Foundation of Information Technology CS CBSE (PDFs)
chapters included-ADDING MORE CONTROL TO PRESENTATIONS,ADVANCED FEATURE OF OPENOFFICE WRITER,BASICS OF INFORMATION TECHNOLOGY,COMPUTER SYSTEM,CONVERGENCE OF TECHNOLOGIES,EDITING AND FORMATTING IN EXCEL,INSERTING FORMULAS AND CHARTS IN CALC,INTRODUCTION TO OPENOFFICE CALC,INTRODUCTION TO WINDOWS 7,OPENOFFICE IMPRESS,OPERATING SYSTEM,SOCIETAL IMPACTS OF IT,TYPES OF SOFTWARE,WORD PROCESSING USING OPENOFFICE,WORD PROCESSING USING OPENOFFICE 2.
Introduction to Eyegaze Technology
The Eye gaze System is a direct-select vision-controlled communication and control system. It was developed in FAIRFAX, Virginia by LCTechnologies. This system is mainly used for the people with complex physical disabilities. Its users are adults and children with cerebral palsy, spinal cord injuries, brain injuries, ALS, multiple sclerosis, brainstem strokes. Good control of one eye Adequate vision Ability to maintain a position in front of the Eye gaze monitor. Mental abilities that improve the probability for successful Eyegaze use: Cognition Ability to read Memory
Multiple Access -Data Communications
It consists of typed notes of Multiple Access. It is shared with me by a student studying at FCRIT, Vashi, and I thought of uploading it here so that the students of first and second-year IT Engineering would benefit a lot from it. Thank You! Enjoy learning.
Memory Organisation- W. Stallings and B. Govindarajalu
Contents:- Introduction to Memory Memory parameters Classifications of memories. Types of RAM and ROM Allocation policies ( First, best, next, worst fit policies ) Memory hierarchy and characteristics. Cache memory: Concept, architecture (L1, L2, L3), mapping techniques Cache Coherency, Interleaved and Associative memory
Data Representation and Arithmetic Algorithms
It consists of typed notes of Data representation and Arithmetic Algorithms. It is shared with me by a student studying at FCRIT, Vashi, and I thought of uploading it here so that the students of first and second-year ITE and CSE would benefit a lot from it. Thank You! Enjoy learning. To understand : 1. Different data ( number ) representation systems like: Binary Data representation Two’s Complement representation Floating Pointing representation IEEE 754 floating-point number representation 2. Different techniques for performing arithmetic operations on Integer and Floating point numbers. Integer Data Computation : Addition Subtraction Multiplication: Signed Multiplication, Booth’s Algorithm Division: Restoring and Non-Restoring division Floating-Point Arithmetic : Addition Subtraction
Input/Output - Organisation
Content: Input Output systems I / O modules and 8089 processor Types of data transfer techniques : Programmed I/O Interrupt driven I/O DMA FAQs covered in this PDF:- Frequently asked University questions : (10M) 1. Explain DMA based data transfer techniques for I/O devices. 2. Write detailed notes on ( All three very important) : 1. Programmed I/O 2. DMA 3. Interrupt driven I/O 3. What are the major requirements of an I/O module? 4. Explain the structure of an I/O module.
Entity-Relationship Model
Entity-Relationship Model ● Design Process ● Modeling ● Constraints ● E-R Diagram ● Design Issues ● Weak Entity Sets ● Extended E-R Features ● Design of the Bank Database ● Reduction to Relation Schemas ● Database Design ● UML Useful for the students who are learning the Database Management System and its a basic introduction to the topic of SQL and MongoDB. In this, we understand the need of the client and make the data base according to his needs.
Network Layer: Logical Addressing
Responsibilities of the Network layer 1. Host to Host (source to destination delivery of message) To deliver packets from source to destination across multiple links (networks). Or Network layer works for the transmission of data from one host to the other located in different networks. 2. Logical Addressing In order to identify each device on internetwork uniquely, the network layer defines an addressing scheme. The sender & receiver’s IP address is placed in the header by the network layer. Such an address distinguishes each device uniquely and universally. - Segment in the Network layer is referred to as Packet. - Network layer is implemented by networking devices such as routers 3. Routing The network layer protocols determine which route is suitable from source to destination. This function of the network layer is known as routing. 4. Fragmentation and Reassembly The network layer must send data down to the data link layer for transmission. The data or information that the network layer receives is in the form of a packet and the data that data link layer forwards is called a frame. The network layer has the responsibility of Fragmentation and reassembly because some data link layer technologies have limits on the length of any message that can be sent. If the packet of data that the network layer has to send is too large, the network layer must break the packet up, send each packet to the data link layer, and then have pieces reassembled once they arrive at the network layer on the destination system.
Delivery, Forwarding, and Routing
The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Topics discussed in this section: Direct Versus Indirect Delivery
Process-to-Process Delivery: UDP, TCP, and SCTP
The transport layer is responsible for process-to-process delivery—the delivery of a packet, part of a message, from one process to another. Two processes communicate in a client/server relationship, as we will see later. The transport layer is responsible for process-to-process delivery.
Transmission Media -with types of Cables
Guided media, which are those that provide a conduit from one device to another, include twisted-pair cable, coaxial cable, and fiber-optic cable. Topics discussed in this section:- Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable
Congestion Control and Quality of Service
The main focus of congestion control and quality of service is data traffic. In congestion control, we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic. So, before talking about congestion control and quality of service, we discuss the data traffic itself. • Congestion occurs when a switch or router receives data faster than it can send it.