Académique Documents
Professionnel Documents
Culture Documents
Om Trivedi
CA Intermediate – Group II (New Course)
• Collection of raw facts • Data that have been BP is a sequence of co- A group of mutually
and figures. processed so that ordinated activities to related, cooperating
• Consists of numbers, they are transforms input into elements working
words, or images, meaningful. output which creates towards reaching a
particularly as • Organized data that some value to the common goal by taking
measurements or has been arranged customer as well as the inputs and producing
observations of a set of for better organization. outputs in organized
variables. comprehension, transformation processes.
understanding
and/or retrieval.
Information System: It refers to a system that collects, stores, analyses, processes and distributes information
in the enterprise for decision-making, co-ordination and control. It can be manual as well as computer-based
information system (CIS).
Information Technology: It refers to the applications of Computer systems – Hardware and Software,
Telecommunications and Networks, DBMS and Other Information Processing Technologies to collect, store,
transmit and manipulate data for processing of information in the enterprise.
• Data is raw facts and figures. • Information is facts or figures ready for
communication or use.
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
HARDWARE
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
PROCESSING DEVICES
Memory Unit
Internal External
RAM ROM CMOS
Memory Memory
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
• Cache is a smaller, faster memory, which stores copies of the data from the most frequently used main
memory locations so that Processor/Registers can access it more rapidly than main memory.
PRIMARY MEMORY
1. Read Only Memory (ROM):
• It is only readable memory.
• The data written on it cannot be modified.
• The instructions required during booting of a system are retrieved from ROM.
2. Random Access Memory (RAM):
• RAM is temporary and is erased when computer is switched off.
• RAM is read/write type of memory, and thus, can be written by user.
3. Complementary Metal Oxide Semiconductor Memory (CMOS):
• CMOS is used to store the system configuration, date, time and another important data.
• When computer is switched on, BIOS (Basic Input/Output System) matches the information of
CMOS with the peripheral devices and displays error in case of mismatching.
SECONDARY MEMORY
Because the storage capacity of primary memory is limited so additional memory called auxiliary memory is
used in computer systems.
Bubble Memory Flash Memory
• Made of thin crystal film - synthetic garnet. • Latest technology in semi-conductor memories.
• This crystal film contains large number of • Made of a small board. (PCB – Printed Circuit
magnetic domains (bubbles). Board).
• The presence or absence of bubbles indicates • A very high speed memory.
whether bit is on or off. • Portable memory for carrying data and
• Non-volatile Memory programmes.
• Credit or Debit card use bubble memory.
Virtual Memory
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
SOFTWARE
System Software Application Software
A computer software designed to operate the Application software has been created to perform a
computer hardware and to provide and maintain a specific task for a user.
platform for running any application software.
Functions of OS Key: (PUsH MTNL File) Types of Application Software Key: (Content and
Media for AIEEE)
1. Performing hardware functions 1. Content Access Software
2. User Interfaces 2. Media Development Software
3. Hardware Independence 3. Application Suite
4. Memory Management 4. Information Worker Software
5. Task Management 5. Enterprise Software
6. Networking Capability 6. Enterprise Infrastructure
7. Logical access security 7. Educational Software
8. File management
Advantages and Disadvantages of Application Software Key: (User needs virus updated
to avoid cost and Malware)
Advantages Disadvantages
1. Addressing User needs 1. Development is costly
1. Less threat from virus 2. Infection from Malware
2. Regular updates
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
processing that enable and load it into the data to reveal hidden patterns subjects, surrounded by
enhanced insight, warehouse for storage and trends in historical our organization, or
decision-making, and and analysis. business activity. perhaps even outside.
process automation.
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
Key: (R2BC)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
Switch:
• Also called switching hub, bridging hub, officially
MAC bridge.
• The switch connects to the rest of the network.
• Number of ports on a Switch: 8 or 16.
• Switches can be connected to each other to build
larger networks.
Repeater:
• Repeater is a communications processor that boosts
or amplifies the signal before passing it to the next
section of cable in a network.
• It is needed when the total length of a single span of
network cable is larger than the maximum allowed
for your cable type.
Bridge:
• A bridge as a kind of smart repeater.
• Bridge is a communication processor that connects
number of Local Area Networks (LAN).
• Used to partition one large network into two
smaller networks for performance reasons.
• It magnifies the data transmission signal while
passing data from one LAN to another.
NIC:
• A network interface card or controller, also known
as network adapter, LAN adapter or
physical network interface is a computer hardware
component that connects a computer to a
computer network.
• NICs implement a networking standard called
Ethernet (In-built with the motherboard).
Modem:
• Modulator-demodulator
• Computers use modems to talk to each other
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
Router:
• Router is a communications processor
• It interconnects networks based on different rules
or protocols.
• So that a telecommunications message can be
routed to its destination.
Packet:
• A packet is a message that is sent over the network from one node to another node.
• Includes the address of the node that sends the packet, the address of the node the packet is being sent to,
and the data.
Node:
• A node is a device that is connected to the network.
MAC Address:
• MAC Address is assigned by the manufacturer of a Network Interface Controller (NIC) and are stored in
its hardware, such as the card’s read-only memory or some other firmware mechanism.
• If assigned by the manufacturer, a MAC address usually encodes the manufacturer’s registered
identification number.
NETWORK TOPOLOGY
The arrangement in which the computers and other network components are connected to each other.
Bus Topology Ring Topology
• The nodes are strung together in a line. • Packets are sent around the circle from
• Commonly used for LANs. computer to computer.
• Every node on the network can see every packet that • Each computer looks at each packet to decide
is sent on the cable. whether the packet was intended for it.
• Each node looks at each packet to determine whether • If not, the packet is passed on to the next
the packet is intended for it. computer in the ring.
• If so, the node claims the packet.
• If not, the node ignores the packet.
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi
CA Intermediate – Group II (New Course)
Packet Switching:
• Data is communicated in the form of packets between
sender and receiver.
• Provides efficient utilization of communication channel.
• Users’ data packets can be transmitted simultaneously.
• Internet communication is based on packets switching techniques.
Voice Over Internet Protocol (VOIP):
A protocol called VoIP enables sounds to be converted to a digital format for transmission over the Internet
and then recreated at the other end.
Voice communication over the Internet is now available to everyone with a browser access (think Skype,
Google Hangouts, and WhatsApp calls).
IP Address:
Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smartphone, or
anything else, is assigned a unique identifying number called an IP (Internet Protocol) address.
Let’s say the domain wikipedia.org has the IP address of 107.23.196.166.
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, omtrivedi@ymail.com)