
or another under remote direction.