Вы находитесь на странице: 1из 15

Supervisor Meet

BASICS OF COMPUTER
&
INTERNET
Computer
 A computer is a machine that manipulates information or "data." You can use a
computer to type documents, send email, and surf the Internet. You can also use it
to handle spreadsheets, accounting, database management, presentations,
games, and desktop publishing. Whether you realize it or not, computers play
important roles in our lives. When you get cash from an ATM or use a calculator,
you're using a computer.

 The first electronic computer, the Electronic Numerical Integrator and Computer
(ENIAC), was developed in 1946. It measured 18 feet by 80 feet and weighed 30
tons. Today's desktop computers weigh much less, can store a million times more
information, and are 50,000 times faster. The first personal computers or PCs
were introduced in the 1970s. PCs came into widespread use in the 1980s as
costs decreased and machines became more powerful.In recent years, notebook-
size laptop computers and hand-held Personal Digital Assistants (PDAs) have
become popular.
Components of the Computer

 Computer Case - is the metal and plastic box that contains the main components of
the computer. Computer cases come in different shapes and sizes. A desktop case
lies flat on a desk, and the monitor usually sits on top of it. A tower case, is tall and
sits next to the monitor or on the floor.
 Monitor - is where the computer displays text and pictures. CRT, LCD Monitors
 Keyboard - lets you type information into the computer. It resembles a typewriter
keyboard
 Mouse - is the hand-held device that lets you point, click, and move objects on the
monitor screen. The trackball, touchpad, and touchscreen are alternatives to the
mouse. When using a touchpad or touchscreen, you can use your finger or a tool
called a stylus to move around the screen.
 Motherboard is the computers main circuit board. It's a thin plate that holds the
CPU (Central Processing Unit), memory, and expansion cards to control the video,
audio and more. The motherboard connects directly or indirectly to every part of the
computer.
 Expansion card is a card which you can install to expand a computer's capabilities.
For example, your computer's video card is an expansion card which plugs into the
motherboard.
 Sound card, also called an audio card, is another type of expansion card. It lets the
computer play sounds through speakers. Some motherboards feature integrated
sound, and do not require a separate sound card.
 Microprocessor (CPU), is the brain of the computer. Its job is to carry out
commands. Whenever you press a key, click the mouse, or start an application,
you're sending instructions to the microprocessor. Located inside the computer case,
this silicon chip The microprocessor determines how fast a computer can execute
instructions. A microprocessor's speed is measured in megahertz (MHZ), or millions
of instructions per second. So, the higher the megahertz, the faster the computer can
process instructions. Intel, Cyrix and AMD are the three main CPU manufacturers for
PCs.
 RAM (Random Access Memory) is your system's short-term memory. Data is
temporarily stored here until you save your work to the hard disk. This short-term
memory disappears when the computer is turned off, so always save your file before
turning off the machine. When you save a file, you are saving it to long-term
storage. The more RAM you have, the faster you computer performs. RAM is
measured in megabytes (MB) or gigabytes (GB).
 Hard disk drive (also called the hard disk) on your computer is where information is
stored permanently. This is long-term storage. The hard disk drive is the data
center inside of the computer. All of your programs are stored here. Hard disk speed
determines how fast your computer starts up and loads programs. The hard disk is
called the C drive on most computers.
 Floppy disk drive - floppy disk drive, known as A Drive, is also used for storing data.
Sometimes called a diskette, it can store 720 KB to 1.44 MB of data. That's about 360
to 720 pages in a book. These drives are becoming outmoded as CD-R drives
become more common.
 CD-ROM (Compact Disk Read-Only Memory) drive accesses information on a CD-
ROM similar to how a CD player accesses music from a CD. CD-ROMs hold much
more information than floppy disks - up to 650 MB or the equivalent of about 450
average size books.
 ROM (Read-only memory) means you can access the programs or data stored on
CD-ROMs but you can't write or store your own data or programs on them.
(Recording information on a compact disk requires a special type of drive.)
 CD writer is a device that can write CD-RW (Compact Disk ReWritable) and CD-R
(Compact Disk-Recordable) discs, and read CD-ROM discs. CD-RW discs may be
written, erased and rewritten, while CD-R discs may be written only once. The terms
CD-RW and CD-R may also refer to the CD writer itself.
 DVD-ROM (Digital Versatile Disc Read-Only Memory), refers to the DVD media
itself, or to the disk drive. DVD-ROM drives can read DVD discs, all types of CDs, and
can display movies from digital video discs.
 A bit is the smallest unit of data in computer processing. A byte is a group of eight
bits. A megabyte is about one million bytes. A gigabyte is 1,024 megabytes.

Types of Computers
Server: a computer or device that manages a network of computers. It's typically used by businesses or
organizations.
Laptops: computer, sometimes called a notebook computer because of its size, is a battery or AC-powered
personal computer. It's easy to carry and convenient to use in such places as airports, libraries, and
coffee shops.
Personal Digital Assistants and Email-Only Devices: The two major types of PDAs are the Palm OS Handhelds,
and the Microsoft Pocket PC. email-only machines, marketed to home users, are dedicated to sending,
receiving, and managing email. Users typically must pay an access fee to use these devices.
Software
 When you want your computer to perform a task, you give it
instructions using software. Software is the name for the
applications or programs that run on your computer.
 Two common types of software are System software and
Application software.
 The Operating system (OS) or System software is the most
important program that runs on a PC. Operating systems
recognize input from the keyboard, send output to the monitor,
keep track of files and directories, and control peripheral devices
such as printers.
 An operating system lets you use different types of Application
software. For example, you can use a word processing
application to write a letter, and a spreadsheet application to
track your financial information.
 Ms Excel – OOSpreadsheet – Basics and Usage
Blu-ray Disc
 Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium
designed to supersede the standard DVD format. Its main uses are for storing high-
definition video, PlayStation 3 games, and other data, with up to 25 GB per single
layered, and 50 GB per dual layered disc. The disc has the same physical dimensions
as standard DVDs and CDs.

 The name Blu-ray Disc derives from the blue-violet laser used to read the disc. While
a standard DVD uses a 650 nanometre red laser, Blu-ray uses a shorter wavelength,
a 405 nm blue-violet laser, and allows for almost six times more data storage than on
a DVD.

 Blu-ray Disc was developed by the Blu-ray Disc Association, a group representing
makers of consumer electronics, computer hardware, and motion pictures. As of June
2009, more than 1000 Blu-ray disc titles are available in Australia, 2500 in Japan,
1500 in the United Kingdom, and 2500 in the United States and Canada.
Blue Ray Disc
Internet and World Wide Web
 The Internet, sometimes called simply "the Net," is a worldwide system of computer
networks composed of other networks and individual computers in which users at any
one computer can, if they have permission, get information from any other computer.
The internet makes use of the TCP/IP protocol suite in order to perform connections
and communication.

 While the internet is a collection of interconnected networks and computers,


the World Wide Web is the portion of the internet comprised of massive
collections of files and resources that are accessible via a web browser.
Client computers using a web browser send HTTP requests to a web server
which returns the requested file to the client's web browser
Basic Details Of Internet
 Domains
Name servers are distributed into tiers called domains. Domains are
organized in a hierarchical "domain name space" which is often referred
to as being like a tree structure. There are several different domain
levels as listed below:
 Root Level Domains - The top of the tree.
 Top Level Domains - These are divided into different categories. Some
of the more common types are shown below:
 .com - Commercial organizations and companies (e.g. yahoo.com)
 .edu - Educational institutes(e.g. harvard.edu)
 .gov - Government owned institutes(e.g. whitehouse.gov)
 .mil - Military domains(e.g. navy.mil)
 .net - Gateways and other networks(e.g. internic.net)
 .org - Private organizations(e.g. eff.org)
 Country codes - International domains (e.g. .in = India)
 Second Level Domains - These domains make up the rest of networks
as all sub-domains are categorized under this heading. So if you visit
PMM site, you are visiting the sub-domain pmmil.com. Within
pmmil.com many other sub-domains may also exist.
(service.pmmil.com)
 Hosts - Hosts are the final level in the hierarchy as they are the
individual computers that occupy or comprise a domain.
 The HTTP Protocol
The Hypertext Transfer Protocol (HTTP) is a part of the TCP/IP protocol suite and is
the set of rules for exchanging files (text, graphic images, sound, video, and other
multimedia files) on the World Wide Web. It is the protocol controlling the transfer and
addressing of HTTP requests and responses.
The Uniform Resource Locator

 The first part is the ‘service descriptor’ which identifies the protocol being used (in the
diagram above it is HTTP). The ‘//’ indicates the start of path (the root directory) which
is followed by the domain name. The remainder of the address is the directory path
on the server that specifies the location of the file to be fetched. An administrator may
wish to keep a web site hidden from the general public which can be done by
changing the port that it is accessed on. A TCP port can be specified in the URL such
as http://crmdms.inservice.tatamotors.com:8080. The TCP port can be any
number in the range of 0 to 65536.
 Browsers - A browser is the software application run on an internet client that
provides a GUI interface for accessing files on the WWW. The most popular browsers
are Microsoft's Internet Explorer and Fire Fox.
 Electronic Mail (E-Mail) - Email addresses appear in the form: user@domainname.
When an email is sent, it lands on a server where it remains until it is downloaded by
a client. E-mail utilizes 2 protocols to handle the delivery of messages as follows:
SMTP - SMTP is responsible for sending mail. Usually it is sent to a POP3 server.
POP3 - POP3 is the responsible for downloading email from a POP3 server to an email client
such as Outlook or Thunderbird
 Internet Protocol (IP) - IP is a connectionless protocol, which means that a session
is not created before sending data. IP is responsible for addressing and routing of
packets between computers. It does not guarantee delivery and does not give
acknowledgement of packets that are lost or sent out of order
 Transmission Control Protocol (TCP) - As opposed to IP, TCP is connection
oriented and assures reliable delivery of packets. When the destination host receives
a segment it sends back an acknowledgement (ack). If an ack is not received by the
source host within a certain period of time then the data is retransmitted. TCP uses
sockets and ports to exchange data between applications. Ports provide a specific
and universal location for message delivery, while sockets use the host ip address,
port number and the type of service (TCP or UDP) to create a reliable connection.
 The File Transfer Protocol (FTP) - The file transfer protocol (FTP) is the
primary method of transferring files over the Internet. As a user, you can use
FTP with a simple command line interface (for example, from the Windows
MS-DOS Prompt window) or with a commercial program that offers a
graphical user interface such as WS_FTP. Two transfer modes are used in
FTP. ASCII and BINARY. ASCII mode is used for the transfer of files
consisting of plain text while the BINARY mode is used all types of files not
consisting of plain text (such as sound, video, executables, images etc).
Failure to upload files in the proper format can cause them not to display
correctly or at all.
 Web Servers - A web server is the computer that is responsible for sending web
pages, images and applications to internet users. Some companies host their own
web servers on their equipment and others outsource this function to another
company called a web host.
Example - Apache: Apache is an open source web server and is typically run on *nix
servers (Unix, Linux, Free BSD, etc), although there is a version available for
Windows based servers. Apache has been the leading web server software for quite
a while.
 Web Hosts - A web host is a company that stores your web site pages and data on
their server and delivers web page requests to your visitors. Web hosts typically
provide support and maintenance functions for web sites that they host as well. There
are several different types of web hosting web masters can choose from.
VIRUS

Internet Attacks

The majority of all attacks come from the internal network. The various types of
attacks are listed below:

 DOS - A denial of service (DoS) attack is a common type of attack in which false
requests to a server overload it to the point that it is unable to handle valid requests.
There are several different types of DoS attacks including Syn Flooding and Ping
Flooding.
 Man-in-the-middle - These attacks can include the interception of email, files,
passwords and other types of data that can be transferred across a network. This is a
form of Data Theft attack.
 IP spoofing - A technique used to gain unauthorized access to computers, whereby
the intruder gives off the appearance that the packets they are sending are coming
from a trusted host. To engage in IP spoofing, an attacker must modify the packet
headers so that it appears that the packets are coming from the trusted IP address.
 Virus - The most common computer infestation, viruses rely on other programs such
as an email client to replicate themselves. There are many different brands of Anti-
Virus software used to detect and eliminate viruses on computers. Virus definition
files are what tell the anti-virus software what to look for and how to fix a particular
virus if found. Because new viruses are being released all of the time, it is very
important to keep the virus definition files up to date.
 Worms - Worms are stand alone programs that do need other programs in order to
replicate themselves like a virus which relies on users to inadvertently spread it.
Viruses and Worms can be prevented by installing anti-virus software which can be
run on servers, clients, firewalls and other devices.
 Trojans - A Trojan is a type of file that appears to do one thing, but in reality does
another. A Trojan can be a file that operates in an expected way, but also has a
secret operation that subverts security. Once a Trojan is installed, it can perform a
wide variety of destructive tasks and/or provide secure information to the attacker.

Вам также может понравиться