1.electronic Digital Computer and Its Parts (CPU Memory, I-O Devices)
1. A computer consists of a processing unit, memory, and input/output devices that allow it to execute a series of instructions to manipulate and store data. Early computers were room-sized, but modern computers are millions of times more powerful and occupy a fraction of the space.
2. Computer memory stores data in cells that are addressed and can store numbers. Modern computers have billions of bytes of memory. Input/output devices allow the computer to exchange information with the outside world. Programming languages allow humans to write instructions for the computer.
3. Word processing and spreadsheet software are common applications used on personal computers. Word processing allows creating, editing and printing documents, while spreadsheets are used for accounting, statistics and
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
91 views26 pages
1.electronic Digital Computer and Its Parts (CPU Memory, I-O Devices)
1. A computer consists of a processing unit, memory, and input/output devices that allow it to execute a series of instructions to manipulate and store data. Early computers were room-sized, but modern computers are millions of times more powerful and occupy a fraction of the space.
2. Computer memory stores data in cells that are addressed and can store numbers. Modern computers have billions of bytes of memory. Input/output devices allow the computer to exchange information with the outside world. Programming languages allow humans to write instructions for the computer.
3. Word processing and spreadsheet software are common applications used on personal computers. Word processing allows creating, editing and printing documents, while spreadsheets are used for accounting, statistics and
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 26
1.
Electronic digital computer and its parts (CPU Memory, I-O
devices) A computer is a general purpose device which can be programmed to carry out a finite set of arithmetic or logical operations. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem. The essential point of a computer is to implement an idea, the terms of which are satisfied by Alan Turing's Universal Turing machine. onventionally, a computer consists of at least one processing element and some form of memory. The processing element carries out arithmetic and logic operations, and a sequencing and control unit that can change the order of operations based on stored information. !eripheral devices allow information to be retrieved from an e"ternal source, and the result of operations saved. A computer's processing unit e"ecutes a series of instructions that make it read, manipulate and then store data. onditional instructions change the sequence of instructions as a function of the current state of the machine or its environment. #n order to interact with such a machine, programmers and engineers developed the concept of a user interface in order to accept input from humans and return results for human consumption. The first electronic digital computers were developed between $%&' and $%&( in the United )ingdom and United States. *riginally, they were the si+e of a large room, consuming as much power as several hundred modern personal computers ,!s-. .$/ #n this era mechanical analog computers were used for military applications. 0odern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space. .1/ Simple computers are small enough to fit into mobile devices, and mobile computers can be powered by small batteries. !ersonal computers in their various forms are icons of the #nformation Age and are what most people think of as 2computers2. 3owever, the embedded computers found in many devices from mp4 players to fighter aircraft and from toys to industrial robots are the most numerous. Memory Main article: Computer data storage 0agnetic core memory was the computer memory of choice throughout the $%5's, until it was replaced by semiconductor memory. A computer's memory can be viewed as a list of cells into which numbers can be placed or read. 6ach cell has a numbered 2address2 and can store a single number. The computer can be instructed to 2put the number $14 into the cell numbered $4(72 or to 2add the number that is in cell $4(7 to the number that is in cell 1&58 and put the answer into cell $(%(2. The information stored in memory may represent practically anything. 9etters, numbers, even computer instructions can be placed into memory with equal ease. Since the !U does not differentiate between different types of information, it is the software's responsibility to give significance to what the memory sees as nothing but a series of numbers. #n almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits ,called a byte-. 6ach byte is able to represent 1(5 different numbers ,1:8 ; 1(5-< either from ' to 1(( or =$18 to >$17. To store larger numbers, several consecutive bytes may be used ,typically, two, four or eight-. ?hen negative numbers are required, they are usually stored in two's complement notation. *ther arrangements are possible, but are usually not seen outside of speciali+ed applications or historical conte"ts. A computer can store any kind of information in memory if it can be represented numerically. 0odern computers have billions or even trillions of bytes of memory. The !U contains a special set of memory cells called registers that can be read and written to much more rapidly than the main memory area. There are typically between two and one hundred registers depending on the type of !U. @egisters are used for the most frequently needed data items to avoid having to access main memory every time data is needed. As data is constantly being worked on, reducing the need to access main memory ,which is often slow compared to the A9U and control units- greatly increases the computer's speed. omputer main memory comes in two principal varietiesA randomBaccess memory or @A0 and readBonly memory or @*0. @A0 can be read and written to anytime the !U commands it, but @*0 is preBloaded with data and software that never changes, therefore the !U can only read from it. @*0 is typically used to store the computer's initial startBup instructions. #n general, the contents of @A0 are erased when the power to the computer is turned off, but @*0 retains its data indefinitely. #n a !, the @*0 contains a speciali+ed program called the C#*S that orchestrates loading the computer's operating system from the hard disk drive into @A0 whenever the computer is turned on or reset. #n embedded computers, which frequently do not have disk drives, all of the required software may be stored in @*0. Software stored in @*0 is often called firmware, because it is notionally more like hardware than software. Dlash memory blurs the distinction between @*0 and @A0, as it retains its data when turned off but is also rewritable. #t is typically much slower than conventional @*0 and @A0 however, so its use is restricted to applications where high speed is unnecessary. .&1/ #n more sophisticated computers there may be one or more @A0 cache memories, which are slower than registers but faster than main memory. Eenerally computers with this sort of cache are designed to move frequently needed data into the cache automatically, often without the need for any intervention on the programmer's part. Input/output (I/O) Main article: Input/output 3ard disk drives are common storage devices used with computers. #F* is the means by which a computer e"changes information with the outside world. .&4/ Gevices that provide input or output to the computer are called peripherals. .&&/ *n a typical personal computer, peripherals include input devices like the keyboard and mouse, and output devices such as the display and printer. 3ard disk drives, floppy disk drives and optical disc drives serve as both input and output devices. omputer networking is another form of #F*. #F* devices are often comple" computers in their own right, with their own !U and memory. A graphics processing unit might contain fifty or more tiny computers that perform the calculations necessary to display 4G graphics .citation needed/ . 0odern desktop computers contain many smaller computers that assist the main !U in performing #F*. programming language
-A vocabulary and set of grammatical rules for instructing a computer to perform
specific tasks. The term programming language usually refers tohighBlevel languages, such as CAS#, , >>, *C*9, D*@T@AH, Ada, and!ascal. 6ach language has a unique set of keywords ,words that it understands- and a special synta" for organi+ing program instructions. 3ighBlevel programming languages, while simple compared to human languages, are more comple" than the languages the computer actually understands, called machine languages. 6ach different type of !U has its own unique machine language. 9ying between machine languages and highBlevel languages are languages called assembly languages. Assembly languages are similar to machine languages, but they are much easier to program in because they allow aprogrammer to substitute names for numbers. 0achine languages consist of numbers only. 9ying above highBlevel languages are languages called fourth-generation languages ,usually abbreviated 4GL-. &E9s are far removed from machine languages and represent the class of computer languages closest to human languages. @egardless of what language you use, you eventually need to convert your program into machine language so that the computer can understand it. There are two ways to do thisA I compile the program interpret the program See compile and interpreter for more information about these two methods. The question of which language is best is one that consumes a lot of time and energy among computer professionals. 6very language has its strengths and weaknesses. Dor e"ample, D*@T@AH is a particularly good language for processing numerical data, but it does not lend itself very well to organi+ing large programs. !ascal is very good for writing wellBstructured and readable programs, but it is not as fle"ible as the programming language. >> embodies powerful obJectBoriented features, but it is comple" and difficult to learn. The choice of which language to use depends on the type of computer the program is to run on, what sort of program it is, and the e"pertise of the programmer. 2.personal computer software WORD PROCESSING PACKAGES ?ord processing packages are readily available foruse in office environments on microcomputers. They enable you to create, modify ,insert, delete, rearrnge-,save, copy, and print documents ,see figure 4B$-. Theusual method of entering a document is to type it on akeyboard. Another method is to use a scanner to read aprinted document and encode it into a digital file forcomputer processing.Kou might also receive adocument that has been transmitted over a network orphone system Spreadsheet packages Spreadsheet is a name for all programs designed to handle all accounting and statistical problems. A spreadsheet is an electronic version of the manual worksheet used to organi+ed and manipulate numbers and displays options for whatBif analysis. it is based on the traditional accounting worksheet that have long been used by accountants and managers to work balance sheets, sales proJections and e"pense budgets. spreadsheets are also used by financial analysts, contractors and other businessmen concerned with manipulating numeric data. Cefore the introduction of electronic spreadsheet, the ledger was the accountant's primary tool for recording financial transactions. Any application that has to do with rows and columns is an application for spreadsheet. some of these application includes income statements, demographic data, budget summaries e.t.c. spreadsheets are important because they handle spreadsheet problems e"ceptionally well. At the heart of any spreadsheet is a column of information, such as set of prices for set items that need to be worked on such as addition. with manual spreadsheet, someone would have to look up the prices, perform the calculation, and then write down the result. Apart from all the time this takes there is the possibility of errors. The electronic spreadsheet on the other hand, will do all the calculations in a matter of split second, prints out the result the way you want with virtually no chance of errors. Kou can manipulate numbers by using stored formulas and calculate different outcomes. Dor e"ample, a retail store manager can estimate quarterly profits by proJecting sales over a threeBmonth period. The manager can subtract e"penses resulting from advertisement, cost of goods and salaries. if he sees that e"penses are too high to produce a profit, he can e"periment on the screen by reducing some e"penses and see the result immediately. Structure of Spreadsheet A spreadsheet is organi+ed in a tabular structure with rows and columns. it has several partsB the worksheet area of the spreadsheet, which displays the row and column table. The rows are usually numbered down the left side while the columns are lettered across the top. The columns run from A,C,,..AL and so on up to 1(5 columns. most spreadsheet packages permit up to 8$%5 rows or more depending on the si+e of the @A0. The intersection of a row and column designates a cell. Gata is entered and held in a cell. The position of a cell is celled cell address. #n the worksheet area of rows and columns movable highlight is used to point to the cells. This highlight is known as the cell pointer and can be moved around with the cursorBmovement,arrow keys to any cell address in much the same way that you move the insertion point in a word processor. Entering Data All that is required to enter data in the spreadsheet is simply moving the pointer to the appropriate cell using the cursor-control keys, and then keying in the data. ou also move the pointer to the appropriate cell in order to edit an already keyed data. !he address and content of the current cell are usually displayed in the user-interface portion of the spreadsheet-top corner of the spreadsheet work area. "hatever you are keying into a cell is displayed as you typed the characters. "hen you finish typing, the E#!E$ key or the cursor-control key is pressed to insert the data into the cell where you have the pointer. if it is the arrow key that was pressed, the data is inserted and the pointer moves to the ne%t cell. !ypes &f Data Entries There are three classifications for the information ,data- that we can put in a cell. if the data is a te"t such as a person's name, title or heading, it is classified as label entry. A label ,te"t- entry is a word, phrase, or any string of alphanumeric te"t ,space included- that occupies a cell. A numeric entry is classified as value. The third classification is formulas, which are instructions for calculations. They calculate results using numbers in referenced cells. for e"ample, to calculate the total for a set of cells, first you need to position the pointer in the cell where you want to have the total usually at the end of a row or column for the set of cells. Kou should tell the spreadsheet that what you want to enter is a formula, not a label or value. in some spreadsheets, you do this by typing the M sign. #n 6"cel you use the ; sign. A typical e"ample is ;G1>A(. This means add the value in G1 to the value in A(. The result of this calculation will be displayed wherever the pointer is positioned. Spreadsheet formulas use standard notation for arithmetic operationsA >,B,N,F,:. Unless otherwise specified, numeric entries are right Justified. you can however, specify otherwise. you can also center your entry in the cell. data'ase management system packages A database management system (GC0S) is a sot!are pac"a#e !it$ computer pro#rams t$at contro% t$e creation& maintenance& an' use o a 'ata(ase) It a%%o!s or#ani*ations to con+enient%y 'e+e%op 'ata(ases or +arious app%ications (y 'ata(ase a'ministrators (D,As) an' ot$er specia%ists) A 'ata(ase is an inte#rate' co%%ection o 'ata recor's& i%es& an' ot$er o(-ects) A D,MS a%%o!s 'ierent user app%ication pro#rams to concurrent%y access t$e same 'ata(ase) D,MSs may use a +ariety o'ata(ase mo'e%s& suc$ as t$e re%ationa% mo'e% or o(-ect mo'e%& to con+enient%y 'escri(e an' support app%ications) It typica%%y supports .uery %an#ua#es& !$ic$ are in act $i#$/%e+e% pro#rammin# %an#ua#es& 'e'icate' 'ata(ase %an#ua#es t$at consi'era(%y simp%iy !ritin# 'ata(ase app%ication pro#rams) Data(ase %an#ua#es a%so simp%iy t$e 'ata(ase or#ani*ation as !e%% as retrie+in# an' presentin# inormation rom it) A D,MS pro+i'es aci%ities or contro%%in# 'ata access& enorcin# 'ata inte#rity& mana#in# concurrency contro%& an' reco+erin# t$e 'ata(ase ater ai%ures an' restorin# it rom (ac"up i%es& as !e%% as maintainin# 'ata(ase security) Current tren's #n $%%8, database management was in need of a new style of databases to solve current database management problems. @esearchers reali+ed that the old trends of database management were becoming too comple" and there was a need for automated configuration and management. SuraJit haudhuri, Eerhard ?eikum and 0ichael Stonebraker were the pioneers that dramatically affected the thought of database management systems. .%/ They believed that database management needed a more modular approach and there were too many specifications needed for users. Since this new development process of database management there are more possibilities. Gatabase management is no longer limited to Omonolithic entitiesP. 0any solutions have been developed to satisfy the individual needs of users. The development of numerous database options has created fle"ibility in database management. There are several ways database management has affected the field of technology. Cecause organi+ations' demand for directory services has grown as they e"pand in si+e, businesses use directory services that provide prompted searches for company information. 0obile devices are able to store more than Just the contact information of users, and can cache and display a large amount of information on smaller displays. Search engine queries are able to locate data within the ?orld ?ide ?eb. @etailers have also benefited from the developments with data warehousing, recording customer transactions. *nline transactions have become tremendously popular for eBbusiness. onsumers and businesses are able to make payments securely through some company websites. (edit)*omponents D,MS en#ine accepts logical requests from various other GC0S subsystems, converts them into physical equivalents, and actually accesses the database and data dictionary as they e"ist on a storage device. Data 'einition su(system helps the user create and maintain the data dictionary and define the structure of the files in a database. Data manipu%ation su(system helps the user to add, change, and delete information in a database and query it for valuable information. Software tools within the data manipulation subsystem are most often the primary interface between user and the information contained in a database. #t allows the user to specify its logical information requirements. App%ication #eneration su(system contains facilities to help users develop transactionBintensive applications. #t usually requires that the user perform a detailed series of tasks to process a transaction. #t facilitates easyB toBuse data entry screens, programming languages, and interfaces. Data a'ministration su(system helps users manage the overall database environment by providing facilities for backup and recovery, security management, query optimi+ation, concurrency control, and change management. (edit)+odeling language A modeling language is a data modeling language to define the schema of each database hosted in the GC0S, according to the GC0S database model. Gatabase management systems ,GC0S- are designed to use one of five database structures to provide simplistic access to information stored in databases. The five database structures areA the hierarchical model, the network model, the relational model, the multidimensional model, and the obJect model. #nverted lists and other methods are also used. A given database management system may provide one or more of the five models. The optimal structure depends on the natural organi+ation of the application's data, and on the application's requirements, which include transaction rate ,speed-, reliability, maintainability, scalability, and cost. (edit)!he hierarchical structure The hierarchical structure was used in early mainframe GC0S. @ecordsQ relationships form a treelike model. This structure is simple but nonfle"ible because the relationship is confined to a oneBtoBmany relationship. #C0Qs #0S system and the @G0 0obile are e"amples of a hierarchical database system with multiple hierarchies over the same data. @G0 0obile is a newly designed embedded database for a mobile computer system. The hierarchical structure is used primarily today for storing geographic information and file systems. Hierarchical model redirects here. For the statistics usage, see hierarchical linear modeling. A $ierarc$ica% 'ata(ase mo'e% is a data model in which the data is organi+ed into a treeBlike structure. The structure allows representing information using parentFchild relationshipsA each parent can have many children, but each child has only one parent ,also known as a 0/to/many re%ations$ip-. All attributes of a specific record are listed under an entity type. 6"ample of a hierarchical model #n a database an entity type is the equivalent of a table. 6ach individual record is represented as a row, and each attribute as a column. 6ntity types are related to each other using :! mappings, also known as oneBtoB many relationships. This model is recogni+ed as the first database model created by #C0 in the $%5's. urrently the most widely used hierarchical databases are #0S developed by #C0 and ?indows @egistry by 0icrosoft. (edit)!he #etwork Structure The net"or# structure consists of more comple" relationships. Unlike the hierarchical structure, it can relate to many records and accesses them by following one of several paths. #n other words, this structure allows for manyB toBmany relationships. For computer net"or# models, see net"or# topolog$, pac#et generation model and channel model. The net!or" mo'e% is a database model conceived as a fle"ible way of representing obJects and their relationships. #ts distinguishing feature is that the schema, viewed as a graph in which obJect types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice. 6"ample of a Hetwork 0odel. The network model's original inventor was harles Cachman, and it was developed into a standard specification published in $%5% by the *GASK9 onsortium. (edit)!he relational structure The relational structure is the most commonly used today. #t is used by mainframe, midrange and microcomputer systems. #t uses twoB dimensional rows and columns to store data. The tables of records can be connected by common key values. ?hile working for #C0, 6.D. odd designed this structure in $%7'. The model is not easy for the end user to run queries with because it may require a comple" combination of many tables. (edit)!he multidimensional structure The multidimensional structure is similar to the relational model. The dimensions of the cubeBlike model have data relating to elements in each cell. This structure gives a spreadsheetBlike view of data. This structure is easy to maintain because records are stored as fundamental attributesR in the same way they are viewedRand the structure is easy to understand. #ts high performance has made it the most popular database structure when it comes to enabling online analytical processing ,*9A!-. (edit)!he o',ect-oriented structure The o%&ect-oriented structure has the ability to handle graphics, pictures, voice and te"t, types of data, without difficultly unlike the other database structures. This structure is popular for multimedia ?ebBbased applications. #t was designed to work with obJectBoriented programming languages such as Sava. The dominant model in use today is the ad hoc one embedded in ST9, despite the obJections of purists who believe this model is a corruption of the relational model since it violates several fundamental principles for the sake of practicality and performance. 0any GC0Ss also support the *pen Gatabase onnectivity A!# that supports a standard way for programmers to access the GC0S. Cefore the database management approach, organi+ations relied on file processing systems to organi+e, store, and process data files. 6nd users critici+ed file processing because the data is stored in many different files and each organi+ed in a different way. 6ach file was speciali+ed to be used with a specific application. Dile processing was bulky, costly and infle"ible when it came to supplying needed data accurately and promptly. Gata redundancy is an issue with the file processing system because the independent data files produce duplicate data so when updates were needed each separate file would need to be updated. Another issue is the lack of data integration. The data is dependent on other data to organi+e and store it. 9astly, there was not any consistency or standardi+ation of the data in a file processing system which makes maintenance difficult. Dor these reasons, the database management approach was produced. (edit)Data structure Gata structures ,fields, records, files and obJects- optimi+ed to deal with very large amounts of data stored on a permanent data storage device ,which implies relatively slow access compared to volatile main memory-. (edit)Data'ase query language A database query language and report obJect allows users to interactively interrogate the database, analy+e its data and update it according to the users privileges on data. #t also controls the security of the database. Gata securityprevents unauthori+ed users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called su%schemas. Dor e"ample, an employee database can contain all the data about an individual employee, but one group of users may be authori+ed to view only payroll data, while others are allowed access to only work history and medical data. #f the GC0S provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. 3owever, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multiBuser organi+ation. These controls are only available when a set of application programs are customi+ed for each data entry and updating function. (edit)!ransaction mechanism A database transaction mechanism ideally guarantees A#G properties in order to ensure data integrity despite concurrent user accesses ,concurrency control-, and faults ,fault tolerance-. #t also maintains the integrity of the data in the database. The GC0S can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The GC0S can help prevent duplicate records via unique inde" constraints< for e"ample, no two customers with the same customer numbers ,key fields- can be entered into the database. See A#G properties for more information. (edit)!opics 1e'it2E3terna%& %o#ica% an' interna% +ie! Traditional view of data .$'/ A GC0S !rovides the ability for many different users to share data and process resources. As there can be many different users, there are many different database needs. The question isA 3ow can a single, unified database meet varying requirements of so many usersU A GC0S minimi+es these problems by providing three views of the database dataA an e"ternal view ,or user view-, logical view ,or conceptual view- and physical ,or internal- view. The userQs view of a database program represents data in a format that is meaningful to a user and to the software programs that process those data. *ne strength of a GC0S is that while there is typically only one conceptual ,or logical- and physical ,or internal- view of the data, there can be an endless number of different e"ternal views. This feature allows users to see database information in a more businessBrelated way rather than from a technical, processing viewpoint. Thus the logical view refers to the way the user views the data, and the physical view refers to the way the data are physically stored and processed. 1e'it24eatures an' capa(i%ities Alternatively, and especially in connection with the relational model of database management, the relation between attributes drawn from a specified set of domains can be seen as being primary. Dor instance, the database might indicate that a car that was originally 2red2 might fade to 2pink2 in time, provided it was of some particular 2make2 with an inferior paint Job. Such higher arity relationships provide information on all of the underlying domains at the same time, with none of them being privileged above the others. 1e'it2Simp%e 'einition A database management system is the system in which related data is stored in an efficient or compact manner. 26fficient2 means that the data which is stored in the GC0S can be accessed quickly and 2compact2 means that the data takes up very little space in the computer's memory. The phrase 2related data2 means that the data stored pertains to a particular topic. Speciali+ed databases have e"isted for scientific, imaging, document storage and like uses. Dunctionality drawn from such applications has begun appearing in mainstream GC0S's as well. 3owever, the main focus, at least when aimed at the commercial data processing market, is still on descriptive attributes on repetitive record structures. Thus, the GC0S of today roll together frequently needed services and features of attribute management. Cy e"ternali+ing such functionality to the GC0S, applications effectively share code with each other and are relieved of much internal comple"ity. Deatures commonly offered by database management systems includeA 5uery a(i%ity Tuerying is the process of requesting attribute information from various perspectives and combination of factors. 6"ampleA 23ow many 1Bdoor cars in Te"as are greenU2 A database query language and report writer allow users to interactively interrogate the database, analy+e its data and update it according to the users privileges on data. ,ac"up an' rep%ication opies of attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may also be created for a distant organi+ation that cannot readily access the original. GC0S usually provide utilities to facilitate the process of e"tracting and disseminating attribute sets. ?hen data is replicated between database servers, so that the information remains consistent throughout the database system and users cannot tell or even know which server in the GC0S they are using, the system is said to e"hibit replication transparency. Ru%e enorcement *ften one wants to apply rules to attributes so that the attributes are clean and reliable. Dor e"ample, we may have a rule that says each car can have only one engine associated with it ,identified by 6ngine Humber-. #f somebody tries to associate a second engine with a given car, we want the GC0S to deny such a request and display an error message. 3owever, with changes in the model specification such as, in this e"ample, hybrid gasBelectric cars, rules may need to change. #deally such rules should be able to be added and removed as needed without significant data layout redesign. Security Dor security reasons, it is desirable to limit who can see or change specific attributes or groups of attributes. This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or ,in the most elaborate models- through the assignment of individuals and groups to roles which are then granted entitlements. Computation ommon computations requested on attributes are counting, summing, averaging, sorting, grouping, crossBreferencing, and so on. @ather than have each computer application implement these from scratch, they can rely on the GC0S to supply such calculations. C$an#e an' access %o##in# This describes who accessed which attributes, what was changed, and when it was changed. 9ogging services allow this by keeping a record of access occurrences and changes. Automate' optimi*ation Dor frequently occurring usage patterns or requests, some GC0S can adJust themselves to improve the speed of those interactions. #n some cases the GC0S will merely provide tools to monitor performance, allowing a human e"pert to make the necessary adJustments after reviewing the statistics collected. 1e'it2Meta/'ata repository 0etadata is data describing data. Dor e"ample, a listing that describes what attributes are allowed to be in data sets is called 2metaB information2. 1e'it2A'+ance' D,MS An e"ample of an advanced GC0S is Gistributed Gata Case 0anagement System ,GGC0S-, a collection of data which logically belong to the same system but are spread out over the sites of the computer network. The two aspects of a distributed database are distribution and logical correlationA GistributionA The fact that the data are not resident at the same site, so that we can distinguish a distributed database from a single, centrali+ed database. 9ogical orrelationA The fact that the data have some properties which tie them together, so that we can distinguish a distributed database from a set of local databases or files which are resident at different sites of a computer network. es! top pu"lis#ing Des"top pu(%is$in# ,abbreviated D6P- is the creation of printed materials using page layout software on a personal computer. ?hen used skilfully, desktop publishing can produce printed literature with attractive layouts and typographic quality comparable to traditional typography and printing. This technology allows individuals, businesses, and other organi+ations to selfBpublish a wide range of printed matterRfrom menus and local newsletters to books, maga+ines, and newspapersRwithout the sometimesBprohibitive e"pense of commercial printing. Gesktop publishing methods provides more control over design, layout, and typography than word processing does. 3owever, word processing software has evolved to include some, though by no means all, capabilities previously available only with professional printing or desktop publishing. !erminology There are two types of pages in desktop publishing, electronic pages and virtual paper pages to be printed on physical paper pages. All computeri+ed documents are technically electronic, which are limited in si+e only by computer memory or computer data storage space. Virtual paper pages will ultimately be printed, and therefore require paper parameters that coincide with international standard physical paper si+es such as 2A&,2 2letter,2 etc., if not custom si+es for trimming. Some desktop publishing programs allow custom si+es designated for large format printing used in posters, billboards and trade show displays. A virtual page for printing has a predesignated si+e of virtual printing material and can be viewed on a monitor in?KS#?KE format. 6ach page for printing has trim si+es ,edge of paper- and a printable area if bleed printing is not possible as is the case with most desktop printers. A web page is an e"ample of an electronic page that is not constrained by virtual paper parameters. 0ost electronic pages may be dynamically reBsi+ed, causing either the content to scale in si+e with the page or causing the content to reBflow. 0aster pages are templates used to automatically copy or link elements and graphic design styles to some or all the pages of a multipage document. 9inked elements can be modified without having to change each instance of an element on pages that use the same element. 0aster pages can also be used to apply graphic design styles to automatic page numbering. !age layout is the process by which the elements are laid on the page orderly, aesthetically, and precisely. 0ain types of components to be laid out on a page include te"t, linked images that can only be modified as an e"ternal source, and embedded images that may be modified with the layout application software. Some embedded images are rendered in the application software, while others can be placed from an e"ternal source image file. Te"t may be keyed into the layout, placed, or ,with database publishing applications- linked to an e"ternal source of te"t which allows multiple editors to develop a document at the same time. Eraphic design styles such as color, transparency, and filters, may also be applied to layout elements. Typography styles may be applied to te"t automatically with style sheets. Some layout programs include style sheets for images in addition to te"t. Eraphic styles for images may be border shapes, colors, transparency, filters, and a parameter designating the way te"t flows around the obJect called 2wraparound2 or 2runaround.2 (edit)*omparisons 1e'it2Wit$ !or' processin# ?hile desktop publishing software still provides e"tensive features necessary for print publishing, modern word processors now have publishing capabilities beyond those of many older GT! applications, blurring the line between word processing and desktop publishing. #n the early days of graphical user interfaces, GT! software was in a class of its own when compared to the fairly spartan word processing applications of the time. !rograms such as ?ord!erfect and ?ordStar were still mainly te"tBbased and offered little in the way of page layout, other than perhaps margins and line spacing. *n the other hand, word processing software was necessary for features like inde"ing and spell checking, features that are common in many applications today. As computers and operating systems have become more powerful, vendors have sought to provide users with a single application platform that can meet all needs. 1e'it2Wit$ ot$er e%ectronic %ayout sot!are #n modern usage, GT! is not generally said to include tools such as TeW or troff, though both can easily be used on a modern desktop system and are standard with many Uni"Blike operating systems and readily available for other systems. The key difference between electronic typesetting software and GT! software is that GT! software is generally interactive and ?KS#?KE in design, while other electronic typesetting software, such as TeW, 9aTeW and other variants, tends to operate in batch mode, requiring the user to enter the processing program's markup language without immediate visuali+ation of the finished product. This kind of workflow is less userBfriendly than ?KS#?KE, but more suitable for conference proceedings and scholarly articles as well as corporate newsletters or other applications where consistent, automated layout is important. *ne of the early and comprehensive reference books on the art of Gesktop !ublishing is Gesktop !ublishing Dor 6veryone by ).S.V. 0enon. This publication deals with virtually every facet of publishing and nearly all tools available as at the time of the publishing of this book in the year 1'''. #t is currently out of print. There is some overlap between desktop publishing and what is known as 3ypermedia publishing ,i.e. ?eb design, )iosk, GB@*0-. 0any graphical 3T09 editors such as 0icrosoft Dront!age and Adobe Greamweaver use a layout engine similar to a GT! program. 3owever, some ?eb designers still prefer to write 3T09 without the assistance of a ?KS#?KE editor, for greater control and because these editors often result in code bloat. (edit)D!- applications For a more comprehensi'e list, see List of des#top pu%lishing soft"are. Aldus !ersonal !ress Adobe Drame0aker Adobe #nGesign Adobe !age0aker Adobe 3ome!ublisher orel Ventura Datpaint ,?ebBbased application- iStudio !ublisher 0icrosoft *ffice !ublisher *pen*ffice.org F 9ibre*ffice !ageStream ,used to be 2!ublishing !artner2- !T Arborte"t TuarkW!ress @eady,Set,Eo Scribus Serif !age!lus *omputer animation packages Computer animation is the process used for generating animated images by using computer graphics. The more general term computer generated imagery encompasses both static scenes and dynamic images, while computer animation only refers to moving images. 0odern computer animation usually uses 4G computer graphics, although 1G computer graphics are still used for stylistic, low bandwidth, and faster realBtime renderings. Sometimes the target of the animation is the computer itself, but sometimes the target is another medium, such as film. omputer animation is essentially a digital successor to the stop motion techniques used in traditional animation with 4G models and frameBbyB frame animation of 1G illustrations. omputer generated animations are more controllable than other more physically based processes, such as constructing miniatures for effects shots or hiring e"tras for crowd scenes, and because it allows the creation of images that would not be feasible using any other technology. #t can also allow a single graphic artist to produce such content without the use of actors, e"pensive set pieces, or props. To create the illusion of movement, an image is displayed on the computer screen and repeatedly replaced by a new image that is similar to it, but advanced slightly in time ,usually at a rate of 1& or 4' framesFsecond-. This technique is identical to how the illusion of movement is achieved with television and motion pictures. Dor 4G animations, obJects ,models- are built on the computer monitor ,modeled- and 4G figures are rigged with a virtual skeleton. Dor 1G figure animations, separate obJects ,illustrations- and separate transparent layers are used, with or without a virtual skeleton. Then the limbs, eyes, mouth, clothes, etc. of the figure are moved by the animator on key frames. The differences in appearance between key frames are automatically calculated by the computer in a process known as tweening or morphing. Dinally, the animation isrendered. Dor 4G animations, all frames must be rendered after modeling is complete. Dor 1G vector animations, the rendering process is the key frame illustration process, while tweened frames are rendered as needed. Dor preBrecorded presentations, the rendered frames are transferred to a different format or medium such as film or digital video. The frames may also be rendered in real time as they are presented to the endBuser audience. 9ow bandwidth animations transmitted via the internet ,e.g. 1G Dlash, W4G- often use software on the endBusers computer to render in real time as an alternative to streaming or preBloaded high bandwidth animations. *reating characters and o',ects on a computer 4G computer animation combines 4G models of obJects and programmed or hand 2keyframed2 movement. 0odels are constructed out of geometrical vertices, faces, and edges in a 4G coordinate system. *bJects are sculpted much like real clay or plaster, working from general forms to specific details with various sculpting tools. A boneFJoint animation system is set up to deform the E# model ,e.g., to make a humanoid model walk-. #n a process called rigging, the virtual marionette is given various controllers and handles for controlling movement. Animation data can be created using motion capture, or keyframing by a human animator, or a combination of the two. 4G models rigged for animation may contain thousands of control points B for e"ample, the character 2?oody2 in !i"ar's movie (o$ )tor$, uses 7'' speciali+ed animation controllers. @hythm and 3ues Studios labored for two years to create Aslan in the movie (he Chronicles of !arnia: (he Lion, the *itch and the *ardro%e which had about $8($ controllers, 7&1 in Just the face alone. #n the 1''& film (he +a$ ,fter (omorro", designers had to design forces of e"treme weather with the help of video references and accurate meteorological facts. Dor the 1''( remake of -ing -ong, actor Andy Serkis was used to help designers pinpoint the gorilla's prime location in the shots and used his e"pressions to model 2human2 characteristics onto the creature. Serkis had earlier provided the voice and performance for Eollum in S. @. @. Tolkien's (he Lord of the .ings trilogy. (edit)*omputer animation development equipment omputer animation can be created with a computer and animation software. Some impressive animation can be achieved even with basic programs< however, the rendering can take a lot of time on an ordinary home computer. Cecause of this, video game animators tend to use low resolution, low polygon count renders, such that the graphics can be rendered in real time on a home computer. !hotorealistic animation would be impractical in this conte"t. !rofessional animators of movies, television, and video sequences on computer games make photorealistic animation with high detail. This level of quality for movie animation would take tens to hundreds of years to create on a home computer. 0any powerful workstation computers are used instead. Eraphics workstation computers use two to four processors, and thus are a lot more powerful than a home computer, and are speciali+ed for rendering. A large number of workstations ,known as a render farm- are networked together to effectively act as a giant computer. The result is a computerBanimated movie that can be completed in about one to five years ,this process is not comprised solely of rendering, however-. A workstation typically costs X1,''' to X$5,''', with the more e"pensive stations being able to render much faster, due to the more technologically advanced hardware that they contain. !rofessionals also use digital movie cameras, motion capture or performance capture, bluescreens, film editing software, props, and other tools for movie animation. .. / perating System concepts W$at is an Operatin# System7 The $%5'Qs definition of an operating system is Othe software that controls the hardwareP. 3owever, today, due to microcode we need a better definition. ?e see an operating system as the programs that make the hardware useable. #n brief, an operating system is the set of programs that controls a computer. Some e"amples of operating systems are UH#W, 0ach, 0SBG*S, 0SB?indows, ?indowsFHT, hicago, *SF1, 0ac*S, V0S, 0VS, and V0. ontrolling the computer involves software at several levels. ?e will differentiate kernel services, library services, and applicationBlevel services, all of which are part of the operating system. !rocesses run Applications, which are linked together with libraries that perform standard services. The kernel supports the processes by providing a path to the peripheral devices. The kernel responds to service calls from the processes and interrupts from the devices. The core of the operating system is the kernel, a control program that functions in pri+i%e#e' state ,an e"ecution conte"t that allows all hardware instructions to be e"ecuted-, reacting to interrupts from e"ternal devices and to service requests and traps from processes. Eenerally, the kernel is a permanent resident of the computer. #t creates and terminates processes and responds to their request for service. *perating Systems are resource managers. The main resource is computer hardware in the form of processors, storage, inputFoutput devices, communication devices, and data. Some of the operating system functions areA implementing the user interface, sharing hardware among users, allowing users to share data among themselves, preventing users from interfering with one another, scheduling resources among users, facilitating inputFoutput, recovering from errors, accounting for resource usage, facilitating parallel operations, organi+ing data for secure and rapid access, and handling network communications. #eed and function of operating system Some information is here about the operating system in your !. Deinition o Operatin# System8 / An *perating System is an essential component of a computer system. #t is a large set of large and comple" program that acts as an interface between the computer hardware Y its user. #ts serves twin obJectives, interpreting the user program instructions to the hardware as well as providing coordination services necessary to enable a group of users to share computer system resources efficiently. Nee' o Operatin# System8 #n earlier dayQs user had to design the application according to the internal structure of the hardware. *perating System was needed to enable the user to design the application without concerning the details of the computerQs internal structure. #n general the boundary between the hardware Y software is transparent to the user. 9sa#e o Operatin# System8 $. 6asy interaction between the human Y computer. 1. Starting computer operation automatically when power in turned on. 4. 9oading Y scheduling users program. &. ontrolling input Y output. (. ontrolling program e"ecution. 5. 0anaging use of main memory. 7. !roviding security to users program. 4unctions o Operatin# System 8 The main functions perform by most *perating System of today are as followA B 0) Process Mana#ement8 / 6$e process management module of an *perating System takes care of the creation Y deletion of processes, scheduling of various system resources to the different process requesting them, Y providing mechanism for synchroni+ation Y communication among processes. :) Memory Mana#ement8 / The memory management module of an *perating System takes care of the allocation Y reallocation of memory space to the various program in need of this resource. ;) 4i%e Mana#ement8 / computer use a lot of data Y programs, which are, stored on secondary storage devices. Dile management functions of an *perating System. #nvolves keeping track of all different files Y maintaining the integrity of data stored in the files including file directory structure. <) Security8 / The security modules of an *perating System protect the resources Y information of a computer system against destructionY unauthori+ed access. =) Comman' Interpretation8 /The ommand #nterpretation module of an *perating System takes care of interpreting of user commands, Y directing the system resources to handle the requests. ?ith this mode of interaction with the system, the user is usually not too concerned with the hardware details of the system. >) Input/Output or De+ice Mana#ement8 / coordination Y control of various input Y output devices is an important function of the *perating System. This involves receiving the request for #F* interrupts, Y communicating back to the requesting process. ?) @o( Contro%8 / ?hen the user wants to run an application program, he must communicate with the *perating System telling it what to do. 3e does this using *perating System Job control language or S9. S9 consists of a number of *perating Systems commands, called system commands that control the functioning of the *perating System. catagories of operating system An operating system is the single most important software when you run a computer, it is what takes care of pretty much everything on a computer system, while the maJority of computers we see happen to be using one ZtypeQ of operating system performing the same functions, operating systems can be branched into several different types as well. #tQs been a while since #Qve shared a fairly technical post on omputer @ealm so # guess today would be a good day for one. Catch !rocessing *perating System #n a batch processing operating system interaction between the user and processor is limited or there is no interaction at all during the e"ecution of work. Gata and programs that need to be processed are bundled and collected as a ZbatchQ and e"ecuted together. Catch processing operating systems are ideal in situations whereA B There are large amounts of data to be processed. B Similar data needs to be processed. B Similar processing is involved when e"ecuting the data. The system is capable of identifying times when the processor is idle at which time ZbatchesQ maybe processed. !rocessing is all performed automatically without any user intervention. @ealBtime *perating System A realBtime operating system processes inputs simultaneously, fast enough to affect the ne"t input or process. @ealBtime systems are usually used to control comple" systems that require a lot of processing like machinery and industrial systems. Single User *perating System A single user *S as the name suggests is designed for one user to effectively use a computer at a time. 0ultiBTasking *perating System #n this type of *S several applications maybe simultaneously loaded and used in the memory. ?hile the processor handles only one application at a particular time it is capable of switching between the applications effectively to apparently simultaneously e"ecute each application. This type of operating system is seen everywhere today and is the most common type of *S, the ?indows operating system would be an e"ample. 0ultiBUser *perating System This type of *S allows multiple users to simultaneously use the system, while here as well, the processor splits its resources and handles one user at a time, the speed and efficiency at which it does this makes it apparent that users are simultaneously using the system, some network systems utili+e this kind of operating system. Gistributed *perating System #n a distributed system, software and data maybe distributed around the system, programs and files maybe stored on different storage devices which are located in different geographical locations and maybe accessed from different computer terminals. ?hile we are mostly accustomed to seeing multiBtasking and multiBuser operating systems, the other operating systems are usually used in companies and firms to power special systems. /.*omputer and communication Aumans $a+e a%!ays communicate') In t$e (e#innin# o man"in'& man an' !oman use' speec$ an' (o'y %an#ua#es) No!a'ays& !e a%so use te%ecommunication tec$no%o#y or communication) Durin# t$e re%ati+e s$ort era o computers !e $a+e 'e+e%ope' %an#ua#es an' ru%es or communication (et!een t$em) 6$ese %an#ua#es an' ru%es are ca%%e' protoco%s) 6$e most !e%% "no!n protoco%s are 6CP/IP& use' in t$e Internet) In our researc$& !e ocus on ra'io (ase' computer communication) Our +ision is to pro+i'e t$e same mo(i%ity to t$e user as t$e ce%%u%ar p$one& !it$ t$e same communication perormance& cost an' .ua%ity as t$e i3e' !ire' net!or"s) The success of the #nternet has been tremendous. The original design of the #nternet protocols has scaled to a worldwide network with millions of computers interconnected by wires and optical fibers. 3owever, the #nternet protocols and technology do not scale that well for mobile and wireless computers since the original protocols assumed that the computers were relatively stationary. They also have problems to meet the requirements from new applications, such as peerBtoBpeer networking. #n our research we study new protocols that can handle the mobility better and that give better support and higher performance for new applications. #n the future, computers will be so common in our everyday appliances and mobile units that we will not react on them. ?ireless embedded sensor networks with powerful !Us will be common. All these computers will be able to communicate with each other, often over wireless networks. Cut, in the future we will not have the time, or the desire to configure this massive amount of computers and networks that we constantly will have around us. #nstead, the computers must configure and setBup networks themselves for their task at hand. A significant part of our research studies such spontaneous autonomic networks, created for the situation and moment. #t could be an adBhoc network of mobile phones for a disaster area where the stationary infraBstructure is broken. A maJor part of our research is in the area wireless sensor networks within the Uppsala ?#S6H6T center of 6"cellence.