Module 1
Module 1
Introduction
What is a Computer?
Definition:
A computer is an electronic machine that
1) Takes in data and instructions (input)
2) Works with the data (processing)
3) Puts out information (output)
A general-purpose machine that processes data according to a set of instructions
that are stored internally either temporarily or permanently.
A simple computer may look like this:
c --> output
Computer Generations
First-generation computers, starting with the UNIVAC I in 1951, used vacuum
tubes, and their memories were made of thin tubes of liquid mercury and magnetic
drums.
Second-generation systems in the late 1950s replaced tubes with transistors and
used magnetic cores for memories (IBM 1401, Honeywell 800). Size was reduced and
reliability was significantly improved.
Third-generation computers, beginning in the mid-1960s, used the first integrated
circuits (IBM 360, CDC 6400) and the first operating systems and DBMSs.
Starting in the mid-1970s, the fourth generation brought us computers made
entirely of chips. It spawned the microprocessor and personal computer. It introduced
distributed processing and office automation.
The fifth generation implies faster hardware and more sophisticated software that
uses artificial intelligence (AI) routinely. Natural language recognition is a major
component of the fifth generation.
What is Hardware and Software?
The computer and all equipment attached to it are called hardware. The
instructions that tell it what to do are called "software." A set of instructions that perform
a particular task is called a "program" or "software program."
Hardware is the physical medium, for example:
Circuit boards
Processors
Keyboard
Software is computer programs, for example:
Operating system
Editor
Compilers
A Fortran 90 program
Hardware Components
Input Devices -- "How to tell it what to do"
A keyboard and mouse are the standard way to interact with the computer. Other
devices include joysticks and game pads used primarly for games.
Output Devices -- "How it shows you what it is doing"
The monitor (the screen) is how the computer sends information back to you,
whether it be surfing the web or writing a memo. A printer is also an output device.
Storage Devices -- "How it saves data and programs"
Hard disk drives are an internal, higher capacity drive which you also stores the
operating system which runs when you power on the computer.
"Floppy" disk drives allow you to save work on small disks and take the data with you
Memory -- "How the processor stores and uses immediate data"
When you use a program, the computer loads a portion of the program from the
hard drive to the much faster memory (RAM). When you "save" your work or quit the
program, the data gets written back to the hard drive.
Microprocessors -- "The brain of the computer"
Scanners
Scanners "digitize" printed material (like photos and graphics) and save it to a
graphic file format (like .GIF or .JPG) for display on the computer.
Operating System
Introduction
Operating systems perform basic tasks, such as recognizing input from the
keyboard, sending output to the display screen, keeping track of files and
directories on the disk, and controlling peripheral devices such as disk drives and
printers.
The operating system is also responsible for security, ensuring that unauthorized
users do not access the system.
Multi-User: Allows two or more users to run programs at the same time. Some
operating systems permit hundreds or even thousands of concurrent users.
UNIX Introduction
What is UNIX?
UNIX is an operating system which was first developed in the 1960s, and
has been under constant development ever since.
UNIX systems also have a graphical user interface (GUI) similar to Microsoft
Windows which provides an easy to use environment.
Types of UNIX
There are many different versions of UNIX, although they share common similarities.
The most popular varieties of UNIX are Sun Solaris, GNU/Linux, and Macos X.
The kernel of UNIX is the hub of the operating system: it allocates time and
memory to programs and handles the filestore and communications in response to
system calls.
As an illustration of the way that the shell and the kernel work together, suppose
a user types rm myfile (which has the effect of removing the file myfile). The shell
searches the file store for the file containing the program rm, and then requests the
kernel, through system calls, to execute the program rm on myfile. When the process rm
myfile has finished running, the shell then returns the UNIX prompt % to the user,
indicating that it is waiting for further commands.
The Shell
The shell acts as an interface between the user and the kernel. When a user logs
in, the login program checks the username and password, and then starts another program
called the shell. The shell is a command line interpreter (CLI). It interprets the commands
the user types in and arranges for them to be carried out. Filename Completion - By
typing part of the name of a command, filename or directory and pressing the [Tab] key,
the shell will complete the rest of the name automatically. If the shell finds more than one
name beginning with those letters you have typed, it will beep, prompting you to type a
few more letters before pressing the tab key again. History - The shell keeps a list of the
commands you have typed in. If you need to repeat a command, use the cursor keys to
scroll up and down the list or type history for a list of previous commands.
Files and processes
Everything in UNIX is either a file or a process.
Directory and file creation and navigation: ls cd pwd mkdir rm rmdir cp find
touch
Text processing: echo cat grep sort uniq sed awk cut tr split printf
Introduction
Linux is a Unix-like computer operating system. Linux is one of the most
prominent examples of free software and open source development; its underlying source
code can be freely modified, used, and redistributed by anyone.[1]
The Linux kernel was first released to the public on 17 September 1991, for the
Intel x86 PC architecture.
The kernel was augmented with system utilities and libraries from the GNU
project to create a usable operating system, which later led to the alternate term
GNU/Linux.[2].
Properties of Linux
Linux is free:
If you want to spend absolutely nothing, you don't even have to pay the price of a
CD. Linux can be downloaded in its entirety from the Internet completely for free.
No registration fees, no costs per user, free updates, and freely available source
code in case you want to change the behavior of your system.
Linux is scalable:
From a Palmtop with 2 MB of memory to a petabyte storage cluster with
hundreds of nodes: add or remove the appropriate packages and Linux fits all.
Mac OSX
Introduction
Mac OS X Apple's Upcoming Mac OS X v10.5 ("Leopard")
The operating system was first released in 1999 as Mac OS X Server 1.0, with a
desktop-oriented version (Mac OS X v10.0) following in March 2001. Since then,
four more distinct "end-user" and "server" editions of Mac OS X have been
released, the most recent being Mac OS X v10.4, which was first made available
in April 2005. Releases of Mac OS X are named after big cats; Mac OS X v10.4
is usually referred to by Apple and users as "Tiger". In October 2007, Apple will
release Mac OS X 10.5, nicknamed "Leopard".
No one knows exactly how many computers are connected to the Internet.
All computers on the Internet communicate with one another using the
Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP.
10
each other to exchange data using a common software standard. Through telephone
wires and satellite links, Internet users can share information in a variety of forms.
The size, scope and design of the Internet allows users to:
During the next two decades, the network that evolved was used primarily by
academic institutions, scientists and the government for research and
communications.
The nature of the Internet changed abruptly in 1992, when the U.S. government
began pulling out of network management, and commercial entities offered
Internet access to the general public for the first time.
11
File Transfer Protocol (FTP), a system for storing and retrieving data files on
large computer systems.
Internet Relay Chat (IRC), a system for sending public and private messages
to
other users in "real time"that is, your message appears on the recipient's screen
as soon as you type it.
The World Wide Web, The World Wide Web provides a single interface for
accessing all these protocols.
12
Large universe of documents: Anyone can publish a Web page - and nearly
anyone has! No matter what obscure information you want to find, there is bound
to be someone out there who has written a Web page about it.
Application of internet
1. Electronic mail
2. File transfer
3. Interactive collaboration
4. Real-time broadcasting
5. Breaking news
6. Shopping opportunities
7. Multimedia displays
Network
A network is a number of computers connected together to share information and
hardware.
LAN, WAN and Other Area Networks
One way to categorize the different types of computer network designs is by their
scope or scale. For historical reasons, the networking industry refers to nearly every type
of design as some kind of area network. Common examples of area network types are:
LAN - Local Area Network, WLAN - Wireless Local Area Network,
WAN - Wide Area Network, MAN - Metropolitan Area Network,
SAN - Storage Area Network, CAN - Campus Area Network, PAN - Personal Area
Network, DAN - Desk Area Network.
A LAN (local area network) is a group of computers and network device
connected together, usually within the same building. By definition, the connections must
be high speed and relatively inexpensive (e.g., token ring or Ethernet). A WAN (wide
area network), in comparison to a MAN, is not restriced to a geographical location,
although it might be confined within the bounds of a state or country. A WAN connects
13
Scanners
Scanners are peripheral devices used to digitize (convert to electronic format)
artwork, photographs, text, or other items from hard copy. In a sense, a scanner works as
a pair of eyes for your PC. Your eyes see an image and translate the image into electrical
impulses that travel to and are interpreted by your brain. Similarly, a scanner captures
images and converts them to digital data that travel to and are interpreted by the
computer.
A scanner works by dividing an image into microscopic rows and columns and
measuring, like the film in a camera, how much light (or lack thereof) reflects from each
individual intersection of the rows and columns. Each reflection is recorded as a dot, or
picture element (pixel). After the scanner collects information from each dot, it compiles
the result into a digital file on the computer.
There are a wide variety of scanners that work in a number of different ways, but
the technology behind them is essentially the same.
More popular types of scanners
Flatbed Scanners
Flatbed scanners look and behave a lot like a photocopier. You lay the item to be
scanned on a glass plate and the scanning head passes below the glass.
Flatbed scanners are very versatile: you can scan objects in a variety of sizes and
shapes, including pages from a book, without damaging the original. While flatbed
scanners are the best choice for a wide variety of uses, if you plan to do a lot of text
scanning (called OCR for Optical Character Recognition) work, keep in mind that
flatbeds only accommodate one page at a time. Scanning multi-page documents can be a
slow, tedious process, because you have to manually remove one page and insert the next.
14
Sheetfed Scanners
Sheetfed scanners look and act more like fax machines. The page or item is fed
into the machine, scanned, then spit out on the other end . A sheetfed scanner is a good
choice for large volumes of text, but not for handling delicate original photographs.
Scanning directly from a book or other three-dimensional object is impossible.
Hand Scanners
Hand scanners are a low-cost alternative to their larger, more sophisticated
cousins. As their name implies, hand scanners are manual devices you move over a flat
surface, just as you do your PC's mouse
The hand scanner's advantages are many, but so are its disadvantages. Generally,
hand scanners work best for small, uncomplicated images such as company logos or
small black-and-white photographs. You might want a hand scanner if you don't plan to
use it on a regular basis, because it usually doesn't require adding internal cards to your
CPU, and it's easily disconnected and stored away. Most hand scanners can only scan a
four-inch wide image at one time and require a steady hand. You're usually provided with
software that helps you "sew up" a series of these 4-inch, side-by-side scans into one
image, but this is obviously not as convenient as getting the full image at once.
NOTE: Other types of scanners also exist, such as barcode readers (like the ones at the
grocery checkout) and slide scanners; however, because these are specialty items
primarily used for commercial purposes, they are not covered here.
Color versus Grayscale Scanners
Scanners that can scan images in full color have become much more popular as
their prices have dropped. Just a few years ago, color scanners cost several thousands of
dollars, but can now be bought for a few hundred, depending on resolution and type.
15
Even so, grayscale (meaning shades of black and white only, no color) scanners
are still available and are significantly cheaper. In many cases, they are perfectly
adequate for the average user. Unless you have a color printer, or use your scanner to
create artwork that will only be viewed on-screen (such as for a Web page), there's no
point in having a color scanner. Consider this carefully before buying; however, what you
think you'll never do now could change as you grow more experienced and interested in
computer technology.
VIRUS
A program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
Viruses can also replicate themselves. All computer viruses are manmade.
A simple virus that can make a copy of itself over and over again is relatively
easy to produce.
Even such a simple virus is dangerous because it will quickly use all available
memory and bring the system to a halt.
An even more dangerous type of virus is one capable of transmitting itself across
networks and bypassing security systems.
A worm is similar to a virus by its design, and is considered to be a sub-class of a
virus. Worms spread from computer to computer, but unlike a virus, it has the capability
to travel without any help from a person.
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it
was named after. The Trojan Horse, at first glance will appear to be useful software but
will actually do damage once installed or run on your computer.
Computer Maintenance
The role of software development
Because software is often designed with security features to prevent unauthorized
use of system resources, many viruses must exploit software bugs in a system or
16
17
Recovery methods
Once a computer has been compromised by a virus, it is usually unsafe to continue
using the same computer without completely reinstalling the operating system. However,
there are a number of recovery options that exist after a computer has a virus. These
actions depend on severity of the type of virus.
Virus removal
One possibility on Windows XP is a tool known as System Restore, which
restores the registry and critical system files to a previous checkpoint. Often a virus will
cause a system to hang, and a subsequent hard reboot will render a system restore point
from the same day corrupt. Restore points from previous days should work provided the
virus is not designed to corrupt the restore files. Some viruses, however, disable system
restore and other important tools such as Task Manager and Command Prompt. Examples
of viruses that do this would be CiaDoor.
Operating system reinstallation
As a last ditch effort, if a virus is on your system and anti-viral software can't
clean it, then reinstalling the operating system may be required. To do this properly, the
hard drive is completely erased (partition deleted and formatted) and the operating system
is installed from media known not to be infected. Important files should first be backed
up, if possible, and separately scanned for infection before erasing the original hard drive
and reinstalling the operating system.
18