Fundamentals of Computer 20CS11T Chapter 3
Fundamentals of Computer 20CS11T Chapter 3
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 42
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
3.1.2 Generation of computers
This long period of evolution can be conveniently divided into the following phases called computer
generations:
Generations of Computer Time-Period Evolving Hardware
First Generation 1940s – 1950s Vacuum Tube Based
Second Generation 1950s – 1960s Transistor Based
Third Generation 1960s – 1970s Integrated Circuit Based
Fourth Generation 1970s – Present Microprocessor Based
Fifth Generation Present – Future Artificial Intelligence Based
Let us now discuss the development in Computer Technology over the different generations.
First Generation
• The period 1940 to 1956, roughly considered as the First Generation of Computer.
• The first-generation computers were developed by using vacuum tube or thermionic valve machine.
• The input of this system was based on punched cards and paper tape; however, the output was displayed
on printouts.
• The first-generation computers worked on binary-coded concept (i.e., language of 0-1).
Second Generation
• The period 1956 to 1963 is roughly considered as the period of Second Generation of Computers.
• In comparison to the first generation, the size of second generation was smaller.
• In comparison to computers of the first generation, the computing time taken by the computers of the
Third Generation
• The period 1963 to 1971 is roughly considered as the period of Third Generation of computers.
• The third-generation computers were developed by using the Integrated Circuit (IC) technology.
• The size of the computers of the third generation was smaller.
• In comparison to the computers of the second generation, the computing time taken by the computers of
the third generation was lesser.
• The third-generation computer consumed less power and also generated less heat.
• The maintenance cost of the computers in the third generation was also low.
• The computer system of the computers of the third generation was easier for commercial use.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 43
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Fourth Generation
• The period 1972 to 2010 is roughly considered as the fourth generation of computers.
• The fourth-generation computers were developed by using microprocessor technology.
• By coming to fourth generation, computer became very small in size, it became portable.
• The machine of fourth generation started generating very low amount of heat.
• It is much faster and accuracy became more reliable.
• The production cost reduced to very low in comparison to the previous generation.
• It became available for the common people as well.
Fifth Generation
• The period 2010 to till date and beyond, roughly considered as the period of fifth generation of
computers.
• By the time, the computer generation was being categorized on the basis of hardware only,
but the fifth-generation technology also included software.
• The computers of the fifth generation had high capability and large memory capacity.
• Working with computers of this generation was fast and multiple tasks could be performed
simultaneously.
• Some of the popular advanced technologies of the fifth generation include Artificial
intelligence, Quantum computation, Nanotechnology, Parallel processing, etc.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 44
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
3.2 Components of computers
a) Hardware (different types of hardware components)
Computer hardware includes the physical components of a computer. Personal computers (PCs) are electronic
devices that use microchips to process information and may include desktop computers, laptops or tablets.
Computer Hardware’s are classified into 3 main groups
a) Internal Hardware’s
b) Input Hardware’s
c) Output Hardware’s
Internal Hardware include the following:
• Motherboard. This is a printed circuit board that holds the central processing unit (CPU) and other
essential internal hardware and functions as the central hub that all other hardware components run
through.
• CPU. The CPU is the brain of the computer that processes and executes digital instructions from
various programs; its clock speed determines the computer's performance and efficiency in processing
data.
• RAM. RAM: It is temporary memory storage that makes information immediately accessible to
programs; RAM is volatile memory, so stored data is cleared when the computer powers off.
• Hard drive or Solid-state drive (SSD): Hard disk drives are physical storage devices that store both
permanent and temporary data in different formats, including programs, device files, photos, etc.
• Optical drive. Optical drives typically reside in an on-device drive bay; they enable the computer to
read and interact with nonmagnetic external media, such as compact disc read-only memory or DVD.
• Heat-sink. This is a passive piece of hardware that draws heat away from components to
regulate/reduce their temperature to help ensure they continue to function properly.
• Graphics processing unit. This chip-based device processes graphical data and often functions as an
extension to the main CPU.
• Network interface card (NIC). A NIC is a circuit board or chip that enables the computer to connect to
a network; also known as a network adapter or local area network adapter, it typically supports
connection to an Ethernet network
Input Hardware components include the following:
• Mouse. A mouse is a hand-held pointing device that moves a cursor around a computer screen and
enables interaction with objects on the screen. It may be wired or wireless.
• Keyboard. A keyboard is an input device featuring a standard QWERTY keyset that enables users to
input text, numbers or special characters.
• Microphone. A microphone is a device that translates sound waves into electrical signals and supports
computer-based audio communications.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 45
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
• Camera. A camera captures visual images and streams them to the computer or through a computer to
a network device.
• USB flash drive. A USB flash drive is an external, removable storage device that uses flash memory
and interfaces with a computer through a USB port.
• Memory card. A memory card is a type of portable external storage media, such as a CompactFlash
card, used to store media or data files.
Output hardware components include the following:
• Monitor. A monitor is an output device similar to a TV screen that displays information, documents or
images generated by the computing device.
• Printer. Printers render electronic data from a computer into printed material.
• Speaker. A speaker is an external audio output device that connects to a computer to generate a sound
output.
• Headphones, earphones, earbuds. Similar to speakers, these devices provide audio output that's audible
only to a single listener.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 46
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
c) Peripherals (working of keyboard and laser printer)
KEYBOARD: A keyboard is one of the main input devices for a computer. It looks similar to a typewriter. It
has various keys that when pressed display numbers, letters, and other symbols on the display unit. A keyboard
can perform other functions as well when certain combinations of keys are used.
• In the middle of each key is a tiny cylindrical bar. On the keyboard are circular holes that the keys fit
into. When you push a key, it goes down like a spring and touches the contact layers on the board. The
holes are built with small pieces of rubber that push the keys back up.
• The above figure shows the contact layers that the keyboards have. These layers are responsible for
detecting which key is pressed. The cables inside carry electrical signals from the keyboard to the USB
port on the computer.
• The contact layers consist of a set of 3 layers of plastic. These are the most crucial elements of the
working of the keyboard. The top and bottom layers have metal tracks that can conduct electricity. The
layer in between has holes in it and acts as an insulator. These are the holes upon which the keys are
fixed. When a key is pressed, the two layers come in contact and produce an electrical signal that is
carried to the port on the system.
LASER PRINTER: here are many moving parts and components inside a laser printer that work together to
produce your final document or image, each have an important part to play. The key parts of the printer
include, toner cartridges, image drum (also known as drum unit or
photo-conductor), transfer roller or belt, fuser unit, laser, and
mirrors.
1. The moment you press print on your computer, tablet or
mobile device, the information is sent to the printer
memory, where the data is stored temporarily.
2. The printer begins to warm up. This is the point where
you usually need to wait, and it’s because the corona wire
is heating up and getting ready to pass its positive static
charge to the drum.
3. As the drum (coated metal cylinder) begins to roll, it received a positive charge across its whole
surface. Some printers contain four drums, one for each colour – Cyan, Magenta, Yellow & Black.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 47
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
4. The laser activates, and beams against a series of mirrors to reflect across the surface of the drum(s)
imprinting the shape of your print using an opposite negative electrical charge.
5. The toner cartridge and hopper sat next to the drum(s) slowly releases positively charged carbon
toner particles on to the drum as it turns. The toner is attracted to any areas of negative charge
leaving positively charged areas of the drum untouched.
6. The transfer belt rolls the paper through the printer giving it a positive charge. As it passes the drum,
the negatively charged toner is attracted to the page in the shape of your print.
7. The toner is then melted to the paper by hot rollers called the fuser unit, and voila, your page is
printed.
common network topologies include bus, star, ring, mesh, and tree.
• Service Provider Networks: These types of Networks give permission to take Network Capacity and
Functionality on lease from the Provider. Service Provider Networks include Wireless Communications,
Data Carriers, etc.
• IP Address: An IP address is a unique numerical identifier that is assigned to every device on a network. IP
addresses are used to identify devices and enable communication between them.
• DNS: The Domain Name System (DNS) is a protocol that is used to translate human-readable domain names
traffic. Firewalls are used to protect networks from unauthorized access and other security threats.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 48
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
3.2.1 Categories / Types of Computers Networks:
There are mainly five Categories / types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
1. Personal Area Network (PAN)
PAN is the most basic type of computer network. This network is restrained to a single person, that is,
communication between the computer devices is cantered only on an individual’s workspace. PAN offers a
network range of 1 to 100 meters from person to device providing
communication. Its transmission speed is very high with very easy
maintenance and very low cost.
This uses Bluetooth, IrDA, and Zigbee as technology.
Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 50
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
3.3 Protocols of Computers Networks (Application layer)
A Protocol; is simply defined as a set of rules and regulations for data communication. Rules are basically
defined for each and every step and process at time of communication among two or more computers.
Networks are needed to follow these protocols to transmit the data successfully. All protocols might be
implemented using hardware, software, or combination of both of them. There are three aspects of protocols
given below:
• Syntax – It is used to explain data format that is needed to be sent or received.
• Semantics – It is used to explain exact meaning of each of sections of bits that are usually transferred.
• Timings – It is used to explain exact time at which data is generally transferred along with speed at
which it is transferred.
Protocol Hierarchies:
Generally, Computer networks are comprised of or contain a large number of pieces of hardware and
software. To just simplify network design, various networks are organized and arranged as a stack of layers
of hardware and software, one on top of another. The number, name, content, and function of each layer
might vary and can be different from one network to another. The main purpose of each of layers is just to
offer and provide services to higher layers that are present. Each and every layer has some particular task
or function. In programming, this concept is very common. The networks are organized and arranged as
different layers or levels simply to reduce and minimize complexity of design of network software.
Example: Below is diagram representing a five-layer network. The diagram shows communication between
Host 1 and Host 2. The data stream is passed through a number of layers from one host to other. Virtual
communication is represented using dotted lines between peer layers. Physical communication is
represented using solid arrows between adjacent layers. Through physical medium, actual communication
occurs. The layers at same level are commonly known as peers. The peer basically has a set of
communication protocols. An interface is present between each of layers that are used to explain services
provided by lower layer to higher layer.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 51
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Advantages of Protocols:
c) Real-time processing
d) On-line processing
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 52
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
c) Real-time Processing
This technique facilitates the user to have direct contact with the computer system. This technique eases data
processing. This technique is also known as the direct mode or the interactive mode technique and is developed
exclusively to perform one task. It is a sort of online processing, which always remains under execution.
d) On-line Processing
This technique facilitates the entry and execution of data directly; so, it does not store or accumulate first and
then process. The technique is developed in such a way that reduces the data entry errors, as it validates data
at various points and also ensures that only corrected data is entered. This technique is widely used for online
applications.
e) Time-sharing Processing
This is another form of online data processing that facilitates several users to share the resources of an online
computer system. This technique is adopted when results are needed swiftly. Moreover, as the name suggests,
this system is time based.
Following are some of the major advantages of time-sharing processing −
• Several users can be served simultaneously
• All the users have almost equal amount of processing time
• There is possibility of interaction with the running programs
f) Distributed Processing
This is a specialized data processing technique in which various computers (which are located remotely)
remain interconnected with a single host computer making a network of computer. All these computer systems
remain interconnected with a high-speed communication network. This facilitates in the communication
between computers. However, the central computer system maintains the master data base and monitors
accordingly.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 54
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
(vi) Denial Of Service Attacks: A Denial-of-Service attack is one in which an attacker tries to prohibit
legitimate users from obtaining information or services. An attacker tries to make a system or network
resource unavailable to its intended users in this attack. The web servers of large organizations such as
banking, commerce, trading organizations, etc. are the victims.
(vii) Phishing: Phishing is a type of attack that is frequently used to obtain sensitive information from users,
such as login credentials and credit card details. They deceive users into giving critical information, such as
bank and credit card information, or access to personal accounts, by sending spam, malicious Web sites,
email messages, and instant chats.
(viii) Key-Loggers: Keyloggers can monitor a user’s computer activity in real-time. Keylogger is a program
that runs in the background and records every keystroke made by a user, then sends the data to a hacker
with the intent of stealing passwords and financial information.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 55
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Previous Year Question Papers
April / May 2021
6. (a) Classify computers based on purpose and size.
(b) Distinguish between system software & application software.
(c) Describe the working of Keyboard.
SECTION-IV
7. (a) Explain Computer network categories.
(b) Describe online data processing method.
(c) Explain the functional units of computer with diagram.
April / May 2022
SECTION- II
5. (a) ************************************************
(b) Classify computers according to purpose.
(c) List different types of system software’s.
6. (a) ************************************************
(b) Explain application layer protocols.
(c) List different types of computer hardware components.
SECTION-IV
7. (a) In distribution data processing, how data is arranged & processed?
(b) Explain functional units of computer with neat block diagram.
(c) Classify the following memory as Primary/Secondary:
(i) ROM (ii) SRAM (iii) DRAM (iv) HDD (v) CD-R (vi) DVD
8. (a) Explain any 2 cyber securities threats.
June / July 2023
SECTION-III
5. (a) ***********************************************
(b) **********************************************
6. (a) Classify computer based on purposes. List any 4 applications of computer.
(b) Explain the working of laser printer with diagram.
SECTION-IV
7. (a) Define Computer Network. Explain categories of network.
(b) Explain the functional units of computer with a neat diagram.
8. (a) Write a note on:
(i) Primary Memory
(ii) Cache Memory
(b) Define Operating System. Explain any two types of Operating System.
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 56
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
October / November 2021
SECTION-III
6. (a) Discuss the characteristics of computers.
(b) List various applications of computers.
(c) List and explain different categories of computer networks.
SECTION-IV
7. (a) Explain the following:
(i) Single user programming
(i) Multi programming
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 57