0% found this document useful (0 votes)
13 views51 pages

Computer Fundamentals PDF

The document provides an overview of computer fundamentals, including definitions, applications, features, advantages, and disadvantages of computers. It discusses the history, generations, classifications, hardware and software components, and the role of computers in education and research. Additionally, it covers human-computer interaction, operating systems, input/output technologies, memory types, and internal components of computers.

Uploaded by

9rrscg6j5b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views51 pages

Computer Fundamentals PDF

The document provides an overview of computer fundamentals, including definitions, applications, features, advantages, and disadvantages of computers. It discusses the history, generations, classifications, hardware and software components, and the role of computers in education and research. Additionally, it covers human-computer interaction, operating systems, input/output technologies, memory types, and internal components of computers.

Uploaded by

9rrscg6j5b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 51

Computer Fundamentals

A computer is an electronic machine that processes information. It takes input,


processes it, and gives an output. Computers help us perform various tasks
quickly and accurately.
The word computer is derived from a Latin word computare which means to
calculate or to count.

Applications of Computers:
Computers are used in almost every field today. Some common applications
are:
 Education – online learning, e-books, and research.
 Business – Managing data, emails, and video meetings.
 Healthcare – Keeping patient records and diagnosing diseases.
 Entertainment – Watching movies, playing games, and listening to music.
 Banking – Online banking, ATMs, and digital payments.
 Shopping – Buying and selling products online.
 Communication – Emails, video calls, and social media.
 Science & Research – Weather forecasting, space exploration, and
experiments.

Features of Computers:
 Speed – Can process millions of calculations in seconds.
 Accuracy – Gives correct results if the input is correct.
 Automation – Can perform tasks automatically without human help.
 Storage – Stores large amounts of data.
 Connectivity – Connects with the internet to share information.
 Multitasking – Can run many programs at the same time.
 User-Friendly – Easy to use with software and apps.

Advantages of Computers:
 Fast and Efficient – Saves time and effort.
 Stores Large Data – Keeps important files safely.
 Reduces Human Effort – Automates work and reduces errors.
 Helps in Learning – Provides access to knowledge and online courses.
 Improves Communication – Connects people worldwide through emails
and video calls.
 Entertainment – Offers games, music, movies, and social media.

Disadvantages of Computers:
 Cybersecurity Issues – Can be hacked, and data can be stolen.
 Health Problems – Long screen time can harm eyes and posture.
 Expensive – High-quality computers and software can be costly.
 Job Loss – Replaces some human jobs with automation.
 Addiction – Overuse can lead to distraction and less physical activity.

Computer History Timeline:


 3000 BC – Abacus, the first counting device.
 1837 – Charles Babbage designs the Analytical Engine.

 1946 – ENIAC (Electronic Numerical Integrator and Computer), the first


general-purpose electronic computer.

 1950s – Transistors replace vacuum tubes, making computers smaller.


 1969 – ARPANET, the foundation of the internet, is created.

 1971 – Intel 4004, the first microprocessor, is developed.

 1981 – IBM PC, the first widely used personal computer.

 1990s – Growth of the internet and personal computing.


 2000s – Rise of AI, cloud computing, and mobile technology.

 2020s and Beyond – Quantum computing and advanced AI development.


Generations of Computers:
Computers have evolved through different generations, each bringing major
advancements in technology.

First Generation (1940s – 1950s) – Vacuum Tube Computers


Used vacuum tubes for processing.
Large, expensive, and consumed a lot of power.
Example: ENIAC, UNIVAC I

Second Generation (1950s – 1960s) – Transistor Computers


Used transistors, making computers smaller and faster.
More reliable and energy-efficient than vacuum tubes.
Example: IBM 1401
Third Generation (1960s – 1970s) – Integrated Circuit (IC) Computers
Used Integrated circuits (ICs), increasing processing speed.
Smaller, cheaper, and more efficient.
Example: IBM System/360

Fourth Generation (1970s – Present) – Microprocessor Computers


Used microprocessors, making computers compact and powerful.
Development of personal computers (PCs) and the internet.
Example: IBM PC, Apple Macintosh
Fifth Generation (Present and Future) – AI and Quantum Computers
Focus on Artificial Intelligence (AI), machine learning, and quantum computing.
Supercomputers, cloud computing, and IoT (Internet of Things).
Example: IBM Watson, Quantum Computers

Classification of Computers:
Computers can be classified based on their size, purpose, and processing
power.

Based on Size and Performance:


Supercomputers – Extremely powerful, used for complex calculations (e.g.,
weather forecasting, space research).
Example: IBM Summit, Fugaku.
Mainframe Computers – Large, powerful systems used by banks, airlines, and
governments for big data processing.
Example: IBM Z Series.

Minicomputers (Mid-Range Computers) – Smaller than mainframes, used by


medium-sized businesses.
Example: PDP-11, VAX.
Microcomputers (Personal Computers – PCs) – Used at homes and offices,
includes desktops and laptops.
Example: Dell, HP, Apple MacBook.

Based on Purpose:
General-Purpose Computers – Used for various tasks (e.g., PCs, Laptops).

Special-Purpose Computers – Designed for specific tasks (e.g., ATMs, medical


equipment).

Based on Data Handling:


Analog Computers – Used for measuring continuous data (e.g., speedometers,
weather instruments).
Digital Computers – Use binary data (0s and 1s) for processing (e.g., laptops,
smartphones).
Hybrid Computers – Combine analog and digital features (e.g., hospital
monitoring systems).

Hardware and Software:


Computers are made up of hardware and software, both working together to
perform tasks.
Hardware (Physical Components):
Hardware includes all the physical parts of a computer that you can touch.

Types of Hardware:
Input Devices – Devices used to enter data into a computer.
Example: Keyboard, Mouse, Scanner, Microphone

Processing Unit – The CPU (Central Processing Unit).


Example: Intel Core, AMD Ryzen

Memory and Storage – Used to store data.


RAM
Hard Drive (HDD/SSD)

Output Devices – Devices that display or present results.


Example: Monitor, Printer, Speaker

Peripheral Devices – Extra devices connected to the computer.


Example: External Hard Drive, USB Flash Drive, Webcam
Software (Programs and Instructions)
Software is a set of programs that tells the hardware what to do.

Types of Software:
System Software – Controls computer hardware and system operations.
Example: Operating System

Application Software – Used for specific tasks.


Example: MS Word, Photoshop, Chrome

Utility Software – Helps maintain the system and improve performance.


Example: Antivirus, Disk Cleanup, Backup Software
Introduction to Human-Computer Interaction (HCI)

Human-Computer Interaction (HCI) is the study of how people interact with


computers and technology. It focuses on designing computer systems that are
easy to use, efficient, and user-friendly.

Key Aspects of HCI:


User Interface (UI) – The visual layout of a computer system (e.g., buttons,
menus, icons).

User Experience (UX) – How users feel when using a system (e.g., ease of use,
efficiency).

Input and Output Devices – How users interact with the system (e.g., keyboard,
touchscreens, voice commands).

Usability – Making systems simple, intuitive, and accessible for all users.

Importance of HCI:
 Improves the ease of using computers and software.
 Enhances productivity by reducing errors and confusion.
 Helps in designing technology that is accessible to everyone.
 Ensures a smooth and enjoyable user experience.

Examples of HCI in Daily Life:


 Smartphones with touchscreens and voice assistants (Siri, Google
Assistant).
 ATMs with easy-to-use touch interfaces.
 Websites and apps with user-friendly navigation.
Operating System:
An Operating System (OS) is system software that acts as an interface between
the user and the computer hardware. It controls all computer functions,
ensuring smooth operation.

Features of an Operating System (OS):


 User Interface – Provides a GUI (Graphical User Interface) or CLI
(Command Line Interface).
 Multitasking – Runs multiple applications at the same time.
 Memory Management – Allocates and manages RAM efficiently.
 File Management – Organizes, stores, and retrieves files.
 Security and Access Control – Protects data with passwords and
encryption.
 Device Management – Manages input/output devices like printers and
USBs.
 Networking – Supports internet and LAN connections.

Types of Operating Systems:


Batch OS – Execute tasks in batches without direct user interaction.
Example: Early IBM Systems.

Time-Sharing OS – Allows multiple users to use a system simultaneously.


Example: Unix.

Real-Time OS (RTOS) – Processes tasks in real time, used in critical applications.


Example: Embedded Systems in medical devices, flight control.

Distributed OS – Uses multiple computers to perform a single task.


Example: Amoeba, Plan9.

Mobile OS – Designed for smartphones and tablets.


Example: Android, iOS.

Comparison of Operating Systems:


Feature Windows macOS Linux Android iOS
Developed By Microsoft Apple Open Source Google Apple
User Interface GUI- GUI- CLI & GUI Touch-based Touch-
based based based

Customizatio High Limited Very High Moderate Limited


n
Security Moderate High Very High Moderate High
Performance High High High Optimized Optimized
Cost Paid Paid Free/Open Free Paid (with
Source devices)

Best For General Creative Programming Smartphones Apple


Use, Work , Servers Devices
Gaming

Uses of Computers in Education and Research:


Computers play a crucial role in education and research, transforming the way
people learn, teach, and explore new knowledge. They provide fast access to
information, improve learning experiences, and enhance research efficiency.
Definition:
E-Learning (Electronic Learning) refers to learning through digital platforms
using computers, the internet, and multimedia tools. It allows students and
professionals to access educational content anytime, anywhere.

Tools for E-Learning:


Learning Management Systems (LMS) – Platforms for managing courses.
Example: Moodle, Blackboard, Google Classroom.

Video Conferencing Tools – For live online classes.


Example: Zoom, Microsoft Teams, Google Meet

Online Course Platforms – Websites offering structured courses.


Example: Coursera, Udemy, Khan Academy

Interactive Content Tools – For creating quizzes and presentations.


Example: Kahoot, Mentimeter, Prezi

Cloud Storage – To store and share learning materials.


Example: Google Drive, Dropbox
Use of Computers in E-Learning:
 Providing instant access to educational content.
 Enabling interactive learning through multimedia (videos, animations,
simulations).
 Supporting online collaboration between students and teachers.
 Allowing self-paced learning with recorded lectures.
 Automating assessments and feedback through online tests.

E-Classroom:
An E-classroom is a technology-enhanced learning space where digital tools
improve teaching and learning.

Features:
 Smart Boards and Projectors – For interactive teaching.
 Online Attendance Systems – Automates student tracking.
 Virtual Labs – For online practical learning.
 Cloud-Based Learning – Stores and shares study materials.
E-Library:
An E-Library is a digital collection of books, research papers, and study
materials accessible online.

Benefits:
 24/7 access to books and journals.
 Saves physical space and resources.
 Searchable databases for easy information retrieval.
 Examples: Google Books, World Digital Library

Data Analysis:
Data analysis involves processing and interpreting data to extract useful
insights. Computers assist in handling large datasets efficiently.

Data Analysis with SPSS:


SPSS (Statistical Package for the Social Sciences) is a software tool for statistical
analysis, widely used in research.
Features:
 Data entry and visualization.
 Advanced statistical tests.
 Graphical representation of data.

Data Analysis with R Tool:


R is a programming language used for statistical computing and data analysis.

Features:
 Handles large datasets efficiently.
 Supports machine learning and AI models.
 Used in academic and industry research.

Google Scholar:
Google Scholar is a free academic search engine that helps researchers find
scholarly articles, research papers, and books.

Features:
 Searches peer-reviewed papers and journals.
 Provides citation tracking.
 Links to full-text PDFs and publisher websites.
Input and Output Technologies

Computers use input and output technologies to communicate with users.


Input devices allow users to enter data into the system, while output devices
display or present the processed information. These technologies have evolved
significantly, improving user interaction and experience.

Input Devices:
An input device is any hardware component used to enter data, commands, or
signals into a computer. These devices convert human actions (such as typing
or touching) into digital signals that the computer can process.

How it works:
 The user interacts with the input device (e.g., pressing a key, moving a
mouse).
 The device converts the action into electrical signals.
 The signals are sent to the computer’s processor for interpretation.
 The computer processes the data and responds accordingly.

Examples of Input Devices:


 Keyboard – Used for text input.
 Mouse – Controls the pointer on the screen.

 Touchscreen – Allows direct interaction with the display.

 Microphone – Captures audio input.


 Scanner – Converts physical documents into digital format.

Output Devices:
An output device is any hardware component that receives processed data
from the computer and presents it to the user in a readable form.

How it works:
 The computer processes user input and generates an output signal.
 The output signal is sent to the appropriate device.
 The device converts the digital signal into a form understandable by
humans (text, images, sound, etc.).

Examples of Output Devices:


 Monitor – Displays visual output.

 Printer – Produces hard copies of digital documents.

 Speakers – Convert digital audio into sound.


 Projector – Displays visuals on a large screen.

Display Technologies:
Display technologies refer to the various methods used to visually present
information on screens.

Types of Display Technologies:


 CRT (Cathode Ray Tube) – Used in old monitors and TVs.
 LCD (Liquid Crystal Display) – Common in modern monitors and laptops.
 LED (Light Emitting Diode) – Provides better brightness and energy
efficiency.
 OLED (Organic LED) – Offers high contrast and flexible screens (used in
smartphones and TVs).
 E-Ink (Electronic Ink) – Used in e-readers like Kindle for low power
consumption.
Memory:
Memory is an essential part of a computer that stores data, instructions, and
information temporarily or permanently. It helps the CPU process tasks
efficiently by quickly accessing and retrieving stored information. Computer
memory is categorized into primary memory (fast, volatile) and secondary
memory (slower, permanent).

Primary Memory and Technologies:


Primary memory (main memory) is the computer’s immediate storage that
holds data and instructions being used by the CPU. It provides fast access but is
usually volatile, meaning data is lost when power is turned off.

Types of Primary Memory:


RAM (Random Access Memory) – Temporary memory where active programs
and processes run.

Technologies:
 DRAM (Dynamic RAM) – Common in desktops and laptops.
 SRAM (Static RAM) – Faster but more expensive, used in cache memory.
ROM (Read-Only Memory) – Stores essential instructions for booting the
system.

Technologies:
 PROM (Programmable ROM) – Can be programmed once.
 EPROM (Erasable PROM) – Can be erased and reprogrammed.
 EEPROM (Electrically Erasable PROM) – Used in BIOS firmware.
 Cache Memory – High-speed memory between CPU and RAM for quick
access.
 Registers – Ultra-fast memory inside the CPU for immediate data
processing.
Secondary Memory and Technologies:
Secondary memory (storage memory) is non-volatile, meaning data is retained
even when the computer is turned off. It is used for long-term data storage.

Types of Secondary Memory:


 Hard Disk Drives (HDDs) – Magnetic storage with moving parts, used for
general storage.

 Solid-State Drives (SSDs) – Faster than HDDs, using NAND flash


technology.
 Optical Discs – CDs, DVDs, and Blu-ray Discs for media storage.

 Flash Storage – Portable storage like USB drives and SD cards.

 Cloud Storage – Remote servers storing data accessible via the internet.

Computers use primary memory for fast processing and secondary memory for
long-term storage, ensuring efficient and reliable computing.
Inside a Computer

A computer consists of several internal components that work together to


process data and perform tasks. The main components inside a computer
include the motherboard, processor(CPU), memory, storage devices, power
supply (SMPS), and cooling system. Each part has a specific function to ensure
smooth operation.

Form Factor of Computer Cabinet:


The form factor of a computer cabinet refers to its size, shape, and layout,
which determines the compatibility of internal components like the
motherboard, power supply, and cooling system.

Common Form Factors:


 Full Tower – Large, supports extended motherboards (ATX, E-ATX).
 Mid Tower – Standard size, fits ATX and micro-ATX motherboards.

 Mini Tower – Smaller, supports micro-ATX and mini-ITX motherboards.


 Small Form Factor (SFF) – Compact size, used in HTPCs and mini-PCs.

SMPS (Switched Mode Power Supply):


SMPS converts AC power into DC power needed by computer components. It
regulates voltage to prevent power fluctuations and overheating.

Common SMPS Ratings:


 300W – 450W (Basic PCs)
 500W – 750W (Gaming and High-Performance PCS)
 850W+ (Servers, Workstations and High-end gaming PCs with multiple
GPUs)
Motherboard:
The Motherboard is the main circuit board that connects all computer
components, allowing them to communicate.

Ports and Interfaces:


Ports and interfaces allow external devices to connect to the computer.

Common Ports:
 USB Ports (Type-A, Type-C) – Connect peripherals like mic and

keyboards.

 HDMI, VGA, DisplayPort – Connect monitors and projectors.


 Ethernet Port – Used for wired internet connections.

 Audio Jacks – For headphones and speakers.


Expansion Slots:
Expansion slots allow users to add extra functionality using expansion cards.

Types:
 PCIe (Peripheral Component Interconnect Express) – Used for graphics
cards, sound cards, and SSDs.
 PCI Slots – Older standard for expansion cards.
 M.2 Slots – For high-speed SSDs and Wi-Fi cards.

Ribbon Cables:
Ribbon Cables are flat, flexible cables used to connect internal components like
storage drives (HDD, SSD), optical drives, and older peripherals inside the
computer.

Traditional ribbon cables were used for older IDE/PATA drives.


Modern SATA drives use thinner cables, which are not ribbon cables. This
distinction is important for accuracy.

Memory Chips and Processors:


Memory Chips (RAM) – Temporary storage that helps the CPU process data
quickly.

Processors (CPU) – The brain of the computer that executes instructions.


Examples: Inter Core i7, AMD Ryzen 9

Third-Party Devices:
Third-party devices are additional components from external manufactures
that enhance a computer’s capabilities.

Examples:
 Graphics Cards (NVIDIA, AMD) – Boosts gaming and video processing.
 Sound Cards – Improves audio quality.
 Cooling Systems (Liquid Cooling, Extra Fans) – Prevents Overheating.
Block Diagram of a Computer:
A block diagram represents the structure of a computer system, showing how
different components interact.

Basic Block Diagram Components:


Input Unit – Keyboard, mouse, Scanner.

CPU (Central Processing Unit) – Consists of:


 Control Unit (CU) – Manages Operations.
 Arithmetic Logic Unit (ALU) – Performs calculations.
 Registers and Cache Memory – Stores temporary data.

Memory Unit – Primary (RAM) and Secondary (HDD, SSD) storage.

Output Unit – Monitor, printer, speakers.


Number Systems

A number system is a way to represent and process numerical values in a


structured format. Computers use different number systems to store, process,
and transmit data. The most common number systems include Binary, Octal,
Decimal and Hexadecimal.

Logic Gates:
Logic gates are fundamental building blocks of digital circuits. They perform
logical operations on binary inputs (0s and 1s) to produce specific outputs.

Types of Logic Gates:


AND Gate – Output is 1 only if both inputs are 1.
OR Gate – Output is 1 if at least one input is 1.
NOT Gate – Inverts the input (0  1, 1  0).
NAND Gate – Inverse of AND (Output is 0 only if both inputs are 1).
NOR Gate – Inverse of OR (Output is 1 only if both inputs are 0).
XOR Gate – Output is 1 if inputs are different.
XNOR Gate – Output is 1 if inputs are the same.

Binary Number System:


Base: 2
Digits Used: 0, 1
Example: (1011)2 = (11)10
Usage: Computers store and process all data in binary format.
Binary to Decimal Conversion:
Example: (1011)2 = (1x23) + (0x22) + (1x21) + (1x20) = (11)10

Octal Number System:


Base: 8
Digits Used: 0 to 7
Example: (57)8 = (47)10
Usage: Used in memory addressing and digital systems.

Octal to Decimal Conversion:


Example: (57)8 = (5x81) + (7x80) = (47)10

Binary to Octal Conversion:


Group binary digits into sets of 3 from the right.
Example: (101110)2 = (56)8

Hexadecimal Number System:


Base: 16
Digits Used: 0-9 and A-F (where A=10, B=11, …., F=15)
Example: (1A3)16 = (419)10
Usage: Used in programming, color codes (HTML, CSS), and memory addresses.

Hexadecimal to Decimal Conversion:


Example: (1A3)16 = (1x162) + (Ax161) + (3x160) = (419)10
Binary to Hexadecimal Conversion:
Group binary digits into sets of 4 from the right:
Example: (11010110)2 = (D6)16
Binary Arithmetic

Binary arithmetic is the way computers add, subtract, multiply, and divide
numbers using only 0s and 1s. Since computers work in binary (Base-2), they
perform calculations just like we do in the decimal system, but with only two
digits: 0 and 1.

Binary Addition:
Works like normal addition, but follows these rules:
0+0=0
0+1=1
1+0=1
1 + 1 = 10 (0 is written, 1 is carried forward)

Binary Subtraction:
Uses borrowing like in decimal subtraction.
Rules:
0–0=0
1–0=1
1–1=0
0 – 1 = 1 (borrow 1 from the next higher bit)
Binary Multiplication:
Same as decimal multiplication, but with 0s and 1s.
Rules:
0x0=0
0x1=0
1x0=0
1x1=1

Binary Division:
Follows the same rules as decimal division.
Example:
1010 / 10 = 101 (10 in binary divided by 2 gives 5)

1’s Complement Arithmetic:


The 1’s complement of a binary number is found by flipping all bits ( 0  1 and
1  0).
Example:
Binary: 1010
1’s Comp: 0101
1’s complement is used in subtraction, where negative numbers are
represented by inverting the bits.

2’s Complement Arithmetic:


The 2’s complement of a binary number is found by:
Taking the 1’s complement (flip all bits).
Adding 1 to the result.
Example:
Binary: 1010
1’s Comp: 0101
+1
2’s Comp: 0110
2’s complement is widely used for representing negative numbers and
performing subtraction.
Central Processing Unit

The Central Processing Unit (CPU) is the brain of a computer. It performs all the
calculations, logic operations, and instructions required to run programs.

Functions of CPU:
The CPU has three main functions:
 Fetch – Retrieves instructions from memory.
 Decode – Interprets the instructions.
 Execute – Carries out the instructions.

Components of CPU:
The CPU consists of several key components:
CPU Registers:
Small, high-speed memory locations inside the CPU.
Store temporary data, instructions, and addresses.
Examples: Accumulator (AC), Program Counter (PC), Instruction Register (IR),
Stack Pointer (SP).

Arithmetic and Logic Unit (ALU):


Performs mathematical operations (addition, subtraction, multiplication,
division).
Handles logical operations (AND, OR, NOT, XOR).

Control Unit (CU):


Directs the flow of data and instructions.
Tells the ALU and memory how to execute instructions.

Cache Memory:
Cache memory is a small, high-speed memory located inside or very close to
the CPU.
It stores frequently used data to make processing faster.

Types of Cache Memory:


L1 Cache (Level 1):
Fastest but smallest (32KB – 512KB).
Located inside the CPU core.

L2 Cache (Level 2):


Slightly slower but larger (256KB – 8MB).
Can be inside or just outside the CPU.

L3 Cache (Level 3):


Largest but slowest among caches (4MB – 64MB).
Shared among multiple CPU cores.

Uses:
 Speeds up processing by reducing access time to data.
 Reduces CPU waiting time for data from RAM.
 Improves overall system performance.
System Bus – Types and Technologies:
The system bus is responsible for communication between CPU, memory, and
other components.

Types of System Buses:


 Data Bus – Transfers actual data.
 Address Bus – Carries memory addresses.
 Control Bus – Sends control signals to manage operations.

Bus Technologies:
 PCI (Peripheral Component Interconnect)
 PCIe (PCI Express) – Faster version for modern systems.
 USB (Universal Serial Bus) – Used for external device connections.
Cyber Security Threats

Cybersecurity threats are dangers that target computers, networks, and data,
aiming to steal, damage, or disrupt systems. These threats come in various
forms, including malware, viruses, hacking, and data breaches. Protecting
against these threats is crucial for personal users, business, and governments.

Computer Malware, Spyware, and Worms:


Malware is any software designed to harm or exploit computers. It includes:
 Viruses – Infect files and spread when executed.
 Worms – Spread automatically without user action.
 Trojans – Disguise as legitimate software but carry harmful code.
 Ransomware – Lock files and demands payment to unlock them.
 Spyware – Secretly monitors user activity and steals data.

Computer Virus:
A computer virus is a type of malware that attaches itself to files and spreads
when the infected file is opened.

Classification of Viruses:
 File infector Viruses – Attach to executable files.
 Boot Sector Viruses – Infect the boot section of a hard drive.
 Macro Viruses – Target documents like Word or Excel.
 Polymorphic Viruses – Change their code to evade detection.
 Metamorphic Viruses – Completely rewrite themselves to avoid anti-
virus software.
Anti-Virus:
Anti-virus software detects, prevents, and removes malware.
 Windows Defender – Built into windows; basic protection.
 Norton Antivirus – Strong protection; requires a paid subscription.
 McAfee – Offers web and identity protection features.
 Bitdefender – Lightweight and powerful security software.
 Kaspersky – Effective defection but has privacy concerns in some
countries.

Hacking:
Hacking is the process of gaining unauthorized access to a system or network.

Types of Hackers:
 White Hat Hackers (Ethical Hackers) – Help improve security.
 Black Hat Hackers – Malicious hackers who steal data or damage
systems.
 Gray Hat Hackers – Sometimes break laws but don’t harm users.

Common Hacking Techniques:


 Phishing – Fake emails or websites to steal personal information.
 Keylogging – Recording keystrokes to capture passwords.
 DDoS Attacks – Overloading a website to make it crash.
 SQL Injection – Exploiting database vulnerabilities.

Security Firewalls:
A firewall is a security system that monitors and controls incoming and
outgoing network traffic based on security rules.
Types of Firewalls:
 Software Firewall – Installed on individual computers (e.g., Windows
Firewall).
 Hardware Firewall – Physical devices that protect entire networks.
 Cloud Firewall – Online-based protection for cloud environments.

Firewall Functions:
 Blocks unauthorized access.
 Filters harmful data packers.
 Prevents malware from spreading.
Modern Computing:
Modern Computing has evolved significantly, enabling faster processing,
wireless connectivity, big data analysis, cloud-based solutions, and smart
devices. These advancements improve efficiently, automation, and accessibility
in various industries, including business, healthcare, and finance.

Wireless Technologies:
Wireless technologies allow devices to communicate without physical cables.

Types of Wireless Technologies:


 Wi-Fi – Provides wireless internet over short distances.
 Bluetooth – Connects devices like phones, headphones, and
smartwatches.
 5G and 4G – High-speed mobile networks for fast internet access.
 NFC (Near Field Communication) – Used for contactless payments.
 Satellite Communication – Enables global Connectivity via satellites.

Data Mining:
 Process of extracting useful patterns from large datasets.
 Used in business, healthcare, fraud detection, and AI.

Big Data Analysis:


 Deals with extremely large and complex data sets.
 Technologies: Hadoop, Apache Spark, Machine Learning.
 Used in social media, e-commerce, and scientific research.

Cloud Computing:
Cloud computing allows users to store, process, and access data over the
internet instead of local computers.
Types of Cloud Computing:
 Public Cloud – Services offered by providers like AWS, Google Cloud,
Microsoft Azure.
 Private Cloud – Exclusive cloud services for business.
 Hybrid Cloud – A mix of public and private cloud solutions.

Benefits:
 Cost-effective and scalable.
 Accessible from anywhere.
 Improves data security and backup.

Mobile Computing:
Mobile computing allows users to work and access data from mobile devices
anywhere.

Components of Mobile Computing:


 Smartphones and Tablets – Portable devices for communication and
apps.
 Wireless Networks – 4G, 5G, Wi-Fi, and Bluetooth.
 Cloud Services – Access to applications via the internet.

Applications:
 Mobile banking
 Online Shopping
 GPS navigation
 Remote work and communication
Internet of Things (IoT):
IoT connects smart devices to the internet to communicate and automate
tasks.

Examples:
 Smart Home Devices – Smart lights, thermostats, security cameras.
 Smart Cars – Self-driving vehicles and GPS tracking.
 Industrial IoT (IIoT) – Automated manufacturing and monitoring systems.
 Healthcare IoT – Wearable devices like smartwatches and health
monitors.

Embedded Systems:
Embedded systems are specialized computing systems built into devices to
perform dedicated functions.
 Automobiles – ABS brakes, airbags, engine control.
 Medical Devices – Pacemakers, MRI scanners.
 Consumer Electronics – Smart TVs, gaming consoles.

Cryptocurrency:
Cryptocurrency is a digital currency that uses encryption for security.
 Bitcoin (BTC) – The first and most well-known cryptocurrency.
 Ethereum (ETH) – Supports smart contracts and decentralized apps.
 Ripple (XRP) – Used for fast cross-border payments.

Features of Cryptocurrency:
 Decentralized – No central authority like banks.
 Uses blockchain for security.
 Allows anonymous transactions.

You might also like