History of Comps
History of Comps
1. Abacus
Abacus was invented by the Chinese around 4000 years ago. Its a wooden
rack with metal rods with beads attached to them. The abacus operator moves
the beads according to certain guidelines to complete arithmetic
computations.
2. Napiers Bone
3. Pascaline
5. Difference Engine
In the early 1820s, Charles Babbage created the Difference Engine. It was a
mechanical computer that could do basic computations. It was a steam-
powered calculating machine used to solve numerical tables such as
logarithmic tables.
6. Analytical Engine
7. Tabulating machine
9. Mark I
By the last part of the 19th century, the word was also used to describe
machines that did calculations. The modern-day use of the word is generally
to describe programmable digital devices that run on electricity.
Then more than a century later in the history of computers, we got our first
electronic computer for general purpose. It was the ENIAC, which stands
for Electronic Numerical Integrator and Computer. The inventors of this
computer were John W. Mauchly and J.Presper Eckert.
And with times the technology developed and the computers got smaller and
the processing got faster. We got our first laptop in 1981 and it was
introduced by Adam Osborne and EPSON.
It is believed that the Analytical Engine was the first computer which was invented
by Charles Babbage in 1837. It used punch cards as read-only memory. Charles
Babbage is also known as the father of the computer.
The basic parts without which a computer cannot work are as follows:
1. Micro Computer
1. Micro Computer:
It is a single-user computer which has less speed and storage capacity than the
other types. It uses a microprocessor as a CPU. The first microcomputer was built
with 8-bit microprocessor chips. The common examples of microcomputers include
laptops, desktop computers, personal digital assistant (PDA), tablets, and
smartphones. Microcomputers are generally designed and developed for general
usage like browsing, searching for information, internet, MS Office, social media,
etc.
2. Mini Computer:
Mini-computers are also known as "Midrange Computers." They are not designed
for a single. They are multi-user computers designed to support multiple users
simultaneously. So, they are generally used by small businesses and firms.
Individual departments of a company use these computers for specific purposes.
For example, the admission department of a University can use a Mini-computer
for monitoring the admission process.
3. Mainframe Computer:
It is also a multi-user computer capable of supporting thousands of users
simultaneously. They are used by large firms and government organizations to run
their business operations as they can store and process large amounts of data. For
example, Banks, universities, and insurance companies use mainframe computers
to store the data of their customers, students, and policyholders, respectively.
4. Super Computer:
Super-computers are the fastest and most expensive computers among all types of
computers. They have huge storage capacities and computing speeds and thus
can perform millions of instructions per second. The super-computers are task-
specific and thus used for specialized applications such as large-scale numerical
5. Work stations:
It is a single-user computer. Although it is like a personal computer, it has a more
powerful microprocessor and a higher-quality monitor than a microcomputer. In
terms of storage capacity and speed, it comes between a personal computer and
minicomputer. Work stations are generally used for specialized applications such
as desktop publishing, software development, and engineering designs.
The computer has become a part of our life. There are plenty of things that we do
in a day are dependent on a computer. Some of the common examples are as
follows:
1. ATM: While withdrawing cash from an ATM, you are using a computer that enables
the ATM to take instructions and dispense cash accordingly.
2. Digital currency: A computer keeps a record of your transactions and balance in
your account and the money deposited in your account in a bank is stored as a
digital record or digital currency.
3. Trading: Stock markets use computers for day to day trading. There are many
advanced algorithms based on computers that handle trading without involving
humans.
4. Smartphone: The smartphone that we use throughout the day for calling, texting,
browsing is itself a computer.
5. VoIP: All voice over IP communication (VoIP) is handled and done by computers.
History of Computers
The first counting device was used by the primitive people. They used sticks,
stones and bones as counting tools. As human mind and technology improved with
time more computing devices were developed. Some of the popular computing
devices starting with the first to recent ones are described below;
Abacus
The history of computer begins with the birth of abacus which is believed to be the
first computer. It is said that Chinese invented Abacus around 4,000 years ago.
It was a wooden rack which has metal rods with beads mounted on them. The
beads were moved by the abacus operator according to some rules to perform
Napier's Bones
It was a manually-operated calculating device which was invented by John Napier
(1550-1617) of Merchiston. In this calculating tool, he used 9 different ivory strips
or bones marked with numbers to multiply and divide. So, the tool became known
as "Napier's Bones. It was also the first machine to use the decimal point.
Pascal invented this machine to help his father, a tax accountant. It could only
perform addition and subtraction. It was a wooden box with a series of gears and
Tabulating Machine
It was invented in 1890, by Herman Hollerith, an American statistician. It was a
mechanical tabulator based on punch cards. It could tabulate statistics and record
or sort data or information. This machine was used in the 1890 U.S. Census.
Hollerith also started the Hollerith?s Tabulating Machine Company which later
became International Business Machine (IBM) in 1924.
In each new generation, the circuits became smaller and more advanced than the
previous generation circuits. The miniaturization helped increase the speed,
memory and power of computers. There are five generations of computers which
are described below;
In this generation, magnetic cores were used as the primary memory and
magnetic disc and tapes were used as the secondary storage. Assembly language
and programming languages like COBOL and FORTRAN, and Batch processing and
multiprogramming operating systems were used in these computers.
o IBM 1620
o IBM 7094
o CDC 1604
o CDC 3600
o UNIVAC 1108
o IBM-360 series
o Honeywell-6000 series
o PDP(Personal Data Processor)
o DEC 10
o STAR 1000
o PDP 11
o CRAY-1(Super Computer)
o CRAY-X-MP(Super Computer)
o Desktop
o Laptop
o NoteBook
o UltraBook
o ChromeBook
o Analogue Computer
o Digital Computer
o Hybrid Computer
1) Analogue Computer
Analogue computers are designed to process analogue data. Analogue data is
continuous data that changes continuously and cannot have discrete values. We
can say that analogue computers are used where we don't need exact values
always such as speed, temperature, pressure and current.
Analogue computers directly accept the data from the measuring device without
first converting it into numbers and codes. They measure the continuous changes
in physical quantity and generally render output as a reading on a dial or
scale. Speedometer and mercury thermometer are examples of analogue
computers.
2) Digital Computer
Digital computer is designed to perform calculations and logical operations at high
speed. It accepts the raw data as input in the form of digits or binary numbers (0
and 1) and processes it with programs stored in its memory to produce the output.
All modern computers like laptops, desktops including smartphones that we use at
home or office are digital computers.
1) Supercomputer
Supercomputers are the biggest and fastest computers. They are designed to
process huge amount of data. A supercomputer can process trillions of instructions
in a second. It has thousands of interconnected processors.
2) Mainframe computer
Mainframe computers are designed to support hundreds or thousands of users
simultaneously. They can support multiple programs at the same time. It means
they can execute different processes simultaneously. These features of mainframe
computers make them ideal for big organizations like banking and telecom sectors,
which need to manage and process high volume of data.
3) Miniframe or Minicomputer
It is a midsize multiprocessing computer. It consists of two or more processors and
can support 4 to 200 users at one time. Miniframe computers are used in institutes
and departments for tasks such as billing, accounting and inventory management.
A minicomputer lies between the mainframe and microcomputer as it is smaller
than mainframe but larger than a microcomputer.
Applications of minicomputers:
4) Workstation
Workstation is a single user computer that is designed for technical or scientific
applications. It has a faster microprocessor, a large amount of RAM and high speed
graphic adapters. It generally performs a specific job with great expertise;
accordingly, they are of different types such as graphics workstation, music
workstation and engineering design workstation.
Any computer that has the following five features, can be termed as a workstation
or can be used as a workstation.
5) Microcomputer
Microcomputer is also known as a personal computer. It is a general-purpose
computer that is designed for individual use. It has a microprocessor as a central
processing unit, memory, storage area, input unit and output unit. Laptops and
desktop computers are examples of microcomputers. They are suitable for
personal work that may be making an assignment, watching a movie, or at office
for office work.
Characteristics of a microcomputer:
o It is the smallest in size among all types of computers.
o A limited number of software can be used.
o It is designed for personal work and applications. Only one user can work at a time.
o It is less expansive and easy to use.
o It does not require the user to have special skills or training to use it.
o Generally, comes with single semiconductor chip.
o It is capable of multitasking such as printing, scanning, browsing, watching videos,
etc.
Computer Components
There are 5 main computer components that are given below:
Llllllllllllllllllllll
2) Storing: The computer has primary memory and secondary storage to store
data and instructions. It stores the data before sending it to CPU for processing and
also stores the processed data before displaying it as output.
3) Processing: It is the process of converting the raw data into useful information.
This process is performed by the CPU of the computer. It takes the raw data from
storage, processes it and then sends back the processed data to storage.
Input Devices
Input device enables the user to send data, information, or control signals to a
computer. The Central Processing Unit (CPU) of a computer receives the input and
processes it to produce the output.
1. Keyboard
2. Mouse
3. Scanner
4. Joystick
5. Light Pen
6. Digitizer
7. Microphone
11. Paddle
16. Remote
18. VR
19. Webcam
1) Keyboard
The keyboard
Is a basic input device that is used to enter data into a computer or any other electronic device by pressing keys.
It has different sets of keys for letters, numbers, characters, and functions. Keyboards are connected to a
computer through USB
Its name is derived from the first six letters that appear on the top left row of the
keyboard. The Q and W keys in AZERTY keyboard are interchanged with A and Z
keys in QWERTY keyboard. Furthermore, in AZERTY keyboard M key is located to
the left of the L key.
AZERTY keyboard differs from QWERTY keyboard not only in the placement of
letters but also in many other ways, e.g., it gives emphasis on accents, which is
required for writing European languages like French.
2) Mouse
The mouse is a hand-held input device which is used to move cursor or pointer
across the screen. It is designed to be used on a flat surface and generally has left
and right button and a scroll wheel between them. Laptop computers come with a
touchpad that works as a mouse. It lets you control the movement of cursor or
pointer by moving your finger over the touchpad. Some mouse comes with
integrated features such as extra buttons to perform different buttons.
The mouse was invented by Douglas C. Engelbart in 1963. Early mouse had a roller
ball integrated as a movement sensor underneath the device. Modern mouse
devices come with optical technology that controls cursor movements by a visible
or invisible light beam. A mouse is connected to a computer through different ports
depending on the type of computer and type of a mouse.
It has a system of a ball and several rollers to track its movement. It is a corded
type of mouse. A mechanical mouse can be used for high performance. The
drawback is that they tend to get dust into the mechanics and thus require regular
cleaning.
As the name suggests, this type of mouse lacks cable and uses wireless
technology such as IrDA (infrared) or radio (Bluetooth or Wi-Fi) to control the
movement of the cursor. It is used to improve the experience of using a mouse. It
uses batteries for its power supply.
Types of Scanner:
i) Flatbed Scanner:
It has a glass pane and a moving optical CIS or CCD array. The light illuminates the
pane, and then the image is placed on the glass pane. The light moves across the
glass pane and scans the document and thus produces its digital copy. You will
need a transparency adapter while scanning transparent slides.
the
In this scanner, the document is inserted into the slot provided in the scanner. The
main components of this scanner include the sheet-feeder, scanning module, and
calibration sheet. The light does not move in this scanner. Instead, the document
moves through the scanner. It is suitable for scanning single page documents, not
for thick objects like books, magazines, etc.
v) Photo Scanner:
It is designed to scan photographs. It has high resolution and color depth, which
are required for scanning photographs. Some photo scanners come with in-built
software for cleaning and restoring old photographs.
A joystick is also a pointing input device like a mouse. It is made up of a stick with
a spherical base. The base is fitted in a socket that allows free movement of the
stick. The movement of stick controls the cursor or pointer on the screen.
The frist joystick was invented by C. B. Mirick at the U.S. Naval Research
Laboratory. A joystick can be of different types such as displacement joysticks,
finger-operated joysticks, hand operated, isometric joystick, and more. In joystick,
the cursor keeps moving in the direction of the joystick unless it is upright,
whereas, in mouse, the cursor moves only when the mouse moves.
A light pen is a computer input device that looks like a pen. The tip of the light pen
contains a light-sensitive detector that enables the user to point to or select
objects on the display screen. Its light sensitive tip detects the object location and
sends the corresponding signals to the CPU
screens, so it is not in use today. It also helps you draw on the screen if needed. The first light pen was invented
around 1955 as a part of the Whirlwind project at the Massachusetts Institute of Technology (MIT).
Digitizer is a computer input device that has a flat surface and usually comes with
a stylus. It enables the user to draw images and graphics using the stylus as we
draw on paper with a pencil. The images or graphics drawn on the digitizer appear
on the computer monitor or display screen. The software converts the touch inputs
into lines and can also convert handwritten text to typewritten words.
It can be used to capture handwritten signatures and data or images from taped
papers. Furthermore, it is also used to receive information in the form of drawings
and send output to a CAD (Computer-aided design) application and software
like AutoCAD
. Thus, it allows you to convert hand-drawn images into a format suitable for computer processing.
The microphone is a computer input device that is used to input the sound. It
receives the sound vibrations and converts them into audio signals or sends to a
recording medium. The audio signals are converted into digital data and stored in
the computer. The microphone also enables the user to telecommunicate with
others. It is also used to add sound to presentations and with webcams for video
conferencing. A microphone can capture audio waves in different ways;
accordingly the three most common types are described below:
i) Dynamic:
It is the most commonly used microphone with a simple design. It has a magnet
which is wrapped by a metal coil and a thin sheet on the front end of the magnet.
ii) Condenser:
It is designed for audio recording and has a very sensitive and flat frequency
response. It has a front plate called diaphragm and a back plate parallel to the
front plate. When sound hits the diaphragm, it vibrates the diaphragm and alters
the distance between the two plates. The changes in distance are transmitted as
electric signals.
iii) Ribbon:
MICR computer input device is designed to read the text printed with magnetic ink.
MICR is a character recognition technology that makes use of special magnetized
ink which is sensitive to magnetic fields. It is widely used in banks to process the
cheques and other organizations where security is a major concern. It can process
three hundred cheques in a minute with hundred-percent accuracy. The details on
the bottom of the cheque (MICR No.) are written with magnetic ink. A laser printer
with MICR toner can be used to print the magnetic ink.
The device reads the details and sends to a computer for processing. A document
printed in magnetic ink is required to pass through a machine which magnetizes
the ink, and the magnetic information is then translated into characters.
It processes and copies the physical form of a document using a scanner. After
copying the documents, the OCR software converts the documents into a two-color
(black and white), version called bitmap. Then it is analyzed for light and dark
areas, where the dark areas are selected as characters, and the light area is
identified as background. It is widely used to convert hard copy legal or historic
documents into PDFs. The converted documents can be edited if required like we
edit documents created in ms word.
It is a digital device as it captures images and records videos digitally and then
stores them on a memory card. It is provided with an image sensor chip to capture
images, as opposed to film used by traditional cameras. Besides this, a camera
that is connected to your computer can also be called a digital camera.
It has photosensors to record light that enters the camera through the lens. When
the light strikes the photosensors, each of the sensors returns the electrical
current, which is used to create the images.
11) Paddle:
It is a simple input device that is widely used in games. It is a wheel that is held by
hand and looks like a volume knob on a stereo that is used to increase or decrease
It is used as an input device in racing video games such as car racing games or in
driving programs as virtual simulators to steer a vehicle. It works like the real
steering wheel by allowing you to take a right or left turn. A steering wheel may be
provided with acceleration and brake pedal devices and a mechanism for shifting
gears. Thus, it makes racing games more adventurous and entertaining.
As the name suggests, it is a pointing input device that is designed to point at and
shoot the targets on the screen in a video game, or arcade, etc. The light gun was
used for the first time on the MIT Whirwind computer. When the gun is pointed at
the target on the screen and the trigger is pulled, the screen goes blank for a
fraction of a second. During this moment, the photodiode, which is present in the
barrel, determines where the gun is pointed. For example, shooting ducks in a
duck hunt game.
15) Touchpad:
16) Remote:
It is a hardware device
designed to control the functioning of a device, e.g., a TV remote that can be used to change channels, increase
or decrease the volume, from a distance without leaving the seat. The first cordless TV remote was invented by
Dr. Robert Adler of Zenith in 1956. The remote sends the electromagnetic waves to communicate with the
device. These waves can be infrared rays, radio waves, etc.
The concept of the touch screen was first introduced and published by E.A. Johnson
in 1965. The first touch screen was developed at the beginning of the 1970s by
CERN engineers Frank Beck and Bent Stumpe.
18) VR:
and can be displayed on the screen if required. Although it works almost the same as the digital camera, it is
different from a digital camera, as it is designed to take compact digital photos that can be uploaded easily on
the webpages and shared with others through the internet.
refers to a process in which a person is identified through his or her biological features such as fingerprints, eye
cornea, face structure, etc. It is done by using biometric devices, which can be of different types based on their
scanning features and abilities, such as:
i) Face Scanner:
It scans the retina or iris of a person's eye to confirm the identity. This device is
more secure than others as it is next to impossible to copy the retina or iris. It
In this scan, a beam of low-energy infrared light falls on the retina through the
scanner's eyepiece. Then, the software captures the network of blood vessels in
the retina and uses it to verify a person's identity.
v) Voice Scanner:
It records the voice of a person and digitizes it to create a distinctive voice print or
template. The voiceprints are stored in the database, and are used to verify the
voice of a person to confirm his or her identity. The person is required to speak in
the normal or same voice that was used to create a voice template. It is not much
reliable as it can be misused using a tape recording.
Output Devices
The output device displays the result of the processing of raw data that is entered
in the computer through an input device. There are a number of output devices
that display output in different ways such as text, images, hard copies, and audio
or video.
1. Monitor
o CRT Monitor
o LCD Monitor
o LED Monitor
1) Monitor
The monitor is the display unit or screen of the computer. It is the main output
device that displays the processed data or information as text, images, audio or
video.
CRT monitors are based on the cathode ray tubes. They are like vacuum tubes
which produce images in the form of video signals. Cathode rays tube produces a
beam of electrons through electron guns that strike on the inner phosphorescent
surface of the screen to produce images on the screen. The monitor contains
millions of phosphorus dots of red, green and blue color. These dots start to glow
when struck by electron beams and this phenomenon is called
cathodoluminescence.
The main components of a CRT monitor include the electron gun assembly,
deflection plate assembly, fluorescent screen, glass envelope, and base.The front
(outer surface) of the screen onto which images are produced is called the face
plate. It is made up of fiber optics.
There are three electron beams that strike the screen: red, green, and blue. So,
the colors which you see on the screen are the blends of red, blue and green
lights.The magnetic field guides the beams of electrons. Although LCDs have
replaced the CRT monitors, the CRT monitors are still used by graphics
professionals because of their color quality.
The LCD monitor is a flat panel screen that is compact and light-weight as
compared to CRT monitors. It is based on liquid crystal display technology which is
used in the screens of laptops, tablets, smart phones, etc. An LCD screen
comprises two layers of polarized glass with a liquid crystal solution between them.
When the light passes through the first layer, an electric current aligns the liquids
crystals. The aligned liquid crystals allow a varying level of light to pass through
the second layer to create images on the screen.
The LCD screen has a matrix of pixels that display the image on the screen.Old
LCDs had passive-matrix screens in which individual pixels are controlled by
sending a charge. A few electrical charges could be sent each second that made
screens appear blurry when the images moved quickly on the screen.
Modern LCDs use active-matrix technology and contain thin film transistors (TFTs)
with capacitors. This technology allows pixels to retain their charge. So, they don?t
make screen blurry when images move fast on the screen as well as are more
efficient than passive-matrix displays.
The LED monitor is an improved version of an LCD monitor. It also has a flat panel
display and uses liquid crystal display technology like the LCD monitors. The
difference between them lies in the source of light to backlight the display. The
LED monitor has many LED panels, and each panel has several LEDsto backlight
the display, whereas the LCD monitors use cold cathode fluorescent light to
backlight the display. Modern electronic devices such as mobile phones, LED TVs,
laptop and computer screens, etc., use a LED display as it not only produces more
brilliance and greater light intensity but also consumes less power.
The plasma monitor is also a flat panel display that is based on plasma display
technology. It has small tiny cells between two glass panels. These cells contain
mixtures of noble gases and a small amount of mercury. When voltage is applied,
the gas in the cells turns into a plasma and emits ultraviolet light that creates
images on the screen, i.e., the screen is illuminated by a tiny bit of plasma, a
charged gas. Plasma displays are brighter than liquid crystal displays (LCD) and
also offer a wide viewing angle than an LCD.
2) Printer
A printer produces hard copies of the processed data. It enables the user, to print
images, text or any other information onto the paper.
Based on the printing mechanism, the printers are of two types: Impact Printers
and Non-impact Printers.
Impact Printer
The impact printer uses a hammer or print head to print the character or images
onto the paper. The hammer or print head strikes or presses an ink ribbon against
the paper to print characters and images.
A. Character Printers
B. Line printers
A) Character Printers
Character printer prints a single character at a time or with a single stroke of the
print head or hammer. It does not print one line at a time. Dot Matrix printer and
Daisy Wheel printer are character printers. Today, these printers are not in much
use due to their low speed and because only the text can be printed. The character
printers are of two types, which are as follows:
Daisy Wheel Printer was invented by David S. Lee at Diablo Data Systems.It
consists of a wheel or disk that has spokes or extensions and looks like a daisy, so
it is named Daisy Wheel printer. At the end of extensions, molded metal characters
are mounted. To print a character the printer rotates the wheel, and when the
desired character is on the print location the hammer hits disk and the extension
hits the ink ribbon against the paper to create the impression. It cannot be used to
print graphics and is often noisy and slow, i.e., the speed is very low around 25-50
characters per second. Due to these drawbacks,these printers have become
obsolete.
B) Line Printers:
Line printer, which is also as a bar printer, prints one line at a time. It is a high-
speed impact printer as it can print 500 to 3000 lines per minute. Drum printer and
chain printer are examples of line printers.
i) Drum Printer:
The chain rotates at a very high speed and when the desired character comes at
the print location, the corresponding hammer strikes the page against the ribbon
and character on the chain.They can type 500 to 3000 lines per minute. They are
also noisy due to the hammering action.
Non-Impact Printer:
Non-impact printers don't print characters or images by striking a print head or
hammer on the ink ribbon placed against the paper. They print characters and
images without direct physical contact between the paper and the printing
machinery. These printers can print a complete page at a time, so they are also
known as page printers. The common types of non-impact printers are Laser
printer and Inkjet printer:
A laser printer is a non-impact printer that uses a laser beam to print the
characters. The laser beam hits the drum, which is a photoreceptor and draws the
image on the drum by altering electrical charges on the drum. The drum then rolls
in toner, and the charged image on the drum picks the toner. The toner is then
printed on the paper using heat and pressure. Once the document is printed, the
drum loses the electric charge,and the remaining toner is collected. The laser
printers use powdered toner for printing instead of liquid ink and produce quality
print objects with a resolution of 600 dots per inch (dpi) or more.
The inkjet printer is a non-impact printer that prints images and characters by
spraying fine,ionized drops of ink. The print head has tiny nozzles to spray the ink.
The printer head moves back and forth and sprays ionized drops of ink on the
paper, which is fed through the printer. These drops pass through an electric field
that guides the ink onto the paper to print correct images and characters.
3) Projector
A projector is an output device that enables the user to project the output onto a
large surface such as a big screen or wall. It can be connected to a computer and
similar devices to project their output onto a screen. It uses light and lenses to
produce magnified texts, images, and videos. So, it is an ideal output device to
give presentations or to teach a large number of people.
Modern projects (digital projectors) come with multiple input sources such as HDMI
ports for newer equipment and VGA ports that support older devices. Some
projectors are designed to support Wi-Fi and Bluetooth as well. They can be fixed
onto the ceiling, placed on a stand, and more and are frequently used for
classroom teaching, giving presentations, home cinemas, etc.
Liquid Crystal Display (LCD) digital projector: This type of digital projectors
are very popular as they are lightweight and provide crisp output. An LCD projector
uses transmissive technology to produce output. It allows the light source, which is
a standard lamp, to pass through the three colored liquid crystal light panels.
Some colors pass through the panels and some are blocked by the panels and thus
images are on the screen.
Control Unit: It is the circuitry in the control unit, which makes use of electrical
signals to instruct the computer system for executing already stored instructions. It
ALU: It is the arithmetic logic unit, which performs arithmetic and logical functions.
Arithmetic functions include addition, subtraction, multiplication division, and
comparisons. Logical functions mainly include selecting, comparing, and merging
the data. A CPU may contain more than one ALU. Furthermore, ALUs can be used
for maintaining timers that help run the computer.
Types of CPU:
CPUs are mostly manufactured by Intel and AMD, each of which manufactures its
own types of CPUs. In modern times, there are lots of CPU types in the market.
Some of the basic types of CPUs are described below:
Single Core CPU: Single Core is the oldest type of computer CPU, which was used
in the 1970s. It has only one core to process different operations. It can start only
one operation at a time; the CPU switches back and forth between different sets of
data streams when more than one program runs. So, it is not suitable for
multitasking as the performance will be reduced if more than one application runs.
The performance of these CPUs is mainly dependent on the clock speed. It is still
used in various devices, such as smartphones.
Dual Core CPU: As the name suggests, Dual Core CPU contains two cores in a
single Integrated Circuit (IC). Although each core has its own controller and cache,
they are linked together to work as a single unit and thus can perform faster than
the single-core processors and can handle multitasking more efficiently than Single
Core processors.
Quad Core CPU uses a technology that allows four independent processing units
(cores) to run in parallel on a single chip. Thus by integrating multiple cores in a
single CPU, higher performance can be generated without boosting the clock
speed. However, the performance increases only when the computer's software
supports multiprocessing. The software which supports multiprocessing divides the
processing load between multiple processors instead of using one processor at a
time.
History of CPU:
Some of the important events in the development of CPU since its
invention till date are as follows:
o In 1823, Baron Jons Jackob Berzelius discovered silicon that is the main component
of CPU till date.
o In 1903, Nikola Tesla got gates or switches patented, which are electrical logic
circuits.
o In December 1947, John Bardeen, William Shockley, and Walter Brattain invented
the first transistor at the Bell Laboratories and got it patented in 1948.
o In 1958, the first working integrated circuit was developed by Robert Noyce and
Jack Kilby.
o In 1960, IBM established the first mass-production facility for transistors in New
York.
o In 1968, Robert Noyce and Gordon Moore founded Intel Corporation.
o AMD (Advanced Micro Devices) was founded in May 1969.
o In 1971, Intel introduced the first microprocessor, the Intel 4004, with the help of
Ted Hoff.
o In 1972, Intel introduced the 8008 processor; in 1976, Intel 8086 was introduced,
and in June 1979, Intel 8088 was released.
Hardware
Hardware, which is abbreviated as HW, refers to all physical components of a
computer system, including the devices connected to it. You cannot create a
computer or use software without using hardware. The screen on which you are
reading this information is also a hardware.
1) Motherboard:
The motherboard is generally a thin circuit board that holds together almost all
parts of a computer except input and output devices. All crucial hardware like CPU,
memory, hard drive, and ports for input and output devices are located on the
motherboard. It is the biggest circuit board in a computer chassis.
There can be different types of motherboards based on the type and size of the
computers. So, a specific motherboard can work only with specific types of
processors and memory.
Components of a Motherboard:
CPU Slot: It is provided to install the CPU. It is a link between a microprocessor
and a motherboard. It facilitates the use of CPU and prevents the damage when it
is installed or removed. Furthermore, it is provided with a lock to prevent CPU
movement and a heat sink to dissipate the extra heat.
Expansion Slot: It is also called the bus slot or expansion port. It is a connection
or port on the motherboard, which provides an installation point to connect a
hardware expansion card, for example, you can purchase a video expansion card
and install it into the expansion slot and then can install a new video card in the
computer. Some of the common expansion slots in a computer are AGP, AMR, CNR,
PCI, etc.
USB Port: It allows you to connect hardware devices like mouse, keyboard to your
computer.
PCI Slot: It stands for Peripheral Component Interconnect slot. It allows you to
connect the PCI devices like modems, network hardware, sound, and video cards.
AGP Slot: It stands for Accelerated Graphics Port. It provides the slot to connect
graphics cards.
Heat Sink: It absorbs and disperses the heat generated in the computer
processor.
2) Monitor:
A monitor is the display unit of a computer on which the processed data, such as
text, images, etc., is displayed. It comprises a screen circuity and the case which
encloses this circuity. The monitor is also known as a visual display unit (VDU).
Types of Monitors:
1. CRT Monitor: It has cathode ray tubes which produce images in the form of video
signals. Its main components are electron gun assembly, deflection plate assembly,
glass envelope, fluorescent screen, and base.
2. LCD Monitor: It is a flat panel screen. It uses liquid crystal display technology to
produce images on the screen. Advanced LEDs have thin-film transistors with
capacitors and use active-matrix technology, which allows pixels to retain their
charge.
3) Keyboard:
It is the most important input device of a computer. It is designed to allow you
input text, characters, and other commands into a computer, desktop, tablet, etc.
It comes with different sets of keys to enter numbers, characters, and perform
various other functions like copy, paste, delete, enter, etc.
Types of Keyboards:
1. QWERTY Keyboards
2. AZERTY Keyboards
3. DVORAK Keyboards
4) Mouse:
It is a small handheld device designed to control or move the pointer (computer
screen's cursor) in a GUI (graphical user interface). It allows you to point to or
select objects on a computer's display screen. It is generally placed on a flat
surface as we need to move it smoothly to control the pointer. Types of Mouse:
Trackball mouse, Mechanical Mouse, Optical Mouse, Wireless Mouse, etc.
Parts of a mouse:
o Two buttons: A mouse is provided with two buttons for right click and left click.
o Scroll Wheel: A wheel located between the right and left buttons, which is used to
scroll up and down and Zoom in and Zoom out in some applications like AutoCAD.
o Battery: A battery is required in a wireless mouse.
o Motion Detection Assembly: A mouse can have a trackball or an optical sensor
to provide signals to the computer about the motion and location of the mouse.
Software
Software, which is abbreviated as SW or S/W, is a set of programs that enables the
hardware to perform a specific task. All the programs that run the computer are
software. The software can be of three types: system software, application
software, and programming software.
1) System Software
The system software is the main software that runs the computer. When you turn on the computer, it activates
the hardware and controls and coordinates their functioning. The application programs are also controlled by
system software. An operating system is an example of system software.
i) Operating System:
An operating system is the system software that works as an interface to enable
the user to communicate with the computer. It manages and coordinates the
functioning of hardware and software of the computer. The commonly used
operating systems are Microsoft Windows, Linux
o BIOS: It stands for basic input output system. It is a type of system software, which
is stored in Read Only Memory (ROM) located on the motherboard. However, in
advanced computer systems, it is stored in flash memory. BIOS is the first software
that gets activated when you turn on your computer system. It loads the drivers of
the hard disk into memory as well as assists the operating system to load itself into
the memory.
o Boot Program: Boot refers to starting up a computer. When you switch on the
computer, the commands in the ROM are executed automatically to load the boot
program into memory and execute its instructions. The BIOS program has a basic
set of commands that enables the computer to perform the basic input/output
instructions to start the computer.
o An assembler: It plays the role of a converter as it receives basic computer
instructions and converts them into a pattern of bits. The processor uses these bits
to perform basic operations.
o A device driver: This system software controls hardware devices connected to a
computer. It enables the computer to use the hardware by providing an appropriate
interface. The kernel of a Computer's CPU communicates with different hardware
through this software. Operating systems generally come with most of the device
drivers. If the operating system does not have a device driver for hardware, you
have to install the device driver before using that hardware device.
2) Application Software:
Application software is a set of programs designed to perform a specific task. It
does not control the working of a computer as it is designed for end-users. A
computer can run without application software. Application software can be easily
installed or uninstalled as required. It can be a single program or a collection of
small programs. Microsoft Office Suite, Adobe Photoshop, and any other software
like payroll software or income tax software are application software. As we know,
they are designed to perform specific tasks. Accordingly, they can be of different
types such as:
3) Programming Software:
It is a set or collection of tools that help developers in writing other software or
programs. It assists them in creating, debugging, and maintaining software or
programs or applications. We can say that these are facilitator software that helps
translate programming language such as Java
, C++
, Python
, etc., into machine language code. So, it is not used by end-users. For example, compilers, linkers, debuggers,
interpreters, text editors, etc. This software is also called a programming tool or software development tool.
Operating System
as it provides a standard user interface that you see on your computer screen after you switch on your
computer. For example, the Windows and the Mac OS are also operating systems that provide a graphical
interface with icons and pictures to enable users to access multiple files and applications simultaneously.
The interaction between a user and the computer does not occur in this system.
The user is required to prepare jobs on punch cards in the form of batches and
submit them to the computer operator. The computer operator sorts the jobs or
programs and keeps similar programs or jobs in the same batch and run as a group
to speed up processing. It is designed to execute one job at a time. Jobs are
processed on a first-come, first-serve basis, i.e., in the order of their submission
without any human intervention.
For example, the credit card bill generated by banks is an example of batch
processing. A separate bill is not generated for each credit card purchase, rather a
single bill that includes all purchases in a month is generated through batch
processing. The bill details are collected and held as a batch, and then it is
processed to generate the bill at the end of the billing cycle. Similarly, in a payroll
system, the salaries of employees of the company are calculated and generated
through the batch processing system at the end of each month.
o You need to train the computer operators for using the batch system.
o It is not easy to debug this system.
o If any error occurs in one job, the other jobs may have to wait for an uncertain time.
Each user gets the processor's time as they get while using a single system. The
duration of time allocated to a task is called quantum or time slice; when this
duration is over, OS starts the next task.
and advanced communication technology have made it possible to design, develop, and use the distributed
operating system. Besides this, it is an extension of a network operating system that supports a high level of
communication and integration of machines on the network.
o Its performance is higher than a single system as resources are being shared.
o If one system stops working, malfunctions, or breaks down, other nodes are not
affected.
o Additional resources can be added easily.
o Shared access to resources like printer can be established.
o Delay in processing is reduced to a greater extent.
o Data sharing or exchange speed is high, owing to the use of electronic mail.
connects computers and devices to a local area network and manages network resources. The software in a NOS
enables the devices of the network to share resources and communicate with each other. It runs on a server and
allows shared access to printers, files, applications, files, and other networking resources and functions over a
LAN. Besides this, all users in the network are aware of each other's underlying configuration and individual
connections. Examples: Ms Windows Server 2003 and 2008, Linux
o The servers are centralized that can be accessed remotely from distant locations
and different systems.
These are used for the applications where timing is critical or response time is a
major factor; even a delay of a fraction of the second can result in a disaster. For
example, airbags and automatic parachutes that open instantly in case of an
accident. Besides this, these systems lack virtual memory.
These are used for application where timing or response time is less critical. Here,
the failure to meet the deadline may result in a degraded performance instead of a
disaster. For example, video surveillance (cctv), video player, virtual reality, etc.
Here, the deadlines are not critical for every task every time.
o The output is more and quick owing to the maximum utilization of devices and
system
o Task shifting is very quick, e.g., 3 microseconds, due to which it seems that several
tasks are executed simultaneously
o Gives more importance to the currently running applications than the queued
application
o It can be used in embedded systems like in transport and others.
o It is free of errors.
o Memory is allocated appropriately.
It was the time before the Second World War when the digital computer was not
developed, and there were calculating engines with mechanical relays at this point
in time. Later mechanical relays were replaced by vacuum tubes as they were very
slow. But, the performance issue was not resolved even with vacuum tubes,
besides these machines were too bulky and large as there were made of tens of
thousands of vacuum tubes.
These systems were designed for numerical calculations. The programmer was
required to sign up for a block of time and then insert his plug board into the
computer. In the 1950s, punch cards were introduced, which improved the
computer performance. It allowed programmers to write programs on punch cards
and read them into the system; the rest of the procedure was the same.
This generation started with the introduction of transistors in the mid-1950s. The
use of transistors made the computers more reliable, and they began to be sold to
customers. These machines were called mainframes. Only the big organization and
government corporations could afford it. In this machine, the programmer was
required to write the program on a paper then punch it on cards. The card would
be taken to the input room and handed over to an operator to get the output. The
printer provides the output which was taken to the output room. These steps made
it a time-consuming task. So, the batch system was adopted to address this issue.
In a batch system, the tasks were collected in a tray in the form of batches in the
input room and read onto a magnetic tape, which was taken to the machine room,
where it was mounted on a tape drive. Then using a special program, the operator
was to read the first task or job from the tape and run it, and the output was
generated onto a second tape. OS automatically read the next job from the tape,
and Jobs were completed one by one. After the completion of the batch, the input
and output tapes were taken off, and the next batch was started. The printouts
were taken from the output tape. It was mainly used for engineering and scientific
calculations. The first OS was used in this generation in computers was called FMS
(Fortran Monitor System), and IBMSYS, and FORTRAN were used as a high-level
language.
This generation began with the introduction of 360 family of computers of IBM
in 1964. In this generation, transistors were replaced by silicon chips, and the operating system was developed
for multiprogramming, some of them even supported batch processing, time sharing, real-time processing, at
the same time.
Computer Memory
The computer memory holds the data and instructions needed to process raw data
and produce output. The computer memory is divided into large number of small
parts known as cells. Each cell has a unique address which varies from 0 to
memory size minus one.
Computer memory is of two types: Volatile (RAM) and Non-volatile (ROM). The
secondary memory (hard disk) is referred as storage not memory.
o Register memory
o Cache memory
o Primary memory
o Secondary memory
Register Memory
Register memory is the smallest and fastest memory in a computer. It is not a part
of the main memory and is located in the CPU in the form of registers, which are
the smallest data holding elements. A register temporarily holds frequently used
data, instructions, and memory address that are to be used by CPU. They hold
Registers hold a small amount of data around 32 bits to 64 bits. The speed of a
CPU depends on the number and size (no. of bits) of registers that are built into the
CPU. Registers can be of different types based on their uses. Some of the widely
used Registers include Accumulator or AC, Data Register or DR, the Address
Register or AR, Program Counter (PC), I/O Address Register, and more.
Cache Memory
Cache memory is a high-speed memory, which is small in size but faster than the
main memory (RAM). The CPU can access it more quickly than the primary
Cache memory can only be accessed by CPU. It can be a reserved part of the main
memory or a storage device outside the CPU. It holds the data and programs which
are frequently used by the CPU. So, it makes sure that the data is instantly
available for CPU whenever the CPU needs this data. In other words, if the CPU
finds the required data or instructions in the cache memory, it doesn't need to
access the primary memory (RAM). Thus, by acting as a buffer between RAM and
CPU, it speeds up the system performance.
L3: It is known as Level 3 cache or L3 cache. This cache is not present in all the
processors; some high-end processors may have this type of cache. This cache is
used to enhance the performance of Level 1 and Level 2 cache. It is located
outside the CPU and is shared by all the cores of a CPU. Its memory size ranges
from 1 MB to 8 MB. Although it is slower than L1 and L2 cache, it is faster than
Random Access Memory (RAM).
If data is not available in any of the cache memories, it looks inside the Random
Access Memory (RAM). If RAM also does not have the data, then it will get that
data from the Hard Disk Drive.
So, when a computer is started for the first time, or an application is opened for
the first time, data is not available in cache memory or in RAM. In this case, the
CPU gets the data directly from the hard disk drive. Thereafter, when you start
your computer or open an application, CPU can get that data from cache memory
or RAM.
Primary Memory
Primary Memory is of two types: RAM and ROM.
Secondary Memory
The secondary storage devices which are built into the computer or connected to
the computer are known as a secondary memory of the computer. It is also known
as external memory or auxiliary storage.
1) Hard Disk:
It is a rigid magnetic disc that is used to store data. It permanently stores data and
is located within a drive unit.
SSD (Solid State Drive) is also a non-volatile storage medium that is used to hold
and access data. Unlike a hard drive, it does not have moving components, so it
offers many advantages over SSD, such as faster access time, noiseless operation,
less power consumption, and more.
As the cost of SSD has come down, it has become an ideal replacement for a
standard hard drive in desktop and laptop computers. It is also suitable for
notebooks, and tablets that don't require lots of storage.
3) Pen drive:
Pen drive is a compact secondary storage device. It is also known as a USB flash
drive, thumb drive or a jump drive. It connects to a computer via a USB port. It is
Pen drive does not have movable parts; it comprises an integrated circuit memory
chip that stores the data. This chip is housed inside a plastic or aluminium casing.
The data storage capacity of the pen drive generally ranges from 2 GB to 128 GB.
Furthermore, it is a plug and play device as you don't need additional drives,
software, or hardware to use it.
4) SD Card:
SD Card stands for Secure Digital Card. It is most often used in portable and mobile
devices such as smartphones and digital cameras. You can remove it from your
device and see the things stored in it using a computer with a card reader.
There are many memory chips inside the SD card that store the data; it does not
have moving parts. SD cards are not created equal, so they may differ from each
other in terms of speed, physical sizes, and capacity. For example, standard SD
cards, mini SD cards, and micro SD cards.
In the beginning, it was used for storing and playing sound recordings, later it was
used for various purposes such as for storing documents, audio files, videos, and
other data like software programs in a CD.
o A polycarbonate disc layer at the bottom has the data encoded by creating lands
and pits.
o The polycarbonate disc layer is coated with a thin aluminium layer that reflects the
laser.
o The reflective aluminium layer is coated with a lacquer layer to prevent oxidation in
order to protect the below layers. It is generally spin coated directly on the top of
the reflective layer.
o The label print is applied on the lacquer layer, or artwork is screen printed on the
top of the disc on the lacquer layer by offset printing or screen printing.
6) DVD:
DVD is short for digital versatile disc or digital video disc. It is a type of optical
media used for storing optical data. Although it has the same size as a CD, its
storage capacity is much more than a CD. So, it is widely used for storing and
viewing movies and to distribute software programs as they are too large to fit on
a CD. DVD was co-developed by Sony, Panasonic, Philips, and Toshiba in 1995.
Types of DVDs:
DVDs can be divided into three main categories which are as follows:
o DVD-ROM (Read-Only): These types of DVDs come with media already recorded
on them, such as movie dvds. As the name suggests, data on these discs cannot be
erased or added, so these discs are known as a read-only or non-writable DVD.
Memory Units
Memory units are used to measure and represent data. Some of the commonly
used memory units are:
1) Bit: The computer memory units start from bit. A bit is the smallest memory
unit to measure data stored in main memory and storage devices. A bit can have
only one binary value out of 0 and 1.
Computer Network
A network set up by connecting two or more computers and other supporting hardware devices through
communication channels is called a computer network. It enables computers to communicate with each
other and to share commands, data, etc., including the hardware and software resources.
A local area network may be a wired or wireless network or a combination of both. The devices in a
LAN are generally connected using an Ethernet cable, which offers an interface to connect multiple
devices like router, switches, and computers. For example, using a single router, few Ethernet cables,
and computers, you can create a LAN at your home, office, etc. In this network, one computer may act
as a server and other computers, which are part of the network, may serve as clients.
Topologies of LAN:
Topology: It refers to the arrangement of computers (nodes) in a computer network. The main
topologies of a local area network are as follows:
Ring Topology:
Star Topology:
In this topology, all the computers are separately connected to a central node or connection point, which
can be a server, a hub, a router, or a switch. This topology offers an advantage that if a cable does not
work, only the respective node will suffer, the rest of the nodes will work smoothly. All data or
messages that one node sends to another passes through the central hub.
This topology is easy to design and implement as well as it is easy to add additional nodes to the central
node. The major drawback of this topology is that it is prone to bottleneck or failure at the central
connection point, i.e., failure at the central node will affect the entire communication.
In this arrangement, the nodes (computers) are connected through interface connectors to a single
communication line (central cable) that carries the message in both the directions. The central cable to
which all the nodes are connected is the backbone of the network. It is called a bus. The signal in this
arrangement travels in both directions to all the machines until it finds the recipient machine. It is easy
to set up than other topologies as it uses only a single central cable to establish the network.
Benefits of LAN:
o It offers a higher operating speed than WAN and MAN.
o It is less expensive and easy to install and maintain.
o It perfectly fulfills the requirement of a specific organization, such as an office,
school, etc.
o It can be wired or wireless or a combination of both.
o It is more secure than other networks as it is a small set up that can be easily taken
care of.
MAN is a high-speed network that spreads over a large geographical area such as a metro city or town.
It is set up by connecting the local area networks using routers and local telephone exchange lines. It can
be operated by a private company, or it may be a service provided by a company such as a local
telephone company.
MAN is ideal for the people of a relatively large area who want to share data or information. It provides
fast communication via high-speed carriers or transmission media such as copper, fiber optics, and
microwaves. The commonly used protocols for MAN are X.25, Frame Relay, Asynchronous Transfer
Mode (ATM), xDSL (Digital Subscriber Line), ISDN (Integrated Services Digital Network), ADSL
(Asymmetrical Digital Subscriber Line), and more.
The area covered by MAN is larger than the LAN but smaller than a WAN. Its network ranges from 5 to
50 km. Furthermore, it also provides uplinks for connecting LANs to WANs and the internet. An
organization can use a MAN to connect all of its LANs located at its different offices across the city.
Advantages of MAN:
o Less Expensive: It is less expensive to set up a MAN and to connect it to a WAN.
o High Speed: The speed of data transfer is more than WAN.
o Local Emails: It can send local emails fast.
o Access to the Internet: It allows you to share your internet connection, and thus
multiple users can have access to high-speed internet.
o Easy to set up: You can easily set up a MAN by connecting multiple LANs.
o High Security: It is more secure than WAN.
WAN extends over a large geographical area. It is not confined within an office, school, city, or town
and is mainly set up by telephone lines, fiber optic, or satellite links. It is mostly used by big
organizations like banks and multinational companies to communicate with their branches and
customers across the world. Although it is structurally similar to MAN, it is different from MAN in
terms of its range, e.g., MAN covers up to 50 Kms, whereas WAM covers distances larger than 50 Km,
e.g., 1000km or more.
The computers are connected to the wide area network through public networks, such as telephone
systems, leased lines or satellites. The users of a WAN do not own the network as it is a large setup
connecting the remote computer systems. However, they are required to subscribe to a service provided
by a telecommunication provider to use this network.
Advantages of a WAN:
o Large Network Range: It spans a large geographical area of 2000 km or more,
e.g., from one country to another countries.
o Centralized data: It allows your different office branches to use your head office
server for retrieving and sharing data. Thus, you don?t need to buy email servers,
files server and back up servers, etc.
o Get updated files and data: It provides an ideal platform for companies who
need a live server for their employees to exchange updated files within seconds.
o High bandwidth: It offers high bandwidth than a normal broadband connection.
Thus, it can increase the productivity of your company by offering uninterrupted
data transfer and communication.
o Workload Distribution: It helps distribute your workload to other locations. You
can hire employees in different countries and assign them to work from your office.
Examples of WAN:
Internet
US defense department
Stock exchanges network
Railway reservation system
Big Banks' cash dispensers' network
Satellite systems
Computer Virus
Computer viruses are unwanted software programs or pieces of code that interfere
with the functioning of the computer. They spread through contaminated files,
data, and insecure networks. Once it enters your system, it can replicate to
There are many antiviruses, which are programs that can help you protect your
machine from viruses. It scans your system and cleans the viruses detected during
the scan. Some of the popular antiviruses include Avast, Quickheal, McAfee,
Kaspersky, etc.
Append Virus:
As the name suggests, this virus appends its malicious code to the end of the host
program's file. After that, it alters the file's header in a way that the file's header is
redirected to the start of the malicious code of the append virus. Thus, this code is
executed each time the program runs. However, it does not destroy the host
program; rather, it modifies it in a way that it holds the virus code and enables the
code to run itself.
Macro Virus
Macro virus alters or infects the macros of a document or data file. It is embedded
as a macro in a document and adds its codes to the macros of the document. The
virus spreads when infected documents or data files are opened in other
computers.
Boot Virus
Boot virus or boot sector virus alters the boot sector program stored in the hard
disk or any other storage device such as floppy disks. It replaces the boot sector
program with its own malicious version. It infects the computer only when it is
used to boot up the computer. If it enters after the boot-up process, it will not
infect the computer. For example, if someone forgets to remove the infected
floppy disk when the pc is turned off and then turns on this pc, it runs the infected
boot sector program during the booting process.
Usually, it enters into your system through corrupt media files, infected storage
devices, and insecure computer networks. The spread of this virus is very rare
these days due to the decline in the use of floppy disk and use of boot-sector
safeguards in the present-day operating systems.
Resident Virus
The resident virus stays permanently in the primary memory (RAM) of the
computer. When you start the computer, it becomes active and corrupts the files
and programs running on the computer.
Non-resident Virus:
Unlike the resident virus, the non-resident virus does not reside in the memory of a
computer. So, it is not executed from the computer's memory. For example,
executable viruses.
Multipartite Virus
Multipartite virus spreads and infects in multiple ways. It infects both the boot
sector and the executable files stored on the hard drive simultaneously. When you
turn on a computer, the boot sector virus is triggered as it latches on to the hard
drive, which has the data for starting up the computer. Once it is triggered, the
program files also get infected.
Computer Worm
Computer worm is similar to a virus but is technically different from the virus. It
can replicate and spread like a virus, but unlike viruses, it does not need a host
program to spread. Being able to self-replicate it can produce multiple copies of
itself. It spreads through networks such as an email sent to an infected email id
can infect your system with a computer worm.
Trojan Horse
Trojan horse is a malware like a virus or a worm, but it is technically different from
both. It can't replicate like virus and worm. Trojan horse hides itself in a program.
Once you install any such program, the trojan horse enters into your computer. It
can provide unauthorized access to your computer, send your files to other
computers, and may delete files or can make other unwanted changes in your
computer.
Cavity virus:
It is also known as a spacefiller virus. As the name suggests, this virus tends to
install itself by occupying the empty sections of a file. It is not easy to detect this
virus as it fills the empty spaces without changing the size of the file.
CMOS Virus:
It infects the CMOS, which stands for complementary metal-oxide semiconductor
and is a memory chip that contains the system configuration. This virus can erase
or reset the system configuration.
Companion Virus:
It resides itself in a file whose name is similar to another program file, which is
executed normally. When the program file is executed, the virus gets activated
Encrypted Virus:
It encrypts its payload to make its detection more difficult. It comprises two parts:
an encrypted virus body and a decryptor, which decrypts the virus when it is
executed. After decryption, the virus can execute itself in order to replicate and
become a resident. Furthermore, it is different from cryptolocker, which is a
computer virus that encrypts the hard drive data and holds it for ransom.
Executable Virus:
It is a non-resident computer virus, which resides in an executable file. Whenever
the infected file is executed, it infects the other files.
Polymorphic Virus:
It creates its thousands of copies itself; in each copy, it changes the sequence and
byte values to evade detection by antivirus software. Even the best antiviruses
may not be able to detect this virus. Polymorphic viruses affect data types and
functions and generally spread through spam, infected sites, and while using other
malware.
Rabbit Virus:
It is also known as wabbit, a fork bomb. It is capable of creating new processes,
and each of the new process further creates new processes. This process continues
until this virus utilizes all the available resources in the system and system falls
short of resources. It may cause the target system to slow down and crash. For
example, it is like an Infinite loop that repeatedly creates processes that consume
lots of CPU cycles and operating system resources.
Stealth Virus:
It is a hidden computer virus, which specifically attacks operating system
processes. It usually hides itself in partitions, files or boot sectors and is capable of
going unnoticed during antivirus or anti-malware scans, i.e., it can avoid detection
intentionally.
o Slow computer performance: The machine may work slowly, e.g., it will take
more time to open or shut down the computer or while opening a file, document,
computer application, etc. The operating system and internet speed may get slow.
o Frequent pop-ups: A virus may cause unusual frequent pop-ups on your window.
o Hard Drive issue: The hard drive may exhibit unusual high activity even when it is
not in use. It may cause unwanted changes to your hard drive and may freeze or
crash this device.
o Frequent crashes: One may experience frequent sudden system crashes while
playing games, watching videos, or doing some other work using the infected
system. A blue screen appears when it crashes.
o Unknown programs: Unwanted programs may open or start automatically when
you start your computer. You can see these programs in your computer's list of
active applications. Sometimes, the window shuts down unexpectedly without any
reason.
o Unusual activities: Your machine may perform differently, such as you may not
be able to log into your accounts, to delete the corrupt files, and Blue Screen of
Death (BSOD) may appear frequently, and more. Furthermore, the hardware,
software, or OS may start malfunctioning leading to crashing the system abruptly.
o Impaired security solutions: Sometimes, security measures taken by you, such
as antivirus may not work smoothly due to virus attack on your computer.
o Network issue: Sometimes, you experience high network activity even if you are
not connected to the internet and vice versa.
o Unnecessary advertisement: We often see advertisements while browsing, but if
you see them even when you are not browsing, it may indicate a virus on your
computer.
o Display problems: You may experience different colors in your display if your
computer is affected by a virus.
Number Systems
The language we use to communicate with each other is comprised of words and
characters. We understand numbers, characters and words. But this type of data is
not suitable for computers. Computers only understand the numbers.
So, when we enter data, the data is converted into electronic pulse. Each pulse is
identified as code and the code is converted into numeric format by ASCII. It gives
each number, character and symbol a numeric value (number) that a computer
understands. So to understand the language of computers, one must be familiar
with the number systems.
Internet
Internet is a global network that connects billions of computers across the world
with each other and to the World Wide Web. It uses standard internet protocol
suite (TCP/IP) to connect billions of computer users worldwide. It is set up by using
cables such as optical fibers and other wireless and networking technologies. At
Internet is different from the World Wide Web as the World Wide Web is a network
of computers and servers created by connecting them through the internet. So, the
internet is the backbone of the web as it provides the technical infrastructure to
establish the WWW and acts as a medium to transmit information from one
computer to another computer. It uses web browsers to display the information on
the client, which it fetches from web servers.
The internet works with the help of clients and servers. A device such as a laptop,
which is connected to the internet is called a client, not a server as it is not directly
connected to the internet. However, it is indirectly connected to the internet
through an Internet Service Provider (ISP) and is identified by an IP address, which
is a string of numbers. Just like you have an address for your home that uniquely
identifies your home, an IP address acts as the shipping address of your device.
The IP address is provided by your ISP, and you can see what IP address your ISP
has given to your system.
A server is a large computer that stores websites. It also has an IP address. A place
where a large number of servers are stored is called a data center. The server
accepts requests send by the client through a browser over a network (internet)
and responds accordingly.
For example, if you have a person's name, you can find his phone number in a
phone book by searching his name. The internet uses the DNS server in the same
way to find the IP address of the domain name. DNS servers are managed by ISPs
or similar organizations.
Now after understanding the basics, let us see how internet works?
Once the server gets the request to provide information about a particular website,
the data starts flowing. The data is transferred through the optical fiber cables in
digital format or in the form of light pulses. As the servers are placed at distant
places, the data may have to travel thousands of miles through optical fiber cable
to reach your computer.
The optical fiber is connected to a router, which converts the light signals into
electrical signals. These electrical signals are transmitted to your laptop using an
Ethernet cable. Thus, you receive the desired information through the internet,
which is actually a cable that connects you with the server.
Furthermore, if you are using wireless internet using wifi or mobile data, the
signals from the optical cable are first sent to a cell tower and from where it
reaches to your cell phone in the form of electromagnetic waves.
The data transfer is very fast on the internet. The moment you press enter you get
the information from a server located thousands of miles away from you. The
reason for this speed is that the data is sent in the binary form (0, 1), and these
zeros and ones are divided into small pieces called packets, which can be sent at
high speed.
The applications are required to enable users to work smoothly. They are the
computing tools that allow users to do their work, communicate, and coordinate
with each other and retrieve and store information.
Furthermore, the user who wants to access the intranet is required to have a
special network password and should be connected to the LAN. A user who is
working remotely can gain access to the intranet through a virtual private network
(VPN) that allows them to sign in to the intranet to access the information.
Disadvantages of Intranet:
o It may be costly to set up an Intranet due to hidden costs and complexity.
o If the firewall does not work properly or not installed, it can be hacked by someone
o High-security passwords are required, which cannot be guessed by outside users
o There is always a fear of losing control over the intranet
o Sometimes document duplication may happen which can cause confusion among
employees
Examples of Intranet:
Educational Intranet: It is generally found in a school, college, etc., For example,
a school intranet is intended to allow teaching staff to communicate with each
other and get information about upcoming updates such as exam dates, schools
functions, holidays, etc.
Real Estate Intranet: The intranet of a real estate company allows its sales team
to have access to all important brochures, templates, forms that they may need to
close a sale. Employees also remain up to date with important events like
meetings, training, sessions, etc. It can also be used to share motivational
messages with the team.
Health Care Intranet: In the healthcare sector, in big hospitals, the Intranet
helps health care professionals to work as a team to provide proper care and
treatment to their patients. Doctors can share reports, treatment procedures, bills
and claims can be settled easily without moving from one department to another
department.
IT Sector Intranet: In the IT sector three is always a lot of information that needs
to be shared with all the employees at one go. It may be related to a project that
needs to be completed within the given time frame, such as guidelines, terms and
conditions, and rules that are to be followed while working on a project.
It is a medium such as optical fiber cable that connects billions It is a small, private network as it b
of computers with each other to establish a worldwide network. to a specific organization.
It has billions of users as it is a public network with a worldwide It has limited users.
presence.
It offers a wide range of information, such as news, blogs, It offers limited information related
websites, etc. organization's work, policies, updat
Extranet
Extranet is a part of an organization's intranet. It is a communication network that
is based on internet protocols (TCP/IP). It provides controlled access to firm's
intranet to its trading partners, customers, and other businesses. So, it is a private
network that securely shares internal information and operations of a firm with
authorized people outside the firm without giving access to the company's entire
network. The users are required to have IDs, passwords, and other authentication
mechanisms to access this network.
Limitations of Extranet:
o Hosting: If you host extranet pages on your own server, it requires a high
bandwidth internet connection, which is may be very expensive.
o Security: You need extra firewall security if you host it on your own server. It
increases the workload and makes security mechanism very complex.
o Dependency: It is dependent on the internet as outsiders cannot access
information without using the internet.
o Less Interaction: It reduces the face to face interaction between customers,
business partners, vendors, etc., which results in poor relationship building.
It is a private network, which cannot It may not be called a private network, as it can be assesse
be accessed externally. externally. It provides limited access to authorized outside-
such as vendors, partners, etc.
It connects the employees of the It connects the company's employees with partners.
company.
Communication takes place only within External users such as suppliers, customers, and partners a
the organization that owns the allowed to be a part of intranet to get information, updates,
network. the organization.
A website is hosted on one or more servers and can be accessed by visiting its
homepage using a computer network
The first website was introduced on 6 August 1991. It was developed by Tim
Berners-Lee at CERN. As of January 2018, there were around 1.7 billion websites on
the internet.
browsing news, images, videos, and more. A website is the first thing that appears on the screen of your laptop
when you search for a product or service, or any other information online. So, it is very important to have a
2. Broder demographic reach: A website can help your business reach people
with diverse backgrounds throughout the world.
4. 24/7 availability: You can keep your products available for sale around the
clock through a website. Customers can buy anytime, and thus you can earn more
profits than a traditional storefront.
6. Build customer rapport: Online presence helps you build and maintain a
rapport among your customers. You can also introduce special offers or discounts
for your loyal customers.
7. Improves productivity: It saves your time as you don't need to explain your
products or services to each customer separately, as all the information is already
available on the website.
8. Educate your customers: You can educate people about the benefits of your
products and can show them how they are betters than the competitors' products.
9. Change location: You can move your business to another location without
affecting your sales as customers still can find you through your website.
10. Grow manpower: You can post job openings for vacant positions and allow
applicants to check job descriptions and apply online.
12. Improve customer service: It allows you to improve customer services such
as you can share phone numbers to contact you, and display other relevant
information such as order status, delivery status, refund or replacement procedure,
etc.
Types of Websites:
A website can be of two types based on the type of webpages:
o Static Website
o Dynamic Website
Static website
A static website, as the name suggests, is a website in which pages do not change
or remain the same. It is the basic type of website that is easy to create, maintain,
and host. You don't need web programming and database design to create a static
website. Its webpages are coded in HTML
. The codes are fixed for each page, so the information contained in the page does not change, and it looks like a
printed page. However, changes can be made by changing the codes if required.
You can think of it as a brochure for a business that has the same information for
every user. So, all users see the same information irrespective of their location,
interests, etc., when they open a particular page of a static website.
In the case of a static website, the content or webpage is taken directly form the
file stored in the server without requiring any interpreter (application software) to
interact with a database to fetch data from the database. So, database and server-
site scripting are not required in static websites.
Dynamic website
A dynamic website is a collection of dynamic web pages whose content changes
dynamically. It accesses content from a database or Content Management System
(CMS). Therefore, when you alter or update the content of the database, the
content of the website is also altered or updated.
As the name suggests, Its webpages do not As the name suggests, the webpages keep changing
change in terms of design, content, etc. The users' requirements such as Facebook profile pages
information or content remains the same. E-commerce site. So, the content does not remain th
It has a limited number of pages. It may contain thousands of pages in the database.
Its hosting cost is low, as HTML files need less Its hosting cost is higher as dynamic pages need mo
space on the server. on the server.
It loads quickly as it involves the use of mark- It takes more time to load due to the more processin
up languages to create a webpage.
It lacks the Content management feature. It makes use of the Content Management Feature.
The content of the webpage cannot be The webpage content can be changed during runtim
changed during runtime.
It does not require interaction with a Interaction with the database occurs.
database.
It is more secure or fewer chances of it It is less secure and may get hacked easily as it uses
getting hacked as it doesn't use plugins. plugins and content sources.
It is more reliable, e.g., whenever the server It is less reliable, as it may go down for hours if the s
is down, it is redirected to other nearby breaks down.
nodes.
2. E-commerce: These types of websites are like online shops where people can
buy products through online payment from the comfort of their home, office, etc.
Anyone who wants to sell products online can create an E-commerce site instead
of investing in setting up a traditional brick-and-mortar shop.
4. Online Community: These sites offer a platform to interact and share ideas
with others through internet. You can find people with similar interests and
backgrounds and interact with them to fulfil your objectives that may include
promoting a product or service, taking feedback about your products, or asking
questions related to a survey.
5. Social Media: These sites are created to provide users a platform where they
can build their personal profiles with a lot of features such as creating a friend list,
sending and accepting friend requests, sending messages, creating and joining
groups, and share information with others users, comment on others' post,
pictures, videos, etc.
What is a Browser?
A browser is a software program that is used to explore, retrieve, and display the
information available on the World Wide Web. This information may be in the form
of pictures, web pages, videos, and other files that all are connected via hyperlinks
and categorized with the help of URLs (Uniform Resource Identifiers). For example,
you are viewing this page by using a browser.
(Hypertext Transfer Protocol). A browser requires a smartphone, computer, or tablet and internet to work.
1. Refresh button: Refresh button allows the website to reload the contents of the
web pages. Most of the web browsers store local copies of visited pages to enhance
the performance by using a caching mechanism. Sometimes, it stops you from
seeing the updated information; in this case, by clicking on the refresh button, you
can see the updated information.
2. Stop button: It is used to cancel the communication of the web browser with the
server and stops loading the page content. For example, if any malicious site enters
the browser accidentally, it helps to save from it by clicking on the stop button.
3. Home button: It provides users the option to bring up the predefined home page
of the website.
4. Web address bar: It allows the users to enter a web address in the address bar
and visit the website.
5. Tabbed browsing: It provides users the option to open multiple websites on a
single window. It helps users to read different websites at the same time. For
example, when you search for anything on the browser, it provides you a list of
search results for your query. You can open all the results by right-clicking on each
link, staying on the same page.
6. Bookmarks: It allows the users to select particular website to save it for the later
retrieval of information, which is predefined by the users.
website. A URL
represents the address of a resource, including the protocol used to access it.
address or the domain name of a resource. Both parts are differentiated by a colon and two forward slashes
like http://www.javatpoint.com.
When a user enters a web address or URL in the search bar like javatpoint.com,
the request is passed to a domain name servers (DNS). All of these requests are
routed via several routers and switches.
The domain name servers hold a list of system names and their corresponding IP
addresses. Thus, when you type something in the browser search bar, it gets
converted into a number that determines the computers to which the search
results are to be displayed.
The browser acts as a part of the client-server model. A browser is a client program
that sends the request to the server in response to the user search queries by
using Hypertext Transfer Protocol or HTTP
. When the server receives the request, it collects information about the requested document and forwards the
information back to the browser. Thereafter, the browser translates and displays the information on the user
device.
In Brief:
o Microsoft Edge: Microsoft Edge is a web browser that comes pre-installed with
Windows 10 operating system and Windows Server 2016. It was introduced to
replace the Internet Explorer Web browser, and its code name was Spartan. It offers
various types of features such as freestyle writing over Web page displays, refined
search, and presentations for e-books and other reading resources.
Microsoft Edge was developed under the Spartan codename Project. In April 2015,
Microsoft changed the project Spartan name as Microsoft Edge. Although Internet
Explorer and Edge are included with Windows 10, Edge act as a default browser. It
combines new web technology evaluations and enhances the speed of browsing.
o Amazon Silk: Amazon silk is a proprietary Internet browser. It was released for Fire
OS devices on 15 November 2011. It is based on the open-source Chromium project
and derives most of the features from the Google Chrome browser. It divides the
task of loading webpages between Amazon's servers and Fire.
Silk browser works through Amazon EC2 (Elastic cloud computing). EC2 acts as the
middleman between devices and webpages and simplify them for examined
mobile consumption. Then, it includes the whole host of processes like page
caching, file compression, and local file storage.
It tries to guess your browsing habits. Accordingly, it predicts the pages that you
may like to visit, and then pre-loads those pages in advance. These background
processes use lower bandwidth and promote speed of page loading. If EC2 is
offline, the silk browser switches to a backup mode where it translates all
information on the Kindle Fire itself.
When the all contents of a page have been fetched on EC2, it renders the pages
for display in the client's browser window. It depends on the amount of load and
the client's network conditions.
The components that can be handed off to EC2 to speed up browsing are: HTML
, Networking, JavaScript
o Opera: An Opera web browser was first conceived at Telenor company in 1994,
later bought by the Opera Software on 1 April 1995. It was designed for desktop and
mobile interfaces, but it is more popular now for mobile phones. It is based on
Chromium, and it uses the blink layout engine. An opera mini was released for
smartphones on 10 August 2005 that could run standard web browsers. It can be
downloaded from the google play store or Apple play store.
o Apple Safari: Safari is an internet browser available for the Macintosh, and
Windows operating systems included the iPhone, iPad, and iPod Touch. It was
developed by Apple, Inc. on 30 June 2003. It is the default browser for the operating
system in its products, such as OS X for the MacBook and Mac computers and iOS
for the iPad and iPhone mobile devices. It is at number four in the browser market
after Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome. It uses the
WebKit engine, which is used for rendering fonts, displays graphics, determining
page layout, and running JavaScript.
o Google Chrome: Google Chrome is an open-source internet browser. It is
developed by Google on 11 December 2008 for Windows, Linux, Mac OS X, Android,
and iOS operating systems. Read more
o Mozilla Firefox: The Mozilla Firefox web browser is developed by the Mozilla
Foundation and its subordinate company, Mozilla Corporation. It was first released
was beta on 23 September 2002. Although it was released as the Mozilla Browser, it
was internally code-named Phoenix. The First version 1.0 of Firefox was introduced
on 9 November 2004. Read more
Opera: https://www.opera.com/
Google Chrome is an open-source and the most popular internet browser that is
used for accessing the information available on the World Wide Web. It was
developed by Google on 11 December 2008 for Windows, Linux, Mac OS X,
Android, and iOS operating systems. It uses sandboxing-based approach to provide
Web security. Furthermore, it also supports web standards like HTML5
and CSS
Google Chrome was the first web browser that has a feature to combine the search
box and address bar, that was adopted by most competitors. In 2010, Google
introduced the Chrome Web Store, where users can buy and install Web-based
applications.
o When you click on the Download Chrome button, the installation process will be
started.
To uninstall Google Chrome, follow the given below steps:
o When you click the OK button, the control panel window will be opened with various
options. Click 'uninstall a program' in the Programs option.
o Now, find and select Google Chrome in the opened list.
o Click the Uninstall button as shown in the below figure:
1. Modern Layout: The Chrome browser has a simple user-interface that includes
frequently-used buttons such as forward, backward, refresh, etc. It also has a
search bar or an Omnibox; that allows users to input the web address for searching
anything.
2. Speedy Performance: There are many websites (like news and online commerce
sites) that are developed by using sophisticated programming that can be a cause
for the slow browsing. Chrome deals with this programming efficiently and displays
complex pages quickly. Thus, it helps to save your time and hold your internet
session snappy responsive in many situations.
1. High amount of memory (RAM) usage: The Google Chrome browser utilizes
more RAM (Random Access Memory) and CPU as compared to other browsers.
Although the browser is lightweight, high consumption of memory can impact the
other applications running simultaneously on your computer.
2. Limited Customization and Options: The Chrome browser does not offer certain
customization and options like other browsers. For example, when you close the
chrome browser window with multiple open tabs, it does not ask you whether to
Incognito mode
Chrome provides a private mode option called Incognito Mode, which refers to a
private browsing, private window, or InPrivate browsing. It is an internet setting
that stops browsing history from getting stored. Generally, when you visit any web
page, the image, content, and cookies needed by the page are stored locally on
your computer. Furthermore, any search queries or filled out forms may be stored
in autocomplete fields. If you do not store this data and close your browser
window, Incognito mode forgets to store this data.
OS
Mozilla Firefox
Mozilla Firefox is an open-source web browser that is used to access the data
available on the World Wide Web. As compared to Internet Explorer, the popular
Explorer 6.0 as it provided user protection against spyware and malicious websites. In the year of 2017, it was
the fourth-most widely used web browser after Google Chrome, Apple Safari, and UC Browser.
The Firefox version 2.0 was released in October 2006. This latest version came
with new features, such as:
, macOS X, iOS
https://www.mozilla.org/en-US/firefox/
Firefox Quantum
Mozilla introduced Firefox Quantum, a technical base, for the Firefox browser on 14
November 2017. All the recent Firefox versions, starting with the version 57, for
desktop computers use Firefox Quantum technology. The mobile versions use the
new appearance features code-named 'Photon UI'.
at the time of browsing. It also offers enhanced thread safety, as its large sections were re-written by using Rust,
which is Mozilla's home-grown system programming language.
o Now, select About Firefox option from the drop-down list. As shown in the below
screenshot:
Internet Explorer
Internet Explorer is a free web browser, commonly called IE or MSIE, that allows
users to view web pages on the internet. It is also used to access online banking,
online marketing over the internet, listen to and watch streaming videos, and
Microsoft Internet Explorer was a more popular web browser for many years from
1999 to 2012 as it surpassed the Netscape Navigator during this time. It includes
network file sharing, several internet connections, active Scripting, and security
settings. It also provides other features such as:
o Remote administration
o Proxy server configuration
o VPN and FTP client capabilities
Internet Explorer 2 It was introduced on 22 November 1995 for PC and later for Mac in 1996.
The IE version 2 was introduced in November 1995, which provided support for
secure sockets layer (SSL) encryption and cookies.
The next version 3 was released in August 1996, followed with the features of
Java and cascading style sheets (CSS).
The last version of IE11 was released in 2013. With the release of Windows 10 in
2015, it was replaced by the Microsoft Edge as a default browser in Windows.
Check/Uncheck the box to Install or Uninstall Internet Explorer. See the below picture: