Computer Course DPT
Computer Course DPT
Generally speaking, computers can be classified into five generations. Each generation
lasted for a certain period of
time, and each gave us either a new and improved computer or an improvement to the
existing computer.
Evolution of computer
Computer generations
First generation computers were used during 1942-1955.These computers were large in
size and writing programs on them was difficult. Some of the computers of this
generation were:
ENIAC: It was the first electronic computer built in 1946 at University of Pennsylvania,
USA by John Eckert and John Mauchly. It was named Electronic Numerical Integrator
and Calculator (ENIAC). The ENIAC was 30 50 feet long, weighed 30 tons, contained
18,000 vacuum tubes, 70,000 registers 10,000 capacitors and required 150,000 watts of
electricity. Today your favorite computer is many times as powerful as ENIAC, still size is
very small.
Advantages
Vacuum tubes were the only electronic component available during those days.
Vacuum tube technology made possible to make electronic digital computers.
These computers could calculate data in millisecond.
Disadvantages
The second generation computers used transistors. The scientists at Bell laboratories
developed transistor in 1947. These scientists include John Barden, William Brattain and
William Shockley. The size of the computers was decreased by replacing vacuum tubes
with transistors. The examples of second generation computers are IBM 7094 series,
IBM 1400 series and CDC 164 etc.
Advantages
Disadvantages
The Third generation computers used the integrated circuits (IC). Jack Kilby developed
the concept of integrated circuit in 1958. It was an important invention in the computer
field. The first IC was invented and used in 1961. The size of an IC is about ¼ square inch.
A single IC chip may contain thousands of transistors. The computer became smaller in
size, faster, more reliable and less expensive. The examples of third generation
computers are IBM 370, IBM System/360, UNIVAC 1108 and UNIVAC AC 9000 etc.
Advantages
Disadvantages
Air conditioning was required.
Highly sophisticated technology required for the manufacturing of IC chips.
Advantages
Disadvantages
Computer Education
Computer Education has become a prerequisite in our modern lives. Proper computer
education is required in order to become competitive in work field and make a distinct
mark in one’s career. Reservation of tickets in Air Lines and Railways, payment of
telephone and electricity bills, deposits and withdrawals of money from banks, business
data processing, medical diagnosis, weather forecasting, etc. are some of the areas
where computer has become extremely useful.
What is computer?
Computer is an electronic device. It accepts data, processes the data and gives us the
desired output in the form of information. Therefore, we may define computer as a
device that transforms data.
Characteristics of Computers: -
1. Speed: It can calculate millions of calculation in seconds.
2. Accuracy: Computer results are highly accurate.
3. Memory: Computers have a large amount of memory to hold a very large amount of
data or information.
4. Programmed Intelligence: They are programmed in such a way that they can perform
those operations which have been fed into them.
5. Diligence: Computer is free from problems like lack of concentration, and confuse like
humans.
6. Versatility: We can perform many different types of tasks on computer.
7. Power of Remembrance: Unlike humans, computer can store things for unlimited
period of time.
8. No intelligence: It cannot take any decision on its own.
Types of a computer: -
There are two types of computers
a. According to Work
b. According to Size
According to Work: -According to work, computer is further divided in three type’s i.e.
a. Analogue Computers
b. Digital Computers
c. Hybrid Computers
Analogue Computers: - Computers that process analogue data are called analogue computers,
analogue data is continuous, and accept analogue input and provide analogue output. It’s used
to measure the physical quantities.
Digital Computers: - Computers that process digital data are called digital computers, digital
data is discrete, accepts only digital input and provides output in digital. It measures digital
quantities. And these are general purpose computers.
Examples: Calculator, Accounting machines
Hybrid Computers: - Computers that process digital and analogue data are called hybrid
computers. They are special purpose computers.
Example: Radars, Telephone, Webcam, Mobiles, computer used in hospitals to measure the
heartbeat of patient.
A hybrid computer combines the best features of both analogue and digital.
According to Size: -
• Super Computer: - Supercomputers are the largest, fastest, most powerful, and most
expensive computers supercomputers can be accessed by many individuals at the same
time. Supercomputers are used primarily for scientific applications that are
mathematically intensive. The first supercomputer was built in the 1960s for the United
States Department of Defence. Supercomputers derive much of their speed from the
use of multiple processors. It is used in · the aerospace, automotive, chemical,
electronics and petroleum industries use supercomputers extensively.
• EXAMPLE:
• Cray-1
• Cray-2
• Control Data Cyber 205
• ETA
• Mainframe Computer: -Mainframe computers are the most powerful computers after
Supercomputers. A mainframe computer may contain several microprocessors. A single
mainframe computer can be used by hundreds of people at once. Each user has his own
terminal that is connected to the mainframe. A mainframe computer system is usually
composed of several processors. Examples of mainframe computer are:
o IBM S/390
o Amdahl 580
o Control Data Cyber 176
o Host Processor:
The host processor is responsible for controlling the other processors, all
the peripheral devices, and the mathematics operations.
Mini Computer: - Minicomputers are medium-sized computers which are more powerful than
microcomputers but not as powerful as mainframes. The "age of the mini" started in the late
1960s. Minicomputers are frequently referred to as mid-range computers. Like mainframes,
most minicomputers are multiuser systems. Mini computers are a little slower than mainframe.
EXAMPLE:
• IBM AS/400
• IBM SYSTEM 360
• HP 3000
• PRIME 9755
Microcomputer: - It’s a single user computer; main units are input, processing, output, and
storage. We can select the programs we want to use, and we don't have to compete with other
users to gain access to the system. A single-user system is designed to meet the computing
needs of an individual. The most common type of microcomputer is a desktop computer,
which is a personal computer that fits on top of a desk. Microcomputers are the smallest and
cheapest and are used at home, in schools and in some businesses.
Computer Hardware and Software
Computer hardware is any physical device, something that you are able to touch
and software is a collection of instructions and code installed into the computer and
cannot be touched. For example, the computer monitor you are using to read this text
on and the mouse you are using to navigate this web page is computer hardware. The
Internet browser that allowed you to visit this page and the operating system that the
browser is running on is software.
Hardware is what makes a computer work. A CPU processes information and that
information can be stored in RAM or on a hard drive. A sound card can provide sound to
speakers and a video card can provide an image to a monitor. All of this is hardware.
And on the other hand an operating system, like Windows or Mac OS, is software. It
provides a graphical interface for people to use the computer and other software on the
computer. A person can create documents and pictures using software.
RAM: A fast CPU is useless without enough amount of RAM (Random Access memory).
RAM is usually referred to as a computer’s memory meaning it stores information that is
used by running programs or applications. More memory lets you run more applications
at the same time without degrading your system’s performance. RAM data can be
accessed randomly, like memory address 10 can be accessed as quickly as memory
address 10, 000,000.
ROM: It stands for Read-only memory, contains programs and data permanently
recorded into memory at the factory and cannot be changed by user, it is not volatile,
contents do not disappear when power is lost the programmable ROM chips that
contain some instructions on chip can be changed.
Flash Memory: It’s non- volatile, and may be used in cellular phone, digital cameras etc.
Hard Disk Drive: HDD of the computer is where permanent information is stored.
Documents, databases, spreadsheets and programs are all stored on hard disk. The
larger the hard disk, the more you can fit on the drive. The size of the HDD doesn’t
affect the speed at which a program can run, but HDD speed can affect how fast you can
access your files.
Video Card: The video card is a board that plugs into the PC motherboard to give it
display capabilities. New video cards come with their own ram and processor to help
speed up the graphics display. Many computers come with video chips built in. That
makes a separate video card unnecessary, unless the computer is going to be used for
high-end multimedia work or to play video games.
Sound Card: Like video cards, sound cards are expansion boards used for enabling a
computer to manipulate sound. Most sound cards give you the power to plug in
speakers and a microphone.
Modem: The modem allows your computer to use a telephone line to communicate and
connect to the internet.
Keyboard
Keyboard is the primary input device; it is an input device that contains key, user press keys to
enter data or instructions in to the computer”. Keyboard keys consist of
• Alphabetic keys contain alphabets from A-Z & a-z
• Numerical keys contain numbers 0-9
• Symbols keys contain many symbols like,!, @, #, $, % etc.
• Functional keys contain f1-f12, design for special purposes.
• Control keys contain Esc, Alt, Ctrl, Enter etc.
• Punctuation Keys contain, “” ‘ `_-\| etc, Space etc.
• Navigational Keys contain Page Up, Page Down, Home, End, etc...
Mouse
Mouse is an input device that fits under palm of hand and Controls movement of
pointer, also called mouse.
TYPES OF MOUSE
1. Mechanical mouse: -The mouse that contains a metal or rubber ball on it’s under
side. When the ball is rolled in any direction, sensors inside the mouse detect this
motion and move the on-screen mouse pointer in the same direction
2. Optical mouse: -An optical mouse uses a laser to detect movement relative to the
underlying surface.
3. Wireless mouse: - Wireless mouse usually work on radio frequencies commonly
referred to as RF. Wireless mouse require two components to work properly a radio
transmitter and a radio receiver.
Monitor
A computer monitor is an electronic device that shows pictures. Monitors often look
similar to televisions. The main difference between a monitor and a television is that a
monitor does not have a television tuner to change channels. Monitors often have
higher display resolution than televisions. A high display resolution makes it easier to
see smaller letters and fine graphics.
• LCD Monitors: LCD stands for Liquid Crystal Display. The main advantage of LCDs are
light weight, occupy less place, low radiation and supports high resolutions. Its looks like
we can see below:
• LED Monitors: LED stands for Light Emitting Diode. Actually there are no differences
between LCD and LED monitors, but better picture quality in LED monitors. So now
everyone should prefer LED monitors over LCD monitors.
Projectors
Output devices that can take the display of a computer screen and project a large
version of it onto a flat surface. Projectors are often used in meetings and presentations
to help make sure everyone in the room can view the presentation.
Advantages of a projector:
Printer
A printer is an output device that prints paper documents. This includes text documents,
images, or a combination of both. The printed output produced by a printer is often
called a hard copy, which is the physical version of an electronic document. Printers are
classified in two major groups one this called impact and second is non-impact printers.
Impact printer - Produces text and images when tiny wire pins on print head strike the ink
ribbon by physically contacting the paper, Dot-matrix printer is the example of Impact printer.
Non-impact printer - Produces text and graphics on paper without actually striking the paper,
and Inkjet printer, laser printer and thermal printer is the example of Non-Impact printer.
Types:
Dot-Matrix Printer: -A type of printer that produces characters by striking pins against
an ink ribbon to print closely spaced dots in the appropriate shape. Dot-matrix printers
are relatively expensive and do not produce high-quality output.
Inkjet Printer: - A type of printer that works by spraying ionized ink at a sheet of
paper. Magnetized plates in the ink's path direct the ink onto the paper in the
desired shapes. Ink-jet printers are capable of producing high quality print. The price
of ink-jet printers is lower than that of laser printers. However, they are also
considerably slower. Another drawback of ink-jet printers is that they require a
special type of ink. Colour ink-jet printers provide an inexpensive way to print full-
colour documents.
Laser Printer: - A type of printer that utilizes a laser beam to produce an image on a
drum. The light of the laser alters the electrical charge on the drum wherever it hits.
The drum is then rolled through a reservoir of toner, which is picked up by the
charged portions of the drum. Finally, the toner is transferred to the paper through a
combination of heat and pressure. This is also the way copy machines work. One of
the chief characteristics of laser printers is their resolution.
Thermal Printer: - A printer that uses heat to transfer an impression onto paper.
There are two kinds of thermal printers:
A storage device is any hardware capable of holding information. There are two types of
storage devices used in computers; a primary storage device, such as RAM, and a
secondary storage device, like a hard drive. Secondary storage can be a removable,
internal or externalstorage.
Without a storage device, your computer would not be able to save any settings or
information
Primary memory is storage where your computer stores instructions and information
about programs it is currently running. Primary storage is much faster than Secondary
Memory, but it cannot be used to store information in the long term. Primary storage is
volatile in nature as soon as the power goes it loses all of the information.
RAM is a volatile memory and stores that part of instructions in its memory which is
being processed. Running application on our system currently takes place in RAM. It is
like achalkboard. You can write notes, read them, and erasethem when you no longer
need them.
Processor Cache
The processor, also known as the CPU (central processing unit), processes information
on your computer. In order to do this, it needs to store the information somewhere,
which in this case is the "cache memory." The cache memory transfers data at fast
speeds so it can be processed by the cores in the processor. The cache memory holds a
lot less space than RAM. For example, a processor will usually have around 12 MB of
cache memory, whereas RAM may have up to 4 GB. However, the cache memory makes
up for that in sheer speed. For instance, RAM will have a speed of 800 Mhz, while the
cache memory can operate at 2.4 Ghz.
Processor Registers
The processor registers are the smallest and fastest of all primary storage devices. They
are primarily used by the processor to handle calculations used to operate the
programs. The larger processes involving software and operating system files are
handled by the cache memory.
For example: Hard disk, floppy drive is the good example of Secondary storage memory
Secondary storage is defined as a storage medium that is separate from the processor and
holds data even with no power passed to it. An example is a hard drive or an optical drive.
USB Drives
A USB flash drive is a type of flash memory storage device integrated with a
universal serial bus interface. Usually portable and rewritable, some can hold up
to 300 GB.
Floppy Disks
Floppy disks are a storage medium made of a thin magnetic disk. They were
widely used from the 1970s to the 1990s. Storage capabilities ranged from 1.5
Mb to 200 MB on some versions.
CD-R
DVD-R (Digital Video Disk- recordable) has a storage capacity of usually 4.1 GB.
There is also an 8.54-GB dual-layer version, called DVD-R DL.
Magnetic Tape
Magnetic tape has been in use for more than 50 years. It is (in recent years)
packaged in cartridges/cassettes. The average amount of storage is 5 MB to 140
MB for every standard-length reel (2,400 feet).
Units of memory
1 bit (binary digit) = the value of 0 or 1
8 bits = 1 byte
0 0 0
1 01 1
2 10 2
3 11 3
4 100 4
5 101 5
6 110 6
7 111 7
8 1000 8
9 1001 9
A 1010 10
B 1011 11
C 1100 12
D 1101 13
E 1110 14
F 1111 15
10 0001 0000 16
Binary System
Binary is the simplest kind of number system that uses only two digits of 0 and 1. By
using these digits computational problems can be solved by machines because in digital
electronics a transistor is used in two states. Those two states can be represented by 0
and 1. That is why this number system is the most preferred in modern computer
engineer, networking and communication specialists, and other professionals.
Decimal System
Decimal number system is the most commonly used and the most familiar one to the
general public. It is also known as Base 10 numbering system since it is based on 10
following symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. In decimal system, every digit has its own
position as well as the decimal point. I.e. the number 356.74 has 4 in the Hundredths
position, 7 in the Tenths position, 6 in the Units position, 5 in the Tens position, and 3 in
the Hundreds position. Decimal number system is also one of the oldest known numeral
system, which is historically related to Hindu-Arabic numeral system.
(25) ÷ 2 = 12 | 1
(12) ÷ 2 = 6 | 0
(6) ÷ 2 = 3 | 0
(3) ÷ 2 = 1 | 1
(11001)²
Step1:11001
Step2:24 23 22 21 20
Step3:24 × 1 + 23 × 1+ 22 × 0+ 21 × 0 + 20 × 1
Step4:16 + 8 + 0 + 0 + 1 = 25
Software
Organized information or set of instructions in the form of operating systems, utilities,
programs, and applications that enable computers to work. Software consists of carefully-
organized instructions and code written by programmers in any of various special computer
languages.It is further divided in two categories.
1. System software
Controls the basic functions of a computer and comes usually preinstalled with the
machine. E.g. BIOS, Operating system
Systems software includes the programs that are dedicated to managing the computer
itself, such as the operating system, file management utilities, and disk operating system
(or DOS). The operating system manages the computer hardware resources in addition
to applications and data. Without systems software installed in our computers we would
have to type the instructions for everything we wanted the computer to do!
2. Application software
Application software is called the end-user programs because they enable the user to
complete tasks such as creating documents, spreadsheets, databases, and publications,
doing online research, sending email, designing graphics, running businesses, and even
playing games! Application software is specific to the task it is designed for and can be
as simple as a calculator application or as complex as a word processing
application.Browser is an application specifically designed to locate, retrieve, and display
content found on the Internet.
Operating system
An operating system is the most important software that runs on a computer. It
manages the computer's memory, processes, and all of its software and hardware
resources to make the best use of it for the user. It helps the hardware to communicate
with applications.
And after being initially loaded into the computer by a boot program, it manages all the
other programs in a computer. Objective of the OS is to provide convenience and to
make it user friendly.
DOS is an acronym for Disk Operating System. Microsoft developed DOS in the early
1980s for personal computers. DOS used a command line interface when Microsoft first
developed it. Microsoft Windows XP’s operating environment is a Graphical User
Interface (GUI).
Mac OS
Mac OS X
Mac OS was the first commercially successful graphical user interface released in 1984.
It was targeted for use with home desktops and workstations. Mac OS X is a multitasking
operating system and it is the latest version of the Macintosh operating system released
in 2001. It also has better security protection compared to Mac OS, for example the
integrated firewall utility.
UNIX
LINUX
UNIX is a multitasking operating system developed in the early 1970s by scientists at the
Bell Laboratories. Some versions of UNIX have a command line interface but most
versions of UNIX offer a graphical user interface. Linux is a popular, free, UNIX-like
graphical user interface operating system. It is open source software. Although Linux
runs on many kinds of equipment, it is best known for its support of IBM-Intel PC-based
hardware.
Introduction to Programming
Writing software, computer programs, is a lot like writing down the steps it takes to do
something. Computers don't do anything without someone telling them what to do. To
make the computer do something useful, you must give it instructions in either of the
following two ways:
Write a program that tells a computer what to do, step by step, much as you
write out a recipe.
Buy a program that someone else has already written that tells the computer
what to do.
Ultimately, to get a computer to do something useful, you (or somebody else) must
write a program.
A program does nothing more than tell the computer how to accept some type of input,
manipulate that input, and spit it back out again in some form that humans find useful.
Machine Languages
Assembly Languages
High Level Languages
Any computer can directly understand only its own Machine Language. Machine
Language is the natural (native) language of a computer. Machine languages generally
consist of strings of numbers (ultimately reduce to 1s & 0s) that instruct computers to
perform their most elementary operations. Machine languages are machine dependent.
Machine-language programming was too slow, boring & error prone for most
programmers. Instead of using Machine language, programmer began using English-like
abbreviation (called mnemonics) to represent elementary operations. Translator
programs called assemblers were developed to convert assembly languages to machine
languages.
To speed up the programming purpose, high level languages were developed in which
single statements could be written to complete large tasks. High level languages allow
programmers to write instruction in everyday English and contain commonly used
Mathematical notations. Translator program called compiler used to convert High level
languages into Intermediate language to be accepted by assembler which further
converts it into binary form we call it Machine language.
1. Increased Efficiency
2. Streamlining of Processes
Data refers to unprocessed information, it is raw material and unorganized facts that
need to be processed. When data are processed, organized, structured or presented in a
given context so as to make them useful, they are called Information. Data in
themselves are fairly useless. But when these data are interpreted and processed to
determine its true meaning, they become useful and can be called Information. Data is
the computer's language. Information is our translation of this language.
Administrator account. The administrator can do everything with the computer and can
go anywhere he or she desires—essentially giving that person control over the entire
computer, including other accounts. The administrator account can never be disabled or
deleted.
Standard account. Users with standard accounts can install programs and hardware,
change pictures and related personal data, and create, change, or remove passwords.
Guest account. A guest account doesn't require a password, can't add or remove
programs from the computer, and is disabled by default. This account type is ideal for
kids and students.
Networking
In early ages it was really very difficult to share data and resources among computers,
one had to physically take the data from one computer to another in some storage
device and then put that data to the desired computer. If there were 3 computers in a
room and 1 printer, in that situation only one computer could use the printer on which
it was installed because there was no networking, so sharing resources was not easy. In
this way networking term was introduced and worked on by the professionals of the
time. So one of the reasons of motivation towards networking was resource sharing.
In the evolution process initially only two computer were connected through a wire
which was not enough if there are more computer present in the room
With the passage of time different topologies came into being. E.g.
Mesh Topology
1. Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.
2. Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
3. Expansion and modification in topology can be done without disrupting other nodes.
Bus Topology
Bus Topology is the simplest of network topologies. In this type of topology, all the
nodes (computers as well as servers) are connected to the single cable (called bus), by
the help of interface connectors. This central cable is the backbone of the network and
is known as Bus. Every workstation communicates with the other device through this
Bus.
o There is a limit on central cable length and number of nodes that can be connected.
o If the main cable (i.e. bus) encounters some problem, whole network breaks down.
o Proper termination is required to dump signals. Use of terminators is must.
o It is difficult to detect and troubleshoot fault at individual station.
Ring Topology
In Ring Topology, all the nodes are connected to each-other in such a way that they
make a closed loop. Each workstation is connected to two other components on either
side, and it communicates with these two adjacent neighbors. Data travels around the
network, in one direction. Sending and receiving of data takes place by the help of
token.
1) This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision. Also in ring
topology all the traffic flows in only one direction at very high speed.
2) Even when the load on the network increases, its performance is better than that of
Bus topology.
3) There is no need for network server to control the connectivity between
workstations.
5) Each computer has equal access to resources.
1) Each packet of data must pass through all the computers between source and
destination. This makes it slower.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
Star Topology
In Star topology, all the components of network are connected to the central device
called “hub” which may be a hub, a router or a switch. Unlike Bus topology, where
nodes were connected to central cable, here all the workstations are connected to
central device with a point-to-point connection. So it can be said that every computer is
indirectly connected to every other node by the help of “hub”.All the data on the star
topology passes through the central device before reaching the intended destination.
Hub acts as a junction to connect different nodes present in Star Network, and at the
same time it manages and controls whole of the network.
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw
how in Physical Star network Topology, computers (nodes) are connected by each other
through central hub. And we also saw in Bus Topology, work station devices are
connected by the common cable called Bus. After understanding these two network
configurations, we can understand tree topology better. In Tree Topology, the number
of Star networks is connected using Bus.
Advantages of Tree Topology
1. Expansion of Network is possible and easy.
2. Easily managed and maintained.
4. Error detection and correction is easy.
5. Each segment is provided with dedicated point-to-point wiring to the central hub.
6. If one segment is damaged, other segments are not affected.
Types of Networking
There are usually said to be three categories of networks these network types are a
separate concept from network topologies such as bus, ring and star.
A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one building.
As the term implies, a WAN spans a large physical distance. The Internet is the largest
WAN, spanning the Earth.A WAN is a geographically-dispersed collection of LANs, A network
device called a router connects LANs to a WAN. A WAN differs from a LAN in several
important ways. Most WANs (like the Internet) are not owned by any one organization
but rather exist under collective or distributed ownership and management.
A network spanning a physical area larger than a LAN but smaller than a WAN, such as a
city. A MAN is typically owned and operated by a single entity such as a government
body or large corporation.
Data Communication
Data communication refers to the exchange of data between a source and a receiver.
The meanings of source and receiver are very simple. The device that transmits the data
is known as source and the device that receives the transmitted data is known as
receiver. Data communication aims at the transfer of data and maintenance of the data
during the process.
Browsers
A software program that allows a person to explore the Internet in an easy way.
Navigating the Internet through a series of hyperlinks we can browse the Internet.
Examples of popular browsers are Chrome, Internet Explorer, Firefox, Safari, and Opera.
If we need to explore anything on internet we open the browser and type the address of
the website like e.g.
Now let’s try to understand what are http, www, google, and com
HTTP: Stands for "Hypertext Transfer Protocol." This is the protocol used to transfer
data over the World Wide Web. That's why all Web site addresses begin with "http://".
Whenever you type a URL into your browser and hit Enter, your computer sends an
HTTP request to the appropriate Web server. The Web server, which is designed to
handle HTTP requests, then sends to you the requested HTML page.
WWW: A technical definition of the World Wide Web is: all the resources and users on
the Internet that are using the Hypertext Transfer Protocol (HTTP).
GOOGLE: This part of the URL denotes the name of the website to which we want to
access using our browser and HTTP protocol.
COM: Each website has a domain name that serves as an address, which is used to
access the website.Domain names are relatively cheap to register, though they must be
renewed every year or every few years. The good news is that anyone can register a
domain name, so you can purchase a unique domain name for your blog or website. The
bad news is that nearly all domain names with common words have already been
registered. Therefore, if you want to register a custom domain name, you may need to
think of a creative variation. Once you decide on a domain name and register it, the
name is yours until you stop renewing it. When the renewal period expires, the domain
name becomes available for others to purchase.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP is used to send
messages, while the POP or IMAP protocols are used to retrieve messages from a mail
server.
Collaborative Computing
An interactive multimedia conferencing application that enables multiple parties to
collaborate on textual and graphic documents. Through special software, each party to
the call can contribute to such documents, working together with the other parties.
During such a collaborative session, the original text document is saved, while each
party contributes changes that are identifiable as such, by contributor. When the parties
agree to the collaborative edits and enhancements, the entire text file is refreshed and
saved. Similarly, a design or a concept can be developed graphically and on a
collaborative basis through white boarding, much as the parties would do on a physical
whiteboard in a face-to face meeting. Typically, each party to the conference has access
to a special whiteboard pad and stylus, which is used to draw. Each party can modify the
initial drawing, with each individual's contribution identified by separate color. Again,
and once the group has agreed on the final graphic rendition, the graphic is saved and
all screens are refreshed.
Social Networking
Social networking websites allow users to be part of a virtual community. The two most
popular sites are currently Facebook and MySpace. These websites provide users with
simple tools to create a custom profile with text and pictures. A typical profile includes
basic information about the user, at least one photo, and possibly a blog or other
comments published by the user. Advanced profiles may include videos, photo albums,
online applications (in Facebook), or custom layouts (in MySpace). After creating a
profile, users can add friends, send messages to other users, and leave comments
directly on friends' profiles. These features provide the building blocks for creating
online communities.
These websites also provide an important linking element between users that allows
friends to communicate directly with each other. Because people often have friends
from different places and different times in their lives, social networking sites provide an
opportunity to keep in touch with old friends and to meet new people as well. Of
course, this means that people you don't know may also be able to view your profile
page. Therefore, if you join a social networking website, it is a good idea to review the
privacy settings for your account. And more importantly, remember to always use
discretion in what you publish on your profile.
E-Commerce
E-commerce (electronic-commerce) refers to business over the Internet. Web sites such
as Amazon.com, Buy.com, and eBay are all e-commerce sites.
E-commerce facilitates the growth of online business. It is categorized as follows:
1. Online marketing
2. Online advertising
3. Online sales
4. Product delivery
5. Product service
6. Online billing
7. Online payments
IT Security and computer Crimes
IT Security
Information security (IS) is designed to protect the confidentiality, integrity and availability of
computer data from those with malicious intentions. Sensitive information must be kept - it
cannot be changed, altered or transferred without permission. For example, a message
could be modified during transmission by someone intercepting it before it reaches the
intended recipient.
Computer Crimes
Any illegal activities are committed through the use of a computer and the Internet is
called cybercrime or computer crime.
• Hacking: The activity of breaking into a computer system to gain an
unauthorized access is known as hacking.
• Phishing: Phishing is the act of attempting to acquire sensitive information like
usernames, passwords and credit card details by disguising as a trustworthy
source.
• Computer Viruses: Computer viruses are computer programs that can replicate
themselves and harm the computer systems on a network without the
knowledge of the system users.
• Cyber stalkers: Often target the users by means of chat rooms, online forums
and social networking websites to gather user information and harass the users
on the basis of the information gathered.
• Identity Theft: This is one of the most serious frauds as it involves stealing
money and obtaining other benefits through the use of a false identity. It is the
act of pretending to be someone else by using someone else's identity as one's
own.