0% found this document useful (0 votes)
9 views90 pages

Ready Reckoner - Grade IX - CA - 2025-26

tf

Uploaded by

karhadkarsanvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views90 pages

Ready Reckoner - Grade IX - CA - 2025-26

tf

Uploaded by

karhadkarsanvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 90

ELPRO INTERNATIONAL SCHOOL, PUNE

Session: 2025-26
Ready Reckoner-CA Grade-9

CHAPTER 1-COMPUTER SYSTEM

• Characteristics of Computer
1. Speed

2. Accuracy

3. Reliability

4. Storage Capacity

5. Versatility

6. Reduction in Manpower

7. Reduction in paper work

• Limitations
1. Limited ability to think

2. Dependencies on Power
 Applications of Computers

1. Military

2. Banks

3. Research

4. Education

5. Media

6. Criminal Identification

7. Edutainment

8. Business

9. Animation And Films


 Functions of computer

Input

Processing

Storage and Retrieval

Output
 Block diagram of Computer
Memory Unit

Internal Memory External Memory

Hardisk Pendrive CD-DVD


RAM ROM
 RAM (Random Access Memory)
Random Access Memory (RAM) is a crucial component in computers and other devices. Here are some key features:

1. Volatility: RAM is volatile memory, meaning it loses all stored data when the device is powered off1.

2. Speed: It is the fastest type of memory, allowing quick read and write access to data1.

3. Primary Memory: RAM serves as the primary memory in a computer, storing data that the CPU needs for immediate access1.

4. Random Access: Data in RAM can be read or written in any order, regardless of its physical location2.

5. Temporary Storage: It temporarily holds data and instructions that the CPU needs while performing tasks3.

6. Capacity: The amount of RAM in a system can significantly affect its performance, especially for multitasking
• Types of RAM

i. DRAM-Dynamic RAM

ii. SRAM-Static RAM

iii. SDRAM- Synchronous Dynamic RAM

iv. DDR-Double Data Rate Memory


 ROM

Types of ROM
• PROM-Programmable ROM
• EPROM-Erasable Programmable ROM

• EEPROM- Electronically Erasable Programmable ROM


• Flash Memory
• Masked ROM
 Units of Memory
 Units of Memory

10
Group of 4 1024= 2

bit

1PB=1024 Group o
• ALU (Arithmetic and Logic Unit)

• An ALU is the main part of the central processing unit (CPU) of a computer system.
• Performs arithmetic and logic operations
• Operations like –ADD, SUB, <,>, AND, OR
• Control Unit
1. The control unit (CU) is a component of the central processing unit of the computer
system that controls the operations of the processor.

2. Brain of the computer

3. It works as a bridge between Software and Hardware of the system.

4. It deals with the co-ordination between hardware devices attached with each
other.
• Computer Performance

1. CPU speed
2. RAM
3. Hard Disk
• Overview of Communication Technologies

1. Email

2. Text Messages
3. CHAT
4. Video Conferencing
5. Blogs
6. Wikis
7. Newsgroup
8. Document and Calendar Sharing Services
Input and Output Devices

Input Devices Output Devices Storage Devices


• Input Unit

Input unit converts the


Input unit refers to
incoming data and
data or instructions
instructions into a
which we feed into a
pattern of a binary
computer.
code
• Input Devices

Keyboard Mouse Stylus Scanner OCR

Barcode
MICR Joystick Microphone Light Pen
Reader

Voice Input Digital


Webcam
Devices camera
• Keyboard

• It is one of the most important input devices


use to input data and instructions into the
computer.
Typing Keys Keys
Control keys

Navigation Keys

Numeric Keypad
Function Keys

Types of Keyboard keys


• Types of Mouse

1.
Mechanical

Types of
Mouse

3.Optical 2.Opto
Mouse Mechanical
• Types of Scanner
1. Optical Character Recognition

2. OCR is the electronic or mechanical


conversion of images of typed, handwritten or printed text into machine-
encoded text, whether from a scanned document, a photo of a document,
a scene-photo.
• Optical Mark Reader

1. OMR is the process of gathering information from human


beings by recognizing marks on a document.
2. OMR is accomplished by using a hardware device
(scanner) that detects a reflection or limited light
transmittance on or through a piece of paper.
• MICR
1. MICR is used by the banking industry to
facilitate the processing of cheques.
2. MICR are printed in special interface
with the magnetic ink or toner.
• Bar Code Reader
1. It is an input device used for reading bar
codes present on various products.
2. A bar code reader consist – lens, light
source and a light sensor.
• Joystick
1. A joystick is an input device consisting of a stick that pivots
on a base and reports its angle or direction to the device it is
controlling.
2. A joystick, also known as the control column, is the principal
control device in the cockpit of many civilian and military aircraft,
either as a center stick or side-stick.
• Microphone

1. MIC is used to record and store voice or any other


sound into a computer, generally as a .wav file.

2. It is commonly used in video conferencing, speech


recognition programs, radio broadcasting
• Light Pen

1. A light pen is a light-sensitive pointing input device commonly


used to select or otherwise modify text or data on a screen.

2. It allows the user to point to display objects or draw on the screen


in a similar way to touchscreen but with greater positional
accuracy
• Voice Input Devices

1. A device in which speech is used to input data or system


commands directly into a system.
• Digital Camera

1.A digital camera or digicam is a camera


that captures photographs in digital
memory.
• Web camera
1. It is a device primarily used to share a live image in realtime to or through a
computer in a network.

2. Used in video conferencing


Speakers

Monitor
Printer

OUTPUT
DEVICES

Projector
Both Input and Output Acting Devices

CD/DVD
webcam

USB- Dnve modem-usb

touch screen
i Cram Pal
www_crampal.in
Camera
• Output Unit

The Output unit is used for displaying A computer can have several output
or printing the processed data in a devices attached to it .
user readable form.
• Monitor
• Touch screen monitor
• Printer
• Speaker
• Plotters
• Monitor

1. A monitor is an electronic
visual computer display that
includes a screen, circuitry
and the case in which that
circuitry is enclosed.

2. Monitor is made up of pixels.

3. The output display on


monitor is called
softcopy.
Differences between LED and LCD

Definition PN-Junction device which discharge It is an optical device used for


visible lights when an electrical charge displaying the information in the form
passes through it. of text and images.
Stand For Light Emitting Diode Liquid Crystal Display
Backlight No backlight Cold cathode fluorescent lamp provides
backlight.
Resolution High Low
Power Consumption Less More
Display Area Small Large
Cost High Low
Material Gallium arsenide phosphide. Liquid crystals and glass electrodes.
Switching Time Fast Slow
Direct Current Do not effects. Reduces Life Span
• Touch Screen Monitor

1. It is an input output device which allows user to input


information by touching the icons or graphical
buttons on the screen.

2. Eg: Used in Supermarkets, museum etc


Printers

Impact Printer Non Impact Printer

Dot- Daisy Thermal Ink Jet


Matri wheel Printers
x Printer
Laser Printer

3D Printer
• Speakers

1. They are mostly used to play a sound.


2. Converts electric current to sound.
• Plotters

1. A plotter produces vector graphics


drawings.

2. They were used in applications such as


computer-aided design, as they were able to
produce line drawings much faster and of a
higher quality than contemporary
conventional printers, and small desktop
plotters were often used for business graphics.
• Types of Plotters

FLATBED PLOTTERS DRUM PLOTTERS


• CPU
1. A central processing unit (CPU), also called a central processor or main processor, is the electronic
circuitry within a computer that executes instructions that make up a computer program. The CPU
performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the
instructions in the program.
Storage Devices
Hard Disk CD –Rom DVD Blue ray Disk Flash Drive

Memory Stick
1. Hard Disk

1. A hard disk drive (HDD), hard disk,


hard drive, or fixed disk[b] is an electro-
mechanical data storage device that
uses magnetic storage to store and retrieve
digital data using one or more rigid rapidly
rotating platters coated with magnetic
material
1. A CD-ROM compact disc read-only
memory is a pre-pressed optical compact disc that
contains data. Computers can
CD-ROM read—but not write to or erase— CD-ROMs, i.e. it is
a type of read- only memory.

2. The CD-ROM format was developed by Japanese


company Denon in 1982.
• DVD (Digital Version Disk)

1. DVD is a digital optical disc storage format invented and developed in 1995 and released in late 1996.

2. The medium can store any kind of digital data and is widely used for software and other computer files as well as
video programs watched using DVD players.

3. DVDs offer higher storage capacity than compact discs while having the same dimensions.
• BLU-RAY Disk
1. BRD is a new optical disk format that is rapidly replacing DVD.

2. The main application of Blu-ray is as a medium for video material such as feature films and for the physical distribution of
video games for the PlayStation 3, PlayStation 4, and Xbox One.
• Flash Drive

1. A flash drive is a small, ultra-portable


storage device which, unlike an optical drive or a traditional hard
drive, has no moving parts.
 Memory Stick

1. Memory Stick is a removable flash memory card format, originally


launched by Sony in late 1998.

2. Memory Sticks are used as storage media for a portable device, in a form
that can easily be removed for access by a personal computer.
 Memory Stick types

Memory
Stick Duo
and PRO
Duo
Memory
Stick Magic Gate
Pro

Memory
Stick
Types of Software
A computer is a machine that does not
possess any intelligence. It follows the
instructions given by the user.

A computer without instructions is like


a car without a driver.

software
A set of instructions that performs a
specific task is a program.

A collection of computer programs that


provides instructions to a computer is
known as software.
A computer software is a collection of
programs and procedures that instructs a
computer how to perform different types of
tasks.

A software enhances the capability of the


hardware and directs the computer how to
Software perform different types of tasks.

Software can be classified into two types:

Application
System software
software
Software

System Application
Software software

Operating Language Device General Specific Customized


Utilities purpose software
system processor drivers purpose
application application
s/w s/w
System Software

Collection of one or more Some of the functions


programs designed to control
overall operation and it performs are:
performance of a computer
system. To read data from input devices
To transmit the processed information
to output devices
To check the working order of all
peripheral devices
To convert data and instruction into
binary form
Provides a platform for running
application software
System Software …. cont.
• System software can be classified into the
following categories:

– Operating System
– Language Processors
– Device drivers
– Utilities
Operating System

An operating system (OS) is


a collection of software The operating system is a
that manages computer vital component of the
hardware resources and system software in a
provides common services computer system.
for computer programs.
Functions of an OS

PROCESSO MEMORY DEVICE FILE


R MANAGEME MANAGEME MANAGEME
MANAGEME NT NT NT
NT

SECURITY ERROR DETECTION JOB SCHEDULING


AND SECURITY
Language Processors
(Translators)
Assembler
• This language processor converts the program written in assembly
language into machine language.
Interpreter
• Converts a HLL into machine language by converting and executing
it line by line
Compiler
• Also converts HLL program into machine language but the
conversion manner is different
• Converts entire HLL program in one go and reports all errors of the
program along with line numbers.
HOW INTERPRETER AND COMPILER
WORKS
Disk/ Folder/ File Encryption/
Antivirus
Management Decryption
software
software software

Clipboard Computer access


Debuggers
managers control

Network utilities System Restore

Utility software (Utilities)


These are programs written by
programmers to enable computer to
perform a specific task such as
processing words, inventory control,
handling calculations and figures,

Application railway reservation, billing etc.

software
Application software can be further
subdivided into three categories:

• General purpose application software


• Specific Purpose application software
• Customized software
• They serve the
common needs of
many users. General
purpose software
packages are:-
• Word processing
packages
• Electronic

• Graphics and
multimedia
packages
• Database

packages
• Desk Top
General purpose Publishing packages

application software
Application designed for
specific purposes such a
company payroll, stock 1. Accounting management
comtrol systems, software
appointment systems, e-
commerce sites etc.
Specific
3. HR Management software
• Attendance system
• Payroll system
purpose
2. Reservation system
application
software
4. Inventory Control System 5. Billing System
Customized
Software
• Custom Software is
designing a software
application for a
specific group of
customers within the
organization. Such
custom software is
designed to address
their needs precisely
as opposed to the
more traditional and
widespread off-the-
shelf software.
Operating
System
User 2 User n

Text Editor Assembler Database System

SYSTEM AND APPLICATION PROGRAMS

-
OPERATING SYSTEM

COMPUTER
HARDWARE
Services provided by operating System
• Following are a few common service provided by an
operating system −
• Program execution
• Handling I/O operations
• manipulation of File System
• Communication
• Error Detection and handling
• Resource Allocation
• Accounting
• Information and Resource Protection
Types Of Operating System

Multiprogram Time sharing


Single User Real Time OS
OS OS

Multiprocessing Multithreading
Multitasking OS Distributed OS
OS OS

Operating System 5
Types OF
OS
• Types OF OS
based on Interface
1. Command line
Interface
2. Interactive
Operating System
Interface
2.1 Graphica
l User interface
2.2 Touch
Screen Interface

Operating System 12/9/2020 6


Commonly Used OS
• Linux
• Windows
• BOSS (Bharat
Operating System
Solution) Linux
• Solaris
• Mobile Operating System

Operating System 12/9/2020 7


File Management
• FILE: A FILE IS A COLLECTION OF DATA STORED IN ONE UNIT,
IDENTIFIED BY A FILENAME.

• FOLDER: A FOLDER, ALSO CALLED A DIRECTORY, IS A


SPECIAL TYPE OF FILE ON YOUR COMPUTER’S FILE SYSTEM
WHICH CONTAINS OTHER FILES AND FOLDERS.

COMPUTER • FILE MANAGEMENT: FILE MANAGEMENT IS THE STORING,


NAMING, SORTING AND HANDLING COMPUTER FILES.
NETWORKING
• FILE EXTENSION– A FILE EXTENSION, OR FILE NAME
EXTENSION, IS THE LETTERS IMMEDIATELY SHOWN
AFTER THE LAST PERIOD IN A FILE NAME.

• FOR EXAMPLE, THE FILE TXT HAS AN EXTENSION OF


.TXT. THIS EXTENSION ALLOWS THE OPERATING
SENDER

RECEIVER

TRANMISSION
MEDIUM

PROTOCOL
EFFICIENT USE OF STORAGE MEDIA PRESERVING INFORMATION

REDUCTION IN HARDWARE COST EFFICIENCY

REDUCES REDUNDANCY
NETWORK CABLES
0

r--II

ZONE
METROP'OLITANI AREA
NETW
ORK

NETWORK
NETWORKING DEVICES · l
REPEATER
MODEM SWITCH

•••••
,,1...........
..•.
• •• ••

GETWAY
ROUTER
Cyber Safety
Many Ways Websites Track You
Websites use various methods to track your online activity. Here are some of the most common
techniques:

1. IP Addresses: Your IP address identifies your device on the internet and can reveal your
general location1.
2. HTTP Referrer: When you click a link, the website you visit can see the URL of the page
you came from1.
3. Cookies: These are small pieces of data stored in your browser that can remember your
login details, preferences, and track your activity across different sites1.
4. Tracking Scripts: These scripts can monitor your behavior on a website, such as the pages
you visit and the actions you take1.
5. Super Cookies: These are more persistent than regular cookies and can track you even if
you delete your regular cookies1.
6. User Agent: This is a string of text that your browser sends to websites, which can include
information about your browser type, operating system, and more1.
7. Browser Fingerprinting: This technique uses your browser’s unique configurations and
settings to create a “fingerprint” that can track you across different sites
Confidentiality of Information

Confidentiality of information refers to the practice of keeping sensitive data


private and secure, ensuring that it is not disclosed to unauthorized individuals or
entities. Here are some key aspects:
1. Definition: Confidential information is any data or knowledge shared under
the condition that it remains private and undisclosed1. This can include
personal details, business secrets, medical records, and legal documents.
2. Legal Obligations: Certain professionals, such as doctors and lawyers, are
legally required to maintain confidentiality. For example, the attorney-client
privilege ensures that any information shared by a client with their lawyer
remains confidential2.
3. Confidentiality Agreements: These are contracts that outline the terms
under which information must be kept confidential. They are commonly
used in business to protect trade secrets and other sensitive information3.
4. Importance: Maintaining confidentiality helps build trust, protects privacy,
and ensures compliance with legal and ethical standards4.
Cybercrime

Cybercrime refers to illegal activities that involve computers, networks, or digital devices. Here are
some key points about cybercrime:
1. Types of Cybercrime:
o Identity Theft: Stealing personal information to commit fraud1.
o Phishing: Sending deceptive emails to trick individuals into revealing sensitive
information1.
o Malware: Distributing malicious software to damage or gain unauthorized access to
systems1.
o Ransomware: Encrypting a victim’s data and demanding payment for its release2.
o Cyber Espionage: Unauthorized access to confidential information for political or
economic gain2.
2. Impact:
o Financial Loss: Cybercrime can lead to significant financial damage for individuals
and organizations2.
o Data Breaches: Compromised personal and corporate data can lead to privacy
violations and identity theft2.
o Reputation Damage: Businesses can suffer reputational harm, leading to loss of
customer trust2.
3. Prevention:
o Use Strong Passwords: Create complex passwords and change them regularly2.
o Enable Two-Factor Authentication: Adds an extra layer of security to your
accounts2.
o Update Software: Regularly update your operating system and applications to
protect against vulnerabilities2.
o Be Cautious with Emails: Avoid clicking on suspicious links or downloading
attachments from unknown sources2.
Anonymous browsing

Anonymous browsing allows you to surf the web without revealing your personal information, such
as your identity, location, or browsing history. Here are some popular methods and tools to help you
browse anonymously:
1. Tor Browser: This browser routes your internet traffic through a network of servers,
encrypting it multiple times to hide your identity and location1.

2. VPN (Virtual Private Network): A VPN encrypts your internet connection and hides your
IP address, making it difficult for anyone to track your online activities2.

3. Private Search Engines: Search engines like Startpage do not track your searches or store
your personal data3.

4. Web Proxies: These act as intermediaries between your device and the internet, masking
your IP address2.

5. Secure Browsers: Browsers like Brave or Firefox with privacy-focused add-ons can help
block trackers and ads
Cyber Law
Cyber law, also known as internet law, encompasses the legal issues related to the use of the
internet and digital technologies. Here are some key aspects:
1. Definition: Cyber law includes regulations and legal principles that govern the internet
and related technologies. It covers a wide range of issues, from online privacy to
intellectual property1.
2. Importance: As digital technologies evolve, cyber law becomes crucial for protecting
individuals and organizations from cybercrimes, ensuring data privacy, and maintaining
the integrity of digital transactions2.
3. Types of Cyber Laws:
o Data Protection and Privacy Laws: These laws regulate the collection, storage,
and sharing of personal data. Examples include the General Data Protection
Regulation (GDPR) in Europe2.
o Intellectual Property Laws: Protects the rights of creators over their digital
content, such as software, music, and literature2.
o Cybercrime Laws: Address illegal activities conducted online, such as hacking,
identity theft, and cyberstalking2.
o E-commerce Laws: Regulate online business transactions, ensuring secure and
fair practices2.
4. Cybercrime and Cyber security: Cyber law also deals with cybercrimes like hacking,
phishing, and ransomware attacks. It includes measures to enhance cybersecurity and
protect against such threats1.
5. International Standards: Many countries have their own cyber laws, but international
standards like ISO 27001 help create a unified approach to cybersecurity1.

You might also like