Uploaded by vasugupta9911

CA

advertisement
BASICS OF COMPUTER
BY:
ISHITA VERMA
USME, DTU
What is a Computer?
• Computer is an electronic device which can be programmed to carry
out various Arithmetic and logical operations.
DATA
RAW FACTS
INPUT
PROCESS
PROCESSING OF DATA
PROCESSING
INFORMATION
PROCESSED
DATA
OUTPUT
CHARACTERISTICS OF COMPUTER
ADVANTAGES OF COMPUTER
▪
▪
▪
▪
▪
Very fast processing.
High storage capacity
Error Free
Never gets tired
Dynamic
LIMITATIONS OF COMPUTER
•
•
•
Can not work by itself
Can not take decisions
Can not learn by experience
EVOLUTION OF COMPUTERS
• FIRST GENERATION COMPUTERS (1946-1952)
➢Used vacuum tubes.
➢Were very large in size and writing programs was very difficult.
➢Examples: ENIAC, EDVAC etc.
• SECOND GENERATION COMPUTERS (1952-1964)
➢Used Transistors.
➢Were smaller in size with higher processing speed.
➢The concept of CPU, Memory, Programming languages and input
output devices were developed during this time.
• THIRD GENERATION COMPUTERS (1964-1970)
➢Used Integrated Circuits(ICs) popularly known as Chips.
➢Size got further reduced as ICs were much smaller in size.
• FOURTH GENERATION COMPUTERS (1970-1990)
➢Used Large Scale Integrated Circuits (LSI) were used.
➢Personal Computer (PC) was developed during this time.
• FIFTH GENERATION COMPUTERS (1990 onwards)
➢Used Very Large Scale Integrated Circuits (VLSI).
➢Concepts of Parallel processing and artificial intelligence were
introduced during this time.
TYPES OF COMPUTER
• DIGITAL COMPUTER – This kind of computer take all the input data in the
form of numbers. All commonly used computers are digital.
• ANALOG COMPUTER – This kind of computer measure some physical
quantity like weather, length of an object, amount of voltage etc and
assigns them numeric values, which are further processed.
• HYBRID COMPUTER – These computers use features of both Digital and
analog computers.
Digital Computers are further classified into :
➢Micro Computer – It is at the lowest end in terms of storage capacity and
processing speed. Its CPU is a Microprocessor. Eg Desktop PCs and laptops.
➢Mini Computer – These are of medium power, more than a Micro
computer but less than a Main frame computer.
➢Main Frame Computer – These operate at very high speed, have very large
storage capacity and can handle many users at a time.
➢Super Computer – These are the fastest and the most expensive
computers.
BLOCK DIAGRAM OF COMPUTER
INPUT DEVICE – These are the devices which are used to give
data to the computer.
output DEVICE – These are the devices which are used to
display output from the computer.
Projector
Central Processing Unit (CPU)
• This is the brain of computer which does all the processing of
instructions.
• It has 2 parts: CONTROL UNIT (CU) and ARITHMETIC LOGIC UNIT
(ALU).
• CU will fetch the instruction from the memory and decode it.
• ALU will perform the required Arithmetic and logical operations, for
execution of instruction.
MEMORY
• There are primarily 2 types of memory in computer:
Main Memory (Primary Memory) and Secondary Memory
• Main Memory : It is this memory with which the CPU can interact
directly. It is further divided into 2 parts:
RAM AND ROM
➢ RAM : Random Access Memory is volatile in nature i.e. its contents get
lost when the power is turned off.
➢ROM : Read Only Memory is nonvolatile in nature i.e. its contents are
not lost even when the power is turned off.
• Secondary Memory : Also called as Auxiliary Memory, it is used to
increase the limited storage capacity of main memory.
• DIFFERENCE BETWEEN PRIMARY MEMORY AND SECONDARY MEMORY
PRIMARY MEMORY
SECONDARY MEMORY
1. It is faster to access.
1. It is time consuming to access as the program
needs to be first brought to main memory in
order to be executed.
2. It is costly.
2. It is cheaper.
3. It is also called as MAIN MEMORY.
3. It is also called as Auxilliary memory.
4. It is temporary memory or volatile in nature.
4. It is non-volatile in nature.
5. It has limited storage capacity.
5. The storage capacity has is unlimited.
• DIFFERENCE BETWEEN RAM AND ROM
RAM
ROM
1. It is called Random Access Memory.
1. It is Read Only Memory.
2. The contents of this memory are lost as soon
as power is turned off.
2. The contents of this memory are permanent
in nature.
3. This is expensive.
3. This is cheaper.
4. This memory allows both reading and
modification.
4. This memory allows only reading but not
modification.
PROTECTION & SECURITY
• Goals of Protection and Security:
The Primary goal of ensuring protection and security is to prevent our
computer system and confidential data against cybercrime. Cybercrime
means criminal activities which are carried out using computer and
internet. The most common types of cybercrime are:
➢Phishing: It is a fraudulent attempt usually made through E mail, phone
calls, SMS etc seeking your personal and confidential details.
➢Cyber theft: It is the stealing of financial and/or personal information
through the use of computers for making its fraudulent or other illegal
use. Cybertheft includes hacking of a bank’s computer records to
wrongfully credit one account and debit another and interfere with a
copyright by wrongfully sending protected material over the internet.
➢Cyber stalking: It is the act of using internet to make someone else afraid or
concerned about their safety. Most of the time the stalkers use social Media,
internet databases, search engines and other databases to cause terror and
anxiety to others.
➢Malware: Also called as Malicious software, has been intentionally designed
to cause harm to someone’s computer system or network. It includes
Computer Virus, Worm, Trojan Horse etc.
➢Spyware: It is a software which gets installed in a user’s computer without
his knowledge and transfers all this surfing information along with personal
information like bank account details, credit card number etc over the
internet. It can also interfere with a user’s control of the system by installing
additional software or redirecting web browsers.
Virus, Worm and Trojan Horse
• Virus: Computer virus is also like a human virus. It attaches itself to a
program or a file and spreads from one computer to others through that
file/program. It requires the file to be executed in order for the virus to
cause the harm i.e the virus may be lying in your system but till the time you
don’t execute the infected file, it will not be able to harm your system.
• Worm: Worm is similar to a virus in its design but it does not require any
human action in order to cause the harm. It has the capability to replicate
itself and then spread through the network without being attached to a file.
One example is a worm can make copies of itself and then send to every
person in your email address book.
• Trojan Horse: It is a destructive program which looks like a genuine
application and thus gives malicious users/hackers access to your system to
steal away your personal and confidential data.
Steps to control Cybercrime
➢Use of passwords: We should always keep our system and data password
protected. Passwords should be strong i.e a mix of alphabets, numbers and
symbols etc so that they are difficult to guess. Also they should be changed
frequently.
➢Use of Antivirus software: Antivirus software also called as Anti-malware is a
computer program developed to prevent, detect and remove malware from
our systems. Some common Antivirus software are Norton antivirus,
Kaspersky etc
➢Use of Firewall: It is a network security device which monitors data coming
in and going out of a network and decides whether to allow or block some
data packets based on a defined set of rules. Firewalls can be either hardware
or software. If they are hardware then they are installed at the entry point of
a network. If they are software then they will be installed on user’s
computers.
➢Use of Encryption and Decryption:
Encryption is the process of converting the plaintext into something that
looks random and meaningless, called as Ciphertext. Decryption is the process
of obtaining the plaintext back from ciphertext.
There are different Encryption algorithms which can be used for encrypting
the data. The goal of every Encryption algorithm is to make it impossible to get
the plaintext back from the ciphertext.
Whenever any confidential data is to be sent over a network it is always
encrypted at the sender’s end and then transmitted over the network. This
makes the data secure from hackers. Everytime we use ATM, make payments
online or access our bank account details, the data is always transmitted over
the internet in encrypted form only.
Cyber laws
• Cyber laws are the laws which safeguard the citizens against cyercrime
like Cyber bullying, hacking, Identity theft, Cyber stalking etc.
• The Information Technology Act, 2000 (also known as ITA-2000, or
the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on
17 October 2000. It is the primary law in India dealing with cybercrime .
• The main objectives of IT Act 2000 are as follows:
➢ to provide legal recognition to all electronic transactions.
➢To give legal recognition to digital signatures.
➢To give legal recognition to keeping of accounting books in electronic
form by banks and other organizations.
➢To provide online privacy and prevent cyber crimes.
Download