Notes ICT
Notes ICT
Introduction to
Computing Application
1st Semester
Compiled by:
Shahid Imran
1|Page
Q. WHAT IS COMPUTER? DESCRIBE CHARACTERSTICS AND USES
OF COMPUTER IN DETAIL.
COMPUTER:
Now a day, the applications of computer are on almost every aspect of our daily lives.
As like many ordinary objects around us, we may need clearer understanding of what
they are. You may ask "What is a computer?" or "What is a software", or "What is a
programming language?" Let’s have some introduction of computer.
Every one of us is well aware of the word “Computer”, we see computers everywhere
in shape of Personal Computer (PC), Laptops, Mobile Phones, Tablet Pc, ATM
Machines and Bar code readers etc. Computer becomes the most important electronic
device in every aspect of life for human beings, our daily life activities become very
easy, efficient, and quick with the use computers.
DEFINITION:
The word computer is derived from the “compute”, which means to calculate or to
count. So by word, we may define computer as a device which helps us in counting or
calculation, but modern computers are doing much more working than simple
calculations. Therefore, we may define “computer is an electronic device, operating
under the control of instructions, it can accepts data as in input, processes the data
according to predefined rules, produces results, and stores the results for future
use.”. This definition indicates that computer is a machine which is totally dependent
on human instructions to perform specific action.
Storage
Computers have large storage capacity,
secondary storage devices are the key for
data storage. User can store data to retrieve it for future use. The examples for various
secondary devices are Hard Disk, Optical disks (CD and DVD), Zip drives, Pen drives
etc.
Accuracy
Computers are strictly working according to the predefined rules so the degree of their
accuracy is very high. There may be errors in the result but these errors in computing
2|Page
are due to human rather than due to technological weakness. If we enter wrong data
then the results can never be accurate.
Diligence
As computer is a machine so it is free from tiredness, lack of concentration and
fatigue, etc. It can work for hours without creating any error with same speed and
same level of accuracy. This capability of computers makes them able to overpower
humans in routine life work.
Versatility
Computer is very versatile machine, it can do different nature of tasks at the same
time and you can listen the music, while preparing your financial statements and also
can chat with friends at the same time.
Power of Remembering
The computers have great power of remembrance; data once stored can retrieve at any
time. We can store large amount of data on computers for future use and computer
never forget the data and return us as we stored on them.
No IQ
Computer is a machine so it can do nothing by itself, it is fully dependant on human
instructions. The IQ level of computer is zero, so it is called as dumb machine. It is
humans who decide which task to do and when to do.
No Feelings
Computer does not have any kind of feelings; they can never feel bad or good about
any event, situation or happening. They just act upon the instructions given by the
humans without any complaint, protest and criticism.
USES OF COMPUTER
Due the variety of their characteristics computers
are used in every field of life and they become the
necessity of every profession. Teachers are using
the computers to prepare notes, time tables,
results and other reports, students are using the
computers to complete their assignments, research
about their thesis and many more educational
tasks. Engineers, architects, jewelers, and
filmmakers all use computers to design things.
Teachers, writers, and most office workers use
computers for research, word processing and
emailing. Small businesses can use computers as
a point of sale and for general record keeping.
Following are some fields in which computers are playing vital role to enhance the
capabilities of the humans to deliver better results:
3|Page
Education
In education field computers are used in multiple ways, computers are not only
helping the teachers and students in the academic activities but also a major source of
information and education. It helps the students to prepare better presentation, notes,
project, assignments and thesis. With the help of internet it is quite possible for the
students to get access to the teacher on distance through e-learning. Universities all
over the world are running online educational programs and students are getting
diplomas and degrees via electronic learning (E-Learning).
Computers are used as aid for education this term is called computer aided learning,
in which
Medical Field
In health care computers are used for different purposes i.e. doctors are using these
devices to diagnose different diseases, to keep the records of the patients, to monitor
the vital signs of the patients even during surgery these devices help the surgeons for
better precision during operations.
Entertainment
Computers are widely used for entertainment purposes. We can play games, watch
movies, listen music and can attend a concert on computer. Animated movies and
cartoons are created and designed on computers.
Manufacturing
Manufacturing industry uses computers for different processes of during development
of their products. Computer Aided Manufacturing (CAM) & Computer Aided
Designing (CAD) software are used to reduce the costs of designing and
manufacturing of the products.
Sports
Computers have entirely changed the world of sports, we can keep history record of
players on computers, which is used by the analyst during any games, computerized
score board in different games are very helpful and entertaining. Different types of
comparative graphs can easily be made on computers.
Tourism
Computers offer great help for tourists, one can plan his trip with the help of
computer, tourist can find the places of their interests; reserve airline tickets, book
hotel rooms can learn new cultures with the help of computers via internet. With the
help of GPRS one can find the nearest key places at any location.
Banking
The deployment of computers in banking sector has entirely changed the system since
last 20 years. Now ATM machine is working as a cashier, we can easily, quickly and
safely transfer funds, pay our utility bills, get vouchers of mobile prepaid connections
with the help of online banking.
4|Page
Q. DESCRIBE COMPUTER GENERATIONS IN DETAILS.
COMPUTER GENERATIONS
The development and growth of computer was started in 16th century and today we
see the result of the evolution. In 20th century, with the development of electronic
computers this industry grew very rapidly. This rapid growth is divided in to 5 major
periods which are commonly known as Generations. Each of these generations of
computers is distinguished by a major technological development that fundamentally
changed the way computers operate, resulting in increasingly smaller, cheaper, more
powerful and more efficient and reliable computing devices.
Era:
The era of 1st generation computers is 1940-1956
Technology Used:
These computers used vacuum tubes for circuitry and magnetic drums for memory,
and were very huge in size that taking up entire rooms.
Examples:
ENIAC
EDVAC
UNIVAC
IBM-701
IBM-650
ENIAC UNIVAC-1
5|Page
Advantages
1. The development of these computers made possible the advent of electronic
digital computers.
2. These computers were the fastest calculating devices of their time.
3. They could perform computations in milliseconds.
Disadvantages
1. These computers were too bulky in size.
2. Due to the huge size they were non portable, and it is impossible to move
these computers from one place to another.
3. Manual assembly of individual components into functioning unit required.
4. Air conditioning was must required for these computers.
5. These computers were not reliable computer machines.
6. Thousands of vacuum tubes that were used emitted large amount of heat and
burnt out frequently
7. These computers faced frequent hardware failures.
8. Constant maintenance was required for these computers.
9. Commercial production was difficult and costly.
10. Limited commercial use.
Era:
The era of 2nd generation computers is around 1956-1963.
Technology used:
In this generation, the transistor were replaced with vacuum tubes, with the use of
transistors the computers became cheaper, faster, consumed less power, more
compact in size and more reliable. In these computers, magnetic cores were used as
primary memory and magnetic tape and magnetic disks were used as storage devices.
The programming languages such as COBOL, FORTRAN were developed during this
period.
6|Page
Examples:
Some of the computers of the Second Generation were:
IBM 1620: Its size was smaller as compared to First Generation computers and
mostly used for scientific purpose.
IBM 1401: Its size was small to medium and used for business applications.
CDC 3600: Its size was large and is used for scientific purposes.
Advantages
These computers were smaller in size as compared to first generation
computers.
These computers were more reliable.
While replacing transistors these computers generate less amount of heat.
These were the faster computer.
Hardware failures ration become low.
Wider commercial use.
Disadvantages
Air-conditioning required in most of the cases.
These computers need frequent maintenance.
Manual assembly of individual components into a functioning unit was
required, due to which labor cost increases.
Commercial production was difficult and costly.
Era:
The era of third generation computers was 1964-1971.
Technology:
The technological development of the integrated circuit was the major breakthrough
in the history of computers. By using this technology Transistors were miniaturized
and placed on silicon chips, called semiconductors, which drastically increased the
speed and efficiency of computers. The third generation computers were introduced in
1964. They used Integrated Circuits (ICs). These ICs are popularly known as Chips. A
single IC has many transistors, registers and capacitors built on a single thin slice of
silicon.
Input devices like keyboard and output devices like monitors were introduced in these
computers and interfaced with an operating system, which allowed the device to run
many different applications at one time with a central program which monitored the
memory.
Advantages
These computers were smaller in size as compared to previous generation
computers.
The speed of these computers was very high.
They were easily portable computers and can be moved from one place to
another.
These computers were more reliable than second-generation computers.
7|Page
Less power requirement than previous generation computers.
Maintenance cost of these computers was low because hardware failures are
rare.
They were totally general purpose computer so they were widely used for
various commercial applications all over the world.
Manual assembly of individual components into a functioning unit not
required. So human labour and cost involved at assembly stage reduced
drastically.
Commercial production was easier and cheaper.
Disadvantages
Air-conditioning required in many cases.
Highly sophisticated technology required for the manufacture of IC chips.
Examples:
IBM-360 series
Honeywell-6000 series
PDP(Personal Data Processor)
IBM-370/168
TDC-316
Era:
The present day computers that we are using today are the fourth generation
computers that started around 1975.
Technology:
Fourth Generation computers are the modern day computers. The Size started to go
down with the improvement in the Integrated Circuits. Very Large Scale(VLSI) and
Ultra Large scale(ULSI) ensured that millions of components could be fit into a small
chip. It reduced the size and price of the computers at the same time increasing power,
efficiency and reliability.
Advantages
The use of microprocessor makes these computers very small in size.
8|Page
Much faster in computation than previous generations.
Hardware failure is negligible.
These computers are very reliable.
No air conditioning required in most cases.
Easily portable because of their small size.
Disadvantage
Highly complicated technology is required for the manufacturing of these
chips.
Very few countries can afford to have this manufacturing technology.
Highly trained and skilled staff is required for manufacturing.
9|Page
Q. WHAT ARE DIFFERENT CLASSIFICATIONS OF COMPTUER?
CLASSIFICATION OF COMPUTER
We can classify computers on the basis of their physical size, processing speed and
price. Some of the computers are general purposes which are used in different fields
of life and some are special purposes which are designed for specific environment or
even for specific organization, so according to the requirements they vary in size,
speed and cost. Computers can be classified in following classes:
Micro Computers
Mini Computers or Mini-frame Computers
Mainframe Computers
Supercomputers
Microcomputer:
Microcomputers are the smallest computers available for the use of single person at a
time. They are the slower and cheaper computers then other classes of computers. The
processor used in these computers is called micro processor.
These computers are available in variety of different types, so they can further divided
in following categories:
Personal Computers (PC)
Laptop Computers
Game consoles
Tablet PC
Smart Phones
PDA
Portable Media Players
Personal Computers
A personal computer (PC) is a general purpose computer, which is designed
for the use of individuals. First PC was introduced by IBM in 1972, with the
advent of PCs the computer industry grew drastically.
There are two popular types of PCs are used i.e. Desktop Computers and
Laptop Computers.
10 | P a g e
Desktop Computers
This type of computer fit on a desk or table so it is called desktop
computer. In many models, the system unit (Casing) is a tall and narrow
tower, which can sit on the floor vertically, and other models have casing
placed horizontally on the desk.
Laptop Computers
A laptop computer is designed to fit on your lap, an easily portable, thin
and lightweight computer which fits in a carrying bag, but yet it can be as
powerful as the average desktop computer. Laptop computers are
operated on special rechargeable batteries or a power supply or both.
Game Consoles
Game consoles are handheld computing devices used to play video
games. They have multiple buttons, a display screen and game controller
handles. They also have storage capacity to store data of video games.
They are single as well as multi user consoles.
Tablet PC
Tablet PCs Resembling a letter-sized slate, the Tablet PC is a special type
of notebook computer that allows you to write or draw on the screen
using a digital pen. For users who prefer typing instead of handwriting,
some Tablet PCs have an attached keyboard; others allow you to connect
a separate keyboard to the device. Most Tablet PCs have touch screens.
Smart Phones
A smart phone is an Internet-enabled cell phone that also provides
personal information management functions like calendar, appointment
book, address book etc. It is also used to receive or make phone calls and
for messaging.
PDAs
A PDA (Personal Digital Assistant) is industry-specific computing device
that usually serves the needs of mobile employees, such as order takers,
meter readers and parcel delivery people, whose jobs require them to
move from place to place in order to collect data from multiple places.
11 | P a g e
A meter reader is using PDA Smart Phone
Mini Computer:
They are also referred to as server computers or midrange computers. These
computers are very much attractive to mid level economy users. These computers
have multiple processors which enhance their processing capabilities and large
storage capacity which enable these computers to process large amount of data and
can work as server in LAN (Local Area Network) environment to provide services up
to thousands of computers.
Advantages:
These computers are faster than the micro computers.
Due to high speed these computers are used as server in networking
environment.
These computers are easily available in markets.
These computers are economical servers.
These computers have large storage capacity.
Mini computers are used as data server in mid level organizations.
They support high graphic software and video games.
12 | P a g e
Mainframe Computer:
These are the large server computers that can serve hundreds or even thousands of
computers connected to them. These systems are used to control the whole
organization. They contain a large number of self-maintenance features, including
built-in security features and high data handling capacity. They operate at very high
speed, have very large storage capacity and can handle the work load of many users.
They are generally used in centralized databases. They are also used as controlling
nodes in Wide Area Networks (WAN).
Advantages:
These computers are used for high level computing
They support the feature of virtualization by which it can be divided into
logical partitions.
System administration becomes very easy.
They are much reliable computers and can detect, report, and self-recover
from system problems.
They have high security and can be secured at different levels.
They are known for their long lasting performance.
Disadvantages:
The main disadvantage of these computers is high maintenance cost.
They are the larger computers, so they occupy huge space.
They are not easily available in market.
Skilled staff required to run and maintain these computers.
Manufacturer:
IBM and HP are the major manufacturers of mainframe computers.
Mainframe Computers
Supercomputer:
Supercomputers are the fastest, most powerful and most expensive computers of
today. These are the large computers or collection of computers act as large computer
capable of processing huge amount of data. They have high processing speed
compared to other computers. They have also multiprocessing technique. One of the
13 | P a g e
ways in which supercomputers are built is by interconnecting thousands of
microprocessors.
Uses:
Supercomputers are mainly being used for weather forecasting, biomedical research,
remote sensing, aircraft design and other areas of science and technology.
Manufacturer:
IBM and Cray are the major manufacturers of supercomputers.
14 | P a g e
Q. DESCRIBE THE TYPE OF COMPUTERS. WHAT IS DIFFERENCE
IN ANALOG AND DIGITAL COMPUTER?
Answer:
On the basis of their functions, data input and output techniques computers can be
divided into following types:
Analog computers
Digital computers
Hybrid computer
Analog Computers
An analog computer is a computer which receives analog data as input and returns the
result on a meter or graph. Analog data is continuous measurement of a physical
property of an object. Speedo meter of bike or car is an example of analog computer,
in Speedo meter the rotation of tires per second is feed as an input and output is
shown on a graph in shape of speeds in kilometers per hour.
These computers are normally slow in speed and having low capacity of memory to
store data and output. The results provided by these computers are not highly reliable
and degree of error is high.
These computers are designed and built for specific purpose and majority of analog
computers are used in engineering and medical field to calculate different type of
reading from physical objects.
Examples:
Analog clock, speedometer, weight machine, analog processor at petrol pumps are the
examples of analog computers.
Digital Computers
A digital computer is designed to process data in digit
or numeric. Everything is described in two states on
or off. It operates by counting numbers or digits and
gives output in digital form. These computers accept
input in digital form and display output on a screen.
The digital computers are very fast. They can be
programmed to perform mathematical calculations,
15 | P a g e
compare values. Digital computers are manufactured in a wide variety of sizes, speeds
and capacities. These computers have great storage capacity and more reliable than
analog computers.
Examples:
Digital watch, scoreboard, calculator, PC are examples of digital computers.
Hybrid Computer
A hybrid computer combines the best characteristics of both the
analog and digital computer. It can accept data in analog and digital
form. A hybrid computer system offers a much cost effective method
that is used to perform complex simulations.
Examples:
Hybrid devices may calculate patient’s heart functions, temperature,
and blood pressure. This measurement can be converted and
displayed in digital form.
16 | P a g e
Q. WHAT ARE DIFFERENT INPUT DEVICES OF COMPUTER?
Hardware
All the physical parts of computer are called hardware. These are manufactured by
substance physical materials. They have some weight, occupy some space and can be
touched. According to the needs of the computer there are different types of hardware
as follows:
Input Devices
Output Devices
CPU
Storage Devices
Memory
Input Devices
The parts of computer which are used to feed data into computer system are known as
input devices. As there are different types of data like characters, numbers, pictures,
audio, video and biometrics, there are following types of input devices:
Keyboard
Pointing Input Devices
Optical Input Devices
Audio Video Input Devices
Biometric Input Devices
Key Board
Key board is the most commonly used input device in computer. We can feed
alphabets, numeric and special characters into the computer with the help of
keyboard. Depends upon the nature of the computer machine, there are many types of
keyboard. In case of PC the QWERTY keyboard is used, in laptop the structure of
keyboard is different. ATM machine has keypad with fewer keys while Tablet PCs
have touch screen keyboards.
QWERTY Keyboard
This type of keyboard is most commonly used with desktop computers, normally
it consists of 101-105 keys. The keys on this keyboard are divided into following
groups:
Alpha-Numeric Keys
Num pad
Function Keys
Navigation Keys
Multimedia Keys
Special Keys
Alpha-Numeric Keys
This is the main group
of keys consist
alphabets characters in
17 | P a g e
small & capitals, numeric keys from 0-9 and special characters i.e. *, %, &, >,
?. The arrangements of these keys are very similar to typewriter buttons.
Num-Pad
On right hand side of the key board there are some keys similar to calculator,
these keys are known as numeric pad. The num-pad enables the users for
quick numeric calculations.
Function Keys
The top row keys on keyboard from F1-F12 are called function keys. These
keys perform different special functions in different software. F1 key is used
for help in most of the programs.
Navigation Keys
This group includes up, down, left and right arrow keys, HOME, END, PAGE
UP and PAGE DOWN keys. These keys are used to navigate or move cursor
on screen.
Multimedia Keys
In some keyboards multimedia keys are used, these keys are used to operate
entertainment programs to listen music or to watch videos.
Special Keys
There are some other keys which are used for special purposes like Windows
button, delete key, internet control buttons, print screen and pause/break
buttons.
Followings are some special keys:
ARROW KEYS- Four arrow keys for moving the cursor or insertion
point right, left, up, or down.
CAPS LOCK KEY - A toggle key that, when activated, causes all
alphabetic characters to be uppercase.
HOME - Moves the cursor to the top left corner of the screen or to the
beginning of the line, but it can have other meanings depending on
which program is running.
END - Moves the cursor to the end of the line, the end of the page, or
the end of the file depending upon which program is running.
18 | P a g e
ESC - Short for Escape, this key is used to send special codes to
devices and to exit (or escape) from programs and tasks.
CTRL KEY - Short for Control, this key is used in conjunction with
other keys to produce control characters. The meaning of each control
character depends on which program is running.
ALT KEY - Short for Alternate, this key is like a second Control key.
In most of the program this key is used to activate menu.
Mouse
The most commonly used pointing input device in personal computers is
mouse. In MS-windows environment mouse appears to be an essential part of
the computer. The mouse is used to control the movement of cursor or pointer
on screen. Mouse has some buttons on it which are used to send commands by
the user. The traditional mouse is known as mechanical mouse, it has a ball at
the bottom of the mouse, when we move the mouse on table or mouse pad the
ball rotate and the cursor move according to the rotations of the ball.
19 | P a g e
Now a day we use optical mouse in which a laser light is emit from the bottom
of the mouse and when we move the mouse on some surface the sensor sense
the motion of the light and hence the cursor is moved. Wireless mouse is also
available, this mouse used Infrared technology. Air mouse is also in practice
now a day; this mouse is work on desk like a laser mouse but also work in air.
Track Ball
Track ball is also a pointing device, it is very similar to mouse but it has ball
on its top. The ball is rotated with the help of figure or thumb and the cursor
moves on the screen. Track ball also has some buttons to send command
instructions.
Touch Pad
In laptops and notebooks a little pad is placed under the keypad, this pad is
pressure sensitive with touch technology. When user presses figure on the
surface of pad, the pointer/cursor on the screen moves.
Pointing Stick
In laptops a little stick with blue or red color is placed right in the middle of
keyboard. This little stick is also pressure sensitive device, when your put
pressure on it in some direction with its figure the cursor moves on the screen.
Joy Stick
A handle like device especially designed to play video games, central handle
of this device used to move the character of video game and control button on
it are useful to send different commands.
20 | P a g e
Touch Screen.
This is dual device used for input and output at the same time; these devices are often
used in public places, such as shopping centers, hotels, and airports, where users may
not have much experience working with computers. The user simply touches the
screen for the desired menu item. Today modern mobile phones also contain touch
screen. ATM and Point of Sale are examples of these devices.
Graphics Tablet
A graphics tablet is a flat rectangular board used to input
drawings or other graphical data. The user draws on the
graphics tablet with an electronic pen (called stylus) or a
mouse-like device (called a puck). The drawing movements
are converted into digital signals that are sent to the computer
as input. Architects and mapmakers commonly use this input
device.
21 | P a g e
Scanner Optical Character Recognition
Barcode Readers
Barcode reader is very simple and easy to use device. It is used to read printed
barcodes from paper or products. This device is widely used at POS (Point of
Sale) counters for preparing bills of the customers. A laser beam emits from
the barcode reader and read data from the source object.
There are two types of magnetic stripe card readers are in practice, one used
the insertion technique in which the card is to be inserted and it reads the data
and other requires to swipe the card for reading data.
MICR Readers
MICR (Magnetic Ink Character Recognition) devices are used to read text
printed with magnetized ink. The magnetized ink is very much in exercise to
print special words on sensitive documents, for example in banking sector the
code on the bottom of cheque is written with this ink, the MICR readers used
to read these special characters and feed in the computer.
Microphone:
We can feed our voice in the computer with the help of microphone. This
device is widely used in voice communication and voice chat. We also can
record our voice with the help of this device and hence can listen or
communicate the recorded file.
Webcam:
The webcam is digital camera device which enable the user to record videos or
still pictures in the computer. This device is broadly used for video
communication. The user can have video chat and participate in video
conference with the help of this device. The device is also used to capture
images in many places for example NADRA and License Departments used
these cameras to capture latest image of the candidate for CNIC or License.
Microphone Webcam
23 | P a g e
Biometric Input
These devices are used to input the physical or behavioral characteristics of a person
in the computer. These devices can scan fingerprints, hand geometry, facial features,
voice, signatures, and eye patterns and then act according to the prescribed
instructions.
The common methods for system security is the use of password, the method of using
password is considered not the best safe methods so the biometric input devices are
used at the entry points to verify the person, in offices for attendance, for security
purpose of sensitive areas. These devices scan the personal characteristics, translate
them into digital code and then compare them with already stored data, if the
characteristics are matched then the system allow the user to for further processing
otherwise denies.
24 | P a g e
Q. WHAT ARE THE DIFFERENT OUTPUT DEVICES OF COMPUTER?
Output Devices
The computer is an electronic device which accepts input and after processing returns
us a result as output. The peripheral devices which are used to return the output are
called output devices. Depending upon the nature of the data and working format of
output is of various types, so different types of output devices are used for this
purpose.
The computer returns the output of following forms:
Softcopy output
Hardcopy output
Softcopy output
This output is in logical or non-physical form and we can see or hear the output. This
output is in electronic and temporary form and we can see or hear it for the time
being. Monitors and Speakers are examples of softcopy output devices.
Hardcopy output
This output is in physical form on some paper or card. This output is in permanent
form and can keep for longer period of time. Printers and Plotters are examples of
hardcopy output devices.
Display Devices
The devices which are used to display the output in visual form are called display
devices. These devices show the output of text, images and videos on a screen.
There are the following devices that are used as display devices:
CRT Monitors
LCD Monitors
Plasma Monitor
CRT Monitor
CRT is abbreviation of Cathode Rays Tube. These monitors use a vacuum
tube and Cathode Rays to display the image on screen. The screen is coated
with small phosphors elements. The image on a CRT display is created by
firing electrons from the back of the tube to phosphors located towards the
front of the display. Once the electrons hit the phosphors, they light up and are
projected on the screen.
CRT Monitors
25 | P a g e
The quality of these monitors is determines by small dots on the screen and
each dot is referred to as pixel. The image is created by firing pixels on each
dot starting from top left corner upto right bottom corner of the screen. In
Black & White monitor the image is created while determining that pixel is on
(white) or off (black), in Gray Scale monitors the brightness of the pixel is
exposed. In color monitor instead of single beam, three electron beams are
used and each pixel contains three phosphors red, green and blue. The color
you see on the screen is produced by a blend of red, blue, and green light,
often referred to as RGB.
These monitors are cheaper than other display screens, create brighter images
and are used by long time with desktop computers. But these monitors are
very heavy in weight, occupy lot of space and consume a lot of energy. So
now the use of these monitors is reduced.
LCD Monitors
These computers are also known as flat-panel
monitors, these monitors use Liquid Crystal
Display (LCD) technology. LCDs contain
fluorescent tubes which emit light waves toward the
liquid-crystal cells, which are sandwiched between
two sheets of material. When an electrical charge
passes through the cells, the cells twist. This
twisting causes some light waves to be blocked and
allows others to pass through, creating images on the display. The quality of
these monitors depends on their resolution, response time, brightness, dot
pitch, and contrast ratio.
These are slim in size so occupy small space on desk, very light in weight and
consume very few energy so they are used widely now a days. Some mobile
computers also contain built-in LCD screens. A big problem with these
monitors is that their image is very difficult to see in bright light and another
issue is that their image is best viewable on a typical right angle and is faded
on inappropriate angle.
Plasma Monitors
Plasma monitors are also flat panel monitors
that use gas plasma technology to display
images, the gas is packed in two glass plates,
and when voltage is applied the gas releases
ultraviolet (UV) light. This UV light causes
the pixels on the screen to glow and form an
image. These monitors are available in large
screen, so can display wide and rich images.
Plasma monitors are slimmest of all displays so having less weighs and are
less bulky than CTR’s. These monitors are with higher viewing angles
26 | P a g e
compared to other displays and can be placed even on walls. These monitors
exhibit very little motion blur due to high refresh rates and response time and
has a life span of about 100,000 hours. One of the limitations of these
monitors is the cost which is much higher as compared to other monitors.
They consume more energy and produce glares due to reflection. These
displays are not available in smaller sizes than 32 inches.
Printers
A printer is an output device that produces hardcopy output on physical medium
typically on paper. To meet the range of printing needs, many different types and
styles of printers exist with different speeds, capabilities, and printing techniques.
Home users are printing dozens of print per week, in a small size organization users
are printing hundreds of page per week but in a large organizations users are printing
thousands of print out per month, so different types of printers are used by these users.
We can print paper in portrait or landscape orientation with the help of printers. The
portrait orientation is taller in size while landscape is wider. Letters, books, notes and
thesis typically use portrait orientation and wider spreadsheets and slide shows often
use landscape orientation.
Types of Printers
According to needs of users and printing techniques there are many type of printers
are used and generally printers are classified into two major types:
Impact Printers
Non-Impact Printers
Impact Printers
An impact printer uses the technique of punching or striking on page. Normally a
ribbon filled with liquid inked is used against the paper in these printers and some
physical object like hammer strikes the ribbon and ink is converted into papers. The
printout quality of these printers is very low and normally just readable. Three
commonly used types of impact printers are dot-matrix printers, daisy wheel printers
and line printers.
Dot-matrix Printer
This printer prints a tiny dot at a
time so it is called as dot-matrix
printer. Small pins are used in
these printers which strike the
inked ribbon and the output is
printed on paper. Normally 9
pins, 18 pins or 24 pins are used
in head of this printer which are
used to form characters or
graphics on paper, more pins
Dot Matrix Printer
create better quality printout.
These printers are normally very noisy and economical in price. The printing
speed is very slow and measured in Character per Second (CPS).
27 | P a g e
Daisy Wheel Printer
This printer uses the technique which is very similar to a typewriter. It
includes a print wheel and each petal of the wheel has character to print. The
print wheel is called daisy wheel. An inked ribbon is placed against the paper,
a motor rotates the wheel and a hammer strikes a petal against the ribbon when
the desired character reaches the position on the paper. This prints the
character on the paper. This printer is also called Character Printer.
Line Printer
This impact printer prints one line at a time, the printing technique of this
printer is very similar to dot matrix, but this print full line at a time, due to
which its speed is faster than dot matrix. The speed of a line printer is
measured by the number of lines per minute (lpm) it can print. Some line
printers print as many as 3,000 lpm. Mainframes, servers, or networked
applications, such as manufacturing, distribution, or shipping, often use line
printers.
Nonimpact Printers
A nonimpact printer uses the printing technique other than striking or punching the
paper. Some of the non-impact printers spray ink, while others use heat or pressure to
create images. Commonly used nonimpact printers are laser jet printer, ink-jet
printers, photo printers, thermal printers, mobile printers, label and postage printers
and plotters.
28 | P a g e
white printers and up to 2400 dpi for color printers.
Using a laser printer has a number of advantages over any other types of
printers available. The speed of a laser printer varies from one model to
another as it depends on a number of factors like the graphic intensity required
in processing the job and others. The latest models of laser printers can print
more than 200 single color pages in one minute, which is more than 12
thousand pages in an hour! The color laser printers are relatively slower, but
even they can print at more than 100 pages per minute. The high speed laser
printers are generally used for printing of mass mailings like utility or credit
card bills etc.
Printing Process
Printing any data onto a piece of paper with a laser printer is a step-by-step
process which is as follows:
Ink-Jet Printers
An ink-jet printer is a type of nonimpact printer
that forms characters and graphics by spraying
tiny drops of liquid ink onto a piece of paper.
Ink-jet printers have become a popular type of
color printer for use in the home and offices.
Photo Printers
A photo printer is a color non-impact printer
that can print high quality pictures instantly and
it is also used print other bright color projects.
29 | P a g e
Photo printers differ from other printers because they have more color
cartridges, which allow for a wider range of hues and tones, and some even
contain special photo ink. These are the easily portable and even can attached
with the camera directly. The price of these printers is depends upon the
resolution and size of the pictures it can print.
Label Printer
Plotters
Plotters are the printers which are used to output the high quality graphics and
normally are used in printing of drawings, maps, circuit diagrams. The engineering
fields like civil, mechanical and electronics are using these printers very efficiently.
There are two types of plotters i.e. flatbed plotter and drum plotters.
A flatbed plotter is also known as Table Plotter. In this plotter a flatbed table is used
to hold the paper and the plotter plots the output on paper which is spread and fixed
over a rectangular flatbed table. In this format the paper is fixed and two pencil like
30 | P a g e
niddels or robotic drawing arms move around the paper and draw the sketch of given
output. The maximum size of the output is according to the size of table. The plot size
may be 20- by-50 feet. It is used in the design of cars, ships, aircrafts, buildings,
highways etc. Flatbed plotter is very slow in drawing or printing graphs. The large
and complicated drawing can take several hours to print. The main reason of the slow
printing is due to the movement mechanical devices.
A drum plotter is like a stand with a drum, paper is wrapped around a drum. The drum
then rotates the paper and pencil like niddles move across the paper to draw the
image. It was the first output device used to print graphics and large engineering
drawings.
Speakers
Speakers are the most commonly used output device for sound, they are used
to listen music, watching movies, playing games and during voice
communication or chat. According to the sound output quality and size there
are many types of speakers are used. PC Speakers are the most conventional
speakers found in the primitive IBM machines, they are built in the system
unit of computer and were the only sound systems and in fact used to be the
only one in use in PC games before more technologically advanced sound
cards were introduced. Multi-channel Speakers are new age audio output
devices. These speakers have separate speaker units also called channels. A
5.1 channel surround sound system means a 5 speaker and one subwoofer
sound system which delivers amazing sound quality and can bring any PC
game to life. The standard speakers are nothing but the normal 2.1 channel or
2 channel speakers which include a subwoofer in the 2.1 channel model. These
are the most popular type of speakers with generating enough sound required
by a home or corporate user. There are also USB speakers which are powered
from the 5 volts at a few milliamps provided by the USB port, per the
standard. The USB powered amplifier draws the power through a USB
cable/plug. No batteries or AC power source are required.
31 | P a g e
Headphones and Earbuds
The headphones are the headset that are plugged into computer system or
speakers and allow the user to privately listen to audio without disturbing
anyone else. Some headphones have Built-in Mic which used for audio input.
In a computer laboratory or other crowded environment, speakers might not be
practical. Instead, users can listen through wireless headphones or earbuds or
plug the device in a port on the sound card, in a speaker, or on the front of the
system unit. The difference is that headphones cover or are placed outside of
the ear, whereas earbuds, or earphones, rest inside the ear canal.
Multimedia Projectors
A multimedia projector is an output device that is a compact, high resolution, full-
color and capable of projecting text, images, video and audio content. Typically the
projector will feature inputs for a computer, DVD player, VCR, CD player and
storage device. The delivery of visual media through projection is an effective way to
entertain, educate, and communicate with people
on a large scale. The projectors are used to
project the image or video on a large screen, for
example, many classrooms use projectors so that
all students easily can see an instructor’s
presentation on the screen. Some projectors are
large devices that attach to a ceiling or wall in an
auditorium. Some operating systems allow
projectors to be part of the network, which
enables a presenter to operate the projector
remotely via a network connection. Others, designed for the mobile user, are small
portable devices that can be transported easily. An output level between 1500 to 2500
lumens suitable for smaller screens with controlled lighting or low ambient light. In a
room equipped with a medium-sized screen, ambient light, or dimmed light, a 2500 to
4000 lumen level is a good choice. A projector with a 4000 lumen output level should
work well with very large screens such as those used in a large conference room with
little or no lighting control.
32 | P a g e
Q. DEFINE CPU. WHAT ARE THE DIFFERENT UNITS OF CPU?
The processor often called CPU (Central Processing Unit) is main part of computer. It
is used to process all the data, instructions and information so it is also referred to as
the brain of the computer. The purpose of the CPU is to process data. It is where all
the searching, sorting, calculating and decision making takes place in the computer. In
Personal Computers Microprocessors are used. The first Microprocessor was invented
by Ted Hoff in 1968, and IBM introduced 1st Personal computer using this processor
in 1972.
The processing speed of a computer depends upon the speed at which CPU can
process the instructions. We can measure the speed of CPU in Hertz (Hz). Hertz is a
unit used to measure the frequency, and Hz represents no. of cycle per second.
The principles of working of all computer processors are the same. It does not matter
of the brand, age, software or broadband set-up. Fundamentally, they all take signals
in the form of binary (0s and 1s), manipulate them according to a set of instructions,
and produce output in the form of binary. Processors work by reacting to an input of
0s and 1s in specific ways and then returning an output based on the decision. The
fact that today’s processors contain millions of transistors offers a clue as to how
complex the logic system is.
Processor Speed
Any computer can work as faster as its processor allows doing, so it is important to
know the speed of the processor. To know about the working capacity of processor
there are three most important specifications, which include its clocking frequency
(specified in Giga Hertz or Mega Hertz), the number of cores contained in the chip,
and the memory cache size. The clocking frequency determines the number of tasks
that a processor can simultaneously process, making it the most important factor
determining processing speed. The number of cores determine the parallel processing
ability of the computer, and more the cores, better equipped is the processor for
multitasking. The memory cache is the working memory of the processor, where data
is temporarily stored. More cache size speeds up processing, improving the processor
speed.
Processor Brands
Intel and AMD are two major types of processor based upon brand and manufacturer
names. Intel's Pentium Pro, Pentium II, Celeron, Pentium II and III Xeon, Pentium M,
33 | P a g e
Dual Core Xeon, Intel Core and Intel Core 2, Intel Pentium Dual Core, Dual Core
Xeon LV, Pentium Duo, Core 2 Quad and Intel Pentium 2 Dual Core Processor, are
some of the most popular processors from Intel that are used in their products by a lot
of PC and laptop manufacturers. On the other hand, AMD's Athlon, Duron, Turion,
Sempron, Phenom and Opteron processor ranges are equally popular.
Units of Processor
Processors contain a control unit and an arithmetic logic unit (ALU). These two
components work together to perform processing operations.
Control Unit:
This is the supervisory part of the computer and
manages all the operations of hardware machine. It is a
circuitry that directs operations within the computer's
processor by directing the input and output of a
computer system. The control unit maintains order
within the computer system and directs the flow
of operations and data. The control unit selects one
program statement at a time from the program
storage area, decodes the statement, and sends it to
the arithmetic-logic unit and storage section to cause
them to carry out the instruction. The control unit
does not perform the actual processing operations
on the data but it controls the flow of all data entering
and leaving the computer. The function of control unit is
to generate relevant timing and control signals to all
operations in computer. It controls the flow of data between the processor and
memory and peripherals. The control unit directs the entire computer system to carry
out stored program instructions. The control unit must communicate with both the
arithmetic logic unit (ALU) and main memory. The control unit instructs the
arithmetic logic unit that which logical or arithmetic operation is to be performed. The
control unit co-ordinates the activities of the other two units as well as all peripherals
and secondary storage devices linked to the computer.
Arithmetic Unit
Arithmetic unit is used to perform arithmetic calculations like addition,
subtraction, multiplication and division.
34 | P a g e
Logic Unit
Boolean functions are used in the logic component of the arithmetic logic unit.
Computers use these functions to test information in order to make logical
decisions. Subjecting information to these logic tests allows the unit to make
the requested alterations to data.
Registers
A processor contains small but very fast computer memory used to speed the
execution of computer programs that are called registers. They are providing quick
access to commonly use values-typically, the values being in the midst of a
calculation at a given point in time. Registers are built from fast multi-ported memory
cell. They must be able to drive its data onto an internal bus in a single clock cycle.
The result of ALU operation is stored here and could be re-used in a subsequent
operation or saved into memory.
Registers are normally measured by the number of bits they can hold, for example, an
“8-bit register” or a “32-bit register”. Registers are now usually implemented as a
register file, but they have also been implemented using individual flip-flops, high
speed core memory, thin film memory, and other ways in various machines.
Cache Memory
Main memory (RAM) is a computer device with the slowest access rate. If the CPU
needs a data item, a request is sent to the main memory via a memory bus. The main
memory then searches for the data item and sends it back to the CPU. Lot of time is
wasted in this entire cycle. So to avoid this delay a cache memory is built-in in the
CPU to temporarily store the frequently used instructions and data so that CPU should
not approach RAM for data every time and hence lot of time will be saved. The use of
Cache Memory is vital to enhance the speed of processor.
Machine Cycle
Processing a single instruction by processor is called machine cycle. For every
instruction, a processor repeats a set of following four operations
(1) Fetch,
(2) Decode,
(3) Execute
(4) Store
Fetch
In this step the program instruction or
information about a needed piece of data is
fetched or obtained from the memory.
Decode
In this step the instructions are decoded so the control unit and ALU can
understand them.
Execute
In this stage the ALU executes the appropriate instruction, if any arithmetic
computation or logical comparisons are required.
35 | P a g e
Store
At the end the original data or the result from the ALU's execution is stored
either in a register or memory, depending on the instruction.
Pipeline Processing
Some of the traditional processors
were working in such a way that they
fetches, decodes, executes, and stores
only one instruction at a time. In
these computers, the processor has to
wait until currently fetched
instruction completes all four stages
of the machine cycle (fetch, decode,
execute, and store) before beginning
work on the next instruction.
Parallel Processing
It is quite possible to divide a single task into pieces and process them by more than
one microprocessor in a single computer
simultaneously. This term of using multiple
processors at the same time is referred to as
parallel processing. The computer resources can
include a single computer with multiple
processors, or a number of computers connected
by a network, or a combination of both.
36 | P a g e
Q. WHAT ARE DIFFERENT STORAGE DEVICES USED IN
COMPUTER?
Storage Devices
A storage medium also called secondary storage is the physical material on which a
computer keeps data, instructions, and information.
Examples of storage devices are hard disks, solid state
drives, memory cards, USB flash drives, optical discs,
smart cards, magnetic stripe cards, and microfilm. The
devices are used to store data or information for longer
period of time permanently, and data is not lost when
computer is shutdown.
Storage Units
Byte is the storage unit for computers and we calculate the storage capacity of any
computer in terms of Byte. Byte is the basic unit however following is the list of units
used for measuring storage capacity of computer:
37 | P a g e
Access Time:
The speed of storage devices is measured in terms of time need to read and/or write
data on it. The access time of storage devices is very slow as compared to the memory
(RAM).
Hard Disk
A hard disk also called a fixed disk is usually fixed in the system unit of
personal computer. In hard disk data is stored on hard material surfaces
(aluminum platters) so it is called as hard disk. It provides large capacity of
data storage usually 2TB or more. The access rate of hard disk is very fast as
compared to other storage media and it is much safer & reliable than
conventional storage devices like Floppy Disk, Zip Disk or even USB Disk.
The system unit on most desktop and notebook computers contains at least one
hard disk. Because disk cannot be removed from the drive the terms hard disk
and hard drive are used interchangeably.
The surfaces of hard disk are usually divided into logical areas called tracked
and sectors. The data is actually stored in the sectors; a sector can store 512
bytes. This division is used to specify locations on the hard disk and to
allocate disk space to files. The formatting process is used to divide the disk
into tracks and sectors.
38 | P a g e
Hard disk has a special-purpose chip called a controller, which is used to
control all the operations of hard disk. It controls the movement of head and
rotating motor. It receives a request for data, instructions, or information from
the processor and according return the required data.
Magnetic Tape:
Magnetic Tape is a secondary storage media and can be used to perform both
functions -input and output. Magnetic tapes are used for large computers like
mainframe computers where large volume of data is stored for a longer time.
In PC also you can use tapes in the form of cassettes. The cost of storing data
in tapes is inexpensive. Tapes consist of magnetic materials that store data
permanently. It can be 12.5 mm to 25 mm wide plastic film-type and 500
meter to 1200 meter long which is coated with magnetic material. The deck is
connected to the central processor and information is fed into or read from the
tape through the processor. It is similar to
cassette tape recorder. Not Write
Protected
Floppy Disk
Write Protected
A floppy disk is a portable, inexpensive
storage medium that consists of a thin,
circular, flexible plastic disk with a
magnetic coating enclosed in a square-
shaped plastic shell. A floppy disk drive
40 | P a g e
(FDD) is a device that can read from and write on a floppy disk. When you
insert a floppy disk into a floppy disk drive, a shutter on the disk’s plastic shell
slides to the side to expose the disk’s recording surface. A floppy disk is a type
of magnetic media because it uses magnetic patterns to store items. The
physical size of latest floppy disks is 3.5” and it can store data up to 1.44MB.
With the advent of CDs and USBs storage media the floppy disk is almost
obsolete.
Zip Disk
Zip Disks are magnetic-based high-capacity floppy
diskettes. The disks are about the same size as the
standard 3.5-inch disk, but require special disk drives
for reading from and writing to the disks. Disk drives
may be permanently built-in the computer or
externally connected to the computer through a port.
These drives have larger storage capacity than floppy
disk i.e. 1000MB and have been used in past for backup disks. Now modern
storage devices have replaced Zip Disks.
DVDs
DVD is abbreviated as Digital
Versatile Disk), the size and shape of
a CDs and DVDs is very similar. A
DVD stores data, instructions, and
information in a slightly different
manner and thus achieves a higher
storage capacity. DVD quality also far
41 | P a g e
surpasses that of CDs because images are stored at higher resolution.
Widely used DVDs are capable of storing 4.7 GB to 17 GB, depending
on the storage techniques used. The storage techniques are single side
sing layer, single side double layers, double side single layer and
double side double layer. The first storage technique involves making
the disc denser by packing the pits closer together. The second
involves using two layers of pits. For this technique to work, the lower
layer of pits is semitransparent so that the laser can read through it to
the upper layer. This technique doubles the capacity of the disc.
Finally, some DVDs are double-sided.
Blu-Ray Disk
A newer and more expensive DVD format is Blu-ray, which has a
higher capacity and better quality than standard DVDs,
especially for high-definition audio and video. A
Blu-ray Disc-ROM (BD-ROM) has storage
capacities of 100-200 GB. Blu-ray Disc (BD)
drives and players are backward compatible
with DVD and CD formats.
Smart Cards
A smart card, which is similar in size to a credit card or ATM card, stores data
on a thin microprocessor embedded in the card. Smart cards contain a
processor and have input, process, output, and storage capabilities.
42 | P a g e
100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about
4x6 inches. A computer output microfilm recorder is the device that records
the images on the film. Microfilm and microfiche use is widespread, libraries
use these media to store back issues of newspapers, magazines, and genealogy
records. Some large organizations use microfilm and microfiche to archive
inactive files. Some banks use them to store transactions and canceled checks.
Memory Cards
Memory cards enable mobile users easily to transport
digital photos, music, or files to and from mobile
devices and computers or other devices. A memory
card is a removable flash memory device, usually no
bigger than 1.5 inches in height or width, which you
insert and remove from a slot in a computer, mobile
device, or card reader/writer.
43 | P a g e
Q. WRITE NOTE OF DIFFERENT TYPE OF COMPUTER MEMORY.
Memory
Memory refers to the instructions, information, and data waiting for immediate
processing. For this reason, memory is also referred to as working memory. Memory
consists of electronic components that store instructions which are waiting to be
executed by the processor. It also store the data needed by those instructions, and the
results of processing the data. Memory usually consists of one or more chips on the
motherboard or some other circuit board in the computer.
Types of Memory
The system unit contains two types of memory: volatile and nonvolatile. When the
computer’s power is turned off, volatile memory loses its contents. Nonvolatile
memory, by contrast, does not lose its contents when power is removed from the
computer. RAM is the most common type of volatile memory. Examples of
nonvolatile memory include ROM, flash memory, and CMOS.
RAM
Random-access memory (RAM) is the best known form of computer memory.
RAM is a volatile memory, it means information stored on it can be accessed
as long as power is on. As soon as the power is off, it cannot be accessed.
RAM holds data and processing instructions temporarily until the CPU needs
it. RAM is read and write memory, CPU can read data on RAM and also can
write the data.
Three basic types of RAM chips exist: Dynamic RAM, Static RAM, and
Magneto-resistive RAM.
• Dynamic RAM chips must be recharged or refreshed constantly again
and again. When we on the computer the DRAM chip gets charged,
and discharged as we use it. So it needs to be recharged after some
time in order to keep the data otherwise data will be lost. This is a
slower speed memory as CPU has to wait for the response of RAM
when it is busy in recharging. Many variations of DRAM chips exist,
most of which are faster than the basic DRAM. Most personal
44 | P a g e
computers today use some form of SDRAM chips or RDRAM chips.
SDRAM (Synchronous DRAM) is synchronized with the CPU speed
and transfer data as CPU clock speed. DDR-SDRAM is Double Data
Rate SDRAM, it transfer double data as clock speed and it is much
faster than SDRAM. DDR2 & DDR3 are the next generations of
SDRAM and are much faster. DDR3 is designed for the computers
which are having multi-core processor. RDRAM (Rambus DRAM)
uses pipeline technique and hence it is faster than SDRAM.
• Static RAM chips are faster and more reliable than any variation of
DRAM chips. These chips do not have to be recharged or refreshed
again & again and available every time CPU read/write data, so CPU
does not have to wait for the response of RAM. SRAM chips are much
more expensive than DRAM chips.
• A newer type of RAM, called Magneto-resistive RAM (MRAM). It
stores data using magnetic charges instead of electrical charges.
Manufacturers claim that MRAM has greater storage capacity,
consumes less power, and has faster access times than electronic RAM.
ROM
Read-only memory (ROM) is
permanent memory and it contains
instructions that the computer uses to
operate various aspects of the hardware.
Unlike RAM, ROM is nonvolatile,
which means its contents are not lost
when power is removed from the
computer. However, this information is
written in the factory and cannot be
modified by the user. Manufacturers of
ROM chips often record data, instructions, or information on the chips when
they manufacture the chips. These ROM chips, called firmware, contain
permanently written data, instructions, or information. ROM contains the
instructions the computer follows to load the operating system when first
turned on.
45 | P a g e
EEPROM: EEPROM stands for Electrically Erasable Programmable
Read Only Memory. In this ROM, the contents can be modified
electrically and no special devices are needed.
Cache Memory
Cache memory is pronounced as CASH memory.
It is a high speed memory where data is copied
when it is retrieved from the RAM. This storage of
key instructions enables a performance
improvement in the processor. Most of today’s
computers improve their processing times with
cache. Cache helps speed the processes of the
computer because it stores frequently used
instructions and data. Most personal computers
today have two types of memory cache; Intel
Processors contain L1 cache and L2 cache.
46 | P a g e
8 The instructions and data are written The instructions in ROM are written
(loaded) in RAM at execution time, at the time of manufacturing.
when computer is working.
9 RAM is used to load data and programs ROM contains the instructions that
currently running. help the computer to start and make
it ready.
10 RAM is much faster than ROM. ROM is slower than RAM.
11 RAM has two main types: Static RAM ROM has three types: PROM,
and Dynamic RAM EPROM and EEPROM
12 Physically RAM chip is larger than Physically ROM chip is smaller than
ROM chip. RAM chip.
47 | P a g e
Q. DEFINE SOFTWARE. DESCRIBE DIFFERENT TYPES OF
APPLICATION & SYSTEM SOFTWARE.
Software
Software is simply defined as logical or non-physical parts of the computer. The role
of software is to provide the detailed instructions that control the operation of a
computer system. Hardware consists of physical or tangible parts the software is the
intangible parts of the computer. If the CPU is the physical brain of the computer,
then software is its mind. Software instructions are programmed or written in a
computer language, translated into machine language, and executed by the computer.
Software is the instructions for the computer to “what to do and how to do”. Software
is the collection of computer programs, procedures and documentation that performs
different tasks on a computer system. The term 'software' was first used by John
Tukey in 1958.
Types of Software
There are the following two major types of software:
Application Software
System Software
Application Software
This is the type of software through which most of the users interact with the
computer. It is the usual interface between user and computer. Application
software enables the user to give instruction to the computer for controlling and
transforming input data into useful output information. It also allows the user to
change the information generated by the processing system. Rarely users directly
manipulate systems software, especially the operating systems software.
Availability of software
Application software are available in variety of forms, it can be written for a
specific user’s application (custom software), or it can be mass-produced for
general use (packaged software). Naturally, custom software is usually much
expensive than packaged software. An accounting package written for a specific
company might cost many thousands of Rupees, whereas a commercial
accounting package might cost only a few hundred Rupees at a retail store. The
advantage of custom software is that it is modified to the user’s specific needs and
can be effortlessly integrated into the user’s existing software. Not only is
48 | P a g e
commercial software less costly, it is also available immediately, and the package
can be evaluated before being purchased.
Word processing
These programs allow the user to quickly and easily create, edit and format
documents. By using word processing applications, the user can format
documents with ease, changing font size, margins, color, etc. Different
types of documents e.g., letters, memos, and reports are often preformatted
in the application. PC-based word processing software is so capable and
inexpensive so in most businesses it has become the usual tool for creating
documents. MS-Word, Word Star, Word Pad and Word Perfect are the
examples of Word Processing Software.
Spreadsheet programs
Spread sheet is another widely used type of application software. These
software are especially useful in calculations in business and accounting.
The electronic spreadsheet consists of rows and columns of data, which the
user can easily edit, copy, move, or print. Using numeric data entered in
the spreadsheet, the computer can perform not only the simple numerous
mathematical calculations automatically but also many of impressive
complex tasks for example in statistical, logical, and engineering fields.
These software are very much help for recalculations, creating charts,
managing multi-sheet documents. MS-Excel and Lotus are the examples of
spreadsheet software.
Presentation software
Presentation software enables users to design quality presentations for
business and educational purposes. The presentations usually consist of
formatted slides for projecting onto a screen from a computer projector or
overhead projector, or for display on a large monitor. These presentations
49 | P a g e
may also be used for online meetings and web broadcasts. The slides can
be designed to include text, backgrounds, graphic images, charts, clipart,
shading, animation, and audio effects. MS-PowerPoint is an example of
presentation software.
Database software
This software allows the user to enter, store, maintain, retrieve, and
manipulate data. In some ways, databases pickup where spreadsheets leave
off, although a fairer assessment is probably that the relationship between
the two types of software is mutual. Database software is certainly more
efficient and effective to handle numeric and non-numeric data than is
spreadsheet software. In most databases, data is entered into tables of rows
and columns, similar to spreadsheets. Unlike spreadsheets, these tables can
be connected into relationships that allow users incredible versatility in
what they can do with that data. MS-Access, SQL Server and MySQL are
the examples of database software.
Graphics Designing
These software are helpful for graphic designers to create interactive
designs. This software includes computer-aided design, desktop
publishing, paint/image editing, photo editing, video and audio editing.
Many graphics and multimedia programs incorporate user-friendly
interfaces and/or have scaled-down versions, making it possible for the
home and small business users to create documents using these programs.
Web Browser
This software allows users to access and
view Web pages on the Internet. Web
Browsers are available for download on
the Web free or for a fee. Internet
Explorer, Opera, FireFox and Google
Chrome are the examples of web
browsers.
Email Client
The e-mail client enables the user to send,
receive, forward and delete emails on
desktop. With the help of email client software users can download their
email on the computer and can use that data even in offline mode.
50 | P a g e
Chat
These software enable user to interact with another user on internet, the
chat can include text, audio and video. Skype is an example of chatting
software which allows user to communicate in audio and video formats.
Entertainment
Entertainment software for personal computers, game consoles, and
mobile devices includes interactive games, videos, and other programs
designed to support a hobby or provide enjoyment. For example, you
might use entertainment software to play games individually or with others
online, make a family tree, or fly an aircraft.
System Software
System software directly controls the computer’s hardware, whereas application
software is one level removed from hardware. System software manages the
computer’s resources, enables the various components of the computer to
communicate, runs application software, and makes the hardware respond to the
user’s needs. When the system software operates efficiently, the difficult operations
of controlling the hardware are transparent to the user.
Operating System
The operating system provides an
interface between the computer
hardware and the user or the
application software. The operating
system has two primary functions.
First, it manages the computer's
resources, the computer's hardware
and any external devices. For
example, the operating system
controls the CPU, accesses RAM,
executes programs, receives input
from the keyboard or other input
device, retrieves and saves data to
and from secondary storage devices,
displays data on the monitor, and controls the printer. Second, the
operating system contains instructions for running application
software.
The examples of operating systems are:
MS- DOS
MS-Windows
Mac OS
Unix
51 | P a g e
Linux
Sun Solaris
Device Divers
CPU and RAM is the internal world of the computer, all the hardware
devices other than CPU & RAM are called peripheral devices. Every
peripheral device needs special software in order to configure with the
operating system in order to use that peripheral device. That special
software is called device driver and it is provided by the manufacturer
of hardware device on CDs. Thousands of drivers for various devices
are built-in in operating system like MS-Windows, user does not to
install the drivers for specific device. When user attached the device
with computer system, operating system will automatically install the
driver for of the device.
Utility Programs
Utility programs perform various specialized "housekeeping" tasks,
such as file management, virus protection, disk defragmentation,
program installation and un-installation, file and disk back up, disk
formatting, and providing screen saver programs. The user directly
controls most utility programs, although some utility programs can be
set to run automatically i.e. screen savers and anti-virus scanning.
Language Translator
Language translators are used with high level languages and are used
to translate the code of high level language into the machine language
that actually controls the computer's operations. Assembler, Compiler
and Interpreters are the language translator. Assembler is used with
Assembly language and other high level languages use their own
compilers and interpreters.
52 | P a g e
Q. WHAT IS OPERATING SYSTEM? DESCRIBE DIFFERENT
FUNCTIONS OF OPERATING SYSTEM.
OPERATING SYSTEM
The operating system provides an interface between the computer hardware and the
user or the application software. The operating system has two primary functions.
First, it manages the computer's resources, the computer's hardware and any external
devices. For example, the operating system controls the CPU, accesses RAM,
executes programs, receives input from the keyboard or other input device, retrieves
and saves data to and from secondary storage devices, displays data on the monitor,
and controls the printer. Second, the operating system contains
instructions for running application software.
User Interface
A basic function of Operating system to provides an environment where user can
interact with the computer. This environment is referred to as user interface. Modern
operating system are graphics based today and the user interface includes graphical
components i.e. the windows, menus, drop down boxes, command buttons, this
interface is referred to as Graphical User Interfaces (GUI). On older operating system
all operation of the computer was performed by typing in commands that interface is
referred to as Command Line Interface (CLI). CLI based operating system are not at
all expired, command-line interfaces are alive and well and provide an alternate way
of running programs on all major operating systems.
Booting a Computer:
It is a major function of the operating system to boot the system. Booting is the
process of transferring the basic information from storage media to RAM which is
required to run the computer. The operating system consists of a supervisor portion
and a set of system programs. When the computer is switched on, the supervisor
portion of the operating system is loaded in the RAM from the disk. The supervisor
portion then loads the system programs from the disk. Each time the computer is
booted, the important components of operating system are loaded from disk into the
RAM.
Device Interfacing:
53 | P a g e
In addition to managing application programs, operating systems also perform
functions relating to the peripheral devices connected to the computer. For example,
the operating system handles the requests for print jobs sent to the printer. When more
print requests are sent to the printer that can be handled at once, the operating system
assigns them an order and places them in a buffer, an area of memory, awaiting
printing. This process is called spooling. Another important function of the operating
system is that of configuring the external devices. Each device must communicate to
the computer, a process requiring a device to have its own program, referred to as the
device driver. The operating system coordinates the installation of this software and
ensures its proper functioning. These procedures are often done manually but in some
cases the process is automatically perform by the operating system called Plug and
Play.
Multi-Tasking:
Operating systems that allow only one user to run one
program at a time are called single user or single tasking
operating systems. Most current operating systems and
computers have moved beyond this stage to multitasking.
In multitasking, the operating system allows more than
one task or program to be executed at a time in a single-
user computer. Operating systems that address more
memory can run several tasks simultaneously. A
computer’s multitasking capability is also limited by the
amount of RAM it contains.
Time Sharing
Another feature of the operating systems in supercomputers, mainframes and
minicomputers, called timesharing, assigns to each user a fraction of the processor’s
time. An efficient operating system controls the multiuser environment in such a way
that the user feels as though he or she is the only person using the computer.
Multiprocessing:
Computers, especially mainframe and minicomputer systems, can also employ
multiprocessing. In this process, the operating system uses more than one processor or
CPU to execute the commands of a single program. The operating system sends
instructions to several processors in parallel, which results in the faster processing of
instructions.
Virtual Storage
An application program can be very large. It might take up many millions of bytes on
a secondary storage device. For this reason, the operating system does not load all of a
large application program into RAM at once. Instead, it loads only a portion of the
application program; when the program requires other code, it accesses that code from
secondary storage. The operating system’s ability to divide the computer program into
variable-length portions and to store only a small portion at a time in RAM is called
virtual storage.
Virtual Memory
Some operating systems also have virtual memory, which enables a small portion of
the hard disk to function as additional RAM by storing the portions of the program
54 | P a g e
not being used in the RAM on the hard disk but in such a fashion that they can be
very quickly accessed.
File System:
An Operating System can create and maintain a file System, where users can create,
delete and move files around a structured file system. Many systems organize the files
in directories or folders. In multi-users system; these folders can have associated user
ownership, and associated access rights.
Multi-User:
This allows one or more user to log into a system. Thus the operating system must
contain a user account database, which contains user name, default home directory,
user passwords and user right.
Controlling Network:
Some operating systems are specially developed for networking environment as
server. These operating systems are called the network operating systems. A network
operating system organizes and co-ordinates multiple users and makes it possible to
access and share resources on the network. The network operating system also has
security features.
Data Management
Data management keeps track of the data on disk, tape and optical storage devices.
The application program deals with data by file name and a particular location within
the file. The operating system's file system knows that data are physically stored on
which sectors of disk and interaction between the application and operating system is
through the programming interface. Whenever an application needs to read or write
data, it makes a call to the operating system.
Security
Operating systems provide password protection to keep unauthorized users out of the
system. Some operating systems also maintain activity logs and accounting of the
user's time for billing purposes. They also provide backup and recovery routines for
starting over in the event of a system failure.
55 | P a g e
Q. WHAT IS COMPUTER LANGUAGE? DESCRIBE DIFFERENT
TYPES OF LANGUAGES.
Programming Language
Programming Language is a set of words, special characters and some rules that
enable a computer programmer to write a program that computer can understand.
Programming languages have developed over time to become more like the natural
languages that human beings speak. There are different methods of computer
programming and for this purpose different computer languages are being used.
Types of Languages
The languages are majorly divided into two main types:
Low Level Languages
High Level Languages
56 | P a g e
computer's circuitry. Because machine language is so far removed from
natural language, it has a number of inherent problems as a programming
language. It is time-consuming and tedious for humans to work in machine
language, and errors in machine-language programs are difficult to find.
The high level programming languages are further divided into following
categories:
o Non-Procedural Languages
o Procedural Languages
o Object Oriented Programming
Language
o Visual programming language
57 | P a g e
programs have been written in COBOL since its inception in the early
1960s.
58 | P a g e
Visual Programming Languages (6GL)
The term visual programming refers to creating or developing windows based
applications or GUI (Graphical User Interface). The visual programming
languages, sometimes called sixth generation languages are also object
oriented languages. The most popular and widely used visual programming
language is Visual Basic.
59 | P a g e
Q. What is computer virus? Describe different types of computer viruses and
methods to prevent viruses.
Answer:
A computer virus is an ill-natured software application or authored code that can
attach itself to other programs, self-replicate, and spread itself onto other devices.
When executed, a virus modifies other computer programs by inserting its code into
them. If the virus’s replication is successful, the affected device is considered
“infected” with a computer virus.
The malicious activity carried out by the virus’s code can damage the local file
system, steal data, interrupt services, download additional malware, or any other
actions the malware author coded into the program. Many viruses pretend to be
legitimate programs to trick users into executing them on their devices, delivering the
computer virus payload.
Types of Viruses:
Every computer virus has a payload that performs an action. The threat actor can code
any malicious activity into the virus payload, including simple, innocuous pranks that
don’t do any harm. While a few viruses have harmless payloads, most of them cause
damage to the system and its data. There are nine main virus types, some of which
could be packaged with other malware to increase the chance of infection and
damage. The nine major categories for viruses on computers are:
Browser Hijacker
A computer virus that can change the settings on your browser will hijack browser
favorites, the home page URL, and your search preferences and redirect you to a
malicious site. The site could be a phishing site or an adware page used to steal data
or make money for the attacker.
Resident Virus
A virus that can access computer memory and sit dormant until a payload is delivered
is considered a resident virus. This malware may stay dormant until a specific date or
time or when a user performs an action.
60 | P a g e
Polymorphic Virus
Malware authors can use polymorphic code to change the program’s footprint to
avoid detection. Therefore, it’s more difficult for an antivirus to detect and remove
them.
Multipartite Virus
These malicious programs spread across a network or other systems by copying
themselves or injecting code into critical computer resources.
Macro Virus
Microsoft Office files can run macros that can be used to download additional
malware or run malicious code. Macro viruses deliver a payload when the file is
opened and the macro runs.
Resident Viruses:
This type of virus is a permanent which dwells in the RAM memory. From there it
can overcome and interrupt all of the operations executed by the system: corrupting
files and programs that are opened, closed, copied, renamed etc.
Companion Viruses:
They are known as companion viruses because once they get into the system they
"accompany" the other files that already exist. In other words, in order to carry out
their infection routines, companion viruses can wait in memory until a program is run
or act immediately by making copies of them.
FAT Virus:
This type of virus attack can be especially dangerous; they attack on FAT by
preventing access to certain sections of the disk where important files are stored.
Damage caused can result in information losses from individual files or even entire
directories.
Worms:
A Worm is a program that copies itself repeatedly in memory or hard disk until no
memory space remains. Ultimately computer stops working and needs restart again &
again.
Trojan Horse:
Trojan horse is a virus program that hides itself with common computer files like zip
file. Whenever the infected files are opened the virus activates.
61 | P a g e
Logic Bombs:
They are not considered as viruses because they do not replicate. They are not even
programs in their own right but rather camouflaged segments of other programs. Their
objective is to destroy data on the computer once certain conditions have been met.
Logic bombs go undetected until launched, and the results can be destructive.
Hackers may exploit weak points in an operating system or app to acquire unapproved
access and power over a user’s machine to achieve their goals.
Ego-driven: Some virus authors seek fame within the hacker community by creating
destructive or widespread viruses that garner media attention.
Cybercrime: Hackers often use computer viruses as tools for ransomware attacks,
identity theft, and other forms of online fraud.
62 | P a g e
Q. WHAT IS DATA COMMUNICATIONS? DESCRIBE COMPONENTS
OF DATA COMMUNICATIONS AND MODES OF DATA
COMMUNICATION.
Answer:
Data Communication
Data communication is the exchange of data between two devices via some
transmission medium such as a cable or wireless. For data communication the
communicating devices must be part of a communication system made up of a
combination of hardware and software.
1. Delivery
The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user
.
2. Accuracy
The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
3. Timeliness
The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video and audio, timely delivery means
delivering data as they are produced, in the same order that they are
produced, and without significant delay.
4. Jitter
Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets. For example, let us
assume that video packets are sent every 30ms. If some of the packets
arrive with 30-ms delay and others with 40-ms delay, an uneven
quality in the video is the result.
Sender
63 | P a g e
The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
Receiver
The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
Transmission medium
The transmission medium is the physical path by which a message travels
from sender to receiver. Some examples of transmission media include
twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
Protocol
A protocol is a set of rules that govern data communications. It represents an
agreement between the communicating devices. Without a protocol, two
devices may be connected but there will be no communicating, just as a person
speaking French cannot be understood by a person who speaks only Japanese.
Communications Channels
A communications channel is a pathway over which information can be
communicated from one device to another. It may be defined by a physical wire that
connects communicating devices, or by a radio, laser, or other radiated energy source
that has no obvious physical presence. Information sent through a communications
channel has a source from which the information originates, and a destination to
which the information is delivered. Although information originates from a single
source, there may be more than one destination, depending upon how many receive
stations are linked to the channel and how much energy the transmitted signal
possesses.
Simplex
In simplex mode, the communication is
unidirectional, as on a one-way street.
Only one of the two devices on a link can
transmit and the other can only receive.
Keyboards and traditional monitors are
examples of simplex devices. The
keyboard can only input data into
computer system and the monitor can only deliver output. The simplex mode
can use the entire capacity of the channel to send data in one direction.
64 | P a g e
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice
versa. The half-duplex mode is like a one-lane road with traffic allowed in
both directions. When cars are traveling in one direction, cars going the other
way must wait. In a half-duplex transmission, the entire capacity of a channel
is taken over by whichever of the two devices is transmitting at the time.
Walkie-talkies and CB (citizens band) radios are both half-duplex systems.
The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time; the entire capacity of the
channel can be utilized for each direction.
Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously. The full-duplex mode is like a two way street with
traffic flowing in both directions at the same time. In full-duplex mode, signals
going in one direction share the capacity of the link with signals going in the
other direction. This sharing can occur in two ways: Either the link must
contain two physically separate transmission paths, one for sending and the
other for receiving; or the capacity of the channel is divided between signals
traveling in both directions. One common example of full-duplex
communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions is
required all the time. The capacity of the channel, however, must be divided
between the two directions.
65 | P a g e
Q. WHAT IS TRANSMISSION MEDIA? DESCRIBE GUIDED AND
UNGUIDED
MEDIA USED TO CONSTRUCT A NETWORK.
Transmission Media
The transmission media is the physical path by which a message travels from sender
to receiver. Some examples of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves.
Twisted-Pair Wire
Twisted-pair wire normally consists of
four or eight copper fibers of wire,
individually insulated in plastic, then
twisted around each other in braided pairs
and bound together in another layer of
plastic insulation. Except for the plastic
coating, nothing shields this type of wire
from outside interference, so it is also
called unshielded twisted-pair (UTP)
wire. Some twisted-pair wire is further encased in a metal sheath and therefore
is called shielded twisted-pair (STP) wire.
Coaxial Cable
Coaxial cable, sometimes called coax,
is widely used for cable TV and is used
in some net-works (however, the
connectors are different for TV and
networks). There are two conductors in
coaxial cable. One is a single wire in
the center of the cable, and the other is
a wire mesh shield that surrounds the
first wire with an insulator in between.
Coaxial cable can carry more data than older types of twisted-pair wiring, and
it is less susceptible to interference from other wiring. However, it is also
more expensive and has become less popular as twisted-pair technology has
improved. Two types of coaxial cable are used with networks: thick and thin.
Thick coax is the older standard and is seldom installed in new networks.
Fiber-Optic Cable
A fiber-optic cable is a thin strand of glass that transmits beams of light rather
than electric frequencies. When one end of the thread is exposed to light, the
thread carries the light all the way to the other end, bending around corners
with only a minute loss of energy along the way. Because light travels at a
much higher frequency than electrical signals, fiber-optic cable can easily
carry data at more than a billion bits per second usually 1300 Mbps. Fiber-
66 | P a g e
optic cable is also immune to the electromagnetic interference that is a
problem for copper wire.
Broadcast Radio
It is a wireless transmission medium that is used to communicate information
through radio signals in air, over long distance such as between cities and
countries. In this medium, a transmitter is required to send messages in form
of signals and receiver is required to receive them. To receive the broadcast
radio signal, the receiver has an antenna that is located in the range of signal.
Some networks use a special device called transceiver used to send and to
receive messages in the form of radio signals. The data transmission speed of
broadcast radio is up to 54Mbps.
67 | P a g e
Cellular Radio
Cellular radio is a form of broadcast radio that is used for mobile
communications such as cellular telephones and wireless modems. A cellular
telephone is a telephone device that uses high frequency radio waves to
transmit voice and digital messages. Some mobile users connect their laptop
computer or other mobile device to a cellular telephone to access the Web,
send and receive e-mail etc. while away from a standard telephone line.
Microwaves
Microwaves are radio waves that provide a high speed data transmission.
Using Microwaves transmission, data is transmitted from one station to
another. Microwave station contains an antenna, transceiver (transmitter &
receiver) and other equipments that are required for microwave
communication. Microwave uses the line-of-sight transmission, which means
that in microwave transmission system the data signals travel in a straight path
and cannot bend. Microwave stations or antennas are usually installed on the
high towers or buildings. Thus microwave stations need to be placed within 20
to 30 miles of each other. Each microwave station receives signals from the
previous stations. In this way, data is transmitted from one place to another.
Communication Satellite
A communication satellite is a space station that receives microwave signals
from earth microwave station (earth based station). The earth based stations
often are microwave stations. Other devices, such as PDAs and OPS receivers,
also functions as earth based stations. Transmitting a signal from ground or
earth station to a satellite station in space is called up-linking and the reverse is
called the down- linking.
Infrared
Infrared is a wireless transmission
medium that sends signals using
infrared light waves. Mobile
computers and devices, such as a
mouse, printer, and smart phone, often
have an IrDA port that enables the
transfer of data from one device to
another using infrared light waves.
These ports conform to standards
developed by the IrDA (Infrared Data
Association). To ensure nothing
obstructs the path of the infrared light
wave, you must align the IrDA port on
the device with the IrDA port on the
computer, similarly to the way you
operate a television remote control. Devices that use IrDA ports include a
smart phone, PDA, keyboard, mouse, and printer. Several of these devices use
a high-speed IrDA port, sometimes called a fast infrared port. Infrared requires
a line-of-sight transmission; that is, the sending device and the receiving
device must be in line with each other so that nothing obstructs the path of the
infrared light wave.
69 | P a g e
Q. DEFINE COMPUTER NETWORK. WHAT ARE THE
ADVANTAGES AND DISADVANTAGES OF NETWORK?
Computer Network
A computer network is a Group of computers which are connected to each for the
purpose of sharing data & resources and for communication between computers. The
main purpose of the network is to share the resources of an organization; these
resources may include data, printers, internet, scanner or other resources. In network
computers can be connected with the help of cables, telephone lines, radio waves or
through satellites.
Component of network:
A network consists of following:
Minimum 2 computers
Cable or wireless medium also called
transmission media
Networking devices i.e. NIC Card, Hub, Switch,
Router
Protocols as rules and regulations
Advantages of network:
File Sharing:
Networks offer a fast and easy way to share files among the computers in network.
Instead of using a disk or USB key to carry files from one computer or office to
another, you can share files directly using a network.
Security:
Network offers greater securities to the users. By using security software like
firewalls on server, we can secure the whole network. The sensitive data can be
secured and protected by password and by limiting the rights of the users we can
minimize the chances of data lost and data theft.
Resource Sharing:
All computers in the network can share resources such as printers, fax machines,
modems, and scanners.
Communication:
In a network user can communicate with others by using email, web browser, audio
and video conference tools.
Workgroup Computing:
Workgroup software like Microsoft BackOffice enables many users to contribute to a
document concurrently. This allows for interactive teamwork.
70 | P a g e
Easier backup
Network provides easy and flexible way for backing up the data and hence restoring
it.
Disadvantages:
There are some disadvantages of using networks. Of course, these small
disadvantages of running a network are much outweighed by the many advantages of
setting up a home or office network, but you should still take them into consideration
when you are installing your network.
Damaged Cables:
Cables are usually used as main medium for communication in a network. If cables
are broken or damaged then it is not possible to communicate through network.
71 | P a g e
Q. WHAT ARE THE DIFFERENT MODELS OF NETWORK?
Answer:
Peer-to-Peer
This is the simplest form of network to share data and resources. Two or more
computers are connected through wires or wirelessly. In this model of network, all the
computers in the network are at the same level and users have direct access to the
other computers and the peripherals attached to
the network. These are the very economical
and simple to install. No dedicated server is
needed to run this network. This is very much
useful for smaller networks.
This type of network means that every PC,
once connected to the network is acting both as
a server and a client. There is no need for a
special network operating system. Access
rights to files, folders and data is controlled by
setting the sharing permissions on individual
machines. So for example, if User A wants to
access some files from User B's computer,
User B must set their permissions to allow this.
Otherwise, User A won't be able to see or
access any of User B's work.
Advantages:
No need for a network operating system
Does not need an expensive server because individual workstations are used to
access the files
No need for specialist staff such as network technicians.
Much easier to set up than other network models
Disadvantages:
Because each computer might be being accessed by others it can slow down
the performance for the user
Files and folders cannot be centrally backed up
Files and resources are not centrally organized into a specific 'shared area'.
They are stored on individual computers and might be difficult to locate if the
computer's owner doesn't have a logical filing system.
Ensuring that viruses are not introduced to the network is the responsibility of
each individual user
There is little or no security besides the permissions. Users often don't need to
log onto their workstations.
72 | P a g e
Server Based
A server based network is ideal for
larger companies that want to
streamline their network by storing
files in a central location, encourage
collaboration, and provide a way to
access workstation when employees
are away from their desks. In addition
you can rest worry-free that your data
is secure.
Advantages:
A server enables file storage in
one central location where
employees can access data and
work collaboratively with
ease.
Running software from a server means that you can upgrade multiple systems
at the same time — keeping your systems in sync.
With a server based network a Virtual Private Network (VPN) can be set up to
access the server over the Internet. You can then access your network when
away from the office, no matter where you or your employees are.
Employees can share not only the files they're working on, but also group
calendars, contact lists and project management applications.
Servers can be configured to back up data automatically using duplicate hard
drives, recording data to tape systems or copying your files to secure off-site
locations.
To keep your data safe from outside threats you can tightly control Internet
interaction. By using multiple levels of access control, data encryption and
firewalls designed to keep intruders and viruses out, you keep your
information safe from prying eyes and hackers, while also enjoying the
convenience of a wireless office setup.
Disadvantages
Often a central server can be quite a bit more expensive than a single
workstation
A server requires some level of administration. That is, someone who knows
how to set it up, create/modify users and groups, apply security, etc.
73 | P a g e
for resources, such as files, devices, and even processing power. Client/server
architecture is widely used, and has following unique advantages and disadvantages:
Advantages:
It has the centralized control i.e. centralized user accounts, security, and access
to simplify network administration.
It does not slow down with heavy use.
The size of the network can be expanded to any size.
Proper Management: All the files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
As all the data is stored on server, so it is easy to make a back-up of data.
Reduces Data Replication - Data stored on the servers instead of each client,
so it reduces the amount of data replication for the application.
Disadvantages:
Whole network is failed if server is failed.
It is very expensive to install and manage as dedicated hardware (server) and
special software is required.
Professional IT people are required to maintain the servers and other technical
details of network.
74 | P a g e
Q. DESCRIBE DIFFERENT TYPES OF NETWORK IN DETAILS.
Types of Network
The networks can be divided into different types on the basis of their geographical
limits. The physical area that a network covered may be in a small room, throughout a
city or it may be around the world.
LAN connections can only operate in a local area which is usually not any bigger then
a house, or a floor in an office building. Typically a LAN will consist of only a
handful of clients, but can have upwards of a hundred. One of the major advantages of
LANs is the high speed of data communication. Another advantage to having a LAN
connection is the cost, it is relatively cheap to have as it tends to require less advanced
infrastructure to keep it running. A LAN connection is very easy to setup and simple
in nature, all you need is some cables, a network switch, and you are good to go.
Alternatively, you can also see LANs being done over Wi-Fi.
75 | P a g e
Metropolitan Area Networks
A metropolitan area network (MAN) is
a network with a size between a LAN
and a WAN. It normally covers the area
inside a town or a city. It is designed
for customers who need a high-speed
connectivity, normally to the Internet,
and have endpoints spread over a city
or part of city. A good example of a
MA N is the part of the telephone
company network that can provide a
high-speed DSL line to the customer.
Another example is the cable TV
network that originally was designed
for cable TV, but today can also be used for high-speed data connection to the
Internet.
We normally refer to
the first as a switched
WA N and to the
second as a point-to-
point WAN. The
switched WAN
connects the end
systems, which usually
comprise a router
(internet-working
connecting device) that
connects to another LA
N or WAN. The point-
to-point WA N is
normally a line leased from a telephone or cable TV provider that connects a home
computer or a small LAN to an Internet service provider (ISP). This type of WAN is
often used to provide Internet access.
Advantages of WAN
Some important advantages of WAN are as follows:
Communication Facility:
A big company may exist at multiple locations in country. The employees can
communicate using WAN. It saves long distance phone calls. Video
76 | P a g e
conferencing is another use of WAN where users can communicate with each
other through their computer systems.
Centralized Data:
The centralized data storage is an important advantage of WAN. It means that
data can be stored in single location even if the organization is spread over
many cities. WAN can manage critical data in a better way by storing it at a
centralized server. The centralized data can be shared among different users
anywhere in the world.
Entertainment:
WAN can facilitate many types of games and entertainment to the user. For
example, Internet provides many sources of entertainment. Many multiplayer
games are available that can be played over WAN.
Disadvantages of WAN
Some important disadvantages of WAN are as follows:
Setup Cost:
Setting up a WAN requires an investment in hardware, software, planning,
designing and implementing. The devices used in WAN are very expensive.
Management Cost:
Managing a WAN is complicated. It requires intensive trained staff to handle.
A network manager and network team usually need to be employed.
Failure of Server:
If a server fails, all computer connected with server are affected and it may
leads to failure of whole network.
77 | P a g e
Q. WHAT IS NETWORK TOPOLOGY? EXPLAIN DIFFERENT
TOPOLOGIES OF NETWORK.
TOPOLOGY:
Bus Topology
Bus topology uses a common backbone to connect all the network devices in a
network in a linear shape. A single cable functions as the shared communication
medium for all the devices attached with this cable with an interface connector. The
device, which wants to communicate send the broadcast message to all the devices
attached with the shared cable but only the intended recipient actually accepts and
Ring Topology
In ring Network, every computer or devices have two adjacent neighbors for
communication. In a ring network, all the communication messages travel in the same
78 | P a g e
direction whether clockwise or anti clockwise. Any damage of the cable of any cable
or device can result in the breakdown of the whole network. Ring topology now has
become almost obsolete.
Star Topology
In the computer networking world the most
commonly used topology in LAN is the star
topology. Star topologies can be implemented in
home, offices or even in a building. All the
computers in the star topologies are connected to
central devices like hub, switch or router. The
functionality of all these devices is different.
Computers in a network are usually connected with
the hub, switch or router with the Unshielded
Twisted Pair (UTP) or Shielded Twisted Pair
Cables.
Tree Topology
Tree topologies are comprised of the
multiple star topologies on a bus. Tree
topologies integrate multiple star
topologies together onto a bus. Only the
79 | P a g e
hub devices can connect directly with the tree bus and each Hub functions as a root of
a tree of the network devices. This bus/star/hybrid combination supports future
expandability of the computer networks.
Advantages
The tree topology is useful in cases where a star or bus cannot be implemented
individually. It is most-suited in networking multiple departments of a
university or corporation.
The advantages of centralization that are achieved in a star topology are
inherited by the individual star segments in a tree network.
Each star segment gets a dedicated link from the central bus. Thus, failing of
one segment does not affect the rest of the network.
Fault identification is easy.
The network can be expanded by the addition of secondary nodes. Thus,
scalability is achieved.
Disadvantages
As multiple segments are connected to a central bus, the network depends
heavily on the bus. Its failure affects the entire network.
Owing to its size and complexity, maintenance is not easy and costs are high.
Also, configuration is difficult in comparison to that in other topologies.
Though it is scalable, the number of nodes that can be added depends on the
capacity of the central bus and on the cable type.
Mesh Topology
Mesh topology work on the concept of routes. Internet employs the Mesh topology
and the message finds its route for its destination. Router works in find the routes for
the messages and in reaching them to their destinations.
Advantages
The arrangement of the network
nodes is such that it is possible to
transmit data from one node to
many other nodes at the same
time.
The failure of a single node does
not cause the entire network to
fail as there are alternate paths for
data transmission.
It can handle heavy traffic, as
there are dedicated paths between
any two network nodes.
Point-to-point contact between every pair of nodes makes it easy to identify
faults.
Disadvantages
The arrangement wherein every network node is connected to every other
node of the network, many connections serve no major purpose. This leads to
redundancy of many network connections.
80 | P a g e
A lot of cabling is required. Thus, the costs incurred in setup and maintenance
are high.
Owing to its complexity, the administration of a mesh network is difficult.
81 | P a g e
82 | P a g e
Q. WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF
INTERNET IN HUMAN LIFE?
Answers:
Advantages
Communication:
The foremost target of internet has always been the communication. And internet has
excelled beyond the expectations .Still; innovations are going on to make it faster and
more reliable. By the advent of computer’s Internet, our earth has reduced and has
attained the form of a global village.
Information:
Information is probably the biggest advantage internet is offering. The Internet is a
virtual treasure trove of information. Any kind of information on any topic under the
sun is available on the Internet. The search engines like Google, yahoo is at your
service on the Internet. You can almost find any type of data on almost any kind of
subject that you are looking for. There is a huge amount of information available on
the internet for just about every subject known to man, ranging from government law
and services, trade fairs and conferences, market information, new ideas and technical
support, the list is end less.
Entertainment:
Entertainment is another popular reason that why many people prefer to surf the
Internet. In fact, media of internet has become quite successful in trapping versatile
83 | P a g e
entertainment factor. Downloading games, visiting chat rooms or just surfing the Web
are some of the uses people have discovered. There are numerous games that may be
downloaded from the Internet for free. The industry of online gaming has tasted
dramatic and phenomenal attention by game lovers.
Services:
Many services are now provided on the internet such as online banking, job seeking,
purchasing tickets for your favorite movies, guidance services on array of topics
engulfing the every aspect of life, and hotel reservations. Often these services are not
available off-line and can cost you more.
E-Commerce:
Ecommerce is the concept used for any type of commercial maneuvering, or business
deals that involves the transfer of information across the globe via Internet. It has
become a phenomenon associated with any kind of shopping, almost anything. You
name it and Ecommerce with its giant tentacles engulfing every single product and
service will make you available at your door steps. It has got a real amazing and wide
range of products from household needs, technology to entertainment.
E-MAIL
E-mail stands for electronic mail. It is the most popular, cheap, easy and fastest
mailing service. We can send and receive messages on internet with in seconds or
minutes.
Online banking
Several banks are online now. So we can manage our bank accounts on internet. Due
to online banking, money is transferred from one city or country to another within
seconds or minutes.
Job search
You can search jobs on internet. There are many job seeking sites on internet.
Search engine
Internet contains a very large amount of information. Search engine is used to easily
and quickly find the required information. Many sites provide facility of search
engine like Google, Yahoo, Find, Lycos and AltaVista.
Chat
It is the most popular services by which two users can live chat with each other. It is
just like talking on telephone. We can chat by text or audio or video. Messenger
software like Yahoo messenger or MSN messenger is used for chatting.
84 | P a g e
Traveling Guides
You can find information about any country of the world on internet. You can find
maps of any country and big cities.
Disadvantages of Internet
Spamming:
Spamming refers to sending unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system. Such illegal activities can be very frustrating for
you, and so instead of just ignoring it, you should make an effort to try and stop these
activities so that using the Internet can become that much safer.
Virus threat:
Virus is nothing but a program which disrupts the normal functioning of your
computer systems. Computers attached to internet are more prone to virus attacks and
they can end up into crashing your whole hard disk, causing you considerable
headache.
Hacking
Hackers access the important information and programs and may destroy it. Hackers
try to get password of internet users and then access important information.
Wastage of time
There are so many interesting facilities on internet. So people use internet for several
hours. In this way valuable time is wasted.
Online robbery
Important documents are stolen on internet. Passwords of credit cards are stolen on
internet. This can do financial loss.
85 | P a g e
Q. WHAT IS CYBER CRIME? DESCRIBE TYPES OF CYBER CRIMES.
Answer:
Computer Crimes
Computer crime includes traditional criminal acts committed with a computer, as well
as new offenses that lack any parallels with non-computer crimes. The U.S.
Department of Justice (DOJ) broadly defines computer crimes as “any violations of
criminal law that involve knowledge of computer technology for their perpetration,
investigation, or prosecution.”
Cyber Crimes
Any illegal activity which involves computer, internet, telecommunication and
networks is called cyber crimes. Following are the major types of cyber crimes.
The crimes through credit cards may be minimized if sellers use following steps on
booking of orders
o Use common sense. Don’t immediately ring up orders received.
o Call customers to confirm.
o Use tracking codes in order forms.
o Ship only within the country.
o Accept orders only from ISP or domain name email addresses.
Hacking
An illegal access to a computer or a network is called hacking. Hacking involves
compromising the security of networks, breaking the security of application software
or creating malicious programs such as viruses.
86 | P a g e
The most common technique used technique used by hackers is scanning. Hackers
have created tools that scan computers for weak spots. It can be an operating system
that hasn't been upgraded or a port in the computer that it is open without the
knowledge of the user.
Hackers use this "open window" to get inside your computer in order to do whatever
they want to do. The interesting thing about this is that these hacker tools are available
for free in the Internet. So, with a couple of hours of instructions, almost every
computer user can become a hacker.
Another way that hackers can access your machine is through malware: programs
designed to capture vital information from your computer, like login users and
passwords. Malware could be hidden in a PowerPoint presentation sent by email or
even in an innocent Instant Messenger message window.
Identity Theft
Identity theft occurs when a cybercriminal uses another person’s personal data like
credit card numbers or personal pictures without their permission to commit a fraud or
a crime.
Ransomware Attack
Ransomware attacks are a very common type of cybercrime. It is a type of malware
that has the capability to prevent users from accessing all of their personal data on the
system by encrypting them and then asking for a ransom in order to give access to the
encrypted data.
Internet Fraud
Internet fraud is a type of cybercrimes that makes use of the internet and it can be
considered a general term that groups all of the crimes that happen over the internet
like spam, banking frauds, theft of service, etc.
Cyber Bullying
It is also known as online or internet bullying. It includes sending or sharing harmful
and humiliating content about someone else which causes embarrassment and can be
a reason for the occurrence of psychological problems. It became very common lately,
especially among teenagers.
Cyber Stalking
Cyber Stalking can be defined as unwanted persistent content from someone targeting
other individuals online with the aim of controlling and intimidating like unwanted
continued calls and messages.
Software Piracy
Software piracy is the illegal use or copy of paid software with violation of copyrights
or license restrictions.
87 | P a g e
An example of software piracy is when you download a fresh non-activated copy of
windows and use what is known as “Cracks” to obtain a valid license for windows
activation. This is considered software piracy. Not only software can be pirated but
also music, movies, or pictures.
Cyber Extortion
Cyber extortion is the demand for money by cybercriminals to give back some
important data they've stolen or stop doing malicious activities such as denial of
service attacks.
Intellectual-property Infringements
It is the violation or breach of any protected intellectual-property rights such as
copyrights and industrial design.
Cyberterrorism
Cyberterrorism is the leveraging of an organization’s or government’s computers and
information, particularly via the Internet, to cause physical, real-world harm or severe
disruption of infrastructure. There are some that argue cyberterrorism is really a form
of hacking or information warfare. They disagree with labeling it terrorism because of
the unlikelihood of the creation of fear, significant physical harm, or death in a
population using electronic means, considering current attack and protective
technologies.
88 | P a g e
Identity Theft:
This is one of the most serious frauds as it involves stealing money and obtaining
other benefits through the use of a false identity. It is the act of pretending to be
someone else by using someone else's identity as one's own. Financial identity theft
involves the use of a false identity to obtain goods and services and a commercial
identity theft is the using of someone else’s business name or credit card details for
commercial purposes. Identity cloning is the use of another user's information to pose
as a false user. Illegal migration, terrorism and blackmail are often made possible by
means of identity theft.
Salami Attacks
In such crime criminal makes insignificant changes in such a manner that such
changes would go unnoticed. Criminal makes such program that deducts small
amount like Rs. 2.50 per month from the account of all the customer of the Bank and
deposit the same in his account. In this case no account holder will approach the bank
for such small amount but criminal gains huge amount.
Cyber Defamation
The Criminal sends emails containing defamatory matters to all concerned of the
victim or post the defamatory matters on a website. Disgruntled employee may do this
against, ex boss, ex- boyfriend against girl, divorced husband against wife etc.
89 | P a g e
Q. What is e-commerce? Describe different types / models of e-commerce.
Answer:
Two thousand years ago, Roman roads brought trade and commerce to Europe in an
unprecedented manner. A thousand years ago, the spice routes linked the cultures of
East and West. At the dawn of the second millennium, the Internet, the world’s largest
computer network, the network of networks, is making fundamental changes to the
lives of everyone on the planet-changing forever the way business is conducted.
Internet has become an important medium for doing global business based on the state
of the art technology. Global business was conducted in a new way: electronically,
using networks and the Internet. The availability of Internet has led to the
development of E-Commerce (Electronic commerce), in which business transactions
take place via telecommunication networks.
90 | P a g e
C2B - Consumer to Business
Consumer to Business is a growing arena where the consumer requests a specific
service from the business. Example: Harry is planning a holiday in Darwin. He
requires a flight in the first week of December and is only willing to pay Rs. 250.
Harry places a submission with in a web based C2B facility. Dodgy Brothers Airways
accesses the facility and sees Harry’s submission. Due to it being a slow period, the
airline offers Harry a return fare for Rs. 250.
B2G e-commerce
Business-to-government e-commerce or B2G is generally defined as commerce
between companies and the public sector. It refers to the use of the Internet for public
procurement, licensing procedures, and other government-related operations. This
kind of e-commerce has two features: first, the public sector assumes a pilot/leading
role in establishing e-commerce; and second, it is assumed that the public sector has
the greatest need for making its procurement system more effective.
C2B E-Commerce
C2B or Consumer to Business transactions involves reverse auctions, which empower
the consumer to drive transactions. A concrete example of this when competing
airlines gives a traveler best travel and ticket offers in response to the traveler’s post
that she wants to fly from New York to San Francisco. There is little information on
the relative size of global C2C e-commerce. However, C2C figures of popular C2C
sites such as eBay and Napster indicate that this market is quite large. These sites
produce millions of dollars in sales every day.
M-commerce
M-commerce (mobile commerce) is the buying and selling of goods and services
through wireless technology-i.e., handheld devices such as cellular telephones and
personal digital assistants (PDAs). Japan is seen as a global leader in m-commerce.
As content delivery over wireless devices becomes faster, more secure, and scalable,
some believe that m-commerce will surpass wireline e-commerce as the method of
choice for digital commerce transactions. This may well be true for the Asia-Pacific
where there are more mobile phone users than there are Internet users.
91 | P a g e
Q. WHAT IS INFORMATION SYSTEM? DESCRIBE ITS MAIN
COMPONENTS OF INFORMATION SYSTEM.
Answer:
An information system
depends on the resources of
people (end users and IS
specialists), hardware
(machines and media),
software (programs and
procedures), data (data and
knowledge basis), and
networks (communications
media and network support) to
perform input, processing,
output, storage, and control
activities that convert data
resources into information
products.
This information system
model highlights the relationships among the components and activities of
information systems. People, hardware, software, data, and networks are the five basic
resources of information systems.
People resources include end users and IS specialists.
Hardware resources consist of machines and media
Software resources include both programs and procedures, data resources can
include data and knowledge bases,
Network resources include communications media and networks.
Data resources are transformed by information processing activities into a
variety of information products for end users.
PEOPLE RESOURCES
People are required for the operation of all information systems. The people resources
include end users and IS specialists.
End users (also called users or clients) are people who use an information
system or the information it produces. They can be accountants, salespersons,
engineers, clerks, customers, or managers. Most of us are information system
end users.
IS Specialists are people who develop and operate information systems. They
include systems analysts, programmers, computer operators, and other
managerial technical, and clerical IS personnel. Briefly, systems analysts
92 | P a g e
design information systems based on the information requirements of end
user, programmers prepare computer programs based on the specifications of
systems analysts, and computer operators operate large computer systems.
HARDWARE RESOURCES
The concept of Hardware resources includes all physical devices and materials used in
information processing. Specially, it includes not only machines, such as computers
and other equipment, but also all data media, that is, all tangible objects on which data
is recorded, from sheets of paper to magnetic disks. Example of hardware in
computer-based information systems are:
Computer systems, which consist of central processing units
containing microprocessors, and variety of interconnected peripheral
devices. Examples are microcomputer systems, midrange computer
systems, and large mainframe computer systems.
Computer peripherals, which are devices such as a keyboard or
electronic mouse for input of data and commands, a video screen or
printer for output of information, and magnetic or optical disks for
storage of data resources.
SOFTWARE RESOURCES
The concept of Software Resources includes all sets of information processing
instructions. This generic concept of software includes not only the sets of operating
instructions called programs, which direct and control computer hardware, but also
the sets of information processing instructions needed by people, called procedures.
It is important to understand that even information systems that don’t use computers
have a software resource component. This is true even for the information systems of
ancient times, or the manual and machine-supported information systems still used in
the world today. They all require software resources in the form of information
processing instructions and procedures in order to properly capture, process, and
disseminate information to their users. The following are the examples of software
resources:
System Software, such as an operating system program, which can controls
and supports the operations of a computer system.
Application Software, which are programs that direct processing for a
particular use of computers by end users. Examples are a sales analysis
program, a payroll program, and a worksheet processing program.
Procedures, which are operating instructions for the people who will use an
information system. Examples are instructions for filling out a paper form or
using a software package.
DATA RESOURCES
Data is more than the raw material of information systems. The concept of data
resources has been broadened by managers and information systems professionals.
They realize that data constitutes a valuable organization resource. Thus, you should
view data as data resources that must be managed effectively to benefit all end users
in an organization. Data can take many forms, including traditional alphanumeric
data, composed of numbers and alphabetical and other characters that describe
business transactions and other events and entities.
Text data, consisting of sentences and paragraphs used in written communications;
image data, such as graphic shapes and figures; and audio data, the human voice and
93 | P a g e
other sounds, are also important forms of data. The data resources of information
systems are typically organized into:
Database that hold processed and organized data.
Knowledge bases that hold knowledge in variety of forms such as facts, rules,
and case examples about successful business practices. For example, data
about sales transactions may be accumulated and stored in a sales database for
subsequent processing that yields daily, weekly, and monthly sales analysis
reports for management. Knowledge bases are used by knowledge
management systems and expert systems to share knowledge and give expert
advice on specific subjects.
NETWORK RESOURCES
Telecommunications networks like the Internet, intranets, and extranets have become
essential to the successful operations of all types of organizations and their computer-
based information systems. Telecommunications networks consist of computers,
communications processors, and other devices interconnected by communications
media and controlled by communications software. The concept of Network resources
emphasizes that communications networks are a fundamental resource component of
all information systems. Network resources include:
Communication media, Examples include twisted pair wire, coaxial cable,
fiber-optic cable, microwave systems, and communication satellite systems.
Network Support, This generic category includes all of the people, hardware,
software, and data resources that directly support the operation and use of a
communications network. Examples include communications control software
such as network operating systems and Internet packages.
94 | P a g e