FIT Notes-1
FIT Notes-1
FIT Notes-1
in
B.Com.(Computers/CA)-I/1 Fundamentals of Information Technology
COMPUTERS DEPARTMENT
COMPUTER
SOFT WARE: Soft ware is a collection of programs or instructions. Which we can’t touchable and seeable are
called Soft ware. Software deals with the tools/ devices/ instruments, which are connected to the computer system
(like keyboard, mouse, monitor, printer, speakers, …, etc).
A)Input Unit :This unit contains devices with the help of which we enter data into the computer. This
unit creates a link between the user and the computer. The input devices translate the information
into a form understandable by the computer.
B)CPU (Central Processing Unit) :CPU is considered as the brain of the computer. CPU performs all
types of data processing operations. It stores data, intermediate results, and instructions (program).
It controls the operation of all parts of the computer.
CPU itself has the following three components –
➢ Control Unit:
This unit controls the operations of all parts of the computer but does not carry out any actual data
processing operations.
Functions of this unit are −
▪ It is responsible for controlling the transfer of data and instructions among other units of a computer.
▪ It manages and coordinates all the units of the computer.
▪ It obtains the instructions from the memory, interprets them, and directs the operation of the
computer.
▪ It communicates with Input/Output devices for transfer of data or results from storage.
▪ It does not process or store data.
C)Output Unit :The output unit consists of devices with the help of which we get the information
from the computer. This unit is a link between the computer and the users. Output devices translate
the computer's output into a form understandable by the users.
6Q) CLASSIFY THE COMPUTERS BASED ON USAGE OF DATA, SIZE AND PERFORMANCE?
Light Pen :
Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or draw pictures
on the monitor screen. It consists of a photocell and an optical system placed in a small tube.
When the tip of a light pen is moved over the monitor screen and the pen button is pressed, its photocell
sensing element detects the screen location and sends the corresponding signal to the CPU.
Benefits
1. Touch screen is used to establish a direct relationship between hand and cursor movements relative to its
direction, speed, and distance.
2. Touch screen movement is direct with respect to the plane on screen.
3. No additional desk space is required.
4. The highly used environments or regions are well suited for touch screens.
Voice Recognition Systems (Q. Write short notes on voice recognition systems?) .
They allow the users to input the data to the computer through their speech/voice.
They make use of microphones for this purpose.
Speech/voice recognition systems are used for capturing or creating t sound such as music, speech, etc
It requires the input to be given in a proper way with appropriate accent, vocabulary and grammar.
This makes it a less preferable and complex system.
Applications of Voice Recognition System are,
1. In hospitals where doctors might be busy in surgeries and require to perform some other operation.
2. Dictating a long passage to the computer to avoid typing.
10Q. WRITE SHORT NOTES ON VARIOUS INPUT DEVICES BEHAVE AS READERS LIKE OCR,
OMR, MICR AND BARCODE READER?
(i) Optical Character Recognition (OCR):
It is one of the most sophisticated type of optical recognition.
An optical card reader works in the similar way as the human eye.
It uses a device that reads preprinted characters in a particular font and converts them to digital code.
A set of optical characters used on merchandise tags that can be read using an OCR want reader to
process the sales transaction.
The information on the tag, such as item price and the inventory number can be automatically entered at a
point of sale terminal.
Data can be saved and transferred to the company’s main computer system to be used in activities such as
managing inventories and analyzing sales.
The primary advantages of OCR is that it sliminates some of the duplications of human efforts required to
get data into the computer.
(ii) Optical Mark Recognition (OMR)
The process of extracting the data from marked fields like fill-in fields of checkboxes is
called OMR.
It contains mark sensing to scan and translate a series of pen or pencil marks in OMR sheet
into computer readable form based on its location.
An example of it is the objective type multiple choice question paper of bank recruitment exam.
A computerized optical mark reader generates scores by identifying the position of the mark.
(iii) Magnetic Ink Character Reader (MICR)
Magnetic Ink Character Reader (MICR) checks the legitimacy of the paper documents, such as bank
checks.
It has magnetic ink printed characters that are captured by the high speed magnetic recognition devices.
They provide some important information to the receivers for processing.
They promote security and speed up in the document sorting process.
They decrease the chances of check fraud.
(iii)Barcode Reader
Barcode reader is an input device that captures and reads the information that is on bar code.
It contains a scanner, decoder and cable. It reads and converts the barcode into integers or alphabets.
It is connected to the computer through serial port, keyboard port or interface device.
It emits a light on the bar code and measures the amount of light that got reflected.
The white spaces reflect more light than the dark bars. This light energy is converted into electrical
energy.
These signals are again converted into the data and sent to the
computer for processing.
11Q. DEFINE OUTPUT DEVICES?
OUTPUT DEVICE: The process of displaying the results from CPU is
known as “OUTPUT”. The devices which are used to display results
from CPU are called as output devices. Output can be represented in the form of hard copy or soft copy.
Ex:- Monitor, Printer, Speakers, ….., etc.
MONITORS (Discuss about monitors and its types?)
Monitor is a standard output device, used to show the result as soft copy on screen.
The components of the monitors usually include display device, circuitry, casing and power supply.
The monitors are most commonly used output device.
They are widely available in variety of shapes, designs and colors.
There are different types of monitors.
Monitors are 2 types based on color display. They are
Black & White (Mono-Chrome)
Color (Poly-Chrome)
Based on light technology monitors are,
(a) CRT Monitor: The CRT monitor is the most common type of monitor and looks and works just like a
television. This type of monitor uses a Cathode Ray Tube (CRT).
(b) LCD Monitor: Liquid Crystal Display (LCD) monitors are flat panel displays that occupies less space. They
are preferred over CRT monitor because they are light weight and consume less power. They produces
flicker-free images on the screen so as to minimize the eyestrain by drawing the entire image at one time.
They can be used in small devices such as laptops, calculators, watches, microwave ovens and so on.
(c) LED Monitor: Light Emitting Diode (LED) is a flat panel display that uses a grid (matrix) of diodes
representing the pixel positions in the display, LED displays are very much similar to LCD displays with only
a difference of light source which is present at the back of the screen. It consist of small semiconductors (light
emitting diodes) that illuminates the display when it is exposed to electric current. It produces better quality
picture than LCD. It is light weight and has longer life span. However, the LED light used in this display is
much more efficient than the traditional lights like incandescent light and fluorescent light. But the cost of
LED is twice of a standard LCD. It is used in applications such as billboards, signs on public transparent
vehicles, display boards for displaying information at hospitals, hotels, schools and so on.
Character Printers:
A) Dot Matrix Printers:
Dot matrix printer is one of the primitive types of printing technology that prints a single character at a
time.
These printers are capable of printing the characters of any shape, font or density onto a paper.
The dot matrix printer not only prints special characters but also prints graphics like charts and graphs.
The speed of printing character is from 200 to 500 characters per second.
B) Daisy wheel printers:
Daisy wheel printers are used when it is required to generate formal (i.e., professional letter quality
documents.
These printers consist of a print head whose shape is similar to that of a daisy flower.
These type of printers are known as letter quality printers because the quality of printing is similar to
the high-quality typewriter.
The speed of printing the character is 90 CPS.
Line Printers :Line printers are the printers which print one line at a time. These are of two types −
• Drum Printer
• Chain Printer
A) Drum Printer: This printer is like a drum in shape hence it is called drum printer. The surface
of the drum is divided into a number of tracks. Total tracks are equal to the size of the paper, i.e. for
a paper width of 132 characters, drum will have 132 tracks. A character set is embossed on the track.
Different character sets available in the market are 48 character set, 64 and 96 characters set. One
rotation of drum prints one line. Drum printers are fast in speed and can print 300 to 2000 lines per
minute.
Advantage: Very high speed
Disadvantages: Very expensive, Characters fonts cannot be changed
B) Chain Printer: In this printer, a chain of character sets is used, hence it is called Chain Printer.
A standard character set may have 48, 64, or 96 characters.
Advantages: Character fonts can easily be changed.
Different languages can be used with the same printer.
Disadvantages: Noisy
II) Non-Impact Printers: These are more capable and give better quality
outputs.
Ex: Ink-Jet Printers, Laser Printers, …, etc.
Characteristics of Non-impact Printers
• Faster than impact printers. They are not noisy.
• High quality. Supports many fonts and different
character size.
Ink-Jet Printers:
Ink-jet printers are most commonly used printers.
They are used to prints the image by spraying tiny droplet of ink onto a
paper by using a sequence of nozzles.
These types of printers are not only capable of printing monochromatic
images but can also print the images in different combination of colors called CMYK (cyan, magenta,
yellow, black).
Advantages: High quality printing. More reliable.
Disadvantages: Expensive as the cost per page is high
Slow as compared to laser printer
Laser Printer:
Laser printers are used to print text and images that are of high quality.
Such printers are also known as page printers.
These pinters are capable of printing both text as well as graphics with a resolution of 300 to 1200 dpi.
Advantages of Laser Printer
1. It is the fastest among all the other non-impact printers.
2. It have the multi-font capability i.e., it can print characters in different fonts.
3. It can print 4 to 32 textual pages per minute.
4. It produces very high quality output.
5. Supports many fonts and different character size
Disadvantages of Laser Printer
1. It is more expensive.
2. It requires high maintenance cost.
SOFT COPY AND HARD COPY DEVICES (Q) Explain the soft copy and hard copy devices?)
Soft copy output devices give screen displayed output that is lost when the computer is shut off. Some
examples of soft copy output devices are monitors, projectors, video display terminals. Soft copy is an
electronic display of digital information, such as files viewed on the pc monitor.
Soft copy- It is the information not printed on the paper but that is being stored in a computer as a file and
which can be only displayed on the computer. Hard copy is simply a document which is printed copy like
printed notes. In other words, we can touch it i.eits in physical form.
Hard copy: It is provide output on printed paper or other permanent media that is human readable
(tangible). Examples of devices that produce hard copy are printers, plotters and microfiche.
PLOTTERS (Q. What is the plotter? Discuss the various types of plotters?)
✓ Plotters are used for creating vector images by using a pen which is attached to a computer.
✓ Because of this, plotters are referred to as pen-based output device.
✓ Vector images are the images that are created by a series of many straight lines.
✓ Plotters are very much similar to printers except that the former draw the lines using a pen.
✓ Plotters are expensive
i) Drum Plotter:In drum plotter, the paper on which the output is to be printed is placed over a drum. Such
plotters consist of at least one pen that is mounted on a carriage. The carriage is placed horizontally across the
drum which can be rotated in both clockwise and anti clockwise direction. These type of plotters are generally
preferred when it is necessary to print output continuously such as plotting the earthquake activities.
ii) Flat-bed Plotter: Flatbed plotter comprises of stationary horizontal plotting surface over which a paper
cannot move (i.e., it is static). A pen is mounted on a carriage. This carriage can move horizontally, vertically,
leftward or rightward in order to draw lines. Since the paper is responsible for providing all the necessary
movements. Flatbed plotters are generally used in designing of ships, aircraft, buildings etc. The main
drawback of flatbed plotters is that the speed of printing the output is very slow.
SPEAKERS (Q. Explain about speakers?)
It is an output device that takes audio input from the sound card of computer and gives audio output in the
form of sound waves to the user.
They are external to the computer and usually contains low-power internal amplifier.
The computer speakers are available in verify of quality and price.
Some speakers supports power amplifiers for bass speakers and small satellite speakers.
Basically, PC speakers can be grouped into two types,
(a) Passive speaker
(b) Active speaker
(a) Passive speaker:
A passive speaker is the standard speaker incorporated by most of the PCs. It does not contain amplifier.
(b) Active Speaker:
An active speaker contains amplifier i.e., the amplifier is built-in the PC. And, it eliminates the need for
external amplifier.
SOUND CARD (Q. Write short notes on sound cards?)
A sound card can be defined as an expansion card that is capable of producing sounds using certain
computer programs.
Hence, it can be also called as an audio card.
It is a peripheral device that can be attached to a motherboard.
2Q) EXPLIAN ABOUT NUMBER CONVERSION FROM ONE NUMBER SYSTEM TO ANOTHER
NUMBER SYSTEM?
Convert Decimal to Binary
Divide the number by 2 for repeating times. Collect remainders in each level.
(16)10 = (?)2 10000
Binary to Octal
Step 1: Divide the digits into groups of three starting from the right
Step 2: If any additional bits required, then add zeros at LHS.
Step 3: Divide the groups from RHS → LHS.
Example
(110010)2 =(?)8 62
Octal Number Binary Code Octal Number Binary Code
0 000 4 100
1 001 5 101
2 010 6 110
3 011 7 111
Octal to Binary:
(62)8 =? 110010. Here 6=110 and 2 = 010.
BINARY SUBTRACTION
Rule for binary subtraction is as follows:
0-0=0
0 - 1 = 1 with a borrow from the next column
1-0=1
1-1=0
BINARY MULTIPLICATION
Table for binary multiplication is as follows:
0x0=0
0x1=0
1x0=0
1x1=1
Example
Multiply the binary numbers 1010 and 101
BINARY DIVISION
Table for binary division is as follows:
0 ¸ 0 = Divide by zero error
0¸1=0
1 ¸ 0 = Divide by zero error
1¸1=1
As in the decimal number system (or in any other number system), division by zero is meaningless
The computer deals with this problem by raising an error condition called ‘Divide by zero’ error.
1. Start from the left of the dividend
2. Perform a series of subtractions in which the divisor is subtracted from the dividend
3. If subtraction is possible, put a 1 in the quotient and subtract the divisor from the corresponding digits of
dividend
4. If subtraction is not possible (divisor greater than remainder), record a 0 in the quotient
5. Bring down the next digit to add to the remainder digits. Proceed as before in a manner similar to long division
Example: Divide 1010 by 101
4Q. WHAT IS MEMORY? LIST ITS FUNCTIONALITIES. ALSO LIST THE DIFFERENCES
BETWEEN PRIMARY AND SECONDARY STORAGE?
A. Memory
Memory is a storage area in a computer. The function of memory is to store data or programs on
temporary or permanent basis.
Functionalities of Memory
❖ It is a device which stores data and program temporarily or permanently.
❖ It basically takes data from an input device and generates result before it is passed to the output
device.
❖ It stores data in digital format and can read only two binary digits i.e., a sequence of 0’s and 1’s.
❖ It has the capacity to store very huge amount of data and retrieve it quickly whenever necessary.
❖ It is capable of performing various operations such as booting up or starting up programs.
❖ It provides unique memory addresses which are accessed by the CPU.
❖ It allows the CPU to directly interact with the programs.
Differences between Primary Memory and Secondary Memory
Primary Storage/Memory Secondary Storage/Memory
1. The memory which is directly accessible by the 1. The memory that is not directly accessible by the
CPU for storing and retrieving information is CPU is known as secondary memory.
known as primary memory.
2. A computer cannot work without a primary 2. A computer can work without a secondary
3. memory. 3. memory.
It is also known as main memory. It is also known as auxiliary memory or backup
4. 4. memory.
5. It is internal to CPU. 5. It is external to CPU.
It basically stores programs and data which are It can store huge amount of data.
6. currently in use. 6.
7. It is connected to computer through “slots”. 7. It is connected to computer through cables.
It is classified as volatile (RAM) and non- It is always non-volatile memory.
8. volatile (ROM) memories. 8.
9. It acts as the working memory of computer. 9. It acts as the storage device in the computer.
10. It loses data on power failure or system crash. 10. It holds data even on power failure or system
11. It is faster than secondary memory. 11. crash.
12. It is expensive. 12. It is slower than primary memory.
Examples of primary memory are RAM and It is cheaper.
ROM. Examples of secondary memory are hard disk,
CD-ROM, DVD etc.
6Q) EXPLAIN ABOUT MEMORY AND ITS TYPES (PRIMARY AND SECONDAY)?
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the storage
space in the computer, where data is to be processed and instructions required for processing are stored. The
memory is divided into large number of small parts called cells. Each location or cell has a unique address, which
varies from zero to memory size minus one. For example, if the computer has 32k words, then this memory unit
has 32 * 1024 = 32768 memory locations. The address of these locations varies from 0 to 32767.
If the computer has 64k words, then this memory unit has 64 * 1024 = 65536 memory locations. The address of
these locations varies from 0 to 65535.
Primary Memory (Main Memory) :The main memory occupies the central position because it is equipped to
communicate directly with the CPU and with auxiliary memory devices through Input/output processor
(I/O). Primary memory holds only those data and instructions on which the computer is currently working.
It has a limited capacity and data is lost when power is switched off. It is generally made up of
semiconductor device. It is divided into two subcategories RAM and ROM.
Characteristics of Main Memory
• It is known as the main memory.
• Usually volatile (Temporary) memory.
• Data is lost in case power is switched off.
• Faster than secondary memories.
• A computer cannot run without the primary memory.
A) RAM (Random Access Memory): It is the internal memory of the CPU for storing data, program, and
program result. It is a read/write memory which stores data until the machine is working. As soon as the
machine is switched off, data is erased.
RAM is volatile (Temporary), i.e. data stored in it is lost when we switch off the computer or if there is a
power failure.
B) ROM (Read Only Memory) : The memory from which we can only read but cannot write on it. This
type of memory is non-volatile (Permanent). A ROM stores such instructions that are required to start a
computer. This operation is referred to as bootstrap. ROM chips are not only used in the computer but also
in other electronic items like washing machine and microwave oven.
Magnetic Disk :Magnetic disk is a device that write/reads data to and from a magnetic tape. It has two
heads. These are write head and read head. The write head encodes the magnetic signals on the magnetic
tape. Similarly, the read head reads the stored data from magnetic tape and transfers it into the RAM.
Magnetic disks are the most commonly used secondary storage medium.
Advantages of Magnetic Disks
1. They provide high storage capacity because of their high data recording densities and compact size.
2. They are much reliable.
3. They are used to transfer the data from one computer to another.
4. Easily portable.
Limitations
1. Not all the types of magnetic disks are portable.
2. The cost of magnetic disks is high compared to magnetic tapes.
3. They are very sensitive and they must be stored in dust-less environment.
4. Magnetic disks should be named properly while keeping them for offline storage. Otherwise, it leads to
confusions.
Types of Magnetic Disks are Floppy disks and Hard disks
Floppy Disks :
Floppy disks are a storage medium made of a thin magnetic disk. They were widely used from the
1970s to the early 2000s. They are very easy to use and are portable. Data is stored as electromagnetic
charges on a metal oxide film coating the Mylar plastic. There exist several types of floppy disks but the
most common one is the 3.5 inch floppy that can store data up to a capacity of 1.44
megabytes, something like 400 typewritten pages. A floppy drive is required to access a
floppy disk.
Hard Disks:
Hard disk drive is made up of a series of circular disks called platters arranged one over the other almost
½ inches apart around a spindle. Disks are made of non-magnetic material like aluminium alloy and
coated with magnetic material. Data is stored by magnetizing or demagnetizing the magnetic coating. A
magnetic reader arm is used to read data from and write data to the disks. A typical modern HD has
capacity in terabytes (TB). Hard disks store very high volume of data. Currently hard disks can store
gigabytes of data (e.g. 500GB). Most operating systems are stored in hard disks and all materials
(application software, documents, images, music files etc) that you save on your computer are stored in
the hard disk. Similar to floppy disks, data is stored in closed concentric circles called tracks.
The metal platter is sealed inside a disk drive. Sometimes some hard disk may fail due to a head crash,
resulting in loss of data and this is due to various reasons such as: improper handling of hard disks, voltage
problems, … etc.
Optical Disks :
An optical disk is primarily used as a portable and secondary storage device. It can store more data than
the previous generation of magnetic storage media, and has a relatively longer lifespan. Compact disks
(CD), digital versatile/video disks (DVD) are currently the most commonly used forms of optical disks.
Optical disks have very less cost-per-bit. The mostly used optical disk with storage capacity of 700MB/
800MB. These disks are generally used to:
▪ Distribute software to customers
▪ Store large amounts of data such as music, images and videos
▪ Transfer data to different computers or devices
▪ Back up data from a local machine
Optical Disk Drive
Optical disk drive is used to read and write data from an optical disk. It consists of all the electrical, electronic
and mechanical components to hold an optical disk while reading or writing data from or to the optical disk.
Access Time
The optical disks have continuous spiral track sectors. The accessing of data randomly is very slow
Optical disk is a removable media.
Types of Optical disks are:
• Compact Disk (CD)
• Digital Versatile Disk (DVD)
Compact Disks (CD): Compact disks are circular disks that use optical rays, usually lasers, to read and
write data. They are very cheap as you can get 700 MB of storage. CDs are inserted in CD drives built into
CPU cabinet. They are portable as you can eject the drive, remove the CD and carry it with you.
There are three types of CDs
1. CD-ROM (Compact Disk – Read Only Memory) − The data on these CDs are recorded by the
manufacturer. Proprietary Software, audio or video are released on CD-ROMs.
2. CD-R (Compact Disk – Recordable) − Data can be written by the user only once on the CD-R. It cannot
be deleted or modified later. Some example applications include creating a backup of your hard disk,
creating your own music CD or saving your family album.
3. CD-RW (Compact Disk – Rewritable) − Data can be written and deleted on these optical disks again
and again. Also known as erasable disks. CR-RW (rewritable) can be used to save data several times. This
type of optical disk is particularly useful to save large files that need to be updated regularly.
Digital Versatile Disk(DVD): DVD are optical devices that can store 15 times more than CDs. They are
usually used to store rich multimedia files that need high storage capacity. DVDs also come in 3 varieties
– read only, recordable and rewritable.
Magnetic Tape :Magnetic tape has been in use for more than 50 years. Modern magnetic tape is
packaged in cartridges or cassettes and is used for storing data backups, particularly in corporate settings.
The average amount of storage is 5 MB to 140 MB.
Uses of Magnetic Tapes
❖ They are often used for data backup from online devices to offline-devices.
❖ They are used for migrating data among different computers which are not linked with each other.
Zip Disk Drive: The drive which is used to play the zip disk is called Zip Disk Drive. The capacity of these disks
ranges from 8GB to 500GB. The drive use to run or connect these disks with computer is called zip drive. These
drives can be of fixed type or portable type. The fixed type of zip drives cannot be disconnected from the system
while the portable drives can be easily removed and connected with other systems. The zip disks can be inserted
and removed from the zip drives as easy as inserting and ejecting a CD drive in a CD player.
Flash Drive (Pen Drive): Pen drive is also called as USB flash drive which is a secondary storage device. It
comprises of the components like USB connectors. Pen drives use EEPROM (Electrically Erasable
Programmable Read Only Memory) that enables to read, write and erase the data easily. Pen drives are available
with 256MB, 512MB, 1GB, 2GB, 4GB, 8GB, 16GB, 32GB and 64GB capacities.
Working of Flash Drive or Pen Drive: It is often identified as a plug and play device as it does not require any
kind of external power supply, a software or a battery for its functioning. The user can start using it by just
directly plugging it into the system’s USB port which is then automatically recognized by the operating system.
As soon as the operating system detects the device, a new drive is created in “My computer” icon of the system.
Now, the user can read, transmit or rewrite the data from a pen drive to computer and vice versa. Finally, after
completing the task, eject/remove the device safely from the computer for future use.
Furthermore, a pen drive is a readable, writable and removable device where the user can access
data (read and write), listen audio and watch videos as well. It can have varied storage capacity. And due
to its compact size, longer life span and faster accessibility, pen drives are preferred more than floppy disks
and CD-ROMs.
Off-line Storage Memory Card : An electronic flash memory storage disk commonly used in consumer
electronic devices such as digital cameras, MP3 players, mobile phones, and other small portable devices.
MACHINE LANGUAGE: We think of computers as being quite complicated, but actually their basis is
very simple. It is based on the concept of electricity being turned "on" and "off". From this on/off, two-
stage system, representing data have been constructed using the binary system of numbers. The binary
system is based on two digits 0 and1. In one system, the letter A is represented as 1000001. Commas,
semicolons and other special characters are also represented as bunches of 0s and 1s. 0s and1s that
electrically set the switches, with 0 representing off and 1 responding on. This has made changing from one
program to another considerably easier. Machine Language is also called as First Generation Language.
Advantages
1. It is easily understood by the CPU.
2. The time taken for executing the program is very less.
3. The computational speed is very high.
Disadvantages
1. It is very difficult for a human to understand.
2. The length of programs written in machine language is very large.
3. It is difficult to correct or modify the programs.
4. It is a machine dependent language.
ASSEMBLY LANGUAGE: An assembly language is a low-level language used basically for programming
computers. This language not only implements a symbolic representation of numeric machine code but also
implements other constants that are required to program a specific CPU architecture.
Initially, assembly languages were developed in 1950’s. This language was referred to as Second Generation
Language (2GL). The purpose of developing such languages is to eliminate the problems encountered while using
first generation languages. Assembly language is generally used for,
1. Performing direct hardware manipulation
2. Accessing the processor’s instructions
3. Addressing critical performance issues.
If a program is written in assembly language, then it comprises of sequence of instructions called mnemonics.
These instructions correspond to a series of executable instructions. A utility program known as assembler is used
for converting these executable instructions into machine language instructions. Every instruction written in
assembly language comprises of opcode and at least one operand. Opcode is the symbolic name given to a single-
executable machine language instruction. Operands refer to the address of data situated in the storage.
Most of the complex and highly-developed assemblers provide additional functionality in order to facilitate
program development, to control the assembly process and to assist in debugging.
Generally, many of the modern assemblers are responsible for creating object code. This is done by
converting the assembly instructions (mnemonics) into opcodes and by resolving the symbolic names for
memory locations.
Advantages
1. Assembly languages reduce the cost of associated ROM chips because of the reduced code size.
2. Assembly language helps the programmer to understand the way the computer operates.
3. Assembly language programs are easy to understand and use.
4. It is easy to perform modifications.
5. It is easy to identify the errors, locate and correct the errors.
Disadvantages
1. The execution time is more
2. It is a machine-dependent language.
3. A programmer requires proper knowledge of the hardware.
HIGH-LEVEL LANGUAGES
A high-level language is a language used for computer programming. High-level languages are very much
similar to human languages. These languages are easier to read, write and maintain. Compiler or interpreter is
responsible for converting the programs written in high-level languages into machine language instructions.
These languages are said to be machine-independent. The main feature of high-level language is that, this
language is not bound to a specific processor. High-level languages are transportable, which means that the same
high-level language can be used in making multiple computers comprising of different processors.
In 1950, the first high-level programming language was developed. But today there are many different
high-level programming languages are ALGOL, BASIC, C, C++, FORTAN, PASCAL etc. These languages
allow programmers to write programs using simpler terms.
Advantages
1. These languages are easier to read.
2. These are machine-independent languages.
3. Corrections and modifications can be done easily.
Disadvantages: The execution time is more since the HLL instruction needs to be converted into assembly
language and then to machine language.
4Q. EXPLAIN IN DETAIL ABOUT APPLICATION SOFTWARE AND ITS TYPES?
A. Application Software: The software that helps the user in some specific task is referred to as application
software. A single program or a set of programs forms the application software. An application software can be
built for any kind of application like graphics, word processors, media players, database applications,
telecommunications etc.
1. Word Processor: Word processor is a special program used for performing work processing. It is capable
of processing the text based documents. It enable a user to create, edit an manipulate the text document.
2. Spreadsheet: Spreadsheets or worksheets can be defined as a work space that consists of interrelated
columnar, complex reports. They are built with cells arranged in the form of rows and columns. The rows
are aligned horizontally across the screen and columns are aligned vertically down.
3. Database Management: A database management system is a software that defines a database, stores the
data, supports a query language, produces reports and creates data entry screens.
4. Graphics Software: Graphics is a software which is implemented through a system in order to create,
view, store, edit and print the pictures, drawings, graphs etc.
5. Entertainment Based Software: A computer system can be used as an entertainment tool. Computer
video games are the examples belongs to this category.
6. Educational Based Software: When a computer is installed with education software, it can be used as a
teaching and learning tool. Some of the examples of such software are teaching mathematics, grammar,
language or any other subject.
7. Personal Assistance Software: This type of software is mostly used in personal computers for various
purposes such as,
(i) Storing and retrieving the personal information.
(ii) Planning and Managing the contacts, finances schedule etc.
5Q. DEFINE WORD PROCESSING. ALSO, EXPLAIN ITS FEATURES?
MS-Word is a most commonly used word processing application. This application can be used to prepare
documentation, notes, reports, officials, letters, files, memos, etc. A Ribbon is present at top of a word document.
It arranges group of tools and commands into various categories referred to as tab. The various other features of
MS-Word are formatting text in a document, Moving, Copying, Saving, Searching words and Mail Merge.
3. Help to create resumes, notes, and assignments: – We can create notes and assignment. It’s easy to write and
format by using various text formatting options such as paragraph, fonts, styles etc. You can insert a cover page,
you can insert watermark and tables in your assignment according to your choice.
6Q) WHAT ARE SPREAD SHEETS (WORK SHEETS)? GIVE A OVERVIEW OF SPREAD SHEETS?
Excel is a spreadsheet program in the Microsoft Office system. You can use Excel to create and format workbooks
(a collection of spreadsheets) in order to analyze data and make more informed business decisions. Specifically,
you can use Excel to track data, build models for analyzing data, write formulas to perform calculations on that
data, pivot the data in numerous ways, and present data in a variety of professional looking charts.
Features of M S EXCEL:
In the Microsoft office package, all the applications have their own dedicated features, these features help the user
to work with the applications smoothly and they also resemble the importance of the application.
Features:
1. Workbook (Worksheets): Excel provides a workbook which contains worksheets. These worksheets contain
cells (combination of rows and columns) where the user can enter the data in an order of row wise or column wise.
These worksheets make the data look more uniform and attractive. User can create add desired number of
worksheets in desired number of workbooks as per the requirement.
2. Normal and Page break view: We are provided with two types of views in excel, normal view is used to
view the worksheet in a normal way, simply it means the worksheet will appear with a default zoom level and
default cell sizes. Page break view will provide an opportunity to set the page breaks as desired by the user.
3. Chart Wizard: Chart wizard feature enables the user to insert a chart on the worksheet. With this feature we
can create a chart on our own as per the data in the worksheet.
4. Function: This feature provides us with predefined formulas that perform calculations by using specific
values, called arguments, in a particular order, or structure. They can be used to perform simple or complex
calculations.
5. Picture: This feature enables the user to insert pictures from clipart, from file and from scanner or camera
onto the worksheet. With this feature we can also insert AutoShapes, WordArt and Organization Chart.
6. Diagram: This diagram feature is used to create an Organization chart, Cycle diagram, Radical diagram,
Pyramid diagram, Target diagram, Venn diagram. This feature will help to make the worksheet more attractable
and the details in the diagrams more understandable.
7. Symbol: This will help the user to insert symbol like custom numbers, Wingdings, etc., and also insert
special characters on the sheet.
8. Comments: By using this feature the user can add comments to a cell in the worksheet and the user can also
see the name of a person who had given the comment.
9. Spelling: Spelling is one among the special feature provided by ms excel for checking the spellings entered
by the user if there are any mistakes. This feature is sophisticated with an internal dictionary which helps in
modifying the spellings like synonyms etc.,
10. Formula auditing: MS Excel provides this feature to correct any problem with the formulas provided. This
feature also helps to graphically display or trace the relationships cells and formulas with blue arrows.
ACTIVE CELL : When you click on a cell in Excel, the active cell is identified by its black outline. You enter
data into the active cell. To move to another cell and make it active, click on it with the mouse or use the arrow
keys on the keyboard.
FILE TAB: The File tab is new to Excel 2010. It is a replacement for the Office Button in Excel 2007, which was
a replacement for the file menu in earlier versions of Excel. The File tab options are mostly related to file
management such as opening new or existing worksheet files, saving, printing, and a new feature saving and
sending Excel files in PDF format.
FORMULA BAR: The formula bar is located above the worksheet, this area displays the contents of the active
cell. It can also be used for entering or editing data and formulas.
NAME BOX: Located next to the formula bar, the Name Box displays the cell reference or the name of the active
cell.
COLUMN LETTERS : Columns run vertically on a worksheet, and each one is identified by a letter in the column
heading.
ROW NUMBERS : Rows run horizontally in a worksheet and are identified by a number in the row heading.
CELL: Cells are the rectangular boxes located in central area of a worksheet. Data entered into a worksheet is
stored in a cell. Each cell can hold only one piece of data at a time. A cell is the intersection point of a vertical
column and a horizontal row. Each cell in the worksheet can be identified by a cell reference, this is combination
of letters and numbers such as A1, F456, or AA34.
SHEET TABS: By default, there are three worksheets in an Excel file, although there can be more. The tab at the
bottom of a worksheet tells you the name of the worksheet, such as Sheet1 or Sheet2. Switch between worksheets
by clicking on the tab of the sheet you want to access
ADD SHEET ICON: Adding additional worksheets can be done by clicking on the add sheet icon next to the
sheet tab at the bottom of the screen or you can use this keyboard shortcut to add a new worksheet.
QUICK ACCESS TOOLBAR: This toolbar can be customized to hold frequently used commands. Click on the
down arrow at the end of the toolbar to display the toolbar's options.
STATUS BAR: The status bar, which runs horizontally along the bottom of screen, can be customized to display
a number of options, most of which give the user information about the current worksheet, data the worksheet
contains, and even the user's keyboard - such as whether the Caps Lock, Scroll Lock, and Num Lock keys are turned
on or off.
ZOOM SLIDER: Located in the bottom right corner of the Excel screen, the zoom slider is used to change the
magnification of a worksheet by dragging the slider box back and forth or by clicking on the Zoom Out and Zoom
In buttons located at either end of the slider.
RIBBON: “The Ribbon” is the professional term for the Microsoft Word toolbar, and is a part of many Microsoft
programs, including Outlook, Excel, and PowerPoint. The ribbon holds all of the information in previous versions
of Microsoft Office in a more visual stream line manner through a series of tabs that include an immense variety
of program features.
Ribbon contains commands organized in three components:
Tabs: These appear across the top of the Ribbon and contain groups of related commands.
Home, Insert, Page Layout are examples of ribbon tabs.
Groups: They organize related commands; each group name appears below the group on the Ribbon. For example,
group of commands related to fonts or group of commands related to alignment, etc.
Commands: Commands appear within each group as mentioned above.
lines or fully rounded circles. However, package generates the lines and round circles because it
automatically links them with one another properly. Additionally, it also permits users to perform move,
copy, delete, rotate, tilit, flip horizontally/vertically, increase/decrease the size of objects. Therefore, the
above mentioned characteristics makes simple for the user to generate complex designs.
Computer-Aided Design (CAD) is an environment which is mainly dependent on this feature of graphics
software. Architects and engineers make use of CAD system for producing architectural drawings, product
designs, landscaping plans and several other types of engineering drawings. Therefore, user can generate
actual designs within less time period rather than designing them several days.
2. Paint Drawings and Pictures
It helps users to alter the drawings and pictures in the form of an image.
The images that are linked over the screen mainly depends on the binary bits called as bit
mapping. The images that are represented in terms of pixels are referred to as bitmap images graphics.
Each pixel represents a particular color. Bitmapped editors are used to create or edit the pictures. Adobe
Photoshop, Flash, Corel Draw, Corel photo point, Lview pro, GIF 89a, Paint shop pro are some of the
commonly used bitmap editors. Bitmapped file format is used to store the bitmap images. The formats
GIF, JPEG, Bitmap (BMP), Post Script (PS), IRIS and Tagged Image File Format (TIFF) can store the
bitmap graphics files.
Images or graphic objects that are represented using mathematical tracks are referred to as vector
graphics. Image attributes such as lines, points, circles, arcs, few geometric shapes are represented in
terms of geometrical equations. The image that needs frequent resizing and repositioning should be
represented using this technique. Vector graphics can be created or modified using vector editors. Most
often vector editors are used to create or modify more complicated graphics like photographs. In raster
graphics, images are produced in the form of dots known as pixels. This technique is used by the painting
software through organizing the screen pixels positions.
However, raster graphics images occupy more memory when compared with vector graphics, it is
more flexible and provides high degree of creativity in drawing typical shapes and using of colors.
3. Present Graphs
It allows users to design graphs and charts by importing the numerical information from software
like a spreadsheet or a database. Line graphs, bar charts and pie charts are mostly used by the users for
representing numerical data graphically. Line graphs consists of several lines which internally links the
data points placed over horizontal and vertical axes. Bar charts utilize more than one bar that exists on
horizontal and vertical axes to display the values through lengths of the bars. In certain cases, each bar
segregated is into various component parts and the addition of these parts is a result of the total length of
the stacked bar.
Pie chart is a circle divided into sectors which shows the sharing of each component in the entire
circle. But, bar graphs shows bette proportion estimates. This is used by the analysts, decision makers as it
helps in easy understanding of the relationships, modifications, trends that hidden in respective
geometrical data and defines decision making.
4. Drag-and-Drop Objects
It allows user to develop all the designs and pictures quickly by enabling them to use ready-made
graphic objects or images that are provided with a software. For instance, drawing software is provided
with additional ready-made shapes such as line, rectangle, circle and so on which can be utilized by the
user while designing based on their requirement.
5. Import Objects
It allows users to develop all the designs and pictures much quickly by enabling them to not only
access graphic objects or images provided along with a software but also those objects that are provided
by some other software.
The general steps for importing the images are as follows,
1. In power point presentation, select the slide to which the user need to add the image or insert a new slide.
2. The commands like Insert/Picture, Insert/Clip art, Insert/Object are used to select the images.
3. Select the format of the file, which the user want to import.
4. Select the file name of the intended image.
5. Click OK then power point adds the selected image to the current slide.
6. Drag the mouse to define the desired size and position of the chosen graphic.
7. Edit the image, if required by double clicking on it.
6. Screen Capture
This technique allows user to capture the screenshot of a display screen and translate it into an
image referred as a bit-mapped image which can be saved in a file and can be imported later whenever
required. This is beneficial at the time of writing books or manuals which involves the screen images.
11Q) Define database management system. Discuss in detail about data models and different types of data
models? (OR) Write about Data Manipulation Language (DML)? (OR)
Discuss in detail about the process of creating and using database?
Database management system is a group of programs that are used for facilitating the users to create,
delete, organize, update and manipulate data in the database.
12Q. Write short notes on (i) Query language (SQL) (ii)Query By Example(QBE).
(i) Query Language
Query languages are supported by the database systems for handling complex queries. These query languages
follow SQL standard.
SQL (Structured Query language) is a database language which is compatible with RDBMS. It provides an
interface to simple relational database. It is a simple portable language that does not require enough learning to
work with its syntax and commands. It performs the following functions,
(a) Creates tables and database structures.
(b) Performs addition, deletion and modification operations on the database structutes.
All these operations are performed using the concept of DML (Data Manipulation Language) and DDL
(Data Definition Language).
Features
1. SQL is an English-like language containing statements in English sentences. Hence SQL statements are
easily understandable.
2. It minimizes the time required in creating and maintaining the database systems.
3. It gives quick solutions to complex queries.
4. It is a portable language and can be executed on various computer systems.
5. It enables communication between clients and servers over a network.
6. It enables programmers to write applications for accessing database.
2Q) WRITE ABOUT THE COMPONENTS THAT HELP IN MEASERING THE SYSTEM
PERFORMANCE?
The performance and efficiency of an operating system is measured by the following key components
(i) Throughput: The no.of processes that are completed per unit time by a system is referred as through put. Per
instance, consider a system that carry out ‘m’ processes within ‘s’ then it’s through put is given as m/s processes
per a second in a given interval of time. It is calculated in terms of processes/ hour. Through put of a system
relies on effectiveness and nature of the jobs processed.
In case of long processes, system through put is one process/ hour where as in short processes it can be 100
processes/ hour for the same system.
(ii) Turn Around Time: It defines the difference between completion time and arrival time of each process/ job
in a given system.
(iii) Response Time: It defines the time a submission of a request till the time of generation of first response is
produced in an interactive system.
6 It proforms code translation only. It performs code translation and code execution.
7 It consumes more memory in a storage device It consumes very less amount of memory in a storage device (Memory
(Memory usage is very high). usage is very low).
INTERNAL COMMANDS:
There are also called memory-resident commands. These commands are automatically loaded into the
computer’s memory during the booting process. They actually included in the Command.com file. So these
commands are executable immediately after getting the dos prompt.
A few internal commands are
01. VER 02. VOL 03 DATE 04. TIME 05. CLS 06. DIR 07. MD
08. CD 09. RD 10. COPY CON 11. COPY 12. DEL 13. REN
A command can be given in Capitals or Small letters also. The internal commands can execute immediately but
External Commands require special files for their execution without which it is not possible to execute them.
1. VER: - All O/S has its own edition number or release or version number. The version number indicates which
edition of O/S you are working on.
Syntax: VER <Enter>
Example: C:\> Ver <Enter>
Result will be: - Microsoft Windows XP [ Version 5.1.2600]
02. VOL: - It is used to display volume label and serial number of the current drive
Syntax: Vol [drive:]
Example: C:\> VOL
3. DATE: - Used to display the current system date and prompt for entering new date.
Syntax: Date <Enter>
Example: C:\> date <Enter>
4. TIME: - Displays the current system Time and prompt for entering new time.
Syntax: Time <Enter>
Example: C:\> Time <Enter>
6. DIR: - This command displays the list of directories and files with details like date of
creation whether it is directory or file etc.
Syntax: DIR <Enter>
Switches:
/p : To display output by page wise. /w : To display output by column wise
/l : Display all the information in lower case letters.
Example:
DIR *.txt : Display all the files with extension .txt
DIR D???.* : Display all the files starting with D and having less than or equal to four characters in the file name
and any extension.
Here “?” And “*” are called “wild card character”. “*” Stand for any number of the character. “?” Stands for nay
one character.
08. CD: - This command allows you to change present directory to another directory.
Syntax: CD [DRIVE:] PATH
Example: C:\> CD SAMS and press <Enter>
10. COPY CON: -We use this command to create a new file.
Syntax: COPY CON <FILENAME>
Example: C:\> Copy Con sams.txt <Enter>
Note: - Typing here and when you are done, press Ctr+Z or F6 key followed by Enter to save the current
document.
11. COPY: - Using this command you can make duplicate files of an exiting file from one location to another or
one directory to another with different name or exiting name.
SYNTAX: COPY < SOURCE FILE NAME> <TARGET FILENAME>
Example: C:\> COPY SAMS.TXT A:\TAJ
Example: C:\> COPY*.TXT +*.BAK TARGET FILENAME And Then Press Enter
Example: C:\> COPY SAMS.TXT C:\SAMS_1\FO\RECEPTION And Then Press Enter
You can also have the option to change the name of files as you copy it.
Example: C:\> COPYold.TXT C:\dos\new.txt And Then Press Enter
12. DEL/ERASE: This command removes one or more files from the disk or current working directories.
SYNTAX: DEL filespec [/p] or ERASE filespec [/p]
Example: C:\> DEL C:*.BAK /P And Then Press Enter
(ii) List of files that end with .MP3 file extension. C:\>dir *.mp3
(iii) List any file that ends with data. For example, appdata, mydata, and 123data would all be matched.
C:\>dir *data
(iv )List any file that is four characters long, begins with he, and has any extension. For example,
help.txt, help.mp3, and heck.jpg would all be matched.
C :\> dir he??.*
2. MOVE : This command moves a file or group of files from one directory to
another and also one disk to another disk. It can also be used to rename directories.
EXAMPLE: move c:\sams\fo.txt to d:
EXAMPLE: move c:\sams\fo.txt to d:\ new_sams
3. MEM: This command displays amount of total available memory ( low, Expanded and
Extended) and all currently programs.
Syntax: MEM [/f][/p][/m]
Switches:
Example: MEM/p and then press <Enter>
4. ATTRIB: Every File on the Disk has its own description like size, space occupied, the type, the date it was
created, etc. Likewise, every file has few attributes. The attributes of a file indicates whether it is a
i) Read-Only File: r ii) Archive File a
5. LABEL: Displays the current system volume label and it provides a chance to provide a new label(NAME) or
old label.
Syn: LABEL <ENTER KEY>
Windows XP is an operating system introduced in 2001 by Microsoft and is a part of the windows family of
operating systems. The operating system provides a new interface that uses graphics to simplify navigation and
completing common tasks, thus, making learning and working easier.
Microsoft released windows XP in two versions: Windows XP Home and Windows XP professional.
Windows XP Home Edition is designed for home use and small business, while windows XP professional is
specially designed for advanced home computing, business and larger organizations. Windows XP professional is
designed to handle more powerful computing needs by providing more reliability, security and administrative
options.
FEATURES OF WINDOWS:
Windows provides a new interface to simplify navigation and perform common tasks (like crating and opening
of a file) easily, thus, making learning and working easier. These are the various features that make Windows a
powerful, fast, efficient, and stable operating system.
1. Improved interface: Windows provides a completely redesigned interface. Start menu lets you access
programs more quickly. Windows displays the most used items in the start menu while it hides the least used
items.
2. More reliable: Windows is based on the same technology that is used in Microsoft Windows NT and Windows
2000.This makes windows much more stable than windows 95,windows 98 and windows ME and greatly
reduces the number of system crashes and system restarts.
3. Better file and folder management: Windows makes it easier to view and work with files and folders for
example, Thumbnail view lets you preview photos and images and the new file and folder tasks pane lets you
Shell: The shell which is also called command interpreter. It receives and understands the commands issued by
the user. It acts as an interface between the user and kernel. The user interacts with the shell by issuing shell
commands. There are 2 major parts of shell.
i) Interpreter that interprets the commands given by the user and gets them executed by the kernel.
ii) Programming capability that allows the users to write shell script (shell program).
Utilities: Utilities are the commands defined in the system directories / bin. Utilities are make user job is easy,
particularly in efficient system programming and application development like open the files, process the files
and output the results.
There are numerous tools available
for processing files;
for editing programs such as ed;
for processing text such as cut, copy, paste;
for developing programs;
for communication such as mail, write messages and so on.
The user itself can create his own tools, which are executable files defined in his own directory.
FEATURES OF UNIX O/S:
➢ Multi user accessing / Resource sharing ➢ Communication
➢ Multi tasking ➢ Utilities
➢ Security ➢ Programmer support
➢ Portability
10Q) EXPLAIN ABOUT LINUX OPERATING SYSTEM?
Linux is an open source operating system which is powerful and easy to implement. It can easily installed
onto the computer system. Linux observes POSIX (Portable Operating System Interface) specifications and is
provided with extensions similar to Unix.
Design principles of Linux OS:
It is multi user, multi tasking and multi programming operating system consisting of tools with traditional
Unix.
It implements the structure and networking model of unix.
It is platform independent.
It is more suitable for architecture of personal computers.
It can be executed on multiple processors or machines.
Linux Development Process:
The Linux OS involves several components during its development process.
Initially, open source development community generates a source code for an OS kernel and sends it to
kernel developer’s core team.
The main role of this team is to verify the advantages of the additional features that can perform the
modifications be included in existing kernel. If these additional features are found to be advantages to the kernel,
then kernel efficiency is improved.
The programmers and application vendors install the kernel that is easily available and then builds
different types of application software for this kernel.
They perform distribution of company’s package and sell different versions of Linux.
Hardware vendors integrate Linux on respect systems and send those systems with Linux OS and a group
of application software.
Finally, the 3rd party runs Linux and applicatons for full-filling their processing necessities.
2Q) DEFINE COMPUTER NETWORK ALONG WITH ITS GOALS AND APPLICATIONS?
Computer Network is a group of computers connected with each other through wires, optical fibres or
optical links so that various devices can interact with each other through a network. The aim of the computer
network is the sharing of resources among various devices. In the case of computer network technology, there are
several types of networks that vary from simple to complex level.
GOALS OF COMPUTER NETWORK
1. Resource sharing: Resource sharing is the sharing of resources such as programs, printers, and data among
the users on the network without the requirement of the physical location of the resource and user.
2. Server-Client model: Computer networking is used in the server-client model. A server is a central computer
used to store the information and maintained by the system administrator. Clients are the machines used to access
the information stored in the server remotely.
3. Communication medium: Computer network behaves as a communication medium among the users. For
example, a company contains more than one computer has an email system which the employees use for daily
communication.
4. E-commerce: Computer network is also important in businesses. We can do the business over the internet. For
example, amazon.com is doing their business over the internet, i.e., they are doing their business over the
internet..
PROTOCOLS: Protocols refers to a set of rules to control the communication between two devices. It basically represents
an agreement between the communicating devices.
1. SIMPLEX MODE
In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction. A device can only send
the data but cannot receive it or it can receive the data but cannot send the data. The simplex mode can use the
entire capacity of the channel to send data in one direction. Example: Keyboard and Monitor are the examples of
the simplex mode as a keyboard can only accept the data from the user and monitor can only be used to display
the data on the screen.
Advantage of Simplex mode:
o In simplex mode, the station can utilize the entire bandwidth of the communication channel, so that more data
can be transmitted at a time.
o The main advantage of the simplex mode is that the full capacity of the communication channel can be utilized
during transmission.
Disadvantage of Simplex mode:
o Communication is unidirectional, so it has no inter-communication between devices.
2. HALF-DUPLEX MODE
In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice versa.
The half-duplex mode is used in cases where there is no need for communication in both direction at the same
time. The entire capacity of the bandwidth of a communication channel can be utilized for each direction.
Example: Walkie- talkie in which message is sent one at a time and messages are sent in both the directions.
Advantage of Half-duplex mode: In half-duplex mode, both the devices can send and receive the data and also
can utilize the entire bandwidth of the communication channel during the transmission of data.
Disadvantage of Half-Duplex mode: In half-duplex mode, when one device is sending the data, then another
has to wait, this causes the delay in sending the data at the right time.
3. FULL-DUPLEX MODE
In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions. Both the
stations can send and receive the message simultaneously. Full-duplex mode has two simplex channels. One
channel has traffic moving in one direction, and another channel has traffic flowing in the opposite direction.
The most common example of the full-duplex mode is a telephone network. When two people are
communicating with each other by a telephone line, both can talk and listen at the same time.
Advantage of Full-duplex mode:
Both the stations can send and receive the data at the same time.
The Full-duplex mode is the fastest mode of communication between devices.
Disadvantage of Full-duplex mode: If there is no dedicated path exists between the devices, then the capacity of
the communication channel is divided into two parts.
2. Coaxial Cable: Coaxial cable is very commonly used transmission media, for example, TV wire is usually a
coaxial cable. The name of the cable is coaxial as it contains two conductors parallel to each other. It has a higher
frequency as compared to Twisted pair cable.
The inner conductor of the coaxial cable is made up of copper, and the outer conductor is made up of copper
mesh. The middle core is made up of non-conductive cover that separates the inner conductor from the outer
conductor. The middle core is responsible for the data transferring whereas the copper mesh prevents from the
EMI(Electromagnetic interference). Coaxial cable is of two types.
1. Baseband transmission: It is defined as the process of transmitting a single signal at high speed.
2. Broadband transmission: It is defined as the process of transmitting multiple signals simultaneously.
Advantages of Coaxial cable:
o The data can be transmitted at high speed.
o It has better shielding as compared to twisted pair cable.
o It provides higher bandwidth.
Disadvantages Of Coaxial cable:
o It is more expensive as compared to twisted pair cable.
o If any fault occurs in the cable causes the failure in the entire network.
3. Fiber Optic: Fiber optic cable is a cable that uses electrical signals for communication. Fiber optic is a cable
that holds the optical fibers coated in plastic that are used to send the data by pulses of light. The plastic coating
protects the optical fibers from heat, cold, electromagnetic interference from other types of wiring. Fiber optics
provide faster data transmission than copper wires.
Basic elements of Fiber optic cable:
Core: The optical fiber consists of a narrow strand of glass or plastic known as a core. A core is a light
transmission area of the fibre. The more the area of the core, the more light will be transmitted into the fibre.
Cladding: The concentric layer of glass is known as cladding. The main functionality of the cladding is to
provide the lower refractive index at the core interface as to cause the reflection within the core so that the light
waves are transmitted through the fiber.
Jacket: The protective coating consisting of plastic is known as a jacket. The main purpose of a jacket is to
preserve the fiber strength, absorb shock and extra fiber protection.
Following are the advantages of fiber optic cable over copper:
Greater Bandwidth: The fiber optic cable provides more bandwidth as compared copper. Therefore, the fiber
optic carries more data as compared to copper cable.
Faster speed: Fiber optic cable carries the data in the form of light. This allows the fiber optic cable to carry the
signals at a higher speed.
Longer distances: The fiber optic cable carries the data at a longer distance as compared to copper cable.
Better reliability: The fiber optic cable is more reliable than the copper cable as it is immune to any temperature
changes while it can cause obstruct in the connectivity of copper cable.
Thinner and Sturdier: Fiber optic cable is thinner and lighter in weight so it can withstand more pull pressure than
copper cable.
UNGUIDED TRANSMISSION
o An unguided transmission transmits the electromagnetic waves without using any physical medium. Therefore
it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can flow easily.
a) RADIO WAVES
o Radio waves are the electromagnetic waves that are transmitted in all the directions of free space. Radio waves
are omni directional, i.e., the signals are propagated in all the directions.
o The range in frequencies of radio waves is from 3Khz to 1 khz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e., the wave sent by the
sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
b) MICROWAVES
Microwaves are of two types:
1. Terrestrial microwave
2. Satellite microwave communication.
MODULATION TECHNIQUES
• Amplitude Modulation (AM): Two binary values (0 and 1) of digital data are represented by two
different amplitudes of the carrier signal, keeping frequency and phase constant
• Frequency Modulation (FM): Two binary values of digital data are represented by two different
frequencies, while amplitude and phase are kept constant
• Phase Modulation (PM): Two binary values of digital data are represented by shift in phase of carrier
signal
9Q) DISCUSS THE CHARACTERISTICS OF MODEMS?
1. SPEED: It specifies the rate of data transmission. If the rate of data transmission is high, then the speed of modem
can be measured in terms of BPS(Bits per second). Otherwise it is measured in terms of Baud rates. Now a days,
most of the networks uses only high speed modems.
2. FLASH MEMORY: The memory which is used by modems is called as Flash RAM. Flash RAM supports new
protocols whenever they added or updated.
3. DATA COMPRESSION: Modems perform the data compression for transfer the data at high speed. Some of the
modems uses data compression techniques to compress the data and de-compress the data.
4. VOICE/ DATA: Many of the modems are provided with a switch known as voice/ data switch, which is used to
change the mode of the modem either in voice mode or in data mode. If a modem is switched to a data modem, then
it is behaves like regular modem. If a modem is switched to a voice modem, then it is behaves like regular
telephone. A modem in voice mode contains built-in loud speaker and microphone to support the voice
communication.
5. AUTO-ANSWER: Modem processes auto-answer characteristics. This characteristic will enable the system to
receive calls without any external interference in the absence of a user.
6. FAX CAPABILITY: Most of the modems are having the ability of transmitting and receiving the electronic
documents as faxes. A fax modem is similar to that of a regular modem along with the capability of sending
documents to a fax machine or to some other fax modem. These types of modems performs double duty.
o Last mile: A telecom company is used to provide the internet services to the customers in hundreds of cities
by connecting their home with fiber.
o Private network: A bank provides a private network that connects the 44 offices. This network is made by
using the telephone leased line provided by the telecom company.
1. Bus Topology
The bus topology is designed in such a way that all the stations are connected through a single cable known as a
backbone cable. Each node is either connected to the backbone cable by drop cable or directly connected to the
backbone cable. When a node wants to send a message over the network, it puts a message over the network. All
the stations available in the network will receive the message whether it has been addressed or not.
The configuration of a bus topology is quite simpler as compared to other topologies. The backbone cable is
considered as a "single lane" through which the message is broadcast to all the stations. The most common
access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
Advantages of Bus topology:
o Low-cost cable: In bus topology, nodes are directly connected to the cable without passing through a hub.
Therefore, the initial cost of installation is low.
o Familiar technology: Bus topology is a familiar technology as the installation and troubleshooting techniques
are well known, and hardware components are easily available.
o Limited failure: A failure in one node will not have any effect on other nodes.
Disadvantages of Bus topology:
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs
in the cable, then it would disrupt the communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the signals of both the nodes collide
with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the network.
2. Ring Topology
All the nodes in a Ring Network are connected in a closed circle of cable. Messages that are transmitted travel
around the ring until they reach the computer that they are addressed to, the signal being refreshed by each
node. In a ring topology, the network signal is passed through each network card of each device and passed on
to the next device. Each device processes and retransmits the signal, so it is capable of supporting many devices
in a somewhat slow but very orderly fashion
By Kakkerla Ramesh, MCA Page 65
www.android.previousquestionpapers.com | www.previousquestionpapers.com | www.ios.previousquestionpapers.com
www.android.universityupdates.in | www.universityupdates.in | www.ios.universityupdates.in
B.Com.(CA)-I/1 Fundamentals Information Technology
There is a very nice feature that everybody gets a chance to send a packet and it is
guaranteed that every node gets to send a packet in a finite amount of time.
Advantages
Broadcasting and multicasting is simple since you just need to send out one message
Less expensive since less cable footage is required
It is guaranteed that each host will be able to transmit within a finite time interval
Very orderly network where every device has access to the token and the opportunity to transmit
Performs better than a star network under heavy network load
Disadvantages
Failure of one node brings the whole network down
Error detection and network administration becomes difficult.
Moves, adds and changes of devices can effect the network
It is slower than star topology under normal load
3. Star Topology:
Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a
central computer. Signals are transmitted and received through the Hub. The central computer is known as a
server, and the peripheral devices attached to the server are known as clients. It is the simplest and the oldest and
all the telephone switches are based on this. In a star topology, each network device has a home run of cabling
back to a network hub, giving each device a separate connection to the network. So, there can be multiple
connections in parallel.
Advantages
Network administration and error detection is easier because problem is isolated to central node
Networks runs even if one host fails
Expansion becomes easier and scalability of the network increases
More suited for larger networks
Disadvantages
Broadcasting and multicasting is not easy because some extra functionality needs to be provided to the central hub
If the central node fails, the whole network goes down; thus making the switch some kind of a Bottleneck
Installation costs are high because each node needs to be connected to the central switch
4. Tree topology
Tree topology combines the characteristics of bus topology and star topology. A tree topology is a type of
structure in which all the computers are connected with each other in hierarchical fashion. The top-most node in
tree topology is known as a root node, and all other nodes are the descendants of the root node. There is only one
path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy.
Advantages of Tree topology
Tree topology is mainly used to provide broadband transmission, i.e., signals are sent over long distances
without being attenuated.
We can add the new device to the existing network. Therefore, we can say that tree topology is easily
expandable.
Easily manageable: The whole network is divided into segments known as star networks which can be easily
managed and maintained.
o Error detection and error correction are very easy in a tree topology.
The breakdown in one station does not affect the entire network.
Point-to-point wiring: It has point-to-point wiring for individual segments.
Disadvantages of Tree topology
Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the problem.
High cost: Devices required for broadband transmission are very costly.
Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall
network
Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
5. Mesh Topology
Mesh technology is an arrangement of the network in which computers are interconnected with each other
through various redundant connections. There are multiple paths from one computer to another computer. It does
not contain the switch, hub or any central computer which acts as a central point of communication. The Internet
is an example of the mesh topology.
Mesh topology is mainly used for WAN implementations where communication failures are a critical concern.
Mesh topology is mainly used for wireless networks.
Advantages of Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link breakdown will
not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Disadvantages of Mesh topology
Cost: A mesh topology contains a large number of connected devices such as a router and more transmission
media than other topologies.
Management: Mesh topology networks are very large and very difficult to maintain and manage. If the
network is not monitored carefully, then the communication link failure goes undetected.
Efficiency: In this topology, redundant connections are high that reduces the efficiency of the network.
6. Hybrid Topology
The combination of various different topologies is known as Hybrid topology.
Hybrid topology is a connection between different links and nodes to transfer
the data. When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are connected with each
other will not result in Hybrid topology. For example, if there exist a ring
topology in one branch of ICICI bank and bus topology in another branch of
ICICI bank, connecting these two topologies will result in Hybrid topology.
Advantages of Hybrid Topology
Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the network.
Scalable: Size of the network can be easily expanded by adding new devices without affecting the functionality
of the existing network.
Flexible: This topology is very flexible as it can be designed according to the requirements of the organization.
Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of the network
is maximized and weakness of the network is minimized.
i)PHYSICAL LAYER
The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
It is the lowest layer of the OSI model.
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface specifications.
It defines the way how two or more devices can be connected physically.
Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-duplex mode
between the two devices on the network.
Topology: It defines the way how network devices are arranged.
ii)DATA LINK LAYER
This layer is responsible for the error-free transfer of data frames.
It defines the format of the data on the network.
It provides a reliable and efficient communication between two or more devices.
It is mainly responsible for the unique identification of each device that resides on a local network
iii)NETWORK LAYER
It is a layer 3 that manages device addressing, tracks the location of devices on the network.
It determines the best path to move data from source to the destination based on the network conditions, the
priority of service, and other factors.
The Data link layer is responsible for routing and forwarding the packets.
Internetworking: An internetworking is the main responsibility of this network layer. It provides a logical
connection between different devices.
iv)TRANSPORT LAYER
The main responsibility of this layer is to transfer the data completely in an order without duplicates
It receives the data from the upper layer and converts them into smaller units known as segments.
This layer can be termed as an end-to-end layer as it provides a point-to-point connection between source and
destination to deliver the data reliably.
Transmission Control Protocol: It is a standard protocol that allows the systems to communicate over the
internet. It establishes and maintains a connection between hosts. When data is sent over the TCP connection,
then the TCP protocol divides the data into smaller units known as segments. Each segment travels over the
internet using multiple routes, and they arrive in different orders at the destination. The transmission control
protocol reorders the packets in the correct order at the receiving end.
v)SESSION LAYER
It is a layer 5 in the OSI model.
The Session layer is used to establish, maintain and synchronizes the interaction between communicating
devices.
Dialog control: Session layer acts as a dialog controller that creates a dialog between two processes or we can
say that it allows the communication between two processes which can be either half-duplex or full-duplex.
Synchronization: Session layer adds some checkpoints when transmitting the data in a sequence. If some error
occurs in the middle of the transmission of data, then the transmission will take place again from the checkpoint.
This process is known as Synchronization and recovery.
vi) PRESENTATION LAYER
A Presentation layer is mainly concerned with the syntax (process) and information exchanged between the
two systems.
It acts as a data translator for a network.
This layer is a part of the operating system that converts the data from one presentation format to another
format.
The Presentation layer is also known as the syntax layer
Translation: The processes in two systems exchange the information in the form of character strings, numbers
and so on. Different computers use different encoding methods.
Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the sender-
transmitted information into another form and sends the resulting message over the network.
Compression: Data compression is a process of compressing the data, i.e., it reduces the number of bits to be
transmitted. Data compression is very important in multimedia such as text, audio, video.
vii)APPLICATION LAYER
An application layer serves as a window for users and application processes to access network service.
It handles issues such as network transparency, resource allocation, etc.
An application layer is not an application, but it performs the application functions.
This layer provides the network services to the end-users.
Functions of Application layer:
File transfer, access, and management (FTAM): An application layer allows a user to access the files in a
remote computer, to retrieve the files from a computer and to manage the files in a remote computer.
Mail services: An application layer provides the facility for email forwarding and storage.
13Q) EXPLAIN SOME CONCEPTS RELATING TO NETWORKING?
INTERNET:
The Internet is a network of computers that links many different types of computers all over the world
§ Network of networks sharing a common mechanism for addressing (identifying) computers, and a common set
of communication protocols
§ Evolved from the basic ideas of ARPANET (the first WAN that had only four sites in 1969) for interconnecting
computers
§ Initially used only by research organizations and universities to share and exchange information
In 1989, the US Government lifted restrictions on the use of the Internet and allowed it to be used for commercial
purposes as well