Encompasses human behavior, workplace ethics, compliance.
Focuses on Internet-related issues like privacy and content publication.
Importance of Computer ethics
Protect personal and commercial information.
Control plagiarism, identity fraud, copyrighted material misuse.
Ensure ICT accessibility for all, including disabled and deprived.
Prevent dishonest business practices and promote fair competition.
Promote moral and social values in society.
Concept of Information Security
More than just preventing unauthorized access.
Prevents unauthorized access, use, disclosure, disruption, etc.
Applies to physical and electronic information.
Encompasses various data types, including personal details.
Spans research areas like Cryptography, Mobile Computing, etc.
Information Security vs. Cyber Security
Focus:
Information Security: Primarily concerned with safeguarding data from unauthorized access, disclosure, and modification, ensuring confidentiality, integrity, and availability.
Cyber Security: Focuses on protecting computer systems, networks, and digital assets from cyber threats, including attacks and breaches.
Scope:
Information Security: Encompasses physical and digital data across various forms.
Cyber Security: Centers on digital assets, online threats, and vulnerabilities in the cyber realm.
Components:
Information Security: Involves policies, procedures, access controls, data classification, and risk management.
Cyber Security: Includes firewalls, intrusion detection systems, antivirus software, encryption, and incident response.
Emphasis:
Information Security: Stresses confidentiality, integrity, and availability of information.
Cyber Security: Emphasizes protection from cyberattacks, data breaches, and maintaining system functionality.
Application:
Information Security: Relevant to all aspects of data handling, storage, and transmission.
Cyber Security: Specifically addresses online threats and digital systems.
Examples:
Information Security: Securing physical documents, complying with regulations, data disposal.
Both fields are closely related and often overlap due to the digital nature of modern information management.
Collaboration:
Effective protection often requires collaboration between information security and cyber security experts.
Evolution:
Both fields evolve to adapt to new technologies and emerging threats in the digital landscape.
Foundation:
The principles of both fields contribute to a comprehensive approach to overall organizational security.
Information security principles
Basic principles/component of Information Security are CIA:
Confidentiality:
Prevents unauthorized disclosure of information.
Example: Password seen during login, compromise occurred.
Breach of confidentiality when unauthorized individuals access information.
Integrity:
Ensures accuracy and completeness of data.
Prevents unauthorized editing or tampering.
Example: Employee leaves, data updated across departments.
Only authorized personnel are allowed to edit data.
Availability:
Information accessible when needed.
Collaboration across organizational teams.
Example: Checking employee’s leave status.
Denial of service attacks can disrupt availability.
Information Security Policy
To prevent and mitigate security breaches.
To make security policy truly effective.
To change the company, new threats, conclusions drawn from previous breaches.
Make information security policy practice and enforceable.
Information security measures
Technical Measures
Organizational Measures
Human Measures
Physical Measures
Concept of Cybercrime
Crime committed using network-connected devices.
Perpetrators called cyber criminals or cyber crooks.
Growing digitization leads to increased cybercrime.
Attack computer networks or devices using IT skills.
Aims: Obtain business information, break accounts, identity theft.
Include revenge porn, cyber-stalking, harassment, bullying.
Also involve child sexual exploitation.
Types of Cybercrime:
Active Attack:
Intended to cause harm or disruption to system or network.
Use malicious code, viruses, worms, Trojans, and other forms of malware to carry out active attack
Attackers take direct and intentional action that causes harm.
Passive Attack:
Attacker intercepts and monitors data transmissions without altering or affecting the target system or data.
Aims to gather sensitive information, such as passwords, financial data, or confidential communications, without the victim’s knowledge.
Designed to be discreet and undetectable, making it challenging for the victim to realize that their data is being compromised.
Hacking:
Unauthorized access to personal information for illegal gain.
Include unauthorized access, data theft, service disruption, and more.
Hacking techniques evolve, requiring ongoing security measures to counteract attempts.
DDoS (Distributed Denial of service) Attacks:
Overwhelm target with traffic to render it inaccessible.
Utilize compromised devices in a botnet for traffic generation.
Detection involves monitoring traffic patterns and spikes.
Identity Theft:
Stealing personal information for financial fraud.
Unauthorized acquisition and use of someone’s personal information.
To assume the victim’s identity for financial gain or fraudulent activities.
Credit card fraud:
Unauthorized use of credit card information for financial gain.
To make fraudulent transactions using stolen card details.
Personal data like credit card numbers and CVVs are targeted.
Cyberstalking:
Harassment or stalking using digital communication and online platforms.
Involves persistent and unwanted online attention towards a victim.
Uses technology to intimidate, control, and cause fear in victims.
Cyber extortion:
Demanding money or something of value through online threats or attacks.
Impact on victims’ finances, reputation, and operational continuity.
Can lead to financial losses, data exposure, and damage to brand image.
Crypto jacking:
Illegitimate use of others’ computing resources to mine cryptocurrencies.
To generate digital currency for the attacker’s benefit.
Methods involve infecting devices with malware to mine cryptocurrencies.
Cyberbullying:
Insulting, harassing, or threatening via the internet.
Harassing, intimidating, or targeting individuals using digital communication.
Involves repetitive and harmful behavior through online platforms.
Cyber Espionage:
Covert and unauthorized gathering of sensitive information through digital means.
Aim is to obtain valuable data for political, economic, or military advantage.
Can lead to compromised diplomatic relations, financial losses, and weakened defense.
Social Engineering:
Cybercriminals make contact through calls, emails, or in person.
Pretend as legitimate entities to gain trust.
Aim: Obtain personal and important information.
Malicious Software and Spam
Malicious Software
Malware stands for malicious software, targeting computers and networks.
It encompasses harmful programs intended to delete, modify, block, or copy data without authorization.
Coined by Yisrael Radai in 1990, but examples of malware date back to earlier times.
One of the earliest instances is the Creeper virus in 1971, an experiment by Robert Thomas.
Different Types of Malware
Computer Virus:
Malicious software that self-replicates and attaches to other files.
Activates secretly when the host program is run.
Types: Memory-Resident, Program File, Boot Sector, Stealth, Macro, Email Viruses.
The example of computer virus include
Install the operating system, stay in RAM from boot to shutdown.
Rare due to modern OS security and Internet precautions.
Infects executable files (e.g., .EXE, .COM) to increase chances of execution.
Distributed through email messages, activated when attachments or links are interacted with.
Encoded as macros embedded in documents, often in applications like Word and Excel.
Worm:
Malicious software that self-replicates like viruses.
Automatically executes itself, unlike viruses that need a host program.
Spreads over networks quickly, capable of causing substantial damage rapidly.
Trojan Horse:
Non-replicating program.
Appears legitimate but contains malicious code.
Gains trust and performs harmful activities when executed.
Used by hackers for stealing passwords, data destruction, and more.
Difficult to detect due to its deceptive nature.
Logic Bomb:
Malicious code triggered by specific events or conditions.
Remains dormant until triggered.
Used for unauthorized access, data destruction, or harm.
Hidden within legitimate software.
Difficult to detect until activation.
Causes damage or disruption at a specific time/event.
Zombies:
Compromised computers/devices controlled by remote attackers.
Part of a botnet network for malicious activities.
Used for DDoS attacks, malware spreading, and data theft.
Devices include computers, smartphones, IoT devices, etc.
Users may not be aware of their devices being used.
Prevention requires security measures and updates.
Phishing:
Phishing is a cyberattack that tricks users into revealing sensitive information or performing actions.
Attackers use deceptive emails, websites, or messages to appear legitimate.
Goals include stealing passwords, financial data, or installing malware.
Phishing preys on human psychology and social engineering techniques.
Users should be cautious and verify the authenticity of requests before sharing information.
Spyware:
Secretly records user information.
Sends collected data to third parties.
Information can include accessed files, online activities, and keystrokes.
Adware:
Displays advertising banners during program execution.
Can function like spyware, collecting confidential information.
Aims to gather data from victim’s computer for various purposes.
Ransomware:
Ransom malware that blocks user access to files/programs.
Demands ransom payment through online methods.
Paid ransom allows user to regain access to their system
Rootkit:
Malicious software altering OS functionality stealthily.
Enables hacker to gain complete control as system administrator.
Designed to hide their presence on the victim’s system.
Botnet:
Compromised computer/device networks under remote control.
Used for various malicious activities.
DDoS attacks, spam distribution, data theft, etc.
Infected devices become “bots” or “zombies.”
Central control by operators for coordinated attacks.
Prevention requires security practices and updates.
Spam:
Unsolicited and often mass emails sent to numerous recipients.
Promotes products, services, scams, or fraudulent schemes.
Can include email, SEO, social networking, mobile, and messaging spam.
Aims to manipulate search results, exploit social platforms, and target mobile users.
Clogs inboxes, distracts from legitimate emails, and can be ignorable.
Spreads across various digital communication channels.
Adverse effects include annoyance, deception, and potential security risks.
Symptoms of Malware attack:
Unexpected Crashes
Slow System
Excessive Hard Drive Activity
Strange Windows
Peculiar Messages
Bad Program Activity
Random Network Activity
Erratic Email
Blacklisting IP Address
Unexpected Antivirus Disabling
Protection from Cybercrime
Keep your computer and software updated:
Regularly apply patches and software updates to prevent vulnerabilities.
Use a non-administrator account whenever possible:
limiting the privileges of the user, reducing the potential impact of security breaches or malicious activities.
Think twice before clicking links or downloading anything:
When clicking links or downloading files is essential to prevent potential exposure to malware, phishing, and other online threats.
Be careful about opening email attachments or images:
When opening email attachments or images is important to avoid potential risks of malware infection, phishing attempts, and other malicious activities.
Don’t trust pop-up windows that ask you to download software:
Being sceptical of pop-up windows that prompt you to download software is important to prevent unwittingly installing malicious or unwanted programs on your device.
Limit your files-sharing:
Limiting file sharing helps control the exposure of sensitive information and reduces the risk of unauthorized access or sharing of confidential data.
Use antivirus/antimalware software:
Utilizing antivirus and antimalware software enhances your device’s protection by identifying and mitigating potential threats, ensuring a safer online experience.
Secure your Network:
To prevent unauthorized access, data breaches, and cyberattacks by implementing strong passwords, encryption, and proper network configuration.
Backup your Files:
Regularly backing up your files ensures that important data is not lost in case of hardware failure, malware attacks, or other unforeseen events.
Use Multiple Strong Passwords:
Avoid repeating passwords on different sites.
Create complex passwords with letters, numbers, and symbols.
Consider using a password management application.
Keep Your Social Media Accounts Private:
Set privacy settings on social networking profiles.
Be cautious about sharing personal information online.
Intellectual Property Right (IPR)
Legal rights safeguarding intellectual creations like inventions, artistic works, and more.
Provides exclusive use of intangible assets for a specific period.
Encompasses copyrights, patents, trademarks, and trade secrets.
Types of Intellectual Property Right
Copyright and related rights:
Copyright is an IPR that safeguards literary, artistic, and technological creations, including writings, music, fine arts, computer programs, and databases.
Patents:
Patent is an exclusive right granted to inventors to prevent unauthorized commercial use of their invention for a limited time, in exchange for public disclosure of the invention’s details.
Trademarks:
Trademark is a distinguishing sign that identifies goods or services of one entity from others. It has historical roots in artisans’ marks and serves to establish brand identity.
Industrial designs:
Industrial design pertains to the aesthetic aspects of an article, encompassing both three-dimensional features like shape and surface, as well as two-dimensional elements like patterns and colors.
Geographical indications:
Geographical indications and appellations of origin are signs used on goods with a specific geographical origin, indicating qualities and characteristics linked to that place of origin, often identified by the name of the place.
Trade secrets:
Trade secrets are confidential and exclusive information such as procedures, systems, formulas, etc., that provide a competitive advantage to a company, contributing to its success.
Why should we promote and protect intellectual property?
Encourages innovation and creativity.
Drives economic growth and job creation.
Preserves cultural heritage and traditional knowledge.
Ensures fair competition and prevents unauthorized use.
Attracts investment and foreign direct investment.
Supports research and development activities.
Facilitates global collaboration and knowledge sharing.
Benefits consumers by ensuring product quality and origin.
Fosters cultural and artistic expression.
Intellectual property rights (IPRs)
Legal rights protecting intellectual creations.
Encompass inventions, art, products, and more.
Types include copyrights, patents, trademarks, trade secrets.
Encourage innovation, creativity, and economic growth.
Foster fair competition and prevent unauthorized use.
Attract investment and support research.
Preserve cultural heritage and traditional knowledge.
Ensure product quality and origin for consumers.
Facilitate global collaboration and partnerships.
Digital Signature
Electronic form of signature to authenticate sender’s identity or document signer.
Ensures original content integrity and prevents tampering.
Transportable and not easily imitated.
Provides non-repudiation, authentication, and message integrity.
The Government of Nepal adopted digital signatures officially on December 2, 2015.
Utilizes cryptographic measures for authenticity, non-repudiation, and integrity.
Working mechanism of digital signature
Two keys are generated : Private key and Public key.
Private key kept by signer and kept securely.
Public key owned by the receiver to decrypt the message.
Hash function:
Hash function generates a fixed-length string from data using a mathematical algorithm.
It works for files of any size, like emails, documents, or images.
The generated hash is unique to the input data.
Hashing is a one-way process; you can’t reverse it to find the original data.
Even a small change in input data produces a significantly different hash.
Used in data integrity verification, password storage, digital signatures, etc.
Public Key Infrastructure (PKI):
PKI facilitates digital signatures and more.
It involves a private-public key pair for each transaction.
Private key is kept secret and used for signing.
Public key is used for validating signatures.
Ensures secure key generation, usage, and storage.
Involves a trusted Certificate Authority (CA).
Certificate Authority (CA):
Digital signatures rely on public-private key pairs.
Assurance of secure key creation and usage is vital.
CAs are trusted third-party organizations.
CAs ensure key security and provide digital certificates.
CAs validate identities before issuing certificates.
Digital certificates are digitally signed by CAs.
Digital Certificate:
Issued by a Certificate Authority (CA).
Contains public key and associated identity.
Used to confirm the key’s ownership.
CA acts as a guarantor of authenticity.
Valid for a specified time.
Necessary for creating a digital signature.
Advantage and Disadvantages of Digital Signature:
Advantage of Digital Signature:
Enhanced security and resistance to forgery.
Authenticates sender’s identity.
Ensures data integrity.
Provides non-repudiation.
Saves costs and time.
Increases efficiency in workflows.
Globally accepted for legal purposes.
Positive environmental impact.
Simplifies audit trail creation.
Integrates well with digital workflows.
Disadvantage of Digital Signature:
Dependence on technology and digital infrastructure.
Complex implementation and management.
Key management challenges.
Variability in legal recognition.
Infrastructure requirements for both parties.
Initial costs for implementation.
User acceptance and familiarity concerns.
Potential for misuse or fraudulent activities.
Complex revocation processes.
Risk of sensitive data exposure during transfer.
Cyber Law in Nepal
Governs legal matters related to computers, internet, data, software, and networks.
Encompasses legal issues in cyberspace.
Pertains to preventing internet-related crimes.
Area of Cyber Law
Electronic and Digital Signature:
Computer Crime:
Intellectual Property:
Data Protection and Privacy:
Telecommunication Laws:
Cyber law in Nepal
Cyber Law covers diverse issues tied to the internet and technology.
Encompasses intellectual property, privacy, expression, and jurisdiction.
Nepal’s first cyber law is the Electronic Transaction Act, 2063.
Responds to the increasing internet use in Nepal.
Addresses commercial, private sector, and criminal aspects.
Covers digital signatures, intellectual property, and cybercrime.
Consists of 12 sections and 80 clauses.
Focuses on computer networks and cybercrime.
Brings cybercriminals to court and imposes penalties like other crimes.
Provisions included in the laws:
Comprehensive coverage of cyber activities.
Key legislation for Nepal’s IT industry development.
Criminal and civil consequences for hacking, data theft, and more.
Penalties include imprisonment up to 5 years or fines.
Focus on severity and repetition of the crime.
Enhanced security for electronic banking transactions.
Boosts economic activities over the internet in Nepal.
Legal recognition for government websites and digital signatures.
Applies to e-banking, e-commerce, and more electronic media.
ICT Policy in Nepal
ICTs are essential for sustainable development and economic growth worldwide.
They transform social interactions and public service delivery.
Nepal considers ICTs crucial for poverty reduction and development goals.
Efficiency is a key indicator of competitiveness, and ICTs contribute to efficiency.
ICTs play a role in better governance, education access, healthcare outreach, and economic growth.
Challenges arise from the fast-paced nature of ICT innovation and evolving policy needs.
Policy formulation needs to adapt to technological trends, including cybersecurity, data protection, privacy, and intellectual property rights.
Addressing challenges of technological convergence and regulatory governance is important.
As telecom connectivity expands, focus shifts to strengthening demand-side fundamentals.
ICTs offer a tool to bridge development gaps and improve citizens’ quality of life.
Vision
Goal to transform Nepal into an information and knowledge-based society and economy.
Mission
To create conditions for the intensified development and growth of ICT sector as a key driver for
Nepal’s sustainable development and poverty reduction
Major Objectives
Make ICT accessible and affordable to all citizens.
Develop and expand ICT infrastructure.
To promote good governance through the use of ICT.
Achieve sustainable and inclusive socio-economic development through the use of ICT
Create the opportunities of human resources development through the use of ICT.
Policy:
Promote a stable, fair and competitive investment climate.
Facilitate the development of e-Trade and E-Commerce activities.
Enhance competitiveness of farmers through ICT in agriculture.
Improve communication systems for tourism development.
Support e-Government planning and strategies.
Develop ICT services to bridge the digital divide.
Ensure efficient use of ICT infrastructure for resilience.
Enhance institutional capacity for ICT education in educational institutions.
Increase enrollment and output of students in key ICT-related skills.
Deploy ICTs in education for better outcomes and expanded access.
Facilitate youth and women’s participation in ICT, media, and content development.
Address gender-based inequalities in ICT initiatives.
Promote use of free and open source software in government.
Develop a competitive and regulated ICT industry through innovation and partnership.
Attract ICT-related foreign investments, especially in the IT-ITES/BPO sector.
Utilized ICT for social and economic development.
Expand broadband services through national telecommunications infrastructure.
Utilize regional and international telecom infrastructure for economic integration.
Safeguard public sector information and investments from negative ICT impacts.
Facilitate e-Trade and E-Commerce with a stable investment climate.
Introduction to Multimedia
Combines text, graphics, audio, and video on computers.
Enables navigation, interaction, creation, and communication.
Offers various ways to communicate information.
TV, animated films, radio broadcasts use different media.
Integration and interactivity through digitization.
Easy feedback enhances interaction.
Flexibility for different situations and audiences.
Applicable to individuals and groups.
Useful for web page creation.
Enables distance education and video conferencing.
Disadvantage of Multimedia:
Information overload: Can present too much information at once.
Compilation time: Takes time to create the original draft.
Cost: Utilizing various resources can be expensive.
Practicality: Large files (video, audio) affect loading times.
Limited distribution: Accessibility issues in remote or poor areas.
Application of Multimedia
1) Education:
Education is a human right for all.
Challenges like geography, technology, lack of higher education options.
Distance education options available: CBT (CD-based) and WBT (Web-based).
CBT offers CD-based courses, while WBT provides online courses.
Smart education tools in schools and colleges for interactive learning.
Many universities offer online degrees and distance education.
Learning becomes engaging and enjoyable.
2) Entertainment and Games:
Education is a human right for all.
Challenges like geography, technology, lack of higher education options.
Distance education options available: CBT (CD-based) and WBT (Web-based).
CBT offers CD-based courses, while WBT provides online courses.
Smart education tools in schools and colleges for interactive learning.
Many universities offer online degrees and distance education.
Learning becomes engaging and enjoyable.
3) Business:
Includes product demos, instant messaging.
Voice and live conferencing are excellent applications.
Engages audiences and widely used in programs.
Mechanics and various professionals can benefit.
Easy-to-use authoring tools for program creation.
Applications enhance smooth and effective operations.
4) Communication:
Multimedia tools allow cost-effective communication via live text, audio, and video chats.
This enhances daily communication’s ease, efficiency, and effectiveness.
Interactive multimedia-based social networking platforms like Facebook, Twitter, and Hi5 make communication faster across different time zones.
Communication through these platforms comes at a nominal cost.
5) Training:
Various systems available for training students.
Covers subjects from mathematics to complex medical procedures.
Incorporates audio clips and multi-angled views for practical skills.
Equipped with decision-making utilities for personalized training.
Uses video sequences to clarify concepts.
6) Web Page Designing:
Websites today serve as information sources for organizations and individuals.
Multimedia tools like images, audios, videos, and animations are used to interactively share information with users.
This approach enhances clarity in delivering information to recipients.
Various types of websites, such as news, educational, medical, business, and personal sites, adopt dynamic layouts for attractive and engaging web pages.
7) Journalism:
Modern journalists have expanded roles, including reporting, photography, editing, interpretation, and design.
Proficiency in multimedia tools is crucial for effectively designing and editing news articles.
Journalists gather diverse field footage to create captivating audio and visual content.
This multimedia approach ensures easy global accessibility to news content.
8) Engineering:
Software engineers frequently employ multimedia tools for tasks like computer graphics, simulations, and product demonstrations.
These tools have versatile applications, spanning scientific research to entertainment design.
Utilizing multimedia tools yields productive results for business entrepreneurs.
The impact of such usage extends to future societal implications.
9) Advertising:
Internet’s rise changed advertising.
Multimedia is crucial in advertising.
Used in both print and electronic ads.
Created using professional software.
Presents to target audiences effectively.
10) Virtual Reality:
Enables user interaction with computer-simulated environments.
Environment can mimic the real world or be completely different.
Used in training (pilot, combat, surgery) and games.
Built on multimedia technology.
11) Medicine:
Doctors trained with virtual surgery and disease simulations.
Develop techniques to prevent virus and bacteria spread.
Multimedia aids practical training and skill development.
Introduction to Web Development
Webpage and Website
Webpages:
Digital document on the World Wide Web.
Written in languages like HTML, CSS, JavaScript.
Contains text, images, videos, links, and more.
Delivers information, media, and functionality.
Retrieved from a web server using a URL.
Accessed through browsers via URLs.
Contains text, graphics, and hyperlinks.
Can be static (unchanging) or dynamic (changing content).
Dynamic pages use scripting languages like PHP, Perl, ASP, JSP.
Scripts on server generate content like date, time, and database info.
Content returned as HTML code.
Browsers translate HTML for display.
Websites:
Collections of interconnected web pages.
Hosted on a single domain or web address.
Accessed through web browsers.
Provide information, resources, and services.
Created using HTML, CSS, JavaScript.
Can include multimedia elements.
Accessed via URLs in web browsers.
Collection of interconnected web pages.
Grouped together and linked.
Referred to as “web site” or “site.”
Created by individuals, groups, businesses, or organizations.
Serve various purposes and functions.
Accessed through web browsers.
Enter URL in browser’s address bar to visit a site.
Search engines help find websites.
Web Browsers and Search Engines
Software for locating, retrieving, and displaying web content.
Enables access to web pages, images, videos, and files on the World Wide Web.
Allows users to enter website addresses and browse the internet.
Essential for accessing websites and online content.
Early browsers like Mosaic and Netscape Navigator rendered HTML and supported bookmarks.
Modern browsers handle HTML, JavaScript, AJAX, multimedia, and more.
Many browsers offer extensions and plugins for added functionality.
Examples include Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Edge, Internet Explorer.
Web Development Process
Planning and Requirement Analysis:
Define the purpose, goals, and target audience of the website.
Gather requirements, features, and functionalities.
Design:
Create wireframes or mockups outlining the layout and structure.
Design the user interface (UI), including colors, typography, and visual elements.
Development:
Write HTML, CSS, and sometimes JavaScript code to create the user interface.
Ensure responsiveness for various devices and screen sizes.
Develop the server-side logic and databases.
Implement functionality, data processing, and interactions.
Integration:
Combine the front-end and back-end components.
Test for compatibility and data flow between both ends.
Testing Deployment:
Perform comprehensive testing, including functionality, usability, performance, and security.
Identify and fix bugs and issues.
Upload the website to a web server or hosting platform.
Configure domain, server settings, and databases.
Launch:
Make the website live and accessible to the public.
Monitor for any issues that might arise after launch.
Overview of Various Internet & Web Technologies
Overview of Internet
Global network of interconnected computers.
Allows communication and sharing of information worldwide.
Built on a decentralized architecture.
Uses standardized protocols like TCP/IP.
Enables access to websites, email, file sharing, and more.
Originated from ARPANET in the 1960s.
Internet Service Providers (ISPs) provide access.
Web browsers are used to access web content.
Facilitates online communication, commerce, and collaboration.
Continuously evolving with new technologies and services.
Uses of Internet
Communication
Information Access
Education
Entertainment
E-Commerce
Research
Work and Business
Social Networking
Banking and Finance
Healthcare
Misuses of Internet
Copyright Infringement
Cyber Crime
Hate Speech
Spread of Misinformation
Web Technology
Refers to technology operating on the World Wide Web.
Enables businesses to enhance tasks and databases with mobility.
Accessible from any location through the Internet.
Also known as SaaS (Software as a Service).
Paid based on usage, no software installation required.
Accessible via simple signup and browser URL.
Example: Configuring devices through a web-based console.
Includes mark-up languages (HTML, CSS, XML), CGI, JavaScript, and HTTP.
Encompasses programming languages, web servers, databases, and business applications.
Protocol
Set of rules for data transmission.
Governs communication between devices/systems.
Defines format, order, and timing of messages.
Enables effective and standardized interaction.
Essential for networks, telecommunications, software applications.
URL
Uniform Resource Locator (URL).
Used to locate resources on the internet.
Includes protocol, domain/IP, and path to the resource.
Standardized way to access web content and files.
Domain Name System
Hierarchical system.
Translates domain names to IP addresses.
Enables user-friendly web addressing.
Facilitates internet resource access.
Email
Digital messages sent over the internet.
Include text, images, attachments, links.
Use protocols like SMTP, POP3/IMAP.
Sent, received, and organized via email clients or webmail services.
Types of Email: Email Client, Webmail.
Content Management System (CMS)
Introduction
Stands for Content Management System.
Manages content using a database.
Used for website development.
Updates content and structure.
Often open-source and free.
May offer paid options like templates and plugins.
Example: WordPress, Wix, Web flow, Tumblr, etc
Content Management Application (CMA), Content Delivery Application (CDA) are two parts of CMS.
Feature of CMS:
User Management: Manage user roles and information.
Theme System: Modify site appearance and functionality.
Extending Plugins: Add custom features using plugins.
Search Engine Optimization (SEO): Built-in SEO tools.
Media Management: Organized and upload media files.
Multilingual: Supports content translation.
HTML the Language of the Web
Scripting language for creating hypertext documents on the web.
Invented by Tim Berners-Lee around 1990.
Based on SGML (Standard Generalized Markup Language).
Later evolved into XHTML (Extensible Markup Language) by W3C.
Uses tags to define structure and presentation of content.
Platform-independent, works on various operating systems.
Browsers interpret HTML tags to display content.
Provides tags for graphics, fonts, colors, and hyperlinks.
Versions include HTML 1.0 (1990), HTML 2.0 (1995), HTML 4.0 (1998), XHTML (2000), HTML 4 (2014).
Objectives of HTML:
Create web pages for websites.
Essential markup language for web pages.
Allows adding graphical elements like videos, images, rich text.
Facilitates customization with HTML5 and newer versions.
Learn coding tools: code editor and browser developer tools.
Create hypertext links to various online resources.
Structure of HTML:
Divided into two parts: the head and the body.
Start with the declaration: ‘<!DOCTYPE html>’.
Four primary container tags: ‘<html>’, ‘<head>’, ‘<title>’, and ‘<body>’.
Tags must appear as pairs with both opening and closing tags.
Published and Hosting (Web Publishing and Web Hosting)
Web Publishing:
Process of sharing content on the internet.
Involves creating websites, updating pages, and posting blogs.
Content includes text, images, videos, and more.
Requires web development software, internet connection, and web server.
Software can be professional tools or web-based interfaces.
Internet connection is needed for uploading content to servers.
Web hosting:
Web hosting can be dedicated or shared.
Web publishing is cost-effective, as it doesn’t require physical materials.
Offers a global audience accessible through an internet connection.
Service for posting websites on the internet.
Web host provides technologies for website viewing.
Websites are stored on servers.
Users access websites by typing the domain in their browser.
Domain ownership often required for hosting.
Choose a reliable web host with good support and minimal downtime.
Pay a monthly fee based on disk space and bandwidth needs.
Estimate site size and traffic before signing up for hosting.
HTML Tags vs. Attributes
Definition of a tag: Group of characters surrounded by ‘<‘ and ‘>’.
Tag sections: Name, attributes, attribute value.
Tag name: Unique identifier.
Attributes: Tag properties, diverse attribute values.
Example: <body> tag, bgcolor attribute with value green.
Two tag types: Single tag, Pair tag.
Basic Tags of HTML
<html> tag
Marks the start and end of an HTML document.
<head> tag
Contains document title and general information (author, copyright, keywords, description).
<body > tag
Defines webpage content displayed in the browser.
Allows use of various HTML tags.
Common attributes of <body> tags are:
Color code format: “#rrggbb”.
rr for red, gg for green, bb for blue.
Values range from 00 to ff in hexadecimal
<meta> tag
‘<meta>’ tag provides metadata about the HTML document.
Includes information like character encoding, author, viewport settings, etc.
Often placed within the ‘<head>’ section of the document.
Heading Tag (H1 to H6) and Attributes (ALIGN)
Heading Tags
Six levels: ‘<h1>’ to ‘<h6>’.
Importance increases from ‘<h1>’ to ‘<h6>’.
Default display: larger and bolder font.
‘<h1>’ is most important, ‘<h6>’ is least important.
Font size decreases from ‘<h1>’ to ‘<h6>’.
Font Tag and Attributes (Sizes: 1 to 7 Levels, BASEFONT, SMALL, BIG, COLOR)
<font> Tag
Sets font properties: color, face, size.
Default font size is 3.
Default color is red.
Default font face is Times New Roman.
<basefont> Tag
Default font size is three.
Modify default size with <basefont> tag.
Use “size” attribute to specify font size.
No closing tag for <basefont>.
Paragraph Formatting (P)
<p> Tag
Marks a block of text as a paragraph.
Adds space between paragraphs in a webpage.
Break Line BR
<br> Tag and <hr> Tag
‘<br>’ tag: Empty element to break a line without space.
‘<hr>’ tag: Insert horizontal rule to visually separate content.
‘<hr>’ is a single tag.
Comment in HTML (<! >)
Comment Tag and Space Character
Start with ‘<!’ and end with ‘>’.
Can span multiple lines.
Can be placed anywhere in the document.
Contents not displayed in browsers.
Formatting Text (B, I, U, Mark, Sup, Sub, EM, BLOCKQUOTE, PREFORMATTED)
General Text Formatting
Utilize tags like bold, italic, underline, font, paragraph, heading, etc.
Basic formatting elements for text.
<br> tag creates line breaks.
<marquee> Tag and <pre>
<marquee> tag:
Creates simple text animations.
Attributes include direction, behavior, width, bgcolor, scrollamount.
<pre> tag:
Maintains formatting from text editor.
Displays HTML code as it’s written.
Special Characters
Ordered List- OL (LI, Type- 1, I, A, a; START, VALUE)
List
Uses numbers for list items.
Defined by <ol> and </ol> pair tags.
Attributes and values can be specified.
Attributes include “type” and “start”.
Unordered List – UL (Bullet Type- Disc, Circle, Square, DL, DT, DD)
Uses bullets for list items.
Supported bullet types: disc, circle, square.
Defined by ‘<ul>’ and ‘</ul>’ pair tags.
Definition List
Represents term and description pairs.
Starts and ends with ‘<dl>’ and ‘</dl>’.
Terms enclosed with ‘<dt>’.
Descriptions enclosed with ‘<dd>’.
Can also be used to create dialogues.
ADDRESS Tag
‘<address>’ tag in HTML shows contact info of a person/organization.
In ‘<body>’, it’s document contact info; in ‘<article>’, it’s article contact info.
Text inside ‘<address>’ appears in italic.
Browsers may add line breaks before and after the ‘<address>’ element.
Inserting Image:
‘<img>’ tag inserts images in web pages.
It’s a pair tag.
Browsers display limited image types: GIF, JPG, and some support PNG.
GIF and JPG are widely supported; modern browsers handle PNG.
JPG is ideal for high quality, compression, and color variety.
JPG format offers attributes and values for customization.
Inserting Object:
Objects are external files like pictures, audio, video, etc.
Mathematical notation for representing numbers consistently.
Uses symbols/digits to express quantities and values.
Used in math, computing, engineering, etc.
Types of Number System:
Non-positional Number System
Early counting used fingers, stones, or sticks.
Additive approach or non-positional system.
Symbols like I, II, III used for values.
Symbols added for total value.
Hard for arithmetic; led to positional systems.
Example: Roman Numeric
2. Positional Number System
Positional systems use digits with varying values.
Digit’s value is based on itself, position, and base.
Different systems based on base value:
Decimal
Binary
Octal
Hexadecimal
Radix of a Number System:
Radix of a number: Also called its base.
Represents the number of unique symbols in a number system.
Determines counting and positional structure.
Decimal system (base-10) has a radix of 10 (0 to 9).
Binary system (base-2) has a radix of 2 (0 and 1).
Hexadecimal system (base-16) has a radix of 16 (0-9 and A-F).
Radix influences mathematical operations and representation rules.
Why Binary number system is used in computer system?
Digital Nature: Computers operate using electronic components that have two stable states: “on” and “off,” corresponding to binary digits 1 and 0.
Simplicity: Binary representation aligns with the basic operation of electronic switches, like transistors, which can have two states.
Reliability: Binary states are distinct, making it easier to differentiate between them and accurately detect changes.
Efficiency: Binary arithmetic involves straightforward operations (addition, subtraction), which can be efficiently implemented using digital circuits.
Memory Cells: Computer memory cells store individual bits, aligning well with binary representation (0 or 1).
Compatibility: Binary representation allows seamless communication between computer components, such as processors, memory, and input/output devices.
Logical Operations: Binary logic gates (AND, OR, NOT) are essential for designing computer components and executing instructions.
Error Handling: Binary representation simplifies error detection and correction mechanisms, ensuring data integrity.
Encoding: Communication protocols use binary encoding for transmitting and storing data accurately.
Uniformity: Binary representation provides a standardized way to handle various tasks and data types consistently in computer systems.
Decimal/Binary/Octal/Hexadecimal Number System & Conversion
Decimal Number System:
Base-10 system.
Digits 0-9.
Positional: Each place represents power of 10.
Common for human calculations.
Binary Number System:
Binary system: 0 and 1.
Base-2 system, simplest due to two digits.
Binary digits called “Bits”.
4 Bits = nibble, 8 Bits = byte.
Represents devices’ ON and OFF states.
Base value of binary is 2 (subscripted as B).
Example: (1010)2 or (1010)B.
Octal Number System:
Octal system: 8 digits – 0 to 7.
Base-8 system, simpler than binary.
Easier handling compared to binary arrays.
Octal array shorter than binary.
Base value of octal is 8 (subscripted as O).
Grouping bits for binary representation.
Used in some assembly languages for instructions and addresses.
Early computing systems with word sizes divisible by three.
Hexadecimal Number System:
Hexadecimal: 10 digits (0-9) and 6 letters (A-F).
A-F represent 10-15.
Base-16 system, used in microprocessors.
Different systems represent same quantities.
Symbols change, quantities stay constant.
Compact representation of binary data.
Common for memory addresses, debugging, and low-level programming.
Representing colors in graphics (HTML/CSS).
Network addresses (IPv6) and file formats.
Number System Conversion
Decimal to Other System Conversion
Conversion from decimal to binary
Rules:
Divide the decimal number by the base value of binary (2) and list the remainder.
The process is continuing till the quotient becomes zero.
Write the remainders left to right from bottom to top.
Example:
Convert (34)10 into Binary.
Solution:
Given number: 34
Let’s convert it to binary:
∴ (34)10 = (100010)2
Fractional conversion (Decimal to Binary):
Rules:
Successively multiply the fraction by 2 (base 2) to generate binary digits.
Repeat until the fraction becomes 0 or until the desired accuracy is reached.
If the fraction becomes 0, terminate the process.
If the fraction does not become 0 after 5 iterations, terminate the process after the 5th iteration.
Example:
Convert (23.84)10 into Binary.
Solution:
Given number: 23.84
Let’s convert the non fractional part first:
∴ (23)10 = (10111)2
Now, let’s convert the fractional part:
∴ (.84)10 = (.11010)2
Finally,
(23)10 + (.84)10 = (10111)2 + (.11010)2
∴ (23.84)10 = (10111.11010)2
Converting Decimal to Octal
Rules:
Divide the decimal number by the base value of Octal (8) and list the remainder.
The process is continuing till the quotient becomes zero.
Write the remainders left to right from bottom to top.
Example:
Convert the decimal number 109 into octal.
Solution:
Given number: 109
Let’s convert it to octal:
∴ (109)10 = (155)8
Fractional conversion (Decimal to Octal):
Rules:
Successively multiply the fraction by 8 (base 8) to generate binary digits.
Repeat until the fraction becomes 0 or until the desired accuracy is reached.
If the fraction becomes 0, terminate the process.
If the fraction does not become 0 after 5 iterations, terminate the process after the 5th iteration.
Example:
Convert (23.84)10 into Octal.
Solution:
Given number: 23.84
Let’s convert the non fractional part first:
∴ (23)10 = (27)8
Now, let’s convert the fractional part:
∴ (.84)10 = (.65605)8
Finally,
(23)10 + (.84)10 = (27)8 + (.65605)8
∴ (23.84)10 = (27.65605)8
Converting Decimal to Hexadecimal
Rules:
Divide the decimal number by 16 and list the remainder.
The process is continuing till the quotient becomes zero.
Write the remainders left to right from bottom to top.
Example:
Convert the decimal number 53 into Hexadecimal number.
Solution:
Given number: 53
Let’s convert it to octal:
∴ (53)10 = (35)16
Example:
Convert decimal number 235 into Hexadecimal number.
Solution:
Given number: 235
Let’s convert it to Hexadecimal:
Here, since it is hexadecimal values, we know:
14 = E
11 = B
∴ (235)10 = (EB)16
Fractional conversion (Decimal to Hexadecimal):
Rules:
Successively multiply the fraction by 16 (base 16) to generate binary digits.
Repeat until the fraction becomes 0 or until the desired accuracy is reached.
If the fraction becomes 0, terminate the process.
If the fraction does not become 0 after 5 iterations, terminate the process after the 5th iteration.
Example:
Solution:
Given number: 31.84
Let’s convert the non fractional part first:
Here, since it is hexadecimal values, we know:
15 = F
∴ (31)10 = (1F)16
Now, let’s convert the fractional part:
Here, since it is hexadecimal values, we know:
13 = D
10 = A
∴ (.84)10 = (.D70A3)16
Finally,
(31)10 + (.84)10 = (1F)16 + (.D70A3)16
∴ (31.84)10 = (1F.D70A3)16
Other System to Decimal Conversion
Converting From Binary to Decimal
Rules:
Multiply each binary digit with its place value i.e. positive powers of two with its positional weight.
Add all the products.
Example: Convert Binary number 111111 into decimal no.
Given number: 11111
Let’s first find out positional weight for each binary digit:
Therefore ( E F . B 1 )16 = ( 2 3 9 . 6 9 1 4 0 6 )10
Binary to Octal and Hexadecimal Conversion
Conversion from Binary to Octal
Method 1:
Write the Binary number in group of 3 from right hand side.
If any digits are inadequate for such group of 3, then add zeros before the number.
Write its corresponding value of octal from the table or convert it to decimal as before.
Example: Convert Binary number 10110 into Octal.
Binary number: 10110
Grouped Binary Number: 010 110
Corresponding Octal Value: 2 6 [Taken from the table]
Or
Given number: 10110
Let’s first find out positional weight for each binary digit:
Now, let’s convert:
= ( 0 × 22 + 1 × 21 + 0 × 20)
= 0+2+0
= 2
Similarly,
= ( 1 × 22 + 1 × 21 + 0 × 20)
= 4+2+0
= 6
Concatenating above results. We get:
∴ (10110 )2= (26)8
Method -2:
First convert the Binary number into Decimal number.
Now convert the decimal number into Octal number.
Example: Convert Binary number 10110 into Octal.
Given number: 10110
Let’s first find out positional weight for each binary digit:
Now, let’s convert to decimal first:
= (1 × 2 4 + 0 × 23 + 1 × 22 + 1 × 21 + 0 × 20)
= 16 + 0 + 4 + 2 + 0
= 22
Therefore, (10110)2 = (22)10
Again, let’s convert decimal to octal:
Therefore (22)10 = (26)8
∴ (10110)2 = (26)8
Fractional conversion (Binary to Octal):
Example: Convert (0110 011.1011)2 into base 8
Binary number = (0110 011.1011)2
Group of 3 bit of Binary = (0 110 011 . 101 1)2
= (110 011 . 101 100)2
Now, let’s convert:
= ( 1 × 22 + 1 × 21 + 0 × 20)
= 4+2+0
= 6
Similarly,
= ( 0 × 22 + 1 × 21 + 1 × 20)
= 0+2+1
= 3
Similarly,
= ( 1 × 22 + 0 × 21 + 1 × 20)
= 4+0+1
= 5
Similarly,
= ( 1 × 22 + 0 × 21 + 0 × 20)
= 4+0+0
= 4
Concatenting above results. We get:
Thus, (0110 011.1011)2 = (63.54)8
∴ (0110 011.1011)2 = (63.54)8
Conversion from Binary to Hexadecimal
Method -1:
Write the binary number in a group of 4 from right to left.
If any digits are inadequate for such a group 4, then add 0 before the number as much is necessary.
Write the equivalent Hexadecimal number from the table or convert binary to decimal as before.
Example: Convert Binary number 10110 into Hexadecimal.
Binary Number: 10110
Grouped Binary Number: 0001 0110
Equivalent Hexadecimal number: 1 6 [taken from the table]
Or
Now, let’s convert:
= ( 0 x 23 + 0 × 22 + 0 × 21 + 1 × 20)
= 0+0+0+1
= 1
Similarly,
= ( 0 x 23 + 1 × 22 + 1 × 21 + 0 × 20)
= 0+4+2+0
= 6
Therefore, (10110) 2 = (16)16
Method -2:
Convert the given binary number into Decimal number
Now convert decimal number into Hexadecimal number.
Example: Convert Binary number 10110 into Hexadecimal.
Let’s first find out positional weight for each binary digit:
Now, let’s convert to decimal first:
= (1 × 2 4 + 0 × 23 + 1 × 22 + 1 × 21 + 0 × 20)
= 16 + 0 + 4 + 2 + 0
= 22
Therefore, (10110)2 = (22)10
Again, let’s convert decimal to octal:
Therefore (22)10 = (16)16
∴ (10110)2 = (16)16
Fractional conversion (Binary to Hexadecimal):
Method -1:
Write the binary number in a group of 4 from right to left.
If any digits are inadequate for such a group 4, then add 0 before the number as much is necessary.
Write the equivalent Hexadecimal number from the table or convert binary to decimal as before.
Example: Convert (11110.01011)2 into Base 16
Binary Number: 11110.01011
Grouped Binary Number: 0001 1110 01011000
Equivalent Hexadecimal number: 1 14/E58 [taken from the table]
∴ (11110..01011)2 =(1E.58)16
OR,
Binary number = (11110..01011)2
Group of 4 bit of Binary = (0001 1110 . 0101 1000)2
Now, let’s convert:
= (0 × 23 + 0 × 22 + 0 × 21 + 1× 20)
= 0 + 0 + 0 + 1
= 1
Similarly,
= (1 × 23 + 1 × 22 + 1 × 21 + 0 × 20)
= 8 + 4 + 2 + 0
= 14
= E
Similarly,
= (0 × 23 + 1 × 22 + 0 × 21 + 1 × 20)
= 0 + 4 + 0 + 1
= 5
Similarly,
= (1 × 23 + 0 × 22 + 0 × 21 + 0 × 20)
= 8 + 0 + 0 + 0
= 8
Concatenating above results. We get:
∴ (11110.01011)2 = (1E.58)16
Octal and Hexadecimal System to Binary Conversion
Conversion from Octal to Binary
Method – 1
Write the equivalent 3 bits of binary number of octal from the table.
Example: Convert octal number 35 into Binary number.
Octal Number: 3 5
Equivalent Binary number: 011 101 [taken from the table]
Therefore, (35)8 = (011101)2
Method -2:
First convert octal number into Decimal number.
Now convert Decimal number into Binary number.
Example: Convert octal number 35 into Binary number.
Octal number: 3 5
Positional weight: 10
Conversion: = (3 × 81 + 5 × 80)
= 24+5
Therefore, (35)8 = (29)10
Thus, (35)8 = (11101)2
Conversion from Hexadecimal to Binary
Method – 1
Convert the Binary number in the group of 4 bits for each hexadecimal number.
Provide base 2 to the result.
Example: Convert Hexadecimal number A2C into Binary.
Hexadecimal Number: A 2 C
Equivalent Binary Number 1010 0010 1100
Therefore, (A2C)16 = (1010 0010 1100)2
Method – 2
First convert the Hexadecimal number into decimal.
Then convert the decimal number into a Binary number.
Hexadecimal Number: A 2 C
Positional weight: 2 1 0
Conversion: = (10 × 162 + 2 × 161 + 12 × 160)
(A=10, C=12 taken from the table)
= (10 × 256 + 2 × 16 + 12 × 1)
= (2560+32+12) = 2604
Therefore, (A2C)16 = (2604)10
Fractional conversion (Hexadecimal to Binary):
Octal to Hexadecimal Conversion and Vice Versa
Conversion from Octal to Hexadecimal
Method-1:
Convert each octal digit into 3 bit of binary equivalent.
Now, form the group of 4 digits of binary numbers from right hand side.
Write the equivalent Hexadecimal value from the given table.
Example: Convert octal number 420 into Hexadecimal number.
Octal Number: 4 2 0
3 Bit of Binary equivalent: 100 010 000
Group of 4 bit of Binary digits 0001 0001 0000
Equivalent Hexadecimal number: 1 1 0
Thus, (420)8 = (110)16
Method -2:
First convert octal number into Decimal number.
Now convert Decimal number into Hexadecimal number.
Conversion from Hexadecimal to Octal
Method -1
Convert each hexadecimal number into 4 bit of binary equivalent.
Then form the group of 3 bits of binary digits from right hand side.
If any digits are inadequate for such group of 3, then add zero before the number.
Now, write the equivalent octal value for each group from the table.
Example: Convert Hexadecimal number 183 into Octal.
Hexadecimal number: 1 8 3
4 bits of Binary equivalent 0001 1000 0011
3 bits of Binary grouping 000 110 000 011
Equivalent octal number 0 6 0 3
Hence, (183)16 = (603)8
Method – 2
First convert Hexadecimal number into decimal number
Then convert decimal number into octal number.
Hexadecimal number: 1 8 3
Positional weight: 2 1 0
Conversion: = (1 × 162 + 8 × 161 + 3 × 160)
= (256+128+3)
= 387
Thus, (183)16 = (387)10
Fractional conversion (Hexadecimal to Octal):
Binary Calculations
Uses 0 and 1 digits.
Arithmetic operations yield results in 0s and 1s.
Binary Addition
Binary Subtraction
Note: Borrowing is necessary when we have to subtract a larger number from a smaller one. A borrow will cause a 1 in the minuend to become 0 and a 0 to become 1. In the second case the preceding 0s in the minuend are changed to 1s until a 1 can be changed to a 0.
Binary Multiplication
Binary Division
Binary division guidelines:
Subtract divisor from dividend.
If subtracting is possible, quotient digit is 1 and subtract.
If not possible, quotient digit is 0.
Bring down next dividend digits to continue.
Repeat until divisor is smaller than dividend.
One’s and Two’s Complement Method for Binary Subtraction
1’s complement method for binary subtraction
Methods for binary subtracting by using 1’s complement.
Make equal no. of bits by placing 0 in front of negative number to make equal with the first number.
Convert 1’s complement of the second number i.e. 1 to 0 and 0 to 1
Add it to the main value.
If an overflow bit occurs, remove it and add it to the remaining number.
If there is not extra bit, find 1’s complement of result in step 2 and add (-ve) sign.
Example: Subtract 11 from 100 by using 1’s complement.
2’s complement method for binary subtraction
Methods for binary subtracting by using 2’s complement
Make equal no. of bits by placing 0 in front of negative number to make equal with first number.
Convert 1’s complement of the second number i.e. 1 to 0 and 0 to 1 and adding 1 to inverted value.
Add it to the main value.
If overflow bit occurs, remove it and the remaining is answer.
If there is no extra bit, find 2’s complement of result in step 2 and add (-ve) sign.
Example: Subtract 11 from 100 by using 1’s complement.
Logic Function & Boolean Algebra
George Boole: Born 1815, Lincoln, England; Died 1864, Cork, Ireland.
Book “The Laws of Thought” (1854) explained human reasoning.
Boolean algebra for logical relationships and binary variables.
Used in logical circuit design and analysis.
Rules for symbolic manipulation by Boole.
True/false outcomes, used in digital logic.
AND, OR, NOT gate operations fundamental.
Unique feature of Boolean Algebra:
Boolean algebra: 0 and 1 values.
No subtraction, division; only logical addition, multiplication.
Unique laws: A + A = A, A . A = A.
Distributive law: A + (B.C) = (A+B).(A+C).
Graphical methods specific to Boolean algebra.
Introduction to Boolean Values, Truth Table, Boolean Expression and Boolean Function
Truth Table
Truth table shows input-output relationships.
Represents input combinations in binary.
Uses Boolean operations.
Example: A, B input; C output.
Shows all possible combinations.
Boolean Expression or Functions
Boolean expression: Represents logic using symbols.
Consists of variables, operations (AND, OR, NOT).
Describes the logic relationship between variables.
Translated into truth tables or simplified.
Used in digital logic design.
Some Example are:
F 1= AB + B’
F2 = AB’C
The function F = 1 when the value of A = 0, B = 0 and C = 1, otherwise F = 0. The Boolean functions can also be represented in a truth table. To represent a Boolean function in a truth table, we need a list of the possible combinations of binary 0 and 1, the combination is formed by 2n where n is the number of binary variables. Above function is illustrated in the following truth table.
The Boolean functions may be represented from an algebraic expression into a logic diagram, which is composed of different logic gates: AND, OR, NOT, etc. The above Boolean function is represented with logic diagram as:
Basic Logical/Boolean Operation
Three basic Boolean operations: OR, AND, NOT.
Operate on binary values 0 and 1.
Binary variables hold 0 or 1.
Essential operations in Boolean algebra.
AND Operation
Denoted by . or AND.
Binary operation, works on 2 or more variables.
Input: Binary variables X and Y.
Output: Binary variable Z.
Logical equation: z = x . y.
Above table illustrates that the output is 1 (TRUE) if all of the given input is 1 (TRUE), otherwise it provides 0 (FALSE) result.
OR Operation
Denoted by + or OR.
Binary operation, works on 2 or more variables.
Input: Binary variables X and Y.
Output: Binary variable Z.
Logical equation: z = x + y.
Above table illustrates that the output is 1 (TRUE) if one of the given input is 1 (TRUE), it provides a 0 (FALSE) result if all the given inputs are 0 (FALSE).
NOT operation
The NOT operation is denoted by bar ( ), prime (‘) or tilde (~). The logical equation of NOT operation is shown as:
Logic Gate
Core of digital systems.
Electronic circuits with inputs and one output.
Represented by graphical symbols.
Interpret logical values, produce logical outputs.
Essential components in digital design.
Include basic gates with distinct functions.
AND Gate
Multiple inputs, one output.
Performs AND operation (logical multiplication).
TRUE output if all inputs are TRUE.
FALSE output if any input is FALSE.
Boolean expression: F = A . B.
The symbol used for the AND gate, truth table and the Venn-diagram is shown in the following figure.
OR Gate
Multiple inputs, one output.
Performs OR operation (logical addition).
TRUE output if any input is TRUE.
FALSE output if all inputs are FALSE.
Boolean expression: F = A + B.
The symbol used for the OR gate, truth table and the Venn-diagram is shown in the following figure.
NOT Gate
One input, one output (unary gate).
Performs NOT operation (logical complement).
TRUE output if input is FALSE, and vice versa.
Boolean expression: F = A’.
The symbol used for the NOT gate, truth table and the Venn-diagram is shown in the following figure.
NAND Gate
Complement of AND gate.
Multiple inputs, one output.
Output is complement of AND operation.
Boolean expression: F = (A . B)’.
The symbol used for the NAND gate, truth table and the Venn-diagram is shown in following figure.
NOR Gate
Complement of OR gate.
Produces TRUE if all inputs are TRUE.
Produces FALSE if any input is TRUE.
Boolean expression: F = (A + B)’.
The symbol used for the NOR gate, truth table and the Venn-diagram is shown in the following figure.
X-OR Gate
XOR gate: Two inputs, one output.
TRUE output when inputs are different.
FALSE output when inputs are the same.
Boolean expressions: F = A’B + AB’ or F = A ⊕ B.
The symbol used for the AND gate, truth table and the Venn-diagram is shown in the following figure.
X-NOR Gate
XNOR gate: Complement of XOR gate.
TRUE output when inputs are both 0 or both 1.
FALSE output when inputs are different.
Algebraic expressions: F = AB + A’B’ or F = A ⊙ B.
The symbol used for the AND gate, truth table and the Venn-diagram is shown in the following figure.
Universal Gate
NAND gate as Universal gate:
NAND and OR gates: Universal gates.
NAND gates can replace other gates.
NAND gates can realise AND, OR, NOT operations.
NAND gate is versatile and widely used.
demonstrated in the following diagram.
NOR gate as universal gate:
NOR gate: Another universal gate.
Can implement AND, OR, NOT functions.
NOR gates replace other gates.
NOR gate is versatile and universal.
The figure below shows how the NOR gate can be used as NOT gate
All NOR input pins connected to the input signal A give an output A’.
The figure below shows how the NOR gate can be used as OR gate.
An OR gate can be replaced by NOR gates as shown in the figure. The OR is replaced by a NOR gate with its output complemented by a NOR gate inverter.
The figure below show how the NOR gate can be used as AND gate.
An AND gate can be replaced by NOR gates as shown in the figure. The AND gate is replaced by a NOR gate with all its inputs complemented by NOR gate inverters.
Laws of Boolean Algebra
Duality Principle
Replacing AND(.) with OR(+) and vice versa.
1 with 0, vice versa keeps variable and complements and variable unchanged.
For example:
Let us consider a Boolean expression
F = A + B . 0
Then it’s duality would be
FD = A . B + 1
And both expressions will be the same. It would be verified by the following truth table.
Boolean Postulates
Rules no needs to verify.
Laws of Boolean Algebra
Identify Laws
A + 0 = A A . 1 = A
2. Complement Laws
A + A’ = 1 A . A’ = 0
3. Idempotent Laws
A + A = A A. A = A
4. Bounded Laws
A + 1 = 1 A . 0 = 0
5. Absorption Laws
A + (A . B) = A A. (A + B) = A
6. Commutative Laws
A + B = B + A A . B = B . A
7. Associative Laws
(A + B) + C = A + (B + C)(A B) C = A (B C)
8. Distributive Laws
A (B + C) = A B + A C A + (B C) = (A + B) (A + C)
9. Involution Laws
(A’)’= A
10. De Morgan’s Laws
(A + B)’ = A’.B’(A.B)’ =A’+B’
Statement and Verification of Laws of Boolean Algebra using Truth Table
Identity Law
These laws state that combining a Boolean variable with its complement (negation) results in the original variable.
(a) A + 0 = A
(b) A . 1 = A
Complement Law
This law states that the sum of a Boolean variable and its complement is always equal to 1.
(a) A + A’ = 1
(b) A . A’ = 0
Commutative Law
These laws state that the order of variables in an operation doesn’t affect the result.
(a) A + B = B + A
(b) A . B = B . A
Associative Law
These laws state that the grouping of variables in an operation doesn’t affect the result.
(a) A + (B + C)=(A + B) + C
The above table shows that (A + B) + C = A + (B + C) is equal for all possible combinations of inputs.
(b) A.(B.C)=(A.B).C
Distributive Law
These laws relate the operations of addition and multiplication.
(a) A (B + C) = A B + A C
The above table shows that A . ( B + C) = (A . B) + (A . C) is equal for all possible combinations of inputs.
(b) A + (B C) = (A + B) (A + C)
DeMoragan’s Theorem
Complement of OR is equivalent to AND of complements: ¬(A OR B) = ¬A AND ¬B
Complement of AND is equivalent to OR of complements: ¬(A AND B) = ¬A OR ¬B
Useful for Boolean expression simplification. Applies to binary variables.
Theorem 1
The above table shows that (A+B)’ = A’.B’ is equal for all possible combinations of inputs. Let us see: when the value of A = 0 and B = 0, the value of (A+B)’ = 1 and A’.B’ = 1. Similarly we can see all the combinations of A and B, all the time (A+B)’ = A’.B’ are equal.
Theorem 2
The above table shows that (A.B)’ = A’+B’ is equal for all possible combination of inputs. Let us see: when the value of A = 0 and B = 0, the value of (A.B)’ = 1 and A’.B’ = 1. Similarly we can see all the combinations of A and B, all the time (A.B)’ = A’+B’ are equal.
Simplification of Boolean Expression
Apply algebraic rules.
Combine terms and eliminate redundancies.
Complex Boolean expressions can be simplified using Boolean algebra.
Difference laws of Boolean algebra are applied for simplification.
Simplification aids logic circuit design.
Reduces complexity and cost of circuits.
Introduction to Computer
Definition of Computer:
Computer – Common Operating Machine Particularly Used for Trade, Education and Research.
‘Computer’ comes from the Latin word “computare” which means to calculate.
An electronic device that can perform a variety of tasks in accordance with a set of instructions called a program.
Accepts data from an input device, processes it into useful information and displays the output.
Characteristics of Computer:
Speed: Computer can work very fast. It can process millions of pieces of information in seconds.
Storage: Computers can store a large amount of data (text, graphic, pictures, audio, video, etc.) temporarily or permanently, as required in various storage devices such as hard disk, pen drive etc.
Accuracy: Computers can process data without any errors. But if there are faults in data, instruction or program, it will result in wrong output. It is known as Garbage in Garbage out (GIGO).
Versatility: Computers can perform various tasks such as surfing the internet, playing games, playing songs, watching movies, working on documents, printing, sending email, mathematical calculation, programming etc.
Diligence: Computers do not have feelings or emotion, taste, knowledge and experience. Thus, it never feels tired or boring to do a task repeatedly for a long time.
Automation: Computers can be programmed to perform complex tasks automatically. For example: Email Scheduling, Automated reply on social media etc.
Non-intelligent: Computer is just a dumb machine and cannot take its own decisions. Human’s have to provide some instructions to perform so that computers can perform any task.
Word Length: It is the number of bits CPU can process in parallel at a time for example 8, 16, 32, 64, 128. Higher the word length, the better the performance of the computer.
Advantages and Disadvantages of Computer
Advantages:
Accurate and reliable machine.
Much faster than humans.
High storage capacity.
Never feels tired and exhausted like a human being.
Versatile device
Error free result
Disadvantages:
Expensive device
Required skilled manpower to operate
Discourage physical activities / affect human health
Rise of computer crimes like hacking, virus, pornography etc.
Need repair, update and maintenance frequently.
Depend on electricity to work.
Application of Computers
Bank:
Online accounting facility like checking current balances, deposits etc.
ATM machines – interconnected computer system
Internet banking for accessing accounts, transferring money, and paying bills.
Engineering:
Work with CAM/CAD software packages like AutoCAD, CATIA, Etabs etc..
Designing and developing machine drawings, building drawings, circuit drawings, 3D views etc.
Medicine:
Diagnosing illness and monitoring patient’s status
Look inside a person’s body and study in detail with the help of automated imaging techniques like UltraSound, CT scans, MRI scans etc.
Storage of patients data in an efficient manner.
Education:
Used as information resource, teaching aid, library system, result system, students record etc.
Remote learning, audio-visual packages, interactive exercises etc.
Online registration, mock exams, entrance exam and interviews
Interactive learning and taking virtual field trips with the help of AR/VR
Ticketing:
Book tickets for flight, bus, movies
Online hotel reservations
Defense:
Information of defense system,
Secured database and record
Tracking, surveillance and controlling the flight, targeting ballistic missiles
Control the access to atomic bombs
Business:
Online buying and selling of goods and services
Collaborating with business partners and suppliers, conducting electronic transactions
File management, calculating the bills, office communication, administrative work, decision making etc.
Multimedia:
Working with graphics and images. Ex: Photoshop
Audio or video composition, editing. Ex: Adobe Premiere Pro, Da Vinci Resolve
Making special effects like VFX in science fiction movies.
Desktop publishing:
Create page layouts for magazines, newspapers, books etc. Ex: Adobe Illustrator, InDesign etc.
Communication:
Real time communication(chatting, video call) over the internet. Ex. Zoom call
Connects with people around the world with the help of emails, social media etc. For example Gmail, Facebook, Instagram, WhatsApp etc.
Government:
Data processing and maintenance of database of citizens record
Create paperless environment
Aid in country’s defense organizations like missile development, satellite, rocket launches etc.
Planning and Scheduling:
Store contact information, generate plans, schedule appointments and deadlines etc.
For example: Project management with Jira, Gmail Scheduling etc.
History of Computer
Mechanical Calculating Era:
a) Abacus
Abacus: earliest calculating device, still in use today.
Originated in China 3000 years ago.
“ABACUS” derived from Roman words “ABAC” and “ABAX” (dust and sand).
Wooden frame, beads on parallel bars for counting.
Experienced users perform fast calculations, rivaling electronic calculators.
b) Napier’s Bone
1617AD: John Napier invented rods for simple multiplication.
‘Bones’: rods with carved numbers for easy multiplication.
Napier is better known for inventing logarithms.
c) Slide Rule
1620 AD: William Oughtred invented the Slide Rule, combining logarithm and Napier’s bones.
Slide Rule used logarithmic scales for rapid multiplication, division, and other calculations.
Engineers and mathematicians extensively used slide rules until electronic calculators replaced them.
d) Pascaline
Around 1642 AD: Blaise Pascal invented a simple mechanical calculator.
Pascal’s calculator used gears and wheels to register numbers.
It could add and subtract easily but couldn’t multiply or divide.
Recognized as the first mechanical calculating device.
e) Stepped Reckoner
Stepped Reckoner: Mechanical calculator invented by Gottfried Wilhelm Leibniz in 1671AD.
Modified the Pascaline and made his own.
Used until replaced by electronic calculators in the 1960’s.
f) Babbage ‘s Engine (Difference Engine and Analytical Engine)
1822AD: Charles Babbage developed the Difference Engine for algebraic equations.
1833 AD: Designed Analytical Machine, inspired by Jacquard’s punched cards.
Prototype of the modern computer with input, storage, output, and program control.
Babbage’s ideas ahead of his time, technology limitations prevented completion.
Babbage is known as the Father of Modern Computers.
g) Lady Augusta Ada
Ada Lovelace: Mathematician, Lord Byron’s daughter.
Assisted Babbage, advocated a binary system.
First computer programmer.
“Ada” programming language named after her by U.S. Defense.
Recognized for significant computer science contributions.
h) George Boole
19th Century (1950s): English mathematician, symbolic logic.
Discovered Boolean Algebra in mathematics.
Pioneered modern electronic computers with 0 and 1 representation.
Introduced “on” and “off” states for communication.
i) Tabulating Machine
1886: Hollerith’s Tabulating Machine inspired by Jacquard.
Used punch cards for faster census calculation.
Founded Tabulating Machine Company (TMC).
1923: TMC merged, formed IBM.
IBM: Top computer manufacturer today.
2) Electro-Mechanical Era:
a) Mark I
Also known as IBMASCC (IBM Automatic Sequence Control Calculator).
Speakers are soft output devices for computer systems.
They receive audio input from the computer’s sound card.
Produce audio output in the form of sound waves.
Most computer speakers are active, with an internal amplifier.
Can increase the volume or amplitude of the sound.
Typically come in pairs for stereo sound from two separate audio channels.
Hardware Interfaces
Hardware interface architecture is used to connect two devices together.
It includes the design of plugs and sockets, wires, and electrical signals.
Connectors and ports in a computer establish communication between the CPU and storage devices.
Serial Port:
Serial ports (COM ports) support sequential data transmission and are bi-directional.
Bi-directional communication allows devices to both receive and transmit data.
Serial ports serialize data, transmitting 8 bits one at a time.
Advantages include lower cable costs and smaller cables.
Disadvantages include slower data transmission compared to parallel ports.
Used to connect external modems, scanners, and older computer mice.
Comes in two versions: 9-pin and 25-pin. 9-pin is the current standard.
Data travels at 115 Kb per second.
Parallel Port:
Parallel ports (LPT ports) were developed to connect printers to PCs.
Data is sent 8 bits (1 byte) at a time and transmitted in parallel, all at once.
Standard parallel port can send 50 to 100 kilobytes of data per second.
Originally, parallel ports were unidirectional, sending data in one direction for each pin.
Bi-directional parallel ports (SPP) were introduced with the PS/2 in 1987.
Bi-directional communication allows devices to both receive and transmit data.
USB Port:
USB stands for “Universal Serial Bus.”
It is the most common type of computer port used in today’s computers.
USB can connect various peripherals, including keyboards, mice, printers, cameras, etc.
USB allows the connection of up to 127 peripherals using USB hubs.
USB is faster than older ports like serial and parallel, with USB 1.1 supporting up to 12Mb/sec and USB 2.0 supporting up to 480 Mbps.
It was introduced in 1997 but gained popularity with the introduction of the Apple iMac in late 1998.
USB is a widely-used cross-platform interface for both Macs and PCs.
HDMI:
HDMI stands for “High Definition Multimedia Interface.”
It is a digital interface used to connect High Definition and Ultra High Definition devices like HDTVs, monitors, gaming consoles, cameras, and Blu-Ray players.
HDMI carries audio signals (compressed/uncompressed) and video signals.
It has 19 pins, and HDMI 2.0 is the latest version, supporting digital video signals.
Slots:
Expansion slots are found on the motherboard and hold expansion cards to enhance a computer’s functionality, like video, network, or sound cards.
The expansion cards are directly connected to the motherboard through the expansion slots, providing direct access to the hardware.
It’s essential to check the available expansion slots in a computer before buying an expansion card.
Older systems may require a riser board for additional expansion cards, but modern computers often have integrated features on the motherboard, reducing the need for extra expansion cards.