0% found this document useful (0 votes)
113 views66 pages

Edc - I.pg English

The document discusses the key elements of information systems including data, hardware, software, procedures, and people. It provides examples and descriptions of each element, and gives short notes on topics like ports and connectors, and the different types of software. Overall, the document provides an overview of the basic components and concepts that make up information systems.

Uploaded by

Raja A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views66 pages

Edc - I.pg English

The document discusses the key elements of information systems including data, hardware, software, procedures, and people. It provides examples and descriptions of each element, and gives short notes on topics like ports and connectors, and the different types of software. Overall, the document provides an overview of the basic components and concepts that make up information systems.

Uploaded by

Raja A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

create, and distribute useful data, typically in organizational

settings.
Subject Name: EDC - FUNDAMENTALS OF COMPUTERS AND
COMMUNICATION
Hardware
(SUBJECT CODE: 19PCSED2)
Unit: I Hardware is the part of a computer-based information system we
can touch – the physical components of the technology.
Section A (5 Marks)
All peripherals, including servers, routers, monitors, printers and
1. What are elements of information systems?(N’16) storage devices.
Data
Information Software
Hardware
Software Software is a set of instructions that tells the hardware what to do.
Procedure
people It gathers, organizes and manipulates data and carries out
instructions. Everything we do using a computer is done by the
Data software.

data as a collection of facts

The statistical data, sets of instructions, lists of names or even


graphics and animations.

Information

Information systems are combinations of hardware, software, and


telecommunications networks that people build and use to collect,
Examples of OS

Microsoft Windows on a personal computer

Google’s Android on a mobile phone. 2. Write short notes on ports and connectors?(N’16)

Examples of application software A port is a physical docking point using which an external device
can be connected to the computer. It can also be programmatic
Microsoft Excel and Angry Birds docking point through which information flows from a program to
the computer or over the Internet.
Procedures
Characteristics of Ports
Procedures are the rules, descriptions and instructions for how
things are done. In computer-based information systems, A port has the following characteristics −
procedures are frequently covered in instruction or user manuals
that describe how to use the hardware, software and data. • External devices are connected to a computer using cables
and ports.
People • Ports are slots on the motherboard into which a cable of
external device is plugged in.
People are the most important part of a computer-based information • Examples of external devices attached via ports are the
system. It is people who design and operate the software, input the mouse, keyboard, monitor, microphone, speakers, etc.
data, build the hardware and keep it running.
Serial Port
Communication
• Used for external modems and older computer mouse
The components that allow one computer to communicate with • Two versions: 9 pin, 25 pin model
another are hardware and are controlled by software. If • Data travels at 115 kilobits per second
communication between people is included in this element, though,
it is an important element.

Parallel Port
• Used for scanners and printers • Three-pronged plug.
• Also called printer port • Connects to the computer's power cable that plugs into a
• 25 pin model power bar or wall socket.
• IEEE 1284-compliant Centronics port
Firewire Port
PS/2 Port
• Transfers large amount of data at very fast speed.
• Used for old computer keyboard and mouse • Connects camcorders and video equipment to the computer.
• Also called mouse port • Data travels at 400 to 800 megabits per seconds.
• Most of the old computers provide two PS/2 port, each for • Invented by Apple.
the mouse and keyboard • It has three variants: 4-Pin FireWire 400 connector, 6-Pin
• IEEE 1284-compliant Centronics port FireWire 400 connector, and 9-Pin FireWire 800 connector.

Universal Serial Bus (or USB) Port Modem Port

• It can connect all kinds of external USB devices such as • Connects a PC's modem to the telephone network.
external hard disk, printer, scanner, mouse, keyboard, etc.
• It was introduced in 1997. Ethernet Port
• Most of the computers provide two USB ports as minimum.
• Data travels at 12 megabits per seconds. • Connects to a network and high speed Internet.
• USB compliant devices can get power from a USB port. • Connects the network cable to a computer.
• This port resides on an Ethernet Card.
VGA Port • Data travels at 10 megabits to 1000 megabits per seconds
depending upon the network bandwidth.
• Connects monitor to a computer's video card.
• It has 15 holes. Game Port
• Similar to the serial port connector. However, serial port
connector has pins, VGA port has holes. • Connect a joystick to a PC
• Now replaced by USB
Power Connector
Digital Video Interface, DVI port
• Connects Flat panel LCD monitor to the computer's high-end • Parallel port, which uses a DB25 connector, mainly for
video graphic cards. connecting old printers;
• Very popular among video card manufacturers. • USB ports (1.1, low-speed, or 2.0, high-speed), for connecting
more recent peripherals;
Sockets • RJ45 connector (called the LAN port or Ethernet port), for
connecting the computer to a network. It interfaces with a
• Sockets connect the microphone and speakers to the sound network card built into the motheboard;
card of the computer. • VGA connector (called SUB-D15), used for hooking up a
monitor. This connector interfaces with the built-in graphics
connectors, normally called "input-output connectors" (or I/O for card;
short), are interfaces for linking devices by using cables. They • Jacks (Line-In, Line-Out and microphone), for connecting
generally have a male end with pins protruding from it. This plug is speakers or a hi-fi sound system, as well as a microphone.
meant to be inserted into a female part (also called a socket), which This connector interfaces with the built-in sound card.
includes holes for accommodating the pins

Input/output connectors
3. Write short notes on software in computer? (A’15)
The computer's motherboard has a certain number of input-ouput
connectors located on the "rear panel."
Software is a set of programs, which is designed to perform a well-
defined function. A program is a sequence of instructions written to
solve a particular problem.

There are two types of software −

• System Software
Most motherboards have the following connectors: • Application Software

• Serial port, which uses a DB9 connector, for connecting older System Software
devices;
The system software is a collection of programs designed to operate, Application software may consist of a single program, such as
control, and extend the processing capabilities of the computer itself. Microsoft's notepad for writing and editing a simple text. It may also
System software is generally prepared by the computer consist of a collection of programs, often called a software package,
manufacturers. These software products comprise of programs which work together to accomplish a task, such as a spreadsheet
written in low-level languages, which interact with the hardware at package.
a very basic level. System software serves as the interface between
the hardware and the end users. Examples of Application software are the following −

Some examples of system software are Operating System, • Payroll Software


Compilers, Interpreter, Assemblers, etc. • Student Record Software
• Inventory Management Software
Here is a list of some of the most prominent features of a system • Income Tax Software
software − • Railways Reservation Software
• Microsoft Office Suite Software
• Close to the system • Microsoft Word
• Fast in speed • Microsoft Excel
• Difficult to design • Microsoft PowerPoint
• Difficult to understand
• Less interactive Features of application software are as follows −
• Smaller in size
• Difficult to manipulate • Close to the user
• Generally written in low-level language • Easy to design
• More interactive
Application Software • Slow in speed
• Generally written in high-level language
Application software products are designed to satisfy a particular • Easy to understand
need of a particular environment. All software applications • Easy to manipulate and use
prepared in the computer lab can come under the category of • Bigger in size and requires large storage space
Application software.
computer. The input devices translate the information into a form
understandable by the computer.
4. Describe about the components of computer system.(A’15)
Output Unit
Hardware represents the physical and tangible components of a
computer, i.e. the components that can be seen and touched. The output unit consists of devices with the help of which we get the
information from the computer. This unit is a link between the
Examples of Hardware are the following − computer and the users. Output devices translate the computer's
output into a form understandable by the users
• Input devices − keyboard, mouse, etc.
• Output devices − printer, monitor, etc. CPU (Central Processing Unit)
• Secondary storage devices − Hard disk, CD, DVD, etc.
• Internal components − CPU, motherboard, RAM, etc. CPU is considered as the brain of the computer. CPU performs all
types of data processing operations. It stores data, intermediate
results, and instructions (program). It controls the operation of all
parts of the computer.

CPU itself has the following three components −

• ALU (Arithmetic Logic Unit)


• Memory Unit
• Control Unit

Central Processing Unit (CPU) consists of the following features −

Input Unit • CPU is considered as the brain of the computer.


• CPU performs all types of data processing operations.
This unit contains devices with the help of which we enter data into • It stores data, intermediate results, and instructions
the computer. This unit creates a link between the user and the (program).
• It controls the operation of all parts of the computer.
This unit can store instructions, data, and intermediate results. This
unit supplies information to other units of the computer when
needed. It is also known as internal storage unit or the main
memory or the primary storage or Random Access Memory (RAM).

Its size affects speed, power, and capability. Primary memory and
secondary memory are two types of memories in the computer.
Functions of the memory unit are −

• It stores all the data and the instructions required for


CPU itself has following three components.
processing.
• Memory or Storage Unit • It stores intermediate results of processing.
• Control Unit • It stores the final results of processing before these results are
• ALU(Arithmetic Logic Unit) released to an output device.
• All inputs and outputs are transmitted through the main
memory.

Control Unit

This unit controls the operations of all parts of the computer but
does not carry out any actual data processing operations.

Functions of this unit are −

• It is responsible for controlling the transfer of data and


instructions among other units of a computer.
• It manages and coordinates all the units of the computer.
• It obtains the instructions from the memory, interprets them,
and directs the operation of the computer.
Memory or Storage Unit
• It communicates with Input/Output devices for transfer of Computer is not only the combination of CPU, Monitor, Mouse and
data or results from storage. Keyboard. The Machines in Medical and Health departments and
• It does not process or store data. hospitals like X-Ray, Pathology Machine, Electrocardiograph
Machine, Transport Monitors, Blood Gas Machine and Transport
ALU (Arithmetic Logic Unit) Ventilators etc. these all and thousands of other machines are
computerized.
This unit consists of two subsections namely,
2. Government Departments
• Arithmetic Section
• Logic Section In the list of advantages on second position goes to the point, uses of
computers in government departments. Government of every
Arithmetic Section country use the computerized system in every department to keep the
records of people for long time. This is the biggest advantages of
Function of arithmetic section is to perform arithmetic operations computer system for the world. Because we can easily find the person
like addition, subtraction, multiplication, and division. All complex in county with the help of notional identification card issue by the
operations are done by making repetitive use of the above government. And the second thing that is very difficult to keep the
operations. record of whole country in books and registers.

Logic Section 3. Education

Function of logic section is to perform logic operations such as Computers have a lot of advantages and disadvantages but we can
comparing, selecting, matching, and merging of data. get full benefits for computer in education department. There are very
high number of uses of computers in all the education sections. We
can use it in schools for students fee cards, pictures, papers, result
5. Explain advantages and disadvantages of using cards etc. also use for merit lists, we can also get connect to the every
Computer. university and college in the world and can get online admission with
the help of internet connection. Students solve their question, create
Uses, Benefits, Reward and Advantages of Computer designs, create software and thousands are other advantages of
computer in education and technology.
1. Medical Departments
4. Jobs Opportunities You can use and get advantages from computer buy saving your
thousands of old and new images. Your old memories, your project
Another important points in list for the jobless people. Because jobless images, videos and working files. Because todays computer have the
people can find easily job on internet with the help of computer. As ability to save the data in Terabytes.
compare to buy the newspaper from market and search job on every
page in all newspapers. You can easily point out job according to your 9. Presentation
education and experience.
Presentations are play big role in every field to know more about the
5. Computer Sports things. And to know something quick and easy with the help of
presentation. Power Point software are uses for creating the
Well this essay is not all about computer general advantages. People presentations. These presentations are may be for events, products
who like sports they can find easily score on the monitor screen or and projects etc.
laptop screen with the help of internet.
10. Business Departments
6. Games
The last points of advantages and disadvantages of computer essay
You are free, no work and nothing to you are getting bore. Let’s on in points are about the uses of computers in business departments.
you (PC) and enjoy the fun of video games. Multiple video games like Every organization in the world, either it is small or big must need at
football, cricket, racing, arcade, fight and mission games are more least one or two computer for documentation, keeping records of
interesting and entertaining. workers, online communication etc.

7. Entertainments Drawbacks, Demerits and Disadvantages of Computer

Today’s the multimedia and entertainment age. Everybody like to 1. Environments Pollution
hear latest new music, want to watch the latest released movies of
Hollywood and Bollywood. Not only this, there are many more Computers are not only the CPU, Monitors, Mouse and Keyboards.
entertainment ways that can people avail with the help of PC system. Heavy automatic machines, Laptops, Mobiles, Tablets and many
other machines and equipment that works on command are called
8. High Storage Space Computer. There for the manufacturing of these machines and
components are causes of Environments Pollution like, Air Pollution,
Water Pollution and Soil Pollution. There are also many Advantages Designer, for architect need person who can work in AutoCAD, for
and Disadvantages of Pollution. computerized accounting need person who can work in Peachtree or
QuickBooks Software.
2. Data Security
6. Time Wastages
The second drawback and demerit of PC is data is not secure in the
hard drive. In the office someone can stole your files in minimum time Another demerits of PC is the wastage of time. People in offices use it
in your absence. Because the CPU’s are very fast now todays and for extra or personal works. Because of that other peoples are in
transferring the data to USB takes no time. problems.

3. Reduce Job Opportunities 7. Money Waste

At the one hand computer produce job opportunities, but on anther As we discuss above that misuse of computer is waste of time, as like
hand it also reduce the job opportunities. Because a lot machines that it is also waste of money. People buy it for playing games,
today’s works automatically, work done before by five or ten peoples watching movies and music are waste of money.
now that work machine do alone with one command.
8. Short Circuit
4. Viruses
In case of any problem in power cable, less or more power of
Virus word is good in sound but it kill your Computer and can electricity or heavy load on computer may cause of short circuit or
damage your files and data available in your Hard Disk. Virus is the blast. In that cases you may lose you data and files and other may be
enemy of PC, once it enter into system, the quantity of virus increase you have to lose your whole system.
automatically daily and at the end you will loss you all important
information and data. 9. Far from Family

5. Need Skilled Person The biggest disadvantages of computer system is more use of it for
entreating and playing video games or other misuse keep the people
No five points in “Disadvantages of Computer” is skilled person is far from their families. Father cannot understand the children better,
needed for every special task. And skilled person in specific software husband cannot understand wife and many other relations are go far.
will charge high salary. For example for designing need Graphic
10. Automatic Operation
On the basis of working Principle : The computer can be classified
This is the last point of “advantages and disadvantages of computer into:
technology in our life”. This is the most serious and dangerous points • Analog computer
because some automatic operations and functions of computerized • Digital computer
software and commands sometime stop work due to some reasons • Hybrid computer
may cause of death. For example in lift, if electricity get off or load
shedding may stop lift. Many other machines that have no sense of
thinking they works only commands. On the basis of size : The computer can be classified into:
• Super Computer
• Mainframe Computer
Section B (10 Marks) • Mini Computer
• Micro Computer
6.Explain in detail about categories of computer.(A’15,N’16) • Workstations

Types of Computer On the basis of purpose of use : The computer can be classified
into:
Computers vary widely in terms of their size and purpose they • Special purpose computer
serve. There are very small computers that can be held on a palm. • General purpose computer
There are also large computers that take a whole room to occupy.
They are used by big organisations, public and private. Types of Computer- On the basic of working Principal
Organisations use computers for a variety of applications ranging
from scientific to commercial in nature. The most widely used On the basis of working Principle the computer can be classified
computers are called personal computers that typically fit on a into:
desktop. 1. Analog computer
2. Digital computer
Computers can be classified on several bases as follows: 3. Hybrid computer
1. On the basis of working Principle
2. On the basis of size » Analog computer
3. On the basis of purpose of use Analog computer operates on inputs of continuously varying
electrical voltage. It measures the input rather than counting. The computations are far more accurate. They come in various sizes
name that is derived from the Greek word 'analog' denotes that the starting from pocket size to the large systems occupying big rooms.
computer functions by establishing similarities between two Most of the computers available today are digital.
quantities that are usually expressed as voltages or currents. Analog
computers are powerful tools to solve differential equations. They
are mainly used in scientific design and production environments.
Each one has to be constructed to do a specific job and will respond
very quickly to changes in the measured inputs.

Digital Computer

» Hybrid Computer
Hybrid computer combines features of both analog and digital
computers. In this computer, some calculations are done in the
analog portion of the computer and some are done in the digital
portion of it. In a hospital, for example, analog devices may measure
Multimeter (Analog computer) patient's heart function, temperature and other vital signs. These
measurements may then be converted into numbers and supplied to
» Digital Computer a digital component in the system. This component is used to
A digital computer operates essentially by counting. All quantities monitor the patient's vital signs and to send an immediate signal to
are expressed as discrete digits or numbers and computations are the nurse's station if any abnormal readings are detected.
done with numerical digits. Mathematical expressions are
represented as binary digits (0 and 1) and all operations are done
using these binary digits at a very high rate. The digital computer
basically knows addition. Remaining operations, like multiplication
and division, are first converted -into addition and then calculated.
Digital computer is much faster than analog computer and the
users can carry it wherever they go. This group includes personal
digital assistant, pen-based computer, hand-held computer,
notebook computer and laptop computer.
(a) Personal Computer or Desktop Computer
Personal computer is a microprocessor based, single user computer.
The peripherals for personal computer include a keyboard and a
mouse as input devices, monitor to display information and a hard
disk for storage.

Types of Computer- On the basic of size

On the basis of size the computer can be classified into:


1. Micro Computer
2. Mini Computer
3. Mainframe Computer
4. Super computer
5. Workstations

» Micro Computer » Mini Computer


Microcomputer is at the lowest end of the computer range in terms Minicomputer is a medium sized computer that is costlier and more
of speed and storage capacity. Its CPU is a microprocessor. The first powerful than a microcomputer. It is in fact a scaled down version
microcomputers were built of 8-bit microprocessor chips. The most of mainframe computer. This can support up to a few hundred users
common application of personal computers (PC) is in this category. at a time with multi-terminal, time-sharing system. They are mainly
The PC supports a number of input and output devices. used as departmental computers in large and medium-sized
Microcomputers include (a) portable computers and (b) desktop organisations. They are also used in government departments,
computers. universities and R and D establishments.
(a) Portable Computer
Portable computer is a very small, easy to use microcomputer. The
large storage capacities and computing speeds that are at least ten
times faster than that of other computers. It can perform hundreds
of millions of instructions per second. The super computer is used
for specialised applications such as large-scale numerical problems
in scientific and engineering disciplines. These include applications
in electronics, petroleum engineering, weather forecasting, medicine
and nuclear energy research.

» Mainframe Computer
The earliest computers were callpd mainframes due to their size.
The term is still used for the large computers of today. They have
large storage capacities, very high speed of processing (compared to
» Workstations
micros and minis) and can support a large number of terminals
Workstation is a powerful computer which in terms of power is
(Many hundreds to thousands) for use by a variety of users
between personal computer and minicomputer. It has high
simultaneously. They are kept in air-conditioned environment in a
resolution graphics monitor, large RAM and secondary storage.
special computer room. They are used by big companies, banks,
Although it is a standalone system, usually it forms part of a
government departments, etc. as their main computer.
network and it uses Unix or Windows NT as operating system.
Workstations are used for specialised applications such as desktop
publishing, software development and engineering designs.

» Super computer
It is the fastest and the most expensive computer. This has extremely
Types of Computer- On the basic of purpose of use machine can be used to prepare paybills, manage inventories, print
sales reports, do scientific calculations and so on.
On the basis of purpose of use the computer can be classified into:
1. Special Purpose Computer
2. General Purpose Computer

» Special Purpose Computer


Special purpose computer is tailor-made solely to cater to the
requirements of a particular task or application, for example,
weather forecasting. It incorporates the instructions needed into the
design of internal storage so that it can perform the given task on a
simple command. It, therefore, does not possess unnecessary
options, and costs less.

7.Describe the data representation in computer system.(A’15)

• Computers are classified according to functionality, physical


size and purpose.
• Functionality, Computers could be analog, digital or hybrid.
Digital computers process data that is in discrete form
whereas analog computers process data that is continuous in
nature. Hybrid computers on the other hand can process data
that is both discrete and continuous.
» General Purpose Computer
• In digital computers, the user input is first converted and
The general-purpose computer is designed to meet the needs of
transmitted as electrical pulses that can be represented by
many different applications. The instructions needed to perform a
two unique states ON and OFF. The ON state may be
particular task are not wired permanently into the internal memory.
represented by a “1” and the off state by a “0”.The sequence
When one job is over, instructions for another job can be loaded into
the internal memory for processing. Thus, a general-purpose
of ON’S and OFF’S forms the electrical signals that the the incoming analog signal is converted back to digital form
computer can understand. in a process known as demodulation.
• A digital signal rises suddenly to a peak voltage of +1 for
some time then suddenly drops -1 level on the other hand an
analog signal rises to +1 and then drops to -1 in a continuous
version. 2. Concepts of data representation in digital computers

• Although the two graphs look different in their appearance, • Data and instructions cannot be entered and processed
notice that they repeat themselves at equal time intervals. directly into computers using human language. Any type of
Electrical signals or waveforms of this nature are said to be data be it numbers, letters, special symbols, sound or pictures
periodic.Generally,a periodic wave representing a signal can must first be converted into machine-readable form i.e. binary
be described using the following parameters form. Due to this reason, it is important to understand how a
• Amplitude(A) computer together with its peripheral devices handles data in
• Frequency(f) its electronic circuits, on magnetic media and in optical
• periodic time(T) devices.

• Amplitude (A): this is the maximum displacement that the Data representation in digital circuits
waveform of an electric signal can attain.
• Frequency (f): is the number of cycles made by a signal in one • Electronic components, such as microprocessor, are made up
second. It is measured in hertz.1hert is equivalent to 1 of millions of electronic circuits. The availability of high
cycle/second. voltage(on) in these circuits is interpreted as ‘1’ while a low
• Periodic time (T): the time taken by a signal to complete one voltage (off) is interpreted as ‘0’.This concept can be
cycle is called periodic time. Periodic time is given by the compared to switching on and off an electric circuit. When
formula T=1/f, where f is the frequency of the wave. the switch is closed the high voltage in the circuit causes the
bulb to light (‘1’ state).on the other hand when the switch is
• When a digital signal is to be sent over analog telephone lines open, the bulb goes off (‘0’ state). This forms a basis for
e.g. e-mail, it has to be converted to analog signal. This is describing data representation in digital computers using the
done by connecting a device called a modem to the digital binary number system.
computer. This process of converting a digital signal to an
analog signal is known as modulation. On the receiving end, Data representation on magnetic media
• The laser beam reflected from the land is interpreted, as 1.The the use of binary are that digital devices are more reliable,
laser entering the pot is not reflected. This is interpreted as small and use less energy as compared to analog devices.
0.The reflected pattern of light from the rotating disk falls on
a receiving photoelectric detector that transforms the patterns Bits, bytes, nibble and word
into digital form.The presence of a magnetic field in one
direction on magnetic media is interpreted as 1; while the • The terms bits, bytes, nibble and word are used widely in
field in the opposite direction is interpreted as “0”.Magnetic reference to computer memory and data size.
technology is mostly used on storage devices that are coated • Bits: can be defined as either a binary, which can be 0, or 1.It
with special magnetic materials such as iron oxide. Data is is the basic unit of data or information in digital computers.
written on the media by arranging the magnetic dipoles of
some iron oxide particles to face in the same direction and • Byte: a group of bits (8 bits) used to represent a character. A
some others in the opposite direction byte is considered as the basic unit of measuring memory size
in computer.
Data representation on optical media • A nibble: is half a byte, which is usually a grouping of 4
bytes.
In optical devices, the presence of light is interpreted as ‘1’ while its
absence is interpreted as ‘0’.Optical devices use this technology to • Word: two or more bits make a word. The term word length
read or store data. Take example of a CD-ROM, if the shiny surface is used as the measure of the number of bits in each word. For
is placed under a powerful microscope, the surface is observed to example, a word can have a length of 16 bits, 32 bits, 64 bits
have very tiny holes called pits. The areas that do not have pits are etc.
called land.
Types of data representation
Reason for use of binary system in computers
• Computers not only process numbers, letters and special
• It has proved difficult to develop devices that can understand symbols but also complex types of data such as sound and
natural language directly due to the complexity of natural pictures. However, these complex types of data take a lot of
languages. However, it is easier to construct electric circuits memory and processor time when coded in binary form.
based on the binary or ON and OFF logic. All forms of data • This limitation necessitates the need to develop better ways of
can be represented in binary system format. Other reasons for handling long streams of binary digits.
• Higher number systems are used in computing to reduce must always be put so as to differentiate the number
these streams of binary digits into manageable form. This systems.
helps to improve the processing speed and optimize memory o The magnitude of a number can be considered using
usage. these parameters.
o Absolute value
Number systems and their representation o Place value or positional value
o Base value
o A number system is a set of symbols used to represent ▪ The absolute value is the magnitude of a digit
values derived from a common base or radix. in a number. for example the digit 5 in 7458 has
o As far as computers are concerned, number systems an absolute value of 5 according to its value in
can be classified into two major categories: the number line.
o decimal number system ▪ The place value of a digit in a number refers to
o binary number system the position of the digit in that number i.e.
o octal number system whether; tens, hundreds, thousands etc.
o hexadecimal number system ▪ The total value of a number is the sum of the
place value of each digit making the number.
Decimal number system ▪ The base value of a number also k known as
the radix, depends on the type of the number
o The term decimal is derived from a Latin prefix deci, systems that is being used .The value of any
which means ten. Decimal number system has ten number depends on the radix. for example the
digits ranging from 0-9. Because this system has ten number 10010 is not equivalent to 1002.
digits; it is also called a base ten number system or
denary number system. Binary number system
o A decimal number should always be written with a
It uses two digits namely, 1 and 0 to represent numbers. unlike in
subscript 10 e.g. X10
o But since this is the most widely used number system decimal numbers where the place value goes up in factors of ten, in
in the world, the subscript is usually understood and binary system, the place values increase by the factor of 2.binary
ignored in written work. However ,when many numbers are written as X2.consider a binary number such as
number systems are considered together, the subscript 10112.The right most digit has a place value of 1×20 while the left
most has a place value of 1×23.
Octal number system also be used. While most computer cases are rather dull, black,
metal boxes, some manufacturers try to give the unit some flair with
Consists of eight digits ranging from 0-7.the place value of octal color and special design elements.
numbers goes up in factors of eight from right to left.
System unit (chassis) is a set of electronic components of a
Hexadecimal number system
computer that provides the proper its operating. There are six main
This is a base 16 number system that consists of sixteen digits
system unit components:
ranging from 0-9 and letters A-F where A is equivalent to 10,B to 11
up to F which is equivalent to 15 in base ten system. The place value
1. Motherboard – a system core. Actually, it is a heart of
of hexadecimal numbers goes up in factors of sixteen.
computer. Other system elements are connected to
motherboard, and the whole system is managed and
• A hexadecimal number can be denoted using 16 as a
controlled by it. Motherboard contains special chips on
subscript or capital letter H to the right of the number .For
which some ICs (Integrated circ uits) are etched
example, 94B can be written as 94B16 or 94BH.

8. Briefly explain the components of system unit.(N’16)

A computer system unit is the enclosure that contains the main


components of a computer. It is also referred to as a computer case
or tower. Read on to learn about the functions and components that
go into a computer system unit.

Definition
.
A typical desktop computer consists of a computer system unit, a
2. Processor – a computer engine, its brain. CPU (central
keyboard, a mouse, and a monitor. The computer system unit is the
processing unit) manages most of computer operations.
enclosure for all the other main interior components of a computer.
Processors can be with pins or pin-less. It contains a control
It is also called the computer case, computer chassis, or computer
unit and a logic unit.
tower. Cases are typically made of steel or aluminum, but plastic can
3. RAM (random access memory) – primarily memory. It Functions
storages all data processed by programs and apps on the
computer. There are dynamic and static RAMs. The primary function of the computer system unit is to hold all the
4. Hard Drive – a system memory that storages data in a form other components together and protect the sensitive electronic parts
of archives. Here all our files, folders, operating system, from the outside elements. A typical computer case is also large
programs, and applications are saved. Hard driver can be of enough to allow for upgrades, such as adding a second hard drive
two type: PATA (Parallel Attachment Packet Interface) and or a higher-quality video card. It is relatively easy to open up a
SATA (Serial Attachment Packet Interface). computer system unit to replace parts and install upgrades. In
5. Video Card (graphics adapter) – with its help the outputs contrast, it is quite difficult to open up a laptop computer, which is
from a computer are displayed on the screen. Modern video not designed with replacements and upgrades in mind.
cards support HDMI (high-definition multimedia interface),
VGA (video graphics array) and DVI (digital visual In most computer system units, the front side contains the elements
interface). a user needs frequently
6. Power Supply – provides every part of PC with electrical
power such as the power button, an optical disk drive, an audio outlet for a
pair of headphones, and a number of USB connections. The back
There were 6 Basic Components of a System unit namely: side contains all other connections - for power, monitor, keyboard,
mouse, Internet connection, and any other peripheral devices. There
1. Motherboard - The core of the Computer everything is are typically more connections than the minimum necessary to
connected to it. allow for expansion.
2. Processor - CPU ( Central Processing Unit ) the brain of the
PC.
3. RAM/ Memory stick - (Random Access Memory) holds all
program and data the processor is using at a given time.
4. Hard Drive - The main storage device of computer.
5. Video Card - Controls computer display via monitor.
6. Power Supply - Responsible of feeding electrical power to
every computer parts
Major components inside a computer case

Front (left) and back (right) of a computer system unit

Inside the Computer Case

Once you open up a computer case, it can initially be difficult to


recognize the various components, especially all the different wires.
However, if you look closely, you will probably start to recognize a
number of components.
Paavendhar College of Arts & Science, M.V.South contained within the rectangular area defined by the start position
Department of Computer Science (top left corner) and the finish position (bottom right corner).
I M.Sc-Physics
The default method for selecting text is as follows. Place the
Subject Name: EDC Unit: II cursor at the start of the text to be copied, hold down the Left mouse
button (with Shift if a rectangular area is to be selected) then drag
Section A (5 Marks) the cursor across to the end of the required text. Releasing the
mouse button will cause the selected text to be saved in the global
1. Explain the functions of mouse?(N’16) cut buffer.

Introduction Another method of selecting text is to quickly click the Left


mouse button twice to select the word at the current cursor position,
Each button can be used to action up to five functions when or three times to select the entire line. Clicking four times will revert
pressed in conjunction with modifier keys. The following table lists back to single character selection. To extend the selection, click the
the functions assigned to each button and key combination by Right mouse button.
default.
Text that has been saved in the global cut buffer may be pasted at
Note that usually Button 1 is the leftmost button, Button 2 is the current cursor position by clicking the Middle mouse button.
the middle button, and Button 3 is the rightmost button. References
to mouse buttons throughout this User's Guide will assume that 2. Graphic Copy & Paste
they are configured in this way.
teemX provides a graphic copy facility which enables you to copy
1. Selecting & Copying Text text and graphics and paste the information in any teemX window.
The area to be copied is selected by positioning the mouse cursor at
You can use the mouse buttons to copy and paste text. The the top left corner of the required area, holding down the keys
region of the display that will be selected for copying depends on Control + Shift and the Left mouse button, then dragging the
whether you use the Select Text or Rect Select Text function. The mouse cursor down to the bottom right corner of the required area.
Select Text function will select all text from the start position to the Releasing the keys will cause the currently selected area to be
finish position, working left to right across the entire width of the copied. To paste the data, position the mouse cursor where you wish
display, whereas the Rect Select Text function will only select text
the top left corner of the copied data to be positioned, then hold You can identify hotspots that are currently present in
down the keys Control + Shift and click the Middle mouse button. display memory by holding down the Control key and the Right
mouse button. All colour attributes will be temporarily removed
3. Moving The Cursor In Block Mode from the display and the hotspots will be highlighted with a red
background. Releasing the keys will return the display to its original
When teemX is in any of the local block modes, you can use the state.
mouse instead of the cursor keys to position the text cursor. Move
the mouse cursor to the required position then hold down the 5. Send Keyword
Control key and click the Left mouse button. The text cursor will
then jump to that position. The Send Keyword function enables you to click on any
delimited word displayed on the screen and it will be sent to the
4. Show & Action Hotspots host, as long as the word is not already defined as a hotspot.
Keyword delimiters are the same as for hotspots, that is: space,
teemX incorporates a user-definable hotspot facility NULL, / , : = ( ) [ and ].
which enables you to invoke a function by clicking the
mouse cursor over a keyword displayed on the screen. 6. Redefining The Mouse Buttons
For example, an application may display information
relating to keys you can press to perform a particular teemX enables you to redefine the functions assigned to the
function. Instead of pressing the key on the keyboard, mouse buttons via the Mouse Button Actions dialog box, which is
you could invoke the function by moving the mouse displayed from the Settings menu.
cursor over the displayed key name, holding down the
Control key and clicking the Middle mouse button.

Hotspots are supported in ALL terminal emulation modes.


teemX provides a set of default hotspot keywords for each mode.
These relate to key functions specific to the emulation. For example,
in VT400 mode you can click on the word Help displayed on the
screen and teemX will execute the function associated with the Help
key.
2. Discuss about headphone and earphones(N’16

The headset, the headphone, the earphone – devices quite


similar in form and function, but with key differences which are
worth knowing. Below, we'll take a quick look at what defines each
of these as distinct devices and give users a bit of a guide to help
them decide which they're looking for.

The Headset

This enables you to specify the function of mouse buttons 1, 2 A headset can be thought of as a set of headphones equipped with a
and 3 when they are pressed on their own or in conjunction with microphone. The headset microphone is either a boom microphone,
modifier keys. You can assign up to five functions to each button. whereby the microphone is attached to a boom which can be moved
Clicking one of the arrow buttons will display a drop-down list box at will and positioned as desired, or alternatively it may be a
which lists all the standard functions that can be assigned: solution incorporating an in-line microphone, whereby the
microphone is attached to the cord which connects the headset to
the computer or other device.

Headsets are ideal for voice over IP communications with services


such as Skype, interfacing with a phone system, playing online
games with voice communications, and much more. With a headset,
you are immersed within your communications device.

The Headphones

Headphones are, in a sense, the classical forebearer of everything


else on this list. In its simplest incarnation, a pair of headphones is
two simple speakers attached to a band which goes across the top of
the wearers head, allowing the speakers to be positioned over the since they do introduce a foreign body into the ear canal. For those
ears. This provides a personal, immersive listening experience who like or even prefer the ear phone experience, however, the
where the sound source delivers its brilliant sonic payload directly reduced bulk and ergonomic contours can be quite comfortable.
into the ears. The experience of listening to headphones is somewhat
unique in comparison to traditional speakers, which vibrate large
segments of air within a room to recreate sounds. 3. Write a short notes on (A’15)
i)Audio input devices
In contrast, headphones only move a relatively small amount of air This is a device used to input voice data and sound. You hold
around the listeners ear, creating a more confined and personalised the microphone up to a source, most likely a person's mouth, and it
sound stage. Headphones are also frequently robustly equipped registers the sounds and inputs them into audio recording
with noise cancelling features, acting as a sort of auditory insulation, applications. This will let you do many things, from recording a
keeping the noise produced by the headphones within the phones song to talking to someone on Skype.
muffs while keeping intrusive noises from the outside out.
ii)video input devices
The Earphones An input device is any device that sends data from an outside
source into a processing system such as a computer or television. A
Earphones, such as the BackBeat GO 2 are sort of the spiritual video input device is any device that sends video. There are several
successor the headphones. Dispensing with the large design of types of video input devices that allow you to play video from an
“cans” or padded ear muffs which nestle the headphones speakers external device on a video display.
in, the earphone is effectively an in-ear speaker. Inserted into the ear
canal, earphones provide an even more direct connection to the Media Players
sound source and move even less air than headphones, since they
pretty much only need to vibrate the small amount of air within the Media players are devices that play any sort of media. These include
listeners auditory canal. physical media players such as VCRs, DVD players and Blu-ray
Ear phones definitely cut down on the bulk of traditional players, as well as digital media players such as DVRs and
headphones, making them great for people on the go and often the streaming video players such as the Roku Netflix player and other
selection of athletes, runners and gym-goers rocking their MP3 Netflix-supported devices.
players while getting some exercise. However, the design of the
earphone inherently compromises its possibilities for noise Video Game Consoles
cancelling and can, for some, be a bit of an uncomfortable nuisance
Video game consoles play video game media. These include the PDA
PlayStation 3, Xbox 360 and Nintendo Wii. Some hand-held consoles
such as the PlayStation Portable can also function as a video input Short for Personal Digital Assistant, PDA is a computer that
device with an optional video output cable. Also, some video game fits in the palm of your hand to help collect such information as
consoles can play other video media such as videos from a media contacts, appointments, files, and programs. The picture is the Palm
server or streaming Netflix or Hulu. Tungsten | E2 and an example of a PDA. Because touchscreens were
not available at the time to use a PDA a stylus was used to input
Satellite/Cable Receivers data into the device. Also, with no Internet connection to backup or
transfer data between a computer and the device it had to be
Satellite and cable receivers are set-top boxes (STB) that allow you to connected to the computer, usually over the serial port.
receive a decrypted video signal from your satellite or cable service
provider. This allows you to receive broadcast TV and subscription The term PDA was first used by John Scully at CES on January 7,
channels as well as optional services such as video on-demand and 1992 while describing the Apple Newton. Today, with the
DVR recordings. popularity and advances in smartphones, PDA's are rarely found
and used as users migrate to smartphones like the iPhone.
Digital Cameras
Smartphone
Digital cameras can also function as video input devices. Most
digital cameras, including still cameras and video cameras, include A smartphone is a handheld personal computer with a
video output ports such as composite or HDMI ports; these ports mobile operating system and an integrated mobile broadband
allow you to connect the camera to a TV to view the photos and
cellular network connection for voice, SMS, and Internet data
videos form the camera. Digital cameras can also be connected to a
communication; most, if not all, smartphones also support Wi-Fi.
computer to transfer photos and videos.
Smartphones are typically pocket-sized, as opposed to tablet
computers, which are much larger. They are able to run a variety of
software components, known as “apps”. Most basic apps (e.g. event
4. Short note on input for PDA,smart phones and tablet calendar, camera, web browser) come pre-installed with the system,
pc’s.
while others are available for download from official sources like the
Google Play Store or Apple App Store. Apps can receive bug fixes
and gain additional functionality through software updates;
similarly, operating systems are able to update. Modern
smartphones have a touchscreen color display with a graphical user
5. Explain about pointing devices.
interface that covers the front surface and enables the user to use a
virtual keyboard to type and press onscreen icons to activate "app" A pointing device, or sometimes called a pointing tool, is a
features. Mobile payment is now a common theme amongst most hardware input device that allows the user to move the mouse
smartphones. cursor in a computer program or GUI operating system. Using a
pointing device allows you to point at or manipulate any object or
Tablet text on the screen. For example, using a pointing device you could
A tablet is a wireless, portable personal computer with point at and select an icon from a list of icons.
a touchscreen interface. The tablet form factor is typically smaller
Mouse
than a notebook computer, but larger than a smartphone.
mouse is a small handheld device pushed over a horizontal
• Convertible tablets. These typically have a display that surface.
rotates 180 degrees and can be folded to close, screen up, over A mouse moves the graphical pointer by being slid across a smooth
an integrated hardware keyboard. Convertible models may surface. The conventional roller-ball mouse uses a ball to create this
allow user input through a variety of methods in addition to action: the ball is in contact with two small shafts that are set at right
the hardware keyboard, including natural handwriting with angles to each other.
a stylus or digital pen and typing through a screen-
based software keyboard.
• Hybrid tablets. Sometimes referred to as convertible or Trackball
hybrid notebooks, a hybrid is like a regular notebook, but has A trackball is a pointing device consisting of a ball housed in a
a removable display that functions independently as a slate. socket containing sensors to detect rotation of the ball about two
• Rugged tablets. A slate-like model that is designed to axis, similar to an upside-down mouse: as the user rolls the ball with
withstand rough handling and extreme conditions. Rugged a thumb, fingers, or palm the pointer on the screen will also move.
tablets are usually encased in a thick protective shell and Tracker balls are commonly used on CAD workstations for ease of
have shock-protected hard drives. use, where there may be no desk space on which to use a mouse
Joystick liquid-crystal display (LCD) monitors are lighter and have better
display quality than older CRT monitors.
joysticks are handle sticks where the user can freely change the
position of the stick, with more or less constant force. Printer

Pointing stick A printer is a device that prints output to a page. Printers come in
color or simply black and white. Inkjet and laser printers are the
A pointing stick is a pressure-sensitive small nub used like a
most common home devices. Most businesses have laser printers
joystick. It is usually found on laptops embedded between the G, H,
since the quality is better and the output is faster. Printers can be
and B keys. It operates by sensing the force applied by the user.
connected to the computer or networked using a print server.
Touchpad
Speakers
A touchpad or trackpad is a flat surface that can detect finger
contact. It is a stationary pointing device, commonly used on laptop Speakers are attached to computers for the output of sound. Sound
computers. At least one physical button normally comes with the cards are required in the computer for speakers to function.
touchpad, but the user can also generate a mouse click by tapping Speakers range from simple, two-speaker output devices to
on the pad. surround-sound multi-channel units

Section B (10 Marks)


7.Briefly explain CRT monitors and printers .(A’15,N’16)
6.Explain any three output devices.(A’15,N’16)
An output device is a part of the computer that receives the Cathode ray tube monitor
processing from the computer and presents or displays it. Output
devices come in several forms, including display monitors, printers Most monitors (computer screens) use cathode ray tubes (or CRT
and speakers, and they are distinct from input devices, which are for short), which are glass vacuum tubes into which an electron gun
the parts of the computer that give the machine instructions. emits a flow of electrons guided by an electrical field towards a
The display is how you see the output of the computer. The display screen covered in small phosphorescent elements.
is the external monitor on a desktop or the attached monitor on a
laptop. Although displays used to be made with cathode-ray tubes
(CRT), flat-screen panels have replaced that technology. Flat-screen
The human eye cannot see this scanning due to persistence of vision.
Try waving your hand in front of your screen to view the
phenomenon: You'll see several hands at once!

Combined with the firing and non-firing of the electron gun,


scanning tricks your eyes into believing that only some pixels on the
screen are lit up.

Printers

The electron gun is made up of a cathode, a negatively charged


metallic electrode, and one or more anodes (positively charged
electrodes). The cathode emits the electrons attracted by the anode.
The anode acts as an accelerator and concentrator for the electrons,
forming a flow of electrons aimed at the screen. A magnetic field
guides the electrons from left to right and from top to bottom. It is
created with two electrified X and Y plates (called deflectors) which
Character Printer : It prints only one character at a time. It has
send the flow horizontally and vertically, respectively.
relatively slower speed. Eg. Of them are Dot matrix printers.

Dot Matrix Printer : It prints characters as combination of dots. Dot


The screen is covered with a fine layer of phosphorescent elements,
matrix printers are the most popular among serial printers. These
called phosphors, which emit light by excitation when electrons
have a matrix of pins on the print head of the printer which form the
strike them, creating a lit-up dot called a pixel.
character. The computer memory sends one character at a time to be
printed by the printer. There is a carbon between the pins & the paper.
Activating the magnetic field causes the electrons to follow a scan
The words get printed on the paper when the pin strikes the carbon.
pattern, going from left to right and then down to the next row once
There are generally 24 pins.
they reach the end.
Laser Printer is a type of printer that utilizes a laser beam to produce Non-Impact Printers : There printers use non-Impact technology
an image on a drum. The light of the laser alters the electrical charge such as ink-jet or laser technology. There printers provide better
on the drum wherever it hits. The drum is then rolled through a quality of O/P at higher speed. These printers are of two types :
reservoir of toner, which is picked up by the charged portions of the
drum. Finally, the toner is transferred to the paper through a Ink-Jet Printer : It prints characters by spraying patterns of ink on the
combination of heat and pressure. paper from a nozzle or jet. It prints from nozzles having very fine
holes, from which a specially made ink is pumped out to create
This is also the way copy machines work. Because an entire page is various letters and shapes. The ink comes out of the nozzle in a form
transmitted to a drum before the toner is applied, laser printers are of vapors. After passing through a reflecting plate, it forms the
sometimes called page printers. There are two other types of page desired letter/shape at the desired place.
printers that fall under the category of laser printers even though they
do not use lasers at all. One uses an array of LEDs to expose the drum
and the other uses LCDs. Once the drum is charged, however, they 8. Discuss about storage devices.
both operate like a real laser printer. One of the chief characteristics Storage Devices
of laser printers is their resolution – how many dots per inch (dpi)
they lay down. Storage devices are used to store data and instructions permanently.
Storage devices are also called secondary storage devices / backing
The available resolutions range from 300 dpi at the low end to 1,200
storage devices / external storage devices or auxiliary storage
dpi at the high end. In addition to text, laser printers are very adept
at printing graphics, so you need significant amounts of memory in devices. Examples of storage devices include Hard Disk, CD and
the printer to print high-resolution graphics. To print a full-page DVD etc.
graphic at 300 dpi, for example, you need at least 1 MB (megabyte) of
printer RAM. For a 600 dpi graphic, you need at least 4 MB RAM. Why Secondary Storage Devices are Used?

Because laser printers are non-impact printers, they are much quieter
Secondary storage devices are used because:
than dotmatrix or daisy-wheel printers. They are also relatively fast,
although not as fast as some dot-matrix or daisy-wheel printers. The
1. Primary memory(RAM) is volatile and temporary. When
speed of laser printers ranges from about 4 to 20 pages of text per
computer is switched off, all data in ram is erased.
minute (ppm). A typical rate of 6ppm is equivalent to about 40
characters per second (cps).
2. Storage devices can store large amounts of data and a. Hard Disk b. Floppy Disk c. Zip Disk
instructions permanently whereas Primary memory has less
capacity of storing data.
a. Hard Disk
Types Of Storage Devices

There are three main types of storage devices:

1. Magnetic Tape 2. Magnetic Disk 3. Optical Disk

1. Magnetic Tape

The hard disk is also called fixed disk. It consists of one or more
metal plates. The plates are fixed in the drive. Metal plates are
coated with magnetic material to store data. A motor rotates disks.
There is also an access arm and read / write heads to read and write
data on disks.
Magnetic tape is the oldest storage device. It is made of plastic Following are major characteristics of hard disk:
coated with magnetic material. Data is stored on magnetic tape in - The storage capacity of hard disk is much greater than floppy disk.
the form of magnetic spots. Tape drive is used to read and write - Now a days hard disks of size 40 GB, 80 GB or more are available.
data on tape. Magnetic disk is sequential access device. It is slower - Hard disk is covered in a hard jacket and there are less chances of
device than magnetic disk or optical disk. Magnetic tapes are used disk damage due to dust and mishandling.
in reels of different lengths, for example 200, 600, 1200 feet etc. - Now days Operating system and application programs are
installed on hard disk.
2. Magnetic Disk - Before using a magnetic disk we use operating system to format
the disk. Operating system divides the disk into circles called tracks.
A magnetic disk is a thin circular metal or plastic disk coated with Each track is divided into pie-shaped areas called sectors. Data is
magnetic material. Data is stored in the form of magnetic spots. stored in sectors. Each sector can store 512 bytes.
Magnetic disk is random access device. It is faster than magnetic
tape. There are three main types of magnetic disk: b. Floppy Disk
Zip disk is similar to 3 ½ inch floppy disk. But it can store 100 MB or
Floppy disk is a small plastic plate coated with magnetic material. more data. Zip disk drive is used to read and write data on a zip
Data is stored in magnetic spots. Main advantage of floppy disk is disk.
that it is used to transfer data from one computer to another. Floppy
disk drive is used to read and write data on floppy disk. 3. Optical Disk
Floppy disk is available in two sizes:
· 3 ½ INCH Floppy Disk LASER technology is used to read and write data on Optical disk.
It is also called micro floppy disk. Its diameter is 3½ inch. It is LASER stands for Light Amplification through Emission of
covered in a hard plastic cover. Read/Write window is covered with Radiation. Laser beam writes on the surface of optical disk by
a metal shutter. When disk is inserted into disk drive then shutter is creating very small holes. The presence of hole represents a One and
automatically opened. It can be write protected by a notch. Storage absence of the hole represents a Zero. There are following main
capacity of micro floppy is 1.44 MB. types of optical disk.
· 5¼ Inch floppy disk. 1.CD-ROM, 2. CD-R or WORM, 3. CD-RW
It is a 5¼ inch diameter plastic plate coated with magnetic material. 4.DVD-ROM, 5. DVD-R, 6. DVD-RW
Its storage capacity is 1.2 MB. It is not used in modern computers.
1. CD-ROM
c. Zip Disk
disk. User can store data on it only once. This is why it is also called
WORM(Write Once Read Many) disk too. Because we can write data
on it only once and later we can read many times. The devices to
store data on CD-R are called CD Writers or CD Burners. We can
write data on CD-R only once, but can read data many times.
Because of this write once read many quality, CD-R is often known
as WORM(write once read many).

3. CD-RW ( CD Rewritable )

CD-ROM stands for Compact Disk-Read Only Memory. The data


stored on Cd-Rom can only be read. It cannot be deleted or changed.
It is a portable storage device. Data can be easily transferred by CD
Rom from one computer to another. Commonly it can store 650 MB
/ 700 MB/ 750 MB data. It is used to store large amounts of data like
Software or audio/video data.We purchase Software, movies,
dramas, lectures, books, wallpapers and other data on Cd-Rom. CD-RW stands for Compact Disk Rewritable. This is a special type
There are many Advantages of Compact Disk. of CD. User can write data on it, if there is an error in writing data,
he may erase the contents and rewrite again. CD-Writers are used to
2. CD-R (CD Recordable) Or WORM (Write Once Read Many) store data on CD-RW.

4. DVD - Digital Video Disk (DVD-ROM)

CD-R stands for Compact Disk -Recordable. Initially, it is a blank


DVD-R stands for Digital Video Disk Recordable. Initially it is a
blank disk. User can store data on disk only once. Then it becomes
read only. It is normally used to store high definition video movies.
DVD-Writers are used to store data on DVD-R.

6. DVD-RW ( DVD Rewritable)

DVD stands for Digital Video Disk. A laser beam with a short wave
length is used to create very very small holes on the surface of disk.
So there are much more tiny holes on the surface of DVD as
compared to that of CD. Therefore, storage capacity of DVD is much
larger than CD. It can store up to 17 GB or more data. DVD-ROM is
pre recorded and it can contain data like movies, videos and
software etc. User cannot change or delete data from DVD-ROM. It
is read only. There are several Benefits of using Digital Video Disk
or DVD.

5. DVD-R (DVD-Recordable)
DVD-RW stands for Digital Video Disk Rewritable. User can write
data on disk many times by erasing the old data.
Paavendhar College of Arts & Science, M.V.South Some examples of system software are Operating System,
Department of Computer Science Compilers, Interpreter, Assemblers, etc.
I M.Sc-Physics

Subject Name: EDC Unit: III

Section A (5 Marks)

1. Illustrate about system software.(N’16)


Here is a list of some of the most prominent features of a system
software −
Software is a set of programs, which is designed to perform a well-
• Close to the system
defined function. A program is a sequence of instructions written to
• Fast in speed
solve a particular problem.
• Difficult to design
• Difficult to understand
There are two types of software −
• Less interactive
• Smaller in size
• System Software
• Difficult to manipulate
• Application Software
• Generally written in low-level language
System Software
2. Explain embedded operating system(N’16)
The system software is a collection of programs designed to operate,
control, and extend the processing capabilities of the computer itself. As the name suggests Embedded Operating System is an
System software is generally prepared by the computer Embedded System’s Operating System. It has limited features. It is
manufacturers. These software products comprise of programs usually designed for some particular operations to control an
written in low-level languages, which interact with the hardware at electronic device. For instance, all mobile phones essentially consist
a very basic level. System software serves as the interface between of an operating system that always boots up when the mobile phone
the hardware and the end users. is in running condition. It controls all the features and basic interface
of the mobile phone. There are some other programs that can be
loaded onto the mobile phones. Mostly, JAVA Apps run on the top. • Types of Embedded Operating Systems
Embedded operating systems runs on embedded processors.
• Single System Control Loop
characteristics of Embedded Operating Systems • Single system control loop is the simplest type of embedded
operating system. It is so like operating system but it is
• Direct use of interrupts designed to run the only single task. It still under debate that
• Reactive operation this system should be classified as a type of operating system
• Real-time operation or not.
• Streamlined protection mechanisms
• I/O device flexibility • Multi-Tasking Operating System
• Configurability • As the name suggests that this operating system can perform
• There are two different kinds of operating system, either multiple tasks. In multi-tasking operating system there are
general purpose operating system that is modified in such a several tasks and processes that execute simultaneously. More
way that it runs on top of a device or the operating system can than one function can be performed if the system has more
be custom written. The approaches for the design of operating than one core or processor.
system include that either we take embedded Operating • The operating system is switched between tasks. Some tasks
System that is existing and adapt it to our embedded wait for events while other receive events and become ready
application or we can design and use a new operating system to run. If one is using a multitasking operating system, then
that is particularly for our Embedded System. software development is simplified because different
• We can adapt the existing Operating System to our embedded components of software can be made independent to each
application by streamline operation, real-time capability and other.
be adding other necessary functions. The advantage of this
approach that it has a familiar interface and its disadvantage is • Rate Monotonic Operating System
that it is not optimized for real-time.
• It is a type of operating system that ensures that task runs in a
• The most common examples of embedded operating system
system can run for a specific interval of time and for a specific
around us include Windows Mobile/CE (handheld Personal
period of time. When it is not ensured, there comes a
Data Assistants), Symbian (cell phones) and Linux. Flash
notification of failure to system software to take suitable
Memory Chip is added on a motherboard in case of the
action. This time limit cannot be ensured if the system is
embedded operating system of your personal computer to
boot from the Personal Computer.
oversubscribed, at this point another event may occur during Objectives of Operating System
run time and the failure notification comes.
The objectives of the operating system are −
• Preemptive Operating System
• A preemptive operating system is a type of multitasking • To make the computer system convenient to use in an
operating system that interprets the preemptive predominance efficient manner.
for tasks. A higher priority is task is always defined and run • To hide the details of the hardware resources from the users.
before a lower priority task. Such multi-tasking operating • To provide users a convenient interface to use the computer
systems are efficient in increasing system response to events system.
and also simplify the development of software making the • To act as an intermediary between the hardware and its
system more reliable. The designer of the system may be able users, making it easier for the users to access and use other
to calculate the time required for the service interprets in a resources.
system and also the time is taken by the scheduler for • To manage the resources of a computer system.
switching tasks. Such systems may fail to meet the deadline of • To keep track of who is using which resource, granting
a system and the software is unaware of the missed deadline. resource requests, and mediating conflicting requests from
CPU loading in a preemptive operating system can be different programs and users.
measured naturally by defining a lower priority task that only • To provide efficient and fair sharing of resources among
increments counter and do nothing else. users and programs.

• Real Time Operating System Characteristics of Operating System


• A real-time operating system is the one which serves real time
Here is a list of some of the most prominent characteristic features of
applications. It processes data as it comes in. The time
Operating Systems −
requirements for processing of operating system are usually
measured in shorter increments or in 10th of seconds. They may • Memory Management − Keeps track of the primary memory,
be time sharing or driven by events. Real time Operating i.e. what part of it is in use by whom, what part is not in use,
systems are used in small embedded systems. etc. and allocates the memory when a process or program
requests it.

3. Write down the objective of operating system? (A’15)


• Processor Management − Allocates the processor (CPU) to a Network Operating System is an operating system that
process and deallocates the processor when it is no longer includes special functions for connecting computers and devices into
required. a local-area network (LAN) or Inter-network. Some popular network
• Device Management − Keeps track of all the devices. This is operating systems are Novell Netware, Windows NT/2000, Linux,
also called I/O controller that decides which process gets the Sun Solaris, UNIX, and IBM OS/2.
device, when, and for how much time.
• File Management − Allocates and de-allocates the resources An operating system that provides the connectivity among a number
and decides who gets the resources. of autonomous computers is called a network operating system. A
• Security − Prevents unauthorized access to programs and typical configuration for a network operating system is a collection of
data by means of passwords and other similar techniques. personal computers along with a common printer, server and file
• Job Accounting − Keeps track of time and resources used by server for archival storage, all tied together by a local network. Some
various jobs and/or users. of the features of Network Operating System are to:
• Control Over System Performance − Records delays between
the request for a service and from the system. 1. Provide basic operating system features such as support for
• Interaction with the Operators − Interaction may take place processors, protocols, automatic hardware detection and support
via the console of the computer in the form of instructions. multi-processing of applications.
The Operating System acknowledges the same, does the
corresponding action, and informs the operation by a display 2. Provide security features such as authentication, logon restrictions
screen. and access control.
• Error-detecting Aids − Production of dumps, traces, error
messages, and other debugging and error-detecting methods. 3. Provide name and directory services.
• Coordination Between Other Software and Users −
Coordination and assignment of compilers, interpreters, 4. Provide file, print, web services and back-up services.
assemblers, and other software to the various users of the
computer systems. 5. Support Internetworking such as routing and WAN ports.

6. User management and support for logon and logoff, remote access;
4. Describe about the network operating system.(A’15) system management, administration and auditing tools with
graphical interfaces.
Mainly there are two types of network operating systems named as network of machines and provide users that are aware of using a set
peer-to-peer and client / server. of computers, with facilities designed to ease the use of remote
resources located over the network. These resources are made
Peer-to-peer network operating systems allow users to share available as services and might be printers, processors, file systems
resources and files located on their computers and to access shared or other devices. Some resources, of which dedicated hardware
resources found on other computers. In a peer-to-peer network, all devices such as printers, tape drives are connected to and managed
computers are considered equal; they all have the same privileges to by a particular machine and are made available to other machines in
use the resources available on the network. Peer-to-peer networks are the network via a service. A typical example of such a system is a set
designed primarily for small to medium local area networks. of workstations connected together through a local area network
Windows for Workgroups is an example of the program that can (LAN). Every workstation has its own operating system every user
function as peer-to-peer network operating systems. has its own workstation in exclusive use and cooperates with each
other to allow a variety of facilities including sharing of files,
Client/server network operating systems allow the network to sharing of hardware resources and execution of remote machines
centralize functions and applications in one or more dedicated file etc. A user can execute a login command in order to connect to
servers. The file servers become the heart of the system, providing another station and also can access a set of shared files maintained
access to resources and providing security. The workstations (clients) by a workstation named/file server.
have access to the resources available on the file servers. The network
operating system allows multiple users to simultaneously share the 5. Explain functions of operating system.
same resources irrespective of physical location. Novell Netware and An Operating System (OS) is an interface between a
Windows 2000Server are examples of client/ server network computer user and computer hardware. An operating system is a
operating systems. software which performs all the basic tasks like file management,
memory management, process management, handling input and
Each computer in the workgroup run an autonomous operating output, and controlling peripheral devices such as disk drives and
system; yet cooperate with each other to allow a variety of facilities printers.
including sharing of files, sharing of hardware resources and
execution of remote machines etc. Some popular Operating Systems include Linux, Windows, OS X,
VMS, OS/400, AIX, z/OS, etc.
Network operating systems are implementations of loosely coupled
operating systems on top of loosely coupled hardware. Network Definition
operating\systems are the software that supports the use of a
An operating system is a program that acts as an interface between • Control over system performance
the user and the computer hardware and controls the execution of • Job accounting
all kinds of programs. • Error detecting aids
• Coordination between other software and users

Memory Management

Memory management refers to management of Primary Memory or


Main Memory. Main memory is a large array of words or bytes
where each word or byte has its own address.

Main memory provides a fast storage that can be accessed directly


by the CPU. For a program to be executed, it must in the main
memory. An Operating System does the following activities for
memory management −

• Keeps tracks of primary memory, i.e., what part of it are in


use by whom, what part are not in use.
• In multiprogramming, the OS decides which process will get
memory when and how much.
• Allocates the memory when a process requests it to do so.
• De-allocates the memory when a process no longer needs it or
has been terminated.
Following are some of important functions of an operating System.
Processor Management
• Memory Management
• Processor Management In multiprogramming environment, the OS decides which process
• Device Management gets the processor when and for how much time. This function is
• File Management called process scheduling. An Operating System does the following
• Security activities for processor management −
• Keeps tracks of processor and status of process. The program • Allocates the resources.
responsible for this task is known as traffic controller. • De-allocates the resources.
• Allocates the processor (CPU) to a process.
• De-allocates processor when a process is no longer required. Other Important Activities

Device Management Following are some of the important activities that an Operating
System performs −
An Operating System manages device communication via their
respective drivers. It does the following activities for device • Security − By means of password and similar other
management − techniques, it prevents unauthorized access to programs and
data.
• Keeps tracks of all devices. Program responsible for this task • Control over system performance − Recording delays
is known as the I/O controller. between request for a service and response from the system.
• Decides which process gets the device when and for how • Job accounting − Keeping track of time and resources used
much time. by various jobs and users.
• Allocates the device in the efficient way. • Error detecting aids − Production of dumps, traces, error
• De-allocates devices. messages, and other debugging and error detecting aids.
• Coordination between other softwares and users −
File Management Coordination and assignment of compilers, interpreters,
assemblers and other software to the various users of the
A file system is normally organized into directories for easy computer systems.
navigation and usage. These directories may contain files and other
directions.

An Operating System does the following activities for file


management − Section B (10 Marks)

• Keeps track of information, location, uses, status etc. The 6.Describe about various application software.(N’16)
collective facilities are often known as file system.
• Decides who gets the resources.
Application Software Features of application software are as follows −

Application software products are designed to satisfy a particular • Close to the user
need of a particular environment. All software applications • Easy to design
prepared in the computer lab can come under the category of • More interactive
Application software. • Slow in speed
• Generally written in high-level language
Application software may consist of a single program, such as • Easy to understand
Microsoft's notepad for writing and editing a simple text. It may also • Easy to manipulate and use
consist of a collection of programs, often called a software package, • Bigger in size and requires large storage space
which work together to accomplish a task, such as a spreadsheet
package.

Examples of Application software are the following − 7.Explain graphics and multimedia software.(N’15)
Windows Presentation Foundation (WPF) provides support
• Payroll Software for multimedia, vector graphics, animation, and content
• Student Record Software composition, making it easy for developers to build interesting user
• Inventory Management Software interfaces and content. Using Microsoft Visual Studio, you can
• Income Tax Software create vector graphics or complex animations and integrate media
• Railways Reservation Software into your applications.
• Microsoft Office Suite Software
• Microsoft Word everal changes have been made related to graphics and
• Microsoft Excel animations.
• Microsoft PowerPoint
• Layout Rounding

When an object edge falls in the middle of a pixel device, the


DPI-independent graphics system can create rendering
artifacts, such as blurry or semi-transparent edges. Previous
versions of WPF included pixel snapping to help handle this
case. Silverlight 2 introduced layout rounding, which is Graphics and Rendering
another way to move elements so that edges fall on whole
pixel boundaries. WPF now supports layout rounding with WPF includes support for high quality 2-D graphics. The
the UseLayoutRounding attached property on functionality includes brushes, geometries, images, shapes and
FrameworkElement. transformations. For more information, see Graphics. The rendering
of graphical elements is based on the Visual class. The structure of
• Cached Composition visual objects on the screen is described by the visual tree. For more
information, see WPF Graphics Rendering Overview.
By using the new BitmapCache and BitmapCacheBrush
classes, you can cache a complex part of the visual tree as a 2-D Shapes
bitmap and greatly improve rendering time. The bitmap
remains responsive to user input, such as mouse clicks, and WPF provides a library of commonly used, vector-drawn 2-D
you can paint it onto other elements just like any brush. shapes, such as rectangles and ellipses, which the following
illustration shows.
• Pixel Shader 3 Support

WPF 4 builds on top of the ShaderEffect support introduced


in WPF 3.5 SP1 by allowing applications to write effects by
using Pixel Shader (PS) version 3.0. The PS 3.0 shader model
is more sophisticated than PS 2.0, which allows for even more
effects on supported hardware.

• Easing Functions

You can enhance animations with easing functions, which


give you additional control over the behavior of animations.
For example, you can apply an ElasticEase to an animation to
give the animation a springy behavior. For more information, These intrinsic WPF shapes are not just shapes: they are
see the easing types in the programmable elements that implement many of the features that
System.Windows.Media.Animation namespace. you expect from most common controls, which include keyboard
and mouse input. The following example shows how to handle the skewing. The following illustration gives an example of the many
MouseUp event raised by clicking an Ellipse element. effects you can achieve by using WPF brushes.

2-D Geometries

When the 2-D shapes that WPF provides are not sufficient, you can
use WPF support for geometries and paths to create your own. The
following illustration shows how you can use geometries to create
shapes, as a drawing brush, and to clip other WPF elements.

3-D Rendering

2-D Effects WPF provides a set of 3-D rendering capabilities that integrate with
2-D graphics support in WPF in order for you to create more
WPF provides a library of 2-D classes that you can use to create a exciting layout, UI, and data visualization. At one end of the
variety of effects. The 2-D rendering capability of WPF provides the spectrum, WPF enables you to render 2-D images onto the surfaces
ability to paint UI elements that have gradients, bitmaps, drawings, of 3-D shapes, which the following illustration demonstrates.
and videos; and to manipulate them by using rotation, scaling, and
.

Animation 8.Explain various types of operating system .(A’15)

Use animation to make controls and elements grow, shake, spin, and
fade; and to create interesting page transitions, and more. Because The Operating System is a program with the following features −
WPF enables you to animate most properties, not only can you
animate most WPF objects, you can also use WPF to animate custom • An operating system is a program that acts as an interface
objects that you create. between the software and the computer hardware.
• It is an integrated set of specialized programs used to manage
overall resources and operations of the computer.
• It is a specialized software that controls and monitors the A special computer DNS (Domain Name Server) is used to provide
execution of all other programs that reside in the computer, a name to the IP Address so that the user can locate a computer by a
including application programs and other system software. name. For example, a DNS server will resolve a name

Paavendhar College of Arts & Science, M.V.South


Department of Computer Science
I M.Sc-Physics

Subject Name: EDC Unit: IV Internet is accessible to every user all over the world.

Section A (5 Marks) Intranet

1. Define internet and write a short note on world wide Intranet is the system in which multiple PCs are connected to each
web(N’16) other. PCs in intranet are not available to the world outside the
intranet. Usually each organization has its own Intranet network
Internet and members/employees of that organization can access the
computers in their intranet.
It is a worldwide/global system of interconnected computer
networks. It uses the standard Internet Protocol (TCP/IP). Every
computer in Internet is identified by a unique IP address. IP
Address is a unique set of numbers (such as 110.22.33.114) which
identifies a computer’s location.
2. Explain in detail about networks communication
standards(N’16)

Computers on a network may use different software,


hardware and protocols. For the two computers to
communicate with each other, they need to follow certain
communication standards. Two such standards are:
Each computer in Intranet is also identified by an IP Address which
is unique among the computers in that Intranet. OSI reference model

Similarities between Internet and Intranet TCP/IP reference model

• Intranet uses the internet protocols such as TCP/IP and FTP. OSI REFERENCE MODEL:
• Intranet sites are accessible via the web browser in a similar
way as websites in the internet. However, only members of Application
Intranet network can access intranet hosted sites. Presentation Session
• In Intranet, own instant messengers can be used as similar to
Transport
yahoo messenger/gtalk over the internet.
Network
Differences between Internet and Intranet Data Link
Physical
• Internet is general to PCs all over the world whereas Intranet Application
is specific to few PCs.
• Internet provides a wider and better access to websites to a
large population, whereas Intranet is restricted.
• Internet is not as safe as Intranet. Intranet can be safely The Open System Interconnection (OSI) model includes a set of
privatized as per the need. protocols that attempt to define and standardize the data
communications process. The OSI protocols were defined by the maintains, and, terminates logical and physical connections across
International Organization for Standardization (ISO).) multiple interconnected networks. A key aspect of this transfer is the
routing of packets from the source to the destination machine
The OSI model is not a single definition of how data typically traversing number of transmission links and network
communications actually takes place in the real world. Numerous nodes where routing is carried out Routing is the process by which a
protocols may exist at each layer. The OSI model states how the path is selected out of many available paths to the destination so
process should be divided and what protocols should be used at that data packet reaches the destination fast, efficiently, reliably as
each layer. If a network vendor implements one of the protocols at required. This function makes the network most complex layer in
each layer, its network components should work with other vendor’’ the reference model. Also network layer is responsible for.
offerings. The OSI model has seven layer Translating logical addresses, or names, into physical (or data-link)
addresses it provides flow- control functions across the computer-
1. The Physical layer provide/the electrical and mechanical 1nterf network interface
ace to the network, medium (the cable). This layer gives the data-
link layer (layer 2) its ability to transport a stream of serial data bits 4. The Transport layer ensures data is successfully sent and received
between two communicating systems; it conveys the bits that move between two end nodes. If data is sent incorrectly, this layer has the
along the cable. It is responsible for making sure that the raw bits responsibility to ask for retransmission of the data. Also it ensures
get from one place to another, no matter what shape they are in, and data are passed onto the upper layers in the same order in which
(deals with the mechanical and electrical characteristics of the cable) they were sent. Specifically, it provides a reliable, network-
independent message-interchange service to the top three
2. (The Data-Link layer handles the physical transfer, ‘framing (the Application-oriented layers. This layer acts as an interface between
assembly of data into a single unit or block), and flow control and the bottom and top three layer By providing the session layer (layer
error-control functions over a single transmission link) it is 5) with a reliable message transfer service, it hides the detailed
responsible for getting the data packaged for the Physical layer. The operation of the underlying network from the session layer
data link layer provides the network layer (layer 3) reliable
information-transfer capabilities) The data-link layer is often 5. The Session layer decides when to turn communication on and off
subdivided into two parts-Logical Link Control (LLC) and Medium between two computers. It provides the mechanisms that control the
Access Control (MAC)-depending on the implementation data-exchange process and coordinates the interaction between
them.lt sets up and clears communication channels between two
3. The Network layer provides for the transfer of data in the form of communicating components. Unlike the network layer (layer 3), it
packets across the communication networks. It establishes, deals with the programs running in each machine to establish
conversations between them. Some of the most commonly Technology plays a central role in searching for information. Online
encountered protocol stacks, including TCP/IP, don’t implement a reference material, such as Encyclopedia Britannica Online, offer
session layer. vast amounts of content supplemented by engaging multimedia and
interactive links. E-book collections offer thousands of texts, and the
6. The Presentation layer performs code conversion and data sheer number of online articles and journals devoted to every
reformatting (syntax translation). It is the translator of the network, imaginable topic make research efficient and highly rewarding.
making sure the data is in the correct form for the receiving Information technology thus plays a key role in the development of
application Of course, both the sending and receiving applications the autonomous learner.
must be able to use data subscribing to one of the available abstract
data syntax forms. Most commonly, applications handle these sorts Creativity and Self-Expression:
of data translations themselves rather than’ handing them off to a
Presentation layer. Information and communication technology also plays a role in
expressing ourselves. Aided by the digital recording functions
7. The Application layer provides the interface between the software integrated into smartphones, tablets and other electronic devices, we
running in a computer and the network. It provides functions to the are able to index the world the way they see it and add their own
user’s software, including file transfer access and management perspective to already existing bodies of knowledge to create
(FTAM) and electronic mail service original work. With audio, photo and video editing software and the
various ways to post self-created media on the Web, we can not only
3. Write a short notes on uses of computer access information but also contribute to its creation. The ability to
communications(A’15) be active members of the learning community, whether on the small
Computers are critical for communication and are the scale of a school’s social media site or on the larger canvas of the
centerpiece of information technology. The early 1990s saw the entire World Wide Web, gives their work broader significance and
emergence of household Internet use, which eventually spurred affirmation.
common use of email, websites, blogs, social networking, video chat
and Voice-Over-Internet Protocol. Today, many traditional Communication and Collaboration:
communication modes including postal mail and landline phones
seem obsolete. Information and communication technology provides more
opportunities to communicate and collaborate. With Learning
Information Access: Management Systems such as Blackboard, many courses have an
online space to participate in discussion threads and forums, chats,
and video conferences. Collaborative functions in office applications Social networking sites including Facebook, Twitter and LinkedIn
allow us to view revisions and add comments in real time, making allow users to rapidly generate content for people in their network
the process of relaying feedback more efficient. to view. Rather than sending individual notes, social networking
provides a constant stream of updates and information. These
computer tools have taken communication a step further than email
due to their ability to instantly communicate life and status updates
Internet: to an entire network of people who can respond and comment to
such notes in real time. Unlike email’s distribution lists — which
The World Wide Web, Internet and email revolutionized the way essentially could transfer the same information to large groups of
individuals communicate with each other. Rather than waiting days people — social networking’s streamlined and user-friendly
or weeks to see information, we can now view all information at the interface precludes information overload that occurs from
speed of light. Email has fundamentally transformed how people attempting the same functions in an email program.
share information and conduct business based on the speed and
flexibility it offers. Computers can process data at approximately 20 Routing:
million bytes per second so it is easy for them to download and
instantly display almost any text email. While it is not a personal computer, routers are types of computers
used to direct communication traffic. They are crucial to the efficient
VOIP and Video Chat: and correct distribution of calls, emails or another Internet traffic.
Routers take “packets” of electronic data and send them in the
Voice-Over-Internet Protocol — or VOIP — replaced the need for direction to connect with the intended person. They can be used in
landline telephones in many instances. These lines can provide the home but are also held in central data warehouses where hubs of
instant phone communication over the Internet, and often are traffic are routed in the same place.
cheaper than fixed phone lines. They also provide the ability to
conduct video chats to see whom you are speaking with. VOIP
platforms also store contact details for easy accessibility and 4. Write about E-commerce(A’15).
dialling. The current drawback to VOIP, as of May 2011, is that 911
operators cannot trace the call back to the location. Electronic commerce or e-commerce refers to a wide range of
online business activities for products and services. It also pertains
Social Networking: to “any form of business transaction in which the parties interact
electronically rather than by physical exchanges or direct physical • Web-based commerce enablers (e.g., Commerce One, a
contact.” browser-based, XML-enabled purchasing automation
software).
E-commerce is usually associated with buying and selling over the
Internet, or conducting any transaction involving the transfer of E-markets are simply defined as Web sites where buyers and sellers
ownership or rights to use goods or services through a computer- interact with each other and conduct transactions
mediated network Though popular, this definition is not
comprehensive enough to capture recent developments in this new In C2B transactions, customers/consumers are given more influence
and revolutionary business phenomenon. A more complete over what and how products are made and how services are
definition is: E-commerce is the use of electronic communications delivered, thereby broadening consumer choices. E-commerce
and digital information processing technology in business allows for a faster and more open process, with customers having
transactions to create, transform, and redefine relationships for greater control.
value creation between or among organizations, and between
organizations and individuals. E-commerce makes information on products and the market as a
whole readily available and accessible, and increases price
• gistics - transportation, warehousing and distribution (e.g., transparency, which enable customers to make more appropriate
Procter and Gamble); purchasing decisions.
• application service providers - deployment, hosting and
management of packaged software from a central facility The Internet allows people from all over the world to get connected
(e.g., Oracle and Linkshare); inexpensively and reliably. As a technical infrastructure, it is a
• outsourcing of functions in the process of e-commerce, such global collection of networks, connected to share information using
as Web-hosting, security and customer care solutions (e.g., a common set of protocols. Also, as a vast network of people and
outsourcing providers such as eShare, NetSales, iXL information, the Internet is an enabler for e-commerce as it allows
Enterprises and Universal Access); businesses to showcase and sell their products and services online
• auction solutions software for the operation and maintenance and gives potential customers, prospects, and business partners
of real-time auctions in the Internet (e.g., Moai Technologies access to information about these businesses and their products and
and OpenSite Technologies); services that would lead to purchase.
• content management software for the facilitation of Web site
content management and delivery (e.g., Interwoven and Before the Internet was utilized for commercial purposes, companies
ProcureNet); and used private networks-such as the EDI or Electronic Data
Interchange-to transact business with each other. That was the early
form of e-commerce. However, installing and maintaining private
networks was very expensive. With the Internet, e-commerce spread
rapidly because of the lower costs involved and because the Internet
is based on open standards

5. How the internet works? Explain .

Internet Addresses

Internet must have a unique address. Internet addresses are


in the form nnn.nnn.nnn.nnn where nnn must be a number 1. The message would start at the top of the protocol stack on
from 0 - 255. This address is known as an IP address. your computer and work it's way downward.
2. If the message to be sent is long, each stack layer that the
message passes through may break the message up into
smaller chunks of data. This is because data sent over the
Internet (and most computer networks) are sent in
manageable chunks. On the Internet, these chunks of data are
known as packets.
3. The packets would go through the Application Layer and
So your computer is connected to the Internet and has a continue to the TCP layer. Each packet is assigned a port
unique address. How does it 'talk' to other computers number. Ports will be explained later, but suffice to say that
connected to the Internet? An example should serve here: many programs may be using the TCP/IP stack and sending
Let's say your IP address is 1.2.3.4 and you want to send a messages. We need to know which program on the
message to the computer 5.6.7.8. The message you want to destination computer needs to receive the message because it
send is "Hello computer 5.6.7.8!". Obviously, the message will be listening on a specific port.
must be transmitted over whatever kind of wire connects 4. After going through the TCP layer, the packets proceed to the
your computer to the Internet IP layer. This is where each packet receives it's destination
address, 5.6.7.8.
5. Now that our message packets have a port number and an IP
address, they are ready to be sent over the Internet. The
hardware layer takes care of turning our packets containing
the alphabetic text of our message into electronic signals and
transmitting them over the phone line.
6. On the other end of the phone line your ISP has a direct
connection to the Internet. The ISPs router examines the
destination address in each packet and determines where to
send it. Often, the packet's next stop is another router. More
on routers and Internet infrastructure later.
7. Eventually, the packets reach computer 5.6.7.8. Here, the
packets start at the bottom of the destination computer's he Internet backbone is made up of many large networks which
TCP/IP stack and work upwards. interconnect with each other. These large networks are known as
8. As the packets go upwards through the stack, all routing data Network Service Providers or NSPs. Some of the large NSPs are
that the sending computer's stack added (such as IP address UUNet, CerfNet, IBM, BBN Planet, SprintNet, PSINet, as well as
and port number) is stripped from the packets. others. These networks peer with each other to exchange packet
9. When the data reaches the top of the stack, the packets have traffic. Each NSP is required to connect to three Network Access
been re-assembled into their original form, "Hello computer Points or NAPs. At the NAPs, packet traffic may jump from one
5.6.7.8!" NSP's backbone to another NSP's backbone. NSPs also interconnect
at Metropolitan Area Exchanges or MAEs. MAEs serve the same
Networking Infrastructure purpose as the NAPs but are privately owned. NAPs were the
original Internet interconnect points. Both NAPs and MAEs are
So now you know how packets travel from one computer to another
referred to as Internet Exchange Points or IXs. NSPs also sell
over the Internet. But what's in-between? What actually makes up
bandwidth to smaller networks, such as ISPs and smaller bandwidth
the Internet? Let's look at another diagram:
providers. Below is a picture showing this hierarchical
infrastructure.
Domain Names and Address Resolution

But what if you don't know the IP address of the computer you want
to connect to? What if the you need to access a web server referred
to as www.anothercomputer.com? How does your web browser know
where on the Internet this computer lives? The answer to all these
questions is the Domain Name Service or DNS. The DNS is a
distributed database which keeps track of computer's names and
their corresponding IP addresses on the Internet.

Many computers connected to the Internet host part of the DNS


database and the software that allows others to access it. These
computers are known as DNS servers. No DNS server contains the
entire database; they only contain a subset of it. If a DNS server does
not contain the domain name requested by another computer, the
DNS server re-directs the requesting computer to another DNS
server.

This is not a true representation of an actual piece of the Internet.


Diagram is only meant to demonstrate how the NSPs could
interconnect with each other and smaller ISPs. None of the physical
network components are shown in Diagram 4 as they are in
Diagram 3. This is because a single NSP's backbone infrastructure is
a complex drawing by itself. Most NSPs publish maps of their
network infrastructure on their web sites and can be found easily.
To draw an actual map of the Internet would be nearly impossible
due to it's size, complexity, and ever changing structure.
Transmission Media- they consist of material or techniques
capable of carrying one or more signals. Transmission media are of
two types: Physical and wireless.

Physical Transmission Media:

• Unshielded Twisted Pair Cable (UTP)


• Shielded Twisted Pair Cable (STP)
• Coaxial Cable
• Fiber Optic Cable

UTP- This is the most popular and generally the best option for
schools.

he Domain Name Service is structured as a hierarchy similar to the


IP routing hierarchy. The computer requesting a name resolution
will be re-directed 'up' the hierarchy until a DNS server is found that
can resolve the domain name in the request. Figure 6 illustrates a
portion of the hierarchy. At the top of the tree are the domain roots. UTP
Some of the older, more common domains are seen near the top.
What is not shown are the multitude of DNS servers around the
world which form the rest of the hierarchy.
Section B (10 Marks)
The cable has four pairs of wires inside the jacket. Each pair is
twisted with a different number of twists per inch to help eliminate
6.Explain in details about physical transmission
interference from adjacent pairs and other electrical devices. The
media.(A’15,N’16)
tighter the twisting, the higher the supported transmission rate
and the greater the cost per foot. The disadvantage of UTP is that it
may be susceptible to radio and electrical frequency interferences.

Unshielded Twisted Pair Connector: this connector is RJ-45. Its a


plastic connector that looks like a large telephone- style connector.
RJ stands for Registered Jack.

SHIELDED TWISTED PAIR CABLE (STP): Coaxial Cable

Coaxial cabling has a single conductor as it center. A plastic layer


provides insulation between the center conductor ad the braided
mental shield. The metal shield help to block any outside
interference from fluorescent lights, motors, and other computers .
Its difficult to install, but its highly resistant to signal interference, it
STP supports greater cable length between network devices than twisted
pair. Two type of coaxial cable are: thick coaxial and thin coaxial.

FIBER OPTIC CABLE


STP is suitable for environments with electrical interference, it help
reduces noise which can degrade coomunication; however the extra
shielding can make the cable bulky . STP is often used on network
using Token Ring Topology.

COAXIAL CABLE :

Fiber Optic Cable


Fiber optic cabling consists of a center glass core surrounded by • A modem exposes an Ethernet interface to a service
several layers of protective materials. It transmit lights rather than provider's native telecommunications infrastructure. In
electronic signals thus eliminating electrical interference, this makes homes these usually come in the form of a DSL modem or
it suitable for areas that contain large amount of electrical cable modem.
interferences. In addition it has the ability to transmit signals over • A router manages network layer connectivity between a
much longer distance, carry more information at a faster speed than WAN and the HAN. It performs the key function of network
coaxial and twisted pair. More over cables are much thinner and address translation enabling multiple devices to share the
light weighted. home's single WAN address. Most home networks feature a
particular class of small, passively cooled, table-top device
with an integrated wireless access point and 4 port Ethernet
7. Explain the following .(A’15) switch. These devices aim to make the installation,
i) Home networks configuration, and management of a home network as
A home network or home area network (HAN) is a type of automated, user friendly, and "plug-and-play" as possible.
computer network that facilitates communication among devices • A network switch is used to allow devices on the home
within the close vicinity of a home. Devices capable of participating network to talk to one another via Ethernet. While the needs
in this network, for example, smart devices such as network printers of most home networks are satisfied with the built-in wireless
and handheld mobile computers, often gain enhanced emergent and/or switching capabilities of their router, certain
capabilities through their ability to interact. These additional situations require the introduction of a distinct switch. For
capabilities can be used to increase the quality of life inside the example:
home in a variety of ways, such as automation of repetitious tasks, o When the router's switching capacity is exceeded.
increased personal productivity, enhanced home security, and easier Most home routers expose only 4 to 6 Ethernet ports.
access to entertainment. o When a non-standard port feature such as power over
Ethernet is required by devices such as IP cameras and
IP phones
A home network usually relies on one or more of the following o When distant rooms have a large amount of wired
equipment to establish physical layer, data link layer, and network devices in close proximity
layer connectivity both internally amongst devices and externally • A wireless access point is required for connecting wireless
with outside networks: devices to a network. Most home networks rely on one
wireless router combination device to fill this role.
• A home automation controller enables low-power wireless and information from a DSL line. ISDN and DSL modems usually
communications with simple, non-data-intensive devices are external devices, in which one end connects to the telephone line
such as light bulbs and locks. and the other end connects to a port on the system unit.
• A network bridge connecting two network interfaces to each
other, often in order to grant a wired-only device, e.g. Xbox, Wireless Modems
access to a wireless network medium. Some mobile users have a wireless modem that uses the cell phone
network to connect to the Internet wirelessly from a notebook
ii) Communication devices computer, a smart phone, or other mobile device. Wireless modems,
communications device is any type of hardware capable of which have an external or built-in antenna, are available as PC
transmitting data, instructions, and information between a sending Cards, ExpressCard modules, and flash cards.
device and a receiving device. One type of communications device
that connects a communications channel to a sending or receiving Network Cards
device such as a com- puter is a modem. Computers process data as
digital signals. Data, instructions, and information travel along a A network card is an adapter card, PC Card, ExpressCard module,
communications channel in either analog or digital form, depending USB network adapter, or flash card that enables a computer or
on the com- munications channel. An analog signal consists of a device that does not have networking capability to access a network.
continuous electrical wave. A digital signal consists of individual The network card coordinates the transmission and receipt of data,
electrical pulses that represent bits grouped together into bytes. instructions, and information to and from the computer or device
Dial-Up Modems containing the network card.
The communications device that performs this conversion is a
modem, sometimes called a dial-up modem. The word, modem, is 8. Discuss about wireless transmission media(A’15).
derived from the combination of the words, modulate, to change For unguided media, transmission and reception are
into an analog signal, and demodulate, to convert an analog signal achieved by means of an antenna. For transmission, the antenna
into a digital signal. radiates electromagnetic energy into the medium (usually air), and
for reception, the antenna picks up electromagnetic radiation waves
ISDN and DSL Modems from the surrounding medium. There are basically two types of
An ISDN modem sends digital data and information from a configurations for wireless transmission: directional and omni
computer to an ISDN line and receives digital data and information directional.
from an ISDN line. A DSL modem sends digital data and
information from a computer to a DSL line and receives digital data
the Cadillac next to him began behaving like a bucking bronco. When
the officer pulled the car over, the driver claimed that he had done
nothing and that the car had gone crazy.

Microwave Transmission:

Above 100 MHz, the waves travel in nearly straight lines and can
therefore be narrowly focused. Concentrating all the energy into a
small beam by means of a parabolic antenna (like the familiar satellite
TV dish) gives a much higher signal-to-noise ratio, but the
transmitting and receiving antennas must be accurately aligned with
each other.

Infrared and Millimeter Waves:

Radio Transmission: Unguided infrared and millimeter waves are widely used for short-
range communication. The remote controls used on televisions,
Radio waves frequency are easy to generate, can travel long distances, VCRs, and stereos all use infrared communication. They are relatively
and can penetrate buildings easily, so they are widely used for directional, cheap, and easy to build but have a major drawback: they
communication, both indoors and outdoors. Radio waves also are do not pass through solid objects (try standing between your remote
omnidirectional, meaning that they travel in all directions from the control and your television and see if it still works). On the other
source, so the transmitter and receiver do not have to be carefully hand, the fact that infrared waves do not pass through solid walls
aligned physically. well is also a plus. It means that an infrared system in one room of a
building will not interfere with a similar system in adjacent rooms or
Sometimes omnidirectional radio is good, but sometimes it is bad. In buildings.
the 1970s, General Motors decided to equip all its new Cadillacs with
computer-controlled antilock brakes. When the driver stepped on the
brake pedal, the computer pulsed the brakes on and off instead of
locking them on hard. One fine day an Ohio Highway Patrolman
began using his new mobile radio to call headquarters, and suddenly
Paavendhar College of Arts & Science, M.V.South Database administration is more of an operational or technical level
Department of Computer Science function responsible for physical database design, security
I M.Sc-Physics enforcement, and database performance. Tasks include maintaining
the data dictionary, monitoring performance, and enforcing
Subject Name: EDC Unit: V organizational standards and security.

Section A (5 Marks) 1. Selection of hardware and software

1. write down the functions of DBA • Keep up with current technological trends
• Predict future changes
A data administration (also known as a database administration • Emphasis on established off the shelf products
manager, data architect, or information center manager) is a high
level function responsible for the overall management of data 2. Managing data security and privacy
resources in an organization. In order to perform its duties, the DA
must know a good deal of system analysis and programming. • Protection of data against accidental or intentional loss,
destruction, or misuse
• These are the functions of a data administrator (not to be • Firewalls
confused with database administrator functions): • Establishment of user privileges
• Data policies, procedures, standards • Complicated by use of distributed systems such as internet
• Planning- development of organization's IT strategy, access and client/ server technology.
enterprise model, cost/benefit model, design of database
environment, and administration plan.
• Data conflict (ownership) resolution 2. Write about risks in computer security
• Data analysis- Define and model data requirements, business
Backdoor
rules, operational requirements, and maintain corporate data
dictionary A backdoor in a computer system, a cryptosystem or an
• Internal marketing of DA concepts algorithm, is any secret method of bypassing normal authentication
• Managing the data repository or security controls. They may exist for a number of reasons,
including by original design or from poor configuration. They may
have been added by an authorized party to allow some legitimate
access, or by an attacker for malicious reasons; but regardless of the Spoofing
motives for their existence, they create a vulnerability. Spoofing is the act of masquerading as a valid entity through
Direct-access attacks falsification of data (such as an IP address or username), in order to
gain access to information or resources that one is otherwise
An unauthorized user gaining physical access to a computer
is most likely able to directly copy data from it. They may also unauthorized to obtain
compromise security by making operating system modifications,
Email spoofing, where an attacker forges the sending (From, or
installing software worms, keyloggers, covert listening devices or
source) address of an email.
using wireless mice.[6] Even when the system is protected by
IP address spoofing, where an attacker alters the source IP
standard security measures, these may be able to be by-passed by
address in a network packet to hide their identity or impersonate
booting another operating system or tool from a CD-ROM or other
another computing system.
bootable media. Disk encryption and Trusted Platform Module are
MAC spoofing, where an attacker modifies the Media Access
designed to prevent these attacks.
Control (MAC) address of their network interface to pose as a valid
user on a network.
Eavesdropping Biometric spoofing, where an attacker produces a fake biometric
sample to pose as another user.
Eavesdropping is the act of surreptitiously listening to a private
conversation, typically between hosts on a network. For instance, 3. Write a short notes on Attacks
programs such as Carnivore and NarusInSight have been used by
the FBI and NSA to eavesdrop on the systems of internet service Basic Network Attacks
providers. Even machines that operate as a closed system (i.e., with
no contact to the outside world) can be eavesdropped upon via Many people rely on the Internet for many of their professional,
monitoring the faint electro-magnetic transmissions generated by social and personal activites. But there are also people who attempt
the hardware; TEMPEST is a specification by the NSA referring to to damage our Internet-connected computers, violate our privacy
these attacks. and render inoperable the Internet services.

Given the frequency and variety of existing attacks as well as the


threat of new and more destructive future attacks, network security
has become a central topic in the field of computer networking.
Malware – short for malicious software which is specifically of understanding about the components of data and how they are
designed to disrupt, damage, or gain authorized access to a related.
computer system. Much of the malware out there today is self-
replicating : once it infects one host, from that host it seeks entry into Components of the Data Hierarchy
other hosts over the Internet, and from the newly infected hosts, it
seeks entry into yet more hosts. In this manner, self-replicating he components of the data hierarchy are listed below.
malware can spread exponentially fast.
A data field holds a single fact or attribute of an entity. Consider a
Virus – A malware which requires some form of user’s interaction date field, e.g. "19 September 2004". This can be treated as a single
to infect the user’s device. The classic example is an e-mail date field (e.g. birthdate), or three fields, namely, day of month,
attachment containing malicious executable code. If a user receives month and year.
and opens such an attachment, the user inadvertently runs the
malware on the device. A record is a collection of related fields. An Employee record may
contain a name field(s), address fields, birthdate field and so on.
Worm – A malware which can enter a device without any explicit
user interaction. For example, a user may be running a vulnerable A file is a collection of related records. If there are 100 employees,
network application to which an attacker can send malware. In some then each employee would have a record (e.g. called Employee
cases, without any user intervention, the application may accept the Personal Details record) and the collection of 100 such records
malware from the Internet and run it, creating a worm. would constitute a file (in this case, called Employee Personal
Details file).
3. Write about hierarchy of data
Data hierarchy refers to the systematic organization of data, Files are integrated into a database. This is done using a Database
often in a hierarchical form. Data organization involves Management System. If there are other facets of employee data that
characters, fields, records, files and so on. we wish to capture, then other files such as Employee Training
History file and Employee Work History file could be created as
Purpose of the Data Hierarchy well.

"Data hierarchy" is a basic concept in data and database theory and


helps to show the relationships between smaller and larger
components in a database or data file. It is used to give a better sense
The database administrator (DBA) is usually a dedicated role in
the IT department for large organizations. However, many smaller
companies that cannot afford a full-time DBA usually outsource or
contract the role to a specialized vendor, or merge the role with
another in the ICT department so that both are performed by one
person.

The primary role of database administration is to ensure maximum


up time for the database so that it is always available when needed.
This will typically involve proactive periodic monitoring and
troubleshooting. This in turn entails some technical skills on the part
of the DBA. In addition to in-depth knowledge of the database in
question, the DBA will also need knowledge and perhaps training in
the platform (database engine and operating system) on which the
database runs.

A DBA is typically also responsible for other secondary, but still


critically important, tasks and roles. Some of these include:

• Database Security: Ensuring that only authorized users have


access to the database and fortifying it against any external,
unauthorized access.
• Database Tuning: Tweaking any of several parameters to
optimize performance, such as server memory allocation, file
fragmentation and disk usage.
• Backup and Recovery: It is a DBA's role to ensure that the
database has adequate backup and recovery procedures in
4. Database Administration ? Explain. place to recover from any accidental or deliberate loss of data.
• Producing Reports from Queries: DBAs are frequently called Data Inconsistency is more in Data Inconsistency is less in
upon to generate reports by writing queries, which are then file system. database management system.
run against the database. Centralisation is hard to get Centralisation is achieved in
when it comes to File Database Management System.
It is clear from all the above that the database administration Management System.
function requires technical training and years of experience. Some User locates the physical In Database Management
companies that offer commercial database products, such as Oracle address of the files to access System, user is unaware of
DB and Microsoft's SQL Server, also offer certifications for their data in File Management physical address where data is
specific products. These industry certifications, such as Oracle System. stored.
Certified Professional (OCP) and Microsoft Certified Database
Administrator (MCDBA), go a long way toward assuring Security is low in File Security is high in Database
organizations that a DBA is indeed thoroughly trained on the Management System. Management System.
product in question. Because most relational database products Database Management System
today use the SQL language, knowledge of SQL commands and File Management System stores
stores structured data which
syntax is also a valuable asset for today's DBAs. unstructured data as isolated
have well defined constraints
data files/entities.
and interrelation.

Section B (10 Marks)


7. Explain file processing versus database
6.Compare file system with database management system
File Processing System Database Management System
File Management System Database Management System On the other hand, a file A database is generally used for
File System is a general, easy- Database management system is system is a more storing related, structured data, with
to-use system to store general used when security constraints unstructured data store for well defined data formats, in an
files which require less security are high. storing arbitrary, probably efficient manner for insert, update
and constraints. unrelated data. and/or retrieval.
Data Redundancy is more in Data Redundancy is less in While databases are consistent at any
file management system. database management system. A file system provides
instant in time,provide,isolated
much looser guarantees
transactions and durable writes,
File Processing System Database Management System Relational Database
about consistency, isolation
and durability. A relational database is a database that stores data in tables that
consist of rows and columns. Each row has a primary key and each
A file-processing system A database management system
column has a unique name. A file processing environment uses the
coordinates only the coordinates both the physical and the
terms file, record, and field to represent data. A relational database
physical access to the data. logical access to the data
uses terms different from a file processing system. A developer of a
A file-processing system is relational database refers to a file as a relation, a record as a tuple,
designed to allow A database management system is and a field as an attribute. A user of a relational database, by
predetermined access to designed to allow flexible access to contrast, refers to a file as a table, a record as a row, and a field as a
data (i.e. compiled data (i.e. queries) column.
programs)
In addition to storing data, a relational database also stores data
Unauthorized access relationships. A relationship is a link within the data. In a relational
Unauthorized access is restricted in
cannot be restricted in database, you can set up a relationship between tables at any time.
DBMS
DBMS The tables must have a common column (field). In a relational
database, the only data redundancy (duplication) exists in the
Redundancy cannot be
Redundancy can be controlled in File common columns (fields). The database uses these common
controlled in File
processing system. columns for relationships. Many organizations use relational
processing system.
databases for payroll, accounts receivable, accounts payable, general
ledger, inventory, order entry, invoicing, and other business-related
functions.

OODB

8.Explain relational database and object oriented database. An object-oriented database (OODB) stores data in objects. An
object is an item that contains data, as well as the actions that read or
process the data. A Student object, for example, might contain data
about a student such as Student ID, First Name, Last Name,
Address, and so on. It also could contain instructions about how to
print a student transcript or the formula required to calculate a
student’s grade point average.

Object-oriented databases have several advantages compared with


relational databases: they can store more types of data, access this data
faster, and allow programmers to reuse objects. An object-oriented
database stores unstructured data more efficiently than a relational
database. Unstructured data includes photos, video clips, audio
clips, and documents. When users query an object-oriented
database, the results often are displayed more quickly than the same
query of a relational database. If an object already exists,
programmers can reuse it instead of recreating a new object on
program development time.

You might also like