II PUC CS Notes
II PUC CS Notes
CU
Memory Unit
Input unit: It takes data from user and produce to system.
Output unit: It takes data from the system and produce to user.
Memory: It stores the data and gives when required.
CPU: Central Processing Unit. Here all tasks will be performed.
A) ALU: Arithmetic Logic Unit. Here arithmetic operations like +, -, *, /, % and also
Logical operation like AND, OR, NOT takes place.
B) CU: Control Unit. It controls all the units of computer.
Disk Controllers: This is the circuit that will enable CPU to communicate with different
Disk like hard disk, floppy disk, etc...
Ports: These are used to connect external devices like printer, keyboard, monitor to the
Mother board. These are located back side of the Computer.
Types:
1. Serial port: These are used to connect communication devices like mouse and modem.
And it can transfer 1bit data at a time.
2. Parallel Port: These are used to connect input and output devices like printer and
scanner. And it can transfer 1Byte data at a time.
Example:
IDE port: (Integrated Digital Electronic) it is used to connect IDE device like CD
drive and Hard disk drive.
USB port: (Universal Serial BUS) It is easy to use also called plug and play port. It
supports 125 devices.
VGA port: (Visual Graphics Adaptor) It is used to connect monitor and projectors.
Power connector: used to connect power supply to the computer.
Bus: Bus is the set of wires that will carry data from one end to another end.
Types:
Data Bus: It provides path to transfer data between CPU and memory.
Address Bus: It provides path to transfer data between CPU and RAM.
Control Bus: It is used to control the access of data.
Types of Memory:
Primary Memory: This is the internal and main memory.
ROM: Read Only Memory. This is pre written information about system and
cannot be changed.
PROM: Programmable ROM. ROM memory which can be written only
once.
EPROM: Erasable Programmable ROM. ROM memory which can be
erasable by ultraviolet light and write again.
EEPROM: Electrically Erasable Programmable ROM. ROM memory
which can be erasable by electrical charge and write again.
RAM: Random Access Memory. This will store program temporary when it
need to execute.
SRAM: Static RAM. It contains 4-6 transistors and it is expensive.
DRAM: Dynamic RAM. It is most commonly used RAM. It contains
Transistor and capacitors.
SDRAM: Synchronous Dynamic RAM.
DDR- SDRAM: Double Data Rate SDRAM.
Secondary Memory: This is external memory. It is used to store data from long time
to access.
Hard Disk
Floppy Disk
Compact Disc (CD)
Magnetic Tape
Cache Memory: This is small and high speed memory placed between primary
memory and CPU. It stores most recent data.
L1 cache memory- It is placed inside CPU.
L2 cache memory- It is present on mother board.
Register: It is the high speed temporary storage is located inside CPU.
**********
CHAPTER – 2
Boolean Algebra
Principle of Duality:
It states that from one Boolean relation another Boolean relation can be derived by
i. Changing each OR (+) into AND (.) sign.
ii. Changing each AND (.) into OR (+) sign.
iii. Changing each 0 by 1 and 1 by 0.
Example:
0+0=0 1.1=1
1+0=1 0.1=0
Properties of 0:
0+X=X 0.X=0
X+0=X X.0=0
Properties 0f 1:
1+X=1 X.1=X
X+1=1 1.X=X
Idempotent Law: This law states that when a variable is combined with itself the output
will be same.
X+X=X
X.X=X
Involution Law: This law states that when variable is complemented two times output will
be same.
̿=X
X
Complementary Law: This law states about combining variable with its complementary.
X+ ̿
X=1
.̿
X X=0
Note:
Tautology: When all the outputs are 1that is Tautology.
Fallacy: When all the outputs are 0 that is Fallacy.
Commutative Law: This law states that
X+Y=Y+X
X.Y=Y.X
De Morgan’s Theorem:
First Theorem:
̅̅̅̅̅̅̅̅
𝑋 +𝑌 =X ̅. Y
̅
Explained by Complementary law. (manually)
First Theorem:
̅̅̅̅̅
𝑋. 𝑌 = ̅X+̅ Y
Explained by Complementary law. (manually)
It explains that break the line change the sign.
Conical expression: Boolean expression composed completely either of max term or min
term is called conical expression.
Sum-of-products: (SOP) ex: ̅ XYZ + ̅
X̅YZ̅ + ̅
XYZ̅
Product-of-Sum: (POS) ex: (X ̅ + Y + 𝑍). (X + ̅Y + 𝑍)
**********
CHAPTER – 3
Logical Gates
Logical gates: It is the simple electronic circuit which takes one or more input signals and
produce single input signal.
Basic gates
NOT gate (Inverter)
OR gate
AND gate
Derived gates: The gates which are derived from basic gates.
NOR gate (NOT-OR)
NAND gate (NOT-AND)
XOR gate (Exclusive OR)
XNOR gate (Exclusive NOR)
NOT gate (Inverter): It takes one input signal and produces one output signal. If input is high
output is low and if input is low output is high. (bar operator “ – “)
OR gate: It takes two input signal and produces one output signal. If any one of the inputs is
high output is high else output is low. (Addition operator “+”)
AND gate: It takes two input signal and produces one output signal. If all the inputs are high
output is high else output is low.(Dot operator “.”)
Derived gate: The gates which are derived by the basic gates.
NOR gate: It takes two input signal and produces one output signal. If any one of the inputs
is high output is low else output is high.
NAND gate: It takes two input signal and produces one output signal. If all the inputs are
high output is low else output is high.
XOR gate: It takes two input signal and produces one output signal. If odd number of inputs
is high than output is high else output is low.
XNOR gate: It takes two input signal and produces one output signal. If odd number of
inputs is high than output is low else output is high.
Universal gates: These are the gate from which all the basic gates can be designed. Those
gates are NAND & NOR.
NOR to OR
NOR to AND
Designing NOT, OR, AND gates using NAND:
NAND to NOT
NAND to OR
NAND to AND
**********
CHAPTER – 6
Basic Concepts of OOPs
Class: Class is a user defined data type. It contains both data members and member
functions. It can have any number of objects.
Object: It is basic building block to design program. It contains both data members and
member functions. Each object is identified with different name.
Data abstraction: It is the concept of providing permission to access information as object
without knowing its background details.
Data encapsulation: It is concept of combining data and function into single unit called
class. And it prevents direct access to data and it can be accessed using member functions.
Inheritance: It is concept of providing idea of reusability. Here properties from one class
will transfer to another class.
Polymorphism: It is ability of performing task in more than one form. It has function
overloading and operator overloading.
Function Overloading: Two or more functions having different arguments.
Operator Overloading: Same operator performing different task based on data type.
Dynamic binding: Combining two or more programs during run time (execution time) is
called Dynamic binding.
Message passing: Message is the request for another code. Message passing is sending
information to another code.
Advantages (Benefits) of OOPs:
Programs are modularized based on the principle of class and object.
By the help of inheritance it is easy to develop complex programs.
By the help of encapsulation it provides security for data.
It reduces software development time.
By the help of message passing it can communicate through other code.
By the help of objects it will share common code to all.
Disadvantages (Limitations) of OOPs:
It is not having set standard.
It is difficult to draw flowchart.
It is difficult to draw algorithm.
It is difficult to convert real world problem into coding.
It is overly generalised.
Applications of OOPs:
Used in object oriented database.
Used in artificial intelligence.
Used in computer graphics.
Used in CAD/ CAM Applications.
Used in real time systems.
**********
CHAPTER – 7
Classes and Objects
Class: Class is the user defined data type. It consists of data members and member functions.
Syntax:
class class_name
{
private: data member;
member functions( );
public: data member;
member functions( );
protected: data member;
member functions( );
}obj1, obj2;
Data members: Data variables declared inside the class are data members.
Member functions: Functions declared inside the class are member functions.
Access Specifiers: These are the keywords which allow members of class to access
according to its permission.
Types:
private: This access specifiers allow members of class to access inside the class.
class class_name
{
private: data member;
member functions( );
}obj1, obj2;
public: This access specifiers allow members of class to access outside the class.
class class_name
{
public: data member;
member functions( );
}obj1, obj2;
protected: This access specifiers allow members of class to access in derived the class.
class class_name
{
protected: data member;
member functions( );
}obj1, obj2;
Array as member of class: array can be used normally as data member of class.
Example: Explained Manually.
Array of object: instead of creating multiple objects we can create array object.
Example: Explained Manually.
Object as function arguments: object can also be sent to other function as arguments.
Example: Explained Manually.
**********
CHAPTER – 8
Function Overloading and Member Functions
Function Overloading: It is the two or more function having same name with different
number of arguments or different types of arguments.
#include<iostream.h>
#include<conio.h>
class FunOverlaoding
{
public: void area (int a, int b)
{
cout<< “Area of the rectangle is=” << a*b<<endl;
}
void area ( int a)
{
cout<< “Area of the square is=” << a*a<<endl;
}
};
void main( )
{
FunOverloading obj;
obj.area (10, 5);
obj.area (50);
getch( );
}
inline Function: It is the function with prefix inline. This reduce the code by replacing
function call with function body.
Features of inline function:
It is function with prefix inline.
It will reduce the code.
Function call will be replaced with function body.
Very efficient code.
Should be declared before all other functions.
Example:
#include<iostream.h>
#include<conio.h>
inline int Area(int a)
{
return a*a;
}
void main ( )
{
clrscr( );
cout<< “ Area of the square=” << Area(10);
getch( );
}
friend Function: It is the non member function which can access members of class.
Features of friend function:
It is the non member function.
It is function with prefix friend.
It should be declared outside the class.
It should be defined outside the class as normal function.
It can access members of class.
Example:
#include<iostream.h>
#include<conio.h>
class Myclass
{
private: int a;
public: void read( )
{
cout<< “ Enter the value”<<endl;
cin>>a;
}
friend void Sum(Myclass obj1, Myclass obj2);
};
void Sum(Myclass obj1, Myclass obj2)
{
cout<< “Addition is=”<<obj1.a+obj2.a;
}
void main( )
{
Myclass obj1,obj2;
obj1.read ( );
obj2.read ( );
Sum(obj1, obj2);
getch ( );
}
**********
CHAPTER – 9
Constructors and Destructors
Constructors: It is the special member function of the class which is used to assign value to
the object when it is created. Here function name and class name will be same.
Features:
It is the special member function of class.
It is used to assign values to object when it is created.
Its name and class name will be same.
It will be invoked automatically when object is created.
Types of Constructors:
1) Default Constructor.
2) Parameterised Constructor.
3) Copy Constructor.
Default Constructor: It is the constructor with no arguments. It is used to set default values
for the objects.
class_name : :class-name( )
{
........
}
Features:
It does not have arguments.
It will assign same values to all objects.
Example: will be explained manually.
Features:
It is having arguments.
It will assign different values to different objects.
Example: will be explained manually.
Copy Constructor: It is the parameterised constructor by which one object is copied to
another object.
Features:
It is used to copy one object to another object.
Example: will be explained manually.
Destructor: It is used to destroy the memory allocated for the constructor. It use tilde ~
symbol.
Example: will be explained manually.
**********
CHAPTER – 10
Inheritance
Inheritance: It is the concept of reusability. Here one class will take properties from another
class.
Base class: The class whose properties are inherited by other class.
Derived class: The class that will inherit properties from another class.
BASE CLASS
DERIVED
CLASS
Advantages of Inheritance:
Reusing existing code.
Faster development time.
Easy to maintain.
Easy to extend.
Memory utilization.
Types of Inheritance:
Single Inheritance
Multilevel Inheritance.
Multiple Inheritance.
Hierarchical Inheritance.
Hybrid Inheritance.
Single Inheritance: It is the class derived from the single base class.
BASE CLASS FATHER
SON
DERIVED
CLASS
Derived 1
Derived 2
Derived n
Multiple Inheritance: It is the class which is derived from two or more base classes.
Derived
B C
#include<iostream.h>
#include<conio.h>
class Base
{
protected: int regno;
char name[20];
public: void readdetails( )
{
cout<< “Enter the Reg.no. and name”<<endl;
cin>>regno>>name;
}
};
class Derived: public Base
{
private: int m1,m2,m3,total;
void readmarks( )
{
cout<< “Enter 3 subject marks”<<endl;
cin>>m1>>m2>>m3;
}
void display( )
{
int tot=m1+m2+m3;
cout<< “Reg. No=”<<regno<< “Name=”<<name<< “Total=”<<tot;
}
};
void main( )
{
Derived obj;
obj.readdetails( );
obj.readmarks( );
obj.display( );
getch( );
}
Virtual Class: During inheritance there may be chance of getting duplicate properties from
same class by different ways. To remove that redundancy we use keyword virtual.
Syntax:
class A
{
................
};
class B: virtual public A
{
................
};
Abstract class:
An abstract class is not used to create objects. It will only act as base class.
Constructor in Inheritance:
Inheritance also supports the constructor concept
Example:
class A
{
public: A( )
{
.........
}
};
class B: public A
{
public: B( )
{
.........
}
};
**********
CHAPTER – 11
Pointers
Pointer: Pointer is the variable that holds memory address of another variable.
Advantages of Pointers:
It is possible to write efficient program.
Memory is utilized properly.
Dynamically allocation and de-allocation of memory.
Easy to deal with hardware components
Establishes communication between program and data.
Declaration of pointer:
Syntax:
datatype *variable;
Ex:
int *ptr;
Initialization of pointer:
Syntax:
datatype *variable=&value;
Ex:
int n,*ptr;
n=50;
ptr=&n;
Address operator (&): It is the unary operator that returns memory address of the variable.
Pointer / Indirection Operator (*): It is the unary operator that returns value inside
memory address.
Pointer Arithmetic:
Operations can be performed:
We can add integer value to pointer.
We can subtract integer value from pointer.
We can compare two pointers, if belongs to same array.
We can subtract two pointers, if belongs to same array.
We can assign one pointer to another pointers, if belongs to same data type.
Operation cannot be performed:
Addition of two pointers cannot be done.
Subtraction of two pointers when they are mot of same array.
Multiplication of two pointers cannot be done.
Division of two pointers cannot be done.
Array of Pointer:
It is possible to create array pointer as normal array.
Example:
int *ptr[5];
int a=10, b=20, c=30, d=40, e=50;
ptr[0]=&a;
ptr[2]=&b;
ptr[3]=&c;
ptr[4]=&d;
ptr[5]=&e;
This pointer: Every object has access to its own address through this pointer.
**********
CHAPTER – 12
Data File Handling
Stream in C++: A stream is sequence of bytes. A stream is a general name given to flow
of data.
Input Stream: The stream that supplies data to the program is known as input
stream.
Output Stream: The stream that receives data from the program is
known as output stream.
Class Meanin
gs
ifstream It supports input operations. It contains open( ) with default input
mode and inherits get( ), getline( ), read( ), seekg( ) and tellg( )
functions from istream.
ofstream It supports output operations. It contains open( ) with default output
mode and inherits put( ), write( ), seekp( ) and tellp( ) functions from
ostream
fstream It supports simultaneous input and output operations.
File Modes:
While using constructors or open( ), the files were created or opened in the default mode.
Syntax: object.open(“filename”, mode);
Example: fout.open(“data”, ios::app) // This opens the file data in the append mode.
The lists of file modes are:
Mode method Meaning
ios::app append to end of the file at opening time
ios::in open file for reading
ios::out open file for writing
open file for updating and move the file pointer to the
ios::ate
end of file
ios::trunc on opening, delete the contents of file
ios::binary opening a binary file.
Closing File:
The member function close( ) on its execution removes the linkage between the file
and the streamobject.
Syntax: object.close( );
Example: fout.close( );
fin.close( );
Input and output operation in text file:
o put( ) function
o get( ) function
put ( ):
The put( ) member function belongs to the class ofstream and writes single
character to the associated stream.
Syntax: object.put(ch); // where ch is the character variable.
Example: char ch=’A’;
ofstream fout(“text.txt”);
fout.put (ch);
get( ):
The get( ) member function belong to the class ifstream and reads a single
character from the associated stream.
Syntax: object.get (ch); // where ch is the character variable.
Example: char ch;
ifstream fin(“text.txt”);
fin.get (ch);
getline( ):
It is used to read a whole line of text. It belongs to the class ifstream.
Syntax: fin.getline(ch, size)
Example:
char ch[50];
ifstream fin;
fin.getline (ch, 50);
write ( ):
The write ( ) member function belongs to the class ofstream and which is used to
write binary data to a file.
Syntax: object.write((char *) & variable, sizeof(variable));
Example: Student s;
fout(“std.dat”, ios::binary);
fout.write((char *) &s, sizeof(s));
read ( ):
The read ( ) member function belongs to the class ifstream and which is used to
read binary data from a file.
Syntax: object.read((char *) & variable, sizeof(variable));
Example: student s;
fin(“std.dat”, ios::binary)
fin.write((char *) &s, sizeof(s));
**********
CHAPTER – 13
Database Concepts
Applications of Database:
Banking: For customer information, accounts and loans, and banking transactions.
Colleges: For student information, course registrations and grades.
Credit card transactions: For purchases on credit cards and generation of
monthly statements.
Finance: For storing information about holdings, sales and purchases of financial
instruments such as stocks and bonds.
Sales: For customer, product, and purchase information.
Telecommunication: For keeping records of call made, generating monthly bills,
maintaining balance on prepaid calling cards, and storing information about the
communication networks.
Aadhar database: This is the biggest database storing a data about 60 million
people residing in India.
Difference between Manual and Computerised data processing.
Manual Data Processing Computerized Data Processing
The volume of data, which can be The volume of data, which can be
processed is limited. processed is large
Requires large quantity of paper Requires less quantity of paper
Speed and accuracy is limited Faster and Accurate
Labor cost is high Labor cost is low
Storage medium is paper. Storage medium is Hard disk etc…
Advantages of Database:
Redundancy can be minimized or controlled: In DBMS environment if
redundancy is present, then it can be controlled by propagating updates in all the
places where ever redundant data is present.
Data Integrity: Data Integrity refers to the correctness of the data in the
database.
Data Sharing: In DBMS, data is stored in the centralized data base and all the
permitted users can access the same piece of information required at the same
time.
Database Security: DBMS provides a variety of security mechanisms for the
user to protect his or her data stored in the database.
Supports Concurrent access: DBMS supports concurrent access to the same
data stored in the database by applying locking and time stamp mechanisms.
Data Abstraction:
A major purpose of a database system is to provide users with an abstract view of the
data. That is the system hides certain details of how the data are stored and maintained.
There are three level of data abstraction.
o Physical Level (Internal level)
o Conceptual Level (Logical level)
o View Level (External level)
Physical Level:
It is the lowest level of abstraction that
describes how the data are actually stored.
ConceptualLevel:
It is the next higher level of abstraction that
describes what data are stored in the database and what relationships exist among
those data.
View Level:
It is the highest level of abstraction that describes only part of the entire database.
Users of DBMS:
End Users (Database Users)
Database users are those who interact with the database in order to query and
update the database, and generate reports.
System Analysts
System analysts determine the requirement of end users to create a solution for
their business need and focus on non-technical and technical aspects.
Application programmers
These are the computer professionals who implement the specifications given by
the system analysts and develop the application programs.
Database Administrators (DBA)
DBA is a person who has central control over both data and application.
Data Independency:
The capacity to change data at one layer does not affect the data at another layer is called
data independence.
Two types of data independence are:
Physical Data Independence
Logical Data Independence
Database Models:
Data model is a collection of conceptual tools for describing data, data relationship, data
semantics and constraints.
Hierarchical Model
Network Model
Relational Model
Hierarchical data model:
The Hierarchical data model organizes data
in a tree structure. In this data model, data is
represented by a collection of records and
the relationships are represented by links.
Network data model:
In1971, the Conference on Data
Systems Languages (CODASYL)
formally defined the network models.
In this model, data is represented by a
collection of records and the
relationships are represented by links.
Each record is collection of fields, which contains only one data value. A link is an
association between two records. In the network model, entities are organized in a graph, in
which some entities can be accessed through several paths.
Normalization Rule:
It is the process of removing redundancy in the database. The rules are as bellow:
First normal form (1NF): Each row must have unique value.
Second normal form (2NF): Should follow 1NF and no partial dependency.
Third normal form (3NF): Should follow 2NF and no transitive dependency.
Boyce and Codd normal form (BCNF): Higher version of 3NF deals with multiple
overlapping.
N RELATION N
STUDENT TEACHER
SHIP
Foreign Key:
A key used to link two tables together is called a foreign key.
Generalization:
In generalization, a number of entities are brought together
into one generalized entity based on their similar
characteristics.
Example: pigeon, house sparrow, crow and dove can all be
generalized as Birds.
Specification:
Specialization is the opposite of generalization.
In specialization, a group of entities is divided into sub-groups
based on their characteristics.
Relation algebra:
Relational algebra is a procedural query language that consists of a set of operations that
take one or more relations as input and result into a new relation as an output.
Cartesian product:
It is a binary operation, and it is denoted by the symbol x.
The Cartesian product of two relations R and S, denoted by R x S, defines a new relation,
which is the concatenation of each tuple of relation R with each tuple of relation S.
Data Warehouse:
Data warehouse is the organization which will store electrical data.
The components of data warehouse:
Data Source
Data Transformation
Reporting
Metadata
**********
CHAPTER – 14
SQL Commands
SQL:
SQL is Structured Query Language, which is a computer language for storing,
manipulating and retrieving data stored in relational database.
All relational database management systems like MySQL, MS Access, and Oracle,
Sybase, Informix, and SQL Server use SQL as standard database language.
SQL Commands:
DDL -Data Definition Language: It gives link between logical and physical structure of
SQL. Mainly deals with the commands related to complete table.
Few of the basic commands for DDL are:
Command Description
CREATE Used to create table, view or other objects.
ALTER Used to modify table, view or other objects.
DROP Used to deletes table, view or other objects.
DML - Data Manipulation Language: It provides data manipulation concept. Mainly deals
with rows of DBMS.
Few of the basic commands for DML are:
Command Description
SELECT Retrieves certain records from one or more tables
INSERT Creates a record
UPDATE Modifies records
DELETE Deletes records
Operators in SQL:
Arithmetic Operator: (+, -, *, /, %)
Operator Description Example( a=10, b=20)
+ Adds two operand a + b = 30
- Subtracts second operand from the first a - b = -10
* Multiply both operand a * b = 200
/ Divide numerator by denominators b/a=2
Modulus operators and remainder of after an
% b%a=0
integer division
Constraints:
Constraints are the rules for the column.
Constraints Description
NOT NULL Ensures that a column cannot have NULL value.
UNIQUE Ensures that all values in column are different and unique.
PRIMARY KEY Ensures that all values in column are unique and not null.
FOREIGN KEY Used to combine two tables.
DEFAULT Provides a default value for a column when none is specified
CHECK Ensures that all values in a column satisfy certain condition.
Join in SQL:
It is used to fetch data from two or more tables by joining them.
SQL Join Types:
INNER JOIN: returns rows when there is a match in both tables.
LEFT JOIN: returns all rows from the left table, even if there are no matches
in the right table.
RIGHT JOIN: returns all rows from the right table, even if there are no matches
in the left table.
FULL JOIN: returns rows when there is a match in one of the tables.
SELF JOIN: is used to join a table to itself as if the table were two tables.
CARTESIAN JOIN: returns the Cartesian product of the sets of records from
the two or more tables.
**********
CHAPTER – 15
Networking Concept
Network goals:
Resource sharing: Data should be available to anyone on the network.
Reliability: Can have multiple copies of data for safety.
Cost factor: Network should be available is lesser price.
Communication Medium: Communication should be speed.
Need of Networking:
File sharing over the network.
Print sharing.
Email tools for communication.
Remote access.
Sharing the data base to multiple users.
ARPANT: Advanced Research Project Agency Network. World’s first operational packet
switching network.
Types of Network:
LAN: Local Area Network. It is small computer with in a small range with high speed
data transfer and very low error rate.
MAN: Metropolitan Area Network. Here network spread over city. Example TV
cable.
WAN: Wide Area Network. Here network spread across countries with slow data
transfer and comparatively higher error.
Networking Topologies:
1) Bus Topology
2) Ring Topology
3) Star Topology
4) Tree Topology
5) Mesh Topology
Bus Topology: Here there will be single path connection between all systems.
Advantages:
Single data path connecting all networks.
Short cable length.
Simple wiring layout.
Less cost
Easy to maintain.
Easy to extend.
Disadvantages:
Data & Network control is not centralised.
Fault detection is not simple.
Nodes are not intelligent.
Repeating configuration.
Ring / Circular Topology: Here there will be single path connection between all systems
and last node again connected to server in circular way.
Star Topology: Here all the systems are connected directly to server. It is easy for service
and one device per connection
Tree Topology: This is the combination of various topology and in the form of tree.
Transmission Medium:
Twisted pair cable: In this wire comes in pair and those will be twisted.
Advantages:
Simple & Physically flexible
Can be easily connected
Easy to install & maintain
Disadvantages:
Low bandwidth
Short distance
1mbps to 10mbps flow
Types:
1) UTP: Unshielded Twisted Pair
2) STP: Shielded Twisted Pair. Here pair will be covered with shield.
Optical fibre: It carries light from one end to another end.
Radio wave: Radio waves consist of transmitter and receiver normally used in TV sets.
Satellite microwave: These are mainly depending on the frequency and wavelength. Mainly
used in internet.
Infrared: It uses infrared lights to send data. These light cannot propagate through a wall.
Switching Technique:
Circuit switching: Computers are connected through the physical copper path with
telephone call.
Message switching: This is also called as store and forward. Here message will pass
from one switching office to another switching office until it reaches destination.
Packet switching: This is same as message switching with fixed size of packets of
message.
Communication mode:
Simple: In this panel there is only one interface that is transmitter and all other
interfaces are receivers.
Half duplex: In this panel each interface works as both transmitter and receiver but
only one can transmit at a time.
Full duplex: In this panel each interface works as both transmitter and receiver and all
can transmit at a time.
Network devices:
Modem: Modulator and Demodulator. It connects computer to reach global internet.
Ethernet card: It is the LAN cable to connect to devices and data transfer speed is 10mbps.
To install this cable computer have Ethernet card.
Hub: A device used to connect different computer together.
Active hub: Amplify the signal.
Passive hub: Sends without any changes.
Bridge: It links to networks and smart to know where data has to transfer.
Applications in Networking:
SMS: Short Message Service.
Chat: Video chat / Text chat.
WiFi: Wireless Fidelity.
Network security.
Cookies: This is the message to keep track the user’s activity on specific website.
Hacker: Who gains knowledge about computer system and use this to play a prank.
Crackers: They are the programmers who break into secured systems.
VIRUS: Vital Information Resource Under Siege.
It is an auto installing software. It can spread from one computer to another.
Types:
File infectors: It infects the executable files.
Boot sector: It install to booting software and tracks hard drive.
Macro virus: It infects the data files like DBMS, ESS.
Network virus: It spread from network like email.
**********
CHAPTER – 16
Internet and Open Source Concepts
OSS: Open Source Software. It is software which is available to customers and they can
modify without limitations.
FLOSS: Free Libre & Open Source Software. These are freely available OSS.
GNU: GNU’s Not Unix. This started organization to provide software free of cost.
FSF: Free Software Foundation. It is non-profit organization which supports free software.
OSI: Open Source Initiative. It is the organization which supports free software.
Proprietary Software: Software which are neither open nor freely available.
WWW: World Wide Web is the set of protocol that allows to access any document on the
net.
Telnet: It is the older Internet Utility that allows to log on to remote Computer System.
Web Browser: These are the WWW server that responds to the requests made by web
browser.
URL: Uniform Recourse Locator is the unique address for the website.
Type: //address/path
Ex: http://www.srpef.com/home
Types of E-Commerce:
1) Business – to – Business (B2B): The exchange of services, information, products from
one business to another business.
2) Business – to – Consumers (B2C): The exchange of services, information, products
from one business to consumers.
3) Consumers – to – Business (C2B): Customers directly contact with business venders
and selects.
4) Consumers – to – Consumers (C2C): Customers will sell his goods, service, and
information to another costumer.
**********
CHAPTER – 17
Web Designing
HTML: Hyper Text Mark-up Language. It is the mother tongue of web page.
Structure of HTML:
<HTML> HTML starts.
<HEAD> Heading section stars.
<TITLE> ........</TITLE> Title of Webpage.
</HEAD> Heading ends.
<H1>....<H1>
<H2>....<H2>
<H6>.....<H6> It is used as heading text.
<FONT SIZE= “.” FACE= “.” COLOR= “.”>...</FONT> To set font effects.
Web Hosting:
Web hosting is hosting the web server application to internet so that it will be available to all
clients.
Types:
Free Hosting: This type of hosting is freely available to use for particular time.
Virtual / Shared Hosting: This type of hosting is provided under other domain.
Dedicated Hosting: This type of hosting if for large, high traffic sites along with
special needs such as e-commerce or security.
Co-location Hosting: This type of hosting will actually owns the server on which its
site is hosted. In this company will be responsible for all server administration.
**********