COMPUTER NOTES Final
COMPUTER NOTES Final
PREPARED BY:
MR. ALUTIA LUKE
YOU CAN WATCH OUR COMPUTER PRACTICAL TUTORIALS ON OUR YOUTUBE CHANNEL:
Computer components are divided into two major categories namely hardware and
software.
Hardware is the machine itself and its connected devices such as monitor, keyboard,
mouse etc. Software is the set of programs that make use of hardware for performing
various functions.
There are totally five computer generations known till date. Each generation has been
discussed in detail along with their time period, characteristics. We've used
approximate dates against each generation which are normally accepted.
First Generation
The period of first generation was 1942-1954.
First generation of computer started with using vacuum tubes as the basic components
for memory and circuitry for CPU (Central Processing Unit). These tubes like electric
bulbs produced a lot of heat and were prone to frequent fusing of the installations,
therefore, were very expensive and could be afforded only by very large organizations.
In this generation mainly batch processing operating system were used. In this
generation Punched cards, Paper tape, Magnetic tape Input & Output device were
used.
There were Machine code and electric wired board languages used.
Second Generation
The period of second generation was 1952-1964.
This generation used the transistors and were cheaper, consumed less power, more
compact in size, more reliable and faster than the first-generation machines made of
vacuum tubes. In this generation, magnetic cores were used as primary memory and
magnetic tape and magnetic disks as secondary storage devices.
□ IBM 7094
□ CDC 1604
□ CDC 3600
UNIVAC 1108
Third Generation
The period of third generation was 1964-1972.
The third generation of computer is marked by the use of Integrated Circuits (IC's) in
place of transistors. Single I.C has many transistors, resistors and capacitors along
with the associated circuitry. The I.C was invented by Jack Kilby. This development
made computers smaller in size, reliable and efficient.
High level language (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68
IBM-360 series
Honeywell-6000 series
□ IBM-370/168
□ TDC-316
Fourth Generation
The period of Fourth Generation was 1972 to date.
The fourth generation of computers is marked by the use of Very Large Scale
Integrated (VLSI) circuits.VLSI circuits having about 5000 transistors and other
circuit elements and their associated circuits on a single chip made it possible to
have microcomputers of fourth generation. Fourth Generation computers became
more powerful, compact, reliable, and affordable. As a result, it gave rise to personal
computer (PC) revolution.
In this generation Time sharing, Real time, Networks, Distributed Operating System
were used.
All the Higher-level languages like C and C++, DBASE etc. were used in this
generation.
Fifth Generation
They are computer expected in the near future and they will mimic or imitate human
behaviors.
In the fifth generation, the VLSI technology will be ULSI (Ultra Large-Scale
Integration) technology, resulting in the production of microprocessor chips having
ten million electronic components.
It is also said that these computers are already in existence though not yet popularized
All the Higher-level languages like C and C++, Java, .Net etc. are used in this
generation.
AI includes:
□ Robotics
□ Neural networks
□ Game Playing
□ Development of expert systems to make decisions in real life situations.
□ Natural language understanding and generation.
The main features of Fifth Generation are:
ULSI technology
Development of true artificial intelligence
Development of Natural language processing
Advancement in Parallel Processing
Advancement in Superconductor technology
More user-friendly interfaces with multimedia features
Availability of very powerful and compact computers at cheaper rates
Classification by Size
Under this classification, we consider how big the computer is and this include;
o Main frame computers: these are large general computers with extensive
storage, input and output capabilities hence enhancing large scale data
processing. They have characteristics of first- and second-generation
computers.
o Mini Computers: these are smaller compared to the mainframe computers
mainly used for special purpose/ general purpose. They have characteristics of
third generation computers.
o Micro Computers: they are smaller than main frame and mini computers where
various integrated circuits and elements of computers are replaced by single
integrated circuits called chip. They have characteristic of fourth generation
computers. They facilitate single users only i.e. Visual display unit, keyboard,
mouse and CPU can be used by one person at a time. Sometimes they are
called personal computers (PCs) or Personal Systems (PS’s). Example; Laptops,
desktop computers.
Classification by Purpose.
These are designed according to tasks they are designed to perform. These include
general purpose and special purpose computers.
o General purpose is designed for all tasks like presentation, data management,
computation, document production e.g. excel, access, power point, word
o Special purpose computers: These are designed to perform specific tasks for
instance thermometer for temperatures, calculations for mathematical
computation, digital watches, and petrol pumps. These types of computers do
not perform word processing jobs.
Classification by process
Computers are also classified according to the way data is presented and these
include; digital, analog and hybrid computers
Business sector
Of recent most of the businesses have resorted to computer usage in their
productivity. In business, computers are used in the following ways;
Scientific research
❖ Computers are used for collecting data where human beings cannot survive or
reach
❖ Storage of information/ data
❖ Communication
❖ Discovery e.g. new drugs, new applications, historical discoveries etc.
Health Sector
❖ Manufacture of drugs
❖ Medical research
❖ Scanning/ testing/ diagonises
❖ Storage of medical data/ information
❖ Communication
❖ Sharing of data/ information
Homes
❖ Entertainment
❖ Educational purposes
❖ Computation of personal budgets
❖ Communication
❖ Security
Sports
❖ Production of new games
❖ Entertainment
❖ Gambling e.g. betting
Education
❖ Teaching/ training
❖ Virtual reality/ virtual University/ online studying
❖ Research
❖ Advertisement
❖ Communication
❖ Entertainment
Security e.g. military and police
❖ Design weapons
❖ Targeting/ location of the enemy
❖ Storage of data
❖ Entertainment
❖ Surveillance
❖ Communication
Government
All different ministries apply computer.
Speed
Accuracy
In addition to being fast, computers are also accurate. Errors that may occur can
almost always be attributed to human error (inaccurate data, poorly designed system
or faulty instructions/programs written by the programmer)
Unlike human beings, computers are highly consistent. They do not suffer from human
traits of boredom and tiredness resulting in lack of concentration. Computers,
therefore, are better than human beings in performing voluminous and repetitive jobs.
Versatility/ flexible
Computers are versatile machines and are capable of performing any task as long as
it can be broken down into a series of logical steps. The presence of computers can
be seen in almost every sphere – Railway/Air reservation, Banks, Hotels, Weather
forecasting and many more.
Storage Capacity
Today’s computers can store large volumes of data. A piece of information once
recorded (or stored) in the computer, can never be forgotten and can be retrieved
almost instantaneously.
Computers help in sharing of both qualitative and quantitative data. This can be
through email, Whatsapp, tweeter, histogram and more other platforms.
Electronic
Computers require some source of power to be able to operate. This power source
may include solar, generator and hydro-electricity.
Cyber Crime: E.g. hacking like transferring money from peoples’ accounts to their
accounts, conning by sending false messages to people
Unemployment: computers reduce on the manual work force e.g. robots can replace
bar attendants in bars.
All types of computers follow the same basic logical structure and perform the
following five basic operations for converting raw input data into information useful to
their users.
This unit contains devices with the help of which we enter data into the computer.
This unit creates a link between the user and the computer. The input devices translate
the information into a form understandable by the computer.
Following are some of the important input devices which are used in a computer −
• Keyboard
• Mouse
• Joy Stick
• Light pen
• Track Ball
• Scanner
• Graphic Tablet
• Microphone
• Magnetic Ink Card Reader(MICR)
• Optical Character Reader(OCR)
• Bar Code Reader
• Optical Mark Reader(OMR)
Keyboard
Keyboard is the most common and very popular input device which helps to input data
to the computer. The layout of the keyboard is like that of traditional typewriter,
although there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104
keys or 108 keys are also available for Windows and Internet.
2 Numeric Keypad
3 Function Keys
The twelve function keys are present on the keyboard which are arranged in a
row at the top of the keyboard. Each function key has a unique meaning and is
used for some specific purpose.
4 Control keys
These keys provide cursor and screen control. It includes four directional arrow
keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
Control(Ctrl), Alternate(Alt), Escape(Esc).
Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock,
Num Lock, Space bar, Tab, and Print Screen.
Mouse
A Mouse is the most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a round ball at its base, which senses the movement
of the mouse and sends corresponding signals to the CPU when the mouse buttons
are pressed.
Generally, it has two buttons called the left and the right button and a wheel is present
between the buttons. A mouse can be used to control the position of the cursor on
the screen, but it cannot be used to enter text into the computer.
Advantages
• Easy to use
• Not very expensive
• Moves the cursor faster than the arrow keys of the keyboard.
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its both lower and upper ends.
The lower spherical ball moves in a socket. The joystick can be moved in all four
directions.
The function of the joystick is similar to that of a mouse. It is mainly used in Computer
Aided Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu
item or draw pictures on the monitor screen. It consists of a photocell and an optical
system placed in a small tube.
When the tip of a light pen is moved over the monitor screen and the pen button is
pressed, its photocell sensing element detects the screen location and sends the
corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers on the
ball, the pointer can be moved.
Since the whole device is not moved, a track ball requires less space than a mouse. A
track ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used
when some information is available on paper and it is to be transferred to the hard
disk of the computer for further manipulation.
Scanner captures images from the source which are then converted into a digital form
that can be stored on the disk. These images can be edited before they are printed.
Digitizer
Digitizer is an input device which converts analog information into digital form.
Digitizer can convert a signal from the television or camera into a series of numbers
that could be stored in a computer. They can be used by the computer to create a
picture of whatever the camera had been pointed at.
Digitizer is also known as Tablet or Graphics Tablet as it converts graphics and pictorial
data into binary inputs. A graphic tablet as digitizer is used for fine works of drawing
and image manipulation applications.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.
The microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.
MICR input device is generally used in banks as there are large number of cheques to
be processed every day. The bank's code number and cheque number are printed on
the cheques with a special type of ink that contains particles of magnetic material that
are machine readable.
This reading process is called Magnetic Ink Character Recognition (MICR). The main
advantages of MICR is that it is fast and less error prone.
Optical Character Reader (OCR)
OCR scans the text optically, character by character, converts them into a machine
readable code, and stores the text on the system memory.
Bar Code Reader is a device used for reading bar coded data (data in the form of light
and dark lines). Bar coded data is generally used in labelling goods, numbering the
books, etc. It may be a handheld scanner or may be embedded in a stationary scanner.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value,
which is then fed to the computer that the bar code reader is connected to.
It is specially used for checking the answer sheets of examinations having multiple
choice questions.
This unit can store instructions, data, and intermediate results. This unit supplies
information to other units of the computer when needed. It is also known as internal
storage unit or the main memory or the primary storage or Random Access Memory
(RAM).
Its size affects speed, power, and capability. Primary memory and secondary memory
are two types of memories in the computer. Functions of the memory unit are −
• It stores all the data and the instructions required for processing.
• It stores intermediate results of processing.
• It stores the final results of processing before these results are released
to an output device.
• All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry out
any actual data processing operations.
• Arithmetic Section
• Logic Section
Arithmetic Section
Logic Section
Function of logic section is to perform logic operations such as comparing, selecting,
matching, and merging of data.
The output unit consists of devices with the help of which we get the information from
the computer. This unit is a link between the computer and the users. Output devices
translate the computer's output into a form understandable by the users.
The following are some of the important output devices used in a computer.
• Monitors
• Graphic Plotter
• Printer
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output device
of a computer. It forms images from tiny dots, called pixels that are arranged in a
rectangular form. The sharpness of the image depends upon the number of pixels.
The CRT display is made up of small picture elements called pixels. The smaller the
pixels, the better the image clarity or resolution. It takes more than one illuminated
pixel to form a whole character, such as the letter ‘e’ in the word help.
A finite number of characters can be displayed on a screen at once. The screen can
be divided into a series of character boxes - fixed location on the screen where a
standard character can be placed. Most screens are capable of displaying 80
characters of data horizontally and 25 lines vertically.
• Large in Size
• High power consumption
Flat-Panel Display Monitor
The flat-panel display refers to a class of video devices that have reduced volume,
weight and power requirement in comparison to the CRT. You can hang them on walls
or wear them on your wrists. Current uses of flat-panel displays include calculators,
video games, monitors, laptop computer, and graphics display.
Printers
• Impact Printers
• Non-Impact Printers
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then
pressed on the paper.
• Character printers
• Line printers
Character Printers
Character printers are the printers which print one character at a time.
In the market, one of the most popular printers is Dot Matrix Printer. These printers
are popular because of their ease of printing and economical price. Each character
printed is in the form of pattern of dots and head consists of a Matrix of Pins of size
(5*7, 7*9, 9*7 or 9*9) which come out to form a character which is why it is called
Dot Matrix Printer.
Advantages
• Inexpensive
• Widely Used
• Other language characters can be printed
Disadvantages
• Slow Speed
• Poor Quality
Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of Daisy
(flower) which is why it is called Daisy Wheel Printer. These printers are generally
used for word-processing in offices that require a few letters to be sent here and there
with very nice quality.
Advantages
Line Printers
Line printers are the printers which print one line at a time.
• Drum Printer
• Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of the
drum is divided into a number of tracks. Total tracks are equal to the size of the paper,
i.e. for a paper width of 132 characters, drum will have 132 tracks. A character set is
embossed on the track. Different character sets available in the market are 48
character set, 64 and 96 characters set. One rotation of drum prints one line. Drum
printers are fast in speed and can print 300 to 2000 lines per minute.
Advantages
Disadvantages
• Very expensive
• Characters fonts cannot be changed
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer. A
standard character set may have 48, 64, or 96 characters.
Advantages
• Noisy
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print
a complete page at a time, thus they are also called as Page Printers.
• Laser Printers
• Inkjet Printers
Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed
to form the characters to be printed on a page.
Advantages
Disadvantages
• Expensive
• Cannot be used to produce multiple copies of a document in a single
printing
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology.
They print characters by spraying small drops of ink onto paper. Inkjet printers
produce high quality output with presentable features.
They make less noise because no hammering is done and these have many styles of
printing modes available. Color printing is also possible. Some models of Inkjet printers
can produce multiple copies of printing also.
Advantages
Disadvantages
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in the computer, where data is to be processed
and instructions required for processing are stored. The memory is divided into large
number of small parts called cells. Each location or cell has a unique address, which
varies from zero to memory size minus one. For example, if the computer has 64k
words, then this memory unit has 64 * 1024 = 65536 memory locations. The address
of these locations varies from 0 to 65535.
• Cache Memory
• Primary Memory/Main Memory
• Secondary Memory
Cache Memory
Cache memory is a very high-speed semiconductor memory which can speed up the
CPU. It acts as a buffer between the CPU and the main memory. It is used to hold
those parts of data and program which are most frequently used by the CPU. The
parts of data and programs are transferred from the disk to cache memory by the
operating system, from where the CPU can access them.
Advantages
Primary memory holds only those data and instructions on which the computer is
currently working. It has a limited capacity and data is lost when power is switched
off. It is generally made up of semiconductor device. These memories are not as fast
as registers. The data and instruction required to be processed resides in the main
memory. It is divided into two subcategories RAM and ROM.
Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower
than the main memory. These are used for storing data/information permanently. CPU
directly does not access these memories, instead they are accessed via input-output
routines. The contents of secondary memories are first transferred to the main
memory, and then the CPU can access it. For example, disk, CD-ROM, DVD, etc.
These are the moral and principles that regulate the use of computers.
In other words, ethics is knowing and understanding what is right and what is wrong,
and then doing the right thing right.
A threat is anything that has potential to cause serious harm to the computer system.
This refers to the copying of software programmes without the authority of the owner.
4. Keep watch over your children and how they use the internet, install parental
software i.e. parental guide.
5. Never give out your credit card information to a person you don’t know
➢ Botnet,is a collection of software robots which run automated tasks over the
internet.
Use of spam filters to screen out e-mail messages with suspect titles.
An operating system performs all the basic tasks like managing files, processes, and
memory. Thus operating system acts as the manager of all the resources,
i.e. resource manager. Thus, the operating system becomes an interface between
user and machine.
• It is very difficult to guess or know the time required for any job to complete.
Processors of the batch systems know how long the job would be when it is in
queue
• It is sometimes costly
• The other jobs will have to wait for an unknown time if any job fails
• Reliability problem
• One must have to take care of the security and integrity of user programs and
data
These types of the operating system is a recent advancement in the world of computer
technology and are being widely accepted all over the world and, that too, with a
great pace. Various autonomous interconnected computers communicate with each
other using a shared communication network. Independent systems possess their own
memory unit and CPU. These are referred to as loosely coupled systems or
distributed systems. These system’s processors differ in size and function. The major
benefit of working with these types of the operating system is that it is always possible
that one user can access the files or software which are not actually present on his
system but some other system connected within this network i.e., remote access is
enabled with the devices connected in that network.
Advantages of Distributed Operating System:
• Failure of one will not affect the other network communication, as all systems
are independent from each other
• Since resources are being shared, computation is highly fast and durable
• These systems are easily scalable as many systems can be easily added to the
network
• To establish distributed systems the language which is used are not well defined
yet
• These types of systems are not readily available as they are very expensive.
Not only that the underlying software is highly complex and not understood
well yet
These systems run on a server and provide the capability to manage data, users,
groups, security, applications, and other networking functions. These types of
operating systems allow shared access of files, printers, security, applications, and
other networking functions over a small private network. One more important aspect
of Network Operating Systems is that all the users are well aware of the underlying
configuration, of all other users within the network, their individual connections, etc.
and that’s why these computers are popularly known as tightly coupled systems.
Advantages of Network Operating System:
• New technologies and hardware up-gradation are easily integrated into the
system
• Server access is possible remotely from different locations and types of systems
These types of OSs serve real-time systems. The time interval required to process and
respond to inputs is very small. This time interval is called response time.
Real-time systems are used when there are time requirements that are very strict
like missile systems, air traffic control systems, robots, etc.
These OSs are meant for applications where time constraints are very strict and
even the shortest possible delay is not acceptable. These systems are built for
saving life like automatic parachutes or airbags which are required to be readily
available in case of any accident. Virtual memory is rarely found in these systems.
These OSs are for applications where for time-constraint is less strict.
6. Multiprogramming OS – The main memory consists of jobs waiting for CPU time.
The OS selects one of the processes and assigns it to the CPU. Whenever the executing
process needs to wait for any other operation (like I/O), the OS selects another
process from the job queue and assigns it to the CPU. This way, the CPU is never kept
idle and the user gets the flavor of getting multiple tasks done at once.
• Memory Management
• Processor Management
• Device Management
• File Management
• Security
• Job accounting
Memory Management
• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what
part are not in use.
• In multiprogramming, the OS decides which process will get memory when and
how much.
Processor Management
• Keeps tracks of processor and status of process. The program responsible for
this task is known as traffic controller.
Device Management
• Keeps tracks of all devices. Program responsible for this task is known as
the I/O controller.
• Decides which process gets the device when and for how much time.
• De-allocates devices.
File Management
A file system is normally organized into directories for easy navigation and usage.
These directories may contain files and other directions.
• Keeps track of information, location, uses, status etc. The collective facilities
are often known as file system.
Following are some of the important activities that an Operating System performs −
• Job accounting − Keeping track of time and resources used by various jobs
and users.
• Operating system's software is quite expensive for small size organization which
adds burden on them. Example Windows
File Viewer
File Compression
A file compression utility shrinks the size of a file. A compressed file takes up less
storage space. Compressing files frees up room on the storage media and improves
system performance. Attaching a compressed file to an e-mail message reduces the
time needed for file transmission.
Uploading and downloading
compressed files to and from the
Internet reduces the file transmission
time.
Compressed files, sometimes called zipped files, usually have a .zip extension. When
you receive or download a compressed file, you must uncompress it. To uncompress,
or unzip, a file, you restore it to its original form. Two popular stand-alone file
compression utilities are PKZIP™ and WinZip® (shown in the Error! Reference
source not found.).
Diagnostic Utility
Disk Scanner
A disk defragment utility reorganizes the files and unused space on a computer’s
hard disk so the operating system can access data more quickly and programs can
run faster. When an operating system stores data on a disk, it places the data in the
first available sector on the disk. Although it attempts to place data in sectors that are
contiguous (next to each other), this is not always possible. When the contents of a
file are scattered across two or more noncontiguous sectors, the file is fragmented.
Fragmentation slows down disk access and thus the performance of the entire
computer. Defragmenting the disk, or reorganizing it so the files are stored in
contiguous sectors, solves this problem. Windows includes a disk defragmenter, called
Disk Defragmenter.
Uninstall Utility
Backup Utility
A backup utility allows you to copy, or backup, selected files or your entire hard disk
onto another disk or tape. During the backup process, the backup utility monitors
progress and alerts you if it needs additional disks or tapes. Many backup programs
will compress files during this process, so the backup files require less storage space
than the original files.
For this reason, you usually cannot use backup files in their backed up form. In the
event you need to use one of these files, a restore program reverses the process
and returns backed up files to their original form. Backup utilities include restore
programs.
You should back up files and disks regularly in the event your originals are lost,
damaged, or destroyed. Windows includes a backup utility. Some users opt to back
up their files to an Internet hard drive. An Internet hard drive, sometimes called online
storage, is a service on the Web that provides storage to computer users. A separate
paper discusses backup strategies in more depth.
Antivirus Program
An antivirus program is a utility that prevents, detects, and removes viruses from a
computer’s memory or storage devices. A virus is a program that copies itself into
other programs and spreads through multiple computers. Some malicious
programmers intentionally write virus programs that destroy or corrupt data on a
computer. A separate paper discusses antivirus programs and viruses in more depth.
Screen Saver
Screen savers originally were developed to prevent a problem called ghosting, in which
images could be permanently etched on a monitor’s screen. Ghosting is not a problem
with today’s monitors. Still, screen savers are popular for security, business, or
entertainment purposes. To secure a computer, you can configure your screen saver
so a user must enter a password to stop the screen saver and redisplay the previous
image. Some screen savers use push technology, which enables you to receive
updated and new information each time the screen saver displays. Push technology
occurs when Web-based content downloads automatically to your computer at a
regular interval or whenever the Web site updates.
An operating system often includes several screen savers. You also can purchase
screen savers or download them from the Web
Topic Six: COMPUTER VIRUS
A virus can only propagate itself by an act of a user of the system in which it
exists. (opening/viewing files that are infected and/or copying/transferring files
from one system to another through diskettes, file transfer, e-mail, Internet
and other means.)
Always check you hard drive for possible infection, if you are connected to the
Internet