Terms to Know

 Terms   
1Basic Operations4 Major Tasks Computer Does >Receive Input, Store Information, Process Information & Gives Output
2Store InformationData Store in the form of numbers according to ASCII ValuesNumerals have numbers
Alphabets & Symbols have numbers
Control Characters have numbers like Esc, del, space etc
Image, Video, Graphic have tiny pixels, each pixel have color in terms of RGB (Red, Green, Blue) and these colors have numbers (from 0-255) according to their brightness level. Average of thus numbers then mapped to ASCII number & further mapped to character with that ASCII value.
Sound is in wave form and that wave form mapped to ASCII values
3American Standard Code for Information Interchange (ASCII)Its Character encoding structureIn total, ASCII values ranging from 0 to 255, Each number is of 8 bit
Exp: ESC=27, #=35, 1=49, A=65, a=97 
Control characters have ASCII values from 0 to 32 & 127
A character, numeral refer to an integer number, some common used symbols between 33 to 126 & other symbols from 128 to 255 which are known as ASCII values
4Process InformationComputers process information by set AlgoritmAlgorithmSeries of Instructions executed internally by CPU while processing information or to perform a computation
5Wires SystemInside Computer have Circuits and these circuits have many wires >Single Wire passes electric signal and have Status either ON or OFF. This Represent a Bit
Information execute one by one in cpu with fraction of seconds in the form of binary numbers > on – off electrical pulses
2 Wires process 2 Bit of information in fraction of second, 32 Wires = 32 Bit, 64 Wires = process 64 Bit of information
6CircuitsAND, OR, NOT, NAND, NOR, XOR circuits give output electrical signals according to their characteristics wrt input electrical signalsThese circuits connects in combinations to perform calculations in computersLike Adder circuit to use for addition, Send/receive circuit use for information exchange, Store circuit to use store information in memory
7Central Processing Unit (CPU)Many of these Circuits are put on small chip called Micro ProcessorMicro Processor, have all the circuits to do different job and it only decide which circuit to use for different calculations
6Binary NumbersBinary Number means 0 or 1 > Means ON or OFF > Means True or FalseBits & Bytes >o   Bit = 0 or 1 (smallest unit)
o   1Byte = 8 Bit
o   1KB = 1024 Bytes
o   1MB = 1024 KB
o   1GB = 1024 MB
7PixelA tiny dot or square on computer screen thru which light comes out is called pixelWhen pixel is ON it emits white light and when pixel is OFF then its emit no light and seen black to usIn the RGB color spectrum, red, green, and blue are the primary colors. These colors are used to create pure white light when added together
All these pixels jointly make up the computer screen
Pixels have RGB (Red/Green/Blue) values & emits colourful light according to colored image which show up on computer screen
ResolutionTotal number of pixels in each dimension along the width & height of computer screen is called Screen ResolutionImage has size in Width & Height. Total pixels in width * total pixels in height is called Image Resolution
View PortThe portion of screen which changes according to dynamic content like the view of webpage on website is called the view port of screen in Browser
8Memory (RAM & ROM)RAMROMHard Disk / Solid State Disk
Ramdom Access MemoryRead Only MemoryStorage Memory
Computer store data for running process, once the process over, data deletedData in ROM is just read only and cannot be write more hereData can be read & write
Used by CPUUsed by System & User when needUsed by System & User when need
Data never remains for always on RAMData remains forever in ROMData remains forever
Very FastSlow comparative to RAMSlow than RAM but fast from ROM
9Storage Device (HDD & SSD)HDDSSD
Hard Disk DriveSolid State Drive
This drive has moving parts like read/write heads & Magnetic disk, data store on disk by electromagnetism (head does not touch the disk), Slower in natureThis drive has no moving part, also called flash drives, data store by passsing electrical signals, Fast in nature
Data can add, delete and store forever on HDDData can add, delete and store forever on SSD
10Operating System (OS)DOS (Disk Operating System) >Its text based Operating System > have commands to type in CLI to do job
Command Line Interface Tools (CLI) for Windows >Command Prompt, Power Shell (More advanced than CMD)Shell is a program that acts as an interface between the user and the operating system. Taken in DOS commands to execute those.
Command Line Interface Tools for MacOS, Linux >Console/Terminal, Bash/Zsh (is Shell for Linux type of OS)Both CMD & Console have different set of text commands to execute same action
Graphical Interface of OSWindows, Mac OS, Linux distribution is Ubuntu
11Applications (APP)Desktop Applications
Mobile Applications
Web Applications
API’s (Application Programing Interface)
Embedded Chip Programs
12Software Architecture Designingrepresents the design decisions related to software overall structure & behaviour.This is about what resources and modules to use in the construction of Software
2 Tier / 3 Tier / N Tier Architecture >2 Tier Architeture
Database Tier & Presentation Tier, Exp: MS Excel
3 Tier ArchitetureMost of the applications work on this architecture
Database Tier, Business Tier & Presentation Tier
N Tier Architeture
If data comes from diff. servers then it is called N Tier Architecture
Application UI DesigningGraphic designing, Web Page designing, Mobile App Screen designing & Desktop App UI designing
13Application Desirable FeaturesWeb App Desirable Features >User friendly Admin Portal
Customized design & theme
Cross browser compatibility
Flash Web Design >Use Vector animation software which create animation to display on web page in less size and rendered easily
E-Commerce Website >ability for money transaction
W3C Compliance >word wide web consortium
Mobile App Desirable Features >Well-designed user interface (UI)
Fast loading time
Strong data protection
Excellent user supportInbuilt support for user general queries
Built-in integrationsLike app should get data and share data with other apps in the system
Good  general navigation and accessibility
14Application Development ProcessGathering Information/Requirments, Requirment Analysis, Planning, Designing, Development, Quality Analysis, Deployment, User Experience, Bug fixing, Regression, Maintenance
Web Application DevelopmentExp: By ASP.Net (Web Form + Business Tier + Database Tier) / .Net MVC Framework (Autogenrated Presentation Tier + Business Tier + Database Tier) / .Net Core technology (for API Creation – Business Tier + Database Tier) using C# or Visual Basic Language > called Backend or APIRun on Web Server > Generate data to handle by HTML > Data from API can also handle by Technology “React” which handle HTML > called frontendHTML Understand by Web Browser
Mobile Application DevelopmentDevelop thru Android Studio, Xcode, React Native (for cross platform) frameworks by using languages Kotlin, Swift, Javascript respectively > called frontendAPI structure for mobile app remains the same as for web application
Application Programming Interface (API)Is a way to communicate betweem diff. parts of computer program intended to simplify the implementation and maintenance of softwareTypes of Request: GET, POST, PUT/UPDATE, DELETE
15Type of DevelopersGraphic Designers >Design Visual Elements of Screen
Front End Developer >Handles GUI > Coding for visual front elements which are directly access by user
Back End Developer >Handles Core Coding > APICoding for core computational, airthmetic & logical operations which are indirectly access by user  
Full Stack Developer >Done tasks of front and back end devleoper
QA Analyst / Engineer >Done Testing of the application
DevOps >Handles Source Code, Its deployment & migrations 
16World wide web (WWW)Is the inter-connected computers networkIs the information system where documents & other web resources identified by URL ( Uniform resource Locator) and are accessible over the internet
Uniform Resource Locator (URL)is the specific IP Addressmapped to alphabetsEnd Points: are the slug after domain name in url which access particular resource of API
Query ParamsQuery parameters are parameters added to the end of a URL to provide extra information to a web server when making requests. those are usually passed on after ?, Like www.website.com/contact?param1=value&param2=valueurl: www.website.com, endpoint or slug: /contact, Params: ?param1=value&param2=value
Payloadrefers to the data that’s sent in a request to server or received in a response from server, essentially the body of the HTTP message containing the actual information being exchanged between a client and a Serverthe payload might contain the user’s name, email, and password in JSON format: {“name”: “John Doe”, “email”: “john.doe@example.com”, “password”: “securePassword”}
17Domain Name System (DNS)Associates URL with particular IP Address Then computer use DNS Server to look partiuclar IP address correspond to URL typedQuery first come to DNS Resolver from DNS Client (Computer or router), DNS Resolver act as middle man for co-ordination. It directs query to Root NameServer.
DNS Servers are connected in distributted hirarchy like connected in groups for .com only / .org only / .net only. This is called Top Level DomainRoot Nameserver is an index of all servers and points the resolver towards the appropriate top-level domain (TLD) nameserver (like .com or .org)
DNS Servers are connected to the internetThe resolver then contacts the TLD nameserver, which in turn directs it to the Authoritative nameserver responsible for the specific domain you requested (e.g., google.com’s nameserver).
Finally, the resolver reaches the authoritative nameserver, which holds the domain’s DNS records. This nameserver checks its records (like A records for IPv4 addresses) and finds the corresponding IP address for the requested domain name, give it to DNS resolver
DNS resolver gives that it to DNS client. 
18InternetIs the medium to connect to inter-connected computers network which is called world wide web, uses internet protocol to link devices world wide
Internet Protocol (IP)(Set of rules which all parties agrees to follow in order while communicating) > IP Address >IPv 4 > (It is 4 sets of Numerals, 3 diff. numerals in each set totaling 8 bits, Grand totalling 4 sets = 32 bits) (Max 3 digit in each set of 4)32 Bit Number > 32 Binary Number used for complete set of IP Address alloted to computer / each device. Number in each set range from 0 to 255
IP have Network ID + Host IDClass A – spans the values 0.0.0.0 to 127.255.255.255. This class, which has 8 bits for the network and 24 bits for hosts, is designed for large networks.4 Sets of digits represents Country. Region. SubNetwork. Host id of Device. Totally 4 Billion devices can connect to internet. 
Loop back address – 127.0.0.1 to ping from CLI tool to get repsonse to check if NIC card brokenClass B – It is intended for medium-sized to big networks. fall between 128.0.0.0 and 191.255.255.255. It also contains 16 bits for hosts and 16 bits for the network.Public IP addresses are coordinated by IANA (The Internet Assigned Numbers Authority, who first allocates the different IP addresses to five RIRs(Regional Internet Registries). Organizations in need of IP addresses apply to these allocation centers who coordinate the allocation.
Class C – We use it for the small local area networks (LANs). The network in this class is indented using three octets. And the IP address has a range of 192.0.0.0 to 223.255.255.255, 24 network bits, and 8 host bits.Private vs Public IP Address: Public IP is provided by ISP which can find on Google by “What is my ip” and same is masked to Private IP Address provided by your router/computer while connected to internet which can see in system settings
Class D – are reserved for multicast communication, allowing a single data packet to be sent to a group of recipients simultaneously. That means we don’t use Class D for standard networking functions.Rest all are public ip address except this range for private IP: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255
Class E – We use it for experimental or study-related reasons. This class of IP addresses covers the first octet values 240.0.0.0 to 255.255.255.255.
IPv 6 > It is the latest version of IP128 Bit Number used in this, this version comes as no. of connected devices on internet increased manifolds since inception of IPv4
Subnet Mask255.255.255.1A subnet mask is a 32 bit number that distinguishes the network address and the host address within an IP address (the network portion of an IP address from the host portion, enabling network segmentation and routing).A subnet is a smaller network within a network that requires a subnet mask. Subnetting is the process of dividing a network into two or more subnets. like in 255.255.255.1, 255.255.255 is the network address & .1 is the host address (device id) which goes upto 255.
Default Gateway for LAN192.168.1.1This is the default gate way to communicate over network if destination gate is unknown to sent & receive packet
Internet Service Provider (ISP) Tier 1 Network, Tier 2, Tier 3 Network (In Desending order, these are the companies / suppliers of internet infrastructure at diff. levels worldwide)Tier 1 are the biggest companies
Dynamic Host Configuration Protocol (DHCP)Is a network management protocol used on Internet Protocol networks whereby a DHCP server assigned IP address to each device on a Local NetworkLAN IP’s allocated by DHCP upto value as specified in Subnet Mask
Virtual Private Network (VPN)is a secure connection that allows you to access the internet as if you were on a private network, masking your IP address and encrypting your data for enhanced privacy and security. VPN operate at the system level encrypits the data, further encrypted data is then wrapped inside additional data packets, The data packets is transmitted through a protected tunnel (This shields both the content and metadata) to the VPN server, VPN server decrypted data, assigned a new virtual IP address, and forwarded to its intended destination. VPN repeats this process in reverse when sending back response to clientVPN hides: Location and IP address, Recent searches (hidden from ISP), Websites you’ve visited (hidden from ISP), Data you send and receive, Files you download.
VPN  Not Hide: Activity on sites you’re logged into [do not login at any site], Activity tracked by cookies [delete cookies], Device browser history [use private browser], Browser fingerprinting and ad-tracking data [its browser property – use not to track feature], The simple fact you’re using a VPN (VPN server IP Address you connected with)
19BandwidthMaximum Number of Bits can be send / second
Bit RateNumber of Bits sent / second
LatencyTime taken by a Bit to travel from source to destination and receive back first repsonse from server
Bits Sending MediumBits can send by Electricity, Light & Radio WavesEthernet use Electric signals to send bits, is cheap and loss of signal can happen
Fibre Optic cables use light to send bits, which are very expensive and no signal loss can happen
Radio Waves, use in Mobiles, Wifi routers, convert digital data into radio waves of diff. frequency and receiver reconvert it into digital data, this technique works on short range
20Packets & Traffic Managers Routers (Packets)Small piece of information in the form of bytes is called packet and data sent on internet is in the form of many no. of packets who are having “From IP address” & “To IP Address” & “Total no. of packets for one call” and “current packet number”. Usually the packet size is 1024 bytes = 1KbSpecial computers on the internet called routers and act as traffic manager which directs the packets to destination computer according to best possible route available
Packet StructureHeader, Payload, Trailer >Header: containes Metadata (a set of data that gives information about other data) like : To & From IP address, Packet Sequence number, Protocol (type of Data), Total Packet nos
Payload: have the actual data transfer to/get from server
Trailer: Packet end information & error checksums data (add up value of all the 1s in payload)if the error checksum data does not match to the computation value of server then receiver request sender to resend that missing packet
21TCP (Transmission Control Protocol)Provide reliable, ordered/sequencial, error checked stream/packets of bytes b/w client & ServerTCP checks whether all packets received or not out of total data sent and provide feedback to sender server so that server can resend missing packet if anyFirst Handshake and then Data Transfer > 3 Way Handshake to establish connection b/w client & host before data flow: Synchronize (1way connection request from client), Synchronize (2way connection requestion from Server)+Acknowledge(for 1way request by server), Acknowledge(2way request by client). Thus 2 way communication setup
7 Layers of OSI Model (Open Systems Interconnection) >Application Layer >This is the application where user generates or gets data
Presentation Layer >Data Encryption happened at this layer
Session Layer >Maintains connection and is responsible for controlling ports and session
Transport Layer >This is the level where data is divided into packets and numbered to create a sequence. The transport layer determines how much data must be sent, where it should be sent to, and at what rate. It ensures that data packets are sent without errors and in sequence and obtains the acknowledgment that the destination device has received the data packets
Network Layer >Decide path at which data will travel, is responsible for sending packets from a network and controlling their movement across a network
Data Link Layer >The Data Link Layer is responsible for node-to-node data transfer and error detection and correction.
Physical Layer >Transmit bits over the physical medium like cables, wireless etc
22Security implemented on TCP (SSL)SSL (Secure Socket Layer) > Developed by NetscapeFirst Encription, Authentication check of Server, encription key sent to Receiver to Dycript & Data TransferAuthentication Check: TCP Check the digital certificate (issued by certification authority for verified content) of the website/server and warns you if not found, Then after start transfering of encrypted Data. Secure connection alias as HTTPS
Encryption Method is CAESAR’s CIPHER used like A+3=D is the actual letter and 3 is the key which only sender and receiver can know. This is symeteric Method
TLSTLS (Transport Layer Security) >First Encription by private key, Authentication check of Server, public encription key received from server, private key encripted by public key and sent to Server, it Dycript there and then pvt key used to dycript data & finally Data Transfer startAsymeteric Method use Public & Private Key Encryption
Authentication Certificate of server have public Key + certificate issue public which verify the client before to transfer private key to serverSender use Public key and receiver have private key to decript
23Data Transfer Protocol according to Media TypeHTTP / HTTPS (Hypertext Transfer Protocol for Webpages)
FTP / SFTP (File transfer protocol)
SMTP (Simple Mail Transfer Protcol)
POP (post office protocol)
IMAP (Internet Message access protocol)
PPP (point to point protocol)
24Internet Engineering Task Force (IETF)The IETF is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It develop all the internet standards
25Network enabled technologies (NET)Technologies that work accros/with the Internet
26Network Interface Card (NIC)Hardware circuit which makes possible for a computer to connect to NetworkEvery NIC has a hardware unique address that is known as MAC AddressMAC Addresses are linked to the hardware of network adaptors
Organizationally Unique Identifier (OUI) >Manufacturers place a special number sequence (called the Organizationally Unique Identifier or OUI) in the MAC address that identifies them as the manufacturer. The OUI is typically right at the front of the address.For example, consider a network adapter with the MAC address “00-14-22-01-23-45.” The OUI for the manufacture of this router is the first three octets—”00-14-22.” i.e. DELL
Medium Access Control Address (MAC)It is the unique number asigned to hardware of computer by manufacturer. 48 Bits. The MAC address is a string of usually six sets of two-digits or characters, separated by colons.Because a MAC address is a unique address, devices on a network do not share the same MAC address.Because of the potential of tracking wireless devices by using a MAC address, many manufacturers (e.g. Apple, Google and Microsoft) generate random MAC addresses.
MAC FilteringMAC filtering is a security measure to prevent unwanted network access by hackers and intruders. In MAC address filtering, the router is configured to accept traffic only from specific MAC addresses. This way, computers whose MAC addresses are approved will be able to communicate through the network—even if they were given a new IP address by DHCP.
Address Resolution Protocol (ARP)is a communications protocol that is an important part of IP (Internet Protocol). ARP maps a 32-bit IP address to a MAC address. 48 bit
27Portsthis is a connection point through which specific data can be transferred between a computer and other devices thru ip addressA port is a virtual point where network connections start and end. Ports are software-based and managed by a computer’s operating system. Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though both reach a computer over the same Internet connection.
Port NumberIs a way to identify a specific process/service thru which network message is to be forwarded when arrives at server Ports 20 and 21: File Transfer Protocol (FTP). FTP is for transferring files between a client and a server.
Port 22: Secure Shell (SSH). SSH is one of many tunneling protocols that create secure network connections.
Port 25: Historically, Simple Mail Transfer Protocol (SMTP). SMTP is used for email.
Port 53: Domain Name System (DNS). DNS is an essential process for the modern Internet; it matches human-readable domain names to machine-readable IP addresses, enabling users to load websites and applications without memorizing a long list of IP addresses.
Port 80: Hypertext Transfer Protocol (HTTP). HTTP is the protocol that makes the World Wide Web possible.
Port 123: Network Time Protocol (NTP). NTP allows computer clocks to sync with each other, a process that is essential for encryption.
Port 443: HTTP Secure (HTTPS). HTTPS is the secure and encrypted version of HTTP. All HTTPS web traffic goes to port 443. Network services that use HTTPS for encryption, such as DNS over HTTPS, also connect at this port.
Port 500: Internet Security Association and Key Management Protocol (ISAKMP), which is part of the process of setting up secure IPsec connections.
Port 587: Modern, secure SMTP that uses encryption.
Port 3389: Remote Desktop Protocol (RDP). RDP enables users to remotely connect to their desktop computers from another device.
28Kernela computer program at the heart of an operating system that controls everything else in the system.
Driverthis is a program that operates or controls a particular type of device that is attached to a computer; each device has its specific driver.
29Firewallthis is a software that helps to protect your computer from exchanging info to harmful network; it blocks unauthorized access while permitting authorized communication.
30Data TablesIs a format to store information in the form of columns and rows  in database
HypertextIt is the text which displayed on screen thru HTML
Hyperlink It refers to other text/Media which reader can immediately access from Hypertext documents interlinked by hyperlinks
31Button Vs HyperlinkButtonHyperlinkText Field
In case of Navigation, button does 2 actions. This means send data to save and then Navigate to next pageIts goes to next page w/o submitting anythingTakes in text to submit to server
32Vector Graphicsare the images or video made up of lines and shapes which defined mathematicaly. This means that they can be scaled up or down without losing any quality. These can be create and displayed by Adobe Flash (extention of flash file .SWF). These are less in size and used to display over webThe most common vector file types are SVG, AI, EPS, PDF, and CRR.