0% found this document useful (0 votes)
3 views

Mah Cet Computer

The MAH BBA CET 2025 exam syllabus for Computer Basics includes fundamental concepts of computer organization, CPU, memory, backup devices, system and application software, and basic internet knowledge. It covers the differences between system software and application software, the importance of backup devices for data protection, and key internet protocols like TCP/IP and HTTP. Additionally, it outlines the structure and functionality of the internet, including data transmission, packet switching, and the client-server model.

Uploaded by

Anushtha Agrawal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Mah Cet Computer

The MAH BBA CET 2025 exam syllabus for Computer Basics includes fundamental concepts of computer organization, CPU, memory, backup devices, system and application software, and basic internet knowledge. It covers the differences between system software and application software, the importance of backup devices for data protection, and key internet protocols like TCP/IP and HTTP. Additionally, it outlines the structure and functionality of the internet, including data transmission, packet switching, and the client-server model.

Uploaded by

Anushtha Agrawal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Computer syllabus MAH BBA CET

The Computer Basics section of the MAH BBA CET 2025 exam covers:

Fundamental concepts of computer science, including the organization of a


computer, CPU, input/output devices, memory, backup devices, and basic
internet knowledge. It also includes system and application software.

Detailed Syllabus:

1.
Organization of a Computer: Understanding the different components of a
computer system and their interconnections.

Central Processing Unit (CPU): Familiarity with the CPU's role, structure, and
function within the computer.

Input/Output Devices: Knowledge of various input and output devices and their
applications.

Computer Memory: Understanding different types of memory and their


characteristics.

2.
Backup Devices: Understanding the purpose and types of backup devices for data
protection.

3.
System Software and Application Software: Differentiating between system
software (like operating systems) and application software (like word processors).

4.
Basics of the Internet: Understanding fundamental concepts of the internet,
including protocols and basic functionality.
Organization of a Computer: Understanding the different components of a
computer system and their interconnections.

1. Under line syllabus


PDF in Documents named as Basic of computer for MAH CET
2.
Backup Devices
Backup devices are essential for data protection as they create copies of data
to ensure recovery in case of data loss, corruption, or disaster. These devices
come in various forms, including local storage, external drives, network-
attached storage (NAS), and cloud storage. The choice of device depends on
factors like budget, storage capacity, and data sensitivity.

Purpose of Backup Devices:


 Data Protection:
Backup devices create copies of data, protecting against hardware failures, software
errors, human mistakes, and cyberattacks.
 Disaster Recovery:
Backups enable recovery of data and systems after a disaster, minimizing downtime
and business disruption.
 Data Integrity:
Backups ensure that data can be restored to a specific point in time, maintaining data
integrity and consistency.
 Business Continuity:
By providing data recovery capabilities, backups are a crucial component of business
continuity plans.
Types of Backup Devices:
 Local Storage (Internal Hard Drives, SSDs):
These devices offer convenient and fast access to data, but they are vulnerable to
physical damage and theft.
 External Drives (USB Hard Drives, SSDs):
Portable and easy to use, these devices provide a cost-effective way to back up data
to a separate location.
 Network-Attached Storage (NAS):
NAS devices offer centralized storage and easy access for multiple users and devices
over a network, making them suitable for small to medium-sized businesses.
 Storage Area Networks (SAN):
SANs provide a high-performance, scalable solution for large-scale data storage and
access, often used in enterprise environments.
 Tape Storage:
Durable and cost-effective for long-term archiving, tape storage offers a reliable way to
store large volumes of data.
 Cloud Storage:
Cloud-based backup services offer scalability, accessibility from anywhere, and off-
site data protection.
Choosing the Right Backup Device:
 Data Volume:
Consider the amount of data you need to back up and choose a device with sufficient
storage capacity.
 Backup Frequency:
Determine how often you need to back up your data and choose a device that
supports the desired frequency.
 Recovery Speed:
Prioritize recovery speed if you need to restore data quickly in case of an emergency.
 Budget:
Backup devices range in price from affordable to expensive, so choose one that fits
your budget.
 Data Sensitivity:
If your data is highly sensitive, consider cloud storage or other secure backup options
with encryption and access controls

3.
Difference Between System Software and Application
Software
Computer software is a set of instructions or programs instructing the
computer to do specific tasks. Software is basically a generic term used to
describe computer programs. In general, scripts, applications, programs and a
set of instructions are all terms often used to describe a software.
On the basis of language in which software is developed and platform which is
required for its execution, we can group different types of software into two
categories: System Software and Application Software. Read through this
article to find out more about System Software and Application Software and
how they are different from each other.

What is a System Software?


Those computer software that control and monitor the computer hardware and
provide essential functionality to the computer are called system software.
Therefore, system software are essential parts of a computer, which means a
computer cannot perform its functions without system software. System
software are entirely responsible for creating an interface between the
computer's user and computer hardware.
System software are the system-side computer programs that are required for
the working of the computer itself, although the user of the computer does not
need to know about the functionality of system software while using the
computer. Examples of system software include: operating systems, device
drivers, language processors, etc.

What is an Application Software?


A computer software which is developed to perform a specific function is known
as an application software. Application software are also called end-user
software because they are designed to use by users of the computer.
An application software may be a set of computer programs or a single
computer program. These software provide the required functionality for a
specific purpose. Thus, a computer user uses these software to accomplish a
specific task.
The different types of application software can be developed to accomplish
different tasks such as word processing, playing multimedia files, database
applications, spreadsheets, accounting, graphic designing, etc. The most
common examples of application software are: MS-Word, Excel, PowerPoint,
browsers, video editors, etc.

Difference between System Software and Application Software


Both system software and application software are essentially required for using
the computer. But they are completely different from each other in many
aspects like programing languages, purposes, development processes, etc. The
important differences between a system software and an application software
are listed in the following table ?

Parameter System Software Application Software

Application Software is the type


System Software is the type of
of software which runs as per
software which is the interface
Definition user request. It runs on the
between application software and
platform which is provide by
system.
system software.

In general, System software are In case of Application software,


developed using low-level high level language is used for
Development
language which is more their development as they are
Language
compatible with the system developed as some specific
hardware in order to interact with. purpose software.

System software are essential for


Application software are not
operating the computer hardware.
essential for the operation of the
Necessity Without these software, a
computer. These are installed as
computer even may not start or
per the user's requirements.
function properly.

System software is used for Application software is used by


Usage
operating computer hardware. user to perform specific task.

System software are installed on


Application software are installed
Installation the computer when operating
according to user's requirements.
system is installed.

System software are specific to


Users can interact with an
User system hardware, so less or no
application software with the
interaction user interaction available in case
help of a User Interface (UI).
of system software.
System software can run An application software cannot
independently. It provides run independently. It cannot run
Dependency
platform for running application without the presence of system
software. software.

Examples of system software


Examples of application software
include operating systems,
Examples include word processors, web
compilers, assemblers, debuggers,
browsers, media players, etc.
drivers, etc.

Conclusion : (IMP)
The most significant difference between a system software and an application
software is that a system software operates on the machine-side and is
essential for operating the computer hardware, while an application software
operates on the user-side and performs a specific task as per the user's
instructions.

4.
The Internet is a global network of interconnected devices that communicate
using a set of standardized protocols. These protocols define the rules for how
data is formatted, transmitted, and received, enabling devices to interact and
exchange information. Key protocols include TCP/IP, which provides
addressing and routing, and HTTP/HTTPS, which facilitate web
communication.

Basic Functionality:
 Data Transmission: The Internet's primary function is to move data between devices.
 Packet Switching: Data is broken down into small packets, which are then routed
through the network to their destination.
 Protocols: Protocols like TCP/IP, HTTP, and DNS ensure reliable and efficient
communication.

IN DETAILS

(A)
The Internet is a global network of interconnected computers that
communicate using the Internet Protocol Suite (TCP/IP). It facilitates the
sharing of information through various tools like email, the World Wide Web,
and file transfer protocols. Key concepts include understanding how data
packets move, different network types, and common protocols.

Key Components and Concepts:


 Data Packets: Small segments of data that travel across the network.
 TCP/IP: The primary protocol used for data transmission, dividing messages into
packets and ensuring their delivery.
 Routers: Devices that forward data packets between networks, directing traffic.
 Switches: Network devices that segment traffic for efficient data transfer.
 Firewalls: Security systems that control network traffic based on rules.
 IP Addresses: Unique numerical addresses assigned to each device on the internet.
 Domain Names: Human-readable names (e.g., www.example.com) that are translated
into IP addresses by the Domain Name System (DNS).
 Web Browsers: Software used to access and display web pages.
 HTTP: The protocol used for transferring web pages.
 HTTPS: The secure version of HTTP, using encryption for safe communication.
 FTP: Protocol used for transferring files between computers.
How it Works:
1. Data is broken down into packets.
2. Packets are routed across the network by routers and switches.
3. TCP/IP ensures that packets arrive in the correct order and are reassembled.
4. The DNS translates domain names into IP addresses.
5. Web browsers use HTTP or HTTPS to request and display web pages.
Other Important Concepts:
 Client-Server Architecture: The internet is primarily a client-server model, where
clients (like web browsers) request information from servers.
 Internet Service Providers (ISPs): Companies that provide users with internet access.
 Social Media Platforms: Online platforms that facilitate social interaction and sharing.
 Security Measures: Firewalls and other security protocols protect the internet from
unauthorized access.

(B)

Internet protocols are the sets of rules that govern how data is transmitted and
received over the internet, ensuring communication between devices. They
define how data is addressed, routed, and delivered, allowing computers to
exchange information efficiently. Key protocols include IP (Internet Protocol),
HTTP (Hypertext Transfer Protocol), and DNS (Domain Name System).
Here's a more detailed explanation:

1. What is a Protocol?
A protocol is essentially a set of rules that define how devices communicate
over a network. It establishes a common language for computers to
understand each other, even if they have different hardware or
software. Without protocols, different devices wouldn't be able to interact, and
the internet as we know it wouldn't exist.

2. Key Internet Protocols:


 IP (Internet Protocol):
This is the foundational protocol that defines how data is addressed and routed across
the internet. Each device connected to the internet has a unique IP address, and IP
ensures that data packets are delivered to the correct destination.
 HTTP (Hypertext Transfer Protocol):
This protocol governs the transfer of web pages and other web-based resources. It's
the foundation of how we browse the internet and interact with websites.
 DNS (Domain Name System):
DNS translates human-friendly domain names (like "www.example.com") into the IP
addresses that computers use to locate each other. This allows us to use memorable
names instead of cryptic numerical addresses.
 TCP (Transmission Control Protocol):
TCP is a transport layer protocol that ensures reliable delivery of data packets, often
used in conjunction with IP. It provides error checking and ensures that packets arrive
in the correct order.
 UDP (User Datagram Protocol):
UDP is another transport layer protocol that provides faster, but less reliable, data
transmission compared to TCP. It's often used for applications where speed is more
important than guaranteed delivery.
 SMTP (Simple Mail Transfer Protocol):
SMTP is the protocol that governs the sending of email messages across the
internet. It allows mail servers to exchange email messages.
3. Why are Protocols Important?
Protocols are essential for the functionality of the internet because they
provide a standardized way for devices to communicate. They ensure that
data is formatted correctly, transmitted efficiently, and received
accurately. Without protocols, the internet would be a chaotic mess of
incompatible systems.

4. Understanding the TCP/IP Model:


The TCP/IP model is a conceptual framework that describes how data is
transmitted across the internet. It's often used as a reference model for
understanding network communication. The TCP/IP model is a suite of
protocols that work together to facilitate data exchange across networks.

5. Importance of Network Protocols:


Network protocols are fundamental for ensuring seamless communication
between devices, regardless of their underlying hardware or software. They
provide a standardized framework for exchanging information, making the
internet a global network that can connect devices of all types.

(C)

The Internet is a global network of interconnected computer networks that use


the TCP/IP protocol suite for communication. It's a network of networks,
encompassing private, public, and business networks, linked by various
technologies. The fundamental principle of the Internet is packet switching,
where data is broken into small packets and routed individually across the
network to their destination.
Here's a more detailed breakdown of the basic functionality:
1. Packet Switching:
 Data is divided into small, standardized packets.
 Each packet includes the destination address (IP address).
 Packets travel independently across the network, potentially taking different routes.
 At the destination, the packets are reassembled into the original data.
2. TCP/IP Protocol Suite:
 TCP (Transmission Control Protocol) ensures reliable data delivery and packet
ordering.
 IP (Internet Protocol) handles the addressing and routing of packets across the network.
 Other protocols, like HTTP, are built on top of TCP/IP for specific applications like web
browsing.
3. Network Structure:
 The Internet is a network of networks, with different levels of connectivity.
 Routers and switches connect networks and forward data packets.
 Routers handle inter-network communication, while switches manage traffic within a
local network.
4. Client-Server Model:
 The Internet primarily operates on a client-server model.
 Clients (e.g., your computer) request information from servers (e.g., web servers).
 Servers store and deliver content to the requesting clients.
5. Domain Name System (DNS):
 DNS translates human-readable domain names (like google.com) into numerical IP
addresses that computers use.
 This allows users to access websites using easy-to-remember names instead of
complex IP addresses.
6. Internet Services:
 The Internet provides various services, including email, file transfer (FTP), and the
World Wide Web.
 The World Wide Web is a system of interconnected documents accessed through
browsers using HTTP.
In essence, the Internet facilitates communication and information sharing by
breaking data into packets, using protocols like TCP/IP to ensure reliable
transmission, and employing a client-server model to access and deliver
information across a global network of interconnected computer networks.

XXXXXXXXXXX

Computer Full Form


Full form of Computer: A computer is an electronic machine that accepts data from
the user, processes the data by performing calculations and operations on it and
generates the desired outcome or result. The computer is derived from the Latin word
‘computerae’ which means ‘to compute’. The full form of the Computer is Common
Operating Machine Purposely Used for Technological and Educational Research.
Computer = Arithmetic Logical Unit + Control unit

ALU: Arithmetic Logical Unit is used to carry out arithmetic ( addition, subtraction,
division, and multiplication ) and logical operation.

CU: Control unit is used to change the order of operations in response to stored
information
What are the categories of computers?
The computer can be categorized in the form of its way to process certain operations.
The basic categories are as follows-

1. Digital Computer
2. Analog Computer
3. Hybrid Computer

Computer Generations
First-generation of computer
The time period of the first generation computer is from 1946 to 1954. Vacuum tubes
also known as electronic valves were used in the first generation of computer. The first
generation computer was the digital computer.

Examples of first-generation computer are: Mark I and Electronic Numerical


Integrator And Calculator (ENIAC)

Second-generation of computer
The time period of the second generation is from 1955 to 1964. The transistor was
used in place of the vacuum tube in a second generation of computers. Ferrite core was
used for main memory and magnetic disks were used as secondary memory in second-
generation computers. The high-level language was used.
Examples of second-generation computers are IBM 1620 and CDC 3600.

Third-generation of computer
The time period of the third generation of computers is from 1964 to 1977. Integrated
circuit(IC) chips were used in place of the transistor. A single Integrated Circuit (IC) chip
can contain many transistors, registers, and capacitors.

Examples of Third-generation computers are: IBM-360 and VAX-750.

Fourth-generation of computer
The time period of the fourth generation is from 1978 to 1990. In the fourth generation,
VLSI was used. The full form of VLSI is a very large-scale integration. An Integrated
Circuit Chip which has more than 1000 components embedded is called VLSI. Personal
computers were manufactured in this generation.

Example of Fourth Generation: IBM-PC and Apple-Macintosh


Fifth-generation of computer
The period of the fifth generation is from 1991 to the present. In the fifth generation,
ULSI chips came in vague. The full form of ULSI is Ultra Large Scale Integration. In
the fifth generation of computer, new technologies are introduced for example AI
(Artificial Intelligence) and Machine Learning

Abbreviations Related to Computer


Candidates preparing for Competitive exams should aware of some computer terms.
These terms can directly ask in the online examination.

Abbreviation Full-Form

COMPUTER Common Operating Machine Purposely Used for Technological and Educational Research

ROM Read-Only Memory

CPU Central Processing Unit

URL Uniform Resource Locator

USB Universal Serial Bus

VIRUS Vital Information Resource Under Siege

TCP Transmission Control Protocol

UPS Uninterruptible Power Supply

SATA Serial Advanced Technology Attachment

RAM Random Access Memory

SMPS Switched-Mode Power Supply

CD Compact Disc
DVD Digital Versatile Disc

CRT Cathode Ray Tube

DEC Digital Equipment Corporation

SAP System Application and Products

PNG Portable Network Graphics

IP Internet Protocol

GIS Geographical Information system

DDS Digital Data Storage

CAD Computer-Aided Design

ACPI Advanced Configuration and Power Interface

AGP Accelerated Graphics Port

APM Advanced Power Management

APIPA Automatic Private Internet Protocol Addressing

HTTP HyperText Transfer Protocol

HTTPS HyperText Transfer Protocol Secure


Father of Computer
You know Charles Babbage is the Father of Computer.

Father of Personal Computer


Henry Edward Roberts is considered the father of Personal computers,

You might also like