Professional Documents
Culture Documents
Computer network:The interconnection of two or more computers by using various media to share data and other
resources is known as computer network.
Few advantages of computer network
Peripheral devices can be shared like printers, scanners, etc.
Data and information can be shared
It facilitates easier data backup.
Few Disadvantages of computer network
Network failure causes loss of data
Chances of leakage of privacy
Chances of spreading computer virus
Types of transmission modes with examples
a)Simplex mode
Television broadcast
News Paper
b)Half-duplex mode
Walkie Talkie
One lane road with traffic controller
c)Full-duplex mode
Telephone network
Mobile phone
Difference between half duplex and full duplex transmission mode
Transmission media:-
Bandwidth
The maximum amount of information that can be transmitted along a channel is called
bandwidth. It is usually measured in bits per second, or "bps. Bandwidth of digital machine is
measured in bps and analog machine is in Hertz.
Modem
Modem stands for modulator-demodulator. It is mostly used for dialup network. It is used for
signal conversion.
Functions of Modem
It modulates digital signal from computer into analog signal and demodulates analog signal
received from telephone line into digital signals.
NIC
NIC stands for network interface card. A network interface card (NIC) is a computer circuit board
or card that is installed in a computer so that it can be connected to a network. It converts data
into electrical signals and transfer them through cables and vice-versa.
Difference between LAN and WAN
LAN(Local area network)
It is limited to small geographical area.
Metropolitan area network is a connection of two or more LANs and is extended throughout the
city or a town. It can have both guided and unguided transmission medium. It may be owned by
single or multiple organizations. e.g: Cable TV network.
Network topology:-
Network topology illustrates physical layout to connect nodes, links and other devices in
computer network. Different network topologies are: Bus topology, Ring topology , Star
Topology ,Mesh Topology , Tree topology
Star topology:-
A star topology is one of the most common network setups where each of the devices and
computers on a network directly connect to a central hub, switch or computer.
Advantages:
The failure of a single computer or cable doesnt bring down the entire network.
Installing and removing of any node is easier.
Disadvantages:
Failure of the central hub causes the whole network failure.
Limited number of nodes and be connected directly to the central device.
Bus topology:Bus topology is network setup in which all the computers and other devices are connected to a
single backbone cable, known as trunk. T-connectors are mostly used to connect nodes to a
trunk.
Advantages:
Bus is easy to use and understand and inexpensive simple network .
It is easy to extend a network.
Disadvantages:
A bus topology becomes slow by heavy network traffic.
It is difficult to troubleshoot a bus because a cable break will bring down the whole
network.
Mesh topology
In a mesh topology, each computer on network is directly connected to all other computers. If a
link fails, data can be transmitted through other alternate links. It is expensive because it
requires lot of wires
Ring Topology
In this topology each node is directly connected to either side of the nodes forming the circular
shape.
Advantages
Additional components do not affect the performance of network.
Each computer has equal access to resources.
Disadvantages:
Protocols:-
Protocols are set of rules that govern the mechanism of data transfer in computer network. It
provides logical connectivity among various components. Few important protocols are:
TCP/IP,NETBIOS/NETBEUI, IPX/SPX
Function of TCP/IP protocol:TCP/IP protocol is the combination of two separate protocols. TCP controls the timing and format
of packets. IP controls the routing of packets towards the destination.
Difference between hub and switch
Hub
Switch
Data is broadcasted to all the ports.
Data packet is transmitted to particular port only.
It requires high bandwidth.
It requires low bandwidth.
Data transfer rate is low
Data transfer rate is high.
There is high probability of data transmission . There is less probability of data transmission
Router:-
A router is an intelligent device that connects dissimilar network using same protocols. The
router determines the best path to be taken by the data packets to the destination computer.
Gateway:-
Gateway is used to connect different networks having different protocols. It provides greater
functionality than a router or bridge because a gateway functions both as a translator and a
router.
Computer security:Computer Security refers to the protection of hardware, software and data from being damaged
or loss using various plans and tools. Damage can be accidental or intentional.
Possible threats to computer security
a)Computer crime
b)Modifying data illegally, Hacking and stealing data, injecting viruses
c)Natural disasters
d)Fire, Earthquakes
e)Hardware failure
f))Network failure, Hard disk failure
In computer we store important data and information, which can be destroyed, hacked, etc. Not
only that there can be natural and intentional physical damages too. Such damages may result in
high loss to the concerned sector. So to avoid these risks, computer security is essential.
Hardware security:It basically refers to the protection of hardware components and other peripheral devices. It is to
protect them from physical damage applying various policies and tools.
Hardware security measures
The hardware security measures to protect the computer system are as follows:
Protection from heat and high temperature.
Power regulator devices and fire detectors.
Insurance policy
Proper maintenance and handling
Importance of voltage regulator device
Voltage regulator device maintain constant voltage level. So, it protect system from hardware
and software damage that results due to power failure and fluctuation.
Importance of password to protect the system from unauthorized access:Password in each system is in encrypted form, with no access to decrypting them. So, only the
authorized person having the password can access the system.
Data backup
Data backup means to store another copy of data in another location. These data are kept on
hard disk, compact disk and tapes.
Defragmentation
The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed
of access and retrieval is known as defragmentation.
Scan disk
It is the process, which involves in maintaining the disk files and folders. It checks files, folder,
bad sector and fix them I possible.
Software security:It is policies and tools to protect software and data from intentional, accidental damage and
unauthorized access.
Scan disk
Defragmentation
Password and data backup
Using antivirus
Encryption:It is the process of converting message/data into unreadable form by using a key so that it can
not be read by anyone other than its intended recipient. The intended recipient can apply the key
to decrypt (rearrange into original form) and read the message/data.
Multimedia:-
Multimedia is the integration of various forms of media in orderto provide information in more
structured and understandable manner.
Different elements of multimedia
Sound, text, graphics, animation, video
Multimedia Hardware
Multimedia hardware are those physical components that are used to run multimedia
applications. e.g: Sound card, Graphics card, Speaker, Monitor, CD-ROM Drive
Multimedia Software
Multimedia software are those software which are used to develop and run multimedia
applications. e.g: Adobe Flash, Power Point, Maya, Window Media Player
The use of multimedia has greatly affected entertainment world. Now days, animated movies,
cartoons, multimedia games are created by using various elements. The techniques like virtual
reality has made it possible to develop various applications that creates real-life imaging. For
example flight simulator, Jurassic park, bagchal, etc.
Multimedia is changing the learning and teaching method in education. Classroom presentations
have become more interactive with its use. Subject matters are presented in more interactive
manner. Kids education games are becoming more popular as kids enjoy to learn through these
tools. They have also enhanced the technology of learning foreign languages. It is used to
produce computer-based training courses.
Multimedia presents interactive information that is easy to visualize and understand. Information
are presented in user friendly interface. People can use user interactive information by using
touch screen. Business world are providing product information by using animated
advertisement.
CD-ROM is very popular in multimedia technology because of its mass storage capacity, cheaper
price and portability.
Computer virus:-
A computer program that can replicate itself by making copies itself without the users
knowledge is called virus. Virus can destroys the data files, program files and system
files of the computer.
Antivirus Software:
The programs which can detect and eliminate the computer viruses are called anti-virus
software. For example, AVG, Avast, Nod32, Avira, MacAfee, Kaspersky, etc.
Boot-sector virus:
Boot-sector viruses reside on the first portion of the hard disk or floppy disk, known as the boot
sector or Master Boot Record (MBR). These viruses replace either the programs that store
information about the disks contents or the programs that start the computer. Typically, these
viruses spread by means of the physical exchange of floppy disks. These viruses are also called
as start-up infector virus. Examples of such viruses are Danish Boot, Disk killer etc.
Multipartite viruses:
Multipartite viruses combine the abilities of the parasitic and the boot-sector viruses, and so are
able to infect either files or boot sectors. These types of viruses can spread if a computer user
boots from an infected diskette or accesses infected files. Examples of such viruses are Invader,
Flip, Tequila, etc.
Parasitic or file viruses or program files:
Parasitic or file viruses infect executable files or programs in the computer. These files are often
identified by the extension .exe , .bin, .sys, .drv etc. in the name of the computer file. File viruses
leave the contents of the host program unchanged but attach to the host in such a way that the
virus code is run first. Then it will affect execution of the program and hence the computer
becomes very slow. Examples of such viruses are Acid Rain, Alien 298, Crazy, Brontok etc.
Script viruses:
Script viruses are written in script programming languages, such as VBScript (Visual Basic Script)
and JavaScript. These script languages can be seen as a special kind of macro language and are
6
even more powerful because most are closely related to the operating system environment. The
ILOVEYOU virus, which appeared in 2000 and infected an estimated 1 in 5 personal computers,
is a famous example of a script virus.
Macro viruses:
Macro virus contains inside files. Macro command which is designed to infect a specific type of
document files such as Ms Word or Ms. Excel files. Examples of such viruses are DMV, Nuclear
and Word Concept.
Stealth viruses:
Stealth virus is one of the most dangerous types of viruses which really give information about
the presence of it in the computer. Generally it infects the boot sector records and program files.
It is difficult to detect using anti-virus program because it can hide in memory from the operating
system and antivirus software. Some time they can hide other files. Examples of stealth virus are
Frodo, Joshi, Whale, etc.
Website is a location of the web pages created by any organizations, universities and
government agencies to provide information regarding them
like: http://www.bbc.co.uk/nepali,http://www.nepalnews.com etc. Each website has its own
address that is also called internet address.
Web pages:
Webpage is a collection of information that is stored in website. The www consists of huge
collection of documents with related website called webpage. Webpage provides vast collection
of information of related websites.
Browser:
Browser is client software that allows the users to display and interact with the web page. For
example: Internet Explorer, Netscape Navigator, Mozilla Firefox or Opera etc.
Web server: web server is a site on which the web pages are kept. It is a server computer that
responds to requests from web browsers to relative resources .
Domain name:
The home page is the first hypertext document regarding the web address displayed when a user
connects to any web server.
ISP( Internet Service Provider)
A company that provides individuals or companies access to the internet and the world wide
web is called ISP.
Firewall:
software or hardware that limits the certain kinds of access to a computer from the internal
network or external network.
E-Mail:
E-mail stands for electronic mail. It is most widely used feature on the internet. Sending and
receiving messages electronically through the internet is called E-mail. We can exchange any
message with the people around the world by using e-mail. It is very easy and quick means of
communication available in the computer world. We can write an e-mail message in an mail
program like Eudora, Outlook Express, Netscape Navigator etc. and several web base program
like Yahoomail, Hotmail, Gmail and Zapakmail are also used to send and receive e-mail.
E-mail address: Each E-mail address is identified by a unique name is called E-mail address. For
example mailme@yahoo.com, ram@fewanet.com.np, etc. It has five parts they are as follows:
Ram : Users name
@ (At the rate) : A separator symbol
Yahoo, fewanet : ISP address or domain name
.com or .edu or .net : commercial or educational groups
.np : Country code
Advantages of using E-mail:
It is cheapest and fastest means of communication and as compared our conventional
postal mail.
It is more reliable than postal mail.
E-mail can be accessed from any part of the world and at any time.
Information can be share globally.
We can send photos, songs, video clips and other file with e-mail attachments.
A single mail can be send to multiple people at a time.
8
Cyber Laws:The law that controls the legal issues in the internet or WWW for digital data processing and
transaction is called cyber law. It controlscybercrimes and misuses of computer. It was introduced
in Nepal in 2061 BS(2004 AD)
Cybercrime:Cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Example of computer crime:
Unauthorized access of computer
Altering web pages of web site.
Malicious computer programs: viruses, hacking and cracking the software.
Password guessing etc.
Effects of cyber / computer crime.
methods.
Physical theft of computer and computer accessories which cause a huge damage of the
assets.
Due to the attackers, the banks and financial companies get adverse publicity.
Vandalize the original web page with the different contents in WWW.
Protection of computer from power related problems by using power surges and power
outrages.
Using call back systems to track the phone number which is used to connect.
Computer Ethics:
Computer Ethics covers all the practical principles that deal with how the computer experts
should make decisions in regard to the social and professional behavior. The core issues of
computer ethics incorporate:
Technological impact on the society.
Plagiarism
Intellectual property rights
Copyrights
Piracy
Hacking
Internet pornography and adult sites
Harassment and stalking etc.
Computer ethics for the computer user:
Respect yourself and do not give passwords to any second person.
Do not ask password and never try to know others password for any purpose.
Always give the credit to your originality.
Ten Commandments for computer ethics: The computer Ethics Institute of the Brookings
Institute, Washington D.C has developed the following ethics:
Do not use a computer to harm other people.
Do not interfere with other peoples computer work.
Donot snoop around in other peoples files.
Donot use a computer to steal.
9
32.A server that sorts and directs electronic messages:- Email Server
33.Web protocol to transmit data over Internet.:-HTTP
34.Visual communication over the Internet.:-Video conferencing
35.Banking transaction done through Internet.:-e-banking
36.Protocol. used to receive email from mall server.:- Post Office Protocol (POP)
37.Protocol used to transfer email to mail server.:-Simple Mail Transfer Protocol (SMTP)
38.Language used to create web pages.:-HTML
39.Online postal service.:-e-mail
40.Internet service that allow. real time communication.:-IRC(Internet Relay Chat
41.An online meeting and information system that allows people to carry on discussions.:Bulletin Board System
42.The scattering of the parts of the same disk file over different location:-Fragmentation
43.A secret word that gives a user a user access to a particular program and system:Password
44.The process of transforming an encrypted message into its original plaintext:-Decryption
45.A copy of a file, which is used in the events of the original file being corrupted:-.Backup
46.Virtual space created by computer network, Internet to make communication.:- Cyper
space
47.Any illegal activities done using computers and the Internet.:- cyber-crime
48.Set of moral principles that regulates the use of computer systematically.:- Computer
ethics
49.Common name for the crime of stealing password..:- Spoofing
50.All legal and rgulatory aspect of internet and WWW.:-Cyberlaw
The End
11