Professional Documents
Culture Documents
Ict 2 Notes
Ict 2 Notes
A register is a very small amount of very fast memory that is built into the
CPU (central processing unit).
High speed temporary storage space for holding data, addresses and
instructions during processing the instruction.
Register are the top of the memory hierarchy.
A Register is a group of flip-flops with each flip-flop capable of storing one
bit of information.
1
Single user operating system
• This operating system can run only one program at a time and hence called
single user or single task system.
For example ; DOS(disk operating system)
• DOS(disk operating system)
• It is single user, single tasking operating system, it is CUI(Character user
interface) or CLI(Command line interface) based operating system.
Multi user operating system
• A multi user operating system allows for multiple users to use the same computer
at the same time.
• Also known as network operating system.
For example
Windows ;
• It is single user, multi tasking operating system for personal computer.
• It is GUL (graphical user interface) based operating system.
Device Management: Device management keeps tracks of all devices. This module
also responsible for this task is known as the I/O controller. It also performs the task of
allocation and de-allocation of the devices.
I/O System Management: One of the main objects of any OS is to hide the peculiarities
of that hardware devices from the user.
Security:- Security module protects the data and information of a computer system
against malware threat and authorized access.
2
Computer Network:
A computer network is a group of computers connected with each other through a transmission
medium such as cable, wire etc. In this guide, we will discuss the types of computer networks in
detail.
Types of Computer Network
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)
1. Local Area Network (LAN)
Local area network is a group of computers connected with each other in a small places such as
school, hospital, apartment etc.
LAN is secure because there is no outside connection with the local area network thus the data
which is shared is safe on the local area network and can’t be accessed outside.
LAN due to their small size are considerably faster, their speed can range anywhere from 100 to
100Mbps.
LANs are not limited to wire connection, there is a new evolution to the LANs that allows local
area network to work on a wireless connection.
2. Metropolitan Area Network (MAN)
3
MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other through
telephone lines. The size of the Metropolitan area network is larger than LANs and smaller than
WANs(wide area networks), a MANs covers the larger area of a city or town.
3. Wide area network (WAN)
Wide area network provides long distance transmission of data. The size of the WAN is larger
than LAN and MAN. A WAN can cover country, continent or even a whole world. Internet
connection is an example of WAN. Other examples of WAN are mobile broadband connections
such as 3G, 4G etc.
What is Topology?
Topology defines the structure of the network of how all the components are interconnected
to each other. There are two types of topology: physical and logical topology.
4
Bus Topology
o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
5
Ring Topology
6
Star Topology
Tree topology
7
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are
the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
8
Mesh topology
Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.
Hybrid Topology
o The combination of various different topologies is known as Hybrid topology.
o A Hybrid topology is a connection between different links and nodes to transfer the
data.
9
o When two or more different topologies are combined together is termed as Hybrid
topology and if similar topologies are connected with each other will not result in
Hybrid topology. For example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.
10
What is Database?
A database is an organized collection of data, so that it can be easily accessed and
managed.
You can organize data into tables, rows, columns, and index it to make it easier to find
relevant information.
Database handlers create a database in such a way that only one set of software program
provides access of data to all the users.
The main purpose of the database is to operate a large amount of information by storing,
retrieving, and managing data.
There are many dynamic websites on the World Wide Web nowadays which are handled
through databases. For example, a model that checks the availability of rooms in a hotel. It
is an example of a dynamic website that uses a database.
There are many databases available like MySQL, Sybase, Oracle, MongoDB, Informix,
PostgreSQL, SQL Server, etc.
Advantage of DBMS
Controls redundancy
It stores all the data in a single database file, so it can control data redundancy.
Data sharing
An authorized user can share the data among multiple users.
Backup
It provides Backup and recovery subsystem. This recovery system creates automatic data
from system failure and restores data if required.
Multiple user interfaces
It provides a different type of user interfaces like GUI, application interfaces.
Disadvantage of DBMS
Size
It occupies large disk space and large memory to run efficiently.
Cost
DBMS requires a high-speed data processor and larger memory to run DBMS software, so it
is costly.
Complexity
DBMS creates additional complexity and requirements.
11
Data communication
Data communications means the exchange of data between two devices via
some form of transmission medium such as a wire cable.
For data communications to occur, the communicating devices must be part
of a communication system made up of a combination of hardware (physical
equipment) and software (programs).
Components of Data Communication:
The five components of data communication are:
1. Message - It is the information to be communicated. Popular forms of information
include text, pictures, audio, video etc.
2. Sender - It is the device which sends the data messages. It can be a computer,
workstation, telephone handset etc.
3. Receiver - It is the device which receives the data messages. It can be a
computer, workstation, telephone handset etc.
4. Transmission Medium - It is the physical path by which a message travels from
sender to receiver. Some examples include twisted-pair wire, coaxial cable, radio
waves etc.
5. Protocol - It is a set of rules that governs the data communications. It represents
an agreement between the communicating devices. Without a protocol, two devices
may be connected but not communicating.
12
Internet Applications
On-line communication
Software sharing
Exchange of views on topics of common interest
Posting of information of general interest
Product promotion
Feedback about product
Customer support service
On-line journals and magazines
web browser
A browser is software that is used to access the internet. A browser lets you
visit websites and do activities within them like login, view multimedia, link from one site
to another, visit one page from another, print, send and receive email, among many
other activities. The most common browser software titles on the market are:
Microsoft Internet Explorer, Google's Chrome, Mozilla Firefox, Apple's Safari,
and Opera. Browser availability depends on the operating system your computer is
using (for example: Microsoft Windows, Linux, Ubuntu, Mac OS, among others).
13
Search engine
Search Engine refers to a huge database of internet resources such as web pages,
newsgroups, programs, images etc. It helps to locate information on World Wide Web.
User can search for any information by passing query in form of keywords or phrase. It
then searches for relevant information in its database and return to the user.
14
Email (Electronic Mail)
Short for electronic mail, email (or e-mail) is defined as the transmission of messages
over communications networks. Typically the messages are notes entered from
the keyboard or electronic files stored on disk. Most mainframes, minicomputers,
and computer networks have an email system.
Some electronic mail systems are confined to a single computer system or network, but
others have gateways to other computer systems, enabling users to send electronic mail
anywhere in the world. Companies that are fully computerized make extensive use of e-mail
because it is fast, flexible, and reliable
E-mail System
E-mail system comprises of the following three components:
Mailer
Mail Server
Mailbox
Mailer
It is also called mail program, mail application or mail client. It allows us to manage,
read and compose e-mail.
Mail Server
The function of mail server is to receive, store and deliver the email. It is must for mail
servers to be Running all the time because if it crashes or is down, email can be lost.
Mailboxes
Mailbox is generally a folder that contains emails and information about them.
Working of E-mail
Email working follows the client server approach. In this client is the mailer i.e. the mail
application or mail program and server is a device that manages emails.
Following example will take you through the basic steps involved in sending and
receiving emails and will give you a better understanding of working of email system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e. mail client and
then select Send option.
The message is routed to Simple Mail Transfer Protocol to person B’s mail
server.
15
The mail server stores the email message on disk in an area designated for
person B.
The disk space area on mail server is called mail spool.
Now, suppose person B is running a POP client and knows how to communicate
with B’s mail server.
It will periodically poll the POP server to check if any new email has arrived for
B.As in this case, person B has sent an email for person B, so email is
forwarded over the network to B’s PC. This is message is now stored on person
B’s PC.
16
Collaborative computing technologies can work across various operating systems and
devices, allowing individual workers to participate in work sessions from various
locations with different equipment. For example, two workers can collaborate if one is
using video conferencing equipment in an office and the other is using a laptop with
webcam.
17
Benefits of E-Commerce
Let us now discuss the benefits of e-commerce −
It facilitates free market.
It is available 24×7.
Its presence is global (there is no constrain of political boundary as such).
Set up cost is substantially low.
It provides user-friendly technology.
It offers multiple opportunity parallel and simultaneously.
It provides frugal facilities to promote and market businesses.
18
• One of the most common methods of providing information assurance is to have
an off-site backup of the data in case one of the mentioned issues arise.
19