Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views5 pages

Computer System and Networking Notes

Find answer of networking and computer system for handwriting notes

Uploaded by

kidsfuntoostv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

Computer System and Networking Notes

Find answer of networking and computer system for handwriting notes

Uploaded by

kidsfuntoostv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

PART-I: BASICS OF COMPUTER SYSTEM

# 1. Input Devices, Output Devices


Input Devices** are hardware used to send data to a computer. Examples:

Keyboard**: For typing.

Mouse**: For selecting/clicking.

Scanner**: For digitizing documents.

Webcam**: For capturing video.

Output Devices** are used to display or project data from the computer. Examples:

Monitor**: Displays the graphical output.

Printer**: Produces physical copies of documents.

Speakers**: Output sound.

# 2. CPU, Memory Devices, ALU, Registers


CPU (Central Processing Unit)**: Brain of the computer. Executes instructions.

Memory Devices**:

- **RAM**: Temporary memory, volatile.

- **ROM**: Permanent, non-volatile.

ALU (Arithmetic Logic Unit)**: Performs arithmetic and logical operations.

Registers**: Small storage units inside CPU used for quick data access.

# 3. Computer System Organisation


A computer system is organized into:

Input Unit**: Devices like keyboard, mouse.

Storage Unit**: RAM, ROM, Hard Drives.

Processing Unit**: CPU with ALU and CU.

Output Unit**: Monitor, Printer.

# 4. Security Software (Antivirus etc.)


Antivirus software detects and removes malware. Examples:

Windows Defender
McAfee

Quick Heal

Functions include scanning files, blocking threats, and quarantining viruses.

# 5. JAP-3903 (2018) Cyber Security Policy


A government-issued policy for securing digital infrastructure:

Guidelines for secure password usage.

Software updates, user access management.

Incident response protocols.

# 6. IT Instructions on Software Development Process


Covers:

SDLC (Software Development Life Cycle)**: Requirements, design, coding, testing, maintenance.

Coding Standards

Version Control**: Using Git.

# 7. Safety Precautions and Handling


Use **antistatic wristbands** while handling components.

Do not open PC when plugged in.

Handle hard drives with care.

Keep systems clean and dust-free.

# 8. Low Level and High Level Language


Low Level**: Close to hardware. E.g., Assembly Language.

High Level**: User-friendly. E.g., Python, Java.

# 9. Compilers and Interpreters; Parts of Operating System


Compiler**: Converts full program to machine code at once. E.g., C compiler.

Interpreter**: Converts and executes line-by-line. E.g., Python interpreter.

Parts of OS**:

Kernel
Shell

File System

Device Drivers

# 10. Operating System Objectives and Functions


Manage hardware and software.

Handle input/output.

Provide UI (User Interface).

File management, memory management, security.

# 11. Multitasking, Time Sharing


Multitasking**: Running multiple programs simultaneously.

Time Sharing**: CPU time divided among users.

Example: A mainframe serving multiple terminals.

# 12. Vayusevak OS
A customized OS used in specific Indian government or defense systems.

Focus on secure, simplified user interfaces for administrative use.

PART-II: SYSTEM SPECIFIC

# Hardware

1. Installation of PC, Peripherals


PC Setup**: Connect motherboard, CPU, RAM, HDD/SSD.

Connect peripherals: Monitor, Keyboard, Mouse, Printer.

2. Installation of OS and Software


Boot from USB/DVD.
Follow OS installation steps (Windows/Linux).

Install drivers, security patches, and applications like MS Office.

3. Common Faults and Diagnosis


No display**: Check RAM, cables.

Boot failure**: Check BIOS settings.

Overheating**: Clean fans, apply thermal paste.

Use tools: MemTest, HDD Regenerator.

4. Policy on IT Asset Management


Maintain hardware lifecycle documents.

Approve upgrades/downgrades through IT admin.

Data sanitization before disposal.

# Networking

5. Overview: LAN, VLAN, CAN, MAN, WAN, Internet, Intranet


LAN**: Local area network (e.g., office).

VLAN**: Virtual LAN-segregates networks.

CAN**: Campus area network.

MAN**: City-wide network.

WAN**: Wide area network-covers countries.

Internet**: Global network.

Intranet**: Internal organizational network.

6. Network Hardware
Server**: Central machine for data/services.

Client**: Access services from server.

Node**: Any device on network.

Switch**: Connects devices in LAN.


Router**: Connects networks.

Cables**: UTP/STP, Coaxial.

Crimping**: RJ45 connector setup.

7. Transmission Media & Topologies


Cables**:

- UTP: Unshielded twisted pair.

- STP: Shielded.

- Coaxial: TV cable.

Connectors**: RJ45, RJ11.

Topologies**:

- **Bus**: One main cable.

- **Star**: Devices connected to a central hub.

- **Ring**: Circular data flow.

- **Mesh**: Every device connected to every other.

8. Protocols and Services


HTTP/HTTPS**: Web protocols.

FTP**: File transfer.

DNS**: Domain name resolution.

TCP/IP**: Core internet protocol.

OSI Model**: 7-layer architecture.

Proxy**: Acts as intermediary.

VPN**: Secure remote access.

Subnetting**: Divides IP ranges.

IP Addressing**: IPv4/IPv6 for unique identification.

This document provides foundational and advanced knowledge for working with computer systems and

networks. Examples are real-world and relatable, suitable for both learning and practical application.

You might also like