Unit I: Basics of Computer
1. Introduction to Computers
1.1 What is a Computer?
A computer is an electronic machine designed to accept raw data as input, process it using a
set of instructions (programs), store it, and finally produce meaningful information as
output. In simple terms, computers help us solve problems faster, store large amounts of
information, and perform tasks automatically.
Modern life is heavily dependent on computers—from mobile phones and ATMs to medical
equipment and supercomputers. Whether in banking, education, business, healthcare,
entertainment, or research, computers play a central role in our daily activities.
1.2 Characteristics of Computers
Computers have certain features that make them more powerful and reliable than manual
human effort.
1.2.1 Speed
Computers can perform millions of calculations within a second. Operations that take
humans hours or days can be done in fractions of a second by computers.
• Example: A supercomputer can predict weather patterns for the next week within
minutes.
1.2.2 Accuracy
When programmed correctly, computers deliver precise and error-free results. Mistakes
occur only if wrong instructions or incorrect data are provided.
• Example: Banking transactions through ATMs are highly accurate.
1.2.3 Automation
Once instructions are given, computers can perform tasks automatically without continuous
human supervision.
• Example: Auto-pilot systems in airplanes.
1.2.4 Versatility
Computers are capable of performing a wide variety of tasks, from designing a building to
analyzing medical data.
• Example: A single computer can be used to play games, manage business accounts,
and browse the internet.
1.2.5 Diligence (No Fatigue)
Unlike humans, computers do not get tired, bored, or distracted. They can work
continuously with the same efficiency.
• Example: Servers run 24×7, handling millions of user requests.
1.2.6 Storage Capability
Computers can store huge amounts of data and retrieve it instantly when needed.
• Example: Google manages petabytes of data across the globe.
1.2.7 Connectivity
Computers can be linked to other computers and devices, enabling communication and
sharing of information across the world.
• Example: The Internet connects billions of devices globally.
1.2.8 Multitasking
Computers can perform multiple functions at the same time.
• Example: A user can listen to music while downloading files, browsing websites, and
preparing documents.
1.3 Limitations of Computers
Despite their strengths, computers are not perfect. They have certain limitations:
1.3.1 Lack of Intelligence
Computers cannot think or reason on their own. They only follow instructions provided by
humans.
• Example: A calculator can solve equations but cannot understand why those
equations matter.
1.3.2 No Decision-Making Power
Computers cannot make judgments based on ethics, emotions, or values. They rely strictly
on logic and data.
• Example: A computer program may suggest the cheapest medical treatment, but it
cannot decide which treatment is best for the patient’s overall well-being.
1.3.3 Dependence on Human Input
Computers need accurate data and instructions. If wrong input is given, the output will also
be wrong. This is often called “Garbage In, Garbage Out (GIGO).”
• Example: Wrong spelling in a search query will lead to incorrect results.
1.3.4 Absence of Emotions and Creativity
Computers cannot feel emotions, develop ideas, or show creativity the way humans do.
• Example: An AI tool can generate art, but it lacks true imagination or emotional
depth.
1.3.5 Security and Privacy Issues
Computers and networks are vulnerable to hacking, viruses, and data breaches.
• Example: Cyberattacks on banks and e-commerce websites compromise customer
data.
1.3.6 High Cost of Setup and Maintenance
Advanced systems like supercomputers or servers require heavy investment and ongoing
maintenance.
• Example: Data centers consume large amounts of electricity and need constant
cooling.
1.4 Evolution of Computers
The computer we use today is the result of continuous development over several centuries.
From the abacus, one of the earliest calculating devices, to today’s artificial intelligence-
powered supercomputers, computers have undergone a remarkable evolution.
The development of computers is generally explained in terms of five generations, each
defined by major technological advancements in hardware, software, and usage.
2.2 Early Calculating Devices (Before Computers)
1. Abacus (3000 BC):
o Wooden frame with beads, used for basic arithmetic (addition, subtraction).
o Widely used in ancient China, Greece, and India.
2. Napier’s Bones (1617):
o Invented by John Napier, used rods with numbers to simplify multiplication
and division.
3. Pascal’s Calculator (1642):
o Blaise Pascal developed a mechanical calculator capable of addition and
subtraction.
4. Leibniz’s Calculator (1671):
o Improved Pascal’s machine to perform multiplication and division.
5. Analytical Engine (1837):
o Designed by Charles Babbage, considered the “Father of the Computer.”
o Could perform general-purpose computations using punched cards.
6. Tabulating Machine (1890):
o Herman Hollerith developed a punched card system for the U.S. census.
o Later became the foundation of IBM (International Business Machines).
2.3 Generations of Computers
First Generation (1940–1956) – Vacuum Tubes
• Technology: Used vacuum tubes for circuitry and magnetic drums for memory.
• Size: Very large, consumed huge electricity, produced heat.
• Programming: Machine language (binary code).
• Example: ENIAC (Electronic Numerical Integrator and Computer), UNIVAC I.
• Limitation: Bulky, costly, and unreliable.
Second Generation (1956–1963) – Transistors
• Technology: Used transistors instead of vacuum tubes.
• Size: Smaller, faster, cheaper, and more reliable.
• Memory: Used magnetic core memory.
• Programming: Assembly language, early high-level languages (COBOL, FORTRAN).
• Example: IBM 1401, IBM 7090.
• Limitation: Still generated heat, required air-conditioning.
Third Generation (1964–1971) – Integrated Circuits (ICs)
• Technology: Used integrated circuits (ICs) which combined thousands of transistors
on a single chip.
• Features: Smaller in size, more efficient, multitasking possible.
• Programming: High-level languages (C, BASIC).
• Example: IBM System/360 series.
• Limitation: Expensive for personal use.
Fourth Generation (1971–Present) – Microprocessors
• Technology: Microprocessors with thousands/millions of transistors on a single chip.
• Size: Very small (desktop and personal computers introduced).
• Memory: Semiconductor memory (RAM, ROM).
• Features: Networks, graphical user interface (GUI), portability.
• Example: Intel 4004 microprocessor (first), IBM PC, Apple Macintosh.
• Special Note: Start of personal computing revolution.
Fifth Generation (Present & Beyond) – Artificial Intelligence
• Technology: Based on AI, machine learning, cloud computing, quantum computing.
• Features: Natural language processing, robotics, expert systems, voice and image
recognition.
• Example: IBM Watson, Google DeepMind, Quantum Computers (D-Wave, Google
Sycamore).
• Focus: Making computers “think” like humans and solve complex real-life problems.
2.4 Comparison of Computer Generations
Programming
Generation Technology Used Examples Key Features
Language
Large, costly,
First (1940–56) Vacuum Tubes Machine language ENIAC, UNIVAC
heat
Second (1956– Assembly, COBOL,
Transistors IBM 1401 Faster, reliable
63) FORTRAN
Smaller,
Third (1964–71) Integrated Circuits BASIC, C IBM 360
multitasking
Fourth (1971– IBM PC, Apple PCs, GUI,
Microprocessors C, C++, Java
Present) Mac portability
Fifth (Present & AI, Quantum IBM Watson, Intelligent,
Python, AI tools
Beyond) Computing Sycamore futuristic
3. Types of Computers
Computers can be classified into different types depending on their size, processing power,
and the way they handle data. This classification helps us understand the wide range of
computer systems, from the smallest handheld devices to the most powerful
supercomputers used in research and defense.
3.2 Types of Computers Based on Size and Power
This classification is based on physical size, processing capacity, storage capability, and
usage.
3.2.1 Supercomputers
• Definition: The most powerful computers designed to perform extremely complex
calculations at very high speeds.
• Features:
o Used for scientific research, weather forecasting, nuclear simulations, AI
research.
o Can process trillions of instructions per second.
o Extremely costly and require special cooling systems.
• Examples: PARAM Siddhi (India), IBM Summit, Fugaku (Japan).
3.2.2 Mainframe Computers
• Definition: Large computers capable of handling and processing very large amounts
of data simultaneously.
• Features:
o Support thousands of users at the same time.
o Used in banking, railways, airlines, and government departments.
o Highly reliable and secure.
• Examples: IBM Z-series mainframes used by banks like SBI.
3.2.3 Minicomputers (Midrange Computers)
• Definition: Medium-sized computers smaller than mainframes but larger than
personal computers.
• Features:
o Support multiple users simultaneously.
o Used in small organizations for departmental tasks like payroll, inventory, and
accounting.
• Examples: PDP-11, VAX series by Digital Equipment Corporation.
3.2.4 Microcomputers (Personal Computers)
• Definition: The most widely used computers designed for individual users.
• Features:
o Small, affordable, and easy to use.
o Found in homes, schools, offices.
o Examples include desktops, laptops, and tablets.
• Examples: Dell, HP, Apple MacBook.
3.2.5 Workstations
• Definition: High-performance computers designed for specialized technical or
scientific tasks.
• Features:
o More powerful than personal computers but less than mainframes.
o Used for graphics design, 3D modeling, engineering simulations.
• Examples: Sun Microsystems Workstations, HP Z-series.
3.2.6 Embedded Computers
• Definition: Computers built into other devices to perform a dedicated function.
• Features:
o Very small in size.
o Cannot be reprogrammed for multiple tasks.
o Used in washing machines, cars, ATMs, smart TVs.
• Examples: Microcontrollers in automobiles, smart appliances.
3.3 Types of Computers Based on Data Handling
This classification depends on how data is represented and processed by the computer.
3.3.1 Analog Computers
• Definition: Work with continuous data and represent information in physical
quantities like voltage, speed, or pressure.
• Features:
o Not very accurate, but useful for scientific and engineering measurements.
o Common before digital computers became popular.
• Examples: Speedometer in cars, traditional thermometers, flight simulators.
3.3.2 Digital Computers
• Definition: Work with discrete data, representing information in binary form (0s and
1s).
• Features:
o Highly accurate and fast.
o Used in business, education, healthcare, and entertainment.
• Examples: Personal computers, laptops, smartphones.
3.3.3 Hybrid Computers
• Definition: Combine features of both analog and digital computers.
• Features:
o Analog part measures physical quantities.
o Digital part converts it into binary and processes it.
o Used where both speed and accuracy are required.
• Examples: Medical machines like ECG (Electrocardiogram), PET Scanners, weather
forecasting systems.
4. Organization of a Computer System
The organization of a computer system refers to the way in which different components of
the computer are structured and interact to perform tasks. A computer does not work as a
single unit but as a combination of different functional parts that handle input, processing,
storage, and output.
For example, when you type on a keyboard (input), the CPU processes your keystrokes,
stores them temporarily in memory, and then displays them on the monitor (output). This
process happens in fractions of a second due to the efficient organization of the computer
system.
4.2 Components of a Computer System
The major components of a computer are:
1. Input Unit
o Function: Accepts raw data and instructions from the user and converts them
into machine-readable form.
o Examples: Keyboard, mouse, joystick, microphone, scanner.
2. Output Unit
o Function: Converts processed information into human-understandable form.
o Examples: Monitor (visual), printer (paper), speakers (audio).
3. Storage Unit
o Function: Stores data permanently or temporarily for later use.
o Divided into primary memory (fast, volatile) and secondary memory
(permanent, non-volatile).
4. Central Processing Unit (CPU)
o The brain of the computer.
o Responsible for executing instructions and controlling other components.
4.3 Central Processing Unit (CPU)
The CPU is the control center of the computer system. It is often called the "brain of the
computer" because all calculations, logical decisions, and control operations are handled
here.
Components of CPU:
1. Arithmetic Logic Unit (ALU):
o Performs all mathematical operations (addition, subtraction, multiplication,
division).
o Handles logical comparisons (greater than, less than, equal to).
2. Control Unit (CU):
o Directs data movement between CPU, memory, and input/output devices.
o Works like a traffic police officer, ensuring data flows in the right direction.
3. Registers:
o Very small, high-speed storage locations inside the CPU.
o Temporarily hold instructions, data, or intermediate results.
Analogy: Think of the CPU as a school:
• Principal (Control Unit) → gives instructions.
• Teachers (ALU) → perform calculations and logic.
• Students’ notebooks (Registers) → hold temporary work.
4.4 Memory Hierarchy
Computers need different kinds of memory for speed, efficiency, and storage capacity. This
leads to the memory hierarchy, which balances speed, size, and cost.
Levels of Memory:
1. Registers (Fastest, Smallest)
o Inside the CPU, used for immediate data storage.
2. Cache Memory
o High-speed memory between CPU and RAM.
o Stores frequently used instructions to save time.
3. Primary Memory (RAM & ROM)
o RAM → Temporary, volatile storage.
o ROM → Permanent storage of boot instructions.
4. Secondary Storage
o Non-volatile, large capacity storage like hard disks, SSDs, DVDs.
5. Tertiary Storage
o Backup and archival storage (magnetic tapes, cloud storage).
Hierarchy Rule: The faster the memory, the smaller and costlier it is. The slower the
memory, the larger and cheaper it is.
4.5 Primary Memory
Primary memory is directly accessible by the CPU and is crucial for processing.
1. RAM (Random Access Memory):
o Temporary storage used during program execution.
o Volatile → contents erased when power is off.
o Types:
▪ DRAM (Dynamic RAM) → Cheaper, slower.
▪ SRAM (Static RAM) → Faster, costlier.
2. ROM (Read Only Memory):
o Non-volatile → permanent storage.
o Stores firmware and boot-up instructions.
o Types: PROM, EPROM, EEPROM.
3. Cache Memory:
o Ultra-fast memory located between CPU and RAM.
o Reduces the time taken to access frequently used data.
4.6 Secondary Storage
Secondary storage is used for long-term data storage. Unlike primary memory, it retains
information even when power is switched off.
• Magnetic Storage: Hard disks, floppy disks (older).
• Optical Storage: CDs, DVDs, Blu-ray discs.
• Solid State Storage: Pen drives, SSDs, memory cards.
• Cloud Storage: Google Drive, OneDrive, Dropbox (internet-based).
Example: When you save a Word file, it is stored in secondary storage (hard disk/SSD), not
in RAM.
5. Software Concepts
5.2 What is Software?
Software is a collection of instructions, data, or programs used to operate a computer and
execute specific tasks. Unlike hardware, which is tangible, software is intangible.
• Developed using programming languages such as C, C++, Java, Python.
• Acts as a bridge between user and hardware.
5.3 System Software
System software is the backbone of a computer. It manages the hardware and provides an
environment where application programs can run.
5.3.1 Types of System Software
1. Operating System (OS):
o Controls hardware resources and provides services to users and applications.
o Functions:
▪ File management (save, delete, organize).
▪ Memory management (allocating RAM).
▪ Process management (running programs).
▪ Device management (keyboard, mouse, printer).
o Examples: Windows, macOS, Linux, Android.
2. Utility Programs:
o Special programs that maintain, analyze, and optimize performance.
o Examples: Antivirus software, Disk Defragmenter, Backup tools, File
compression tools (WinRAR, 7-Zip).
3. Language Translators:
o Convert programs written in high-level or assembly language into machine
code.
o Types:
▪ Compiler (translates the whole program at once).
▪ Interpreter (translates line by line).
▪ Assembler (converts assembly language to machine code).
Analogy: System software is like the operating staff of a hotel—they ensure electricity,
cleaning, and services are running, so guests (applications) can work comfortably.
5.4 Application Software
Application software refers to the programs designed to perform specific tasks for users.
Unlike system software, which runs the computer itself, application software helps users
accomplish particular activities.
5.4.1 Types of Application Software
1. General-Purpose Application Software:
o Designed for a wide range of users.
o Examples:
▪ MS Word, MS Excel, PowerPoint (Office productivity).
▪ Web browsers (Google Chrome, Firefox, Edge).
▪ Media players (VLC, Windows Media Player).
2. Special-Purpose Application Software:
o Developed for specific tasks or industries.
o Examples:
▪ Tally (Accounting).
▪ AutoCAD (Engineering/Design).
▪ Hospital Management Software.
▪ Airline Reservation Systems.
3. Customized Application Software:
o Tailor-made for a particular organization or client.
o Examples:
▪ Banking software for HDFC Bank.
▪ E-commerce software for Amazon/Flipkart.
Analogy: Application software is like the menu in a restaurant—you choose dishes (tasks)
you want, while the hotel infrastructure (system software) ensures smooth service.
5.5 Differences between System Software and Application Software
Feature System Software Application Software
Manages hardware and provides a
Purpose Performs specific tasks for users
platform
Runs independently of application
Dependency Depends on system software to run
software
Feature System Software Application Software
MS Word, Tally, Photoshop,
Examples Windows, Linux, macOS, Android
Browsers
Users Computer itself, technical staff End users (students, teachers, etc.)
Execution Starts when the computer is switched on Runs when the user commands it
5.7 Case Study Example
Case: Mobile Phone Software
• System Software: Android OS or iOS manages phone hardware, battery, storage, and
sensors.
• Application Software: WhatsApp, Instagram, YouTube, and Banking Apps allow users
to perform specific tasks.
• Without Android/iOS (system software), no applications could run on your phone.
6. Programming Languages
Type Description Examples
Machine Language Binary code (0s and 1s) None (hardware-specific)
Assembly Language Symbolic codes, needs assembler MOV, ADD
High-Level Languages (HLL) Easy, English-like, portable C, Java, Python
4GL (Fourth Gen) Focus on reducing coding effort SQL
OOP Languages Based on objects and classes C++, Java
Scripting Languages Lightweight, often web-based JavaScript, PHP
7.1 Applications of Computers and MS Office tools
The invention of the computer has revolutionized the modern world. Today, computers are
not just number-crunching machines but versatile tools used across education, business,
health, communication, research, and entertainment. They help in solving complex
problems, storing vast amounts of data, automating tasks, and improving productivity.
To make computers more user-friendly, software suites like Microsoft Office were
developed. These tools empower users to create documents, analyze data, deliver
presentations, manage databases, and communicate effectively.
7.2 Applications of Computers
Computers have become indispensable in almost every sphere of human activity. Their
applications can be categorized as follows:
7.2.1 Computers in Education
• Teaching and Learning: Teachers use multimedia presentations, e-learning
platforms, and simulations to make classes engaging.
• Student Assignments: Students prepare projects, assignments, and reports using MS
Word, Excel, and PowerPoint.
• E-Libraries: Online resources and digital libraries provide access to books and
research material worldwide.
Example: Universities use Learning Management Systems (LMS) like Moodle, Blackboard,
or Google Classroom to manage courses, conduct online exams, and share study material.
7.2.2 Computers in Business
• Accounting and Finance: Spreadsheets in Excel help prepare balance sheets, income
statements, and cash flow analyses.
• Communication: Email and video conferencing reduce geographical barriers.
• Marketing and Sales: Businesses use data analysis to predict customer behavior and
design targeted campaigns.
Example: E-commerce platforms like Amazon rely heavily on computer systems for
inventory management, online payments, and customer relationship management.
7.2.3 Computers in Healthcare
• Patient Records: Hospitals maintain electronic health records (EHRs) for better
treatment.
• Medical Imaging: Techniques like CT scans, MRIs, and ultrasounds use advanced
computer systems.
• Telemedicine: Remote consultations and online prescriptions improve healthcare
access in rural areas.
Example: AI-based software like IBM Watson assists doctors in diagnosing diseases by
analyzing patient data.
7.2.4 Computers in Banking and Finance
• Online Banking: Enables real-time transactions, fund transfers, and bill payments.
• ATMs: Automated Teller Machines are computer-based systems for cash
withdrawals.
• Stock Market: Computers execute high-speed trading and monitor risks.
Example: UPI (Unified Payments Interface) in India allows instant mobile-based financial
transactions.
7.2.5 Computers in Government and Defense
• E-Governance: Online portals for tax filing, Aadhaar, passport, and land records.
• Defense Applications: Simulation software, satellite monitoring, and defense
communication networks.
Example: The Aadhaar project in India is the largest biometric database in the world,
powered by advanced computer systems.
7.2.6 Computers in Science and Research
• Used for space exploration, climate modeling, DNA sequencing, and artificial
intelligence research.
• Supercomputers can perform trillions of calculations per second, making them
essential for complex simulations.
Example: ISRO uses supercomputers for satellite launches and interplanetary missions.
7.2.7 Computers in Entertainment and Media
• Movies: Special effects (VFX) are created using high-performance computing.
• Music: Editing and composing are done digitally.
• Gaming: Online and VR-based games rely on advanced graphics processors.
Example: Streaming services like Netflix use machine learning algorithms to recommend
shows to viewers.
7.3 MS Office Tools
Microsoft Office is a suite of productivity software applications developed by Microsoft. It
is one of the most widely used software packages in the world.
7.3.1 MS Word – Word Processing Software
• Used for creating, editing, formatting, and printing documents.
• Features: Spell-check, grammar correction, mail merge, tables, charts,
headers/footers.
• Applications: Writing letters, resumes, reports, research papers.
Example: A student preparing a dissertation uses MS Word to format the document with
tables, figures, and references.
7.3.2 MS Excel – Spreadsheet Software
• Used for data entry, calculations, and data analysis.
• Features:
o Formulas and functions (SUM, AVERAGE, IF, VLOOKUP).
o Charts and graphs for data visualization.
o Pivot tables for summarizing large datasets.
• Applications: Budgeting, financial forecasting, business analytics.
Example: A company uses Excel to track sales, calculate monthly revenue, and create
growth forecasts.
7.3.3 MS PowerPoint – Presentation Software
• Used for creating interactive and professional presentations.
• Features:
o Slide templates, transitions, animations.
o Insertion of images, videos, and audio.
o Presenter view for lectures.
• Applications: Business pitches, classroom teaching, workshops.
Example: A startup uses PowerPoint to pitch its business idea to venture capital investors.
7.3.4 MS Access – Database Management Software
• Used to store, manage, and query structured data.
• Features:
o Tables, queries, forms, reports.
o Relational database management system (RDBMS).
• Applications: Inventory management, payroll systems, student databases.
Example: A library uses MS Access to maintain records of books, borrowers, and due dates.
7.3.5 MS Outlook – Communication and Scheduling Software
• Used for emails, task scheduling, and calendar management.
• Features:
o Email sending and receiving.
o Meeting reminders and scheduling.
o Integration with MS Teams.
• Applications: Corporate communication, project collaboration.
Example: Companies use Outlook to manage daily meetings and professional
communication.
Chapter 2: Operating Systems
Introduction
Every time you use your smartphone, laptop, or desktop computer — you are actually
interacting with a special type of software known as an Operating System (OS).
Whether you open Microsoft Word, browse the internet, or play a video, the operating system
is working behind the scenes to make sure everything runs smoothly.
In simple terms, an Operating System is the backbone of a computer.
It manages the hardware (like the CPU, memory, and storage devices), coordinates software
programs, and provides an easy interface for users to interact with the machine.
Without an operating system, a computer would be like a car without a driver — full of
potential, but unable to function effectively.
Definition of Operating System
Definition:
An Operating System (OS) is a system software that acts as an intermediary between the user
and the computer hardware. It manages computer resources and provides services to
application programs.
In other words, it is the manager of the computer system that:
Allocates and monitors the use of resources like CPU, memory, and input/output devices.
Provides an environment where users can execute programs conveniently and efficiently.
Functions of an Operating System
An Operating System (OS) performs a variety of important functions that make the computer
system efficient, reliable, and user-friendly. It acts as a manager of resources and a bridge
between users and hardware, ensuring that all components of the computer work together
smoothly.
The major functions of an Operating System are explained below:
1. Processor Management (CPU Management)
The processor, also called the Central Processing Unit (CPU), is the brain of the computer.
At any given time, many programs or processes may want to use the CPU. The Operating
System decides which process gets to use the CPU, for how long, and in what order.
Key Responsibilities:
Process Scheduling:
The OS uses scheduling algorithms to determine the order in which processes are executed.
For example, when you are listening to music and typing a report, both applications are given
time on the CPU alternately so that both seem to run simultaneously.
Process Creation and Termination:
The OS creates new processes when a program starts and removes them from memory once
they finish.
Context Switching:
When the CPU switches from one process to another, the OS saves the state of the old
process and loads the state of the new one. This ensures smooth multitasking.
Example:
When you open Microsoft Word and Chrome browser together, the OS manages both
applications by rapidly switching the CPU between them, giving the illusion that both are
running at the same time.
2. Memory Management
The main memory (RAM) is a limited and valuable resource.
The OS is responsible for allocating and deallocating memory space to programs so that
multiple processes can run efficiently without interfering with each other.
Key Responsibilities:
Allocation of Memory:
When a program is started, the OS assigns it a specific portion of memory.
Deallocation:
When a program is closed, the OS frees the memory space so that it can be used by other
programs.
Memory Protection:
The OS ensures that one process does not access or modify another process’s memory space,
which prevents data corruption.
Virtual Memory Management:
When physical memory is full, the OS temporarily transfers some data to the hard disk
(known as paging or swapping) to simulate additional memory.
Example:
If your computer runs out of RAM while running large programs, the OS uses part of the hard
disk as virtual memory to keep the system functioning smoothly.
3. File Management
The File Management function of an OS deals with storing, organizing, retrieving, and
managing data on storage devices like hard drives, SSDs, or USB drives.
Files can contain data, programs, or instructions, and are organized into directories (folders)
for easy access.
Key Responsibilities:
File Organization:
The OS maintains a file system to store and arrange files logically (e.g., NTFS in Windows,
EXT4 in Linux).
File Access and Permissions:
It controls who can access which files, ensuring data security and privacy.
File Operations:
The OS provides commands to create, read, write, rename, copy, and delete files.
Backup and Recovery:
The OS helps in recovering data if files are lost or corrupted.
Example:
When you save a Word document, the OS decides where it will be stored on the disk, updates
the directory structure, and ensures that only you or authorized users can modify it.
4. Device Management (Input/Output Management)
Computers use various devices like keyboards, mice, printers, scanners, and monitors.
The Operating System manages all these input and output (I/O) devices so that they can
communicate efficiently with the computer.
Key Responsibilities:
Device Communication:
The OS uses small software programs called device drivers to translate the instructions of the
OS into a form that the hardware devices can understand.
Buffering and Spooling:
Buffering temporarily stores data before sending it to a device (like a printer or monitor).
Spooling manages data from multiple programs waiting to use the same device.
Device Allocation and Deallocation:
The OS assigns devices to processes when needed and releases them after use.
Example:
When you print a document, the OS sends it to the printer driver, stores it in a print queue
(spool), and prints it one by one in the correct order.
5. User Interface Management
The User Interface (UI) is how the user interacts with the computer. The OS provides this
interface to make it easier to give commands and receive results.
Types of User Interfaces:
Command-Line Interface (CLI):
Users type textual commands (e.g., MS-DOS, UNIX shell).
Graphical User Interface (GUI):
Users interact through windows, icons, menus, and buttons (e.g., Windows, macOS).
Key Responsibilities:
Providing tools for users to run programs and manage files.
Translating user commands into system actions.
Making the system more user-friendly.
Example:
When you click on the “Recycle Bin” icon to delete files, the OS translates that action into
file management commands behind the scenes.
6. Security and Access Control
The Operating System ensures that the computer system is secure and protected from
unauthorized access or misuse.
Key Responsibilities:
User Authentication:
Requires users to log in with passwords, PINs, or biometrics.
Access Rights:
Controls which users or applications can access specific files or resources.
Data Encryption:
Protects sensitive data by encoding it, making it unreadable to unauthorized users.
System Protection:
Guards against malware, viruses, and hacking attempts.
Example:
When you try to delete a system file, the OS asks for administrator permission — this is an
example of access control.
7. Error Detection and Handling
Errors can occur due to hardware failure, software bugs, or user mistakes. The Operating
System constantly monitors the system to detect and respond to such issues.
Key Responsibilities:
Error Detection:
Identifying issues such as missing files, printer errors, or memory overflow.
Error Reporting:
Displaying informative error messages to the user.
Error Recovery:
Taking corrective actions such as restarting a process or preventing data loss.
Example:
If a USB drive is suddenly removed during file transfer, the OS shows an error message and
prevents file corruption.
8. Resource Allocation
The OS manages the distribution of all hardware and software resources among different
users and programs to avoid conflicts and ensure efficiency.
Key Responsibilities:
Allocating CPU time, memory, and devices to different programs.
Managing shared resources so that multiple applications can run simultaneously.
Resolving conflicts when two programs request the same resource.
Example:
When multiple applications try to access the printer or hard drive, the OS decides the order
and ensures fairness.
9. System Performance Management
The OS monitors system performance and ensures that resources are being used efficiently.
Key Responsibilities:
Monitoring CPU usage, memory utilization, and input/output performance.
Managing background processes to maintain system speed.
Providing tools like Task Manager to help users track system activity.
Example:
When your computer becomes slow, the OS allows you to check which program is
consuming too much CPU and end the task if necessary.
10. Communication Management
In modern systems, especially in networks, computers need to communicate with each other.
The OS manages data transmission between different systems through network protocols.
Key Responsibilities:
Managing data exchange over networks.
Handling transmission errors and maintaining data integrity.
Supporting communication services such as email, file transfer, and web browsing.
Example:
When you download a file from the internet, the OS handles all data communication between
your system and the remote server.
11. Job Accounting and Monitoring
In business or multi-user environments, the OS keeps track of how system resources are used.
This is useful for performance analysis and cost control.
Key Responsibilities:
Recording CPU time and memory usage per user or program.
Generating reports for system administrators.
Managing billing or usage statistics in large organizations.
Example:
In a company, the OS may log how much printing or processing each department does to
allocate IT costs fairly.
12. Coordination Between Software and Hardware
The OS ensures smooth coordination between hardware components and application
software.
Key Responsibilities:
Translating software instructions into hardware-level commands.
Ensuring compatibility between devices and applications.
Managing updates and driver installations.
Example:
When you play a video, the OS coordinates between the media player software, graphics
card, and sound system to produce synchronized output.
Types of Operating Systems
Computers are used in many different environments — from personal laptops and mobile
phones to large business servers and scientific supercomputers. Each environment has
different needs, and therefore, different types of Operating Systems (OS) have been
developed to handle those needs efficiently.
An Operating System can be classified based on how it manages processes, users, and tasks.
The main types of Operating Systems are:
Batch Operating System
Time-Sharing Operating System
Distributed Operating System
Network Operating System
Real-Time Operating System
Multi-User Operating System
Multi-Tasking Operating System
Mobile Operating System
1. Batch Operating System
Meaning:
The Batch Operating System was one of the earliest types of operating systems, used in the
1950s and 1960s.
In this system, similar jobs are grouped together (in batches) and executed one after another
without direct user interaction.
Users used to submit their programs (called jobs) on punched cards or magnetic tapes. The
OS would then process these jobs in batches.
Example:
IBM Mainframe systems, early versions of UNIX.
Features:
Processes similar jobs in batches.
No real-time user interaction.
Jobs are executed sequentially.
Advantages:
Simple to implement.
Ideal for tasks that do not need immediate results.
Efficient when processing large volumes of repetitive data.
Limitations:
No user control once the job starts.
Debugging is difficult (errors are found only after completion).
Delay in output — results come only after all jobs in a batch are completed.
Business Example:
Used in payroll systems or billing systems where monthly data (like salaries or invoices) can
be processed in bulk at once.
2. Time-Sharing Operating System
Meaning:
A Time-Sharing Operating System allows multiple users to access a single computer system
at the same time.
The CPU time is divided into small intervals called time slices, and each active user/process
gets a short share of CPU time in rotation.
This gives the illusion that all users are working simultaneously — even though the CPU
switches rapidly among them.
Example:
UNIX, Linux, Multics, macOS.
Features:
Multiple users can interact with the system at once.
CPU time is divided fairly among users.
Supports multi-user multitasking.
Advantages:
Efficient use of system resources.
Reduces idle time of the CPU.
Quick response time for each user.
Limitations:
High complexity in system management.
Heavy load may reduce performance.
Requires powerful hardware.
Business Example:
Used in university computer labs or corporate servers where many employees access a shared
system simultaneously.
3. Distributed Operating System
Meaning:
In a Distributed Operating System, a group of computers (nodes) is connected via a network,
and they work together as a single system.
Each node has its own processor and memory, but the OS coordinates them so users
experience a unified system.
Example:
Amoeba, LOCUS, and modern systems like Google’s distributed infrastructure and Hadoop
clusters.
Features:
Multiple systems connected through a network.
Resources (CPU, memory, data) are shared across systems.
High reliability — even if one node fails, others continue to work.
Advantages:
Fast processing due to workload sharing.
Fault-tolerant — one machine’s failure doesn’t crash the system.
Easy scalability (new machines can be added easily).
Limitations:
Expensive to set up and maintain.
Complex communication and synchronization.
Requires reliable network connections.
Business Example:
Used in cloud computing, online banking, and large-scale data processing where multiple
servers handle tasks together.
4. Network Operating System (NOS)
Meaning:
A Network Operating System manages and controls computers connected in a local area
network (LAN) or wide area network (WAN).
Each computer runs its own OS, but the network OS provides services like file sharing,
printer sharing, and communication between systems.
Example:
Microsoft Windows Server, Linux Server, Novell NetWare.
Features:
Centralized control over network resources.
Provides file and printer sharing.
User accounts and permissions managed centrally.
Advantages:
Resource sharing reduces costs.
Easy management of networked devices.
Centralized data backup and security.
Limitations:
Server failure can disrupt the whole network.
Requires trained administrators.
Hardware and maintenance costs can be high.
Business Example:
Used in office environments where many computers share files, internet connections, and
printers through a central server.
5. Real-Time Operating System (RTOS)
Meaning:
A Real-Time Operating System is designed to perform tasks within a fixed time limit.
It is used in systems where timing and reliability are critical — even a small delay can cause
major failure.
Example:
VxWorks, QNX, RTLinux, and even embedded OS in systems like autopilots or medical
devices.
Features:
Processes input and gives output almost instantly.
Handles high-priority tasks first.
Highly reliable and deterministic.
Advantages:
Quick and predictable response.
Ensures consistency in critical systems.
High reliability and stability.
Limitations:
Expensive to design and maintain.
Limited multitasking (focuses on time-sensitive tasks).
Business/Practical Example:
Used in aircraft control systems, medical monitoring equipment, industrial robots, and
automatic security systems.
6. Multi-User Operating System
Meaning:
A Multi-User Operating System allows multiple users to access the same computer resources
(CPU, memory, storage, etc.) at the same time from different terminals.
Each user is given a separate session and cannot interfere with others.
Example:
UNIX, Windows Server, Linux Server.
Features:
Multiple users share system resources.
Provides user authentication and security.
Maintains separate data and sessions for each user.
Advantages:
Cost-effective resource sharing.
Supports collaboration in organizations.
Improves productivity.
Limitations:
Complex system management.
Performance may slow down with too many users.
Business Example:
Used in organizations where multiple employees access a centralized database or server —
like a banking system where tellers use the same server simultaneously.
7. Multi-Tasking Operating System
Meaning:
A Multi-Tasking Operating System can perform multiple tasks at the same time on a single
processor.
The OS rapidly switches between tasks, giving the illusion that all programs are running
simultaneously.
Example:
Windows 10/11, macOS, Linux, Android.
Features:
Executes more than one program at a time.
Ensures CPU time is shared among all processes.
Background tasks (like file downloads) can run while the user works.
Advantages:
Increases system efficiency and productivity.
Saves time for users.
Improves CPU utilization.
Limitations:
Heavy multitasking may slow down performance.
Requires more memory and processing power.
Business Example:
A manager can prepare a report in Word, check emails, and attend an online meeting — all
simultaneously — thanks to multitasking OS like Windows.
8. Mobile Operating System
Meaning:
A Mobile Operating System is specifically designed for smartphones, tablets, and wearable
devices.
It manages mobile hardware, supports wireless communication, and provides a platform for
apps.
Example:
Android (by Google), iOS (by Apple), HarmonyOS, KaiOS.
Features:
Touchscreen interface.
Efficient battery and resource management.
Connectivity features: Wi-Fi, Bluetooth, GPS.
App-based architecture.
Advantages:
User-friendly and portable.
Optimized for mobility and communication.
Offers a wide range of apps for entertainment, productivity, and business.
Limitations:
Limited hardware resources (compared to PCs).
Dependency on app ecosystem.
Security and privacy risks.
Business Example:
Mobile OSs enable business apps like Google Workspace, Microsoft Teams, Zoom, and
banking applications, allowing professionals to work remotely.
Comparison Table: Types of Operating Systems
User
Type Main Feature Example Best Used For
Interaction
IBM
Batch OS Executes jobs in batches No Payroll, billing
Mainframe
Time-Sharing Multiple users share CPU Shared systems,
UNIX, Linux Yes
OS time education
Distributed Combines many computers Amoeba,
Limited Cloud, data centers
OS into one system Hadoop
Manages networked Windows
Network OS Yes Offices, LAN
computers Server
Real-Time Immediate response to RTLinux,
Minimal Critical systems
OS inputs VxWorks
Multi-User Many users access system Banking, corporate
UNIX, Linux Yes
OS simultaneously servers
Multi- Runs multiple programs at Windows,
Yes Personal computers
Tasking OS once macOS
Designed for handheld Smartphones,
Mobile OS Android, iOS Yes
devices tablets
Memory Management
Meaning
When several programs run on a computer at the same time, they all need space in the main
memory (RAM).
The Operating System (OS) is responsible for managing this memory so that every program
gets the space it needs and no data is lost or mixed up.
Definition:
Memory Management is the process by which the operating system allocates and controls
computer memory for different programs and processes.
Objectives of Memory Management
To allocate memory to programs when needed.
To free memory when a program finishes.
To use memory efficiently without waste.
To protect one program’s data from another.
To allow multitasking (running several programs at once).
Functions of Memory Management
Allocation:
Assigning memory space to programs when they start.
Deallocation:
Releasing memory after the program ends so it can be reused.
Protection:
Preventing one process from accessing another’s memory.
Swapping:
Moving inactive programs from main memory to the hard disk (virtual memory) to free
space.
Address Mapping:
Keeping track of which memory address belongs to which process.
Types of Memory
Type Description
Main Memory
Fast, temporary storage used while programs run.
(RAM)
Secondary Memory Permanent storage (like hard drives).
Cache Memory Very fast memory close to CPU for quick access.
Part of the hard drive used as extra RAM when physical memory is
Virtual Memory
full.
Example
When you open Word, Chrome, and Spotify together —
the OS divides memory so each program gets space to run smoothly.
If RAM becomes full, the OS uses virtual memory on the hard disk.
Importance of Memory Management
Ensures smooth multitasking.
Prevents memory waste and overflow.
Improves system performance.
Protects program data.
Allows larger programs to run using virtual memory.
Booting Procedure
Meaning
When you turn on your computer or laptop, it doesn’t start working immediately — it first
loads the operating system into memory.
This process is called Booting.
Definition:
Booting is the process of starting a computer and loading the operating system so that it
becomes ready for use.
Types of Booting
Cold Booting:
When the computer is started after being completely shut down.
Example: Pressing the power button to turn on your system.
Warm Booting:
When the computer is restarted without turning off the power.
Example: Restarting the system using the Restart option or pressing Ctrl + Alt + Del.
Steps in Booting Process
Power On:
When the power is switched on, electricity flows to all computer components.
POST (Power-On Self-Test):
The system checks all hardware components (keyboard, memory, disk drives, etc.) to ensure
they are working properly.
BIOS/UEFI Execution:
The BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface)
stored on the motherboard runs first.
It initializes hardware and looks for a bootable device (like a hard disk).
Loading the Bootloader:
BIOS finds the bootloader program on the selected device (e.g., hard drive).
The bootloader’s job is to start loading the operating system.
Loading the Operating System:
The bootloader loads essential parts of the OS (kernel) into memory.
System Ready:
Once the OS is loaded, it takes control, shows the desktop or login screen, and the computer
is ready to use.
Example
When you turn on a Windows laptop:
The BIOS checks your hardware.
The bootloader loads Windows files.
The Windows logo appears, and after a few seconds, the desktop is displayed.
Importance of Booting
Initializes and tests computer hardware.
Loads the operating system automatically.
Prepares the computer for user interaction.
Ensures system stability and readiness.
1. File
A file is a collection of related data or information stored on a computer.
It can contain text, images, videos, programs, or any digital data.
Example:
[Link] → Word document
Music.mp3 → Audio file
[Link] → Excel spreadsheet
Every file has:
A name (e.g., “Report”)
An extension (e.g., “.docx” or “.jpg”) that shows the file type.
2. Directory (or Folder)
A directory (also called a folder) is a container used to organize files on a computer.
It helps in storing similar files together.
Example:
Folder: Documents
Files inside: [Link], [Link], [Link]
A directory can also have subdirectories (subfolders) — just like a cupboard with smaller
sections.
Example of structure:
Documents
├── College
│ ├── [Link]
│ └── [Link]
└── Office
├── [Link]
└── [Link]
3. Volume
A volume refers to a storage area or partition on a physical storage device like a hard disk or
SSD.
It is a section of the disk that acts as a separate unit for storing data.
Example:
Your computer may have drives like C:, D:, and E: — each one is a volume.
The OS may be stored on C:, and personal files on D:.
4. Label
A label is the name given to a storage device or volume to identify it easily.
Example:
C: drive → Label: “System”
D: drive → Label: “Work Files”
E: drive (USB) → Label: “PEN DRIVE”
It is like a tag or title for a storage device.
5. Drive Name (Drive Letter)
A drive name (or drive letter) is a unique alphabet assigned by the operating system to each
storage device or partition.
Example:
C: → Main hard disk (usually where the OS is installed)
D: → Secondary partition
E: → DVD or USB drive
Drive names help the computer locate files easily, like an address for each storage area.
Introduction to GUI Using Windows Operating System
Meaning of GUI
GUI (Graphical User Interface) is a type of user interface that allows users to interact with the
computer through graphical elements such as windows, icons, menus, and buttons, instead of
typing commands.
It makes computers easy to use, even for beginners.
Windows Operating System and GUI
The Windows Operating System (developed by Microsoft) is the most common example of a
GUI-based operating system.
It allows users to perform tasks like opening files, using applications, or managing folders by
simply clicking, dragging, or selecting icons on the screen.
Main Elements of GUI in Windows
Desktop:
The main screen that appears after the computer starts. It contains icons, folders, and
shortcuts.
Icons:
Small pictures representing files, folders, or applications.
Example: Recycle Bin, My Computer, Word, etc.
Taskbar:
A bar at the bottom of the screen showing open programs, the Start button, and system time.
Start Menu:
The main access point for programs, settings, and power options.
Windows (Application Windows):
Each program or file opens in its own rectangular area called a window, which can be moved,
resized, minimized, or closed.
Mouse and Pointer:
Used to click, select, drag, and open items on the screen.
Menus and Toolbars:
Lists of commands and buttons that help perform specific tasks easily.
Advantages of GUI
Easy to learn and use.
Reduces typing errors.
Provides a visual and interactive environment.
Allows multitasking (running several programs at once).
User-friendly for beginners.
Example
When you open Microsoft Word in Windows:
You click the icon (no command typing needed).
A window opens with menus like File, Edit, View.
You can use the mouse to format text or save files easily.
Computers understand only machine language, which is made up of 0s and 1s.
However, humans write programs in high-level languages (like C, Python, Java) or assembly
language (a simpler, symbolic form of machine code).
Therefore, the computer needs special programs to translate human-written code into
machine language.
These special programs are called Compiler, Interpreter, and Assembler.
1. Compiler
Meaning
A compiler is a program that translates the entire source code (written in a high-level
language like C or C++) into machine code at once, before execution.
Once the translation is done, the compiler creates an executable file that can be run directly
by the computer.
Example
C and C++ languages use compilers such as GCC or Turbo C.
Features
Translates the whole program in one go.
Shows all syntax errors together after compiling.
After successful compilation, the program can run multiple times without recompiling.
Advantages
Runs faster once compiled.
Efficient for large programs.
Disadvantages
Takes more time to compile initially.
Errors must be fixed before the program can run.
2. Interpreter
Meaning
An interpreter is a program that translates and executes code line by line.
It reads one line of the source program, converts it into machine code, and immediately
executes it before moving to the next line.
Example
Languages like Python, JavaScript, and BASIC use interpreters.
Features
Translates one instruction at a time.
Stops immediately when an error occurs.
Does not create a separate executable file.
Advantages
Easier to find and fix errors.
Good for small programs and beginners.
Disadvantages
Slower execution because translation happens during running.
Program must be re-interpreted each time it is executed.
3. Assembler
Meaning
An assembler is a program that converts assembly language code into machine code.
Assembly language uses short codes or mnemonics like MOV, ADD, SUB, which are easier
for humans to understand compared to binary code.
The assembler changes these into 0s and 1s that the CPU can execute.
Example
Used for programming in microprocessors and embedded systems.
Features
Converts low-level assembly code into binary form.
Produces very fast and efficient programs.
Advantages
Provides full control over hardware.
Creates compact, high-performance programs.
Disadvantages
Difficult to learn and use.
Works only on specific hardware.
4. Difference Between Compiler, Interpreter, and Assembler
Basis Compiler Interpreter Assembler
Language Used High-level language High-level language Assembly language
Translation Translates entire program Translates one line at a Translates entire
Method at once time assembly code
Execution Slow (translates while
Fast (runs executable file) Very fast
Speed running)
Shows all errors after Shows errors line by Errors shown during
Error Detection
compilation line assembly
Executes directly, no
Output Creates an executable file Creates machine code
file
Examples C, C++ Python, JavaScript Assembly Language
DATA COOMUNICATION AND COMPUTER NETWORKS
Introduction
In today’s digital world, the ability to exchange information quickly and accurately is
essential for every business. Whether it’s sending an email, conducting a video meeting,
transferring money online, or sharing files between departments—data communication
makes it all possible.
Simply put, data communication refers to the process of transmitting data or information
from one device to another through some form of communication medium.
For example, when you send a WhatsApp message, your text (data) is converted into digital
signals, transmitted through the internet, and received by your friend’s device.
Meaning of Data Communication
Data Communication is the exchange of data between two devices (like computers,
phones, or servers) using some transmission medium such as cables, radio waves, or optical
fibers.
For communication to occur, the data must be:
1. Transmitted from a sender,
2. Travel through a medium, and
3. Received correctly by a receiver.
Example:
When you withdraw money from an ATM, your transaction details are communicated to
your bank’s central server. The server verifies your details and sends back a confirmation
message—all within a few seconds!
Components of Data Communication
Every data communication system has five main components:
1. Message
The actual information or data that needs to be transmitted.
Example: Text, images, videos, numbers, or audio.
2. Sender (Transmitter)
The device that sends the data message.
Example: A computer, mobile phone, or server.
3. Receiver
The device that receives the transmitted data.
Example: Another computer, mobile phone, or printer.
4. Medium (Transmission Channel)
The physical path through which data travels.
Example: Copper wire, fiber optic cable, or wireless signals.
5. Protocol
The set of rules that govern data communication—ensuring both sender and receiver
understand the message.
Example: TCP/IP, HTTP, FTP, etc.
Characteristics of Effective Data Communication
For communication to be effective, it should have the following characteristics:
Characteristic Description
Delivery Data must be delivered to the correct destination.
Accuracy Data must be delivered without any alteration.
Timeliness Data must be delivered at the right time.
Jitter Variation in packet arrival time should be minimal.
Example:
During an online video call, if there’s too much delay or distortion, communication becomes
ineffective.
Types of Data Communication
Data communication can occur in different directions depending on how the data flows
between sender and receiver.
Simplex Communication
• Data flows in one direction only.
• The receiver cannot send any data back.
• Example: A keyboard sending input to a monitor.
Diagrammatically:
→ Sender → Receiver
Half-Duplex Communication
• Data flows in both directions, but only one direction at a time.
• When one device is sending, the other must wait.
• Example: Walkie-talkies, where only one person speaks at a time.
↔ (Alternate one-way at a time)
Full-Duplex Communication
• Data flows in both directions simultaneously.
• Both sender and receiver can transmit at the same time.
• Example: Telephone calls, where both parties can speak and listen together.
↔ (Both directions at once)
Modes of Data Transmission
Data can be transmitted in three main modes:
Mode Description Example
Bits are sent one after another over a single
Serial Transmission USB devices
channel.
Multiple bits are sent simultaneously over
Parallel Transmission Printers
multiple lines.
Synchronous Data sent in blocks or frames, synchronized by Video
Transmission clock signals. conferencing
Asynchronous Data sent character by character with start and
SMS, email
Transmission stop bits.
Types of Communication Media
Communication media are the paths or channels through which data travels from one point
to another. They can be broadly divided into two types:
A. Guided (Wired) Media
Guided media involve the physical transmission of data through cables or wires.
1. Twisted Pair Cable
• Two insulated copper wires twisted together.
• Inexpensive and easy to install.
• Commonly used in telephone lines.
• Speed: Up to 10 Mbps.
• Types:
o Unshielded Twisted Pair (UTP)
o Shielded Twisted Pair (STP)
Advantages:
• Low cost
• Easy to maintain
Disadvantages:
• Susceptible to interference and signal loss
2. Coaxial Cable
• Consists of a central copper conductor surrounded by insulation and metallic
shielding.
• Used in cable TV and broadband.
• Speed: Up to 1 Gbps
Advantages:
• Better resistance to noise
• Higher bandwidth than twisted pair
Disadvantages:
• Thicker and harder to install
3. Optical Fiber Cable
• Uses light signals instead of electrical signals.
• Made of glass or plastic fibers.
• Speed: Extremely high (up to several Tbps)
• Commonly used in internet backbones and large networks.
Advantages:
• Very high speed
• Immune to electromagnetic interference
• Long-distance transmission
Disadvantages:
• Expensive and fragile
• Difficult to install
B. Unguided (Wireless) Media
Unguided media transmit data through the air using electromagnetic waves. No physical
cables are required.
1. Radio Waves
• Used for mobile phones, radio, and Wi-Fi.
• Range: Few meters to several kilometers.
• Can penetrate walls easily.
2. Microwaves
• Used for long-distance communication and satellite links.
• Require line-of-sight between sender and receiver.
• Example: TV broadcasting, mobile networks.
3. Infrared Waves
• Used for short-range communication.
• Example: Remote controls, wireless keyboards, or printers.
4. Satellite Communication
• Uses communication satellites orbiting Earth to transmit signals.
• Example: GPS, satellite phones, DTH television.
Importance of Data Communication in Business
1. Faster Decision-Making: Quick data transfer enables real-time business decisions.
2. Cost Reduction: Minimizes travel and paperwork through electronic communication.
3. Improved Coordination: Helps teams across locations collaborate effectively.
4. Global Connectivity: Enables international trade, meetings, and customer service.
5. Automation and Control: Used in automated systems, banking, and e-commerce.
Concept of Computer Networks
A computer network is a system where two or more computers or devices are connected
together to share data, hardware, software, and communication resources.
Definition:
A computer network is an interconnected collection of autonomous computers and devices
that communicate using a shared communication medium and standard protocols.
Objectives of Computer Networks
Objective Description
Resource Sharing Share printers, files, and internet connections.
Data Communication Exchange information easily between users.
Centralized Manage software updates and user permissions from a central
Management point.
Cost Efficiency Reduces duplication of hardware and saves money.
Central servers can maintain regular data backups and security
Backup and Security
controls.
Advantages of Computer Networks
• File sharing: Quick and easy sharing of data.
• Hardware sharing: Printers, scanners, and storage can be shared.
• Communication: Enables email, chat, and video conferencing.
• Data security and backup: Centralized data management.
• Scalability: Easy to add new devices to the network.
Types of Computer Networks
Computer networks can be classified based on their geographical coverage.
Type Full Form Coverage Area Example
PAN Personal Area Network Within a few meters Bluetooth, phone hotspot
LAN Local Area Network Within a building or campus Office or school network
MAN Metropolitan Area Network Within a city Cable TV network
WAN Wide Area Network Across countries or continents The Internet
Personal Area Network (PAN)
• Smallest type of network.
• Used for communication between personal devices such as smartphones, laptops,
and tablets.
• Example: Bluetooth connection between mobile and wireless earphones.
Local Area Network (LAN)
• Covers a small geographical area, like an office or school.
• High data transfer speed.
• Usually managed by a single organization.
• Example: College computer lab network.
Metropolitan Area Network (MAN)
• Covers a city or large campus.
• Interconnects several LANs.
• Example: A city-wide Wi-Fi network or cable TV provider’s network.
Wide Area Network (WAN)
• Covers large distances—even globally.
• Connects multiple LANs and MANs.
• Uses satellite links or fiber optic cables.
• Example: The Internet is the largest WAN in the world.
Network Topologies
Network topology refers to the physical or logical arrangement of computers, cables, and
other devices in a network.
It defines how nodes are connected and how data flows between them.
4.1 Types of Topologies
1. Bus Topology
• All devices are connected to a single communication line called a bus.
• Data travels in both directions along the bus.
Advantages:
• Easy to set up.
• Cost-effective for small networks.
Disadvantages:
• Entire network fails if main cable breaks.
• Heavy data load can slow communication.
Example: Early Ethernet networks.
2. Star Topology
• All computers are connected to a central device, usually a hub or switch.
Advantages:
• Easy to install and manage.
• Failure of one node does not affect others.
Disadvantages:
• Central device failure brings down the whole network.
• More cabling required.
Example: Office LANs commonly use star topology.
3. Ring Topology
• Each computer is connected to two others, forming a closed loop.
• Data travels in one direction until it reaches its destination.
Advantages:
• Predictable performance under heavy load.
• Equal access to all nodes.
Disadvantages:
• Failure of one node can disrupt the entire network.
• Difficult to reconfigure.
Example: Token Ring networks.
4. Mesh Topology
• Every device is connected to every other device.
• Provides multiple paths for data transmission.
Advantages:
• Very reliable and fault-tolerant.
• Suitable for critical applications.
Disadvantages:
• Expensive and complex.
• Difficult to maintain.
Example: Military communication systems.
5. Tree Topology
• A combination of star and bus topologies.
• Has a central “root” node with branches that resemble a tree.
Advantages:
• Supports network expansion.
• Easy fault detection.
Disadvantages:
• Failure in the backbone affects the entire system.
6. Hybrid Topology
• Combination of two or more topologies.
• Offers flexibility and scalability.
Example: A university campus network using both star and bus configurations.
Comparison of Network Topologies
Topology Cost Reliability Ease of Setup Example Use
Bus Low Low Easy Small offices
Star Medium Medium Easy Modern LANs
Ring Medium Medium Moderate Industrial control systems
Mesh High Very High Complex Military, banking
Tree Medium High Moderate Large organizations
Hybrid High Very High Complex Large universities
Networking Devices
Networking devices are the hardware components that connect computers and manage
data transmission in a network.
Common Networking Devices
1. Network Interface Card (NIC)
• A hardware component that allows a computer to connect to a network.
• Each NIC has a unique MAC address.
• Can be wired (Ethernet) or wireless (Wi-Fi).
2. Hub
• A simple device that connects multiple computers in a network.
• Transmits data to all connected devices, regardless of destination.
• Works at the Physical Layer of OSI Model.
Disadvantage: Causes network congestion.
3. Switch
• Smarter than a hub.
• Forwards data only to the intended device using MAC address.
• Works at the Data Link Layer.
• Reduces unnecessary data traffic.
4. Router
• Connects multiple networks together (e.g., your home network to the Internet).
• Uses IP addresses to route data.
• Works at the Network Layer.
5. Bridge
• Connects and filters traffic between two LAN segments.
• Works at the Data Link Layer.
• Reduces network collisions.
6. Gateway
• Acts as an entrance or exit between different networks.
• Converts data formats and protocols if necessary.
• Works across all layers of OSI Model.
7. Modem
• Short for Modulator-Demodulator.
• Converts digital data from a computer into analog signals (for telephone lines) and
vice versa.
• Used in dial-up and broadband connections.
8. Access Point (AP)
• Enables wireless devices to connect to a wired network using Wi-Fi.
• Commonly used in offices and public areas.
9. Repeater
• Amplifies weak network signals to extend transmission distance.
• Works at the Physical Layer.
OSI Model (Open Systems Interconnection Model)
The OSI Model is a theoretical framework developed by ISO to standardize how data is
transmitted between networked systems.
It divides the communication process into seven layers, each with specific functions.
Layers of OSI Model
Layer Name Function Example
7 Application User interaction and application services Email, browser
6 Presentation Data translation, encryption, compression SSL, JPEG
5 Session Manages sessions and connections Logins, APIs
4 Transport Ensures reliable data transfer TCP, UDP
3 Network Routes data packets IP, routers
2 Data Link Error detection, MAC addressing Switches, Ethernet
1 Physical Transmission of raw bits Cables, hubs
Example of Data Flow (Encapsulation)
When you send an email:
1. Application Layer – You type the message.
2. Presentation Layer – Data is formatted and encrypted.
3. Session Layer – Communication session begins.
4. Transport Layer – Data broken into packets.
5. Network Layer – IP addresses added for routing.
6. Data Link Layer – Frames created with MAC addresses.
7. Physical Layer – Data sent as electrical or optical signals.
Importance of the OSI Model
• Standardization: Provides a universal framework for communication.
• Troubleshooting: Helps identify problems layer by layer.
• Compatibility: Ensures different hardware and software can communicate.
• Education: Simplifies understanding of how networks work.
Concept of Internet
The Internet is a global system of interconnected computer networks that communicate
using a common set of rules called Internet Protocols (TCP/IP).
In simple words, the Internet is a worldwide network that connects millions of computers
and allows users to share data, communicate, and access information.
Features of the Internet
Feature Description
Global connectivity Connects people worldwide.
Resource sharing Enables sharing of data, files, and applications.
Low cost Inexpensive compared to other communication methods.
Accessibility Available 24×7 from anywhere.
Multimedia support Allows text, audio, video, and animation.
Interactive Two-way communication via emails, chats, etc.
Types of Networks Based on Access: Internet, Intranet, and Extranet
Internet
The Internet is a public network that anyone can access. It connects millions of users across
the world through ISPs (Internet Service Providers).
• Example: Google, YouTube, Facebook, and online shopping websites.
• Access: Public (open to everyone).
• Security: Low, as it is open to all users.
Intranet
An Intranet is a private network used within an organization. It uses Internet technologies
(like web browsers and servers) but is accessible only to employees or authorized
members.
• Purpose: To share internal information and improve collaboration.
• Example: A company portal where employees can access HR policies, forms, and
reports.
Advantages:
• Secure and controlled access.
• Enhances communication within an organization.
• Reduces paperwork and improves efficiency.
Example:
A university intranet where students access course materials and grades.
Extranet
An Extranet extends the organization’s intranet to external partners, suppliers, or clients. It
allows controlled access to outsiders for specific business purposes.
• Example: A manufacturing company giving suppliers access to inventory levels.
• Access: Restricted external access (through passwords or VPNs).
• Purpose: Facilitates collaboration beyond the organization’s boundaries.
World Wide Web (WWW)
The World Wide Web (WWW) is a collection of interlinked documents and multimedia
content that can be accessed through the Internet using a web browser.
In simple terms, WWW is the system that allows you to view websites, read articles, watch
videos, and shop online.
• It works on the HTTP protocol (Hypertext Transfer Protocol).
• Web pages are written in HTML (Hypertext Markup Language).
• Each page has a unique address known as a URL.
Example:
When you type [Link], the browser fetches the webpage from Amazon’s web
server.
Components of WWW
1. Web Pages: Individual documents written in HTML.
2. Websites: A collection of related web pages under one domain (e.g., [Link]).
3. Web Browser: Software used to access and view web pages.
4. Web Server: A computer that stores and delivers web pages to users.
File Transfer Protocol (FTP)
FTP (File Transfer Protocol) is a standard protocol used to transfer files between computers
over the Internet.
• It allows users to upload files from their computer to a web server or download files
from a server to their computer.
• Commonly used by web developers and hosting services.
Example:
• Uploading a website’s HTML files to a hosting server.
• Downloading large software from a company’s FTP site.
IP Address
An IP address (Internet Protocol address) is a unique numerical identifier assigned to each
device connected to the Internet.
It acts like a postal address for your computer, helping data find the right destination.
Internet Service Providers (ISPs)
An Internet Service Provider (ISP) is a company that provides Internet access to individuals
and businesses.
Functions of an ISP
• Provides Internet connectivity.
• Assigns IP addresses.
• Offers domain registration, web hosting, and email services.
• Provides technical support and maintenance.
URL (Uniform Resource Locator)
Meaning
A URL is the address of a resource (webpage, image, or file) on the Internet.
It tells the browser where to find a particular webpage.
Example:
[Link]
Components of URL:
• https:// → Protocol
• [Link] → Domain Name
• /[Link] → Specific page on the website
Domain Names
A domain name is a human-readable name that represents an IP address.
Instead of remembering [Link], we can simply type [Link].
Examples of Common TLDs
TLD Meaning
.com Commercial websites
.org Non-profit organizations
.edu Educational institutions
Web Browsers
A web browser is software that enables users to access, view, and interact with websites
and web pages.
It acts as a bridge between the user and the Internet.
Examples of Web Browsers
• Google Chrome
• Mozilla Firefox
Functions of Web Browsers
1. Sending requests to web servers (via HTTP/HTTPS).
2. Displaying HTML content (text, images, videos).
3. Managing bookmarks and history.
4. Supporting plug-ins and security settings.
Internet Protocols
Protocols are set rules or standards that define how data is transmitted over the Internet.
Common Internet Protocols
Protocol Full Form Function
Transfers web pages between servers and
HTTP Hypertext Transfer Protocol
browsers.
HTTPS Secure Hypertext Transfer Protocol Encrypted, secure version of HTTP.
FTP File Transfer Protocol Transfers files between systems.
Protocol Full Form Function
SMTP Simple Mail Transfer Protocol Sends emails.
POP3 Post Office Protocol v3 Retrieves emails from the server.
IMAP Internet Message Access Protocol Manages and syncs emails.
Transmission Control Protocol /
TCP/IP Foundation of Internet communication.
Internet Protocol
DNS Domain Name System Converts domain names into IP addresses.
Search Engines
A search engine is a web-based tool that helps users find information on the Internet by
typing keywords.
It works by indexing web pages and displaying results ranked by relevance.
How Search Engines Work
1. Crawling: Bots scan websites and gather data.
2. Indexing: The collected data is stored in a huge database.
3. Ranking: When a user searches, results are ranked based on relevance and
popularity.
Email (Electronic Mail)
Email is one of the most widely used Internet services for sending and receiving messages
electronically.
It is the digital equivalent of sending letters but much faster, cheaper, and more convenient.
Structure of an Email Address
username@[Link]
Part Description
username The user’s account name
@ Separator
[Link] The mail server hosting the account
Components of an Email System
1. Email Client: Software like Outlook or Gmail app.
2. Mail Server: Stores and forwards emails.
3. Protocols Used: SMTP, POP3, IMAP.
Importance of Internet in Business
1. E-commerce: Selling products online (e.g., Amazon, Flipkart).
2. Communication: Email, video conferencing, and chat.
3. Marketing: Digital ads, SEO, social media promotions.
4. Data Management: Cloud storage and file sharing.
5. Research and Development: Access to vast online resources.
6. Customer Support: Online help desks and feedback systems.
Concept of Protection and Security
Protection
Protection refers to the mechanisms that control access to the resources of a computer
system — such as files, memory, CPU, and software.
It ensures that only authorized users and processes can access or modify system resources.
Example:
• A student can view their grades but cannot edit them.
• Employees in HR can access salary details, but other departments cannot.
Thus, protection is about rights and permissions — who can do what.
Security
Security refers to defending the computer system from external and internal threats such
as hackers, viruses, and unauthorized access.
Security ensures that data remains confidential, intact, and available only to authorized
users.
Example:
• Using passwords, encryption, firewalls, and antivirus software.
Difference Between Protection and Security
Basis Protection Security
Protects system from external/internal
Meaning Controls access to system resources.
attacks.
Concerned with permissions and Concerned with data confidentiality,
Scope
access control. integrity, and safety.
Example File access permissions (read/write). Use of antivirus and firewalls.
Goals of Protection and Security
Every computer system aims to ensure that its resources and information are safe. The three
fundamental goals of computer security are:
Confidentiality
• Ensures that information is accessible only to authorized users.
• Prevents unauthorized disclosure of data.
Example: Only a bank customer should access their account details.
Integrity
• Ensures that data is accurate and not modified by unauthorized users or accidental
errors.
• Protects data from tampering during storage or transmission.
Example:
If an employee’s salary record is ₹50,000, no one should alter it to ₹80,000 without
permission.
Availability
• Ensures that authorized users can access information and resources whenever
required.
• Protects against attacks like Denial of Service (DoS).
Example:
A bank’s online server must be available 24×7 for customers to use internet banking.
Additional Goals
Goal Description
Authentication Verifying the identity of a user (e.g., username and password).
Goal Description
Authorization Granting access rights based on authentication.
Non-repudiation Ensures that a sender cannot deny sending a message.
Accountability Keeping logs of who did what and when.
Threats to Computer Security
Computer systems face numerous threats, both internal (from employees or users) and
external (from hackers or malware).
Threat Type Description Example
Accessing files or systems without
Unauthorized Access Hacking, data theft
permission.
Malicious software that damages
Malware Virus, worm, Trojan
systems.
Fake emails or messages to steal
Phishing Bank fraud emails
credentials.
Denial of Service Overloading a server to make it Website crash during
(DoS) unavailable. cyberattack
Data Theft Copying confidential data illegally. Stealing business secrets
Concept of Encryption and Decryption
Encryption and Decryption are two key methods used to secure data during communication
or storage.
Encryption
Encryption is the process of converting plain (readable) data into coded form using a secret
key or algorithm.
This ensures that unauthorized people cannot understand the information even if they
intercept it.
It is like locking your data with a secret key.
Example:
Plain text: “HELLO”
Encrypted text (using a simple shift cipher): “KHOOR”
Decryption
Decryption is the reverse process of encryption — converting coded (encrypted) data back
into readable form using the correct key.
It’s like unlocking the message with the same or corresponding key.
Example:
Encrypted text: “KHOOR”
Decrypted text: “HELLO”
Types of Encryption
Type Description Example
Symmetric Encryption Same key used for encryption and decryption. AES, DES
Asymmetric Different keys used — a public key and a private
RSA
Encryption key.
Converts data into fixed-length values (not Password
Hashing
reversible). storage
Example of Real-World Encryption
• Online banking uses SSL/TLS encryption to protect transactions.
• WhatsApp uses end-to-end encryption, meaning only the sender and receiver can
read messages.
Computer Viruses and Related Threats
What is a Computer Virus?
A computer virus is a malicious program designed to infect files and systems, replicate
itself, and spread to other devices.
It attaches itself to legitimate programs or files and activates when the file is opened.
Example: A virus attached to an email attachment can spread through the entire
organization when opened.
Characteristics of a Virus
• Infects other programs or files.
• Replicates and spreads without user consent.
• Can corrupt or delete data.
• Often triggered by specific actions or dates.
Types of Computer Viruses
Type Description Example
Boot Sector Virus Infects the boot record of storage devices. Michelangelo virus
File Infector Virus Attaches to executable files (.exe). Cascade virus
Macro Virus Infects documents with macros (Word, Excel). Melissa virus
Polymorphic Virus Changes its code to avoid detection. Storm Worm
Resident Virus Hides in memory and infects files as they’re opened. CMJ virus
Worms
A worm is a self-replicating program that spreads across networks without attaching itself
to other files.
It doesn’t need a host file — it spreads automatically through email or networks.
Example:
• The ILOVEYOU worm (2000) caused billions in damage by spreading through email.
Difference Between Virus and Worm:
Basis Virus Worm
Attachment Attaches to host files. Independent and self-replicating.
Spreading Method Spreads via infected files. Spreads via networks and emails.
Damage Corrupts files and programs. Slows or crashes networks.
Trojan Horse
A Trojan Horse appears as a useful or legitimate program but actually performs malicious
activities once installed.
Example:
A free game download that secretly installs spyware on your system.
Antivirus Software
Antivirus software is a program designed to detect, prevent, and remove malicious
software such as viruses, worms, and Trojans.
It acts as a “security guard” for your computer.
Functions of Antivirus Software
• Scanning: Detects malicious code in files or memory.
• Quarantining: Isolates infected files to prevent spreading.
• Removal: Cleans or deletes infected files.
• Real-Time Protection: Monitors system activity for suspicious behavior.
Examples of Antivirus Programs
• McAfee
• Quick Heal
Firewall
A firewall is a security system that monitors and controls incoming and outgoing network
traffic based on predefined security rules.
It acts as a barrier between a trusted internal network (like your office network) and an
untrusted external network (like the Internet).
Analogy:
Just like a security guard checks people entering a building, a firewall checks data packets
entering or leaving the network.
Types of Firewalls
Type Description
Checks data packets based on source/destination IP and port
Packet-Filtering Firewall
numbers.
Intercepts and inspects all messages between user and
Proxy Firewall
Internet.
Tracks the state of active connections to make smarter
Stateful Inspection Firewall
filtering decisions.
Next-Generation Firewall Combines firewall, antivirus, and intrusion detection
(NGFW) capabilities.
Importance of Firewalls
• Protects against hackers and unauthorized access.
• Filters harmful websites and malware.
• Monitors and logs network activity.
• Helps enforce organizational security policies.
Best Practices for Data Protection and Security
1. Use strong passwords (mix of letters, numbers, and symbols).
2. Enable two-factor authentication (2FA) wherever possible.
3. Encrypt sensitive data before sharing or storing.
4. Install and regularly update antivirus and firewalls.
5. Backup important data frequently.
6. Avoid clicking unknown links or downloading from untrusted sources.
7. Keep your operating system and software up-to-date.
8. Educate employees about cybersecurity awareness.