IT 3rd Semester Selected Portion PDF
IT 3rd Semester Selected Portion PDF
IT 3rd Semester Selected Portion PDF
Unit 2:
Data Organization and Data Base Management
System [10 Marks]
2. Hierarchy of Data: Character, field, record, file and database [RKB]****
Hierarchy of Data:
Data are the principal resources of an organization. Data stored in computer systems form a hierarchy
extending from a single bit to a database, the major record-keeping entity of a firm. Each higher rung of
this hierarchy is organized from the components below it.
Data are logically organized into:
1. Bits (characters)
2. Fields
3. Records
4. Files
5. Databases
1. Bit (Character) - a bit is the smallest unit of data representation (value of a bit may be a 0 or 1).
Eight bits make a byte which can represent a character or a special symbol in a character code.
2. Field - a field consists of a grouping of characters. A data field represents an attribute (a
characteristic or quality) of some entity (object, person, place, or event).
3. Record - a record represents a collection of attributes that describe a real-world entity. A record
consists of fields, with each field describing an attribute of the entity.
4. File - a group of related records. Files are frequently classified by the application for which they are
primarily used (employee file). A primary key in a file is the field (or fields) whose value identifies a
record among others in a data file.
5. Database - is an integrated collection of logically related records or files. A database consolidates
records previously stored in separate files into a common pool of data records that provides data for
many applications. The data is managed by systems software called database management systems
(DBMS). The data stored in a database is independent of the application programs using it and of the
types of secondary storage devices on which it is stored.
Candidate keys:
Candidate keys are those keys which is candidate for primary key of a table. In simple words we can
understand that such type of keys which full fill all the requirements of primary key which is not null
and have unique records is a candidate for primary key. So thus type of key is known as candidate
key. Every table must have at least one candidate key but at the same time can have several.
Foreign Key
Foreign key are those keys which is used to define relationship between two tables. When we want to
implement relationship between two tables then we use concept of foreign key. It is also known as
referential integrity. We can create more than one foreign key per table. foreign key is generally a
primary key from one table that appears as a field in another where the first table has a relationship to
the second. In other words, if we had a table A with a primary key X that linked to a table B where X
was a field in B, then X would be a foreign key in B.
Alternate Key
If any table have more than one candidate key, then after choosing primary key from those candidate
key, rest of candidate keys are known as an alternate key of that table.
Unit 3:
Internet and Its Applications [8 Marks]
1. 1. Meaning of Internet [Compiled by Ravi Bhalotia]***
What does Internet mean?
The internet is a globally connected network system that uses TCP/IP to transmit data via various
types of media. The internet is a network of global exchanges – including private, public, business,
academic and government networks – connected by guided, wireless and fiber-optic technologies.
The terms internet and World Wide Web are often used interchangeably, but they are not exactly
the same thing; the internet refers to the global communication system, including hardware and
infrastructure, while the web is one of the services communicated over the internet.
Internet has been perhaps the most outstanding innovation in the history of mankind. It is the
world’s largest computer network, the network of networks. Today internet has brought a globe in a
single room. It is a wealth of knowledge and has great potential and lot to offer.
The IPv6 address format is much different than the IPv4 format. It contains eight sets of
four hexadecimal digits and uses colons to separate each block. An example of an IPv6 address is:
2602:0445:0000:0000:a93e:5ca7:81e2:5f9d. There are 3.4 x 1038 possible IPv6 addresses, meaning we
shouldn't run out of IPv6 addresses anytime soon.
Unit 4:
Security and Encryption [8 Marks]
2. Measures to ensure Security [Compiled by Ravi Bhalotia]***
Major security measures are following −
(a) Encryption − It is a very effective and practical way to safeguard the data being transmitted over
the network. Sender of the information encrypts the data using a secret code and only the
specified receiver can decrypt the data using the same or a different secret code.
(b) Digital Signature − Digital signature ensures the authenticity of the information. A digital
signature is an e-signature authenticated through encryption and password.
(c) Security Certificates − Security certificate is a unique digital id used to verify the identity of an
individual website or user.
Network Hacking − Hacking a network means gathering information about a network by using
tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system
and hamper its operation.
Email Hacking − It includes getting unauthorized access on an Email account and using it without
taking the consent of its owner.
Ethical Hacking − Ethical hacking involves finding weaknesses in a computer or network system
for testing purpose and finally getting them fixed.
Password Hacking − This is the process of recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Computer Hacking − This is the process of stealing computer ID and password by applying
hacking methods and getting unauthorized access to a computer system.
Asymmetric encryption
Asymmetric encryption uses the public key for the encryption, and a private key (Secret key) is
used for decryption.
Unit 5:
IT Act. 2000 and Cyber Crimes [6 Marks]
(q) "Digital Signature Certificate" means a Digital Signature Certificate issued under subsection (4) of
section 35;
(za) "originator" means a person who sends, generates, stores or transmits any electronic message or
causes any electronic message to be sent, generated, stored or transmitted to any other person but does not
include an intermediary; **
(zc) "private key" means the key of a key pair used to create a digital signature;****
(zd) "public key" means the key of a key pair used to verify a digital signature and listed in the Digital
Signature Certificate; ****
(zg) "subscriber" means a person in whose name the Digital Signature Certificate is issued; ****