Sunday, November 6, 2022

Overview



In the modern world of electronics, the term Digital is generally associated with a computer because the term Digital is derived from the way computers perform operation, by counting digits. For many years, the application of digital electronics was only in the computer system. But now-a-days, digital electronics is used in many other applications. Following are some of the examples in which Digital electronics is heavily used.

  • Industrial process control
  • Military system
  • Television
  • Communication system
  • Medical equipment
  • Radar
  • Navigation

Signal

Signal can be defined as a physical quantity, which contains some information. It is a function of one or more than one independent variables. Signals are of two types.

  • Analog Signal
  • Digital Signal

Analog Signal

An analog signal is defined as the signal having continuous values. Analog signal can have infinite number of different values. In real world scenario, most of the things observed in nature are analog. Examples of the analog signals are following.

  • Temperature
  • Pressure
  • Distance
  • Sound
  • Voltage
  • Current
  • Power

Graphical representation of Analog Signal (Temperature)

Analog Signal

The circuits that process the analog signals are called as analog circuits or system. Examples of the analog system are following.

  • Filter
  • Amplifiers
  • Television receiver
  • Motor speed controller

Disadvantage of Analog Systems

  • Less accuracy
  • Less versatility
  • More noise effect
  • More distortion
  • More effect of weather

Digital Signal

digital signal is defined as the signal which has only a finite number of distinct values. Digital signals are not continuous signals. In the digital electronic calculator, the input is given with the help of switches. This input is converted into electrical signal which have two discrete values or levels. One of these may be called low level and another is called high level. The signal will always be one of the two levels. This type of signal is called digital signal. Examples of the digital signal are following.

  • Binary Signal
  • Octal Signal
  • Hexadecimal Signal

Graphical representation of the Digital Signal (Binary)

Digital Signal

The circuits that process the digital signals are called digital systems or digital circuits. Examples of the digital systems are following.

  • Registers
  • Flip-flop
  • Counters
  • Microprocessors

Advantage of Digital Systems

  • More accuracy
  • More versatility
  • Less distortion
  • Easy communicate
  • Possible storage of information

Comparison of Analog and Digital Signal

S.N.Analog SignalDigital Signal
1Analog signal has infinite values.Digital signal has a finite number of values.
2Analog signal has a continuous nature.Digital signal has a discrete nature.
3Analog signal is generated by transducers and signal generators.Digital signal is generated by A to D converter.
4Example of analog signal − sine wave, triangular waves.Example of digital signal − binary signal.

Sunday, October 30, 2022

Shortcut Keys



Short-cut keys Functions
Commonly Used Short-cut Keys
F1Universal help (for any sort of program).
Alt + FFile menu options in current program.
Alt + EEdits options in current program.
Ctrl + ASelects all text.
Ctrl + XCuts the selected item.
Ctrl + CCopies the selected item.
Ctrl + VPastes copied item.
HomeTakes the user to the beginning of the current line.
EndTakes the user to the end of the current line.
Ctrl + HomeTakes the user to the beginning of the document.
Ctrl + EndTakes the user to the end of the document.
Shift + HomeHighlights from the current place to the beginning of line.
Shift + EndHighlights from the current place to the end of line.
Microsoft Windows Shortcut Keys
Ctrl + F4Closes window in program.
Alt + F4Closes current open program.
F2Renames the selected icon.
F3Start find from desktop.
F4Opens the drive selection when browsing.
F5Refreshes contents.
Alt + TabSwitches from one open application to another open application.
Alt + Shift + TabSwitches backwards between open applications.
Alt + Print ScreenCreates screen shot for current program.
Ctrl + Alt + Del.Opens windows task manager/reboot.
Ctrl + EscBrings up start menu.
Alt + EscSwitches between applications on taskbar.
Ctrl + Plus (+) KeyAutomatically adjusts widths of all columns in Windows Explorer.
Alt + EnterOpens properties window of selected icon or program.
Shift + F10Simulates right-click on selected item.
Shift + DelDeletes selected programs/files permanently.
Holding Shift During Boot-upEnables boot safe mode or bypass system files.
Ctrl + NStarts a new note.
Ctrl + OOpens a recently used note.
Ctrl + SSaves changes to a note.
Ctrl + PPrints a note.
Alt + F4Closes a note and its Journal window.
Ctrl + ZHelps Undo a change.
Ctrl + YHelps Redo a change.
Ctrl + ASelects all items on a page.
Ctrl + XCuts a selection.
Ctrl + CCopies a selection to the Clipboard.
Ctrl + VPastes a selection from the Clipboard.
EscCancels a selection.
Ctrl + FStart a search tool.
Ctrl + Shift + CDisplay a shortcut menu for column headings in a note list.
Microsoft Word Shortcut Keys
Ctrl + NCreates a new document.
Ctrl + OOpens an existing document.
Ctrl + SSaves changes to a document.
F12Saves the document as a new file.
Ctrl + PPrints a document.
Ctrl + ZHelps Undo a change.
Ctrl + YHelps Redo a change.
Ctrl + ASelects the whole document.
Ctrl + XHelps cut a selection
Ctrl + CCopies a selection to the Clipboard.
Ctrl + VPastes a selection from the Clipboard.
Ctrl + BMakes selected text bold.
Ctrl + IItalicizes selected text.
Ctrl + UUnderlines selected texts.
Ctrl + LAligns text left.
Ctrl + RAligns text right.
Ctrl + EAligns text center.
Ctrl + JHelps justify text.
Ctrl + 1Sets single line spacing.
Ctrl + 2Sets double line spacing.
Ctrl + 5Sets line spacing to 1.5.
Ctrl + Shift + AChanges characters to all capitals.
Ctrl + DInserts a Microsoft Paint drawing.
Ctrl + FFinds text
Ctrl + HomeMoves to the beginning of the document.
Ctrl + EndMoves to the end of the document.

Development



In this chapter, we will discuss the development in Computer Science chronologically.

The following table lists down the development −

YearDevelopment
1959Transistors: IBM 7090; IBM 1401
1962NPN transistor
1963Mouse; CMOS patented
1964CDC 6600; IBM Data Cell Drive
1966Integrated circuits: HP 2116A
1966Apollo Guidance Computer
1969Honeywell 316
19718" floppy disk; ILLIAC IV
1973Micral first microprocessor PC
1980Sinclair ZX80, Seagate hard disk drive
1981IBM PC, Acorn BBC Micro
1983Apple Lisa; 3.5" floppy
1984Apple Mac; Apple Lisa 2
1988Dell
1989NeXT
1991Apple Switches to PowerPC
1992HP 95LX; Palmtop PC
1995IBM Deep Blue chess computer
1996USB 1.0
1997Compaq buys Tandem; CD-RW
1998iMac
2000USB 2
2001Apple iPod
2005Mac Mini
2006Apple transition to Intel
2007iPhone 1
2008USB 3.0
2010Apple iPad
2012IBM zEnterprise System

Abbreviations



In this chapter, we will discuss the different abbreviations in Computer Science. The following table lists down those abbreviations −

AbbreviationFull-name
A/DAnalog-to-Digital
ABCAtanasoff Berry Computer
ACMAssociation for Computing Machinery
AIArtificial Intelligence
ALGOLAlgorithic Language
ALUArithmetic Logic Unit
AMDAdvanced Micro Devices
APRANETAdvanced Research Project Agency Network
ASCIIAmerican Standard Code for Information Interchange
BASICBeginners All-purpose Symbolic Instruction Code
BCDBinary Coded Decimal
BIOSBasic Inpute Output System
BIPSBillions of Instructions Per Second
BPIBytes Per Inch
CADComputer Aided Design
CAEComputer Aided Engineering
CANCampus Area Network
CASEComputer Aided Software Engineering
CDCompact Disk
CDCControl Data Corporation
CD-RCD-Recordable
CD-ROMCompact Disk Read Only Memory
CD-RWCD Read/Write
CLCommand Language
CLICommand Line Interface
COBOLCommon Business Oriented
CODASYLConference On Data Systems
CPUCentral Processing Unit
CRTCathode Ray Tube
D/ADigital-to-Analog
DATDigital Audio Tape
DBMSData Base Management System
DBSDemand Based Switching
DDLData Definition Language
DDSDigital Data Storage
DECDigital Equipment Corporation
DMADirect Memory Access
DNADigital Network Architecture
DPIDots Per Inch
DRAMDynamic RAM
DSNDistributed Systems Network
DTSDigital Theater System
DVDDigital Video/Versatile Disk
EBCDICExtended Binary Coded Decimal Interchange Code
EDSACElectronic Delay Storage Automatic Calculator
EDVACElectronic Discrete Variable Automatic Calculator
EFMEight-to-Fourteen Modulation
ENIACElectronic Numerical Integrator And Calculator
EPGElectronic Programming Guide
EPICExplicitly Parallel Instruction Computing
EPROMErasable Programmable Read-Only Memory
FATFile Allocation Table
FDMFrequency Division Multiplexing
FEPFront End Processor
FLOPSFloating Point Operations Per Second
FMFrequency Modulation
FMSFile Management System
FORTRANFORmula TRANslation
FSKFrequency Shift Keying
FTPFile Transfer Protocol
GBGiga Bytes
GFLOPSGiga FLOPS
GHzGiga Hertz
GNUGnu Not Unix
GPRSGeneral Packet Radio Service
GSMGlobal System for Mobile communication
GUIGraphical User Interface
HPHewlett Packard
HSSHierarchical Storage System
HTMLHyperText Markup Language
HTTPHyperText Transport Protocol
IBMInternational Business Machine
ICIntegrated Circuit
IDNIntegrated Digital Networks
IPInternet Protocol
IrDAInfrared Data Association
ISDNIntegrated Services Digital Network
ISPInternet Service Provider
JPEGJoint Photographic Experts Group
JREJava Runtime Engine
JSPJava Server Pages
KBKilo Bytes
KHzKilo Hertz
LANLocal Area Network
LCDLiquid Crystal Display
LEDLight Emitting Diode
LPMLine Per Minute
LSILarge Scael Integration
MANMetropolitan Area Network
MARMemory Address Register
MBMega Bytes
MBRMemory Buffer Register
MHzMega Hertz
MIDIMusical Instrument Digital Interface
MIPSMillions of Instructions Per Second
MNPMicrocom Network Protocol
MPEGMoving Pictures Experts Group
MS-DOSMicroSoft Disk Operating System
MVTMultiprogramming with Variable Tasks
NICNetwork Interface Card
NICNETNational Informatics Center NETwork
NOSNetwork Operating System
OCROptical Character Recognition
OMROptical Mark Reader
OSOperating System
OSIOpen System Interconnection
OSSOpen Source Software
PANPersonal Area Network
PCPersonal Computer
PDFPortable Document Format
PDLProgram Design Language
PDPProgram Data Processor
PIPPeripheral Interchange Program
PROMProgrammable Read-Only Memory
QoSQuality of Service
RAMRandom Access Memory
ROMRead Only Memory
SDLCSoftware Development Life Cycle
SEQUELStructured English QUEry Language
SGMLSyntax for Generalized Markup Language
SIMMSingle In-line Memory Module
SNASystems Network Architecture
SNOBOLStriNg Oriented and symBOlic Language
SQLStructured Query Language
SRAMStatic RAM
SSISmall Scale Integration
TBTera Bytes
TCPTransport Control Protocol
TDMTime Division Multiplexing
UDPUser Datagram Protocol
ULSIUltra Large Scale Integration
UPCUniversal Product Code
URLUniform Resource Locator
USBUniversal Serial Bus
UTFUnicode Transformation Format
VANValue Added Network
VCRVideo Cassette Recorder
VDTVideo Display Terminal
VGAVideo Graphics Array
VODVideo-On-Demand
VoIPVoice over Internet Protocol
VSATVery Small Aperture Terminal
WANWide Area Network
WAPWireless Application Protocol
WiMAXWorldwide Interoperability for Microwave Access
WLANWireless Local Area Network
WLLWireless Local Loop
WORMWrite Once Read Many
WWWWorld Wide Web
XHTMLeXtensible HyperText Markup Language
XMLeXtensible Markup Language
X.400Electronic Mail Protocol
X.500Directory Server Protocol

Virus



A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them.

Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it across every folder and damage the data of your computer system.

A computer virus is actually a malicious software program or "malware" that, when infecting your system, replicates itself by modifying other computer programs and inserting its own code.

Computer Virus

Infected computer programs may include data files, or even the "boot" sector of the hard drive.

Types of Virus

Following are the major types of computer virus −

Worms

This is a computer program that replicates itself at a swift pace. Unlike a computer virus, it is self-contained and hence does not need to be part of another program to propagate itself.

Trojan Horse

A Trojan Horse is also a sort of destructive program that remains disguised in a normal software program. It is not exactly a virus, as it cannot replicate itself. However, there is possibility that virus program may remain concealed in the Trojan Horse.

Bombs

It is similar to Trojan Horse, but Logic bombs have some specialty; these include a timing device and hence it will go off only at a particular date and time.

How Does Virus Affect?

Let us discuss in what ways a virus can affect your computer system. The ways are mentioned below −

  • By downloading files from the Internet.
  • During the removable of media or drives.
  • Through pen drive.
  • Through e-mail attachments.
  • Through unpatched software & services.
  • Through unprotected or poor administrator passwords.

Impact of Virus

Let us now see the impact of virus on your computer system −

  • Disrupts the normal functionality of respective computer system.
  • Disrupts system network use.
  • Modifies configuration setting of the system.
  • Destructs data.
  • Disrupts computer network resources.
  • Destructs of confidential data.

Virus Detection

The most fundamental method of detection of virus is to check the functionality of your computer system; a virus affected computer does not take command properly.

However, if there is antivirus software in your computer system, then it can easily check programs and files on a system for virus signatures.

Virus Preventive Measures

Let us now see the different virus preventive measures. A computer system can be protected from virus through the following −

  • Installation of an effective antivirus software.
  • Patching up the operating system.
  • Patching up the client software.
  • Putting highly secured Passwords.
  • Use of Firewalls.

Most Effective Antivirus

Following are the most popular and effective antivirus from which you can choose one for your personal computer −

  • McAfee Antivirus Plus
  • Symantec Norton Antivirus
  • Avast Pro Antivirus
  • Bitdefender Antivirus Plus
  • Kaspersky Anti-Virus
  • Avira Antivirus
  • Webroot Secure Anywhere Antivirus
  • Emsisoft Anti-Malware
  • Quick Heal Antivirus
  • ESET NOD32 Antivirus

Threat



Threat in a computer system is a possible danger that might put your data security on stake. The damage is at times irreparable.

Computer Threat

Definition

As defined by the National Information Assurance Glossary −

  • “Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.”

  • A computer threat can be "intentional" such as hacking or "accidental" such as malfunctioning of or physical damage.

Types of Threat

Following are the most common types of computer threats −

  • Physical damage − It includes fire, water, pollution, etc.

  • Natural events − It includes climatic, earthquake, volcanic activity, etc.

  • Loss of services − It includes electrical power, air conditioning, telecommunication, etc.

  • Technical failures − It includes problems in equipment, software, capacity saturation, etc.

  • Deliberate type − It includes spying, illegal processing of data, etc.

Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of media, retrieval of discarded materials, etc.

Sources of Threat

The possible sources of a computer threat may be −

  • Internal − It includes employees, partners, contractors (and vendors).

  • External − It includes cyber-criminals (professional hackers), spies, non-professional hackers, activists, malware (virus/worm/etc.), etc.

Common Terms

Following are the common terms frequently used to define computer threat −

Virus Threats

A computer virus is a program designed to disrupt the normal functioning of the computer without the permission of the user.

Spyware Threats

Spyware is a computer program that monitors user’s online activities or installs programs without user’s consent for profit or theft of personal information.

Hackers

Hackers are programmers who put others on threats for their personal gain by breaking into computer systems with the purpose to steal, change or destroy information.

Hackers

Phishing Threats

It is an illegal activity through which phishers attempt to steal sensitive financial or personal data by means of fraudulent email or instant messages.

How to Secure Your Computer System from Threats?

Following are the significant tips through which you can protect your system from different types of threat −

  • Install, use, and keep updated Anti-Virus in your system.
  • Install, use, and keep updated a Firewall Program.
  • Always take backups of your important Files and Folders.
  • Use Strong and Typical Passwords.
  • Take precaution especially when Downloading and Installing Programs.
  • Install, use, and keep updated a File Encryption Program.
  • Take precaution especially when Reading Email with Attachments.
  • Keep your Children aware of Internet threats and safe browsing.

Monday, October 24, 2022

Security



Advancement of computer technology has radically changed the world; resultantly, most of the works whether it is matter of nation’s security system or buying a shoe online everything depends on computer.

Such increased dependency also raises the issue of security, as most of the data is now stored in the computer system.

Computer Security

Your computer systems store various sorts of data and hence if it is not secured, then you might be in for a big trouble.

Why Do We Computer Security?

Let us now see why do we need Computer security. It is required for the following major reasons −

  • To prevent damage of the hardware.

  • To prevent theft or damage of the installed software.

  • To prevent theft or damage of stored data and information.

  • To prevent the disruption of service.

  • Likewise, security system keeps the computer system safe by protecting the installed software and the stored data (information).

Protection of Data and Information

Following are the important steps to protect data −

  • Make backup of all your important files.
  • Keep your system virus by using anti-virus software.
  • Keep updating your computer system.
  • Run disk defragmenter and disk cleanup on certain interval of time.
  • Use a firewall.
  • Use anti-spyware software.

Further, if you use internet, then you need to take greater precaution. Consider the following points to understand the precautions that need to be taken −

  • Do not click on any link that you don’t know (as it may be dangerous for your computer - virus attack).

  • Do not open unauthorized an unlawful website (it may damage your computer system).

  • Do not download unsolicited data from unknown website.

What is Defragmentation?

Frequent saving and deleting of file (data) from the hard disk creates problems in performance and also reduce the space; therefore, defragmentation again clean-up the drive and restore the system to run smoothly.

Following are the simple steps of defragmentation −

Defragmentation

Disk Cleanup

While browsing websites (on internet), many of the files get stored in the hard disk automatically (actually these stored files later help to reopen the website faster); besides some other cookies also get stored in the hard disk. All these stored files create problem along with eating space.

So, disk cleanup process cleans all these files and releases the space occupied by these unwanted files.

Following are the simple steps of disk cleanup −

Disk Cleanup

AntiVirus

Antivirus software is designed to find known viruses and oftentimes other malware such as Ransomware, Trojan Horses, worms, spyw...