Unit 1, 2 Part B
Unit 1, 2 Part B
Delhi
Study Material
For
INFORMATION
TECHNOLOGY
(SUB. CODE - 802)
Part-B – SUBJECT
SPECIFIC SKILLS
INFORMATION TECHNOLOGY (SUB. CODE - 802)
Part-B – SUBJECT SPECIFIC SKILLS
UNIT 4: RDBMS
Chapter 1: Understand Relational Database Management System
Chapter 2: Introduction to MYSQL
Chapter 3: DML
Chapter 4: Commands
1.2Characteristics of computer
Speed – The computer’s remarkable speed with which they can process
data and commands is one of their most impressive features. The typical
high-speed computer has a 3–4 mips (million instructions per second)
processing speed
Accuracy – The machine not only completes a variety of tasks quickly but
also precisely and accurately. Be aware that any faults in a computer’s
output result from incorrect data entry or improperly supplied computation
instructions rather than from the machine itself. This behaviour is often
referred to as GIGO in computer terminology (Garbage In Garbage Out).
Diligence – A computer is free from tiredness. It can operate for several
hours without making any mistakes. A computer will complete every
calculation with the same accuracy even if millions of calculations need to
be made.
Storage – A computer can hold a vast amount of data and information for
later retrieval. A computer’s memory is unlimited and does not degrade
over time like a human’s does.
1.3Components of computer
1) Input Devices
A piece of equipment/hardware that helps us enter data into a
computer is called an input device. Sometimes they are also used
to control computers. Some Input Devices are:
a. Keyboard
b. Mouse
c. MICR (Magnetic Ink Character Reader)
d. OCR (Optical Character Reader)
e. OMR (Optical Mark Reorganization)
f. Joystick
2) Output Devices
A piece of equipment/hardware that gives out the result of the
entered input, once it is processed (i.e. converts data from machine
language to a human-understandable language), is called an output
device. Some Output Devices are:
a. Monitors/VDU (Visual Display Unit)
b. Printer
c. Plotter (large printer used for printing large posters, and
advertisements)
d. Speakers
Parts of CPU
a. CU (Control Unit)
Coordination between a computer’s various units is the
responsibility of the control unit. It controls the transfer of data,
input/output functions and coordinates all internal working of
the hardware. It functions as an manager.
b. Arithmetic Logic Unit (ALU)
The actual processing of data is done by the arithmetic logic
unit (ALU). It is the part of the computer processor (CPU) can
be used to perform arithmetic and logic operations. An
arithmetic-logic unit (ALU) is further divided into two parts,
(AU) arithmetic unit and a (LU) logic unit.
4) Storage
a. Primary Memory
Primary storage/memory, also known as main memory, is the
part of the computer that stores current data, programs, and
instructions. The CPU has direct access to information kept in
primary memory. When compared to secondary storage, this
storage is both more expensive and comparatively quick.
-
b. Secondary Storage
Secondary memory is a type of computer memory that is used
to store data and programs that can be accessed even after
the computer is turned off. Secondary memory is non-volatile
and can store data and programs for long time. Hard Disks,
CDs, DVDs, Pen/Flash drives, SSD, Memory Card etc, are
examples of secondary storage.
5. Cache Memory
Self-Assessment Exercises:
1) Motherboard:
This is the main circuit board that holds together various
components like CPU, memory, connectors for the hard drive and
optical drives, expansion cards to control the video and audio, and
connections in the form of various ports (such as USB ports). It
provides a connection to every component of the computer.
2) Input–Output Devices
Input devices: devices that take input from the user. The input may
be in the form of text, image, sound, video etc. A wide range of input
devices have been devised for supporting varying types of input.
Following are examples of some of the input devices of the
computer:
4) Power Supply Unit: This component of the computer is the one that
converts the alternate current power supply being received by
homes or offices to the low voltage direct current required by the
machine.
Self-Assessment Exercises
5) File Management: The operating system takes care of all the files
and folders maintained on the computer disk. The basic tasks that a
user needs to perform on files are the creation, renaming, deletion,
copying, or moving of a file or folder.
File System - Details of files in a computer are stored and
traced using a file system called FAT. FAT is used by the operating
system to keep track of files on the hard disk. Various FAT systems
are named based on the number of bits used to store the data of
FAT. For example, FAT 16 uses 16 bits to store data, and FAT 32
uses 32 bits. Another system is NTFS (New Technology File
System).
3.2 Types of Operating Systems
When you switch on the system, the power supply detects the CPU
and the peripherals (the other connected devices). The system boots,
and if all peripheral devices have been successfully detected, most
systems will produce a beep.
Keyboard Troubleshooting
Sound Troubleshooting
When you are not getting sound from the speakers, troubleshoot
using the suggestions given below:
1) Check Speaker Volume
2) Check the volume level of the speakers
3) Check Audio Player Controls
Many audios and video players have their own separate audio
controls. Ensure that the sound is turned on and that the volume is
set large enough to be heard.
4) Check the Cables
In case external speakers are used, ensure that the speakers are
plugged into the electric socket, turned on, and connected to the
correct audio port or a USB port on your system. If your computer
has color-coded ports, the audio output port will usually be green.
5) Check the Sound Using Headphones
Connect headphones to the audio output port of your computer, and
check whether you can hear sound from the headphones. If you can,
that means there is something wrong with your speakers. Contact a
Service Engineer.
Exercises
1) List some common troubleshooting steps that you should keep in
mind.
2) What steps would you take if the monitor is not showing any display,
or the screen is blank?
3) What would you do when your keyboard or mouse is not responding/
working properly?
4) What troubleshooting step will you take when the printer is not
responding?
5) What could be the reasons for the print jobs being sent to the wrong
printer?
6) What checks would you undertake when the speaker is not working?
7) What are the troubleshooting steps taken when an application
freezes?
8) What could be the possible cause for all the applications to be
running slow?
9) How can we check the network connectivity of your system?
10) Explain how you would check the validity of the IP address.
Chapter 5: Understand the Importance of Utilities
Utilities are the special programs that help computer systems to work
more smoothly, efficiently, and effectively. Utility software programs help
in :
Method 1: Open the Start menu. In the search box type “Disk Cleanup”
and open it.
Method 2: Open Run Box. In the Run box, type cleanmgr and
press Enter.
To empty the Recycle Bin, right-click the Recycle Bin icon and select
Empty Recycle Bin from the drop-down menu.
5.4 Disk defragmentation
Method 1: Go to the search bar on the Start menu and type defrag. On
the Defragment and Optimize Drives option, select the drive that needs
to be defragmented and click on Optimize.
Exercises
1.1Introduction
ARPANET – 1969
NSFNET – 1980
INTERNET - 1990
a) File sharing - you can easily share data and files between different
users, or access it from anywhere.
a) Sender
A sender is a computer or any such device which is capable of
sending data over a network. It can be a computer, mobile phone,
smartwatch, walkie-talkie, video recording device, etc.
b) Receiver
A receiver is a computer or any such device which is capable of
receiving data from the network. It can be any computer, printer,
laptop, mobile phone, television, etc.
c) Message
It is the data or information that needs to be exchanged between the
sender and the receiver. Messages can be in the form of text,
numbers, images, audio, video, multimedia, etc.
d) Communication media/Channel
It is the path through which the message travels between source
and destination. It is also called medium or link which is either wired
or wireless. For example, a television cable, telephone cable,
ethernet cable, satellite link, microwaves, etc.
1) RJ45 connector
RJ 45 or Registered Jack-45 is an eight-
pin connector that is used with Ethernet
cables for networking. It is a standard
networking interface that is used with
Twisted Pair Cable. Basically, it is a
small plastic plug that fits into RJ-45
jacks of the Ethernet cards.
2) Modem
3) Repeater
5) Switch
7) Gateway
Gateway serves as the entry and exit point of a network. All data
coming in or going out of a network must first pass through the
gateway. At home, the Gateway is the ISP that connects the user
to the Internet. Generally, a router is configured to work as a
gateway device in computer networks. A gateway can be
implemented completely in software, hardware, or a combination of
both.
8) Routers
2) Star Topology
All of the devices in a star topology are connected to the hub, which
serves as the central controller. Any two devices can communicate
with each other through the hub that relays messages. Installation
and configuration of the star network are simple.
3) Ring Topology
4) Mesh Topology
1) MAC Address
MAC address is the physical address, which uniquely identifies each
device on a given network. To make communication between two
networked devices, we need two addresses: IP address and MAC
address. It is assigned to the NIC (Network Interface card) of each
device that can be connected to the internet.
3) Domain Name
3) ISP
The term “internet service provider (ISP)” refers to a company that
provides access to the internet to both personal and business
customers. ISPs make it possible for their customers to access the
web, shop online, conduct business, and connect with family and
friends—all for a fee.
2.4 Data Transfer Rate (bps, Kbps, KBps, Mbps, MBPS, Gbps,
GBPS)
The data transfer rate is the amount of data that is transferred from
one device to another over a channel within a certain time frame. For
this reason, it is often also referred to as data rate, transmission
speed or connection speed.
Protocol defines:
1. TCP/IP
2. FTP
FTP is used for transferring files from one machine to another. FTP
creates a connection between the two nodes for accessing the file.
FTP also allows the user to use user ID and password. Some
servers provide FTP service without authentication for accessing
files.
In FTP, user specifies the file name and location of the desired file.
After that, another connection sets up and the file transfer happens
directly between the two machines.
3. HTTP
It stands for HyperText Transfer Protocol. HTTP is for transferring
Hypertext (i.e, text, graphic, image, sound, video etc) on web. The
use of HTTP is between a web browser (client) and a web server.
HTTP defines how information are formatted and transmitted from
web server to client.
Once a user opens a web browser and types in the URL of the any
web page, a link between the client and the web server is created.
4. SMTP
5. POP3
It is a standard mail protocol for receiving emails from server to
email client. It also allows the user to download their received email
on their computer so that they can read them offline. POP3 protocol
is suitable if you accessing your emails using a single application or
from a single location. By default, POP3 deletes emails on the
server after downloading them to your local email client.
6. PPP
7. UDP
With the increase in use of the network for accessing data and resource
sharing, security is becoming a prime concern. The Internet represents
an insecure channel for exchanging information, which leads to a high
risk of intrusion or fraud, such as phishing,[viruses, trojans, worms and
more.
1) Digital Footprints
2) Malware
b. Worm
worm is often received via network, and it automatically keeps
on creating several copies of itself on the hard disk thereby
flooding the hard disk. When a worm is received as an email
attachment, it is automatically forwarded to the recipients
leading to network congestion. Thus, a worm may crash the
system and entire network. No host application is required for
worms to replicate themselves e.g. Code Red Worm which
makes more than 2,50,000 copies of itself in approximately 9
hours.
c. Trojan Horse
Trojan Horse is a code that appears to be desirable and useful
but ends up harming the system.
Trojan horse can attach itself with a safe application. For
example, it may be attached to any game downloaded over
the Internet. Such an application when executed creates a
backdoor in the system through which a hacker can access
the system. The hacker can monitor all the activity performed
on the system. He can also control the infected system by
harming the data on the system. For example, in the late
1990s, Trojan Horse named Sub7 was created which took
advantage of security flaws of earlier version browsers such
as Internet Explorer and Chrome to illegally access the host
computer.
3) Spam
Spam is any kind of unwanted, unsolicited digital communication
that gets sent out in bulk. Often spam is sent via email, but it can
also be distributed via text messages, phone calls, or social media.
4) DoS Attacks
A denial-of-service attack (DoS attack) is a cyber-attack in which the
machine or network resource becomes unavailable to its users by
temporarily or indefinitely disrupting services. Denial of service is
typically accomplished by flooding the targeted machine or resource
with superfluous requests to overload systems and prevent requests
from being fulfilled. A DoS attack is like a group of people crowding
the entry door of a shop, making it hard for legitimate customers to
enter.
5) Eavesdropping
Eavesdropping is the act of secretly or stealthily listening to the
private conversations or communications of others without their
consent. Eavesdropping is done through telephone lines, cellular
networks, email, and instant messaging.
6) Adware
Adware is a type of malware or unwanted software designed to
deliver targeted advertisements on infected computers. Adware can
serve ad pages and collect information about users to target them
better with customized ads.
7) Spyware
Spyware is software with malicious behaviour that aims to gather
information about a person or organization and send it to another
entity in a way that harms the user by violating their privacy,
endangering their device's security, or other means. This behaviour
may be present in malware and in legitimate software.
8) Snooping
Snooping is a broad term that can include casual observance of an
email that appears on another person's computer screen or
watching what someone else is typing. More sophisticated snooping
uses software to remotely monitor activity on a computer or as
communications data traverses a network.
1) Antivirus
2) Firewall
1) Phishing
It is an unlawful activity, where fake websites or emails that look
original or authentic are presented to the user. It is performed to
fraudulently collect sensitive and personal details, particularly
usernames, passwords, banking and credit card details. Most
common phishing method is email spoofing where a fake emails is
used and the user presumes it to be from authentic source.
2) Pharming
Pharming is a type of social engineering cyberattack in which
criminals redirect internet users trying to reach a specific website to
a different, fake site. These “spoofed” sites aim to capture a victim’s
personally identifiable information (PII) and log-in credentials, such
as passwords, social security numbers, account numbers, and so
on, or else they attempt to install pharming malware on their
computer.
3) Spoofing
4) Cyber Bullying
5) Hacking
6) Cracking
7) Identity Theft
8) Cyber Stalking
9) Cyber Trolling
1) Netiquette
2) IT Act
Information Technology Act or IT Act in India was notified on 17
October 2000. It is primary law in India dealing with Cybercrime and
electronic commerce. A major amendment was made in 2008.
Exercises
1. Give the full form of the following terms:
(a) ARPANET
(b) LAN
(c) MAN
(d) WAN
(e) WWW
(f) TELNET