Information Technology Paper - 6
Information Technology Paper - 6
UNIT – 1 & 2
UNIT- 1
Computer components are divided into two major categories namely hardware and software.
Hardware is the machine itself and its connected devices such as monitor, keyboard, mouse etc.
Software are the set of programs that make use of hardware for performing various functions.
CHARACTERISTICS OF COMPUTERS
Speed
Computers work at an incredible speed. A powerful computer is capable of performing about 3-4
million simple instructions per second.
Accuracy
In addition to being fast, computers are also accurate. Errors that may occur can almost always be
attributed to human error (inaccurate data, poorly designed system or faulty instructions/programs
written by the programmer)
Diligence
Unlike human beings, computers are highly consistent. They do not suffer from human traits of
boredom and tiredness resulting in lack of concentration. Computers, therefore, are better than
human beings in performing voluminous and repetitive jobs.
Versatility
Computers are versatile machines and are capable of performing any task as long as it can be broken
down into a series of logical steps. The presence of computers can be seen in almost every sphere –
Railway/Air reservation, Banks, Hotels, Weather forecasting and many more.
Storage Capacity
Today’s computers can store large volumes of data. A piece of information once recorded (or stored)
in the computer, can never be forgotten and can be retrieved almost instantaneously.
The term hardware refers to the physical components of your computer such as the system unit,
mouse, keyboard, monitor etc.
The software is the instructions that makes the computer work.
Software is held either on your computer’s hard disk, CD-ROM, DVD or on a diskette (floppy disk)
and is loaded (i.e. copied) from the disk into the computers RAM (Random Access Memory), as and
when required
Hardware Components
Input Devices -- "How to tell it what to do“ - A keyboard and mouse are the standard way to interact
with the computer. Other devices include joysticks and game pads used primarily for games.
Output Devices -- "How it shows you what it is doing" - The monitor (the screen) is how the
computer sends information back to you. A printer is also an output device.
INPUT DEVICES
The Mouse
The Keyboard The keyboard is still the commonest way of entering information into a computer
Tracker Balls an alternative to the traditional mouse and often used by graphic designers
INPUT DEVICES
Scanners A scanner allows you to scan printed material and convert it into a file format that may be
used within the PC
Touch Pads A device that lays on the desktop and responds to pressure Light Pens Used to allow
users to point to areas on a screen
Joysticks Many games require a joystick for the proper playing of the game
OUTPUT DEVICES
VDU The computer screen is used for outputting information in an understandable format
Printers There are many different types of printers. In large organizations laser printers are most
commonly used due to the fact that they can print very fast and give a very high quality output.
Plotters
A plotter is an output device similar to a printer, but normally allows you to print larger images.
Speakers
The full form of CPU is Central Processing Unit. Alternatively, it is also known by the name
of processor, microprocessor or a computer processor. A CPU is an electronics circuit used in a
computer that fetches the input instructions or commands from the memory unit, performs
arithmetic and logic operations and stores this processed data back to memory.
A CPU or Central Processing Unit is the heart of a computer and is installed in a socket specified on
a motherboard. Since a CPU performs a lot of calculations at a high speed, it gets heat up quickly. To
cool down the temperature of a CPU a cooling FAN is installed on it.
Control Unit
The Control Unit is an internal part of a CPU that co-ordinates the instructions and data flow
between CPU and other components of the computer. It is the CU that directs the operations of a
central processing unit by sending timing and control signals.
Data(operands) to be operated
When all the instructions have been operated, the output that consists of data is stored in memory
and a status information is stored in internal registers of a CPU.
Working of a CPU
All the CPUs regardless of their origin or type performs a basic instruction cycle that consists of three
steps named Fetch, decode and Execute
Fetch
IT4nextgen > Computer Hardware > What is a CPU? Definition and Working [with Block Diagram]
The full form of CPU is Central Processing Unit. Alternatively, it is also known by the name
of processor, microprocessor or a computer processor. A CPU is an electronics circuit used in a
computer that fetches the input instructions or commands from the memory unit, performs
arithmetic and logic operations and stores this processed data back to memory.
A CPU or Central Processing Unit is the heart of a computer and is installed in a socket specified on
a motherboard. Since a CPU performs a lot of calculations at a high speed, it gets heat up quickly. To
cool down the temperature of a CPU a cooling FAN is installed on it.
Components of a CPU
Control Unit
The Control Unit is an internal part of a CPU that co-ordinates the instructions and data flow
between CPU and other components of the computer. It is the CU that directs the operations of a
central processing unit by sending timing and control signals.
The ALU is an internal electronic circuitry of a CPU that performs all the arithmetic and logical
operations in a computer. The ALU receives three types of inputs.
Data(operands) to be operated
When all the instructions have been operated, the output that consists of data is stored in memory
and a status information is stored in internal registers of a CPU.
Working of a CPU
All the CPUs regardless of their origin or type performs a basic instruction cycle that consists of three
steps named Fetch, decode and Execute
Fetch
A program consists of a number of instructions. Various programs are stored in memory. During
this step, the CPU reads instruction that is to be operated from a particular address in the memory.
The program counter of CPU keeps the record of address of the instructions.
Decode
A circuitry called instruction decoder decodes all the instructions fetched from the memory. The
instructions are decoded to various signals that control other areas of CPU.
Execute
In the last step, the CPU executes the instruction. For example, it stores a value in the particular
register and the instruction pointer then points to other instruction that is stored in next address
location.
Clock Speed
The speed of processor is measured by the number of clock cycles a CPU can perform in a second.
The more the number of clock cycles, the more number of instructions (calculations) it can carry out.
The CPU speed is measured in Hertz. Modern Day processors have speed units of GHz. ( 1GHz=1
million thousand cycles per second).
CPU Manufacturers
There are two types of storage device: secondary storage device and primary storage device
A secondary storage device has a larger storage capacity and can store data permanently. The device
can be both external and internal to a computer and includes; compact disk, USB drive, hard disk,
etc.
Data Loss. Intentional and accidental file deletion can make one to lose precious data. Data recovery
programs provide a solution for lost files, deleted data, corrupt documents and hidden files. In the
event of a data loss scenario, a reliable data recovery software can be used to retrieve back 70% of
the lost data.
Step by Step on how to recover Storage devices files with “Disk Drill Storage device recovery
software.”
Download Disk Drill to your computer (choose between Mac OS X and Windows platform).
Install the software. The installation process is quite fast and will take you only some few minutes.
If you want to recover deleted files on an external storage device, connect the device to your
computer using a USB cable. Make sure the device drive is scan-able and is recognized by your
computer operating system.
Launch Disk Drill. On the data recovery tab, Disk Drill will display all drives and devices connected to
your PC. Locate the drive or device that you want to recover data from and click on the “recovery”
button next to it.
Disk Drill will perform a quick scan that will search for lost files and documents on your storage
device. All recoverable files will be displayed on your screen.
Choose all the files that you want to recover back and save them on your PC drive.
Computer programming language, any of various languages for expressing a set of detailed
instructions for a digital computer.
Such instructions can be executed directly when they are in the computer manufacturer-specific
numerical form known as machine language, after a simple substitution process when expressed in a
corresponding assembly language, or after translation from some “higher-level” language.
.
Language Types
A machine language consists of the numeric codes for the operations that a particular computer can
execute directly. The codes are strings of 0s and 1s, or binary digits (“bits”), which are frequently
converted both from and to hexadecimal (base 16) for human viewing and modification. Machine
language instructions typically use some bits to represent operations, such as addition, and some to
represent operands, or perhaps the location of the next instruction. Machine language is difficult to
read and write, since it does not resemble conventional mathematical notation or human language,
and its codes vary from computer to computer.
Algorithmic languages
Algorithmic languages are designed to express mathematical or symbolic computations. They can
express algebraic operations in notation similar to mathematics and allow the use of subprograms
that package commonly used operations for reuse. They were the first high-level languages.
FORTRAN
FORTRAN made it convenient to have subprograms for common mathematical operations, and built
libraries of them.
FORTRAN was also designed to translate into efficient machine language. It was immediately
successful and continues to evolve.
ALGOL
ALGOL (algorithmic language) was designed by a committee of American and European computer
scientists during 1958–60 for publishing algorithms, as well as for doing computations.
Like LISP (described in the next section), ALGOL had recursive subprograms—procedures that
could invoke themselves to solve a problem by reducing it to a smaller problem of the same kind.
ALGOL introduced block structure, in which a program is composed of blocks that might contain
both data and instructions and have the same structure as an entire program. Block structure
became a powerful tool for building large programs out of small components.
LISP (list processing) was developed about 1960 by John McCarthy at the Massachusetts Institute of
Technology (MIT) and was founded on the mathematical theory of recursive functions (in which a
function appears in its own definition).
A LISP program is a function applied to data, rather than being a sequence of procedural steps as in
FORTRAN and ALGOL. LISP uses a very simple notation in which operations and their operands are
given in a parenthesized list. For example, (+ a (* b c)) stands for a + b*c. Although this appears
awkward, the notation works well for computers. LISP also uses the list structure to represent data,
and, because programs and data use the same structure, it is easy for a LISP program to operate on
other programs as data.
Business-oriented languages
COBOL
COBOL (common business oriented language) has been heavily used by businesses since its
inception in 1959.
COBOL uses an English-like notation—novel when introduced. Business computations organize and
manipulate large quantities of data, and COBOL introduced the record data structure for such tasks.
A record clusters heterogeneous data such as a name, ID number, age, and address into a single unit.
This contrasts with scientific languages, in which homogeneous arrays of numbers are common.
Records are an important example of “chunking” data into a single object, and they appear in nearly
all modern languages.
Data Communication:
When we communicate, we are sharing information. This sharing can be local or remote. Between
individuals, local communication usually occurs face to face, while remote communication takes
place over distance
Components: A data communications system has five components.
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation,
telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels
from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement
between the communicating devices. Without a protocol, two devices may be connected but not
communicating, just as a person speaking French cannot be understood by a person who speaks only
Japanese.
Q) NETWORK?
A network is a set of devices (often referred to as nodes) connected by communication links. A node
can be a computer, printer, or any other device capable of sending and/or receiving data generated
by other nodes on the network.
Generally called LANs, are privately-owned networks within a single building or campus of up to a
few kilometres in size. They are widely used to connect personal computers and workstations in
company offices and factories to share resources (e.g., printers) and exchange information.
LANs are distinguished from other kinds of networks by three characteristics: (1) Their size, (2) Their
transmission technology, and (3) Their topology.
LANs are restricted in size, which means that the worst-case transmission time is bounded and
known in advance. Knowing this bound makes it possible to use certain kinds of designs that would
not otherwise be possible. It also simplifies network management.
A metropolitan area network, or MAN, covers a city. The best-known example of a MAN is the cable
television network available in many cities.
This system grew from earlier community antenna systems used in areas with poor over-the-air
television reception. In these early systems, a large antenna was placed on top of a nearby hill and
signal was then piped to the subscribers' houses.
At first, these were locally-designed, ad hoc systems. Then companies began jumping into the
business, getting contracts from city governments to wire up an entire city.
Wide Area Network: A wide area network, or WAN, spans a large geographical area, often a country
or continent. It contains a collection of machines intended for running user (i.e., application)
programs. These machines are called as hosts.
The hosts are connected by a communication subnet, or just subnet for short. The hosts are owned
by the customers (e.g., people's personal computers), whereas the communication subnet is
typically owned and operated by a telephone company or Internet service provider.
Internet, a system architecture that has revolutionized communications and methods of commerce
by allowing various computer networks around the world to interconnect.
Sometimes referred to as a “network of networks,” the Internet emerged in the United States in the
1970s but did not become visible to the general public until the early 1990s.
By 2015, approximately 3.2 billion people, or nearly half of the world’s population, were estimated
to have access to the Internet.
ONLINE TRUST ?
Trust is a social, economic and political binding agent. A vast research literature on trust and “social
capital” documents the connections between trust and personal happiness, trust and
other measures of well-being, trust and collective problem solving, trust and economic
development and trust and social cohesion.
We didn’t focus on how you could wreck this system intentionally [when designing the
internet].VINTON CERF
Trust has not been having a good run in recent years, and there is considerable concern that
people’s uses of the internet are a major contributor to the problem. For starters, the internet
was not designedwith security protections or trust problemsin mind.
“We didn’t focus on how you could wreck this system intentionally.” (Cerf is a respondent to the
question addressed in this report; his worried quote is featured here.)
Moreover, the rise of the internet and social media has enabled entirely new kinds of relationships
and communities in which trust must be negotiated with others whom users do not see, with
faraway enterprises, under circumstances that are not wholly familiar, in a world exploding with
information of uncertain provenance used by actors employing ever-proliferating strategies to
capture users’ attention. In addition, the internet serves as a conduit for the public’s privacy to be
compromised through surveillance and cyberattacksand additional techniques for them to fall victim
to scams and bad actors.
If that were not challenging enough, the emergence of trust-jarring digital interactions has also
coincided with a sharp decline in trust for major institutions, such as government(and Congress and
the presidency), the news media, public schools, the church and banks.
Q) DATA PROCESSING & FORMATTING?
Data processing, Manipulation of data by a computer. It includes the conversion of raw data to
machine-readable form, flow of data through the CPU and memory to output devices, and
formatting or transformation of output.
Any use of computers to perform defined operations on data can be included under data
processing. In the commercial world, data processing refers to the processing of data required to run
organizations and businesses.
DISK FORMATTING
Disk formatting is the configuring process of a data storage media such as a hard disk drive, floppy
disk or flash drive for initial usage.
Any existing files on the drive would be erased with disk formatting. Disk formatting is usually done
before initial installation or before installation of a new operating system. Disk formatting is also
done if there is a requirement for additional storage in the computer.