WHAT IS COMPUTER?
Definition:
A Computer is an electronic device for storing data, processing information and
displays the desired (want) output in human readable form.
Especially computer is used to type documents, send email, play games,
and browse the
Web. You can also use it to edit or create spreadsheets, presentations, and even videos.
DATA
REPRESENTATION:
NUMBERSYSTEM:
A set of values used to represent different quantities is known as Number System".
Some
important number systems are as follows.
·
Decimal
number system
·
Binary
number system
·
Octal
number system
·
Hexadecimal
number system
Decimal number System
The Decimal Number System consists of
ten digits from 0 to 9 (i.e 0 1 2 3 4 5 6 7 8 9 ). These digits can be used to
represent any numeric value. The base of decimal number system is 10. It is the
most widely used number system.
Example:
The
value of digit 4
= 4x102
= 400
The
value of digit 5
= 5x101 =
50
The
value of digit 3
= 3x100
= 3
The
actual number can be found by adding the values obtained by the digits as
follows:
400
+ 50 + 3 =45310
Binary Number System
Digital computer represents all kinds
of data and information in the binary system. Binary Number System consists of
two digits 0 and 1. Its base is 2. Each digit or bit in binary number system
can be 0 or 1. A combination of binary numbers may be used to represent
different quantities like 1001.
Example: Convert 101112 to decimal number
101112
= 1 x 24 + 0 x 23
+ 1 x 22 + 1 x 21 + 1 x 20
= 1 x 16 + 0 + 1 x 4 + 1
x 2 + 1 x 1
= 16 + 0 + 4 2 + 1
= 2310
Octal Number System
Octal Number System consists of eight
digits from 0 to 7. The base of octal system is 8. Each digit position in this
system represents a power of 8. Any digit in this system is always less than 8.
Octal number system is used as a shorthand representation of long binary
numbers.
Example: convert 458 to decimal number
458
= 4 x 81 + 5 x
80
= 4 x 8 + 5 x 1
= 32 + 5
= 3710
Hexadecimal number system
The Hexadecimal Number System consists
of 16 digits from 0 to 9 and A to F. The alphabets A to F represent decimal
numbers from 10 to 15. The base of this number system is 16. Each digit
position in hexadecimal system represents a power of 16. The number 76416 is
valid hexadecimal number. It is different from 76410 which is seven hundred and
sixty four.
Example: Convert 3A16 to decimal number
3A16
= 3 x 161 + A
x 160
= 3 x 16 + 10 x 1
= 48 + 10
= 5810
BINARY
NUMBER CONVERSION
Binary to Octal
An easy
way to convert from binary to octal is to group binary digits into sets of
three, starting with the least significant (rightmost) digits.
Then, look up each group in a table:
Binary:
|
000
|
001
|
010
|
011
|
100
|
101
|
110
|
111
|
|||||
Octal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
|||||
Binary =
|
011
|
100
|
101
|
||||||||||
Octal =
|
3
|
4
|
5
|
= 345 oct
|
|||||||||
Binary to Hexadecimal
An equally
easy way to convert from binary to hexadecimal is to group binary digits into
sets of four, starting with the least significant (rightmost) digits.
Binary:
11100101 = 1110 0101
Binary:
|
0000
|
0001
|
0010
|
0011
|
0100
|
0101
|
0110
|
0111
|
Hexadecimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Binary:
|
1000
|
1001
|
1010
|
1011
|
1100
|
1101
|
1110
|
1111
|
||||
Hexadecimal:
|
8
|
9
|
A
|
B
|
C
|
D
|
E
|
F
|
||||
Binary =
|
1110
|
0101
|
||||||||||
Hexadecimal =
|
E
|
5
|
= E5
|
|||||||||
Binary to Decimal
1.
Start the decimal result at 0.
2.
Remove the most significant binary digit (leftmost) and add
it to the result.
3.
If all binary digits have been removed, you’re done. Stop.
4.
Otherwise, multiply the result by 2.
5.
Go to step 2.
Here is an
example of converting 11100000000 binary to decimal:
Binary Digits
|
Operation
|
Decimal Result
|
Operation
|
Decimal Result
|
11100000000
|
+1
|
1
|
× 2
|
2
|
1100000000
|
+1
|
3
|
× 2
|
6
|
100000000
|
+1
|
7
|
× 2
|
14
|
00000000
|
+0
|
14
|
× 2
|
28
|
0000000
|
+0
|
28
|
× 2
|
56
|
000000
|
+0
|
56
|
× 2
|
112
|
00000
|
+0
|
112
|
× 2
|
224
|
0000
|
+0
|
224
|
× 2
|
448
|
000
|
+0
|
448
|
× 2
|
896
|
00
|
+0
|
896
|
× 2
|
1792
|
0
|
+0
|
1792
|
done.
|
DECIMAL
NUMBER CONVERSION
A repeated
division and remainder algorithm can convert decimal to binary, octal, or
hexadecimal.
1.
Divide the decimal number by the desired target radix (2, 8,
or 16).
2.
Append the remainder as the next most significant digit.
3.
Repeat until the decimal number has reached zero.
Decimal to Binary
Here is an
example of using repeated division to convert 1792 decimal to binary:
Decimal Number
|
Operation
|
Quotient
|
Remainder
|
Binary Result
|
|
1792
|
÷ 2 =
|
896
|
0
|
0
|
|
896
|
÷ 2 =
|
448
|
0
|
00
|
|
448
|
÷ 2 =
|
224
|
0
|
000
|
|
224
|
÷ 2 =
|
112
|
0
|
0000
|
|
112
|
÷ 2 =
|
56
|
0
|
00000
|
|
56
|
÷ 2 =
|
28
|
0
|
000000
|
|
28
|
÷ 2 =
|
14
|
0
|
0000000
|
|
14
|
÷ 2 =
|
7
|
0
|
00000000
|
|
7
|
÷ 2 =
|
3
|
1
|
100000000
|
|
3
|
÷ 2 =
|
1
|
1
|
1100000000
|
|
1
|
÷ 2 =
|
0
|
1
|
11100000000
|
|
0
|
done.
|
Decimal to Octal
Here is an
example of using repeated division to convert 1792 decimal to octal:
Decimal Number
|
Operation
|
Quotient
|
Remainder
|
Octal Result
|
|
1792
|
÷ 8 =
|
224
|
0
|
0
|
|
224
|
÷ 8 =
|
28
|
0
|
00
|
|
28
|
÷ 8 =
|
3
|
4
|
400
|
|
3
|
÷ 8 =
|
0
|
3
|
3400
|
|
0
|
done.
|
Decimal to Hexadecimal
Here is an
example of using repeated division to convert 1792 decimal to hexadecimal:
Decimal Number
|
Operation
|
Quotient
|
Remainder
|
Hexadecimal Result
|
|
1792
|
÷ 16 =
|
112
|
0
|
0
|
|
112
|
÷ 16 =
|
7
|
0
|
00
|
|
7
|
÷ 16 =
|
0
|
7
|
700
|
|
0
|
done.
|
The only
addition to the algorithm when converting from decimal to hexadecimal is that a
table must be used to obtain the hexadecimal digit if the remainder is greater
than decimal 9.
Decimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Hexadecimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Decimal:
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
Hexadecimal:
|
8
|
9
|
A
|
B
|
C
|
D
|
E
|
F
|
The
addition of letters can make for funny hexadecimal values. For example, 48879
decimal converted to hex is:
Decimal Number
|
Operation
|
Quotient
|
Remainder
|
Hexadecimal Result
|
|
48879
|
÷ 16 =
|
3054
|
15
|
F
|
|
3054
|
÷ 16 =
|
190
|
14
|
EF
|
|
190
|
÷ 16 =
|
11
|
14
|
EEF
|
|
11
|
÷ 16 =
|
0
|
11
|
BEEF
|
|
0
|
done.
|
OCTAL NUMBER
CONVERSION
Octal to Binary
Converting from octal to binary is as easy as converting from
binary to octal. Simply look up each octal digit to obtain the equivalent group
of three binary digits.
Octal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Binary:
|
000
|
001
|
010
|
011
|
100
|
101
|
110
|
111
|
Octal =
|
3
|
4
|
5
|
|
Binary =
|
011
|
100
|
101
|
=
011100101 binary
|
Octal to Hexadecimal
When converting from octal to hexadecimal, it is often easier
to first convert the octal number into binary and then from binary into
hexadecimal. For example, to convert 345 octal into hex:
(from the previous example)
Octal =
|
3
|
4
|
5
|
|
Binary =
|
011
|
100
|
101
|
=
011100101 binary
|
Binary 011100101 = 1110 0101
Then, look up the groups in a table to convert to hexadecimal
digits.
Binary:
|
0000
|
0001
|
0010
|
0011
|
0100
|
0101
|
0110
|
0111
|
Hexadecimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Binary:
|
1000
|
1001
|
1010
|
1011
|
1100
|
1101
|
1110
|
1111
|
Hexadecimal:
|
8
|
9
|
A
|
B
|
C
|
D
|
E
|
F
|
Binary =
|
1110
|
0101
|
|
Hexadecimal =
|
E
|
5
|
=
E5 hex
|
Therefore, through a two-step conversion process, octal 345
equals binary 011100101 equals hexadecimal E5.
Octal to Decimal
The conversion can be performed in the conventional
mathematical way, by showing each digit place as an increasing power of 8.
345 octal = (3 * 82) + (4 * 81) + (5 *
80) = (3 * 64) + (4 * 8) + (5 * 1) = 229 decimal
HEXADECIMAL
NUMBER CONVERSION
Hexadecimal to Binary
Converting
from hexadecimal to binary is as easy as converting from binary to hexadecimal.
Simply look up each hexadecimal digit to obtain the equivalent group of four
binary digits.
Hexadecimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Binary:
|
0000
|
0001
|
0010
|
0011
|
0100
|
0101
|
0110
|
0111
|
Hexadecimal:
|
8
|
9
|
A
|
B
|
C
|
D
|
E
|
F
|
Binary:
|
1000
|
1001
|
1010
|
1011
|
1100
|
1101
|
1110
|
1111
|
Hexadecimal =
|
A
|
2
|
D
|
E
|
|
Binary =
|
1010
|
0010
|
1101
|
1110
|
= 1010001011011110 binary
|
Hexadecimal to Octal
When
converting from hexadecimal to octal, it is often easier to first convert the
hexadecimal number into binary and then from binary into octal. For example, to
convert A2DE hex into octal:
(from the previous example)
Hexadecimal =
|
A
|
2
|
D
|
E
|
|
Binary =
|
1010
|
0010
|
1101
|
1110
|
= 1010001011011110 binary
|
Add
leading zeros or remove leading zeros to group into sets of three binary
digits.
Binary:
1010001011011110 = 001 010 001 011 011 110
Then, look up each group in a table:
Binary:
|
000
|
001
|
010
|
011
|
100
|
101
|
110
|
111
|
Octal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Binary =
|
001
|
010
|
001
|
011
|
011
|
110
|
|
Octal =
|
1
|
2
|
1
|
3
|
3
|
6
|
= 121336 octal
|
Therefore,
through a two-step conversion process, hexadecimal A2DE equals binary
1010001011011110 equals octal 121336.
Hexadecimal to Decimal
Converting
hexadecimal to decimal can be performed in the conventional mathematical way,
by showing each digit place as an increasing power of 16. Of course,
hexadecimal letter values need to be converted to decimal values before
performing the math.
Hexadecimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Decimal:
|
0
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
Hexadecimal:
|
8
|
9
|
A
|
B
|
C
|
D
|
E
|
F
|
Decimal:
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
= ((A) * 163) + (2 * 162) + ((D) * 161) + ((E) * 160)
= (10 * 163) + (2 * 162) + (13 * 161) + (14 * 160)
= (10 * 4096) + (2 * 256) + (13 * 16) + (14 * 1)
= 40960 + 512 + 208 + 14
= 41694 decimal
TYPES
OF COMPUTER
Computer can be classified according to two different ways.
They are
1.
According
to the logic used by the computer.
2.
According
to the size of the computer.
According to the logic used by the
computer. It can be classified
into 3 types. They are
1.
Analgo
Computers 2. Digital Computers 3. Hybrid Computers
Analgo Computers: The
computers which accept the data in the form of voltage (v) or current
signals and convert them to numeric values are called Analog Computers.
These
Computers can measure physical quantities like temperature, speed etc..These
Computers give only approximate results.
Ex: . A
speedometer which measures the speed of vehicle, and thermometer which measures
the temperature of the body etc...
Digital Computers: The
computer which accepts the data in the form of binary digits (bits)
representing ZERO (0) and ONE (1) are called as Digital Computers. Each one is
called as a bit. Logically 0 indicates false and 1 indicates true.
Digital Computers give more accurate
and very faster results than analog computers.
Digital Computers deal with counting
rather than physical measurement. They accept the input data and instructions
in the form of digits 0 to 9, alphabets ( A to Z) or special symbols like + , *
,- ,/ ,$ ,% etc…. In this there are TWO
purposes of digital computers. They are
1.
General
Purpose Digital Computer 2. Special Purpose Digital Computer
General
Purpose Digital Computers are designed to perform of different jobs or
applications. These computers can be used in solving a business problem as well
as mathematical problem with same accuracy and consistency.
Special
Purpose Digital Computers are designed to meet the need of special application.
They are designed, made and used for only a single job. So they execute their
tasks quickly and efficiently.
Hybrid Computers: The
computers which accept the data in the form of combination of voltage or
signals or binary digits are known as Hybrid Computers. So, these computers are
computers which have the features of both digital and analog computers.
These
computers are very useful in scientific research and to perform specific job
etc….
Ex: In a hospital ICU (Intensive Care Unit) ,
Analog devices may measure a patient’s heart function, temperature and other
vital signs. These measurements may then be converted into numbers and supplied
to the digital device which may send as immediate signal to the nurses’ station
if any abnormal reading is detected.
According to the SIZE , the computers are classified as
follows:
1. Super
computers 2. Mainframe computers 3.Mini computers 4. Micro computers
Super computers: Super
computers are large size computers and
these computers can be processed
billions of instructions per second. These systems are multiprocessor
system and it is used to do parallel
processing. These systems are very expensive and powerful and used in the
complex tasks. It is typically used for following applications.
·
Weather
Information
·
Medicine
·
Real-time
Animation etc…..
Mainframe computers: Mainframe
computers are large size computers and these computers can be processed
hundreds of millions of instructions per second. In this computer, RAM is much
more than micro computers as well as mini computers and it supports 100 users
in time sharing mode. These computers are used in large organizations like…
·
Railway
reservations
·
Airlines
reservations
·
Banking
applications etc…..
Mini computers: Mini
computers are also large size computers and these computers and it supports
multiuser environment. These computers are expensive as compare to micro
computers. The main memory RAM can be 1MB to 16 MB.These computers also used in
large organizations like..
·
Reservation
system
·
Banking
and industries.
Micro computers : Micro computers are
smallest category of digital computers in which a microprocessor performs the
function of ALU and Control Unit. These computers are single user systems which
mean that a single user can operate only one system at a time. These computers
are also classified into types. They are
1.
Desktop
computers 2. Laptop computers 3. Handheld computers
Desktop computers ( Personal computers): Desktop
computers are also called as Personal computers or simply PC’s. Today the
Desktop computers are most popular computer systems. They are usually easier to
use and more affordable.
Laptop computers: Laptop
computers are portable computers. They are light weight computers with a thin
screen. They are also called as notebook computers because of their small size.
It can be easily carried from one place to another place. It has battery also.
Handheld computers: Handheld
computers are also called as Personal Digital Assistants (PDA’s). These
computers are pen based and battery – powered. These systems are small size and
carried easily from one place to another place.
GENARATIONS OF COMPUTER
Initially, the generation term was used to distinguish
between varying hardware technologies. But nowadays, generation includes both
hardware and software, which together make up an entire computer system.
Following are the main five generations of computers
S.N.
|
Generation & Description
|
1
|
The period of first generation: 1946-1959. Vacuum tube based.
|
2
|
The period of second generation: 1959-1965. Transistor based.
|
3
|
The period of third generation: 1965-1971. Integrated Circuit based.
|
4
|
The period of fourth generation: 1971-1980. VLSI (Very Large Scale
Integration) microprocessor based.
|
5
|
The period of fifth generation: 1980-onwards. ULSI ( Ultra )microprocessor
based
|
The computers of first generation used vacuum tubes as
the basic components for memory and circuitry for CPU (Central Processing
Unit). In this generation mainly batch processing operating system were used.
Punched cards, paper tape, and magnetic tape were used as input and output
devices. The computers in this generation used machine code as programming
language.
The main features of first generation are:
·
Vacuum tube technology
·
Supported machine language only
·
Very costly
·
Generated lot of heat
·
Slow input and output devices
·
Huge size
·
Need of A.C.
·
Non-portable
In this generation transistors were used that were
cheaper, consumed less power, more compact in size, more reliable and faster
than the first generation machines made of vacuum tubes. In this generation,
magnetic cores were used as primary memory and magnetic tape and magnetic disks
as secondary storage devices. In this generation assembly language and
high-level programming languages like FORTRAN, COBOL were used. The computers
used batch processing and multiprogramming operating system.
The main features of second generation are:
·
Use of transistors
·
Smaller size as compared to first generation computers
·
Generated less heat as compared to first generation computers
·
Faster than first generation computers
·
Still very costly
·
A.C. needed
·
Supported machine and assembly languages
The computers of third
generation used integrated circuits (IC's) in place of transistors. A single IC
has many transistors, resistors and capacitors along with the associated
circuitry. The IC was invented by Jack Kilby. This development made computers
smaller in size, reliable and efficient. In this generation remote processing,
time-sharing, multi-programming operating system were used. High-level
languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were
used during this generation.
The main features of third generation are:
·
IC used
·
Smaller size
·
Generated less heat
·
Faster
·
Lesser maintenance
·
Still costly
·
A.C needed
·
Supported high-level language
The
computers of fourth generation used Very Large Scale Integrated (VLSI)
circuits. VLSI circuits having about 5000 transistors and other circuit
elements and their associated circuits on a single chip made it possible to
have microcomputers of fourth generation. Fourth generation computers became
more powerful, compact, reliable, and affordable. As a result, it gave rise to
personal computer (PC) revolution. In this generation time sharing, real time,
networks, distributed operating system were used. All the high-level languages
like C, C++, DBASE etc., were used in this generation.
The main features of fourth generation are:
·
VLSI technology used
·
Very cheap
·
Use of PC's
·
Very small size
·
No A.C. needed
·
Concept of internet was introduced
·
Computers became easily available
In the
fifth generation, the VLSI technology became ULSI (Ultra Large Scale
Integration) technology, resulting in the production of microprocessor chips
having ten million electronic components. This generation is based on parallel
processing hardware and AI (Artificial Intelligence) software. All the
high-level languages like C and C++, Java, .Net etc., are used in this
generation.
The main features of fifth generation are:
·
ULSI technology
·
Development of true artificial intelligence
·
Advancement in Parallel Processing
·
More user friendly interfaces with multimedia feature
BLOCK
DIAGRAM OF COMPUTER
The computer
system consists of three units:
1. Input Unit
2.
Central Processing Unit (CPU)
3. Output Unit
Block diagram of a Computer:
Working
Process of above diagram:
·
The program or data is entered through
input unit like keyboard and that data is controlled by C .U.
·
The control unit sends this data to
the memory unit (M.U) for temporary storage i.e. in RAM (Random Access Memory).
·
This temporary stored data is then
sent to A.L.U (Arithmetic Logical Unit) for processing through C.U.
·
A.L.U processes this data and then this
processed data sent it back to Memory Unit for permanent storage i.e. in hard disk,
again through C.U.
·
This processed data can also be sent
to output unit directly through control unit or it can also sent from
permanently stored memory i.e. M.U to the output unit.
·
Finally, this output unit will give
the result
1.
Input: This is the process of
entering data and programs in to the computer system. You should know that
computer is an electronic machine like any other machine which takes as inputs
raw data and performs some processing giving out processed data. Therefore, the
input unit takes data from us to the computer in an organized manner for
processing.
2.
Central
Processing Unit: It is the part of the computer that carries out
the instructions of a computer
program. It is the unit that reads and executes program instructions. Hence it
is known as the Brain of the computer. The CPU consists of storage or memory
unit, Arithmetic Logic Unit (ALU) and control unit.
(a). Memory Unit: It is also known as the primary storage or
main memory. It stores data, program instructions,
internal results and final output temporarily before it is sent to an
appropriate output device. It consists of thousands of cells called ―storage
locations‖. These cells activate with ―off-on‖ or binary digits (0,1)
mechanism. Thus a character either a letter or numerical digit is stored as a
string of (0, 1) Binary digits (BITS). These bits are used to store
instructions and data by their combinations.
(b) Arithmetic and Logical Unit(ALU): It is the unit where all Arithmetic operations
(addition, subtraction
etc.) and logical functions such as true or false, male or female are
performed. Once data are fed into the main memory from input devices, they are
held and transferred as needed to ALU where processing takes place. No process
occurs in primary storage. Intermediate generated results in ALU are
temporarily placed in memory until needed at later time. Data may move from
primary memory to ALU and back again to storage many times before the process
is finalized.
(c).Control
Unit : The control unit controls all the activities of the computer.
3. Output: This is the process of producing results from the data for
getting useful information.
Similarly the output produced by the computer after processing must also be
kept somewhere inside the computer before being given to you in human readable
form. Again the output is also stored inside the computer for further
processing.
PRIMARY STORAGE
Primary Storage is also called as a
Main Memory and it is the part of computer system. In this, the processor and
CPU directly stores data and retrieve information. This memory is accessed by
CPU in random manner.
The Primary Memory or Main Memory is
implemented by two types of memory technologies. They are 1.RAM (Random Access
Memory) 2.ROM (Read Only Memory)
1. RAM (Random Access Memory): Ram
is made of electronic chips that means made of semiconductor material just like
processors. In RAM, transistors make up the individual storage cells which can
each keep an amount of data. RAM is also called as RWM (Read and Write Memory).
RAM stores the data temporarily in the
computer. RAM nature is VOLATILE
that means data stored in computer, it is lost when we switch of the computer
or if there is a power failure.
RAM can be both means it can be
physically as well as in the amount of data it can hold. RAMs are two types.
They are
1. SRAM (Static RAM) 2. DRAM (Dynamic RAM)
1. SRAM (Static RAM): The
word Static indicates that the memory retains (keep or maintain) its contents as
long as electrical power is applied to the chip. However, data is lost when the
power gets down due to the volatile. SRAM need not have to be refreshed on the
regular basis
2. DRAM (Dynamic RAM): DRAM
unlike SRAM, it must be continually refreshed in order for maintain the data.
DRAM is used for most system memory because it is cheap and small. DRAM used
less chips than SRAM for the same amount of storage space.
2. ROM (Read Only Memory): ROM
is a permanent memory and it is provided by the manufacturer at the time of
fabrication. They are two reasons why read-only
·
Permanent
·
Security
Permanent: The
values or data stored in ROM are always retained even when power is off .For
this reason it is called as Non-Volatile and the hard disk is also Non-Volatile
for this same reason but regular RAM is not.
Security: Actually
ROM refers only to mask ROM the oldest type of solid state ROM, which is
fabricated with the desired data permanently stored it and it can never
modified. But modern types semiconductor ROM chips such as EPROM and flash
EERPOM can be erased and re-programmed multiple times.
ROM
has different types of Rom’s. They are
·
MROM ( Masked
ROM)
·
PROM (
Programmable ROM)
·
EPROM( Erasable PROM)
·
EEPROM(
Electrically Erasable PROM)
MROM (Masked ROM): It
is a hard-wired device that contained pre-programmed set of data or
instructions.
PROM (Programmable ROM): PROM
is read only memory that can be modified only once by user. The user buys a
blank PROM and enters the desired contents using PROM programmer. It cannot be
erasable.
EPROM (Erasable PROM): EPROM
can be erased and re-programmed and it can be erased by exposure to strong
ultraviolet light (typically for 10 minutes or longer), then re-written with a
process that again requires application of higher than usual voltage.
EEPROM (Electrically Erasable PROM): EERPOM
is programmed and erased electrically. It can be erased and re-programmed about
10 thousand times. Both erasing and programming take about 4 to 10
milliseconds. In this, any location can be selectively erased and programmed
and it can be erased 1 byte at a time.
CACHE
MEMORY:
Cache Memory is the process of
moving the data between CPU and RAM. It is one of the most time consuming
operations a CPU must performs
because RAM is much more slow
than CPU.
A
partial (in complete) solution to this problem is to include a Cache Memory in
the CPU.
Cache
Memory is similar to RAM except that it is extremely fast compared to normal
memory and it is used in a different way.
When a program is running and the
CPU needs to read piece of data or program instructions from RAM, the CPU
checks first to see whether the data is in cache memory. If the data is not
there, the CPU reads the data from RAM into its registers, but also loads a
copy of the data into cache memory. The next time the CPU needs the data; it
finds it in the cache memory and saves the time needed to load the data from
RAM.
UNIT-2
Devices are used
to provide data and instructions to the computer are called Input devices. Some important input devices are
1. Keyboard 2.Mouse 3. Joy Stick 4.Light
pen 5.Track Ball 6.Scanner 7.Microphone 8.Bar Code Reader
Keyboard
Keyboard is the
most common and very popular input device which helps in inputting data to the
computer. Keyboards are of two
sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108 keys are
also available for Windows and Internet.
S.No
|
Keys
|
Description
|
1
|
Typing Keys
|
These keys include the letter keys
(A-Z) and digit keys (0-9) which generally give same layout as that of
typewriters.
|
2
|
Numeric Keypad
|
It is used to enter numeric data or
cursor movement. Generally, it consists of a set of 17 keys that are laid out
in the same configuration used by most adding machines and calculators.
|
3
|
Function Keys
|
The twelve function keys are present
on the keyboard which is arranged in a row at the top of the keyboard. Each
function key has unique meaning
|
4
|
Control keys
|
These keys provide cursor and screen
control. It includes four directional arrow keys. Control keys also include
Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt),
Escape(Esc).
|
5
|
Special Purpose Keys
|
Keyboard also contains some special
purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and
Print Screen.
|
Mouse
Mouse is most
popular pointing device. It is a very famous cursor-control device having a
small palm size box with a round ball at its base which senses the movement of
mouse and sends corresponding signals to CPU when the mouse buttons are
pressed. Generally it has two buttons called
left and right button and a wheel is present between the buttons.
Joystick
Joystick is
also a pointing device which is used to move cursor position on a monitor
screen. It is a stick having a spherical ball at its both lower and upper ends.
The lower spherical ball moves in a socket. The joystick can be moved in all
four directions. The function of joystick is similar to that of a mouse. It is
mainly used in Computer Aided Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device which is
similar to a pen. It is used to select a displayed menu item or draw pictures
on the monitor screen. It consists of a photocell and an optical system placed
in a small tube. When the tip of a light pen is moved over the monitor screen
and pen button is pressed, its photocell sensing element detects the screen
location and sends the corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly
used in notebook or laptop computer, instead of a mouse. This is a ball which
is half inserted and by moving fingers on ball, pointer can be moved. Since the
whole device is not moved, a track ball requires less space than a mouse. A
track ball comes in various shapes like a ball, a button and a square.
Scanner
Scanner is an input device which works more
like a photocopy machine. It is used when some information is available on a
paper and it is to be transferred to the hard disc of the computer for further
manipulation. Scanner captures images from the source which are then converted
into the digital form that can be stored on the disc. These images can be
edited before they are printed.
Microphone
Microphone is an input device to input sound
that is then stored in digital form. The microphone is used for various
applications like adding sound to a multimedia presentation or for mixing
music.
Bar Code Readers
Bar Code
Reader is a device used for reading bar coded data (data in form of light and
dark lines). Bar coded data is generally used in labeling goods, numbering the
books etc. It may be a hand held scanner or may be embedded in a stationary
scanner. Bar Code Reader scans a bar code image, converts it into an
alphanumeric value which is then fed to the computer to which bar code reader
is connected.
**************************************
OUTPUT DEVICES
Any
device that is capable of representing information on a computer is called an
Output device. Output devices receive information from the CPU and present it
to the user in the desired form.
Following are few of the important output
devices which are used in a computer.
- Monitors
- Plotters
- Printers
- Speakers
Monitors
·
Monitors, commonly called as Visual Display
Unit (VDU), are the main output device of a computer. It forms images from tiny
dots, called pixels that are arranged in a rectangular form. There are two kinds of viewing screen used for
monitors.
- Cathode-Ray Tube (CRT)
- Flat- Panel Display
Cathode-Ray Tube (CRT) Monitor
The CRT
display is made up of small picture elements called pixels. The smaller the
pixels, the better the image clarity, or resolution. It takes more than one
illuminated pixel to form whole character, such as the letter ‘e’ in the word
help. Most screens are capable of displaying 80
characters of data horizontally and 25 lines vertically.
Flat-Panel Display Monitor
The
flat-panel display refers to a class of video devices that have reduced volume,
weight and power requirement in comparison to the CRT. You can hang them on
walls or wear them on your wrists. Current uses of flat-panel displays include
calculators, video games, monitors, laptop computer, graphics display.
Printers: Printer is an output device, which is
used to print information on paper.
There are two types of printers:
- Impact Printers
- Non-Impact Printers
Impact Printers
The impact printers print the characters by
striking them on the ribbon which is then pressed on the paper. These printers are of two types
1. Character
printers 2. Line printers
Character Printers
Character
printers are the printers which print one character at a time. These are further divided into two types:
- Dot Matrix Printer(DMP)
- Daisy Wheel
Dot Matrix Printer
In the market one of the most popular printers is Dot Matrix Printer. These printers are popular because of their ease of printing and economical price. Each character printed is in form of pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out to form a character that is why it is called Dot Matrix Printer.
Daisy Wheel:
Head is lying
on a wheel and pins corresponding to characters are like petals of Daisy
(flower name) that is why it is called Daisy Wheel Printer. These printers are
generally used for word-processing in offices which require a few letters to be
sent here and there with very nice quality.
Line Printers
Line printers
are the printers which print one line at a time.
These are of
further two types
- Drum Printer
- Chain Printer
Drum Printer
This printer
is like a drum in shape so it is called drum printer. The surface of drum is
divided into number of tracks. Total tracks are equal to size of paper i.e. for
a paper width of 132 characters, drum will have 132 tracks. Drum printers are fast in speed and can print 300 to
2000 lines per minute.
Chain Printer
In this
printer, chain of character sets are used so it is called Chain Printer. A
standard character set may have 48, 64, or 96 characters.
Non-impact Printers
·
Non-impact printers print the characters
without using ribbon. These printers print a complete page at a time so they
are also called as Page Printers.
It faster
than impact printers.
These printers are of two types
- Laser Printers
- Inkjet Printers
Laser Printers
These are
non-impact page printers. They use laser lights to produce the dots needed to
form the characters to be printed on a page.
- It can be very high speed
- It can be very high quality output
·
But cannot be used to produce
multiple copies of a document in a single printing.
Inkjet Printers
Inkjet
printers are non-impact character printers based on a relatively new
technology. They print characters by spraying small drops of ink onto paper.
Inkjet printers produce high quality output with presentable features.
Plotters
Plotters are a
specialist type of printer which is able to draw high quality image pieces of
paper
They are used by
engineers, architects and map-makers to draw plans of buildings, diagram of
machines.
A plotter differs
from a printer in that it draws images using a pen that can be lowered ,raised
and moved across the paper to form continuous lines. The electronically
controlled pen is moved around the paper by computer.
In the plotters
,there are pen-less.
Speakers: As many users are using computers as a
multimedia device for listening to music and watching movies, speakers have
become an integrated part of the computer.
Mainly speakers are used for producing sound outputs. They convert the
digital signals coming from computer to analog sound waves. Several sizes and
wattage of speakers are available. A personal computer generally contains 210-500 watt speakers which can produce the
sound for a small room only. To cover big area, amplified speakers and woofers
systems are used.
*****************----------------------------------------**********************
SECONDARY STORAGE DEVICES
Secondary Storage Device is also
called as External Storage devices. Secondary Storage Devices are used to store
data and instructions permanently. The nature of secondary storage devices is
Non-Volatile that means it remains its data and instructions even after power
is shut off. There are 2 types’ secondary storage devices. They are
1. Sequential Access Storage Devices
(ex… Tape Drives)
2. Direct Access Storage Devices (ex….
Disk Drives)
1. Sequential Access Storage Devices: Sequential
means step by step processing. The data stored on SASD is accessed sequentially
by the computer that is to access 100th record; it has to traverse
the previous 99 records. It’s like, music cassette to listen 4th
song you will have to forward first three songs. Magnetic Tapes are sequential
access storage devices.
Magnetic Tape: It is
sequentially accessed storage medium. Basically it is used for back up storage.
The magnetic medium is a thin plastic reel (Mylar) coated with iron oxide
substance that can be magnetized. Information is represented as magnetized or
Non-magnetized and spots represented 1’s and 0’s .In this, read/write head
cannot jump to desired point so that the tape must be read or written sequentially.
Mainly tapes are used with mainframe and
minicomputer is stored on detachable reels. In this, we can record the data in
3 places. They are
v Recoding data on magnetic tape
v Recording data on tape drive
v Recording data on tape controller
Recording data on magnetic tape: Data
is recorded on magnetic tape across width as rows of magnetic spots and spaces
divided into Columns. These are called as tracks or channels which run onto the
entire length of the tape.
Recording data on tape drive: A magnetic tape drive is used for storage and
retrieval of information stored on magnetic tape. The tape drive consists of
read/write heads which stores data on tapes.
Recoding data on tape controller: A tape drive is connected to and controlled by
controller which interprets the commands for the working of the tape drive.
Advantages:
High storage capacity, Low cost, Re–usability and portability.
Disadvantage
is tape is sequential access device so it is not possible for data fast
accessing
2. Direct Access Storage Devices: It
can access the data directly. The access of data in direct devices is
irrespective of the location of data stored on media. The time taken to
retrieve 1st and 100th record is almost same. In this
data accessing is very faster than the sequential access devices. It has
different types of devices. They are
v Floppy Disk (Magnetic Disk)
v Hard Disk (Magnetic Disk)
v Compact Disk (Optical Disk)
Floppy Disk: It is made of magnetic only. And it is direct
access storage. It was the primary storage data and transferring the data until
the CD-ROM drive captured the market.
A floppy disk was invented in 1967 at
IBM by Alan shugart. Initially the disks were 8 inch in size which later
evolved into the 5.25 inch diskette. A floppy disk drive is an electromechanical
device that reads and writes data on small circular coated (iron oxide)
plastic. The data is written on tracks which are concentric rings of data.
Earlier, the capacity of the disk was
only 360 KB. Almost all computers these days have 3.5 inch drives and having
capacity of 1.44 MB covered a rigid envelope. Bigger floppies are obsolete now.
To read/write, update, store and
retrieve data from the floppy disk, a special mechanism is required known as
Floppy Disk Drive (FDD).
Major parts of FDD:
v Read/write heads
v Drive motor
v Stepper motor
v Mechanical frame
v Circuit board
Storage Capacity:
Floppy disk storage capacity depends on the following factors.
v Data is stored on one side or double side
v Data recording density that is number of bits
stored per inch (bpi).
v Track density means tracks per inch on which
data is recorded.
Hard Disk: Hard disk drive is the main device and it is
usually largest data storage device in a computer. A hard disk drive is made up
of metal platters coated with a thin film of magnetic material. The nature of
hard disk drive is Non-Volatile that means the data cannot delete when the
power is shut off because data is permanently stored.
A
hard disk is generally the fastest of the secondary storage devices, and it has
the largest capacity, approximately the same as magnetic tapes. There are 2
types of hard disks .They are
v Internal hard disk
v External hard disk
Internal hard disk: These types of hard disks are used internally
in computer system that means building with CPU when you purchasing the
computer system.
External hard disk: These
types of hard disks are used for taking data from one computer system to
another computer system and it is substitute for portable storage.
A
hard disk is divided into tracks and sectors. Data on this hard disk is
positioned into these tracks and sectors so they can be easily read by heads
and also to help reduce fragmentation on the hard disk.
Data
on a hard disk are access by 2 methods. They are
v Fixed head
v Moving head
Fixed head: Hard disk with fixed heads have a read/write
head for each track on the hard disk, since there is no moving of head to
access data so the data access time is faster for fixed head hard disk drive.
Moving head: A moving head hard disk is one in which one
or more read-write head are attached to a movable arm which allows each head to
cover many tracks of information.
Compact Disk: It is
optical disk and optical disk can store the data /write by lasers only.
The
compact disk-CD was invented in 1982 by two well known companies (Philips and
Sony). Initially it was an audio CD, digital audio. CD shape is round medium
and it was made of molded polymer. It is a small optical disk on which data
such as music, text, or graphic images is digitally encoded. CDs contain
computer data in the same way as the hard disk.
A
CD is a form of data storage that can transfer data up to the speed of 7800
KB/s. A standard 120 mm CD holds data up to 700 MB and 70 minutes of audio. It
has different types of CDs. They are
v CD-DA
(Audio CD, Digital Audio by Philips and Sony )
v Photo CD (It is one format that holds digitized
photographs and sound , developed by Kodak and Philips)
v VCD (Video CD can hold around 70 minutes of
video footage)
v CD-R
(CD-Rs are WORM Write Once Read Many) the user can write to each blank
disk only once. After written once, it behaves like CD-ROM.
v CD-RW (Rewritable or erasable –CD, developed in
1995. These disks can be erased and rewritten at any time)
v DVD (Digital Versatile Disc is extends of CD. It
can be used for storing data and disk capacity is 4.7 GB to 17 GB , it access
rates of 600 KBps to 1.3 MBps)
UNIT-3
DIFFERENT TYPES OF
PROGRAMMING LANGUAGES
Language is the communication among
human beings; different countries have different languages. Similarly in order
to communicate with the computer user also needs to have language that should
be understood by the computer. Basically languages are divided into two
categories. They are
1. Low
Level Language 2.High
Level Language
Low Level
Language:
Low Level Computer Languages are
machine codes. Computer cannot understand instructions given in high level
languages or in English. It can only understand and execute instructions given
in the form of machine language. There are two types of Low level languages
1. Machine
Language 2.
Assembly Language
Machine
Language:
It is the lowest and most elementary
level of programming language and it was the first type of programming language
to be developed. Machine language is basically the only language which computer
can understand. In fact, a manufacturer designs a computer to obey just one
language, its machine code, which is represented inside the computer by string
of binary digits o and 1.
Advantages of
Machine Language:
1. It makes fast and efficient use
of the computer.
2. It requires no translator to
translate the code.
Disadvantages of
Machine Language:
1.
All operation codes have to be remembered.
2.
All memory address has to be remembered.
Advantages
of Assembly Language:
1.
It is easy to understand and use as compared to machine language.
2.
It is modified easily.
Disadvantages
of Assembly Language:
1. Like machine language, it is also
machine dependent.
High Level
Language:
High Level Languages are basically
symbolic languages that use English words and Mathematical symbols rather than
mnemonic codes. Each instruction in the high level language is translated into
many machine language instructions. There are different types High level
languages. They are
(a)
Algebraic Formula Type (b) Business Data
Processing
(c) String
and List Processing (d) Visual Programming Languages
(a) Algebraic
Formula Type:
These languages are used to
computational procedures for solving mathematical and statistical problems.
Ex: BASIC (Beginners All Purpose Symbolic
instruction Code) ,FORTRAN (Formula Translation)
(b) Business Data Processing:
These languages are used for
maintaining the data processing procedures and file handling problems.
Ex: COBOL (Common Business Oriented)
(c) String and List
Processing:
These are used for string
manipulation including search patterns, inserting and deleting characters.
Ex: OOP (Object Oriented Programming) like
C++ and JAVA
(d) Visual Programming Languages:
These are designed for building
Windows – based applications
Ex: Visual Basic, Visual Java and Visual C
Advantages
of High Level Language:
1. User- friendly 2.They requires less time to write
*************************----------------------------------******************************
TRANSLATORS:
Computers can understand instructions only
when they are written in their own language – the machine language.
Therefore, a program written in any other language should be translated into
machine language. The software that ―translates‖ the instructions of different
languages is known as translators.
There are two
types of translators. They are compilers
and Interpreters
A Compiler
checks the entire user – written program (known as the source program) and if
it is error free, produces a complete program in machine language (known as
object program). The source program is retained for possible modifications and
corrections and the object program is loaded into the computer for execution.
If the source program contains errors, the compilers produce a list of errors
at the end of the execution of the program. I.e. a compiler translates the
whole program before execution.
An interpreter does a similar job but in a different style.
The interpreter translates
One
statement at a time and if it is error – free, executes.
Thus an interpreter translates or executes the first
instruction before it goes to the second, while a compiler translates the whole
program before execution.
The
major difference between compiler and interpreter is
1.
Error correction
is very much simpler in the case of interpreter as it translates the statements
in stages. The compiler produces an error list of the entire program at the
end.
2.
Interpreter takes
more time for the execution of the program compared to compilers as it
translates one statement at a time.
OPERATING SYSTEM
An Operating System is a intermediatery (mediate)
between the computer user and computer system. An Operating System is a
software program, it is different from word processing programs and spread
sheets and all other software programs on your computer. Mainly the purpose of Operating System is to
provide a good environment in which user execute the programs in convenient and
efficient manner.
Operating System is main example for system software
because software that controls the system hardware that interacts with the user
and application software.
FUNCTIONS OF OPERATING SYSTEM
1.
Processor management: It manages the assignment of processor to
different tasks being performed by the computer system.
2.
Memory management: It manages the allocation of main memory and
other storage areas to the system programmes as well as user programmes and
data.
3.
Input / Output management: It manages the co-ordination and assignment of
different Input and Output devices while one or more programmes are executed.
4.
File management: It allows all files to be easily changed and
modified through the use of text editors or some other file manipulation
routines.
5.
Establishment and enforcement of a priority
system: It determines and
maintains the order in which jobs are to be executed in the computer system.
6.
Interpretation of commands and instructions.
7.
Facilitates easy communication between the computer
system and the computer operator.
TYPESS
OF OPERATING SYSTEM?
There
are Many Operating
Systems those
have be Developed for Performing the Operations those are requested by the
user. The Operating system can perform a Single Operation and also Multiple
Operations at a Time. So there are many types of Operating systems those are
organized by using their Working Techniques.
1. BATCH PROCESSING: Here Batch means collection
of instructions. The Batch Processing is same as the Serial Processing
Technique. But in the Batch Processing similar types of jobs are firstly
prepared and they are stored on the punched card and that card will be submit
to the system for the processing. The system then all the operations on the
instructions one by one and a user can’t be able to specify any input.
The
main problem is that the jobs those are prepared for execution must be the same
type and if a job required for any type of input then this will not be possible
for the user. And so much of time will be wasted for preparing the Batch wise.
Batch processing has been associated with mainframe computers. Commonly uses of
batch processing are..
1. Data
processing 2.Printing 3.Images 4.Converting 5.Data base
2. MULTI-PROGRAMMING: As we know that in the Batch
Processing System there are multiple jobs executed by the system. The system
first prepare a batch and after that it will execute all the jobs and those
jobs are stored into the batch. But the main problem is that if a processor or
job requires an input and output operation, then it is not possible and second
problem is there will be wastage of the time when we are preparing the batch
and the CPU will remain idle at that
time. To overcome this problem another operating system is introduces that is
Multiprogramming.
Multiprogramming operating system is one that allows
end-users to run more than one program at a time. The technology works by
allowing the central processing unit (CPU)
of a computer to switch between two or more running tasks when the CPU is idle.
The main benefit of this functionality is that it can reduce wasted time in the
system's operations. For example, We can open the Ms Word and type a letter and
We can hear audio at the same time. We can even make calculations on Ms Excel
without closing Ms Word. Thus all these programming can be executed
simultaneously by the operating system.
3)
MULTI TASKING: Multitasking is logical extension of
multiprogramming system that supports multiple programs to run or execute
concurrently. In multitasking more than one task are executed at the same time.
In this technique, the multi tasks also known as processes, share common
processing resources such as CPU. In the case of a computer with single CPU,
only one job can be processes at a time.
For example, when we see someone in the car,
next to eating some snacks and taking his cell phone and trying to drive at the
same time that person is doing multitasking.
4) TIME
SHARING: A Time Sharing system
allows many users to share the computer resources simultaneously. In other
words, time sharing refers to the allocation of computer resources in time
slots to several programs simultaneously. For example, a mainframe computer
that has many users logged on to it. Each user uses the resources of the
mainframe i.e. memory, CPU etc.
The Time
Sharing system provides the direct access to a large number of users where CPU
time is divided among all the users on scheduled
basis. The OS allocates a set of time to user. When the time is expired, it
passes control to the next user on the system.
Note: Time sharing is no longer
commonly used; it has been replaced by multitasking system.
5. REAL TIME: A real-time operating system (RTOS) is a system
that guarantees a certain capability within a
specified time constraint. For example, an operating system might be designed
to ensure that a certain object was available for a robot on an assembly line.
In what is usually called a "hard" real-time operating system, if the
calculation could not be performed for making the object available at the
designated time, the operating system would terminate with a failure. In a
"soft" real-time operating system, the assembly line would continue
to function but the production output might be lower as objects failed to
appear at their designated time, causing the robot to be temporarily
unproductive.
Some real-time
operating systems are created for a special application and others are more
general purpose. To some extent, almost any general purpose operating system
such as Microsoft's Windows 2000or IBM's OS/390 can be evaluated for its
real-time operating system qualities.
The
Serial Processing operating systems are those which perform all the instructions
into a Sequence Manner or the instructions those are given by the user will be
executed by using the FIFO manner means First In First Out. All the
instructions those are entered first in the system will be executed first and
the instructions those are entered later will be executed later. For running
the instructions the , the Program Counter is used for executing all the
instructions.
In this, the Program Counter will determines
which instruction is going to executer and the which instruction will be
executer after this. Mainly the punched cards are used for this as input. In
this, all the jobs are firstly prepared and stored on the punched card and
after that card will be entered in the system and all the instructions will be
executed one by one. But the main problem is that a user doesn’t interact with
the system while he is working on the system, means the user can’t be able to
enter the data for execution.
DISK OPERATING SYSTEM (DOS):
It was developed as early as 1980 by
Bill Gates at the age of 19. It is suited for personal computers. DOS is a
single user and single task operating system
DOS commands are the
instructions which are used to communicate with the computer system. You call
these instructions as commands. There are two types of commands. They are
1.
Internal Commands 2. External Commands
INTERNAL COMMANDS:
Internal commands of Dos are loaded in memory automatically when
you loading DOS operating system. These commands are always available for
execution and executes without interpretation of any other softwares.
Directory Structure of DOS:
One thing is to be kept in mind is that a directory can have as
many child (sub) directories, but the child directory can have only one parent
directory.
1. CLS: this command is used to clean the screen. Ex:
c:\>cls
2. DIR: this
command allows the user to see all files and sub-directory in the current
directory. DIR Command lists file information in five columns; (first) column
gives primary name of the file (second) column gives extension of the file
(third) column gives the file size - number of bytes used; (fourth) column
gives the last updated date; (fifth) column gives the last updated time. Ex: c:\>dir
Dir/p - page
by page display of file name and directory names; Ex: c:\>dir/p
Dir/w -
width-wise display; Ex: c:\>dir/w
Dir/s -
displays all sub directory and files in the sub-directory of current directory.
3. Copy con: this command copies whatever typed on keyboard to the file; after
typing the text press ctrl+z or F6 for saving entered text. Ex: c:\>copy con
4. Date it
displays two system date and allows the user to change it if desired ; it is
displayed in the form of mm - dd - yy; Ex:
c:\>date .
5. Time it displays the system type and enables the user to change it; Ex: c:\>time
6. md(mkdir) it creates a new directory in sub directory in the current
directory;
Ex: c:\>mkdir directory name
7. rd(rmdir) this command is used to remove a directory from the disk; it can't
remove a directory which contains sub directory or files, ie, the child should
be removed from the parent; similarly this command can't remove the current
directory and root directory. Ex: c:\>rd
directory name
8. Type it displays the content of saved file; eg: C:\> Type> file name.
9. Ren this command changes the name of existing file or directory:
Syntax: C:\> ren <old name> new
name>
10. Delete delete
a file from current directory; Syntax:
C:\> del<file name>
11. Ver it displays the version of DOS currently being used in the system;
Syntax:
C:> ver
12. Copy it copies the given file or files from the source directory to the
largest directory; Syntax:C:\>
copy<source file name> <target file name>.
13. Prompt allows the user to set a new DOS prompt instead of usual C:\>
or A:\>; eg C:\> prompt pcc;
Prompt$p$g - this allows you to reset default prompt; Prompt $d (current date);
Prompt $t (current time);
14. cd This command is used to
changing directory that means change from one directory to another directory. EX:
C:\> cd directory name
Note: If you want to go to
previous directory then you press cd..
EXTERNAL COMMAND:
These commands are not loaded with DOS operating system and loaded
from the disk into the memory of the computer before you want to execute them.
1. Attrib this command is used for protecting the files from accidental
changes or modification. It can also be used for making a hidden file, archive
files, read only files; Syntax: Attrib +R/-R/+H/-H/+A/-A <file name> +FR
protects the file by making it read only, -R removes the read only protection; eg: Attrib + r <file name >
2. Scandisk/ Chkdisk this command checks the status of the disk; it shows a graphical
display, information about the user file.
3. Diskcopy: This is used to copy a disk into another disk. Ex:
C:\>diskcopy d: e:
4. Diskcomp: This is used to compare the contents of two diskettes on the
drives specified.
4. Tree this command graphically displays the path of each directory and
sub directory in given drive; Syntax:
C:\> tree<
5. More it displays one screen of data at a time and is used with another
command when one screen is full; if you press any key on the next screen is
displayed: Syntax C:\> type abc.doc|
more.
6. Edit the command loads the MSDOS editor, where we can edit files, create
new files, open existing files; Syntax:
C:\> edit < file name>
7. Label a label is a name given to a disk which refers to collection of
filers and directories on disk; Syntax:
C:\>label A.
8. Sort this command is used for sorting data and displaying the result on
the screen: Syntax:C:\>dir/sort/r
(reverse order)
9. Echo this
command can be used to display a message on the screen.
UNIT-4
NETWORK:
Network is
two or more computers connected logically with the help of data communication
devices and transmission media.
The basic
purpose of network is communication between two or more machines. Each computer
in a network can have its own processing capabilities and can share data files
and programs.
TYPES OF NETWORKS
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a
network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Some of the different networks based on
size are:
- Local area network, or LAN
- Metropolitan area network, or MAN
- Wide area network, or WAN
Local Area Network: A local area network, or LAN, consists of a computer network at a single site, typically an
individual office building. A LAN is very useful for sharing resources, such as
data storage and printers. LANs can be built with relatively inexpensive
hardware, such as hubs, network adapters and Ethernet cables.
The smallest
LAN may only use two computers, while larger LANs can accommodate thousands of
computers. A LAN typically relies mostly on wired connections for increased
speed and security, but wireless connections can also be part of a LAN. High
speed and relatively low cost are the defining characteristics of LANs.
Metropolitan Area Network: A metropolitan
area network, or MAN, consists of
a computer network across an entire city, college campus or small region. A MAN
is larger than a LAN, which is typically limited to a single building or site.
Depending on the configuration, this type of network can cover an area from
several miles to tens of miles.
A MAN is often used to connect several LANs
together to form a bigger network. When this type of network is specifically
designed for a college campus, it is sometimes referred to as a campus area
network, or CAN.
Wide Area Network: A wide area network, or WAN, occupies a very large area, such as an entire country or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the best-known example of a public WAN.
TYPES OF NETWORK TOPOLOGY
Topology is referred to the way in which the end of a network is linked
together.
Network
Topology is description of the physical
connections of a network or the description of the logical connections between
computers of a network indicating which pairs of computers are able to
communicate and through which way. There are different types of topologies.
They are
1.
Bus Topology 2.
Ring Topology 3. Star Topology 4. Mesh Topology
BUS TOPOLOGY
Bus topology is a network type in where every computer and network
device is connected to single cable.
Features of Bus Topology
1.
It transmits data
only in one direction.
2.
Every device is
connected to a single cable
Advantages of Bus Topology
1.
It is cost
effective.
2.
Cable required is
least compared to other network topology.
3.
Used in small
networks.
4.
It is easy to
understand.
5.
Easy to expand
joining two cables together.
Disadvantages of Bus Topology
1.
Cables fails then
whole network fails.
2.
If network
traffic is heavy or nodes are more the performance of the network decreases.
3.
Cable has a
limited length.
4.
It is slower than
the ring topology.
RING TOPOLOGY
It is called ring topology because it forms a ring as each
computer is connected to another computer, with the last one connected to the
first. Exactly two neighbors’ for each device.
Features of Ring Topology
1.
A number of
repeaters are used and the transmission is unidirectional.
2.
Date is
transferred in a sequential manner that is bit by bit.
Advantages of Ring Topology
1.
Transmitting
network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2.
Cheap to install
and expand
Disadvantages of Ring Topology
1.
Troubleshooting
is difficult in ring topology.
2.
Adding or
deleting the computers disturbs the network activity.
3.
Failure of one
computer disturbs the whole network.
STAR TOPOLOGY
In this type of topology all the computers are connected to a
single hub through a cable. This hub is the central node and all others nodes
are connected to the central node.
Features of Star Topology
1.
Every node has
its own dedicated connection to the hub.
2.
Acts as a
repeater for data flow.
3.
Can be used with
twisted pair, Optical Fiber or coaxial cable.
Advantages of Star Topology
1.
Fast performance
with few nodes and low network traffic.
2.
Hub can be upgraded
easily.
3.
Easy to
troubleshoot.
4.
Easy to setup and
modify.
5.
Only that node is
affected which has failed rest of the nodes can work smoothly.
Disadvantages of Star Topology
1.
Cost of
installation is high.
2.
Expensive to use.
3.
If the hub is
affected then the whole network is stopped because all the nodes depend on the
hub.
4.
Performance is
based on the hub that is it depends on its capacity
MESH TOPOLOGY
It is a point-to-point connection to other nodes or devices.
Traffic is carried only between two devices or nodes to which it is connected.
Mesh has n (n-2)/2 physical channels to link hn devices.
Types of Mesh Topology
1.
Partial Mesh
Topology: In
this topology some of the systems are connected in the same fashion as mesh
topology but some devices are only connected to two or three devices.
2.
Full Mesh
Topology: Each
and every nodes or devices are connected to each other.
Features of Mesh Topology
1.
Fully connected.
2.
Robust.
3.
Not flexible.
Advantages of Mesh Topology
1.
Each connection
can carry its own data load.
2.
It is robust.
3.
Fault is
diagnosed easily.
4.
Provides security
and privacy.
Disadvantages of Mesh Topology
1.
Installation and
configuration is difficult.
2.
Cabling cost is
more.
3.
Bulk wiring is
required.
BOUNDED/GUIDED TRANSMISSION MEDIA
It is the transmission media in
which signals are confined to a specific path using wire or cable. The types of
Bounded/ Guided are discussed below.
TWISTED PAIR CABLE:
This cable is the most commonly
used and is cheaper than others. It is lightweight, cheap, can be installed
easily, and they support many different types of network. Some important points
:
·
Its frequency
range is 0 to 3.5 kHz.
·
Typical
attenuation is 0.2 dB/Km @ 1kHz.
·
Typical delay is
50 µs/km.
·
Repeater spacing
is 2km.
Twisted Pair is of two types:
·
Unshielded Twisted Pair (UTP)
·
Shielded Twisted Pair (STP)
Unshielded Twisted Pair Cable:
It is the most common type of
telecommunication when compared with Shielded Twisted Pair Cable which consists
of two conductors usually copper, each with its own color plastic insulator.
Identification is the reason behind colored plastic insulation.
UTP cables consist of 2 or 4 pairs
of twisted cable. Cable with 2 pair use RJ-11 connector and 4 pair cable useRJ-45 connector.
Advantages :
·
Installation is
easy
·
Cheap and high
speed capacity,
·
100 meter limit
·
Higher grades of
UTP are used in LAN technologies like Ethernet.
Disadvantages :
·
Bandwidth is low
when compared with Coaxial Cable
·
Provides less
protection from interference.
Shielded Twisted Pair Cable:
This cable has a metal foil or
braided-mesh covering which encases each pair of insulated conductors.
Electromagnetic noise penetration is prevented by metal casing.
Advantages :
·
Easy to install
·
Performance is
adequate
·
Can be used for
Analog or Digital transmission
·
Increases the
signalling rate
·
Higher capacity
than unshielded twisted pair
Disadvantages :
·
Difficult to
manufacture
·
Heavy
COAXIAL CABLE:
Coaxial is called by this name
because it contains two conductors that are parallel to each other. Copper is
used in this as centre conductor which can be a solid wire or a standard one.
It is surrounded by PVC installation, a sheath which is encased in an outer
conductor of metal foil, barid or both.
Here the most common coaxial standards.
·
50-Ohm RG-7 or
RG-11 : used with thick Ethernet.
·
50-Ohm RG-58 :
used with thin Ethernet
·
75-Ohm RG-59 :
used with cable television
There are two types of Coaxial cables
:
BaseBand
This is a 50 ohm (Ω) coaxial cable
which is used for digital transmission. It is mostly used for LAN’s. Baseband
transmits a single signal at a time with very high speed.
BroadBand
This uses analog transmission on
standard cable television cabling. It transmits several simultaneous signal
using different frequencies. It covers large area when compared with Baseband
Coaxial Cable.
Advantages :
·
Bandwidth is high
·
Used in long
distance telephone lines.
·
Transmits digital
signals at a very high rate of 10Mbps.
·
Data transmission
without distortion.
Disadvantages :
·
Single cable
failure can fail the entire network.
·
Difficult to
install and expensive when compared with twisted pair.
FIBER OPTIC CABLE:
These are similar to coaxial
cable. It uses electric signals to transmit data. At the centre is the glass
core through which light propagates.
In multimode fibers, the core is
50microns, and in single mode fibers, the thickness is 8 to 10 microns.
Fiber optic cable has bandwidth
more than 2 gbps (Gigabytes
per Second)
Advantages :
·
Provides high
quality transmission of signals at very high speed.
·
These are not
affected by electromagnetic interference, so noise and distortion is very less.
·
Used for both
analog and digital signals.
Disadvantages :
·
It is expensive
·
Difficult to
install.
·
Maintenance is
expensive and difficult.
·
Do not allow
complete routing of light signals.
TRANSMISSION MODES IN COMPUTER NETWORKS
Transmission mode means
transferring of data between two devices. It is also called communication mode.
These modes direct the direction of flow of information. There are three types
of transmission mode. They are :
·
Simplex Mode
·
Half duplex Mode
·
Full duplex Mode
SIMPLEX MODE
In this type of transmission mode
data can be sent only through one direction i.e. communication is
unidirectional. We cannot send a message back to the sender. Unidirectional
communication is done in Simplex Systems.
Examples of simplex Mode is
loudspeaker, television broadcasting, television and remote, keyboard and
monitor etc.
HALF DUPLEX MODE
In half duplex system we can send
data in both directions but it is done one at a time that is when the sender is
sending the data then at that time we can’t send the sender our message. The
data is sent in one direction.
Example of half duplex is a
walkie- talkie in which message is sent one at a time and messages are sent in
both the directions.
FULL DUPLEX MODE
In full duplex system we can send
data in both directions as it is bidirectional. Data can be sent in both
directions simultaneously. We can send as well as we receive the data.
Example of Full Duplex is a
Telephone Network in which there is communication between two persons by a
telephone line, through which both can talk and listen at the same time.
In full duplex system there can be
two lines one for sending the data and the other for receiving data.
UNIT-5
INTERNET
Internet was
conceived by the Advanced Research Projects Agency (ARPA) of the U.S.
government in 1969 and was first known as the ARPANet. The original aim was to
create a network that would allow users of a research computer at one
university to "talk to" research computers at other universities. A
side benefit of ARPANet's design was that, because messages could be routed or
rerouted in more than one direction, the network could continue to function
even if parts of it were destroyed in the event of a military attack or other
disaster.
The internet is a global connection of
computers. These computers are connected via a huge network of telecommunication
links. The internet allows you to access to a whole resource of data and
information stored at different sites (called hosts) and locations around the
world. The communication links which inter connect each host computer use a
common method of transmission known as TCP/IP, which stands for Transmission
Control Protocol / Internet Protocol.
Internet
connection helps us to:
1.
Read information on a wide range of
topics
2.
Send or receive E-mail
3.
Down load useful programs such as
virus detectors, file compression, decompression utility
4.
Share your opinions and your knowledge
on a variety of topics through various new groups.
5.
Chat with other people anywhere in the
world
6.
View interesting video‘s listen to
music or wander through a 3-D world.
Requirements for connecting to the Internet:
a)
Modem: A modem is a peripheral device that
allows a computer to connect and communicate
with other computers. Modem stands for Modulator Demodulator.
b)
Web Browser: A browser is a software program that
is necessary in order to view web pages
on the web. Ex: Internet Explorer, Netscape Navigator, Mozilla Firefox,
Microsoft outlook express etc.
c)
Telephone line: A telephone line is required to
transfer data from one computer to another.
The computer is connected to a modem, which, in turn, connected to a telephone
line.
d) Subscription with Internet service provider (ISP): ISP‘s
are companies that provide access
to the internet. We need subscription with any ISP to get an Internet
connection. Some of the ISPs in India are VSNL, MTNL.
INTRANET
An intranet is a
private network that is contained within an enterprise. It may consist of many
interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet
includes connections through one or more gateway computers to the outside
Internet. The main purpose of an intranet is to share company information and
computing resources among employees. An intranet can also be used to facilitate
working in groups and for teleconferences.
An intranet uses TCP/IP, HTTP, and other Internet
protocols and in general looks like a private version of the Internet.
Main differences
between the internet, intranet and extranet:
§
Intranet
and Extranet are more secure than Internet because having Intranet or extranet
network system means organization has created a firewall against outsiders.
Accessing any information on Internet is not much difficult today.
§
General
public is the user of Internet so it can be called as public network while
business persons and organization are the users of Intranet and Extranet and
can be called as private networks.
§
Internet
can be access through without having user account. While user account is the
first important condition in case of Intranet and Extranet.
Uniform
Resource Locator: (URL):
A URL (Uniform Resource
Locator, previously Universal Resource Locator). A URL is a type of URI (Uniform Resource Identifier,
formerly called Universal Resource Identifier.)
Each web site has a unique address commonly
referred to as a URL. A URL
specifies the exact location of the web page on the internet. A typical web
address or URL looks as http:// www.microsoft.com/catalog/navigation.asp
Explanation of the example URL:
http: --à Identifies protocol necessary to retrieve the
file.
www: ----à
Indicates that the site is on the world wide web
Microsoft:-à
Indicates the name of the web site
.com: -à Indicates the domain type of the web site
Anotomy
of a URL:
URL anatomy explained
Protocol: The
protocol declares how your web browser should communicate with a web server
when sending or fetching a web page or document. The most common protocol is
http
which
stands for Hypertext Transfer Protocol. Another common protocol is https
which
stands for Hypertext Transfer Protocol Secure. You'll see this on secure pages,
like shopping sites and log in pages.
Sub domain: A
sub domain is a sub-division of the main domain name.
For example,
mail.doepud.com
and calendar.doepud.com
are
sub domains of the domain name doepud.com
.
Domain name: A
domain name is a unique reference that identifies a web site on the internet. For example
doepud.co.uk
.
A domain name always includes the top-level domain (TLD), which in Doepud's
case is uk
.
The co
part
is shorthand for commercial and combined .co.uk
is
called a second-level domain (SLD).
Port: The
port number is rarely visible in URLs but always required. When declared in a
URL it comes right after the TLD, separated by a colon. When it's not declared
and in most cases where the protocol is http, port 80 is used. For https
(secure) requests port 443 is used.
Path: The
path typically refers to a file or directory on the web server, e.g.
/directory/file.php
.
Query: A
query is commonly found in the URL of dynamic pages and is represented by a
question mark followed by one or more parameters. The query directly follows
the domain name, path or port number.
Parameters: Parameters
are snippets of information found in the query string of a URL. With reference
to the Google query above, the parameters follow the question mark and are
separated by an ampersand (&) character so they can be understood
individually and used to display content on that page.
Fragment: A
fragment is an internal page reference, sometimes called a named anchor. It usually appears at the end of a URL
and begins with a hash (#) character followed by an identifier.
E-MAIL:
E-mail or electronic mail is a service for
sending or receiving messages electronically through a computer network. The
electronic mail uses various technologies that support electronic transmission
of text, data and graphics.
Some of the
features of E-mail are
1. It is much faster than the normal mail.
Messages can be sent within a matter of seconds to any part in the world.
2.
it can be sent to many people at the
same time
3.
E-mail is cheaper than a phone call
and an ordinary mail
4.
it can access information and file
libraries on request
5.
E-mail user can have a mail box which
is accessed through a computer terminal
6.
an E-mail message consists of two
parts
a)
a header specifying the address of the
sender and the address of the receiver
b)
the text of the message
7.
The mailing
system allows selecting messages for reading, displaying, saving, deleting,
forwarding and replying.
8.
Mailing list can be created to send
the same message to a group of people
E-Mail Address: An E-Mail address consists of three parts
1.
The person‘s Login name
2.
@ sign
3.
Domain name
A domain represents organization,
network, and country name
Ex: gurijalasudhakar@gmail.com in this gurijalasudhakar
is the user name and his account is in the domain gmail.com. Both the names are separated by the @symbol.
Search Engine:
Search
engines are utilities used to search for information on the web. A user
interface is provided where you can enter the word or phrase you are searching
for. The search engine looks for the keywords we have entered and returns the
results of the search, providing links to relevant Web sites for us to choose
from. Some commonly used search engines are MSN, Alta Vista, Google, Yahoo!
search and Info seek etc.
WEBBROWSER
Web browser is a software application used to locate, retrieve and
display content on the World Wide Web, including Web pages, images, video and other files. As client, the browser is the client run on a computer that
contacts the Web server and requests information. The Web server sends the information back to
the Web browser which displays the results on the computer or other
Internet-enabled device that supports a browser. There are no of web browsers
are available. They are
1.
Google
Chrome 2.Mozilla Fire Fox 3.Internet
Explorer 4.Apple Safari 5.Opera
No comments:
Post a Comment