0% found this document useful (0 votes)
13 views46 pages

14 It & Acts

Uploaded by

alan thomas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views46 pages

14 It & Acts

Uploaded by

alan thomas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 46

IT & ACTS 2 1.

TFT (THIN FILM  NUMBER OF PIXEL


TRANSISTORS)
1 HARD WARE 1 2. IPS (IN PLANE ∝RESOLUTION
SWITCHING)  SIZE OF PIXEL 1/∝
INTRODUCTION  Functional units of a Types of LED RESOLUTION
computer 1. OLED (Organic  PIXEL – SMALLEST
INFORMATIONS Hardware
TECHNOLOGY ELEMENT
1. Input Devices 2. AMOLED (Active Matrix
 RESOLUTION – TOTAL
 Electronic Device 2. Output Devices NUMBER OF PIXEL
(Calculator Mobile, 3. CPU
4. Other Devices MONITOR (VDU)
Computer )
 Features of VDU
Output Unit
Output Devices 1. Size (Diagonal length)
1. DATA -INPUT  The information obtained
1. Monitor 2. Pixel
2. PROCESSING- CPU after data processing is
2. Speaker 3. Resolution
3. INFORMATION – supplied to the outside
3. Printer 4. PPI (Pixel Per Inch)
OUTPUT [Monitor , world through the output
4. Plotter 5. Refresh Rate & Response
Speaker ,Printer , unit in a human-readable
5. Projector time
Plotter ,Projector ] form.
 The functions performed
Q1. താഴെപ്പറയുന്ന  MONITOR (VDU) -
by output unit
പ്രസ്താവനകളിൽ ഏത്? VISUAL DISPLAY
1. Receives the results
ഏതൊക്കെയാണ് ശരി ? UNIT
produced by the CPU in
i) ഡിജിറ്റൈസർ ഒരു coded form.
ഇൻപുട്ട് ഉപകരണമാണ്. Generations of Monitor 2. Converts these coded
ii) പ്ലോട്ടർ ഒരു ഔട്ട്പുട്ട് 1. MONOCHROME results to human-readable
ഉപകരണമാണ്. (BLACK & WHITE) form.
iii) ജോയിസ്റ്റിക്ക് ഒരു
2. CRT (CATHODE RAY 3. Supplies the results to the
TUBE) outside world.
ഇൻപുട്ട് ഉപകരണമല്ല.
3. LCD (LIQUID CRYSTAL  FULL -1080 p
ANS :-(i) and (ii)
DISPLAY)  HALF H – 720 p Monitor
4. LED (LIGHT EMITTING A Visual Display Unit
DIODE) (VDU) is an output device
Types of LCD
that visually conveys text,  Monitors, with lesser  Drum  Two factors that
graphics and video response time provide determine the quality of a
information. better movie viewing 2. NON IMPACT printer are its resolution
experience.  Ink Jet (Catridge) and speed.
 Some of the  Laser (Toner)  Resolution is measured in
characteristics of a VDU Q1. Which computer  Thermal Printer (Heat terms of DPI.
are size, resolution, pixel- monitor uses neon/xenon gas Sensitive Paper)  Speed is measured in
pitch and response time. to produce images? terms of number of
VDUs are available in a. LED Printer characters printed in a
different sizes. b. CRT  Printers are used to unit of time and is
 The size of a monitor is c. Plasma produce hardcopy output. represented as characters
measured diagonally d. OLED  Based on the technology per second (cps), lines per
across the screen, in used, they can be minute (lpm), or pages
inches. Refresh rate and Response classified as impact or per minute (ppm).
 The resolution of the time non-impact printers.
monitor is the maximum Refresh rate determines how Impact printers use the 3D Printer
number of pixels it can many frames per second your typewriting or printing A 3D printer can print
display horizontally and display can show, while mechanism where a anything from ceramic cups
vertically (such as 800 x response time determines hammer strikes the paper to plastic toys, metal
600 or 1024 x 768 or how fast each frame can through a ribbon in order machine parts, stoneware
1600x1200). change. A high refresh rate to produce output. vases, fancy chocolate cakes,
 The pixel spacing on the with a low response time can  Dot-matrix printers fall etc.
screen is called the dot provide the best image under this category. Non-
pitch. A screen with quality and performance for impact printers do not  DPI- Dots Per Inch
smaller dot pitch produces fast-moving content, such as touch the paper while
sharper images. gaming or action movies. printing. 3
 Response time refers to  They use different
the time taken for a pixel  Printer technologies to print INPUT DEVICES
to turn from a state of characters on paper.
brightness to a state of 1. IMPACT Inkjet, Laser and Thermal Plotter
darkness and then back  Dot matrix printers fall under this A plotter is an output device
again.  Daisywheel category of printers. used to produce hardcopies
 Chain
of graphs and designs on the viii. Trackball (Pointing  Primary input device- B. ടച്ച് സ്ക്രീൻ
paper. A plotter is typically Devices ) keyboard C. ബാർകോഡ് റീഡർ
used to print large-format ix. Light pen (Pointing D. ജോയ്സ്റ്റിക്
graphs or maps such as Devices)  Keyboard Invented by - Q3. An optical input device
construction maps, x. Stylus (Pointing Christopher Latham that interprets pencil marks
engineering drawings and big Devices) Sholes on paper media is.............
posters. xi. Graphic Tablet  Mouse invented by - A. OMR
 Drum Plotter (Digitizer) Douglas Engelbert B. Punch Card Reader
 Flat bed Plotter xii. Sensor  Older Mouse is called- C. Optical Scanners
- Track ball Mouse D. Magnetic Tape
 CAD -Computer Aided Input Devices
Design.  With Abbreviations Q1. താഴെപ്പറയുന്ന Q4.താഴെ പറയുന്നവയിൽ
പ്രസ്‌താവനകളിൽ ഏത്/ഏ ഏതാണ് കമ്പ്യൂട്ടറിലേ ക്ക്
 BCR- Bar Code തൊക്കെയാണ് ശരി? ഡാറ്റ ഇൻപുട്ട് ചെയ്യാൻ
Input Devices
ഉപയോഗിക്കുന്ന
 Machine Language - Reader
I. ഡിജിറ്റൈസർ ഒരു ഉപകരണം?
Binary  OMR - Optical Mark
ഇൻപുട്ട് ഉപകരണമാ
 An input device is any Reader A. പ്ലോട്ടർ
hardware device that  OCR - Optical II. പ്ലോട്ടർ ഒരു ഔട്ട്പുട്ട് B. പ്രിൻറർ
sends data to a computer, character Reader ഉപകരണമാണ് C.ഫ്ലാഷ് മെമ്മറി
allowing you to interact  MICR - Magnetic ink D. ബയോ-മെട്രിക് സെൻസർ
with and control it. character Reader III. ജോയിസ്റ്റിക് ഒരു
 QR Scanner - Quick ഇൻപുട്ട് ഉപകരണമല്ല.
i. Keyboard 4
ii. Mouse (Pointing Response
A. I മാത്രം
Devices) SECONDARY STORAGE
 Devices which can be B. I AND II
iii. Scanner (Har Copy DEVICES
TO Soft Copy) considered i/p as well as C. I, II AND III
iv. Microphone o/p
Touch screen & Display D. II AND III Computer Memory
v. Touchpad (Pointing  Memory Measuring Units
Devices) Q2. താഴെ പറയുന്നവയിൽ Smallest memory measuring
vi. Joystick (Pointing Input Device പോയിൻ്റിംഗ് ഉപകര unit- bit
Devices )  Alpha numeric data entry ണം അല്ലാത്തത് ഏത്? collection of 4 bit -Nibble
vii. Camera device - keyboard A. മൗസ് collection of 8 bit -Byte
1 bit capacity - Flip flop  FDD  Data is stored on the
surface of a platter in
Computer Memory 3. Optical Disk sectors and tracks.
1. 1024 BYTE-1 KB Memory Measuring Units  BRD
(KILO)  CD  Tracks are concentric
2. 1024 KB - 1MB 1. 1 Byte + 4 bit + 8 Bit +  DVD circles on a platter.
(MEGA) 1 Nibble = 3BYTE 4. Flash Memory  Sector is a pie-sliced part
3. 1024 MB - 1 GB  Memory Card (SD of a disk platter.
(GIGA) 2. 8 BIT + 20 BIT + CARD)  Formatting is the activity
4. 1024 GB - 1TB 1NIBBLE+4 BYTE =  SSD of creating sectors and
(TERA) 8 BYTE  Pen Drive tracks on the disk. Only
5. 1024 TB -1 PB then can read/write
(PETA) Secondary Storage operation be performed
6. 1024 PB - 1 EB Devices on the disk. If a disk
(EXA)  Computer Memory  Magnetic having data is formatted,
7. 1024 EB - 1 ZB Hard Disk Drive then all data will be lost.
(ZETA) 1. Primary Memory  The hard disk consists of
8. 1024 ZB-1 YB (Internal) metal disks coated with Hard Disk Drive
( YOTTA)  RAM magnetic material  Rating of Hard Disk
9. 1024 YB-1 BB (BONTO)  ROM concealed in dust free Drive (HDD) depends on
10.1024 BB -1 GEOP containers. Hard disks capacity, speed and
BYTE 2. Secondry Memory have very high storage access time
(External) capacity, high data  Storage capacity: 500GB,
 Magnetic Storage transfer rates and low 1TB or more
 ½ BYTE =4 BIT =  Optical Storage access time.  Speed - How fast the disk
1 NIBBLE  Flash Storage  A hard disk may contain spins, rotations per
 8BIT = 1 BYTE
one or more platters. minute (rpm) usually
 2 NIBBLE = 1 BYTE  Secondary storage  Each platter requires two 5400 rpm/7200 rpm
 8 BIT =1BYTE  Access time - Time to
Devices read/write heads, one for
 16 BIT = 2 BYTE 1. Magnetic Tape each surface retrieve bits of data from
 24 BIT = 3 BYTE 2. Magnetic Disk disk (in milliseconds)
 HDD
FLOPPY DISK DRIVE  It is expensive
 Invented by ALAN
SHUGART
 Size – 3.5 INCH
 Storage Capacity -1.44 BRD (Blue Ray Disk) 5
MB  Storage capacity:- single
Layer = 25 GB, Double PRIMARY MEMORY
Optical Layer = 50GB
1
Optical disk is a data storage
medium which uses low-  The process of writing
RAM (Random Access
powered laser beam to read data to a optical disk is
Memory)
from and write data into it. It called - Burning
 Volatile many
consists of an aluminum foil  Bootstrap loader is a
sandwiched between two Flash/Semiconductor program that starts up the
circular plastic disks. Data is Type operating system when a
written on a single 1.Pendrive computer is turned on.
continuous spiral in the form 2.SD Card (Secure Digital)  It resides in the
of pits and land. 3.SSD HDD (Solid State computer's firmware or
Drive) read only memory (ROM)
CD (Compact Disk) and is responsible for
 Invented by JAMES T Solid State Drive loading the initial code
RUSSEL  A solid-state drive is a necessary to start the
 Size (diameter)- 12 CM solid-state storage device operating system.
 Storage Capacity that uses integrated circuit
-700MB assemblies to store data
persistently, typically
using flash memory.
DVD (Digital Vasatile  It is 10 times faster than
Disk) normal HDD Primary Memory
 Size -12CM  It is more durable than functions of storage unit are
 Storage Capacity – 4.7 normal HDD to hold or store:
GB ( 4.3 – 15.9 GB)  It is lighter is size
1. data and instructions  Process of loading stores frequently used
required for processing. Types of ROM operating system files instructions and data for
2. intermediate results for on from HDD to RAM is quicker processing by the
going processing. i. PROM called Booting. central processing unit
3. final results of processing,  Programmable ROM  Booting is done by a (CPU) of a computer.
before releasing to the output  Non Erasable software called Bootstrap  SRAM is used in Cache
unit. Loader. memory.
ii. EPROM (UVPROM)  Bootstrap loader is Central Processing Unit
Primary memory  Erasable PROM residing in Computer (CPU)
1.ROM  Erasable (few times only) ROM.  The CPU is the brain of
2.RAM with UV light. the computer.

 All major computations


iii. EEPROM Types of RAM and comparisons are
ROM (Read Only Memory) 1. DRAM (Dynamic) made inside the CPU.
 Electrically Erasable
 It is a non volatile PROM 2. SRAM (Static)  Responsible for activating
memory  The difference between and controlling the
 Erasable (Numerous
 ROM is a semiconductor times) DRAM and SRAM is that operations of other units
chip contains instructions SRAM is faster and more of the computer.
 EEPROM is used in the
for the start up procedure expensive, while DRAM  The functions of CPU are
flash memory
of the computer. is slower and less performed by three
 BIOS (Basic Input Output RAM (Random Access expensive. components -
System) software is stored Memory)/Main Memory  DRAM requires power 1. Arithmetic Logic Unit
in ROM. and a clock pulse to hold (ALU)
 It's a Volatile memory
 BIOS is the first software data. 2. Control Unit (CU)
 RAM holds instructions,
that runs when you power  SRAM requires power 3. Registers.
data and intermediate
on your system, only.
results of processing.
 Performing an initial pack Arithmetic Logic Unit
 It also holds the recently
of diagnostic tests (POST, Cache (ALU)
produced results of the
or Power On Self-Test).
job done by the computer.  A high speed  The actual operations
 POST is the first step in semiconductor memory specified in the
your hardware's boot system that temporarily instructions are carried
sequence.
Booting
out in the Arithmetic concerned in the system Instruction Register (IR):
Logic Unit (ALU). to execute them The instructions to be
 It performs calculations executed by the processor are
and logical operations 6 stored in the instruction
such as comparisons and register.
decision making. PRIMARY MEMORY Program Counter (PC): It
 The data and instructions holds the address of the next
2 instruction to be executed by
stored in the storage unit
are transferred to the the processor.
ALU and the processing
TYPES OF
takes place in it. REGISTERS
 Intermediate results
produced by the ALU are Accumulator: The
temporarily transferred accumulator is a part of the
back to the storage and Arithmetic Logic Unit
are retrieved later when (ALU). This register is used
needed for further to store data to perform
arithmetic and logical RAM vs ROM
processing
operation. The result of an RAM ROM
operation is stored in the It is faster It is a slower
Control Unit
accumulator. than ROM memory
 It invokes the other units
Memory Address Register It stores the
to take charge of the
(MAR): It stores the address operating It stores the
operation they are
of a memory location to system, program
associated with.
which data is either to be application required to
 It is the central nervous
read or written by the programs and boot the
system that manages and
processor. data when computer
co-ordinates all other
Memory Buffer Register the computer initially
units of the computer.
(MBR): It holds the data, is (BIOS)
 It obtains instructions functioning.
either to be written to or read
from the program stored
from the memory by the
in the memory, interprets
processor.
the operation and issues
signals to the unit
It allows Usually  BRAIN = CPU പ്ലഗ് പോയിൻ്റിൽ Virtual memory is a memory
reading and allows നിന്നുള്ള എസി പവർ management technique
 USB - universal serial ഡിസി പവറായി
writing reading only. where secondary memory
bus പരിവർത്തനം can be used as if it were a
It is volatile, It is non-  HDMI- High- ചെയ്യുകയും part of the main memory.
ie, its volatile, ie, Definition Multimedia എസ്എംപിഎസ് വഴി
സിപിയുവിൻ്റെ വിവിധ
contents are its contents Interface  MAR refers to:
ഭാഗങ്ങളിലേക്ക് വിതരണം
lost when the are retained  VGA- Video Graphics ചെയ്യുകയും ചെയ്യുന്നു.
Memory Address Register
device is even when Array.  SMPS- Equipment Give
powered off. the device is 7 Regular And Accurate
powered off. Quantity Of Power
HARWARE revision Supply To Components
Sto Spe Capa Rel Vo Like Motherboard,
rag ed city ati lati Main Ports of Computer Processor, Hard Disk
e ve le DVD Drive Etc
Co  The Process Of Loading
st Other Components The Operating System
Re Fas Lowe Hig Ye Files Into Dynamic
gist test st hes s Mother Board (Back bone) Random Access Memory
ers t ഒരു കമ്പ്യൂട്ടറിലെ പ്രധാന -Booting
Cac Mo Low Ver Ye പ്രിൻ്റഡ് സർക്യൂട്ട്  1 PB =1024 TB
he re y s ബോർഡാണ് (പിസിബി)  കമ്പ്യൂട്ടർ
Fas Hig മദർബോർഡ്, അതിലേക്ക് ഓഫാക്കിയാൽ
t h കമ്പൂട്ടറിലെ എല്ലാ ഉള്ളടക്കം നഷ്ടപ്പെ ടുന്ന
RA Ver Low/ Hig Ye ഘടകങ്ങളും ബാഹ്യ ഒരു അസ്ഥിര
M y Mode h s പെരിഫറലുകളും മെമ്മറിയാണ്-റാൻഡം
Fas rate ബന്ധിപ്പിക്കപ്പെടുന്നു. ആക്‌സസ് മെമ്മറി (RAM)
t  ROM BIOS-location are
Har Mo Very Ver N the 1st computer
d der High y O instructions available on
Dis ate Lo boot up
k w SMPS (Switched Mode Virtual Memory  കമ്പ്യൂട്ടറിലെ പ്രൊസ്സ
Power Supply) സ്സറിനോട് ഏറ്റവും
അടുത്ത് സ്ഥിതി മെമ്മറിയിൽ പെടുന്നു-  used to measure the speed  They are general
ചെയ്യുന്ന മെമ്മറി - EEPROM of the CPU (processor)- programs designed to
ക്യാഷ് മെമ്മറി  predominant Clock speed assist humans in the use
 ഏറ്റവും വേഗത manufacturers for desktop of computer system by
കൂടിയ മെമ്മറി and laptop processors-  MIPS -MILLION performing tasks such as
ഏതാണ്-Cache 1. Intel INSTRUCTIONS PER  Controlling the
 കമ്പ്യൂട്ടറിൻ്റെ CPU Eg: Core 2 Duo, Pentium, SECOND operations,
വിലെ താത്ക്കാലിക Celeron, Core i3, i5 i7  Move data into and out of
ദ്യുത വേഗ സംഭരണ 2. AMD (Advanced
സ്ഥലം അറിയപ്പെടുന്നത്- Micro Devices)
8 a computer system
REGISTOR
 and to do all the steps in
Athlon, Sempron, Ryzon. executing application
 വിവരങ്ങൾ SYSTEM SOFTWARE
സൂക്ഷിക്കുന്ന & APPLICATION programs.
കമ്പ്യൂട്ടറിലെ ഏറ്റവും  In short, system software
SOFT WARE
വേഗതയേറിയ മെമ്മറി- supports the running of
REGISTOR other software, its
 ശാശ്വതമായി ഡാറ്റ communication with other
സംഭരിക്കുന്നതിന് താഴെ  MOBILE PROCESSOR Software peripheral devices. It
പ്പറയുന്നതിൽ ഏതാണ് SOC (CPO) Software is a general term helps the users to use
ഉപയോഗിക്കുന്നത്-Hard Eg: used to denote a set of computer in an effective
Disk, DVD o Qualcomm (Company) programs that help us to use manner.
 ആക്സസ് സമയം- ↓ computer system and other
സംഭരിച്ച ഡാറ്റ
 The following are the
Snapdragon electronic devices efficiently components of system
കണ്ടെത്തുന്നതിനും o MEIA TEK-HELIO and effectively.
വിണ്ടെടുക്കുന്നതിനും
software.
o SAMSUN – EXYNOS 1. System software  Operating system
വേണ്ട സമയം
 OS  Language processors
 ഏറ്റവും കൂടുതൽ ഡാറ്റ
 Data moves in and out of  Utility Soft ware  Utility software
സൂക്ഷിക്കാൻ പറ്റിയ
the CPU through  Language Processor  Device Driver
ഒപ്റ്റിക്കൽ സ്റ്റോറേജ്
embedded wires called-  Device Driver
ഉപകരണം- ബ്ലൂ-റേ ഡി.
Bus 2. Application software SYSTEM SOFTWARE
വി. ഡി
 a temporary storage  General Purpose
 ഒരു ഫ്ലാഷ് മെമ്മറി
location attached to CPU  Specific Purpose 1. LANGUAGE
ഏത് കമ്പ്യൂട്ടർ
മെമ്മറിയിൽ
for input and output TRANSALATON
operations-Buffer System Software
2. OPERATING APPLE MAC OS IOS original form when needed. high level language or
SOFTWARE GOOGL CHROM ANDRO Compression of files is assembly language into its
3. FIRMWARE E E OS ID known as zipping and equivalent machine
4. UTILITY SOFTWARE LINUX GNU/ TIZEN decompression is called language.
5. DEVICE DRIVER LINUX, (SAMS unzipping. WinZip, Eg: Compiler , Interpreter,
BOSS WinRAR, etc. are examples Assembler
UNG)
UBUNT
 FIRMWARE = U ,FEDO KAI OS of compression tools.
HARDWARE + RA 4. Device Driver
SOFTWARE AT & T UNIX Disk defragmenter: Disk A device driver is a computer
( DENNI defragmenter is a program program that operates or
1. Operating System S that rearranges files on a controls a particular type of
RITCHI computer hard disk. This
 Dos- Disk Operating E)
device that is attached to a
System enables the computer to work computer.
 Operating system is a set faster and more efficiently.
of programs that acts as Backup software: Backup 5. Firmware
an interface between the means duplicating the disk Firmware is a type of
2. Utility Software information so that in an
user and computer  Utility software is a set of software that is embedded
hardware. Operating event of disk failure or in an into the read-only memory of
programs which help event of accidental deletion,
system controls and co- users in system hardware devices. It provides
ordinates the operations this backup may be used basic instructions on how the
maintenance tasks and in
of a computer. It acts as performing tasks of device should operate and
the resource manager of Antivirus software: helps hardware communicate
routine nature. Antivirus software is a utility
the computer system. with other software running
 Eg: Compression Tools program that scans the
Operating system is the on a device.
Disk Defragmenter, computer system for viruses
most important system
Backup Software, and removes them.
software. 9
Calender, clock etc.. EG:- firewall , clock,
COMPA DESKT MOBIL
NY OP E OS Calender, Keyboard
OS Compression tools: Large OPERATING SYSTEM
MICRO WINDO WINDO files can be compressed so 3. Language Processor
SOFT WS, WS that they take less storage Language processors are the
SOFTWARE
DOS area. These compressed files ANOTHER DIVISION
MOBIL system programs that
E can be decompressed into its translate programs written in
 SOFTWARE  It is sold without any  The Free Software development and
access to source code and Foundation (FSF) defines distribution. It was organised
1. Proprietary Software is therefore not possible the four freedoms for in the GNU project
to change or improve by free and open source introduced in 1983 by
 closed source
the user. software: Richard Stallman in the FSF.
 Can’t Modify, Edit,
Distribute  Some examples of
 Eg:-WINDOWS ,
proprietary software are 1. Freedom 0 GIMP
PHOTOSHOP , TALLY , MS Microsoft Windows The freedom to run program It stands for GNU Image
OFFICE , FACE BOOK Operating System, MS for any purpose. Manipulation Program. It is
Office, Mac OS, etc. an image editing software, It
2. Free Software 2. Freedom 1 can be used for retouching
 Open Source  Free Soft Ware- Richard The freedom to study how photographs, creating and
Stallman the program works and adapt editing images. It supports
 Can Edit , Modify ,
it to your needs. Access to graphic files of different
Distribute
Free and open source source code should be formats and allows
 EG:- Gnu Linux , It @
software provided. converting from one format
School .Open Office ,
 Free and open source to another.
Libre Office ,Vlc , Gimp ,
3. Freedom 2
Python , Fire Fox software gives the user
The freedom to distribute Mozilla Firefox
the freedom to use, copy,
copies of the software.. It is one of the most popular
3. Shareware distribute, examine,
change and improve the web browsers created by the
 Trial ware 4. Freedom 3
software. Mozilla Corporation. It
4. freeware The freedom to improve the provides added security
 Nowadays free and open
program and release your features for safe browsing.
source software is widely
improve- ments to the public,
Proprietary software used throughout the world
so that the whole community OpenOffice.org
 Proprietary software is a because of adaptable
benefits. It is a complete office suite
computer program that is functionality, less overall
costs, vendor that contains word processor
an exclusive property of GNU/Linux (Writer) to prepare and
its developer or publisher independency, adherence
to open standards, GNU/Linux is a computer format documents, spread
and cannot be copied or operating system assembled sheets (Calc) and
distributed without interoperability and
security. under the model of free and presentations (Impress). It
licensing agreements. open source software
works on both Linux and distribute the 6. Command
Windows platforms. shareware. 3. File management interpretation
Freeware Trial ware/ The file management module A command interpreter is the
Shareware OPERATING of an operating system takes part of a computer operating
Freeware Sharewares SYSTEM care of file related activities system that understands and
refers to give users a The major functions of an such as organising, naming, executes commands that are
software that chance to try Operating System are:- storing, retrieving, sharing, entered interactively by a
anyone can the software protection and recovery. human being or from a
download before 1. Process management program.
from the buying it. By the term process we mean 4. Device management
Internet and a program in execution. The Device management module
use for free. process management module of an operating system
of an operating system takes performs the management of  OS- Is The Resource
care of the allocation and de- devices attached to the Manager.
allocation of processes and computer. It handles the
All the All features scheduling of various system devices by combining both
features are are not resources to the different hardware and software Operating First
free. available. requesting processes. techniques. The OS System Developers
To use all the communicates with the Unix Dennis
features of 2. Memory management hardware device via the Ritchie, Ken
the software, Memory management is the device driver software. Thompson ,B
user has to functionality of an operating ell Lab
purchase it. system which handles or 5. Security management BSD University of
manages primary memory. It Security refers to providing a (Berkeley California
Freeware Shareware keeps track of each and every protection system to Software
programs can may or may memory location to ensure computer system resources Distribution)
be distributed not be whether it is allocated to such as CPU, memory, disk, Mac OSX Apple Inc
free of cost. distributed some process or free. It software programs and most
freely. In calculates how much importantly data/information GNU/Linux Partitions
many cases, memory is to be allocated to stored in the computer
author's each process and allocates it. system. Root (/)
permission is It de-allocates memory if it is For Storing The Programs Of
needed to not needed further. The Operating System
 OPPO – COLOR OS
Home (/home)  REDMI – MIUI
For Storing The Files Apple Mac HPPS,  ONE PLUS – OXYGEN
Created By The User OSX HPFS+ OS

Swap Operating Proprie Ker


The Fast File System For System tary/ nel
Temporary Storage. Free use
d
 But a GNU/Linux system GNU/ FREE LIN
can also function with just LINUX,UB UX
Root and Swap file ANTU,
systems. REDHAT
Microsoft PROPRI Win
 GNU - Richard Stallman Windows ETARY dow
 Linux- Linus Torvalds s
FILE SYSTEMS 10 NT
The manner in which each
 Generally, a complete
operating system formats. the POPULAR FreeBSD FREE Lin
operating system will
hard disk is known as its file APPLICATION SOFT ux
have two parts on the
system. Some important file Mac OSX PROPRI XN
systems are shown in the WARE operational level. One is
the kernel, which interacts ETARY U
table below:-
The general structure of with the hardware directly
or through drivers. And Operati Compa Basic
Operating The file an operating system ng ny that progra
the other consists of Shell
System system used System brings it m
and Systems that display
GNU/Linux Ext3 , Ext4
software windows
(Graphical User Interface- ANDRO Google Linux
GUI). ID
IOS Apple Unix
Microsoft Fat 32, NTFS Mobile OS GUI Corp.
Windows Inc.
 SAMSUNG – ONE UI
Window Microso Micros The time elapsed between smaller value indicating a  Priority (pre-emptive
s 10 ft oft the arrival of a process and faster seek time. version)
Mobile Windo its completion.
ws 8. Throughput 2. Non Preemptive
Tizon Linux Linux Turnaround Time = Throughput is the number of Approach
Foundati Completion Time - Arrival processes completed per unit  FCFS(FIFO) (First Come
on Time of time First Save)"
(Samsun  SJF(Shortest Job First)
g) 5. Waiting Time  LJF(Longest Job Fist)
Blackber Blackbe QNX This is a process's duration in  The elapsed time between  Priority (Non pre-emptive
ry 10 rry Ltd. the ready queue before it the time of a program is version)
begins executing. submitted and time when
CPU Scheduling in OS it is completed by the PREEMPTI NON
1. Arrival Time Waiting Time CPU is -Tum around VE PREEMTPI
The moment in time when a =Turnaround Time - Burst time SCHEDULI VE
process enters the ready Time NG SCHEDULI
queue and is awaiting CPU Scheduling NG
execution by the CPU. 6. Response Time Algorithms It allocates It allocates
2. Burst Time It is the duration between The CPU Scheduling is the the CPU to a the CPU to
It is the amount of CPU time the arrival of a process and process by which a process is process for a process until
the process requires to the first time it runs. executed by resources of the set period. it finishes or
complete its execution. CPU. goes to a wait
Response Time = Time it There are two modes in CPU state.
Started Executing - Arrival Scheduling Algorithms. They A process A running
3. Completion Time Time are: can be process
Completion time is when a interrupted cannot be
process finishes execution 7. Seek Time 1. Pre emptive Approach (stopped) stopped (in-
and is no longer being Seek time is the amount of  SRTF (Shortest while being terrupted)
processed by the CPU. time it takes for a hard Remaining Time First) executed. while
drive's read/write head to  Round Robin running.
4. Turnaround Time find a specific piece of data  LRTF (Longest Remaing A process A process
on a disk. It's measured in Time First) can transit can only
milliseconds (ms), with a
from running transition (preemptive work Pages, filmora,
to the ready from run- version) Google Doc Blender
state or from ning to the Spread sheets MS Excel, Audio Adobe
waiting to the waiting state Libra office Editors Audition,
ready state. or terminates.  FIFO scheduling is- Calc, I work Audacity
Pre emptive It is rigid. It Non-preemptive scheduling Numbers , Graphics GIMP, Corel
scheduling is insists on a google Sheet Editor Draw, Adobe
flexible. A running pro- Presentation Ms power Illustrator,
criti- cal cess Softwares point,libra Ink scape
process completing 11 office Accounting Tally, SAP
accesses the before any impress,i Soft wares
CPU without other process BASICS OF work
de lay. accesses the PROGRAMMING keynote, Type of Functionality
CPU. google slide General
Database MS Access, Software
A low- Execution of Managers My SQL, Application
priority a process Oracle Word Used for
process can with a high Multimedia Windows Processing creating,
Application Software
suffer starva- burst time Software Media Software editing, and
 Text editor: Notepad,
tion if high- can result in Player, VLC, formatting
Word pad, Google keep
priority starvation KMP, Real, text-based
processes processes  VLC – VIDEO LAN
Adobe flash documents.
arrive simul- will suffer CLIENT
Image MS Paint, Examples
taneously. starvation. Editors GIMP, Include
High CPU Low CPU General Purpose Adobe Microsoft
utilization utilization Software Packages Photoshop, Word, Google
Light mom, Docs, and
Examples Examples App. Examples Snap seed LibreOffice
include include Software Video Writer.
round-robins, FCFS, SJF, Type Editors Adobe Spread sheet Used for
SRTM, and priority Word MS word, Premise, Software organizing
priority- scheduling Processors Libre office Final Cut and
scheduling writer, I Pro, VN, manipulating
numerical Microsoft
data. Graphics Used for Outlook, Specific Purpose Software
Examples Software creating and Gmail, and Packages
include editing visual Mozilla
Microsoft content. Thunderbird. Specific purpose software is
Excel, Google Examples Media Used for a highly specialised software
Sheets, and include Players playing designed to handle particular
LibreOffice Adobe various forms tasks. These are tailor-made
Calc. Photoshop, of media, software to satisfy the needs
Presentation Used for Adobe such as audio of an organisation or
Software creating and Illustrator, and video institution.It is also known as
delivering and Corel files. customised software.
multimedia DRAW Examples
presentations. include Application Purpose
Examples Web Used for Windows Software
include Browsers accessing and Media Player, Payroll Payroll
Microsoft viewing VLC media System system
PowerPoint, websites on player, and maintains the
Google the internet. iTunes. details of
Slides, and Examples System Used for employees of
LibreOffice include Utilities maintaining an
Impress. Google and organisation
Database Used for Chrome, optimizing a and keeps
Software storing, Mozilla computer track of their
organizing, Firefox, and system. salary details.
and retrieving Microsoft Examples Inventory It is used for
data. Edge include Management tracking
Examples Email Used for antivirus System inventory
include Clients managing and software, disk levels,
Microsoft sending clean up orders, sales
Access, emails. tools, and and
MySQL, and Examples backup deliveries in
Oracle. include utilities. a business
firm. (iii) കമ്പ്യൂട്ടറിൽ ചിത്രങ്ങൾ  Two Basic Types of
Human It is used for വരയ്ക്കുന്നതിന് Computer Language
Resource managing ഉപയോഗിക്കുന്ന 1. Low-Level Languages
Management human സോഫ്റ്റ്‌ വെയറാണ്
System resource in ഒഡൊസിറ്റി 2. High-Level Languages
an
(A) (i) മാത്രം
organisation. (B) (ii) മാത്രം
1. Low Level Languages
(C) (iii) മാത്രം  A language that
Q1.താഴെ പറയുന്നവയിൽ (D) (ii) & (iii) corresponds directly to a
സിസ്റ്റം സോഫ്റ്റ് വെയർ specific machine.
അല്ലാത്തത് ഏത്?  Low-level computer
A. .പ്രോഗ്രാമിംഗ് ലാംഗ്വേജ് languages are either
ട്രാൻസ്ലേറ്റർ machine codes or are very
B. ഓപ്പറേറ്റിംഗ് സിസ്റ്റം close them.
C.സ്പ്രെഡ് ഷീറ്റ് സോഫ്റ്റ്  A computer can only
വെയർ understand and execute
D.ഡിവൈസ് ഡ്രൈവർ
instructions given in the
Q2. താഴെപ്പറയുന്നവയിൽ Programming Languages form of machine language
നിന്ന് ശരിയായ  A programming language i.e. binary
പ്രസ്ഥാവന / is a set of instructions  There are two types of
പ്രസ്ഥാവനകൾ written by a programmer low-level languages:
കണ്ടെത്തുക to tell a computer how to
(i) കമ്പ്യൂട്ടറിൽ ശബ്ദം do things. i. Machine Language
റെക്കോർഡ് ചെയ്യുന്നതിന്  Programms are written in
ഉപയോഗിക്കുന്ന a specific language, such ii. Assembly Language
സോഫ്റ്റ്‌ വെയറാണ് as C, C++, Java,
ഒഡാസിറ്റി Pythonetc. i. Machine Language
(ii) കമ്പ്യൂട്ടറിൽ ദൃശ്യം  Basically, languages can Machine language is a
റെക്കോർഡ് ചെയ്യുന്നതിന് be divided into two language that is directly
ഉപയോഗിക്കുന്ന
categories according to interpreted by the hardware.
സോഫ്റ്റ്‌ വെയറാണ്
how the computer It is the lowest level of
ഒഡാസിറ്റി
understands them. programming language,
which uses binary codes. ('1' translated into machine code and executing it line- the
and '0') understandable form for by-line. representa
its successful execution.  Eg: Computer Languages tive
ii. Assembly Language  Assemblers, Compilers that used interpreter: shapes
Assembly language is and Interpreter are the BASIC Input/ A
slightly more user-friendly examples of Language Output parallelog
language that directly translators 12 ram
corresponds to machine represents
language. Assembly  Assemblers, Compilers input or
BASICS OF
language use mnemonic and Interpreter are the Output
codes. PROGRAMMING 2 Proces A
examples of Language
translators. s rectangle
2. High Level Languages Algorithm
 Assembler: An assembler represents
High-level computer A precise step-by-step
translates assembly a process
languages use formats that procedure to solve a problem
language into machine Decisi A
are similar to English. It is is called algorithm.
code. on diamond
very easy to use and  Compiler: A Compiler indicates
understand. High-level Flowchart
translates code written in a decision
languages are basically The pictorial representation
a high level language to a of an algorithm is called
symbolic languages that use lower level language, Algorithm VS Flowchart
English words and flowchart.
object/machine code. VS program
mathematical symbols. Symbol Name Function
 Eg: Computer languages  Perform simple
eg; C,C++, Java, PHP, Start/ An Oval
that use compiler: C, C+ mathematical operations
Python,COBOL, BASIC, end represents
+... a start or  Eg. Algorithm for adding
FORTRAN etc  Source Program two numbers
end point
→Compiler → Target Arrow A line is a
Language Program Step1. Start
Translator(Language s/flow connector
 Interpreter: An Step2. Input A,B
processors) Line that
interpreter executes the Step3. C A+B
 All the programs written shows
programs directly, Step4. Print C
in programming language relationsh
running through program Step5. Stop
(except machine level ips
language) is first Between
from AC Important Control
SKI Skip on input Transfer Instructions
flag  JMP -(Jump)
SKO Skip on unconditionally transfers
output flag control to the target
ION Interrupt location.
enable on  CALL - (Call Procedure)
IOF Interrupt activates an out-of-line
enable off procedure, saving on the
stack the address of the
Memory Instructions instruction following the
Instr Description CALL for later use by a
uctio RET (Return) instruction.
n  RET- (Return From
AN Performs AND Procedure) terminates the
D operation between execution of a procedure
memory and and transfers control
accumulator. through a back-link on the
Debugging AD Performs add stack to the program that
A bug is an error, flaw, or D operation between originally invoked the
fault in a computer program. memory and procedure.
Debugging is the process of accumulator.  INT-Interrupt
finding and fixing errors or  IRET -(Return From
bugs in the source code of LDA Load accumulator in Interrupt) returns control
any software, memory to an interrupted
STA Store accumulator in procedure.
Basic Instruction Types memory
 INPUT, OUTPUT BUN Branch  The symbols used in an
Instructions unconditionally assembly language are-
INP Input char. to BSA Branch and save Mnemonics
AC return address
OUT Output char. INC Increment
 To process data,  First languages used in computer with other in the same network.
computers use:- High Artificial intelligence- computers. The cost of These can be retrieved
level language , Machine Lisp purchasing licensed software from other computers in
language, Assembly for each computer can be which they are saved in
language 13 reduced by purchasing case of disasters
 Compiler- System network versions of such (malfunctioning of
Software allows storing NETWORKING BASICS software. This will least computers. accidental
the output as Object Code affect the performance of deletion of files, etc.)
such resources and lead to
Need for Network /
 The first usable considerable savings in cost. 5. Scalability
Advantages of Network Computing capacity can
programming Language-
FORTRAN [FORmula 3. Communication be increased or decreased
1. Resource sharing Computer network helps user easily by adding or
TRANslating system]
The sharing of available to communicate with any removing computers to
 First language developed hardware and software
for Business data other user of the network the network. In addition
resources in a computer through its services like e- to this, the storage
processing- FORTRAN network is called resource
 First language used to mail, chatting, video capacity of networks can
sharing. For example, the conferencing etc. For also be increased by
create webpages- contents of a DVD placed in
Hypertext Markup example, one can send or including more storage
a DVD drive of one receive messages within no devices to the network.
Language (HTML) computer can be read in
 Language used to create time irrespective of the
another computer. Similarly, distance.
dynamic webpages - Key terms
other hardware resources like
PHP, Perl, ASP, hard disk, printer, scanner,
ASP.NET, JSP, 4. Reliability Bandwidth
etc. and software resources It is possible to replicate
ColdFusion and other like application software, Bandwidth measures the
languages. or backup amount of data that can be
anti-virus tools, etc. can also data/information in
 First language developed be shared through computer sent over a specific
multiple computers using connection in a given amount
to use internet- by John networks. the network. For example, of time. Bandwidth describes
McCarthy in the late
the C++ files, photos or the maximum data-transfer
1950s, -Lisp 2. Price-performance ratio songs saved in one rate between computers in a
One can easily share the computer can also be
resources available in one network. In digital systems,
saved in other computers
bandwidth is measured in 3. Receiver available for computer
bits per second (bps) The computer or device that networks.
receives the messages is  Installation and
Noise called the receiver. maintenance are difficult
Noise is unwanted electrical and complex.
or electromagnetic energy 4. Medium
that lowers the quality of It is the physical path Wireless communication
data signals. It occurs from through which a message technologies using radio
nearby radio transmitters, travels from the sender to the waves
motors or other cables. receiver. It refers to the way
in which nodes are 1. Bluetooth
Node connected.  Bluetooth technology
Any device (computer, uses radio waves in the
scanner, printer, etc.) which 5. Protocol frequency range of 2,402
is directly connected to a The rules under which Data Communication GHz to 2.480 GHz This
computer network is called a message transmission takes Medium technology is used for
node. place between the sender and  Characteristics of short range
the receiver is called a optical fibre cable communication (approx.
Data Communication protocol. 10 m) in a variety of
 High bandwidth for voice, devices for wireless
1. Medium  Father of optical fiber :- video and data communication.
It is the information to be Narendar Singh Kabani applications Speed  Cell phones, laptops,
communicated. Major forms  UTP –Unsheielded  Carries data over a very mouse, keyboard, tablets,
of information include text,  STP - Sheilded long distance at a stretch. head sets, cameras etc. are
picture, audio, video, etc.  Not susceptible to some of the devices that
electromagnetic fields, as utilise blue tooth
2. SENDER it uses light for data communication
The computer or device that transmission.
is used for sending messages
 The most expensive and
is called the sender, source or  Thanos 2.4G
the most efficient
transmitter.  Thanos 5G
communication media
2. WiFi adapter in a  Usually, a signal travels  Then are multiple micro
 Wi-Fi network makes use computer.Nowadays, this in a straight line and is wave frequency hands
of radio waves to transmit technology is widely used not able to bend around which are used for
information across a to share Internet the globe to reach a satellites links.
network like cell phones, connection with laptops destination far away.  Frequency used for uplink
televisions and radios. or desktops.  Signals can be sent to varies from 1.6 GHz to
 The radio waves used in 3. WI-MAX geostationary satellites in 30.0 Gr and that for
Wi-Fi ranges from a  Worldwide space and then redirected downlink varies from 1.5
frequency of 2.4 GHz to 5 Interoperability for to another satellite or GHz to 20.0 GHz.
GHz. Communication Microwave Access (Wi- directly to a far away  Downlink frequency is
across a wireless network MAX) combines the destination. always lower than the
is two- way radio benefits of broadband and  A geostationary satellite uplink frequency.
communication. wireless. orbits the earth in the  The satellite system is
 The wireless adapter in a  Wi-MAX has a the same direction and very expensive, but its
computer translates data frequency range of 2 GHz amount of time it takes to coverage area is very
into radio signal and to 11 GHz. Wi-MAX can revolve the earth once is large.
transmits it using an provide high-speed equal to the time taken for  Communication satellites
antenna. wireless Internet access earth's one rotation. are normally owned by
 A wireless router receives over very long distances  From the earth, therefore, governments or by
the signal and decodes it. (a whole city). the satellite appears to be government approved
Once decoded, the data  Wi-MAX equipment stationary, always above organisations of various
will be sent to the Internet exists in two basic forms- the same area of the earth. countries
or network through a base stations, installed by  These satellites carry
wired Ethernet/wireless service providers to electronic devices called 14
connection. deploy the technology in transponders for
 Similarly, the data a coverage area, and receiving, amplifying, and NETWORK DEVICES
received from the receivers, installed by re broadcasting signals to
Internet/ network will also clients. the earth. Types Of Networks
pass through the router 4. Satellite link  Transmission of signals
and coded into radio  Long distance wireless from the earth to a 1. PAN
signals that will be communication systems satellite is called uplink  Personal
received by the wireless use satellite links for and from a satellite to
transmitting signals. earth is called downlink.
 Eg: Personal Gadgets to Km be already integrated with the disadvantage of hub is that it
Connection 10 radi motherboard. NIC can increases the network traffic
 House Network Km us) prepare, send, receive and and reduces the effective
radi control data on the network. bandwidth, as it transmits
2. LAN us) It breaks up data into data packets to all devices
 Local Tran Hig Hig Mo Lo manageable units, translates connected to it.
 Computer lab/café smis h h dera w the protocols of the computer
 Office network sion spe spee te spe to that of the communication 3. SWITCH
 Hospital network spee ed d spe ed medium and supplies address A switch is an intelligent
d ed recognition capabilities. device that connects several
3. MAN Net Ne Inex Mo Ex computers to form a network.
wor glig pen dera pen 2. HUB It is a higher performance
 Metropolitan
king ible sive tely siv A hub is a device used in a alternative to a hub. It looks
 Cable Tv Network
cost exp e wired network to connect exactly like a hub. Switches
ensi computers/ devices of the are capable of determining
4. WAN
ve same network. It is a small, the destination and redirect
 Wide simple, passive and the data only to the intendend
 Eg:- Network inexpensive device . node. Switch performs this
 NETWORKING Computers/devices are by storing the addresses of
Para PA LA MA W connected to ports of the hub all the devices connected to it
mete N N N AN DEVICES
using Ethernet cable. When in a table. When a data
r NIC of one computer sends packet is send by one device,
1. NETWORK
INTERFACE CARD data packets to hub, the hub the switch reads the
Area Sm A A Ent transmits the packets to all destination address on the
cove all few city ire (NIC)
Network Interface Card other computers connected to packet and transmits the
red are met and cou it. Each computer is packet to the destination
a ers its ntr (NIC) is a device that enables
a computer to connect to a responsible for determining device with the help of the
(Up to a vici y. its data packets. The table. A switch performs
to few nity con network and communicate. It
provides hardware interface computer for which the data better than a hub on busy
10 Kilo (Up tine packets are intended accepts networks, since it generates
m met to nt. between a computer and a
network. It can be a separate it. Other computers on the less network traffic in
radi ers (10 or network discards these data delivering messages.
us) (Up 0 glo circuit board that is installed
in a computer or a circuit packets. The main
4. BRIDGE passes the bridge will be algorithms to find the best networks with different
broadcast to all nodes on the path for packets to reach the protocols, there must be
other side and is only destination. some mutual understanding
accepted by the intended between the networks. A
destination node. 6. GATEWAY gateway is capable of
understanding the address
5. ROUTER structure used in different
networks and seamlessly
translate the data packet
between these networks.

7. REPEATER
A repeater is a device that
regenerates incoming
A bridge is a device used to electrical, wireless or optical
segmentise a network. An signals through a
existing network can be split communication medium.
into different segments and Data transmissions through
can be interconnected using a A gateway is a device that
can interconnect two wired or wireless medium
bridge. This reduces the can travel only a limited
amount of traffic on a different networks having
A router is a device that can different protocols , It can distance as the quality of the
network. When a data packet signal degrades due to noise.
reaches the bridge, it inspects interconnect two networks of translate one protocol to
the same type using the same another protocol. It is a Repeater receives incoming
the incoming packet's data signals, amplifies the
address and finds out to protocol. It can find the network point that acts as an
optimal path for data packets entrance to another network. signals to their original
which side of the bridge it is strength and retransmits them
addressed (to nodes on the to travel and reduce the Its operations are similar to
amount of traffic on a that of a router. It can check to the destination.
same side or the other side).
Only those packets addressed network. Even though its the device address and the
to the nodes on the other operations are similar to a network address and can use
side, will be allowed to pass bridge, it is more intelligent. algorithms to find the best
the bridge. Others will be The router can check the path for packets to reach the
discarded. The packet that device address and the destination. Further, while
network address and can use interconnecting two
 Data Terminal a computer to analog signals time in the form of a single,
devices (modulation) for telephone complex signal and then
A data terminal equipment lines. It also converts the recovering the separate
(DTE) is a device that analog signals received back signals at the receiving end.
controls data flowing to or from telephone lines to Multiplexing divides the
from a computer. It is digital signals physical medium into logical
connected to the transmission (demodulation) for the segments called frequency
medium at the end of a computer. The speed of the channels. Multiplexer
telecommunication link. modem determines how fast combines (multiplexes) the
Here we discuss the most it can send and receive inputs from different sources
commonly used DTEs- information through and sends them through
modem and multiplexer. telephone lines. The speed of different channels of a
modem is measured in bits medium. The combined data
1. MODEM per second (bps). travels over the medium
simultaneously.
At the destination, a de
2. MULTIPLEXER multiplexer separates (de
multiplexes) the signals and
sends them to destinations.
1. Bus topology

15
TOPOLOGIES/ ADDRESS
A modem is an electronic
device used for
Network Topologies
communication between
The way in which the nodes
computers through telephone
It is called multiplexing. are physically interconnected
lines. The name is formed
Similar is the case with data to form a network is called a
from the first three letters of
transmission over networks. Topology
the two words modulator and
Multiplexing is sending
demodulator. It converts
multiple signals on a
digital signals received from
physical medium at the same
Characteristics of bus  No signal amplification is  Failure of hub/switch Transmission Modes
topology:- required as each node leads to failure of entire
 Easy to install. amplifies the signal. network.
 Requires less cable length  Requires less cable length  Requires more cable
and hence it is cost and hence is cost length compared to bus
effective. effective. topology.
 Failure of a node does not  If one node fails, entire
affect the network. network will fail. 4. Mesh topology
 Failure of cable (bus) or  Addition of nodes to the
terminator leads to a network is difficult.
break down of the entire
network. 3. Star topology
 Fault diagnosis is
difficult.
 Only one node can
transmit data at a time.

2. Ring topology

Characteristics of mesh
topology:-
Characteristics of star  Network will not fail even
topology;- if one path between the
nodes fails.
 More efficient compared  Expensive because of the
to bus topology. extra cables needed.
 Easy to install.  Very complex and
 Easy to diagnose faults, difficult to manage.
Characteristics of ring  Easy to expand depending
topology:- on the specifications of
central hub/ switch.
16 client's request. Client-server devices on the local networks
architecture is an example and the Internet.
NETWORK for centralised software
management.
PROTOCOLS AND
INTERNET Peer to Peer type
A peer-to-peer network has
Logical classification of no dedicated servers. Here a
networks number of computers are
connected together for the
purpose of sharing
information or devices. All
the computers are considered
equal. Any computer can act
as a client or as a server at
any instance.

PROTOCOLS
A network protocol is the
special set of rules to be
followed in a network when
devices in the network
exchange data with each
other.
Client Server type TCP/IP (Transmission
In a network, the client- Control Protocol/I nternet
server architecture consists Protocol)
of high-end computer (called TCP/IP, Transmission
server) serving lower Control Protocol/Internet
configuration machines Protocol, is a suite of
called clients. A server communications protocols
provides clients with specific used to interconnect network
services (responses) upon
 POP- POST OFFICE response. This pair of request exchanging of data and
PROTOCOL and response is called an program files across a
 IMAP- INTERNET HTTP session . network. FTP is the easiest
MESSAGE ACCESS The response from the server way to transfer files between
PROTOCOL can be static such as a file computers via the Internet. It
 DHCP- DYNAMIC already stored on the server, uses TCP and IP to perform
HOST or dynamic, such as, the uploading and downloading.
CONFIGURATION result of executing a piece of A FTP client program
PROTOCOL code by the server as per the installed in the computer can
 ARP- ADDRESS request from the client. help in the uploading
RESOLUTION (sending files to another
PROTOCOL computer) and downloading
 VOIP-VOICE OVER (receiving files from another
IP(3G) computer) of files.
 VOLTE- VOICE FTP uses client-server
OVERLONG TERM architecture in servers with
EVOLUTION(4G) security features, username
and password protection for
 VONR-VOICE OVER
The two important file transfer. An FTP client
Protocols NEW RADIO(5G)
characteristics of HTTP program (Filezilla, Cute FTP,
 HTTPS- HYPER TEXT are:- etc) installed in the computer
HTTP
TRANSFER  HTTP is transmission can help in the easy
HTTP stands for Hypertext
PROTOCOL SECURE medium independent. uploading and downloading
Transfer Protocol. It is a
 FTP-FILE TRANSFER  HTTP is stateless (The of files.
standard protocol for
PROTOCOL server and client are
transferring requests from
 DNS- DOMAIN NAME client-side and to receive aware of each other only DNS
SYSTEM responses from the server- during a request or DNS stands for Domain
 UDP- USER side. The HTTP client response. Afterwards, Name System. DNS returns
DATAGRAM (browser) sends a HTTP each forgets the other). the IP address of the domain
PROTOCOL request to the HTTP server name, that we type in our
 SMTP-SIMPLE MAIL (web server) and server FTP web browser's address bar.
TRANSFER responds with a HTTP FTP stands for File Transfer (like mobile phone
PROTOCOL Protocol. It is a standard for automatically dialing the
phone number when we the Internet has a unique
select a name from contact URL.. Network resources are Few more points  ഹൈപ്പർ ടെക്സ്റ്റ്-
list). files that can be plain web  Last 3 parts of MAC സാധാരണ ടെക്സ്റ്റ്
The DNS system has its own pages, other text documents, address indicates (6 char)- കൂടാതെ മറ്റ് ഡോക്യു
network. DNS implements a graphics, programs, etc. Device ID(Serial No) മെന്റിലേക്കുള്ള
database to store domain URL consists of letters, ലിങ്കുകൾ അടങ്ങിയ
names and IP address numbers and punctuations.  Largest possible Decimal ഒരു ഡോക്യുമെന്
information of all web sites URL. string can be divided Number in a part of IPV4  FTP:File Transfer
on the Internet. DNS into three parts. address – Protocol
assumes that IP addresses do a) Network protocol (also 8bit 8bit 8bit 8bit  IPv4 അഡ്രസ് ഒരു 32
not change (statically called the scheme) XXX.XXX.XXX.XXX } ബിറ്റ് അഡ്രസ് ആണ്
assigned). b) Domain name (Host name =32bit  A computer used in
If one DNS server does not or address)  Connection oriented internet is identified using
know how to translate a c) File name protocol in TCP/IP- TCP its -IP Address
particular domain name, it For example, the URL  Connectionless protocol  MAC അഡ്രസ്സിൽ 12
asks another one, and so on, http://www.dhsekerala.gov.in in TCP/IP- UDP
until the correct IP address is /indes.html has three parts. അക്കങ്ങൾ ഉണ്ട്
 Protocol focuses on
returned. The detailed description of
dynamic IP allocation-
these three parts are given
DHCP
17 below: 18
Layers of TCP/IP
URL & PYQ 1. Application Layer INTERNET 1
2. Transport Layer
Uniform Resource 3. Internet Layer History Of Internet
 http://- PROTOCOL
Locator (URL) 4. Network Access Layer  The Internet started as a
URL stands for Uniform small network through a
 www.dhsekerala.gov.in –  Protocol used by www- project by the United
Resource Locator, URL is a
DOMAIN NAME HTTP States Department of
formatted test string used by
web browsers, email clients  SMTP -used for email Defence by the name
 //Index.html –FILE transmission across the ARPANET (Advanced
and other software to identify
NAME internet Research Projects Agency
a network resource on the
Internet. Every resource on Network)
 ARPANET which used  Hyperlinks - A hyperlink within an organisation. BROWSWERS, SEARCH
TCP/IP protocol for is a text or an icon that  Extranet -When an ENGINES ETC
communication was you can click on to get to intranet is made
thereafter used for another website. The link, accessible to some
scientific research and which is usually in blue computers that are not
information sharing and is underlined Hyper part of a company's
 ARPANET is considered Text - Hypertext is text private network it is
as the first wide area with hyperlinks. called an extranet
network. Vinton Gray
Cerf who was ICANN World Wide Web
instrumental in the  In 1998, Internet  The World Wide Web
development of Internet Corporation for Assigned (WWW) is a system of
and TCP/IP protocol, is Names and Numbers interlinked hypertext
considered as the father of (ICANN) was established. documents accessed via
Internet. ICANN does not control the Internet. It is a service
the Internet content; on the Internet that uses
Tim Berners Lee rather it develops policies Internet infrastructure.
 In 1989, Tim Berners on the Internet's Uniform WWW is a huge client-
Lee, a researcher, Resource Locators server system consisting
proposed the idea of (URL). of millions of clients and
World Wide Web  Internet - The Internet is servers connected
(WWW). Tim Berners an interconnected system together. Each server
Lee and his team are of computer networks that maintains a collection of First and Fastest
credited with inventing serves the users all over documents and they can  First OS of India- BOSS
Hyper Text Transfer the world. be accessed using a (Bharath OS Solutions)
Protocol (HTTP), HTML  Intranet - An intranet is reference called Uniform  First Mobile OS of India-
and the technology for a considered as a private Resource Locator (URL). Bharos, Bharath Os (IIT
web server and a web computer network similar  Clients can access the Madras) (Jandkops)
browser. Using hyperlinks to Internet that uses documents on the servers  first Web browser in the
embedded in hypertext TCP/IP protocol to share using software called world- Nexus
the web developers were information, software or browser.
able to connect web services
pages.
 first Web browser of 19 2. The browser then sends a Internet. Each device is
India- EPIC (Hidden request to the DNS server of provided with a unique IP
Reflux) INTERNET 2 the user's ISP to get the IP address which identifies it
address of the URL.. and allows it to transfer data
 Programmes used in the
 First Search engine in the over Internet without human
Search engine are called -
world- Archie 3. The ISP's DNS server intervention. The huge
CRAWLER
replies with the IP address. increase in the number of IP
PROGRAMMS
 First Search engine of addresses due to the
India-GURU 4. The browser then makes a implementation of IPv6
TCP connection to the web supports the introduction of
 First Super Computer in server at the IP address this technology. The IoT can
the world- CDC 6600 (www.kerala.gov.in). be used to monitor health of
patients and inform the
 First Super Computer of 5. Then it sends a GET doctor about an urgency,
request for the required file applied to things which help
India- PARAM 8000
(web page) to the web server. us reduce wastage like
 Fastest Super computer in power, water, etc, and
the world -FORNTIER 6. The web server returns the improve the way we work
web page. and live.
 Fastest Super computer of
India- AIRAWAT 7. The TCP connection is Social Media
supercomputer released. Social media refers to the use
of mobile and web-based
 AIRAWAT Super 8. The browser processes the technologies through which
computer (75th Rank)- contents of the webpage and individuals and communities
Top 500 (EDAC Pune) displays it. can create, share, discuss and
 HOTMAIL (Sabeer modify content.
Bhatia) 1. The browser determines Internet of Things (IoT)
the URL IoT is the concept of 1. Internet forums
(http://www.kerala.gov.in) connecting all devices like An Internet forum is an
entered. mobile phones, fridges, cars, online discussion web site
air conditioners, lamps, where people can engage in
wearable devices, etc. to the conversations in the form of
posted messages. Each their surroundings - text, pictures, videos, etc. Wikipedia itself and other
Internet forum will have sub information about events and and comment to the posts. external resources. Since
forums which may have opinions about topics from a Eg: whatsapp, facebook, users are able to create
several topics. Each wide range of fields. Instagram, Linked in and edit ar- ticles, the
discussion on a topic is Microblogging offers a quality of the content in
called a thread. communication mode that is 6. Content communities the articles depends on
Eg: Ubuntu, Reddit, Quora spontaneous and can Content communities are the person who contrib-
etc influence public opinion. websites that organise and utes and edits it. The
Eg: Twitter, Tumbler, share contents like photos, Malayalam edition of
2. Social blogs Threads videos, etc. Youtube, Tik Wikipedia is available at
A blog (web log) is a Tok, Instagam. ml.wikipedia.org.
discussion or informational 4. Wikis
website consisting of entries Wikis allow people to add  Wikipedia is a free online Advantages of Social Media
or posts displayed in the content or edit existing encyclopedia to which  Bring people together
reverse chronological order information in a web page, to anyone can add content  Plan and organise
i.e., the most recent post form a community and edit. Wikipedia was events
appears first. Some blogs document. Wiki is a type of formally launched on 15th  Business promotion
provide comments on a content management system. January 2001 by Jimmy  Social skills
particular subject; others Editing done by users is very Wales and Larry Sanger
function as personal online closely monitored by other using the concept and Limitations in use of social
diaries and some others as editors and therefore technology of a wiki. media
online brand advertising for a incorrect information, Wikipedia consists of  Intrusion to privacy
particular individual or advertising, etc. are removed over 3 crore articles in  Addiction
company. immediately. around 300 languages.  Spread rumours
Eg:Blogger.com, Eg:Wikipedia, wikimapia, The english edition alone
Wordpress.com Wikimedia commons includes around 44 lakh Social media interaction
articles and is one of the Best practices
3. Microblogs 5. Social networks most visited websites on  Avoid unnecessary
Microblogs allow users to Social networking sites allow Internet. Articles on uploading of personal
exchange short sentences, people to build personal web topics range from very data like e-mail address,
individual images or video pages and then connect with broad to highly specific. telephone num- ber,
links. People use microblogs friends to communicate and Each article consists of a address, pictures and
to share what they observe in share content. We can share number of links to videos.
 Setting time schedule for create web pages on the 2. Title Tag 2. Bold Tag
using these sites can save internet. The title tag <title> specifies The <b> tag is used to make
wastage of time.  You can use any text the HTML page title, which the text bold.
 In social media websites editor to write the HTML is shown in the browser's
like wikis and blogs, code, such as Notepad title bar. 3. Italic Tag
photo and video sharing (PC) or TextEdit (Mac). The <i> tag is used to make
are public. What you  Save the file with 3. Body Tag the text italic.
contribute is available for the .html extension, and The body tag <body> is
all to see. Be aware of open it using a web where you insert your web 4. Underline Tag
what you post online. browser of your choice. page's content. The <u> tag is used to set the
Avoid posting content text underline.
you may regret later. Html Tags 4. Paragraph Tag
 Set your privacy levels in  HTML tags are the A paragraph tag <p> is used Link Tag
such a way that you know keywords on a web page to define a paragraph on a The <a> tag links one page
exactly who can see your that define how your web web page. to another page. The href
posts and who can share browser must format and attribute specifies the
them. The three basic display your web page. 5. Heading Tag location (URL) of the
privacy levels in social  Almost all tags contain The HTML heading tag is external resource.
media are private, friends two parts, an opening, and used to define the heading of
and public. a closing tag. For the HTML document. The List Tag
example, <html> is the <h1> tag defines the most The <li> tag is used if you
20 opening tag and </html> important tag, and <h6> want to enter the contents in
is the closing tag. defines the least. the listed order. There are
two types of lists.
INTERNET 3
Basic Html Tags Formatting Tags
i. Ordered list <ol>
Web Designing 1. Emphasis tag
 HTML, which stands for 1. Head Tag
The HTML <em> tag is used ii. Unordered list <ul>
Hypertext Markup The head tag <head>
contains all the elements to emphasize the particular
Language, is the language text in a paragraph.
used to describe describing the document.
structured documents and
the language used to
Other Important Tags i) Hub operates on data link Trojan horses, ransome
layer while switch operates ware and spyware.
Tags Description on physical layer.  Malware is denoted as
<dl> Definition Computer Contaminant
List ii ) Hub is broadcast type in Indian Cyber Law
<dir> Directory transmission.
List iii) Router operates on VIRUS (Vital Information
network layer. Resource Under Seige)
<select> Dropdown A) (i) only  A computer virus is a
List [PYQ.] B) (i) and (ii) program that attaches
<sub> Subscript C) (i), (ii) and (iii) itself to another program
<sup> Superscript D) (ii) and (iii) or file enabling it to
<img> To add spread from one computer
Image [PYQ]  What is "Social Media to another without our
<embed> container for Optimization - Creating knowledge and interferes
embedding content which easily 21 with the normal operation
plug-ins creates publicity via of a computer.
(Multimedia) social networks CYBER CRIMES 1  A virus might corrupt or
delete data on our
 First line in the html  A document containing  Social Media computer, replicate itself
document <!DOCTYPE links, in addition to Optimization – Creating and spread to other
html> normal text, to other Content Which Easily computers or even erase
documents is called a - Creates Publicity Via everything in the hard
 A computer Hypertext Social Networks disk.
communicates with other  The HTML tag used to  Almost all viruses are
computers on the internet insert a picture in an Malware attached to executable
through - TCP/IP HTML page is -<img>  Malware, or malicious files.
tag software, is any program  Viruses spread when the
Q1.Which of the following or file that is intentionally file they are attached to, is
statements is/are false ? harmful to a computer, transferred from one
network or server. Types computer to another using
of malware include a portable storage media
computer viruses, worms, (USB drives, portable
hard disks, etc.), file  Worms always slow data  Unlike viruses and on the web server from
sharing, or through e-mail traffic on the network by worms, Trojans do not using that service.
attachments. (Host is consuming bandwidth, reproduce by infecting  This attack can be done
necessary) whereas viruses almost files nor do they self- using a single computer
always corrupt or modify replicate. called Denial of Service
I LOVE YOU worm files on a computer. (DoS) attack or using
The worm affected  The most destructive Ie0199.exe Trojan more than one computer
computers in 2000 by effect that a worm can E-mail users received a called Distributed Denial
overwriting most of the Files cause is through e-mails. message that offered a free of Service (DDoS) attack.
Users received this worm an upgrade to Internet Explorer
email with a subject ne Trojan Horse that contained an executable Distributed Denial of
ILOVEYOU and with a file  A Trojan horse, will file Ie0199.exe as Service Attack (DoS)
attachment LOVE LETTER- appear to be a useful attachment. This e-mail
FOR- YOU TXT.vs. Those (appealing) software but instructed the user to
who iced the attachment get will actually do damage download and install this
their computers affected by once installed or run on program for the upgrade. The
the worn and last their flas the computer. users who followed these
 When a Trojan is instructions got their files
Computer Worm activated on a computer, infected.
 A computer worm is a they can cause serious
stand alone malware damage by deleting files Denial of Service Attack
(malicious software) and destroying (DoS)
program that replicates information on the  A Denial of Service(DoS)
itself in order to spread to system. attack is usually aimed at
other computers.  Some Trojans create a a web server. An attack in
 Worms spread from backdoor on the which the attackers' goal
computer to computer on computer. This gives is to shut down the target
its own. Unlike a virus, it malicious users access to server rather than stealing
does not need to attach confidential or personal data is called DoS attacks.
itself to a program to information in the  This prevents genuine  A DDoS attack uses
propagate.(Host is not computer through the users of a service/website multiple computers in the
necessary) network. network that it has
previously infected. These
infected computers called Logic Bomb behavior and display White hat hackers
'zombies', work together A logic bomb is a type of personalized ads. Adware White hat hackers, also
and send out large malicious code embedded in can cause problems for known as ethical security
quantities of fake software that remains devices if left unchecked, hackers, identify and fix
messages/requests to the dormant until specific including: Slowing down, vulnerabilities. Hacking into
target server. conditions are met. When Changing settings, Crashing systems with the permission
 This increases the amount triggered, a logic bomb virus browsers, Selling data to of the organizations they
of data traffic to the target executes a destructive action, third parties, and Making hack into, white hat hackers
server. This leads to such as deleting files or web browsing worse. try to uncover system
server overload and the disrupting critical systems. weaknesses in order to fix
server is unable to 22 them and help strengthen
provide services to its Ransomware overall internet security.
users. Ransomware is a type of CYBER LAW 2
cryptovirological malware
Spyware that permanently block Cyber Crimes targeting Gray hat hackers
Spyware is malicious access to the victim's Individuals, society, Gray hat hackers may not
software that enters a user's personal data unless a organization have the criminal or
computer, gathers data from ransom is paid. malicious intent of a black
the device and user, and While some simple Hacking hat hacker, but they also
sends it to third parties ransomware may lock the Hacking means an illegal don't have the prior
without their consent. system without damaging intrusion into a computer knowledge or consent of
eg:Pegasus any files, more advanced system and/or network. those whose systems they
malware uses a technique Every act committed towards hack into.
Keylogger called cryptoviral extortion. breaking into a computer
A keylogger, also known as eg: Petya, Wannacry, bad and/or network is hacking. Phishing
keyboard capturing or rabbit, Locky Phishing is a type of fraud
keystroke logging, is a type Black hat hackers that involves stealing
of spyware that records Adware Black hat hackers are personal information
keystrokes and sends them to Adware, or advertising- cybercriminals that illegally (sensitive information)such
a hacker. supported software, is a type crack systems with malicious as Customer ID, IPIN,
of malicious software that intent. Credit/Debit Card number,
displays ads on devices. It Card expiry date, CVV
can also track online number, etc. through emails
that appear to be from a Cyber Slacking Email spamming Data Diddling
legitimate source. Cyber slacking, also known Email spam is the act of Data diddling, also known as
as cyber loafing, is when sending unwanted emails to a false data entry or data
 VISHING- Phishing employees use their work large number of people, often manipulation, is a
through Phone Call devices, internet, or other for commercial purposes. cybercrime that involves
 SMISHING-Phishing resources for non-work- altering data before or during
through SMS related purposes during Email bombing input to a computer system.
working hours. Email bombing refers to
Defamation sending a large number of Salami Attack
When a person publishes Domain Squatting emails to the victim resulting A salami attack is a type of
defamatory matter about Domain squatting, also in the victim's email account cybercrime where an attacker
someone on a website or known as cybersquatting or (in case of an individual) or steals small amounts of
sends e-mails containing typo squatting, is the practice mail servers (in case of a money from a large number
defamatory information to all of registering, buying, or company or an email service of accounts over time.
of that person's friends, it is using an internet domain provider) crashing.
termed as cyber defamation. name that is similar to Cyber Vandalism
another trademark, brand, or Man-in-the-Middle attack Cyber vandalism is the
Cyber Stalking business name with the intent A man-in-the-middle attack intentional act of damaging
Cyber stalking is the use of of profiting from it or refers to an attack in which or disrupting digital systems,
electronic communication by harming the legitimate an attacker secretly intercepts websites, or online platforms
a person to follow a person, owner. electronic messages between without the intention of
or attempts to contact a the sender and the receiver monetary gain.
person to foster personal Email spoofing and then captures, inserts and Web jacking
interaction repeatedly despite Email spoofing refers to modifies messages during In simplest terms, when
a clear indication of email that appears to message transmission. attackers illegally gain
disinterest by such person; or originate from one source but control of an organisation's
monitors the internet, email actually has been sent from 23 or individual's website is
or any other form of another source. Email known as Web Jacking.
electronic communication spoofing can also cause CYBER LAWS 3
commits the offence of monetary damage. Juice Jacking
stalking. Cyber Crimes targeting Juice jacking is a type of
Individuals, society, cyber attack that uses a USB
organization
charging port to steal data or Pornography accessing, usually by  World's very first
infect phones with malware. printed or visual material encrypting the data. antivirus program -
containing the explicit iii) The attacker blackmails Reaper
Cyber Extortion description or display of the victim to pay for getting  World's very first virus-
Cyber extortion is sexual organs or activity, access to the data. Creeper
blackmailing an individual or intended to stimulate sexual A) (i) only
organization by threatening excitement comes under B) (i) and (ii) Q2.Which of the following
to release sensitive data or pornography. C) (i), (ii) and (iii) malware types does not clone
launch a cyber attack. According to Section 67 of D) None of these or replicate itself through
the IT Act Whoever infection?
Cyber Terrorism publishes or transmits or  A person is continually a. Viruses
Cyber terrorism is usually causes to be published in the chased/followed by b. Worms
defined as any premeditated, electronic form, any material another person or a group c. Trojans
politically motivated attack which is lascivious or of various people - d. Rootkits
against information systems, appeals to the prurient Stalking
programs, and data that interest or if its effect is such
threatens violence or results as to tend to deprave and 24
 Antivirus program type
in violence. corrupt persons who are 1. Kaspersky
likely, having regard to all CYBER LAWS 4
2. Quick heal
Intellectual Property relevant circumstances, to 3. McAfee
Rights Violations read, see or hear the matter  THE INFORMATION
4. Norton TECHNOLOGY
An intellectual property (IP) contained or embodied in it, 5. AVG
infringement is the shall be punished. ACT.2000
6. Avira
infringement or violation of 7. Bit defender
an intellectual property right. Q1.Which of the following 1. SECTION 43- Penalty
There are several types of and Compensation for
statements about Ransom  A Firewall can be a
intellectual property rights, damage to computer,
ware are correct? hardware device or a
such as copyrights, patents, computer system, etc.
i) Ransom ware is a virus software program that
trademarks, industrial 2. SECTION 43A-
which replicate itself. filters all the packets of
designs, and trade secrets. Compensation for failure
ii) Kind of cyber crime data that comes through a to protect data.
where the attacker gains network, the internet, etc.
access to the computer and
blocks the user from
3. SECTION 65-Tampering sexually explicit act, etc IT ACT 2000 to protect g Rs 5
with computer source in electronic form IMPORTANT SECTIONS data crore
documents. 12.SECTION 67B-
4. SECTION 66-Computer Punishment for  Important sections  Sections relating to
related offences publishing or transmitting relating to Electronic punishment for cyber
5. SECTION 66B - material depicting Records & Digital offences
Punishment for children in sexually Signature Sec crime Maxim Fi
dishonestly receiving explicit act, etc in Section ACT tion um ne
stolen computer resource electronic form 3 Authentication Impris
or communication device. 13.SECTION 72- Penalty of electronic onment
6. SECTION 66C- for breach of records. 65 Tamper 3 2
Punishment for identity confidentiality and 4 Legal ing with YEARS la
theft. privacy. recognition of Comput kh
7. SECTION 66D - 14.SECTION 77B- electronic er s
Punishment for cheating Offences with 3 years records. Source
by personation by using imprisonment to be 5 Legal Docum
computer resources. bailable. recognition of ents
8. SECTION 66E - digital (Source
Punishment for violation signatures. Code)
of privacy.  IT ACT 66 Comput 3 5
9. SECTION 66F -  Sections relating to er YEARS la
Punishment for cyber  IT ACT 2000 compensations for Related kh
terrorism. Came into force - October offences Offence s
10.SECTION 67 - 17, 2000 Se Crime Compen s
Punishment for cti sation (Hackin
publishing or transmitting on g) "43”
obscene material in  IT ACT 2008 43 Penalty for Not 66B Dishone 3 1
electronic form. Came into force - October damage to exceedin stly YEARS la
11.SECTION 67A- 27, 2009 computer, g Rs 1 receivin kh
Punishment for computer crore ga s
publishing or transmitting system, etc. stolen
material containing 43 Compensatio Not comput
A n for failure exceedin er
resourc itting khs  Sections relating to  ഇന്ത്യയിൽ
e or obscen -10 punishment for cyber ഇൻഫർമേഷൻ
commu e lak offences ടെക്നോളജി നിയമം
nication materi hs Sec Crime Maxim fi നിലവിൽ വന്ന വർഷം-
device al in tion um n 2000
66C Punish 3 1 electro impriso e  IT Act in India was
ment YEARS la nic nment amended in - 2008
for kh form. 72 Breach 2 Years 1
identity s 67 Cyber 5 years- 10 of la  In IT Act 2008, section 65
theft. A pornog 7 years lak confide k deals with -Tampering
66 cheatin 3 1 raphy hs- ntiality h with computer source
D g by YEARS la 10 and documents.
persona kh lak privacy  ഐഡന്റിറ്റി മോഷണം
tion s hs 72 Offenc നടക്കുന്നത് തടയുന്ന
67 Child 5 years- 10 B es with ഐ. ടി ആക്ട് - ഐ. ടി
66E Violatio 3 2 B Pornog 7 years lak three ആക്ട് 66 C
n of YEARS la raphy hs- years  കമ്പ്യൂട്ടർ വിഭവങ്ങൾ
Privacy kh (Age 10 an ഉപയോഗിച്ച് ആൾമാറാ
s 18) lak above ട്ടം നടത്തിയാൽ (IT Act
hs impris 2000 and 2008) ഏതു
സെക്ഷൻ പ്രകാരമാണ്
 Sections relating to 69 Power to onmen
ശിക്ഷ നടപ്പിലാക്കുന്നത്
punishment for cyber intercept/monitor/decr t to be
-66 D
offences ypt any cogniz  മറ്റൊരാളുടെ
Sect Crime Maxim Fi communication able – സ്വകാര്യതയിലേക്കുള്ള
ion um ne 69 Power to block Public non കടന്നു കയറ്റം
impriso A Access for Websites, bailabl ഇൻഫർമേഷൻ
nment Apps etc e ടെക്നോളജി
66 Cyber life ആക്ടിന്റെ ഏത്
F terroris impriso സെക്ഷനിൽപ്പെടുന്നു -
m nment സെക്ഷൻ 66E
67 Publis 3 years-  Indian IT Act - 2000
hing or 5 lakhs 5 നിയമങ്ങളിൽ സൈബർ
transm La
ടെററിസം ആയി j) Theft, modification and destroy or alter any computer
ബന്ധപ്പെട്ട ശിക്ഷകൾ destruction of source codes source code used for a
25
നിർവചിക്കപ്പെട്ടിരിക്കു Section 43 A computer, computer
ന്നത് ഏത് സെക്ഷനിൽ programme, computer
ആണ് - 66F CYBER LAWS 5 system or computer network,
A Compensation for failure
 IT Act Section 66A താഴെ when the computer source
to protect data
പറയുന്നതിൽ ഏത് Section 43 Where a body corporate, code is required to be kept or
സൈബർ  Penalty and maintained by law for the
കുറ്റകൃത്യത്തിൻ്റെ
possessing, dealing or
Compensation for damage handling any sensitive time being in force, shall be
ശിക്ഷ നിർദ്ദേശിക്കുന്നു - to computer, computer personal data or information punishable with
തെറ്റായതും system, etc in a computer resource which imprisonment up to three
കുറ്റകരവുമായ വിവര
 Computer Contaminant it owns, controls or operates, years, or with fine which
ങ്ങൾ ഇലക്ട്രോണിക്
Malware All kinds of is negligent in implementing may extend up to two lakh
മാധ്യമങ്ങൾ വഴി
malicious software and maintaining reasonable rupees, or with both.
പ്രചരിപ്പിക്കുന്നത്
a) Hacking security practices and
 ഇലക്ട്രോണിക്
b) Theft of data procedures and thereby Section 66
രേഖകളുടെ
നിയമപരമായ causes wrongful loss or a) Hacking
c) Deposition of malwares wrongful gain to any person, b) Theft of data
അംഗീകാരം 2000-ലെ
d) Destruction of data and such body corporate shall be c) Deposition of malwares
ഐടി ആക്‌ടിന്റെ ഏത്
വിഭാഗമാണ്
computer resources liable to pay damages by way d) Destruction of data and
കൈകാര്യം ചെയ്യുന്നത്-
e) Disruption of computer, of compensation, not computer resources
network, server etc ⇒ DoS exceeding five crore rupees, e) Disruption of computer,
Section 4
f) Prevent a person from to the person so affected. network, server etc
using a computer resource ⇒ f) Prevent a person from
DoS Section 65 using a computer resource
24 CHAPTER'S
g) Providing assistance for g) Providing assistance for
COMPLETED
hacking Tampering with Computer hacking
h) Hacking another person Source Documents h) Hacking another person
April 7 for money Whoever knowingly or for money
i) Data destruction, intentionally conceals, i) Data destruction,
correction, thereby reducing destroys or alters or correction, thereby reducing
their value intentionally or knowingly their value
causes another to conceal,
j) Theft, modification and identification feature of any any person without his or her Whoever publishes or
destruction of source codes other person, shall be consent, under circumstances transmits or causes to be
Section 65 punished with imprisonment violating the privacy of that published in the electronic
Section 66 B of either description for a person, shall be punished form, any material which is
term which may extend to with imprisonment which lascivious or appeals to the
Punishment for dishonestly three years and shall also be may extend to three years or prurient interest or if its
receiving stolen computer liable to fine which may with fine not exceeding two effect is such as to tend to
resource or communication extend to rupees one lakh. lakh rupees, or with both. deprave and corrupt persons
device who are likely, having regard
Whoever dishonestly Section 66 D Section 66F to all relevant circumstances,
receives or retains any stolen to read, see or hear the matter
computer resource or Punishment for cheating by Punishment for cyber contained or embodied in it,
communication device personation by using terrorism shall be punished on first
knowing or having reason to computer resource Whoever commits or conviction with
believe the same to be stolen Whoever, by means of any conspires to commit cyber imprisonment of either
computer resource or communication device or terrorism shall be punishable description for a term which
communication device, shall computer resource cheats by with imprisonment which may extend to two three
be punished with personation, shall be may extend to imprisonment years and with fine which
imprisonment of either punished with imprisonment for life'. may extend to five lakh
description for a term which of either description for a rupees and in the event of a
may extend to three years or term which may extend to Section 67 second or subsequent
with fine which may extend three years and shall also be conviction with
to rupees one lakh or with liable to fine which may Publishing or transmitting imprisonment of either
both. extend to one lakh rupees. obscene material in description for a term which
electronic form may extend to five years and
Section 66 C Section 66 E also with fine which may
 67 Punishment for extend to ten lakh rupees.
Punishment for identity Punishment for violation of publishing or
theft. privacy. transmitting obscene Section 67 A
Whoever, fraudulently or Whoever, intentionally or material in electronic
dishonestly make use of the knowingly captures, form (Amended vide Punishment for publishing
electronic signature, publishes or transmits the ITAA 2008) or transmitting of material
password or any other unique image of a private area of containing sexually explicit
act.etc. in electronic form (a) publishes or transmits or imprisonment of either (ii) which is kept or used for
(Pornography) causes to be published or description for a term which bonafide heritage or religious
transmitted material in any may extend to five years and purposes
Whoever publishes or electronic form which with a fine which may extend
transmits or causes to be depicts children engaged in to ten lakh rupees and in the Explanation: For the
published or transmitted in sexually explicit act or event of second or purposes of this section,
the electronic form any conduct or subsequent conviction with "children" means a person
material which contains (b) creates text or digital imprisonment of either who has not completed the
sexually explicit act or images, collects, seeks, description for a term which age of 18 years.
conduct shall be punished on browses, downloads, may extend to seven years
first conviction with advertises, promotes, and also with fine which may Section 69
imprisonment of either exchanges or distributes extend to ten lakh rupees: Powers to issue directions for
description for a term which material in any electronic interception or monitoring or
may extend to five years and form depicting children in Provided that the provisions decryption of any
with fine which may extend obscene or indecent or of section 67, section 67A information through any
to ten lakh rupees and in the sexually explicit manner or and this section does not computer resource.
event of second or (c) cultivates, entices or extend to any book,
subsequent conviction with induces children to online pamphlet, paper, writing, Section 69 A
imprisonment of either relationship with one or drawing, painting, Power to issue directions for
description for a term which more. children for and on representation or figure in blocking for public access of
may extend to seven years sexually explicit act or in a electronic form- any information through any
and also with fine which may manner that may offend a (i) The publication of which computer resource
extend to ten lakh rupees. reasonable adult on the is proved to be justified as
computer resource or being for the public good on Section 69 B
Section 67B (d) facilitates abusing the ground that such book, Power to authorize to
children online or pamphlet, paper writing, monitor and collect traffic
Punishment for publishing (e) records in any electronic drawing, painting, data or information through
or transmitting of material form own abuse or that of representation or figure is in any computer resource for
depicting children in others pertaining to sexually the interest of science, Cyber Security
sexually explicit act, etc. in explicit act with children, literature, art or learning or
electronic form. other objects of general
shall be punished on first concern; or
Section 72
Whoever, conviction with
Breach of confidentiality  77 B Offences with three your IP address. This helps
and privacy years imprisonment to prevent unauthorized people
Save as otherwise provided be cognizable from seeing your traffic and
in this Act or any other law (1) Notwithstanding anything gives you the ability to work
for the time being in force, contained in Criminal remotely. VPNs are often
any person who, in pursuant Procedure Code 1973, the used in corporate
of any of the powers offence punishable with environments.
conferred under this Act, imprisonment of three years 1. To encrypt data
rules or regulations made and above shall be communication.
there under, has secured cognizable and the offence 2. To hide your IP Address.
access to any electronic punishable with
record, book, register, imprisonment of three years 25 chapters completed
correspondence, information, shall be bailable.
document or other material April 16
without the consent of the VPN Virtual Private
person concemed discloses Network)
such electronic record, book,
register, correspondence,
information, document or
other material to any other
person shall be punished
with imprisonment for a term
which may extend to two
years, or with fine which
may extend to one lakh
rupees, or with both.
VPN stands for virtual
private network, and it's a
Section 77B service that creates an
Offences with three years encrypted connection
imprisonment to be between your device and a
cognizable remote server, which
encrypts your data and hides
i) Digitizer is an input  Spread sheet Software-is
device.. not a system software
ii) Plotter is an output device.  Network device is used to
iii) Joystick is not an input connect two computer
device. networks that use
26 A) (i) only different protocols -
B)(1) and (ii) Gateway
REVISION 1 C) (i), (ii) and (iii)  The HTML tag used to
D) (ii) and (iii) insert a picture in an
 System Software allows
storing the output as HTML page is-
Object Code- Compiler  FIFO scheduling is- Non <img> tag
pre emptive scheduling  A special temporary high
 The current fastest Super
Computer as per TOP500  Stealing any digital asset speed storage area within
ranking is- Frontier HPE or information is listed as the CPU of the computer
Cray EX235a a cyber-crime under is-Register
 India- AIRAWAT which Section of the IT  OMR- is an input device
Act- 65  The elapsed time between
 Search Engine provided
by Micro Soft  Processor management- the time of a program is
Corporation is-BING is not a function of submitted and time when
 Browser- Edge operating systems. it is completed by the
 A computer  The cyber crime where a CPU is- Turn around
communicates with other hacker sends malicious time
computers on the internet links to users to gain  HTML tags is used to
through-TCP/IP access to their computers create a drop down list -
and accounts is called- <SELECT> tag
 Which Section of IT Act,
Phishing  The network topology in
2000 deals with legal
recognition of electronic  Gateway- device can join which devices are not
records- Section 4 a LAN to a WAN. linked to each other and
 computer memory that a where hub acts as a
Q1. Which of the following FLASH MEMORY central controller is-Star
statement is/are true? belongs to – EEPROM Q2.A flow chart is a kind of
A) One dimensional graphics
B) Two dimensional graphics
C) Three dimensional
graphics
D) None of these
 World Computer Security
day an-November 30

 computer language is
used for Artificial
Intelligence –
PROLOG,LISP ,PYTH
ON
 The extension of
“.com, .edu, .org, .net” etc
are usually called-
Domain name
 Security-is a firewall
protection

26 chapters completed

April 21

You might also like