COS 101 NOTE 1 (Introduction To Computer Sciences-1)
COS 101 NOTE 1 (Introduction To Computer Sciences-1)
1. . WHAT ISCOMPUTER?
The word “computer” is comes from the word “TO COMPUTE” meansto
calculate.
A computer is normally considered to be a calculation device which canperform
the arithmetic operations veryspeedily.
A computer may be defined as a device which operates upon thedata.
Data can be in the form of numbers, letters, symbols, size etc. And it comesin
various shapes & sizes depending upon the type of computerapplication.
A computer can store, process & retrieve data as and when wedesired.
The fact that computer process data is so fundamental that many peoplehave
started calling as “DataProcessor”.
A computer first it gets the Data, does Process on it and thenproduces
Information.
DEFINATION OFCOMPUTER
o A computer is an electronic device which takes input from theuser,
processes it and gives the output as per user’srequirement.
o So the main tasks of performed by the computerare:
Input
Process
Output
2. . WRITE DOWN THE CHARACTERISTICS OFCOMPUTER
Some important characteristics of the computer are as follow:
DATAutomatic:
o Computers are automatic machines because it works by itselfwithout
humanintervention.
o Once it started on a job they carry on until the job isfinished.
o Computer cannot startthemselves.
o They can works from the instructions which are stored inside the systemin
the form of programs which specify how a particular job is to bedone.
Accuracy:
o The accuracy of a computer is veryhigh.
o The degree of accuracy of a particular computer depends upon itsdesign.
o Errors can occur by the computer. But these are due to humanweakness,
due to incorrect data, but not due to the technologicalweakness.
Speed:
o Computer is a very fact device. It can perform the amount of work infew
seconds for which a human can take an entireyear.
o While talking about computer speed we do not talk in terms ofseconds
and milliseconds but inmicroseconds.
o A powerful computer is capable of performing several billion (109)simple
arithmetic operations persecond.
Diligence:
o Unlike human beings, a computer is free from monotony, tiredness &lack
ofconcentration.
o It can continuously work for hours without creating any error &without
grumbling.
o If you give ten million calculations to performed, it will performwith
exactly the same accuracy & speed as the firstone.
Versatility:
o It is one of the most wonderful features about thecomputer.
o One moment it is preparing the results of a particular examination, the
next moment it is busy with preparing electricity bills and in between it
may be helping an office secretary to trace an important letter inseconds.
Power ofremembering:
o Computer can store and recall any amount of data because of itshigh
storage capacity of its storagedevices.
o Every piece of information can be retained as long as desired by theuser
and can be recalled as and whenrequired.
o Even after several years, if the information recalled, it will be asaccurate
as on the day when it was filled to thecomputers.
NoI.Q.
o A computer is not a magical device; it processes no intelligence of itsown.
o Its I.Q. iszero.
o It has to be told what to do & in whatsequence.
o It cannot take its owndecision.
NoFallings:
o A Computer has no feelings because they aremachines.
o Based on our feelings, task, knowledge and experience we oftenmake
certain judgments in our day todaylife.
o But Computer goes exactly the way which we have given theinstructions .
3. . EXPLAIN THE DATA PROCESSING CYCLE
OFCOMPUTER.
The computer Data Processing is any process that a computer program does to
enter data &summarise, analyse or convert data into useable information.
The process may be automated & run on acomputer.
It involves recording, analysing, storing, summarising& storing data.
Because data are most useful when it is well presented &
informative.
The Data Processing Cycle:
Data Processing cycle described all activities which are common to alldata
processing systems from manual to electronicsystems.
These activities can be grouped in four functional categories, viz., data input,
data processing, data output and storage, constituting what is known as adata
processingcycle.
The main aim of data processing cycle is to convert the data intomeaningful
information.
Data processing system are often referred to as InformationSystem.
The Information System typically take raw Data as Input to produceInformation
asOutput.
INPUT OUTPUT
DATA PROCESS INFORMATION
STORAGE
Second Generation:
Duration: 1955-1964
Technology: transistor
o 10 times Smaller in size than 1st generationsystem.
o Less heat than 1st generationcomputers.
o Consumed less power than 1st generationsystem.
o Computers were done calculations inmicroseconds.
o Air-conditioner is alsorequired.
o Easy to configure than 1st generationcomputers.
o More reliable ininformation.
o Wider commercialuse.
o Large & fast primary/secondary storage than 1st generationcomputers.
ThirdGeneration:
Duration: 1965-1975
Technology: ICchip
o Smaller in size than 1st& 2nd generationcomputers.
o Perform more fast calculations than 2nd generationsystems.
o Large & fast primary/secondary storage than 2nd generationcomputers.
o Air –conditioner isrequired.
o Widely used for commercialapplications.
o General purposecomputers.
o High level languages like COBOL & FORTAN are allowed to writeprograms.
o Generate less heat & consumed less power than 2nd generationcomputer.
Fourth Generation:
Duration: 1975-1989
Technology: Microprocessorchip
o Based on LSI & VLSI microprocessorchip.
o Smaller insize.
o Much faster than previousgenerations.
o Minimum hardware maintenance isrequired.
o Very reliable as computer to previous generationcomputers.
o Totally general purposecomputer.
o Easy toconfigure.
o Possible to use network concept to connect the computertogether.
o NO requirement ofair-conditioners.
o Cheapest inprice.
Fifth Generation:
Duration: 1989 to Present
Technology: ULSI microprocessor chip
o Much smaller &handy.
o Based on the ULSI chip which contains 100 million electroniccomponents.
o The speed of the operations isincreased.
o Consumed lesspower.
o Air-conditioner is notrequired.
o More user friendly interface with multi-mediafeatures.
o High level languages are allowed to writeprograms.
o Larger & faster primary/secondary storage than previousgenerations.
o Notebook computers are the example of 5th generationcomputers.
InputDevices:
o The devices which are used to entered data in the computer systemsare
known as inputdevices.
o Keyboard, mouse, scanner, mike, light pen etc are example of
inputdevices.
o FUNCTION OF INPUTDEVICES
o Accept the data from the outsideworlds.
o Convert that data into computer codedinformation.
o Supply this data to CPU for furtherprocessing.
OutputDevices:
o The devices which display the result generated by the computer are knownas
outputdevices.
o Monitor, printer, plotter, speaker etc are the example of outputdevices.
FUNCTIONS OF OUTPUT DEVICES
o Accept the result form theCPU.
o Convert that result into human readableform.
o Display the result on the outputdevice.
MemoryUnit:
o The data & instruction have to store inside the computer before theactual
processingstart.
o Same way the result of the computer must be stored before passed tothe
output devices. This tasks performed by memoryunit.
ControlUnit:
o It controls the movement of data and program instructions into and outof
the CPU, and to control the operations of theALU.
o In sort, its main function is to manage all the activities within thecomputer
system.
o Controls the internal parts as well as the external parts related withthe
computer.
CPU:
o The Unit where all the processing is done is called as Central ProcessingUnit.
o It contains many other units underit.
o Main of them are:- Control Unit And ALU (Arithmetic & LogicUnit)
UNIT: 2 INPUT DEVICES
1. . WHAT ISINPUTDEVICES ?
The Input devices are the devices which are used to enter the data inthe
computersystem.
Keyboard, mouse, scanner, microphone are the example of inputdevices.
FUNCTIONS OF INPUTDEVICES:
o Accept the data from the outsideworlds.
o Convert that data into computer codedinformation.
o Supply this data to Central Processing Unit for furtherprocessing.
SIMULTANEOUS-CLICK:
o Press & release left & right button togather.
o Used in some software package to added somefunctionality.
DRAG:
o Press the left button down & moved the mouse onscreen.
o Used to move the graphics onscreen.
Many types of mouse are available such as mechanical mouse, optical mouse,
serial mouse, wireless mouse which are used for differentpurpose.
2. . TRACK BALL
3. .JOYSTICK
4. . LIGHT PEN
Light pen is a pointing device which is used to draw directly draw on thescreen.
It is called light pen because it is similar to a pen & senseslight.
It’s an input device in the form of light-sensitive stick used in conjunction witha
CRTdisplay.
The light pen allows the user to point out or draw any object on thescreen.
The user brings the pen to the desired point on screen and presses thepen
button to makecontact.
It has a switch on its top which allows the user to make contact withscreen.
It is useful for drawing or graphics in the program such as CAD (computeraided
design).
An engineer, architect or fashion designer can draw directly onscreen.
Used in application such as gaming, graphic arts, healthcare applicationsetc.
Light pen cannot scratch or damage ascreen.
Advantages of light pen;
o Less expensive than touchscreen.
o give the user the full range of mouse capabilities, without the use of apad
or any horizontalsurface
o Cannot scratch or damagescreen.
o Works on any sizescreen.
5. . TOUCH SCREEN
Touch screen is a pointingdevice.
It is most simple & easiest to learn of all inputdevices.
It allows the user to choose from available options by simply touching withtheir
figure to the desired icon or menu item displayed on the computerscreen.
A touch screen is an electronic visual display that can detect the presenceand
location of a touch within the displayarea.
The term generally refers to touching the display of the device with a fingeror
hand.
Touch screens are common in devices such as computers, tablet computers&
Smartphone.
The touch screen has two mainattributes::
o First, it enables one to interact directly with what isdisplayed.
o Secondly, it lets one do so without requiring any intermediate devicethat
would need to be held in thehand
It’s a very easy to operate device which users can use the system withoutany
formaltraining.
Uses optical sensors that detect the touch of the finger onscreen.
Sensors communicate the position of touch to the computer which interpretsthe
input made by theusers.
It contains pressure sensitive monitors which are placed inside the baseof
computerscreen.
Pressure sensitive monitors contain sensors to measure the monitor’s weightat
manypoints.
When user touches the screen, the changes on weights & forcestransferred
down to sensor which allows the device to detect the location of thetouch.
This type of monitors required little pressure to transmit the desiredinput.
Touch screen are commonly used in followingplaces.
o An airport or railwaystation.
o Large departmentalstores.
o In large museums or zoos to guide visitors to the locations ofvarious
attractions.
o Self service checkout
o In ATMmachines
o In I-phones orPDA’s
o Computer basedtraining
Any type of touch screen contains Three maincomponents:
A touch screen sensorpanel:
o Which sits above the display & generate appropriate voltage accordingto
where precisely it istouched?
A touch screen controller:
o Processes the signal received from the sensor & translates this touchevent
data & passed to pc’s processor via serial or USBinterface.
A soft waredriver:
o Provides an interface to the pc’s operating system & which translates the
touch event data into mouseevent.
6. .DIGITIZER
An inputdevice.
Used for converting pictures, map & drawing into digitalform.
Allows one to hand-draw images and graphics, similar to the way onedraws
images with a pencil andpaper.
Also be used to capture data or handwrittensignatures.
The device consists of a flat surface upon which the user may "draw" animage
using an attached stylus, a pen-like drawingtool.
These devices are usually connected via a Serialport.
Placed on the desk n connected with thecomputer.
Digitizer consists of graphic tablets which are associated with astylus.
The stylus is like a pen with abutton.
Stylus connected with a tablet and can press down at a point on the tabletto
input (x, y) co-ordinates ofpoint.
It contains hundreds of copper wires forming a grid that receives electricpulsed.
When stylus moves on tables the cursor on screen movesssimultaneously.
Allows the user to draw sketchesdirectly.
Commonly used in CAD by architects &engineers.
Used in GIS (geographical information system) for digitizingmaps.
7. .MICROPHONE
It’s an inputdevice.
Used to stores the voice data into the computersystem.
Microphones are a type of transducer - a device which converts energy fromone
form toanother.
Microphones convert sound waves into electricalenergy.
Different types of microphone have different ways of convertingenergy.
OR
EXPLAIN CRT (CATHOD RAY TUBE) MONITER.
The monitor is the common output device mostly used It is a softcopyoutput
device.
It can be thought of as a high resolution TVset.
The monitor can also determine if the display will be colour, black and white,or
include graphical objects(pictures).
Two types of monitors areused.
o CRTmonitors.
o Non CRTmonitors.
Most computer monitors are based on Cathode Ray Tube (CRT)technology.
The basic operation of these tubes is similar to that in televisionsets.
In CRT display CRT is a specialised vacuum tube in which images areproduced
when electron beam strikes a phosphorsurface.
CRT monitor contains cathode, control grid, acceleration anode, deflectionplates
& phosphor coatedscreen.
Cathode: the cathode is heated by filament and produced high speed & large
amount ofelectrons.
Control Grid: used to control the brightness of the screen. It controls thenumber
ofelectrons.
Accelerating anodes: they are with focusing lens are applied withpositive
electrons.
Horizontal deflection plate: moves electron side byside.
Vertical deflection: moves electrons up &down.
Screen: contains millions of tiny red, green, blue phosphor dot that glowwhen
struck by electron beam that travels across screen to create a visibleimage.
ADVANTAGES OF CRT DISPLAY
Produce morecolours.
Price is lower than LCD &Plasma.
High contrastratio.
Can easily increase brightness of monitor by reflecting thelight.
DISADVANTAGES OF CRTDISPLAY
High powerconsumed.
Heavy to pick up andcarry.
Large spacerequired.
LCD(LiquidCrystalDisplay)
In LCD, a liquid crystalline material is sandwiched between two glass or a plastic
plates.
The front plate is transparent and the back plate isreflective.
There is a coating of thin film on the frontplate.
The coating is transparent and conductive. Its sections (segments) are inthe
shape of desiredcharacters.
LCDs do not emit their own light. Therefore, a light source is to beused.
LCDs simply change the reflection of available light. Today, most LCDs usedare
of the type that produces dark images on a silverbackground.
Advantages:
Light weight as compare toCRT.
Perfectly flatscreen.
Consumed low electricitypower.
Able to generate higher brightness inimages.
Disadvantages:
Fixed resolution that cannot bechanged.
Expensive than CRTdisplay.
Limited viewingangle.
Shortlife.
ADVANTAGES:
o Low cost than non impactprinter.
o Can make carbon copy of printout.
o Chain can be easilychanged.
o Allowed to print different typefont.
o Printing quality is similar to a typewriter.
DISADVANTAGES:
o Slower than non impactprinter.
o Verynoisy.
o Large &heavy.
o Cannot printgraphics.
o Only prints predefined set ofcharacters.
7. . EXPALAIN NON -IMPACT PRINTERS.
INK-JET PRINTER:
It’s non-impactprinter.
It’s a characterprinter.
Forms characters and all kinds of images by spraying drops of ink on tothe
paper.
Print head contains 64 tinynozzles.
To print a character the printer the printer selectively heats the appropriateset
of nozzle as the print head moveshorizontally.
Inkjet printer can either colour ormonochrome.
Capable to print 30 to 400 characters perminutes.
ADVANTAGES:
o High qualityoutput.
o Silent during theoperation.
o Able to printgraphics.
o Able to print any characters &graphics.
o Able to generate colour& monochromeoutput.
DISADVANTAGES:
o Slower than dot matrixprinter.
o Cannot make carbon copy of printout.
Expensive than impactprinter.
LASERPRINTER:
It’s non-impactprinter.
It’s a pageprinter.
Three main components laser beam, a multi-sided mirror, aphotoconductive
drum &toner.
To print page laser beam is focused on drum by spinning multisidedmirror.
Drum is electriccharged.
Toner which is composed of oppositely charged ink particles, stick to thedrum.
Then toner focused on the paper with heat & pressure to generateoutput.
Low speed laser printer can print 4 to 12 page per minute while high speedlaser
printer Capable to print 500 to 1000 pages perminutes.
ADVANTAGES:
o High qualityoutput.
o Very faster inspeed.
o Silent during theoperation.
o Able to printgraphics.
o Able to print any characters &graphics.
o Able to generate colour& monochromeoutput.
DISADVANTAGES:
o Veryexpensive.
o Cannot make carbon copy of printout.
Drum plotter:
In the case design has to be made is placed over adrum.
It consist one or more than penholders which are mounted to the drumsurface.
The drum plotter both the paper and the penmove.
The paper is contained on two rollers and passes over adrum.
The pen is driven along fixed arm set across the length of thedrum.
It is especially useful for plotting continuous linegraph.
The accuracy of the drum type depends on the paper transport mechanism,
which in turn is dependent on the width of the paper and it can alsoproduce
largerdrawings.
Flatbed Plotter
The Flatbed Plotter is generally more expensive and can produce verydetailed
and accuratedrawings.
The paper is mounted on a stationaryflatbed.
32
The pen is mounted on a moveablearm.
Colour drawing can be produced by some plotters through interchangeable
pens.
Able to draw output in small size as A4 size or can able to generate verylarge
size can be up to 20ft by50ft.
Specially used in the design of cars, ships, aircrafts, buildings, highwaysetc.
ADVANTAGES:
Performance is faster than single-coreprocessors.
Able to divide information for processing by multipleunits.
Core processor uses slightly less power than two coupled single-coreprocessors
Multi-core chips also allow higher performance at lowerenergy.
CORE 2DUO
Core 2 Duo is the name given by Intel to its second batch of dual coreprocessors.
Desktop PCs with the Intel® Core™2 processor family deliver fasterperformance,
greater energy efficiency, and more responsivemultitasking.
Intel’s dual core processors were simply 2 Pentium 3 processors thatwere
fabricated in a singlechip.
Astheyrefinedtheirproductmore,theydecidedtodifferentiatetheirsecondset of
processors from the Core Duo and decided to call it Core 2Duo.
The difference between dual core processors and the Core 2 Duo processorsis
just in the semantics as Core 2 Duo is simply a name given to a more recent
family of dual coreprocessors.
If we translate this to the single core processors, we can say that Core Duois
Pentium 1 while Core 2 Duo is Pentium 2. But all these are still single core
processors.
We can therefore say that Core 2 Duo is simply a subset of all the dualcore
processors that are out in the markettoday.
SRAM:
Static Random Access Memory is also a volatilememory.
Once data is written into the chip, it is maintained as long as power is suppliedto
it; it does not needrefreshing.
However, SRAM is slower than DRAM and it is also moreexpensive.
ROM
The complete name of ROM is read onlymemory.
The data stored permanently & can’t be altered by theprogrammer.
Data stored in RAM chip can be read & used but cannot bechanged.
This memory also known a field storage permanent storage or deadstorage.
It is basically used to store manufacturer programmed & userprogram.
Most of the basic operations are carried out by electronic circuits whichare
known as microprograms.
These programs are stored in ROM. For ex. System BootLoader.
PROM
Programmable Read Only Memory is a non-volatile memory which allowsthe
user to program the chip with a PROMwriter.
The chip can be programmed once, thereafter, it cannot bealtered.
EPROM &EEPROM
Erasable Programmable Read Only Memory and Electrically Erasable
Programmable Read Only Memory chips can be electricallyprogrammed.
Unlike ROM and PROM chips, EPROM chips can be erased andreprogrammed.
3. .
EXPLAINFOLLOWING PORTS
SERIAL PORT
Known as asynchronous port or RS-232-Cport.
This type of port is sends & receives data using only twoline.
Therefore this type of port is ideal for connection to the phone circuitswhich
uses 2 datalines.
The communication process of data transfer isslower.
Due to this reason it is not used forprinter.
It has high signal travellingcapacity.
PARALLEL PORT
Known as centronics or printerport.
It’s a type of socket found on personal computer for connecting various typesof
computerdevices.
Normally it is reserved forprinter.
They carry 8 bits at the same time so that communication becomes veryfaster.
Due to the faster data communication capability it is used in input &output
devices.
The signal travel capacity is less than serialport.
USB PORT
It’s a new interface technology which are used to connect computerperipherals
such as keyboard, mouse, scanner, joysticks, printer, web cameraetc.
USB operate at two speeds 1.5 mbps & 12mbps.
The speed is depending upon the devices which are attached with theport.
For example the devices such as mouse, keyboard Use the law band while digital
camera use high speedchannel/
Main advantage is that when devices are attached the appropriate driversare
loadedautomatically.
PS/2 PORT
Developed by IBM for connecting mouse or keyboard toPC.
It supports the plug that contains 6pins.
Also called mouseport.
Parallel Cabl e
On many legacy peripherals, the parallel cable utilized both the 25 pin Sub-D
connector and the 36 pin Centronicsconnector.
This was a common printer interface and is still in service in greatnumbers.
With the advent of "intelligent" laser and ink jet printers, the IEEE-1284bi-
directional printer cable wasintroduced.
This parallel interface allows for bi-directional communication resulting inspeeds
up to 10 times faster than conventionalcables.
USB Cable
Advantages:
Large or unlimited storagecapacity.
Lowcost.
Light weight and compact insize.
Copying of data is easy andfast.
Possible to erase older data n store newdata.
Disadvantages:
Cannot be accessed directly because it’s a Sequential accessdevice.
Must be located in dust free environment otherwise it causeerrors.
Data are stored in coded form so cannot interpret or verifydirectly.
storage capacity of disk =number of recording surface * number of track per surface *
number of sector per tracks * number of bytes per sectors
TRACK
Two common types of magnetic disks are usedwidely.
o Floppydisks
o Harddisks
Advantages:
Cheap incost.
Convenient offline storage for small computerusers.
Disadvantages;
Low storagecapacity.
A floppy disk drive device is required to use read/writedata.
It’s a high capacity, removable magnetic disk which can be read or write byZIP
drive.
It is similar to floppy disk except that much faster & largercapacity.
Zip disks are available in two size namely 100 megabytes & 250megabytes.
Advantages:
Easy touse and carry
Large capacity than floppydisk.
Faster than floppydisk
Disadvantages:
Expensive
Data transfer between drive & computer isslow.
ConvertingDecimalToOctal
In conversion from decimal to any other number system, the steps tobe
followedare:
o Divide the decimal number by the base of the8.
Example:
The decimal number is224
8 224 0
8 28 4
8 3 3
110 6
111 7
Converting from Binary to Octal
The binary number must be divided into groups of three from the octalpoint
– to the right in case of the fractional portion and to the left in case of the
integer portion. Each group can then be replaced with their octal equivalent.
Example
Binary101010101010100
101 010 101 010 100
5 2 5 2 4
So, 52524 is the Octal equivalent of binary101010101010100
ConvertingOctaltoBinary
Each octal digit is replaced with the appropriate ‘triple’ of binarydigits.
e.g. 65
6 5
110 101
The binary equivalent of the Octal number 65 is110101
Hexadecimal Number System (Base16)
There is another commonly used positional system, hexadecimalsystem.
The hexadecimal system has a base of 16, so the value increases from left to
right as 1, 16, 256, 65536,. . ..
We need to keep a simple table in mind before we attempt anyconversion
from hexadecimal orvice-versa.
ConvertingDecimalToHexaDecimal
In conversion from decimal to any other number system, the steps tobe
followedare:
o Divide the decimal number by the base of16.
Example:
The decimal number is370
16 370 2
16 23 7
16 1 1
0
The hexadecimal number of 370 is172
ConvertingHexadecimalToDecimal
The hexadecimal number 172
= (1*162) + (7*161) + (2*160)
= (1*256) + (7*16) + (2*1)
= 256+112+2
= 370
The decimal number of 172 is370
ConvertingBinarytoHexadecimal
Each hexadecimal digit is represented by 4 binarydigits.
BinaryHexadecimal
0000 0
0001 1
0010 2
0011 3
0100 4
0101 5
0110 6
0111 7
1000 8
1001 9
1010 A
1011 B
1100 C
1101 D
1110 E
1111 F
To convert a binary number to its hexadecimal equivalent we split the
quantity into groups of four onwards, asbefore.
Each of this group of four is directly converted into theirhexadecimal
equivalent.
We may add zeros to the left of the number ifnecessary.
example
Binary 10101011000010
0010 1010 1100 0010
2 A C 2
So, the hexadecimal equivalent of binary 10101011000010 will be2AC2
ConvertingHexadecimaltoBinary
The conversion from hexadecimal to binary consists of writing off thebinary
Eq 100000 0100 0001 0010 1100
uiv 1 9 0 1 A 0 4 1 2 C
ale Thus the required binary number can be
nt
writtenas:
of
eac 110010000000110100000010000010010
h 1100
he
xad
eciConvertingHexadecimaltoOctal
ma Write 4 digit binary numbers for eachhexadecimal.
l Arrange the entire number sequence into group of 3 bitsection.
dig If any bit is missing add 0 on leftmostsection.
it Now write down octal equivalent of each 3 bitsection.
in
Example:
gro
ups The hexadecimal
of number is2A35. 2
fou A 35
r. 0010 1010 0011 0101
e 000010 101000 110 101
. 0 2 5 0 6 5
g
The octal number is25065
.
HeConvertingOctaltoHexadecimal
xad Write 3 digit binary number for eachoctal.
eci Arrange the entire number sequence into group of 4 bitsection.
ma If any bit is missing add 0 on leftmostsection.
l Now write down hexadecimal equivalent of each 4 bitsection.
19
Example:
01
A0 The octal
41 number
2C is25065. 2 5 0
00 65
01 010 101 000 110 101
10 00101010 00110101
01
2 A 3 5
00
00
00
01
10Binary Arithmetic
Addition
All the arithmetic operations are possible in binary numbering systemlike
addition, subtraction, multiplication and division All the Arithmetic
operations are done in binary number system are explained asunder:
For binary addition the following rules of binary addition are tobe
considered:
o0 + 0 =0
o0 + 1 =1
o1 + 0 =1
o 1 + 1 = 0 (carry 1 to the next column to theleft)
o 1 + 1 + 1 = 1 (carry 1 to the nextcolumn)
e.g. 1 Add two binary numbers 11011 and111
Carry 1 1 11
10111
+ 1 11
1 0 0 0 1 0 (Answer)
Subtraction
Though there are other methods of performing subtraction, we willconsider
the method of subtraction know as complementarysubtraction.
This is a more efficient method of subtraction while using electroniccircuits.
We will be following three steps to performsubtraction:
o Find the complement of the number you aresubtracting.
o To the complement of the number we obtained in step 1, we addthe
number we are subtractingfrom.
o If there is a carry of 1 add the carry to the result of the addition elsere
complement the sum and attach a negativesign.
How do we find the complement of a binary number ? We have to invertall
the bits. e.g. NumberComplement
1000110101110010
0010101011010101
Consider the following example ofsubtraction:
e.g. 1
1010101 – 1001100
Step-1. Find the complement of1001100
0110011
Step-2. Add the number you are subtractingfrom
Carry 1 1 1 0 1 11
1 0 1 0 1 01
+ 0 1 1 0 0 11
0 0 0 1 0 00
+ 1 (Continue since there is a carry of 1)
0 0 0 1 0 0 1 (Answer)
e.g. 2
101100 – 11100101
Step-1. Find the complement of11100101
00011010
Step-2. Add the number you are subtractingfrom
Carry 0 1 11
0 0 1 0 1 1 00
+ 0 0 0 1 1 0 10
0 1 0 0 0 1 10
Step-3. Since there is no carry we are complement theresult
10111001
attach a negative sign
- 10111001 (Answer)
Multiplication
Multiplication
Multiplication in binary follows the same rules that are followed inthe
decimal system. The table to be rememberedis:
0 x 0 =0
0 x 1 =0
1 x 0 =0
1 x 1 =1
e.g.
1010 * 1001
1010
x1001
1010
0000
0000
1010
101101 0
The answer is(1011010)
Division
Table for binary division is given asunder:
0 / 1 =1
1 / 1 =1
The steps for binary divisionare:
o Start from the left of thedividend.
o Perform subtraction in which the divisor is subtracted fromthe
dividend
o If subtraction is possible put a 1 in the quotient and subtract thedivisor
from the corresponding digits of the dividend else put a 0 in the
quotient
o Bring down the next digit to the right of theremainder.
o Execute step 2 till there are no more digits left to strating downfrom
thedividend.
e.g.
100001 / 110
0101 (quotient)
110 100001
110
1000
110
100
110
1001
110
11 (reminder)
Unit Of Information (Codes)
Most computers do not represent characters as pure binarynumbers.
They use a coded version of true binary to represent letters and specialsymbols
as well as decimalnumbers.
Coding of characters has been standardized to enable transfer of data between
computers.
Codes usedare:
- BCD
- ASCII
- EBCDIC
BCD
BCD stands for Binary CodedDecimal.
BCD code is one of the early computercodes.
It is based on the idea of converting each digit of a decimal number into its
binary equivalent rather than converting the entire decimal into binaryform.
All decimal digits are represented in BCD by 4bit.
Each decimal digit is independently converted into a 4 bit binary number &so
the conversion process is veryeasy.
4 bit BCD can be used to represents only decimal numbers because 4 bitsare
insufficient to represent variouscharacters.
By using 4 bit BCD only 16 possible characters arerepresented.
So the BCD code was extended from 6-bit code and it is possible to represent64
characters.
ASCII
UNICODE
With the onset of globalization through Internet, there emerged a need to
Cater for data interchange of the more common languages of thedifferent
nationalities like Chinese, Korea andJapanese.
ASCII, EBCDIC and other forms of representation provedinsufficient.
The Unicode/ISO 10646 standard was devised to overcome thisproblem.
The 16 bits used by Unicode can represent 65536 symbols, one extra parity bit
for parity check, which is more than enough to represent all the worldswritten
characters.
Although Unicode solves the problem of multi-language data representation, it is
not the perfect solution as there remain issues to beaddressed.
Problems include the wastage of storage space, time needed fordata
transmission and the lack of support of current operatingsystems.
Furthermore, Unicode does not guarantee a particular sortorder.
Parity Check
LANGUAGES
The 1st part is the operation code which tells the computer what function tobe
performed.
The 2nd part is the operand which tells the computer where to find & storedata
to bemanipulated.
So each instruction tells the computer what operation to perform & the length&
location of the data field which are involved in theoperation.
Advantages
Programs can be executed immediately upon completion because it doesn’t
require anytranslation.
Now extra storage space isneeded.
Programmer has complete control over the performance of thehardware.
Disadvantage
Tedious toprogram
Difficult toprogram
Difficult tomodify
Time consuming tocode
Errorprone
Operation codes have to bememorised
Assignment of memory is done byprogrammer
Time consuming fordevelopment
Programs development are machinedependent
Preparation of programs was slow andcostly.
Compiler
Compiler is a special program (translator) which translates high levelprograms
into machinecodes.
Advantages:
Machineindependent.
Easier to learn, use andunderstand.
Easier to correcterror.
Easier tomaintain.
Less time &efforts.
Easilyrelocatable.
Program preparation cost islow.
Few errors.
Disadvantages:
Lessflexible.
Lowerefficiency.
Require more time & storagespace.
4. .SHORT NOTE: ASSEMBLER
A computer can directly execute only machine language programs so the
assembly language program must be converted into its equivalentmachine
language program before can beexecuted.
This translation is done with the help of a translator program which is knownas
assembler.
Assembler is a special program (translator) which translates symbolic operation
codes into machine codes, and symbolic address is addressed into an actual
machineaddress.
Y LANGUAGE
PROGRAM
A
S
S
E
M
B
L
Input R MACHINE
ASSE
outpu LANGUAGE
MBLE t PROGRAM
(SourceProgram) ONE TOONECORRESPONDENCE (ObjectProgram)
As shown in figure that the input to assembler is the assembly language program
(source program) and the output is the machine language program (object
program).
Assembler translates each assembly language instruction intoequivalent
machine languageinstruction.
There is one to one correspondence between the assembly language instructions
of source program & the machine language instruction of its equivalent object
program.
In case of assembly language program the computer not only has to runthe
program but also must first run assembler program to translate the original
assembly language program into machine languageprogram.
So the computer has to spend more time in getting desiredanswer.
As shown in figure that the input to compiler is the high level languageprogram
(source program) and the output is the machine language program (object
program).
High level language instructions are macroinstructions.
The compiler translates each high level language instruction into set ofmachine
language instructions rather than a single machine languageinstruction.
There is one to many correspondence between high level languageinstructions
of source program into equivalent objectprogram.
During the translation the source program is only translates notexecuted.
A compiler can translates only those source programs which have written inthe
language for which compiler isdesigned.
A compiler can also detect & indicates the syntax errors during thecompilation
process butcannot able to detect logicalerrors.
Aninterpreterisanothertypeoftranslatorwhichisusedfortranslatingprogram
written using high levellanguages.
It takes one statement of high level language, translates into machinelanguage
& immediately executesthe resulting machine languageinstructions.
The main difference between compiler & interpreter is that compilercan
translates the entire code but not involve inexecution.
FUNCTION OF OPERATINGSYSTEM
1) PROCESSMANAGEMENT
o The process management of OS taking care about the creation &deletion
of user & system process, providing mechanism for process
synchronization & processcommunication.
2) MEMORYMANAGEMENT
o The memory management of OS taking care about the allocation
&deallocation of memory space to the various programs in need
ofthis resource.
3) FILEMANAGEMENT
o The file management of OS is taking care about the file relatedactivities
such as creation, storing, retrieving, naming, sharing & organization of
files.
4) SECURITY
o The security model of OS protects the resources & information ofa
computer system against destruction & unauthorizedaccess.
5) COMMANDINTERPRETATION
o This model taking care of interpreting user commands & directingthe
system resources to handle therequests.
As data are transcribed into machine readable form before submitting for
processing, the speed of processing is therefore determined by the computerand
not by theoperator.
Payroll processing is suitable for batch processing as it is only performed on a
regular basis. ( for example everymonth)
ADVANTAGES:
Lesscomplicated.
After input process is over, while processing is going on, user can attendother
jobs.
DISADVANTAGES:
Long turnaroundtime.
Access to one is notpossible.
Difficult to provide priorityscheduling.
Not convenient for programdevelopment.
Advantages
Error messages areimmediate
Source documents are available at the time the erroroccurs.
Faster than on-linesystems.
Disadvantages
Direct access devices have to beused.
Elaborate controls and backup procedures to guard against unwarrantedaccess
to thesystem.
Control checks are difficult since updating occurs at the time ofprocessing.
10 . EXPLAIN TIME SHARING OPERATING SYSTEM
Time-sharing is a mechanism that allows the many users to use a computer
system in such a way that each user is given the impression that they usetheir
ownsystem.
It has many user terminals simultaneously connected to the samecomputer.
Using these terminals multiple users can simultaneously work on thesystem.
The multiprogramming feature allows multiple programs tosimultaneously
reside in thememory.
The special scheduling algorithm used in a time-sharingsystem.
In this very short period of CPU time allocates to each userprocess.
When the CPU is allocated to user process, the process will use CPU untilthe
allocate time slice is expires or the execution process is over during thistime
period.
Features:
o The processing time is divided among various programs in timeslices.
o Each program is given control of CPU only for time slice turn byturn.
Advantages:
o Reduce CPU idletime
o Provides advantages of quick responsetime.
o Offers good computing facility to smallusers.
11.MULTIPROGRAMMINGOPERATING SYSTEM
Multiprogramming is the name given to the interleaved execution of twoor
more different & independent programs by the same computer.
In this more than one program in main memory at a sametime.
In multiprogramming operating system two or more programs are resides in the
main memory and it execute themconcurrently.
In this operating system the CPU can allocate time to several programs insteadof
remaining idle when one program is busy with I/O operations the another
program is ready to utilize theCPU.
ADVANTAGES:
Many programs can runsimultaneously.
Time is notwasted.
Maximum use ofresources.
DISADVANTAGES:
Required largememory.
Required memoryprotection.
Job of resources management & memory managementincreases.
ADVANTAGES:
It improves the performance ofcomputer.
Less turnaroundtime.
In case of failure of one CPU other can take over without anyloss.
DISADVANTAGES:
Large main memoryrequired.
Expensive
Design of the system makes time consumingprocess.
13 . EXPLAIN TYPES OF SOFTWAREPACKAGES
The software is set of programs, procedure and associated documentswhich
describe the programs and how they areused.
On the base of task performed by software it can be divided in followingtasks.
WORD PROCESSING SOFTWARE:
o It enables you to make use of computer system for creating, editing, and
viewing, formatting, storing, retrieving & printingdocuments.
SPREAD SHEETSOFTWARE:
o Spreadsheet software is a numeric data analysis tool, which allows usto
create kinds of computerisedledger.
o Provides a predefined sheet which contains rows andcolumns.
DATABASESOFTWARE
o A database is a collection of related data stored & treated as a unitfor
information retrievalpurpose.
o Database software is a set of one or more programs which enables usto
create a database, maintain it, and organizeit.
GRAPHICSSOFTWARE:
o Graphic software enables you to use a computer system forcreating,
editing, viewing, storing, retrieving and printing designs, drawings,
pictures,graphs.
PERSONAL ASSITANCESOFTWARE:
o It allows you to use personal computers for storing & retrievingyour
personal information & planning & managing schedules, contacts,
inventory & importantitems.
PRESENTATIONSOFTWARE:
o It allows you to provide the tools which help you to develop apresentation
on specificsubject.
ANIMATION/VIDEO/SOUNDPACKAGE:
o Provides the different kinds of application that allows you to generate
animation, watching or creating videos, playing or producing sounddata.
Introduction
Emerging technologies are contemporary advances and innovation invarious
fields oftechnology.
Various converging technologies have emerged in the technologicalconvergence
of different systems evolving towards similargoals.
Convergence can refer to previously separate technologies such as voice(and
telephony features), data (and productivity applications) and video that now
share resources and interact with each other, creating newefficiencies.
Emerging technologies are those technical innovations which represent
progressive developments within a field for competitiveadvantage
COMPONENTS OF GIS
There are 5 types components of a GIS like
o Hardware
o Software
o Data
o People
o Method
GPS APPLICATIONS:
o Navigation
o Agriculture
o SpaceShuttle
o Tourism
o Air TrafficControl
o Surveying andmapping
o Remotesensing
o military
STANDARD OFCDMA:
There are number of standards that employs CDMA for instance, IS-95A,IS-
95B,CDMA-1etc.
CDMA-1 describes a complete wirelesssystem.
It represents the end-to-end wireless system and all the necessaryspecifications
that administer itsoperation.
CDMA provides a collection of related services including fixed wired,wireless
local loop and cellular within the personal communication servicesfamily
ADVANTAGES:
Provides good quality & low powerconsumption
Avoidinterceptions.
Require fewer cell sites thanGSM
This technology provides good resistance to fadingproblems.
4. GSM
GSM stands for Global System For Mobilecommunication.
GSM is the most popular standard for mobile phones in theworld.
Its promoter, the GSM association, estimates that 80% of the global mobile
market uses thestandard.
GSM is used by over 3 billion people across more than 212countries.
Its ubiquity makes international roaming very common between mobile phone
operators, enabling subscribers to use their phones in many parts of theworld.
GSM differs from its predecessors in both signalling& speech channels aredigital
& thus it is considered as 2G mobile phonesystem.
The GSM standard has been an advantage to the both consumers andalso
networkoperators.
GSM pioneered a low cost alternative to voice calls, the short message
service(SMS) which is now supported on other mobile standard aswell.
Another advantage of GSM is that the standard includes oneworldwide
emergency telephone number,112.
This makes it easier for international travellers to connect to emergencyservices
without knowing the local emergencynumbers.
There are 5 different cell sizes in a GSM network: macro, micro, pico, femtoand
umbrellacells.
The coverage area of each cell varies according to theimplementation
environment.
5. NOTE ONFOLLOWINGCOMMUNICATION DEVICES:
MODEM
Converting digital signal into analog is called modulation and the reverseprocess
that is converting analog signal into digital signals is calleddemodulation.
The word “MODEM” comes from the termmodulation-demodulation
Computer can store & transmit data digitally while our telephone linescan
transmit data in analogsignals.
When an analog facility is used for data communication between twodigital
devices, two modems are required, one near each digitaldevice.
The analog signal is transmitted through the telephone line which isconverted
into digital bymodem.
To connect a computer network that are at distant location by usingtelephone
line then modems must be used at both ends to do the modulation &
demodulations.
The modem is an essential piece of hardware for any application in whichtwo
digital devices want to communicate over an analog transmissionchannel.
Different capacity modems are available according to different data transfer
rate.
INFRARED
Infrared are widely used for short-rangecommunications.
Distance is about to only 1 metersrange.
Remote controls used on television, VCRs and stereos all used in infrared
communications.
They are directional, cheap and easy to build but do not pass through solid
objects.
Infrared is used for indoor wirelessLANs.
Two types of infrared givenbelow:
o Point topoint
Point to point systems requires direct alignment betweendevices.
Many laptop systems and PDAS use point-to-pointtransmission.
o Broadcast
Broadcast infrared transmissions use a spreadsignal.
One broadcast in all directions instead of a directbeam.
This help to reduce the problems of proper alignment&
obstructions.
It allows multiple receivers of asignal.
BLUETOOTH
Bluetooth is the technology using short range radio links, intended to replacethe
cables connecting portable/fixed electronicdevices.
By using Bluetooth the users can have all mobile and fixed computer devicescan
be totallycoordinated.
The standard defines a uniform structure for a wide range of devicesto
communicate with each other and minimal userefforts.
This technology offers wireless access to LANs, PSTN, the mobile phonenetwork
and theinternet.
Bluetooth technology use license-free 2.4GHz frequencyband.
You can connect wireless device up to 10meter.
The main advantage of Bluetooth is it can able to simultaneously handleboth
data & voicetransmissions.
Bluetooth is a radio based wireless technology which allows devices toshare
information over a maximum range of 10meters.
It enables computers, phones and the other peripherals to communicatewith
one another withoutcables.
Provides more security, flexibility and less powerconsumptions.
ADVANTAGES:
Less powerconsumptions.
Enhances user’sexperience.
Voice conferencing & video clips on cell phone ispossible.
Connect devices without usingcable.
WI -FI
Wi-Fi stands for wirelessfidelity.
It is used to define any of the wireless technology in the IEEE802.11.
It is useful to get internetaccess.
It’s a wireless way to handlenetworking.
It is also known as 802.11 networking or wirelessnetworking.
It provides the facility to connect computers anywhere in your homeoffice
without need of physicalconnection.
Wi-Fi allows connecting the computers within up to 100 feetarea.
Wi-Fi network uses radio technologies called IEEE 802.11 which providesfast,
secure & reliable wirelessconnectivity.
Wi-Fi setup contains one or more access points & one or moreclients.
The Wi-Fi standard leaves connection criteria & roaming totally open tothe
client.
Wi-Fi transmit in the air, it has some properties as a non-switched wired
Ethernet network therefore collisions canoccur.
Wi-Fi cannot do collisiondetection.
Wi-Fi network can be used to connect computer to each other to the internet&
wirednetworks.
Wi-Fi networks operate in the unlicensed 2.4 and 5 GHZ radiobands.
ADVANTAGES:
Allows LANs to be deployed withoutcabling.
Allows you to connect any place within up to 100feetarea.
Contains one more access points and connect with one or moreclients.
Wi-Fi products are widely available inmarket.
DISADVANTAGES:
Limitedrange.
Power consumption is higher thanBluetooth.
Wi-Fi devices do not have channels to avoidinterference.
A computer virus is a program that can copy itself & infect a computerwithout
permission or knowledge of theuser.
It’s a small piece of software that damages the realprograms.
A virus can only spread from one computer to another when it host is taken to
the uninfected computer by internet or removable medium such as CD orUSB.
In computers virus is a program that replicates to another program,computer
boot sector ordocument.
Virus can be transmitted as attachments to an e-mail or downloaded file orbe
present onCD.
The virus is classified in main fivetypes.
FILEINFECTORS
o It infects programfiles.
o Normally infect executable files such as .COM or .EXTfiles.
o Some virus can infect any program when the program is requested for
execution such as .SYS, .OVL, .PRG and .MNUfiles.
o Many of this virus are memoryresident.
BOOT SECTORVIRUS
o This virus infects executable code found in certain system areas on adisk.
o They attached to the DOS boot sector or the master boot record on hard
disks.
o Boot sector virus attaches themselves to the boot record informationand
activate when user attempt to start up formdisk.
o This virus are always memoryresident.
MULTI-PARTITEVIRUSES:
o Known aspolypartite.
o They infect both boot records and programfiles.
o This virus is difficult torepair.
o If the boot area is cleaned, but the files are not than boot areainfected
again.
MACROVIRUSES:
o These are the most common virus and they tend to do the leastdamage.
o These types of virus infect data files such as it can infect yourword
document and insert unwanted words orphrases.
o Ex. W97M,Melissa
STEALTHVIRUSES:
o These viruses use certain techniques to avoiddetection.
o They may either redirect disk head to read another sector instead ofthe
one which they are reside or alter the reading of infectedfiles.
7. PROTECTION FROMVIRUS.
You can protect system against virus with a few simplesteps.
o Write protected your floppy when suing them on the othercomputer.
o Remove floppy whilebooting.
o Install software from original write- protecteddisks.
o Use secure operating system likeUNIX
o Do not install piratedsoftware.
o Scans files downloaded from theinternet.
o Scan your system regularly if you continue usinginternet.
o Use good antivirus program to scan removable devices as well assystem.
o Do not open attachments who contains an executablefiles.
o Do not open spam or junkmails
o Prepare a reuse disk with critical system files. Probably it shouldbootable.