Edc - I.pg English
Edc - I.pg English
settings.
Subject Name: EDC - FUNDAMENTALS OF COMPUTERS AND
COMMUNICATION
Hardware
(SUBJECT CODE: 19PCSED2)
Unit: I Hardware is the part of a computer-based information system we
can touch – the physical components of the technology.
Section A (5 Marks)
All peripherals, including servers, routers, monitors, printers and
1. What are elements of information systems?(N’16) storage devices.
Data
Information Software
Hardware
Software Software is a set of instructions that tells the hardware what to do.
Procedure
people It gathers, organizes and manipulates data and carries out
instructions. Everything we do using a computer is done by the
Data software.
Information
Google’s Android on a mobile phone. 2. Write short notes on ports and connectors?(N’16)
Examples of application software A port is a physical docking point using which an external device
can be connected to the computer. It can also be programmatic
Microsoft Excel and Angry Birds docking point through which information flows from a program to
the computer or over the Internet.
Procedures
Characteristics of Ports
Procedures are the rules, descriptions and instructions for how
things are done. In computer-based information systems, A port has the following characteristics −
procedures are frequently covered in instruction or user manuals
that describe how to use the hardware, software and data. • External devices are connected to a computer using cables
and ports.
People • Ports are slots on the motherboard into which a cable of
external device is plugged in.
People are the most important part of a computer-based information • Examples of external devices attached via ports are the
system. It is people who design and operate the software, input the mouse, keyboard, monitor, microphone, speakers, etc.
data, build the hardware and keep it running.
Serial Port
Communication
• Used for external modems and older computer mouse
The components that allow one computer to communicate with • Two versions: 9 pin, 25 pin model
another are hardware and are controlled by software. If • Data travels at 115 kilobits per second
communication between people is included in this element, though,
it is an important element.
Parallel Port
• Used for scanners and printers • Three-pronged plug.
• Also called printer port • Connects to the computer's power cable that plugs into a
• 25 pin model power bar or wall socket.
• IEEE 1284-compliant Centronics port
Firewire Port
PS/2 Port
• Transfers large amount of data at very fast speed.
• Used for old computer keyboard and mouse • Connects camcorders and video equipment to the computer.
• Also called mouse port • Data travels at 400 to 800 megabits per seconds.
• Most of the old computers provide two PS/2 port, each for • Invented by Apple.
the mouse and keyboard • It has three variants: 4-Pin FireWire 400 connector, 6-Pin
• IEEE 1284-compliant Centronics port FireWire 400 connector, and 9-Pin FireWire 800 connector.
• It can connect all kinds of external USB devices such as • Connects a PC's modem to the telephone network.
external hard disk, printer, scanner, mouse, keyboard, etc.
• It was introduced in 1997. Ethernet Port
• Most of the computers provide two USB ports as minimum.
• Data travels at 12 megabits per seconds. • Connects to a network and high speed Internet.
• USB compliant devices can get power from a USB port. • Connects the network cable to a computer.
• This port resides on an Ethernet Card.
VGA Port • Data travels at 10 megabits to 1000 megabits per seconds
depending upon the network bandwidth.
• Connects monitor to a computer's video card.
• It has 15 holes. Game Port
• Similar to the serial port connector. However, serial port
connector has pins, VGA port has holes. • Connect a joystick to a PC
• Now replaced by USB
Power Connector
Digital Video Interface, DVI port
• Connects Flat panel LCD monitor to the computer's high-end • Parallel port, which uses a DB25 connector, mainly for
video graphic cards. connecting old printers;
• Very popular among video card manufacturers. • USB ports (1.1, low-speed, or 2.0, high-speed), for connecting
more recent peripherals;
Sockets • RJ45 connector (called the LAN port or Ethernet port), for
connecting the computer to a network. It interfaces with a
• Sockets connect the microphone and speakers to the sound network card built into the motheboard;
card of the computer. • VGA connector (called SUB-D15), used for hooking up a
monitor. This connector interfaces with the built-in graphics
connectors, normally called "input-output connectors" (or I/O for card;
short), are interfaces for linking devices by using cables. They • Jacks (Line-In, Line-Out and microphone), for connecting
generally have a male end with pins protruding from it. This plug is speakers or a hi-fi sound system, as well as a microphone.
meant to be inserted into a female part (also called a socket), which This connector interfaces with the built-in sound card.
includes holes for accommodating the pins
Input/output connectors
3. Write short notes on software in computer? (A’15)
The computer's motherboard has a certain number of input-ouput
connectors located on the "rear panel."
Software is a set of programs, which is designed to perform a well-
defined function. A program is a sequence of instructions written to
solve a particular problem.
• System Software
Most motherboards have the following connectors: • Application Software
• Serial port, which uses a DB9 connector, for connecting older System Software
devices;
The system software is a collection of programs designed to operate, Application software may consist of a single program, such as
control, and extend the processing capabilities of the computer itself. Microsoft's notepad for writing and editing a simple text. It may also
System software is generally prepared by the computer consist of a collection of programs, often called a software package,
manufacturers. These software products comprise of programs which work together to accomplish a task, such as a spreadsheet
written in low-level languages, which interact with the hardware at package.
a very basic level. System software serves as the interface between
the hardware and the end users. Examples of Application software are the following −
Its size affects speed, power, and capability. Primary memory and
secondary memory are two types of memories in the computer.
Functions of the memory unit are −
Control Unit
This unit controls the operations of all parts of the computer but
does not carry out any actual data processing operations.
Function of logic section is to perform logic operations such as Computers have a lot of advantages and disadvantages but we can
comparing, selecting, matching, and merging of data. get full benefits for computer in education department. There are very
high number of uses of computers in all the education sections. We
can use it in schools for students fee cards, pictures, papers, result
5. Explain advantages and disadvantages of using cards etc. also use for merit lists, we can also get connect to the every
Computer. university and college in the world and can get online admission with
the help of internet connection. Students solve their question, create
Uses, Benefits, Reward and Advantages of Computer designs, create software and thousands are other advantages of
computer in education and technology.
1. Medical Departments
4. Jobs Opportunities You can use and get advantages from computer buy saving your
thousands of old and new images. Your old memories, your project
Another important points in list for the jobless people. Because jobless images, videos and working files. Because todays computer have the
people can find easily job on internet with the help of computer. As ability to save the data in Terabytes.
compare to buy the newspaper from market and search job on every
page in all newspapers. You can easily point out job according to your 9. Presentation
education and experience.
Presentations are play big role in every field to know more about the
5. Computer Sports things. And to know something quick and easy with the help of
presentation. Power Point software are uses for creating the
Well this essay is not all about computer general advantages. People presentations. These presentations are may be for events, products
who like sports they can find easily score on the monitor screen or and projects etc.
laptop screen with the help of internet.
10. Business Departments
6. Games
The last points of advantages and disadvantages of computer essay
You are free, no work and nothing to you are getting bore. Let’s on in points are about the uses of computers in business departments.
you (PC) and enjoy the fun of video games. Multiple video games like Every organization in the world, either it is small or big must need at
football, cricket, racing, arcade, fight and mission games are more least one or two computer for documentation, keeping records of
interesting and entertaining. workers, online communication etc.
Today’s the multimedia and entertainment age. Everybody like to 1. Environments Pollution
hear latest new music, want to watch the latest released movies of
Hollywood and Bollywood. Not only this, there are many more Computers are not only the CPU, Monitors, Mouse and Keyboards.
entertainment ways that can people avail with the help of PC system. Heavy automatic machines, Laptops, Mobiles, Tablets and many
other machines and equipment that works on command are called
8. High Storage Space Computer. There for the manufacturing of these machines and
components are causes of Environments Pollution like, Air Pollution,
Water Pollution and Soil Pollution. There are also many Advantages Designer, for architect need person who can work in AutoCAD, for
and Disadvantages of Pollution. computerized accounting need person who can work in Peachtree or
QuickBooks Software.
2. Data Security
6. Time Wastages
The second drawback and demerit of PC is data is not secure in the
hard drive. In the office someone can stole your files in minimum time Another demerits of PC is the wastage of time. People in offices use it
in your absence. Because the CPU’s are very fast now todays and for extra or personal works. Because of that other peoples are in
transferring the data to USB takes no time. problems.
At the one hand computer produce job opportunities, but on anther As we discuss above that misuse of computer is waste of time, as like
hand it also reduce the job opportunities. Because a lot machines that it is also waste of money. People buy it for playing games,
today’s works automatically, work done before by five or ten peoples watching movies and music are waste of money.
now that work machine do alone with one command.
8. Short Circuit
4. Viruses
In case of any problem in power cable, less or more power of
Virus word is good in sound but it kill your Computer and can electricity or heavy load on computer may cause of short circuit or
damage your files and data available in your Hard Disk. Virus is the blast. In that cases you may lose you data and files and other may be
enemy of PC, once it enter into system, the quantity of virus increase you have to lose your whole system.
automatically daily and at the end you will loss you all important
information and data. 9. Far from Family
5. Need Skilled Person The biggest disadvantages of computer system is more use of it for
entreating and playing video games or other misuse keep the people
No five points in “Disadvantages of Computer” is skilled person is far from their families. Father cannot understand the children better,
needed for every special task. And skilled person in specific software husband cannot understand wife and many other relations are go far.
will charge high salary. For example for designing need Graphic
10. Automatic Operation
On the basis of working Principle : The computer can be classified
This is the last point of “advantages and disadvantages of computer into:
technology in our life”. This is the most serious and dangerous points • Analog computer
because some automatic operations and functions of computerized • Digital computer
software and commands sometime stop work due to some reasons • Hybrid computer
may cause of death. For example in lift, if electricity get off or load
shedding may stop lift. Many other machines that have no sense of
thinking they works only commands. On the basis of size : The computer can be classified into:
• Super Computer
• Mainframe Computer
Section B (10 Marks) • Mini Computer
• Micro Computer
6.Explain in detail about categories of computer.(A’15,N’16) • Workstations
Types of Computer On the basis of purpose of use : The computer can be classified
into:
Computers vary widely in terms of their size and purpose they • Special purpose computer
serve. There are very small computers that can be held on a palm. • General purpose computer
There are also large computers that take a whole room to occupy.
They are used by big organisations, public and private. Types of Computer- On the basic of working Principal
Organisations use computers for a variety of applications ranging
from scientific to commercial in nature. The most widely used On the basis of working Principle the computer can be classified
computers are called personal computers that typically fit on a into:
desktop. 1. Analog computer
2. Digital computer
Computers can be classified on several bases as follows: 3. Hybrid computer
1. On the basis of working Principle
2. On the basis of size » Analog computer
3. On the basis of purpose of use Analog computer operates on inputs of continuously varying
electrical voltage. It measures the input rather than counting. The computations are far more accurate. They come in various sizes
name that is derived from the Greek word 'analog' denotes that the starting from pocket size to the large systems occupying big rooms.
computer functions by establishing similarities between two Most of the computers available today are digital.
quantities that are usually expressed as voltages or currents. Analog
computers are powerful tools to solve differential equations. They
are mainly used in scientific design and production environments.
Each one has to be constructed to do a specific job and will respond
very quickly to changes in the measured inputs.
Digital Computer
» Hybrid Computer
Hybrid computer combines features of both analog and digital
computers. In this computer, some calculations are done in the
analog portion of the computer and some are done in the digital
portion of it. In a hospital, for example, analog devices may measure
Multimeter (Analog computer) patient's heart function, temperature and other vital signs. These
measurements may then be converted into numbers and supplied to
» Digital Computer a digital component in the system. This component is used to
A digital computer operates essentially by counting. All quantities monitor the patient's vital signs and to send an immediate signal to
are expressed as discrete digits or numbers and computations are the nurse's station if any abnormal readings are detected.
done with numerical digits. Mathematical expressions are
represented as binary digits (0 and 1) and all operations are done
using these binary digits at a very high rate. The digital computer
basically knows addition. Remaining operations, like multiplication
and division, are first converted -into addition and then calculated.
Digital computer is much faster than analog computer and the
users can carry it wherever they go. This group includes personal
digital assistant, pen-based computer, hand-held computer,
notebook computer and laptop computer.
(a) Personal Computer or Desktop Computer
Personal computer is a microprocessor based, single user computer.
The peripherals for personal computer include a keyboard and a
mouse as input devices, monitor to display information and a hard
disk for storage.
» Mainframe Computer
The earliest computers were callpd mainframes due to their size.
The term is still used for the large computers of today. They have
large storage capacities, very high speed of processing (compared to
» Workstations
micros and minis) and can support a large number of terminals
Workstation is a powerful computer which in terms of power is
(Many hundreds to thousands) for use by a variety of users
between personal computer and minicomputer. It has high
simultaneously. They are kept in air-conditioned environment in a
resolution graphics monitor, large RAM and secondary storage.
special computer room. They are used by big companies, banks,
Although it is a standalone system, usually it forms part of a
government departments, etc. as their main computer.
network and it uses Unix or Windows NT as operating system.
Workstations are used for specialised applications such as desktop
publishing, software development and engineering designs.
» Super computer
It is the fastest and the most expensive computer. This has extremely
Types of Computer- On the basic of purpose of use machine can be used to prepare paybills, manage inventories, print
sales reports, do scientific calculations and so on.
On the basis of purpose of use the computer can be classified into:
1. Special Purpose Computer
2. General Purpose Computer
• Although the two graphs look different in their appearance, • Data and instructions cannot be entered and processed
notice that they repeat themselves at equal time intervals. directly into computers using human language. Any type of
Electrical signals or waveforms of this nature are said to be data be it numbers, letters, special symbols, sound or pictures
periodic.Generally,a periodic wave representing a signal can must first be converted into machine-readable form i.e. binary
be described using the following parameters form. Due to this reason, it is important to understand how a
• Amplitude(A) computer together with its peripheral devices handles data in
• Frequency(f) its electronic circuits, on magnetic media and in optical
• periodic time(T) devices.
• Amplitude (A): this is the maximum displacement that the Data representation in digital circuits
waveform of an electric signal can attain.
• Frequency (f): is the number of cycles made by a signal in one • Electronic components, such as microprocessor, are made up
second. It is measured in hertz.1hert is equivalent to 1 of millions of electronic circuits. The availability of high
cycle/second. voltage(on) in these circuits is interpreted as ‘1’ while a low
• Periodic time (T): the time taken by a signal to complete one voltage (off) is interpreted as ‘0’.This concept can be
cycle is called periodic time. Periodic time is given by the compared to switching on and off an electric circuit. When
formula T=1/f, where f is the frequency of the wave. the switch is closed the high voltage in the circuit causes the
bulb to light (‘1’ state).on the other hand when the switch is
• When a digital signal is to be sent over analog telephone lines open, the bulb goes off (‘0’ state). This forms a basis for
e.g. e-mail, it has to be converted to analog signal. This is describing data representation in digital computers using the
done by connecting a device called a modem to the digital binary number system.
computer. This process of converting a digital signal to an
analog signal is known as modulation. On the receiving end, Data representation on magnetic media
• The laser beam reflected from the land is interpreted, as 1.The the use of binary are that digital devices are more reliable,
laser entering the pot is not reflected. This is interpreted as small and use less energy as compared to analog devices.
0.The reflected pattern of light from the rotating disk falls on
a receiving photoelectric detector that transforms the patterns Bits, bytes, nibble and word
into digital form.The presence of a magnetic field in one
direction on magnetic media is interpreted as 1; while the • The terms bits, bytes, nibble and word are used widely in
field in the opposite direction is interpreted as “0”.Magnetic reference to computer memory and data size.
technology is mostly used on storage devices that are coated • Bits: can be defined as either a binary, which can be 0, or 1.It
with special magnetic materials such as iron oxide. Data is is the basic unit of data or information in digital computers.
written on the media by arranging the magnetic dipoles of
some iron oxide particles to face in the same direction and • Byte: a group of bits (8 bits) used to represent a character. A
some others in the opposite direction byte is considered as the basic unit of measuring memory size
in computer.
Data representation on optical media • A nibble: is half a byte, which is usually a grouping of 4
bytes.
In optical devices, the presence of light is interpreted as ‘1’ while its
absence is interpreted as ‘0’.Optical devices use this technology to • Word: two or more bits make a word. The term word length
read or store data. Take example of a CD-ROM, if the shiny surface is used as the measure of the number of bits in each word. For
is placed under a powerful microscope, the surface is observed to example, a word can have a length of 16 bits, 32 bits, 64 bits
have very tiny holes called pits. The areas that do not have pits are etc.
called land.
Types of data representation
Reason for use of binary system in computers
• Computers not only process numbers, letters and special
• It has proved difficult to develop devices that can understand symbols but also complex types of data such as sound and
natural language directly due to the complexity of natural pictures. However, these complex types of data take a lot of
languages. However, it is easier to construct electric circuits memory and processor time when coded in binary form.
based on the binary or ON and OFF logic. All forms of data • This limitation necessitates the need to develop better ways of
can be represented in binary system format. Other reasons for handling long streams of binary digits.
• Higher number systems are used in computing to reduce must always be put so as to differentiate the number
these streams of binary digits into manageable form. This systems.
helps to improve the processing speed and optimize memory o The magnitude of a number can be considered using
usage. these parameters.
o Absolute value
Number systems and their representation o Place value or positional value
o Base value
o A number system is a set of symbols used to represent ▪ The absolute value is the magnitude of a digit
values derived from a common base or radix. in a number. for example the digit 5 in 7458 has
o As far as computers are concerned, number systems an absolute value of 5 according to its value in
can be classified into two major categories: the number line.
o decimal number system ▪ The place value of a digit in a number refers to
o binary number system the position of the digit in that number i.e.
o octal number system whether; tens, hundreds, thousands etc.
o hexadecimal number system ▪ The total value of a number is the sum of the
place value of each digit making the number.
Decimal number system ▪ The base value of a number also k known as
the radix, depends on the type of the number
o The term decimal is derived from a Latin prefix deci, systems that is being used .The value of any
which means ten. Decimal number system has ten number depends on the radix. for example the
digits ranging from 0-9. Because this system has ten number 10010 is not equivalent to 1002.
digits; it is also called a base ten number system or
denary number system. Binary number system
o A decimal number should always be written with a
It uses two digits namely, 1 and 0 to represent numbers. unlike in
subscript 10 e.g. X10
o But since this is the most widely used number system decimal numbers where the place value goes up in factors of ten, in
in the world, the subscript is usually understood and binary system, the place values increase by the factor of 2.binary
ignored in written work. However ,when many numbers are written as X2.consider a binary number such as
number systems are considered together, the subscript 10112.The right most digit has a place value of 1×20 while the left
most has a place value of 1×23.
Octal number system also be used. While most computer cases are rather dull, black,
metal boxes, some manufacturers try to give the unit some flair with
Consists of eight digits ranging from 0-7.the place value of octal color and special design elements.
numbers goes up in factors of eight from right to left.
System unit (chassis) is a set of electronic components of a
Hexadecimal number system
computer that provides the proper its operating. There are six main
This is a base 16 number system that consists of sixteen digits
system unit components:
ranging from 0-9 and letters A-F where A is equivalent to 10,B to 11
up to F which is equivalent to 15 in base ten system. The place value
1. Motherboard – a system core. Actually, it is a heart of
of hexadecimal numbers goes up in factors of sixteen.
computer. Other system elements are connected to
motherboard, and the whole system is managed and
• A hexadecimal number can be denoted using 16 as a
controlled by it. Motherboard contains special chips on
subscript or capital letter H to the right of the number .For
which some ICs (Integrated circ uits) are etched
example, 94B can be written as 94B16 or 94BH.
Definition
.
A typical desktop computer consists of a computer system unit, a
2. Processor – a computer engine, its brain. CPU (central
keyboard, a mouse, and a monitor. The computer system unit is the
processing unit) manages most of computer operations.
enclosure for all the other main interior components of a computer.
Processors can be with pins or pin-less. It contains a control
It is also called the computer case, computer chassis, or computer
unit and a logic unit.
tower. Cases are typically made of steel or aluminum, but plastic can
3. RAM (random access memory) – primarily memory. It Functions
storages all data processed by programs and apps on the
computer. There are dynamic and static RAMs. The primary function of the computer system unit is to hold all the
4. Hard Drive – a system memory that storages data in a form other components together and protect the sensitive electronic parts
of archives. Here all our files, folders, operating system, from the outside elements. A typical computer case is also large
programs, and applications are saved. Hard driver can be of enough to allow for upgrades, such as adding a second hard drive
two type: PATA (Parallel Attachment Packet Interface) and or a higher-quality video card. It is relatively easy to open up a
SATA (Serial Attachment Packet Interface). computer system unit to replace parts and install upgrades. In
5. Video Card (graphics adapter) – with its help the outputs contrast, it is quite difficult to open up a laptop computer, which is
from a computer are displayed on the screen. Modern video not designed with replacements and upgrades in mind.
cards support HDMI (high-definition multimedia interface),
VGA (video graphics array) and DVI (digital visual In most computer system units, the front side contains the elements
interface). a user needs frequently
6. Power Supply – provides every part of PC with electrical
power such as the power button, an optical disk drive, an audio outlet for a
pair of headphones, and a number of USB connections. The back
There were 6 Basic Components of a System unit namely: side contains all other connections - for power, monitor, keyboard,
mouse, Internet connection, and any other peripheral devices. There
1. Motherboard - The core of the Computer everything is are typically more connections than the minimum necessary to
connected to it. allow for expansion.
2. Processor - CPU ( Central Processing Unit ) the brain of the
PC.
3. RAM/ Memory stick - (Random Access Memory) holds all
program and data the processor is using at a given time.
4. Hard Drive - The main storage device of computer.
5. Video Card - Controls computer display via monitor.
6. Power Supply - Responsible of feeding electrical power to
every computer parts
Major components inside a computer case
The Headset
This enables you to specify the function of mouse buttons 1, 2 A headset can be thought of as a set of headphones equipped with a
and 3 when they are pressed on their own or in conjunction with microphone. The headset microphone is either a boom microphone,
modifier keys. You can assign up to five functions to each button. whereby the microphone is attached to a boom which can be moved
Clicking one of the arrow buttons will display a drop-down list box at will and positioned as desired, or alternatively it may be a
which lists all the standard functions that can be assigned: solution incorporating an in-line microphone, whereby the
microphone is attached to the cord which connects the headset to
the computer or other device.
The Headphones
Pointing stick A printer is a device that prints output to a page. Printers come in
color or simply black and white. Inkjet and laser printers are the
A pointing stick is a pressure-sensitive small nub used like a
most common home devices. Most businesses have laser printers
joystick. It is usually found on laptops embedded between the G, H,
since the quality is better and the output is faster. Printers can be
and B keys. It operates by sensing the force applied by the user.
connected to the computer or networked using a print server.
Touchpad
Speakers
A touchpad or trackpad is a flat surface that can detect finger
contact. It is a stationary pointing device, commonly used on laptop Speakers are attached to computers for the output of sound. Sound
computers. At least one physical button normally comes with the cards are required in the computer for speakers to function.
touchpad, but the user can also generate a mouse click by tapping Speakers range from simple, two-speaker output devices to
on the pad. surround-sound multi-channel units
Printers
Because laser printers are non-impact printers, they are much quieter
Secondary storage devices are used because:
than dotmatrix or daisy-wheel printers. They are also relatively fast,
although not as fast as some dot-matrix or daisy-wheel printers. The
1. Primary memory(RAM) is volatile and temporary. When
speed of laser printers ranges from about 4 to 20 pages of text per
computer is switched off, all data in ram is erased.
minute (ppm). A typical rate of 6ppm is equivalent to about 40
characters per second (cps).
2. Storage devices can store large amounts of data and a. Hard Disk b. Floppy Disk c. Zip Disk
instructions permanently whereas Primary memory has less
capacity of storing data.
a. Hard Disk
Types Of Storage Devices
1. Magnetic Tape
The hard disk is also called fixed disk. It consists of one or more
metal plates. The plates are fixed in the drive. Metal plates are
coated with magnetic material to store data. A motor rotates disks.
There is also an access arm and read / write heads to read and write
data on disks.
Magnetic tape is the oldest storage device. It is made of plastic Following are major characteristics of hard disk:
coated with magnetic material. Data is stored on magnetic tape in - The storage capacity of hard disk is much greater than floppy disk.
the form of magnetic spots. Tape drive is used to read and write - Now a days hard disks of size 40 GB, 80 GB or more are available.
data on tape. Magnetic disk is sequential access device. It is slower - Hard disk is covered in a hard jacket and there are less chances of
device than magnetic disk or optical disk. Magnetic tapes are used disk damage due to dust and mishandling.
in reels of different lengths, for example 200, 600, 1200 feet etc. - Now days Operating system and application programs are
installed on hard disk.
2. Magnetic Disk - Before using a magnetic disk we use operating system to format
the disk. Operating system divides the disk into circles called tracks.
A magnetic disk is a thin circular metal or plastic disk coated with Each track is divided into pie-shaped areas called sectors. Data is
magnetic material. Data is stored in the form of magnetic spots. stored in sectors. Each sector can store 512 bytes.
Magnetic disk is random access device. It is faster than magnetic
tape. There are three main types of magnetic disk: b. Floppy Disk
Zip disk is similar to 3 ½ inch floppy disk. But it can store 100 MB or
Floppy disk is a small plastic plate coated with magnetic material. more data. Zip disk drive is used to read and write data on a zip
Data is stored in magnetic spots. Main advantage of floppy disk is disk.
that it is used to transfer data from one computer to another. Floppy
disk drive is used to read and write data on floppy disk. 3. Optical Disk
Floppy disk is available in two sizes:
· 3 ½ INCH Floppy Disk LASER technology is used to read and write data on Optical disk.
It is also called micro floppy disk. Its diameter is 3½ inch. It is LASER stands for Light Amplification through Emission of
covered in a hard plastic cover. Read/Write window is covered with Radiation. Laser beam writes on the surface of optical disk by
a metal shutter. When disk is inserted into disk drive then shutter is creating very small holes. The presence of hole represents a One and
automatically opened. It can be write protected by a notch. Storage absence of the hole represents a Zero. There are following main
capacity of micro floppy is 1.44 MB. types of optical disk.
· 5¼ Inch floppy disk. 1.CD-ROM, 2. CD-R or WORM, 3. CD-RW
It is a 5¼ inch diameter plastic plate coated with magnetic material. 4.DVD-ROM, 5. DVD-R, 6. DVD-RW
Its storage capacity is 1.2 MB. It is not used in modern computers.
1. CD-ROM
c. Zip Disk
disk. User can store data on it only once. This is why it is also called
WORM(Write Once Read Many) disk too. Because we can write data
on it only once and later we can read many times. The devices to
store data on CD-R are called CD Writers or CD Burners. We can
write data on CD-R only once, but can read data many times.
Because of this write once read many quality, CD-R is often known
as WORM(write once read many).
3. CD-RW ( CD Rewritable )
DVD stands for Digital Video Disk. A laser beam with a short wave
length is used to create very very small holes on the surface of disk.
So there are much more tiny holes on the surface of DVD as
compared to that of CD. Therefore, storage capacity of DVD is much
larger than CD. It can store up to 17 GB or more data. DVD-ROM is
pre recorded and it can contain data like movies, videos and
software etc. User cannot change or delete data from DVD-ROM. It
is read only. There are several Benefits of using Digital Video Disk
or DVD.
5. DVD-R (DVD-Recordable)
DVD-RW stands for Digital Video Disk Rewritable. User can write
data on disk many times by erasing the old data.
Paavendhar College of Arts & Science, M.V.South Some examples of system software are Operating System,
Department of Computer Science Compilers, Interpreter, Assemblers, etc.
I M.Sc-Physics
Section A (5 Marks)
6. User management and support for logon and logoff, remote access;
4. Describe about the network operating system.(A’15) system management, administration and auditing tools with
graphical interfaces.
Mainly there are two types of network operating systems named as network of machines and provide users that are aware of using a set
peer-to-peer and client / server. of computers, with facilities designed to ease the use of remote
resources located over the network. These resources are made
Peer-to-peer network operating systems allow users to share available as services and might be printers, processors, file systems
resources and files located on their computers and to access shared or other devices. Some resources, of which dedicated hardware
resources found on other computers. In a peer-to-peer network, all devices such as printers, tape drives are connected to and managed
computers are considered equal; they all have the same privileges to by a particular machine and are made available to other machines in
use the resources available on the network. Peer-to-peer networks are the network via a service. A typical example of such a system is a set
designed primarily for small to medium local area networks. of workstations connected together through a local area network
Windows for Workgroups is an example of the program that can (LAN). Every workstation has its own operating system every user
function as peer-to-peer network operating systems. has its own workstation in exclusive use and cooperates with each
other to allow a variety of facilities including sharing of files,
Client/server network operating systems allow the network to sharing of hardware resources and execution of remote machines
centralize functions and applications in one or more dedicated file etc. A user can execute a login command in order to connect to
servers. The file servers become the heart of the system, providing another station and also can access a set of shared files maintained
access to resources and providing security. The workstations (clients) by a workstation named/file server.
have access to the resources available on the file servers. The network
operating system allows multiple users to simultaneously share the 5. Explain functions of operating system.
same resources irrespective of physical location. Novell Netware and An Operating System (OS) is an interface between a
Windows 2000Server are examples of client/ server network computer user and computer hardware. An operating system is a
operating systems. software which performs all the basic tasks like file management,
memory management, process management, handling input and
Each computer in the workgroup run an autonomous operating output, and controlling peripheral devices such as disk drives and
system; yet cooperate with each other to allow a variety of facilities printers.
including sharing of files, sharing of hardware resources and
execution of remote machines etc. Some popular Operating Systems include Linux, Windows, OS X,
VMS, OS/400, AIX, z/OS, etc.
Network operating systems are implementations of loosely coupled
operating systems on top of loosely coupled hardware. Network Definition
operating\systems are the software that supports the use of a
An operating system is a program that acts as an interface between • Control over system performance
the user and the computer hardware and controls the execution of • Job accounting
all kinds of programs. • Error detecting aids
• Coordination between other software and users
Memory Management
Device Management Following are some of the important activities that an Operating
System performs −
An Operating System manages device communication via their
respective drivers. It does the following activities for device • Security − By means of password and similar other
management − techniques, it prevents unauthorized access to programs and
data.
• Keeps tracks of all devices. Program responsible for this task • Control over system performance − Recording delays
is known as the I/O controller. between request for a service and response from the system.
• Decides which process gets the device when and for how • Job accounting − Keeping track of time and resources used
much time. by various jobs and users.
• Allocates the device in the efficient way. • Error detecting aids − Production of dumps, traces, error
• De-allocates devices. messages, and other debugging and error detecting aids.
• Coordination between other softwares and users −
File Management Coordination and assignment of compilers, interpreters,
assemblers and other software to the various users of the
A file system is normally organized into directories for easy computer systems.
navigation and usage. These directories may contain files and other
directions.
• Keeps track of information, location, uses, status etc. The 6.Describe about various application software.(N’16)
collective facilities are often known as file system.
• Decides who gets the resources.
Application Software Features of application software are as follows −
Application software products are designed to satisfy a particular • Close to the user
need of a particular environment. All software applications • Easy to design
prepared in the computer lab can come under the category of • More interactive
Application software. • Slow in speed
• Generally written in high-level language
Application software may consist of a single program, such as • Easy to understand
Microsoft's notepad for writing and editing a simple text. It may also • Easy to manipulate and use
consist of a collection of programs, often called a software package, • Bigger in size and requires large storage space
which work together to accomplish a task, such as a spreadsheet
package.
Examples of Application software are the following − 7.Explain graphics and multimedia software.(N’15)
Windows Presentation Foundation (WPF) provides support
• Payroll Software for multimedia, vector graphics, animation, and content
• Student Record Software composition, making it easy for developers to build interesting user
• Inventory Management Software interfaces and content. Using Microsoft Visual Studio, you can
• Income Tax Software create vector graphics or complex animations and integrate media
• Railways Reservation Software into your applications.
• Microsoft Office Suite Software
• Microsoft Word everal changes have been made related to graphics and
• Microsoft Excel animations.
• Microsoft PowerPoint
• Layout Rounding
• Easing Functions
2-D Geometries
When the 2-D shapes that WPF provides are not sufficient, you can
use WPF support for geometries and paths to create your own. The
following illustration shows how you can use geometries to create
shapes, as a drawing brush, and to clip other WPF elements.
3-D Rendering
2-D Effects WPF provides a set of 3-D rendering capabilities that integrate with
2-D graphics support in WPF in order for you to create more
WPF provides a library of 2-D classes that you can use to create a exciting layout, UI, and data visualization. At one end of the
variety of effects. The 2-D rendering capability of WPF provides the spectrum, WPF enables you to render 2-D images onto the surfaces
ability to paint UI elements that have gradients, bitmaps, drawings, of 3-D shapes, which the following illustration demonstrates.
and videos; and to manipulate them by using rotation, scaling, and
.
Use animation to make controls and elements grow, shake, spin, and
fade; and to create interesting page transitions, and more. Because The Operating System is a program with the following features −
WPF enables you to animate most properties, not only can you
animate most WPF objects, you can also use WPF to animate custom • An operating system is a program that acts as an interface
objects that you create. between the software and the computer hardware.
• It is an integrated set of specialized programs used to manage
overall resources and operations of the computer.
• It is a specialized software that controls and monitors the A special computer DNS (Domain Name Server) is used to provide
execution of all other programs that reside in the computer, a name to the IP Address so that the user can locate a computer by a
including application programs and other system software. name. For example, a DNS server will resolve a name
Subject Name: EDC Unit: IV Internet is accessible to every user all over the world.
1. Define internet and write a short note on world wide Intranet is the system in which multiple PCs are connected to each
web(N’16) other. PCs in intranet are not available to the world outside the
intranet. Usually each organization has its own Intranet network
Internet and members/employees of that organization can access the
computers in their intranet.
It is a worldwide/global system of interconnected computer
networks. It uses the standard Internet Protocol (TCP/IP). Every
computer in Internet is identified by a unique IP address. IP
Address is a unique set of numbers (such as 110.22.33.114) which
identifies a computer’s location.
2. Explain in detail about networks communication
standards(N’16)
• Intranet uses the internet protocols such as TCP/IP and FTP. OSI REFERENCE MODEL:
• Intranet sites are accessible via the web browser in a similar
way as websites in the internet. However, only members of Application
Intranet network can access intranet hosted sites. Presentation Session
• In Intranet, own instant messengers can be used as similar to
Transport
yahoo messenger/gtalk over the internet.
Network
Differences between Internet and Intranet Data Link
Physical
• Internet is general to PCs all over the world whereas Intranet Application
is specific to few PCs.
• Internet provides a wider and better access to websites to a
large population, whereas Intranet is restricted.
• Internet is not as safe as Intranet. Intranet can be safely The Open System Interconnection (OSI) model includes a set of
privatized as per the need. protocols that attempt to define and standardize the data
communications process. The OSI protocols were defined by the maintains, and, terminates logical and physical connections across
International Organization for Standardization (ISO).) multiple interconnected networks. A key aspect of this transfer is the
routing of packets from the source to the destination machine
The OSI model is not a single definition of how data typically traversing number of transmission links and network
communications actually takes place in the real world. Numerous nodes where routing is carried out Routing is the process by which a
protocols may exist at each layer. The OSI model states how the path is selected out of many available paths to the destination so
process should be divided and what protocols should be used at that data packet reaches the destination fast, efficiently, reliably as
each layer. If a network vendor implements one of the protocols at required. This function makes the network most complex layer in
each layer, its network components should work with other vendor’’ the reference model. Also network layer is responsible for.
offerings. The OSI model has seven layer Translating logical addresses, or names, into physical (or data-link)
addresses it provides flow- control functions across the computer-
1. The Physical layer provide/the electrical and mechanical 1nterf network interface
ace to the network, medium (the cable). This layer gives the data-
link layer (layer 2) its ability to transport a stream of serial data bits 4. The Transport layer ensures data is successfully sent and received
between two communicating systems; it conveys the bits that move between two end nodes. If data is sent incorrectly, this layer has the
along the cable. It is responsible for making sure that the raw bits responsibility to ask for retransmission of the data. Also it ensures
get from one place to another, no matter what shape they are in, and data are passed onto the upper layers in the same order in which
(deals with the mechanical and electrical characteristics of the cable) they were sent. Specifically, it provides a reliable, network-
independent message-interchange service to the top three
2. (The Data-Link layer handles the physical transfer, ‘framing (the Application-oriented layers. This layer acts as an interface between
assembly of data into a single unit or block), and flow control and the bottom and top three layer By providing the session layer (layer
error-control functions over a single transmission link) it is 5) with a reliable message transfer service, it hides the detailed
responsible for getting the data packaged for the Physical layer. The operation of the underlying network from the session layer
data link layer provides the network layer (layer 3) reliable
information-transfer capabilities) The data-link layer is often 5. The Session layer decides when to turn communication on and off
subdivided into two parts-Logical Link Control (LLC) and Medium between two computers. It provides the mechanisms that control the
Access Control (MAC)-depending on the implementation data-exchange process and coordinates the interaction between
them.lt sets up and clears communication channels between two
3. The Network layer provides for the transfer of data in the form of communicating components. Unlike the network layer (layer 3), it
packets across the communication networks. It establishes, deals with the programs running in each machine to establish
conversations between them. Some of the most commonly Technology plays a central role in searching for information. Online
encountered protocol stacks, including TCP/IP, don’t implement a reference material, such as Encyclopedia Britannica Online, offer
session layer. vast amounts of content supplemented by engaging multimedia and
interactive links. E-book collections offer thousands of texts, and the
6. The Presentation layer performs code conversion and data sheer number of online articles and journals devoted to every
reformatting (syntax translation). It is the translator of the network, imaginable topic make research efficient and highly rewarding.
making sure the data is in the correct form for the receiving Information technology thus plays a key role in the development of
application Of course, both the sending and receiving applications the autonomous learner.
must be able to use data subscribing to one of the available abstract
data syntax forms. Most commonly, applications handle these sorts Creativity and Self-Expression:
of data translations themselves rather than’ handing them off to a
Presentation layer. Information and communication technology also plays a role in
expressing ourselves. Aided by the digital recording functions
7. The Application layer provides the interface between the software integrated into smartphones, tablets and other electronic devices, we
running in a computer and the network. It provides functions to the are able to index the world the way they see it and add their own
user’s software, including file transfer access and management perspective to already existing bodies of knowledge to create
(FTAM) and electronic mail service original work. With audio, photo and video editing software and the
various ways to post self-created media on the Web, we can not only
3. Write a short notes on uses of computer access information but also contribute to its creation. The ability to
communications(A’15) be active members of the learning community, whether on the small
Computers are critical for communication and are the scale of a school’s social media site or on the larger canvas of the
centerpiece of information technology. The early 1990s saw the entire World Wide Web, gives their work broader significance and
emergence of household Internet use, which eventually spurred affirmation.
common use of email, websites, blogs, social networking, video chat
and Voice-Over-Internet Protocol. Today, many traditional Communication and Collaboration:
communication modes including postal mail and landline phones
seem obsolete. Information and communication technology provides more
opportunities to communicate and collaborate. With Learning
Information Access: Management Systems such as Blackboard, many courses have an
online space to participate in discussion threads and forums, chats,
and video conferences. Collaborative functions in office applications Social networking sites including Facebook, Twitter and LinkedIn
allow us to view revisions and add comments in real time, making allow users to rapidly generate content for people in their network
the process of relaying feedback more efficient. to view. Rather than sending individual notes, social networking
provides a constant stream of updates and information. These
computer tools have taken communication a step further than email
due to their ability to instantly communicate life and status updates
Internet: to an entire network of people who can respond and comment to
such notes in real time. Unlike email’s distribution lists — which
The World Wide Web, Internet and email revolutionized the way essentially could transfer the same information to large groups of
individuals communicate with each other. Rather than waiting days people — social networking’s streamlined and user-friendly
or weeks to see information, we can now view all information at the interface precludes information overload that occurs from
speed of light. Email has fundamentally transformed how people attempting the same functions in an email program.
share information and conduct business based on the speed and
flexibility it offers. Computers can process data at approximately 20 Routing:
million bytes per second so it is easy for them to download and
instantly display almost any text email. While it is not a personal computer, routers are types of computers
used to direct communication traffic. They are crucial to the efficient
VOIP and Video Chat: and correct distribution of calls, emails or another Internet traffic.
Routers take “packets” of electronic data and send them in the
Voice-Over-Internet Protocol — or VOIP — replaced the need for direction to connect with the intended person. They can be used in
landline telephones in many instances. These lines can provide the home but are also held in central data warehouses where hubs of
instant phone communication over the Internet, and often are traffic are routed in the same place.
cheaper than fixed phone lines. They also provide the ability to
conduct video chats to see whom you are speaking with. VOIP
platforms also store contact details for easy accessibility and 4. Write about E-commerce(A’15).
dialling. The current drawback to VOIP, as of May 2011, is that 911
operators cannot trace the call back to the location. Electronic commerce or e-commerce refers to a wide range of
online business activities for products and services. It also pertains
Social Networking: to “any form of business transaction in which the parties interact
electronically rather than by physical exchanges or direct physical • Web-based commerce enablers (e.g., Commerce One, a
contact.” browser-based, XML-enabled purchasing automation
software).
E-commerce is usually associated with buying and selling over the
Internet, or conducting any transaction involving the transfer of E-markets are simply defined as Web sites where buyers and sellers
ownership or rights to use goods or services through a computer- interact with each other and conduct transactions
mediated network Though popular, this definition is not
comprehensive enough to capture recent developments in this new In C2B transactions, customers/consumers are given more influence
and revolutionary business phenomenon. A more complete over what and how products are made and how services are
definition is: E-commerce is the use of electronic communications delivered, thereby broadening consumer choices. E-commerce
and digital information processing technology in business allows for a faster and more open process, with customers having
transactions to create, transform, and redefine relationships for greater control.
value creation between or among organizations, and between
organizations and individuals. E-commerce makes information on products and the market as a
whole readily available and accessible, and increases price
• gistics - transportation, warehousing and distribution (e.g., transparency, which enable customers to make more appropriate
Procter and Gamble); purchasing decisions.
• application service providers - deployment, hosting and
management of packaged software from a central facility The Internet allows people from all over the world to get connected
(e.g., Oracle and Linkshare); inexpensively and reliably. As a technical infrastructure, it is a
• outsourcing of functions in the process of e-commerce, such global collection of networks, connected to share information using
as Web-hosting, security and customer care solutions (e.g., a common set of protocols. Also, as a vast network of people and
outsourcing providers such as eShare, NetSales, iXL information, the Internet is an enabler for e-commerce as it allows
Enterprises and Universal Access); businesses to showcase and sell their products and services online
• auction solutions software for the operation and maintenance and gives potential customers, prospects, and business partners
of real-time auctions in the Internet (e.g., Moai Technologies access to information about these businesses and their products and
and OpenSite Technologies); services that would lead to purchase.
• content management software for the facilitation of Web site
content management and delivery (e.g., Interwoven and Before the Internet was utilized for commercial purposes, companies
ProcureNet); and used private networks-such as the EDI or Electronic Data
Interchange-to transact business with each other. That was the early
form of e-commerce. However, installing and maintaining private
networks was very expensive. With the Internet, e-commerce spread
rapidly because of the lower costs involved and because the Internet
is based on open standards
Internet Addresses
But what if you don't know the IP address of the computer you want
to connect to? What if the you need to access a web server referred
to as www.anothercomputer.com? How does your web browser know
where on the Internet this computer lives? The answer to all these
questions is the Domain Name Service or DNS. The DNS is a
distributed database which keeps track of computer's names and
their corresponding IP addresses on the Internet.
UTP- This is the most popular and generally the best option for
schools.
COAXIAL CABLE :
Microwave Transmission:
Above 100 MHz, the waves travel in nearly straight lines and can
therefore be narrowly focused. Concentrating all the energy into a
small beam by means of a parabolic antenna (like the familiar satellite
TV dish) gives a much higher signal-to-noise ratio, but the
transmitting and receiving antennas must be accurately aligned with
each other.
Radio Transmission: Unguided infrared and millimeter waves are widely used for short-
range communication. The remote controls used on televisions,
Radio waves frequency are easy to generate, can travel long distances, VCRs, and stereos all use infrared communication. They are relatively
and can penetrate buildings easily, so they are widely used for directional, cheap, and easy to build but have a major drawback: they
communication, both indoors and outdoors. Radio waves also are do not pass through solid objects (try standing between your remote
omnidirectional, meaning that they travel in all directions from the control and your television and see if it still works). On the other
source, so the transmitter and receiver do not have to be carefully hand, the fact that infrared waves do not pass through solid walls
aligned physically. well is also a plus. It means that an infrared system in one room of a
building will not interfere with a similar system in adjacent rooms or
Sometimes omnidirectional radio is good, but sometimes it is bad. In buildings.
the 1970s, General Motors decided to equip all its new Cadillacs with
computer-controlled antilock brakes. When the driver stepped on the
brake pedal, the computer pulsed the brakes on and off instead of
locking them on hard. One fine day an Ohio Highway Patrolman
began using his new mobile radio to call headquarters, and suddenly
Paavendhar College of Arts & Science, M.V.South Database administration is more of an operational or technical level
Department of Computer Science function responsible for physical database design, security
I M.Sc-Physics enforcement, and database performance. Tasks include maintaining
the data dictionary, monitoring performance, and enforcing
Subject Name: EDC Unit: V organizational standards and security.
1. write down the functions of DBA • Keep up with current technological trends
• Predict future changes
A data administration (also known as a database administration • Emphasis on established off the shelf products
manager, data architect, or information center manager) is a high
level function responsible for the overall management of data 2. Managing data security and privacy
resources in an organization. In order to perform its duties, the DA
must know a good deal of system analysis and programming. • Protection of data against accidental or intentional loss,
destruction, or misuse
• These are the functions of a data administrator (not to be • Firewalls
confused with database administrator functions): • Establishment of user privileges
• Data policies, procedures, standards • Complicated by use of distributed systems such as internet
• Planning- development of organization's IT strategy, access and client/ server technology.
enterprise model, cost/benefit model, design of database
environment, and administration plan.
• Data conflict (ownership) resolution 2. Write about risks in computer security
• Data analysis- Define and model data requirements, business
Backdoor
rules, operational requirements, and maintain corporate data
dictionary A backdoor in a computer system, a cryptosystem or an
• Internal marketing of DA concepts algorithm, is any secret method of bypassing normal authentication
• Managing the data repository or security controls. They may exist for a number of reasons,
including by original design or from poor configuration. They may
have been added by an authorized party to allow some legitimate
access, or by an attacker for malicious reasons; but regardless of the Spoofing
motives for their existence, they create a vulnerability. Spoofing is the act of masquerading as a valid entity through
Direct-access attacks falsification of data (such as an IP address or username), in order to
gain access to information or resources that one is otherwise
An unauthorized user gaining physical access to a computer
is most likely able to directly copy data from it. They may also unauthorized to obtain
compromise security by making operating system modifications,
Email spoofing, where an attacker forges the sending (From, or
installing software worms, keyloggers, covert listening devices or
source) address of an email.
using wireless mice.[6] Even when the system is protected by
IP address spoofing, where an attacker alters the source IP
standard security measures, these may be able to be by-passed by
address in a network packet to hide their identity or impersonate
booting another operating system or tool from a CD-ROM or other
another computing system.
bootable media. Disk encryption and Trusted Platform Module are
MAC spoofing, where an attacker modifies the Media Access
designed to prevent these attacks.
Control (MAC) address of their network interface to pose as a valid
user on a network.
Eavesdropping Biometric spoofing, where an attacker produces a fake biometric
sample to pose as another user.
Eavesdropping is the act of surreptitiously listening to a private
conversation, typically between hosts on a network. For instance, 3. Write a short notes on Attacks
programs such as Carnivore and NarusInSight have been used by
the FBI and NSA to eavesdrop on the systems of internet service Basic Network Attacks
providers. Even machines that operate as a closed system (i.e., with
no contact to the outside world) can be eavesdropped upon via Many people rely on the Internet for many of their professional,
monitoring the faint electro-magnetic transmissions generated by social and personal activites. But there are also people who attempt
the hardware; TEMPEST is a specification by the NSA referring to to damage our Internet-connected computers, violate our privacy
these attacks. and render inoperable the Internet services.
OODB
8.Explain relational database and object oriented database. An object-oriented database (OODB) stores data in objects. An
object is an item that contains data, as well as the actions that read or
process the data. A Student object, for example, might contain data
about a student such as Student ID, First Name, Last Name,
Address, and so on. It also could contain instructions about how to
print a student transcript or the formula required to calculate a
student’s grade point average.