1.
1 Hardware
Input devices: keyboard, mouse, scanner, microphone, sensors.
Output devices: monitor, printer (laser/inkjet/3-D), speakers, actuators.
Storage
Primary: RAM (volatile), ROM (non-volatile).
Secondary: HDD, SSD, optical discs (CD/DVD/Blu-ray), flash drives.
Cloud: remote servers accessed via internet.
1.2 Software
System software: operating systems (Windows, Linux), utility programs (backup,
antivirus, compression).
Application software: word processors, spreadsheets, browsers, custom-written
packages.
1.3 Data Representation
Binary: base-2 (0,1).
Hexadecimal: base-16 (0–9, A–F).
Conversions: Binary ↔ Decimal ↔ Hex.
Data units: bit, nibble (4 bits), byte (8 bits), KB, MB, GB, TB.
💾 2. Networks & Internet
Types: LAN (local), WAN (wide).
Topology: star, bus, mesh, ring.
Hardware: router, switch, hub, NIC, access point.
IP addressing: IPv4 (e.g., 192.168.1.1), IPv6.
Protocols:
HTTP/HTTPS – web.
FTP – file transfer.
SMTP/IMAP/POP3 – email.
Security: encryption, firewalls, strong passwords, two-factor authentication.
🔢 3. Data & Databases
Data types: integer, real, Boolean, character, string, date/time.
Validation vs Verification
Validation: range check, type check, length check.
Verification: double entry, visual check.
Database concepts
Table, record, field, primary key, foreign key.
SQL basics: SELECT, INSERT, UPDATE, DELETE.
🖱 4. Algorithms & Programming
4.1 Problem Solving
Algorithm: step-by-step method.
Flowchart symbols: oval (start/end), parallelogram (input/output), rectangle
(process), diamond (decision).
Pseudocode conventions:
IF … THEN … ELSE … ENDIF
FOR … TO … NEXT
WHILE … ENDWHILE
4.2 Programming Concepts
Variables, constants.
Data types: integer, real, Boolean, string.
Operators: arithmetic (+ − × ÷), relational (<, >, =), logical (AND, OR, NOT).
Procedures & functions: reusable blocks of code.
Arrays: 1-D and 2-D.
4.3 Testing & Debugging
Dry run, trace table.
Normal, boundary, and erroneous test data.
🔒 5. Security & Ethics
Threats: hacking, malware (virus, worm, Trojan).
Prevention: anti-virus, backups, encryption, firewalls.
Ethical issues: privacy, plagiarism, intellectual property.
Legal: data protection laws, computer misuse acts.
🧮 6. Computer Architecture
Von Neumann model: CPU, memory, input/output.
CPU components:
Control Unit (CU) – manages instructions.
Arithmetic Logic Unit (ALU) – calculations & logic.
Registers – MAR, MDR, Accumulator, Program Counter.
Fetch–Decode–Execute cycle:
PC holds address of next instruction.
Address → MAR; instruction fetched to MDR.
Instruction decoded & executed.
🧠 7. Emerging Technologies
AI and machine learning basics.
Robotics & automation.
Cloud computing.
Internet of Things (IoT).