Fcs All Notes - Merged
Fcs All Notes - Merged
● Types of computer
● A computer is an electronic device wherein we need to input raw data to be processed with a set of
programs to produce a desirable output.
● Computers have the ability to store, process and manipulate data.
● Analog computers
● Analogue computers are designed to process analogue data. Analogue data is continuous data that
changes continuously and cannot have discrete values. We can say that analogue computers are used
where we don't need exact values such as speed, temperature, pressure and current.
● Analogue computers directly accept the data from the measuring device without first converting it into
numbers and codes. They measure the continuous changes in physical quantity and generally render output
as a reading on a dial or scale. Speedometer (Used for measuring speed.) and mercury thermometer (used
to determine the temperature of body, liquid, and vapor)are examples of analog computers.
● Hybrid computer
● hybrid, which means made by combining two different things. Similarly, the hybrid computer is a
combination of both analog and digital computers. Hybrid computers are fast like analog computers and
have memory and accuracy like digital computers. So, it has the ability to process both continuous and
discrete data. For working when it accepts analog signals as input then it converts them into digital
● Supercomputers are the fastest and the most expensive machines. They have high processing speed
compared to other computers. The speed of the supercomputer is generally measured in FLOPS
(Floating point operations per second).
● Some of the faster supercomputers can perform trillions of calculations per second.supercomputer are
built by interconnecting thousands of processors that can work in parallel.
● The first supercomputer was developed by Seymour Cray in 1976.
● Supercomputers are used for highly calculation-intensive tasks such as weather forecasting,climate
research (global warming),molecular research, biological research, nuclear research and aircraft
design. They are also used in major universities, military agencies and scientific research laboratories.
● Some examples of supercomputers are IBM Roadrunner,Frontier and Intel ASCI red.
● PARAM is a series of supercomputers assembled in India by C-DAC (Center of Development of Advanced
Computing), in pune.
● Examples of the Indian supercomputers are AIRAWAT , PARAM-Siddhi AI,Pratyush.
● It has a very long life. It can run smoothly for up to 50 years after proper installation.
● It has the ability to share or distribute its workload among other processors and input/output terminals.
● There are fewer chances of error or bugs during processing in mainframe computers. If any error occurs it
can fix it quickly without affecting the performance.
● It has the ability to protect the stored data and other ongoing exchange of information and data.
● Personal Computer
● Desktop ,laptop,palmtop and all other tops belong to this category.essentially they are capable of executing
user’s software as they are equipped with some type of operating system.inside these PCs,we would be able
to locate some microprocessor which are more powerful and interfaced with larger size of memory than the
● Work Stations
● Workstation is a single user computer that is designed for technical or scientific applications. It has a
faster microprocessor, a large amount of RAM and high speed graphic adapters. It generally performs a
● It has larger storage capacity, better graphics, and a more powerful CPU than a personal computer.
● It can handle animation, data analysis, CAD, audio and video creation and editing.
● Embedded System
● Starting without mobile handsets, these embedded systems. We can locate almost every corner around us,
for example ipods,automatic weighing machines, digital cameras, robots and so on. They are
essentially controlled by some type of microcontrollers which are already indicated before,single-chip
computers and contain all necessary hardware and software to run the system for which it is
programmed.
● These tiny computers are generally not capable of executing any user program,which our PCs can.
However they are capable of running the system designated around them.in most of the cases, they are
● Central processing unit is also called the brain of the computer.CPU consists of an arithmetic logic
unit(ALU) and Control unit (CU). In addition,the CPU also has a set of registers which are temporary
storage areas for holding data and instructions.
● ALU performs the arithmetic and logic operations on the data that is made available to it.CU is
responsible for organizing the processing of data and instructions.CU controls and coordinates the
activity of the other units of the computer.
● The CPU uses the registers to store the data,instructions during processing.
● CPU executes the stored program instructions, i.e instruction and data are stored in memory before
execution. For processing the CPU get data and instructions from the memory.it interprets the program
instructions and performs the arithmetic and logic operations required for the processing of data. Then it
sends the processed data or result to the memory.CPU also acts as an administrator and is responsible for
supervising operations of other parts of the computer.
● The CPU is fabricated as a single integrated circuit (IC) chip, and is also known as the microprocessor.the
microprocessor is plugged into the motherboard of the computer.
● CPU sends data, instructions and information to the components inside the computer as well as to the
peripheral devices attached to it.Bus is a set of electronic signal pathways that allows information
and signal to travel between components inside or outside of a computer. The different
components of a computer i.e CPU,I/O unit and memory unit are connected with each other by a bus.
● The user interacts with the computer via the I/O unit.The input unit accepts data from the user and
the output unit provides the processed data i.e.the information to the user. The input unit converts
the data that it accepts from the user, into a form that is understandable by the computer. Similarly the
output unit provides the output in a form that is understandable by the user. The input is provided to
the computer using input devices like keyboard,trackball and mouse. Some of the commonly used
output devices are monitor and printer.
● Registers are high-speed storage areas within the CPU but have the least storage capacity. Registers
are not referenced by their address, but are directly accessed and manipulated by the CPU
during instruction execution.
● Registers store data, instructions,address and intermediate results of processing. Registers are
often referred to as the CPU’s working memory.
● The data and instructions that require processing must be brought in the registers of CPU before they
can be processed. For example, if two numbers are to be added, both numbers are brought in the
registers in CPU.
1. Accumulator(AC) stores the result of arithmetic and logic operations.
2. Instruction Register (IR) contains the current instruction most recently fetched.
3. Program counter(PC) contains the address of the next instruction to be processed.
4. Memory Address Register (MAR) contains the address of the next location in the
memory to be accessed.
5. Memory Buffer Register (MBR) temporarily stores data from memory or the data
to be sent to memory.
● Control Unit
● The control unit of a computer does not do any actual processing of data. It organizes the processing
of data and instructions.it acts as a supervisor and controls and coordinates the activity of the
other units of the computer.
● CU coordinates the input and output device of a computer.it directs the computer to carry out stored
program instruction by communicating with ALU and the register. CU uses the instructions in the
instruction register to decide which circuit needs to be activated. It also instructs the ALU to
perform the arithmetic or logic operation. When a program is run the program counter register
keeps track of the program instruction to be executed next.
● CU tells when to fetch the data and instructions,what to do, where to store the results, the sequencing
of events during processing etc.
● CU also holds the CPU’s instruction set which is list of all operations that the CPU can perform
● This is a 16-bit register which holds the address of the next instruction that has to be fetched
from the main memory and loaded into the instruction register. The program controlling the
operation is stored in the main memory and instructions are retrieved from this memory normally in
order. Therefore, normally the address contained in the PC is incremented after each instruction is
fetched. However, certain classes of instruction can modify the PC so that the programmer can provide
for branching away from the normal program flow.
● This is also a 16-bit register and is used by the programmer to maintain a stack in the memory while
using subroutines.The stack pointer is also a register used as a memory pointer; initially, it will be
called the stack pointer register to emphasize that it is a register. A stack pointer is a small register
● Inter connection Bus structure – Data Bus, Address Bus, Control Bus
● Data Bus
● The data bus provides a path for moving the data. This bus typically consists of 8,16 or 32 separate
lines, each line being capable of transferring one bit. The number of lines is referred to as the width of
the data bus, which is a key factor to determine the performance of the system, as the number of lines
determines how many bits can be transferred at time.
● Address Bus
● The address lines are used to specify the source and destination address of the data to be read or
written. For example, to read a word from the memory, the address of the desired word is put on the
data lines.
● Control Bus
● Control bus transmits both the command and timing information between the system module and is
used to control the functioning of various components of the computer system. The operations that the
CUP has to perform are identified by the command signals,whereas the timing signals indicate the
time during which the data and address are present and are valid.
● Instruction cycle
● The primary responsibility of a computer processor is to execute a sequential set of instructions that
constitute a program. CPU executes instructions in a series of steps called instruction cycle
● A instruction cycle involves four steps
● Fetching: the processor fetches the instruction from the memory.The fetch instruction is placed in the
instruction register.program counter holds the address of next instruction to be fetched and is
incremented after each fetch.
● Decoding: the instruction that is fetched is broken down into parts or decoded.the instruction is
translated into commands so that they correspond to those in the CPU’s instruction set. The instruction
set architecture of the CPU defines the way in which an instruction is decoded.
● Executing: the decoded instruction or the command is executed.CPU performs the operation implied
by the program instruction. For example if it is an ADD instruction, addition is performed.
● Storing: CPU writes back the result of execution to the computer’s memory.
● Although an ISR might move data from a CPU register or a hardware port into a memory
buffer, generally, it relies on a dedicated interrupt thread (or task), called the interrupt service
thread (IST), to do most of the required processing. If additional processing is required, the ISR
returns a logical interrupt value to the kernel. Then it maps a physical interrupt number to a
logical interrupt value.
● To achieve the goals of an Operating system, the Operating System performs several functionalities,
which are:
● Process Management: The CPU executes many instructions for users at a time. Besides, user's
commands, the CPU has some of its activities to perform, called processes. The CPU has to complete
all the tasks assigned to it. So, it solves the problem by giving a certain amount of time to a particular
● Advantages of Time-Sharing OS
● The time-sharing operating system provides effective utilization and sharing of resources.
● Real-time operating systems are very complex and can consume critical CPU cycles.
● Types of memory
● Reference link:https://www.javatpoint.com/classification-of-memory
● What is Memory?
● Computer memory is just like the human brain. It is used to store data/information and instructions. It
is a data storage unit or a data storage device where data is to be processed and instructions required
for processing are stored. It can store both the input and output can be stored here.
● Types of memory
● Primary memory
● Secondary memory
● Cache memory
● Primary memory
● It is also known as the main memory of the computer system. It is used to store data and programs or
instructions during computer operations. It uses semiconductor technology and hence is commonly
called semiconductor memory. Primary memory is of two types:
● RAM (Random Access Memory)
● ROM (Read Only Memory)
○ Disadvantages of DRAM
○ It has a complex manufacturing process.
○ Refreshing is required Continuously.
○ It is slower than SRAM.
● Characteristics of SRAM
○ It does not require refreshing.
○ It is faster than DRAM
○ Advantages of SRAM
○ It is preferred because of its access speed, despite being very expensive.
○ During the speed-sensitive cache it is very helpful.
○ SRAM is simple and easy to manage.
○ It is very reliable and therefore is used for cache memory.
○ Disadvantages of SRAM
○ Its speed does not justify its price.
○ It is a volatile memory, so all data is lost when power is cut off.
○ It also has a small storage capacity and takes up a lot of space.
○ The design is complex and not easy to build or understand.
The access time of SRAM is slow. The access time of DRAM is high.
It uses flip-flops to store each bit of information. It uses a capacitor to store each bit of
information.
It does not require periodic refreshing to It requires periodically refreshing to preserve the
preserve the information. information.
● Floppy Disk – A floppy disc refers to a magnetic disk housed in a square plastic container. It is
primarily used to store information and then transfer it from one device to another. There are two
sizes of floppy disk (a) Size: 3.5 inches, 1.44 MB storage capacity (b) Size: 5.25 inches and 1.2 MB
storage capacity. A computer must consist of a floppy disc drive for using a floppy disc. Such a
storage device is now obsolete, and DVDs, CDs, and flash drives have taken its place.
● Compact Disk – A Compact Disk or the CD is a type of secondary storage media that is widely
utilized. Its surface is covered in tracks and sectors. It is composed of polycarbonate plastic and has a
● CD-R or compact disk recordable – It is not possible to remove data that has been written onto it; it
can only be read.
● CD-RW or compact disk rewritable – It’s a particular kind of CD that allows us to wipe and rewrite
data as many times as we desire, so It’s also known as an erasable CD.
● Digital Versatile Disk – DVD stands for Digital Versatile Disk. It resembles a CD, but it has a larger
storage capacity; up to 4.7 GB of data can be stored. To use a DVD on a computer, a DVD-ROM
drive is required. Video files, such as movies or video recordings, are commonly saved on DVDs,
which may be played with a DVD player. There are three different kinds of DVDs available:
● DVD-ROM or Digital Versatile Disc Read-Only Memory – The manufacturer writes the data on
the DVD-ROM, and the users can only read it; they cannot create new data on it. For example, a
movie DVD has already been written by the maker, and we can only watch it; we cannot add new
data to it.
● DVD-RW or Digital Versatile Disc RW (Re Writable and Erasable) – It’s a particular kind of
DVD that allows us to wipe and rewrite data as many times as we desire. It’s also known as an
erasable DVD.
● Blu-ray Disc – It resembles a CD/VD, but it can actually hold up to 25 GigaBytes data or
information. You’ll need a Blu-ray reader if you wish to use a Blu-ray disc. The name Blu-ray comes
from the technology used to read the disc: ‘Blu’ comes from a blue-violet laser, and ‘ray’ comes from
an optical ray.
● Hard Disk – Hard disks are storage devices designed to hold a lot of information. Hard disk, often
known as hard disk drives, are available in a variety of storage capacities. (For example, 256 GB, 500
GB, 1 TB, and 2 TB). It is made up of platters, which are a collection of disks. The dishes are stacked
one on top of the other. They have a magnetic coating on them. Each platter is made up of a number
of invisible circles, each of which has the same central track. Internal and external hard disks are the
two types of hard disk.
● Solid-state Disk – A Solid-state Disk (SSD) is a data storage and retrieval device that is non-volatile.
It’s faster, makes no noise (since it doesn’t have any moving parts like a hard drive), uses less
electricity, and so on. If the price is right, it’s a perfect replacement for regular hard drives in laptops
and desktops, and it’s also ideal for tablets, notebooks, and other devices that don’t require a lot of
storage.
● SD Card – A Secure Digital Card (SD Card) is commonly used to store data in portable devices such
as cell phones and cameras. It comes in a variety of capacities, including 1, 2, 4, 8, 16, 32, and 64
GB. You can access the data present in the SD card by removing it from the device and inserting it
into a computer using a card reader. The data in the SD card is stored in memory chips (which are
included in the SD card), and there are no moving elements like there are on a hard disc.
● Register Memory
● The register memory is a temporary storage area for storing and transferring the data and the
instructions to a computer. It is the smallest and fastest memory of a computer. It is a part of
computer memory located in the CPU as the form of registers. The register memory is 16, 32 and 64
● Cache Memory
● It is a small-sized chip-based computer memory that lies between the CPU and the main memory. It
is a faster, high performance and temporary memory to enhance the performance of the CPU. It stores
all the data and instructions that are often used by computer CPUs. It also reduces the access time of
data from the main memory. It is faster than the main memory, and sometimes, it is also called CPU
memory because it is very close to the CPU chip.
Byte 8 Bits 1
The user can use the The user can indirectly access
Access logical address to access physical addresses but not
the physical address. directly.
● First fit
● There may be many holes in the memory, so the operating system, to reduce the amount of time
it spends analyzing the available spaces, begins at the start of primary memory and allocates
memory from the first hole it encounters large enough to satisfy the request. Using the same
example as above, the first fit will allocate 12KB of the 14KB block to the process. Its advantage is
that it is the fastest search as it searches only the first block i.e. enough to assign a process.
● Best fit
● The allocator places a process in the smallest block of unallocated memory in which it will fit.
For example, suppose a process requests 12 KB of memory and the memory manager currently has a
list of unallocated blocks of 6KB, 14KB, 19KB, 11KB, and 13KB blocks. The best-fit strategy will
● Paging
● Paging is a storage mechanism used to retrieve processes from the secondary storage into the main
memory in the form of pages.
● The main idea behind the paging is to divide each process in the form of pages. The main
memory will also be divided in the form of frames.
● One page of the process is to be stored in one of the frames of the memory. The pages can be stored
at the different locations of the memory but the priority is always to find the contiguous frames or
holes.
● Pages of the process are brought into the main memory only when they are required, otherwise they
reside in the secondary storage.
● Different operating systems define different frame sizes. The sizes of each frame must be equal.
Considering the fact that the pages are mapped to the frames in Paging, page size needs to be the
same as frame size.
● Conversion of Numbers
● Decimal to Other Bases
25 ÷ 2 12 1(MSB)
12 ÷ 2 6 0
6÷2 3 0
3÷2 1 1
1÷2 0 1(LSB)
128 ÷ 8 16 0
16÷ 8 2 0
2÷ 8 0 2
● Decimal to Hexadecimal:
● Convert (128)10 to hex.
Operation Output Remainder
128÷ 16 8 0
8÷ 16 0 8
951 ÷ 16 59 7
59÷ 16 3 11-B
3÷ 16 0 3
● Therefore, the equivalent hexadecimal number is (3B7)16
● Converting the fractional part (0.35) to hexadecimal:
● Multiply 0.35 by 16:
○ 0.35 × 16 = 5.6 (5 is the first hex digit after the decimal point)
● Multiply 0.6 by 16:
○ 0.6 × 16 = 9.6 (9 is the next hex digit)
● Multiply 0.6 by 16 (again to get more precision):
○ 0.6 × 16 = 9.6 (you can stop here or continue if you want more digits)
● 1×2−1=1×0.5=0.5
● 0×2−2=0×0.25=0
● 1×2−3=1×0.125=0.125
●
● Exercise of the octal to decimal conversion
● Convert (10)8 to decimal.
● Ans: (8)10
● Convert (17)8 to decimal.
● Ans: (15)10
● ASCII Code
● ASCII stands for American Standard Code for Information Interchange, A character encoding
standard that assigns unique numerical values to letters, digits, punctuation marks, and other symbols.
● In the physical world, you would use a pen and paper to write the message, and your friend would
read the text directly. However, when it comes to digital communication, computers don’t understand
letters and symbols the way humans do. Instead, they process information in the form of binary code,
which consists of 0s and 1s. This is where ASCII values come into play.
● The American Standard Code for Information Interchange (ASCII) is nothing more than the
definition of a code page that contains 128 symbols and uses 7 bits. This is extended to 8 bits by the
ANSI standard, and there are multiple separate code pages for the symbols 128 to 255.
● In 1985, Microsoft Windows was released for the first time with the ANSI character set already
installed. The ANSI code page format is the primary one used in Windows ME. They are also
compatible with the Windows NT operating system. It is referred to as Windows-1252 when running
on Windows/U.S. In addition, the ANSI coding format is the one that is used by default in
Notepad++. The encoding of Latin letters is typically done . Unix and MS-DOS are both examples of
popular software that is ANSI-based.
OR + (or) ∨ Third
Idempotent
P+P=P P.P = P
Law
Associative P + (Q + R) = (P + Q)
P.(Q.R) = (P.Q).R
Law +R
AND Law
AND law of the Boolean algebra uses AND operator and the AND law is,
● A.0=0
● A.1=A
● A.A=A
OR Law
OR law of the Boolean algebra uses OR operator and the OR law is,
● A+0=A
● A+1=1
● A+A=A
Advantages of LAN
● Simple and reasonable cost: The primary benefit of the local area network is that it is immediate
and easy to set up and also its price is minimum.
● Accessing software program: With the help of LAN, software programs are also shared. You can
incorporate a single licensed program that can be used by any device on a network. It is very costly to
buy a license for every device on a network, consequently sharing software is a simple and
straightforward way.
Disadvantages of LAN
● Limited distance: Local area networks are used only in buildings or apartment complexes; it cannot
be occupied in bigger areas.
● Information security issue created: If the server equipment is not programmed correctly then
unapproved users can retrieve data and there is a technical mistake. There arise issues like server
privacy.
● Installing LAN is expensive: It is expensive to establish a LAN. Here specialized software is
essential to install a server. Communication hardware such as hubs, switches, routers, and cables are
expensive to buy.
Advantages of MAN
● Security: MAN provides more security as compared to WAN and it is easy to implement.
● Distance occupies: MAN is occupied more distance as compared to LAN i.e. It is wider than LAN.
● Less expensive: MAN implementation cost is less than WAN because MAN requires fewer resources
as compared to WAN. It saves implementation costs.
● High speed: Man has a high speed of data transfer because MAN often uses fiber optics cables that
are capable of offering speeds up to 1000Mbps.
● Centralized management: MANs can be centrally managed, making it easier to monitor and control
network traffic.
● Cost-effective: Compared to WANs, MANs are more cost-effective to implement and maintain.
● Scalability: MANs can be easily scaled up or down to meet changing business needs.
● Improved communication: MANs can improve communication within organizations by allowing
for faster and more efficient sharing of data and resources.
Examples of MAN
● Cable TV network.
● Used in government agencies.
● University campuses.
● Used in hospitals to connect multiple buildings
Advantages of WAN
● Large area coverage: WAN covers a large geographical area(1000 km or more than). Ex. If your
business office is situated in another country and you live in another country then WAN is a platform
to communicate with each other(i.e. you and your office staff members).
● Higher bandwidth: WAN networks usually cover large geographical areas. Ex.1000 km or more
than the wide area network has higher bandwidth than LAN and MAN networks.
● Centralized data: Using the WAN network you can share the data connected to all the devices in the
respective network. Ex. By using the WAN network, all branches are capable of sharing all data
through the head office server and you can get support, full backup, and other precious data from the
head office, and all data gets synchronized along with all other company branches.
Whereas there is
While there is
There is less more congestion
Congestion more congestion
congestion in LAN. than MAN in
in MAN.
WAN.
In WAN, there is
There is more fault While there is less
Fault tolerance also less fault
tolerance in LAN. fault tolerance.
tolerance.
● Internet
● What is the Internet?
● The Internet is used to connect the different networks of computers simultaneously. It is a public
network therefore anyone can access the internet. On the internet, there are multiple users and it
provides an unlimited amount of information to the users.
● What is the Intranet?
● An intranet is a kind of private network. For example, an intranet is used by different organizations
and only members/staff of that organization have access to this. It is a system in which multiple
computers of an organization (or the computers you want to connect) are connected through an
intranet. As this is a private network, so no one from the outside world can access this network. So
many organizations and companies have their intranet network and only its members and staff have
access to this network. This is also used to protect your data and provide data security to a particular
organization, as it is a private network and does not leak data to the outside world
● Internet
● The Internet is a global network that connects billions of computers across the world with each other
and to the World Wide Web. It uses the standard internet protocol suite (TCP/IP) to connect billions
of computer users worldwide. It is set up by using cables such as optical fibers and other wireless and
networking technologies. At present, the internet is the fastest means of sending or exchanging
information and data between computers across the world.
● Here in this diagram, a company or an organization has created its private network or intranet for its
work(intranet network is under the circle). The company or organization has many employees(in this
diagram, we have considered 3). So, for their access, they have PC 1, PC 2, and PC 3(In the real
world there are many employees as per the requirements of an organization). Also, they have their
server for files or data to store, and to protect this private network, there is a Firewall. This firewall
● Advantages of Intranet
● In the intranet, the cost of conveying data utilizing the intranet is very low.
● Using intranet employees can easily get data anytime and anywhere.
● It is easy to learn and use.
● It can be utilized as a correspondence center point where employees can store data at whatever point
they need and download files in just a few seconds.
● It connects employees with each other.
● The documents stored on the intranet are much more secure.
● Disadvantages of Intranet
● The expense of actualizing intranets is normally high.
● The staff of the company or organization require special training to know how to use the system.
● Data overloading.
● Although the intranet provides good security, it still lacks in some places.
● Types of Intranets
● Corporate Intranet: A corporate intranet is the main platform for internal communication and
cooperation inside a firm. It gives employees access to internal materials, including corporate news,
guidelines, and records. Corporate intranets often feature tools for internal messaging, file sharing,
Internet Intranet
On the internet, there are multiple On an intranet, there are limited users.
users.
Anyone can access the Internet. In this, anyone can’t access the Internet.
Using Social media on your phone or A company used to communicate internally with
researching resources via Google. its employees and share information
The Internet is a global network that An intranet is a private network that connects
connects millions of devices and devices and computers within an organization.
computers worldwide.
Users can access the Internet from any Access to an intranet is restricted to authorized
location with an Internet connection users within the organization and is typically
and a compatible device. limited to specific devices and locations.
In static web pages, Pages will remain the In dynamic web pages, Content of pages
same until someone changes it manually. are different for different visitors.
Static Web Pages are simple in terms of Dynamic web pages are complicated.
complexity.
In Static Web Pages, the database is not In dynamic web pages, databases are used.
used.
Static web pages are written in languages Dynamic web pages are written in
such as: HTML, JavaScript, CSS, etc. languages such as: CGI, AJAX, ASP,
ASP.NET, etc.
Static web pages do not contain any Dynamic web pages contain application
application program . programs for different services.
Static web pages require less work and cost Dynamic web pages require comparatively
in designing them. more work and cost in designing them.
● Hypertext
● Hypertext is a cross referencing tool which connects the links to other text using hyperlinks.
Hypertext is non-linear and multi sequential and it is different from our normal text. By the help of
hypertext one organized way is achieved to present information. This makes the user move from one
part of the information to another part of the information which is on the same page or any other
page. It makes the documentation simple by providing a way to easily access the end user.
● Application of Internet
● The Internet is a global networking system that can be used on most devices nowadays and has
become an essential part of our lives. In today's technological era, most of the companies are getting
● What is Software?
● In a computer system, the software is basically a set of instructions or commands that tell a computer
what to do. In other words, the software is a computer program that provides a set of instructions to
execute a user’s commands and tell the computer what to do. For example like MS-Word, MS-Excel,
PowerPoint, etc.
● Types of Software
● It is a collection of data that is given to the computer to complete a particular task. The chart below
describes the types of software:
● Communication
● Communication is the most basic yet important step in the software engineering framework. Here, the
software engineer and the user or the client discuss the functioning of the application. It is important
to note down all the details. Even if a small detail is missed or ignored, it may cause a problem in the
later steps.
● Planning
● Client-server architecture is a computing model in which the server hosts, delivers, and manages
most of the resources and services requested by the client. It is also known as the networking
computing model or client-server network as all requests and services are delivered over a network.
The client-server architecture or model has other systems connected over a network where resources
are shared among the different computers.
● Typically, client-server architecture is arranged in a way that clients are often situated at workstations
or on personal computers, while servers are located elsewhere on the network, usually on more
powerful machines. Such a model is especially beneficial when the clients and server perform routine
tasks. For example, in hospital data processing, a client computer can be busy running an application
● The user enters the uniform resource locator (URL) of the website or file and the browser sends a
request to the domain name system (DNS) server.
● DNS server is responsible for searching and retrieving the IP address associated with a web server
and then initiating actions using that IP address.
● After the DNS server responds, the browser sends over an HTTP or HTTPS request to the web
server’s IP, which was provided by the DNS server.
● Following the request, the server proceeds to transmit the essential website files required.
● Cloud application
● As we know, cloud computing technology is used by both small and large organizations to store the
information in the cloud and access it from anywhere at any time using the internet connection.
● Cloud computing architecture is a combination of service-oriented architecture and event-driven
architecture.
● Cloud computing architecture is divided into the following two parts -
● Front End
● Back End
● The below diagram shows the architecture of cloud computing -