Assignment - Computer Platforms
Assignment - Computer Platforms
Contents
Page No
The processor
02
Backing storage
03
08
_______________________________________________________________________________
1 - 57
THE PROCESSOR
A computers processor, also known as its central processing unit (CPU), is one of
the biggest hardware factors affecting the computers performance. Processors
have a number of different specifications and statistics that factor into their speed,
but many users dont fully understand what they mean.
2. Clock Rate
Also called clock speed, a processors clock rate is a measure of how many
instructions the processor can execute in one second. Clock rate is measured in
megahertz (MHz) or gigahertz (GHz). One hundred MHz is one hundred million
operations per second. Equal processors with faster clock speeds process data
faster than those with slower clock speeds.
3. Bandwidth
Measured in bits, the bandwidth determines how much information the processor
can process in one instruction. If you were to compare data flow to the flow of
traffic on a highway, then clock speed would be the speed limit, and bandwidth
would be the number of lanes on the highway.
Most existing desktop computer systems today run on 32-bit processors, but
almost all new PC's are coming equipped with 64-bit chips and operating systems.
It makes sense to design your new computer around a multi-core, 64-bit CPU, like
the Athlon 64 X2 or the Intel Core2 Quad.
Other factors affecting data transfer rates include the system clock speed, the
motherboard chipset, and the RAM speed.
5. Cache Size
Processors get their data from the computer's Random Access Memory (RAM).
As the data pours in, the processor copies it and sends it to a "cache." The cache
acts as a temporary information way station. It makes commonly or recently used
data readily available to save the processor from having to retrieve it from RAM.
The larger the cache, the more of this easy-to-access memory the processor can
use.
6. Multi-core Processors
Many modern processors have more than one core. Each core effectively serves as
another processor, able to perform functions simultaneously with the other cores.
A 133 MHz dual-core processor can actually perform 266 million operations per
second.
BACKING STORAGE
Backing storage (sometimes known as secondary storage) devices are where can
store data permanently. They are non-volatile, which means that even when the
computer is switched off, the data will still be safe and can be loaded onto a
computer system when required.
_______________________________________________________________________________
3 - 57
1. Hard Drives
Hard-drives have a very large storage capacity (up to 5TB). They can be used to
store vast amounts of data. Hard-drives are random access devices and can be
used to store all types of films, including huge files such as movies. Data access
speeds are very fast. Data is stored inside a hard-drive on rotating metal or glass
discs (called platters).
2. Magnetic Tape
Magnetic tape is a large capacity, serial access medium. Because it is a serial
access medium, accessing individual files on a tape is slow. Tapes are used where
large amounts of data need to be stored, but where quick access to individual
files is not required. A typical use is for data back-up (lots of data, but rarely only
accessed in an emergency).
3. Magnetic Discs
Floppy Disc:
Floppy disc is removable, portable, cheap, low-capacity (1.44MB) storage
medium. Floppy discs are random access devices used for transfer small
_______________________________________________________________________________
4 - 57
4. Optical Discs
Optical discs save data as patterns of dots that can be read using light. A laser
beam is the usual light source.
The data on the disc is read by bouncing the laser beam off the surface of the
medium. If the beam hits a dot it is reflected back differently to how it would be
if there was no dot. This difference can be detected, so the data can be read.
Dots can be created using the laser beam (for media that is writable such as CDRs). The beam is used in a high-power mode to actually mark the surface of the
medium, making a dot. This process is known as burning data onto a disc.
CD-ROM:
Compact Disc - Read-Only Memory (CD-ROM) discs can hold around
800MB of data. The data cannot be altered (non-volatile), so cannot be
accidentally deleted. CD-ROMs are random-access devices. CD-ROMs are
used to distribute all sorts of data: software (e.g. office applications or
games), music, electronic books (e.g. an encyclopedia with sound and video.)
DVD-ROM:
Digital Versatile Disc - Read-Only Memory (DVD-ROM) discs can hold
around 4.7GB of data (a dual-layer DVD can hold twice that). DVD-ROMs
are random-access devices. DVD-ROMs are used in the same way as CDROMs (see above) but, since they can hold more data, they are also used to
store high-quality video.
_______________________________________________________________________________
5 - 57
Recordable optical discs can have data written onto them (burnt) by a
computer user using a special disc drive (a disc burner).
DVD-RAM:
DVD-Random Access Memory (DVD-RAM) discs are a type of re-writable
DVD. They often come in a floppy-disc style case (to protect the disc).
DVD-RAM discs have a similar capacity to a normal DVD, holding 4.7GB of
data. DVD-RAM discs are random-access devices. DVD-RAM discs are used
in many camcorders (video recording cameras).
The discs are much higher quality than normal DVD-RWs and can reliably
store data for up to 30 years. This means that they are often used for video and
data back-up and archiving.
1,000B
1,000kB
1,000MB
1,000GB
=
=
=
=
1kB
1MB
1GB
1TB
_______________________________________________________________________________
8 - 57
Input Devices
Input devices are absolutely crucial to computers. The most common input
devices are mice and keyboards which barely every computer has. A new
popular pointing device that may eventually replace the mouse is touch screen
which you can get on some tablet notebooks. Other popular input devices include
microphones, webcams, and fingerprint readers which can also be built in to
modern laptops and desktops. A scanner is another popular input device that
might be built-in to your printer.
Output Devices
There are lots of different kinds of output devices that you can get for your
computer. The absolute most common external output device is a monitor. Other
very popular output devices are printers and speakers. There are lots of different
kinds of printers and different sizes of speakers for your computer. Monitors are
connected usually through the HD-15 connector on your video card. Printers are
usually connected through a USB port. Speakers have their own audio out port
built-in to the sound card.
1. Computer Monitor
A monitor or a display is an electronic visual display for computers. The monitor
comprises the display device, circuitry and an enclosure. The display device in
modern monitors is typically a thin film transistor liquid crystal display (TFTLCD) thin panel, while older monitors used a cathode ray tube (CRT) about as
deep as the screen size.
Type of Monitors by Technology
_______________________________________________________________________________
9 - 57
Measurements of Performance
The performance of a monitor is measured by the following parameters:
Aspect ratio is the ratio of the horizontal length to the vertical length.
Monitors usually have the aspect ratio 4:3, 5:4, 16:10 or 16:9.
Viewable image size is usually measured diagonally, but the actual widths and
heights are more informative since they are not affected by the aspect ratio in
the same way. For CRTs, the viewable size is typically 1 in (25 mm) smaller
than the tube itself.
Display resolution is the number of distinct pixels in each dimension that can
be displayed. Maximum resolution is limited by dot pitch.
Dot pitch is the distance between sub pixels of the same color in millimeters.
In general, the smaller the dot pitch, the sharper the picture will appear.
Response time is the time a pixel in a monitor takes to go from active (white)
to inactive (black) and back to active (white) again, measured in milliseconds.
Lower numbers mean faster transitions and therefore fewer visible image
artifacts.
Contrast ratio is the ratio of the luminosity of the brightest color (white) to
that of the darkest color (black) that the monitor is capable of producing.
Delta-E: Color accuracy is measured in delta-E; the lower the delta-E, the
more accurate the color representation. A delta-E of below 1 is imperceptible
to the human eye. Delta-Es of 2 to 4 are considered good and require a
sensitive eye to spot the difference.
Viewing angle is the maximum angle at which images on the monitor can be
viewed, without excessive degradation to the image. It is measured in degrees
horizontally and vertically.
3. Printer
Printer is an external hardware device responsible for taking computer data and
generating a hard copy of that data. Printers are one of the most used peripherals
on computers and are commonly used to print text, images, and photos.
Types of printers
Below is a list of all the different types of computer printers. Today, the most
common printers used with a computer are Inkjet and Laser printers.
_______________________________________________________________________________
11 - 57
Availability
_______________________________________________________________________________
12 - 57
From where can the ink or toner be purchased? Some printer manufacturers may
require that you purchase the ink directly from them; and if purchased from a
third-party, cause your printer warranty to become void. Verify that the ink can be
purchased from a third-party and if so, from whom.
Type
See what ink or toner used with your printer, and for users considering an Ink Jet
printer, see if the printer accepts separate color cartridges. Some manufacturers
may include all the cartridges as one cartridge, causing you to have to purchase all
the available colors for one color that may be out. In addition, see if the cartridges
are just ink or ink and nozzles. Cartridges with ink and nozzles will cost more than
those that have just ink.
Cost Per Page
It is important to look at the cost per page and see how much you may be paying
for the amount of printing you expect to do. You can expect to pay less for a laser
printer than an ink printer when looking at Cost per Page.
_______________________________________________________________________________
13 - 57
TASK 02
Contents
Page No
Selection of computer
14
_______________________________________________________________________________
14 - 57
SELECTION OF COMPUTER
System - 1
Processor
Ram
Hard Disc
Mother Board
Monitor
- i5 processor
- 4GB 1800MHz axe Ram DDR3
- 1 Terabyte hard disc
- DG43GT Intel G43 Chipset 1333 FSB Intel motherboard
- 19 LED Monitor
Advantage of Core i5
Core i5 is the latest - mid-range processor by Intel. A step up from the Core i3, i5
processors will give a noticeable difference in speed, depending on what type of
applications that runs. If we are playing solitaire, we arent going to be able to tell
a difference between Core i3 and Core i5 processors. If we are editing multiple
files in Adobe Flash, with virtualization software, we may notice the Core i5 to be
snappier.
Technically, Core i5 processors are marketed a bit differently. There are two main
types of Core i5 Processors, dual core, and quad core. Dual core i5 processors
have 32nm technology, hyper threading support, virtualization support, and Turbo
Boost technology. Quad core i5 processors have 45nm technology, virtualization
support and Turbo Boost technology, but do not have hyper threading support.
Both types of Core i5 processors offer similar performance. However, one may be
better than another when running multi-threaded applications.
Core i5s offer enough performance to do stuff like video editing and gaming, and
more than enough performance to do basic stuff like word processing, internet
surfing, and email. A Core i5 processor is a great, mid-range priced processor for
people who use their computers frequently and often multi task.
Longer Life-span
The fluorescent lights used in LCD monitors have a relatively short lifespan: after
three to five years, LCD display may be noticeably dimmer than when first
purchased the monitor. Fluorescent lights deteriorate over time, and the monitors
are not designed for easy replacement of failing lights. While a fluorescent bulb
may last approximately 10,000 hours, an LED bulb will likely last for more than
100,000 hours of usage.
_______________________________________________________________________________
15 - 57
Size
Because LED monitors don't use fluorescent bulbs, they can be thinner and lighter
than LCD monitors. The fluorescent bulbs are not only heavier, but larger and can
make an LCD monitor much more bulky than an LED monitor. Also, side lit LED
monitors are even thinner than LED backlit monitors and are much lighter and
easier to manage if we need to move the monitor to another room.
Picture Quality
LED monitors outperform LCD monitors when it comes to picture quality in the
areas of motion blurring and color intensity. LCD monitors tend to suffer from an
issue called "motion blur," where the image momentarily blurs in times of intense
motion on the screen. Also, LCD monitors have a lower contrast ratio and color
gamut than LED monitors. The LED advantage with regard to color is due to the
fact that LED monitors use red, green and blue diodes that mix the light in correct
ratios to obtain true-to-life color. Also, contrast for blacks and darker colors is
more crisp and true in an LED monitor since LCD monitors only attempt to block
incoming light by "closing" pixels, and sometimes this light leaks. An LED
monitor actually dims the appropriate diodes to create darker images.
_______________________________________________________________________________
16 - 57
TASK 03
Contents
Page No
17
_______________________________________________________________________________
17 - 57
_______________________________________________________________________________
18 - 57
Programmers write computer program with built in instruction called system calls.
They request serves from the program.
E.g.: If we want to retrieve a file we use the open dialogue box to list the program
calls on the Operating System. The Operating System goes to the same process to
build a list of files.
Sharing information
Many type of applications provides to move blocks of data from one place to
another.
For e.g.; if we want to copy a chart from Excel to Word processor, we can select
the copy command and then apply the paste command. Thus the OS provide the
data movement facilities.
Managing hardware
When programs run they need to use the computer's memory, monitor, disk drives
and printer. The Operating System is the intermediary between programs and the
hardware. In a computer network the Operating System also mediate between our
computer and other devices on the network.
Processing interrupt
The Operating System response to request to use memory and other devices keeps
track of which program has access to devices and co-ordinate everything the
hardware done. So that various activities do not overlap. The Operating System
uses interrupt request (IRQS) to help CPU coordinate the process.
Working with device drivers
The Operating System provides programs for working with special devices such
as printers. These programs are called drivers. Because they allow the Operating
System and other programs to activate and use drive is a hardware device. Most
new software in work with our printer, monitor and other equipment without
requiring to install any special drivers.
System 3.x
Windows 98
_______________________________________________________________________________
19 - 57
Windows CE
Multi-User - A multi-user operating system allows for multiple users to use the
same computer at the same time and different times. See the multi-user definition
for a complete definition for a complete definition. Below are some examples of
multi-user operating systems.
Linux
UNIX
Windows 2000
Linux
UNIX
Windows 2000
UNIX
Windows 2000
Linux
UNIX
Windows 2000
Troubleshooting
Common questions and answers to operating systems in general can be found on
the below operating system question and answers. All other questions relating to
an operating system in particular can be found through the operating system page.
_______________________________________________________________________________
20 - 57
Windows CE
Windows 3.x
Windows 95
Windows 98
Windows 98 SE
Windows ME
Windows NT
Windows 2000
Windows XP
Windows Vista
Windows 7
Characteristics of Windows
lists etc. The server version of Windows is called Windows server. 2008 is the
most recent version of Windows server.
_______________________________________________________________________________
23 - 57
2. Linux
Linux is an operating system for Intel based PCs. The system has been designed
and builds by hundreds of programmers scattered around the world. LINUX was
developed in the early 1990's by Linux Torvald along with other programmers
around the world.
As an operating system, it performs many of the same functions as DOS or
Windows. However LINUX is distinguished by its power and flexibility. It is free.
Unlike the official operating system, LINUX is distributed freely. LINUX also
comes with source code, so you can change or customize the software to adapt
your own needs. LINUX is a great operating system that is rich in features
adapted from other versions of UNIX. It is a powerful UNIX like Operating
System. It is a fast growing Operating System .LINUX enhance the PC on which
the titanic movies animations where created. It includes all UNIX features such as
multitasking multiprocessor support Internet support Graphical user interface. It is
a full 32 bit, 64 bit multitasking OS that support multiple users and multiple
processors. LINUX can run on any computer and can support any kind of
application. LINUX uses a command line interface, and also windows base
Graphical User Interface environment.
The main non technical difference between LINUX and UNIX is its price. It is a
freeware Operating System. The most popular LINUX vendors are Redhat and
Ubuntu. Both offer special LINUX bundles for desktop computers as well as for
servers. For all these reasons, LINUX has become a popular OS. Students and
teachers have flocked to LINUX to participate in the global community that has
built up around the Operating System .This community invites LINUX users and
developers to contribute modifications and enhancement, and it freely share
information about UNIX and LINUX related issues. LINUX is mostly used with
severs, personal computers and super computers. This operating system is less
expensive than Windows.
I recommend the operating system LINUX. Because this operating system uses a
command line interface and also windows base Graphical User Interface
environment. So LINUX is best to avoid viruses, spam and spyware. LINUX can
run on any computer and can support any kind of application.
_______________________________________________________________________________
24 - 57
TASK 04
Contents
Page No
24
25
Backup
26
_______________________________________________________________________________
25 - 57
$Recycle.Bin
Boot
Documents and Settings
inetpub
IIS folder (if installed)
PerfLogs
Program Data
Program Files
Program Files (x86)
Recovery
System Volume Information
Users
Windows
UNIX
UNIX and UNIX-like operating systems use the file system Hierarchy Standard as
the common form for their directory structures. All files and directories appear
under the root directory "/", even if they are stored on different physical devices.
_______________________________________________________________________________
26 - 57
Principle
User interfaces should be tailored to accommodate the different presentation
capacity of a user's device. Device independent content authoring needs content to
be tailored according to the presentation capacity characteristic of the device (e.g.,
device's screen size) and the semantic relation between widgets (c.f. Figure 4.2).
However, no markup-based user interface description language allows the
definition of semantic relation between widgets.
_______________________________________________________________________________
Figure 4.2: Definition of semantic information concerning the relationship of widgets.
27 - 57
Concepts
The concepts presented in this section help answering the following aspects of
user interface tailoring:
BACKUP
In information technology, a backup, or the process of backing up, refers to the
copying and archiving of computer data so it may be used to restore the original
after a data loss event. The verb form is to back up in two words, whereas the
noun is backup.
Backups have two distinct purposes. The primary purpose is to recover data after
its loss, be it by data deletion or corruption. Data loss can be a common
experience of computer users. The secondary purpose of backups is to recover
data from an earlier time, according to a user-defined data retention policy,
typically configured within a backup application for how long copies of data are
required. Though backups popularly represent a simple form of disaster recovery,
and should be part of a disaster recovery plan, by themselves, backups should not
alone be considered disaster recovery. One reason for this is that not all backup
systems or backup applications are able to reconstitute a computer system or other
complex configurations such as a computer cluster, active directory servers, or a
database server, by restoring only data from a backup.
Since a backup system contains at least one copy of all data worth saving, the data
storage requirements can be significant. Organizing this storage space and
managing the backup process can be a complicated undertaking. A data repository
model can be used to provide structure to the storage. Nowadays, there are many
different types of data storage devices that are useful for making backups. There
are also many different ways in which these devices can be arranged to provide
geographic redundancy, data security, and portability.
Before data is sent to its storage location, it is selected, extracted, and
manipulated. Many different techniques have been developed to optimize the
backup procedure. These include optimizations for dealing with open files and
live data sources as well as compression, encryption, and de-duplication, among
others. Every backup scheme should include dry runs that validate the reliability
of the data being backed up. It is important to recognize the limitations and human
factors involved in any backup scheme.
_______________________________________________________________________________
28 - 57
Storage Media
Regardless of the repository model that is used, the data has to be stored on some
data storage medium somewhere.
1. Magnetic Tape
Magnetic tape has long been the most commonly used medium for bulk data
storage, backup, archiving, and interchange. Tape has typically had an order of
magnitude better capacity/price ratio when compared to hard disk, but recently the
ratios for tape and hard disk have become a lot closer. There are myriad formats,
many of which are proprietary or specific to certain markets like mainframes or a
particular brand of personal computer. Tape is a sequential access medium, so
even though access times may be poor, the rate of continuously writing or reading
data can actually be very fast. Some new tape drives are even faster than modern
hard disks. A principal advantage of tape is that it has been used for this purpose
for decades (much longer than any alternative) and its characteristics are well
understood.
2. Hard Disk
The capacity/price ratio of hard disk has been rapidly improving for many years.
This is making it more competitive with magnetic tape as a bulk storage medium.
The main advantages of hard disk storage are low access times, availability,
capacity and ease of use. External disks can be connected via local interfaces like
SCSI, USB, FireWire, or e SATA, or via longer distance technologies like
Ethernet, i SCSI, or Fibre Channel. Some disk-based backup systems, such as
Virtual Tape Libraries, support data deduplication which can dramatically reduce
the amount of disk storage capacity consumed by daily and weekly backup data.
The main disadvantages of hard disk backups are that they are easily damaged,
especially while being transported (e.g., for off-site backups), and that their
stability over periods of years is a relative unknown.
3. Optical Storage
Recordable CDs, DVDs, and Blu-ray Discs are commonly used with personal
computers and generally have low media unit costs. However, the capacities and
speeds of these and other optical discs are typically an order of magnitude lower
than hard disk or tape. Many optical disk formats are WORM type, which makes
them useful for archival purposes since the data cannot be changed. The use of an
auto-changer or jukebox can make optical discs a feasible option for larger-scale
backup systems. Some optical storage systems allow for cataloged data backups
without human contact with the discs, allowing for longer data integrity.
4. Floppy Disk
_______________________________________________________________________________
29 - 57
During the 1980s and early 1990s, many personal/home computer users associated
backing up mostly with copying to floppy disks. However, the data capacity of
floppy disks failed to catch up with growing demands, rendering them unpopular
and obsolete.
_______________________________________________________________________________
30 - 57
TASK 05
Contents
Page No
30
30
System bus
33
_______________________________________________________________________________
31 - 57
Processor Speed
Your computer's central processing unit (CPU), also known as a processor, can be
thought of as the brain of the computer. Fast processors typically offer better
performance than slower processors, and they are especially useful for running
multimedia programs, such as games or audio and video editing programs.
A computer's processor speed describes the maximum number of calculations per
second the processor can perform, and is given in megahertz (MHz) or gigahertz
(GHz). Generally, the larger the number, the faster and more powerful the
processor.
Processor Characteristics
Multiple issues
Multiple outstanding caches misses
On-chip cache controllers
Separate interface to the runway system bus
Cache characteristics
Direct mapped
Virtually indexed
Off-chip tag rams
Off-chip cache RAMs
Highly tuned CPU/cache interface
32 byte cache line size
RAM stands for Random Access Memory. RAM can be written to and read from.
All the data and programs are stored in RAM while in use. It is a good idea when
you buy a computer to get one with as much RAM as possible as this improves the
performance of your computer.
ROM stands for Read Only Memory. You cannot write anything to ROM. It holds
programs used when the computer is switched on that, if lost would make the
computer useless.
Differences between ROM and RAM
ROM
RAM
Table 5.1
Memory Organization
Memory is made up of lots of storage locations.
Each location can hold a word. A word is the term given to the number of bits that
can be processed by the computer in a single operation.
So the correct data can be found in main memory, each storage location has its
own unique address. This is just like each house having its own unique address so
that the postman can deliver letters to the right person. This concept is called
addressability.
External storage devices provide additional storage other than that available in
computer. Data can be transported easily from one place to another. It is useful to
store software and data that is not needed frequently. External storage also works
as data backup. This back up may prove useful at times such as fire or theft
because important data is not lost.
Magnetic storage
Cassette tape
Floppy disk
Optical storage
Optical media are the media that use laser light technology for data storage and
retrieval.
CD-ROM
CD-Recordable
CD-Rewritable
DVD stands for digital versatile disk. Its speed is much faster than CD but not as
fast as hard disk. The standard DVD-5 technology has a storage capacity of 4.7
GB. The storage capacity changes with the standard used. Its storage capacity (4.7
GB) is much higher than a CD (700 MB). It is achieved by a number of design
changes.
Flash Memory
Flash memory is what's called solid state memory. As opposed to hard drives,
which are made of spinning platters that store data and an arm that accesses the
platters to the read the data, flash memory is a single, solid chip with no moving
parts. Because of this, it's more durable, less likely to break or skip when dropped
or jostled, and transfers data at a faster speed. Flash memory is also much smaller
than a hard drive, often less than the size of a piece of gum and offering a smaller
weight.
_______________________________________________________________________________
34 - 57
As a result of its small size and light weight, it is often used in mobile devices
where those factors are at a premium. It is also beginning to be used in traditional
computers, like the Macbook Air.
For many years, Flash memory didn't afford large capacity storage at prices
competitive with hard drives. Advances in technology, and the benefits provided
by Flash memory, have combined to drive increases in the capacity of Flash
memory and reduce its cost.
Advantages of Flash Memory
Flash is very tough and will not break when dropped or exposed to heat (it is a
solid-state device)
It is very reliable as there are no moving parts, the data should be held for
decades.
It is very compact and can store gigabytes of data in a small space.
It is very fast. As there are no moving parts needed to get to the data it is much
quicker than hard disk or DVD.
Data can only be stored in chunks, typically 512 to 2048 Bytes at a time. This
means it is fine as a secondary storage method, just like floppy disks, hard
disks and DVD's but it is no good as main memory like RAM and ROM.
It does wear out over time. You can write to it roughly a million times before it
fails. In practice this is plenty for most applications.
Memory sticks
Jump Drives
Camera memory cards
Solid state hard drives
SYSTEM BUS
A system bus is a single computer bus that connects the major components of a
computer system. The technique was developed to reduce costs and improve
modularity. It combines the functions of a data bus to carry information, an
address bus to determine where it should be sent, and a control bus to determine
its operation. Although popular in the 1970s and 1980s, modern computers use a
variety of separate buses adapted to more specific needs
_______________________________________________________________________________
35 - 57
Given these changes, the classical terms "system", "expansion" and "peripheral"
no longer have the same connotations. Other common categorization systems are
based on the buses primary role, connecting devices internally or externally, PCI
vs. SCSI for instance. However, many common modern bus systems can be used
for both; SATA and the associated e SATA are one example of a system that would
formerly be described as internal, while in certain automotive applications use the
primarily external IEEE 1394 in a fashion more similar to a system bus.
Internal Bus
Internal bus, also known as internal data bus, memory bus or system bus or frontSide-Bus, connects all the internal components of a computer, such as CPU and
memory, to the motherboard. Internal data buses are also referred to as a local bus,
because they are intended to connect to local devices. This bus is typically rather
quick and is independent of the rest of the computer operations.
External Bus
The external bus, also known as expansion bus, is made up of the electronic
pathways that connect the different external devices, such as monitor, printer etc.,
to the computer.
To further confuse issues, it was common in the past to classify bus systems based
on the communications system they used, serial or parallel. Many modern systems
can operate in either mode, depending on the application.
_______________________________________________________________________________
36 - 57
TASK 06
Contents
Page No
Power supply
36
Display
36
Color capability
36
37
37
_______________________________________________________________________________
37 - 57
POWER SUPPLY
A power supply is a hardware component that supplies power to an electrical
device. It receives power from an electrical outlet and converts the current from
AC (alternating current) to DC (direct current), which is what the computer
requires. It also regulates the voltage to an adequate amount, which allows the
computer to run smoothly without overheating. The power supplies an integral
part of any computer and must function correctly for the rest of the components to
work.
You can locate the power supply on a system unit by simply finding the input
where the power cord is plugged in. Without opening your computer, this is
typically the only part of the power supply you will see. If you were to remove the
power supply, it would look like a metal box with a fan inside and some cables
attached to it. Of course, you should never have to remove the power supply, so
it's best to leave it in the case.
While most computers have internal power supplies, many electronic devices use
external ones. For example, some monitors and external hard drives have power
supplies that reside outside the main unit. These power supplies are connected
directly to the cable that plugs into the wall. They often include another cable that
connects the device to the power supply. Some power supplies, often called "AC
adaptors," are connected directly to the plug (which can make them difficult to
plug in where space is limited). Both of these designs allow the main device to be
smaller or sleeker by moving the power supply outside the unit.
DISPLAY
The display is usually considered to include the screen or projection surface and
the device that produces the information on the screen. In some computers, the
display is packaged in a separate unit called a monitor. In other computers, the
display is integrated into a unit with the processor and other parts of the computer.
(Some sources make the distinction that the monitor includes other signalhandling devices that feed and control the display or projection device. However,
this distinction disappears when all these parts become integrated into a total unit,
as in the case of notebook computers.) Displays (and monitors) are also
sometimes called video display terminals (VDTs). The terms display and monitor
are often used interchangeably.
COLOR CAPABILITY
Today, most desktop displays provide color. Notebook and smaller computers
sometimes have a less expensive monochrome display. Displays can usually
operate in one of several displays that determine how many bits are used to
describe color and how many colors can be displayed. A display that can operate
in Super VGA mode can display up to 16,777,216 colors because it can process a
_______________________________________________________________________________
38 - 57
24-bit long description of a pixel. The number of bits used to describe a pixel is
known as its bit-depth. The 24-bit bit-depth is also known as true color . It allows
eight bits for each of the three additive primary colors - red, green, and blue.
Although human beings can't really distinguish that many colors, the 24-bit
system is convenient for graphic designers since it allocates one byte for each
color. The Visual Graphics Array (VGA) mode is the lowest common denominator
of display modes. Depending on the resolution setting, it can provide up to 256
colors.
_______________________________________________________________________________
39 - 57
TASK 07
Contents
Page No
Testing of software
39
39
Testing levels
42
Test target
42
_______________________________________________________________________________
40 - 57
TESTING OF SOFTWARE
Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software testing
can also provide an objective, independent view of the software to allow the
business to appreciate and understand the risks of software implementation. Test
techniques include, but are not limited to, the process of executing a program or
application with the intent of finding software (errors or other defects).
Software testing can be stated as the process of validating and verifying that a
software program/application/product:
White-Box Testing
White-box testing is when the tester has access to the internal data structures and
algorithms including the code that implements these.
Test Coverage
White-box testing methods can also be used to evaluate the completeness of a test
suite that was created with black-box testing methods. This allows the software
team to examine parts of a system that are rarely tested and ensures that the most
important function points have been tested.
Two common forms of code coverage are:
Black-Box Testing
Black-box testing treats the software as a "black box"without any knowledge of
internal implementation. Black-box testing methods include: equivalence
partitioning, analysis, all, fuzz testing, model-based testing, exploratory testing
and specification-based testing.
Specification-based testing: Aims to test the functionality of software according
to the applicable requirements. Thus, the tester inputs data into, and only sees the
output from, the test object. This level of testing usually requires thorough test
cases to be provided to the tester, who then can simply verify that for a given
input, the output value (or behavior), either "is" or "is not" the same as the
expected value specified in the test case.
Specification-based testing is necessary, but it is insufficient to guard against
certain risks.
Advantages and disadvantages: The black-box tester has no "bonds" with the
code, and a tester's perception is very simple: a code must have bugs. Using the
principle, "Ask and you shall receive," black-box testers find bugs where
programmers do not. On the other hand, black-box testing has been said to be
"like a walk in a dark labyrinth without a flashlight," because the tester doesn't
_______________________________________________________________________________
42 - 57
know how the software being tested was actually constructed. As a result, there
are situations when (1) a tester writes many test cases to check something that
could have been tested by only one test case, and/or (2) some parts of the backend are not tested at all.
Therefore, black-box testing has the advantage of "an unaffiliated opinion", on the
one hand, and the disadvantage of "blind exploring", on the other.
Grey-Box Testing
Grey-box testing (American spelling: gray-box testing) involves having
knowledge of internal data structures and algorithms for purposes of designing
tests, while executing those tests at the user, or black-box level. The tester is not
required to have full access to the software's source code.] Manipulating input
data and formatting output do not qualify as grey-box, because the input and
output are clearly outside of the "black box" that we are calling the system under
test. This distinction is particularly important when conducting integration testing
between two modules of code written by two different developers, where only the
interfaces are exposed for test. However, modifying a data repository does qualify
as grey-box, as the user would not normally be able to change the data outside of
the system under test. Grey-box testing may also include reverse engineering to
determine, for instance, boundary values or error messages.
By knowing the underlying concepts of how the software works, the tester makes
better-informed testing choices while testing the software from outside. Typically,
a grey-box tester will be permitted to set up his testing environment; for instance,
seeding a database; and the tester can observe the state of the product being tested
after performing certain actions. For instance, in testing a database product he/she
may fire an SQL query on the database and then observe the database, to ensure
that the expected changes have been reflected. Grey-box testing implements
intelligent test scenarios, based on limited information. This will particularly
apply to data type handling, exception handling, and so on.
Visual Testing
The aim of visual testing is to provide developers with the ability to examine what
was happening at the point of software failure by presenting the data in such a
way that the developer can easily find the information he requires, and the
information is expressed clearly.
At the core of visual testing is the idea that showing someone a problem (or a test
failure), rather than just describing it, greatly increases clarity and understanding.
Visual testing therefore requires the recording of the entire test process capturing
everything that occurs on the test system in video format. Output videos are
supplemented by real-time tester input via picture-in-a-picture webcam and audio
commentary from microphones.
_______________________________________________________________________________
43 - 57
TESTING LEVELS
Tests are frequently grouped by where they are added in the software development
process, or by the level of specificity of the test. The main levels during the
development process as defined by the SWEBOK guide are unit-, integration-,
and system testing that are distinguished by the test target without implying a
specific process model. Other test levels are classified by the testing objective.
TEST TARGET
Unit Testing
Unit testing, also known as component testing refers to tests that verify the
functionality of a specific section of code, usually at the function level. In an
object-oriented environment, this is usually at the class level, and the minimal unit
tests include the constructors and destructors.
These types of tests are usually written by developers as they work on code
(white-box style), to ensure that the specific function is working as expected. One
function might have multiple tests, to catch corner cases or other branches in the
code. Unit testing alone cannot verify the functionality of a piece of software, but
_______________________________________________________________________________
44 - 57
rather is used to assure that the building blocks the software uses work
independently of each other.
Integration Testing
Integration testing is any type of software testing that seeks to verify the interfaces
between components against a software design. Software components may be
integrated in an iterative way or all together ("big bang"). Normally the former is
considered a better practice since it allows interface issues to be localized more
quickly and fixed.
Integration testing works to expose defects in the interfaces and interaction
between integrated components (modules). Progressively larger groups of tested
software components corresponding to elements of the architectural design are
integrated and tested until the software works as a system.
System Testing
System testing tests a completely integrated system to verify that it meets its
requirements.
_______________________________________________________________________________
45 - 57
TASK 08
Contents
Page No
Help desk
45
Helpline
45
_______________________________________________________________________________
46 - 57
HELP DESK
There are also in-house help desks geared toward providing the same kind of help
to a company's employees. Some schools offer classes in which they perform
similar tasks as a help desk. In the Information Technology Infrastructure Library,
within companies adhering to ISO/IEC 20000 or seeking to implement IT Service
Management best practice, a help desk may offer a wider range of user centric
services and be part of a larger Service Desk.
In a business enterprise, a help desk is a place that a user of information
technology can call to get help with a problem. In many companies, a help desk is
simply one person with a phone number and a more or less organized idea of how
to handle the problems that come in. In larger companies, a help desk may consist
of a group of experts using software to help track the status of problems and other
special software to help analyze problems (for example, the status of a company's
telecommunications network).
HELPLINE
A helpline is a telephone service which offers help to those who call. Many
helpline services now offer more than telephone support - offering access to
information, advice or customer service via telephone, email, web or SMS.
Increasingly often customers require a high quality, efficient support service 24
hours a day, regardless of their geographical location.
In order for the business to be able to develop properly it is essential that
customers and users perceive themselves to be receiving a rapid and customized
service that helps them by:
The point of contact with the customer may take various forms, depending on the
breadth and depth of the services offered:
Call Centre: The aim is to manage a high volume of calls and redirect users
(except in trivial cases) to other levels of support and/or sales.
The Help Desk: Its main objective is to provide a first line of supporting
resolving service interruptions as quickly as possible.
The Service Desk: This is customers' and users' interface with the whole range of
IT services offered by the organization focusing on business processes. Apart from
_______________________________________________________________________________
47 - 57
offering the services mentioned above, it provides customers, users and the IT
organization itself additional services such as:
_______________________________________________________________________________
48 - 57
TASK 09
Contents
Page No
Logical security
48
Type of authentication
48
49
Encryption
53
_______________________________________________________________________________
49 - 57
LOGICAL SECURITY
Logical Security consists of software safeguards for an organizations systems,
including user identification and password access, authentication, access rights
and authority levels. These measures are to ensure that only authorized users are
able to perform actions or access information in a network or a workstation. It is a
subset of computer security.
TYPE OF AUTHENTICATION
Token Authentication
Token Authentication comprises security tokens which are small devices that
authorized users of computer systems or networks carry to assist in identifying
that who is logging in to a computer or network system is actually authorized.
They can also store cryptographic keys and biometric data. The most popular type
of security token (RSAs Secure ID) displays a number which changes every
minute. Users are authenticated by entering a personal identification number and
the number on the token. The token contains a time of day clock and a unique seed
value, and the number displayed is a cryptographic hash of the seed value and the
_______________________________________________________________________________
50 - 57
time of day. The computer which is being accessed also contains the same
algorithm and is able to match the number by matching the users seed and time of
day. Clock error is taken into account, and values a few minutes off are sometimes
accepted. Another similar type of token (CRYPTO Card) can produce a value each
time a button is pressed. Other security tokens can connect directly to the
computer through USB, Smart card or Bluetooth ports, or through special purpose
interfaces. Cell phones and PDA's can also be used as security tokens with proper
programming.
Password Authentication
Password Authentication uses secret data to control access to a particular resource.
Usually, the user attempting to access the network, computer or computer program
is queried on whether they know the password or not, and is granted or denied
access accordingly. Passwords are either created by the user or assigned, similar to
usernames. However, once assigned a password, the user usually is given the
option to change the password to something of his/her choice. Depending on the
restrictions of the system or network, the user may change his/her password to any
alphanumeric sequence. Usually, limitations to password creation include length
restrictions, a requirement of a number, uppercase letter or special character, or
not being able to use the past four or five changed passwords associated with the
username. In addition, the system may force a user to change his/her password
after a given amount of time.
Two-Way Authentication
Two-Way Authentication involves both the user and system or network
convincing each other that they know the shared password without transmitting
this password over any communication channel. This is done by using the
password as the encryption key to transmit a randomly generated piece of
information, or the challenge. The other side must then return a similarly
encrypted value which is some predetermined function of the originally offered
information, his/her - response, which proves that he/she was able to decrypt the
challenge. Kerberos (a computer network authentication protocol) is a good
example of this, as it sends an encrypted integer N, and the response must be the
encrypted integer N + 1.
What type of information does the data contain? Data that doesn't seem
important to us may be very important to someone else. Thus, the type of
information the data contains can help us determine if we need to back up the
data - as well as when and how the data should be backed up.
How often does the data change? The frequency of change can affect the
decision on how often the data should be backed up. For example, data that
changes daily should be backed up daily.
Who will be responsible for the backup and recovery plan? Ideally,
someone should be a primary contact for the organization's backup and
recovery plan. This person may also be responsible for performing the actual
backup and recovery of data.
_______________________________________________________________________________
52 - 57
off-site storage location, we should also include copies of the software we may
need to install to reestablish operational systems.
_______________________________________________________________________________
53 - 57
Normal/full backups - All files that have been selected are backed up,
regardless of the setting of the archive attribute. When a file is backed up, the
archive attribute is cleared. If the file is later modified, this attribute is set,
which indicates that the file needs to be backed up.
Copy backups - All files that have been selected are backed up, regardless of
the setting of the archive attribute. Unlike a normal backup, the archive
attribute on files isn't modified. This allows you to perform other types of
backups on the files at a later date.
_______________________________________________________________________________
54 - 57
Daily backups - Designed to back up files using the modification date on the
file itself. If a file has been modified on the same day as the backup, the file
will be backed up. This technique doesn't change the archive attributes of files.
ENCRYPTION
Encryption is the conversion of data into a form, called a cipher text that cannot be
easily understood by unauthorized people. Decryption is the process of converting
encrypted data back into its original form, so it can be understood.
The use of encryption/decryption is as old as the art of communication. In
wartime, a cipher, often incorrectly called a code, can be employed to keep the
enemy from obtaining the contents of transmissions. (Technically, a code is a
means of representing a signal without the intent of keeping it secret; examples
_______________________________________________________________________________
55 - 57
are Morse code and ASCII.) Simple ciphers include the substitution of letters for
numbers, the rotation of letters in the alphabet, and the "scrambling" of voice
signals by inverting the sideband frequencies. More complex ciphers work
according to sophisticated computer algorithms that rearrange the data bits in
digital signals.
In order to easily recover the contents of an encrypted signal, the correct
decryption key is required. The key is an algorithm that undoes the work of the
encryption algorithm. Alternatively, a computer can be used in an attempt to break
the cipher. The more complex the encryption algorithm, the more difficult it
becomes to eavesdrop on the communications without access to the key.
Encryption/decryption is especially important in wireless communications. This is
because wireless circuits are easier to tap than their hard-wired counterparts.
Nevertheless, encryption/decryption is a good idea when carrying out any kind of
sensitive transaction, such as a credit-card purchase online, or the discussion of a
company secret between different departments in the organization. The stronger
the cipher -- that is, the harder it is for unauthorized people to break it -- the better,
in general. However, as the strength of encryption/decryption increases, so does
the cost.
In recent years, a controversy has arisen over so-called strong encryption. This
refers to ciphers that are essentially unbreakable without the decryption keys.
While most companies and their customers view it as a means of keeping secrets
and minimizing fraud, some governments view strong encryption as a potential
vehicle by which terrorists might evade authorities. These governments, including
that of the United States, want to set up a key-escrow arrangement. This means
everyone who uses a cipher would be required to provide the government with a
copy of the key. Decryption keys would be stored in a supposedly secure place,
used only by authorities, and used only if backed up by a court order. Opponents
of this scheme argue that criminals could hack into the key-escrow database and
illegally obtain, steal, or alter the keys. Supporters claim that while this is a
possibility, implementing the key escrow scheme would be better than doing
nothing to prevent criminals from freely using encryption/decryption.
_______________________________________________________________________________
56 - 57
REFERENCES
__________________________________________________________________
http://www.techterms.com/definition/mips
http://www.kitchentablecomputers.com/processor2.php
http://www.ehow.com/facts_7232619_processor-speed-performance.html
http://www.webopedia.com/term/c/CD_ROM.html
http://www.wisegeek.com/what-is-a-dvd-rom.htm
http://www.igcseict.info/theory/3/optic/index.html
http://tutor2u.net/business/ict/intro_information_data_storage.htm
http://www.techterms.com/definition/storagecapacity
http://www.scribd.com/doc/46461476/secondary-storage-devices
http://openbookproject.net/courses/intro2ict/hardware/peripherals.html
http://en.wikipedia.org/wiki/Computer_monitor
http://www.techterms.com/definition/vram
http://www.computerhope.com/jargon/p/printer.htm
http://en.wikipedia.org/wiki/Directory_structure
http://www.w3.org/2002/07/DIAT/posn/salzburg.html
http://en.wikipedia.org/wiki/Backup
http://searchstorage.techtarget.com/definition/solid-state-storage
__________________________________________________________________
_______________________________________________________________________________
57 - 57