Professional Documents
Culture Documents
Grade 8 Second Term Note
Grade 8 Second Term Note
Grade 8 Second Term Note
A wired network is a network that uses cables to connect the different devices such as
laptops, computers, and printers. Wireless network does not use wires or cables to
connect computers or other devices. In a wireless network devices are connected
through radio waves. Bluetooth and Wi-Fi are two wireless technologies that use radio
waves for connecting various devices.
Types of Network
Based on the geographical area and transmission medium used, computer networks
can be categorized into following types;
A WAN is a computer network that covers a large geographical area such as a city, a
country, or many countries. It connects LANs in different cities and countries used in a
WAN to extend the signal over a distance.
1
Grade 8 – Computer
Network Architecture
Network architecture is a logistical and structural layout that shows how network
devices are connected and the rules that regulate data transfer between them. Since
the computer network architecture governs the structure of the network, its
performance relates directly to the quality of the architecture. Understanding network
architecture requires knowledge of its components.
Hardware
Network protocols
Transmission media
Network topologies
Network Components
NIC stands for network interface card. NIC is a hardware component used to connect a
computer with another computer onto a network. There are two types of NIC. There
are;
Wired NIC: The Wired NIC is present inside the motherboard. Cables and
connectors are used with wired NIC to transfer data.
Wireless NIC: The wireless NIC contains the antenna to obtain the connection over
the wireless network. For example, laptop computer contains the wireless NIC.
Switch
2
Grade 8 – Computer
Router
Modem
A modem is a hardware device that allows the computer to connect to the internet over
the existing telephone line. A modem is not integrated with the motherboard rather
than it is installed on the PCI slot found on the motherboard. It converts the digital
data into an analog signal over the telephone lines.
Hub
A Hub is a hardware device that divides the network connection among multiple
devices. When computer requests for some information from a network, it first sends
the request to the Hub through cable. Hub will broadcast this request to the entire
network.
Network Cables
Cable is a transmission media used for transmitting a signal. There are three types of
cables used in transmission:
A network operating system (NOS) is software that connects multiple devices and
computers on the network and allows them to share resources on the network. The
basic definition of an operating system is that the operating system is the interface
between the computer hardware and the user.
3
Grade 8 – Computer
Network Topologies
In Computer Network, there are various ways through which different components are
connected to one another. Network Topology is the way that defines the structure, and
how these components are connected to each other. There are various network
topologies are:
Bus Topology
If node devices are connected to each other in a bus topology, then the number of
cables required to connect them is 1, known as backbone cable, and node drop lines
are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support
up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to build
small networks.
Bus topology is familiar technology as installation and troubleshooting techniques
are well known.
4
Grade 8 – Computer
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for
Ring topology with a large number of nodes,
because if someone wants to send some data
to the last node in the ring topology with 100
nodes, then the data will have to pass through
99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the
network.
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole
topology.
Less secure.
Star topology
5
Grade 8 – Computer
If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
Network Protocols
A network protocol is an accepted set of rules that govern data communication between
different devices in the network. It determines what is being communicated, how it is
being communicated, and when it is being communicated. It permits connected devices
to communicate with each other, irrespective of internal and structural differences.
HTTP stands for HyperText Transfer Protocol. Tim Berner invents it. HyperText is the
type of text that is specially coded with the help of some standard coding language
called HyperText Markup Language (HTML). HTTPS stands for HyperText Transfer
Protocol Secure.
Innovation in Network
Cloud Computing
Cloud computing is a network of servers, hosted on the internet, used for storing and
retrieving data. Cloud computing is defined as virtual platform that allows you to store
and access your data over the internet. There are different cloud computing service
providers such as Google drive, iCloud, OneDrive, and so on.
Global Access
Storage
Easy set up
Automatic Updates
Low Cost
Security
Privacy
Loss of Control
Reliability
6
Grade 8 – Computer
Secure in Network
Network security is defined as the activity created to protect the integrity of your
network and data. Every company or organization that handles a large amount of data,
has a degree of solutions against many cyber threats. Network Security has become the
central topic of cyber security with many organizations inviting applications from
people who have skills in this area. The network security solutions protect various
vulnerabilities of the computer systems such as:
Users
Locations
Data
Devices
Applications
There are several types of network security through which we can make our network
more secure, your network and data are shielded from breaches, invasions, and other
dangers by network security. Following are some of it;
Email security
Firewalls
Network segmentation
Access control
Web security
Password policies
Biometric security
Two-factor authentication
7
Grade 8 – Computer
Network Security helps in protecting clients’ information and data which ensures
reliable access and helps in protecting the data from cyber threats.
Network Security protects the organization from heavy losses that may have
occurred from data loss or any security incident.
It overall protects the reputation of the organization as it protects the data and
confidential items.
8
Grade 8 – Computer
Computer Software
System Software
System software is a software that directly operates the computer hardware and
provides the basic functionality to the users as well as to the other software to operate
smoothly. There are three types of system software. There are;
Operating system
It is the main program of a computer system. When the computer system turns ON this
is the first software that loads into computer’s memory. Basically, it manages all the
resources such as resources such as computer memory, CPU, hard disk, printer, and
etc… and provides an interface to the user, which helps the user to interact with the
computer system.
Language processor
9
Grade 8 – Computer
Utility programs
Utility programs are software used to maintain and efficiently run the computer, its
devices, or its programs such as operating system, word processors or spreadsheets.
Some of the commonly used utility programs given below.
o Antivirus utility
o Backup utility
o File compression utility
o Disk defragmenters
Application Software
Application software is a set of one or more programs used to accomplish a specific task
such as creating and formatting documents, performing calculations, drawing and
editing images etc.
Software
Application software is a set of one or more programs used to accomplish a specific task
such as creating and formatting documents, performing calculations, drawing and
editing images etc.
Computer Languages
Machine languages are faster in execution because they are in binary form.
Machine language does not need to be translated, because it is already present in
simple binary form.
The CPU directly executes the machine language.
10
Grade 8 – Computer
The evolution of the computer system and operating system over the time period
is due to machine language.
Machine languages are used in developing a high-grade computer system.
o High-level languages
A computer program written using short English phrases is called high-level language
program. However the computer cannot understand a high-level language. Therefore it
has to be converted to machine language using translator.
o Assembly language
Assembly language uses English keywords or symbols or mnemonics to represent the
different instructions in machine language. Mnemonics refer to an abbreviation for an
operation.
It provides precise control over hardware and hence increased code optimization.
It allows direct access to hardware components like registers, so it enables
tailored solutions for hardware issues.
Efficient resource utilization because of low level control, optimized code,
resource awareness, customization etc.
11
Grade 8 – Computer
Complex and very hard to learn the language especially for beginners.
It is highly machine dependent. So, it limits portability.
It is really hard to maintain the code, especially for large scale projects.
It is very time consuming since it is really hard to understand and very length of
code.
Debugging is very challenging to programmers.
Registers
Command
Instructions
Labels
Mnemonic
Marco
Operands
Opcode
o Fourth-generation languages
Fourth-generation languages consist of statements similar to statements in a human
language. They are more visual and do not require a considerable amount of
programming knowledge.
12
Grade 8 – Computer
Storage devices
Most users of digital devices are aware that they need some kind of storage device to
allow them to use their data at a later time. Storage devices that are used to store data
for long periods of time are called secondary storage devices. Digital devices also need
to be able to store computer programs and data when the devices are currently in use.
Memory used in this way is called primary memory. Primary memory is built into the
main internal components of a digital device. There are two types of primary memory.
13
Grade 8 – Computer
Number System
In a computer when you type words or numbers, the computer translates them into
numbers. Even colors, outlines of drawing, audios or videos are translated and store as
large numbers. A computer can understand these combinations of numbers and
respond accordingly. There are four types of number systems as following;
o Binary (base 2)
o Decimal (base 10)
o Octal (base 8)
o Hexadecimal (base 16)
The decimal number system is the most widely used number system. It consists of ten
digits from 0 to 9. These digits can be used to represent any numeric value. The base of
decimal number system is 10.
The binary or base 2 number system uses only two digits: 0 and 1. It is the most
fundamental numbering system in digital computers.
1310 = _______2
14
Grade 8 – Computer
3210 = __________2
10112 = _______10
111112 = __
_____10
1 0 1 1 1 0
25 24 23 22 21 20
32 16 8 4 2 1
32 - 8 4 2 -
15
Grade 8 – Computer
Logic Circuits
A logic gate is an electronic circuit designed by using electronic components like diodes,
transistors, resistors, and more. Logic gates are the fundamental components of all
digital circuits and systems. In digital electronics, there are seven main types of logic
gates used to perform various logical operations. A logic gate is basically an electronic
circuit designed by using components like diodes, transistors, resistors, capacitors, etc.,
and capable of performing logical operations. The logic gates can be classified into the
following major types:
ii. Universal Logic Gates – In digital electronics, the following two logic gates are
considered as universal logic gates:
NOR Gate
NAND Gate
iii. Derived Logic Gates – The following two are the derived logic gates used in
digital systems:
XOR Gate
XNOR Gate
AND gate
The AND gate is one of the basic logic gate that performs the logical multiplication of inputs applied
to it. It generates a high or logic 1 output, only when all the inputs applied to it are high or logic 1.
Otherwise, the output of the AND gate is low or logic 0. The following are two main properties of
the AND gate:
AND gate can accept two or more than two input values at a time.
When all of the inputs are logic 1, the output of this gate is logic 1.
16
Grade 8 – Computer
OR gate
OR gate can be designed to have two or more inputs but only one output. The primary
function of the OR gate is to perform the logical sum operation.
NOT gate
The NOT gate is another basic logic gate used to perform compliment of an input signal
applied to it. It takes only one input and one output. The output of the NOT gate is
complement of the input applied to it. Therefore, if we apply a low or logic 0 output to
the NOT gate is gives a high or logic 1 output and vice-versa. The NOT gate is also
known as inverter, as it performs the inversion operation.
The output of a NOT gate is complement or inverse of the input applied to it.
NOT gate takes only one output.
17
Grade 8 – Computer
Machine Learning
Machine learning refers to the process of teaching computers to learn from data,
without being explicitly programmed to do so. This involves using algorithms and
statistical models to find patterns in data, and the using these patterns to make
predictions or decisions.
18
Grade 8 – Computer
In computing, data is information that has been translated into a form that is efficient
for movement or processing. Data can be measured, collected, reported, and analyzed,
whereupon it is often visualized using graphs, images, or other analysis tools. Raw data
(“unprocessed data”) may be a collection of numbers or characters before it’s been
“cleaned” and corrected by researchers. It must be corrected so that we can remove
outliers, instruments, or data entry errors. Data that has been processed is known as
information.
Big Data
Data that cannot easily be processed using traditional applications is known as Big
Data. Big data can be describe as 5Vs. following are the 5Vs;
Volume
This refer to the “Huge Amount of data” that is generated at a rapid rate every day,
including sources such as Facebook, Twitter, YouTube, IoT, and others. The size of the
data generally determines if a data set can be termed Big Data or not. Usually, data
sets greater than terabytes and petabytes are called Big Data.
Velocity
This refers to the speed at which different sources are generating data on daily basis.
The data flow is getting high and in continuous form.
Variety
Big data sets are generally collected from a wide range of sources including
transactional databases, sensor data, end etc…. a data set can be of any type such as
images, text, audio, or video.
Veracity
This refers to the consistency, quality, accuracy, and reliability of Big data. In other
words, veracity is the process to sort out and manage Big Data.
19
Grade 8 – Computer
Value
Data in itself is of no use or importance but it needs to be converted into something
valuable to extract information. Hence, you can state that value is the most important
V of all the 5Vs.
Connectivity Interoperability
Intelligence and Identity Embedded Sensors and Actuators
Scalability Autonomous operation
Dynamic and Self-Adapting Data-driven
(Complexity) Security
Architecture Ubiquity
Safety Context Awareness
Self Configuring
20
Grade 8 – Computer
Applications of IoT
Smart Agriculture
Smart Home
Smart Pollution Control
Smart Healthcare
Smart Cities
Smart Retail
Wearables
21