Computer Ncert (3 Files Merged)
Computer Ncert (3 Files Merged)
2024-25 2024-25
Computer SyStem 3 4 Computer SCienCe – ClaSS xi
are shown in Figure 1.3. A braille display monitor is The Von Neumann architecture is shown in Figure
useful for a visually challenged person to understand 1.5. It consists of a Central Processing Unit (CPU)
the textual output generated by computers. for processing arithmetic and logical instructions, a
A printer is the most commonly used device to get memory to store data and programs, input and output
output in physical (hardcopy) form. Three types of devices and communication
commonly used printers are inkjet, laserjet and dot
channels to send or receive the
matrix. Now-a-days, there is a new type of printer
A punched card is a output data. Electronic Numerical
called 3D-printer, which is used to build physical
replica of a digital 3D design. These printers are being piece of stiff paper that Integrator and Computer (ENIAC)
used in manufacturing industries to create prototypes
stores digital data in is the first binary programmable
the form of holes at
of products. Their usage is also being explored in the predefined positions.
Figure 1.5: Von Neumann architecture for computer based on Von Neumann
the computer
medical field, particularly for developing body organs. architecture.
During the 1970s, Large Scale Integration (LSI) of
1.2 evolutIon of computer electronic circuits allowed integration of complete
From the simple calculator to a modern day powerful CPU on a single chip, called microprocessor. Moore’s
data processor, computing devices have evolved in a Law predicted exponential growth in the number
relatively short span of time. The evolution of computing In 1965, Intel co-
of transistors that could be assembled in a single
devices in shown through a timeline in Figure 1.4 founder Gordon Moore microchip. In 1980s, the processing power of computers
introduced Moore’s increased exponentially by integrating around 3 million
EDVAC/ENIAC
Pascaline Law which predicted
Blaize Pascal invented a mechanical
John Von Neumann introduced components on a small-sized chip termed as Very
calculator known as Pascal calculator
the concept of stored program that the number of
or Pascaline to do addition and
computer which was capable of
transistors on a chip Large Scale Integration (VLSI). Further advancement in
storing data as well as program
subtraction of two numbers directly in the memory. The EDVAC and would double every two technology has made it feasible to fabricate high density
and multiplication and division through then the ENIAC computers were
repeated addition and subtraction. years while the costs of transistors and other components (approx 106
developed based on this concept.
would be halved.
components) on a single IC called Super Large Scale
Tabulating Machine Integrated Circuit
Herman Hollerith designed An Integrated Circuit (IC) is Integration (SLSI) as shown in Figure 1.6.
1642 a tabulating machine for
summarising the data stored
1945 a silicon chip which contains
entire electronic circuit on a
IBM introduced its first personal computer (PC) for
on the punched card. It is very small area. The size of the home user in 1981 and Apple introduced Macintosh
computer drastically reduced
step towards programming. because of ICs.
1890 1970
10,000,000,000
Number of Transistors
per Integrated Circuit
1,000,000,000 Core 2 DUO Core i7
100,000,000 Intel Microprocessors Pentium IV
Pentium II Pentium III
1834 1947 10,000,000 Pentium
1,000,000 486
486
Analytic Engine Transistor 100,000 Invention of the 386
Vacuum tubes were Transistor 286
Charles Babbage invented
replaced by transistors
10,000 8086
analytical engine, a
500 BC mechanical computing device 1937 developed at Bell Labs, 1,000 4004
for inputting, processing, using semiconductor
storing and displaying the materials. 100 Doubles every 2 years
output, which is considered 10
to form the basis of modern 1
computers.
Abacus Turing Machine
Computing is attributed to The Turing machine concept was a 1940 1950 1960 1970 1980 1990 2000 2010 2020
the invention of ABACUS general purpose programmable
almost 3000 years ago. It machine that was capable of solving
was a mechanical device any problem by executing the
capable of doing simple program stored on the punched cards. Figure 1.6: Exponential increase in number of transistors used in ICs over time
arithmetic calculations only.
Figure 1.4: Timeline showing key inventions in computing technology
2024-25 2024-25
Computer SyStem 5 6 Computer SCienCe – ClaSS xi
machines in 1984. The popularity of the PC surged Table 1.1 Measurement units for digital data
by the introduction of Graphical User Interface (GUI) Unit Description Unit Description
based operating systems by Microsoft and others in KB (Kilobyte) 1 KB = 1024 Bytes PB (Petabyte) 1 PB = 1024 TB
place of computers with only command line interface, MB (Megabyte) 1 MB = 1024 KB EB (Exabyte) 1 EB = 1024 PB
like UNIX or DOS. Around 1990s, the growth of World GB (Gigabyte) 1 GB = 1024 MB ZB (Zettabyte) 1 ZB = 1024 EB
Wide Web (WWW) further accelerated mass usage of TB (Terabyte) 1 TB = 1024 GB YB (Yottabyte) 1 YB = 1024 ZB
computers and thereafter computers have become an
indispensable part of everyday life. 1.3.2 Types of Memory
Further, with the introduction of laptops, personal
Human beings memorise many things over a lifetime, and
computing was made portable to a great extent. This recall from memory to make a decision or some action.
was followed by smartphones, tablets and other However, we do not rely on our memory completely, and
personal digital assistants. These devices have leveraged we make notes and store important data and information
the technological advancements in processor using other media, such as notebook, manual, journal,
miniaturisation, faster memory, high speed data and document, etc. Similarly, computers have two types of
connectivity mechanisms. memory — primary and secondary.
The next wave of computing devices includes (A) Primary Memory
the wearable gadgets, such as smart watch, lenses, Primary memory is an essential component of a
headbands, headphones, etc. Further, smart appliances computer system. Program and data are loaded into the
are becoming a part of the Internet of Things (IoT), by primary memory before processing. The CPU interacts
leveraging the power of Artificial Intelligence (AI). directly with the primary memory to perform read or
write operation. It is of two types viz. (i) Random Access
1.3 computer memory Memory (RAM) and (ii) Read Only Memory (ROM).
RAM is volatile, i.e., as long as the power is supplied
A computer system needs memory to store the data and
to the computer, it retains the data in it. But as soon
instructions for processing. Whenever we talk about the
as the power supply is turned off, all the contents of
‘memory’ of a computer system, we usually talk about the
RAM are wiped out. It is used to store data temporarily
main or primary memory. The secondary memory (also
while the computer is working. Whenever the computer
called storage device) is used to store data, instructions
is started or a software application is launched, the
and results permanently for future use.
required program and data are loaded into RAM
1.3.1 Units of Memory for processing. RAM is usually referred to as main
A computer system uses binary numbers to store and memory and it is faster than the secondary memory or
process data. The binary digits 0 and 1, which are the storage devices.
basic units of memory, are called bits. Further, these On the other hand, ROM is non-volatile, which
bits are grouped together to form words. A 4-bit word means its contents are not lost even when the power is
is called a Nibble. Examples of nibble are 1001, 1010, turned off. It is used as a small but faster permanent
0010, etc. A two nibble word, i.e., 8-bit word is called a storage for the contents which are rarely changed. For
byte, for example, 01000110, 01111100, 10000001, etc. Think and Reflect example, the startup program (boot loader) that loads
Like any other standard unit, bytes are grouped the operating system into primary memory, is stored
Suppose there is a
together to make bigger chunks or units of memory. computer with RAM
in ROM.
Table 1.1 shows different measurement units for digital but no secondary (B) Cache Memory
data stored in storage devices. storage. Can we install RAM is faster than secondary storage, but not as fast
a software on that
computer? as a computer processor. So, because of RAM, a CPU
2024-25 2024-25
Computer SyStem 7 8 Computer SCienCe – ClaSS xi
may have to slow down. To speed up the operations of and (iii) Control bus to communicate
the CPU, a very high speed memory is placed between control signals between different
the CPU and the primary memory known as cache. It components of a computer. All these
stores the copies of the data from frequently accessed three buses collectively make the
primary memory locations, thus, reducing the average system bus, as shown in Figure 1.8.
time required to access data from primary memory. As the CPU interacts directly with
When the CPU needs some data, it first examines the main memory, any data entered from
cache. In case the requirement is met, it is read from input device or the data to be accessed
the cache, otherwise the primary memory is accessed. from hard disk needs to be placed in the
main memory for further processing.
(C) Secondary Memory Figure 1.8: Data transfer between components through The data is then transferred between
Primary memory has limited storage capacity and Pen system bus CPU and main memory using bus.
is either volatile (RAM) or read-only (ROM). Thus, a Drive
The CPU places on the address bus, the address of
computer system needs auxiliary or secondary memory the main memory location from which it wants to read
to permanently store the data or instructions for data or to write data. While executing the instructions,
future use. The secondary memory is non-volatile and the CPU specifies the read or write control signal through
has larger storage capacity than primary memory. It the control bus.
is slower and cheaper than the main memory. But, it CD/DVD As the CPU may require to read data from main
cannot be accessed directly by the CPU. Contents of memory or write data to main memory, a data bus is
secondary storage need to be first brought into the main bidirectional. But the control bus and address bus are
memory for the CPU to access. Examples of secondary unidirectional. To write data into memory, the CPU
memory devices include Hard Disk Drive (HDD), CD/ places the data on the data bus, which is then written
DVD, Memory Card, etc., as shown in Figure 1.7. to the specific address provided through the address
However, these days, there are secondary storage bus. In case of read operation, the CPU specifies the
devices like SSD which support very fast data transfer address, and the data is placed on the data bus by a
speed as compared to earlier HDDs. Also, data transfer dedicated hardware, called memory controller. The
between computers have become easier and simple due memory controller manages the flow of data into and
to the availability of small-sized and portable flash or out of the computer's main memory.
pen drives. 1.5 mIcroproceSSorS
1.4 data tranSfer between memory and cpu In earlier days, a computer's CPU used to occupy a large
Figure 1.7: Storage devices room or multiple cabinets. However, with advancement
Data need to be transferred between the CPU and in technology, the physical size of CPU has reduced and
primary memory as well as between the primary and it is now possible to place a CPU on a single microchip
secondary memory. only. A processor (CPU) which is implemented on a
Data are transferred between different components of single microchip is called microprocessor. Nowadays,
a computer system using physical wires called bus. For almost all the CPUs are microprocessors. Hence, the
example, bus is used for data transfer between a USB terms are used synonymously for practical purpose.
port and hard disk or between a hard disk and main Microprocessor is a small-sized electronic component
memory. Bus is of three types — (i) Data bus to transfer inside a computer that carries out various tasks involved
data between different components, (ii) Address bus to in data processing as well as arithmetic and logical
transfer addresses between CPU and main memory. operations. These days, a microprocessor is built over
The address of the memory location that the CPU wants an integrated circuit comprising millions of small
to read or write from is specified in the address bus, components like resistors, transistors and diodes.
2024-25 2024-25
Computer SyStem 9 10 Computer SCienCe – ClaSS xi
Microprocessors have evolved over time in terms Activity 1.2 clock inside a computer. The clock speed indicates the
of their increased processing capability, decreasing speed at which the computer can execute instructions.
Find out the clock speed
physical size and reduced cost. Currently available of the microprocessor
Earlier, it was measured in Hertz (Hz) and Kilohertz
microprocessors are capable of processing millions of of your computer and (kHz). But with advancement in technology and chip
instructions per millisecond. Table 1.2 lists different compare with that of density, it is now measured in Gigahertz (GHz), i.e.,
types of microprocessors along with their generation, your peers? billions of pulses per second.
time period, and underlying technology since their (D) Cores
inception in early 1970s. Core is a basic computation unit of the CPU. Earlier
Table 1.2 Generations of Microprocessor processors had only one computation unit, thereby
capable of performing only one task at a time. With the
Generation Era Chip Word Maximum Clock Cores Example*
advent of multicore processor, it has become possible
type size memory size speed
for the computer to execute multiple tasks, thereby
First 1971-73 LSI 4 / 8 1 KB 108 KHz- Single Intel 8080
bit 200 KHz
increasing the system’s performance. CPU with two,
Second 1974-78 LSI 8 bit 1 MB Upto 2 MHz Single Motorola 6800 four, and eight cores is called dual-core, quad-core and
Intel 8085 octa-core processor, respectively.
Third 1979-80 VLSI 16 bit 16 MB 4 MHz - 6 Single Intel 8086
MHz 1.5.2 Microcontrollers
Fourth 1981-95 VLSI 32 bit 4 GB Upto 133 Single Intel 80386 The microcontroller is a small computing device which
MHz Motorola 68030 has a CPU, a fixed amount of RAM, ROM and other
Fifth 1995 till SLSI 64 bit 64 GB 533 MHz - Multicore Pentium,
peripherals all embedded on a single chip as compared
date 34 GHz Celeron, Xeon
to microprocessor that has only a CPU on the chip. The
*few prominent examples are included.
structure of a microcontroller is shown in Figure 1.9.
1.5.1 Microprocessor Specifications Keyboard, mouse, washing machine, digital camera,
pendrive, remote controller, microwave are few examples
Microprocessors are classified on the basis of different of microcontrollers. As these are designed for specific
features which include chip type, word size, memory tasks only, hence their size as well as cost is reduced.
size, clock speed, etc. These features are briefly Because of the very small size of the
explained below: microcontroller, it is embedded in another device
(A) Word Size or system to perform a specific functionality. For
Word size is the maximum number of bits that a Clock CPU Memory
example, the microcontroller in a fully automatic
microprocessor can process at a time. Earlier, a word washing machine is used to control the washing cycle
was of 8 bits, as it was the maximum limit at that Bus System without any human intervention. The cycle starts
time. At present, the minimum word size is 16 bits and with the filling of water, after which the clothes are
maximum word size is 64 bits. Input Output soaked and washed; thereafter the water is drained
I/O-ports
(B) Memory Size and the clothes are spin dry. The simple use of
Depending upon the word size, the size of RAM varies. microcontroller has permitted repetitive execution
Activity 1.1 of tedious tasks automatically without any human
Initially, RAM was very small (4MB) due to 4/8 bits word Figure 1.9: Structure of
size. As word size increased to 64 bits, it has become The maximum memory microcontroller intervention, thereby saving precious time.
feasible to use RAM of size upto 16 Exabytes (EB). size of microprocessors
of different generations
(C) Clock Speed are given at Table 1.2. 1.6 data and InformatIon
Computers have an internal clock that generates pulses Represent each of the A computer is primarily for processing data. A computer
memory size in terms
(signals) at regular intervals of time. Clock speed simply system considers everything as data, be it instructions,
of power of 2.
means the number of pulses generated per second by the pictures, songs, videos, documents, etc. Data can also be
2024-25 2024-25
Computer SyStem 11 12 Computer SCienCe – ClaSS xi
raw and unorganised facts that are processed to get It is clear that such data is organised in row/column
Think and Reflect
meaningful information. format and is easily understandable. Structured data
So understanding the concept of data along with Can you give some may be sorted in ascending or descending order. In the
more examples of
its different types is crucial to understand the overall unstructured data?
example, attendance data is sorted in increasing order
functioning of a computer. Sometimes people use the on the column ‘month’. Other examples of structured
terms data, information and knowledge interchangeably, data include sales transactions, online railway ticket
which is incorrect. bookings, ATM transactions, etc.
1.6.1 Data and Its Types (B) Unstructured Data
Data which are not organised in a pre-defined record
A computer system has many input devices, which format is called unstructured data. Examples include
provide it with raw data in the form of facts, concepts, audio and video files, graphics, text documents, social
instructions, etc., Internally everything is stored in media posts, satellite images, etc. Figure 1.10 shows a
binary form (0 and 1), but externally, data can be input report card with monthly attendance record details sent
to a computer in the text form consisting of English to parents. Such data are unstructured as they consist
alphabets A–Z, a–z, numerals 0 – 9, and special symbols of textual contents as well as graphics, which do not
like @, #, etc. Data can be input in other languages too follow a specific format.
or it can be read from the files. The input data may
be from different sources, hence it may be in different
formats. For example, an image is a collection of Red, Attendance record for the month of July
School Logo
Green, Blue (RGB) pixels, a video is made up of frames,
and a fee receipt is made of numeric and non-numeric
characters. Primarily, there are three types of data. Attended:
2024-25 2024-25
Computer SyStem 13 14 Computer SCienCe – ClaSS xi
1.6.2 Data Capturing, Storage and Retrieval Activity 1.3 Activity 1.4 accidentally erase data from storage devices, or a hacker
To process data, we need to first input or capture or malware can delete the digital data intentionally.
Visit some of the places Explore possible ways
the data. This is followed by its storage in a file or a of recovering deleted Deleting digitally stored data means changing the
like bank, automobile
database so that it can be used in the future. Whenever showroom, shopping data or data from a details of data at bit level, which can be very time-
corrupted device.
data is to be processed, it is first retrieved from the mall, tehsil office, etc., consuming. Therefore, when any data is simply deleted,
file or database so that we can perform further actions and find out 2 – 3 names its address entry is marked as free, and that much
of tools or instruments
on it. space is shown as empty to the user, without actually
used to capture data in
digital format. deleting the data.
(A) Data Capturing
It involves the process of gathering data from different In case data gets deleted accidentally or corrupted,
sources in the digital form. This capturing may vary there arises a need to recover the data. Recovery of the
from simple instruments like keyboard, barcode readers data is possible only if the contents or memory space
used at shopping outlets (Figure 1.12), comments or marked as deleted have not been overwritten by some
posts over social media, remote sensors on an earth other data. Data recovery is a process of retrieving
orbiting satellite, etc. Sometimes, heterogeneity among deleted, corrupted and lost data from secondary
data sources makes data capturing a complex task. Figure 1.12: Capturing storage devices.
(B) Data Storage data using barcode reader There are usually two security concerns associated
It is the process of storing the captured data for with data. One is its deletion by some unauthorised
processing later. Now-a-days data is being produced at person or software. These concerns can be avoided
a very high rate, and therefore data storage has become by limiting access to the computer system and using
a challenging task. However, the decrease in the cost passwords for user accounts and files, wherever
of digital storage devices has helped in simplifying
possible. There is also an option of encrypting files to
this task. There are numerous digital storage devices
protect them from unwanted modification.
available in the market like as shown in Figure 1.7.
Data keeps on increasing with time. Hence, the The other concern is related to unwanted recovery of
Activity 1.5
storage devices also require to be upgraded periodically. data by unauthorised user or software. Many a times,
Create a test file and we discard our old, broken or malfunctioning storage
In large organisations, computers with larger and then delete it using
faster storage called data servers are deployed to store Shift+Delete from
devices without taking care to delete data. We assume
vast amount of data. Such dedicated computers help the keyboard. Now that the contents of deleted files are permanently
recover the file using removed. However, if these storage devices fall into the
in processing data efficiently. However, the cost (both
the methods you have hands of mischief-mongers, they can easily recover
hardware and software) of setting up a data server as explored in Activity 1.4.
well as its maintenance is high, especially for small data from such devices; this poses a threat to data
organisations and startups. confidentiality. This concern can be mitigated by using
proper tools to delete or shred data before disposing off
(C) Data Retrieval
It involves fetching data from the storage devices, for its any old or faulty storage device.
processing as per the user requirement. As databases
grow, the challenges involved in search and retrieval of 1.7 Software
the data in acceptable time, also increase. Minimising Till now, we have studied about the physical
data access time is crucial for faster data processing. components or the hardware of the computer system.
1.6.3 Data Deletion and Recovery But the hardware is of no use on its own. Hardware
needs to be operated by a set of instructions. These
One of the biggest threats associated with digital data is sets of instructions are referred to as software. It is that
its deletion. The storage devices can malfunction or crash component of a computer system, which we cannot
down resulting in the deletion of data stored. Users can
2024-25 2024-25
Computer SyStem 15 16 Computer SCienCe – ClaSS xi
touch or view physically. It comprises the instructions access and security to the users of the system. Some
and data to be processed using the computer hardware. of the popular operating systems are Windows, Linux,
The computer software and hardware complete any Macintosh, Ubuntu, Fedora, Android, iOS, etc.
task together. (B) System Utilities
The software comprises a set of instructions which Software used for maintenance and configuration of the
on execution deliver the desired outcome. In other computer system is called system utility. Some system
words, each software is written for some computational utilities are shipped with the operating system for
purpose. Some examples of software include operating example disk defragmentation tool, formatting utility,
systems like Ubuntu or Windows 7/10, word processing system restore utility, etc. Another set of utilities are
tool like LibreOffice or Microsoft Word, video player like those which are not shipped with the operating system
VLC Player, photo editors like GIMP and LibreOffice but are required to improve the performance of the
draw. A document or image stored on the hard disk or system, for example, anti-virus software, disk cleaner
pen drive is referred to as a soft-copy. Once printed, the Hardware refers to the
physical components tool, disk compression software, etc.
document or an image is called a hard-copy. of the computer system
(C) Device Drivers
which can be seen and
1.7.1 Need of Software touched. For example, As the name signifies, the purpose of a device driver is to
Activity 1.6
The sole purpose of a software is to make the computer RAM, keyboard, ensure proper functioning of a particular device. When
printer, monitor, CPU, Ask your teacher to
hardware useful and operational. A software knows how it comes to the overall working of a computer system,
etc. On the other hand, help you locate any two
to make different hardware components of a computer device drivers installed the operating system does the work. But everyday new
software is a set of
work and communicate with each other as well as with instructions and data on your computer. devices and components are being added to a computer
the end-user. We cannot instruct the hardware of a that makes hardware system. It is not possible for the operating system alone
computer directly. Software acts as an interface between functional to complete to operate all of the existing and new devices, where each
the desired task.
human users and the hardware. device has diverse characteristics. The responsibility
Depending on the mode of interaction with hardware for overall control, operation and management of a
and functions to be performed, the software can be broadly particular device at the hardware level is delegated to
classified into three categories viz. (i) System software, its device driver.
(ii) Programming tools and (iii) Application software. The device driver acts as an interface between the
device and the operating system. It provides required
1.7.2 System Software
services by hiding the details
The software that provides the basic functionality of operations performed at the
to operate a computer by interacting directly with its hardware level of the device. Just
constituent hardware is termed as system software. A like a language translator, a device
system software knows how to operate and use different driver acts as a mediator between
hardware components of a computer. It provides services
the operating system and the
directly to the end user, or to some other software.
attached device. The categorisation
Examples of system software include operating systems,
system utilities, device drivers, etc. of software is shown in Figure 1.13.
(A) Operating System 1.7.3 Programming Tools
As the name implies, the operating system is a system In order to get some work done
software that operates the computer. An operating by the computer, we need to give
system is the most basic system software, without instructions which are applied on the
which other software cannot work. The operating system input data to get the desired outcome.
manages other application programs and provides Computer languages are developed
Figure 1.13: Categorisation of software for writing these instructions.
2024-25 2024-25
Computer SyStem 17 18 Computer SCienCe – ClaSS xi
It is important to understand here that computers and noteS Code in high language. The program code written in assembly or
level language
humans understand completely different languages. high-level language is called source code. The source
(Source Code)
While humans are able to write programs in high-level code is converted by a translator into the machine
language, computers understand machine language. understandable form called object (machine) code as
There is a continuous need for conversion from high depicted in Figure 1.14.
Language
level to machine level language, for which translators translater As we have different types of computer languages,
are needed. Also, to write the instruction, code editors different translators are needed to convert the source
(e.g., IDLE in Python) are needed. We will briefly describe code to machine code. The three types of translators
here the programming languages, language translators
used in computing systems are assembler, compiler
and program development tools. Code in machine
language and interpreter.
(A) Classification of Programming Languages (Object Code) The translator used to convert the code written
It is very difficult for a human being to write in assembly language to machine language is called
Figure 1.14: Translator to
instructions in the form of 1s and 0s. So different types convert source code into assembler. Each assembler can understand a specific
of computer programming languages are developed to object code
microprocessor instruction set only and hence, the
simplify the coding. Two major categories of computer
machine code is not portable.
programming languages are low-level languages and
high-level languages. We also need translators to convert codes written
Low-level languages are machine dependent languages in high level language (source code) to machine
and include machine language and assembly language. understandable form (machine code) for execution by
Machine language uses 1s and 0s to write instructions the computer. Compiler converts the source code into
which are directly understood and executed by the machine code. If the code follows all syntactic rules of
computer. But writing a code in machine language is the language, then it is executed by the computer. Once
difficult as one has to remember all operation codes translated, the compiler is not needed.
and machine addresses. Also finding errors in the code An interpreter translates one line at a time instead of
written in machine language is difficult. the whole program at one go. Interpreter takes one line,
To simplify the writing of code, assembly language converts it into executable code if the line is syntactically
was developed that allowed usage of English-like words correct, and then it repeats these steps for all lines in
and symbols instead of 1s and 0s. But one major the source code. Hence, interpreter is always needed
drawback of writing a code in this language is that the
whenever a source code is to be executed.
code is computer specific, i.e., the code written for one
type of CPU cannot be used for another type of CPU. (C) Program Development Tools
High level languages are machine independent and Whenever we decide to write a program, we need a text
are simpler to write code into. Instructions are using editor. An editor is a software that allows us to create a
English like sentences and each high level language text file where we type instructions and store the file as
follows a set of rules, similar to natural languages. the source code. Then an appropriate translator is used
However, these languages are not directly understood to get the object code for execution. In order to simplify
by the computer. Hence, translators are needed to the program development, there are software called
translate high-level language codes into machine Integrated Development Environment (IDE) consisting
language. Examples of high level language include C++, of text editor, building tools and debugger. A program
Java, Python, etc. can be typed, compiled and debugged from the IDE
(B) Language Translators directly. Besides Python IDLE, Netbeans, Eclipse, Atom,
As the computer can understand only machine Lazarus are few other examples of IDEs. Debugger, as
language, a translator is needed to convert program the name implies, is the software to detect and correct
written in assembly or high level language to machine errors in the source code.
2024-25 2024-25
Computer SyStem 19 20 Computer SCienCe – ClaSS xi
2024-25 2024-25
Computer SyStem 21 22 Computer SCienCe – ClaSS xi
opening, editing or deleting a file, etc. The user has to noteS systems which provide voice-based control to users
remember the names of all such programs or specific include iOS (Siri), Android (Google Now or “OK Google”),
commands which the operating system supports. Microsoft Windows 10 (Cortana) and so on.
The primary input device used by the user for (E) Gesture-based Interface
command based interface is the keyboard. Command Some smartphones based on Android and iOS as well
based interface is often less interactive and usually as laptops let users interact with the devices using
allows a user to run a single program at a time. gestures like waving, tilting, eye motion and shaking.
Examples of operating systems with command-based This technology is evolving faster and it has promising
interface include MS-DOS and Unix. potential for application in gaming, medicine and
(B) Graphical User Interface other areas.
Graphical User Interface (GUI) lets users run programs
1.8.2 Functions of Operating System
or give instructions to the computer in the form of
icons, menus and other visual options. Icons usually Now let us explore the important services and tasks
that an operating system provides for managing the
represent files and programs stored on the computer
computer system.
and windows represent running programs that the user
has launched through the operating system. (A) Process Management
The input devices used to interact with the GUI While a computer system is operational, different tasks
commonly include the mouse and the keyboard. are running simultaneously. A program is intended to
Examples of operating systems with GUI interfaces carry out various tasks. A task in execution is known
Operating system is called
include Microsoft Windows, Ubuntu, Fedora and resource manager as it as process. We can activate a system monitor program
Macintosh, among others. manages different resources that provides information about the processes being
like main memory, CPU,
(C) Touch-based Interface I/O devices, so that each executed on a computer. In some systems it can be
Today smartphones, tablets and PCs allow users to resource is used optimally activated using Ctrl+Alt+Delete. It is the responsibility
and system performance does
interact with the system simply using the touch input. of operating system to manage these processes and get
not deteriorate.
Using the touchscreen, a user provides inputs to the multiple tasks completed in minimum time. As CPU is
operating system, which are interpreted by the OS as the main resource of computer system, its allocation
commands like opening an app, closing an app, dialing among processes is the most important service of the
a number, scrolling across apps, etc. operating system. Hence process management concerns
Examples of popular operating systems with touch- the management of multiple processes, allocation
based interfaces are Android and iOS. Windows of required resources, and exchange of information
8.1 and 10 also support touch-based interfaces on among processes.
touchscreen devices. (B) Memory Management
(D) Voice-based Interface Primary or main memory of a computer system is
Modern computers have been designed to address the usually limited. The main task of memory management
needs of all types of users including people with special is to give (allocate) and take (free) memory from running
needs and people who want to interact with computers processes. Since there are multiple processes running
or smartphones while doing some other task. For users at a time, there arises a need to dynamically (on-the-go)
who cannot use the input devices like the mouse, allocate and free memory to the processes. Operating
keyboard, and touchscreens, modern operating systems system should do it without affecting other processes
provide other means of human-computer interaction. that are already residing in the memory and once the
Users today can use voice-based commands to make process is finished, it is again the responsibility of the
a computer work in the desired way. Some operating operating system to take the memory space back for re-
2024-25 2024-25
Computer SyStem 23 24 Computer SCienCe – ClaSS xi
utilisation. Hence, memory management concerns with noteS noteS • System bus is used to transfer data, addresses
management of main memory so that maximum memory and control signals between components of the
is occupied or utilised by large number of processes computer system.
while keeping track of each and every location within • A microprocessor is a small-sized electronic
the memory as free or occupied. component inside a computer that performs basic
(C) File Management arithmetic and logical operations on data.
Data and programs are stored as files in the secondary • Microcontroller is a small computing device which
storage of a computer system. File management involves has a CPU, a fixed amount of RAM, ROM and other
peripherals embedded on a single chip.
the creation, updation, deletion and protection of these
files in the secondary memory. Protection is a crucial • Software is a set of instructions written to achieve
function of an operating system, as multiple users can the desired tasks and are mainly categorised
as system software, programming tools and
access and use a computer system. There must be a
application software.
mechanism in place that will stop users from accessing
• Hardware of a computer cannot function on its own.
files that belong to some other user and have not been
It needs software to be operational or functional.
shared with them. File management system manages
• Operating system is an interface between the user
secondary memory, while memory management system
and the computer and supervises the working of
handles the main memory of a computer system.
computer system, i.e., it monitors and controls the
(D) Device Management hardware and software of the computer system.
A computer system has many I/O devices and hardware
connected to it. Operating system manages these
heterogeneous devices that are interdependent. The exercISe
operating system interacts with the device driver and the 1. Name the software required to make a computer
related software for a particular device. The operating functional. Write down its two primary services.
system must also provide the options for configuring
a particular device, so that it may be used by an end 2. How does the computer understand a program
user or some other device. Just like files, devices also written in high level language?
need security measures and their access to different 3. Why is the execution time of the machine code less
devices must be restricted by the operating system to than that of source code?
the authorised users, software and other hardware only.
4. What is the need of RAM? How does it differ from
ROM?
Summary
5. What is the need for secondary memory?
• A computing device, also referred as computer,
6. How do different components of the computer
processes the input data as per given instructions
communicate with each other?
to generate desired output.
• Computer system has four physical components 7. Draw the block diagram of a computer system. Briefly
viz. (i) CPU, (ii) Primary Memory, (iii) Input Device write about the functionality of each component.
and (iv) Output Devices. They are referred to as 8. What is the primary role of system bus? Why is
hardware of computer. data bus is bidirectional while address bus is
• Computer system has two types of primary unidirectional?
memories viz. (i) RAM, the volatile memory and
9. Differentiate between proprietary software and
(ii) ROM, the non-volatile memory.
freeware software. Name two software for each type.
2024-25 2024-25
Computer SyStem 25 26 Computer SCienCe – ClaSS xi
10. Write the main difference between microcontroller noteS noteS 6. Check the size of RAM and HDD of a computer in
and microprocessor. Why do smart home appliances your school. Make a table and write their size in
have a microcontroller instead of microprocessor Bytes, Kilobytes, Megabytes and Gigabytes.
embedded in them? 7. List all secondary storage devices available at your
11. Mention the different types of data that you deal school or home.
with while browsing the Internet. 8. Which operating system is installed on your
12. Categorise the following data as structured, semi- computer at home or school?
structured and unstructured:
• Newspaper
• Cricket Match Score
• HTML Page
• Patient records in a hospital
13. Name the input or output device used to do the
following:
a) To output audio
b) To enter textual data
c) To make hard copy of a text file
d) To display the data or information
e) To enter audio-based command
f) To build 3D models
g) To assist a visually-impaired individual in
entering data
14. Identify the category (system, application,
programming tool) of the following software:
a) Compiler
b) Assembler
c) Ubuntu
d) Text editor
explore yourSelf
1. Ask your teacher to help you locate any two device
drivers installed on your computer.
2. Write any two system software and two application
software installed on your computer.
3. Which microprocessor does your personal computer
have? Which generation does it belong to?
4. What is the clock speed of your microprocessor?
5. Name any two devices in your school or home that
have a microcontroller.
2024-25 2024-25
138 InformatIcs PractIces
Chapter A computer
network (Figure 5.2)
is an interconnection
devices.
Such interconnection
allows computers
to share data and
resources among
each other. A basic
network may connect
a few computers
placed in a room.
Figure 5.1: Interconnection forming a social network The network size
“The internet could be a very
may vary from small
positive step towards education, to large depending on the number of computers it
organisation and participation in a connects. A computer network can include different
meaningful society.” types of hosts (also called nodes) like server, desktop,
— Noam Chomsky laptop, cellular phones.
Activity 5.1 A computer network (Figure 5.2) is an interconnection
Identify some among two or more computers or computing devices.
other networks in Such interconnection allows computers to share data
the real world.
and resources among each other. A basic network may
In this chapter connect a few computers placed in a room.
The network size may vary from small to large
5.1 IntroductIon to computer » Introduction to
Computer Networks depending on the number of computers it connects.
networks A computer network can include different types of
» Types of Networks
We are living in a connected world. hosts (also called nodes) like server, desktop, laptop,
Information is being produced, exchanged, » Network Devices
cellular phones.
and traced across the globe in real time. It's » Networking Topologies
possible as almost everyone and everything » The Internet
in the digital world is interconnected through » Applications of Internet
one way or the other.
A group of two or more similar things » Website
or people interconnected with each other » Web Page
is called network (Figure 5.1). Some of the » Web Server
examples of network in our everyday life » Hosting of a website
include: Figure 5.2: A computer network
» Browser
• Social network Apart from computers, networks include networking
• Mobile network devices like switch, router, modem, etc. Networking
• Network of computers devices are used to connect multiple computers in
• Airlines, railway, banks, hospitals different settings. For communication, data in a network
networks. is divided into smaller chunks called packets. These
2024-25 2024-25
Internet and Web 139 140 InformatIcs PractIces
2024-25 2024-25
Internet and Web 141 142 InformatIcs PractIces
can be extended up to 30–40 km. Sometimes, many Network User Network User
Network User Network User
LANs are connected together to form MAN, as shown in
Figure 5.4.
Internet
2024-25 2024-25
Internet and Web 143 144 InformatIcs PractIces
2024-25 2024-25
Internet and Web 145 146 InformatIcs PractIces
2024-25 2024-25
Internet and Web 147 148 InformatIcs PractIces
wiring is complex and cabling cost is high in creating 5.4.4 Star Topology
Think and Reflect
such networks, and there are many redundant or In star topology, each communicating device is connected
unutilised connections. How will a bus and to a central node, which is a networking device like a
ring topology behave in
hub or a switch, as shown in Figure 5.15.
case a node is down?
Star topology is considered very effective, efficient
and fast as each device is directly connected with the
central device. Although disturbance in one device
will not affect the rest of the network, any failure in
the central networking device may lead to the failure of
Figure 5.12: A mesh topology complete network.
5.4.2 Ring Topology To build a fully-
In ring topology, each node is connected to two other connected mesh
devices, one each on either side, as shown in Figure topology of n nodes,
5.13. The nodes connected with each other thus form a it requires n(n-1)/2
ring. The link in a ring topology is unidirectional. Thus, wires.
data can be transmitted in one direction only (clockwise Figure 5.15: A star topology
or counterclockwise). The central node can be either a broadcasting device
means data will be transmitted to all the nodes in the
network, or a unicast device means the node can identify
the destination and forward data to that node only.
5.4.5 Tree or Hybrid Topology
It is a hierarchical topology, in which there are multiple
Figure 5.13: A ring topology branches and each branch can have one or more basic
topologies like star, ring and bus. Such topologies are
5.4.3 Bus Topology usually realised in WANs where
In bus topology (Figure 5.14), each communicating multiple LANs are connected.
device connects to a transmission medium, known as Those LANs may be in the form
bus. Data sent from a node are passed on to the bus of ring, bus or star. In Figure
and hence are transmitted to the length of the bus in 5.16, a hybrid topology is shown
both directions. That means data can be received by connecting 4 star topologies
any of the nodes connected to the bus. in bus.
In this type of network, data
transmitted from source first
reaches the centralised device and
Bus
from there the data passes through
Figure 5.16: A hybrid topology every branch where each branch
can have link for more nodes.
Figure 5.14: A bus topology 5.5 the Internet
In this topology, a single backbone wire called bus The Internet is the global network of computing devices
is shared among the nodes, which makes it cheaper including desktop, laptop, servers, tablets, mobile
and easy to maintain. Both ring and bus topologies are phones, other handheld devices as well as peripheral
considered to be less secure and less reliable. devices such as printers, scanners, etc. In addition, it
2024-25 2024-25
Internet and Web 149 150 InformatIcs PractIces
also consists of networking devices such as routers, notes • HTML — HyperText Markup Language or HTML is a
switches, gateways, etc. Today, smart electronic language which is used to design standardised Web
appliances like TV, AC, refrigerator, fan, light, etc., Pages so that the Web contents can be read and
can also communicate through the Internet. The list of understood from any computer across the globe. It
such smart devices are always increasing e.g., drones, uses tags to define the way page content should be
vehicles, door lock, security camera, etc. displayed by the web browser. Basic structure of
The Internet is evolving everyday. Computers every webpage is designed using HTML.
are either connected to a modem through a cable or • URI — Uniform Resource Identifier or URI is a unique
wirelessly (Wi-Fi). A modem, be it wired or wireless, identifier to identify a resource located on the web.
is connected to a local Internet Service Provider (ISP) URI identifies a resource (hardware or software) either
who then connects to a national network. Many such by its location or by its name or by both.
ISPs connect together forming a regional network and
URL is Uniform Resource Locator and provides
regional networks connect together forming a national
the location and mechanism (protocol) to access
network, and such country-wise networks form the
the resource. Examples of URI identifying resources
Internet backbone.
The Internet today is a widespread network, and its using location (i.e., URL) are: https://www.mhrd.gov.
influence is no longer limited to the technical fields of in, http://www.ncert.nic.in, http://www.airindia.
computer communications. It is being used by everyone in, etc. URL is sometimes also called a web address.
in the society as is evident from the increasing use of However, it is not only the domain name, but contains
online tools for education, creativity, entertainment, other information that completes a web address, as
socialisation and e-commerce. depicted below:
Domain Name
5.6 ApplIcAtIons of Internet
http://www.ncert.nic.in/textbook/textbook.htm
Following are some of the broad areas or services
provided through Internet: URL
• The World Wide Web (WWW)
• Electronic mail (Email) In the above URL, http is the protocol name, it can
• Chat be https, http, FTP, Telnet, etc. www is a subdomain.
ncert.nic.in is the domain name.
• Voice Over Internet Protocol (VoIP) Search Engine(s)
Note: These days it is not mandatory to mention protocol
like google.
5.6.1 The World Wide Web (WWW) and subdomain while entering a URL. The browser
co.in, bing.com,
automatically prefixes it.
The World Wide Web (WWW) or web in short, is an duckduckgo.com,
ocean of information, stored in the form of trillions • HTTP — The HyperText Transfer Protocol is a set
in.yahoo.com, etc.,
of interlinked web pages and web resources. The of rules which is used to retrieve linked web pages
can be used to
resources on the web can be shared or accessed through across the web. It’s more secure and advanced version
search and retrieve
the Internet. is HTTPS.
information when
Earlier, to access files residing in different computers, the address of the Many people confuse the web with the Internet.
one had to login individually to each computer through web page is not The Internet as we know is the huge global network
the Internet. Besides, files in different computers were known. of interconnected computers, which may or may not
sometimes in different formats, and it was difficult to have any file or webpage to share with the world.
understand each other’s files and documents. Sir Tim The web on the other hand is the interlinking of a
Berners-Lee — a British computer scientist invented the collection of WebPages on these computers which are
revolutionary World Wide Web in 1990 by defining three accessible over the Internet. WWW today gives users
fundamental technologies that lead to creation of web: access to a vast collection of information created and
2024-25 2024-25
Internet and Web 151 152 InformatIcs PractIces
shared by people across the world. It is today the notes notes forum where multiple people connect to each other,
most popular information retrieval system. to discuss their common interests. Two individuals
can also send messages instantly. The sender types
5.6.2 Electronic Mail (Email)
a message and sends it; the receiver immediately
Email is the short form of electronic mail. It is one of receives the message and can read and revert through
the ways of sending and receiving message(s) using the text message. All this happens in real time, as if the
Internet. An email can be sent anytime to any number sender and receiver were sitting in the same place. For
of recipients at anywhere. The message can be either a successful chat session, the communicating parties
text entered directly onto the email application or an should be online simultaneously, and use the same
attached file (text, image audio, video, etc.) stored on chat application.
a secondary storage. An existing file can be sent as an With ever increasing internet speed, it is now possible
attachment with the email, so no need to type it again. to send image, document, audio, video as well through
To use email service, one needs to register with an instant messengers. It means, the communicating
email service provider by creating a mail account. These parties can talk to each other through an audio call or
services may be free or paid. Some of the popular email through a video call. Moreover, it is also possible to chat
service providers are Google (gmail), Yahoo (yahoo mail), through text, audio and video in a group. Thus, we can
Microsoft (outlook), etc. However, many organisations have group chat or group calls.
nowadays get customised business email addresses for Applications such as WhatsApp, Slack, Skype, Yahoo
their staff using their own domain name. For example, Messenger, Google Talk, Facebook Messenger, Google
[email protected]. Hangout, etc., are examples of instant messengers.
Following are some of the common facilities available Some of these applications support instant messaging
for an email user: through all the modes — text, audio and video.
1. Creating an email, attaching files with an email,
5.6.4 VoIP
saving an email as draft for mailing later. Creating
email is also termed as composing. Voice over Internet Protocol or VoIP, allows us to have
2. Sending and receiving mail. Same email can be sent voice call (telephone service) over the Internet, i.e., the
to multiple email addresses, simultaneously. voice transmission over a computer network rather
3. Sending the copy of mail, as carbon copy (cc) or than through the regular telephone network. It is also
known as Internet Telephony or Broadband Telephony.
blind carbon copy (bcc).
But to avail the phone service over the Internet, we
4. Forwarding a received email to other user(s)
need to have an Internet connection with reasonably
5. Filtering spam emails
good speed.
6. Organising email in folders and sub folders
VoIP works on the simple principle of converting the
7. Creating and managing email ids of the people you analogue voice signals into digital and then transmitting
know. them over the broadband line. There are two major
8. Setting signature/footer to be inserted automatically advantages of a VoIP—
at the end of each email • These services are either free or very economical,
9. Printing emails using a printer or saving as files. so people use them to save on cost. That is why
10. Searching emails using email address or email these days even international calls are being made
subject text using VoIP.
5.6.3 Chat • VoIP call(s) can be received and made using IP phones
from any place having Internet access. Hence, VoIP
Chatting or Instant Messaging (IM) over the Internet has increased the portability and functionality of the
means communicating to people at different geographic voice calling system. Incoming phone calls can be
locations in real time through text message(s). It is a
2024-25 2024-25
Internet and Web 153 154 InformatIcs PractIces
automatically routed to the VoIP phone as soon as it notes • Selling products and delivering services
is connected to the Internet. • Posting and finding information on the internet
The only disadvantage of VoIP is that its call quality is • Communicating with each other
dependent on Internet connection speed. Slow Internet • Entertainment purposes
connection will lead to poor quality voice calls.
• Disseminating contents and software
5.7 websIte
5.8 web pAge
Each one of us might have visited one or the other
A web page (also referred to as a page) is a document
website. A website in general contains information
on the WWW that is viewed in a web browser. Basic
organised in multiple pages about an organisation. A
structure of a web page is created using HTML (HyperText
website can also be created for a particular purpose,
Markup Language) and CSS (Cascaded Style Sheet). A
theme or to provide a service.
web page is usually a part of a website and may contain
A website (usually referred to as a site in short) is a
information in different forms, such as:
collection of web pages related through hyperlinks, and
saved on a web server. A visitor navigates from one page
Activity 5.4 ● text in the form of paragraphs, lists, tables, etc.
to another by clicking on hyperlinks. Also, all the pages Visit NCERT, SWAYAM ● images
of a website are integrated under one domain name
or any other website ● audio
and have a common theme and template. For example,
and note down URLs ● video
of some of the specific
the website of NCERT will have all the pages related ● software application
pages of that website.
to NCERT, viz., textbooks, syllabus, events, resource ● other interactive contents
materials, etc., under one domain name and having a Additionally, various styling and formatting are
common design theme. To access a website, one has applied on a web page to make it attractive and organised.
to type the address of the website (URL) in the address Further, program codes called scripts are used to define
bar of a browser, and press enter. The home page of the the manner in which the page will behave on different
website will be displayed. actions. Scripts make a web page interactive. JavaScript
is the most popular and commonly used scripting
5.7.1 Purpose of a Website language. However, Python and PHP are also used to
We are living in an Internet era where the whole world apply scripting on a web page.
is connected. A website’s purpose is to make the The first page of the website is called a home page.
information available to people at large. For example, a It generally contains information and links to all the
company might like to advertise or sell its products, a related web pages. Each web page has a unique address
government organisation may like to publish circulars, that is visible on the address bar. Hence if we want to
float tenders, invite applications or get feedback from view a particular web page, its address has to be typed in
various stakeholders. A website is a means that helps the address bar of the browser. The web pages that are
to communicate with people in a specific, transparent linked to form a website share a unique domain name.
and user friendly manner. Therefore, while developing For example, https://swayam.gov.in/ is a website by
a website, the first question to ask is why the website is the Government of India to deliver online courses for
being created, and what should be its pages so that it School, College and University students and teachers. It
serves the required purpose. is a collection of multiple web pages that link to different
Basically, a website should be user friendly and courses related information.
provide information to users with minimum efforts. A 5.8.1 Static and Dynamic Web Pages
website should be designed keeping in mind different
categories of people that will be visiting the site. Some of A web page can be static or dynamic. A static webpage
the common purposes for which websites are designed is one whose content always remains static, i.e., does
are listed below: not change for person to person. When a web server
2024-25 2024-25
Internet and Web 155 156 InformatIcs PractIces
receives a request (from browser) for a static web page, STEP 2: Calls
it just locates the page on its storage media and sends an application
it to the browser of the client. No additional processing program in
is performed on the page. Hence, a static web page response to the
remains the same for all users until someone changes
HTTP request.
its code manually.
Static web pages are generally written in HTML,
STEP 1: HTTP Request
JavaScript and/or CSS and have the extension .htm Web Web
or .html. Browser Browser
STEP 4: HTTP Response
STEP 1: HTTP Request
Web Web
STEP 3: The
Browser Browser program
STEP 2: HTTP Response executes and
produces
HTML output.
Figure 5.17: Working of a static web page Figure 5.18: Working of a dynamic web page
2024-25 2024-25
Internet and Web 157 158 InformatIcs PractIces
the error message (Error 404 – page not found) to the • Upload the files in properly organised folders on the
client’s browser. allocated space.
• Get domain name mapped to the IP address of the
5.10 Hosting of a Website web server.
Web hosting is a service that allows us to put a website The domain name system (DNS) is a service that
or a web page onto the Internet, and make it a part of does the mapping between domain name and IP
the World Wide Web. Once a website is created using a address. When the address of a website is entered in a
hardware server, we need to connect it to the Internet browser, the DNS finds out the IP address of the server
so that users across the globe can access. On the other corresponding to the requested domain name and sends
hand, we can rent server resources (CPU, RAM, and the request to that server.
Activity 5.5
storage) from a cloud service provider and host our locally
created website there. This is done by uploading the Find out some of the 5.11 Browser
files constituting the website (HTML, CSS, JavaScript, Web hosting service
A browser is a software application that helps us to view
images, databases, etc.) from the local computer onto providers from both the web page(s). In other words, it helps us to view the
the space allocated on the server. For this, we have categories — free data or information that is retrieved from various web
to avail the services of a web hosting service provider. and paid. servers on the Internet. Some of the commonly used web
These services for using the server’s resources such as browsers are Google Chrome, Internet Explorer, Mozilla
RAM, hard disk, bandwidth, etc., are usually paid and Firefox, Opera, etc. A web browser essentially displays
these resources can be increased or decreased as per the HTML documents which may include text, images,
the loads on the website. audio, video and hyperlinks that help to navigate from
A web server whether it is a local server or a cloud one web page to another.
server when connected to the Internet is assigned
a unique numeric address on the Internet called IP
address. This IP address needs to be mapped to a
textual name called domain name of the website. This
is because it is not convenient for users to remember a
numeric IP address. Thus, for accessing a website, the
user enters the domain through a browser (URL). The
Mozilla Microsoft Google
Firefox Internet Chrome
domain name has to be registered (purchased) with an rer
Explorer
authorised agency.
5.10.1 How to host a website?
To host a website, follow the steps given below:
• Select the web hosting service provider that will provide
the web server space as well as related technologies
and services such as database, bandwidth, data
backup, firewall support, email service, etc. This has Opera Apple
to be done keeping in mind the features and services Mosaic was the Safari
that we want to offer through our website. first web browser
Figure 5.19: Some commonly used browsers
developed by the
• Identify a domain name, which best suits our
National Centre for The initial web browsers like Mosaic used to support
requirement, and get it registered through domain
Supercomputing HTML documents containing plain text (static website)
name Registrar.
Application (NCSA). only, but nowadays with the advancement of technology,
• Once we get web space, create logins with appropriate modern web browsers allow us to view interactive and
rights and note down IP address to manage web space.
2024-25 2024-25
Internet and Web 159 160 InformatIcs PractIces
2024-25 2024-25
Internet and Web 161 162 InformatIcs PractIces
Sync Panel: This panel contains options to set up and To add an extension, click the Options button on
manage a Firefox account which is needed to access all the top right corner of the browser and select the Add-
services given by Mozilla. ons option. Click the Extensions Panel option on the
Make the desired settings and close the browser left. On the right, options to Manage your Extensions
settings window. The changes made in the browser will appear. There will be a list of enabled, disabled and
settings will be applied. Think and Reflect recommended extensions. Make the desired selections
Can we compare Add- and close the add-ons window.
5.11.2 Add-Ons and Plug-ins
ons and Plug-ins with Similarly, to add plug-ins, click Plug-ins options on
Add-ons and plug-ins are the tools that help to extend utility software? the left side of the browser window. Make the desired
and modify the functionality of the browser. Both the selections to enable or disable the required plug-ins.
tools boost the performance of the browser, but are
different from each other. 5.11.3 Cookies
A plug-in is a complete program or may be a A cookie is a text file, containing a string of information,
third-party software. For example, Flash and Java are which is transferred by the website to the browser when
plug-ins. A Flash player is required to play a video in we browse it. This string of information gets stored in the
the browser. A plug-in is a software that is installed on First cookie form of a text file in the browser. The information stored
the host computer and can be used by the browser for software was is retransmitted to the server to recognise the user, by
multiple functionalities and can even be used by other created in 1994 identifying pages that were visited, choices that were
applications as well. at Netscape, made while browsing various menu(s) on a particular
for determining
On the other hand, an add-on is not a complete program whether the person
website. It helps in customising the information that
and so is used to add only a particular functionality to is a first time visitor will be displayed, for example the choice of language for
the browser. An add-on is also referred to as extension in or a re-visitor of browsing, allowing the user to auto login, remembering
some browsers. Adding the functionality of a sound and their site. the shopping preference, displaying advertisements of
graphics card is an example of an add-on. one’s interest, etc.
Cookies are usually harmless and they can’t access
information from the hard disk of a user or transmit
virus or malware. It is the browser on our computer
which stores and manages the cookies. However,
viruses can also be tricked as cookies and cause harm
to a computer. One can disable cookies by changing the
Privacy and Security settings of our browser.
S ummary
• A group of two or more similar things or people
interconnected with each other is called network
• A computer network is an interconnection
among two or more computers to share data and
resources.
• Devices in a network can be connected either
Figure 5.22: Add-ons and plug-ins
through wired or wireless media.
2024-25 2024-25
Internet and Web 163 164 InformatIcs PractIces
notes notes
• Based on the geographical area covered and data • In tree topology, multiple star and bus topologies
transfer rate, computer networks are broadly are connected to a central cable, also called the
categorised as LAN, MAN and WAN. backbone of the network.
• The protocol or the set of rules that decide • In mesh topology, each communicating device is
functioning of a LAN is called Ethernet. connected with every other device in the network.
• Local Area Network (LAN) is a network that • The Internet is the largest WAN that connects
connects digital devices placed at a limited millions of computers across the globe.
distance of upto 1 km. • Some of the services provided through the Internet
• Metropolitan Area Network (MAN) is an extended are information sharing, communication, data
form of LAN which covers a larger geographical transfer, social networking, e-commerce, etc.
area like a city or a town. • A Uniform Resource Locator (URL) is a standard
• Wide Area Network (WAN) connects computers and naming convention used for accessing resources
other LANs and MANs, which are spread across over the Internet.
different geographical locations of a country or in • Electronic mail is a means of sending and receiving
different countries or continents. message(s) through the Internet.
• A repeater is an electronic device that receives a • Chatting is communicating in real time using text
weak signal and regenerates it. message(s).
• Modem (MOdulator DEMolulator) refers to any • Voice over Internet Protocol (VoIP) allows you to
such device used for conversion between analog have voice calls over digital networks.
signals and digital bits. • A website is a collection of related web pages.
• A hub is a network device used to connect • A web page is a document that is viewed in a web
multiple devices to form a network or to connect browser such as Google Chrome, Mozilla Firefox,
segment(s) of LAN. Opera, Internet Explorer, etc. It can be static or
• A switch is a networking device that filters network dynamic.
traffic while connecting multiple computers or • A static web page is one whose content does not
communicating devices. change for requests made by different people.
• A router is a network device that can receive the • A dynamic web page is one in which the content
data, analyse it and transmit to other networks. of the web page displayed is different for different
• A gateway is a device that connects the users.
organisation’s network with the outside world of • A web server is a program or a computer that
the Internet. provides services to other programs or computers
• The physical organisation of computers, cables called clients.
and other peripherals in a network is called its • Web hosting is a service that allows you to post
topology. Common network topologies are Bus, the website created locally so that it is available
Star, Tree, Mesh, etc. for all internet users across the globe.
• In bus topology, each communicating device • Every browser has got certain settings that define
connects to a common central transmission the manner in which the browser will behave.
medium, known as bus. These settings may be with respect to privacy,
• In star topology, each communicating device is search engine preferences, download options,
connected to a central node, which is a networking auto signature, autofill and autocomplete feature
device like a hub or a switch, through separate and much more.
cables.
2024-25 2024-25
Internet and Web 165 166 InformatIcs PractIces
2024-25 2024-25
noTes 12.2 Malware
apter Malware is a short term used for MALicious softWARE.
Ch It is any software developed with an intention to damage
hardware devices, steal data, or cause any other trouble
12 Security Aspects
to the user. Various types of malware have been created
from time-to-time, and large-scale damages have been
inflicted. Many of these malware programs have been
identified and counter measures have been initiated.
However, different types of malware keep on coming on a
regular basis that compromise the security of computer
systems and cause intangible damages. Besides, each
year, malware incur financial damages worth billions
of dollars worldwide. Viruses, Worms, Ransomware,
Trojans, and Spyware are some of the kinds of malware.
“Treat your password like your
12.2.1 Virus
toothbrush. Don't let anybody else use it,
and get a new one every six months.” The term computer virus was coined by Fred Cohen in
1985 and has been borrowed from biological science
with almost similar meaning and behavior, the only
— Clifford Stoll difference is that the victim is a computer system and
the virus is a malicious software. A virus is a piece of
software code created to perform malicious activities
In this Chapter and hamper resources of a computer system like CPU
time, memory, personal files, or sensitive information.
» Threats and Prevention Mimicking the behaviour of a biological virus, the
» Malware computer virus spreads on contact with another system,
» Antivirus i.e. a computer virus infects other computer systems
12.1 ThreaTs and PrevenTion that it comes into contact with by copying or inserting
» Spam
its code into the computer programs or software
» HTTP vs HTTPS Being alone is the most ideal situation for an (executable files). A virus remains dormant on a system
» Firewall individual in terms of security. It applies to and is activated as soon as the infected file is opened
» Cookies computers as well. A computer with no link to (executed) by a user.
an external device or computer is free from the Viruses behave differently, depending upon the
» Hackers and Crackers
security threats arising otherwise. However, reason or motivation behind their creation. Some of
» Network Security Threats it is not an ideal solution for a human being the most common intentions or motives behind viruses
or a computer to stay aloof in order to mitigate include stealing passwords or data, corrupting files,
any security threats, as the world at present spamming the user’s email contacts, and even taking
is on its way to become fully connected. This control of the user’s machine. Some well-known viruses
connectedness of various devices and computers include CryptoLocker, ILOVEYOU, MyDoom, Sasser
has brought into our focus the various network and Netsky, Slammer, Stuxnet, etc.
threats and its prevention.
Network security is concerned with protection 12.2.2 Worms
of our device as well as data from illegitimate access The Worm is also a malware that incurs unexpected or
or misuse. Threats include all the ways in which damaging behaviour on an infected computer system.
one can exploit any vulnerability or weakness in The major difference between a worm and a virus is that
a network or communication system in order to
cause harm or damage one’s reputation.
224 Computer SCienCe - ClaSS Xii
2024-25 2024-25
unlike a virus, a worm does not need a host program or noTes noTes the concept, a Trojan is a malware, that looks like a
software to insert its code into. Worms are standalone legitimate software and once it tricks a user into installing
programs that are capable of working on its own. Also, it, it acts pretty much like a virus or worm. However,
a virus needs human triggering for replication (i.e. when a Trojan does not self-replicate or infect other files, it
a user opens/executes the infected file), while a worm spreads through user interaction such as opening an
replicates on its own and can spread to other computers email attachment or downloading and executing a file
through the network. Some prominent examples of from the Internet. Some Trojans create backdoors to
worms include Storm Worm, Sobig, MSBlast, Code Red, give malicious users access to the system.
Nimda, Morris Worm, etc.
12.2.3 Ransomware
It is a type of malware that targets user data. It
either blocks the user from accessing their own data
or threatens to publish the personal data online and
demands ransom payment against the same. Some
ransomware simply block the access to the data while
others encrypt data making it very difficult to access.
In May 2017, a ransomware WannaCry infected almost
200,000 computers across 150 countries. It worked by
encrypting data and demanding ransom payments in
the Bitcoin cryptocurrency. It literally made its victims
“cry” and hence the name.
12.2.5 Spyware
It is a type of malware that spies on a person or an
organisation by gathering information about them,
without the knowledge of the user. It records and sends
the collected information to an external entity without
consent or knowledge of the user.
Spyware usually tracks internet usage data and sells
them to advertisers. They can also be used to track and
capture credit card or bank account information, login
and password information or user’s personal identity.
12.2.6 Adware
An Adware is a malware that is created to generate
Figure 12.1: A ransomware revenue for its developer. An adware displays
online advertisements using pop-ups, web pages, or
12.2.4 Trojan installation screens. Once an adware has infected a
Since the ancient Greeks could not infiltrate the city substantial number of computer systems, it generates
of Troy using traditional warfare methods, they gifted revenue either by displaying advertisements or using
the king of Troy with a big wooden horse with hidden “pay per click” mechanism to charge its clients against
soldiers inside and eventually defeated them. Borrowing the number of clicks on their displayed ads. Adware
(A) Online Virtual Keyboard Vs On-Screen Keyboard 12.2.8 Modes of Malware distribution
The names “on-screen” and “virtual” keyboard refer to A malware once designed, can take many routes to
any software-based keyboard and are sometimes used reach your computer. Some of the common distribution
interchangeably. But, there exists a notable difference channels for malware are:
between “on-screen” and “online virtual” keyboards. • Downloaded from the Internet: Most of the time,
Both types of keyboards may look the same, but the malware is unintentionally downloaded into the
difference is in terms of the layout or ordering of the hard drive of a computer by the user. Of course, the
keys. The on-screen keyboard of an operating system malware designers are smart enough to disguise
uses a fixed QWERTY key layout (Figure 12.3), which their malware, but we should be very careful while
can be exploited by sophisticated keylogger software. downloading files from the Internet (especially those
However, an online virtual keyboard randomises the highlighted as free stuff).
key layout every time it is used (Figure 12.4), thereby
• Spam Email: We often receive an unsolicited email
making it very difficult for a keylogger software to know
with embedded hyperlinks or attachment files. These
or record the key(s) pressed by the user.
links or attached files can be malware.
• Removable Storage Devices: Often, the replicating
malware targets the removable storage media
like pen drives, SSD cards, music players, mobile
phones, etc. and infect them with malware that
gets transferred to other systems that they are
plugged into.
• Network Propagation: Some malware like Worms
have the ability to propagate from one computer to
another through a network connection.
•
11
00
000
user data.
11
11
•
11
01
01
01
11
11
000 Ransomware either blocks the user from
10101
accessing their own data or threatens to publish
01