VAC Digital and Technological Solutions
VAC Digital and Technological Solutions
VAC Digital and Technological Solutions
Technological
Solutions
Exploring the foundations of digitization
www.bpbonline.com
xvi
Table of Contents
Conclusion............................................................................................................................. 23
Points to remember............................................................................................................... 23
Key terms............................................................................................................................... 24
Multiple choice questions.................................................................................................... 24
Answers............................................................................................................................. 26
Fill in the blanks.................................................................................................................... 26
True/ False statements......................................................................................................... 27
Match the following.............................................................................................................. 28
Answers............................................................................................................................. 29
Answers........................................................................................................................... 177
Join our book’s Discord space.................................................................................. 178
7. Cybersecurity...................................................................................................................... 213
Introduction......................................................................................................................... 213
Structure............................................................................................................................... 213
Objectives............................................................................................................................. 214
Cybersecurity....................................................................................................................... 214
Importance of cybersecurity............................................................................................ 215
Common cybersecurity threats and incidents................................................................. 215
Malware.................................................................................................................. 215
Identifying malware................................................................................................ 219
Phishing.................................................................................................................. 220
Risks associated with phishing attacks................................................................... 221
Ransomware............................................................................................................ 221
Cybercrimes......................................................................................................................... 223
Categories of cybercrime.................................................................................................. 224
Types of cybercrime......................................................................................................... 224
Cyberstalking.......................................................................................................... 224
Cyber bullying........................................................................................................ 226
Financial scams....................................................................................................... 229
Impact of cybercrime on society....................................................................................... 230
Measures to prevent cybercrimes..................................................................................... 230
Cyber hygiene...................................................................................................................... 231
Conclusion........................................................................................................................... 233
Points to remember............................................................................................................. 233
Multiple choice questions.................................................................................................. 234
Answers........................................................................................................................... 235
xxv
Index..............................................................................................................................283-291
Chapter 1
Computer System
Fundamentals
Introduction
Computer science is a field that deals with the study of computers and how they work.
It involves learning how to create programs that can solve problems and make things
easier. The field of computer science emerged during the mid-20th century with the
development of the first electronic computers. Back then, computer science was closely
linked to math, and people like Alan Turing, John von Neumann, and Grace Hopper made
important contributions to both fields.
During the 1960s and 1970s, computer science experienced rapid expansion, leading to the
development of fresh computer designs, programming languages, and innovative software
creation methods. As time passed, computer science kept changing and improving.
Personal computers, the internet, and mobile devices were created. Today, computer
science is a diverse field and affects many parts of modern life, including science, business,
entertainment, and social media.
Structure
In this chapter, we will cover the following topics:
• Understanding computers
• Computer architecture
2 Digital and Technological Solutions
• Software
• Operating system
• Algorithm
• Flow chart
Objectives
Upon completion of this chapter, students should be able to understand the generations
of computers and their advancements from generation I to V. They will also be able to
comprehend computer architecture, including hardware components like CPU, RAM,
and storage devices. Further, students will recognize the significance of output units and
their role in information display and distinguish between system software and application
software, focusing on operating systems. Along with that, students will explore the
fundamental aspects of algorithms, including their properties and representation, using
flow charts.
Understanding computers
The computer is a machine that can handle and store information, and perform different
tasks according to the commands it receives. It is made up of several parts that work
together to make it function, such as CPU, memory, solid-state drive, or hard drive
(storage), input devices like a keyboard and mouse, and output devices like a screen or
speakers. The following figure illustrates parts of a computer system:
Computers can perform a wide range of tasks, from simple operations like typing and
calculating to complex ones like analyzing large sets of data or running simulations.
They can be used for various purposes like creating documents, editing photos or videos,
browsing the internet, playing games, and much more. Computers have become an
essential part of our lives and are used in many industries and fields, including education,
healthcare, finance, engineering, and entertainment. They have made many tasks faster,
easier, and more efficient than they used to be, and have enabled us to accomplish things
that were once impossible.
Generations of computers
It refers to the different stages of development in computer technology. Each generation
represents a significant step forward in the design and functionality of computers.
Typically, each new generation is marked by the introduction of new hardware and
software technologies that enable faster processing, more efficient memory usage, and
increased computing power. Each generation builds on the achievements of the previous
generation, resulting in increasingly powerful and capable computers. Let us briefly
understand each generation:
• Generation I: The first generation of computers was the vacuum tube era, which
spanned from the late 1940s to the early 1950s. These computers used vacuum
tubes to perform calculations. They were very large and expensive, but they were
the first computers capable of performing complex calculations and were a huge
leap forward for computer technology. Examples of first-generation computers are
ENIAC, EDVAC, UNIVAC, IBM-701, and IBM-650.
• Generation II: Transistors replaced vacuum tubes during the late 1950s, marking
the emergence of the second generation of computers. Transistors were more
reliable, faster, and smaller than vacuum tubes, and they allowed for the creation of
smaller and more powerful computers. Examples of second-generation computers
are IBM 1620, IBM 7094, CDC 1604, CDC 3600, and UNIVAC 1108.
• Generation III: In the 1960s, the computer industry witnessed the emergence of
the third generation of computers, which marked a significant milestone with
the introduction of Integrated Circuits (ICs). These ICs revolutionized computer
design by enabling the development of more compact and powerful machines.
As a result, mainframe computers and minicomputers became possible, bringing
about a new era of computing with enhanced capabilities and improved efficiency.
Examples of third-generation computers are IBM 370, PDP-11, IBM System/360,
UNIVAC 1108, Honeywell-6000, DEC series, and ICL 2900.
• Generation IV: The fourth generation of computers commenced in the late 1970s
and extended throughout the 1980s saw the development of microprocessors.
Microprocessors made it possible to create personal computers that were affordable
and accessible to individuals and small businesses. Examples of fourth-generation
computers are IBM 4341, DEC 10, STAR 1000, and PUP 11.
4 Digital and Technological Solutions
• Generation V: The fifth generation of computers initiated in the 1990s and has
persisted to the present era, featuring significant advancements in technologies
such as artificial intelligence and other cutting-edge innovations. These
technologies have enabled the creation of machines that can learn, reason, and
understand natural language, and they have revolutionized fields like healthcare,
finance, and manufacturing. Examples of fifth-generation computers are Param
1000, Intel P4, IBM laptops, notebooks, and PCs of Pentium. The following figure
illustrates the generations of computer:
Computer architecture
Computer architecture is the design or blueprint that explains how different components
of a computer system like hardware and software, work together to process information
and execute programs. In short, computer architecture refers to how a computer system is
designed and how it works.
Hardware
Hardware refers to the physical components of a computer system that can be touched
and seen. Examples of hardware include the computer case, monitor, keyboard, mouse,
motherboard, hard drive, and CPU.
Input unit
Input devices enable users to input data and commands into a computer system, allowing
them to provide information in various forms, such as numbers, words, actions, and
commands. Its primary role is to capture and direct these inputs into the computer. For
Computer System Fundamentals 5
instance, a keyboard serves as an input device for entering numbers and characters, while
a mouse can be used to input directions and commands. Other examples of input devices
include Magnetic Ink Character Recognition (MICR), barcode readers, Optical Character
Recognition (OCR) devices, and touch screens.
Primary memory
Commonly referred to as main memory, primary memory is the type of memory that the
CPU can directly access. It is also volatile, which means that it requires power to retain its
data. Primary memory is of two types, along with another form called cache memory. Let
us briefly understand each type: