Presentation is loading. Please wait.

Presentation is loading. Please wait.

Press SPACE BAR to continue...

Similar presentations


Presentation on theme: "Press SPACE BAR to continue..."— Presentation transcript:

1 Press SPACE BAR to continue...
ABOUT COMPUTER Press SPACE BAR to continue...

2 Press SPACE BAR to continue...
COMPUTER It is an Electronic Device which Accepts data supplied by the user. Inputs, Stores and Executes Instructions. Performs Mathematical and Logical Operations. Outputs Results according to the user Requirements. Press SPACE BAR to continue...

3 Press SPACE BAR to continue...
DATA Is a collection of Facts, Figures, Statistics which can be processed to produce meaningful INFORMATION. For example : A list of items Letters and documents Presentations etc. Press SPACE BAR to continue...

4 Press SPACE BAR to continue...
PROCESS Includes CALCULATION Addition, Substraction, Multiplication, Division. COMPARISON Equal to, Greater than, Lesser than, Positive, Zero, Negative. DECISION MAKING Branching to a different path depending on a condition. LOGIC The sequence or flow of step to be followed to get the desired result. Press SPACE BAR to continue...

5 Press SPACE BAR to continue...
HISTORY OF COMPUTER Press SPACE BAR to continue...

6 Press SPACE BAR to continue...
HISTORY In 1647, MECHANICAL CALCULATOR was invented and another in The PUNCHED CARD was invented in 1801. The CENSUS MACHINE was invented in 1887. Between 1820 and 1870, the ANALYTICAL ENGINE was developed. After this began the era of the ‘GENERATION OF COMPUTERS.’ Press SPACE BAR to continue...

7 MECHANICAL CALCULATOR
Invented by a French boy, BLAISE PASCAL In 1647. Also known as ADDING MACHINES. Machine worked using TOOTHED WHEELS and could ADD and SUBSTRACT only. Press SPACE BAR to continue...

8 Press SPACE BAR to continue...
PUNCHED CARDS Invented by a French weaver, JOSEPH MARIE JACQUARD in 1801 to control his Mechanical Looms. A woven pattern on cloth is often produced by lowering needles of various hues as each row of cloth is woven. With hundreds of threads involved, the process could get extremely complicated. These Punched Cards controlled the movement of the threads by the PRESENCE and ABSENCE of Holes. Press SPACE BAR to continue...

9 Press SPACE BAR to continue...
ANALYTICAL ENGINE Created by CHARLES BABBAGE in 1820. Machine had 50,000 moving parts worked by mechanical gears. Meant for both Arithmetic Calculations and to Store Data. He also created DIFFERENTIAL ENGINE in 1822. Press SPACE BAR to continue...

10 Press SPACE BAR to continue...
FIRST PROGRAMMER A brilliant Mathematician, Lady AUGUSTA ADA LOVELACE assisted CHARLES BABBAGE in his creation. She improved upon his ideas and invented new approaches to program design. The Programming Language ADA is named in her honour. She used a special number system called the BINARY NUMBER system. Due to the above description, she is rightly known as the FIRST COMPUTER PROGRAMMER. Press SPACE BAR to continue...

11 AUTOMATIC CALCULATOR (ASCC)
Known as Automatic Sequence Controlled Calculator. Built by a Harvard Professor, HOWARD AITKEN in 1937 with the help of his Students and Engineers. It was known as MARK I. Was 50 feet long, had 500 miles of wires and 1000s of relays. Used till 1959. Press SPACE BAR to continue...

12 Press SPACE BAR to continue...
THE FIRST GENERATION From Used VACUUM TUBES to Store DATA and Programming Instructions. Data represented in 1(ON) and 0(OFF). Vacuum tubes consumed large amount of electricity and produced large amounts of heat. This led to the Second Generation of Computers. Press SPACE BAR to continue...

13 Press SPACE BAR to continue...
ENIAC In 1946, ECKERT & MAUCHLY built the first ELECTRO-MECHANICAL computer called ENIAC (Electronic Numerical Integrator And Calculator). It required the physical setting of thousands of switches and had less storage space. It got heated up very fast and thus had to be shut down very often to cool it. This computer was 100 feet long, weighed 80 Tonnes, had 70,000 Resistors, over 18,000 Vacuum Tubes and consumed electricity of 1,50,000 Watts. Each time a program was changed, the writing had to be completely redone. In October 1955, ENIAC was completely turned off. It was developed on Experimental Basis. Press SPACE BAR to continue...

14 Press SPACE BAR to continue...
EDSAC Electronic Delay Storage Automatic Calculator Invented in 1949. First to operate on the stored Program Concept. Started operating in1951. It was developed on Experimental Basis. Press SPACE BAR to continue...

15 Press SPACE BAR to continue...
EDVAC Electronic Discrete Variable Automation Computer. Used Punched Cards for DATA ENTRY and was able to Store Programs. Press SPACE BAR to continue...

16 Press SPACE BAR to continue...
UNIVAC UNIVersal Automatic Computer. Used about 10,000 Vacuum Tubes. Performed SELF-CHECKING. It could work even for 24 hours a day and used MAGNETIC TAPES as INPUT MEDIA. Press SPACE BAR to continue...

17 Press SPACE BAR to continue...
LEO Lyons Electronic Office. Became operational in 1951. First computer used for Commercial Purpose. Started running full DATA PROCESSING services in 1954. Press SPACE BAR to continue...

18 Press SPACE BAR to continue...
THE SECOND GENERATION From Used Solid State TRANSISTORS (SEMICONDUCTORS) instead of VACUUM TUBES. System speed increased than the First Generation Systems. Example = ICT 1301 and IBM 1401. Press SPACE BAR to continue...

19 Press SPACE BAR to continue...
THE THIRD GENERATION From Used INTEGRATED CIRCUITS on CHIPS (Thin Wafers of SILICON) of TRANSISTORS (may be 100 transistors per chip). Could handle more than one operation simultaneously. Example = ICL 1900, IBM 360 & SYSTEM 4. Press SPACE BAR to continue...

20 Press SPACE BAR to continue...
THE FOURTH GENERATION From More circuits on a single chip were used. This increased the amount of data that could be processed and stored in the memory chip. Large Scale Integration (LSI) technology and Very Large Scale Integration (VLSI) technology were used. Press SPACE BAR to continue...

21 Press SPACE BAR to continue...
THE FIFTH GENERATION From 1986 and continuing. The entire processor of the computer can be put on a single chip. Press SPACE BAR to continue...

22 Press SPACE BAR to continue...
TYPES OF COMPUTERS Press SPACE BAR to continue...

23 Press SPACE BAR to continue...
A LAPTOP Is a small, slim attache case weighing around 2 to 4 kilograms. Offers same power as a desktop machine. Uses reduced keyboard and mouse. Disadvantage is bulky, difficult to operate a mouse without desk. E.g. Toshiba 5200C and Compaq’s SLT/286. Press SPACE BAR to continue...

24 Press SPACE BAR to continue...
A NOTEBOOK Size is approximately 21 * 29.7 centimetres and weighs around 3 to 4 kilograms. Same power as desktop machine. E.g. Compaq’s Contura 3/20, Acer’s AnyWhere and from Zenith Computers Limited. Press SPACE BAR to continue...

25 Press SPACE BAR to continue...
A PALMTOP Smallest in size (that of a pocket calculator). Applications limited and built-in. E.g. HP’s HP95LX comes configured with Lotus 123 spreadsheet. Press SPACE BAR to continue...

26 PC’s or Personal Computer
Is bulky, needs more space and not movable. Large applications can be stored in it. Press SPACE BAR to continue...

27 Press SPACE BAR to continue...
SUPER COMPUTERS Designed for Complex Scientific Application Processing Needs. Is a MULTIUSER and EXPENSIVE. Storage Capacity is between 64 MB to 4 GB. Word Length is from 64 to 128 BITS. Eg. CRAY, CRAY-2, NEX SX-2, ROBOT, PARAM Press SPACE BAR to continue...

28 Press SPACE BAR to continue...
A MAINFRAME COMPUTER Also MULTIUSER Used in CENTRALISED Centres. Provides large storage capacity and faster CPU Speed. Several MATH and LOGIC Processors are used. Example - Dec 1090, Cyber 170, IBM 4300 Series, IBM360/370, UNIVAC 1100/60. Press SPACE BAR to continue...

29 Press SPACE BAR to continue...
A MINI COMPUTER Multi-user System. Allows 50 users at a time. Storage capacity is from 2 to 16 MB. Offers advantage of MAINFRAME at a lower cost. First was PDP-8 launched in 1965. Example - PPDP-8, PDP-II, VAX-7500, HCL-DAYSIS Press SPACE BAR to continue...

30 Press SPACE BAR to continue...
A MICRO COMPUTER Called PC as it is a SINGLE USER system. Popular due to low rate. Single chip contains PROCESSOR, REGISTERS and CONTROL UNIT. Speed is only 100 Kilo Instructions Per Second (KIPS). Maximum word length is 8, 16, 32 Bits. Example - UPTRON-S-800, INTEL Series 8080 (PC), (PC-XT), /80486 (PC-AT), PENTIUM (I/II/III- Upto 850 MHz), PENTIUM MMX. Press SPACE BAR to continue...

31 Press SPACE BAR to continue...
COMPONENTS Press SPACE BAR to continue...

32 Press SPACE BAR to continue...
HARDWARE AND SOFTWARE HARDWARE includes the computer equipment that is MECHANICAL ELECTRICAL ELECTRONIC PARTS of the system. SOFTWARE is the program that instructs a computer how to process the Data and generate the required Information. Press SPACE BAR to continue...

33 Press SPACE BAR to continue...
TYPES AND USES ANALOG Computers : used for measuring PHYSICAL QUANTITIES such as Temperature, Pressure etc. DIGITAL Computers : Calculates Figures and Manages Text. HYBRID Computers : is the combination of ANALOG and DIGITAL computers. Press SPACE BAR to continue...

34 Press SPACE BAR to continue...
ADVANTAGES Fast Processing Speed. Reduces Use of Paper. Lifetime Storage of Data. Efficiency does not Decrease with Age. Very Accurate. Performs Complicated Tasks in a very Short Time. Press SPACE BAR to continue...

35 Press SPACE BAR to continue...
DISADVANTAGES Cannot Think. Cannot try Various Alternatives. Cannot Draw a Conclusion. Does not Learn from Experience. Press SPACE BAR to continue...

36 Press SPACE BAR to continue...
STORAGE OF DATA All digital computers store Numbers, Letters, and other Characters in CODED FORM. The code used to represent characters is the BINARY CODE. Every character is represented by a string of ‘0s’ and ‘1s’ - the only digits found in the BINARY numbering system. Binary code is made of binary digits called BITS. Most computers have words that consist of 8 or 16 BITS. In larger computers the number of BITS could be 16, 32, 36 or 40. Press SPACE BAR to continue...

37 Press SPACE BAR to continue...
DATA STORAGE (MISC.) ‘0’ or ‘1’ is called a BIT. 4 bits make a NIBBLE. Sequence of 8 bits is called a BYTE. 8 bytes make a OCTET. 1024 bytes make a KILOBYTE (KB). 1024 KB make a MEGABYTE (MB). 1024 MB make a GIGABYTE (GB). 1024 GB make a TERABYTE (TB). Press SPACE BAR to continue...

38 Press SPACE BAR to continue...
BINARY SYSTEM Has a base of 2. Symbols used are 0 and 1. As we move to the left, the value of the digit will be two times greater than its predecessor. Can be converted to octal, decimal and hexadecimal number systems. Press SPACE BAR to continue...

39 Press SPACE BAR to continue...
ASCII SYSTEM American Standard Code for Information Interchange. Uses 7 bits per character. Provides 128 different arrangements including upper case, special symbols like *, %, +, hyphen(-), 10 decimal digits (0 - 9) and non- printable control characters like carriage return key. Used to represent data internally in PCs. Besides codes for characters, codes are also defined for End Of File, End Of Page etc. These codes are called non-printable control characters. Press SPACE BAR to continue...

40 Press SPACE BAR to continue...
PERIPHERALS Devices used with the computer system other than the computer itself. Press SPACE BAR to continue...

41 Press SPACE BAR to continue...
A MOTHERBOARD Is the BRAIN of the system and controls all the functions of the computer. Every hardware is connected to it for working. It has the Central Processing Unit (CPU) fixed on it, which controls the working. Serial and Parallel ports for Mouse and Printer connection; Hard Disk, Floppy Drive, CD-ROM Drive; Power, Reset, LED Switches; Keyboard, Joystick etc. Press SPACE BAR to continue...

42 THE CENTRAL PROCESSING UNIT
Is the HEART of the system. Controls the working of the computer. Press SPACE BAR to continue...

43 CPU PROCESSOR TYPE & SPEED IN MHz
486 = DX2-66, DX4-100, DX4-S100, SX-33, SX2-40 MHz 586 = 66, 100 MHz PENTIUM = 100, 120, 133, 166, 200, MHz Press SPACE BAR to continue...

44 Press SPACE BAR to continue...
TYPE AND SPEED (CONT.) CYRIX = 233, 300 MHz CELERON = 233, 266, 300, 333, 350, 400, 433, 466 MHz P-II = 233, 266, 300, 333, 350 MHz P-III = 450, 500, 533, 550, 667, 700, 733, 766, 800, 850, 933 MHz P-IV = 2GHz, 2.4GHz and more.. Press SPACE BAR to continue...

45 Press SPACE BAR to continue...
INPUT DEVICES Keyboard Mouse Scanner Barcode Reader MICR (Magnetic Ink Character Reader) Microphone Press SPACE BAR to continue...

46 Press SPACE BAR to continue...
KEYBOARD 101 Keys (PC-AT /ENHANCED) 104 Keys (WINDOWS) More than 104 Keys (INTERNET and MULTIMEDIA) Resembles a TYPEWRITER Has three categories ALPHANUMERIC KEYS Contains ALPHABETS(A - Z, a - z) and FIGURES(0 - 9), OTHERS(space, dot, comma, #, $, %, ^, &, *, (, ), -, +, /, <, >, [, ], ‘, “, ~, `, {, }, |, \ ) Press SPACE BAR to continue...

47 Press SPACE BAR to continue...
KEYBOARD (CONT.) Special keys : Perform Specific Tasks BACKSPACE, DELETE (DEL), INSERT (INS), SHIFT, CAPS LOCK, SCROLL LOCK, NUM LOCK, CONTROL (CRTL), ALTER (ALT), ESCAPE (ESC), RETURN (ENTER). FUNCTION KEYS : for SHORTHAND F1 TO F12 (F1 FUNCTION KEY IS USED AS A HELP KEY IN MOST OF THE SOFTWARES). Press SPACE BAR to continue...

48 Press SPACE BAR to continue...
MOUSE Invented by a Scientist DUGLES C. ENGELWART in 1977 at STANFORD Research Laboratory. Previously known as POINTING DEVICE. 2 types are Mechanical and Optical. One, Two and Three Buttons. Movement is measured in HUNDREDTHS of an INCH. Function of each button is determined by the program that uses the mouse. A three-button mouse is quite suitable for Multimedia and Internet. Press SPACE BAR to continue...

49 Press SPACE BAR to continue...
MOUSE (CONT.) MECHANICAL the ball that projects through the bottom surface rotates as the mouse is moved along a flat surface. the direction of rotation is detected and relayed to the computer by the switches inside the mouse. E.g. Microsoft, IBM and Logitech OPTICAL uses a light beam instead of a rotating ball to detect movement across a specially patterned mouse pad. E.g. MSC Corp. mouse Press SPACE BAR to continue...

50 Press SPACE BAR to continue...
SCANNER Used to reproduce photographs on the computer screen FLATBED Can scan and store images from books without removing the page. ROLLER-FEED Image is passed over a roller where it is captured. Press SPACE BAR to continue...

51 Press SPACE BAR to continue...
TOUCH SCREENS Information accessed with minimum effort. Screen is made sensitive to touch and exact position is detected. Screen is lived with LED and Photo-detectors. When user’s finger approaches the screen, light beam is broken and is detected by photo- detectors. Press SPACE BAR to continue...

52 Press SPACE BAR to continue...
OUTPUT DEVICES MONITORS PRINTERS PLOTTERS Press SPACE BAR to continue...

53 Press SPACE BAR to continue...
MONITORS Also known as visual display unit (VDU). Consists of cathode ray tube (crt) which produces a beam of electrons that makes a picture on screen. Used to display information. Represented by an array of dots called pixels. Minimum pixels in DOS = 80 columns and 25 rows. WINDOWS = 640 columns and 480 rows. Press SPACE BAR to continue...

54 Press SPACE BAR to continue...
PRINTERS IMPACT We can put carbon paper between the pages to print the data on other pages NON IMPACT It is not possible to create a carbon copy at the same time while printing the data. Press SPACE BAR to continue...

55 Press SPACE BAR to continue...
DOT MATRIX An arrangement of tiny hammers strikes to the ribbon to produce the desired character. Each hammer prints a small dot on the paper to form a character. Upto 180 characters per second can be printed. Press SPACE BAR to continue...

56 Press SPACE BAR to continue...
NON-IMPACT PRINTERS INKJET LASER BUBBLEJET THERMAL Press SPACE BAR to continue...

57 Press SPACE BAR to continue...
PLOTTERS Output device used to create presentation, visuals, charts, graphs, tables and diagrams. Consists of a pen mounted on an arm moved by motors along the paper up or down to make contact with the paper. Positioning is done by the computer in the form of horizontal (x- coordinate) and vertical (y-coordinate) position. Press SPACE BAR to continue...

58 Press SPACE BAR to continue...
PLOTTERS (CONT.) A combination of the two arm provides movement along the horizontal and vertical axis. Pen can be moved as small as 1000th of an inch. Plotters plot an entire drawing at a rate of several inches per second with a resolution of a few 1000ths of an inch. Press SPACE BAR to continue...

59 Press SPACE BAR to continue...
PLOTTERS (CONT.) Is more software dependent than any other computer peripheral and needs much more instructions than printer for producing output. To draw clear, high quality diagrams, plotter needs high quality pens with special inks with different colours. COLOUR plotters use four or more pens. Press SPACE BAR to continue...

60 Press SPACE BAR to continue...
STORAGE DEVICES The size of memory is limited and is thus insufficient for storing large volumes of data. By using backing storage it is possible to store large volumes of data on a removable storage medium. Secondary storage media do not lose their contents in the absence of power Press SPACE BAR to continue...

61 PRESENT STORAGE DEVICES
TAPES Cartridge, Magnetic, Streamer DISK Compact, Floppy, Hard, Optical, Magneto-Optical, Virtual, Winchester, DVDs ZIP DRIVE Press SPACE BAR to continue...

62 Press SPACE BAR to continue...
VIRTUAL DISK known as Random Access Memory disk. Temporary (volatile) storage device. Data lost when power is switched off. Used to speed up data access time. Offered by some versions of operating software. Press SPACE BAR to continue...

63 Press SPACE BAR to continue...
HARD DISK Based on the principle of magnetism. Data is stored in bits (0,1). Used as a permanent data storage device. Buffer memory same as cache memory is built within a solid state device. Interfacing cable is a 40-pin connector. Press SPACE BAR to continue...

64 Press SPACE BAR to continue...
FLOPPY DISK A long slit is provided for the read/write head to access the disk. A hub in the centre is used for mounting the disk drive. A hole is used to sense the index marking. Inserted into the drive mechanism which rotates the flexible disk inside. Read / Write head is in physical contact with the disk. Press SPACE BAR to continue...

65 Press SPACE BAR to continue...
FLOPPY DISK (CONT.) Has 4 sensors monitoring disk motor whether disk is present location of track 00 on disk whether disk is write protected Only 1.44 and 2.88 MB floppy drives have sensors mentioned above. Press SPACE BAR to continue...

66 Press SPACE BAR to continue...
FLOPPY DISK (CONT.) 3.5” in diameter High density have 80 tracks, with recording density of 96 tracks per inch, 18 sectors per track, 2 heads, 300 rotations per minute and data rate of 500 Kbps. Total capacity is MB (1,457,664 bytes). Floppy disk type is Rigid. Press SPACE BAR to continue...

67 Press SPACE BAR to continue...
COMPACT DISK Based on the use of light. Non erasable disk used for storing computer data. Formed from a resin, such as polycarbonate and coated with a highly reflective surface, usually aluminium. Information is imprinted as a series of microscopic pits on the reflective surface. Press SPACE BAR to continue...

68 Press SPACE BAR to continue...
COMPACT DISK (CONT.) Master disk is created using a finely focussed, high intensity laser. Master is used to make copies. A top coat of clear lacquer(coloured varnish) dissolved in alcohol protects the pitted surface from dust and scratches. Low powered laser in the drive unit is used to read information on the disk. Press SPACE BAR to continue...

69 Press SPACE BAR to continue...
COMPACT DISK (CONT.) The laser shines through the clear protective coating while a motor spins the disk past it. When it encounters a pit, the intensity of the reflected light of the laser changes. Change is detected by photo sensors and converted into a digital signal. Data can be addressed by track and sector. Press SPACE BAR to continue...

70 Press SPACE BAR to continue...
COMPACT DISK (CONT.) It can store upto 700 MB of data. Non erasable disk used for storing computer data. One small disk can store the contents of the 33 volumes of the Encyclopedia Brittanica and have room to spare. Types: Read only, Writable, Erasable. Press SPACE BAR to continue...

71 Press SPACE BAR to continue...
DVD Digital Video Disk High capacity Compact Disk. Store enough data for a full-length movie. Press SPACE BAR to continue...

72 Press SPACE BAR to continue...
LOCAL AREA NETWORK A group of internally connected computers is called computer network. When the computer network is established in the limited area, it is called Local Area Network. The computers are connected with the help of ETHERNET (LAN) CARD and data supply cables. The main computer of the network is called SERVER and the other connected computers are called CLIENTS. The SERVER stores the data which is supplied from the CLIENT computers. Press SPACE BAR to continue...

73 Press SPACE BAR to continue...
MODEM Used for accessing Internet, Sending and Receiving Messages etc. Voice modems are used to transfer speech files. Can be installed Internally as a card on the Motherboard. Also as a external device because they are easy to communicate where telephone lines are not proper. Press SPACE BAR to continue...

74 Press SPACE BAR to continue...
INPUT/OUTPUT DEVICES HARD DISK DRIVE (HDD) FLOPPY DISK DRIVE (FDD) COMPACT DISK DRIVE (CDR) MODEM Press SPACE BAR to continue...

75 Press SPACE BAR to continue...
MEMORY RAM (Random Access Memory) ROM (Read Only Memory) CACHE BUFFER Press SPACE BAR to continue...

76 RAM ( Random Access Memory)
NORMAL Extended Data Out = another type of DRAM used in memory modules. Faster and more expensive than standard RAM. Dynamic RAM (TRANSISTOR) = most common type used. Also the slowest and cheapest type of memory still used. Static RAM = VOLATILE(LASTS TILL POWER IS ON) Press SPACE BAR to continue...

77 Press SPACE BAR to continue...
RAM (CONT.) Video RAM = another type of DRAM used on video cards. Increases movie clarity and is faster than standard DRAM. Synchronous DRAM = faster and more expensive type used in processor cache memory. Synchronous Graphics RAM = type of SDRAM used primarily in video graphics cards. Press SPACE BAR to continue...

78 Press SPACE BAR to continue...
RAM (CONT.) Error Correcting Code = very reliable and more expensive type of EDO RAM. Used primarily on network file servers and high-end workstations. Multibank Dynamic RAM = is speedier and more efficient processing. Called Multibank because they have double the number of storage banks. Fast Page Mode DRAM = is slightly faster than standard DRAM. Press SPACE BAR to continue...

79 Press SPACE BAR to continue...
ROM (Read Only Memory) Programmable ROM = Once the chip has been programmed , the recorded information can’t be changed. Erasable PROM = can be programmed or reprogrammed usually by exposing a normally covered sector to ultra-violet light. When in use, information can be “read” and the information remains on the chip until it is erased. Electrically EPROM = is a special type of chip used to store BIOS programs. Under normal circumstances, the program stored is permanent. This is what happens to Flash BIOS. Press SPACE BAR to continue...

80 Press SPACE BAR to continue...
VIRUS Press SPACE BAR to continue...

81 Press SPACE BAR to continue...
VIRUS Are a sad fact of life. Only way is to catch is to copy and run an uninfected program. Internet and downloads are responsible for 75% of all viruses. Simple remedy is to take data backups regularly. Another remedy is using Anti-Virus software. Press SPACE BAR to continue...

82 Press SPACE BAR to continue...
VIRUS (CONT.) Could be hidden in small files called “cookies”. binary program file attached to (word document containing macro). internet through Java Applets and Activex modules. Press SPACE BAR to continue...

83 Press SPACE BAR to continue...
ANTI-VIRUS SOFTWARE Scanners scan the hard disk and floppy disk and detect viruses. this program checks for a known number of viruses. checks all the files on the disk that has been specified and reports if it finds any. then user can either delete the infected file or let the anti-virus software do it. Press SPACE BAR to continue...

84 Press SPACE BAR to continue...
ANTI-VIRUS (CONT.) Antidote destroys viruses which they are programmed to detect. some virus scanners reside in computer’s memory and check the entry of virus after every input / output operation. on detection, a warning is displayed and all further operations are suspended. Press SPACE BAR to continue...

85 TERMS USED FOR INTERNET
Press SPACE BAR to continue...

86 Press SPACE BAR to continue...
Browsers Simply put, a browser is a software application that lets you view pages on the Internet. Type the URL in the address bar of the browser, and it pops up the page for you. The browser gets the address translated into an IP address (the address of the server hosting the Web site), using the DNS. Thereafter, it forms a connection with that server and procures the necessary information, which is usually in the form of hypertext. Next, it reads the information, formats the page accordingly to display it on the screen. Some of the popular Internet browsers include Internet Explorer, Netscape Navigator, Opera, etc. Press SPACE BAR to continue...

87 Press SPACE BAR to continue...
Domain Name Every computer on the Internet has its own unique IP address, which is in the form of numbers, e.g., The system of domain names saves the trouble of remembering IP address of Web sites that need to be accessed. Domain names are recognisable words such as that represent a Web site or computer on the Internet. First, the Internet browser translates the domain name typed in the address bar into the correct IP address. This is known as domain name resolution, and the system that makes this work is called the Domain Name System (DNS). There are 13 root servers distributed globally which perform this task. The object of the DNS is that anyone connected to the Internet can reach a particular site, or send e mail simply with the correct domain name. For this to work, every domain name must be unique. Having two Web sites with the same domain name would make the system unpredictable and unreliable. This uniqueness makes it a reliable system with universal resolvability. Ensuring this universal resolvability is a non profit independent organisation known as Internet Corporation for Assigned Names and Numbers (ICANN). ICANN manages distribution of unique IP addresses and maintains the root servers that store information about all the top level domains (.com, .net, org, etc., and country specific names such as .co.in). Press SPACE BAR to continue...

88 File Transfer Protocol
FTP is a protocol developed for transferring files over the Internet Based on TCP/IP, it is one of the most reliable and fastest file transferring methods, and is compatible with all types of systems be it PC, Mac, or UNIX. Some of the most common FTP commands such as GET, PWD and PUT are supported by almost all operating systems. Though a user can use these commands at the command line, they are mainly intended for use in programs. Most of the servers that facilitate file downloads are based on the FTP protocol. HTTP an improvement over FTP supports a display of HTML pages with images and graphics along with support for file download. Press SPACE BAR to continue...

89 Press SPACE BAR to continue...
Home Page On the Internet, Home Page could mean one of two things: Every Web site has its own home page the first page a user views when he or she visits the site. For example, when you type into a browser, you are greeted with the site's home page. They can have access to all of the site's content from there. A home page could also be a user's personal start page that opens when he or she launch their browser or press the browser's home button. This could be any Web page on the Internet, or a customized file on the local hard disk. This could also be set to a blank page. Web portals such as MyWay.com allow you to customize your start pages by delivering the content you want directly to your personal start page. Press SPACE BAR to continue...

90 Hyper Text Transfer Protocol
Hyper Text Transfer Protocol (HTTP) was developed to transfer text, images and files embedded in HTML tags over the Internet. Hypertext mainly includes links that lead from one page to another page, and Web browsers such as Internet Explorer, Netscape Navigator, etc., helps a user to browse through these links. A user can also direct a browser to a Web page by typing in a Universal Resource Locator (URL) in the address bar. A software known as HTTP server runs on the machine that hosts the Web pages. Upon receiving a request from another machine, it sends the information across. A browser at the receiving end converts the data received from the server into HTML pages, and displays it to the user. Press SPACE BAR to continue...

91 Press SPACE BAR to continue...
Web hosting Web sites are saved on Web servers, from where users surfing the Internet can access them. Here's how it works. A user types a URL into his or her Web browser. The browser finds the physical location of the URL the server's IP address, gets the page from that server and renders it for the user. Most Web sites cannot afford their own server with the requisite high speed Internet connection. Hence, companies offer a service called hosting wherein they set up servers and let out a fixed amount of space for a Web site to use. Many Web sites maybe hosted on the same server. Hosting charges are based on the amount of server space taken up and the amount of bandwidth used. The amount of traffic depends on the number of people who have read those pages off the server. Contracts are for specific time periods generally a year. One or more e mail boxes may also be bundled along. The actual URL of the Web site the domain name has to be registered with a registrar such as Network Solutions. This is an additional expense. Generally, the same company will offer you a bouquet of services such as domain registration, hosting, e mail and Web site creation. Press SPACE BAR to continue...

92 Press SPACE BAR to continue...
Web Site Put simply, a Web site is a collection of (Web) pages that are related in some way, and placed in a distinct structure. A Web site could be about a company and its services, or a personal page about the creator and his or her specific interest. It could also be a Web site offering services such as news or downloads. Web pages are built on a markup language called Hyper Text Markup Language (HTML). Users can access Web pages through a Web browser that reads the code off the Web server and draws (renders) the page for display to the user. Web sites always have a home page or a starting address that is advertised or published. Web sites are not to be confused with a Web server. A server is a physical computer that serves pages. A large and complex Web site such as Microsoft.com would have different parts of the Web site on different servers, in different locations. The user accessing the Web site does not know whether the server is at the other end of the town, or the other end of the world it's seamless. A site is said to be 'hosted' on a server and companies that provide space on their servers perform a service called hosting. Press SPACE BAR to continue...

93 Press SPACE BAR to continue...
Active Server Pages Active Server Pages (ASP), is a Microsoft technology that is used to create dynamic Web pages. It means the pages are not static as with HTML pages, but are created on the fly according to what is to be shown to a particular visitor. An example, where this is needed, is Web based e mail services such as Yahoo! The ASP technology is marketed by Microsoft along with its Internet Information Server (IIS). There have been four major versions of ASP ASP 1.0 (which was distributed with IIS 3.0), ASP 2.0 (which was distributed with IIS 4.0), ASP 3.0 (which was distributed with IIS 5.0) and ASP.NET, which is part of the Microsoft .NET platform. Before ASP.NET, it was possible to create pages by mixing ASP server side code with HTML and client side scripting code. The result was an HTML code that could be viewed by your browser. With ASP .NET, support for .NET languages such as C# is introduced. Now, Web pages can be created using the Visual Studio .NET classes, as well as by normal scripting like the old days. The close competitor to ASP is PHP, which is a free server side scripting technology. Press SPACE BAR to continue...

94 Press SPACE BAR to continue...
Broadband A broadband medium is the one that simultaneously carries several channels that are separated using frequency division multiplexing. This term is also used as a synonym for broadband Internet connection. A broadband Internet connection is one that has connection speeds above the normal dial up and ISDN connections, i.e., speeds above 128 kb/s. In some countries, the speed goes up to 1 Mb/s for home users and even higher for business users. These high speeds make it possible to have higher data transfer rates as well as higher performance while streaming data such as audio and video streams. It also makes it possible to use P2P file sharing software. Press SPACE BAR to continue...

95 Press SPACE BAR to continue...
Cookie A cookie is a small file that websites place on your computer's hard disk. It stores information about your previous visits to the site. Cookies are supposed to make your web experience better. For example, when you visit online forums and read some posts, a cookie will be placed tracking this. The next time you visit, the cookie will be read. New posts since the last time you visited can be marked as new, so you won't waste time on items that were there the last time you visited. Other applications of cookies are web sites that 'remember' what type of content you like and show you only that, like a news web site that shows you only your local news, weather, and your personal stocks. Even advertisers use cookies so that they don't keep showing you the same ads. Privacy groups fear that cookies could be used to invade our privacy. Some privacy software let you remove all your cookies. Or you could just find the files and erase them manually. Press SPACE BAR to continue...

96 Press SPACE BAR to continue...
E mail E mail or stands for electronic mail. More and more companies and individuals are making extensive use of e mail because it's cheap, fast, flexible, and reliable. Any electronic document as well plain text can be sent over the Internet through e mail. Most e mail systems have a text editor for users to enter text messages and attach other files to the message. The e mail address is composed of two parts that are separated with the sign. The second part is the name of the server that hosts the user's electronic mail box and the first part is the username on that server. For example, has 'something.com' as the name of the server and 'someone' as the username. Let's consider a mail sent from to First, the user 'abc' logs onto the server 'xyz.com', composes his message and sends it. The server 'xyz.com' will send this message to 'something.com'. The server 'something.com' stores this in 'someone's' mail box. The user 'someone' will be able to read the message when he or she logs on to the server 'something.com'. He can then read it, delete it, forward it or get it printed. There are two kinds of e mail accounts Web based mail accounts and POP mail accounts. Web based mail accounts, such as those provided by Yahoo!, need the user to log on to the server whenever he or she wants to read or send s. In the case of POP mail accounts, the mails are downloaded to the user's computer using such software as Outlook. While composing a message, specify the address of the receiver in the 'To' field. More than one address can be specified using a comma or semicolon. Any address mentioned in the Carbon Copy (CC) field, will be seen by all the recipients in the mail header. Addresses specified in the blind carbon copy (BCC) field are not shown in the mail header. Press SPACE BAR to continue...

97 Press SPACE BAR to continue...
Firewall A firewall is a system that prevents unauthorised access to or from a private network. It examines each message entering and leaving the network, and allows only those authorised messages to pass through. It can be implemented in hardware, software or both. Some of the firewall techniques used are as follows: Packet filtering: In this technique, each packet entering or leaving the network is examined and filtering is done on the basis of user defined rules. Though this technique is effective, but is difficult to setup. In addition, it is vulnerable to IP spoofing. Application gateway: Only specific applications such as FTP and Telnet servers are observed. Though it is very effective, it can lead to performance degradation. Circuit level gateway: Here, security mechanisms are applied only when a TCP or UDP connection is being established. Once connected, data can flow through the connection without being checked. Proxy server: In this technique, all messages entering and leaving the network are intercepted. The true network addresses are hidden. Usually, two or more of these techniques are used to implement a firewall. Press SPACE BAR to continue...

98 Press SPACE BAR to continue...
Instant Messaging Instant Messengers (IM) exchange short text messages instantly between users who are online. All you need to do is download and install the chat software, register, and add a couple of friends. Once your contacts come online, you will be informed, and you're ready to chat. The first popular tool was created by 3 Israelis in late 1996: ICQ (short for 'I Seek You') is an instant messaging tool that makes it simple for its users to communicate with other ICQ users. There are four big players in the IM space today ICQ, Microsoft's MSN Messenger, Yahoo! Messenger, and AOL's Instant Messenger (AIM). MSN grew in popularity because of its simplicity, and its tight integration with its ubiquitous Hotmail service. Similarly Yahoo! and AIM have capitalized on their strong user base to grow their popularity. Groups of friends, or departments in the office, generally have a preference towards one IM. Interoperability or better still a common standard, would greatly increase the value of the entire IM community. There are 2 solutions to this. Over time a common standard will be developed, or you could use a tool which works with all the networks together such as Trillian. Apart from text messaging, today's IM clients provide the basis for much richer forms of communication. Voice and even video can be carried over the same networks. Press SPACE BAR to continue...

99 Press SPACE BAR to continue...
Internet The Internet is a collection of millions of computers interconnected over a network. It was started as a small network by ARPA (Advanced Research Project Agency) for the US government in 1969 and it was known as ARPANET. Later, this design was used to create the Internet (or Net) as we know it today. The Net is based on the TCP/IP protocol, and uses resources similar to telecommunication networks. Unlike intranet, the Internet is completely decentralized by design. Every computer connected to the Net is independent, and you can decide what Internet services you want or don't want. To connect to the Internet, you have to contact an Internet Service Provider (ISP); the ISP gives you access to the Internet through their gateway. E mail (electronic mail) and IM (instant Messaging) are some of the most popular Internet based applications. Press SPACE BAR to continue...

100 Press SPACE BAR to continue...
Spam Spam is unwelcome e mail that you get from people you don't know. It often promotes dubious products, promises of a free trip to Hawaii, a better love life, get rich quick schemes, free pornography, etc. These often overwhelm your inbox and overload e mail systems, raising the maintenance cost. There are certain practices that help reduce the amount of spam you receive they vary in effectiveness and ease of use. The first thing to do is to create two e mail IDs; a personal one for friends, family and colleagues, and a second public ID for the rest of the online world. Give the public ID to Services that require your e mail address, such as newsletters or message boards. Another option is to use the filter offered by most e mail clients and services. These let you sort your inbound e mail according to the address of the sender, directing the mail sent by someone on your address book into a separate folder, while another folder holds the mail that has originated from an unknown source. Finally, there are software solutions that protect you against 80 per cent of spam. These work as blacklists: databases with addresses that are known to generate spam mail. Press SPACE BAR to continue...

101 Press SPACE BAR to continue...
Telnet Telnet is a tool for remotely logging on to a computer. It is based on the TCP/IP protocol, and allows one to use a remote computer just like a regular computer, provided that you have been given the necessary access rights to the programs and data present on that system. When you login using telnet, the remote system asks for your username and password. Based on that, one gets access to the system. You can then enter commands on your system that will be executed on the remote system. For example, \"telnet computername\" logs you on to the computer called \"computername\". This tool is now mainly used for remote administration the administrator can configure a server remotely over a network. Press SPACE BAR to continue...


Download ppt "Press SPACE BAR to continue..."

Similar presentations


Ads by Google