You are on page 1of 11

FULL FORM

ADSL: Asymmetric Digital Subscriber Line


AI: Artificial Intelligence
ALU: Arithmetic and Logical Unit
GSM:-Global System for Mobile
communication
GPRS:-General Pocket Radio Service
ARPANet: American Advanced Research
Project Agency
ATM: Automated Teller machine
B2B: Business to Business
BASIC: Beginners All Purpose Symbolic
Instruction Code
DTH: Direct To Home
BIOS: Basic Input Output System
Bits:Binary Digits
BNC: British Naval Connector
ISOC:InternetSOCiety
bps: Bit Per Second
CD-ROM: Compact Disk Read Only Memory
CPAV: Central Point Anti-Virus
CRT: Cathode Ray Tube
CSU/DSU: Channel Service Unit / Digital
Service Unit
DBMS: Database Management System
DIX: Digital Intel and Xerox
DNA: Digital Network Architecture
DNS: Domain Name Server
DRPA: Defense Advanced Research Project
Agency
DVD: Digital Versatile Disk
E-mail: Electronic mail
EMI: Electro Magnetic Interference
EOF: End of File
FAQ: Frequently Asked Questions
FAT: File Allocation Table
G2C: Government to Citizens
G2G: Government to Government
GB: Giga Bytes
GIF: Graphics Interchange Format
GIGO: Garbage in Garbage Out
GIS: Geographical Information System
GUI: Graphical User Interface
HMD: Head Mounted Display

HTML: Hypertext Markup Language


HTTP: Hyper Text Transfer Protocol
ICT: Information and Communication
Technology.
IMS: Information Management System
IPX: Internetwork Packet eXchange.
IRC: Internet Relay Chat
ISP: Internet Service Provider
IT: Information Technology
JPEG: Joint Photographic Expert Group
LAN: Local Area Network
LCD: Liquid Crystal Display
LED: Light Emitting Diode
MAN: Metropolitan Area Network
MB: Mega Bytes
MBR: Master Boot Record
MODEM: MODulator and DEModulator
MPEG: Motion Picture Expert Group
NAV: Norton Anti Virus
NDD: Norton Disk Doctor
NFS: Network File System
OLE: Object Linking and Embedding
Pixel: Picture Element
POP: Post Office Protocol
POST: Power OnSelf Test
PSTN: Public Switched Telephone Network
RDBMS: Relational Database Management
System.
SMTP: Simple Mail Transfer Protocol
SQL: Structured Query Language
STP: Shielded Twisted Pair
TCP/IP: Transmission Control Protocol/
Internet Protocol
UPS: Uninterruptible Power Supply
URL: Uniform Resource Locator
USB: Universal Serial Bus
UTP: Unshielded Twisted Pair
VoIP: Voice Over Internet Protocol
VSAT: Very Small Aperture Terminal
W3C: World Wide Web Consortium
WAIS: Wide Area Information Server
WAN: Wide Area Network
WWW: World Wide Web

Computer network:The interconnection of two or more computers by using various media to share data and other
resources is known as computer network.
Few advantages of computer network
Peripheral devices can be shared like printers, scanners, etc.
Data and information can be shared
It facilitates easier data backup.
Few Disadvantages of computer network
Network failure causes loss of data
Chances of leakage of privacy
Chances of spreading computer virus
Types of transmission modes with examples

a)Simplex mode
Television broadcast
News Paper
b)Half-duplex mode
Walkie Talkie
One lane road with traffic controller
c)Full-duplex mode
Telephone network
Mobile phone
Difference between half duplex and full duplex transmission mode

Transmission media:-

A transmission or communication medium is a channel through which communication signals can


be carried from one system to another. Transmission media can mainly be divided into two types.
Guided transmission medium.e.g: co-axial cable, optical Fiber cable,Twisted cables
Unguided transmission medium.e.g: satellite, microwave,Radio waves
Difference between guided and unguided transmission medium
Guided transmission medium
Unguided transmission medium
Guided Transmission Media uses a cabling system
unguided medium signal passes through
that guides the data signals along a specific path.
the air, it is independent of a physical
pathway.
It is also known as bounded medium.
It is also known as unbounded medium.
It is comparitively secured.
There is relatively high risk of data loss.
e.g: fibre optic, co-axial cable
e.g: microwave, radio frequency

Bandwidth

The maximum amount of information that can be transmitted along a channel is called
bandwidth. It is usually measured in bits per second, or "bps. Bandwidth of digital machine is
measured in bps and analog machine is in Hertz.

Modem

Modem stands for modulator-demodulator. It is mostly used for dialup network. It is used for
signal conversion.

Functions of Modem

It modulates digital signal from computer into analog signal and demodulates analog signal
received from telephone line into digital signals.

NIC

NIC stands for network interface card. A network interface card (NIC) is a computer circuit board
or card that is installed in a computer so that it can be connected to a network. It converts data
into electrical signals and transfer them through cables and vice-versa.
Difference between LAN and WAN
LAN(Local area network)
It is limited to small geographical area.

WAN(Wide area network)


It is extended throughout the country or
the world.
2

Guided medeium is mostly used


It is privately owned
It has significantly higher transmission
rate.
It is more secured
e.g: Ethernet

Unguided medium is mostly used


It is controlled by multiple organizations
It has low transmission rate
It is less secured
e.g: Internet

MAN (Metropolitan Area Network):-

Metropolitan area network is a connection of two or more LANs and is extended throughout the
city or a town. It can have both guided and unguided transmission medium. It may be owned by
single or multiple organizations. e.g: Cable TV network.

Network topology:-

Network topology illustrates physical layout to connect nodes, links and other devices in
computer network. Different network topologies are: Bus topology, Ring topology , Star
Topology ,Mesh Topology , Tree topology

Star topology:-

A star topology is one of the most common network setups where each of the devices and
computers on a network directly connect to a central hub, switch or computer.
Advantages:
The failure of a single computer or cable doesnt bring down the entire network.
Installing and removing of any node is easier.
Disadvantages:
Failure of the central hub causes the whole network failure.
Limited number of nodes and be connected directly to the central device.
Bus topology:Bus topology is network setup in which all the computers and other devices are connected to a
single backbone cable, known as trunk. T-connectors are mostly used to connect nodes to a
trunk.
Advantages:
Bus is easy to use and understand and inexpensive simple network .
It is easy to extend a network.
Disadvantages:
A bus topology becomes slow by heavy network traffic.
It is difficult to troubleshoot a bus because a cable break will bring down the whole
network.
Mesh topology
In a mesh topology, each computer on network is directly connected to all other computers. If a
link fails, data can be transmitted through other alternate links. It is expensive because it
requires lot of wires
Ring Topology
In this topology each node is directly connected to either side of the nodes forming the circular
shape.
Advantages
Additional components do not affect the performance of network.
Each computer has equal access to resources.

Disadvantages:

It is slower than Star topology.


If one workstation or port goes down, the entire network gets affected.
Peer-to-peer and Client-server network

Differentiate between Peer-to-peer network and Client-server network


Peer-to-peer network
Client-server network
All the systems have equal relations.
Server has more power and controls clients
It has low security.
It has high security.
3

Data backup is responsibility of individual


computer
No need of separate server network
operating system.

Backup is centralized and done regularly.


Server based network operating system is
required

Protocols:-

Protocols are set of rules that govern the mechanism of data transfer in computer network. It
provides logical connectivity among various components. Few important protocols are:
TCP/IP,NETBIOS/NETBEUI, IPX/SPX
Function of TCP/IP protocol:TCP/IP protocol is the combination of two separate protocols. TCP controls the timing and format
of packets. IP controls the routing of packets towards the destination.
Difference between hub and switch
Hub
Switch
Data is broadcasted to all the ports.
Data packet is transmitted to particular port only.
It requires high bandwidth.
It requires low bandwidth.
Data transfer rate is low
Data transfer rate is high.
There is high probability of data transmission . There is less probability of data transmission

Router:-

A router is an intelligent device that connects dissimilar network using same protocols. The
router determines the best path to be taken by the data packets to the destination computer.

Gateway:-

Gateway is used to connect different networks having different protocols. It provides greater
functionality than a router or bridge because a gateway functions both as a translator and a
router.

Computer security:Computer Security refers to the protection of hardware, software and data from being damaged
or loss using various plans and tools. Damage can be accidental or intentional.
Possible threats to computer security
a)Computer crime
b)Modifying data illegally, Hacking and stealing data, injecting viruses
c)Natural disasters
d)Fire, Earthquakes
e)Hardware failure
f))Network failure, Hard disk failure

Need of computer security

In computer we store important data and information, which can be destroyed, hacked, etc. Not
only that there can be natural and intentional physical damages too. Such damages may result in
high loss to the concerned sector. So to avoid these risks, computer security is essential.

Hardware security:It basically refers to the protection of hardware components and other peripheral devices. It is to
protect them from physical damage applying various policies and tools.
Hardware security measures
The hardware security measures to protect the computer system are as follows:
Protection from heat and high temperature.
Power regulator devices and fire detectors.
Insurance policy
Proper maintenance and handling
Importance of voltage regulator device
Voltage regulator device maintain constant voltage level. So, it protect system from hardware
and software damage that results due to power failure and fluctuation.
Importance of password to protect the system from unauthorized access:Password in each system is in encrypted form, with no access to decrypting them. So, only the
authorized person having the password can access the system.

Data backup
Data backup means to store another copy of data in another location. These data are kept on
hard disk, compact disk and tapes.
Defragmentation
The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed
of access and retrieval is known as defragmentation.
Scan disk
It is the process, which involves in maintaining the disk files and folders. It checks files, folder,
bad sector and fix them I possible.

Software security:It is policies and tools to protect software and data from intentional, accidental damage and
unauthorized access.

Software security measures

Scan disk
Defragmentation
Password and data backup
Using antivirus
Encryption:It is the process of converting message/data into unreadable form by using a key so that it can
not be read by anyone other than its intended recipient. The intended recipient can apply the key
to decrypt (rearrange into original form) and read the message/data.

Multimedia:-

Multimedia is the integration of various forms of media in orderto provide information in more
structured and understandable manner.
Different elements of multimedia
Sound, text, graphics, animation, video

Multimedia Hardware

Multimedia hardware are those physical components that are used to run multimedia
applications. e.g: Sound card, Graphics card, Speaker, Monitor, CD-ROM Drive

Multimedia Software

Multimedia software are those software which are used to develop and run multimedia
applications. e.g: Adobe Flash, Power Point, Maya, Window Media Player

Multimedia in entertainment world

The use of multimedia has greatly affected entertainment world. Now days, animated movies,
cartoons, multimedia games are created by using various elements. The techniques like virtual
reality has made it possible to develop various applications that creates real-life imaging. For
example flight simulator, Jurassic park, bagchal, etc.

Multimedia in education sector

Multimedia is changing the learning and teaching method in education. Classroom presentations
have become more interactive with its use. Subject matters are presented in more interactive
manner. Kids education games are becoming more popular as kids enjoy to learn through these
tools. They have also enhanced the technology of learning foreign languages. It is used to
produce computer-based training courses.

Multimedia in information world

Multimedia presents interactive information that is easy to visualize and understand. Information
are presented in user friendly interface. People can use user interactive information by using
touch screen. Business world are providing product information by using animated
advertisement.

Use of CD-ROM in multimedia technology

CD-ROM is very popular in multimedia technology because of its mass storage capacity, cheaper
price and portability.

Function of the following hardware components

a) Video Capture Card:


Video capture cards are used to get the picture from the cable, aerial, or satellite television
5

source into the PC.


b) Sound Card:A sound card is a facilitates the input and output of audio signals to and from a computer under
control of computer programs. It provides high quality play back through computer speakers.
c)Virtual reality:Virtual reality is an artificial environment created with computer hardware and software and
presented to the user in such a way that it appears real.

Computer virus:-

A computer program that can replicate itself by making copies itself without the users
knowledge is called virus. Virus can destroys the data files, program files and system
files of the computer.

Purposes of creating virus.

To protect software from software piracy.


To sell anti-virus program and earn money.
To entertain the user by generating pictures and interesting messages on the screen.
Computer may not boot and hang quickly.
System files may corrupt and affect the performance of computer..
Date and time change automatically.
File renames automatically.
Unnecessary and unusual messages appear on the screen.

Antivirus Software:
The programs which can detect and eliminate the computer viruses are called anti-virus
software. For example, AVG, Avast, Nod32, Avira, MacAfee, Kaspersky, etc.

Prevention and protection from virus:

Install reputed anti-virus software and use regularly.


Update the anti-virus programs virus library to detect and eliminate new virus.
Never install pirated software.
Do not open e-mail attachment and e-mail from unknown person before scanning at first.
We must make backup copy of valuable data so it can be restored from original location in
case of damage.
Types of computer virus:
There are many categories of viruses, including parasitic or file viruses, bootstrap-sector,
program virus or file virus multipartite, macro, stealth virus and script viruses.

Boot-sector virus:

Boot-sector viruses reside on the first portion of the hard disk or floppy disk, known as the boot
sector or Master Boot Record (MBR). These viruses replace either the programs that store
information about the disks contents or the programs that start the computer. Typically, these
viruses spread by means of the physical exchange of floppy disks. These viruses are also called
as start-up infector virus. Examples of such viruses are Danish Boot, Disk killer etc.

Multipartite viruses:

Multipartite viruses combine the abilities of the parasitic and the boot-sector viruses, and so are
able to infect either files or boot sectors. These types of viruses can spread if a computer user
boots from an infected diskette or accesses infected files. Examples of such viruses are Invader,
Flip, Tequila, etc.
Parasitic or file viruses or program files:
Parasitic or file viruses infect executable files or programs in the computer. These files are often
identified by the extension .exe , .bin, .sys, .drv etc. in the name of the computer file. File viruses
leave the contents of the host program unchanged but attach to the host in such a way that the
virus code is run first. Then it will affect execution of the program and hence the computer
becomes very slow. Examples of such viruses are Acid Rain, Alien 298, Crazy, Brontok etc.

Script viruses:

Script viruses are written in script programming languages, such as VBScript (Visual Basic Script)
and JavaScript. These script languages can be seen as a special kind of macro language and are
6

even more powerful because most are closely related to the operating system environment. The
ILOVEYOU virus, which appeared in 2000 and infected an estimated 1 in 5 personal computers,
is a famous example of a script virus.

Macro viruses:

Macro virus contains inside files. Macro command which is designed to infect a specific type of
document files such as Ms Word or Ms. Excel files. Examples of such viruses are DMV, Nuclear
and Word Concept.

Stealth viruses:

Stealth virus is one of the most dangerous types of viruses which really give information about
the presence of it in the computer. Generally it infects the boot sector records and program files.
It is difficult to detect using anti-virus program because it can hide in memory from the operating
system and antivirus software. Some time they can hide other files. Examples of stealth virus are
Frodo, Joshi, Whale, etc.

The Internet and E-mail:Internet:


The Internet is the global network of networks which operates on TCP/IP protocol. The Internet
started in the US in 1972 with four host computers connected with each other. Now it has grown
to cover the whole globe. There are many heterogeneous networks connected with each other.It
is also called super information highway .
the common services provided by the internet are:
Electronic mail (E-Mail)
IRC(Internet Real chat).
TELENET
WWW
Ecommerce
Newsgroup
E-banking
Virtual library
Equipment used in internet/ components required to use internet:
A set of computer
A modem and regular telephone line or broadband internet connection.
An account in ISP to access the internet host.
A communication software for example: Internet Explorer, Netscape Navigator, Mozilla
Firefox or Opera etc.
Terms related to the internet:
WWW: WWW is a series of services that are interconnected through hypertext. It provides link in
the web documents.
Advantages of www:
A link in a web document can be used to open other documents.
Web pages can contain pictures, buttons and even links to sound files in addition to text,
thus allowing multimedia applications.
Sophisticated web document allow users to interact with applications through dialog boxes
and forms.
Web site:

Website is a location of the web pages created by any organizations, universities and
government agencies to provide information regarding them
like: http://www.bbc.co.uk/nepali,http://www.nepalnews.com etc. Each website has its own
address that is also called internet address.
Web pages:

Webpage is a collection of information that is stored in website. The www consists of huge
collection of documents with related website called webpage. Webpage provides vast collection
of information of related websites.

Browser:

Browser is client software that allows the users to display and interact with the web page. For
example: Internet Explorer, Netscape Navigator, Mozilla Firefox or Opera etc.
Web server: web server is a site on which the web pages are kept. It is a server computer that
responds to requests from web browsers to relative resources .
Domain name:

It is a name of specific internet area controlled by any organization, company or government .


Home page:

The home page is the first hypertext document regarding the web address displayed when a user
connects to any web server.
ISP( Internet Service Provider)

A company that provides individuals or companies access to the internet and the world wide
web is called ISP.
Firewall:

software or hardware that limits the certain kinds of access to a computer from the internal
network or external network.
E-Mail:

E-mail stands for electronic mail. It is most widely used feature on the internet. Sending and
receiving messages electronically through the internet is called E-mail. We can exchange any
message with the people around the world by using e-mail. It is very easy and quick means of
communication available in the computer world. We can write an e-mail message in an mail
program like Eudora, Outlook Express, Netscape Navigator etc. and several web base program
like Yahoomail, Hotmail, Gmail and Zapakmail are also used to send and receive e-mail.
E-mail address: Each E-mail address is identified by a unique name is called E-mail address. For
example mailme@yahoo.com, ram@fewanet.com.np, etc. It has five parts they are as follows:
Ram : Users name
@ (At the rate) : A separator symbol
Yahoo, fewanet : ISP address or domain name
.com or .edu or .net : commercial or educational groups
.np : Country code
Advantages of using E-mail:
It is cheapest and fastest means of communication and as compared our conventional
postal mail.
It is more reliable than postal mail.
E-mail can be accessed from any part of the world and at any time.
Information can be share globally.
We can send photos, songs, video clips and other file with e-mail attachments.
A single mail can be send to multiple people at a time.
8

Cyber Laws:The law that controls the legal issues in the internet or WWW for digital data processing and
transaction is called cyber law. It controlscybercrimes and misuses of computer. It was introduced
in Nepal in 2061 BS(2004 AD)
Cybercrime:Cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Example of computer crime:
Unauthorized access of computer
Altering web pages of web site.
Malicious computer programs: viruses, hacking and cracking the software.
Password guessing etc.
Effects of cyber / computer crime.

Consumption of time of staff member in detecting intruders and managing safety

methods.
Physical theft of computer and computer accessories which cause a huge damage of the

assets.
Due to the attackers, the banks and financial companies get adverse publicity.

Vandalize the original web page with the different contents in WWW.

Loss of privacy due to the unauthorized access of information .

Safety from computer crime:

Protection of computer from power related problems by using power surges and power

outrages.
Using call back systems to track the phone number which is used to connect.

Using firewall system to protect computer from external threats.

Using computer to protect from viruses.


Making backup regularly.

Computer Ethics:
Computer Ethics covers all the practical principles that deal with how the computer experts
should make decisions in regard to the social and professional behavior. The core issues of
computer ethics incorporate:
Technological impact on the society.
Plagiarism
Intellectual property rights
Copyrights
Piracy
Hacking
Internet pornography and adult sites
Harassment and stalking etc.
Computer ethics for the computer user:
Respect yourself and do not give passwords to any second person.
Do not ask password and never try to know others password for any purpose.
Always give the credit to your originality.
Ten Commandments for computer ethics: The computer Ethics Institute of the Brookings
Institute, Washington D.C has developed the following ethics:
Do not use a computer to harm other people.
Do not interfere with other peoples computer work.
Donot snoop around in other peoples files.
Donot use a computer to steal.
9

Do not to use a computer to bear false witness.


Donot to copy or use proprietary software for which you have not paid.
Do not use other peoples computer resources without authorization or proper permission.
Do think about the social consequences of the program you write or the system you
design.
Use a computer in ways that show consideration and respect for you fellow humans.

Computer related legal problems:


Plagiarism: The presentation of somebodys work as if it were your own is known as plagiarism.
For example some people or students copy the material from the internet and present them as if
it is their own creation without prior permission from the authorized person to copy from the
copyrighted material.
Software Piracy: Copying software CD or DVD is another big problem. People copy software
and install in their computer. Some programs are freely available in the public domain under the
provision of General Public License (GPL).
Digital signature: A security mechanism used on the internet that relies on two keys, one
public and one private, which are used to encrypt and to decrypt them on the receipt.
Technical Terms:1. The amount of data transmitted per second. :-Bandwidth
2. An intelligence device that connects two different networks using same protocol.:- Router
3. Physical Layout of network.:-LAN Topology
4. Group of interconnect computers with other devices:- Computer Network
5. Unit used to measure Band-Width of digital device:-bps
6. A device that joins network. having different protocol.:-.Gateway
7. Medium that carries data without physical path.:-unguided medium
8. Formal set of rule that govern the exchange of information in a network.:- Protocol
9. The computer that acts as the central authority on a network.:- Server
10.Device used to convert analog to digital and vice versa.:- MODEM
11.A private internet:- Intranet
12.Card used to connect the network cables to the computers.-. Network Interface Card
13.Faster and reliable communication media.:- Optical Fibers
14.Operating System used in server computer in a network.:- Network Operating System
15.Network confined to relatively small area.:- Local Area Network
16.A network that covers an entire city:- MAN
17.Mode of data transmission to which transmission exists In both direction at a time.:Duplex
18.Network to which every computer acts as both client and server:-Peer to Pear Network
19.A high bandwidth network that in sufficient for high quality wino. music and video
transmission.:-Broadband
20.Device that combines several electrical signals into a single signal and vice versa.:Multiplexer
21.A device with multiple ports that transmits data to the specific computer. :-Switch
22.Device to amplify or regenerate digital signals received.:-.Repeater
23.Website used to search information on the Internet:-Search Engines
24.A business through Internet.:- E-commerce
25.The process of transmitting data/file from users computer to interne:-Uploading
26.The process of transmitting data/file from Internet tousers computer:-Downloading
27.The technique used to provide educational informationand services through the
Internet.:-eLearning
28.Network of Networks:-Internet
29.A company that provides the Internet facility.:-Internet Service Provider (ISP)
30.Aprogram that allows the user log on remote computer on the internet.:- Telnet
31.Software used to open WebPages.:- Web browser
10

32.A server that sorts and directs electronic messages:- Email Server
33.Web protocol to transmit data over Internet.:-HTTP
34.Visual communication over the Internet.:-Video conferencing
35.Banking transaction done through Internet.:-e-banking
36.Protocol. used to receive email from mall server.:- Post Office Protocol (POP)
37.Protocol used to transfer email to mail server.:-Simple Mail Transfer Protocol (SMTP)
38.Language used to create web pages.:-HTML
39.Online postal service.:-e-mail
40.Internet service that allow. real time communication.:-IRC(Internet Relay Chat
41.An online meeting and information system that allows people to carry on discussions.:Bulletin Board System
42.The scattering of the parts of the same disk file over different location:-Fragmentation
43.A secret word that gives a user a user access to a particular program and system:Password
44.The process of transforming an encrypted message into its original plaintext:-Decryption
45.A copy of a file, which is used in the events of the original file being corrupted:-.Backup
46.Virtual space created by computer network, Internet to make communication.:- Cyper
space
47.Any illegal activities done using computers and the Internet.:- cyber-crime
48.Set of moral principles that regulates the use of computer systematically.:- Computer
ethics
49.Common name for the crime of stealing password..:- Spoofing
50.All legal and rgulatory aspect of internet and WWW.:-Cyberlaw
The End

11

You might also like