This textbook provides a thorough discussion of the fundamentals of computer science and relates them to practical applications. Using simple and lucid language, it guides students through the concepts and knowledge required to build a primary hardware platform and a modern software hierarchy from the ground up.
Students will learn about hardware architecture, operating systems, programming languages, compilers, algorithms, software engineering and data handling mechanisms. Computer networking concepts and data communication systems used in real-time platforms are also discussed. This book provides an overview of information security and the tools and techniques used to secure information. It also explores cybercrimes and the associated laws. It concludes with an in-depth discussion on autonomous systems – the technology of the future.
Salient features
S Sagayaraj is Associate Professor at the Department of Computer Science, Sacred Heart College (Autonomous), Tirupattur, Tamil Nadu.
A George Louis Raja is Head of the Department of Computer Applications (PG), Sacred Heart College (Autonomous), Tirupattur, Tamil Nadu.
A John Martin is Head of the Department of Computer Applications (UG), Sacred Heart College (Autonomous), Tirupattur, Tamil Nadu.
R Denis is Assistant Professor at the Department of Computer Science, Mount Carmel College (Autonomous), Bengaluru, Karnataka.
D Gajalakshmi is Assistant Professor at the PG Department of Computer Science, Sacred Heart College (Autonomous), Tirupattur, Tamil Nadu.
About the Authors
JNTUH Elements of Computer Science and Engineering Syllabus
Preface
Brief Overview of the Chapters
Acknowledgments
Chapter 1 Introduction to Computers
Introduction | What is a Computer? | Characteristics of Computers | History of Computers |
Generations of Computers | Classification of Computers | Computer Hardware | Types of Digital
Computers | Computer Software | Applications
Chapter 2 Storage Devices and Memory
Introduction | Types of Storage Devices | Memory | Types of Memory | Memory Hierarchy
Chapter 3 Input and Output Devices
Introduction | Input Devices | Output Devices | Input/Output Devices
Chapter 4 Computer Software
Introduction | Programming Languages | Types of Software | Packages | Frameworks | Integrated
Development Environment (IDE)
Chapter 5 Software Development
Introduction | What is Software? | What is Software Engineering? | Software Development Life Cycle
(SDLC) | Software Development Life Cycle Models
Chapter 6 Fundamentals of Programming
Introduction | Algorithm Specification | Fundamentals of Programming Languages | Steps in Program
Development | Types of Programming Languages | Data Structures
Chapter 7 Operating Systems
Introduction | What is an Operating System? | Evolution of the Operating System | Types of Operating
Systems | Popular Operating Systems | General Architecture of the Operating System | Functions of the
Operating System
Chapter 8 Data Handling Mechanisms
Introduction | Data and Information | Database and DBMS | Relational Database Management System
(RDBMS) | SQL | Data Centres | Data Models | Database Transactions | Cloud Services
Chapter 9 Computer Networks
Introduction | History of Computer Networks | Advantages of Computer Networks | Architecture of
a Computer Network | Types of Computer Networks | Internet | Wireless Sensor Network (WSN) |
Wi-Fi | Vehicular Networks (VANETs) | 5G Networks | Network Topologies
Chapter 10 Web Programming using HTML, CSS and XML
Introduction | Internet and the World Wide Web (WWW) | Form Design using HTML and CSS |
HTML with CSS | Client-side Validation Using Javascript | Content Structuring Using XML |
Tools for Web Design
Chapter 11 Social Media and Online Social Networks
Introduction | Types of Social Media and Formats | Popular Social Media Sites | Online Social
Networks | Benefits and Drawbacks of Social Networking | Privacy Threats in Social Media
Chapter 12 Information Security
Introduction | Security Overview | New Threats | Examples of Security Violations | Challenges in
Security | Security Terminology | Types of Security | Security Goals | Types of Attacks | Other Attacks |
Security Services | Security Mechanisms | Information Security Methods
Chapter 13 Cybersecurity
Introduction | Need for Cybersecurity | Cybercrime | Social Engineering and Cybercrimes | Cyber
Stalking | Cybercrime and Cyber Laws: An Indian Perspective | Cybercrime and Cyber Laws: A Global
Perspective | Cybercrime and Challenges | Cloud Computing and Cybercrime | Tools and Methods
Used in Cybercrime
Chapter 14 Autonomous Systems - I
Introduction | Internet of Things | Robotics | Drones | Artificial Intelligence
Chapter 15 Autonomous Systems - II
Machine Learning | Deep Learning | Game Theory | Natural Language Processing | Image Processing |
Video Processing
Index