File 64477ffea2a9c
File 64477ffea2a9c
UNIT-1 LECTURE-1
COMPUTER HARDWARES
1
Syllabus
2
Objective
COURSE OBJECTIVES:
This course is intended to make new students comfortable
with computing environment - Learning basic computer skills,
Learning basic application software tools, Understanding
Computer Hardware, Cyber security awareness.
3
Outcome
COURSE OUTCOMES:
At the end of the course student will be able to
comfortably work on computer, install and configure
OS, assemble a PC and connect it to external devices,
write documents, create various worksheets, prepare
presentations, protect information and computers
from basic abuses/ attacks.
4
Contents of UNIT: 1
5
Introduction to Computer
Computers are seen everywhere around us, in
all spheres of life, in the field of education,
research, travel and tourism, weather
forecasting, social networking, e-commerce etc
Computers have now become an indispensable
part of our lives.
Working: A computer can take data from the user through input devices (Input), process
the user given data (Processing), produces the result to the user through output devices
(Output)and stores data (Information) for future use
6
Block Diagram of Computer
7
Block Diagram of Computer: How Data Flows
8
Components of Computer
9
Components of Computer
Hardware
Software
User
10
Detailed View of Hardware Components
11
C.P.U (Central Processing Unit)
CPU is the major component which interprets and executes software Instructions. It also
control the operation of all other components such as memory, input and output units. It
accepts binary data as input, process the data according to the instructions and provide the
result as output.
The CPU has three components which are Control unit, Arithmetic and logic unit (ALU) and
Memory unit.
Arithmetic and Logic Unit: The ALU is a part of the CPU where various computing functions
are performed on data. The ALU performs arithmetic operations such as addition,
subtraction, multiplication, division and logical operations. The result of an operation is
stored in internal memory of CPU.
Control Unit: The control unit controls the flow of data between the CPU, memory and I/O
devices. It also controls the entire operation of a computer.
Memory Unit: To Store the result of all the processed data by ALU we need a temporary
storage place that is called as memory unit of CPU. It has various registers that are limited
in numbers to hold that data temporary for other process.
12
Central Processing Unit Types
Types of CPU
1. Single-core CPU: it is the oldest type of CPU which is
available and employed in most of the personal and
official computers. ...
6. Deca-core processor.
13
Memory Devices (Primary and Secondary)
14
Memory Unit (Primary and Secondary)
The primary memory is used to temporarily store the programs and data
when the instructions are ready to execute. The secondary memory is used to
store the data permanently.
The Primary Memory is volatile, that is, the content is lost when the power
supply is switched off. The Random Access Memory (RAM) is an primary-
volatile memory and Read Only Memory (ROM) is primary-non-volatile
memory.
The Secondary memory is non volatile, that is the content is available even
after the power supply is switched off. Hard disk, CD-ROM and DVD ROM are
examples of secondary memory.
15
Classification of Primary Memory
16
Random Access Memory (RAM): In Detail
It is also called as read write memory or the main memory or the primary memory. The
programs and data that the CPU requires during execution of a program are stored in this
memory. It is a volatile memory as the data loses when the power is turned off. RAM is
further classified into two types-
SRAM (Static Random Access memory) and DRAM (Dynamic Random Access Memory).
17
Read Only Memory (ROM) in Detail
Read Only Memory (ROM) –Stores crucial information essential to operate the system,
like the program essential to boot the computer. It has following features:
1. It is not volatile.
2. Always retains its data.
3. Used in embedded systems or where the programming needs no change.
4. Used in calculators and peripheral devices.
5. ROM is further classified into 4 types- ROM, PROM, EPROM, and EEPROM.
3. EEPROM (Electrically erasable programmable read only memory) – The data can be
erased by applying electric field, no need of ultra violet light. We can erase only
portions of the chip.
18
Difference between RAM AND ROM
19
Hard Disk Drive (HDD)
A hard disk drive (HDD), hard
disk, hard drive, or fixed disk is an electro-
mechanical data storage device that stores
and retrieves digital data using magnetic
storage and one or more rigid rapidly
rotating platters coated with magnetic
material.
20
Pen Drive
A pen drive, or a USB flash drive, is a
portable data-storage device. Pen drives
have replaced the floppy drives of old and
have become the most popular data-
storage devices among consumers.
21
INPUT DEVICES
22
Keyboard
Keyboard: Keyboard (wired / wireless, virtual) is the most common input device used
today. The individual keys for letters, numbers and special characters are collectively
known as character keys. keyboard layout is derived from the keyboard of original
typewriter. The data and instructions are given as input to the computer by typing on the
keyboard. Apart from alphabet and numeric keys, it also has Function keys for performing
different functions. There are different set of keys available in the keyboard such as
character keys, modifier keys, system and GUI keys, enter and editing keys, function
keys, navigation keys, numeric keypad and lock keys.
23
Keyboard Keys
24
Keyboard’s Key Description
25
1.1.1 Keyboard’s Key Description
Action Keys: Keyboard has many action keys. When you press an action key, a special event
takes place. Most commonly used action keys of the keyboard are described below.
Caps Lock Key: When you press this key, capital lock becomes on. When you press an
alphabet key, while capital lock is on, the letter written on it gets typed in upper case.
Shift Key: Shift key is always pressed along with other keys. When you press this key along
with number key then the symbol written on upper part of the key gets typed. When you
press Shift key along with alphabet key then the alphabet gets typed in upper case.
Enter Key: Enter key is used to start a new line. When you press this key; cursor comes to
the next line. Whatever you type now, gets typed in the next line.
Space Bar : This key is used to put blank spaces between the two characters.
DEL Key: This key is used to rub a character from current cursor position.
Backspace Key: This key removes one character from the left side of the cursor.
Insert Key: This key is used to insert characters in between the two characters, which have
already been typed.
Page Keys: There are two page keys on the keyboard, named as PgDn (i.e. Page Down) and
PgUp (i.e. Page Up). When you press PgUp key, previous page gets displayed on the screen.
When you press PgDn key, next page gets displayed on the screen.
Tab Key: This key is used for making the cursor jump in forward direction, by many places.
ESC Key: This key is called Escape key. Currently on-going activity gets cancelled when this
key is pressed.
26
MOUSE
Mouse: Mouse (wired/wireless)
is a pointing device used to
control the
movement of the cursor on the
display screen. It can be used to
select icons, menus, command
buttons or activate something
on a computer. Some mouse
actions are move, click, double
click, right click, drag and drop.
27
Scanners
Scanner: A Scanner is an input device and is used to input data into the computer system
in the form of pictures. It optically scans images, printed text, handwriting, or an object,
and converts it to a digital image. Examples of scanners are a desktop or flatbed scanner.
This device works like a Xerox machine. The scanner any converts type of printed or
written information including photographs into a digital format, which can be manipulated
by the computer.
28
Bar Code reader
Bar Code / QR Code Reader: A Bar code is a
pattern printed in lines of different thickness. The
Bar code reader scans the information on the
bar codes transmits to the Computer for further
processing. The bar code is 13 digits long and it
has four main divisions.
29
Web Camera
A webcam is input device that is like a video camera that feeds or streams an image or
video in real time to or through a computer to a computer network, such as the Internet.
Webcams are typically small cameras that sit on a desk, attach to a user's monitor, or are
built into the hardware. Webcams can be used during a video chat session involving two
or more people, with conversations that include live audio and video.
30
OUTPUT DEVICES
31
DISPLAY Unit
Display: it is also called Monitor that is the
most commonly used output device to
display the information. It looks like a TV.
Pictures on a monitor are formed with
picture elements called PIXELS.
32
1.1.1 DISPLAY Unit
33
1.1.1 DISPLAY Unit
34
Printers
Printers: Printers are used to print the information on
papers. Printers are divided into two main categories:
•Impact Printers
• Non Impact printers
Impact Printers : these printers print with striking of
hammers or pins on ribbon. These printers can print on
multi-part (using carbon papers) by using mechanical
pressure. For example, Dot Matrix printers and Line
matrix printers are impact printers.
35
Printers
Line matrix printers use a
fixed print head for
printing. Basically, it prints
a page-wide line of dots.
But it builds up a line of
text by printing lines of
dots. These printers are
capable of printing much
more than 1000 Lines Per
Minute, that result in
thousands of pages per
hour. These printers also
uses mechanical pressure
to print on multi-part
(using carbon papers).
36
Printers
Non-Impact Printers These printers do not use
striking mechanism for printing. They use
electrostatic or laser technology. Quality and
speed of these printers are better than Impact
printers. For example, Laser printers and Inkjet
printers are non-impact printers.
37
1.1.3 Printers
Inkjet Printers: Inkjet Printers use color cartridges which combined Magenta, Yellow and
Cyan inks to create color tones. A black cartridge is also used for monochrome output.
Inkjet printers work by spraying ionized ink at a sheet of paper. The speed of Inkjet
printers generaly range from 1-20 PPM (Page Per Minute).
They use the technology of firing ink by heating it so that it explodes towards the paper
in bubbles or by using piezoelectricity in which tiny electric currents controlled by
electronic circuits are used inside the printer to spread ink in jet speed. An Inkjet printer
can spread millions of dots of ink at the paper every single second
38
Peripheral Devices
A peripheral device, also sometimes called an auxiliary device, is any connected
device (internal or external) that provides a computer with additional
functionality.
Peripheral devices fall into three main categories:
1. Input devices, which send data to the computer.
2. Output devices, which receive data from the computer.
3. Input/output devices, such as storage devices
39
Motherboard
40
Mother board description
The motherboard is mounted inside the case and is securely
attached via small screws through pre-drilled holes that
contains ports to connect all of the internal components. It
provides a single socket for CPU.
41
End
Any Question
?
42
INTRODUCTION TO IT SYSTEMS
Subject Code- 2002203
UNIT-1 LECTURE -2
COMPUTER LANGUAGES
1
Syllabus
2
Contents of UNIT: 1
3
How does Computer work?
From Definition we know that computer is an electronic device that processes the
input according to the set of instructions provided to it and gives the desired output at
a very fast rate.
4
Computer Languages
5
Computer Languages
What is Computer Language?
Generally, we use languages like English, Hindi, etc., to make communication between
two persons. That means when we want to make communication between two persons
we need a language through which persons can express their feelings.
When a user wants to give any instruction to the computer the user needs a specific
language and that language is known as a computer language. The user interacts with
the computer using programs and that programs are created using computer
programming languages like C, C++, Java, etc.,
In short we can say that Computer languages are the languages through which the user
can communicate with the computer by writing program instructions. Every computer
programming language contains a set of predefined words and a set of rules (syntax) that
are used to create instructions of a program.
6
Computer Languages classification
Over the years, computer languages have been evolved from Low-Level to
middle level to now High-Level Languages. In the earliest days of computers,
only Binary Language was used to write programs.
7
1.2 Computer Languages classification
8
High level language
What is High-Level computer Language?
When writing a program in a high-level language, then the whole attention needs to
be paid to the logic of the problem not the process.
Languages like COBOL, FORTRAN, BASIC, C, C++, JAVA, etc., are examples of high-level
languages.
9
High level language Continue…
A high-level language is closer to the users, so it is easy to read, write, and maintain as
it is written in English like words.
10
Assembly level language
What is Assembly Level computer Language?
Assembly language is the more than low level and less than high-level language so it is
intermediary language and so also called middle level language. it uses numbers,
symbols, and abbreviations instead of 0s and 1s. For example: For addition,
subtraction and multiplications it uses symbols likes Add, sub and Mul, etc.
Assembler is a translator which takes assembly code as input and produces machine
code as output. Computer cannot understand middle-level language,
so it needs to be translated into a low-level language to make it understandable by
the computer. So, Assembler is used to translate middle-level language into low-level
language.
11
Assembly level language Continue…
Advantages of a Assembly level language:
12
Low level language
What is Low Level computer Language?
Machine language or low level programming language it that language that is
completely understandable by the computer.
Computer can understand any thing in two bits either 0 or 1 so, machine language can
only be represented by 0s and 1s. For example: To write 12 in the computer system its
representation is 1100. So it is very difficult to learn. To overcome this problem the
assembly language is invented.
Machine language is also known as the Machine Code. CPU directly understands the
binary language instructions, it does not require any translator. CPU directly starts
executing the binary language instructions and takes very less time to execute the
instructions as it does not require any translation. Low-level language is considered as
the First Generation Language (1GL).
13
Low level language Continues..
Low-level language instructions require very less time for their execution.
In low-level language, there is more chance for errors and it is very difficult to find
errors, debug and modify.
14
How each level of language work together?
15
End
Any
Question
?
16
INTRODUCTION TO IT SYSTEMS
Subject Code- 2002203
UNIT-1 LECTURE-3
Basic Internet Skill, Computer and
Communication
1
Syllabus
2
Contents of UNIT: 1
3
1.3 Computer and Communication
Why the need arise to connect two computer ?
Computers hold and process information. Users of the information naturally form groups and unless
all the users of the group use the same computer there will be a need to connect their computers
together. Different groups wants to connect different sets of computers together and so the need
evolves into the requirement to form computers into networks such that any computer in the
network can communicate with any other. This is why and how gradually internet evolved.
File Transfer: the ability to move a file from one computer to another. Transferring text files between
machines is straight forward although it may be necessary to select a translation option to ensure the
end of line character is treated properly.
File Access: the ability to read or write a file on another computer. For example this allows a group of
workstations to be connected together but to attach all the disks to just one member which would
then provide the file store for the rest of the group.
Mail: This is a natural extension to the service provided to a group of users on a single computer to a
group of users on a network of computers.
Remote Login: i.e. connecting a user's terminal or workstation to a remote computer so that the user
can use that computer as if it were his local one.
4
Communication
Computer Network:
A computer network is an interconnection of various computers to
share software, hardware, resources and data through a
communication medium between them. The computers on a
computer network may be linked through cables, telephone lines,
radio waves, satellites, or infrared light beams.
5
Network and internet
Evolution of Networking
1. ARPANET:
ARPANET was established by the
Advanced Research Projects Agency
(ARPA) in 1969 for two main reasons:
6
Network and internet
Evolution of Networking
7
Network and Internet
Evolution of Networking
3. Internet
Internet is a world-wide global system of
interconnected computer networks.
The History of the Internet Began with the launch of the Evolution of Research
Network (ERNET) in 1986.
The first publicly available Internet Service in India was launched by state -owned
videsh Sanchar Nigam Limited (VSNL) on 14thAugust 1995
9
Internet Uses in Current time
Internet allows us to communicate with Apart from communication and source
the people sitting at remote locations. of information, internet also serves a
There are various apps available on the medium for entertainment.
web that uses Internet as a medium for
communication. Online Television
Online Games
One can find various social networking Songs
sites such as: Videos
Social Networking Apps
Facebook
Twitter Internet allows us to use many services
Instagram like:
Gmail Internet Banking
Whatsapp etc. Online Educational Services
Online Shopping
One can surf for any kind of information Online Ticket Booking
over the internet with the help of a search Online Bill Payment
engine. Data Sharing
E-mail
10
Basic Tools of Internet
In order to access the various services of internet we need to have two main
components and these are called basic tools for accessing internet.
1. Hardware components
2. Software components
11
The Role of WWW as Service on the Internet
The World Wide Web abbreviated as WWW or
the Web. It is an information space
where documents and other web resources are
identified by Uniform Resource Locators
(URLs), interlinked by hypertext links, and can be
accessed through the Internet. Scientist Tim
Berners Lee invented the World Wide Web in
1989. He introduced the first web browser
computer program in 1990 . the browsers
available in general public on the Internet in
August 1991 .
12
Web Browser
A Web Browser is an application software that
allows us to view and explore information on the
web. A web browser also called browser. It is a
software application for retrieving, presenting
and traversing information resources on the
World Wide Web. Browsers are primarily use the
World Wide Web, they can also be used to
access information provided by web servers
in private networks or files in file systems
13
1.3 Familiar Web Browser
Looking for information on the internet is called surfing or browsing. To
browse the internet, a software called the web browser or browser is used.
E-commerce, social media, and many other things we take for granted
today would be impossible without internet browsers. Web browsers
translates HTML documents of the website and allows to view it on the
screen.
14
1.3
1.3 Familiar
Familiar Web
Web Browser
Browser
15
How Web Browser Display Web Pages : Its Features
A brief description about some of these interactions/buttons is as follows:
Back/Forward Buttons: Back button can be used by you for going back to the
previously visited web page whereas the Forward button is used to visit the next page
(if you are not on the most recent page visited by you, this may happen when you have
pressed the back button at least once).
Tab: It allows you to view multiple web pages in the same browser without opening a
new browser session.
Address bar: Also known as URL Bar is a place where you can type the web page
address that you want to retrieve from the web address. It also displays the address of
the web page currently being visited by you.
Recent History: This shows the links to the web pages previously visited by you.
Refresh: This is also called as reload button. It reloads the current web page.
Stop: It cancels loading of the current web page. This button is used when the page is
in the loading state.
Home: This button will bring you back to the home page of your website. Home page is
the first page of any web site.
Search: Search box allows any term to be searched by the search engine from the web.
It can also used for searching contents from the website visiting .
16
As stated earlier, a web browser is an application that allows you to interact with various
web sites on the Internet. You can run a browser from your Windows Desktop. Below figure
shows some of the important interactions/displays that are available on a browser window:
17
Web Server
A web server is used to store and deliver the The web browser from the client
contents of a website to clients such as a computer sends a request (HTTP
browser that request it. A web server can be request) for a page containing the
software or hardware. desired data or service. The web server
then accepts, interprets, searches and
The server needs to be connected to the responds (HTTP response) to the
Internet so that its contents can be made request made by the web browser. The
accessible to others. requested web page is then displayed
in the browser of the client. If the
The server is assigned a unique domain name server is not able to locate the page, it
so that it can be accessed from anywhere sends a page containing the error
using the domain name. To develop and test a message (Error 404 – page not found)
website using a personal computer, we need to the client’s browser.
to first install a web server on that computer
18
Types of Web Server
A web server is a computer system application that processes requests via
HTTP, the basic network protocol used to distribute information on the World
Wide Web. The term can refer to the entire system, or specifically to the
software that accepts and supervises the HTTP requests . There are many
server today available they are managed and maintained by big companies.
Some famous examples of web servers are following.
19
Web Server & Web-Browser communication in Detail
20
Web Pages
A Webpage is a document commonly written in HyperText Markup Language (HTML)
that is accessible through the Internet or other network using an Internet browser. A
web page is accessed by entering a URL address and may contain text, graphics and
hyperlinks to other web pages and files.
21
Web Pages in Detail…
A webpage is a page of a Website. A web page can be accessed by a URL in a browser
and that page can be copied and or send to a friend for review whereas websites are
collections of multiple page that must be navigated to view other content. Every page
has a unique address called the Uniform. Resource Locator (URL). The URL locates the
pages on the internet .
22
Web pages are classified as Static and Dynamic Web pages
Web pages are called Static when they remain the same whenever it is visited. Examples
of static Websites are website owned by Small business organizations, School websites.
Websites that displays marks of Public Examinations and Entrance Examinations changes
when different register numbers are given. Such websites are called as Dynamic
Websites. Eg,. Websites of Government and Entrance Exams.
23
Search Engine
A 'web search engine' or search engine is a
software system that is designed to search for
information on the World Wide Web. Search
engines, sometimes called search services, allow
an individual to search the contents of pages and
files on the World Wide Web.
24
Why we need Search Engine?
25
Search Engine Types
Some of the basic categories of Search engines are :
(A) Primary Search Engines: Such search engines use web crawlers or spiders to traverse
the web and scan websites for key words, phrases, to generate database of web pages
having some indexing or classification. Google and Alta Vista are examples of primary
search engines.
(B) Web directory: Web directories organize information into categories and subcategories
or directories. You can search a web directory for all those entries that contain a
particular set of keywords. Directories differ from search engines in the way they
organize information. Yahoo is an example of web directory.
(C) Meta search engines: Such search engines pass your queries to many search engines
and web directories and present summarized results to the users. Some of the
examples of meta search engines are — Dogpile, Infind, Metacrawler, Metafind and
Meta-search.
26
Working procedure of Search Engine
Spidering or Web crawling: Spider or Web crawler is a computer program that browses the web
pages of WWW in a systematic, automated manner. Search Engines use spider for getting up-to-
date data on web sites. They are used to create a copy of the pages visited by them for later
processing to create Index.
Indexing: Once, the spiders have completed the task of finding information about Web pages, the
search engine must store the information in such way that you are able to use it. The search engine
may provide some information relating to relevance of information may be in the form of Ranking.
Thus, a search engine may store the keywords of a web page, number of times that word
appeared on the page, the URL of the page. This is one of the reasons that a search
for the same word on different search engines will produce different results. Since, the data that is
to be stored for indexing is large, therefore, search engine may encode it. The Index is created with
the sole purpose, that is, it allows you to find the information on the Internet quickly.
Searching: When a user enters a query into a search engine, the engine examines its index and
provides a listing of best-matching web pages according to its ranking criteria. This short list,
usually, have a short summary containing the tile of the document and small part of the text.
Most search engines support Boolean search. Some simple example of a search is given below: To
find website which contains ―java tutorial‖, you may type Java tutorial in the search box of the
browser. The search will look for keywords ―Java‖ AND ―Tutorial‖; the search expression will
retrieve all those records where both the terms occur.
27
Working of Search Engine Continues..
28
Working of Search Engine Continues..
29
Domain Name
Domain Name:
A domain name is an identification a string that
defines a area of administrative autonomy, authority
or control within the Internet. Domain names are
formed by the rules and procedures of the Domain
Name System (DNS).
30
Domain Name
31
Domain Name System
An Internet or Web address is used to view a web page. When you are viewing a Web
page, the web address of the page appears in the Address bar in the browser. They are very
cumbersome to remember. For example, to visit IGNOU website the address
www.ignou.ac.in is far simpler than that of an IP address like 190.10.10.247. Obviously,
what we want to use simpler textual domain addresses instead of complex IP addresses.
However, to enable the use of simple textual address, you will require a service that will
map these text based names to respective IP addresses automatically. Such a service was
designed in 1983 by the University of Wisconsin with the name Domain Name System
(DNS).
In the present day, Internet, Domain Name System (DNS) should keep track of address of
each computer or any other internet device and email addresses. The name servers
translates the web address or email address to respective IP address.
For example, the name server translates address like www.ignou.ac.in into a computer
understandable IP address. It sounds simple, but remembers on Internet you are dealing
with million of addresses and every day this list is increasing. All these computers have a
unique address. Therefore, DNS follows a hierarchical naming scheme that is supported
by distributed database system to ensure no duplicate names are issued at all.
32
Internet, Intranet and Extranet
Domain Name System(DNS), is The heart of intranets and the internet through
which computers can contact each other and do things such as exchange
electronic mail or display Web pages. The Internet Protocol (IP) uses this
Internet address information and the DNS to deliver mail and other
information from computer to computer
33
URL
Uniform Resource Identifier or URI is a
unique identifier to identify a resource
located on the web. URI identifies a
resource (hardware or software) either by
its location or by its name or by both. URL is
Uniform Resource Locator and provides the
location and mechanism (protocol) to access
the resource. Examples of URI identifying
resources using location (i.e., URL) are: In the above URL, http is the protocol name,
https://www.mhrd.gov.in it can be https, http, FTP, Telnet, etc. www is
http://www.ncert.nic.in, a subdomain. ncert.nic.in is the domain
http://www.airindia.in,etc. name. Note: These days it is not mandatory
to mention protocol and subdomain while
URL is sometimes also called a web entering a URL. The browser automatically
address. However, it is not only the domain prefixes it
name but contains other information that
completes a web address, as depicted
below:
34
URL continues..
35
Email
Electronic mail or email is information stored on a computer that is exchanged between
the two users over telecommunications. Email is a message that may contain text, files,
images or any other attachments sent through a network to a specified individual or
group of individuals .
36
Working of Email
37
Advantages of Email
38
Structure of E-mail
Click the Compose button and then writing an e-mail contents When sending an e-mail
message, several fields are required to be filled:
The To field is where you type the e-mail address of the person who is the recipient of
your message.
The From field should contain your e-mail address, If you are replying to a message,
the To and From fields are automatically filled out; if it's a new message, you'll need to
enter them manually.
The Subject should consist of a few words describing the e-mail's contents. The
Subject lets the recipient see what the e-mail is about, without opening and reading
the full e-mail. This field is optional.
The CC (Carbon Copy) field allows you to specify recipients who are not direct
addressees (listed in the "To" field). This field is optional.
The BCC (Blind Carbon Copy) field is similar to CC, except the recipients are secret.
Each BCC recipient will receive the e-mail, but will not see who else received a copy.
The addressees (anyone listed in the "To" field) remain visible to all recipients. This
field is optional.
Finally, the Message Body is the location you type your main message. It often
contains your signature at the bottom; similar to a hand-written letter.
39
Structure of E-mail
40
Internet Threat
It’s a dangerous world out there in the World Wide Web. Just as your mother may have told
you to never talk to strangers, the same advice holds true for the virtual world. You may
know to be wary of giving strangers your business bank account details. But can you be
sure the website you’re logging into is that of your bank and not a forgery created by a
cybercriminal? Cybercriminals use many different methods to lure you into parting with
your confidential personal or business information. Hence you ought to be aware of the
issues and be extra vigilant when online and offline..
1. Computer virus: A computer virus is a small piece of software that can spread from one
infected computer to another. The virus could corrupt, steal, or delete data on your
computer.
2. Malware: Malware is short for “malicious software.” Malware is used to mean a “variety
of forms of hostile, intrusive, or annoying software or program code.” Malware could be
computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all
of which are defined below.
3. Trojan horse: Users can infect their computers with Trojan horse software simply by
downloading an application they thought was legitimate but was in fact malicious.
4. Malicious spyware: Malicious spyware is used to describe the Trojan application that
was created by cybercriminals to spy on their victims.
5. Computer worm: A computer worm is a software program that can copy itself from one
computer to another, without human interaction.
41
Internet Threat
Botnet: A botnet is a group of computers connected to the Internet that have been
compromised by a hacker using a computer virus or Trojan horse. An individual computer
in the group is known as a “zombie“ computer.
Spam: Spam in the security context is primarily used to describe email spam. Unwanted
messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter
your mailbox as well as potentially take up space on your mail server.
Rootkit: A rootkit is a collection of tools that are used to obtain administrator-level access
to a computer or a network of computers. A rootkit could be installed on your computer
by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on
your PC and may contain spyware that monitors and records keystrokes.
42
Safe Internet rules
1. Don’t give out your personal information – Don’t put personal details such as your home
address, telephone numbers or parent’s work address online as cybercriminals can use
this information to create a fake profile with your details
2. What goes online, stays online – Use privacy settings to make sure only your friends and
family can see photos you post. Avoid posting holiday plans as criminals have been known
to track your movements
3. Check your security and privacy settings – Make sure your social network privacy
settings are secured so only your friends can see your personal information and use your
privacy settings to restrict who can see your posts, videos and photos.
4. Password safety – Sharing your password with your parents is a sensible idea, but avoid
sharing your password with your friends, even if they promise they won’t tell anyone!
Also, when setting your password, make sure it isn’t something people may guess such as
your pet’s name. Use a mixture of letters, numbers and upper and lower case characters
5. Always protect your mobile device – Make sure your mobile phone is pin-protected so all
your personal information stored on it is safe. Download a security app which allows you
to remotely wipe any personal data, should your mobile be lost or stolen.
43
Safe Internet rules
6. Don’t talk to strangers online or offline – Don’t meet up with strangers and let your
parents, know if a stranger has tried to get in contact with you online.
7. Listen to the adults who know – Adults will always be worried about you. Help set their
mind at rest and avoid chatting online with strangers.
8. Be wary of unsecured or unknown websites – When shopping online, use reputable and
known retailers.
9. Be careful what links you click on – Avoid clicking links in an email, Instant Message or
on your social network unless you are sure the message is from someone you know
44
End
Any Question
?
45
INTRODUCTION TO IT SYSTEMS LAB
Subject Code- 2002207
1
Objective
COURSE OBJECTIVES:
This Lab course is intended to practice whatever is
taught in theory class of ‘Introduction of IT Systems’
and become proficient in using computing
environment - basic computer skills, basic application
software tools, Computer Hardware, cyber security
features, etc.
2
Outcome
COURSE OUTCOMES:
At the end of the course student will be able to
comfortably work on computer, install and configure OS,
assemble a PC and connect it to external devices, write
documents, create various worksheets, prepare
presentations, protect information and computers from
basic abuses/ attacks.
3
Contents of LAB from UNIT 1
4
LAB 1
Topic: Lab work 1
Read Wikipedia pages on computer hardware components. Look at those components
in lab, identify them, recognize various ports/interfaces and related cables, etc.
5
LAB 1
Topic: Lab work 1
Read Wikipedia pages on computer hardware components. Look at those
components in lab, identify them, recognize various ports/interfaces and
related cables, etc.
https://en.wikipedia.org/wiki/Computer_hardware
6
LAB 2
Topic: Lab work 2
Connect various peripherals (printer, scanner, etc) to computer, explore
various features of peripheral and their device driver software.
7
LAB 2
Topic: Lab work 2
Connect various peripherals (printer, scanner, etc.) to computer, explore
various features of peripheral and their device driver software.
8
LAB 2
Topic: Lab work 2
Connect various peripherals (printer, scanner, etc.) to computer, explore
various features of peripheral and their device driver software.
9
LAB 2
Topic: Lab work 2
Connect various peripherals (printer, scanner, etc.) to computer, explore
various features of peripheral and their device driver software.
10
LAB 3
Topic: Lab work 3
Browser features, browsing, using various search engines and writing search
queries.
11
LAB 3
Topic: Lab work 3
Browser features, browsing, using various search engines and writing search
queries.
A navigational query is a search query entered with the intent of finding a particular
website or webpage. For example, a user might enter "youtube" into Google's search
bar to find the YouTube site rather than entering the URL into a browser's navigation bar
or using a bookmark. In fact, “facebook” and “youtube” are the top two searches on
Google, and these are both navigational queries.
12
LAB 3
13
LAB 4
Topic: Lab work 4
Visit various e-governance/Digital India portals, understand their features and
services offered.
14
LAB 4
Various Initiatives Under Digital India Initiatives
MyGov: It aims to establish a link between Government and Citizens towards meeting the
goal of good governance. It encourages citizens as well as people abroad to participate in
various activities i.e. 'Do', 'Discuss', 'Poll', 'Talk', ‘Blog’, etc.
DigiLocker: It serves as a platform to enable citizens to securely store and share their
documents with service providers who can directly access them electronically.
National Scholarships Portal (NSP): It provides a centralized platform for application and
disbursement of scholarship to students under any scholarship scheme.
DARPAN: It is an online tool that can be used to monitor and analyze the implementation
of critical and high priority projects of the State.
15
LAB 4
PRAGATI (Pro-Active Governance And Timely Implementation): It has been aimed at
starting a culture of Pro-Active Governance and Timely Implementation. It is also a robust
system for bringing e-transparency and e-accountability
Common Services Centres 2.0 (CSC 2.0): It is being implemented to develop and provide
support to the use of information technology in rural areas of the country. The CSCs enabled
kiosks with broadband connectivity to provide various Governments, private and social
services at the doorstep of the citizen
Mobile Seva: It provides government services to the people through mobile phones and
tablets.
Jeevan Pramaan: It is an Aadhaar based Biometric Authentication System for Pensioners. The
system provides authenticity to Digital Life Certificate without the necessity of the pensioner
being present in person before his/ her Pension Dispensing Authority (PDA).
16
LAB 4
17
End
Any
Question
?
18