100% found this document useful (1 vote)
895 views

SEE Computer Science 2079 Notes.

The document discusses various topics related to networking and telecommunication including: 1) Networking concepts like communication, telecommunication, and data communication. 2) Different transmission modes - simplex, half duplex, and full duplex. 3) Types of transmission media - guided (wired) and unguided (wireless) media. Examples include twisted pair cable, coaxial cable, fiber optics, radio waves, microwaves, and infrared. 4) Components of a computer network including servers, network cards, cables, hubs, switches, routers, and gateways.

Uploaded by

Shiwang Phuyal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
895 views

SEE Computer Science 2079 Notes.

The document discusses various topics related to networking and telecommunication including: 1) Networking concepts like communication, telecommunication, and data communication. 2) Different transmission modes - simplex, half duplex, and full duplex. 3) Types of transmission media - guided (wired) and unguided (wireless) media. Examples include twisted pair cable, coaxial cable, fiber optics, radio waves, microwaves, and infrared. 4) Components of a computer network including servers, network cards, cables, hubs, switches, routers, and gateways.

Uploaded by

Shiwang Phuyal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Contents

1.1 Networking and Telecommunication


1.2 Ethical and Social Issues in ICT
1.3 Computer Security
1.4 E-Commerce
1.5 Contemporary Technology
1.6 Number System
2.1 Database Management System
3.1 Programming in QBASIC
3.2 Modular Programming
3.3 File handling in QBASIC
4.1 Structured Programming in C

1.1 Networking and Telecommunication


Communication
Communication is sending and receiving information between two or more persons.

Telecommunication
Telecommunication is a system of transmission of sounds, images, texts or data in the form of electronic
signals.

Data Communication
Data communication is a process of transferring data electronically from one place to other using different
transmission mediums. E.g. E-Mail, Chat and phone calls.

Components of Data Communication.


i) Data ii) Sender iii) Medium iv) Receiver v) Protocol

Medium
A path through which the sender makes communication to the receiver is known as medium.

Protocol
Protocol is a set of rules by which computers on the network communicate with each other.
E.g., TCP/IP, SMTP, HTTP etc.

Data Transmission Mode


Data transmission mode is the way of transmission of data from one location to another. There are three
types of transmission mode:
i) Simplex mode
ii) Half duplex mode
1
Edited by: Krishna Sir. Developed by: Deepak Sir.
iii) Full Duplex Mode

Simplex mode
The transmission mode in which transmission of data can take place in one direction only is called simplex
mode.
E.g.: Newspaper, Radio and Television.

Half duplex mode


The transmission mode in which transmission of data can take place in both directions but only in one
direction at a time is called half duplex mode.
E.g.: Wireless handset and walkie-talkie.

Full duplex mode


The transmission mode in which data can be transmitted in both directions simultaneously is called full
duplex mode.
E.g.: Telephone, internet etc.

Bandwidth
Bandwidth can be defined as the maximum volume of data that can be transmitted through a
communicationsystem.
We can measure bandwidth in digital devices by bits per second and in analogue devices by cycles per
second or Hertz (Hz).

Transmission medium / Communication Channel


Transmission medium is a pathway that can transmit information from a sender to a receiver through
wiredor wireless medium on a network.
The types of communication medium are:
i) Guided Medium (Bounded or Wired)
ii) Unguided Medium (Unbounded or Wireless)

Guided medium
The transmission media which comprises of cables or wires through which data is transmitted is called
guided medium. They are called guided since they provide a physical channel from the sender device to
the receiver device. The signal travelling through these media are bounded by the physical limits of the
medium.
E.g.: twisted pair cable, co-axial cable, fiber optics cable, etc.

Features of guided media:


a) Data transmits through the physical cable or fixed path
b) Data transmission rate is higher.

Unguided medium
The transmission media which transfer data in the form of electromagnetic waves that do not require
any cables for transmission is called unguided medium. These media are bounded by geographical
boundaries.
E.g.: radio wave, microwave, infrared etc.

Guided VS Unguided Media


2
Edited by: Krishna Sir. Developed by: Deepak Sir.
Guided Media Unguided Media
Guided media is a medium that sends signals Unguided media is a medium that transmits signals
through a solid physical path. through free space.
There is a specific direction to send signals. There is no particular direction to send signals.
Used in wired transmission Helps wireless transmission
Twisted pair, coaxial cable, and fiber optics Radio wave, microwave, and infrared

Twisted pair cable


A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted
wiresare bundled to form cable. These are the most common medium for LAN. Wires are twisted
with each other so as to reduce crosstalk (A disturbance caused by electromagnetic interference,
along a circuit or a cable pair).
Its types are:
a) Unshielded Twisted Pair Cable
b) Twisted Pair Cable

Unshielded twisted pair (UTP)


Unshielded twisted pair is a popular type of cable that consists of two unshielded wires twisted
aroundeach other which are used in telephone wiring and local area networks (LANs). It is called
unshieldedbecause it has no additional foil wrap, or shield.
RJ-45 connector is commonly used with unshielded twisted pair.

Shielded twisted pair (STP)


Shielded twisted pair is a type of copper telephone wiring in which each of the two copper wires are
twisted together and coated with an insulating coating. The extra covering in shielded twisted pair
wiringprotects the transmission line from electromagnetic interference.
D-shell connectors are used with shielded twisted pair.

Co-axial cable
Coaxial (or “coax”) cable is a common type of cable used for transmitting data over long distances.
Theyare most commonly used to transmit cable TV and Internet signals.
The connectors used with co-axial cables are BNC, T-connectors and terminators in bus
topology.10 bps is the maximum speed of co-axial cable.

Fiber optic cable


Fiber optics cable is one of the costlier cables used in data communication which uses light to carry a
datasignal through the cable.
The connectors used in fiber optics are Screw Mounted Adaptors (SMA), Spring-loaded Twist
(ST), SCand FC.
It is costlier to maintain, produce and install.

Radio wave transmission


The transmission making use of radio waves through air is called radio wave
transmission.It provides low bandwidth for data communication.
Radio, TV, cellular phones etc. uses radio transmission in one form or
another.The radio waves can travel through walls and through an entire
building.
Depending upon the frequency, they can travel long distance or short
distance.It does not require line of sight for data transmission

3
Edited by: Krishna Sir. Developed by: Deepak Sir.
Microwave transmission
Microwave is a line-of-sight wireless communication technology that uses high frequency beams of
radiowaves to provide high speed wireless connections that can send and receive voice, video, and data
information.
Microwaves do not pass-through buildings. So, indoor receivers cannot be used
effectively.It provides higher bandwidth for data communication.
It requires line of sight for data transmission.

Infrared transmission
Infrared Transmission is the transmission of data or voice information over infrared (IR) light over
shortranges.
It requires line-of-sight and is unable to break through walls.

Computer network
A computer network means two or more computers connected with each other to share data, hardware,
software and other resources.

Advantages of computer network


a) Computer in a network can access the network-connected hardware devices like printers, disk
drives,etc.
b) Data in a network environment can be updated from any computer. Updated data can be
accessed byall computers on the network.
c) Computers in a network system share different software packages.
d) Information can be exchanged rapidly in computer network.

Disadvantages of computer network


a) The sharing of information may leak the privacy of other clients.
b) The networking cost is high
c) If hardware or software malfunctions, it affects the whole network.
d) Data and information may be stolen by computer hackers if the security of network is not reliable.

Reasons of keeping computers on the network


a) To share hardware devices like printers, scanners, hard disks etc.
b) To share data and information.
c) To share software resources.
d) To communicate with each other.

Hardware components of a computer network (Elements of Network)


Physical parts and devices used to connect computers in the network environment are called hardware
components. The hardware components of computer network are
a) Computer system (Server or Workstation) b) Network connectors c) Network cables
d) NIC Card e) MODEM f) Hub g) Bridge h) Switch
i) Router j) Gateway k) Repeater
Server
A server is the main computer that provides services, data and other resources to the other computers
in the network environment. Network operating software used by server is Novell Netware, Linux,

4
Edited by: Krishna Sir. Developed by: Deepak Sir.
Unix etc.Different types of servers are file server, print server, application server etc.

Workstation
Workstation is a computer network that utilizes network resources. Network operating software used by
workstation are Windows 98, Windows XP etc.

Node
Each computer or device of network is called node.

Router
Router is an intelligent device that connects two different networks which uses the address for filtering and
forwarding the data as well as it has an ability to determine the best route for destination.

Network Interface Card (NIC)


A Network Interface Card (NIC) is the adapter through which the computer is connected to the network.
Thefunction of NIC is to convert data into electronic signals and transfer them through cables and vice-
versa.
The advantage is to present the platform for a communication between the computers within a network.

Cable
Cables are commonly used media of physical channel for transmitting data between computers in network.
Examples of cables are coaxial, twisted pair and fiber optic cable.

Connector
Connector is an interface between the NIC of the computer and the cable that passes data between
computers in network. Examples of connectors are BNC used with coaxial cable, RJ 45 used with
UTPcable, ST used with fiber optic cable etc.

Hub
A hub is a network device with multiple points or ports which acts as a central point from where
differentcomputers and other devices are connected. It broadcasts all network data across each
connection.
Hub is mostly used in physical star topology.

Switch
A switch is a networking device that has multiple connecting ports which is often used interchangeably
withthe bridge.
Bridge
A bridge is a device that connects two or more similar types of network which filters the data or
inspectsincoming signals and decides whether to forward the signals or discard them.

Gateway
Gateway is an interconnecting device that connects two dissimilar networks

Repeater
5
Edited by: Krishna Sir. Developed by: Deepak Sir.
Repeater is a device that amplifies the incoming signals, creates a copy of it and transmits the
signal onnetwork.

MODEM
MODEM is a device which is used to transfer the data of one computer to another computer using
telephone lines.
The role of MODEM in data transmission is that it transfers data from one computer to another
throughtelephone line. It also converts the digital signal into analog and vice versa.

Importance of MODEM

MODEM modulates the digital codes of the computer into analog signal, which then can travel
through the telephone cable. At the receiving end the MODEM kept there will demodulate the
analog signal to digital codes, which can be then understood and used by the receiving computer. In
this way a MODEMmakes the computer network possible.

Modulation
The process of translating digital signals of a computer to analog signals, which are then transmitted
across the standard telephone lines, is known as modulation.

Demodulation
The process of translating analog signals from a phone line and converts then into digital signals for the
computer is known as demodulation.

Software components of a computer network


a) Network protocol
b) Network operating system
c) Device driver

Network operating system


Network operating system is a set of computer program that manages the resources on network. E.g.
Novellnetwork, Microsoft Windows NT, Linux, Unix etc.
Device driver
Device driver is a program that controls the functionality of the hardware device.

Types of Networks
a) LAN (Local Area Network)
b) MAN (Metropolitan Area Network)
c) WAN (Wide Area Network)

LAN (Local Area Network)


A LAN is a type of network which covers small area i.e., within a room, building, or short distance
by using cables or small wireless devices. It is controlled by a single organization. It uses private
connectionmedia. E.g.: network in a school, college or cyber cafe. The diameter is not more than a
few kilometers. LAN offers bandwidth of 10-100 Mbps.
MAN (Metropolitan Area Network)
A MAN is a type of network which covers an entire city. It is controlled by single or group of
organization. It uses private or public connection media. E.g.: interconnection between different
6
Edited by: Krishna Sir. Developed by: Deepak Sir.
brancheson same branch and ISP providing internet services. It offers a number of network services
compatible with bandwidth from 128 kbps to 1 Gbps.

WAN (Wide Area Network)


A WAN is a type of network which connects two or more computers generally across a wide
geographical area such as cities, districts, and countries. It is controlled by group of organization. It
uses
public connections media like telephone lines, satellite links or microwave system to connect
severalLANs and MANs. E.g., internet. Data transmission in WAN is slower than LANs and
WANs.

Network topology (LAN topology) [SLC 2064] [SLC 2065 S] [SEE 2066 S] [SEE 2067 S] [SLC 2068]
The arrangement or connection pattern of computers or nodes and other devices of the network is called
network topology. The three basic topologies are bus topology, ring topology and star topology

Bus topology
The network topology in which computers and other devices are arranged in linear format which uses a
common backbone or wire to connect all the computers and devices is called bus topology.

Diagram of bus topology

Advantages of bus topology


a) It is easy to set up computers and other devices in bus topology, because all the devices are
connectedthrough a single wire.
b) It requires fewer cable media, so it is cheaper than other topologies.
c) It is easy to add new node to the network.
d) Failure of one workstation does not affect other computers on the network.

Disadvantages of bus topology


a) The whole network system collapses if the cable or backbone is damaged.
b) The network slows down if additional computers are connected.
c) The limited length of the cable in a network may restrict to connect the workstation or devices.
d) It is difficult to find fault in this network topology.
e)

Ring topology
The network topology in which computers are connected in the shape of a circle without any end
points iscalled ring topology. Each workstation contains two neighbors for communication or an
7
Edited by: Krishna Sir. Developed by: Deepak Sir.
input and output connections.

Diagram of ring topology

Advantages of ring topology


i) It is easy it set up and configure.
ii) Each computer gets equal opportunity to access the network resources.
iii) It supports high data transmission rate.
iv) Performs better than a star topology under heavy network load.

Disadvantages of ring topology


i) Failure of any cable or single computers may affect the entire network.
ii) It is difficult to detect the errors.
iii) Adding/removing the devices affect the entire network.
iv) Much slower than an Ethernet network under normal load.

Star topology
The network topology in which all computers or other devices are connected through a central device
through a central device called hub or switch is called star topology.

Diagram of star topology

Advantages of star topology


i) Easy to set up and configure.
ii) Failure of single computer or cable doesn’t affect the entire network.
iii) It is easy to find the fault.
iv) It is easy to extend to network by attaching new devices to the central devices.

Disadvantages of star topology


8
Edited by: Krishna Sir. Developed by: Deepak Sir.
i) It requires more cable in comparison of bus topology so it is more costly.
ii) Failure of central devices (hub or switch) break down the whole system.

Network architecture (Models of Computer Network)


The arrangement of the computers on the network which is based on the computing model is called
network architecture. Its types are
a) Centralized computing network
b) Client / Server Network
c) Peer to Peer Network

Centralized computing network


A centralized computing network is a network in which a central host computer performs data
processingand storage on behalf of clients. It is different from client server network as client server
network consistsof at least one server and one or more client as well as client server provides high
security of data and other resources.
Client/server network
Client/ server network is a type of network architecture that consists of at least one server and one or
more clients or workstations, where users do their work. It provides central security administration
andthe network administrator is responsible for data security and other resources management of the
network.

Peer-to-peer network
Peer-to-Peer network is a group of computers, which function both as servers and workstations to
sharedata, information and other resources of the network. It lacks centralized network
administration, wherethe network administrator needs to manage security on each computer. It
provides no reliable security and might put data in higher risks.
Client/server network Vs Peer-to-peer network

Client/server network Peer-to-peer network


There is a specific server and specific clients Clients and server are not distinguished; each node
connected to the server. act as client and server.
The client request for service and server responds Each node can request for services and can also
with the service. provide the services.
The data is stored in a centralized server. Each peer has its own data.
The client-server is expensive to implement. Peer-to-peer are less expensive to implement.

Internet
Internet is an interconnection of several thousands of computers of different types belonging to the
various networks all over the world in order to share data and information.
In other words, network of networks is called Internet.

Who controls internet?


Different organization like ISOC (Internet Society), W3C (World Wide Web Consortium), IAB
(InternetArchitecture Board), IEFT (Internet Engineering Task Force), IRTF (Internet Research
Task Force), IESG (Internet Engineering Steering Group) and INIC (Internet Network information
Centre) gives directive and guideline for the proper use of internet.
Internet called Network of networks

The internet is called „network of networks‟ because all the smaller networks of organizations are
9
Edited by: Krishna Sir. Developed by: Deepak Sir.
linkedtogether into the one giant network called the internet.

Protocol used by the internet.


TCP/IP is the communication protocol used by the internet.

Components required for internet connection


a) A TCP/IP enabled computer with web browser
b) An account with an ISP
c) Router / MODEM (necessary if you are using a telephone line to access the Internet)
d) Connection (ISDN, Satellite, cable and dial-up)

ADSL (Asymmetric Digital Subscriber Line)


ADSL is a technology for transmitting digital information at a high bandwidth on existing phone
lines tohomes and businesses. Unlike regular dialup phone service, ADSL provides continuously-
available, "always on" connection.

Services of internet
a) WWW (World Wide Web)
b) E-mail (Electronic mail)
c) FTP (File Transfer Protocol)
d) IRC (internet Relay Chat)
e) Newsgroup
f) Telnet
g) E-commerce

Advantages of internet
a) Internet has an endless knowledge supply which anyone can access that too free of cost.
b) Selling and buying has become so easy with the use of internet and it has helped millions to
sell andbuy their goods online.
c) Internet has given us E-Mail which is fast, secure and reliable mode of communication.
d) It makes easy to transfer the file or information.

Disadvantages of internet
a) Increasing virus threats not only steals your sensitive data but also damages your computer.
b) People using too much of internet get disconnected from the real world.
c) Pornography that can get in the hands of young children too easily.
d) Addiction to online games affects health leading to obesity and serious health issues.

Intranet
An intranet is a private computer network that uses the internet protocol to securely share any part
of information of an organization. It is owned by a single organization or company. It can only be
used bythe employees of the owned organization.
Extranet
An extranet is a computer network that allows controlled access from outside for specific business or
educational purposes.

ISP (Internet Service Provider)


An Internet service provider (ISP) is an organization that provides services for accessing and
usingthe Internet. World Link, Mercantile, Classitech, Vianet etc. are the ISPs of Nepal.
10
Edited by: Krishna Sir. Developed by: Deepak Sir.
E-mail (Electronic Mail)
E-mail (Electronic mail) is one of the most popular services provided by the internet which exchanges
messages between the computers through a network. It is the soft copy service of the internet.
E-mail can be sent using a computer with modem, e-mail program and internet facility.
E.g., [email protected]
Any four sites that provide e-mail services are:
a) www.yahoomail.com
b) www.hotmail.com
c) www.gmail.com
d) www.outlook.com

Advantages of E-mail
a) It allows to send and receive message across the world at very low cost.
b) E-mail is faster, cheaper, more reliable than traditional mail.
c) The image, sound, video and documents can be attached to e-mail message.
d) Email can be accessed from anywhere in the world.

Disadvantages of e-mail
i) Minor mistakes in e-mail address may deliver the mail to wrong address.
ii) Since it passes through a vast electronic network, it may be seized in between.

Newsgroup
Newsgroups are discussion groups that focus on a particular topic such as politics, health, computer, etc.
Theinterested people on the particular field write the information or articles. Then these articles are posted
to thenewsgroup so that other people can read them.

Telnet
A telnet is a program that allows a user to log in to a remote computer on internet as a user on that system.

FTP (File Transfer Protocol)


File Transfer Protocol is the internet tool that allows the user to transfer the file from one computer to
another computer. It helps to upload and download the files.

Use / Function of FTP


File Transfer protocol helps to transfer (download or upload) files from one computer to another
computer.
Uploading
Uploading refers to copying files or documents, programs or data from the user computer to the internet
server.

Downloading
Downloading refers to the copying files or document or program or data from the internet server to the
user computer.

IRC (Internet Relay Chat)


Internet Relay Chat is one of the important services provided by the internet which allows the user to
communicate with other people in real time. It uses the browser software without using special chat

11
Edited by: Krishna Sir. Developed by: Deepak Sir.
software. It communicates only text. For e.g.: chatting on Facebook.

FAQ (Frequently Asked Questions)


FAQ (Frequently Asked Questions) is an online document that possesses series of common questions
and answers on a specific topic.

Video conferencing
Video conferencing is an important and interesting service provided by the internet which makes
communication using sounds as well as pictures. It requires necessary hardware and software to see and
speak to each other. It enables virtual face-to-face communication among people sitting at different
locations. For e.g.: chatting on skype.

Web browser
Web browser is a computer program that access web pages and displays them on the user computer.
Examples of web browsers are Mozilla Firefox, Google chrome, Internet Explorer, opera etc.
Browsing/Surfing means searching information on the internet.

URL (Uniform Resource Locator)


Ans: URL is a unique address that provides location of a webpage on the internet.
Example of URL: http://www.abc.com/mainpage/first.html
http: protocol name, www.abc.com: server name, main page: path, first.html: filename

Search engine
Ans: A search engine is a software program or script available through the Internet that searches
documents and files for keywords and returns the results of any files containing those keywords. They
are used to locatespecific sites and information. Examples of search engines are Google, Bing, Yahoo
etc.

Blog (weblog)
A blog is a time-stamped online journal that appears on a website. A blog is a frequently updated online
personal journal or diary. A place to share your thoughts and your passions to the world.

Wi-Fi (Wireless Fidelity)


Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide
wirelesshigh-speed Internet and network connections.
WWW (World Wide Web)
The World Wide Web (abbreviated WWW or the Web) is an information space where documents
and other web resources are identified by Uniform Resource Locators (URLs), interlinked by
hypertext links,and can be accessed via the Internet.

DNS (Domain Name System)


Domain Name System is an Internet service that translates domain names into IP addresses.

1.2 Ethical and Social Issues in ICT

The development of ICT has made possible to store large amount of data in the virtual world and make
communication through it. At the same time, computer crimes and abuse of data, privacy violations,
pornography are increasing.
12
Edited by: Krishna Sir. Developed by: Deepak Sir.
Challenges of ICT

1. Virtual Identity
a) A major problem in the ICT environment.
b) Internet criminals enter into the system by creating fake identities and use the system for
theirbenefits which is difficult to recognize and control.
2. Security
a) Hacking or unauthorized access of system is increasing.
b) Hackers are the greatest challenge for the ICT security personnel.
c) Hackers hack others data and use for their benefits especially in banking and commercial
sectors.
Privacy Issues
a) Cyber bullying is a kind of harassment using mobiles or computers.
b) Kind of harassment using electronic devices such as mobiles and computers.
c) Sharing unnecessary information of individual or group of people is the danger of ICT in this
era.
d) Using internet many users bully others.
3. Copyright
a) A legal right that grants the creator of an original work.
b) Because of its openness and easy access, through the internet, users can easily access the
work ofothers and use them for the benefits without the permission of the creator.
4. Social Behavior
a) Excessive use of internet has changed the behavior of the people.
b) Negative effects on sleep, work and academic achievements of the students.
c) Usage of unethical sites has increased negative behaviors and crimes in society.
d) Employees use internet at their workplace for non-productive works.
5. Digital Divide
a) The Digital Divide is a social issue referring to the differing (conflicting) amount of
information between those who have access to the Internet (especially broadband access) and
those who do not have access.
b) In education sector, developing countries have poor old education systems, so students will
not be aware of new information technologies.
c) In remote areas, they do not even have power, so information technology looks like computer
cannot be used.
d) To get ICT benefits, developing countries should train their human resource and also adopt
new culture which is a bit costly.

Computer Ethics
Computer ethics can be defined as to follow the rules and regulation of computer technology and not to
harm other computer users knowingly or unknowingly.

Major Provisions included in computer ethics are:


a) You should not use a computer to harm other people.
b) You should not search the file or record of other people.
c) You should not spread false and illegal information.
d) You should not destroy, erase or edit personal or group records.
e) You should not use other people’s computer resources without authorization.

Cyber Law
❖ Cyber law refers to the laws regarding the internet and cyberspace which includes a wide variety of
legalissues related to the use of communication technology.
13
Edited by: Krishna Sir. Developed by: Deepak Sir.
❖ Cyber Law (also known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed
on30th Bhadra 2061 (15 September 2004).

The major components included in cyber law are:


a) Electronic and Digital Signature Law
b) Computer Crime / Cyber Crime Law
c) Intellectual property Law
d) Data Protection and Privacy Law
e) Telecommunication Law

International Cyber Law


a) Fair Credit Reporting Act in 1970
b) Freedom of Act in 1970
c) Federal Privacy Act in 1974
d) Video Privacy Protection Act in 1988
e) Copyright Act 1992

Digital Signature
A digital signature is an electronic form of a signature that can be used to authenticate the identity of the
sender of a message or the signer of a document, and also ensure that the original content of the message
or document that has been sent is unchanged.
It is necessary to keep the uniformity standard and guarantee in all the activities of the e-sector.

Cyber crime
Cybercrime is a crime committed by using cyber means/computer
technology.Cybercrime is also known as computer-related crime.
Illegal activities committed using computer technology
a) Damage to computer and computer system.
b) Acts to gain illegal access into the system.
c) Use as weapons to commit other crimes.
d) Acts against the provision of cyber law.

Examples of cyber/computer crimes


a) Creating fake documents
b) Blackmailing/social media abuse
c) Distribution of pornography materials
d) Piracy of intellectual properties
e) Spreading computer viruses/malware

Digital citizenship
❖ A digital citizen is anyone who uses digital tools such as computers, cell phones, or the Internet.
Youcan use these tools in your work, at school or for recreation.

❖ Digital citizenship refers to the responsible use of technology by anyone who uses
computers,the Internet, and digital devices to engage with society on any level.
❖ Digital citizenship applies to “those who use the Internet regularly and effectively,”
❖ Good digital citizenship engages young students and shows them how to connect with one
another,empathize (understand) with each other, and create lasting relationships through digital
tools.
❖ Bad digital citizenship, on the other hand, entails (involves) cyber bullying, irresponsible
socialmedia usage, and a general lack of knowledge about how to safely use the Internet.
Examples of Digital Citizenship
a) Communicating with respect
b) Respecting other’s privacy

14
Edited by: Krishna Sir. Developed by: Deepak Sir.
c) Adding helpful information/context to a discussion or wiki page
d) Supporting others by offering useful feedback
e) Encouraging them, or sharing work they’re proud of, etc.

Digital footprint
❖ A trace of data you create while using the Internet.
❖ Includes the websites you visit, emails you send, and information you submit to online services.
❖ Your online identity and individuality and is what makes you unique.
❖ It builds the online reputation, or impression depending on the things you do online.
❖ It is important to be aware of it because anything posted online is permanent and stays
foreverregardless of being deleted.
❖ Publishing a blog and posting social media updates are another popular ways to expand your
digitalfootprint.
❖ Every tweet you post on Twitter, every status update you publish on Face book, and every
photo youshare on Instagram contributes to your digital footprint.
❖ The more you spend time on social networking websites, the larger your digital footprint will be.
❖ Even "liking" a page or a Face book post adds to your digital footprint, since the data is
saved onFace book’s servers.

Types of digital footprints


a) Active digital footprint
b) Passive digital footprint

Active digital footprints


a) An active digital footprint is where a user knows that they're sharing the information.
b) Posting on Face book, Instagram, Snap chat, Twitter, and other social media platforms
c) Filling out online forms, such as when signing up to receive emails or texts
d) Agreeing to install cookies on your devices when prompted by the browser

Passive digital footprints


a) A passive digital footprint is the information collected from a user without their knowledge.
b) Websites that install cookies in your device without disclosing it to you
c) Apps and websites that use geo location to pinpoint your location
d) Social media news channels and advertisers that use your likes, shares, and comments to profile
youand to serve up advertisements based on your interests

"Everything leaves a digital footprint. Whatever gets created may never go away. If they don’t want to see
ittomorrow, they'd better not post it today"

IT Policy 2072
❖ IT Policy launch in Nepal – 2000 AD (2057 BS)
❖ Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

❖ Total laws in ICT policies 2015 (2072 BS) – 21 Policies


❖ Strategies in ICT policies 2015 (2072 BS) – 21 Strategies
❖ Percentage of the population will have digital skills by the end of 2020? – 75%
❖ Percentage of the population will be able to access the broadband services by 2020? – 90%
❖ Percentage of the population of Nepal will have internet access by 2020? – 100%
❖ Percent of government services will be provided online by 2020? – 80%

Objectives of IT Policy 2000


a) To establish knowledge-based industry
b) To increase employment
c) To build knowledge-based society
15
Edited by: Krishna Sir. Developed by: Deepak Sir.
Vision of ICT Policy 2015
❖ To transform Nepal into information and knowledge-based society and economy.

Mission of ICT Policy 2015


❖ To create conditions for the intensified development and growth of ICT sector as a key
driver forNepal’s sustainable development and poverty reduction strategies.

Goals of Information and Communication Technology policy

a) Nepal will strive towards enhancing overall national ICT readiness with the objective of being at
least in the top second quartile of the international ICT development index and e-Government
rankings by 2020.
b) At least 75 percent of the population will have digital literacy skills by the end of 2020.
c) A universal broadband access to all people on an equitable basis will be in place. By 2020, 90
percent of the population will be able to access the broadband services.
d) The role and significance of ICT industries and services (including telecom services) will increase
inthe Nepali economy with ICT value added (including digital content and service industry)
accounting for at least 7.5% percent of GDP by 2020.
e) The jurisdiction of Nepal Telecommunications Authority will be expanded to secure complete
alignment with policy provisions outlined in this document. Along these lines, Nepal
Telecommunications Authority will be renamed Nepal Communication Authority and its areas of
operation restructured accordingly.
f) By 2020, entire population of Nepal would have access to internet
g) 80% of all citizen facing government services would be offered on line by 2020
h) e-Procurement will be promoted as means of driving transparency through government
procurementprocesses covering all public procurement of goods and services irrespective of cost
and volume of such procurements by 2018
i) G2G implementation would be promoted with a view to achieving complete automation of the
operations of land administration, revenue administration and management, vital registration,
passport and citizenship certificate services by 2020.
j) Broadband access will be expanded across the country with the goal of achieving a broadband
Internet user penetration rate of 30% at a minimum of 512kbps and making available at least 10
Mbps download speed on demand in urban areas by 2018.
k) Special funding arrangements will be developed and implemented within 2018 to support
innovation and incubation of on-line businesses and start-ups

Objectives of National Information and Communication Technology Policy

a) To empower and facilitate Nepal’s participation in the Global Knowledge Society.

b) To transform Government service delivery regime by promoting transparency, efficiency,


inclusiveness and participation through effective utilization of information and communication
technologies
c) To promote ICT to further productivity among the sectors that is key drivers of the national
economy.
d) To create easily accessible, affordable and innovative public access points under a comprehensive
community/ Village network initiative;
e) To deploy ICTs at all levels of Nepali educational system in order to improve educational
outcomes while expanding access to education and training facilities
f) To facilitate the participation of youths and women in ICTs particularly in media and content
development initiatives;
g) To promote the use of free and open-source software as well as open standard in software
development for government agencies

16
Edited by: Krishna Sir. Developed by: Deepak Sir.
h) To safeguard public sector information and investment against negative impacts of deploying
and using ICTs.
i) To improve communication systems across the country especially in areas of touristic interest to
support tourism development in the country
j) To conserve natural resources and safeguard Nepal's heritage using ICT tools.

Implementation of policy and strategy framework

A National Information and Communication Technology Policy Implementation Steering Committee


will beformed at the Ministry of Information Technology and Communication with the following
structure.

Hon. Minister, Ministry of Information and Communication Technology Chairperson


Member, National Planning Commission Member
Secretary, Ministry of Education Member
Secretary, Ministry of Health Member
Secretary, Ministry of Agriculture Member
Secretary, Ministry of Finance Member
Secretary, Ministry of Local Development Member
Secretary, Ministry of Information and Communication Member
Chairman, Nepal Telecommunications Authority Member
Representative Private Sector / Domain Expert 2 Members
Joint-Secretary (Policy and Program),
Ministry of Information and Communication Member-Secretary

The primary role of Information and Communication Technology Policy Implementation Steering
Committee is to provide overall coordination support for the effective implementation of policy
provisions along with monitoring and evaluation of policy interventions.

The Steering Committee will form an ICT Policy Implementation Sub-Committee comprising of
representation from the stakeholder community and domain experts, including the private sector, to
provideit with domain specific expert advice and recommendations in relation to the execution of policy
provisions.

Electronic Transaction
❖ Transactions of electronic records data by using any types of electronic means.
❖ Contains electric records and valid digital medium.
❖ The exchange of all types of records which are in the form of electronic.

ETA (Electronic Transaction Act)


❖ ETA (Electronic Transaction Act) deals with issues related to cybercrime and also help in making
and implementing laws over cybercrime.
❖ It has made different requirements so that if anyone found having cybercrime, he/she will be
punished according to the scene of the crime.
❖ He /she can be jailed for minimum from 6 months to a maximum of 3 years and has to pay the
penalty according to the offense.
❖ Maintaining privacy in the cyberspace, creating strong passwords, updating the security software,
updating password are some of the techniques to keep secure him /her.
❖ The computer and cybercrimes such as hacking, piracy, copyright violation, fraudulent and all
other deceitful activities have been clearly defined and punishments are set accordingly. The
action againstsuch crimes and punishment will be in the range of a minimum Rs 50,000 to a
17
Edited by: Krishna Sir. Developed by: Deepak Sir.
maximum Rs 3,00,000 in cash and six months to three years imprisonment.
❖ The new legislation has not only legalized all forms of electronic transactions and digital
signatures but has also clearly spelled out ways to regulate various computer-based activities and
punish cybercrimes.

When was electronic transaction act 2063 authenticated and published in Nepal?
⚫ December 8 2006 (22 Mangshir 2063)

Objectives of the Electronic Transaction Act 2063


a) To make legal provision for authentication and regulation of electronic data.
b) To make a reliable date generation, communication, and transmission.
c) To make a secured and authentic means of electronic communication.
d) To regulate all the relating matters of electronic transactions.

Scopes of the Electronic Transaction Act 2063


a) Creation and use of digital signature
b) Control cyber/computer-related crimes.
c) Protection of intellectual property.
d) Protection of confidentiality.

Social Media
❖ The 'social' part: refers to interacting with other people by sharing information with them
andreceiving information from them.
❖ The 'media' part: refers to an instrument of communication, like the internet (while TV, radio,
andnewspapers are examples of more traditional forms of media).
❖ Social media is computer-based technology that facilitates the sharing of ideas, thoughts, and
information through the building of virtual networks and communities.
❖ By design, social media is internet-based and gives users quick electronic communication of
content.
❖ Content includes personal information, documents, videos, and photos.
❖ Users engage with social media via computer, tablet or smart phone via web-based software or
webapplication, often utilizing it for messaging.

Many Forms of social media

❖ Social media may take the form of a variety of tech-enabled activities. These activities include
photo sharing, blogging, social gaming, social networks, video sharing, business networks, virtual
worlds, reviews and much more.
❖ Even governments and politicians utilize social media to engage with constituents and voters.
❖ For individuals, social media is used to keep in touch with friends and extended family.

❖ Some people will use various social media applications to network career opportunities, find
people across the globe with like interests, and share their thought, feelings, insight, and emotions.
Those who engage in these activities are part of a virtual social network.
❖ For businesses, social media is an indispensable tool. Companies use the platform to find and
engagewith customers, drive sales through advertising and promotion, gauge (find) consumer
trends, and offering customer service or support.

Different platforms of Social media


a) Facebook - Facebook is a free social networking Web platform that promotes and facilitates
interaction between friends, family and colleagues. Facebook was founded in 2004 by Mark
18
Edited by: Krishna Sir. Developed by: Deepak Sir.
Zuckerberg and several Harvard University classmates.
b) Twitter – Twitter is a free social networking microblogging service that allows registered
members to broadcast short posts called tweets. Twitter was created in March 2006 by Jack
Dorsey, Noah Glass, Biz Stone, and Evan Williams, launched in July of that year.
c) Instagram – Instagram is the name of an online photo sharing social Web service that lets you
share your life with friends through a series of pictures captured with a mobile device. Instagram
also supports video uploads.
The Instagram service, which claims to have more than 100 million users, was founded by Kevin
Systrom and Mike Krieger in October, 2010. In April, 2012, Facebook acquired Instagram for
$300 million in cash and 23 million shares of stock -- a total purchase value of nearly $1 billion.
d) LinkedIn – LinkedIn is a social networking website designed for business professionals. It allows
you to share work-related information with other users and keep an online list of professional
contacts.
e) Blogs – A blog (shortening of “weblog”) is an online journal or informational website displaying
information in the reverse chronological order, with the latest posts appearing first. It is a platform
where a writer or even a group of writers share their views on an individual subject.
f) Wikipedia – Wikipedia is a free, open content online encyclopedia created through the
collaborative effort of a community of users known as Wikipedians. Anyone registered on the site
can create an article for publication; registration is not required to edit articles.

Opportunities of using social media


a) People from anywhere can connect with anyone. Regardless of the location and religion.
b) Millions of people are using social media platforms so it has a great opportunity to promote
business.
c) It is a very fast way of exchanging the information.
d) You can share your ideas and views in a particular area of interest.
e) It also creates awareness and innovates (introduce new) the way people live.
f) Communication mechanism is very simple and easy.

Threats of using social media


a) Personal data and privacy can be easily hacked and shared on the internet.
b) More chances of creating fake accounts.
c) Create health problems.
d) Decrease the working efficiency of people.

e) More chances of spreading unnecessary rumor soon.


f) It can easily collapse someone’s reputation just by creating a false story and spreading
across thesocial media.

1.3 Computer Security


Computer Security / Cyber Security
⚫ The protection of computer systems and information from harm, theft, and unauthorized use.
⚫ Proper computer security helps prevent viruses and malware, which allows programs to run
quickerand smoother.
Tips for Best Computer Security
a) Use the best antivirus software, which not only provides protection to your PC but also
internetprotection and guards against cyber threats.
b) Do not download un trusted email attachments as these may carry harmful malware.
c) Never download software from unreliable sites as they may come with a virus that may infect
yoursystem as soon as you install the software.

Information Security (infosec)


19
Edited by: Krishna Sir. Developed by: Deepak Sir.
The processes and methodologies which are designed and implemented to protect print,
electronic, orany other form of confidential, private and sensitive information or data from
unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

Key principles of Information Security


a) Confidentiality: - Only authorized users can access the data resources and information.
b) Integrity: - Only authorized users should be able to modify the data when needed.
c) Availability: - Data should be available to users when needed.

Security Threats
⚫ A risk which can potentially harm computer systems and organization.
⚫ The cause could be physical such as someone stealing a computer that contains vital data.
⚫ The cause could also be non-physical such as a virus attack.

Possible Security Threats


⚫ Internal: The threats include fire, unstable power supply, humidity in the rooms
housing thehardware, etc.
⚫ External: These threats include Lightning, floods, earthquakes, etc.
⚫ Human: These threats include theft, vandalism of the infrastructure and/or hardware,
disruption,accidental or intentional errors.
⚫ Loss or corruption of system data.
⚫ Disrupt business operations that rely on computer systems.
⚫ Loss of sensitive information.
⚫ Unauthorized access to computer systems resources such as data.

Malicious code (Malware)


⚫ A code developed by cyber attackers, designed to cause extensive damage to data and systems
or togain unauthorized access to a network.
⚫ Includes computer viruses, worms, Trojan horses and spyware.

⚫Perform a variety of different functions such as stealing, encrypting or deleting sensitive data,
altering or hijacking (taking control) core computing functions and monitoring users' computer
activity without their permission.
Types of malwares
a) A virus is the most common type of malware which can execute itself and spread by infecting
otherprograms or files.
b) A worm can self-replicate without a host program and typically spreads without any
humaninteraction or directives from the malware authors.
c) A Trojan horse is designed to appear as a legitimate (valid) program in order to gain access
to asystem. Once activated following installation, Trojans can execute their malicious
functions.
d) Spyware is made to collect information and data on the device user and observe their
activitywithout their knowledge.
e) Keyloggers, also called system monitors, are used to see nearly everything a user does on
theircomputer. This includes emails, opened web-pages, programs and keystrokes.

Protect a system from infection


a) Never download files from unknown or suspicious sources.
20
Edited by: Krishna Sir. Developed by: Deepak Sir.
b) Install antivirus software that features automatic updates and has the capability to detect all
types ofinfections.
c) Delete spam and junk emails without forwarding.
d) Always scan a pen drive from an unknown source for viruses before using it.
e) Regularly back up your documents, photos, and important email messages to the cloud or
to anexternal hard drive. In the event of an infection, your information will not be lost.

Security mechanisms
⚫ A mechanism that is designed to detect, prevent, or recover from a security attack.
⚫ It includes
⚫ Authentication Systems
⚫ Firewalls
⚫ Cryptography
⚫ Antivirus Software
⚫ Backup System

Authentication System
⚫ Authentication is the process of verifying the identity of a person or device.
⚫ Authentication system makes sure that right people enter the system and access the
rightinformation.
⚫ Types of Authentications
⚫ Password
⚫ Biometric

Password
⚫ A set of secret characters or words used to authenticate access to a digital system.
⚫ Password ensures that unauthorized users do not access the computer.
⚫ Password secures the data by protecting the data from unauthorized access.

⚫ To protect a system from unauthorized access, password should be kept in a system which provides
security to the system.
⚫ A password should be difficult to guess and determine and should be changed
regularly andmemorized.

Any four criteria for strong password are:


a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
b) Do not keep word as password that is currently popular.
c) Keep a password with mixture of alphabet and numbers which is difficult to guess.
d) Keep changing your password regularly.

Biometric
⚫ Biometrics are physical or behavioral human characteristics that can be used to digitally
identify aperson to grant access to systems, devices or data.
⚫ Examples of these biometric identifiers are fingerprints, facial patterns and voice.
⚫ Computers and devices can unlock automatically when they detect the fingerprints of an
approveduser.
⚫ Apple's Face ID (introduced with the iPhone X) authenticates users by facial recognition.
21
Edited by: Krishna Sir. Developed by: Deepak Sir.
⚫ Retinal scanners, which require an eye scan to allow authorized individuals to access secure areas.

Firewall
⚫ A network security device, either hardware or software that monitors and filters all
incoming andoutgoing network traffic based on an organization’s previously established
security policies.
⚫ Firewall blocks unwanted traffic as well as malicious software from infecting your computer.
⚫ Firewalls helps to prevent unauthorized access.
⚫ Software firewalls are designed to protect a computer by blocking certain programs from
sendingand receiving information from a local network or the Internet.
⚫ Hardware firewalls are found on most network routers and can be configured through the router
setup screen.

Cryptography
⚫ A technique of securing information and communications through use of codes so that only
those people for whom the information is intended can understand it and process it.
⚫ Thus, preventing unauthorized access to information.
⚫ The prefix “crypt” means “hidden” and suffix grapy means “writing”.
⚫ A message sent over the network is transformed into an unrecognizable encrypted message
known asdata encryption. At the receiving end, the received message is converted to its original
form known as decryption.
⚫ Cryptography is used to secure and protect data during communication.

Features of Cryptography
a) Confidentiality: Information can only be accessed by the person for whom it is intended
and noother person except him can access it.
b) Integrity: Information cannot be modified in storage or transition between sender and
intendedreceiver without any addition to information being detected.

c) Non-repudiation: The creator/sender of information cannot deny his or her intention to


sendinformation at later stage.
d) Authentication: The identities of sender and receiver are confirmed. As well as
destination/origin ofinformation is confirmed.
Encryption
⚫ Encryption is a process which transforms the original information into an unrecognizable form.
⚫ This new form of the message is entirely different from the original message.
⚫ That's why a hacker is not able to read the data as senders use an encryption algorithm.
⚫ Encryption is usually done using key algorithms.
⚫ Data is encrypted to make it safe from stealing. However, many known companies also encrypt
datato keep their trade secret from their competitors.

Decryption
⚫ Decryption is a process of converting encoded/encrypted data in a form that is
readable andunderstood by a human or a computer.
⚫ This method is performed by un-encrypting the text manually or by using keys used to encrypt the
original data.

22
Edited by: Krishna Sir. Developed by: Deepak Sir.
KEY DIFFERENCE BETWEEN ENCRYPTION AND DECRYPTION
a) Encryption is a process of converting normal data into an unreadable form whereas
Decryption is amethod of converting the unreadable/coded data into its original form.
b) Encryption is done by the person who is sending the data to the destination, but the
decryption isdone at the person who is receiving the data.
c) The same algorithm with the same key is used for both the encryption-decryption processes.

Antivirus software
⚫ Antivirus software is software designed to detect and remove virus from computer
system andensures virus free environment.
⚫ E.g., Kaspersky, NAV, MSAV, McAfee, NOD 32 etc.
⚫ Main use of antivirus is to protect computer from viruses and remove viruses that are
detected andalso protects data and programs from being corrupted.

Backup system
⚫ It is the system of copying data and programs into another location or creating a duplicate copy
of itin a secured place.
⚫ A copy of a file which is used in the event of the original file being corrupted.
⚫ Backup is vital to computer security system in order to save the data from being lost or damaged
dueto accidental or intentional harm. When data and software are lost or damaged, we can easily
recoverthrough backup.
⚫ These files are kept on hard disks, CDs and tapes and on the internet.

Hardware Security
⚫ The security given to the machine and peripheral hardware from theft and from electronic
intrusion(interruption) and damage.

⚫ Different hardware security measures are:


a) Regular Maintenance
b) Insurance
c) Dust free environment
d) Protection from Fire
e) Protection from Thief
f) Air condition system
g) Power Protection device (Volt guard, Spike guard, UPS)

Regular Maintenance
⚫ Computer system need regular maintenance to keep the computer hardware in good
working condition and it also helps to find out problems in hardware and correct the
problems before theycause several damages.
⚫ The hardware components of computer systems are very delicate and gets damaged if proper care
is
not taken.
⚫ E.g., CPU cooler not working properly and if we don’t repair or replace on time then the
computersystem may get halted and can damage microprocessor.
⚫ Another E.g., Computer Hard disk which needs to be checked frequently in order to find errors and
keep in good condition.

23
Edited by: Krishna Sir. Developed by: Deepak Sir.
Insurance
⚫ A means of protection from financial loss.
⚫ If a computer is damaged or stolen or any kind of harm done then we can claim for the
insuranceamount and get the economic support.

Dust Free Environment


⚫ Dust particles can cause the failure of hardware components.
⚫ Computer room should be absolutely free from dust and air pollution.
⚫ Use dust cover to prevent our computer from dust particles.

Protection from Fire


⚫ Due to faulty wiring, loose connection, smoking in the computer room and overload on power
socketcan cause fire in a room.
⚫ Using fire alarms, fire doors, fire detectors and fire extinguishers can minimize the damage of
hardware components and loss of information from fire.

Protection from Theft


⚫ Use of Lighting system, Grills on the windows, Safety Lock on the doors, Alarms, CCTV
(ClosedCircuit Television) helps to protect from thieves.

Air Condition System


⚫ A system for controlling the temperature and humidity (wetness) of the air
⚫ Maintains suitable temperature or humidity in the computer room.
⚫ Room Temperature should be maintained between 210C to 240C.

Power Protection Device


⚫ An electric device that controls electric voltage and provides enough backup to the computer
systemwhen there is power failure.
⚫ Computer needs 220 volts to 240 volts constantly.
⚫ Some common power protection devices are:
a) UPS
b) Volt Guard
c) CVT
d) Stabilizer
e) Spike Guard
f) Surge Suppressor
Why Power Protection Device needed?
⚫ To protect computer system from damage, expensive data loss and unnecessary down time (is
out ofaction or unavailable for use).

Volt Guard
⚫ A power protection device that provides constant output voltage to the computer system in
case ofhigh input voltage coming from the source.

UPS
⚫ UPS is a battery supported power protection device which controls the electric voltage and
suppliesclean and continuous power to the computer system even during power failures.

24
Edited by: Krishna Sir. Developed by: Deepak Sir.
⚫ The importance of UPS in computer security system is that it controls fluctuation of electric
voltage
and provides enough backup electric power to the computer system when there is power failure.

Spike Guard
⚫ A device designed to protect electrical devices from voltage spikes.
⚫ Automatically maintains a constant voltage level.

1.4 E-Commerce
E-Commerce

⚫ Ecommerce, also known as electronic commerce or internet commerce, refers to the


buying andselling of goods or services using the internet.

⚫ any kind of commercial transaction that is facilitated through the internet.

⚫ E.g., Amazon, Flipkart, eBay, sastodeal, daraz etc.

⚫ Almost anything can be purchased through e-commerce today.

Types of Ecommerce Models

a) Business to Consumer (B2C):


When a business sells a good or service to an individual consumer (e.g., You buy a pair of shoes
froman online retailer).

b) Business to Business (B2B):


When a business sells a good or service to another business (e.g., A business sells
software-as-a-service for other businesses to use)

c) Consumer to Consumer (C2C):


When a consumer sells a good or service to another consumer (e.g., You sell your old
furniture on hamrobazar to another consumer).

d) Consumer to Business (C2B):


When a consumer sells their own products or services to a business or organization (e.g., An
influencer offers exposure to their online audience in exchange for a fee, or a photographer
licensestheir photo for a business to use).

Advantages of E-commerce

a) It makes buying/selling possible 24/7.

b) It makes buying selling procedure faster, as well as easy to find products.

c) You can set up an online business even by sitting at home if you have the required
software, adevice, and the internet.

d) There are no geographical boundaries for e-business. Anyone can order anything from
25
Edited by: Krishna Sir. Developed by: Deepak Sir.
anywhere atany time.

e) Higher quality of services and lower operational costs.

Disadvantages of E-commerce

a) No guarantee of product quality.

b) Customer loyalty becomes a bigger issue as there is a minimal direct customer-company


interaction.

c) Technical failure may affect the business system.

d) Anyone can start an online business, which sometimes leads to scam and phishing sites.

e) There are many hackers who look for opportunities and thus an ecommerce site, service
paymentgateways all are always prone (liable to suffer from) attack.

M-Commerce / Mobile Commerce

⚫ The online transactions through the wireless handheld devices such as mobile phone,
laptop,palmtop, tablet, or any other personal digital assistant.

⚫ It does not require the user to sit at the computer that is plugged in and perform the
commercialtransactions.

⚫ People can perform several functions such as pay bills, buy and sell goods and services,
access emails, book movie tickets, make railway reservations, order books, read and watch
the news, etc.

⚫ The term itself was coined in 1997 by Kevin Duffy.

Advantages of M-Commerce

⚫ Easy To Use - It is the easiest purchase where without any disturbance you can search all the
onlinesites and choose the best among the one.

⚫ More Access To User Data - Once a purchase is been done from a store user’s information
getsstored. Which can be used in the future by sending about the deals and offers to the
users.

⚫ Time-Saving - Instead of physically going to the store’s users can easily select and purchase
anyproduct of any brand and place they want. Saving both the time and energy of the user.

⚫ Global Customer Base - If an individual has a mobile device and internet connection then they
arethe potential customer to any platform. you can choose, select and purchase any product
from anyplace you want.

⚫ Easy Inventory Management - You can manage and maintain your inventory levels regardless of
howsmall it is. Saving all the product database you can easily know what product is available or
not.

Disadvantages of M-commerce

⚫ Smartphone Limitation - No matter how useful it is without the use of smartphone user can

26
Edited by: Krishna Sir. Developed by: Deepak Sir.
neveraccess and navigate the data properly.

⚫ Connectivity - Without accessing the internet connections user will not be able to receive any
data topurchase.

⚫ Need Faithful Shipment Company - You should tie-up with a good shipping company for
deliveringyour products on time to the users.

⚫ Security - Entering all the details of your bank and security codes. Which sometimes can harm
you,also syncing of data or connecting to unknown Wi-Fi networks may appear risky by
hacking or bypassing your information to others.

Online Payment

⚫ Making transactions or paying for goods and services through an electronic medium, without
the useof checks or cash.

⚫ It helps in sending and receiving the money online, buy air tickets, pay utility bills, purchase
mobilerecharge cards, pay school college bills, internet bills, subscribe newspaper and
magazines online, etc.

⚫ E.g., eSewa Nepal, iPay, Khalti, e-banking, etc.

Advantages of online payment

a) Low labor costs - Since online payments are usually automatic, they have lower labor costs
thanmanual payment methods, such as cheque, money order and cash.

b) Convenience for online sales - Online payment methods allow conveniently selling
goods andservices online.

c) Automatic - Online payments can be automatic, which can be convenient for you and
yourcustomers.

d) Fast transaction speed - Online transactions quickly provide feedback to you and your customers.

e) Low risk of theft - After processing delays, online payments generally go straight into your
bankaccount, so they have a low risk of theft.

Disadvantages of online payment

a) Service fees - Payment gateways and third-party payment processors charge service fees.

b) Inconvenient for offline sales - Online payment methods are inconvenient for offline sales.

c) Vulnerability to cybercriminals - Cybercriminals can disable online payment methods or


exploitthem to steal people’s money or information.

d) Reliance on telecommunication infrastructure - Internet and server problems can disable


27
Edited by: Krishna Sir. Developed by: Deepak Sir.
onlinepayment methods.

e) Technical problems - Online payment methods can go down due to technical problems.

1.5 Contemporary Technology


What is Cloud Computing?
Cloud Computing is the use of hardware and software to deliver a service over a network (typically the
Internet). With cloud computing, users can access files and use applications from any device that can
access the Internet.

Examples of Cloud Computing


a) Drop box, Face book, Gmail
b) Google Drive, Apple iCloud
c) Google Photos, Online Photoshop
d) Word, Excel, PowerPoint
e) Online gaming
f) YouTube

Uses of Cloud Computing


a) Store, backup and recovers data
b) Host websites and blogs
c) Make communication and send emails
d) Deliver on demand software services
e) Upload/download audio / video

Advantages of Cloud Computing


a) Excellent accessibility - Cloud allows us to quickly and easily access store information
anywhere,anytime in the whole world, using an internet connection.
b) Backup and Restore Data - Once the data is stored in the cloud, it is easier to get back-up and
restorethat data using the cloud.
c) Low Maintenance Cost - Cloud computing reduces both hardware and software maintenance
costsfor organizations.
d) Mobility - Cloud computing allows us to easily access all cloud data via mobile.
e) Data Security - Data security is one of the biggest advantages of cloud computing. Data is
securelystored and handled.

Disadvantages of Cloud Computing


a) Internet Connectivity - If you do not have good internet connectivity, you cannot access these data.
b) Security - While sending the data on the cloud, there may be a chance that your organization's
information is hacked by Hackers.
c) Downtime: The cloud providers may sometimes face technical outages that can happen due to
various reasons, such as loss of power, low Internet connectivity, data centers going out of service
for maintenance, etc. This can lead to a temporary downtime in the cloud service.
d) Lacks of Support - Cloud computing companies fail to provide proper support to the customers.
Moreover, they want their user to depend on FAQs or online help, which can be a tedious job for
non-technical persons.
28
Edited by: Krishna Sir. Developed by: Deepak Sir.
e) Vendor lock-in: When in need to migrate from one cloud platform to another, a company might
face some serious challenges because of the differences between vendor platforms. During
migration, you might end up facing compatibility, interoperability and support issues.

Artificial intelligence
Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent
machines that work and reacts like humans. John McCarthy coined the term Artificial Intelligence in
theyear 1955.
Applications of AI
a) Gaming − AI plays crucial role in strategic games such as chess, poker, tic-tac-toe, etc.,
wheremachine can think of large number of possible positions.
b) Natural Language Processing − It is possible to interact with the computer that understands
naturallanguage spoken by humans.
c) Expert Systems − There are some applications which integrate machine, software, and special
information to impart reasoning and advising. They provide explanation and advice to the
users. (For example, some expert systems help doctors diagnose diseases based on symptoms)
d) Vision Systems − These systems understand the visual input on the computer. For example,
Policeuse computer software that can recognize the face of criminal with the stored portrait
made by forensic artist.
e) Intelligent Robots − Robots are able to perform the tasks given by a human. They have
sensors to detect physical data from the real world such as light, heat, temperature,
movement, sound, bump,and pressure. They are capable of learning from their mistakes and
they can adapt to the new environment.
Examples of AI
a) Siri / Alexa- both use AI to help your complete tasks or answer questions on your mobile devices.
b) Netflix / YouTube - uses advanced predictive technology to suggest shows based on your
viewingpreferences or rating.
c) Facebook Feed - filter content that is most likely to be of interest to the particular Facebook
user andpredict what they will want to see.
Virtual Reality
An artificial environment created with computer hardware and software and presented to the user in
such away that it appears and feels like a real environment.
To "enter" a virtual reality, a user wears special gloves, earphones, and goggles, all of which
receivetheir input from the computer system.
In this way, at least three of the five senses are controlled by the computer.
In addition to feeding sensory input to the user, the devices also monitor the user's actions.
The goggles, for example, track how the eyes move and respond accordingly by sending new video input.

Application areas of VR

a) It can be used in medical studies to enable students to know the human body structure.
b) It can be used in scientific research laboratories so that scientist can easily research on a
specifictopic.
c) It can be used in entertainment like in games and movies to make the gaming experience more
29
Edited by: Krishna Sir. Developed by: Deepak Sir.
realand to allow individual to experience adventures under extreme conditions.
d) It can be used in driving schools as it gives a real look of roads and traffic.
e) It can be used in military training for the soldiers to get familiar with different areas in the
battlefield.
E-Governance
a) The use of ICT and its application by the government for the provision of information and
publicservices to the people.
b) The basic purpose of e-governance is to simplify processes for all, i.e., government, citizens,
businesses, etc. at National, State and local levels.
c) It is the use of electronic means, to promote good governance.
d) An ordinary citizen gets the government facility through the internet.

Models of E-Governance
a) Government-to-Citizen(G2C)
b) Government-to-business (G2B)
c) Government-to-Government (G2G)
d) Government-to-Employee (G2E)

Government-to-Citizen(G2C)
a) G2C-is transaction between the government to citizens.
b) It helps the ordinary people to reduce the time and cost to conduct a transaction.
c) A citizen can have access to the services anytime from anywhere.
d) It includes online registration of birth/ death/marriage certificates, filling of income taxes,
electricitybills, license renewals etc.

Government-to-business (G2B)
a) G2B it is the transaction between government to business.
b) It is efficient for both government and business organizations.
c) It enhances the efficiency and quality of communication and transparency of government projects.
d) It includes online application forms, renewing licenses, registration etc.

Government-to-Government (G2G)
a) G2G it is the transaction between government to government.
b) Government agencies can share the same database using online communication.
c) It can communicate with global government and local government as well.
d) It provides safe and secure inter-relationship between domestic or foreign government.

Government-to-Employee (G2E)
30
Edited by: Krishna Sir. Developed by: Deepak Sir.
a) G2E it is the transaction between government to employee.
b) G2E aims to bring employees together and improvise knowledge sharing.
c) G2E provides online facilities to the employees like applying for leave, reviewing salary
paymentrecord and checking the balance of holiday.
d) G2E is also the relationship between employees, government institutions, and their management.

Advantages of E-Governance
a) Speed - Electronic technologies make communication better, and faster. It will take very less
time for any policy, or scheme to reach to the people.
b) Transparency - The use of e-governance helps make all functions of the business transparent.
All the information of each and every policy will be directly available to the citizens.
c) Accountability - Accountability is answerability to the people by the government. Once the
transparency is achieved the government will automatically become accountable.
d) Reduction In Cost - A lot the Government expenditure goes towards the cost of buying stationery
forofficial purposes. However, replacing them with smart phones and the internet can saves crores
of money in expenses every year.
Disadvantages of E-Governance
a) Loss of Interpersonal Communication - Interpersonal communication is an aspect of
communicationthat many people consider vital.
b) High Setup Cost and Technical Difficulties - the setup cost is very high and the machines have to
be regularly maintained. Often, computers and internet can also break down and halts
governmental work and services.
c) Illiteracy - People who doesn’t know how to operate computers and smart phones will be very
difficult for them to access and understand.
d) Cybercrime/Leakage of Personal Information - There is always the risk of private data of citizens
stored in government serves being stolen. Cybercrime is a serious issue; a breach of data can
make the public lose confidence in the Government’s ability.

Mobile Computing
⚫ A technology that allows transmission of data, voice and video via a computer or any other
wirelessenabled device without having to be connected to a fixed physical link.
⚫ A variety of devices that allow people to access data and information from wherever they are.

⚫ The main concept involves −


a) Mobile communication - protocols, services, bandwidth, and portals necessary to
facilitateand support the stated services.
b) Mobile hardware - portable laptops, smart phones, tablet Pc's, Personal Digital Assistants.
c) Mobile software - actual program that runs on the mobile hardware. E.g. Operating System
Benefits of Mobile Computing
a) Connectivity: You can stay connected to all sources at all times.
b) Social Engagement: You can interact with a variety of users via the Internet.

31
Edited by: Krishna Sir. Developed by: Deepak Sir.
c) Personalization: You can modify your mobile computing to your individual needs.
Features of Mobile Computing
a) Easy to handle and carry these small devices.
b) Ability to share data and collaboration between users.
c) Data can be transferred easily between users.
d) People can work from the comfort of any location they wish to as long as the connection and the
security concerns are properly factored.
e) The presence of high-speed connections has also promoted the use of mobile computing.
The Internet of Things (IoT)
⚫ A technology that connects all electronic devices together and prompts them to exchange
information without any human intervention.
⚫ A system of interrelated computing devices, mechanical and digital machines, objects, animals
or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a
network without requiring human-to-human or human-to-computer interaction.
⚫ The term "The Internet of Things" was coined by Kevin Ashton in a presentation to Proctor &
Gamble in 1999.
Components of IoT
a) Sensors/Devices - Sensors/Devices collect data from their environment. e.g., Our phone is a
device that has multiple sensors like GPS, camera, Motion etc. where data is being collected
based on surroundings
b) Connectivity to Cloud - The sensors/devices can be connected to the cloud and store, through a
variety of methods including: Bluetooth, Wi-Fi, Cellular etc.
c) Data Processing - Software perform data processing on cloud data to get an analyzed or computed
data. e.g., Computing the temperature within an acceptable range.
d) User Interface - The analyzed or computed data is made useful to the end user via and alert (email,
text, notification). e.g., an alert message when temperature is beyond the acceptable range.
Applications of Internet of Things (IoT)
a) Smart home - Smart home encapsulates the connectivity inside your homes. It includes smoke
detectors, home appliances, light bulbs, windows, door locks, etc.
b) Smart City - Smart city offers all types of use cases which include traffic management to
waterdistribution, waste management, etc.
c) Parking Sensors - IOT technology helps users to identify the real-time availability of
parkingspaces on their phone.
d) Connected Cars - IOT helps automobile companies handle billing, parking, insurance, and
otherrelated stuff automatically.
e) Activity Trackers - Helps you to capture heart rate pattern, calorie expenditure, activity
levels,and skin temperature on your wrist.
Advantage of IOT
a) Accessing information is easy; you can control a device that is miles apart in real time.
b) Communication between the connected devices becomes more transparent and easier.
c) Transferring data packets over a network reduces both time and money.
32
Edited by: Krishna Sir. Developed by: Deepak Sir.
d) Automation is the need of the hour; IOT reduces human intervention and efficiency of services
Disadvantage of IOT
a) There is a huge risk of leakage of confidential data, when sent over a network.
b) Due to its complex network, a single loophole can put the entire system down, affecting
everyone.
c) With automation, the need of human labor reduces drastically.
d) Today’s lifestyle is technology driven; we depend on the technology for the tiniest of tasks.

E-learning
E-learning is a new concept of delivering digital contents in learner-oriented environment using
informationand communication technology (ICT). Delivery of the digital content is the main characteristic
of e-learning.
Advantages of e-learning:
a) It is easy for customization.
b) There is no any geographical limitation for learning.
c) It is quite favorable for learner as it can happen at any time and anywhere.
d) It reduces or eliminates travel costs to attend learning events.
e) It reduces or eliminates need for classroom/instructor infrastructure.
Disadvantages of e-learning:
a) Learners with low motivation or bad study habits may fall behind
b) Students may feel isolated from the instructor and classmates
c) Instructor may not always be available when students are studying or need help
d) Slow Internet connections or older computers may make accessing course materials frustrating
e) Managing computer files and online learning software can sometimes seem complex for
studentswith beginner-level computer skills

E-Banking
⚫ to conduct financial transactions via the Internet.
⚫ funds transfer, payment of bills, opening bank accounts online, and much more.
⚫ consumers aren't required to visit a bank branch in order to complete most of their basic
bankingtransactions.
⚫ A customer needs a device, an Internet connection, and a bank card to register. Once
registered, theconsumer sets up a password to begin using the service.
Features of E-Banking
a) Faster Transactions - People don’t need to wait in queue to transfer their funds or pay off their
bills;they can easily do it through their device. It saves the time of customers as they can easily
access their account with the help of their device.
b) Lowers Transaction Cost - Whole transactions are done online over the internet. It has reduced
the manpower requirements as workload is reduced. It has also reduced the paperwork in
organizations as all transactions are recorded digitally.
c) Provides 24×7 Service - Customers can easily access their account anytime & from anywhere
33
Edited by: Krishna Sir. Developed by: Deepak Sir.
with no limitations. It provides convenience to the customers as they can perform transactions as
per theirwish.
d) Reduces The Chances of Error - E-banking system works fully automated over the internet. All
transactions are recorded & stored digitally. There is no need to manually maintain each & every
record in books of account. So, the chances of human error are minimized.
e) Develops Loyalty in Customers - Customers are able to get a user-friendly interface from the
banking website. They are able to avail services any time even from their home comfort. This
develops a sense of loyalty among customers when they are happy with the services of their banks.
Internet Banking
⚫ a facility offered by banks and financial institutions that allow customers to use banking
servicesover the internet.
⚫ Customers need not visit their bank’s branch office to avail each and every small service.
⚫ Use PC or laptop and internet connection to use this facility.
⚫ Kumari Bank was the initiator of internet banking in Nepal. It started its e-banking services in
2002.

Features of Internet Banking


a) The customer can view account statements.
b) The customer can check the history of the transactions for a given period by the concerned bank.
c) Bank, statements, various types of forms, applications can be downloaded.
d) The customer can transfer funds, pay any kind of bill, recharge mobiles, DTH connections, etc.
e) The customer can buy and sell on e-commerce platforms.

Advantages of Internet Banking


a) The customers get permanent access to his/her bank anytime and anywhere.
b) Transactions are safe and highly secure.

c) Immediate funds transfer helps the user in time of urgent need.


d) It saves valuable time of the users.

Disadvantages of Internet Banking


a) Internet Requirement - An uninterrupted internet connection is a foremost requirement to use
internet banking services. If you do not have access to the internet, you cannot make use of any
facilities offered online.
b) Transaction Security: No matter how much precautions banks take to provide a secure network;
online banking transactions are still susceptible to hackers.
c) Difficult for Beginners: if there is nobody who can explain them on how internet banking works
and the process flow of how to go about it. It will be very difficult for inexperienced beginners
to figure it out for themselves.
34
Edited by: Krishna Sir. Developed by: Deepak Sir.
d) Securing Password: If the password is revealed to others, they may utilize the information to
devise some fraud. Also, the chosen password must comply with the rules stated by the banks.
Individuals must change the password frequently to avoid password theft which can be a hassle
to remember by the account holder himself.
Mobile Banking
a) Mobile banking is the act of making financial transactions on a mobile device (cell phone, tablet,
etc.).
b) Download Mobile App or SMS system
c) Inquiry based transactions such as balance inquiry, transaction history, and transaction alert.
d) Request for banking services such as cheque book request, statement request, cheque stop request
e) Other transactions such as fund transfer, utility payment, merchant payment, third party payment

1.6 Number system


Number system
Number system is a method of expressing numbers by means of symbols where each symbol receives a
specific value or position.

Decimal number system


The number system of base ten of different digits to represent different values is known as decimal number
system. The decimal number system consists of ten digits from 0 to 9.

Binary number system


The number system of base two that represents values is known as binary number system. The binary
number system consists of two digits 0 and 1.

Octal number system


The number system that uses eight different digits to represent different values is known as octal
numbersystem. The octal number system has eight digits starting from 0 to 7.

Hexa-decimal number system


The number system with base 16 is called hexa-decimal number system. The hexa-decimal number
systemconsists of sixteen digits from 0 to 9 and A to F to represent values ten to fifteen.

2.1 Database Management System


Data
Data can be numbers, letters or symbols representing facts and figures which may or may not give any
sense.
E.g.: Ram, student, 20, etc.
Information
Information is an organized collection of related data, which gives a complete
sense.“Ram is a student. He is 20 years old.”, is information that gives a
complete sense.

35
Edited by: Krishna Sir. Developed by: Deepak Sir.
Database
A database is an organized collection of related information that can be used for different purpose so
thatit can easily be accessed, managed, and updated.
E.g., Dictionary, Marks Ledger, Telephone Directory etc.

DBMS (Database Management System)


DBMS is a software which helps to extract, view and manipulate data in an organized
way.In DBMS, data can be accessed, managed and updated easily.
E.g.: MS-Access, Oracle, Fox pro, dbase etc.

Computerized Database
a) It can store large volume of data. It is very fast to find a specific record.
b) Data can be sorted into ascending or descending order on multiple criteria.
c) The database can be kept secure by use of passwords.
d) We can search data very easily.
e) Modification is very easy in comparison of manual database.

Non-Computerized Database
a) It is limited by physical storage available.
b) It can take a while to manually search through all of the records.
c) Difficult to sort data on more than one criterion.
d) The only security would be locking up the records.

RDBMS (Relational Database Management System)


RDBMS is a database management system that is based on the relation model in which data is
stored inthe form of tables and the relationship among the data is also stored in the form of tables.
E.g.: SQL, MS-Access, Oracle, etc.

Importance / Advantages of DBMS / Computerized database


a) It controls data redundancy which means duplication of data.
b) It allows sharing the existing data by different programs.
c) Large volume of data can be stored and updated easily.
d) It provides high security of data as well as maintains accurate database.

MS-Access
MS-Access is a relational database management system developed by Microsoft Corporation which
isused to store and manipulates large volume of data in the form of table.

Features of MS-Access
a) It provides the flexible ways to add, edit, delete and display the related data.
b) Queries help to view, change and analyze the data indifferent ways.
c) Forms are used for viewing and editing the information.
d) Reports are used for summarizing and printing the data.

Objects of MS-Access
a) Table
36
Edited by: Krishna Sir. Developed by: Deepak Sir.
b) Form
c) Query
d) Report

Table
Table is an object of MS-Access that stores large volume of data in the form of rows and
columns.The different ways to create table are:
i) Design view
ii) Using wizard
iii) Entering data

Importance of table
a) Different properties of a field can be set in a table.
b) It provides options for primary key which helps to make data consistent.

Record
Record is complete set of information. Record is a collection of multiple related fields in a row
whichgives complete information about a person or thing. E.g.: Ram Chabahil 4468790

Field
Field is a small unit of information. A column in a table is called field, and it contains a specific
piece ofinformation within a record. E.g.: Name, Address, Telephone

Primary key
A key that uniquely identifies each record in a database is primary key. It is needed because it neither
accepts duplicate values now null values.

Uses of Primary key


i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.

Purpose of Primary key


A primary key prevents duplicate records from being entered in the table and is used to control the
orderin which records display in the table. This makes it faster for databases to locate records in the
table andto process other operations. The primary key is also used to create a link between tables in
a database.

Importance of Primary Key


a) It does not allow duplicate data.
b) It does not allow null value

Composite key
The group of primary keys that consists of two or more attributes is called composite key.

Foreign Key
Foreign key is a unique field or combination of fields in linked table whose value matches
with aprimary key in another table.

37
Edited by: Krishna Sir. Developed by: Deepak Sir.
Data Redundancy
Data redundancy means repetition of same piece of data in a database in more than one location.
Dataredundancy can be controlled in MS-Access by normalization of database.

Data type
Data type is an attribute for a field that determines what type of data it can
contain.Any four data types of MS-Access are:
i) Text
ii) Number
iii) Memo
iv) Currency

While designing table structure which data types are suitable to store information about teacher’s
name, address, salary and date of birth.
Teacher’s name
- TextAddress –
Text
Salary – Currency
Date of birth – Date/Time

Identify a record, field and value from the following table structure. [SQE 2074]
Roll Name Marks
1 Kopila 87
2 Rabin Rana 56

Ans: Record = 1 Kopila 87, 2 Prabin Rana 56


Field =
Roll,Name,Marks
Value = 87, 56

What happens when we enter text in a numeric field?


Ans: If we enter text in a numeric field then it displays the errors.

Text
It is used for storing text or combination of text and numbers. It can store up to 255 characters.

Memo
It is used for storing lengthy text and numbers. It can store up to 65,535 characters.

Field properties
The four types of field properties of MS-Access are:
i) Caption ii) Format iii) Validation rule iv) Input mask

Input mask
Input mask is a field property that controls the value of a record and sets in a specific format.

Caption
Caption is a field property which displays an alternate name for the field to make the field name more
explanatory. It can contain up to 2048 characters.

Validation rule:
38
Edited by: Krishna Sir. Developed by: Deepak Sir.
A field property which enables to limit values that can be accepted into a field is known as
validationrule.

Validation text
A field property which allows type text to be displayed if the user input value is prohibited by the
validation rule is known as validation text.

Field size
Field size is a field property that specifies the maximum number of characters allowed in the field.

Format
The use of „Format‟ field property is to display data in a different format.

Lookup Wizard
The use of Lookup Wizard is that it creates a field that allows choosing a value from another table
orfrom a list of values by using a list box or combo box.

Hyperlink
The use of Hyperlink is that it stores hyper like addresses like email addresses, websites, database objects
Indexing
Indexing is one of the important properties of database that speed up searching and storing of
recordsusing on the field.

Relationship
Relationship is an association among several entities (table). Its types are:
i) One to one relationship
ii) One to many
iii) Many to many relationship

Sorting
Sorting is the process of arranging the record in ascending or descending order according to a given field
orfields. Sorted data is easier to handle than unsorted data.

Advantages of sorting:
i) It helps to find specific information quickly.
ii) It helps to arrange data in alphabetical order.

Filtering
Filtering is an option that selects the required records and displays the result.

Query
Query is an object of MS-Access which extracts and arranges information from a table in a
manner thatis specified.
The different types of queries are:
i) Select query
ii) Action query
In action query, we have update query, append query, delete query and make-table query.

Select query
39
Edited by: Krishna Sir. Developed by: Deepak Sir.
❖ A select query is the most common category and is used for extracting specific information
from oneor more tables in a database. It cannot make changes in tales.
❖ We use select query to group records and perform calculations on field values in the groups
such assum, count, average, minimum and maximum.

Action query
Action query is a query which makes changes to many records in just one operation.

Update query
Update query is a type of action query which make global changes to a group of records in one or
moretables.

Append query
The use of append query is to add a group of records at the end from one or more tables.

Delete Query
A delete query is an action query that deletes a set of records according to criteria that is specified.

Insert Query
❖ Insert queries can be used to insert records from one table into another table, or from a query
into atable.
❖ The records inserted will be appended into that table (rather than replace the previous records).

Advantages of query
a) We can filer, perform calculations and summarize data.
b) Large volume of records can be updated or deleted at a same time.
c) It retrieves and display records including some fields or all the fields of a table or multiple
linkedtables.

Purposes of query in MS-Access


a) To view records including some fields or all the fields of a table or multiple linked tables.
b) To perform mathematical calculation of a data.
c) To sort the records on the basis of one or more key fields.
d) To perform mass update, delete or append new records to a table.

Form
❖ Form is an object of MS-Access which provides graphical interface to enter data into the
tables ormultiple linked tables.
❖ Forms are usually displayed on the screen.
❖ Forms generally provide a detailed took at records and usually for the people who actually work
withthe database.
Methods to create a form are:
i) By using auto forms features.
ii) By using the form wizard features.
iii) By using your own in design view.
Importance of Form.
a) It provides an interactive platform for input of data into the database.
b) It helps to display data in more presentable form than a datasheet.
c) It gives a separate platform to handle data.

Report
❖ Report is an object of MS-Access which displays the output in an effective way to present the
data ina printed format.

40
Edited by: Krishna Sir. Developed by: Deepak Sir.
❖ Reports can be previewed on the screen, but they are usually printed.
❖ Reports are often used to group and summarize data, and are often for the people who don’t
workwith the database but who use its information for other business task.
❖ The data sources for report are table and
query.The methods of creating report are:
i) Using design view
ii) Using report wizard

Why is Report created?


Report is created to print documents according to user’s specifications of the summarized information
through query or table.

Importance of report
a) It helps to prepare well formatted output.
b) It displays the information the way we want to view it.
c) It presents the information retrieved through queries or tables.
It presents the information in designed layouts by adding necessary titles, setting font color or fontsize, etc.

3.1 Modular Programming


1. Modular programming
Modular programming is a technique used to divide program into many small, manageable,
logical andfunctional modules or blocks.

2. QBASIC is called Modular Programming


QBasic is called modular programming because it divides program into many small, manageable,
logicaland functional modules or blocks.

3. Advantages of modular programming

i) Different programmers can design different program modules independently, which is


required in alarge and complex program.
ii) It is easy to design code and test the program modules independently.
iii) It is possible to use a single module in different places which reduces program codes.
4. Main module
The top-level controlling section or the entry point in modular programming is called main module.

5. Sub module
Module is a block of statement that solves a particular problem. Sub module is a program which is
written under the main module. A program may have one or more sub modules under main module.

6. Procedure
Procedure is a block of statements that solves a particular program.
Procedure is a section of code which performs one or more specific tasks and can be accessed from
remote location.
There are two types of procedure – SUB Procedure and FUNCTION procedure

7. SUB procedure
A SUB procedure is a small, logical and manageable functional part of program which performs
specific task and does not return any value. SUB-procedure is called by CALL statement. SUB-

41
Edited by: Krishna Sir. Developed by: Deepak Sir.
procedure’s namedoes not accept data type symbol because it does not need to return a value.

8. FUNCTION procedure
A FUNCTION procedure is a small, logical and manageable functional part of a program which
performs specific task and returns single value to the main program or calling module.
FUNCTION- procedure is called by statement and expression method. FUNCTION-procedure’s
name accepts datatype symbols such as $, %, #, &, etc. and it depends on the type of value to be
returned. E.g.: FUNCTION REV$ returns string.

9. String function
String function is used with string it returns string value.

10. Numeric function


Numeric function is used with number it returns numeric value.

11. Library functions


Library functions are built-in or readymade functions provided by QBASIC. E.g., MID$(), LEN (),
SQR () etc.

12. User defined function


Function which is defined by the user according to the need is called user defined function.

13. Parameters
Parameters are variables that will receive data (arguments value) sent to the procedures (SUB
programand FUNCTION). Formal parameters are called parameter.

14. Arguments
Arguments are the values that are sent to the procedures (SUB program and FUNCTION). Actual or
realparameters are called arguments.

15. CALL statement


The function of CALL statement is to transfer the control to another procedure.

16. DECLARE statement


The function of DECLARE statement is to declare procedure such as FUNCTION or SUB in modular
programming.

17. DIM SHARED statement


i) It makes variable accessible to all modules.
ii) It appears in main module/ program.

18. SHARED
It is used in the sub program to share the values of certain variables between main module and sub
program

19. COMMON SHARED


It is used in the main program to share variable list between main module and all sub programs. This
42
Edited by: Krishna Sir. Developed by: Deepak Sir.
statement is used to declared variable global.

20. Local Variable


Variables which are declared inside the procedure are called local variables. Local variables are
not visible to other modules or functions. Its value is protected from outside interference and has
no effecton the variables outside the procedures. Local variable can access only in its own
module.

21. Global Variable


Variables which are declared outside the procedure are called global variables. Global variables are
visible to other modules or functions. Its values can be accessed from any procedure or module.
Globalvariable can be access throughout the program.

22. Passing arguments by value


When arguments are passed by value it makes a duplicate copy of arguments and their values
(constants)are used directly in parameter. It doesn’t make any effect on values of variable which are
passed to a procedure even they are changed in the procedure. To pass the argument by value,
variable is enclosed inparenthesis.

23. Passing arguments by reference


When arguments are passed by reference the address of the variables are passed to the procedure. The
changes made in the procedure’s variable will affect the variables used at calling module. By default,
thevalue is passed by reference.

24. QBASIC Operators


Operators are special symbols that are meant for specific tasks or operators.
i) Arithmetic operators
ii) Relational operators
iii) Logical Operators
iv) String operator

25. Static variable


The variable which is declared by using the “STATIC” keyword is called static variable.

43
Edited by: Krishna Sir. Developed by: Deepak Sir.
3.2 Handling of Data Files
1. Data File
The file which contains data given by the user to the program and information provided by the
user to the computer is called data file. The different types of data file are:

a) Sequential Access files - A data file that stores a sequential data file containing name, address
of some people in the same order or in sequential order is called sequential access data file. It
takes long time to access if the data file contains a large volume of data. In sequential access
data file, we cannot change the existing entry or insert a new entry
b) Random access files

2. Program File
The file which contains a set of instructions that are needed for data processing is called program file.

3. Mode of data file


Mode of data file means opening a sequential file for one of the three modes of operation like
outputmode, input mode and append mode.

4. Modes of operation for opening a sequential file


a) Output Mode: It is used to create a new data file and write data in it. If the file already exists
itscurrent contents will be destroyed.
b) Input Mode: It is used to retrieve records or contents of existing data file.
c) Append Mode: It is used to add more records in existing file. If the specified file does not
existAPPEND mode creates it.

5. File number
The number assigned to a file in order to identify it during processing is called file number.

Write down the functions of:


6. OPEN statement: It opens a sequential file for one of the three possible operations (reading,
writing,appending).
7. WRITE statement: It sends one or more data items to the specified file. It inserts commas
between the data items. It encloses strings in double quotation marks.
8. PRINT#: It adds spaces between data items while storing data. It does not enclose strings in
doublequotation marks.
9. CLOSE statement: It closes one or all open files.
10. INPUT# statement: It reads data from the sequential data file.
11. EOF () function: It is used to test the end of records with in a file.
12. LINE INPUT statement: It reads the entire line or maximum 255 characters form the keyboard
or thesequential file.
13. INPUT$ function: It reads the specified number of characters form the data file.
14. NAME statement: The NAME statement renames a file on a diskette. Onlyfile name changes,
data and program line remain intact.

44
Edited by: Krishna Sir. Developed by: Deepak Sir.
15. KILL statement: The KILL statement deletes the file or files from the specified drive and
directory.
16. MKDIR statement: It creates a subdirectory which is used to manage files.
17. CHDIR statement: It allows QBASIC to change from one directory to another.

18. RMDIR statement: It is used to remove or delete only the subdirectoriesfrom a disk. It can
remove only empty subdirectories.
19. FILES statement: The FILES statement displays the files of the current sub directory or specified
subdirectory.
20. SHELL: The SHELL statement allows a program to run external programs or command line
statementsin Windows, MAC OS and Linux.
21. INT: It rounds and returns the largest integer less than or equal to a numericexpression.
22. PRINT: Display result on screen.
23. MID$ (): It is a string function that returns the specified number of characters from thespecified
location of string.
24. LEN (): Returns the number of characters in a string or the number of bytes required tostore a
variable.

4.1 C Language

Introduction of C

Structured programming
The programming that follows a top- down approach, on which developers separate the overall
programstructure into different sub selection, is called structured programming.

Advantages of structured programming


d) It is easy to design code and test the program modules independently
e) It is possible to use a single module in different in different places which reduces program codes.

C language
❖ C language is a structured programming language that divides program into many functions.
❖ Dennis Ritchie at Bell telephone laboratory developed C-language in 1972 AD.
❖ C is called middle level language because it combines elements of high-level language with
somefeatures of assembler.
❖ A high-level language tries to give programmer everything through built-in language.
❖ A low-level language forces programmer to define function directly from user level.
❖ C is mostly used to write system program such as operating system, language, compiler, text
editor,language interpreters, utilities, etc.
❖ C keywords are words which have special meaning for the compiler. Examples are: auto, break,
case,char etc.

45
Edited by: Krishna Sir. Developed by: Deepak Sir.
Data types used in C
Data type are means to identify the type data and associated operation of handling it.

Data types used in C language


a) char b) int c) float d) double

Data Modifiers
Data modifiers change the meaning of the basic data type to fit the various situations. The data
modifiersare: short int, unsigned int and long int

Characteristics of C language
a) It is a high-level language with some features of low-level language.
b) It is mostly used to prepare system software.
c) It is structured programming language with function procedure.
d) It has enough number of inbuilt functions and operators.
e) It is a small programming language which occupies less memory space.

Features of C- language
a) Simple and easy to use
b) Occupies less memory
c) C is the structured programming language.
d) C has powerful set of operators.
e) C is a high-level programming language.
f) C contains very smaller number of keywords

Advantages of C language
a) It is machine independent programming language
b) It is easy to learn and implemented C language
c) It can be implemented from mobile device to mainframe computers.
d) It is the mother of all modern programming language like python, pearl 5 and PHP

Disadvantages of C language
a) There is no runtime checking. It has poor errors detection system.
b) On large programs, it is hard to find errors.
c) There is no strict type checking int data type to float variables.
d) It does not support modern programming methodologies-oriented programming language.

Counter
Counter is a variable which controls the loop statement and provides the track to run the loop
statementin certain number times.

Accumulator
Accumulator is a numeric variable which accumulates the values in a loop statement.

Variable
A variable is a location in the memory of a computer whose value may change during the execution of
program.

46
Edited by: Krishna Sir. Developed by: Deepak Sir.
Constant
Constant are the values that do not change during the execution of a program.

Operator
Operators are special symbols that are meant for specific tasks or operators.
❖ The different types of C operators are: - Arithmetic operators, Assignment operators,
Unaryoperators, Relational operators, Logical operators and Conditional operators.
❖ Arithmetic operators are the operators that are used for manipulating arithmetic data and
performsarithmetic operation. The arithmetic operators are: - +, -, *, / and %
❖ The operator that operates on one operand variable or constant is called urinary operator. E.g., ++,
--

Logical Operator
The operators used for logical operation is called logical operator.

Selection statement.
Selection statement is a statement that allows the selective execution of statements depending on
thevalue of an an expression. The selection statements of C program are: - If statement and
Switch statement

Loop
A set of statements which is used to repeat a block of statements for a specific number of times or
aslong as the condition is true/false is called loop.

The looping statements provided by care: -For loop, while loop and do. .... while loop

Comparing C and QBASIC language


QBASIC C
It is a high-level language without feature of It is a high-level language with some features
low level language. of low-level language.
It is mostly used to design application It is mostly used to prepare system software.
software.
It supports structure programming with sub It is a structured programming language with
and function procedure. function procedure.
It is not case sensitive It is case sensitive
IBM PC version of BASIC has around 159 It has only 32 keywords.
keywords.

Input / Output using scanf and printf

❖ Input refers to accepting of data while output refers to the presentation of data.
❖ Input is accepted form keyboard and output is displayed to screen.
❖ Formatted input output functions accept or present the data in a particular format.
❖ printf() and scanf() allow user to format input output in desired format. printf() and scanf()
can beused to read any type of data (integer, real number, character etc.).

47
Edited by: Krishna Sir. Developed by: Deepak Sir.
Format String Meaning
%d Scan or print an integer as signed decimal number

%f Scan or print a floating-point number


%c To scan or print a character

%s To scan or print a character string.

Header File
❖ A header file is a file containing C declarations and macro definitions to be shared between
severalsource files.
❖ You request the use of a header file in your program by including it, with the C
preprocessingdirective „#include‟.
❖ The standard input-output header file, named stdio.h contains the definition of the
functions printf() and scanf(), which are used to display output on screen and to take input from
userrespectively.
❖ The conio.h header file used in C programming language contains functions for console
input/output.Some of its most commonly used functions are clrscr, getch, getche, kbhit etc.
They can be used to clear screen, change color of text and background, move text, check
whether a key is pressed or not and to perform other tasks.
❖ The main () function is like other functions. It also takes arguments, and returns some value. One
point we have to keep in mind that the program starts executing from this main () function. So,
the operating system calls this function. When some value is returned from main (), it is returned
to operating system.

❖ The void main () indicates that the main () function will not return any value, but the int
main ()indicates that the main () can return integer type data.
❖ When our program is simple, and it is not going to terminate before reaching the last line of the
code,or the code is error free, then we can use the void main ().
❖ But if we want to terminate the program using exit () method, then we have to return some
integervalues (zero or non-zero).
❖ In that situation, the void main () will not work. So it is good practice to use int main () over
the voidmain().

❖ getch() reads only single character from the screen


❖ getche() reads a single character from the keyboard and displays immediately on output
screenwithout waiting for enter key.

Decision Making Statement in C


Decision making statement is depending on the condition block need to be executed or not which
isdecided by condition.

If the condition is "true" statement block will be executed, if condition is "false" then statement block
willnot be executed.

48
Edited by: Krishna Sir. Developed by: Deepak Sir.
In this section we are discuss about if-then (if), if-then-else (if else), and switch statement. In C
languagethere are three types of decision-making statement.

• if

• if-else

• switch
if statement

if (expression)
statement;
or
if (expression)
{
Block of Statements
}
or
if (expression)
{
Block of statements;
}
else
{
Block of statements;
}
or
if (expression)
{
Block of statements;
}
else if(expression)
{
Block of statements;
}
else
{
Block of statements;
}

49
Edited by: Krishna Sir. Developed by: Deepak Sir.
switch statement:
The switch statement is much like a nested if .. else statement. Its mostly a matter of preference which you
use, switch statement can be slightly more efficient and easier to read.
Show Example
switch( expression )
{
case constant-expression1: statements1;
[case constant-expression2: statements2;]
[case constant-expression3: statements3;]
[default : statements4;]
}

Looping Statement in C
Looping statement are the statements execute one or more statement repeatedly several number of
times.In C programming language there are three types of loops; while, for and do-while.

Why uses loop?

When you need to execute a block of code several number of times then you need to use looping
conceptin C language.

Advantage with looping statement

• Reduce length of Code

• Take less memory space.

• Burden on the developer is reducing.

• Time consuming process to execute the program is reduced.

Types of Loops.

There are three type of Loops available in 'C' programming language.

• while loop

• for loop

• do..while

Differences between conditional and looping Statements.


Conditional statement executes only once in the program where as looping statements executes
repeatedlyseveral number of time.
50
Edited by: Krishna Sir. Developed by: Deepak Sir.
while loop
while loop can be addressed as an entry control loop. It is completed in 3 steps.

• Variable initialization. (e.g int x = 0;)


• condition (e.g while(x <= 10))
• Variable increment or decrement ( x++ or x-- or x = x + 2 )
Syntax :
variable initialization;
while(condition)
{
statements;
variable increment or decrement;
}

Note: If while loop condition never false then loop become infinite loop.

for loop
for loop is used to execute a set of statements repeatedly until a particular condition is satisfied. We can
sayit is an open-ended loop. General format is,

for(initialization; condition; increment/decrement)


{
statement-block;
}
In for loop we have exactly two semicolons, one after initialization and second after the condition. In this
loop we can have more than one initialization or increment/decrement, separated using comma operator.
Butit can have only one condition.
The for loop is executed as follows:

1. It first evaluates the initialization code.


2. Then it checks the condition expression.
3. If it is true, it executes the for-loop body.
4. Then it evaluates the increment/decrement condition and again follows from step 2.
5. When the condition expression becomes false, it exits the loop.
do while loop
In some situations, it is necessary to execute body of the loop before testing the condition. Such
situationscan be handled with the help of do-while loop. do statement evaluates the body of the loop
first and at theend, the condition is checked using while statement. It means that the body of the loop
will be executed atleast once, even though the starting condition inside while is initialized to be false.
General Syntax is,

do
{
.....
.....
}
while(condition)

51
Edited by: Krishna Sir. Developed by: Deepak Sir.
Computer
Science SEE
Model Question
Time: 1 hr. 30 min F.M: 50
Group “A” (10 Marks)
1. Answer the following questions in one sentence. [6×1=6]

a. What is internet?
Internet is an interconnection of several thousands of computers of different types belonging to the
various networks all over the world in order to share data and information.

b. What is browser?
Web browser is a computer program that access web pages and displays them on the user
computer.

c. Which is the logical data type of MS Access?


Yes/No is the logical data type of MS Access.

d. Which view is used to modify a table in MS-Access?


Design view is used to modify a table in MS-Access.

e. Which is the structure programming language?


C language is the structure programming language.

f. Write any two data types of C language.


int and char are any two data types of C language.

2. Write appropriate technical terms for the following: [2×1=2]


a. Crimes committed using electronic devices and cyber space. Cyber crime
b. A malicious program of computer that damages data and software. Computer virus

3. Write the full forms of the following: [2×1=2]


a. UTP: Uninterruptible Power Supply
b. WWW: World Wide Web
Group „B‟ [24
Marks]

4. Answer the following questions. [9×2=18]


a. What is computer network? Write any two disadvantages of it.
A computer network means two or more computers connected with each other to share data,
hardware, software and other resources.
Any two disadvantages of it are:
i. The sharing of information may leak the privacy of other clients.
ii. The networking cost is high

52
Edited by: Krishna Sir. Developed by: Deepak Sir.
b. What is cyber ethics? Write any two cyber ethics.
Cyber ethics can be defined as to follow the rules and regulation of computer technology and not
toharm other computer users knowingly or unknowingly.
Any two cyber ethics are:

i. You should not spread false and illegal information.


ii. You should not destroy, erase or edit personal or group records.

c. What is hardware security? Write the role of UPS in hardware security.


The security given to the machine and peripheral hardware from theft and from electronic
intrusion(interruption) and damage.
The role of UPS in hardware security system is that it controls fluctuation of electric voltage and
provides enough backup electric power to the computer system when there is power failure.

d. What is e-banking? Write any two uses of it.


E-banking refers to conduct financial transactions like funds transfer, payment of bills, opening
bankaccounts online etc. via the internet
Any two uses of e-banking are:
i. It saves the time of customers as they can easily access their account with the help of
theirdevice.
ii. All transactions are recorded & stored digitally. So, the chances of human error are
minimized.
iii.

e. What is database management system? Give two examples.


DBMS is a software which helps to extract, view and manipulate data in an organized way.
E.g., MS-Access and Oracle.

f. What is database? Give any two examples.


A database is an organized collection of related information that can be used for different
purpose sothat it can easily be accessed, managed, and updated. E.g., Dictionary and Telephone
Directory.

g. Define field and record.


A column in a table is called field, and it contains a specific piece of information within a
record. Record is a collection of multiple related fields in a row which gives complete
information about aperson or thing.

h. What is a report? Write its use.


Report is an object of MS-Access which displays the output in an effective way to present the
data ina printed format.
Uses of report are:
i. It helps to prepare well formatted output.
ii. It displays the information the way we want to view it.

53
Edited by: Krishna Sir. Developed by: Deepak Sir.
i. Define form? Write any two uses of it.
Form is an object of MS-Access which provides graphical interface to enter data into the tables or
multiple linked tables.
Any two uses of form are:
i. It provides an interactive platform for input of data into the database.
ii. It helps to display data in more presentable form than a datasheet.

5. Write the output of the given program: (Workout with dry run) [2]
DECLARE SUB OUTPUT1(A)
CLS N=135
CALL OUTPUT1(N)
END
SUB OUTPUT1(A)
DO WHILE A < > 0
R = A MOD 10
T=T+R
A = A \ 10
LOOP
PRINT T
END SUB
Dry run
Var. Var. Condition check Var. Var. Output
N A A<>0 R T
135 135 135 < > 0 Yes 5 5
Loop Continues
13 13 < > 0 Yes 3 8
Loop Continues
1 1 < > 0 Yes 1 9
Loop Continues
0 0 < > 0 No 9
Loop Exits

Output
9

6. Re-write the given program after correcting the bugs. [2]


REM to create a new file
CLS
OPEN “ABC.DAT” FOR INPUT AS #1
DO
INPUT “Enter Name, Roll No & Total. “; N$, R, T
INPUT #1, N$, R, T
INPUT “Supply more records Y/N”; C$
LOOP WHILE UCASE(Y$) =” Y”
CLOSE #1
END

54
Edited by: Krishna Sir. Developed by: Deepak Sir.
Debugged Program
REM to create a new file
CLS
OPEN “ABC.DAT” FOR OUTPUT AS #1
DO
INPUT “Enter Name, Roll No & Total. “; N$, R, T
WRITE #1, N$, R, T
INPUT “Supply more records Y/N”; C$
LOOP WHILE UCASE$(C$) = “Y”
CLOSE #1
END

7. Study the following program and answer the given questions. [2×1=2]
OPEN “EMP.DAT” FOR INPUT AS #1
DO
INPUT #1, N$, A$, S
IF UCASE$ (A$) = “KATHMANDU” THEN
PRINT N$, A$, S
END IF
LOOP WHILE NOT EOF (1)
CLOSE #1
END
a. Write the use of statement “INPUT #1, N$, A$, S” in the above program.
The use of statement “INPUT #1, N$, A$, S” in the above program to read data from the data
fileEMP.DAT.
b. What happens if you remove “UCASE$” from the above program?
If UCASE$ is removed then if Kathmandu is in small letters, then it won’t be displayed on the
screen.
8. Convert / Calculate as per the instruction. [4×1=4]
a. (ABC)16 = (?)8
b. (52)10 = (?)2
c. (1010)2 + (110)2 – (1111)2 = (?)2
d. (1101101)2  (110)2

9. a. Write a program in QBASIC that allows the user to input length, breadth and
height andthen calculate the area of 4 walls. Hint: [A = 2H(L+B)]
DECLARE FUNCTION AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
PRINT “AREA OF FOUR WALLS”; AREA (L, B, H)
END
FUNCTION AREA (L, B, H)
A = 2 * H * (L + B)
AREA = A
END FUNCTION
55
Edited by: Krishna Sir. Developed by: Deepak Sir.
b. Write a program to create a sequential data file named “Employ.Dat” to store Name, Post,
Addressand Salary for the number of employees. The program should terminate on user’s choice.
OPEN “Employ.Dat” FOR OUTPUT AS #1
TOP:
CLS
INPUT “Enter Name”; N$
INPUT “Enter Address”; A$
INPUT “Enter Post”; P$
INPUT “Enter Salary”; S
WRITE #1, N$, A$, P$, S
INPUT “Do you want to continue”; CH$
IF UCASE$ (CH$) = “Y” THEN GOTO TOP
CLOSE #1
END
10. Write a program in C language to input a number and then check whether the number is
positive,negative or zero number.

#include <stdio.h>
#include <conio.h>
int main ()
{
int n;
printf ("Enter any number: ");
scanf ("%d", &n);
if(n>0)
{
Printf ("%d is positive number",n);
}
else if(n<0)
{
Printf (“%d is negative number”,n);
Else
{
Printf (“%d is equal to zero”);
Return 0;

OR
Write a program in C language to display the series 1, 1, 2, 3, 5, 8 up to 10th terms.
56
Edited by: Krishna Sir. Developed by: Deepak Sir.
#include <stdio.h>
#include <conio.h>
int main ()
{
int a, b, c, i;
a=1;
b=1;
for (i=1; i<=10; i++)
{
Printf ("%d \n", a);
c=a + b;
a = b;
b = c;
}
return 0;
}

***

57
Edited by: Krishna Sir. Developed by: Deepak Sir.

You might also like