Posts

Storage Devices

Storage Device :- Ø  स्टोरेज डिवाइस दो प्रकार की होती है- 1. Primary Memory / Internal Memory:- Ø यह किसी सिस्टम का आवश्यक व अभिन्न अंग होता है, जो  सेमीकंडक्टर मटेरियल  जैसे  सिलिकॉन या जर्मेनियम  का बना होता है । यह भी दो प्रकार का होता है –  RAM  और  ROM  । RAM (Random Access Memory) RAM को  मेन मेमोरी  भी कहा जाता है इसमे डाटा को लिखा और पढ़ा जा सकता है इसलिए इसे रीड राइट मेमोरी भी कहा जाता है । RAM प्रकृत में  Volatile  (परिवर्तनशील) होती है अर्थात इसमे लिखा गया डाटा समाप्त हो जाता है । RAM दो प्रकार का होता है-  SRAM और DRAM   । ROM (Read Only Memory) इसमे डाटा को केवल पढ़ा जा सकता है । ROM प्रकृत में  Non-Volatile  (अपरिवर्तनशील) होता है अर्थात इसमे लिखा गया डाटा समाप्त नहीं होता है । कंप्यूटर के on होते ही ROM का  BIOS (Basic Input Output System)  नामक भाग सबसे पहले लोड होता है । ROM को तीन भागो में बाटा गया है-  PROM  ,  EPROM  और  EEPROM  । 2. S...

Input devices & Output devices

Input Device(इनपुट डिवाइस) :- जिस डिवाइस के द्वारा कंप्यूटर सिस्टम को निर्देश दिया जाता है, उसे इनपुट डिवाइस कहते हैं। जैसे – कीबोर्ड, माउस, जॉयस्टिक, ट्रैकबॉल, लाइटपेन, स्कैनर, कार्ड रीडर, कैमरा, टच स्क्रीन, इत्यादि। Keyboard  :- :-Ø इसका आबिष्कार क्रिस्टोफर लाथम शोल्स ने किया था। Ø सामान्यतः एक कीबोर्ड में १०४-१०८ बटन होते हैं। Ø कीबोर्ड तीन प्रकार का होता है- Standard, Multimedia और Wireless। Ø कीबोर्ड में पांच प्रकार के बटन होते हैं- (i) Alphabetic Keys (A – Z) (ii) Numeric Keys (0 - 9) (iii) Function Keys (F1 – F12) (iv) Cursor Control Keys/ Movement keys/ Arrow keys (v) Special Keys (Alt, Shift, Ctrl, Home, End, Insert, Delete, etc.) Ctrl, Shift, Alt को Modifier key भी कहा जाता है। Mouse  :- Ø माउस एक इनपुट डिवाइस व Pointing Device है। Ø माउस का आबिष्कार डगलस कार्ल एन्गेल्बर्ट ने किया था। Ø माउस में तीन बटन होते हैं। Ø ऐसा इनपुट डिवाइस जिसके द्वारा कंप्यूटर स्क्रीन पर पर्दर्शित हो रहे किसी कमांड या आप्शन को सेलेक्ट किया जाता है। उसे pointing डिवाइस कहते हैं। Joystick ...

Intro. to Computer

Introduction to computer (कंप्यूटर का परिचय) :- Ø कंप्यूटर एक इलेक्ट्रॉनिक मशीन है। Ø कंप्यूटर का सुद्ध हिन्दी नाम संगणक है। Ø कंप्यूटर दिए गए इंस्ट्रक्शन के अनुसार कार्य करता है। Ø कंप्यूटर को दिए जाने वाले इंस्ट्रक्शन प्रोग्रामिंग लैंग्वेज में दिए जाते हैं। Ø कंप्यूटर शब्द की उत्पत्ति अंग्रेजी के कंप्यूट नामक शब्द से हुई है। Ø कंप्यूट का अर्थ होता है - गणना करना, अतः हम कंप्यूटर को गणना करने वाली मशीन कह सकते हैं। Ø कंप्यूटर मुख्य रूप से तीन प्रकार के होते हैं – एनालॉग , डिजिटल और हाइब्रिड। Ø एनालॉग कंप्यूटर फिजिकल नेचर के इनफार्मेशन जैसे – तापमान , दबाव इत्यादि को प्रोसेस करते हैं। Ø ऐसे कंप्यूटर जिसका प्रयोग गणितीय गणनाए करने के लिए किया जाता है, उसे डिजिटल कंप्यूटर कहा जाता है। Ø डिजिटल कंप्यूटर डाटा एवं इनफार्मेशन को बाइनरी फॉर्म में प्रोसेस करते हैं। Ø ऐसे कंप्यूटर जिसमे एनालॉग और डिजिटल दोनों प्रकार के कंप्यूटर के गुण पाए जाते हैं, उसे हाइब्रिड कंप्यूटर कहते हैं। Ø सबसे छोटा कंप्यूटर माइक्रो कंप्यूटर होता है। Ø माइक्रो कंप्यूटर को होम कंप्यूटर और पर्सनल कंप्यूटर(PC) भी कहा जात...

Practice time

Question- 1. L1 is related to? a) Random access memory b) Cash c) Read only memory d) Register Answer : b) Question- 2. What does error 404 or not found error while accessing a URL means? a) HTML file is not available b) Server cannot find the given URL c) HTML file does not have enough permission d) Address not valid Answer : b) Question- 3. What is the default number of seats in LibreOffice 6.0 Calc? a) 1 b) 2 c) 3 d) 4 Answer : a) Question- 4. In which layer does the router work in SI (OSI)? a) Physical b) data link c) network d) Transport Answer : c) Question- 5. In which year RTGS came into force in India? a) November 2005 b) December 2006 c) April 2004 d) March 2004 Answer : d) Question- 6. Which of the following shortcut keys can we upload a document directly to Google Drive? a) Shift + U b) Ctrl + L c) Ctrl + U d) Shift + L Answer : a) Question- 7. Umang app was launched from which ministry? a) Ministry of Finance b) Ministry of Education c) Ministry of Electronic and IT d) non...

Practice time

Question- 1. Why Firewall is used? a) Network Connection b) Security c) Store IP Address d) None Answer : b) Question- 2. What is the full name of CSS? a) Cascading Style Style b) Cascading Speed ​​Sheets c) Case Style Sheets d) Cascading Style Sheets Answer : d) Question- 3. What is the full name of ADC? a) Any-to-Digital Converter b) Analog-to-Data Converter c) Analog-to-Digital Cone d) Analog-to-Digital Converter Answer : d) Question- 4. If a book is made up of questions, then what does a website consist of? a) web page b) paper pages c) HTML d) URL Answer : a) Question- 5. Artificial intelligence is the creation of which generation? a) second generation b) third generation c) fifth generation d) Fourth generation Answer : c) Question- 6. What is the full name of CMS? a) Complete management system b) Contact management system c) Content management speed d) Content management system Answer : d) Question- 7. What type of devices are monitors and keyboards? a) half-duplex b) full duple...

Some usefull HLL and their Uses

Fortran :-   Developed in year 1957 Developed by John backus in bell labs. Used in mathematics ALGOL :-   Developed in year 1958 Developed by European and American scientists . Used in science LISP :-   Developed in year 1958 Developed by J.MCcarthy from MIT institute. Used in AI COBOL :-   Developed in year 1959 Developed by Grace hopper Used in business BASIC :-  Developed in year 1964 Developed by John g. Cament and e. Kurtz from durtmouth college (New Hampshire) Used in education PASCAL :-    Developed in year 1970 Developed by Nicholas Wirth Used in education C :-   Developed in year 1972 Developed by Dennis Ritchie from bell labs. Used in system programming C++ :-  Developed in year 1983 Developed by bazarne straustrup from bell labs. Used in system object programming JAVA :-  Developed in year 1995 Developed by James gausling from sun microsystem. Used in Internet based programming

Measuring units of computer storage

Measuring units of computer :- (1) Bit : 0 or 1 (2) Nibble : 4 Bit (3) Byte : 8 Bit (4) KiloByte{KB} : 1024 Byte (5) MegaByte{MB} : 1024 KB (6) GigaByte{GB} : 1024 MB (7) TeraByte{TB} : 1024 GB (8) PetaByte{PB} : 1024 TB (9) ExaByte{EX} : 1024 PB (10) ZetaByte{ZB} : 1024 EB (11) YottaByte{YB} : 1024 ZB (12) HellaByte{HB}* : 1024 YB (13) GeopByte{GB}** : 1024 HB * HellaByte sometimes also called BrontoByte{BB}. ** GeopByte is the largest unit in present time.

Company's Founders

Company's Founders :- Apple :- Steve Jobs Amazon :-  Jeff Bezos Airtel :- Sunil Mittal Alibaba :- Jack ma Adobe :- Charles Geschke & John Warnock Byjus:- Byju Raveendra Nath Cadbury :- John Cadbury Dell :- Michael Dell eBay :- Pierre morad omidyar Google :- Sergey brin & Larry page FB :- Mark Zuckerberg Nestlé :- Henry Nestlé FSF :- Dennis Ritchie Ford :- Henry Ford Horlicks :- William & James Horlicks HP :- Bill Hawlett & David Packard Intel :- Gordon e moore, robert Noyce & Arthur rock Mobikwik :-  Bipasana Taku & Vipin Preet Singh Myspace :- Tom, Chris & Jon MS :- Bill Gates Nike :- Bill Bowerman Nokia :- Fredrik & Leo Oracle :- Larry errison Wikipedia :- Jimmy Wales & Larry Sanger YouTube :- Steve Chen, Chad & Jawed Twitter :- Evan Williams, Biz & Jack Samsung :- Les byung-chull Yahoo :- David filo & Jerry Yang Sony :- Maruso Ibuka & Akio Morita Tesla :- Elon Musk Instagram :- Kevin Systrom LinkedIn :- Reid ...

OSI Layers and their work

OSI (Open system interconnection) Layers :- (1) Application Layer :-  Manipulation of data, mail service etc. are provided, uses web browser. (2) Presentation Layer :-  Perform by OS that converts HLL to MLL, maintain encryption & decryption. (3) Session Layer :- Manages conversation between two different applications, Manages session b/w source and destination. (4) Transport Layer :-  Decides data transmission should be on parallel or single path, It breaks message into packets & maintain it should reach destination with reliability. (5) Network Layer :-   Acts as network controller, Decides which route data should take. (6) Data Link Layer :- Error controlling, Error detection bits are used. (7) Physical Layer :- Activates, maintain  & deactivate Physical connection, It converts digital bits into electrical signals. BONUS FACTS  :- Hub :-  Works on Physical Layer. Switch :- Works on Data Link Layer. Bridge :- Works on Data Link Layer. ...

Operating System (OS)

OS  :- It is system software which works as an interface between user and hardware. Types of OS  :- (1)   Single user OS :- Allows one user at a time. Like PC.e.g. MS DOS. (2) Multi user OS :- Allow multiple users at a time. Like Network.e.g. Unix,Linux. (3) Multitasking OS :- Work on more than one processor at a time and allow users to switch between running applications.e.g.Linux, Unix. (4) Real Time OS :- Processing done within a time constraint. Like Flight reservations,Military applications.e.g.HP-RT. (5) Embedded OS :- It is self contained in the device & resident in ROM. Like Microwave,washing machines.e.g.Win.CE. (6) Batch processing OS :- No.of jobs are put together & executed as a group.e.g.Unix. (7) Distributed OS :- Data can be stored & processed on multiple locations. Like IBM RS/6000 e.g.Unix. (8) Mobile OS :- Operates on smart phones,tablets & digital mobile phones.Mobile OS classified as : * Android :- Introduced by Google in 2007.Based on ...

Classification of computers Part-II

Image
•  Micro Computer :- Micro Computer is a small, relatively inexpensive computer with a microprocessor as its CPU. •  Mini Computer :- Mini computers were designed for control, instrumentation, human interaction, and communication switching as it is distinct from calculation and record keeping. •  Mainframe Computers :- Mainframe Computers is a powerful multi-user computer that can support thousand users simultaneously. •  Super Computer :- Super Computers are best in terms of processing capacity and also the most expensive one.

Nature & orientation of HLL

Fortran - Compiled   Imperative, structured and general purpose language. ALGOL - Compiled Imperative LISP - Compiled and interpreted General purpose COBOL - Compiled Imperative BASIC - Interpreter General purpose PASCAL - Compiled Procedural C - Compiled Procedural C++ - Compiled Object oriented Java - Compiled and interpreted Object oriented

Important laws of Cyber crimes

Sections Applicable for Cyber Crimes   Cyber Crime ITAA 2008 Act Section’s-IPC Section’s Email spoofing 66D-416,417,463,465,419 Hacking  66,43-378,379,405,406  Web-jacking 65-383  Virus attacks 43,66  Logic bombs  43,66  Salami attacks 66  Denial of Service attacks  43  Email bombing  66  Pornography & Child Pornography  67,67B-292,293,294  Bogus websites,cyberfrauds  420  Forgery of electronic records  463,465,470,471 Sending defamatory messages by email 66A-499,500  Sending threatening messages by email 66A-503,506  Financial Crime 415,384,506,511 CyberTerrorism  66F-153A,UAPA15-22  Identity Theft 66C-417A,419A  Website Defacement 65-463,464,468,469

Security threat & safety measures

 ❖ A computer virus is a program usually hidden within another simple program.  Macro viruses created with the intention of fooling the user can deceive them in sharing confidential information.   ❖ Worms are very similar to viruses in the manner that they are computer programs that replicate copies of themselves.   ❖ A Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into the system.   ❖ A Spyware is a program used to spy on the computer system to get all the confidential and sensitive information such as your bank account numbers, passwords etc.   ❖ Malware is any kind of unwanted software that is installed without your adequate consent.   ❖ Spam emails is not only unwanted, it clogs your email accounts and uses unnecessary server space. It is also referred as junk email.   ❖ Hackers were the gifted programmers who gain access to the systems or network to s...

Image File Formats

Formats  :-   TIFF : Tagged Image File format  XWD : X Window System JPEG : Joint Photographic Experts Group XPM : X Pixmap GIF : Graphics Interchange Format PNG : Portable Network Graphics PSD : Photoshop Document PPM : Portable PixMap BMP : Bitmap PCS : Personal Computer Exchange

Basics of Internet

❖The World Wide Web (WWW) is an internet based service, which uses common set of rules known as Protocols, to distribute documents across the Internet in a standard way.  ❖The Internet is a massive network of networks. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.  ❖ Search engines are the programs which are needed to extract the information from the internet. A search engine works in the following order: Web crawling, Indexing, Searching.  ❖ A web server commonly known as HTTP server or application server is a program that serves content using the HTTP protocol.  ❖ A Web page can contain an article, or a single paragraph, photographs, and it is usually a combination of text and graphics.  ❖ A brow...

Domain names

Domain Names  :- .com : commercial .edu : educational .gov : government entities .net : ISP(internet service provider) .mil : military sites .org : organisation Some of the proposed domain names are as follows :- .arts : cultural & entertainment related  .rec : recreational related .web : www(world wide web) related .firm : businesses .info : informational services .nom : websites of individual .store : shops & stores

Spreadsheet Formulas

All spreadsheet formulas begin with an equal(=) sign.After this symbol formula function is entered. E.gs. of some important formulas :-  ★Concatenate ★Abs ★Average ★Char ★Code ★Count ★Counta ★Countif ★Exact ★Exp ★Fact ★If ★Indirect ★Int ★Len ★Ln ★Lower ★Log ★Median ★Max ★Min ★Pi ★Product ★Rand ★Randbetween ★Stdev ★Sum ★Sumif ★Text ★Today ★Trend ★Trim ★Upper ★Value ★Var ★Vlookup ★Hlookup

MS DOS

MS DOS  : It is text based OS.Originally written by Tim Paterson & introduced by MS in Aug. 1981. MS DOS Commands  :  (1) verify on /verify off :- verify files correctly written to a disk or not. (2)  ver :- display version of a window. (3)  undelete :- restore delete files. (4)  time :- view or edit computer time. (5)  shutdown :- shutdown a window. (6) ren/rename :- change name of file or directory. (7)  color :- change background color or text color. (8) cd :- change directory. (9)  chcp :- display active page code. (10)  del :- delete one or more files. (11)  deltree :- delete directory (permanently). (12)  dir :- display content of directory. (13) edit :- full screen text editor. (14)  rmdir :- remove directory. (15) mkdir :- make directory. (16) cd.. :- comes one step back. (17) cls :- clear the screen. (18)   comp :- compare two files. (19) edlin :- edit line by line  (20)  exit :- exit the c...

Classification of computers

Image
Classification of Computer  : • Analog Computer •Hybrid Computer •Digital Computer ♥ Analog computer : •An analog computer represents the data as physical quantities and operates on the data by manipulating the quantities. •It is designed to process data in which the variable quantities vary continuously. ♥ Hybrid computer   : •A hybrid is a combination of digital and analog computers. •It combines the best features of both types of computers, i.e. It has the speed of  an analog computer and the memory and accuracy of digital computer. •It accepts analog signals, converts them into digital and processes them in digital form. •A hybrid computer may use or produce analog data or digital data. •It accepts a continuously varying input, which is then converted into a set of discrete values for digital processing. ♥ Digital computer : •A digital computer is designed to process the data in numerical form, its circuits perform mathematical operations of ad...