1-1 B.com. Honours BO - Fair
1-1 B.com. Honours BO - Fair
COURSE 2
BUSINESS ORGANIZATION
Student Activity
• Identifying the attributes of network (Topology, service provider, IP address and bandwidth
of your college network) and prepare a report covering network architecture.
• Identify the types of malwares and required firewalls to provide security.
Latest Fraud techniques used by hackers.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [1]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [2]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
INTRODUCTION TO COMPUTERS
In ancient times, from Egypt to china merchants used ABACUS to perform the calculations.
ABACUS having heads on wires to represent the data, and can possible to calculate the addition,
subtraction, multiplication and division. It can produce the accurate values for the mathematical
expressions at that times.
The term “Computer” is derived from the Latin word “Compute”, which means to calculate.
The computer is also calculate just like a calculator, but it can perform more than calculations.
Charles Babbage, is an English Scientist and Mathematician created the first fully modern
computer design, and he is called as the “Father of Computers”.
COMPUTER
A Computer is an electronic and programmable device, it accepts data from the user as an input
and processes it, convert into information and return back it to the user as an output.
DATA I NFORMATION
Data : Data is the plural of “datum”, Data can be defined as facts. In general, It is a
Raw material, which is used to enter into the computer for process.
Input : The Data is used to enter into the computer is called as an Input.
Information : The processed data is called as an Information. (or) The result which is outcome after
processed from the computer is called as an Information.
Output : The Information or processed data, which is outcome after process from the
computer is called as an Output.
User : The person, who utilizes the input, process and output using the system.
Thus, in any calculation the computer can perform three operations. These operations are
mainly enter the data into the computer, perform the process and taking the output.
They are
1. Input
2. Process
3. Output.
INPUT OUTPUT
PROCESS
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [3]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
These three units are combined, called as the computer system. All these functional units
are connected with cables to each other. This can be diagrammatically represented as in fig.
A.L.U.
Secondary Memory
C.P.U.
1. INPUT UNIT
The Data which is used to enter into the computer for processing is called as an Input. We can
enter the data using Input Devices. These are used to enter data into the computer by
converting the data into signals which are readable by the computer.
Ex:- Keyboard, Mouse, Scanner, etc….
2. C.P.U
CPU stands for Central Processing Unit. This is treated as the brain of the computer system.
This is the part of the computer that execute the program instructions of the computer. This
unit includes all the devices which are required for execution of the program, like mother
board, chips, components, and etc.., all are representing in a house like cabinet.
C.P.U contains three main functional parts.
They are
1. A.L.U. ( Arithmetic and Logic Unit )
2. C.U. ( Control Unit)
3. M.U. ( Memory Unit )
I. A.L.U. : This unit is designed to perform arithmetic and logical operations. This unit can
perform the Arithmetic Operations like Addition, Subtraction, Multiplication, Division and
etc., and also perform the Logical Operations, when it is required to take the decision
based on some programming execution. After completing the operations the data and
the results will be sent to the memory unit.
II. C.U. : By its name suggest it control all the internal operations in the system, and it
transfer the data for processes. It gives the signal to the other units to execute the
instructions.
III. M.U. : This unit can perform the memory management of the computer. The storage
capacity of the computer is known as its memory. We have mainly two types of
memories are available.
They are i) Primary Memory
ii) Secondary Memory
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [4]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
i. Primary Memory – It contains the data which is required to execute the current
running programs. It is small in capacity but the processing speed is high. It is a
temporary memory.
Ex:- RAM, ROM
ii. Secondary Memory – It is a permanent memory which is used to store data and
information of the computer files.
Ex:- Hard Disc, CD, DVD, etc.,
3. OUTPUT UNIT
The processed data or the resultant information received from the computer is called as an
output. We can see the output using with devices, like
Ex:- Monitor ( V.D.U. – Visual Display Unit ), Printer, Plotters, Speakers
1. Speed
Computers work at very high speed and are much faster than humans. A computer can
perform billions of calculations in a second. The time used by a computer to perform an
operation is called the processing speed. Now a days computers speed is calculated in
nano (10-9 sec) and pico (10-12 sec) & MIPS / MOPS.
2. Storage
Storage is the major advantage of the computer, it can store a large amount of data
permanently. User can use this data at any time.
Here, we can maintain the memory management with two types of memories. They are
Primary memory devices and Secondary memory devices.
3. Accuracy
Accuracy is the best feature of the computer. It must give the assured values, and it doesn’t
not give any chance to make a mistake. So, Computers are very reliable, it never makes a
mistake. Most probably the error occurs due to the user, rather than the computer
4. Reliability
Computers can perform the operations in high reliability, even the processing of the computer
is very high, but it does not give a chance to make a mistake and must give the exact and
accurate values in all times.
5. Versatility
Computers are used for different works in different areas. Computers can perform any type
of works. Now a days the modern computers used as personal computers, for home uses,
for business oriented tasks, weather forecasting, space explorations, teaching, railways,
banking, medicine, etc.
A single computer can perform all these works, so it a versatile machine.
6. Diligence
Diligence is the biggest issue for human beings. Because of tiredness, and lack of
concentration, not interest in particular work we will do some mistakes, but Being a machine,
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [5]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
a computer does not suffer from the human characteristics of tiredness and lack of
concentration. If 3 million calculations have to be performed it will perform the 3 millionth with
exactly the same accuracy and speed as the first
7. Automation
Now a days the computers are used for all purposes which are done by the employees in any
office or organization. It is used to maintain all the data and information, and keep
computerized and stored for future references.
8. No Intelligence ( I.Q.(Intelligence Quotient) )
Computer is not a magical device. It has no intelligence of it’s own. User can give the
instructions to the computer to perform the tasks. So, computer cannot take its own decision,
its work only depends on the user decisions.
9. Processing
The major quality in computer is the Processing ability. The computer must perform the
calculation at a high speed and accurately. It can process all types of data which is very
much usable and can’t expected by the user.
10. Communication
Most computers today have the capability of communicating with other computers. We can
connect two or more computers is called network. A group of inter connected networks is
called internet. These computers can share data, instructions, and information.
USES OF COMPUTERS
Now a days, computers are used in various places in our society, and in and around of the world.
Computers are emerging day to day, and merges into our lives also.
Computers have become an essential part of modern human life. Since the invention of
computer they have evolved in terms of increased computing power and decreased size. Owing to
the widespread use of computers in every sphere, Life in today’s world would be unimaginable
without computers. They have made human lives better and happier. There are many computer
uses in different fields of work. Engineers, architects, jewelers, and filmmakers all use computers to
design things. Teachers, writers, and most office workers use computers for research, word
processing and emailing. Small businesses can use computers as a point of sale and for general
record keeping.
Now the computers are used in all types of major fields in our society. They are mainly
1. Education
Computers have its dominant use in the education field which can significantly enhance
performance in learning. Even distance learning is made productive and effective through
internet and video-based classes. Researchers have massive usage of these computers in
their work from the starting to till the end of their scholarly work.
2. Business & Commercial
A computer has high speed of calculation, diligence, accuracy, reliability, or versatility which
made it an integrated part in all business organizations. Computer is used in business
organizations for: Payroll calculations, Sales analysis, Budgeting, Financial forecasting,
Managing employees database and Maintenance of stocks etc.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [6]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
3. Banking and Automation
Today banking is almost totally dependent on computer. Banks provide the facilities of:
Banks provide online accounting facility, which includes current balances, deposits,
overdrafts, interest charges, shares, and trustee records.
ATM machines are making it even easier for customers to deal with banks.
4. Science and Technology
With the growth of the computer, Most of the science and technology aspects are emerged
in different approaches. Scientific researches including the high efficient technical aspects
all are very effectively using with computers.
5. Medicine
Most of the medical information can now be digitized from the prescription to reports.
Computation in the field of medicine allows us to offer varied miraculous therapies to the
patients. ECG’s, radiotherapy wasn’t possible without computers.
6. Engineering
As per the technology improved, the major planning designs of buildings, bridges,
magazines and many others using the computers in very effective and efficient manner.
The designs and constructive layouts are designed beautifully on system using different
type of tools and software.
7. Insurance
Insurance companies are keeping all records up-to-date with the help of computers. The
insurance companies, finance houses and stock broking firms are widely using computers
for their concerns.
8. Aero Space
The technology is used not only on earth, its also emerged in space also. The Aircrafts,
space shuttles, satellites are used to bring its presence in the technology of computers. We
can communicate with Aircrafts or satellites using with signals of computers only.
9. Atmospheric
With the use of the computers, the research on atmosphere is also merely changed, and it
reaches very good results. The study on atmosphere or nature is used this computer
technology.
10. Entertainment
People can find entertainment on the internet. They can watch movies, listen to songs, and
watch videos download different stuff. They can also watch live matches on the internet.
Chatting & Social Media
People can chat with friends and family on the internet using different software like Skype
etc. One can interact with friends over social media websites like Facebook, Twitter &
Google Plus. They can also share photos and videos with friends.
11. Domestic
Computer uses in home depend on the user. There are so many people using the computer
at home. Some people are using the computer to take online classes. Some people using
the computer to do online business. Some people are using the computer listen to songs
and to watch movies etc.
Else the use of the computer in the home provides great advantages. Such you can access
banking and business services from home. You can communicate with people around the
world by the use of the computer.
Not only the above, it is used in all fields of our life.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [7]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
TYPES OF COMPUTERS
Computers are classified based on the following methods.
They are
1) Computations or processing
2) Size and capability.
C. Hybrid computers
These computers can have both analog and digital properties. Hybrid computers
incorporate the technology of both analog and digital computers. These computers store
and process analog signals which have been converted into discrete numbers using analog-
to-digital converters. They can also convert the digital numbers into analog signals or
physical properties using digital-to-analog converters. These computers are mainly used in
AI (Robotics) and Computer Aided Manufacturing, and etc.
Ex: Patient monitoring system in a hospital, computers used in control of space
vehicles.
2. Classification based on size and capability
Based on the size and capability computers are classified into four types.
a) Micro computers
b) Mini computers
c) mainframe computers
d) super computers
a) Micro computers
These are single user system. So these can also called as personal computers [PC]. These
are very small computers. Now-a-days micro computer is available in different sizes. Some
of them are
1. Laptop computers:
These are also called as Note book computers these are well settled in small briefs.
Ex: Lenovo, Dell, Compaq
2. Palmtop computers:
These are very small computers with a size of man’s palm.
Ex: Personal digital assistant
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [8]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
b) Mini computers
These systems are multi user systems. They are designed for using more than one user at a
time. A small group of people are formed as a network and used this computer at a time.
Each user has an individual terminal. A time sharing operating system is used in those
systems, where a predefined space is allotted to each user.
c) Mainframe computers
Main Frame computers are less powerful and cheaper than the Super Computers. These are
general purpose computers capable of handling all kinds of scientific and business
applications. It can process Millions of instructions per second. It can support thousands of
terminals at a time. It contain the huge storage data for maintaining the databases.
Mainframes such as ES/9000 family computers of the IBM(International Business Machine).
d) Super computer
These are the fastest and largest computers ever in the world. It is used in Specialized areas
like in Defense, Aircraft design, highly budged computer generated movies, and weather
research, etc. It can process the instructions in MIPS/MOPS ( Million Instructions per second
/ Million Operations per second), its nearly 1.2 billion Instructions per second. It can support
10,000 terminals at a time. The First super computer was the ILLIAC IV, made by Bur
Roughs, and others are CRAY series, CDC, and etc. The first super computer introduced in
India is “PARAM”.
These computers are used for
(i) Designing of super-sonic air crafts.
(ii) Scientific researches
(iii) Designing of Robots
(iv) Defense use
HISTORY OF COMPUTERS
The evolution of computer has passed through different stages before it reached the present state
of development. The evolution probably started from the 3500 BC, when human being first started
to learn the calculations using the machine like ABACUS. Thus, started the evolution, then
BLAISSE PASCAL, the French mathematician, made the foundation of the automatic computing
using with his Adding Machine in 1662, used for only additions and subtractions. This machine
was later improved by GOTTFRIED, Germany to perform the multiplication and division.
Charles Babbage, a professor of mathematics of Cambridge University invented a machine
called “Differential Engine”, which can evaluate the algebraic expressions and mathematical tables
accurately up to 20 decimal places. Later, he developed “Analytical Machine”. His efforts are
taken the technology to improve the stages of computers, so he is remembered as the “Father of
Computing”, and his co-worker “Lady Lovelace” (ADA LOVELACE) is remembered as the first
programmer in the world.
Later on,
MARK I COMPUTER
In 1934, Harvard Professor H. Eiken developed an automatic calculating machine, it was called as
MARK I digital computer.
ENIAC
In 1946, a team of professors at Moore School of University of Pennsylvania, built the first
electronic general purpose computer called ENIAC ( Electronic Numeric Integrator And Calculator).
It consists of 18,000 vacuum tubes, 70,000 resistors, 10,000 capacitors, 60, switches and a large
size occupying 1500 sq.feet of space. It can perform 5000 additions or 350 simple multiplications
in one second.
UNIVAC
In 1946, Eckert and Mauchly founded the UNIVAC ( Universal Automatic Computer).
In 1951, Remington Rand developed UNIVAC-1, and followed by EDVAC (Electronic
Discrete Variable Automatic Computer)
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [9]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
GENERATIONS OF COMPUTERS
In computer talk a generation means “A step a head in Technology”. Every step includes a major
change in the components used for constructing a computer. It provides a frame work for the
growth of computer industry. After development of ENIAC system, in computer’s history we found
five generations.
They are
1. First Generation Computers
2. Second Generation Computers
3. Third Generation Computers
4. Fourth Generation Computers
5. Fifth Generation Computers
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [11]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
NETWORK
When two or more computers are connected with wire or without wire, which can possible to send or
receive the data and information from one computer to another computer, then these computers are
in a network.
NETWORK COMPONENTS
The important components used in the computer network are:
• Media
It is the medium through which the data travels. The various alternatives for transmission media
are: twisted pair cable, coaxial cable, fibre optics, etc.
• Processor
Processor is the hardware which helps to transfer the data from source to destination. Different
processors used in the data communication are: modem, router, bridge, etc.
• Software
To transfer the data from source to destination we require software, examples are: networking
operating system software, internet explorer, etc.
• Topology
It is the way which data travels, the various topologies available are:
star, ring, bus, mesh, tree, etc.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [12]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
ADVANTAGES AND DIS-ADVANTAGES OF NETWORKS
Advantages
• Sharing
We can share the information with other computers on the network
• Sharing resource
This means that you can setup certain computer resources like input and output devices of
the computers on the network can access them.
• High reliability
Networks are reliable they can work without any failure
• Backup
All the data and information is stored on the server, backing up the critical data is a simple
process.
Dis-advantages
• Crash
If the server crashes, then whole of the system will be disturbed.
• Data integrity
As all the data is shared it is possible unauthorized person can access the data if the network
security is poor or weakly implemented.
• No privacy
Network may also means loss of privacy. Especially your boss, with the right network
privileges may be in the position to read your private email.
TYPES OF NETWORKS
There are three types of network.
They are:
1. Local area network (LAN)
2. Metropolitan/ Medium area network (MAN)
3. Wide area network (WAN)
1. Local area Network (LAN)
When two or more computers are connected with wires in a small area i.e., with in a room, or
building or within a diameter of not more than a few kilometers, then such network is known as
local area network. It is made for an organization and most of the times it is within a single
building. The data rate in LAN is in the form of Mbps.
The characteristics of LAN are:
a. It covers in a room or within a building or an area of less than 5 kilometers
b. It provides high speed data communication
c. They have low error rates.
d. They use simple data communication protocols.
2. Metropolitan area Network (MAN)
It resides between LAN and WAN. It interconnects the computer within a city. It uses dual queue
dual bus protocol. The implementation for MAN provides transfer rates from 34 mbps which is not
very slow as compared to LAN. They use broad band cables as transmission media. They also
use fibre optical cable as transmission media.
1. Analog signal
Analog refers to continues set of specific points of data and all possible points between.
Analog signals can have any value in a range.
2. Digital signal
Digital signal is discrete. It can have only limited number of defined value often as simple as
1 and 0. It is as a light being switched off and on. Digital signals can have only a limited
number of values.
NETWORK TOPOLOGY
Network Topology is the schematic description of a network arrangement, connecting various nodes
(sender and receiver) through lines of connection. Topology is a structure representing how the
systems are connected in a network. The systems or nodes are connected in different way to form a
network.
Types of Network Topologies
1. Bus Topology
2. Ring Topology
3. Mesh Topology
4. Hybrid Topology
5. Tree Topology
6. Star Topology
1. Bus Topology
Bus topology is a network type in which every computer
computer and network device is connected to
single cable.
Features of Bus Topology
1. It transmits data only in one direction.
2. Every device is connected to a single
cable
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other
network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the networknetwor
decreases.
3. Cable has a limited length.
------------------------------------------------------------
--------------------------------------------------------------------------------
---------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [14]
I B.Com.-CA (HONOURS) : Semester-I
Semester BHARATHI DEGREE COLEGE : CHIRALA
-----------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------
2. Ring Topology
It is called ring topology because it forms a ring
as each computer is connected to another
computer, with the last one connected to the
first. Exactly two neighbours for each device.
Features of Ring Topology
1. The transmission is unidirectional, but it
can be made bidirectional by having 2
connections between each Network
Node, it is called Dual Ring Topology.
Topology
2. In Dual Ring Topology, Topology two ring
networks are formed, and data flow is in
opposite direction
ction in them. Also, if one ring fails, the second ring can act as a backup,
to keep the network up.
3. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to
pass through each node of the network, till the destination node.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only
the nodes having tokens can transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring r topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.
3. Mesh Topology
Generally, there are two types of Mesh Topologies
they are
1. Partial Mesh Topology
2. Full Mesh Topology
------------------------------------------------------------
--------------------------------------------------------------------------------
---------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [15]
I B.Com.-CA (HONOURS) : Semester-I
Semester BHARATHI DEGREE COLEGE : CHIRALA
-----------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------
4. Tree Topology (Hierarchical Topology) T
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology.
topology It should at least
have three levels to the hierarchy.
Features of Tree Topology
1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
5. Hybrid Topology
It is two different types of topologies which is a
mixture of two or more topologies. For example if in
an office in one department ring topology is used and
in
n another star topology is used, connecting these
topologies will result in Hybrid Topology (ring
topology and star topology).
Features of Hybrid Topology
1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of
the topologies included
Advantages of Hybrid Topology
1. Reliable as Error detecting and trouble shooting is easy.
2. Effective.
3. Scalable as size can be increased easily.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.
6. Star Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
Features of Star Topology
1. Every node has its own dedicated
connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical
Fibre or coaxial cable.
Advantages of Star Topology
1. Fast performance with few nodes and low
network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only thatt node is affected which has failed, rest of the nodes can work smoothly.
------------------------------------------------------------
--------------------------------------------------------------------------------
---------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [16]
I B.Com.-CA (HONOURS) : Semester-I
Semester BHARATHI DEGREE COLEGE : CHIRALA
-----------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the
hub.
4. Performance is based on the hub that is it depends on its capacity
INTERNET
The international network is broadly called as internet.
• The internet is a global network that connects billions of computers all over the world.
• It is also called as network of networks.
networks
• The internet links different organizations, academic institutions, government offices,
and home users to share information among large group of users.
• Internet is a worldwide global system of interconnected different kind of computers.
• Internet is a global network of billions of computers and other electronic
devices.. With the Internet, it's possible to access almost any information,
communicate with anyone else in the world, and do much more. You can do all of this
by connecting a computer to the Internet,
Internet, which is also called going online.
HISTORY OF INTERNET
• In 1971, the first email was sent using @ sign in ARPANET.
• In 1983, the TCP/IP protocols became more strong and sophisticated. Some attributes
addition like acknowledgment (ACK) and reverse acknowledgment (RAK) made the
internetworking as a good outlook.
• In 1990, a CERN scientist Tim Berners Lee proposed a markup language which is named
HTTP later. In this proposed method, Lee connected CERN employees by sharing messages
through this language platform. But this method was limited to CERN members only.
• In 1993, the proposed method of Lee was open to the public and the first website launched in
the world. Although some say that the first website was launched in 1991 but that wasn’t
public or free
• In 1995, famous market place and shop cart amazon.com made their first launch and still
they’re the best sellers in online shopping. Google introduced itself as a search engine in
1997 with yahoo. Both are top search engine now.
------------------------------------------------------------
--------------------------------------------------------------------------------
---------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [17]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
Disadvantages of the Internet
1. There are huge amount of data is exist, that may be wrong information exists.
2. Any person can post any thing.
3. Rumors can spread very fastly
4. Some people can getting addicted for unnecessary things like games, jokes, movies, etc..
5. Lots of adultery and violent content will be harmful to children.
6. Every one can easily waste their valuable time on it.
7. It contains fake websites
8. Virus, hackers, etc can be damage to ours a lot.
9. We easily lost our identity or integrity on internet.
10. Medically its very important to know, we will effect so many physical problems as well as
psychological problems.
INTERNET APPLICATIONS
Internet is interconnection of large number of heterogeneous computer networks all over the world that
can share information back and forth.
The internet is treated as one of the biggest invention and it has large number of uses.
They are mainly
1. Search engine
It can be used to search anything and everything. Most popular search engines are Google
and yahoo.
2. Communication
This is a major role of the internet. It helps people to communicate either with the use of
social networking websites or through e mails. Even chatting is a major use of the internet.
3. Studying
Now right from kinder garden children are exposed to internet and computers. They find
many useful things to learn on the internet.
4. Health and Medicine
Internet provides information and knowledge about field of health and medicine. People can
have information about various diseases and can receive help. Patient can be taken to virtual
check room where they can meet doctors.
5. Travel
One can use internet to gather information about various tourist place. It can be used for
booking holiday tours, hotels, train and flights. Some of the web sites providing this service air
India travels. Org. com, raj travel. Com, make mytrip. Com.
6. Entertainment
Songs, movies, latest sports update through internet some of the web sites providing this
services are cricinfo.com.
7. Shopping
Internet is also used for online shopping. By just giving accounts details you can perform the
transaction you can even pay your bills and perform bank related transaction.
8. Stock Market Updates
You can sell or bases shares white sitting on computer through interest several websites like
ndtv profit.com, money pore.com, provide information regarding investment.
9. Research
A large number of people are using internet for research purposes you can download any kind
information by using internet.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [18]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
1. Generic Domains
It defines the registered hosts according to their generic behavior.
Each node in a tree defines the domain name, which is an index to the DNS database.
It uses three-character labels, and these labels describe the organization type.
Label Description
aero Airlines and aerospace companies
biz Businesses or firms
com Commercial Organizations
coop Cooperative business Organizations
edu Educational institutions
gov Government institutions
info Information service providers
int International Organizations
mil Military groups
museum Museum & other nonprofit organizations
name Personal names
net Network Support centers
org Nonprofit Organizations
pro Professional individual Organizations
2. Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational
abbreviations.
3. Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask for
mapping an address to the name.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [19]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
Working of DNS
• DNS is a client/server network communication protocol. DNS clients send requests to
the. server while DNS servers send responses to the client.
• Client requests contain a name which is converted into an IP address known as a forward
DNS lookups while requests containing an IP address which is converted into a name known
as reverse DNS lookups.
• DNS implements a distributed database to store the name of all the hosts available on the
internet.
• If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP address
of a hostname. If DNS server does not contain the IP address associated with a hostname,
then it forwards the request to another DNS server. If IP address has arrived at the resolver,
which in turn completes the request over the internet protocol
PURPOSE OF ISP
Internet service was originally limited to government agencies and specific university Departments.
The technology was developed to provide access to the general public through the World Wide Web
in the late 1980s. Initially, consumers were able to gain limited access through a few ISPs—America
Online (AOL) being one of the most recognized names at the time—that used dial-up connections
using a phone line.
The number of ISPs increased to several thousand during the mid-1990s, and the boom was
on. As the options for connectivity increased and speeds moved away from slower dial-up
connections, the internet economy was born. Providers developed more advanced technology,
allowing customers high-speed access via broadband technology through cable and digital
subscriber line (DSL) modems.
Internet service providers provide their customers access to the internet—plain access
providers just handle the traffic between the individual and the internet as a whole. But there may
also be other services bundled in depending on the customer’s location and availability.
Some of these services include:
• Email services
• Web hosting services
• Domain registration
• Browser and software packages
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [20]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
HOW INTERNET WORKS
When you turn on your computer and type a domain name in the browser search bar, your browser
sends a request to the DNS server to get the corresponding IP address. After getting the IP
address, the browser forwards the request to the respective server. Once the server gets the
request to provide information about a particular website, the data starts flowing. The data is
transferred through the optical fiber cables in digital format or in the form of light pulses. As the
servers are placed at distant places, the data may have to travel thousands of miles through optical
fiber cable to reach your computer.
The optical fiber is connected to a router, which converts the light signals into electrical
signals. These electrical signals are transmitted to your laptop using an Ethernet cable. Thus, you
receive the desired information through the internet, which is actually a cable that connects you
with the server.
Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the
optical cable are first sent to a cell tower and from where it reaches to your cell phone in the form of
electromagnetic waves.
The internet is managed by ICANN (Internet Corporation for Assigned Names and
Numbers) located in the USA. It manages IP addresses assignment, domain name registration, etc.
The data transfer is very fast on the internet.
The moment you press enter you get the information from a server located thousands of
miles away from you. The reason for this speed is that the data is sent in the binary form (0, 1), and
these zeros and ones are divided into small pieces called packets, which can be sent at high
speed.
INTERNET SERVICES:
Important services of the internet are
1. World Wide Web:
• This also called web or www.
• The collection of all web pages.
• Those web pages provide a information in the form of text, pictures and audio.
2. E-mail:
• E-mail stands for electronic mail. It is most popular fastest mailing service.
• We can send and receive messages is seconds.
3. News groups:
• They are discussion groups on internet.
• They are used for free exchange of information.
4. E-commerce:
• It stands for Electronic commerce.
• Buying and selling can be done through internet. Ex: online shopping and banking.
5. FTP:
• FTP stands for file transfer protocol. It can be used to transfer files easily.
• Multimedia files can be uploaded and downloaded using FTP.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [21]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
6. Telnet:
• It is used to access remote computer.
7. Chat:
• Two or more users can live chat with each other.
8. Gopher:
• Gopher is used to search for files via menus.
IP ADDRESS
The format of an IP address is a 32-bit numeric address written as four numbers separated by
periods. Each number can be zero to 255.
For example, 1.177.10.248 could be an IP address.
It is an identifier for a computer on a TCP / IP network.
INTERNET ADDRESSING
To Enter into the network, we have to type the address of the particular website.
• An internet address uniquely identifies a computer on the internet.
• It may also referred to the name or IP address of a website.
• Format of IP address is a 32 bit numeric address written as 4 numbers,
separated by dots. Ex: 1.160.10.240
• IP addresses as four natural numbers from 0-255.
• 4 numbers in an IP address are used in different ways to identify a particular
network and a host on that network.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [22]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
Examples
• Example 1: https://www.bharathidegree.com.
• Example 2: https://www.facebook.com/rameshpuppala79/
• Example 3: anu.ac.in
• Example 4: https://en.wikipedia.org
Types of URL
URL s varies depending on the location of the documents to which user will link. Basically URLS
fall into two categories; Absolute and relative URL. They are described below.
I) Absolute URL
An absolute URL contains all the information necessary to find the files on the internet.
It contains the protocol indicator, host name, folder name and File name.
Absolute URL are similar to address used by the postal service, which include a name,
street address, apartment number, city, state and pin code.
If the protocol indicator or host name is missing some information from a URL, browsers can
not link to a specific file because they won’t know where and how to look for the file.
BROWSER
A browser is a software application used to locate, retrieve and display content on the World Wide
Web, including Web pages, images, video and other files.
Browser is a software application which is used as gateway to enter into the network using
the computer system.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [23]
I B.Com.-CA (HONOURS) : Semester-I
Semester BHARATHI DEGREE COLEGE : CHIRALA
-----------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------
Types of Browsers
Web Browsers are software installed on your PC. To access the Web, you need a web browser,
such as Netscape Navigator, Microsoft Internet Explorer or Mozilla Firefox.
Internet Explorer (IE) is a product from software giant Microsoft. This is the most
commonly used browser in the universe. This was introduced in 1995 along with
Windows 95 launch.
Google Chrome web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows. Today, chrome is known to be
one of the most popular web browsers with its global share of more than 50%.
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It was
first released as a public beta in January 2003. Safari
Safari has very good support for
latest technologies like XHTML, CSS2 and the iPhone, iPod Touch and iPad. etc.
Opera is smaller and faster than most other browsers, yet it is full-
full featured. Fast,
user-friendly,
friendly, with keyboard interface, and more.
NETWORK SECURITY
Network security is a set of technologies that protects the usability and integrity of a company's
infrastructure by preventing the entry or proliferation within a network of a wide variety of potential
threats
The main concepts of Network security are :
accountability, authentication, authorizations, privacy, confidentiality, integrity, and non-repudiation.
non
------------------------------------------------------------
--------------------------------------------------------------------------------
---------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [24]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
4. Access Control List (ACL)
A list of rules used to control access to resources on a network, including specific IP
addresses, users, and ports. ACLs can be configured for either read or write operations on
specific network.
5. Network Access Control (NAC)
A network security solution that allows administrators to restrict access to a network based
on the user’s identity, device type, and other criteria.
6. Virtual Private Networks (VPN)
An encrypted network connection used to securely connect two or more private networks
over a public network such as the Internet.
7. Cryptography
The study of how data is protected through encryption algorithms and cryptographic
protocols.
8. SSL/TLS
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are network protocols used
to secure network traffic.
9. PKI
Public Key Infrastructure (PKI) is a network security solution that uses public-key
cryptography to authenticate network users and their devices.
10. NAT
Network Address Translation (NAT) is a network security technique that allows private
networks to use one or more public IP addresses for outgoing traffic.
11. DDoS
Distributed Denial of Service attacks are malicious attempts to overwhelm network resources
with large amounts of network traffic from multiple sources or locations.
12. IPSec
Internet Protocol Security (IPSec) is an internet standard protocol suite for establishing
secure, encrypted connections between network devices.
13. TACACS
Terminal Access Controller Access Control System (TACACS) is a network security protocol
used to authenticate network users and their devices.
14. RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a network authentication protocol
used to securely connect network users with network services such as VPNs, network
access control (NAC), and wireless networks.
15. WPA/WPA2
Wi-Fi Protected Access (WPA/WPA2) is the most commonly used wireless network security
protocol for encrypting traffic between Wi-Fi access points and clients.
16. SASL
Simple Authentication and Security Layer (SASL) is a network authentication protocol used to
securely authenticate network users.
17. IPSO
Intrusion Prevention System/Intrusion Detection System (IPSO) is a network security solution
that combines network intrusion detection with network intrusion prevention capabilities.
18. SIEM
Security Information and Event Management (SIEM) is a network security solution that
consolidates log data from multiple sources into one centralized repository for monitoring,
analysis, and reporting.
19. Endpoint Security
Endpoint security is network security solution designed to protect network devices from
malicious activity and threats, including malware and unsecured network connections.
20. UTM
Unified Threat Management (UTM) is a network security solution that combines multiple
network security solutions, such as firewalls, intrusion detection/prevention systems, antivirus
software, and more into one unified platform.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [25]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
INFORMATION ASSURANCE
Information assurance (IA) is the practice of assuring information and managing risks related to the
use, processing, storage, and transmission of information. Information assurance includes
protection of the integrity, availability, authenticity, non-repudiation and confidentiality of
user data.
Authentication
Authentication refers to the verification of the validity of a transmission, originator, or process within
an information system.
• Authentication provides the recipient confidence in the data senders validity as well as the
validity of their message.
• There exists many ways to bolster authentication, mainly breaking down into three main
ways, personally identifiable information such as a person's name, address telephone
number, access to a key token, or known information, like passwords.
Integrity
Integrity refers to the protection of information from unauthorized alteration. The goal of information
integrity is to ensure data is accurate throughout its entire lifespan. User authentication is a critical
enabler for information integrity. Information integrity is a function of the number of degrees-of-trust
existing between the ends of an information exchange One way information integrity risk is mitigated
is through the use of redundant chip and software designs. A failure of authentication could pose a
risk to information integrity as it would allow an unauthorized party to alter content.
For example, if a hospital has inadequate password policies, an unauthorized user could gain
access to an information systems governing the delivery of medication to patients and risk altering
the treatment course to the detriment of a particular patient.
Availability
The availability refers to the preservation of data to be retrieved or modified from authorized
individuals.
• Higher availability is preserved through an increase in storage system or channel reliability.
• Breaches in information availability can result from power outages, hardware failures, DDOS,
etc. The goal of high availability is to preserve access to information.
• Availability of information can be bolstered by the use of backup power, spare data channels,
off site capabilities and continuous signal.
Confidentiality
Confidentiality is in essence the opposite of Integrity. Confidentiality is a security measure which
protects against who is able to access the data, which is done by shielding who has access to the
information.
This is different from Integrity as integrity is shielding who can change the information.
Confidentiality is often ensured with the use of cryptography and steganography of data..
Non-repudiation
Non-repudiation is the integrity of the data to be true to its origin, which prevents possible denial that
an action occurred.
• Increasing non-repudiation makes it more difficult to deny that the information comes from a
certain source.
• In other words, it making it so that you can not dispute the source/ authenticity of data.
• Non-repudiation involves the reduction to data integrity while that data is in transit, usually
through the use of a man-in-the-middle attack or phishing.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [26]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
CRYPTOGRAPHY
Cryptography is the process of hiding or coding information so that only the person a
message was intended for can read it.
The art of cryptography has been used to code messages for thousands of years and
continues to be used in bank cards, computer passwords, and ecommerce.
3. Hash Function
This algorithm makes no use of any keys. A hash value with a fixed length is calculated based
on the plain text, making it impossible to recover the plain text’s contents. Many operating
systems encrypt passwords using hash functions.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [27]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
Malware can do
• Intelligence and intrusion
Exfiltrates data such as emails, plans, and especially sensitive information like passwords.
• Disruption and extortion
Locks up networks and PCs, making them unusable. If it holds your computer hostage for
financial gain, it's called ransomware.
• Destruction or vandalism
Destroys computer systems to damage your network infrastructure.
• Steal computer resources
Uses your computing power to run botnets, cryptomining programs (cryptojacking), or send
spam emails.
• Monetary gain
Sells your organization's intellectual property on the dark web
It is an umbrella term that includes all types of malicious software like a virus, Trojan horses,
worms, spyware, etc. Almost every kind of disruptive program is included in malware. It
can cause many advertisements to appear on our computer screens, and those ads can be
harmful if we accidentally click on them.
The most common way to keep your system protected from malware is by installing anti-
malware or anti-virus software. Most of the malware can be scanned or removed by using an
antivirus program.
FIREWALLS
A firewall can be defined as a special type of network security device or a software program that
monitors and filters incoming and outgoing network traffic based on a defined set of security rules. It
acts as a barrier between internal private networks and external sources (such as the public
Internet).
The primary purpose of a firewall is to allow non-threatening traffic and prevent malicious or
unwanted data traffic for protecting the computer from viruses and attacks.
A firewall is a cyber security tool that filters network traffic and helps users block malicious
software from accessing the Internet in infected computers.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [28]
I B.Com.-CA (HONOURS) : Semester-I BHARATHI DEGREE COLEGE : CHIRALA
-------------------------------------------------------------------------------------------------------------------------------------
This is one of the most problematic questions whether a firewall is a hardware or software.
As stated above, a firewall can be a network security device or a software program on a computer.
This means that the firewall comes at both levels, i.e., hardware and software, though it's best to
have both.
Why Firewall
Firewalls are primarily used to prevent malware and network-based attacks. Additionally, they can
help in blocking application-layer attacks. These firewalls act as a gatekeeper or a barrier. They
monitor every attempt between our computer and another network. They do not allow data packets
to be transferred through them unless the data is coming or going from a user-specified trusted
source.
Firewalls are designed in such a way that they can react quickly to detect and counter-
attacks throughout the network. They can work with rules configured to protect the network and
perform quick assessments to find any suspicious activity. In short, we can point to the firewall as a
traffic controller.
FRAUD TECHNIQUES
Privacy and Data Protection
Although both data protection and privacy are important and the two often come together, these
terms do not represent the same thing.
• Data privacy is focused on defining who has access to data
• Data protection focuses on applying those restrictions.
Data protection safeguards information from loss through backup and recovery. Data
security refers specifically to measures taken to protect the integrity of the data itself against
manipulation and malware. It provides defense from internal and external threats. Data privacy refers
to controlling access to the data.
Data privacy is essential for protecting personal information, establishing trust, complying
with regulations, maintaining ethical practices, driving innovation, and preserving individual
autonomy.
Data privacy Data protection
It focuses on protecting the data from unauthorised
Data privacy is defined as the one having
access. It serves as a technical control over one’s
authorised access to the data.
data.
Data privacy is a form of regulation that Data protection is the mechanism that enforces the
governs and controls the data shared with policies and regulation into motion and prevents it
an entity. from unauthorised access or use.
It is the company’s responsibility of protecting the
data and ensuring the level of privacy set by the
Data privacy is controlled by the user.
users. The company must take precautions for
protecting the data.
Data privacy is concerned about the
Data protection is concerned with keeping the
information not being sold either online or
information safe from hackers.
offline.
Data privacy is to have control over your Data protection ensures that your data is protected
data and use of it. from unethical intervention and access.
Data privacy measure precedes the query
Data protection is the act of safeguarding the data
of security. We often overlook and avoid
already obtained.
this fact.
-------------------------------------------------------------------------------------------------------------------------------------------------
(BUSINESS ORGANISATION ) UNIT – V [29]