Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Wednesday, October 3, 2012

Computer Fundamentals and Cyberlaw for Upcoming PSC Exams : ASSISTANT/AUDITOR IN GOVT.SECRETARIAT,KPSC,LFAD etc.

Video CD for Secretariat Assistant Examination 2013








kerala psc cyber law related questions and answers.
Information Technology and Cyber Laws : Fundamentals of Computers- Internet Etc Cyber Laws


Computer Fundamentals

Hardware and Software 

A computer system is made up from hardware and software. ie , tangible.
Hardware is the physical medium, for example:
  • circuit boards
  • processors
  • keyboard
  • mourse
Software is a collection of  computer program. ie, intangible for example:
  • an operating system ( Windows , Linux , Unix etc )
  • an editor
  • a compiler
  • ms word 

Computer System Units ( Input , Output and CPU )







Functions of CPU ( ALU and CU )

CPU stands for central processing unit , sometimes it is called the brain of a computer.Two typical components of a CPU are the following:


  • The arithmetic logic unit (ALU), which performs arithmetic and logical operations.
  • The control unit (CU), which extracts instructions from memory and decodes and executes them, calling on the ALU when necessary.
clock speed
The speed at which a microprocessor executes instructions. Clock speeds are expressed in megahertz (MHz) or gigahertz ((GHz).




Input Output Devices



Input

Keyboard
Mouse
Touch Screen
Scanner
Camera
Microphone
Light pen
optical mark reader
Bar code reader
Optical Character Reader
Magnetic Ink Character Reader
QR Reader 


Output

Printer
Monitor
Speakers
Projector
Plotter 


Input As Well As Output

Hard Disk
Floppy Disk
CD
DVD





How Computer Works ? ( POST , BIOS , Booting )ecretariatassistant.com.




Types of Booting ( Cold , Warm , Remote and iBoot )
Role of Memory and its Classification
Memory ( Primary and Secondary , Volatile and Non Volatile )
Various type of Memory and Storage Devices ( RAM , ROM , HDD , FDD , ODD etc)
Need of Formatting
Operating System and its Role .
Basics of Windows , DOS , Linux and Unix



Famous personalities in the history of Computers ( Charles Babbage , John Vohn Neumann , Blaise Pascal , Ada Lovelace , Alan Turing , James Gosling , John Mcarthy )



Charles Babbage 
(26 December 1791 – 18 October 1871) was an English mathematician, philosopher, inventor and mechanical engineer who originated the concept of a programmable computer.Considered a "father of the computer", Babbage is credited with inventing the first mechanical computer. His inventions include Difference Engine and Analytical Engine.

Tim Berners-Lee 
(born 8 June 1955),also known as "TimBL", is a British computer scientist and the inventor of the World Wide Web. He made a proposal for an information management system in March 1989,and on 25 December 1990, with the help of Robert Cailliau and a young student at CERN, he implemented the first successful communication between a Hypertext Transfer Protocol(HTTP) client and server via the Internet.

Ada Lovelace
(10 December 1815 – 27 November 1852), born Augusta Ada Byron and now commonly known as Ada Lovelace, was an English mathematician and writer chiefly known for her work on Charles Babbage's early mechanical general-purpose computer, the analytical engine. Her notes on the engine include what is recognised as the first algorithm intended to be processed by a machine; she sometimes considered the world's first computer programmer.

John Vohn Neumann

December 28, 1903 – February 8, 1957) was a Hungarian-American mathematician and polymath who made major contributions to a vast number of fields. He formulated stored program concept , the working principle of modern computers. Von Neumann's design for a self-reproducing computer program is considered the world's first computer virus, and he is considered to be the theoretical father of computer virology.

Alan Turing

23 June 1912 – 7 June 1954), was a British mathematician, logician, cryptanalyst, and computer scientist. He was highly influential in the development of computer science, giving a formalisation of the concepts of "algorithm" and "computation" with the Turing machine, which can be considered a model of a general purpose computer. Alan Turing was considered as the Father of Computer Science.


Dennis Ritchie 
(born September 9, 1941; October 12, 2011) was an American computer scientist who "helped shape the digital era.". He created the C programming language and, with long-time colleague Ken Thompson, the Unix  .


Vint Cerf
(born June 23, 1943) is an American computer scientist, who is recognized as one of "the fathers of the Internet",sharing this title with American computer scientist Bob Kahn.


John Mcarthy
(September 4, 1927 – October 24, 2011) was an American computer scientist and cognitive scientist. He invented the term "artificial intelligence" (AI), developed the Lisp programming language family, significantly influenced the design of the ALGOL programming language. He was considered as the father of Artificial Intelligence.


James Gosling
(born May 19, 1955 near Calgary, Alberta, Canada) is acomputer scientist, best known as the father of the Java programming language.

Douglas Engelbart(born January 30, 1925) is an American inventor, and an early computer and internet pioneer. He is best known for his work on the challenges of human–computer interaction, particularly while at his Augmentation Research Center Lab in SRI International, resulting in the invention of the computer mouse.




Artificial Intelligence , Expert Systems, Mechatronics and Nano Technology


Internet 

History about Internet  ( ARPANET , WWW , GOPHER , Tim Berners Li )

Father of Internet : Vinton Gray "Vint" Cerf




ARPANET : The Advanced Research Projects Agency Network (ARPANET) was the world's first operational packet switching network and the progenitor of what was to become the global Internet.

WWW ( World Wide Web )
Sir Timothy John "Tim" Berners-Lee, (born 8 June 1955),also known as "TimBL", is a British computer scientist and the inventor of the World Wide Web.

GOPHER 
The Gopher protocol is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet.

Browsers , The softwares used for viewing websites. ( Internet Explorer , Google Chrome , Mozilla Firefox , Safari etc )

Browsing & Navigation
Website & Webportals
Search Engines , Online Encyclopedia ( About Google , Yahoo, Bing , wikipedia )
E-Commerce ( Web cart , Non-Repudiation , EFT )




Cyber law and Web security

Definition of Cyber law , Cyber Crime , Cyber Lawyer etc

Cyber Crime
Cyber crime is unlawful acts wherein the computer is either a tool or a target or both.

We can categorize Cyber crimes in two ways
The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.

The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.


Indian IT Act 2000 ( amendments in 2006 and 2008 )


In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000.

This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.

The Information Technology Act, 2000 also aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means. The Act states that unless otherwise agreed, an acceptance of contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability. Some highlights of the Act are listed below:

Chapter-II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. It further states that any person can verify an electronic record by use of a public key of the subscriber.

Chapter-III of the Act details about Electronic Governance and provides inter alia amongst others that where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is -
rendered or made available in an electronic form; and accessible so as to be usable for a subsequent reference.

The said chapter also details the legal recognition of Digital Signatures.

Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities. The Act envisages a Controller of Certifying Authorities who shall perform the function of exercising supervision over the activities of the Certifying Authorities as also laying down standards and conditions governing the Certifying Authorities as also specifying the various forms and content of Digital Signature Certificates. The Act recognizes the need for recognizing foreign Certifying Authorities and it further details the various provisions for the issue of license to issue Digital Signature Certificates.

Chapter-VII of the Act details about the scheme of things relating to Digital Signature Certificates. The duties of subscribers are also enshrined in the said Act.

Chapter-IX of the said Act talks about penalties and adjudication for various offences. The penalties for damage to computer, computer systems etc. has been fixed as damages by way of compensation not exceeding Rs. 1,00,00,000 to affected persons. The Act talks of appointment of any officers not below the rank of a Director to the Government of India or an equivalent officer of state government as an Adjudicating Officer who shall adjudicate whether any person has made a contravention of any of the provisions of the said Act or rules framed there under. The said Adjudicating Officer has been given the powers of a Civil Court.

Chapter-X of the Act talks of the establishment of the Cyber Regulations Appellate Tribunal, which shall be an appellate body where appeals against the orders passed by the Adjudicating Officers, shall be preferred.

Chapter-XI of the Act talks about various offences and the said offences shall be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police. These offences include tampering with computer source documents, publishing of information, which is obscene in electronic form, and hacking.



Security Breeches ( Spamming , Spoofing , Phishing , Hacking etc )
Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: Web search engine spam, spam in blogs etc. Email spam, also known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. A person who creates electronic spam is called a spammer.

Spoofing
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.

Types of Hackers & Ethical hacking

Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.

White Hat Hacker
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.

Black Hat Hackers
Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Grey Hat Hacker
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker.




Cryptography ( Encryption and Decryption Techniques )
Cryptography is the science of secret writing. This word emerged from the greek words 'krupto' means secret and 'graph' means writing.

Encryption is the process of transforming plain text to unreadable scrambled text called cipher text.
Decryption is the reverse process of encryption , ie it converts unreadable cipher text back to plain text.


Need of Protocols like HTTPS and SSL
Hypertext Transfer Protocol Secure (HTTPS) is a widely used communications protocol for secure communication over a computer network.

HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.
Eavesdropping is the act of secretly listening to the private conversation of others without their consent.


VIRUS , WORMS & TROJANS
VIRUS stands for Vital Information Resources Under Siege. VIRUS is a computer program .
Antivirus programs are used to detect the presence of VIRUS in computer .VIRUS programs have unique code pattern called VIRUS Signature.  Virus programs are categorized accordingly by analyzing this code pattern.
Neumann's design for a self-reproducing computer program is considered the world's first computer virus, and he is considered to be the theoretical father of computer virology.

Spyware
Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.



Common Abbreviations in Computer Science

AGP  : Accelerated Graphics Port
ALU  : Arithmetic and Logic Unit
API    : Application Programming Interface
AVI   : Audio Visual Interleaving


BASIC : Beginner's all-purpose symbolic instruction code
BBS     : Bulletin Board System
bcc       : blind carbon copy
BIOS   : Basic input/output system
BIPS    : Billion instructions per second
BMP    : Bit Map


CAD :computer aided design
CASE: computer aided software engineering
CGA: Color Graphics Array
COBOL :common business oriented language
CPU: central processing unit




DBA: database administrator
DBMS :database management system
DCE :Data Communications Equipment
DNS :Domain Name System
DTP: desktop publishing



EBCDIC: extended binary coded decimal interchange code
EDP : electronic data processing
ENIAC: Electronic Numerical integrator And Calculator 
EOF :end of file
EGA :Enhanced Graphics Adapter

FAPI :Fingerprint Aware Application Program Interface 
FAT : file allocation table
FDD: floppy disc drive
FORTRAN :formula translation
FTP :File Transfer Protocol



GB :Gigabyte
GIGO :Garbage In, Garbage Out
GPRS :General Packet Radio Service
GPS: Global Positioning System
GSM :Global Shared Memory / Global System for Mobile



HDD :Hard Disk Drive
HGP: Human Genome Project
HTML :HyperText Markup Language
HTTP :HyperText Transfer Protocol
HTTP-NG :HTTP Next Generation
HTTPS : HyperText Transfer Protocol Secure










secretariat assistant exam objective questions.



Q . Keyboard designed to reduce the risk of wrist and hand injuries.
1) ANSI Keyboard 2) Qwerty Keyboard 3)Ergonomic Keyboard 4) Virtual Keyboard

Q. Eudora is a
1) e-mail client 2) web editor 3) File compression utility 4)Anti Virus


Q. Unsolicited bulk emails received from unknown source are called
1) captcha 2) worms 3) Trojan 4) spam

4.Symbol used to represent ‘decision making ’ in a flowchart
1) Oval 2) Circle 3) parallelogram 4) Rhombus

5.Process of finding useful pattern from a huge database is known as
1) Redundancy 2)Data Mining 3)Data digging 4)Normalization

6. User defined tags are possible using
1) HTML 2)DHTML 3)WML 4)XML

7. Table maintained by operating system to manage disk space used for file storage
1)FAT 2)space table 3)TAT 4)Index table

8. Symbol used to make an absolute reference to column in MS Excel
1)$ 2)@ 3)# 4)&

9. What does pixel means
1)Picture element 2)Storage unit 3)speed factor 4)None of these

10.SEO technics, attempt unfairly to redirect search results to a particular target page
1.Spoofing 2.Spamdexing 3.Optimizing 4.Querying

11.The terms SaaS and PaaS related to
1.Data Security 2.MS Office 3.Cloud computing 4.Artificial Intelligence

psc secretariat assistant exam. related to cyberlaws
cyber laws psc questions  for  Secretariat Assistant exam


IT , Computer and cyber law questions for sec assistant exams.kerala psc cyberlaw related questions and answers , Cyberlaw IT ACT 2000 etc

2 comments:

Sandy Shaw said...

Nice Article! Thanks for sharing with us.
Network Concept

Sandy Shaw said...

Nice Article! Thanks for sharing with us.
Network Concept

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.