SEE COMPUTER SCIENCE Notes of computer science class 10
CONTENTS1.1. Networking and Telecommunication
1.2 Ethical and Social Issues in ICT
1.3 Computer Security
1.5 Contemporary Technology
1.6 Number System
2.1 Database Management System
3.1 Programming in QBASIC
3.2 Modular Programming
3.3. File handling in QBASIC
4.1 Structured Programming in c
1.1 Networking and Telecommunication
Communication:
Communication is sending and receiving information between two or more persons.
Telecommunication:
Telecommunication is a system of transmission of sounds, images, texts or data in the form of electronic
signals.
Telecommunication is a system of transmission of sounds, images, texts or data in the form of electronic
signals.
Data Communication:
Data communication is a process of transferring data electronically from one place to other using different transmission mediums. Eg. E-Mail, Chat and phone calls.
Data communication is a process of transferring data electronically from one place to other using different transmission mediums. Eg. E-Mail, Chat and phone calls.
Components of Data Communication:
i) Data ii) Sender iii) Medium iv) Receiver v) Protocol
Medium:
A path through which the sender makes communication to the receiver is known as medium
Protocol [MFT 2075]:
Protocol is a set of rules by which computers on the network communicate with each other.
E.g. TCP/IP, SMTP, HTTP etc.
Data Transmission Mode [MF 2076]:
i) Data ii) Sender iii) Medium iv) Receiver v) Protocol
Medium:
A path through which the sender makes communication to the receiver is known as medium
Protocol [MFT 2075]:
Protocol is a set of rules by which computers on the network communicate with each other.
E.g. TCP/IP, SMTP, HTTP etc.
Data Transmission Mode [MF 2076]:
Data transmission mode is the way of transmission of data from one location to another.
There are three types of transmission mode:
i) Simplex mode
ii) Half duplex mode
iii) Full Duplex Mode
Simplex mode [MF 2076]:
The transmission mode in which transmission of data can take place in one direction only is called simplex mode.
E.g.: Newspaper, Radio and Television.
Half duplex mode [MF 2076]:
The transmission mode in which transmission of data can take place in both directions but only in one
direction at a time is called half duplex mode.
E.g.: Wireless handset and walkie-talkie.
Full duplex mode [MF 2076]:
The transmission mode in which data can be transmitted in both directions simultaneously is called full
duplex mode.
E.g.: Telephone, internet etc.
Bandwidth [SEE 2066]:
Bandwidth can be defined as the maximum volume of data that can be transmitted through a communication system.
E.g.: Telephone, internet etc.
Bandwidth [SEE 2066]:
Bandwidth can be defined as the maximum volume of data that can be transmitted through a communication system.
We can measure bandwidth in digital devices by bits per second and in analogue devices by cycles per
second or Hertz (Hz).
Transmission medium / Communication Channel [SLC 2070 S] [SEE 2074 U]:
Transmission medium is a pathway that can transmit information from a sender to a receiver through wired or wireless medium on a network.
The types of communication medium are:
i) Guided Medium (Bounded or Wired)
ii) Unguided Medium (Unbounded or Wireless)
Guided medium [SEE 2074 U]:
The transmission media which comprises of cables or wires through which data is transmitted is called guided medium.
They are called guided since they provide a physical channel from the sender device to the
receiver device. The signal travelling through these media are bounded by the physical limits of the medium.
E.g.: twisted pair cable, co-axial cable, fibre optics cable, etc.
Features of guided media: [SEE 2075]:
a) Data transmits through the physical cable or fixed path
b) Data transmission rate is higher.
Unguided medium [SEE 2074 U]:
Transmission medium / Communication Channel [SLC 2070 S] [SEE 2074 U]:
Transmission medium is a pathway that can transmit information from a sender to a receiver through wired or wireless medium on a network.
The types of communication medium are:
i) Guided Medium (Bounded or Wired)
ii) Unguided Medium (Unbounded or Wireless)
Guided medium [SEE 2074 U]:
The transmission media which comprises of cables or wires through which data is transmitted is called guided medium.
They are called guided since they provide a physical channel from the sender device to the
receiver device. The signal travelling through these media are bounded by the physical limits of the medium.
E.g.: twisted pair cable, co-axial cable, fibre optics cable, etc.
Features of guided media: [SEE 2075]:
a) Data transmits through the physical cable or fixed path
b) Data transmission rate is higher.
Unguided medium [SEE 2074 U]:
The transmission media which transfer data in the form of electromagnetic waves that do not require any
cables for transmission is called unguided medium. These media are bounded by geographical boundaries.
E.g.: radio wave, microwave, infrared etc.
Guided VS Unguided Media
Guided media is a medium that sends signals Unguided media is a medium that transmits signals
through a solid physical path. through free space.
cables for transmission is called unguided medium. These media are bounded by geographical boundaries.
E.g.: radio wave, microwave, infrared etc.
Guided VS Unguided Media
Guided media is a medium that sends signals Unguided media is a medium that transmits signals
through a solid physical path. through free space.
There is a specific direction to send signals. There is no particular direction to send signals.
Used in wired transmission Helps wireless transmission
Used in wired transmission Helps wireless transmission
Twisted pair, coaxial cable, and fiber optics Radio wave, microwave, and infrared
Twisted pair cable:
A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted wires are bundled to form cable. These are the most common medium for LAN. Wires are twisted with each other so as to reduce crosstalk (A disturbance caused by electromagnetic interference, along a circuit or a cable pair).
Its types are:
a) Unshielded Twisted Pair Cable
b) Twisted Pair Cable
Unshielded twisted pair (UTP):
Unshielded twisted pair is a popular type of cable that consists of two unshielded wires twisted around
each other which are used in telephone wiring and local area networks (LANs). It is called unshielded
because it has no additional foil wrap, or shield.
RJ-45 connector is commonly used with unshielded twisted pair.
Shielded twisted pair (STP):
Shielded twisted pair is a type of copper telephone wiring in which each of the two copper wires are
twisted together and coated with an insulating coating. The extra covering in shielded twisted pair wiring
protects the transmission line from electromagnetic interference.
D-shell connectors are used with shielded twisted pair.
Co-axial cable
Twisted pair cable:
A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted wires are bundled to form cable. These are the most common medium for LAN. Wires are twisted with each other so as to reduce crosstalk (A disturbance caused by electromagnetic interference, along a circuit or a cable pair).
Its types are:
a) Unshielded Twisted Pair Cable
b) Twisted Pair Cable
Unshielded twisted pair (UTP):
Unshielded twisted pair is a popular type of cable that consists of two unshielded wires twisted around
each other which are used in telephone wiring and local area networks (LANs). It is called unshielded
because it has no additional foil wrap, or shield.
RJ-45 connector is commonly used with unshielded twisted pair.
Shielded twisted pair (STP):
Shielded twisted pair is a type of copper telephone wiring in which each of the two copper wires are
twisted together and coated with an insulating coating. The extra covering in shielded twisted pair wiring
protects the transmission line from electromagnetic interference.
D-shell connectors are used with shielded twisted pair.
Co-axial cable
Coaxial :
Cable is a common type of cable used for transmitting data over long distances. Theyare most commonly used to transmit cable TV and Internet signals.
Cable is a common type of cable used for transmitting data over long distances. Theyare most commonly used to transmit cable TV and Internet signals.
The connectors used with co-axial cables are BNC, T-connectors and terminators in bus topology.
10 bps is the maximum speed of co-axial cable.
Fiber optic cable:
Fiber optics cable is one of the costlier cables used in data communication which uses light to carry a data
signal through the cable.
The connectors used in fiber optics are Screw Mounted Adaptors (SMA), Spring-loaded Twist (ST), SC
and FC.
It is costlier to maintain, produce and install.
Radio wave transmission:
The transmission making use of radio waves through air is called radio wave transmission.
It provides low bandwidth for data communication.
Radio, TV, cellular phones etc. uses radio transmission in one form or another.
The radio waves can travel through walls and through an entire building.
Depending upon the frequency, they can travel long distance or short distance.
It does not require line of sight for data transmission
Microwave transmission:
10 bps is the maximum speed of co-axial cable.
Fiber optic cable:
Fiber optics cable is one of the costlier cables used in data communication which uses light to carry a data
signal through the cable.
The connectors used in fiber optics are Screw Mounted Adaptors (SMA), Spring-loaded Twist (ST), SC
and FC.
It is costlier to maintain, produce and install.
Radio wave transmission:
The transmission making use of radio waves through air is called radio wave transmission.
It provides low bandwidth for data communication.
Radio, TV, cellular phones etc. uses radio transmission in one form or another.
The radio waves can travel through walls and through an entire building.
Depending upon the frequency, they can travel long distance or short distance.
It does not require line of sight for data transmission
Microwave transmission:
Microwave is a line-of-sight wireless communication technology that uses high frequency beams of radio
waves to provide high speed wireless connections that can send and receive voice, video, and data
information.
Microwaves do not pass through buildings. So, indoor receivers cannot be used effectively.
It provides higher bandwidth for data communication.
It requires line of sight for data transmission.
Infrared transmission:
Infrared Transmission is the transmission of data or voice information over infrared (IR) light over short
ranges.
It requires line-of-sight and is unable to break through walls.
Computer network: [SLC 2066] [SLE 2068 S] [SLC 2069 S] [SLC 2070 S] [SLC 2071 S] [SEE 2074]
A computer network means two or more computers connected with each other to share data, hardware,
software and other resources.
Advantages of computer network [SLC 2065 S] [SLC 2069] [SLC 2071 S] [SEE 2075 ] [MF 2076]
a) Computer in a network can access the network-connected hardware devices like printers, disk drives,
etc.
b) Data in a network environment can be updated from any computer. Updated data can be accessed by
all computers on the network.
c) Computers in a network system share different software packages.
d) Information can be exchanged rapidly in computer network.
Disadvantages of computer network [SEE 2075 S2] [MF 2076] [MFT 2075]
a) The sharing of information may leak the privacy of other clients.
b) The networking cost is high
c) If hardware or software malfunctions, it affects the whole network.
d) Data and information may be stolen by computer hackers if the security of network is not reliable.
Reasons of keeping computers on the network [SLC 2070 ]
a) To share hardware devices like printers, scanners, hard disks etc.
b) To share data and information.
c) To share software resources.
d) To communicate with each other.
Hardware components of a computer network (Elements of Network)
Physical parts and devices used to connect computers in the network environment are called hardware
components. The hardware components of computer network are
a) Computer system (Server or Workstation)
b) Network connectors
c) Network cables
d) NIC Card
e) MODEM
f) Hub
g) Bridge
h) Switch
i) Router
j) Gateway
k) Repeater
Server:
A server is the main computer that provides services, data and other resources to the other computers in
the network environment. Network operating software used by server is Novell Netware, Linux, Unix etc.
Different types of servers are file server, print server, application server etc.
Workstation:
Workstation is a computer network that utilizes network resources. Network operating software used by
workstation are Windows 98, Windows XP etc.
Node:
Each computer or device of network is called node.
Router [MFT 2075]:
Router is an intelligent device that connects two different networks which uses the address for filtering and forwarding the data as well as it has an ability to determine the best route for destination.
Network Interface Card (NIC) [SQE 2075K]
A Network Interface Card (NIC) is the adapter through which the computer is connected to the network. The
function of NIC is to convert data into electronic signals and transfer them through cables and vice-versa.
The advantage is to present the platform for a communication between the computers within a network.
Cable
Cables are commonly used media of physical channel for transmitting data between computers in network.
Examples of cables are coaxial, twisted pair and fiber optic cable.
Connector
Connector is an interface between the NIC of the computer and the cable that passes data between
waves to provide high speed wireless connections that can send and receive voice, video, and data
information.
Microwaves do not pass through buildings. So, indoor receivers cannot be used effectively.
It provides higher bandwidth for data communication.
It requires line of sight for data transmission.
Infrared transmission:
Infrared Transmission is the transmission of data or voice information over infrared (IR) light over short
ranges.
It requires line-of-sight and is unable to break through walls.
Computer network: [SLC 2066] [SLE 2068 S] [SLC 2069 S] [SLC 2070 S] [SLC 2071 S] [SEE 2074]
A computer network means two or more computers connected with each other to share data, hardware,
software and other resources.
Advantages of computer network [SLC 2065 S] [SLC 2069] [SLC 2071 S] [SEE 2075 ] [MF 2076]
a) Computer in a network can access the network-connected hardware devices like printers, disk drives,
etc.
b) Data in a network environment can be updated from any computer. Updated data can be accessed by
all computers on the network.
c) Computers in a network system share different software packages.
d) Information can be exchanged rapidly in computer network.
Disadvantages of computer network [SEE 2075 S2] [MF 2076] [MFT 2075]
a) The sharing of information may leak the privacy of other clients.
b) The networking cost is high
c) If hardware or software malfunctions, it affects the whole network.
d) Data and information may be stolen by computer hackers if the security of network is not reliable.
Reasons of keeping computers on the network [SLC 2070 ]
a) To share hardware devices like printers, scanners, hard disks etc.
b) To share data and information.
c) To share software resources.
d) To communicate with each other.
Hardware components of a computer network (Elements of Network)
Physical parts and devices used to connect computers in the network environment are called hardware
components. The hardware components of computer network are
a) Computer system (Server or Workstation)
b) Network connectors
c) Network cables
d) NIC Card
e) MODEM
f) Hub
g) Bridge
h) Switch
i) Router
j) Gateway
k) Repeater
Server:
A server is the main computer that provides services, data and other resources to the other computers in
the network environment. Network operating software used by server is Novell Netware, Linux, Unix etc.
Different types of servers are file server, print server, application server etc.
Workstation:
Workstation is a computer network that utilizes network resources. Network operating software used by
workstation are Windows 98, Windows XP etc.
Node:
Each computer or device of network is called node.
Router [MFT 2075]:
Router is an intelligent device that connects two different networks which uses the address for filtering and forwarding the data as well as it has an ability to determine the best route for destination.
Network Interface Card (NIC) [SQE 2075K]
A Network Interface Card (NIC) is the adapter through which the computer is connected to the network. The
function of NIC is to convert data into electronic signals and transfer them through cables and vice-versa.
The advantage is to present the platform for a communication between the computers within a network.
Cable
Cables are commonly used media of physical channel for transmitting data between computers in network.
Examples of cables are coaxial, twisted pair and fiber optic cable.
Connector
Connector is an interface between the NIC of the computer and the cable that passes data between
computers in network. Examples of connectors are BNC used with coaxial cable, RJ 45 used with UTP
cable, ST used with fiber optic cable etc.
Hub [MF 2076]
A hub is a network device with multiple points or ports which acts as a central point from where different computers and other devices are connected. It broadcasts all network data across each connection. Hub is mostly used in physical star topology.
Switch [MF 2076]
A switch is a networking device that has multiple connecting ports which is often used interchangeably with the bridge.
Bridge
A bridge is a device that connects two or more similar types of network which filters the data or inspects incoming signals and decides whether to forward the signals or discard them.
Gateway
Gateway is an interconnecting device that connects two dissimilar networks
Repeater
Repeater is a device that amplifies the incoming signals, creates a copy of it and transmits the signal on network.
MODEM [MFT 2075]
MODEM is a device which is used to transfer the data of one computer to another computer using
cable, ST used with fiber optic cable etc.
Hub [MF 2076]
A hub is a network device with multiple points or ports which acts as a central point from where different computers and other devices are connected. It broadcasts all network data across each connection. Hub is mostly used in physical star topology.
Switch [MF 2076]
A switch is a networking device that has multiple connecting ports which is often used interchangeably with the bridge.
Bridge
A bridge is a device that connects two or more similar types of network which filters the data or inspects incoming signals and decides whether to forward the signals or discard them.
Gateway
Gateway is an interconnecting device that connects two dissimilar networks
Repeater
Repeater is a device that amplifies the incoming signals, creates a copy of it and transmits the signal on network.
MODEM [MFT 2075]
MODEM is a device which is used to transfer the data of one computer to another computer using
telephone lines.
The role of MODEM in data transmission is that it transfers data from one computer to another through
telephone line. It also converts the digital signal into analog and vice versa.
Importance of MODEM [SLC 2064] [SLC 2071 S] [SEE 2073 U]
MODEM modulates the digital codes of the computer into analog signal, which then can travel through
the telephone cable. At the receiving end the MODEM kept there will demodulate the analog signal to
digital codes, which can be then understood and used by the receiving computer. In this way a MODEM
makes the computer network possible.
Modulation
The process of translating digital signals of a computer to analog signals, which are then transmitted
across the standard telephone lines, is known as modulation.
Demodulation
The process of translating analog signals from a phone line and converts then into digital signals for the
computer is known as demodulation.
Software components of a computer network
a) Network protocol
The role of MODEM in data transmission is that it transfers data from one computer to another through
telephone line. It also converts the digital signal into analog and vice versa.
Importance of MODEM [SLC 2064] [SLC 2071 S] [SEE 2073 U]
MODEM modulates the digital codes of the computer into analog signal, which then can travel through
the telephone cable. At the receiving end the MODEM kept there will demodulate the analog signal to
digital codes, which can be then understood and used by the receiving computer. In this way a MODEM
makes the computer network possible.
Modulation
The process of translating digital signals of a computer to analog signals, which are then transmitted
across the standard telephone lines, is known as modulation.
Demodulation
The process of translating analog signals from a phone line and converts then into digital signals for the
computer is known as demodulation.
Software components of a computer network
a) Network protocol
b) Network operating system
c) Device driver
Network operating system [PMT 2075]
Network operating system is a set of computer program that manages the resources on network. E.g. Novell
network, Microsoft Windows NT, Linux, Unix etc.
Device driver
Device driver is a program that controls the functionality of the hardware device.
Types of Network
a) LAN (Local Area Network)
b) MAN (Metropolitan Area Network)
c) WAN (Wide Area Network)
LAN (Local Area Network)
A LAN is a type of network which covers small area i.e. within a room, building, or short distance by
using cables or small wireless devices. It is controlled by a single organization. It uses private connection media. E.g.: network in a school, college or cyber cafe. The diameter is not more than a few kilometres.
LAN offers bandwidth of 10-100 Mbps.
MAN (Metropolitan Area Network)
A MAN is a type of network which covers an entire city. It is controlled by single or group of
organization. It uses private or public connection media. E.g.: interconnection between different branches on same branch and ISP providing internet services. It offers a number of network services compatible with bandwidth from 128 kbps to 1 Gbps.
WAN (Wide Area Network)
A WAN is a type of network which connects two or more computers generally across a wide
geographical area such as cities, districts, and countries. It is controlled by group of organization. It uses public connections media like telephone lines, satellite links or microwave system to connect several
LANs and MANs. E.g. internet. Data transmission in WAN is slower than LANs and WANs.
Network topology (LAN topology) [SLC 2064] [SLC 2065 S] [SEE 2066 S] [SEE 2067 S] [SLC 2068]
The arrangement or connection pattern of computers or nodes and other devices of the network is called
network topology. The three basic topologies are bus topology, ring topology and star topology
Bus topology
The network topology in which computers and other devices are arranged in linear format which uses a
common backbone or wire to connect all the computers and devices is called bus topology.
Advantages of bus topology [SEE 2073]
a) It is easy to set up computers and other devices in bus topology, because all the devices are connected
through a single wire.
b) It requires fewer cable media, so it is cheaper than other topologies.
c) Itis easy to add new node to the network.
d) Failure of one workstation does not affect other computers on the network.
Disadvantages of bus topology
a) The whole network system collapses if the cable or backbone is damaged.
b) The network slows down if additional computers are connected.
c) The limited length of the cable in a network may restrict to connect the workstation or devices.
d) Itis difficult to find fault in this network topology.
Ring topology [MF 2076]
The network topology in which computers are connected in the shape of a circle without any end points is called ring topology. Each workstation contains two neighbours for communication or an input and
output connections.
Advantages of ring topology
i) It is easy it set up and configure.
ii) Each computer gets equal opportunity to access the network resources.
iii) It supports high data transmission rate.
iv) Performs better than a star topology under heavy network load.
Disadvantages of ring topology
i)Failure of any cable or single computers may affect the entire network.
ii) It is difficult to detect the errors.
iii) Adding/removing the devices affect the entire network.
iv) Much slower than an Ethernet network under normal load.
Star topology [SLC 2065] [U1]
The network topology in which all computers or other devices are connected through a central device
through a central device called hub or switch is called star topology.
Diagram of star topology [SLC 2064] [SLC 2065] [U1]
Star Topology
Computer
Advantages of star topolo
i) Easy to set up and configure.
ii) Failure of single computer or cable doesn’t affect the entire network.
1i1) It is easy to find the fault.
iv) It is easy to extend to network by attaching new devices to the central devices.
Disadvantages of star topology
1) It requires more cable in comparison of bus topology so it is more costly.
ii) Failure of central devices (hub or switch) break down the whole system.
Network architecture (Models of Computer Network)
The arrangement of the computers on the network which is based on the computing model is called
network architecture. Its types are
a) Centralized computing network
b) Client / Server Network
c) Peer to Peer Network
Centralized computing network [SQE 2074]
A centralized computing network is a network in which a central host computer performs data processing
and storage on behalf of clients. It is different from chent server network as client server network consists
of at least one server and one or more client as well as client server provides high security of data and
other resources.
Client/server network [SLC 2071]
Client/ server network is a type of network architecture that consists of at least one server and one or
more clients or workstations, where users do their work. It provides central security administration and
the network administrator is responsible for data security and other resources management of the
network.
Peer-to-peer network [SLC 2071]
Peer-to-Peer network is a group of computers, which function both as servers and workstations to share
data, information and other resources of the network. It lacks centralized network administration, where
the network administrator needs to manage security on each computer. It provides no reliable security
and might put data in higher risks.
Client/server network Vs Peer-to-peer network Client/server network Peer-to-peer network.
There is a specific server and specific clients Clients and server are not distinguished; each node
connected to the server. act as client and server.
The client request for service and server respond Each node can request for services and can also with the service. provide the services.
The data is stored in a centralized server. Each peer has its own data.
The client-server are expensive to implement. Peer-to-peer are less expensive to implement.
Internet [SLC 2065 S] [SLC 2066] [SLC 2069] [SLC 2069 S] [SLC 2071 S] [SEE 2074] [MFT 2075]
Internet is an interconnection of several thousands of computers of different types belonging to the
various networks all over the world in order to share data and information.
In other words network of networks is called Internet.
Who controls internet?
Different organization like ISOC (Internet Society), W3C (World Wide Web Consortium), IAB (Internet Architecture Board), IEFT (Internet Engineering Task Force), IRTF (Internet Research Task Force), IESG (Internet Engineering Steering Group) and INIC (Internet Network information Centre) gives directive and guideline for the proper use of internet.
Internet called Network of networks [PMT 2075 ]
The internet is called network of networks because all the smaller networks of organizations are linked together into the one giant network called the internet.
Protocol used by the internet.
TCP/IP is the communication protocol used by the internet.
Components required for internet connection
a) A TCP/IP enabled computer with web browser
b) An account with an ISP
c) Router / MODEM (necessary if you are using a telephone line to access the Internet)
d) Connection (ISDN, Satellite, cable and dial-up)
ADSL (Asymmetric Digital Subscriber Line) [SQE 2074K]
ADSL is a technology for transmitting digital information at a high bandwidth on existing phone lines to
homes and businesses. Unlike regular dialup phone service, ADSL provides continuously-available,
"always on connection.
Services of internet [SLC 2065] [SLC 2068] [SEE 2072] [MFT 2075] [U1]
a) WWW (World Wide Web)
b) E-mail (Electronic mail)
c) FTP (File Transfer Protocol)
d) IRC (internet Relay Chat)
e) Newsgroup
f) Telnet
g) E-commerce
Advantages of internet [SLC 2065 S] [SEE 2075]
a) Internet has an endless knowledge supply which anyone can access that too free of cost.
b) Selling and buying has become so easy with the use of internet and it has helped millions to sell and
buy their goods online.
c) Internet has given us E-Mail which is fast, secure and reliable mode of communication.
d) It makes easy to transfer the file or information.
Disadvantages of internet
a) Increasing virus threats not only steals your sensitive data but also damages your computer.
b) People using too much of internet get disconnected from the real world.
c) Pornography that can get in the hands of young children too easily.
d) Addiction to online games affects health leading to obesity and serious health issues.
Intranet
An intranet is a private computer network that uses the internet protocol to securely share any part of
information of an organization. It is owned by a single organization or company. It can only be used by
the employees of the owned organization.
Extranet
An extranet is a computer network that allows controlled access from outside for specific business or
educational purposes.
ISP (internet Service Provider)
An Internet service provider (ISP) is an organization that provides services for accessing and using
the Internet. World Link, Mercantile, Classitech, Vianet etc are the ISPs of Nepal.
E-mail (Electronic Mail) [SLC 2068 S] [SLE 2069 S] [SEE 2075 S2] [MM 2076] [MFT 2075]
E-mail (Electronic mail) is one of the most popular services provided by the internet which exchanges
messages between the computers through a network. It is the soft copy service of the internet.
E-mail can be sent using a computer with modem, e-mail program and internet facility.
E.g. xyz@gmail.com
Any four sites that provide e-mail services are:
a) www.yahoomail.com
b) www.hotmail.com
c) www.gmailcom
d) www.outlook.com
Advantages of E-mail [SEE 2067 S$] [SLC 2070] [SEE 2073 U] [MM 2076] [MEF 2076] [MFT 2075]
a) It allows to send and receive message across the world at very low cost.
b) E-mail is faster, cheaper, more reliable than traditional mail.
c) The image, sound, video and documents can be attached to e-mail message.
d) Email can be accessed from anywhere in the world.
Disadvantages of e-mail
i) Minor mistakes in e-mail address may deliver the mail to wrong address.
ii) Since it passes through a vast electronic network, it may be seized in between.
Newsgroup
Newsgroups are discussion groups that focus on a particular topic such as politics, health, computer, etc. The
interested people on the particular field write the information or articles. Then these articles are posted to the
newsgroup so that other people can read them.
Telnet
A telnet is a program that allows a user to log in to a remote computer on internet as a user on that system.
FTP (File Transfer Protocol) [MFT 2075]
File Transfer Protocol is the internet tool that allows the user to transfer the file from one computer to
another computer. It helps to upload and download the files.
Use / Function of FTP [SLC 2071] [SEE 2073]
File Transfer protocol helps to transfer (download or upload) files from one computer to another
computer.
Uploading [MF 2076] [MFT 2075]
Uploading refers to copying files or documents, programs or data from the user computer to the internet
Downloading [MF 2076] [MFT 2075]
Downloading refers to the copying files or document or program or data from the internet server to the user
computer.
IRC (internet Relay Chat) [MFT 2075]
Internet Relay Chat is one of the important services provided by the internet which allows the user to
communicate with other people in real time. It uses the browser software without using special chat
software. It communicates only text.For eg: chatting on facebook.
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) is an online document that possesses series of common questions and
answers on a specific topic.
Video conferencing
Video conferencing is an important and interesting service provided by the internet which makes
communication using sounds as well as pictures. It requires necessary hardware and software to see and
speak to each other. It enables virtual face-to-face communication among people sitting at different
locations. For eg: chatting on skype.
Web browser [SEE 2075 UJ [SLC 2067] [MEF 2076]
Web browser is a computer program that access web pages and displays them on the user computer.
Examples of web browsers are Mozilla Firefox, Google chrome, Internet Explorer, opera etc. Browsing/
Surfing means searching information on the internet.
URL (Uniform Resource Locator)
Ans: URL is a unique address that provides location of a webpage on the internet.
Example of URL: http://www.abc.com/mainpage/first.html
http: protocol name, www.abc.com: server name, mainpage: path, first-html: filename
Search engine [SEE 2074 UL[SQE 2075]
Ans: A search engine is a software program or script available through the Internet that searches documents
and files for keywords and returns the results of any files containing those keywords. They are used to locate
specific sites and information. Examples of search engines are Google, Bing, Yahoo etc
Blog (weblog)
A blog is a time-stamped online journal that appears on a website. A blog is a frequently updated online
personal journal or diary. A place to share your thoughts and your passions to the world.
Wi-Fi (Wireless Fidelity)
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless
high-speed Internet and network connections.
WWW (World Wide Web)
13|Page Prepared By: Deepak Shrestha
SEE Computer Science 2077
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and
other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links,
and can be accessed via the Internet.
DNS (Domain Name System)
Domain Name System is an Internet service that translates domain names into IP addresses.
The development of ICT has made possible to store large amount of data in the virtual world and make
communication through it. At the same time, computer crimes and abuse of data, privacy violations,
pornography are increasing.
Challenges of ICT
1. Virtual Identity
a) A major problem in the ICT environment.
b) Internet criminals enter into the system by creating fake identities and use the system for their
benefits which is difficult to recognize and control.
2. Security
a) Hacking or unauthorized access of system is increasing.
b) Hackers are the greatest challenge for the ICT security personnel.
c) Hackers hack others data and use for their benefits especially in banking and commercial sectors.
Privacy Issues
a) Cyber bullying is a kind of harassment using mobiles or computers.
b) Kind of harassment using electronic devices such as mobiles and computers.
c) Sharing unnecessary information of individual or group of people is the danger of ICT in this era.
d) Using internet many users bully others.
3. Copyright
a) A legal right that grants the creator of an original work.
b) Because of it openness and easy access, through the internet, users can easily access the work of
others and use them for the benefits without the permission of the creator.
4. Social Behavior
a) Excessive use of internet has changed the behavior of the people.
b) Negative effects on sleep, work and academic achievements of the students.
c) Usage of unethical sites has increased negative behaviors and crimes in society.
d) Employees use internet at their workplace for non-productive works.
5. Digital Divide
a) The Digital Divide is a social issue referring to the differing (conflicting) amount of information
between those who have access to the Internet (especially broadband access) and those who do
not have access.
b) In education sector, developing countries have poor old education systems, so students will not
be aware of new information technologies.
c) In remote areas, they do not even have power, so information technology looks like computer
cannot be used.
d) To get ICT benefits, developing countries should train their human resource and also adopt new
culture which is a bit costly.
Computer Ethics
Computer ethics can be defined as to follow the rules and regulation of computer technology and not to
harm other computer users knowingly or unknowingly.
Major Provisions included in computer ethics are:
a) You should not use a computer to harm other people.
b) You should not search the file or record of other people.
c) You should not spread false and illegal information.
d) You should not destroy, erase or edit personal or group records.
e) You should not use other people’s computer resources without authorization.
Cyber Law
“* Cyber law refers to the laws regarding the internet and cyberspace which includes a wide variety of legal
issues related to the use of communication technology.
Cyber Law (also known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed on
30" Bhadra 2061 (15 September 2004).
The major components included in cyber law are:
a) Electronic and Digital Signature Law
b) Computer Crime / Cyber Crime Law
c) Intellectual property Law
d) Data Protection and Privacy Law
e) Telecommunication Law
International Cyber Law
a) Fair Credit Reporting Act in 1970
b) Freedom of Act in 1970
c) Federal Privacy Act in 1974
d) Video Privacy Protection Act in 1988
e) Copyright Act 1992
Digital Signature
A digital signature is an electronic form of a signature that can be used to authenticate the identity of the
sender of a message or the signer of a document, and also ensure that the original content of the message or
document that has been sent is unchanged.
It is necessary to keep the uniformity standard and guarantee in all the activities of the e-sector.
Cyber crime
Cyber crime is a crime committed by using cyber means/computer technology.
Cyber crime is also known as computer-related crime.
Illegal activities committed using computer technology
a) Damage to computer and computer system.
b) Acts to gain illegal access into the system.
c) Use as weapons to commit other crimes.
d) Acts against the provision of cyber law.
Examples of cyber/computer crimes
a) Creating fake documents
b) Blackmailing/social media abuse
c) Distribution of pornography materials
d) Piracy of intellectual properties
e) Spreading computer viruses/malware
Digital citizenship
“+ A digital citizen is anyone who uses digital tools such as computers, cell phones, or the Internet. You
can use these tools in your work, at school or for recreation.
15|Page Prepared By: Deepak Shrestha
SEE Computer Science 2077
Digital citizenship refers to the responsible use of technology by anyone who uses computers,
the Internet, and digital devices to engage with society on any level.
Digital citizenship applies to “those who use the Internet regularly and effectively,â€
Good digital citizenship engages young students and shows them how to connect with one another,
empathize (understand) with each other, and create lasting relationships through digital tools.
Bad digital citizenship, on the other hand, entails (involves) cyber bullying, irresponsible social
media usage, and a general lack of knowledge about how to safely use the Internet.
Examples of Digital Citizenship
a) Communicating with respect
b) Respecting other’s privacy
c) Adding helpful information/context to a discussion or wiki page
d) Supporting others by offering useful feedback
e) Encouraging them, or sharing work there proud of, etc.
Digital footprint
A trace of data you create while using the Internet.
Includes the websites you visit, emails you send, and information you submit to online services.
Your online identity and individuality and is what makes you unique.
It builds the online reputation, or impression depending on the things you do online.
It is important to be aware of it because anything posted online is permanent and stays forever
regardless of being deleted.
Publishing a blog and posting social media updates are another popular ways to expand your digital
footprint.
Every tweet you post on Twitter, every status update you publish on Face book, and every photo you
share on Instagram contributes to your digital footprint.
The more you spend time on social networking websites, the larger your digital footprint will be.
Even a Face book post adds to your digital footprint, since the data is saved on
Face books servers.
a) It is easy to set up computers and other devices in bus topology, because all the devices are connected
through a single wire.
b) It requires fewer cable media, so it is cheaper than other topologies.
c) Itis easy to add new node to the network.
d) Failure of one workstation does not affect other computers on the network.
Disadvantages of bus topology
a) The whole network system collapses if the cable or backbone is damaged.
b) The network slows down if additional computers are connected.
c) The limited length of the cable in a network may restrict to connect the workstation or devices.
d) Itis difficult to find fault in this network topology.
Ring topology [MF 2076]
The network topology in which computers are connected in the shape of a circle without any end points is called ring topology. Each workstation contains two neighbours for communication or an input and
output connections.
Advantages of ring topology
i) It is easy it set up and configure.
ii) Each computer gets equal opportunity to access the network resources.
iii) It supports high data transmission rate.
iv) Performs better than a star topology under heavy network load.
Disadvantages of ring topology
i)Failure of any cable or single computers may affect the entire network.
ii) It is difficult to detect the errors.
iii) Adding/removing the devices affect the entire network.
iv) Much slower than an Ethernet network under normal load.
Star topology [SLC 2065] [U1]
The network topology in which all computers or other devices are connected through a central device
through a central device called hub or switch is called star topology.
Diagram of star topology [SLC 2064] [SLC 2065] [U1]
Star Topology
Computer
Advantages of star topolo
i) Easy to set up and configure.
ii) Failure of single computer or cable doesn’t affect the entire network.
1i1) It is easy to find the fault.
iv) It is easy to extend to network by attaching new devices to the central devices.
Disadvantages of star topology
1) It requires more cable in comparison of bus topology so it is more costly.
ii) Failure of central devices (hub or switch) break down the whole system.
Network architecture (Models of Computer Network)
The arrangement of the computers on the network which is based on the computing model is called
network architecture. Its types are
a) Centralized computing network
b) Client / Server Network
c) Peer to Peer Network
Centralized computing network [SQE 2074]
A centralized computing network is a network in which a central host computer performs data processing
and storage on behalf of clients. It is different from chent server network as client server network consists
of at least one server and one or more client as well as client server provides high security of data and
other resources.
Client/server network [SLC 2071]
Client/ server network is a type of network architecture that consists of at least one server and one or
more clients or workstations, where users do their work. It provides central security administration and
the network administrator is responsible for data security and other resources management of the
network.
Peer-to-peer network [SLC 2071]
Peer-to-Peer network is a group of computers, which function both as servers and workstations to share
data, information and other resources of the network. It lacks centralized network administration, where
the network administrator needs to manage security on each computer. It provides no reliable security
and might put data in higher risks.
Client/server network Vs Peer-to-peer network Client/server network Peer-to-peer network.
There is a specific server and specific clients Clients and server are not distinguished; each node
connected to the server. act as client and server.
The client request for service and server respond Each node can request for services and can also with the service. provide the services.
The data is stored in a centralized server. Each peer has its own data.
The client-server are expensive to implement. Peer-to-peer are less expensive to implement.
Internet [SLC 2065 S] [SLC 2066] [SLC 2069] [SLC 2069 S] [SLC 2071 S] [SEE 2074] [MFT 2075]
Internet is an interconnection of several thousands of computers of different types belonging to the
various networks all over the world in order to share data and information.
In other words network of networks is called Internet.
Who controls internet?
Different organization like ISOC (Internet Society), W3C (World Wide Web Consortium), IAB (Internet Architecture Board), IEFT (Internet Engineering Task Force), IRTF (Internet Research Task Force), IESG (Internet Engineering Steering Group) and INIC (Internet Network information Centre) gives directive and guideline for the proper use of internet.
Internet called Network of networks [PMT 2075 ]
The internet is called network of networks because all the smaller networks of organizations are linked together into the one giant network called the internet.
Protocol used by the internet.
TCP/IP is the communication protocol used by the internet.
Components required for internet connection
a) A TCP/IP enabled computer with web browser
b) An account with an ISP
c) Router / MODEM (necessary if you are using a telephone line to access the Internet)
d) Connection (ISDN, Satellite, cable and dial-up)
ADSL (Asymmetric Digital Subscriber Line) [SQE 2074K]
ADSL is a technology for transmitting digital information at a high bandwidth on existing phone lines to
homes and businesses. Unlike regular dialup phone service, ADSL provides continuously-available,
"always on connection.
Services of internet [SLC 2065] [SLC 2068] [SEE 2072] [MFT 2075] [U1]
a) WWW (World Wide Web)
b) E-mail (Electronic mail)
c) FTP (File Transfer Protocol)
d) IRC (internet Relay Chat)
e) Newsgroup
f) Telnet
g) E-commerce
Advantages of internet [SLC 2065 S] [SEE 2075]
a) Internet has an endless knowledge supply which anyone can access that too free of cost.
b) Selling and buying has become so easy with the use of internet and it has helped millions to sell and
buy their goods online.
c) Internet has given us E-Mail which is fast, secure and reliable mode of communication.
d) It makes easy to transfer the file or information.
Disadvantages of internet
a) Increasing virus threats not only steals your sensitive data but also damages your computer.
b) People using too much of internet get disconnected from the real world.
c) Pornography that can get in the hands of young children too easily.
d) Addiction to online games affects health leading to obesity and serious health issues.
Intranet
An intranet is a private computer network that uses the internet protocol to securely share any part of
information of an organization. It is owned by a single organization or company. It can only be used by
the employees of the owned organization.
Extranet
An extranet is a computer network that allows controlled access from outside for specific business or
educational purposes.
ISP (internet Service Provider)
An Internet service provider (ISP) is an organization that provides services for accessing and using
the Internet. World Link, Mercantile, Classitech, Vianet etc are the ISPs of Nepal.
E-mail (Electronic Mail) [SLC 2068 S] [SLE 2069 S] [SEE 2075 S2] [MM 2076] [MFT 2075]
E-mail (Electronic mail) is one of the most popular services provided by the internet which exchanges
messages between the computers through a network. It is the soft copy service of the internet.
E-mail can be sent using a computer with modem, e-mail program and internet facility.
E.g. xyz@gmail.com
Any four sites that provide e-mail services are:
a) www.yahoomail.com
b) www.hotmail.com
c) www.gmailcom
d) www.outlook.com
Advantages of E-mail [SEE 2067 S$] [SLC 2070] [SEE 2073 U] [MM 2076] [MEF 2076] [MFT 2075]
a) It allows to send and receive message across the world at very low cost.
b) E-mail is faster, cheaper, more reliable than traditional mail.
c) The image, sound, video and documents can be attached to e-mail message.
d) Email can be accessed from anywhere in the world.
Disadvantages of e-mail
i) Minor mistakes in e-mail address may deliver the mail to wrong address.
ii) Since it passes through a vast electronic network, it may be seized in between.
Newsgroup
Newsgroups are discussion groups that focus on a particular topic such as politics, health, computer, etc. The
interested people on the particular field write the information or articles. Then these articles are posted to the
newsgroup so that other people can read them.
Telnet
A telnet is a program that allows a user to log in to a remote computer on internet as a user on that system.
FTP (File Transfer Protocol) [MFT 2075]
File Transfer Protocol is the internet tool that allows the user to transfer the file from one computer to
another computer. It helps to upload and download the files.
Use / Function of FTP [SLC 2071] [SEE 2073]
File Transfer protocol helps to transfer (download or upload) files from one computer to another
computer.
Uploading [MF 2076] [MFT 2075]
Uploading refers to copying files or documents, programs or data from the user computer to the internet
Server.
Downloading [MF 2076] [MFT 2075]
Downloading refers to the copying files or document or program or data from the internet server to the user
computer.
IRC (internet Relay Chat) [MFT 2075]
Internet Relay Chat is one of the important services provided by the internet which allows the user to
communicate with other people in real time. It uses the browser software without using special chat
software. It communicates only text.For eg: chatting on facebook.
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) is an online document that possesses series of common questions and
answers on a specific topic.
Video conferencing
Video conferencing is an important and interesting service provided by the internet which makes
communication using sounds as well as pictures. It requires necessary hardware and software to see and
speak to each other. It enables virtual face-to-face communication among people sitting at different
locations. For eg: chatting on skype.
Web browser [SEE 2075 UJ [SLC 2067] [MEF 2076]
Web browser is a computer program that access web pages and displays them on the user computer.
Examples of web browsers are Mozilla Firefox, Google chrome, Internet Explorer, opera etc. Browsing/
Surfing means searching information on the internet.
URL (Uniform Resource Locator)
Ans: URL is a unique address that provides location of a webpage on the internet.
Example of URL: http://www.abc.com/mainpage/first.html
http: protocol name, www.abc.com: server name, mainpage: path, first-html: filename
Search engine [SEE 2074 UL[SQE 2075]
Ans: A search engine is a software program or script available through the Internet that searches documents
and files for keywords and returns the results of any files containing those keywords. They are used to locate
specific sites and information. Examples of search engines are Google, Bing, Yahoo etc
Blog (weblog)
A blog is a time-stamped online journal that appears on a website. A blog is a frequently updated online
personal journal or diary. A place to share your thoughts and your passions to the world.
Wi-Fi (Wireless Fidelity)
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless
high-speed Internet and network connections.
WWW (World Wide Web)
13|Page Prepared By: Deepak Shrestha
SEE Computer Science 2077
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and
other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links,
and can be accessed via the Internet.
DNS (Domain Name System)
Domain Name System is an Internet service that translates domain names into IP addresses.
1.2 Ethical and Social Issues in ICT
The development of ICT has made possible to store large amount of data in the virtual world and make
communication through it. At the same time, computer crimes and abuse of data, privacy violations,
pornography are increasing.
Challenges of ICT
1. Virtual Identity
a) A major problem in the ICT environment.
b) Internet criminals enter into the system by creating fake identities and use the system for their
benefits which is difficult to recognize and control.
2. Security
a) Hacking or unauthorized access of system is increasing.
b) Hackers are the greatest challenge for the ICT security personnel.
c) Hackers hack others data and use for their benefits especially in banking and commercial sectors.
Privacy Issues
a) Cyber bullying is a kind of harassment using mobiles or computers.
b) Kind of harassment using electronic devices such as mobiles and computers.
c) Sharing unnecessary information of individual or group of people is the danger of ICT in this era.
d) Using internet many users bully others.
3. Copyright
a) A legal right that grants the creator of an original work.
b) Because of it openness and easy access, through the internet, users can easily access the work of
others and use them for the benefits without the permission of the creator.
4. Social Behavior
a) Excessive use of internet has changed the behavior of the people.
b) Negative effects on sleep, work and academic achievements of the students.
c) Usage of unethical sites has increased negative behaviors and crimes in society.
d) Employees use internet at their workplace for non-productive works.
5. Digital Divide
a) The Digital Divide is a social issue referring to the differing (conflicting) amount of information
between those who have access to the Internet (especially broadband access) and those who do
not have access.
b) In education sector, developing countries have poor old education systems, so students will not
be aware of new information technologies.
c) In remote areas, they do not even have power, so information technology looks like computer
cannot be used.
d) To get ICT benefits, developing countries should train their human resource and also adopt new
culture which is a bit costly.
Computer Ethics
Computer ethics can be defined as to follow the rules and regulation of computer technology and not to
harm other computer users knowingly or unknowingly.
Major Provisions included in computer ethics are:
a) You should not use a computer to harm other people.
b) You should not search the file or record of other people.
c) You should not spread false and illegal information.
d) You should not destroy, erase or edit personal or group records.
e) You should not use other people’s computer resources without authorization.
Cyber Law
“* Cyber law refers to the laws regarding the internet and cyberspace which includes a wide variety of legal
issues related to the use of communication technology.
Cyber Law (also known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed on
30" Bhadra 2061 (15 September 2004).
The major components included in cyber law are:
a) Electronic and Digital Signature Law
b) Computer Crime / Cyber Crime Law
c) Intellectual property Law
d) Data Protection and Privacy Law
e) Telecommunication Law
International Cyber Law
a) Fair Credit Reporting Act in 1970
b) Freedom of Act in 1970
c) Federal Privacy Act in 1974
d) Video Privacy Protection Act in 1988
e) Copyright Act 1992
Digital Signature
A digital signature is an electronic form of a signature that can be used to authenticate the identity of the
sender of a message or the signer of a document, and also ensure that the original content of the message or
document that has been sent is unchanged.
It is necessary to keep the uniformity standard and guarantee in all the activities of the e-sector.
Cyber crime
Cyber crime is a crime committed by using cyber means/computer technology.
Cyber crime is also known as computer-related crime.
Illegal activities committed using computer technology
a) Damage to computer and computer system.
b) Acts to gain illegal access into the system.
c) Use as weapons to commit other crimes.
d) Acts against the provision of cyber law.
Examples of cyber/computer crimes
a) Creating fake documents
b) Blackmailing/social media abuse
c) Distribution of pornography materials
d) Piracy of intellectual properties
e) Spreading computer viruses/malware
Digital citizenship
“+ A digital citizen is anyone who uses digital tools such as computers, cell phones, or the Internet. You
can use these tools in your work, at school or for recreation.
15|Page Prepared By: Deepak Shrestha
SEE Computer Science 2077
Digital citizenship refers to the responsible use of technology by anyone who uses computers,
the Internet, and digital devices to engage with society on any level.
Digital citizenship applies to “those who use the Internet regularly and effectively,â€
Good digital citizenship engages young students and shows them how to connect with one another,
empathize (understand) with each other, and create lasting relationships through digital tools.
Bad digital citizenship, on the other hand, entails (involves) cyber bullying, irresponsible social
media usage, and a general lack of knowledge about how to safely use the Internet.
Examples of Digital Citizenship
a) Communicating with respect
b) Respecting other’s privacy
c) Adding helpful information/context to a discussion or wiki page
d) Supporting others by offering useful feedback
e) Encouraging them, or sharing work there proud of, etc.
Digital footprint
A trace of data you create while using the Internet.
Includes the websites you visit, emails you send, and information you submit to online services.
Your online identity and individuality and is what makes you unique.
It builds the online reputation, or impression depending on the things you do online.
It is important to be aware of it because anything posted online is permanent and stays forever
regardless of being deleted.
Publishing a blog and posting social media updates are another popular ways to expand your digital
footprint.
Every tweet you post on Twitter, every status update you publish on Face book, and every photo you
share on Instagram contributes to your digital footprint.
The more you spend time on social networking websites, the larger your digital footprint will be.
Even a Face book post adds to your digital footprint, since the data is saved on
Face books servers.
1 Comments
Excellent Computer Science Class 10 Notes
ReplyDeleteFeel free to comment here.