BA 4TH (Foundation) Computer Foundation Unlocked
BA 4TH (Foundation) Computer Foundation Unlocked
Foundation Course
BAFNDC
[ENGLISH EDITION]
Authors
Daminni Grover, (Units: 1.2-1.4, 3) © Reserved, 2017
Sanjay Saxena, (Units: 1.5, 1.7, 4, 5.2) © Sanjay Saxena, 2017
Rajneesh Agrawal, (Unit: 1.6) © Rajneesh Agrawal, 2017
B. Basavaraj, (Unit: 2.2-2.5), © B. Basavaraj, 2017
Paulomi M Jindal, (Unit: 5.3) © Reserved, 2017
Vikas Publishing House, (Units: 1.0-1.1, 1.8-1.12, 2.0-2.1, 2.6-2.13, 5.0-5.1, 5.4, 5.5-5.10) © Reserved, 2017
Books are developed, printed and published on behalf of Directorate of Distance Education,
Tripura University by Vikas Publishing House Pvt. Ltd.
All rights reserved. No part of this publication which is material, protected by this copyright notice
may not be reproduced or transmitted or utilized or stored in any form of by any means now known
or hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording
or by any information storage or retrieval system, without prior written permission from the DDE,
Tripura University & Publisher.
Information contained in this book has been published by VIKAS® Publishing House Pvt. Ltd. and has
been obtained by its Authors from sources believed to be reliable and are correct to the best of their
knowledge. However, the Publisher and its Authors shall in no event be liable for any errors, omissions
or damages arising out of use of this information and specifically disclaim any implied warranties or
merchantability or fitness for any particular use.
Unit - II
Unit 2: Data Representation
Data Represenation: Number Systems and Character
and Number System
Representation, Decimal, Binary, Octal and Hexadecimal (Pages 37-87)
System, Conversion from One Number System to Another
Number System, Binary Arithmetic (Addtion, Subtraction Using
1’s Complement & 2’s Complement, Multiplication).
Representation of Data/Information Concepts of Data
Processing.
Definition of Information and Data, Basic Data Types, Storage
of Data/Information as Files.
INTRODUCTION
Computers have brought about major changes in all spheres of life. Today it is
NOTES
extremely difficult to imagine the world without computers. Computers help us to
communicate using modems, telephone and Wi-Fi facilities and it seems as if you
are sitting side by side and communicating directly with each other. This modern
way of communication has been made possible by computers. Through the Internet
and e-mail, we now have the facility to communicate with anybody in any part of
the world in a fraction of minutes. Conveniences like ATM bank services, the
Internet, video conferencing, wireless telephony and electronic mail could not have
been possible without data communication and computer networks. Communication
facilities available with an organization or with an individual measure the level of
standard for them.
The fact that computers have made a big impact on many aspects of our
lives can hardly be questioned. They have opened up an entire world of knowledge
and information that is readily accessible. Today, we are using the fifth generation
of computers. The term ‘generation’ is used to distinguish between varying hardware
and software technologies. The hardware by itself cannot do any calculation or
manipulation of data without being instructed what to do and how to do it. Thus,
there is a need of software in a computer system. The software used in a computer
system is grouped into application software, system software and utility software.
This book, Computer Foundation, attempts to provide a sound theoretical
as well as practical basis for understanding the subject. We have tried to present a
clear conceptual understanding of computers and have used an easy-to-follow
visual style for the practical usage of various packages to facilitate understanding.
The material in this book has been provided in the self-instruction or SIM format.
Each unit begins with an ‘Introduction’ to the topic that gives a brief outline of the
concept to be dealt with. It is followed by the ‘Unit Objectives’ and then the
details of the topic of each unit. ‘Summary’ and ‘Key Terms’ are given after every
unit to help students recapitulate the concepts. The ‘Check Your Progress’ and
‘Questions and Exercises’ sections in each unit help in better understanding the
subject through rigorous exercises given. The ‘Further Reading’ section creates a
research interest in students for further exploration of the topics covered.
Self-Instructional Material 1
Introduction to
COMPUTER SYSTEM
NOTES
Structure
1.0 Introduction
1.1 Unit Objectives
1.2 Definition of Computer
1.3 Characteristics of Computers
1.4 Computer Generations
1.5 Classification of Computers
1.6 Uses of Computers
1.7 Applications of Computer
1.8 Summary
1.9 Key Terms
1.10 Answers to ‘Check Your Progress’
1.11 Questions and Exercises
1.12 Further Reading
1.0 INTRODUCTION
In this unit, you will be introduced to computers. Computers are electronic devices
that perform the basic operations of input, process, output and storage under the
direction and control of a program. Computers have become an integral part of our
lives. Most of the work that is done these days is performed by computers in some
way or other.
Computers are used to educate students, obtain any information needed,
manage finances and accounts, and for social networking with friends and family
members. It plays a vital role in our personal and professional lives. This unit will
help you understand the definition, characteristics, generations and classifications of
computers and it will help you become computer literate.
Self-Instructional Material 3
Introduction to
Computer System 1.2 DEFINITION OF COMPUTER
Computers are becoming popular day by day because of their characteristics that
make them very useful. The characteristics that make computers indispensable are:
(i) Speed: A computer is able to process data given by a user and gives the
output in fractions of seconds. It provides information to the user on time,
thus enabling the user to take right decisions on the right time.
(ii) Accuracy: In spite of its high-speed processing, errors seldom occur as a
computer’s accuracy is always high, which avoids any errors. Since the
computer is capable of doing only what it is instructed to do, faulty instructions
for data processing may lead to inaccurate and inconsistent data or defective
programs as well as defective program design. This is termed as Garbage In
Garbage Out (GIGO).
(iii) Large storage capacity: Computers can store high volumes of data in small
and compact storage devices.
(iv) Constant efficiency: Computers do not feel tired and distracted. They
perform multiple tasks simultaneously with the same ease.
(v) Versatility: It is a very versatile kind of machine. It can work upon various
data types, such as numbers, characters, graphics, audio, video, etc.
4 Self-Instructional Material
Introduction to
1.4 COMPUTER GENERATIONS Computer System
Self-Instructional Material 5
Introduction to focus thus shifted from hardware to programming. People thought of ways to make
Computer System
programming more efficient and reliable. Hence, a new type of programs called
assemblers and compilers developed. The purpose of the software was to translate
symbolic code that people can understand to machine code, i.e., 1s and 0s.
NOTES They were smaller in size, generated less amount of heat and had higher
capacity of internal storage and their processors operated in microsecond speed
range. The second generation computers made substantial use of magnetic tape and
had memory capacity of 32 kB and 64 kB. They supported high-level languages,
such as ALGOL, COBOL and FORTRAN II. They had multi-programming
capabilities and could communicate data over telephone lines. Some examples of
this generation computers were Burrough 5000, IBM 1401, 7080 and 7090, Philco
S-2000, Honeywell 400, etc.
The second generation computers had various distinctive features, such as
these machines were based on transistor technology, were smaller than the first
generation computers. The computation time of these machines increased and these
computers were more reliable and less prone to hardware crash, thus requiring less
maintenance. These machines were potable and gave out less heat, but still air-
conditioning was required. In the second generation computers, the Assembly
language was used to program computers, due to which programming became more
time efficient and less cumbersome. It requires manual assembly of individual
components into a functioning unit.
Third Generation Computers (1970s): Integrated Circuits
In third generation computers, transistors and other electronic components were
combined on a single silicon chip called integrated circuits (IC’s). These ICs are
popularly known as CMIPs. With this technology, computers became smaller, faster
and even more reliable. Powerful computer languages and computer programs were
developed. From the mid-1960s to 1970s the focus turned towards the data component
of IS. This era saw the birth of database management system (DBMS) on mainframe
computers. Higher level languages, Beginners All Purpose Symbolic Instruction Code,
such as (BASIC) were also developed during this period. Some of the examples of
this generation computers were IBM 360, IBM 370, ICL-1900 and VAX-750.
The third generation computers, based on integrated circuit (IC) technology,
further reduced the computation time from microseconds to nanoseconds. Their
distinct features included easy portability; as these computers were relatively smaller
in size as compared to previous computers. The other features were—increased
reliability, less heat generation (requiring air conditioning only in some cases), thus,
less electricity was consumed. The hardware failure was rare which led to low
maintenance cost. These third generation computers used high-level languages.
Fourth Generation Computers (1980s): Microprocessors
In this generation electronic components were further miniaturized and condensed
into very large scale integrated circuits (VLSI). One result of VLSI was that it
became possible for an entire computer to be put on a single chip. This led to the
creation of the personal computers (PCs) in the late 1970s. Thus, the computers
6 Self-Instructional Material
which occupied very large rooms earlier could now be placed on a table. Introduction to
Computer System
Consequently, computer technology was now available to the common people for
communication and business needs. This generation represents an upgradation of
the third generation brought about by the introduction of advanced micro technology.
This led to the possibility of extremely large internal and external storage capacities NOTES
as well as extensive computer networks and widely distributed databases. Some
examples of this generation computers were Apple II, IBM PCs, TRS 80, VAX
9000, etc.
The main features of these generations were that these machines were based
on microprocessors; these machines were smaller in size than the earlier generation
computers. These computers were quite economical as compared to the earlier
generations. They were portable and reliable. They generations very low heat, hence
they hardly require air-conditioning. The hardware failure was reduced ever further,
thus bringing down the cost of maintenance and production. The graphical user
interface (GUI) enabled users to understand the use of these computers easily. And
finally, due to networking of these computers, better communication and resource
sharing was possible.
Fifth Generation Computers (1990s): Artificial Intelligence (AI)
Computers that can ‘think’ and are capable of taking decisions like human beings
have been characterized as fifth generation computers. They are also termed as
Thinking Machines. The speed of this generation computers are very high. They
use the concept of ‘Artificial Intelligence’ and possess voice recognition capabilities.
Artificial intelligence (AI), a branch of computer science, is concerned with making
computers perform functions associated with human intelligence, such as reasoning,
learning, self-improvement, etc. In 1956 John McCarthy coined the term.
AI is used to play games, such as chess and checkers, etc. It is also used as
expert systems, i.e., programming computers to make decisions in real-life situations,
for example, many expert systems help doctors to diagnose diseases based on
symptoms. AI is also employed to program computers to comprehend natural
languages. It is even used in neural networks, i.e., systems that simulate intelligence
by attempting to reproduce the types of physical connections that occur in animal
brains. It is also used in robotics, to program computers to see and hear and react to
other sensory stimuli. At present, there is not a single computer that has full artificial
intelligence.
These computers use parallel processing of semiconductors for advanced
computing. These computers have the capabilities of learning and self organization.
Some examples of this generation computers are IBM notebooks, Pentium PCs,
SUN Workstations, IBM SP/2, etc.
The three main features of the fifth generation of computers are (i) based on
mega chips, (ii) parallel processing and (iii) AI.
(i) These computers use super large scale integrated (SLSI) chips. There
are millions of electronic components on a single chip. These machine
need to store a great amount of storage capacity to store instructions
Self-Instructional Material 7
Introduction to and information. Thus, these chips enable the computer to approximate
Computer System
the memory capacity of the human mind.
(ii) Computers using parallel processing can access many instructions at a
time and process them simultaneously through use of multiple CPUs.
NOTES
(iii) The idea of AI points to a series of technologies that try to simulate and
reproduce human intelligence, such as learning, reasoning, self-
improvement, etc. AI consists of a group of related technologies, such
as natural language processing (NLP), expert systems (ES), speech
recognition, vision recognition and robotics, etc.
Computers can be classified on the basis of their size, processing speed and cost.
The various types of computers are as follows:
• Personal computers
• Workstations
• Notebook/Laptop computers
• Tablet PC
• Personal Digital Assistant or PDA
• Mainframe computers
• Supercomputers
Analog
Analog computers are generally used in industrial process controls and to measure
physical quantities, such as pressure, temperature, etc. An analog computer does
not operate on binary digits to compute. It works on continuous electrical signal
inputs and the output is displayed continuously. Its memory capacity is less and can
perform only certain type of calculations. However, its operating speed is faster
than the digital computer as it works in a totally different mode.
Analog computers perform computations using electrical resistance, voltage,
etc. The use of electrical properties signifies that the calculations can be performed
in real time or even faster at a significant fraction of the speed of light. Typically, an
analog computer can integrate a voltage waveform using a capacitor which ultimately
accumulates the charge. The basic mathematical operations performed in an electric
analog computer are summation, inversion, exponentiation, logarithm, integration
8 Self-Instructional Material
with respect to time, differentiation with respect to time, multiplication and division. Introduction to
Computer System
Hence in the analog computers, an analog signal is produced which is composed of
Direct Current (DC) and Alternating Current (AC) magnitudes, frequencies and
phases. The starting operations in an analog computer are done in parallel. Data is
represented as a voltage that is a compact form of storage. NOTES
Digital
Digital computers are commonly used for data processing and problem solving using
specific programs. A digital computer stores data in the form of digits (numbers) and
processes. It is in the discrete form from one state to the next. These processing
states involve binary digits which acquire the form of the existence or nonexistence
of magnetic markers in a standard storage devices, ON/OFF switches or relays. In
a digital computer, letters, words, symbols and complete texts are digitally represented,
i.e., using only two digits 0 and 1. It processes data in discrete form and has a large
memory to store huge quantity of data.
The functional components of a typical digital computer system are input/
output devices, main memory, control unit and arithmetic logic unit. The processing
of data in a digital computer is done with the help of logical circuits, which are also
termed as digital circuits. All the circuits processing data in side a computer function
in an extremely synchronized mode, which is further controlled using a steady oscillator
acting as the computer’s ‘clock’. The clock rate of a typical digital computer ranges
from several million cycles per second to several hundred million cycles whereas
the clock rate of fastest digital computers are about a billion cycles per second.
Hence, the digital computers operate on very high speed and are able to perform
trillions of logical or arithmetic operations per second to provide quick solution to
problems, which is not possible for a human being to do manually.
Hybrid
Hybrid computers are the combination of digital and analog computers. A hybrid
computer uses the best features of digital and analog computers. It helps the user to
process both continuous and discrete data. Hybrid computers are generally used for
weather forecasting and industrial process control.
The digital component basically functions as a controller to provide logical
operations, whereas the analog component functions as a solver to provide solutions
of differential equations. Remember that the hybrid computers are different from
hybrid systems. The hybrid system is a digital computer equipped with an analog-to-
digital converter for input and a digital-to-analog converter for output. The term
‘hybrid computer’ signifies a mixture of different digital technologies to process
specific applications with the help of various specific processor technologies.
General Purpose
Workstations are high end, general purpose computers designed to meet the computing
needs of engineers, architects and other professionals who need computers with
greater processing power, larger storage and better graphic display facilities. These
are commonly used for Computer Aided Design (CAD) and for multimedia
applications such as creating special audio/visual effects for television programmes
Self-Instructional Material 9
Introduction to and movies. A workstation looks like a PC and can be used by only one person at a
Computer System
time. The characteristics of a workstation, which are often used to differentiate it
from a PC are as follows:
• Display Facility: Most workstations have a large screen monitor (21 inches
NOTES or more) capable of displaying high resolution graphics as compared to PCs,
which have a small screen monitor (19 inches or less).
• Storage Capacity: Workstations have a larger main memory than PCs, which
have only a few hundred MB of main memory. The hard disk capacity of
workstations is also more than that of PCs.
• Processing Power: The processing power of workstations is several times
greater than that of PCs.
• Operating System: PCs can run any of the five major operating systems
namely MS DOS, Microsoft Windows, Windows NT, Linux and UNIX, but
all workstations generally run the Unix operating system or a variation of it,
such as AIX (used in IBM workstations), Solaris (used in SUN workstations)
and HPUX (used in HP workstations).
• Processor Design: PCs normally use CPUs based on the Complex
Instruction Set Computer (CISC) technology whereas workstation CPUs
are based on the Reduced Instruction Set Computer (RISC) technology.
Special Purpose
A special purpose computer is a digital or an analog computer specifically designed
to perform desired specific task. These are high performance computing systems
with special hardware architecture, which is dedicated to solve a specific problem.
This is performed with the help of specially programmed Field Programmable Gate
Array (FPGA) chips or custom Very Large Scale Integration (VLSI) chips. They
are used for special applications, for example, astrophysics computations, Very Large
Scale Integration or GRAvity PipE (GRAPE) 6 (for astrophysics and molecular
dynamics), Hydra (for playing chess), MDGRAPE-3 (for protein structure
computations), etc.
Micro, Mini, Mainframe and Supercomputers
Microcomputers
Microcomputers are developed from advanced computer technology. They are
commonly used at home, classroom and in the workplace. Microcomputers are
called home computers, personal computers, laptops, personal digital assistants, etc.
They are powerful and easy to operate. In recent years, computers were made
portable and affordable. The major characteristics of a microcomputer are as follows:
• Microcomputers are capable of performing data processing jobs and solving
numerical programs. Microcomputers work rapidly like minicomputers.
• Microcomputers have reasonable memory capacity which can be measured
in megabytes.
10 Self-Instructional Material
• Microcomputers are reasonably priced. Varieties of microcomputers are Introduction to
Computer System
available in the market which can be as per the requirement of smaller business
companies and educational institutions.
• Processing speed of microcomputers is measured in MHz. A microcomputer
running at 90MHz works approximately at 90 MIPS. NOTES
• Microcomputers have drives for floppy disk, compact disk and hard disks.
• Only one user can operate a microcomputer at a time.
• Microcomputers are usually dedicated to one job. Millions of people use
microcomputers to increase their personal productivity.
• Useful accessory tools, such as clock, calendar, calculator, daily schedule
reminders, scratch pads, etc., are available in a microcomputer.
• Laptop computers, also called notebook computers are microcomputers. They
use the battery power source. Laptop computers have a keyboard, mouse,
floppy disc drive, CD drive, hard disk drive and monitor. Laptop computers
are expensive in comparison to personal computers.
Minicomputers
Minicomputers are a scaled down version of mainframe computers. The processing
power and cost of a minicomputer are less than that of the mainframe. The
minicomputers have big memory sizes and faster processing speed compared to the
microcomputer. Minicomputers are also called workgroup systems because they
are well suited to the requirements of the minor workgroups within an organization.
The major characteristics of a minicomputer are as follows:
• Minicomputers have extensive problem solving capabilities.
• Minicomputers have reasonable memory capacity which can be measured in
MB or GB.
• Minicomputers have quick processing speeds and operating systems facilitated
with multitasking and network capabilities.
• Minicomputers have drives for floppy disk, magnetic tape, compact disk, hard
disks, etc.
• Minicomputers can serve as network servers.
• Minicomputers are used as a substitute of one mainframe by big organizations.
Mainframe Computers
Mainframe computers are generally used for handling the needs of information
processing of organizations like banks, insurance companies, hospitals and railways.
This type of system is placed in a central location with several user terminals
connected to it. The user terminals act as access stations and may be located in the
same building Figure 1.2.
Self-Instructional Material 11
Introduction to
Computer System
NOTES
Mainframe computers are bigger and more expensive than workstations. They
look like a row of large file cabinets and need a large room with closely monitored
humidity and temperature levels. A mainframe system of lower configuration is
often referred to as a minicomputer system. The various components of a mainframe
computer are as follows:
• Host, Front End and Back End Computers: A mainframe system
consists of several computers, such as a host computer that carries out
most of the computations and has direct control over all other computers.
The front end portion is used for handling communications to and from all
the user terminals connected to the mainframe computer. The back end
portion is used to handle data input/output operations. The host computer
and other computers are located in the systems room, to which entry is
restricted to system administrators and maintenance staff only.
• Consoles: Console terminals are directly connected to the host computer
and are mainly used by the system administrator to perform certain
administrative tasks like installing new software on the system, taking
system backups and changing the configuration of the system.
• Storage Devices: A mainframe computer has several magnetic disk
drives directly connected to the back end computer. The host computer,
via the back end computer, accesses all data to and from these magnetic
disks. In addition, a mainframe computer also has a few tape drives and a
magnetic tape library (located in the systems room) for restoration and
backup of data. The tape drives are located in the users’ room, so that
users’ tapes can be used for input and output.
• User Terminals: User terminals are used to access the required stations,
which may be located at different locations. Since mainframe computers
support multiprogramming with time sharing, they can run different
operating systems and can be accessed by multiple users simultaneously.
• Output Devices: A mainframe computer has several output devices like
printers and plotters, connected to the back end computer, so that these
devices are accessible to the user for taking their outputs. A plotter is a
device that prints vector graphics on paper using ink pens and pencils on
mechanical arms mainly used for large size printouts of architectural and
engineering drawings.
12 Self-Instructional Material
Supercomputers Introduction to
Computer System
Supercomputers are the most powerful and expensive computers available today.
They are primarily used for processing complex scientific applications that involve
tasks with highly complex calculations and solving problems with mechanical physics,
such as weather forecasting and climate research systems, nuclear weapon simulation NOTES
and simulation of automated aircrafts. Military organizations, major research and
development centres, universities and chemical laboratories are major users of
supercomputers.
Supercomputers use multiprocessing and parallel processing technologies to
solve complex problems promptly. They use multiprocessors, which enable the user
to divide a complex problem into smaller problems. A parallel program is written in a
manner that can break up the original problem into smaller computational modules.
Supercomputers also support multiprogramming, which allows simultaneous access
to the computer by multiple users. Some of the manufacturers of supercomputers
are IBM, Silicon Graphics, Fujitsu and Intel.
Personal Computers
A PC is a small single user microprocessor based computer that sits on your desktop
and is generally used at homes, offices and schools. As the name implies, PCs were
mainly designed to meet the personal computing needs of individuals. Personal
computers are used for preparing normal text documents, spreadsheets with
predefined calculations and business analysis charts, database management systems,
accounting systems and also for designing office stationary, banners, bills and
handouts. Children and youth love to play games and surf the Internet, communicate
with friends via e-mail and Internet telephony and do many other entertaining and
useful tasks.
The configuration varies from one PC to another depending on its usage.
However, it consists of a CPU or system unit, a monitor, a keyboard and a mouse. It
has a main circuit board or motherboard (consisting of the CPU and the memory),
hard disk storage, floppy disk drive, CD-ROM drive and some special add-on cards
(like Network Interface Card or NIC) and ports for connecting peripheral devices
like printers.
PCs are available in two models namely desktop and tower. In the desktop
model, the monitor is positioned on top of the system unit whereas in the tower
model the system unit is designed to stand by the side of the monitor or even on the
floor to save desktop space. Due to this feature, the tower model is very popular.
Some popular operating systems for PCs are MS DOS, Microsoft Windows,
Windows NT, Linux and UNIX. Most of these operating systems have the capability
of multitasking, which eases operation and saves time when a user has to switch
between two or more applications while performing a job. Some leading PC
manufacturers are IBM, Apple, Compaq, Dell, Toshiba and Siemens.
Self-Instructional Material 13
Introduction to Types of Personal Computers
Computer System
Notebook/Laptop Computers
Notebook computers are battery operated personal computers. Smaller than the
NOTES size of a briefcase, these are portable computers and can be used in places like
libraries, in meetings or even while travelling. Popularly known as laptop computers,
or simply laptops, they weigh less than 2.5 kg and can be only 3 inches thick (refer
Figure 1.3). Notebook computers are usually more expensive as compared to
desktop computers though they have almost the same functions, but since they
are sleeker and portable they have a complex design and are more difficult to
manufacture. These computers have large storage space and other peripherals,
such as serial port, PC card, modem or network interface card, CD-ROM drive
and printer. They can also be connected to a network to download data from other
computers or to the Internet. A notebook computer has a keyboard, a flat screen
with Liquid Crystal Display (LCD) display and can also have a trackball and a
pointing stick.
14 Self-Instructional Material
used as smart phones, Web enabled palmtop computers, portable media players or Introduction to
Computer System
gaming devices.
Most PDAs today typically have a touch screen for data entry, a data storage/
memory card, Bluetooth, Wireless Fidelity (Wi-Fi) or an infrared connectivity and
can be used to access the Internet and other networks. NOTES
Information Technology (or IT as it is popularly called) has changed our life in many
ways. Like electricity, IT has impacted all parts of life and, in fact, its usage is so
universal that it is difficult for today’s generation to lived without computers. It is
used in different industries to achieve the following function:
(i) Decreasing the cost of operations by increasing operational efficiency and
staff productivity.
(ii) Improving revenues by helping management in informed decision-making
and focusing on priority areas.
(iii) Improving customer satisfaction by providing better, faster and value-added
services.
IT has opened up several allied industries and employment opportunities
which never existed before like Business Process Outsourcing or BPO or Web-
enabled services (medical transcription, call centres, etc.). The Internet has brought
the world closer.
1. Railways
The railway industry is the backbone of the country’s economy. So, for better
economic growth, the rail network has to be effective, efficient and timely. In the
case of the Indian Railways, which is one of the largest rail networks of the world,
it has to manage 11,000 trains every day covering around 108,706 kms, connecting
6,853 stations and a 1.54 million workforce. Since it was very difficult and complex
to manage and operate on such a large scale, Indian Railways decided to go for
computerization to simplify their operations and have a better control over the
management. Some of the major IT initiatives taken by Indian Railways are as
follows:
• All India centralized reservation system provides the facility for the passenger
to book tickets from any destination and is one of the most successful examples
of computerization in the country.
• IRCTC is an online railway ticket booking portal which enables the passenger
to book railway tickets for any destination in India from anywhere in the
world. It also provides very useful information like computerized reservation-
related enquiries about booking status, train schedule and trains between pairs
of stations. Booking a railway ticket is now easy with an option to print your
tickets from your printer or get it couriered within twenty-four hours. Apart
Self-Instructional Material 15
Introduction to from this, the railway timetables, network maps and freight charges are also
Computer System
available on the Indian Railways Website.
• Indian Railways has also launched the online computerized system for
unreserved passengers. This service caters to almost 14 to 15 million people
NOTES travelling with unreserved tickets. These unreserved tickets being available
from locations other than boarding stations reduce the long queues and chaos
at the railway station ticket counters.
• Indian Railways has also started a pilot project for issuing periodical season
tickets through ATMs (Automated Teller Machines) and another pilot project
for buying tickets through smart cards.
• The Interactive Voice Response System (IVRS) has also been introduced to
update passengers with railway inquiry and other related information. This
national enquiry system is capable of providing train running positions in a
real-time system through the IVRS and other output devices.
2. Airlines
The airline business is one of the largest users of computers. Computers have been
deployed in almost all aspects of the airline business for increasing revenues, reduc-
ing cost and enhancing customer satisfaction.
Imagine the trouble airline companies will have booking air tickets across
thousands of booking counters spread all over the world without computerized booking
systems and interconnectivity of these systems. The airline industry is using a vast
Web-based online system that can be accessed by anyone from anywhere in the
world. Some of the major IT initiatives taken by the airline industry are as follows:
• Online Ticket Booking Through the Internet: Almost all the airline
companies, may it be domestic or international, sell air tickets online. Air
tickets can be booked online by paying through credit cards and e-tickets
can be printed on your printer.
• Flight and Seat Availability Information: Flight and seat availability
information, along with the cost of the ticket, is now easily available online
with an option to compare it with other available airlines, making it easier
to choose the airlines according to the time and price that best suits an
individual. The facility of choosing the seat position and the meals
(vegetarian or non-vegetarian) if offered, is also available. Yatra.com,
makemytrip.com and travelguru.com are a few Websites available for
online booking other than the official Website of each airline.
• Last Minute Deals and Auctions: To recover the lost revenue
opportunity on unsold seats, most airlines have started bidding for last
minute tickets in online auction. Several specific airline ticket auctions
sites like razorfinish.com are also available. This option is beneficial both
for the passenger as well as the airline company since the airline company
gets some revenue on unbooked seats and the passenger gets a good deal
by paying much less than the regular price.
16 Self-Instructional Material
All these facilities would not have been possible for airline companies without Introduction to
Computer System
the use of computers.
3. Banking
In the 1960s, with the increasing workload, rise in the customer database and bank NOTES
branches coming up all over, it was getting extremely difficult for banks to fight the
competition in providing good customer service. With the increasing number of
branches, banks had to simply recruit more manpower to cope up with the additional
workload which meant more operational cost and cost was the main basis for
competition. To reduce this operational cost, banks computerized all the customer
accounts. However, computerization meant reduction in back office operational cost
only, and banks still needed manpower as customer relation officers for the front
office. To deal with this problem, banks played a smart move by introducing the
Automated Teller Machines (ATMs). With the introduction of the ATMs, customer
interaction with the bank staff was drastically reduced and customers had the privilege
of 24×7 banking. This meant they could take advantage of certain banking facilities
round the clock like depositing and withdrawing cash, checking available balances,
requesting for statements and requesting for cheque books and drafts without even
entering the bank.
Today the banking industry has come a long way since then. It is now one of
the largest users of IT. Some of the major IT initiatives taken by the banking industry
are as follows:
• Back Office Computerization: Not only international banks, but also
national banks today run on a fully integrated online system where all
back office operations like account transaction postings, bank
reconciliation, cheque clearings and other back office banking operations
are fully computerized.
• Front Office Computerization: With the introduction of the computerized
systems, all banks today are in a position to provide certain facilities likes
instant bank account statement, electronic fund transfer, direct debit facility
etc., to their customers.
• Automated Teller Machines: ATMs are a wonderful invention that
enabled customers to do their regular bank transactions without visiting
their bank branch, instead, visiting their nearest bank ATM which are
much more in number and easily accessible. All these transactions, such
as withdrawing cash, checking account balance and viewing the bank
statement are possible on swiping the card and clicking a button on the
computerized machine installed at many locations easily accessible to the
customer. ATMs drastically reduced infrastructure and operational costs
and enabled the banks to provide a hassle free and a better service 24×7.
• Internet Banking: Almost all banks today have an extremely user-friendly
Website for e-banking, where the customer can carry out the typical
banking transactions, such as making request for cash and cheque pickup,
cash delivery, generating account statements, requests for cheque books
Self-Instructional Material 17
Introduction to and drafts online without the hassle of physically visiting the bank. The
Computer System
innovative use of Internet banking enables convenient, cost-effective, easy
and quick banking for the customer and hassle-free operation for the
banks.
NOTES • Credit Card Operations: Credit cards provide one with the facility of
cashless purchases with an added advantage of credit from the bank at a
certain percentage charged as interest. The customer simply swipes his
credit card at the time of clearing the bill at the merchant’s Point Of Sale
(POS) machine that instantly connects with the bank’s database through
the telephone line and authenticates the customer for credit, simultaneously
authorizing the merchant to carry on the transaction and receive the
payment from the bank. The customer gets the advantage of not carrying
huge sums of money for shopping and the banks earn money on every
transaction from the merchant and interest from the customer on the
credit given to the customer.
All these operations would not have been possible without the use of IT.
4. Insurance
The insurance industry also involves substantial paperwork, such as maintaining
policyholder databases, clearing insurance claims filed, maintaining survey and
investigation reports, premium payment receipts, premium overdue, list of policies
lapsed, and so on.
Today, with the increasing number of insurance policyholders, it will be very
difficult for an insurance company to function without the use of computers. With
the help of these computerized systems, insurance companies are able to provide
quicker and more efficient service to its customers. The computerized database
system also has an option to get information about the customers’ financial, economic
and demographic details enabling the insurance company to minimize risk and
maximize profits.
5. Financial Accounting
In most cases, computerization of business organizations started with the
computerization of financial accounting systems.
Computerization of accounts made life much more easier for accountants as
they no longer had to maintain manual books, filled vouchers, update registers, maintain
long ledgers and then spend days cross-checking the manual entries. Now they can
concentrate more on analysing information.
Features like ledger database, automatic calculation, figures tally systems,
checks and validations, automatic posting of entries from the voucher to the profit
and loss account and the balance sheet, inventory systems, invoicing, creation of
challans and purchase orders, creation of relevant reports, interconnectivity between
users at different geographical locations and many more, make the computerized
accounting systems an error-free, time saving and a fairly simple system to use.
18 Self-Instructional Material
According to the difficulty of the operation and size of the organization, various Introduction to
Computer System
ready-made financial accounting software are available in the market. Tally, EX and
Busy are financial accounting software which are good enough for most small- and
medium-scale organizations.
On the other hand, larger organizations with offices in multiple locations and NOTES
multiple operations use Enterprise Resource Planning (ERP) software like ORACLE
Financials, BAAN and SAP. Though ERP software cost millions of rupees and are
comparatively much more difficult to implement, they provide an excellent platform
for ensuring that the company’s system and procedures are consistently followed at
multiple locations at the same time. Since ERP software provide complete integrated
solutions for all functions of business such as financial accounting, payroll
management and inventory control, they make it easy for the companies with office
at multiple locations to consolidate disparate information at a centralized place, thus
enabling the top management to get effective real-time management information.
6. Inventory Control
Most large manufacturing units usually need a variety of raw material for production.
Manually managing such a large number of raw materials and then keeping track of
the finished products is not an easy task. IT plays a useful role here; a computerized
inventory management system provides the facility of specifying the right amount of
inventory in hand and determines the time at which, and the amount of inventory
required.
The computerized inventory control system maintains a date-wise list of all
items along with the maximum, minimum, reorder and inventory in hand and
automatically updates the list according to the available material. The computerized
inventory control system is also capable of preparing many other useful MIS reports
such as aging analysis, goods movement analysis, slow and fast moving stock report,
valuation report and it assists the storekeeper and accountants.
ERP software like ORACLE Financials, BAAN, SAP are some examples of
sophisticated inventory control packages which can also generate purchase orders
automatically whenever the minimum level of stocks is reached, provide automatic
posting of accounting entries as soon as any purchase or sale is carried out and
generate analytical reports which (itemize) show the previous and future trends in
inventory consumption.
Many organizations nowadays have inventory control systems connected
through the Internet or the intranet whereby the request for purchase or the purchase
order is instantly delivered to the department or the vendor through e-mails, the
moment they receive an order or request for an item which is out of or low in stock.
Some interesting IT-based innovations used to simplify and improve inventory
management are as follows:
• Barcode Readers: Barcodes are a series of black and white parallel
and adjacent bars with spaces which represent a string of characters.
Bar coding is a quick and easy method for automatically reading barcodes
from the products identifying their batch numbers, manufacturing and
Self-Instructional Material 19
Introduction to expiry dates, etc., without having to manually read and type it in the
Computer System
computer to generate bills and track inventory.
• HandHeld Terminals (HHTs): HHTs are microprocessor-based simple
devices used to communicate with any type of microprocessor-based
NOTES device. HHTs’ standard input device is basically a calculator-like device
with a small LCD display output. It is a compact, easy to use device
designed for collecting data from large warehouses.
7. Hotel Management
The hotel industry is an important aspect of tourism, which in turn is an source of
revenue for any country, especially India. The use of IT in the sector has revolutionized
both the hotel and tourism industries. Over the Internet, one can get information
about tourist spots, hotel locations, room availability and price details as well as
pictures of hotels and locations. IT can play a crucial role for the hotel industry
because of its potential of creating customer relationships and the flow of information
between the industry and its customers.
Information technology is widely used in the hotel industry; some common
instances of use of IT in hotel management are as follows:
• Computerized Records: A hotel can track and record all the interactions
between a guest and the hotel, from the booking of the room to the check-
in and all transactions such as meals, drinks and services provided during
their stay. This data can be used to calculate bills and receipts or to help
identify particular client types in order to cater to their needs better in
future. The data regarding room bookings can be used in a larger hotel
management system to track the number of guests in the hotel at a
particular time and can also be used in an online booking facility.
• Online Booking: Data regarding room availability can be used by the
hotel in an online booking system on the hotel’s Website. This allows a
potential guest to see the availability of different types of rooms as well as
the pricing schemes of the hotel. The user can then book a room using
this system which will automatically update the hotel management system
once the booking is confirmed. The hotel staff will be made aware of the
bookings and can make preparations for the guest’s arrival.
8. Education
In a traditional teaching model, a teacher would present the study material through
verbal presentation, the use of a black or white board to write and illustrate. There
would generally be a text book to accompany this material which the students and
teacher alike could refer to. Information technology has the potential to enhance
and complement traditional teaching methods by providing additional tools to a teacher
to display and explain ideas to their students and providing students with innovative
but practical learning tools to help study.
For a teacher, the presentation of study material can be enhanced through
multimedia presentations where a slide show, animation, video with sound is projected
20 Self-Instructional Material
for the students to view. This makes the material more interesting and accessible Introduction to
Computer System
than if it was merely presented verbally and through a textbook. Furthermore,
concepts and ideas presented in a visual format like these as well as verbally are
more easily understood and retained longer by students.
Some interesting developments and uses of IT in education are as follows: NOTES
• Computer Based Training (CBT): Advanced educational institutions can
conduct classroom sessions using computer-based training or CBT. Each
student will sit at a computer terminal which operates software that presents
course material in interactive sessions. It includes refreshers and quizzes of
the material presented to reinforce the students’ understanding. The benefits
of such learning software are that the student can learn at their own pace,
and it allows the student to explore and discover ideas and concepts within
the material.
• Internet: The Internet is a huge source of academic information; a student
can use the Web to help his research and study from textbooks and libraries.
Search engines allow students to locate relevant and accurate material for
study.
• Distance Learning: IT applications, such as e-mail, videoconferencing, Web-
based study has made distance learning available to many students who are
not able to study on location at a university. The students receive and submit
assignments, get course material, course information over the Internet and
are able to contact their tutors through videoconference or e-mails.
Note that it is important to understand that information technology is not a
replacement for real teaching or learning but a tool to improve these things.
9. Telephone Exchanges
In its early stages after invention by Alexander Graham Bell, the telephone system
worked on a ‘point-to-point’ basis. That is, all telephones had to be directly connected
by telephone wire in order to make a call. This system was adequate when the
number of phone users was very few and the scale of the ‘telephone network’ was
very small but the consequences of using this system on a larger scale became
apparent very quickly. A ‘point-to-point’ telephone network was unworkable for the
following reasons: the difficulty of connecting individual phones on a larger network
without a centralized system to control this activity and the telephone wire
requirements increased as the network grew.
The solution to both these problems was the telephone exchange. A telephone
user would be connected directly to their local telephone exchange (as would all
other telephone users) where the operator would connect a user to his desired
destination by physically connecting the incoming caller’s wire to the destination
user’s telephone wire — known as switching. This process was by no means perfect
because as the telephone network grew, the number of exchanges increased and
the number of connections at each exchange grew. The whole telephone network
required a lot of labor and the process of connecting calls was prone to errors due to
the large number of connections at each exchange.
Self-Instructional Material 21
Introduction to The telephone network in its conceptual operation has not changed much
Computer System
since it was first introduced; a telephone user picks up the phone at one end and
makes a connection to a user at the other. The complexity, efficiency and reliability
of the network has been increased a lot through evolution and developments in
NOTES technology used in its implementation. Now telephone exchanges are automated
and computerized not only for switching calls but also for passing information to a
user regarding the status of their call. They can switch and connect many calls at a
time with no delays or mistakes. Thus, human beings are no longer required to
perform the function of connecting calls.
Computerization and digitization of telephone exchanges have allowed
integration of other systems into the telephone network making a variety of services
and functionality available to users. These include the following:
• Call waiting.
• Caller identification information.
• Digital answer phones.
• Automated billing.
• Customer information services.
10. Mobile Phones
In this era of technology, using IT tools of communication has become an important
aspect of all types of business and personal communication. Until a few years ago,
a majority of the population in developing nations remained disconnected from the
outside world primarily due to demographics and economic factors. This was
especially true in less populated areas where landlines or any other wired modes of
communication were never installed due to the low benefit over cost ratio. Even the
maintenance of these telephone cables across difficult regions poses a huge challenge
to network providers.
The perfect solution for providing connectivity is a mobile phone. It works on
the fundamental concept of a radio. Increased coverage can be provided while
keeping cost and power expenditure at a minimum by dividing coverage area into
cells. Each cell contains a base station within its area of coverage. The base station
hosts an antenna and other radio equipment which wirelessly connects with the
mobile phones located in its proximity. Mobility beyond the coverage of a cell is
achieved by allowing inter-cell communication and transfer of connection from one
cell to another.
Mobile technology has made great advances over a short period, starting
from the first generation mobile phones, such as the Motorola, using which the
subscriber could only make or receive phone calls, down to the latest multipurpose
sophisticated mobile phones which can be used to send/receive SMSs, browse the
Internet, make calendar entries or watch TV, etc. With the addition of these features,
the cost-effectiveness and the efficiency of mobile technology has further improved,
thus increasing the popularity of mobile services by making them more affordable.
Another reason for the rapid acceptance of mobile phones in our society is due to
22 Self-Instructional Material
the vast functions they offer, such as video recording, music, radio, office document Introduction to
Computer System
editing, GPS, etc., all integrated into a pocket size device.
Some of the popular functions of mobile phones which are based on IT are as
follows:
NOTES
• Short Messaging Service (SMS): Messages containing plain text can
be exchanged between any two mobile devices for exchanging information.
SMSs are limited by the number of characters each message can contain.
• Address Book: It is an electronic medium for storing contact information
inside the mobile phone.An address book can contain fields such as full name,
phone number, e-mail, fax number, and other information.
• Calendar Schedules or To-do Lists: A mobile phone user can fix
reminders for upcoming events by putting notes and other relevant
information against a particular day and date. A to-do list is a basic text
file which stores brief information about unfinished tasks in the
chronological order.
• Send or Receive E-mail: Mobile phones using WAP, GPRS, EDGE or
3G can send and receive e-mails from the Internet by combining mobile
phone features to network services. By using the onboard memory, a
user can not only send and receive e-mail but also store them for offline
viewing.
11. Weather Forecasting
Predicting the condition or state of the atmosphere after a period of time and over a
certain region(s) is known as weather forecasting. The professionals involved in the
study and prediction of weather are called meteorologists. The atmosphere depends
on various factors, such as temperature, humidity, wind speed, etc.
With the development in IT, weather forecasting has become a science.
Weather forecasting requires processing and analysing huge amounts of data quickly.
This makes it suitable for the application of IT. The volume of data to be processed
and the complexity of calculations that must be made in order to forecast weather
with a certain degree of accuracy can be gauged by the fact that this task can only
be performed by supercomputers which work at very high speeds and can process
huge amounts of data very quickly.
The software and hardware tools provided by IT help in making accurate
weather forecasts over longer time intervals. Large amounts of data are collected
by weather balloons, satellites, sensors and radar instruments and fed into computers
with huge processing power and data storage capacity for quantitative analysis
and weather modelling. Some examples of software used in this process would
be Digital Atmosphere, Forecast Laboratory and RAOB. Accurate assessments
of weather conditions over a period of three to six days can be made using
hydrological forecasts and warnings of extreme events can be issued five to ten
days in advance.
Self-Instructional Material 23
Introduction to There is still a huge scope for development in the field of weather forecasting
Computer System
and IT is helping it by developing better software for computer modelling, building
and designing weather monitoring sensors. Software is also being developed for
data collection, analysis and growing channels of weather forecasting services and
NOTES making systems with huge computing power and storage space available. The
screened displays of a weather forecasting is made by using software named
METLAB (see Figure 1.4).
Remote Sensing
The retrieval of data and information regarding an object or phenomenon without
coming into physical contact with it is known as remote sensing. The devices used
for recording such data are known as sensors, and depending upon the method of
retrieval there can be either recording or real-time sensors. The technique of remote
sensing determines if it is active remote sensing or passive remote sensing.
In active remote sensing, artificial radiation focuses over a particular region
of interest and the reflected rays are detected by the sensors to collect data and
relevant information. An example of active remote sensing is radar technology.
Passive remote sensing only detects natural radiations of an object or that
reflected from its surrounding area. Remote sensors do not emit radiation for measuring
values of the object. A remote camera set up to observe wildlife and natural
phenomenon is a good example of passive remote sensing.
With the help of IT remote sensors, computer systems and software were
developed to monitor and collect geographic or spatially referenced data. Figure 1.5
shows the process of remote sensing.
The various applications of IT in the field of remote sensing are as follows:
(i) Software: Embedded software are used to process data from remote
sensors and turn it into relevant information. They also control the functions
of a remote sensor by judging the data returned from it. Image
24 Self-Instructional Material
enhancement and grouping applications, for example, help in clearing Introduction to
Computer System
interference from raw images (captured images from camera with
minimally processed data and huge detail) and can be used to transform
multiple images into one high-resolution continuous image.
NOTES
Self-Instructional Material 25
Introduction to E-commerce, by a combination of facilitates such as online payment gateways,
Computer System
customer analysis and report generation, advertisement channels and security coded
access to goods and services, provides a sales and distribution channel which is
extremely customer-friendly.
NOTES The Internet revolution and availability of cheap computers and Internet
bandwidth have been the main reasons for the proliferation of e-commerce as a
viable alternative to the ‘brick-and-mortar’ businesses.
‘Brick and mortar’ is a term used since the development of e-commerce to
refer to a traditional model of a business that is based at a commercial address made
up of brick and mortar. Before the advent of the Internet and e-commerce, a
commercial address or shop front was required for any business that wanted to sell
goods directly to the public.
A brick and mortar business can offer some features that an e-commerce
business cannot. They are as follows:
• Customer Security: Many people feel more comfortable buying goods
or services from a business in the real world rather than a virtual business
where the customer cannot visit in person.
• Increased Customer Relations: A business operating at a commercial
address with sales staff can offer a more personal experience to the
customer, increasing satisfaction and the possibility of repeat business.
• Many Businesses Simply Require a Physical Location in Order to
Provide Services: Such businesses could include healthcare services or
motor vehicle repair shops.
A brick and mortar business also has disadvantages compared to businesses
that operate only online. These are:
• Increased Cost: The cost of setting up and running a brick and mortar
business is far more than those in e-commerce. The basic reason behind
this is the cost of operating in a commercial property. Property cost,
maintenance charges, tax, insurance and employees are all costs that e-
commerce can avoid but a brick and mortar business cannot.
• Smaller Customer Base: A brick and mortar business with no online
presence has a customer base that is limited by geography and local
population. An online store has no such limitations.
Therefore, many brick and mortar businesses now recognize the potential
for business expansion through e-commerce and so simultaneously run online and
shop front operations. In that case, there is no competition amd both business can
harmoniously coexist and complement each other. So for every example of ‘pure’
online stores (like e-bay.com and Amazon.com) which sell only on the Web, there
are many examples of standard businesses using the online business to complement
its brick and mortar operation (like HP and Sony).
26 Self-Instructional Material
13. Web Publishing Introduction to
Computer System
Traditionally, when we talk about the term publishing then printers, paper, distribution,
expensive infrastructure and static content comes to mind. The drawbacks of these
are that they require a huge amount of investment, the productivity is low as a lot of NOTES
manual and machine work is involved, the content published cannot be changed
easily and the scope of marketing the product is very limited. All these drawbacks
have been overcome by the development of Web publishing.
Web publishing involves putting content on the World Wide Web and includes
all the support arrangements required for it. It includes custom Web designs for
Web development, Website hosting and e-commerce. Originally, Web publishing
simply meant putting selected content on paper into HTML over a Website for
public access; this is also known as ipaper. This method of publishing is not widely
used any more as professional Web publishers now use modern software, such as
content management systems for rearranging the structure of a Website and modifying
its content.
The most important tool of information technology used in the process of
Web publishing is the World Wide Web. This makes content available twenty-four
hours a day, seven days a week, to anybody in the world who is connected to the
Internet. The only requirement for publishing and viewing the content online is a
computer or a handheld device which has an Internet connection and a Web browser.
The scope of Web publishing in terms of penetration is very high, with an estimated
1.5 billion Internet users worldwide, as of 2007. The relatively low cost of buying a
domain name and hosting a Website is another major driver behind the large amount
of online data available over Websites.
14. Management Information Systems
Management Information Systems (MIS) consist of people, technology and
procedures to collect, process, store and disseminate data and information required
by a business organization for planning, controlling, monitoring, decision-making and
other functions of management.
Some of the most commonly used applications of management information
systems are accounting, financial management, production planning and control,
sales and marketing, human resource management, project management, etc.
The two most important components of an MIS system are database
management system and software which allows users to work on these databases
for performing various business functions like sales, accounting, etc. The first
component is typically covered by a Relational Database Management Systems,
also called a RDBMS, and the second by Enterprise Resource Planning, also called
ERP.
Although MIS systems need not always be based on standard ERP software
since businesses can use custom-built MIS software to serve one or more specific
areas of a business, such as inventory control or human resource management.
Self-Instructional Material 27
Introduction to However, the use of standard Commercial Off-The-Shelf (COTS) packages, such
Computer System
as ERP packages, are increasing.
Before the advent of computers and computerized MIS, it was very difficult
to manage huge databases of customers, suppliers, shareholders, etc. Since these
NOTES databases could not be maintained and managed properly, the data therein could not
be analysed easily. This meant that managers had to make decisions on either partial
data or rely more on ‘hunch’ or ‘gut feel’ rather than on facts and figures.
Nowadays, large RDBMSs like Oracle and Ingress, along with ERP packages
(which are sophisticated MIS packages covering the entire gamut of functions of an
organization) like Oracle, SAP and BAAN and MySQL help organizations to manage
vast databases more efficiently, accurately, quickly and easily as compared to past
methods of manual data base management. The use of these sophisticated databases
and packages has meant that managers can now be better informed and base their
decisions on factual analysis rather than timates. While nobody can still deny the
role of ‘gut-feel’ and intuitive decision-making, these tools, when supported by hard
facts and figures, provide the basis for making better decisions.
The use of the Internet and Web-based management information systems
have made MIS simpler and faster, making it possible to get data and information
instantly at the click of a mouse from anywhere across the globe.
15. Decision Support Systems
Decision Support Systems (DSS) is a computerized information system that supports
organizational and business decision-making tasks. It is basically an interactive
computer software developed to enable decision makers to compile information
from basic data, documents, knowledge and business models to enhance the ability
to make decisions. A DSS may present information graphically and may support or
be complemented by an Artificial Intelligence (AI) or expert system.
A decision support application mainly collects and presents the following
information:
• Inventory of all present information assets like data warehouses, data
marts, etc.
• Comparison of periodic data, e.g., inventory for this month with past months.
• Projected data based on assumptions, e.g., projected sales figures based
on sales assumptions.
• Consequences of different decision alternatives based on past experience.
16. Medical
IT has completely transformed the way modern medical systems work—from storing
information about a patient’s history to developing new ways of diagnosing patients
and educating students in medicine. IT has become such an integral part of the
modern medical system that nowadays it is inconceivable to think how this industry
worked without it.
28 Self-Instructional Material
Developments in medicine due to IT have offered important benefits to patients Introduction to
Computer System
and healthcare systems. Research in hi-tech medicine, such as genetic research,
DNA modification, hospital infrastructure, rapid ambulance services, etc., have been
facilitated by IT. Medical scientists can now use computers to check the effectiveness
of a drug against a disease by modelling their genetic structure on computer-based NOTES
software and using high-speed processors to support the process (see Figure 1.6).
The storage and rapid access to electronic medical records and its instant
transmission over the Internet in large amounts is called teleconsulting where
practitioners share patients’ data across the world to diagnose patients cooperatively
without experiencing their medical history. Videoconferencing between surgeons
allows the sharing of expertise so that complicated procedures can be carried out
by sharing knowledge in real time. This allows doctors to develop expertise without
the need for supervising surgeons to travel. Operations can be performed in areas
in which they would not ordinarily be accessible, potentially saving or improving
many lives, with the help of IT.
Medical images are sometimes so complicated that they cannot be effectively
analysed without using computers. They can not only improve the image quality but
also adapt images to fit in accordance to the doctor’s desire.
Self-Instructional Material 29
Introduction to
Computer System 1.7 APPLICATIONS OF COMPUTER
Computers are useful in various ways. With the increasing availability of more complex
NOTES and dynamic operating systems, the primary use of a computer is only limited to the
imagination and technical know-how of the user. Everything from your cell phone,
DVD player, to your TV has some sort of microprocessor in it, giving it computer-
like abilities. Computers have the ability to help the society by various means. They
have a number of applications in science as well. In space aeronautics, computers
are used in space shuttles for data collection as well as control of flights. In the
medical industry, computers are being used in conjunction with robotics to create a
new breed of machines that can perform operations on a minimally invasive scale,
thereby, increasing the patient’s survival rate and reducing the healing time. Computers
are also used in agriculture for controlling complex irrigation systems and sensors
that detect soil pH among others things, to give the crops a higher yield and faster
grow times.
The various applications of computers are as follows:
• Word processing: Word processing software automatically corrects spelling
and grammar mistakes. If you want some content of your document to be
repeated, you do not have to type it each time. You can use the copy and
paste features. Images can also be added to your document.
• Internet: It is a network of almost all the computers in the world. You can
browse through much more information than you could do in a library. That is
because computers can store enormous amounts of information. You can
also have very fast and convenient access to information. Through e-mail,
you can communicate with a person sitting thousands of miles away in seconds.
The chat software enables you to chat with another person on a real-time
basis. Videoconferencing tools are becoming readily available to the common
man.
• Digital video or audio composition: Audio or video composition and editing
have been made much easier by computers. It no longer costs thousands of
dollars of equipment to compose music or make a film. Graphics engineers
can use computers to generate short or full-length films or even create three-
dimensional models. Anybody owning a computer can now enter the field of
media production. Special effects in science fiction and action movies are
created using computers.
• Desktop publishing: Page layouts for books can also be created on your
personal computer.
• Medicine and health care: Software is used in magnetic resonance imaging
to examine the internal organs of the human body and also used for performing
surgery. Computers are used to store patient data.
• Mathematical calculations: Computers have computing speeds of over a
million calculations per second, using which we can perform various
mathematical calculations.
30 Self-Instructional Material
• Banks: All financial transactions these days are done by computer software. Introduction to
Computer System
They provide security, speed and convenience.
• Travel: One can book air tickets or railway tickets and make hotel reservations
online.
NOTES
• Communication: Software is widely used in this field through which you
can interact with people around the world.
• Military: There is software embedded in almost every weapon. Military
software is used for controlling flights and for marking target in ballistic missiles.
Software is used to control access to atomic bombs.
• E-learning: For a student, it is easier to learn from e-learning software instead
of a book.
• Examinations: You can give online exams and get instant results.
• Certificates: Different types of certificates can be generated and it is very
easy to create and change layouts.
• ATM machines: The computer software authenticates the user and dispenses
cash for banks.
• Marriage: There are matrimonial sites through which one can search for a
suitable groom or bride.
• News: There are many websites through which you can read the latest or
old news.
• Planning and management: Software can be used to store contact
information, generate plans and schedule appointments and deadlines.
• Plagiarism: Software can examine content for plagiarism.
• Sports: It is used for making umpiring decisions. There are simulation software
using which a sportsperson can practice his skills. Computers are also to
identify flaws in technique.
• Airplanes: Pilots train on software, which simulates flying.
• Weather analysis: Supercomputers are used to analyse and predict weather.
• Research: Computers are widely used for research purposes in various
fields such as follows:
o Network-attached storage (Linux distribution named FreeNAS)
o Media Server (Hewlett-Packard makes a dedicated version)
o Graphics design (Adobe is the forefront in design software)
o Architectural design (AutoCAD/CAM)
o Online banking (savings, loans, insurance, credit, mutual funds, etc.)
o Gaming (computer 3D games, etc.)
o Social networking (Myspace, Facebook, Twitter)
o Knowledge sharing (WikiAnswers, Wikipedia, Lifehacker, Gizmodo, etc.).
Self-Instructional Material 31
Introduction to
Computer System 1.8 SUMMARY
Short-Answer Questions
1. What is a computer?
2. What do you understand by the term artificial intelligence?
3. What are the different types of computers?
4. Define general and special purpose computers.
Long-Answer Questions
1. What are the characteristics of computers?
2. Briefly describe the various generations of the computer.
3. Explain the different types of personal computers.
4. What are the uses and application areas of computers?
34 Self-Instructional Material
Introduction to
1.12 FURTHER READING Computer System
Self-Instructional Material 35
Data Representation and
2.0 INTRODUCTION
A mathematical tool used to count and measure is known as a number. The moment
we hear the ‘term’ numbers, our mind begins to picturize digits like 0, 1, 2, 3, etc.
Numbers are used in everyday life for calculating even the smallest of things, and
has brought system to the world as a whole. Numbers are used everywhere by
everyone, in shops, offices, businesses, homes, etc. This unit will discuss number
systems, bits and bytes, binary number system, decimal number system, octal number
system and hexadecimal number system. You will also learn about conversion from
one number system to another, representation of characters and binary arithmetic.
The data plays an important role in programming and all computer programs
involve applying operations on the data. The data may be a value or a set of values,
such as name and age of a person, grade of a student, salary of an employee, and so
on. The data is just a collection of values and no conclusion can be drawn from it;
however, after processing it becomes information that can be helpful in making
some decisions. You will learn the difference between data and information, and
how data can be classified into structured and unstructured data. You will then learn
the logical and physical concept of data.
NOTES
40 Self-Instructional Material
In each binary digit, the value increases in powers of two starting with 0 to the left Data Representation and
Number System
of the binary point and decreases to the right of the binary point starting with
power –1.
Why is Binary Number System used in Digital Computers? NOTES
Binary number system is used in digital computers because all electrical and
electronic circuits can be made to respond to the two states concept. A switch,
for instance, can be either opened or closed, only two possible states exist. A
transistor can be made to operate either in cut-off or saturation; a magnetic
tape can be either magnetized or non-magnetized; a signal can be either HIGH
or LOW; a punched tape can have a hole or no hole. In all of the above illustrations,
each device is operated in any one of the two possible states and the intermediate
condition does not exist. Thus, zero can represent one of the states and one can
represent the other. Hence, binary numbers are convenient to use in analysing
or designing digital circuits.
Decimal Number System
The number system which utilizes ten distinct digits, i.e., 0, 1, 2, 3, 4, 5, 6, 7, 8 and
9 is known as decimal number system. It represents numbers in terms of groups of
ten, as shown in Figure 2.2.
We would be forced to stop at 9 or to invent more symbols if it were not for
the use of positional notation. It is necessary to learn only 10 basic numbers and
positional notational system in order to count any desired figure.
The decimal number system has a base or radix of 10. Each of the ten
decimal digits zero through nine, has a place value or weight depending on its
position. The weights are units, tens, hundreds and so on. The same can be written
as the power of its base as 100, 101, 102, 103... etc. Thus, the number 1993
represents quantity equal to 1000 + 900 + 90 + 3. Actually, this should be written
as {1 × 103 + 9 × 102 + 9 × 101 + 3 × 100}. Hence, 1993 is the sum of all digits
multiplied by their weights. Each position has a value 10 times greater than the
position to its right.
For example, the number 379 actually stands for the following representation.
100 10 1
2 1
10 10 100
3 7 9
3 × 100 + 7 × 10 + 9 × 1
Self-Instructional Material 41
Data Representation and ∴ 37910 = 3 × 100 + 7 × 10 + 9 × 1
Number System
= 3 × 102 + 7 × 101 + 9 × 100
In this example, 9 is the least significant digit (LSD) and 3 is the most significant
NOTES digit (MSD).
Example 1. Write the number 1936.469 using decimal representation.
Solution: 1936.46910 = 1 × 103 + 9 × 102 + 3 × 101 + 6 × 100 + 4 × 10–1
+ 6 × 10–2 + 9 × 10–3
= 1000 + 900 + 30 + 6 + 0.4 + 0.06 + 0.009 = 1936.469
It is seen that powers are numbered to the left of the decimal point starting with 0
and to the right of the decimal point starting with –1.
The general rule for representing numbers in the decimal system by using
positional notation is as follows:
anan – 1 ... a2a1a0 = an10n + an – 110n–1 + ... a2102 + a1101 + a0100
Where n is the number of digits to the left of the decimal point.
0 000 000 0
1 000 001 1
2 000 010 2
3 000 011 3
42 Self-Instructional Material
4 000 100 4 Data Representation and
5 000 101 5 Number System
6 000 110 6
7 000 111 7
8 001 000 10
NOTES
9 001 001 11
10 001 010 12
11 001 011 13
12 001 100 14
13 001 101 15
14 001 110 16
15 001 111 17
16 010 000 20
Consider an octal number [567.3]8. It is pronounced as five, six, seven octal point
three and not five hundred sixty seven point three. The co-efficients of the integer
part are a0 = 7, a1 = 6, a2 = 5 and the co-efficient of the fractional part is a– 1 = 3.
Counting in hexadecimal
When counting in hex, each digit can be incremented from 0 to F. Once it reaches
F, the next count causes it to recycle to 0 and the next higher digit is incremented.
This is illustrated in the following counting sequences: 0038, 0039, 003A, 003B,
003C, 003D, 003E, 003F, 0040; 06B8, 06B9, 06BA, 06BB, 06BC, 06BD,
06BE, 06BF, 06C0, 06C1.
Double-Dabble Method
A popular method known as double-dabble method, also known as divide-by-
two method, is used to convert a large decimal number into its binary equivalent.
In this method, the decimal number is repeatedly divided by 2, and the remainder
after each division is used to indicate the co-efficient of the binary number to be
formed. Notice that the binary number derived is written from the bottom up.
Example 5. Convert 19910 into its binary equivalent.
Solution: 199 ÷ 2 = 99 + remainder 1 (LSB)
99 ÷ 2 = 49 + remainder 1
49 ÷ 2 = 24 + remainder 1
24 ÷ 2 = 12 + remainder 0
12 ÷ 2 = 6 + remainder 0
6÷2 = 3 + remainder 0
3÷2 = 1 + remainder 1
1÷2 = 0 + remainder 1 (MSB)
46 Self-Instructional Material
The binary representation of 199 is, therefore, 11000111. Checking the result we Data Representation and
Number System
have,
[11000111]2 = 1 × 27 + 1 × 26 + 0 × 25 + 0 × 24 + 0 × 23 + 1 × 22
+ 1 × 21 + 1 × 20
NOTES
= 128 + 64 + 0 + 0 + 0 + 4 + 2 + 1
∴ [11000111]2 = [199]10
Notice that the first remainder is the LSB and last remainder is the MSB. This
method will not work for mixed numbers.
Decimal Fraction to Binary
The conversion of decimal fraction to binary fractions may be accomplished by
using several techniques. Again, the most obvious method is to subtract the highest
value of the negative power of 2, which may be subtracted from the decimal
fraction. Then, the next highest value of the negative power of 2 is subtracted from
the remainder of the first subtraction, and this process is continued until there is no
remainder or to the desired precision.
Example 6. Convert decimal 0.875 to a binary number.
Solution: 0.875 – 1 × 2–1 = 0.875 – 0.5 = 0.375
0.375 – 1 × 2–2 = 0.375 – 0.25 = 0.125
0.125 – 1 × 2–3 = 0.125 – 0.125 = 0
∴ [0.875]10 = [0.111]2
A much simpler method of converting longer decimal fractions to binary consists
of repeatedly multiplying by 2 and recording any carriers in the integer position.
Example 7. Convert 0.694010 to a binary number.
Solution: 0.6940 × 2 = 1.3880 = 0.3880 with a carry of 1
0.3880 × 2 = 0.7760 = 0.7760 with a carry of 0
0.7760 × 2 = 1.5520 = 0.5520 with a carry of 1
0.5520 × 2 = 1.1040 = 0.1040 with a carry of 1
0.1040 × 2 = 0.2080 = 0.2080 with a carry of 0
0.2080 × 2 = 0.4160 = 0.4160 with a carry of 0
0.4160 × 2 = 0.8320 = 0.8320 with a carry of 0
0.8320 × 2 = 1.6640 = 0.6640 with a carry of 1
0.6640 × 2 = 1.3280 = 0.3280 with a carry of 1
We may stop here as the answer would be approximate.
∴ [0.6940]10 = [0.101100011]2
If more accuracy is needed, continue multiplying by 2 until you have as many digits
as necessary for your application.
Self-Instructional Material 47
Data Representation and Example 8. Convert 14.62510 to binary number.
Number System
Solution: First the integer part 14 is converted into binary and then, the fractional
part 0.625 is converted into binary as shown below:
NOTES Integer part Fractional part
14 ÷ 2 =7 + 0 0.625 × 2 = 1.250 with a carry of 1
7÷2 =3 + 1 0.250 × 2 = 0.500 with a carry of 0
3÷2 =1 + 1 0.500 × 2 = 1.000 with a carry of 1
1÷2 =0 + 1
∴ The binary equivalent is [1110.101]2
48 Self-Instructional Material
The fractional part is multiplied by 8 to get a carry and a fraction. The new Data Representation and
Number System
fraction obtained is again multiplied by 8 to get a new carry and a new fraction.
This process is continued until the number of digits have sufficient accuracy.
Example 12. Convert [416.12]10 to octal number. NOTES
Solution: Integer part 416 ÷ 8 = 52 + remainder 0 (LSD)
52 ÷ 8 = 6 + remainder 4
6 ÷ 8 = 0 + remainder 6 (MSD)
Fractional part 0.12 × 8 = 0.96 = 0.96 with a carry of 0
0.96 × 8 = 7.68 = 0.68 with a carry of 7
0.68 × 8 = 5.44 = 0.44 with a carry of 5
0.44 × 8 = 3.52 = 0.52 with a carry of 3
0.52 × 8 = 4.16 = 0.16 with a carry of 4
0.16 × 8 = 1.28 = 0.28 with a carry of 1
0.28 × 8 = 2.24 = 0.24 with a carry of 2
0.24 × 8 = 1.92 = 0.92 with a carry of 1
∴ [416.12]10 = [640.07534121]8
Example 13. Convert [3964.63]10 to octal number.
Solution: Integer part 3964 ÷ 8 = 495 with a remainder of 4 (LSD)
495 ÷ 8 = 61 with a remainder of 7
61 ÷ 8 = 7 with a remainder of 5
7÷8 = 0 with a remainder of 7 (MSD)
∴ [3964]10 = [7574]8
Fractional part 0.63 × 8 = 5.04 = 0.04 with a carry of 5
0.04 × 8 = 0.32 = 0.32 with a carry of 0
0.32 × 8 = 2.56 = 0.56 with a carry of 2
0.56 × 8 = 4.48 = 0.48 with a carry of 4
0.48 × 8 = 3.84 = 0.84 with a carry of 3 [LSD]
∴ [3964.63]10 = [7574.50243]8
Note that the first carry is the MSD of the fraction. More accuracy can be obtained
by continuing the process to obtain octal digits.
Self-Instructional Material 49
Data Representation and represent the eight octal digits of the octal form. The octal number system is often
Number System
used in digital systems, especially for input/output applications. Each octal digit
that is represented by 3 bits is shown in Table 2.5.
52 Self-Instructional Material
Example 24. Convert [A85]16 to decimal number. Data Representation and
Number System
Solution: Converting the given hexadecimal number into binary, we have
A 8 5
[A85]16 = 1010 1000 0101
NOTES
11 9 7 2 0
[1010 1000 0101]2 = 2 + 2 + 2 + 2 + 2 = 2048 + 512 + 128 + 4 + 1
∴ [A85]16 = [2693]10
Example 25. Convert [269]16 to decimal number.
Solution: Hexadecimal number
2
[269]16 = 0010 6 9
0110 1001
[001001101001]2 = 29 + 26 + 25 + 23 + 20 = 512 + 64 + 32 + 8 + 1
∴ [269]16 = [617]10
or, [269]16 = 2 × 162 + 6 × 161 + 9 × 160 = 512 + 96 + 9 = [617]10
Example 26. Convert [AF.2F]16 to decimal number.
Solution: Hexadecimal number
[AF.2F]16 = A × 161 + F × 160 + 2 × 16–1 + F × 16–2
= 10 × 16 + 15 × 1 + 2 × 16–1 + 15 × 16–2
= 160 + 15 + 0.125 + 0.0586
∴ [AF.2F]16 = [175.1836]10
Decimal to Hexadecimal Conversion
One way to convert from decimal to hexadecimal is the hex Dabble method.
The conversion is done in a similar fashion, as in the case of binary and octal,
taking the factor for division and multiplication as 16.
Any decimal integer number can be converted to hex successively dividing
by sixteen until zero is obtained in the quotient. The remainders can then be written
from bottom to top to obtain the hexadecimal results.
The fractional part of the decimal number is converted to hexadecimal number
by multiplying it by sixteen and writing down the carry and the fraction separately.
This process is continued until the fraction is reduced to zero or the required
number of significant bits is obtained.
Example 27. Convert [854]10 to hexadecimal number.
Solution: 854 ÷ 16 = 53 + with a remainder of 6
53 ÷ 16 = 3 + with a remainder of 5
3 ÷ 16 = 0 + with a remainder of 3
∴ [854]10 = [356]16
Self-Instructional Material 53
Data Representation and Example 28. Convert [106.0664]10 to hexadecimal number
Number System
Solution: Integer part
106 ÷ 16 = 6 + with a remainder of 10
NOTES 6 ÷ 16 = 0 + with a remainder of 6
Fractional part
0.0664 × 16 = 1.0624 = 0.0624 + with a carry of 1
0.0624 × 16 = 0.9984 = 0.9984 + with a carry of 0
0.9984 × 16 = 15.9744 = 0.9744 + with a carry of 15
0.9744 × 16 = 15.5904 = 0.5904 + with a carry of 15
Fractional part [0.0664]10 = [0.10FF]16
Thus, the answer is [106.0664]10 = [6A.10FF]16
Example 29. Convert [65, 535]10 to hexadecimal and binary equivalents.
Solution: (a) Conversion of decimal to hexadecimal number
65,535 ÷ 16 = 4095 + with a remainder of F
4095 ÷ 16 = 255 + with a remainder of F
255 ÷ 16 = 15 + with a remainder of F
15 ÷ 16 = 0 + with a remainder of F
∴ [65535]10 = [FFFF]16
(b) Conversion of hexadecimal to binary number
F F F F
1111 1111 1111 1111
∴ [65535]10 = [FFFF]16 = [1111 1111 1111 1111]2
A typical microcomputer can store up to 65,535 bytes. The decimal
addresses of these bytes are from 0 to 65,535. The equivalent binary addresses
are from
0000 0000 0000 0000 to 1111 1111 1111 1111
The first 8 bits are called the upper byte, and second 8 bits are called lower byte.
When the decimal is greater than 255, we have to use both the upper byte and the
lower byte.
Hexadecimal to Octal Conversion
This can be accomplished by first writing down the 4-bit binary equivalent of
hexadecimal digit and then partitioning it into groups of 3 bits each. Finally, the 3-
bit octal equivalent is written down.
Example 30. Convert [2AB.9]16 to octal number.
Solution: Hexadecimal number 2 A B . 9
↓ ↓ ↓ ↓
4 bit numbers 0010 1010 1011 . 1001
54 Self-Instructional Material
3 bit pattern 001 010 101 011 . 100 100 Data Representation and
Number System
↓ ↓ ↓ ↓ ↓ ↓
Octal number 1 2 5 3 . 4 4
∴ [2AB.9]16 = [1253.44]8
NOTES
Example 31. Convert [3FC.82]16 to octal number.
Solution: Hexadecimal number 3 F C . 8 2
4 bit binary numbers 0011 1111 1100 . 1000 0010
3 bit pattern 001 111 111 100 . 100 000 100
↓ ↓ ↓ ↓ ↓ ↓ ↓
Octal number 1 7 7 4 . 4 0 4
[3FC.82]16 = [1774.404]8
Notice that zeros are added to the rightmost bit in the above two examples to
make them group of 3 bits.
Octal to Hexadecimal Conversion
It is the reverse of the above procedure. First the 3-bit equivalent of the octal digit
is written down and partitioned into groups of 4 bits, then the hexadecimal equivalent
of that group is written down.
Example 32. Convert [16.2]8 to hexadecimal number.
Solution: Octal number 1 6 . 2
↓ ↓ ↓
3 bit binary 001 110 . 010
4 bit pattern 1110 . 0100
↓ ↓
Hexadecimal E . 4
∴ [16.2]8 = [E.4]16
Example 33. Convert [764.352]8 to hexadecimal number.
Solution: Octal number 7 6 4 . 3 5 2
3 bit binary 111 110 100 . 011 101 010
4 bit pattern 0001 1111 0100 . 0111 0101 000
↓ ↓ ↓ ↓ ↓ ↓
Hexadecimal number 1 F 4 . 7 5 0
∴ [764.352]8 = [1F4.75]16
Self-Instructional Material 55
Data Representation and
Number System 2.4 REPRESENTATION OF CHARACTERS
Binary data is not the only data handled by the computer. We also need to process
NOTES alphanumeric data like alphabets (upper and lower case), digits (0 to 9) and special
characters like + – * / ( ) space or blank etc. These also must be internally represented
as bits.
Binary Coded Decimal (BCD)
Binary Coded Decimal (BCD) is one of the early memory codes. It is based on the
concept of converting each digit of a decimal number into its binary equivalent rather
than converting the entire decimal value into a pure binary form. It further uses four
digits to represent each of the digits. Table 2.6 shows the BCD equivalent of the
decimal digits.
Table 2.6 BCD Equivalent of Decimals
Decimal Number Binary Equivalent
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
Since EBCDIC is an 8 bit code, it can easily be divided into two 4 bit groups.
Each of these groups can be represented by one hexadecimal digit (explained earlier
in this unit). Thus, hexadecimal number system is used as a notation for memory
dump by computers that use EBCDIC for internal representation of characters.
Developed by IBM, EBCDIC code is used in most IBM models and many
other computers.
American Standard Code for Information Interchange (ASCII)
A computer code that is very widely used for data interchange is called the ‘American
Standard Code for Information Interchange’ or ASCII. Several computer
manufacturers have adopted it as their computers’ internal code. This code uses
seven digits to represent 128 characters. Now an advanced ASCII is used having 8
bit character representation code allowing for 256 different characters. This
representation is being used in micro computers.
Let us look at the encoding method. Table 2.7 below shows the bit combinations
required for each character.
Table 2.7 Bit Combinations for Each Character
00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00 NUL SOH STX ETX EOT ENQ ACK BEL BS TAB LF VT FF CR SO SI
10 DLE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FSR GS RS US
20 ! " # $ % & ‘ ( ) * + , - . /
30 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
40 @ A B C D E F G H I J K L M N O
50 P Q R S T U V W X Y Z [ \ ] ^ _
60 ' a b c d e f g h i j k l m n o
70 p q r s t u v w x y z { | } ~ DEL
Example 4. Add the binary numbers (i) 011 and 101, (ii) 1011 and 1110, (iii)
10.001 and 11.110, (iv) 1111 and 10010, and (v) 11.01 and 101.0111.
Solution: (i) Binary number Equivalent decimal number
11 ← Carry
011 3
+ 101 5
Sum = 1000 8
(ii) Binary Decimal (iii) Binary Decimal
11 ← Carry 1 ← Carry
1011 11 10.001 2.125
+ 1110 + 14 + 11.110 + 3.750
Sum = 11001 25 Sum = 101.111 5.875
58 Self-Instructional Material
(iv) Binary Decimal (v) Binary Decimal Data Representation and
Number System
11 ← Carry 11 ← Carry
1111 15 11.01 3.25
+ 10010 + 18 101.0111 + 5.4375
NOTES
Sum = 100001 33 Sum = 1000.1011 8.6875
Since the circuit in all digital systems actually performs addition that can handle only
two numbers at a time, it is not necessary to consider the addition of more than two
binary numbers. When more than two numbers are to be added, the first two are
added together and then their sum is added to the third number and so on. Almost all
modern digital machines can perform addition operation in less than 1 µs.
Larger Binary Numbers
Column by column addition applies to binary as well as decimal numbers.
Example 35. Add the following binary numbers.
(i) 1101101 and 1001110 (ii) 1111001 and 1100101
(iii) 110011 and 111000 (iv) 1111110 and 11100111
Solution: 1 1 1 carry 1 1 1 carry
1 1 0 1 1 0 1 1 1 1 1 0 0 1
(i) 1 0 0 1 1 1 0 (ii) 1 1 0 0 1 0 1
1 0 1 1 1 0 1 1 1 1 0 1 1 1 1 0
1 carry 1 1 1 1 1 1 carry
1 1 0 0 1 1 0 1 1 1 1 1 1 0
(iii) 1 1 1 0 0 0 (iv) 1 1 1 0 0 1 1 1
1 1 0 1 0 1 1 1 0 1 1 0 0 1 0 1
Example 36. Add these 8-bit numbers : 0110 1011 and 1011 0110. Then, show the
same numbers in hexadecimal notation.
Solution: 8 bit binary Hexadecimal equivalent
1111 11 carry
0110 1011 6 B H
+ 1011 0110 +B 6 H
10010 0001 1 2 1 H
Logic equations representing the sum is also known as the exclusive OR function
and can be represented also in Boolean ring algebra as S = AB BA = A ⊕ B.
Binary Subtraction
Subtraction is the inverse operation of addition. To subtract, it is necessary to establish
procedure for subtracting a large digit from a small digit. The only case in which this
Self-Instructional Material 59
Data Representation and occurs with binary numbers is when 1 is subtracted from 0. The remainder is 1, but
Number System
it is necessary to borrow 1 from the next column to the left. The rules of binary
subtraction are shown below in Table 2.9.
1. 0 – 0 = 0
NOTES 2. 1 – 0 = 1
3. 1 – 1 = 0
4. 0 – 1 = 0 with a borrow of 1
5. 10 – 1 = 01
Table 2.9 Binary Subtraction
Self-Instructional Material 63
Data Representation and Example 44. Multiply the binary numbers 1011 and 1101.
Number System
1011 Multiplicant = 1110
×1011 Multiplier = × 1310
14310
NOTES
1011
0000 Partial product = 14310
1011 Final product = 14310
1011
10001111
Example 45. Multiply the following binary numbers.
(i) 1100 12 (ii) 1011 11
×1010 ×10 ×1100 ×12
0000 120 0000 132
1100 0000
0000 1011
1100 1011
1111000 10000100
64 Self-Instructional Material
negative numbers shown in Figure 2.3 represents the 2’s complements of the Data Representation and
Number System
positive numbers.
Except for the magnitude, the positive and negative numbers are 2’s
complements of each other. Hence, we can take the 2’s complement of a positive
NOTES
binary number to find the corresponding negative binary number.
Case 1: Two positive numbers
Consider the addition of + 29 and + 19.
+ 29 0001 1101 (augend)
Adding + 19 0001 0011 (addend)
+ 48 0011 0000 (sum = 48)
Case 2: Positive and smaller negative number
Consider the addition of +39 and –22, remembering that the –22 will be in its
2’s complement form. Thus +22 (0001 0110) must be converted to –22 (1110
1010).
+ 39 0010 0111
Adding – 22 1110 1010
17 1 0001 0001
↑
This carry is disregarded, so the result is 10001.
In this case, the sign bit of addend is 1. The sign bits also participate in the process
of addition. In fact a carry is generated in the last position of addition. This carry is
always disregarded.
Case 3: Positive and larger negative number
Consider the addition of –47 and +29.
– 47 1101 0001
Adding + 29 0001 1101
– 18 1110 1110
The result has a sign bit of 1, indicating a negative number. It is in 2’s complement
form. The last seven bits 110 1110, naturally represent the 2’s complement of the
sum. To find the true magnitude of the sum, we must take the 2’s complement of
1110 1110; the result is 10010 (+ 18). Thus, 1110 1110 represents – 18.
Case 4: Two negative numbers
Consider the addition of – 32 and – 44.
– 32 1110 0000 (augend)
Adding – 44 1101 0100 (addend)
Self-Instructional Material 65
Data Representation and – 76 11011 0100 (sum = – 76)
Number System
↑
This carry is disregarded, so the result is 1011 0100.
NOTES Subtraction in 2’s Complement System
As in the case of addition, there are four cases. The subtraction operation using
the 2’s complement system actually involves the operation of addition.
Case 1: Both positive numbers
Consider the case where 19 is to be subtracted from +28
+ 28 0001 1100
+ 19 0001 0011
To subtract + 19 from + 28, the computer will send + 19 to a 2’s complement
circuit to produce – 19 1110 1101
The computer will then add + 28 and – 19 as follows:
+ 28 0001 1100
Adding – 19 1110 1101
(Sum = 9) 1 0000 1001 disregard the carry
Case 2: Positive and smaller negative number
Consider that the minuend is + 39 and the subtrahend is – 21. In 2’s complement
system, they appear as,
+ 39 0010 0111
– 21 1110 1011
The computer sends – 21 to a 2’s complement circuit to produce,
+ 21 0001 0101
The computer then adds + 39 and + 21 as follows:
+ 39 0010 0111
Adding + 21 0001 0101
(Sum = 60) 0011 1100
Case 3: Positive and larger negative number
Consider that the minuend is + 19 and the subtrahend is – 43. In 2’s complement
system, they appear as,
+ 19 → 0001 0011
– 43 → 1101 0101
The computer sends the 2’s complement of – 43, i.e.,
+ 43 → 0010 1011
66 Self-Instructional Material
Now the computer adds + 19 and + 43 as shown below: Data Representation and
Number System
+ 19 → 0001 0011
Adding + 43 → 0010 1011
(sum = 62) 0011 1110 NOTES
Signal Binary Number Representation
In digital computers, the binary numbers are represented by a set of binary storage
devices, such as flip-flops. Each device represents one bit. A 6 bit FF register, for
example, could store binary numbers ranging from 000000 to 111111 (0 to 63
decimal). This represents the magnitude of the number. Since digital computers and
calculators handle positive as well as negative numbers, some means is required for
representing the sign of the number (+ or –). This is usually done by placing another
bit called sign bit to the left of the magnitude bits. A 0 in the sign bit represents a
positive number and a 1 in the sign bit represents a negative number. Therefore, –
101, –100 and –010 are coded as 1101, 1100 and 1010 respectively.
The sign bit is used to indicate whether a stored number is positive or negative.
The numbers in Figure 2.4 consists of a sign bit and seven magnitude bits. The
magnitude bits are true binary equivalent of the decimal value being represented.
This is called the sign-magnitude system for representing signed binary numbers.
Sign Magnitude
0 0 1 1 0 1 0 0 = + 5210
1 0 0 1 1 –1 1 1 = – 3110
1 0 1 0 1 1 1 0 = +4610
Three main signed number binary codes are used : (i) Sign magnitude (ii) 1’s
complement code, and (iii) 2’s complement code. The most commonly used system
for representing signal binary numbers is the 2’s complement system.
Self-Instructional Material 67
Data Representation and
Number System 2.6 DATA AND INFORMATION
Data comprises raw facts and/or figures from which meaningful conclusions can be
NOTES easily drawn. When the data is recorded, classified, organized and related or
interpreted within a framework, it provides meaningful information. Information can
be defined as ‘data that has been transformed into a meaningful and useful form for
specific purposes’. Data is represented by the letters of the alphabets or numerals,
while the information may be represented in the form of tables, graphs, charts, and
so on.
In some cases, data may not require any processing before constituting
information. However, data is not useful unless it is subjected to a process through
which it is manipulated and organized, and through which its contents are analysed
and evaluated. When items are purchased from a departmental store, a number of
data items are recorded, such as your name, address, items purchased, the price, the
tax, discounts, the amount paid, and so on. If you put these items together and
interpret them, they represent information about a business transaction.
Data vs Information
Often the terms data and information are used interchangeably. However, they are
different. Data consists of raw facts and figures, such as numbers and text, whereas
information is processed data which is presented with some context. For example:
Data : 261108
Information : Joining date of an employee: 26/11/08
: Average salary of an entry level software engineer: ` 2,61,108
: Total number of books available in university library: 2,61,108
The term ‘Data Management’ refers to all actions related to the management and
implementation of storage, updating, retrieval, indexing, security as well as searching
of data. Data management is a key process in the functioning of any organization. A
well planned and effective data management strategy can make a huge difference
to the efficiency and decision-making abilities within an organization. In this unit, we
will discuss the need for and applications of data management but first we must
understand the concept of ‘Data’ in the context of business.
Classification of Data
For data management purposes, data is broadly classified into two categories:
(i) Structured and (ii) Unstructured data.
Structured Data
Structured data or structured information is the data stored in fixed fields within a
file or a record. This form of data representation is also known as ‘Tabular Data’,
where data sets are organized in the form of a table. Structured data is managed by
68 Self-Instructional Material
techniques that work on query and reporting against programmed data types and Data Representation and
Number System
clear relationships. Databases and spreadsheets are examples of structured data.
Unstructured Data
People use and create unstructured data everyday, although they may not be aware, NOTES
a word processed letter or e-mail, in fact any document and images, such as those
captured by a digital camera are all examples of ‘Unstructured Data’. Unstructured
data primarily consists of ‘Textual Data’ and ‘Image Data’. Textual data being any
string of text, this could be a whole book or simply a short note. Images are digital
pictures, such as photographs and maps.
Unstructured data in business can take the form of letters, memorandums,
reports and legal documents. In order to manage this data effectively, it needs to be
organized for storage and retrieval because the information in these documents may
be critical to business processes. One technique for organizing or structuring
unstructured data is to utilize metadata.
Managing Data
Data is a valuable resource for any organization, large or small. Regardless of the
operations and objectives of an organization, it keeps records of its finances,
employees, stocks, production, and so on. Whether these records are stored and
updated electronically using a computer system or on paper using a filing cabinet, an
organization will benefit by managing this data effectively.
Recording and storing data within an organization is only useful if this data is
used to benefit the firm. Unused data, apart from the legal requirements of record
keeping, is generally considered a wasted resource. Data on stock control and
production output in a manufacturing firm can be analysed to identify strengths and
weaknesses in the production process, employee records can help identify trends
and information regarding salary and demographics to focus development on the
workforce. These benefits and many more can be achieved by managing an
organization’s data.
At its most basic level, managing data is about organizing an environment or
system where data can be stored, updated and retrieved. An organization’s data
management requirements will be greater than this and the specific requirements
will be more complex.
Data Management in IT: From the very moment a computer was used to
make calculations involving data, the need to store and access this data was identified
and the following solutions were developed:
File System was developed in the 1950s followed by hierarchical Database
Management System (DBMS) in the 1960s.
Network DBMS, followed by Relational DBMS were developed in the 1970s
and later on developed to Object Oriented DBMS in the 1990s.
Self-Instructional Material 69
Data Representation and Logical and Physical Concept of Data
Number System
The logical architecture of a DBMS is known as three level architecture which was
suggested by ANSI/SPARC (American National Standards Institute/Standards
NOTES Planning And Requirements Committee).
The data can be accessed and manipulated by defining the levels of abstraction.
There are three levels of abstraction, which are as follows:
• Physical or Internal Level: It is the lowest level of abstraction. It
describes how data is actually stored on the physical media.
• Logical or Conceptual Level: It is the next higher level of abstraction.
It describes what data is stored and how data is interrelated.
• External or View Level: It is the lowest level of abstraction as seen by
a user. This level of abstraction describes only a part of the entire database
or a subset of the database.
Figure 2.5 presents the logical architecture of a typical DBMS.
Conceptual level
Internal level
Physical storage
70 Self-Instructional Material
this conceptual view. There is only one conceptual schema per database. Each Data Representation and
Number System
external view is described by means of a schema called an external schema or a
subschema. Many external schemas can be defined and even overlap each other.
The concept of level of architecture can be explained with the help of an
employee database that contains the details of an employee, such as the employee NOTES
number, employee name and the department number. The internal level of architecture
for the employee database can be represented as follows:
Stored_emp BYTES=20
Prefix TYPE=BYTE (5), OFFSET=0
Emp TYPE=BYTE (6), OFFSET=5, INDEX=EMPX
Dept TYPE=BYTE (2), OFFSET=10
Pay TYPE=FULLWORD, OFFSET=10
Self-Instructional Material 71
Data Representation and At the external level, the two views can be explained as follows:
Number System
View 1
employee_number FName Designation Dept_No
NOTES
View 2
72 Self-Instructional Material
DML Precompiler: This converts the DML (Data Manipulation Language) Data Representation and
Number System
statements embedded in an application program to normal procedure calls in a host
language. Through the DML precompiler, DML commands and application programs
written in the host language are separated. DML commands are sent to the DML
interpreter for translation into the object code for database access and the rest of NOTES
the program is sent to the compiler of the host language. Object codes for the
commands and the rest of the program are combined together through linking and
are sent to the DBMS engine (also called database manager) for execution. The
precompiler must interact with the query processor in order to generate the appropriate
code. The precompiler interacts with the query processor.
Data Manipulation Language or DML
DML Compiler: This translates DML or Data Manipulation Language statements
into low level instructions that a query processor understands.
The manipulation of database is needed if schemas are compiled and database
is working with multiple databases. DML, a database language, is used to manipulate
data. Data manipulation means accessing and retrieving data, adding new data,
manipulating data and deleting data if specific data is not necessary. A query statement
in DML is used to retrieve data from database. Query language is posed by a subset
of DML. The query language and DML are used as synonymously.
DML is embedded with conventional programming languages, such as C,
C++, Pascal, Assembler, COBOL and PL/I. DML statements are called host language
if it is embedded with general purpose programming. DML is also known as data
sublanguage. The two types of DML are as follows:
• Low Level or Procedural
This level facilitates a user to specify what type of data is needed and how to get it.
For example, DMLs for hierarchical and network database system.
• High Level or Non-procedural
This level facilitates a user to specify what type of data is needed without specifying
how to get it, for example, SQL (Sequential Query Language) and QBE (Query
By Example).
Data Definition Language or DDL
DDL Interpreter or Compiler: This interprets Data Definition Language or DDL
statements and records definitions in the data dictionary.
DDL is also known as database scheme which represents a set of definitions.
DDL allows the creation and deletion of structures of database objects as well as
provides facilities for defining and altering defined physical data structures.
and statements are the most frequently used DDL statements. The
definition also includes any constraints that are set of rules to be maintained for
integrity of the database.
Database Manager: This is a program module providing an interface for
low level data with application programs and queries which are submitted to the
database system.
Self-Instructional Material 73
Data Representation and The functions of the database manager include:
Number System
• Efficient storage, retrieval and updation of data
• Interaction with the file manager
NOTES • Ensuring a state of consistency in the database, irrespective of system
failures
• Maintenance of integrity controls and user authority for data accession
File Manager: This manages the allocation of disk space and data structures
used to represent information on disk.
In addition, several data structures are required for the physical system
implementation.
• Data: It is stored in data files which store the database itself.
• Data Dictionary: Actually, this is a critical element in the DBMS. The
result of the compilation of DDL statements is a set of tables that is
stored in a special file called data dictionary which documents data in a
database. A data dictionary contains metadata (data about data). Metadata
is data about the storage details of a database.
• Indices: To improve the performance of a DBMS, a set of access aids in
the form of indexes are usually provided in the database systems. An
index is a data structure that helps access data through a given part of
their value. It provides fast access to data. There are several indexes,
and for implementing indexes, several techniques are used; however, each
technique is specific to a particular database application. A DBMS provides
commands to build, maintain and destroy such indexes.
• Statistical Data File: The query processor uses statistical data to optimize
queries.
• Log File: Each log record comprises the values for database items before
and after a modification, and it can be utilized for the purpose of recovery.
74 Self-Instructional Material
is ideal for converting similarly structured data into specific sets of information using Data Representation and
Number System
predefined rules of selection, processing and presentation. Data processing can also
include the conversion of one type of information into another for legacy systems
transfer.
The data processing activities, including collection, conversion, manipulation, NOTES
storage and communication, are common to all data processing systems from manual
to electronic systems. These activities can be categorized into four groups, namely
data input, data processing, data output and storage. These altogether are known as
a data processing cycle.
(i) Input: The term ‘input’ denotes the activities that are required for
recording data and for making it available for processing. The input can
also include the steps that are important to check, verify and validate
data contents.
(ii) Processing: The term ‘processing’ refers to the actual data manipulation
techniques, such as classifying, sorting, calculating, summarizing,
comparing, and so on, which convert data into information.
(iii) Output: After the processing of data, the information generated in
transmitted through s communication function known as output. The
output transmits the information to the persons who need the information.
Sometimes output also includes decoding activity, which converts the
electronically generated information into human-readable form.
(iv) Storage: It is the last stage in the data processing cycle, where data,
instruction and information are held for future use. This cycle allows
quick access and retrieval of the processed information. It allows to
pass the information on to the next stage directly, when needed. Every
computer uses storage to hold system and application software.
Self-Instructional Material 75
Data Representation and Typically, a data processing cycle can be broadly divided into three stages:
Number System
(i) Data collection
It is the first stage of the cycle, and also the most important. This is because the
NOTES quality of the data collected can have a strong impact on the output. The collection
process should ensure that the data collected are both well-defined and correct, so
that the following decisions based on the outcomes are authentic. This stage provides
both the baseline from which to measure and a target on what to improve.
Data can be collected in the form of events, transaction or some observations.
Following the collection of data, it can be recorded in some usable form. Initially,
data may be recorded on paper source documents and then converted into a machine-
usable form for processing. On the other hand, they may be recorded by a direct
input device in a paperless, machine-readable form. Data collection is also known
as data capture.
(ii) Data manipulation
After the collection of data is complete, it is manipulated into a suitable form for
further analysis and processing. It is not possible to process raw data, which must
also be checked for accuracy. Preparation is about constructing a dataset from one
or more data sources, which is to be used for further exploration and processing.
The analysis of data, which has not been checked properly for problems, can result
in highly misleading results that are heavily dependent on the quality of data prepared.
Once data is collected and converted, it is ready for the manipulation function
which converts data into information. Data manipulation includes the following
activities:
• Sorting: It includes the arrangement of data items in the preferred
sequence. Generally, it is easier to work with data if it is arranged in a
logical sequence. Usually, the data are arranged in alphabetical order.
Sometimes sorting itself will change data into information. Sorting technique
is extensively used in business data processing. Almost all the records in
business files are maintained in some logical sequence. In computer-based
processing systems, numeric sorting is preferred because it is usually
faster than alphabetical sorting.
• Calculating: It refers to the arithmetic manipulation of data. Items of
recorded data can be added to one another, subtracted, divided or multiplied
to create new data. Calculation is, therefore, a very important part of data
processing.
• Summarizing: In this method, large amount of data are condensed or
reduced to a more usable and concise form. When the data involved is
numbers, you summarize by counting or accumulating the totals of the
data in a classification or by selecting strategic data from the mass of
data being processed.
• Comparing: To compare data means performing an evaluation in relation
to some known measure. For example, business managers compare data
76 Self-Instructional Material
to discover how their companies are performing. They may draw a Data Representation and
Number System
comparison between current sales figures and those of the last year to
analyse the performance of the company in the current month.
(iii) Output generation NOTES
In this stage, the processed information is transmitted to the user. Output is presented
to users in different report formats, such as printed report, audio, video or on monitor.
Output needs to be understood so that it can provide meaningful information.
Once data has been captured and manipulated, the following activities may
be carried out:
• Storing: By storing data, the user can utilize the data later or for continued
usage. Storage is important for any organized method of processing and
re-using data. The storage mechanisms for data processing systems are
file cabinets in a manual system and electronic devices, including magnetic
disks/magnetic tapes in case of computer based system. The storing activity
comprises storing data and information in an organized method for
facilitating the retrieval activity. Moreover, data should be stored only if
the value of having them in the future exceeds the storage cost.
• Retrieving: When the stored data or information is recovered or found
again, it is known as retrieval. Retrieval techniques use data storage
devices. Therefore, data, whether in file cabinets or in computers, can be
recalled for further processing. Retrieval and comparison of old data gives
meaning to current information.
• Communicating: The process of sharing information is known as
communication. Communication is of no use unless the information is
made available to the users who require it. Therefore, communication
involves the transfer of data and information produced by the data
processing system to the potential users of such information or to another
data processing system. Accordingly, reports and documents are prepared
and delivered to the users. In electronic data processing, results are
communicated through display units or terminals.
• Reproducing: To reproduce is to copy or duplicate data or information.
This reproduction activity may be carried out manually or by machine.
Types of Data Processing
Just as there are different types of data (classified either by usage, attributes or
content), there are different methods of processing data. These are as follows:
1. Manual Data Processing: This type of processing is used for calculation
and processing of data. It is usually simple and operated manually. This type
of function is carried out using non-technological tools, such as paper, writing
tools and physical filing cabinets.
2. Electro-Mechanical Data Processing: It functions by using electric motor,
switches and relays for control of processes, for example, desk calculators
and punched card processing devices.
Self-Instructional Material 77
Data Representation and 3. Electronic Data Processing: This type of processing is used in the modern
Number System
age. It includes the modern computer which have evolved into five generations
with advancement of processing hardware; the vacuum tubes, transistors,
integrated circuits and microprocessors.
NOTES (i) Batch Processing: Real-time processing requires high speed broadband
connections so that the data inputted from different computers or
locations can be used to update a centralized server and database. Setting
up such networks is expensive and not always feasible because
sometimes the data does not need to be processed immediately. For
example, in a BPO (Business Processing Outsourcing) outfit, hundreds
of operators may be inputting data, which can be made available to the
client only after it is checked and verified by a supervisor(s). Such
situations call for batch mode processing, which is used when the
conversion of data into information is not required to be done immediately
and, therefore, this data processing is done in lots or batches. The
advantages of batch processing are that it is cheaper and processing
can be done offline (see Figure 2.7).
78 Self-Instructional Material
Data Representation and
Number System
NOTES
80 Self-Instructional Material
• Sequencing: It refers to physical ordering of data. The function sequencing Data Representation and
Number System
is also referred as sorting.
• Calculation: A series of arithmetic and logical operations are performed to
validate and manipulate the data so that it is converted into useful information.
NOTES
• Transmission: The information may be moved or transmitted over LAN,
WAN or the Internet. It is presented in a variety of formats, such as tables,
graphs and charts.
Data Processing Systems
A computer is a programmable machine. Computers act upon executing a series of
instructions called software programmes. Data processing systems include computers,
application software, printers, scanners, and so on. They are capable of manipulating
and storing data.
A Personal Computer (PC) is a desktop computer that runs on a single
microprocessor. Typically, a PC consists of a keyboard for entering data; a mouse
for interacting with the application software; an output console, called monitor for
the display of information; and a storage medium, called hard disk for storing the
information. These components of a PC are used for desktop applications, such as
Word Processing, Spreadsheets, PowerPoint presentations and other utility software.
The other kind of computer is called mainframe computer which is a bigger
computer with high processing and large storage capabilities, usually up to terabytes.
Mainframe computers are used for processing large volumes of data. Supercomputers,
on the other hand, are extremely fast computers compared to PCs and execute
several hundreds of instructions per second.
PC memory and storage cards are the devices that are used to enhance
storage capacity of the computers. In order to transmit data files over the Internet
network, modems are used. Figure 2.11 illustrates data processing systems.
A file stored in a storage device is always identified using a file name (e.g.,
STUDENT.DAT TEXTINFO.TXT, and so on). Note that a filename normally has
a primary name and a secondary name which are separated by a dot (.).
STUDENT.DAT
NOTES
A text file contains information stored in the form of string of characters. The
characters entered through the keyboard are stored continuously as illustrated in
Figure 2.14.
Computer is an electronic device or a
multipurpose tool which can be used for data
A text file processing, numerical problem solving,
graphical 2D or 3D picture generation, multimedia
applications and so on.
2.9 SUMMARY
NOTES
2.10 KEY TERMS
1. There are four systems of arithmetic, which are often used in digital systems.
These systems are:
• Decimal
• Binary
• Hexadecimal
• Octal
2. A nibble is a group of 4 bits. This gives a maximum number of sixteen possible
different values.
3. A number system that uses eight digits, 0, 1, 2, 3, 4, 5, 6 and 7 is called an octal
number system.
4. A popular method also known as divide-by-two method, the double-dabble
method is used to convert a large decimal number into its binary equivalent.
5. The simplest procedure is to use the binary-triplet method. The binary digits
are grouped into groups of three on each side of the binary point with zero’s
added on either side if needed to complete a group of three.
Self-Instructional Material 85
Data Representation and 6. Conversion from binary to hexadecimal is easily accomplished by partitioning
Number System
the binary number into groups of four binary digits, starting from the binary
point to the left and to the right.
7. Solution: Hexadecimal number
NOTES 2 A B 9
↓ ↓ ↓ ↓
4 bit numbers 0010 1010 1011 . 1001
3 bit pattern 001 010 101 011 . 100 100
↓ ↓ ↓ ↓ ↓ ↓
Octal number 1 2 5 3 . 4 4
∴ [2AB.9]16 = [1253.44]8
86 Self-Instructional Material
Data Representation and
2.12 QUESTIONS AND EXERCISES Number System
Short-Answer Questions
1. Why is binary number system used in digital computers? NOTES
2. Write a short note on Octal Number System.
3. Convert [854]10 to hexadecimal number.
4. Write a short note on how binary addition is performed.
5. List the five stages of data processing cycle.
Long-Answer Questions
1. How would you perform a binary to decimal conversion?
2. Explain floating point representation of numbers.
3. Perform the subtraction using 1’s complement addition of the following binary
numbers: 110010–101101, 111001010–110110101, 11010101–10101100
4. Convert 19910 into its binary equivalent.
5. Convert [65, 535]10 to hexadecimal and binary equivalents.
6. Convert [2AB.9]16 to octal number.
7. Add the following binary numbers:
(i) 011 and 101
(ii) 1011 and 1110
(iii) 10.001 and 11.110
(iv) 1111 and 10010
(v) 11.01 and 101.0111
8. Subtract the following using 2’s complement method:
(i) (1011)2 from (1100)2
(ii) (1001)2 10012 from 11012
(iii) 01012 from 10012
3.0 INTRODUCTION
In this unit, you will learn how the operating system acts as interface between user
and hardware. An operating system is a set of programs that manages computer
hardware resources to provide common services for software and application
programs. Without an operating system, a user cannot run an application program
on their computer unless the application program is executed with self-booting process.
For hardware functions, such as input and output, and memory allocation, the operating
system acts as an intermediary between application programs and the computer
hardware although the application code is usually executed directly by the hardware
and will call the operating system or be interrupted by it. An operating system manages
the computer’s memory, processes and all of its software and hardware. There are
many objectives to be met for achieving the ultimate goal of easy to use and human
friendly operating system that ensures the computer to be useful, user friendly,
acceptable and affordable to everyone in this world.
This unit also explains the characteristics of operating system and types of
software.
Self-Instructional Material 89
Human Computer Interface
3.2 OPERATING SYSTEM AS USER INTERFACE
An OS is a program that acts like an interface between a user of a computer and the
NOTES computer hardware. The purpose of the operating system is to provide an environment
to the user in which he/she can execute programs. The operating system is an
integral part of almost every computer system. A computer system can broadly be
divided into three components:
(i) The hardware which comprises the memory, the CPU, the ALU, various
bulk storage, I/O and peripheral devices.
(ii) Systems programs, such as OS, device drivers, loaders, utilities, etc.
(iii) Application programs such as database systems, business programs, etc.
A computer system is described in Figure 3.1.
Computer Hardware
The CPU is located on the chips inside the system unit. The CPU is the brain/heart/
soul of the computer system. It is the place where the computer interprets and
processes information. The OS is the first component of the systems programs that
interests us here.
Systems programs are the programs that are written for direct execution on
computer hardware in order to make the power of the computer fully and efficiently
accessible to the applications programmers and other computer users. Note that
system programming is different such as from application programming, as it
requires an intimate knowledge of the computer hardware as well as the end users’
needs.
Systems programs are often large and more complex than application
programs, although that is not always the case. Since systems programs provide the
foundation upon which application programs are built, it is imperative that systems
programs are reliable, efficient and correct.
90 Self-Instructional Material
Definition of Operating System Human Computer Interface
The OS can be defined as set of programs that are capable to manage resources as
well as the operations of a computer. The OS can hide the hardware virtually from
the user, i.e., it isolates the hardware from the user (see Figure 3.2). Till the time the
NOTES
functions are performed, user is not concerned about the hardware specifications.
Hardware
Operating
System
Application
Program
Users Users
Self-Instructional Material 91
Human Computer Interface (d) Data Transfers between memories, terminals etc.
(e) Arithmetic Operations involves addition, subtraction, multiplication and
division of numeric values.
NOTES (f) Text Processing involves copying, comparison, extraction, insertion of
textual items.
(g) Error Handling deals with error conditions.
• Device management: The OS closely manages the I/O job of the computer
system. The processor transmits signals which are decoded by the control
unit and transmitted to and recognized by the IO devices. Each running process
generates the I/O requests which are required to be served by the system.
There are differences in the operational speed of the processor and I/O devices.
This calls for buffering and blocking of each file which the operating system
takes care of. Indeed, the weakest links in the computer system are its I/O
subsystems, which can cause errors. Using hardware and software
mechanisms, the operating system detects and corrects errors when they
occur.
• File management: This function is incorporated in the operating system
because of the following reasons:
(a) To relieve the users of the problem of storing files separately from the
computer and thus making retrieval a more straightforward operation.
(b) To allow two or more user to share the same file.
To achieve these objectives, the operating systems are designed to implement policies
which provide protection form loss or corrupted files etc. Apart from that, it also
provides efficient allocation of space in the secondary storage devices and file sharing
besides arranging user computer interface by the use of symbolic file names and
attributes.
• System management: This may be taken as consisting of the following
main sub-systems:
(a) Security
(b) Job accounting
(c) Overall system performance
(d) Interaction with operators and logging thereof
Security: This capability includes provision of safeguards against
unauthorized access to programs and data resident in the memory,
performing validation of inputs, taking action to resolve errors, etc. These
measures impose restrictions even on unauthorized users, thereby
minimizing the chances of destruction/corruption of data or services.
Job accounting: This capability implies keeping track of time and
resources used by various hobs/users of the system. The accounting of
the resources includes keeping count of the following:
(a) Total system time elapsed
92 Self-Instructional Material
(b) Total CPU time elapsed Human Computer Interface
Software is the program used to make the computer usable in terms of accomplishing
the users’ tasks. Software consists of programs, routines and procedures that can
be run on a computer system. The different categories of software are:
• System software: System software makes the computer work and gets it to
the state where it is ready to run our programs. It consists of all the operating
systems, translators and languages to ensure smooth and efficient functioning
of the computer system. These programs provide the integration of various
components of a computer to work together and provide the way to manipulate
these resources according to the need and choice of the user.
Self-Instructional Material 93
Human Computer Interface • Application software: Application software refers to all the programs that
the user uses in order to complete a particular task. This software allows the
user to utilize computers for the tasks which are provided by the software
itself, such as data manipulation, documentation, image, and multimedia
NOTES development and usage, etc. It ranges from playing games to word processing
to monitoring the condition of patients in hospitals.
• Utility packages: Utility packages are special software which provides a
helping hand to the other software in terms of improvements in the systems
performances by performing some routine task, such as disk defragmentation,
disk scanning and bad sector corrections. The Norton tool kit is one of the
utility toolkits that provide a lot of tools to perform tasks that can help in
managing and enhancing the systems performances.
System Software
System software comprises different programs that are use to control the computer
system and aid a programmer in doing his work efficiently. It consists of all the
operating systems, translators and languages to ensure smooth and efficient
functioning of the computer system. System software makes very efficient use of
the hardware resources. System software can be further categorized as:
• Operating system and controlling programs
• Translators, such as assemblers, compliers and interpreters
• Database management systems (DBMS)
• Drivers and system testing tools
Operating Systems
It is an integrated set of specialized programs that are used to control and manage
the resources and overall operations of a computer. Operating system (OS) controls
the execution of other computer programs. It provides scheduling, debugging, I/O
control, compilation, storage assignment, data management and other related
services to all other programs running on the computer. Some examples of popular
OS are: MS-DOS (Disk Operating System), OS2, UNIX, Linux, MS-Windows
95/98, MS-Windows NT, MS-Windows XP and MS-Windows Vista.
Translators
Programs that translate a program written in any computer language into machine
understandable code are known as translators. Translators are further divided into
three categories. These categories are explained in the following:
Assemblers
An assembly language program cannot be directly executed by a computer. To
interpret and execute an assembly language program, it has to be converted into
its machine language equivalent. An assembler is a program that translates a program
written in assembly language into a machine executable code.
94 Self-Instructional Material
An input to the assembler program is termed as source program and the Human Computer Interface
output of assembler is a machine language program termed as object program.
Once an object program is formed, it is translated to the computer’s primary memory
using the systems loader.
NOTES
Compiler
Compilers are the translators that translate high-level language programs into
machine code, and this machine code is executed afterwards. The translated
machine code is known as object code. Functions performed by compliers are:
• They allocate addresses for all variables and statements.
• They generate the object program on tape or disk as required.
• They produce a printed listing of the source and object programs, if required.
• They tabulate a list of programming errors found during compilation.
Interpreters
These are used for translating a high-level language program into a machine-level
language program line by line and each of the instructions alternately. When a
program is to be executed, the interpreter accesses the first interaction, translates
it into one or more machine language instructions, and then executes these
instructions. The interpreter then accesses the next instruction and repeats these
tasks. The process continues until all source language instructions have been
translated and executed. The most well known interpreter-based language is
BASIC.
Functions of Interpreters
• Interpreters are slow as compared to compilers because of line by line
translation and execution.
• Debugging is easier in interpreter-based languages because the interpretation
process stops as soon as an error is encountered.
Drivers
A driver is a special type of software created by peripheral device manufacturers
to provide facility to the computer to communicate with the peripheral devices,
e.g. printer drivers, mouse drivers, etc. Drivers have the ability to convert the data
supplied by the computer according to the device setting and than transfer to the
device to work over it.
Application Software
Application software enables the computer to produce some useful output, such
as specific inventory control reports, attendance accounting, linear programming
or medical counting, etc. It is subdivided into three categories: general purpose,
special purpose and bespoke (common).
Self-Instructional Material 95
Human Computer Interface General Purpose Software
General purpose or generic software refers to applications that have a number of
common uses among a range of different users. The most common types of general
NOTES purpose software being used in business are:
1. Word processing applications are used like typewriters to produce letters
and other text based documents including letters, essays, legal documents,
contracts, etc.
2. Spreadsheet applications are used to handle numbers and calculations, for
example, a company accounts, sales figures, etc.
3. Presentation applications are used to make multimedia presentations usually
to be displayed as a slide show.
4. Desktop publishing applications are used to create pages for publications
that required more complex layout, for example, magazines, newspapers and
brochures.
5. Database applications are used to store and search information for a
particular purpose, for example, customer records, dental records, etc.
6. Programming applications are used for writing computer programs, such
as employee attendance, record keeping system, etc.
7. Multimedia applications are used to create and display any kind of pictorial
information, for example, line drawings, paint packages and animations.
Special Purpose Software
These are the generalized set of programs used to deal with a particular application.
The software is normally developed by specialist software developers to solve
common problems faced by many users, e.g., MS-Office, WordStar, Lotus and
Tally, etc.
Bespoke (Customized) Software
Bespoke (customized) application software is programs written by a use or a
programmer in order to perform specific tasks for the user. They are written in a
variety of programming languages depending on the task in hand. Normally, these
are sets of programs used in conjunction with one another, e.g., payroll system,
customized accounting packages for a company, etc.
96 Self-Instructional Material
Human Computer Interface
3.4 SUMMARY
• An OS is a program that acts like an interface between a user of a computer
and the computer hardware. The purpose of the operating system is to provide NOTES
an environment to the user in which he/she can execute programs.
• Systems programs are the programs that are written for direct execution on
computer hardware in order to make the power of the computer fully and
efficiently accessible to the applications programmers and other computer
users.
• The various tasks that are generally performed by the operating system are:
(i) Storage management
(ii) Processing management
(iii) Device management
(iv) File management
• Software is the program used to make the computer usable in terms of
accomplishing the users’ tasks. Software consists of programs, routines and
procedures that can be run on a computer system.
• Application software refers to all the programs that the user uses in order to
complete a particular task.
• Utility packages are special software which provides a helping hand to the
other software in terms of improvements in the systems performances by
performing some routine task, such as disk defragmentation, disk scanning
and bad sector corrections.
• General purpose or generic software refers to applications that have a number
of common uses among a range of different users.
Self-Instructional Material 97
Human Computer Interface
3.6 ANSWERS TO ‘CHECK YOUR PROGRESS’
1. An assembler is a program that translates a program written in assembly
NOTES language into a machine executable code.
2. A driver is a special type of software created by peripheral device
manufacturers to provide facility to the computer to communicate with the
peripheral devices, e.g. printer drivers, mouse drivers, etc.
Short-Answer Questions
1. Define operating system.
2. A computer system is divided into three components. List them.
3. What do you understand by the term software?
4. What are the different categories of software?
Long-Answer Questions
1. Explain how the OS acts like an interface between a user and computer
hardware?
2. Explain the tasks that are performed by operating systems.
3. What are general and special purpose software? Discuss in detail.
98 Self-Instructional Material
I/O Devices and Memory
4.0 INTRODUCTION
In this unit, you will learn in detail about different types of input and output devices.
Information to the CPU is sent through an input device to carry out several functions.
A computer is capable of using several types of input devices so that every user gets
a unique experience. Keyboard, mouse, webcam, scanner, microphone, etc., can be
grouped as input devices. An input device is any peripheral (piece of computer
hardware) equipment used to provide data and control signals to the computer.
Output is information produced by the computer program and perceived by
the user. In simple words, output is what you get from the computer. This can be
information on a screen, sound, images, or a printed page. The output is given to us
through various devices which are called output devices. An output device is a
computer hardware equipment used to communicate the results of data processing
carried out by an information processing system (such as a computer).
Further in this unit, you will learn about data storage in a computer system. The
most commonly used form of auxiliary storage involves a kind of magnetic disk. It
comes in various sizes and stores data on a magnetic surface. Magnetic disk is known
for its high storage capacity and reliability. It also facilitates direct access to data. This
unit will also discuss data storage devices like hard disks, diskette and optical disks.
The I/O devices that provide a means of communication between the computer
and the outside world are known as peripheral devices. This is because they surround
the CPU and the memory of a computer system. While input devices are used to
enter data from the outside world into the primary storage, output devices are used
to provide the processed results from the primary storage to the users.
As mentioned earlier in this section, input devices are used to transfer user
data and instructions to the computer. The most commonly used input devices can
be classified into the following categories:
• Keyboard devices (general and special purpose, key-to-tape, key-to-disk,
key-to-diskette)
• Point-and-draw devices (mouse, trackball, joystick, light pen, touch screen)
• Scanning devices (optical mark recognition, magnetic ink character
recognition, optical bar code reader, digitizer, electronic-card reader)
• Voice recognition devices
• Vision-input devices (webcam, video camera)
100 Self-Instructional Material
Keyboard Devices I/O Devices and Memory
Keyboard devices allow input into the computer system by pressing a set of keys
which are mounted on a board connected to the computer system. Keyboard devices
are typically classified into general-purpose keyboards and special-purpose keyboards.
NOTES
General-purpose keyboard
The most familiar means of entering information into a computer is through a
typewriter-like keyboard that allows a person to enter alphanumeric information
directly.
The most popular keyboard used today is the 101-keys with a traditional
QWERTY layout, having an alphanumeric keypad, twelve function keys, a variety
of special-function keys, numeric keypad, and dedicated cursor-control keys. It is so
called because of the arrangement of its alphanumeric keys in the upper left row.
Figure 4.2 shows QWERTY keyboard layout.
Function Keys Numeric Keypad
These are standalone data entry systems used for computers deployed for specific
applications. These typically have special purpose keyboards to enable faster
data entry. A very typical example of such keyboards can be seen at the automatic NOTES
teller machines or the ATMs, where the keyboard is required for limited functionality
(support for some financial transactions) by the customers. Point-of-sale or POS
terminals at fast food joints, air/railway reservation counters are some other
examples of special-purpose keyboards. These keyboards are specifically designed
only for special types of applications.
Key-to-tape, key-to-disk, key-to-diskette
These are standalone data entry stations. These units usually have a small processor
attached to a keyboard and a visual display unit. The processor checks for the
accuracy of data at the time of entry. The screen displays data as it is being entered.
These facilities are very useful and desirable during mass data entry and are therefore
becoming very popular in data processing centres.
Point-and-Draw Devices
The keyboard facilitates input of data only in the text form. While working with
display based packages, we usually point to a display area and select an option from
the screen (fundamentals of GUI applications). For such cases, the sheer user-
friendliness of input devices that can rapidly point to a particular option displayed on
screen and support its selection, resulted in the advent of various point-and-draw
devices.
Mouse
A mouse is a small device that a computer user pushes across a desk surface in
order to point to a place on a display screen and to select one or more actions
possible from that position. The mouse first became a widely used computer tool
when Apple Computer made it a standard part of the Apple Macintosh. Today, the
mouse is an integral part of the graphical user interface (GUI) of any personal
computer. The mouse apparently got its name by being about the same size and
colour as a toy mouse.
Figure 4.3 shows a mouse.
It is more convenient and requires much less space than the mouse since
here the whole device is not moved (as in the case of a mouse). Trackball comes in
various shapes but supports the same functionality. Typical shapes used are a ball, a
square, and a button (typically seen in laptops).
Joystick
The joystick is a vertical stick that moves the graphic cursor in the direction the stick
is moved. It consists of a spherical ball which moves within a socket, and has a stick
mounted on it. The user moves the ball with the help of the stick that can be moved
left or right, forward or backward, to move and position the cursor in the desired
location. Joysticks typically have a button on top that is used to select the option
pointed by the cursor. Video games, training simulators, and control panels of robots
are some common uses of a joystick. The following figure shows a joystick:
The light pen is a pen-shaped device which allows natural movement on the screen.
It is made up of a light sensitive cell and a lens assembly designed in such a way that
it focuses onto itself any light in its field of view. The pen contains a light receptor
NOTES
and is activated by pressing the pen against the display screen. The receptor is the
scanning beam that helps in locating the pen’s position (X and Y coordinates on the
screen). Suitable system software is provided to initiate the desired action once the
area on the display screen is located with the help of the light pen. Light pens are
typically used in CAD (Computer Aided Design) applications to directly draw on
screen. The following figure shows a light pen:
Touch screen
A touch screen is probably one of the simplest and most intuitive of all input devices.
It uses optical sensors in or near the computer screen which can detect the touch of
a finger on the screen. Once the user touches the screen at a particular position,
sensors communicate the position to the computer. This is then interpreted by the
computer to understand the user’s choice for input. The most common usage of
touch screens is in information kiosks, where users can receive information at the
touch of a screen. These devices have become very popular today.
Scanning Devices
Scanning devices are input devices used for direct data entry from the source
document into the computer system. Scanners facilitate capturing of information
and storing it in a graphical format for displaying it back on the graphical screen.
They consist of two components, one to illuminate the page so that the optical image
can be captured and the other to convert the graphical image into a digital format for
storing. The graphical images thus scanned can be seen and processed directly by
the computer.
There are two types of scanners, CONTACT and LASER. Both bounce a
beam of light off an image, and then measure the reflected light to determine the
value of the image. Hand-held contact scanners make contact as they are brushed
over the printed matter to be read. Laser-based scanners are more versatile and
can read data passed near the scanning area. Hand-held scanners are used where
the information to be scanned or the volume of documents to be scanned is very
Self-Instructional Material 105
I/O Devices and Memory low. They are much cheaper as compared to the flat-bed scanners. The following
figures shows hand-held and flatbed scanners:
NOTES
Fig. 4.7 (a) Hand-held Scanner Fig. 4.7 (b) Flatbed Scanner
Answer Sheet
1. a b c d
2. a b c d
3. a b c d
4. a b c d
Page 1 of 4
NOTES
Digitizer
Digitizers are used to convert drawings or pictures and maps into a digital format for
storage in the computer. A digitizer consists of a digitizing or graphics tablet, which is
a pressure sensitive tablet, and a pen with the same X and Y coordinates as on the
screen. Some digitizing tablets also use a crosshair device instead of a pen. The
movement of the pen or the crosshair is reproduced simultaneously on the display
screen. When the pen is moved on the tablet, the cursor on the computer’s screen
moves simultaneously to the corresponding position on the screen (X and Y coordinates).
This allows the user to draw sketches directly or input existing sketched drawings
easily. Digitizers find most common usage by architects and engineers as a tool for
computer aided designing (CAD). The following figure shows a digitizing tablet:
Electronic-card reader
Card readers are devices that also allow direct data input into a computer system.
The electronic-card reader is connected to a computer system and reads the data
encoded on an electronic card and transfers it to the computer system for further
processing.
Electronic cards are plastic cards with data encoded on them and meant for
a specific application. Typical examples of electronic cards are the plastic cards
issued by banks to their customers for use in automatic teller machines or ATMs.
Electronic cards are also used by many organizations for controlling access of various
types of employees to physically secured areas.
108 Self-Instructional Material
Depending on the manner in which the data is encoded, electronic cards may I/O Devices and Memory
be either magnetic strip cards or smart cards. Magnetic strip cards have a magnetic
strip on the back of the card. Data stored on magnetic strips cannot be read with the
naked eye, a useful way to maintain confidential data. The following figure shows
an access card security system: NOTES
Smart cards
Smart cards, going a stage further, have a built-in microprocessor chip where data can
be permanently stored. They also possess some processing capability making them
suitable for a variety of applications. For example, to gain access, an employee inserts
a card or a badge in the reader. This device reads and checks the authorization code
before permitting the individual to enter a secured area. Since smart cards can hold
more information as compared to magnetic strip cards, they are gaining in popularity.
Fig. 4.13(a) Dot Matrix Printer Fig. 4.13(b) Characters Formed Using Dots
The speed, versatility and ruggedness, combined with low cost, tend to make such
printers particularly attractive in the personal computer market. Typical printing
Self-Instructional Material 111
I/O Devices and Memory speeds in case of dot matrix printers range between 40 – 1000 cps (characters-per-
second). One major disadvantage of this technology is that the print quality is low.
Inkjet printer
NOTES Inkjet printers use a series of nozzles to spray drops of ink directly on the paper.
These therefore fall under the category of non-impact printers. The printhead of an
inkjet printer consists of a number of tiny nozzles that can be selectively heated up in
a few microseconds by an IC register. When this happens, the ink near it vapourizes
and is ejected through the nozzle to make a dot on the paper placed in front of the
printhead. The character is printed by selectively heating the appropriate set of
nozzles as the printhead moves horizontally.
If you have ever looked at a piece of paper that has come out of an inkjet
printer, you would have noticed the following:
• The dots are extremely small (usually between 50 and 60 microns in
diameter), so small that they are tinier than the diameter of a human hair
(70 microns).
• The dots are positioned very precisely, with resolutions of up to 1440×720
dots per inch (dpi).
• The dots can have different colours combined together to create photo-
quality images.
Inkjet printers are slower than dot-matrix printers (40–300 cps), cheaper to
buy but are more expensive in running costs (the ink cartridge cost is considerably
higher than that of the DMP ribbon) and are used by people/organizations, where
speed of printing is not the most important factor. The following figure shows an
inkjet printer:
Laser
Laser printers use dry ink (toner), static electricity, and heat to place and bond the
ink onto the paper. They use a combination of laser and photocopier technology.
Printing is achieved by deflecting laser beam onto the photosensitive surface of a
drum after which the latent image attracts the toner to the image. The toner is then
electrostatically transferred to the paper and fixed into a permanent image. The
following figure shows a laser printer:
112 Self-Instructional Material
I/O Devices and Memory
NOTES
Laser printers are capable of converting computer output into print, page by
page. Since characters are formed by very tiny ink particles, they produce very high
quality images (text and graphics), generally offer a wide variety of character fonts,
and are silent and fast in use. Laser printers are faster in printing speed than the
other printers discussed here. Their speeds can range from ten pages a minute to
about 200 pages per minute, depending upon the make/model.
Laser is high quality, high speed, high volume, and non-impact technology that
work on plain paper or pre-printed stationery. This technology is relatively expensive
but has become very popular because of the quality, speed and noiseless operations.
Plotters
Plotters are used to produce graphical output on paper. It is a device capable of
producing charts, drawings, graphics, maps, etc. It is much like a printer but is
designed to print graphs instead of alphanumeric characters.
Based on the technology used, plotters may be pen plotters or electrostatic
plotters. While pen plotters have an ink pen attached to draw the images, electrostatic
plotters work similar to a laser printer. Image is produced by charging the paper with
a high voltage. This voltage attracts the toner, which is then melted on the paper
with heat. Electrostatic plotters are fast, but the quality is generally considered to be
poor when compared to pen plotters. This is why pen plotters are more extensively
used as compared to electrostatic plotters. Flatbed plotters and drum plotters constitute
the most commonly used plotters.
Flatbed plotters
Flatbed plotters have a flat base like a drawing board on which the paper is laid (as
shown in Figure 4.16(a). One or more arms, each of them carrying an ink pen,
moves across the paper to draw. The arm movement is controlled by a
microprocessor (chip). The arm can move in two directions, one parallel to the
plotter and the other perpendicular to it (called the x and y directions). With this type
of movement, it can move very precisely to any point on the paper placed below.
NOTES
The computer sends the commands to the plotter which are translated into x
and y movements. The arm moves in very small steps to produce continuous and
smooth graphics. The size of the plot in a flatbed plotter is limited only by the size of
the plotter’s bed.
The advantage of flatbed plotters is that the user can easily control the graphics.
He can manually pick up the arm anytime during the production of graphics and
place it on any position on the paper to alter the position of graphics to his choice.
The disadvantage here is that flatbed plotters occupy a large amount of space.
Drum plotters
Drum plotters use a drum revolver to move the paper during printing (as shown in
Figure 4.16(b)). The arm carrying a pen moves only in one direction, perpendicular
to the direction of motion of the paper. Thus, in drum plotters the pen is moved in a
single axis track and the paper itself moves on a cylindrical drum to add the other
axis or dimension. The combination of the pen and paper movement creates the
graphics.
The size of the graph is therefore limited only by the width of the drum and
can be of any length. Drum plotters are very compact and lightweight as compared
to flatbed plotters. This is one of the advantages of such plotters. The disadvantage,
however, is that the user cannot freely control the graphics when they are being
created.
NOTES
Read/ Write Read Only – ROM
(Volatile) (Non-Volatile)
PROM EPROM
EEPROM UVEPROM
Fig. 4.17 Types of Random Access Memories
Cache Memory
Cache memories are small, fast memories placed between the CPU and the main
memory. They are faster than the main memory with access times closer to the
speed of the CPU. Although caches are fast, they are also very expensive and so
are used only in small quantities. For example, caches of size 64K, 128K are normally
used in PC-386 and PC-486, where can have 1 to 8 MB of RAM or even more.
Cache memories are therefore intended to provide fast speed memory retrieval
without sacrificing the size of the memory.
If the memory is so small, how can it be advantageous in increasing the
overall speed of memory? The answer to this lies in the phenomenon known as
locality of reference. Let us examine what this means.
Locality of reference. Analysis of a large number of typical programs has
shown that memory references at any given interval of time tend to be confined to
a few localized areas in the memory. This phenomenon is known as the property of
locality of reference. This is true because most of the programs typically contain
iterative loops (like ‘for’ or ‘while’ loops). During the execution of such programs,
the same set of instructions (within the loop) are executed many times. The CPU
repeatedly refers to the set of instructions in the memory that constitute the loop.
Everytime a specific subroutine is called, its set of instructions is fetched from the
memory. Thus, loops and subroutines tend to localize the references to memory for
fetching instructions.
Accessed Address of
Word Accessed Word
NOTES
Cache Memory
Block of Words If Word not Found
including
in Cache
Accessed Word
Main Memory
Fig. 4.19(b) Magnetic Tape Reel Fig. 4.19(c) Magnetic Tape Cartridge
The tape is read sequentially, i.e., data can be read in the order in which the
data has been written. This implies that if the desired record is at the end of the tape,
all the earlier records have to be read before it is reached. A typical example of a
tape can be seen in a music tape cassette where to listen to the fifth song one must
listen to, or traverse, the earlier four songs. The access time of information stored
on tape is therefore, very high as compared to that stored on a disk.
The storage capacity of the tape depends on its data recording density and
the length of the tape. Data recording density refers to the amount of data that can
be stored or the number of bytes that can be stored per linear inch of tape. The data
recording density is measured in BPI (Bytes per inch).
Thus,
Storage capacity of a tape = Data recording density × Length of tape
It is worth noting that the actual storage capacity for storing user data, is
much less owing to the file header labels, file trailer labels, BOT and EOT markers,
and the use of IBGs.
Some commonly used magnetic tapes are the following:
• 1/2 inch tape reel
• 1/2 inch tape cartridge
• 1/4 inch streamer tape
• 4 mm DAT (Digital Audio Tape) – typical capacity of 4GB to 14 GB
Magnetic disks are direct-access medium and hence they are the most popular
online secondary storage devices. Direct-access devices are also called random-
access devices because information is literally available at random or in any order. NOTES
Access to any location on the device is direct and so approximately equal access
time is required for each location. An example of this is a music CD, where if you
wish to listen to the fifth song, you can directly select the fifth track. It does not
require you to fast forward the previous four songs.
Track
Sector
Inter -
track
Gap
Usually, the upper surface of the topmost disk and the lower surface of the
bottom-most disk are not used since these are prone to getting scratched easily. For
faster access of data from disk packs, a concept called cylinders is used. As can be
seen in Figure 4.21, a set of corresponding tracks on all the recording surfaces of
the disk pack together form a cylinder. Thus, if there are 100 tracks on each disk
surface, there are 100 cylinders in the disk pack.
Cylinder-based organization provides faster data access. The related records
of a file can be stored on the same cylinder (on multiple disks of a disk pack)
and subsequently with one movement of the access arm, all records on, say cylinder
5, (fifth track of every recording surface) can be simultaneously read.
The storage capacity of a disk system can be determined as follows:
Storage capacity = Number of recording surfaces × Number of tracks
per surface × Number of sectors per track ×
Number of bytes per sector
Example: Consider that a disk pack consists of 4 plates each having 2655
tracks with 125 sectors per track. Also, each sector can store 512 bytes. Then,
Storage capacity = 6 × 2655 × 125 × 512 = 1,01,95,20,000 bytes = 1 × 109
bytes approximately or 1 GB or 1 Gigabyte.
Note: We have six recording surfaces since there are four disk plates.
Access time on disks
As detailed earlier, the disk address is specified in terms of the surface number, the
track or cylinder number, and the sector number. The read/write heads need to be
first positioned on the track on which the data is to be recorded or from which data
needs to be read. Information is always written from the beginning of a sector and
can be read only from the beginning of the desired track. Thus, the disk access time
depends on the following factors:
• Seek time: The time taken to position the head on a specific track. The
seek time would vary depending upon the position of the access arms at
NOTES
Label for
Identification
Write-protect tab
Thus, for a 3½ inch high density disk which has eighty tracks, eighteen sectors/
track, and 512 bytes/sector, the disk storage capacity can be calculated as follows:
2 × 80 × 18 × 512 = 14,74,560 bytes or 1.4 MB (approximately)
The following table provides the necessary details and associated storage
capacities of various types of floppy disks:
Floppy disks are extensively used in personal computers as a medium for
distributing software to computer users.
Table 4.1 Details of Various Floppy Disks
Size No. of No. of No. of
No. of Storage Capacity
(diameter Recording Sectors/ Bytes/ (approx)
in inches) Surfaces Tracks Tracks Sector
5¼ 3,68,640 bytes or
2 40 9 512
360kB
Hard Disks
Unlike floppy disks, hard disks are made up of rigid metal. The sizes for the disk
platters range between 1 to 14 inches in diameter. Depending on the way they are
packaged, hard disks can be categorized as disk packs or Winchester disks.
• Winchester disks: also consist of two or more hard disk platters mounted
on a single central shaft but are of the fixed type. The disk platters are sealed
in a contamination-free container. Due to this fact all the disk platters, including
the upper surface of the topmost disk platter and the lower surface of the
bottommost platter, are used for storing data. So, even though Winchester
disks have limited storage capacity as opposed to disk packs, they can store
larger amounts of data as compared to the same number of disk platters.
Another type of disk called the zip disk is very common today. This consists
of a single hard disk platter encased in a plastic cartridge. Such a disk typically has
a capacity of about 100 MB. Also, the zip drive can be fixed or portable. The fixed
zip drive is permanently connected to the computer system while the portable ones
can be carried around and connected to any computer system for the duration of its
NOTES
Optical Disks
Optical disks are storage devices with huge storage capacity. It is a relatively
new storage medium and uses laser beam technology for writing and reading data.
Optical disks consist of one large track that starts from the outer edge and
spirals inward towards the centre (this is unlike the magnetic disk in which tracks
are concentric circles on the disk platter). An optical disk is also split up into sectors,
but these are of the same length regardless of its location on the track. Data is
therefore packed at maximum density over the disk.
The storage capacity of an optical disk is determined as follows:
Storage capacity = Number of sectors × Number of bytes per sector
(Note that we do not consider the number of tracks since there is only one
track in this case.)
Thus, a 5.25 inch optical disk with 3,30,000 sectors and storing 2,352 bytes
per sector, will have a storage capacity of
3,30,000 × 2352 = 77,61,60,000 bytes or 740 MB (approx.).
The technology used in optical disks uses laser beams to write and read data
as opposed to the read /write head used in magnetic disks. Data is recorded by
etching microscopic pits (burnt surface) on the disk surface. A high intensity laser
beam is used to etch the pits, while a low intensity laser beam is used for data
retrieval.
NOTES
Raid Controller
Multiple
Disks
4.5 SUMMARY
• An input device accepts data from the outside world and transforms it into a
form the computer can interpret.
• Point-and-draw devices are used to point to, and select menu items or icons
displayed on screen. They provide a means for graphical user interface (GUI).
• The I/O devices that provide a means of communication between the computer
and the outside world are known as peripheral devices.
• Keyboard devices allow input into the computer system by pressing a set of
keys which are mounted on a board connected to the computer system. The
most popular keyboard used today is the 101-keys with a traditional QWERTY
layout, having an alphanumeric keypad, twelve function keys, a variety of
special-function keys, numeric keypad, and dedicated cursor-control keys.
• A mouse is a small device that a computer user pushes across a desk surface
in order to point to a place on a display screen and to select one or more
actions possible from that position.
• Scanning devices are input devices used for direct data entry from the source
document into the computer system. Scanners facilitate capturing of
information and storing it in a graphical format for displaying it back on the
graphical screen. There are two types of scanners, CONTACT and LASER.
• Digitizers are used to convert drawings or pictures and maps into a digital
format for storage in the computer.
Short-Answer Questions
1. What are point-and-draw devices? Give examples.
2. What are mass storage devices?
3. What is the need for data backup?
4. Write a short note on the role of monitors as output devices.
5. Find the storage capacity of a magnetic disk which has 80 tracks, 15 sectors
per track and stores 512 bytes per sector.
Self-Instructional Material 133
I/O Devices and Memory 6. Write short notes on plotters.
7. Write a short note on access modes used in memory.
8. Define cache memory and locality of reference.
NOTES Long-Answer Questions
1. Describe how input devices are used to enter information into the computer.
2. What are scanning devices? Explain in detail.
3. What are display devices? Explain the different display screen technologies.
4. What are printers? Explain the different types with the technology used in
them.
5. What are secondary storage devices? Explain.
EDUCATION AND
NOTES
RESEARCH
Structure
5.0 Introduction
5.1 Unit Objectives
5.2 Applications of Computers in Education and Research
5.3 Digital Library and Google Scholar
5.3.1 Google Scholar
5.4 Domain Specific Package: MS Office, Mathematica
5.4.1 Microsoft Office 2010 – Products and Applications
5.4.2 New Features and Tools in Office 2010
5.4.3 Mathematica
5.5 Data Analysis: SPSS
5.6 Summary
5.7 Key Terms
5.8 Answers to ‘Check Your Progress’
5.9 Questions and Exercises
5.10 Further Reading
5.0 INTRODUCTION
Education
In a traditional teaching model, a teacher would present the study material either
through verbal presentation or using a black or whiteboard to write and illustrate.
There would generally be a textbook to accompany this material which the students
and teacher alike could refer to. Information technology has the potential to enhance
and complement traditional teaching methods by providing additional tools to a teacher
to display and explain ideas to their students and providing students with innovative
but practical learning tools to help study.
The presentation of study material can be enhanced through multimedia
presentations where a slide show, animation, video with sound is projected for the
students to view. This makes the material more interesting and accessible than if it
was merely presented verbally and through a textbook. Furthermore, concepts and
ideas presented in a visual format like these are more easily understood and retained
longer by students.
Some interesting developments and uses of IT in education are as follows:
• Computer Based Training (CBT): Progressive educational institutions
can conduct classroom sessions using what is known as CBT. In this
case, each student then sits at a computer terminal which operates
software that presents course material in interactive sessions. It includes
NOTES
NOTES
NOTES
NOTES
NOTES
NOTES
NOTES
NOTES
NOTES
One of the unique features which were introduced in Microsoft Office 2010
is the feature of Backstage View. Backstage View is a group of commands which
are used to perform different types of tasks on documents. It provides you with the
features of managing documents, sharing files and providing greater security. In
order to open backstage view, you must open the Word document and then go to the
File tab. In this, the default selection is the ‘Info option’, that shows the backstage
view of the document. Backstage view hides the previous document and shows all
essential things and permissions associated with the documents. In order to return
from the backstage view, you can simply press the “Esc” key or click on the File
menu. This will take you to the original document in which you were working.
Screenshot showing the Backstage View of MS Word is as shown:
The first option is “Inspect Document”, which helps in inspecting the document
before sending it to clients or colleagues. With the help of “inspect document”, you
can identify the personal information which gets accumulated in the document over
a period of time. Sending personal information by mistake to other organizations will
reveal essential details about your organization. That is why inspection of documents
is performed before sending them to other users or organizations.
Before performing inspection of the document, the file should be saved on
the local computer. This is so because MS Word sometimes is unable to restore
documents once inspection of documents is performed.
Screenshot of the “Inspect Document” feature is as shown:
Hence, it can be said that Microsoft Word 2010 is much more powerful application
software as compared to its previous versions, not only in terms of its robustness,
but also from an aesthetic point of view.
• Microsoft Excel: Microsoft Excel 2010 has all the functionalities of the
previous edition, and also has some new additional features. Microsoft Excel
168 Self-Instructional Material
2010 maintains features of the “Ribbon User Interface” with some additional Use of Computers in
Education and Research
features. There are also some changes in the UI. In the previous edition, the
background of Microsoft Excel was in blue color. In the recent edition, the
background color of Microsoft Excel is grey. Microsoft Excel has increased
row limits, and thus shows improvement in visualization and analyses of data NOTES
trends. A lot of features in it have improved over its previous editions, such as
formatting, PivotTable and many more.
The screenshot showing differences in interface and row count is as shown:
With the help of Slicers, data can be filtered and interpreted in an aesthetic
manner. Slicer is inserted by using the ‘Insert’ option in the Excel Spreadsheet.
Slicers help in creating interactive reports as it has improved the features of functions
used in Excel.
Thus, you can say that Microsoft Excel 2010 has included new features in order to
improve the presentation of the business scenario.
• Microsoft PowerPoint: Microsoft PowerPoint 2010 has all the functionalities
of the previous editions such as Protected View, Backstage View, Collaboration
and sharing, taking screenshot directly. Transition tab is the new tab which
is introduced in Microsoft Office 2010. It has been separated from the
Animations tab of 2007 with some more animation effects.
NOTES
In this, one can convert the PPT to PDF or XPS formats. However in the
earlier editions, this feature was not present. It also provides the features of sharing
a presentation over web and converting presentations to video. It also provides
many options of video editing.
The screenshot shows few additional features that are included in MS
PowerPoint 2010:
NOTES
It has improved the features of arranging the mail in the proper manner so
that it can be indexed easily at the top. The Organization and storage of the Mail can
be done easily with the help of Outlook.
NOTES
It has improved the features of organization of tabs, sending the content under
any section, sharing the notes over the web browser. It is used for accessing files
from anywhere: the user’s office, home or any other place across the world.
Microsoft office 2010 is better than the previous versions as it is based on the
latest technologies. The new features allow us to create more aesthetically appealing
documents, presentations, spreadsheets, notes and databases, with added
functionalities in comparison to the previous versions.
5.6 SUMMARY
• Progressive educational institutions can conduct classroom sessions using
what is known as CBT. In this case, each student then sits at a computer
terminal which operates software that presents course material in interactive
sessions.
• Many research studies cannot be carried out without the use of computer
particularly those involving complex computations, data analysis and modelling.
Computer in scientific research is used at all stages of study, i.e., from proposal/
budget stage to submission or presentation of findings.
• In the setting of a distributed client-server environment, typically, a digital
library will require both server side and client side software and hardware.
• A telecommunication network is used by the client and the server for
communication purpose over a well-defined protocol.
• In digital libraries, the data is saved in digital files, which could be created
from the digitization of original record materials or from the most common or
standard data formats.
• A video file is a moving image recording, and it has audio synchronized created
with original digital video or analog. Some of the characteristics that are
important in a video file are pixel array, frame rate per second, aspect ratio,
bit rate, field order, color space and the definition being standard or high.
• When the various components of a digital library and the services associated
with them can be interchanged both functionally and logically, they are said to
be interoperable. These components are structured according to a set of
well-defined publicly known interfaces.
• For libraries that work with electronic content, a huge matter of concern is
the archiving and preservation of content. This relates to content that might
have been converted in-house, acquired via subscription services, purchased
in digital media, or any other way.
• Linking is a feature that is well supported by digital libraries. Since the Web is
a system based on hypermedia, it enables the linking between the various
electronic resources that are stored on servers which might even be located
at different geographical locations with massive geographical distances
between them.
NOTES
5.9 QUESTIONS AND EXERCISES
Short-Answer Questions
1. Define CBT.
2. List the components of digital library.
3. What are the software that are generally needed in a digital library?
4. Write a short note on digital libraries.
5. Outline the concept of IPR and copyright in digital libraries.
6. Differentiate between linking, cross-linking and interlinking in digital libraries.
7. Define SPSS.
8. What are the different versions of SPSS?
Long-Answer Questions
1. Explain the components needed to build a digital library.
2. Discuss the various formats and media types used in a digital library.
3. Describe the process of creating and developing a digital library.
4. What are the different applications of MS Office 2010?
5. What are the new features and tools incorporated in office 2010 in comparison
to earlier versions?
6. Explain the terminalogy used in SPSS.