Introduction To Computers 1.1 History of Computers
Introduction To Computers 1.1 History of Computers
INTRODUCTION TO COMPUTERS
1.1.1 Introduction
The Slide Rule was invented by William Oughtred. It is based on the principle
that actual distance from the starting point of the rule is directly proportional
to the logarithm of the numbers printed on the rule. The slide rule is
embodied by the two sets of scales that are joined together, with a marginal
space between them. The suitable alliance of two scales enabled the slide
rule to perform multiplication and division by a method of addition and
subtraction.
The first generation of computers used vacuum tubes for circuitry and
magnetic drums for memory. They were large in size, occupied a lot of
space and produced enormous heat.
They were very expensive to operate and consumed large amount of
electricity. Sometimes the heat generated caused the computer to
malfunction. First generation computers operated only on machine language.
Input was based on punched cards and paper tape, and output was
displayed on printouts. First generation computers could solve only one
problem at a time.
The development of the integrated circuit left its mark in the third
generation of computers. Transistors were made smaller in size and placed
on silicon chips, which dramatically increased the speed and efficiency of
computers.
•Stored facts
•Inactive
•Technology based
•Gathered from various sources.
Hence information is
•Processed facts
•Active
•Business based
•Transformed from data.
The programmer must decide the program requirements, develop logic and
write instructions for the computer in a programming language that the
computer can translate into machine language and execute. Hence, problem
solving is an act of defining a problem, understanding the problem and
arriving at workable solutions.
In other words, problem solving is the process of confronting a novel
situation, formulating connection between the given facts, identifying the
goal of the problem and exploring possible methods for reaching the goal. It
requires the programmer to co-ordinate previous experience and intuition in
order to solve the problem.
1.3.1 Introduction
Main Secondary
Memory Storage
� The Processor, more formally known as the central processing unit (CPU),
has the electronic circuitry that manipulates input data into the information
as required. The central processing unit actually executes computer
instructions.
� Memory from which the CPU fetches the instructions and data is called main
memory. It is also called as primary memory and is volatile in nature.
� Storage usually means secondary storage, which stores data and programs.
Here the data and programs are permanently stored for future use.
Computer Software
Application Software
System Software
Hardware
1.4.1 Introduction
Analog Computers
Digital Computers
Digital computers are made for both general purpose and special
purpose. Special purpose computer is one that is built for a specific
application. General purpose computers are used for any type of
applications. It can store different programs and do the jobs as per the
instructions specified on those programs. Most of the computers that we see
fall in this category.
Hybrid Computers
A hybrid computing system is a combination of desirable features of
analog and digital computers. It is mostly used for automatic operations
of complicated physical processes and machines. Now-a-days analog-to-
digital and digital-to-analog converters are used for transforming the data
into suitable form for either type of computation.
Super Computers
The mightiest computers but at the same time, the most expensive
ones are known as super computers. Super computers process billions of
instructions per second. In other words, super computers are the computers
normally used to solve intensive numerical computations. Examples of such
applications are stock analysis, special effects for movies, weather
forecasting and even sophisticated artworks.
Mainframe Computers
Mini Computers
The mini computers were developed with the objective of bringing out low cost
computers. They are lower to mainframe computers, in terms of speed and
storage capacity. Some of the hardware features available in mainframes
were not included in the mini computer hardware in order to reduce the
cost. Some features which were handled by hardware in mainframe
computers were done by software in mini computers. Hence the performance
of mini computer is less than that of the mainframe. However, the mini
computer market has diminished somewhat as buyers have moved towards
less expensive but increasingly powerful personal computers.
Micro Computers
Workstations
Workstations are also desktop machines mainly used for intensive
graphical applications. They have more processor speed than that of
personal computers.
NUMBER SYSTEMS
2.1 Introduction
There are several kinds of data such as, numeric, text, date, graphics,
image, audio and video that need to be processed by a computer. The text
data usually consist of standard alphabetic, numeric, and special characters.
The graphics data consist of still pictures such as drawings and
photographs. Any type of sound, including music and voice, is considered
as audio data. Video data consist of motion pictures. The data has to be
converted into a format that the computer understands. Data can be
classified into two forms, analog data and digital data. Analog data can have
any value within a defined range and it is continuous. Sound waves,
telephone signals, temperatures and all other signals that are not broken into
bits are examples of analog data. Digital data can be represented by a series
of binary numbers and it is discrete.
The Arithmetic and Logic Unit (ALU) of the computer performs arithmetic
and logical operations on data. Computer arithmetic is commonly performed
on two different types of numbers, integer and floating point. As the
hardware required for arithmetic is much simpler for integers than floating
point numbers, these two types have entirely different representations. An
integer is a whole number and the floating-point number has a fractional
part. To understand about how computers store data in the memory and
how they handle them, one must know about bits and bytes and the number
systems.
Bits and bytes are common computer jargons. Both the main memory
(Random Access Memory or RAM) and the hard disk capacities are
measured in terms of bytes. The hard disk and memory capacity of a
computer and other specifications are described in terms of bits and bytes.
For instance, a computer may be described as having a 32-bit Pentium
processor with 128
Megabytes of RAM and hard disk capacity of 40 Gigabytes.
2.2 Bits and Bytes
A bit is small piece of data that is derived from the words “binary
digit”. Bits have only two possible values, 0 and 1. A binary number
contains a sequence of 0s and 1s like 10111. A collection of
8 bits is called as a byte. With 8 bits in a byte, we can represent 256
values ranging from 0 to 255 as shown below:
0 = 0000
1 = 0000
2 = 0001
0000
3 = 0010
0000
0011 ………….
………….
………….
948.23 10
= 9 X 102 + 4 X 101 + 8 X 100 + 2 X 10-1 + 3 X 10-2
10111 10 X 24 + 0 X 23 + 1 X 22 + 1 X 21 + 1 X 20=
2 =1
16 + 0 + 4 + 2 + 1= 23
The decimal equivalent of the fractional binary sequence can be
estimated in the same manner. The exponents are negative powers of two for
digits on the right side of the binary point. The binary equivalent of the
decimal point is the binary point. Thus the decimal value of the
fractional binary sequence 0.1011 2 is:
0.1011
2
= 1 X 2-1 + 0 X 2-2 + 1 X 2-3 + 1 X 2-4
= 0.5 + 0 + 0.125 + 0.0625
= 0.6875
10
0000 = 0 1000 = 8
0001 = 1 1001 = 9
0010 = 2 1010 = A
0011 = 3 1011 = B
0100 = 4 1100 = C
0101 = 5 1101 = D
0110 = 6 1110 = E
0111 = 7 1111 = F
= 2 X 161 + C X 160
2C16
= 32 + 12
10
= 44
The hexadecimal representation is more compact than binary
representation. It is very easy to convert between binary and hexadecimal
systems. Each hexadecimal digit will correspond to four binary digits
because 24 = 16. The hexadecimal equivalent of
the binary sequence 110010011101 2
is:
ie., M = 2 * 1M +
1
r r1 = 0 or 1
ie., 1 M = 2 * M + = 0 or 1
r 2 2 r2
so that 2 M = 2 (2 * M +r)+r 2 1
2
2 M + r * 21 + r * 20
= 2
3
2 1
M = 1 * 2k + r k * 2k-1 + …. * 22 + * 21 + r * 20
+ r 3
r 2 1
Example:
Quotient Remainder
23/2 11 1 (LSB)
11/2 5 1
5/2 2 1
2/2 1 0
1/2 0 1 (MSB)
2310 = 10111
2
The number of bits in the binary number is the exponent of the smallest
power of 2 that is larger than the decimal number. Consider a decimal
number 23. Find the exponent of the smallest power of 2 that is larger than
23.
16 < 23 < 32
24 < 23 < 25
Hence, the number 23 has 5 bits as 10111. Consider another example.
Find the number of bits in the binary representation of the decimal
number 36 without actually converting into its binary equivalent.
32 < 36 < 64
25 < 36 < 26
b. Set the 32’s bit to 1 and subtract 32 from the original number.
36 – 32 = 4
c. 16 is greater than the remaining total. Therefore, set the 16’s bit to 0
d. 8 is greater than the remaining total. Hence, set the 8’s bit to 0 e. As the
remaining value is itself in powers of 2, set 4’s bit to 1
and subtract 4
4–4=0
32 16 8 4 2 1
1 36 – 32 = 4
32 16 8 4 2 1
1 0 0 1 4–4= 0
32 16 8 4 2 1
1 0 0 1 0 0 36
10 = 100100
2
Example:
64 32 16 8 4 2 1
1 91-64 = 27 64 32 16 8 4 2 1
1 0 1 91-(64+16) = 11
(Since 32 > 27, set the 32’s bit 0 and 16 < 27. set the 16’s bit 1)
64 32 16 8 4 2 1
1 0 1 1 91-(64+16+8) = 3
64 32 16 8 4 2 1
1 0 1 1 0 1 91-(64+16+8+2) = 1
64 32 16 8 4 2 1
1 0 1 1 0 1 1 91-(64+16+8+2+1) = 0
Hence 9110 = 1011011
2
2.7 Conversion of fractional decimal to binary
The decimal fractions like 1/2, 1/4, 1/8 etc., can be converted into exact
binary fractions. Sum of powers method can be applied to these fractions.
0.5
10 = 1 * 2-12 = 0.1
0.25
10 = 0 * 2-1 + 1 * 22-2 = 0.01
0.125
10 = 0 * 2-1 + 0 * 2-2 + 1 *2 2-3 = 0.001
The fraction 5/8 = 4/8 + 1/8 = 1/2 + 1/8 has the binary equivalent:
· Multiply the decimal fraction by 2 and note the integer part. The
integer part is either 0 or 1.
0.2 * 2 = 0.4 0
Read the integer parts from top to bottom to obtain the equivalent
fractional binary number. Hence 0.2 10 = 0.00110011…
2
The exponent of the smallest power of 16 that is greater than the given
decimal number will indicate the number of hexadecimal digits that will be
present in the converted hexadecimal number. For example, the decimal
number 948, when converted into hexadecimal number has 3 hexadecimal
digits.
Example:
Process quotient remainder
948 / = 59 4(LSB)
16
59 / 16 = 3 11 (B)
3 / 16 = 0 3 (MSB)
948= 3B4
10 16
7 * 82 + 1 * 81 + 1 * 80 =
10 457
Quotient Remainder
64/8 8 0 (LSB)
8/8 1 0
1/8 0 1 (MSB)
0100 = +4
1100 = -4
This method does not change the sign of the number by simply changing
a single bit (MSB) in its representation. The 2’s-complement method used
with -ve numbers only is as follows:
a. Invert all the bits in the binary sequence (ie., change every 0 to1 and every
1 to 0 ie.,1’s complement)
b. Add 1 to the result
This method works well only when the number of bits used by the system
is known in the representation of the number. Care should be
taken to pad (fill with zeros) the original value out to the full representation
width before applying this algorithm.
Example:
Wrong approach:
The binary equivalent of 23 is 10111. Invert all the bits => 01000
Add 1 to the result => 01001
Pad with zeros to make 8-bit pattern => 00001001 => +9
Right approach:
Step 1: Copy the bits from right to left, through and including the first 1.
Example 1:
As per step2, copy the inverse of the remaining bits => 1 100 => -4
Example 2:
00010111
As per step 1: 1
11100110 2 = 230
10
11100110 2 = -26
10 (after 2’s complement and add negative sign).
When comparing two binary numbers for finding which number is
greater, the comparison depends on whether the numbers are considered as
signed or unsigned numbers.
Example:
X = 1001
Y = 0011
Is ( X > Y) /* Is this true or false? */
It depends on whether X and Y are considered as signed or unsigned. If X
and Y are unsigned:
X is greater than Y
If X and Y are signed: X is less than Y.
In case of a signed integer, the most significant (left most) bit is used
to represent a sign. Hence, half of the 2n patterns are used for positive
values and the other half for negative values. The range of positive values is
from 0 to 2n-1-1 and the range of negative values is from –1 to –2n-1. In a
4-bit system, the range of signed integers is from –8 to +7.
2.11 Binary Arithmetic
When two digits are added, if the result is larger than what can be
contained in one digit, a carry digit is generated. For example, if we add 5
and 9, the result will be 14. Since the result cannot fit into a single digit, a
carry is generated into a second digit place. When two bits are added it will
produce a sum bit and a carry bit. The carry bit may be zero.
Example:
0+0=0 0
0+1=0 1
1+1=1 0
The sum bit is the least significant bit (LSB) of the sum of two
1-bit binary numbers and the carry bit holds the value of carry (0 or
1) resulting from the addition of two binary numbers.
Example 1:
1100
1011
—————
1 0 1 1 1 carry bit —————
sum bits
Example 2:
Carry bits
111
10111
10110
———————
101101
———————
In unsigned binary addition, the two operands are called augend and
addend. An augend is the number in an addition operation to which
another number is added. An addend is the number in an addition operation
that is added to another.
Add –7 10
+ 510 using 4-bit system.
Add 1 1
+ 0 1 0 1 (5)
——————
1 1 1 0 (-2)
——————
If the result of the operation is negative, we get a negative number in
2’s complement form. In some cases, there is a carry bit beyond the end of
the word size and this is ignored.
Example 3:
0100 (+4)
——————
1 0000 =0
——————
In the above example, the carry bit goes beyond the end of the word
and this can be ignored. In this case both operands are having different
signs. There will be no error in the result. On any addition, the result may
be larger than can be held in the word size being used and this would result
in overflow.
If two numbers are added and if they are either positive or negative,
then overflow occurs if and only if the result has the opposite sign.
Example 4:
0–0 = 0
1–0 = 1
1–1 = 0
10 – 1 = 1
When subtracting 1 from 0, borrow 1 from the next most significant bit
(MSB). When borrowing from the next most significant bit, if it is 1, replace
it with 0. If the next most significant bit is 0, you must borrow from a more
significant bit that contains 1 and replace it with 0 and all
0s up to that point become 1s.
Example 1:
Example 2:
Example 3:
Subtract (+2) – (+7) using 4-bit system
0 0 1 0 (+2)
0 1 1 1 (+7)
0 0 1 0 (2)
+ 1 0 0 1 (-7)
——————
1 0 1 1 (-5)
——————
Example 4:
Subtract (-6) – (+4) using 4 bit system
Minuend -6 1 0 1 0
2’s complement of the Subtrahend -4 1 1 0 0
——————
1 0 1 1 0
——————
Example:
A AND B =A.BA OR B =A+
NOT A = A’ (or A)
A Boolean expression is a combination of Boolean variables, Boolean
Constants and the above logical operators. All possible operations in
Boolean algebra can be created from these basic logical operators. There are
no negative or fractional numbers in Boolean algebra.
The operation AND yields true (binary value 1) if and only if both of its
operands are true. The operation OR yields true if either or both of its
operands are true. The unary operation NOT inverts the value of its operand.
The basic logical operations can be defined in a form known as Truth Table,
which is a list of all possible input values and the output response for each
input combination.
The AND operator is defined in Boolean algebra by the use of the dot (.)
operator. It is similar to multiplication in ordinary algebra. The AND operator
combines two or more input variables so that the output is true only if all the
inputs are true. The truth table for a 2-input AND operator is shown as
follows:
A B Y
0 0 0
0 1 0
1 0 0
1 1 1
NOT operator
The NOT operator has one input and one output. The input is either true
or false, and the output is always the opposite, that is, the NOT operator
inverts the input. The truth table for a NOT operator where A is the input
variable and Y is the output is shown below:
A Y
0 1
1 0
The basic logic functions AND, OR, and NOT can also be combined to
make other logic operators.
NAND operator
The NAND is the combination of NOT and AND. The NAND is generated
by inverting the output of an AND operator. The algebraic expression of the
NAND function is:
Y= A.B
A B Y
0 0 1
0 1 1
1 0 1
1 1 0
NOR operator
The NOR is the combination of NOT and OR. The NOR is generated by
inverting the output of an OR operator. The algebraic expression of the NOR
function is:
Y= A+B
A B Y
0 0 1
0 1 0
1 0 0
1 1 0
A NOR B = NOT (A OR B)
2.12.2 Laws of Boolean algebra
Boolean Identities
Laws of Complementation
1 : If A = 0,then A = 1
Theorem 2 : If A = 1,then A = 0
Theorem 4 : A.1=A
If A equals 0 and the other input is 1, the output is 0. If A equals 1 and the
other input is 1, the output is 1.
Theorem 8 : A+1=1
If A equals 0 and the other input is 1, the output is 1. If A equals 1 and the
other input is 1, the output is 1.
Thus the output is always equal to 1 regardless of what value A
takes on.
Theorem 9 : A+0=A
Product Term
Minterm
Sum term
Example: A+B+D
Maxterm
Example: A+AB+ABC
Product-of-sums (POS)
Example: (A + B) (A + B) (A + B)
Example:
A + B = B + A AB = BA
Subtraction is not commutative:
A-B ≠ B-A
(A + B) + C = A + (B+C) = (A + C) + B
Similarly, the order in which one does the AND operation does not
affect the result.
Example:
A(B+C) = AB + AC
A + (B . C) = (A + B) . (A + C)
= (A B C + A B C) + (A B C + A B C) + A B C
= A B + A B + ABC
The above expression is in the minimum sum of products form. The
given Boolean expression can be rewritten as follows using theorem 10.
A B C + A B C + A B C + A B C + A B C + A B C (A B C + A B C = A B C)
= (A B C + A B C) + (A B C + A B C) + (A B C + A B C)
= A B (C + C) + A B (C + C) + A C(B + B)
=AB+AB+AC
Examples:
A B C + A B C Let x = A B and y = C
= x(y + y)
= x=AB
Prove that A + A B = A + B
A + A B = (A + A)(A + B) = 1 · (A + B) = A + B
Simplify the following Boolean Expression
ABC+ABC+ABC+ABC
= A C(B + B) + A B C + A B C
=AC+ABC+ABC
= A(C + BC) + A B C
= A(C + B)(C + C) + A B C
= A(C + B) + A B C
In the given Boolean Expression, if the second and third terms are
grouped, it will give
A B C + (A B C + A B C) + A B C
= A B C + A B(C + C) + A B C
=ABC+AB+ABC
= B C(A + A) + A B
Theorem 16: AB = A + B
The above identities are the most powerful identities used in Boolean
algebra. By constructing the truth tables, the above identities can be proved
easily.
Example:
15)
= (D A B) (A B) (D A C)
= (D + A + B)(A + B)(D + A + C)
COMPUTER ORGANIZATION
3.1.1 Introduction
Computers are often compared to human beings since both have the
ability to accept data, store, work with it, retrieve and provide information.
The main difference is that human beings have the ability to perform all of
these actions independently. Human beings also think and control their own
activities. The computer, however, requires a program (a predefined set of
instructions) to perform an assigned task. Human beings receive information
in different forms, such as eyes, ears, nose, mouth, and even sensory
nerves. The brain receives or accepts this information, works with it in
some manner, and then stores in the brain for future use. If information at
the time requires immediate attention, brain directs to respond with actions.
Likewise the Central Processing Unit (CPU) is called the brain of the
computer. It reads and executes program instructions, performs calculations
and makes decisions.
- Input Unit
- Output Unit
- Central Processing Unit
- Memory Unit
Output Unit
CPU is the brain of any computer system. It is just like the human brain
that takes all major decisions, makes all sorts of calculations and directs
different parts of the computer function by activating and controlling the
operation. It consists of arithmetic and logic units, control unit and internal
memory (registers). The control unit of the CPU co- ordinates the action of
the entire system. Programs (software) provide the CPU, a set of instruction
to follow and perform a specific task. Between any two components of the
computer system, there is a pathway called a bus which allows for the data
transfer between them.
Control unit controls all the hardware operations, ie, those of input
units, output units, memory unit and the processor. The arithmetic and logic
units in computers are capable of performing addition, subtraction, division
and multiplication as well as some logical operations. The instructions and
data are stored in the main memory so that the processor can directly fetch
and execute them.
Memory Unit
In the main memory, the computer stores the program and data that
are currently being used. In other words since the computers use the stored
program concept, it is necessary to store the program and data in the main
memory before processing.
The main memory holds data and program only temporarily. Hence
there is a need for storage devices to provide backup storage. They are
called secondary storage devices or auxiliary memory devices. Secondary
storage devices can hold more storage than main memory and is much less
expensive.
All modern computers use the stored program concept. This concept is
known as the Von – Neumann concept due to the research paper published
by the famous mathematician John Von Neuman. The essentials of the
stored program concept are
- the program and data are stored in a primary memory (main memory)
- once a program is in memory, the computer can execute it automatically
without manual intervention.
- the control unit fetches and executes the instructions in sequence one by
one.
- an instruction can modify the contents of any location inThe stored program
concept is the basic operating principle for every computer.
3.2 Central Processing Unit
The arithmetic and logic unit (ALU) is the part of CPU where actual
computations take place. It consists of circuits which perform arithmetic
operations over data received from memory and are capable of comparing
two numbers.
The control unit directs and controls the activities of the computer
system. It interprets the instructions fetched from the main memory of the
computer, sends the control signals to the devices involved in the execution
of the instructions.
While performing these operations the ALU takes data from the
temporary storage area inside the CPU named registers. They are high-
speed memories which hold data for immediate processing and results of the
processing.
Fig. 3.3 : Functions of a CPU
The CPU is similar to a calculator, but much more powerful. The main
function of the CPU is to perform arithmetic and logical operations on data
taken from main memory. The CPU is controlled by a list of software
instructions. Software instructions are initially stored in secondary memory
storage device such as a hard disk, floppy disk, CD-ROM, or magnetic tape.
These instructions are then loaded onto the computer’s main memory.
(i) input the value of a (ii) input the value of b (iii) sum = a + b
(iv) output the value of sum
This program accepts two values from the keyboard, sums it and
displays the sum on the monitor. The steps are summarized as follows :
1. The control unit recognizes that the program (set of instructions) has been
loaded into the main memory. Then it begins to execute the program
instructions one by one in a sequential manner.
2. The control unit signals the input device (say keyboard) to accept the input
for the variable ‘a’.
4. The control unit recognizes and enables to route the data (value of a) to the
pre-defined memory location (address of ‘a’).
5. The steps 2 to 4 will be repeated for the second input ‘b’. The value of ‘b’ is
stored in the memory location (address of ‘b’).
7. The ALU performs the addition. After the computation, the control unit
enables to send the copy of the result back to the memory (address of
‘sum’).
8. Finally, the result is displayed on the monitor. The control unit enables to send
the copy of the values of the address of ‘sum’ to the monitor (buffer) and
signals it. The monitor displays the result.
The data flow and the control flow of CPU during the execution of this
program is given as,
The ALU functions are directly controlled by the control unit. The control
unit determines when the services of the ALU are needed, and it provides the
data to be operated. The control unit also determines what is to be done with
the results.
Step 1 : The numbers (5 and 8) to be added up are put into two separate memory
locations.
Step 2 : The control unit fetches the two numbers from their memory
locations into the data registers.
Step 3 : The arithmetic unit looking at the operator (+) uses the accumulator
and adds the two numbers.
Step 4 : The ALU stores the result (13) in memory buffer register.
Step 5 : Then the control unit stores the result into a user desired
memory location, say ‘sum’.
Fig. 3.5 Arithmetic Logic Unit
Some of the basic functions performed by the ALU are - add, subtract,
logical AND, logical OR, shift left and shift right on two’s complement binary
numbers. The inputs to be calculated are stored in the input register (AREG)
and the input / output register (ACCUM) for add, AND and OR functions. The
shift left and shift right functions operate on the value in the ACCUM
Fig. 3.6 : Functional Description of ALU
The above figure illustrates the functional level block diagram of the
ALU. The control unit controls the operations of the ALU by giving
appropriate control signals to select a specific function and then enable the
operation after the data are fed into the registers. The enable bit is made 1
after the data to be operated are transferred from main memory.
There are different types of memory. They are Random Access Memory
(RAM), Read Only Memory (ROM), Programmable Read- Only Memory
(PROM), Erasable Programmable Read-Only Memory (EPROM), Electrically
Erasable Programmable Read-Only Memory (EEPROM).
The main memory must store many data items and have some way of
retriving them when they are needed. The memory can be compared to the
boxes at a post office. Each box-holder has a box with a unique number
which is called its address. This address serves to identify the box. The
memory has a number of locations in its store. Each location in a memory
has a unique number called its memory address. This serves to identify it for
storage and retrival.
Operations on memories are called reads and writes, defined from the
perspective of a processor or other device that uses a memory: a write
instruction transfers information from other device to
memory and a read instruction transfers information from the memory to
other devices. A memory that performs both reads and writes is often called a
RAM, random access memory. Other types of memories commonly used in
systems are read-only memory.
Data Representation
� The registers (internal memory) are used to hold the instruction and data for
the execution of the processor. Eventually the top of the hierarchy goes to
the registers.
Keyboard
Mouse
The OCR technique permits the direct reading of any printed character
like MICR but no special ink is required. With OCR, a user can scan a page
from a book. The computer will recognize the characters in the page as
letters and punctuation marks, and stores. This can be edited using a word
processor.
Optical Mark Reading and Recognition (OMR)
Light Pen
Magnetic Reader
All the credit cards, ATM cards (banks), petro cards, etc. stores data in
a magnetic strip which can be read easily by the magnetic reader.
Smart Cards
Monitors
Impact Non-impact
Impact printers include all printers that print by striking an ink ribbon.
Impact printers use a print head containing a number of metal pins which
strike an inked ribbon placed between the print head and the paper. Line
printers, dotmatrix printers are some of the impact printers.
Ø Non-impact printers are faster than impact printers because they have
fewer moving parts.
Ø They are quiet than impact printers because there is no striking mechanism
involved.
Ø They posses the ability to change typefaces automatically. Ø These
printers produce high-quality graphics
Ø These printers usually support the transparencies
Ø These printers cannot print multipart forms because no impact is being made
on the paper.
Line Printer
The most popular serial printer is the dot matrix printer. It prints one
line of 8 or 14 points at a time, with print head moving across a line. They
are similar to typewriters. They are normally slow. The printing speed is
around 300 characters per second. It uses multipart stationaries to prepare
copies of a document.
Laser Printers
Laser printers use a laser beam and dry powdered ink to produce a
fine dot matrix pattern. It can produce very good quality of graphic images.
One of the chief characteristics of laser printers is their resolution – how
many dots per inch (dpi) they lay down. The available resolutions range
from 300 dpi at the low end to around
1200 dpi at the high end.
The computer can also give produce voice output(audio data). Speaker
serves as a voice output device. Using speakers along with speech
synthesizer software, the computer can provide voice output. Voice output
has become very common in many places like airlines, banks, automatic
telephone enquiry system etc. Users can also hear music/songs using the
voice output system.
Apart from the output devices like printers, plotters are also used to
produce graphical output. Although printer output is very convenient for
many purposes, the user needs to present the information graphically in
order to understand its significance.
Hard Disk
Hard disk is a magnetic disk on which you can store computer data.
The hard disk is a direct-access storage medium. This means you can store
and retrieve data randomly.
The smallest unit that can be written to or read from the disk is a
sector. Once a read or write request has been received by the disk unit,
there is a delay involved until the required sector reaches the read/write
head. This is known as rotational latency, and on average is one half of
the period of revolution.
Magnetic Tape
A recording medium consisting of a thin tape with a coating of a fine
magnetic strip, used for recording digital data. The tape itself is a strip of
plastic coated with a magnetic recording medium.
Floppy Disk
The floppy drive uses a thin circular disk for data storage. It is a soft
magnetic disk. It is a thin magnetic-coated disk contained in a flexible or
semi-rigid protective jacket. The disk rotates at 360rpm. A read/write head
makes physical contact with the disk surface. Data is recorded as a series of
tracks subdivided into sectors.
The floppy disks are usually 3.5" in size. However, older floppy disks
may be in use; these would be 5.25" in size or even 8" in size. A 3.5" floppy
disk can hold 1.44 MB of data. Once data is stored on a floppy disk it can be
‘write protected’ by clicking a tab on the disk. This prevents any new data
being stored or any old data being erased. Disk drives for floppy disks are
called floppy drives. Floppy disks are slower to access than hard disks and
have less storage capacity. It is less expensive and are portable. It can be
accessed randomly.
Optical Disk
Optical disks are a storage medium from which data is read and to
which it is written by lasers. The optical disk is a random access storage
medium; information can be easily read from any point on the disk. CD-
ROM stands for Compact Disk - Read Only Memory.
Summary
* Computers are often compared to human beings since both have the ability
to accept data, store, work with it, retrieve and provide information.
* In modern computers, monitors and printers are the commonly used output
devices.
* CPU is the brain of any computer system. It consists of arithmetic and logic
units, control unit and internal memory (registers).
* Control unit controls all the hardware operations, ie, those of input units,
output units, memory unit and the processor.
* In the main memory, the computer stores the program and data that are
currently being used.
* All modern computers use the stored program concept. This concept is due
to John Von Neuman.
* The smallest unit of information is a single digit called a ‘bit’ (binary digit),
which can be either 0 or 1.
* The secondary memory is the memory that supplements the main memory.
This is a long term non-volatile memory.
* Some of the commonly used storage devices are hard disks, magnetic tapes,
floppy disks and CD-ROM.
Chapter 5
SOFTWARE
Software
Computer software provides instructions that tell the computer how to operate.
There are two main types of software. They are System software
and
Application software
� System Software
o System software
� Application Software
It is literally "the right to copy", but also gives the copyright holder the
right to be credited for the work, to determine who (if anyone) may adapt
the work to other
forms, to determine who may perform the work, to benefit financially from
the work, and other related rights. It is one form of intellectual property
(distinct from patents, trademarks, and trade secrets), and applies to any
particular expression of an idea or information, which is substantial and self-
contained in a fixed form
forms, or "works". Specifics vary by jurisdiction, but these can include poems,
theses, plays, other literary works, movies, dances, musical compositions,
audio recordings, paintings, drawings, sculptures, photographs, software, radio
and television broadcasts, and industrial designs
(a) the "source code'' (the programs themselves) is freely distributed, and
When the source code of a program is available (e.g. the C or C++ files which
make up the program), the consequences that follow are
• Anyone can read the source code and learn the technology
� Commercial Software
• A backup copy is used in case something goes wrong with the original software
• The backup copy cannot be shared or sold
o It is not possible to copy, look at the program's code, change, or use the
software in another program without the copyright holder's permission
� Public Domain Software
� Freeware
o Has a copyright - someone owns the right to determine who can make copies
of the software
o Its free for use but it is possible to give away only exact copies of the software
o Cannot be changed or used in another program without the copyright holder's
permission
� Shareware
o Has a copyright
System Software
The operating system and utility programs are the two major
categories of system software. Just as the processor is the important part of
the computer system, the operating system is the core of all software
activity.
ii. UNIX
UNIX is an operating system which was first developed in the 1960s, and
has been under constant development ever since. By operating system, we
mean the suite of programs which make the computer work. It is a stable,
multi-user, multi-tasking system for servers, desktops and laptops.
iii. Linux
Most recent versions are based on Unix. It has a good graphical interface and
so it is both stable (does not crash often or have as many software problems
as other systems may have) and easy to learn. It can only be run on
Apple produced hardware.
V. BOSS GNU/Linux, Indian Linux
Programming Languages
Commonly used High BASIC, C, C++, C#, COBOL, Fortran, Java, Lisp,
level languages Pascal
Commonly used Bourne script, JavaScript, Python, Ruby, PHP, Perl
Scripting languages
ii. Spreadsheet:
iv. Database:
COMPUTER COMMUNICATIONS
6.1 Introduction
6.2 Network
1. Network services
3. Protocols
· Provide multiple access (more than one user, use the network)
– reduce the number of printers required for the organization.
· Eliminates distance constraints – take a printout at a
different location.
· Handle simultaneous requests – queue print jobs reducing
the computer time.
· Share specialized equipments-Some printers are designed
for specific use such as high-speed output, large size
formals or colour prints. Specialised equipments may be
costlier or may not be frequently used by the user, when
numerous clients are using the network, printer use is
optimized.
· Network fax service – Fax service is integrated in the network.
The computer in the network sends the digital document
image to any location. This reduces the time and paper
handling.
6.9.3 Message services
7 Application
Purpose for communicating:
e-mail, file transfer,
client/server
1
0 1 0 1 0 1 0
6 Presentation
Rules for data conversion
5 Session
Starts, stops and governs
Transmission order.
4 Transport
Ensures delivery of
Complete message
Fig 6.6. Digital Data Transmission
3 Network
Routes data to
different networks
2 Data link
Transmits data to
Different networks
1 Physical
Passes bits on to
Connecting median
6.15 Internet
Several networks, small and big all over the world, are
connected together to form a Global network called the Internet.
Today’s Internet is a network of about 50 million or more computers
spread across 200 countries. Anyone connected to the Internet can
reach, communicate and access information from any other
computer connected to it.
· Students
· Faculty members
· Scientists
· Executives and Corporate members
· Government employees.
The Internet protocol (IP) addressing system is used to keep
track of the million of users. Each computer on net is called a host.
The IP addressing system uses the letter addressing system and
number addressing systems.
http:// www.country-watch.com/India
· A Computer
· A Telephone line
· A Modem
· Internet Service Provided or ISP
The ISPs are the companies which allows the user to use
the Internet for a price. One has to register with the ISP for an
Internet account. ISP provides the following:
1 2 3 4 5
Many organizations have Local Area Network that allows their computers
to share files, data, printers and other resources. Sometimes these private
network uses TCP / IP and other Internet standard protocols and hence they are
called intranet. All the Internet services such as web pages, email, chat; usenet
and FTP are provided on the intranet to serve the organization. Creating a web
page on the intranet is simple because they use only Word- Processing
Software One of the main consideration of the intranet is security. The
sensitive company data available on the intranet is protected from the outside
world.
Taking intranet technology a few steps forward extranets are useful in the
business world. Intranet connecting selected customers, suppliers and offices in
addition to the internal personnel, is called extranet. By using extranet
business organizations can save telephone charges. For example a can
manufacturing company can extend their intranet to their dealers and customers
for support and service.