0% found this document useful (0 votes)
43 views65 pages

Cos101 - Introduction To Computing Sciences - 051335

Education

Uploaded by

u345245
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views65 pages

Cos101 - Introduction To Computing Sciences - 051335

Education

Uploaded by

u345245
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

UNIVERSITY OF DELTA

AGBOR
FACULTY OF COMPUTING
COURSE CODE: COS101

COURSE TITLE: INTRODUCTION TO


COMPUTING SCIENCES
COMPUTER
GENERATIONS
FIRST GENERATION
FEATURES
 existed b/w 1940 – 1956 Example includes:
 used vacuum tube technology  ENAIC
 unreliable EDVAC
Supported machine language only UNIVAC
 very costly IBM-701
 generated lot of heat IBM-650
Slow input and output devices –
Punch card and paper tape.
Huge size
 need of A.C
Non portable
 consumed lot of electricity
SECOND GENERATION
FEATURES:
 existed b/w 1956 - 1963
 use of transistors Example includes:
Reliable, compared to 1st generation  IBM 1620
Smaller in size, compared to 1st IBM 7094
generation CDC 1604
Generated less heat, compared to 1st CDC 3600
generation UNIVAC 1108
Consumed less electricity, compared to 1st
generation
Faster than 1st generation computers
Still very costly
A.C needed
Supported machine & assembly language
COBOL and FORTRAN were developed.
THIRD GENERATION
FEATURES:
 existed b/w 1964 - 1974
Example includes:
 IC used
 IBM 360 series
More reliable in comparison to previous
Honeywell 6000
generations
series
Smaller in size
PDP (PERSONAL
Generated less heat
DATA PROCESSOR)
Faster
IBM 370
Lesser maintenance
IBM 168
Still costly
TDC 316
A.C needed
Consumed lesser electricity
Supported high level languages
Keyboard and Mouse were introduced.
FOURTH GENERATION
FEATURES:
 existed b/w 1975 - 1989
 MSI, LSI and VLSI technology were used. Example includes:
Networking OS/Object oriented  DEC 10
programming. STAR 1000
 Internet/GUI PDP 11
Very cheap CRAY 1
Portable and reliable (superComputer)
Use of PC’s CRAY X
Very small in size (SuperComputer)
Pipeline processing
No A.C needed
Concept of internet was introduced
Great development in the field of network
Computers became easily available
FIFTH GENERATION
FEATURES:
 existed b/w 1990’s – Till date Example includes:
 ULSI technology  Desktop
Development of true artificial intelligence Laptop
– Robotics, Neural networks, Game playing. NoteBook
Development of Natural language UltraBook
processing ChromeBook
Advancement in Parallel Processing
Advancement in Superconductor
technology
More user friendly interface with
multimedia features
Availability of very powerful and compact
computers at cheaper rates
CLASSIFICATION
OF COMPUTERS
Computers may be classified into three broad categories namely:
 According to Data representation
 Digital Computers – These are computers in which data are
represented in coded digital format and each digit or character
is stored discretely. E.g In BCD format, the decimal number
432 will be stored as 0100 0011 0010 as against 110110000
which is the true binary value (As shown in the tables below).
All laptops and Desktop found in offices are digital computers.
Digital computers have the advantage of speed.
NUMBER BCD CODE (4 bits) 2 432
0 0000 2 216 R 0
1 0001 2 108 R 0

2 0010 2 54 R 0

3 0011 2 27 R 0

4 0100 2 13 R 1

5 0101 2 6R 1

6 0110 2 3R 0

7 0111 2 1R 1
0R 1
8 1000

9 1001 FOR ANALOGUE COMPUTERS, WE


APPLY LONG DIVISION AND READ
THE RESULT UPWARD.
FOR DIGITAL COMPUTERS
432 = 110110000
432 = (0100) (0011) (0010)
= 010000110010
= 10000110010
Analogue Computers – These are computers in which data are
represented without storing each character or digit discretely. Data
is instead represented in continuous form, which is the true binary
value of the given data. E.g decimal number 423 would be stored
as 110110000. Analogue computers are mainly used for measuring
quantities. E.g Car speedometer, fuel/kerosine/diesel dispenser.
Analogue computer possess the advantage of accuracy.
Hybrid Computers – These are computers that combines the
advantages of both digital and analogue computers. They are used
in scientific and technical applications such as process control in
spare parts manufacturing, space shuttle, missile lunch etc.
 According to Size and processing capacity
 Super Computers
 Mainframe Computers
 Mini Computers
 Micro Computers/Personal Computers
1. Desktop
2. Laptops
3. Notebooks – Ultrabooks, Chromebook
4. Palmtops – Tablets, Smartphones, PDA’s
 According to Purpose
 General purpose computer
 Special purpose computers
COMPUTER
APPLICATION
IN SOCIETY
Computers are applied in many areas of
human endeavour. Some of these areas
includes:
• Computers in Telecommunications
• Computers in Retailing
• Computers in Automobile
• Computers in Financial institutions
• Computers in Homes
• Computers in Recreation/Leisure services
• Computers in Health care
• Computers in Education etc.
COMPUTERS IN EDUCATION: The application of computers in
Education can be discussed under the following:
• Test scoring
• School administration
• Teaching and Learning

TEACHING AND LEARNING PROCESS: Computers are applied


to the teaching and learning process through the following means:
• CAL (Computer Assisted Learning)
• CAI ( Computer Assisted Instruction)
• CML (Computer managed Learning)

Every CAI and CAL package has three levels. These are :
• Tutorial level
• Practice and Drill level
• Dialogue level
WINDOWS
OPERATING
SYSTEM
 Software is a collection of programs well
designed to perform a certain task on the
computer.
 A program is a set of commands or
instructions written to address a particular
issue or problem.
 Software generally is subdivided into two
categories
 System software
Application software
System Software: refers to a group of
applications or programs created to manage,
regulate, and expand the computing power of
the computer. System software serves as an
interface between the end users and the
hardware. Examples of system software
includes: operating systems, compilers,
interpreters, assemblers, firmware, device
drivers, utility programs, etc.
Characteristics of system software:
 Close to the system
 Fast in speed
 Difficult to design
 Difficult to understand
 Less interactive
 Smaller in size
 Difficult to manipulate
 Written in low-level or mid-level language
Application Software
Application software is software that a user
interacts with directly. These are software that
renders services to the user. Application
software's main objective is to help the user do
specific tasks. Application software includes
programs like Microsoft Word, Microsoft Excel,
Firefox, Google Chrome, etc.
Characteristics of application software:
 Close to the user
 Slow in speed
 Easy to design
 Easy to understand
 More interactive
 Bigger in size and requires large storage
space
 Easy to manipulate and use
 Written in a high-level language
Operating system (OS) is the basic software that
control the computer. It simply coordinates,
controls, allocates, schedules and terminates the
basic operations of various computer hardware's.
The operating system has three major functions:
• It coordinates and manipulates computer
hardware.
• It organizes files on varieties of storage media.
• It manages hardware errors and the loss of data.

Examples of operating system (OS) includes:


UNIX, Macintosh, Windows, Linux etc.
Types of operating systems
 Single-User/Single-Tasking OS
 Single-User/Multitasking OS
 Multi-User/Multitasking OS
 Real-time OS
 Networking OS
Functions of operating systems
 Memory Management
 Process Management
 Input/Output (I/O) Operations
 Disk Management
 File Management
 Network Management
 Interrupt/Error handling Management
WINDOWS OPERATING SYSTEMS
Windows operating systems is an OS that is
designed with the concept of graphical User
interface (GUI), which allows users to manipulate
small pictures, called icons with the help of the
mouse. It is the most widely used OS with several
versions evolving till date. They include:
 Windows 1.0 released in 1985.
 Windows 2.0 released in 1987.
 Windows 3.0, 3.1, 3.11 released in 1990.
 Windows NT released in 1993.
 Windows 95 released in 1995.
 Windows CE released in 1996.
 Windows 98 released in 1998.
 Windows 2000 released in 1999.
 Windows Me released in 2000
 Windows XP released in 2001.
 Windows Vista released in 2006.
 Windows 7 released in 2009.
 Windows 8 released in 2012
 Windows 10 released in 2015
 Windows 11 released in 2021
MOUSE AND KEYBOARD
MOUSE AND KEYBOARD
MOUSE: Is a hand-held pointing device (input device)
that control the movement of the cursor within a GUI
(Graphical User Interface) environment. The mouse can be
configured for either a right handed person or for a left
handed person. Which ever the case of configuration, the
functions of the buttons changes. The following are the
basic actions that can be performed using the mouse:
•Pointing
•Clicking (left and right clicking)
•Double clicking
•Dragging
Types of Mouse
1. Wireless mouse

2. Wired mouse
Types of Mouse
3. Mechanical mouse

4. Optical mouse
Types of Mouse
5. Laser mouse

6. Gaming mouse
Types of Mouse
7. Trackball mouse

8. Stylus mouse
Types of Mouse
9. Presentation mouse

10. Ergonomic/Vertical mouse


Types of Mouse
11. Touchpad mouse
KEYBOARD: A keyboard is one of the primary input
devices used with a computer. It is a typewriter-like device
with keys that a user presses to enter data (characters) and
commands into a computer. The keys on the keyboard are
classified into the following:
• Numeric keys: 0,1,2,3 … 9
• Alphabetic keys: A, B ,C, … Z or a, b, c, … z
• Special keys: +, =, -, <, >, ?, /, “, ;, {, }, %, ^, &, #, @
etc.
Types of Keyboard
1. Standard keyboard: This is a keyboard that has between
84 – 89 keys. It has 10 function keys.
2. Enhanced keyboard: This keyboard has between 101 –
104 keys. It has 12 function keys.
Types of Keyboard (Based on keys arrangement)
1. QWERTY keyboard
2. DVORAK keyboard
Sections of the keyboard
The keyboard is divided into the following sections
 Numeric keys – 0, 1, 2, . . ., 9
 Alphabetic keys – A, B, C, . . ., Z or a, b, c, . . .,z
 Function keys – F1 to F12
 Arrows keys
 Special keys – Shift key, Control key, Alternate key,
Caps lock key, Enter key, Backspace key, Tab key,
Spacebar key etc.
 Numeric keypad
Types of QWERTY keyboard (Based on usage or function))
1. Multimedia keyboard

2. Mechanical keyboard
Types of QWERTY keyboard (Based on usage or function))
3. Wireless keyboard

4. Virtual keyboard
Types of QWERTY keyboard (Based on usage or function))
5. USB keyboard

6. Ergonomic keyboard
Types of QWERTY keyboard (Based on usage or function))
7. flexible keyboard

6. Laptop size keyboard


COMPUTER NETWORK
Computer network: A computer network is the
connectivity of two or more computers to enable
users of the network to be able to share
information, files, and resources such as: printers
etc.

Network layers: Most network have three layers


or components. They are :
• Application software layer
• Network software layer
• Network hardware layer
Application software layer consist of computer programs
that interface with network and permits the sharing of
information. An example of such an application are the
Client – server and peer - to – peer network.

Network software layer consist of computer programs


that establishes protocols or rules for computers in the
network to talk each other.

Network hardware layer is made up of the physical


components that connects computers together. These
includes cables , adapters etc.
Types of Computer Network (Based on geographical
location)
Based on geographical location, network is classified into
the following:
• Local area network
• Wide area network
• Metropolitan area network

Types of Computer Network (Based on information


storage/retrieval)
Based on information storage /retrieval, network is
classified into the following:
• client/server network
• peer to peer network
Advantages of Network
•Eliminates sneakernet
•Work away from office
•Sharing of information
•Sharing of equipment's/peripherals

Disadvantages of Network
•It suffers from extreme limited band width. (WAN)
•It consumes a lot of cables. (LAN)
•It is used for inter-process communication for remote
short messages such e-mail etc. (WAN)
Network security
•Firewall
•User name and password (PIN)

Network Topology
•Bus topology
•Star topology
•Ring topology
Bus topology is a type of network topology in which
all devices are connected to a single cable called a
"bus." This cable serves as a shared communication
medium (backbone), allowing all devices on the
network to receive the same signal simultaneously.
Star Topology

Star topology, sometimes known as a star network, is a


network topology in which each device is connected to a
central device (Hub, Switch, or Computer). It is one of the
most prevalent computer network configurations, and it's by
far the most popular Network Topology. In this network
arrangement, all devices linked to a central network device are
displayed as a star.
A ring topology is a network design where connected
devices form a circular data channel. Each networked
device is linked to two more ones by two points on a circle.
A ring network is a collective term for the devices arranged
in a ring topology.
INTERNET AND ITS
RESOURCES
INTERNET
This is the connectivity of millions of computers around the
globe with the aim of sharing information and other
computational resources.

WORLD WIDE WEB (WWW) The web is a set of


software programs that presents information through
multimedia formats: graphics, sound, animations and video.
It employs several tools to provides a visual layout:
hypertext links, browser software etc. The information on
the web are created using a language called Hypertext
Markup Language (HTML).
BROWSER A browser is a software program that creates an
interface between the computer user and the internet (web).
Most browser have a graphical user interface (GUI) which
gives users the means to connect to a location on the internet
either by typing in the desired address or by clicking on
hyperlinks to reach a site. Examples includes: Microsoft
Edge, Mozilla Firefox, Opera, Chrome etc.

INTERNET PROTOCOLS These are rules that governs the


use of the internet. They simply describe how clients servers
communicates across a network. The protocols used currently
were developed many years ago, and still maintains a standard
of placing priority on which computer must transmit data
before another. Examples of internet protocols includes:
• TCP/IP Transmission control protocol/internet protocol
• HTTP Hyper Text Transfer Protocol
• HTTPS Hyper Text Transfer Protocol Secured
• FTP File Transfer Protocol
• SMTP Simple Mail Transfer Protocol
• POP Post Office Protocol
• IMAP Internet Messaging Access Protocol
• UDP User Datagram Protocol
• Telnet
HOW THE INTERNET WORKS Internet
communication is made possible by the transmission
control protocol/Internet protocol (TCP/IP) software on
the computers. It is the most popular network protocol and
the basis for the internet. It aid in sending information to
the computer with which you are connected, which then
passes it on to other computers until it reaches the
destinations. TCP/IP does a lot of work to ensure that your
information is transferred quickly and reliably. It divides
your data into smaller units called packets and sends each
packets separately across the internet. Each packet consist
of two parts: These are packet header and packet
payload.
A packet header simply specifies the computer to which the
packet should be delivered, and how the data in the packet
should be combined with the data in other packets by
recording which piece of a document is contained in the
packets.
While the packet payload contains the data being sent. If a
packet is lost, all data does not need to be resent; TCP/IP
resends only the missing packets. The destination computer
collects the packets and reassembles them into your
original data.
IP ADDRESSES Every computer connected to the internet
has its own IP address, which allows a packet or unit of data
to be delivered to a specific computer. The internet
technology employs IP addressing scheme, where every
device connected to the internet would be given protocol
address, just as houses and businesses are given street
address. With the internet protocol address, a sending
computer carries the destination address as a header and the
source address (address of the sending computer) as the
trailer. The technology is designed in such a way that it
continues to accommodate more numbers of computers
connecting the internet. With the scheme, instead of having
street address format, such as 15 Orubor street Agbor, a 32 bit
address format is used, such as the following: 202.116.33.14
The address is divided into four numbers separated by a
dot. Each of the four numbers is between 0 and 255. Some
numbers value are reserved, but there roughly 256 x 256 x
256 x 256 different IP address possible.

DOMAIN NAME SYSTEM (DNS) When you access a


website, the address of the web server must be entered into
the web browser. As mentioned before, one way to identify
the server is to provide the IP address. However, most
users or professional prefer to use domain name because
word base name are easier to remember. The DNS
translate IP address into easily recognizable names .
Examples includes: www.unidel.edu.ng , www.useit.com
etc.
The DNS is an important internet protocol. One way to
remember a domain name is to understand its structure,
which can reveal a great deal about the site. Each domain
name is unique. Once a name within a domain category or
extension is assigned (eg .com, .edu), no other
organization may use that name within that category or
extension. Example of domain category or extension are :
• com commercial or company site
• gov government
• mil military
• org organization (clubs, associations, non profit
organization)
• net network site, including commercial ISP’s
• edu education
INTERNET SERVICE PROVIDER (ISP)
The ISP’s provides internet access to customers for a
monthly or annual fee. There are several ways to be
connected to the internet. These includes:
• Dedicated access
 Digital Subscriber Line (DSL)
 Very Small Aperture Terminal (VSAT)
• Dial up access
• Wireless access
ELECTRONIC MAIL (e-mail) The electronic mail
allows the transfer of message from one computer to
another in a network. In this vane, two or more mail server
are involved: out going possibly incoming mail servers. A
user can send e-mail to others with the outgoing server
using SMTP and receive e-mail from an incoming mail
server using the POP or IMAP. A user composes or creates
an e-mail message and specifies a recipient using an e-mail
address, which is a string consisting of the recipient’s login
name followed by an at (@ ) symbol and then domain name
and extension. Example include:
 john4real@gmail.com.
 andy.emuobonuvie@unidel.edu.ng
UNIVERSAL RESOURCE LOCATOR (URL) Every page on the
web has an individual address or URL address, which allows you to
go directly to the page. If you have an address you are interested in
viewing, simply type the URL address in the address field at the top
of your web browser window and press enter. A URL address is
divided into four parts, these are:
• Protocol
• Domain
• Directory
• Filename
Example :
https://www.useit/alertbox/990124.html
• https is the protocol
• www.useit.com is the domain
• alertbox is the directory
• 990124.html is the filename
SEARCH ENGINE
These are software programs that enables a user to search
the web for information. Examples of such programs
includes:
• Google
• Yahoo (Yet Another Hierarchical Officious Oracle)
• Alta vista
• Excite
• Dogpile
• Search.com
• Metacrawler
• Looksmart

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy