www.muhammadniaz.blogspot.com computer science xi
TRANSCRIPT
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
1/17
Hardware Software(1)It is the Physical Components of a
Computer System.
(2)Hardware is Manufactured.
(3)It is Physical in Nature.(4)Duplication from the Original is
Not Possible.
(1) It is the very large Computer
Program or It is a set of many
Programs.
(2)It is Developed.
(3)It is Non Physical in Nature.(4)Duplication from the Original is
Possible.
Software
Operating System:-
Software used to manage Hardware and software Resources.Compiler & Interpreter:-It is the software that Translate high-level language into low-
level language.
Linker:-It is software that is used to attach Pre-Defined Translated Code
in a Program to Produced Executables file.
Source Program:-The Code we Type in a Computer Language Program is called
Source Program.
OR
High Level Language Code we Type in an IDE (Integrated
Development Environment)
System Software Applications Software
Operating System
Compiler
Interpreter
Linker
Assembler
MS WORD
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
2/17
Object Program:-It is the Program with Comes in Machine Language from after
Translation of Source Program.
ORTranslated (Complied) Version of Source Program.
Executable:-The Complied and Library Code Intended Version of program
is Called Executable program.
Input DeviceDevice that are used to take data Input into the Computer
Memory. Example Key Board, Mouse, Toy Stick, Scanner Light Pen Exc.
Mouse:-It is a small Assembly which keep Two, Three button and a
Digital Circuitry to Navigate. Pointer over the Screen Area.
Some Mouse Keep is Roiling Mechanism to Navigate Cursor while
same keep Optical Mechanism.
WorkingWhen the Mouse button is pressed a signal is sent to the Computer for
the Corresponding Screen Position. The Mouse is accepted by the Computer
and the Application to do Corresponding Action.
Mouse Clicking Types(I) Left Click
(II) Right Click(III) Double Click
(I) Left ClickPressing of Left Mouse button is called Left Click.
(II) Right Click
Pressing of Right Mouse button is called Right Click.
(III) Double ClickThe Pressing of Left Mouse Button Twice is a Rapid Succession.
Keyboard:-It is an assembly that continues Number Button (Key)
corresponding to Different types of data and action input into the memory of
a Computer.
Key are Grouped together in a special manner and their Grouping are
as follow.
1.Character Key Pad (A to Z, a to z, Symbol)
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
3/17
2.Numeric Key Pad (0 to 9)
3.Functions Key Pad (F1 to F12)
4.Screen Navigate Key Pad ( )5.Special Function Key Pad (Tab, Ctrl, Alt)
Working
When a key is pressed it is Corresponding ASCII Code is send in a
Memory Buffer than the contents of Buffer is sent to R.A.M.
Software Development Process/ Life Cycle
System Development:-System is the computerized solution for a set of Problem of an
organization or a group of persons.
Its development is divided mainly into four phases;
A.Analysis
B.Design
C.Coding
D.Testing & Maintenance
(A) Analysis:-
This is the first Phase in which following major tasks are done.
1. Meeting with Client.
2. Finding all existing problems.
3. Selecting subset of problem that can be solved through computer.(B) Design Phase:-
In this phase we deal with following Task are performed here;
1. Designing of Algorithms and flow Charts.
2. Determination of inputs, procedures, filing method and outputs.
(C) Coding:-
It is simply the typing of source program in a Selected IDE.
(D) Testing & Maintenance:-
In testing we check for verification and validation of program.
Verification is the functionality check whether the program is running or not
validation is the achievement of desired level of accuracy and precision. In
Maintenance we perform following tasks;
1. Delivery of system to client.
2. Software/Hardware Changes are made.
3. Training of end users.
4. Away of doing tasks.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
4/17
Networking
Networking:--The Interconnection of Hardware resources to Share resources.
Topology:--The art of Physical Connection of Computers to form a Network.
Node:--A Physical Device or Computer on a Network.
Server:--A Computer that services its resources and Application.
Client:--A Computer or Node that request for the Services.
Types of Topology:--1. Bus Topology2. Star Topology3. Ring Topology4. Ring Topology
Bus Topology:--
In Bus on all the Node are connected to the main Bus (Group of Wire)
At ends High Value residences are connected to signal lows.
Working:-
The Communication in the Bus Topology is slow due to a single port.
At a time only two Node can either Transfer or received data. No either
Transmition can take Place during a Communication Return two Nodes.
Advantages:-
1. Easy to build.2. Suitable for work group.
3. Low building cost.
Disadvantages:-
1. It is very slow Topology for Network Communication.
2. If a main Bus is Broken or a Node Expire, the whole Network Collapse.
3. To add new node, the network has to be stop.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
5/17
Star Topology:--
In Star Topology All the Nodes are connected to a Central Node
(HUB/Switch). It is sample to construct but it is costly. Hub can be Active or
Passive. The Active Hub Required a Power supply so that it can regenerate
in coming signal. Passive Hub do not required a Power supply.Working:-The Data from a Node is first sent to Central Node then it is routed.
Advantages:-
1. It is easy to build.
2. New user can be entering without stopping whole Network.
3. If any single Node Expire the networks remain operating.
Disadvantages:-
1. It is costly Topology.
2. If a Central Node expired the whole Network Collapse.
Ring Topology:--
In Ring Topology, Every Node is connected physically to its two
neighboring Node to from a circular Pattern called Ring. In Electronic
privilege called Token.
Working:-The Token Circulator in either Clock-wise, Anti Clock-wise Direction.
Node attaches massage to the token with Destination I.D and other
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
6/17
information. The Token is then passed to the Neighboring Node the
Neighbor checks the massage in the token and it accept or reject the take it.
It can also attach a new massage the token and the distributions of data take
place due to circulating token or tokens.
Advantages:-
1. It is easy to build.
2. It is low in cost.
3. It is easy to maintain.
Disadvantages:-
1. It a single Node Expire the whole Network Collapse.
2. The Network has to be stop for enter a new user/Node.
3. It the Number of Node increase the Network be come slow.
Mesh Topology:--
In this Topology every Node is individually connected to every other
on the Network. It is a costly Network but Reliable. Data Communicationcan be Perform through more than one Route.
Advantages:-
1. There is no chance of data collision.
2. Most Reliable Network Topology.
Disadvantages:-
1. It is very costly.
2. It is time Consuming to build and Difficult maintains.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
7/17
Types of etworkThe Network is categorized basically into 4 types.
1. Local Area Network (LAN)
2. Wild Area Network (WAN)3. Metropolitan Area Network (MAN)
4. Global Area Network (GAP)
(1) Local Area Network (LAN):-It is a Network that is confine within geographical area of one squire
Kilometer.
Example:-
A Computer Network in a building or group of buildingextra
It is the faster Communication Network that is owned by a person or a
group of person.It is easy to minuteness and incorporate few Networking devices.
(2) Wild Area Network (WAN):-This Network is extended geographically ever more than 1KM
distance. It can cover many buildings and mach area of the city It user both
Networking and internetworking devices. It cant be Owen by a person it is
10 time Slower than Local Area Network. Many Protocols are used and so
the gateway is used to form Wild Area Network.
(3) Metropolitan Area Network (MAN):-This Network is extended across entire city. It is much bigger than
WAN and it used Telephone line as well and Telephone exchange service
for building communication link.
(4) Global Area Network (GAP):-This Network is extended across the entire global and it covered all
sold devices, topology, Links and services to from global Area Network.
There much is single topology so that information can uniformally beexchange ever the world.
Example:-
Internet uses
Transportation control protocol /Internet Protocol (TCO/IP).
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
8/17
Networking:--Networking Devices are used for two purposes
1. To build a Network.2. To extend the Network.
These exude LAN Card, Switches, Hub, repeater, cables and Bridge.
Inter networking:--Inter Networking Devices are used to link to deformfan
Types of Inter Networking Devices these are Router, Booster, Gateway,
CSU, DSC extra
( )
Network Operating System:--An Operating System that manages the resources of every Node on the
Network is called Network Operating System.Example:-
UNIX, Linux, Windows NT (New Technology)
The server Computer is the Real Place for NOS.
Protocol:--Protocols are the rule and resolution to convey information from one
Computer to another. Some protocols are routable and same are not.
Protocols are installing as standard for information exchange on every Node
on the Network. There are install on client side and on sever side.Example:--
NA, NET, BUE, IE, TCP/IP Groper FTP extraMedia:--
There are two types of media
(1)wires media(2)Wireless
Wires Media:--
In wires media we used toasted cable, to estate cable, coaxial cable and
optical fibber.Wireless Media:--
In wireless media we used redo value microbes and seta light System.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
9/17
OSI Model:-- (open system interconnection)
It is a model proposed by a comate to define the standard to establish
and manage a Computer Network.It defines protocols for every single tastes and group, than protocol in the
form of layers every layer is categorized difficultly due to its nature of work.
Following are the OSI layers
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer7. Application Layer
1. Physical Layer:--This Layer due all the physical issues of the Network Topology Cable,
Represent of Data encoding, decoding, Number of pens in a connector and
Network Devices are the men issues solve.
2. Data link Layer:--This Layer is Responsible for establishing a single link between to
Node it manages and Inlay terminates that link. The Data is broken in to
small Data picket and CRCO is imposed.3. Network Layer:--
This Layer is responsible for managing all links between source and
destination Computer. It is responsible for making correct routing decision.
4. Transport Layer:--This Layer is responsible for transporting Data packets across different
types of Network in a reliable and error-free manner.
5. Session Layer:--This Layer is responsible for building a session (A Communication
Channels) between two Applications running on different Nodes on a
Network. It establishes the session and transported after the communication
ends.
6. Presentation Layer:--This Layer is responsible for transforming the transportable form of
Data in to use able form and wise ware.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
10/17
7. Application Layer:--This Layer is used to serve services to Network like email services,
file transport services, chatting services, video confessing services.
Networking Devices:--Devices that are used to create and extend a single Network are called
Networking Devices.
Example:--
HUB, switch, repeater, bridge and ether Net card /LAN Card
1. LAN Card :--( Network Adapter/ether Net Card)
This is Hardware card install client side and it Casper UNIX IP
address. This makes the Node dusting disable on a Network for
communication.
2. HUB/Switch:--
It is a central Node of a Network that provides connective among all
Node It may be Active (Requiring a Power Supply) or It may be passive(Does not Requiring compare supply) which is similar to HUB but is farmer
indigent as it can take write design for the Network.
Data Communication Modal:--
Source:--A Point where the Data is first originated
Modulator:--A device that mixes the low frequency data with the carrier high
frequency during sending of data
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
11/17
Transmitter:--A device that increases the gain of modulated signal so that it can be
transmitted to long distances
Transmission Media:--It is an entity that carries the data signal from source to destination.
Point:--It is divided into two types
(A)Wires Media (Twisted pair, curial cable, Optical fiber )(B)Wireless Media (Radio waves, microwaves, FM Satellite)
Receiver:--
A cirevit that catches the weak incoming signal and amplitude ofsignal is amplified.
Demodulator:--A device that separate the low frequency signal from the high
frequency carrier wave
Destination:--A point where the data is to be reached finally
Types of Data(A)Analog Data (Continuous(point) wave from signal element)(B)Digital Data (Discrete(whole (number) wave from signal element)
Encoding:--Transformation of one form of signal into another form of signal
Types of Encoding:--
(A)Digital to Digital Encoding(B)Digital to Analog Encoding(C)Analog to Analog Encoding(D)Analog to Digital Encoding
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
12/17
Digital to Digital Encoding:--In this type of encoding the input Digital signal is transformed into
another form of Digital signal.
Digital to Analog Encoding:--
In this type of encoding the input Digital signal is transformed intoanother form of Analog signal.
Analog to Analog Encoding:--Here input signals an analog wave form while the output signal is also
an Analog Signal.
Example are ASK, FSK, and PSK modulation.
Analog to digital Encoding:--
Here input signals an analog wave form while the output signal is alsoa Digital Signal.
Examples are Pulse Code, Delta Modulation.
Wires MediaMedia:--
Entities that convey energy from one place to another wires media
include mainly three types of wires;1. Twisted Pair2. Coaxial Cable3. Optical Fiber1.Twisted Pair wire:--
It is a group of two insulated wires that are twisted together to cancel
the effect of inductions in the wires conveying data signal. They are covered
by an outer covering for strength and protection.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
13/17
2.Coaxial Cable:--
Here two wires runs side by side in such a way that the main inner
conductor is in the center (axial) and the second outer Conductor is around
the axial and absorbing any leak radiation from both in and outside of
conductor. It is used for high frequency transmission.
3.Optical Fiber:--
It is a fiber of light conducting material its inner central region is of
high density and the outer region is of low density. Light travels in denser
median and remain travels in it due to total internal reflection signal of very
high frequency is transmitted through optical fiber.
Multiplexing Playing:--It is the division of time allocated for sending more than one types of
signal throws a signal channel of frequency. The devices that performMultiplexing are called Multiplayer.
Modulation:--It is a process of mixing low Data frequency with the high carrier
frequency to from modulated signal.
Demodulation:--It is a process in which the signal is separated from the carrier
frequency.
Time sharing:--It is the distribution of time allocated for different tasks.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
14/17
Register:--It is a digital sharked that storages a single instruction at a time. It size
me be 8 bit, 16 bit, 32 bit, 64 bit extra. They are located in site micro
processor and are the fasted memory aliasing.
Some of the common registers are
1.
Program Counter2. Memory Address Register3. Intrusion Register4. Accumulator Register5. Buffer Register6. Stack Register7. Flag Register
1. Program Counter:--
This register generates the count this count is actually the address of
memory where over program is storage the address is send to the memory
address Register.
2. Memory Address Register
This register gets the count is address a loads the contents on that
memory address. It then protect for super wise what is being brought in to
the memory and what is being taking out from the memory.
3. Intrusion Register:--
This register holds a complete single instruction. It sends command
part to controller unit and address to MAR.
4. Accumulator Register:--
This register is used to holds the accumulator is filled with data.
B-Register
This register holds the second next value after the accumulator is
filled with data.
Out register
This register supplies the data to the outside world or accepts the data
form.
6. Stack Register:--
This register holds the data item in last in first out principle. It I used
to store paused state of programs that can lather recondite.
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
15/17
7. Flag register:--
This register is used to indicate and storage the current status of all
register and operations during program execution every operation is
educated by a single bit .etc
Fetch OperationStep 1
Program counter generates the count (Address of 1stinstruction of a
program) and send the count to memory address register.
Step 2
MAR enable the contents of given address to be taken from thememory.
Step 3
The loaded content of memory is brought into instruction register.
Fetch Decode Operation
Decode Operation:--In this operation, the command is interpreted into series of sub
infraction trough controller unit.
Execute Operation:--
Application of sub-instructions to all units from the controller unit is
called execution.
VirusVirus:--
A Computer program that is designed specifically to perform illegal
tasks.
Types of Virus:--
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
16/17
Following are some main categories into which virus are divided.
1. Worms2. Trojans3. Time Booms4. File Infectors5. Boot Sector virus
WORM:--This virus is designed to duplicate is self to accomay maximum
memory space. They can special form network ant another input/output
resources and can slow down processing of computer.
Trojans:--They are the programs that do not horn computer operations during
there accept ion Next time went the Computer is run they gates intooperation and perform illegal tasks.
Time booms:--These viruses are design to perform illegal operations on a carting
date and time for example; Michelangelo virus activate on March 6.
File Infectors:--These virus spreads automatically injure them self in a file that latter
on Ram in affectedly.
Boot Sector virus:--This virus reside it salve in hard drive on the boot sector and prevent
the booting operations of the system.
Data ProtectionsMethod of data protection:--
We have two resources that need to protect. Following are the ways
mentioned.
1. Use of Anti-virus2. Use of password and domain3. Use of proxy server and firewall4. Use of Data back-up5. Use of Audile Software
-
7/22/2019 Www.muhammadNiaz.blogspot.com Computer Science XI
17/17
6. Use of Alternate Power supply7. Use of SCSI port and devices8. Use of Physical protection methods9. Use of copyright Law10.Use of Anti-Hacking and Anti-spying Software
1. Use of anti-virus:--The Antivirus software is used to scan hard drive and its contents,detect the virus organize a strategy to remove or isolate the virus the
scanning is centralled by the user or it can automatically be set. The Anti-
virus software has to be updated download latest virus definitions.
Example; AVG, Norton, Avast and ESET NOD32
2.Use of password and domain:--On the Network we use a policy to share resources. We define and
grant privileges to the user in a group of a domain hence only authorized
user can effectively and safely use resources. Password is a digital lock for ausers account if the password is correctly typed, then the user can use
domain privileges. Bio metrically set password can also be applied.
Name: Muhammad Niaz
Contact: 0334, 0307, 0343, 0313=3248963Website:www.Muhammadniaz.Blogspot.com
http://www.muhammadniaz.blogspot.com/http://www.muhammadniaz.blogspot.com/http://www.muhammadniaz.blogspot.com/