Basic Science and Engineering
Basic Science and Engineering
Basic Science and Engineering
Generations of Computer
There are a total of five Generations of Computer, with each Generation something new was
discovered to improvise the functioning and the use of the computer systems.
First Generation (Vacuum Tubes) – 1940-1956:
This Generation computers relied on Machine Language (the Language of 0s and 1s) and used
Vacuum tubes as components of memory. They were huge in size and occupied almost a room-size
area to fit in.
Given below are a few characteristic features of the 1st Generation of computer:
● The price of managing these computers was very high.
● They were huge.
● They were not capable of multitasking, and only one task could be performed at a time.
● There was no use of monitors; the output was directly given in the form of print outs.
● The electricity consumption was very high.
Examples of computers developed in this generation are ENIAC – Electronic Numeric Integrated and
Computer, UNIVAC- Universal Automatic Computer, EDSAC – Electronic Delay Storage Automatic
Calculator and EDVAC – Electronic Discrete Variable Automatic Computer
Classification of Computers
There are three major categories based on which computers can be classified. These are:
1. Based on Size
2. Based on Purpose
3. Based on Types
The image given below gives a clear classification of the Types of Computers:
These may include basic calculators, laptops, desktop computers, mobile phones, etc., which can
help people with their basic necessary functions are included in the General Purpose computer
type.
1. Keyboard
● A simple device comprising keys and each key denotes either an alphabet, number or
number commands which can be given to a computer for various actions to be performed
● It has a modified version of typewriter keys
● The keyboard is an essential input device and computer and laptops both use keyboards to
give commands to the computer
2. Mouse
3. Joy Stick
● It is a device which comprises a stick which is attached at an angle to the base so that it can
be moved and controlled
● Mostly used to control the movement in video games
● Apart from a computer system, a joystick is also used in the cockpit of an aeroplane,
wheelchairs, cranes, trucks, etc. to operate them well
4. Light Pen
● It is a wand-like looking device which can directly be moved over the device’s screen
● It is light-sensitive
● Used in conjunction with computer’s cathode ray tube
5. Microphone
6. Scanner
● This device can scan images or text and convert it into a digital signal
● When we place any piece of a document on a scanner, it converts it into a digital signal and
displays it on the computer screen
7. Barcode Reader
1. Monitor
● The device which displays all the icons, text, images, etc. over a screen is called the Monitor.
● When we ask the computer to perform an action, the result of that action is displayed on
the monitor.
● Various types of monitors have also been developed over the years.
2. Printer
● A device which makes a copy of the pictorial or textual content, usually over a paper is called
a printer.
● For example, an author types the entire book on his/her computer and later gets a print out
of it, which is in the form of paper and is later published.
● Multiple types of printers are also available in the market, which can serve different
purposes.
3. Speakers
4. Projector
● An optical device which presents an image or moving images onto a projection screen is
called a projector.
● Most commonly these projectors are used in auditoriums and movie theatres for the display
of the videos or lighting.
● If a projector is connected to a computer, then the image/video displayed on the screen is
the same as the one displayed on the computer screen.
5. Headphones
● They perform the same function as a speaker, the only difference is the frequency of sound.
● Using speakers, the sound can be heard over a larger area and using headphones, the sound
is only audible to the person using them.
● Also known as earphones or headset
1. Input Unit
2. Output Unit
3. Memory Unit
4. Control Unit
5. Arithmetical and Logical Unit
Input Unit
● A computer will only respond when a command is given to the device. These commands can
be given using the input unit or the input devices.
● For example: Using a keyboard we can type things on a Notepad and the computer
processes the entered data and then displays the output of the same of the screen.
● The data entered can be in the form of numbers, alphabet, images, etc. We enter the
information using an input device, the processing units convert it into computer
understandable languages and then the final output is received by a human-understandable
language.
Output Unit
● When we command a computer to perform a task, it reverts back for the action performed
and gives us a result. This result is called output. There are various output devices connected
to the computer. The most basic of which is a monitor. Whatever we write using a keyboard
or click using a mouse, is all displayed on the monitor.
● Thus, the output unit gives us the final result once the entire processing is done within the
mechanism of a device.
● For example: when we visit an ATM, we enter our details like language, pin, amount to be
withdrawn, etc. and then the final money which the cash dispenser releases is our outcome.
In this case, the cash dispenser acts as an output unit.
Memory Unit
● When we enter the data into the computer using an input device, the entered information
immediately gets saved in the memory unit of the Central Processing Unit (CPU). Because of
the presence of some existing programming, the Memory Unit transmits the data further to
the other parts of the CPU.
● Similarly, when the output of our command is processed by the computer, it is saved in the
memory unit before giving the output to the user.
Control Unit
● This is the core unit which manages the entire functioning of the computer device. It is one
of the most essential components of the computer system.
● The Control Unit collects the data entered using the input unit, leads it on for processing and
once that is done, receives the output and presents it to the user. It can be said to the centre
of all processing actions taking place inside a computer device.
● Basically, the instructions taken, interpretation of entered data, issuing signals to execute the
data and then finally retrieving the data is all done in the Control Unit.
All these three units are elements of CPU and together help in the efficient working and processing
of data. It is also known as the “Brain of Computer” and no action can be conducted by a device
without the execution and permission of the Central Processing Unit.
The device is a close-knit circuit comparison microprocessor which helps in fetching the data and
proving suitable results to the user. Thus, CPU is the main processing unit of the computer.
● Speed of the System – In case a virus is completely executed into your device, the time
taken to open applications may become longer and the entire system processing may start
working slowly
● Pop-up Windows – One may start getting too many pop up windows on their screen which
may be virus affected and harm the device even more
● Self Execution of Programs – Files or applications may start opening in the background of
the system by themselves and you may not even know about them
● Log out from Accounts – In case of a virus attack, the probability of accounts getting hacked
increase and password protected sites may also get hacked and you might get logged out
from all of them
● Crashing of the Device – In most cases, if the virus spreads in maximum files and programs,
there are chances that the entire device may crash and stop working
● Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or the
Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files which are
required to start the Operating system of the computer. The virus either overwrites the
existing program or copies itself to another part of the disk.
● Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and enters
the device while its execution is called a Direct Action Virus. If it gets installed in the
memory, it keeps itself hidden. It is also known as Non-Resident Virus.
● Resident Virus – A virus which saves itself in the memory of the computer and then infects
other files and programs when its originating program is no longer working. This virus can
easily infect other files because it is hidden in the memory and is hard to be removed from
the system.
● Multipartite Virus – A virus which can attack both, the boot sector and the executable files
of an already infected computer is called a multipartite virus. If a multipartite virus attacks
your system, you are at risk of cyber threat.
● Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove the existing program and replace it with the malicious code by overwriting it.
Gradually it can completely replace the host’s programming code with the harmful code.
● Polymorphic Virus – Spread through spam and infected websites, the polymorphic virus are
file infectors which are complex and are tough to detect. They create a modified or morphed
version of the existing program and infect the system and retain the original code.
● File Infector Virus – As the name suggests, it first infects a single file and then later spreads
itself to other executable files and programs. The main source of this virus are games and
word processors.
● Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file with
viruses. It is known as cavity virus. It will neither affect the size of the file nor can be
detected easily.
● Macro Virus – A virus written in the same macro language as used in the software program
and infects the computer if a word processor file is opened. Mainly the source of such
viruses is via emails.
What is an Anti-Virus?
An anti-virus is a software which comprises programs or set of programs which can detect and
remove all the harmful and malicious software from your device. This anti-virus software is
designed in a manner that they can search through the files in a computer and determine the files
which are heavy or mildly infected by a virus.
Given below is a list of few of the major antivirus software which is most commonly used:
● Norton Antivirus
● F-Secure Antivirus
● Kaspersky Antivirus
● AVAST Antivirus
● Comodo Antivirus
● McAfee Antivirus
● The first development was the introduction of host-to-host network interactions. This was
first observed in ARPANET in 1969. It was developed by Advanced Research Projects Agency
(APRA) of the Department of Defence, U.S. It was one of the first general usage of computer
networks.
● Next step was commercialising the usage and making the transistors and transmitters fit in
smaller devices for convenient Internet usage for the general public. This was introduced in
the 1970s
● Moving forward, satellites and wireless communication was the main target. Defence
Advanced Research Projects Agency (formerly ARPA), supported satellite-based radio
packets for mobile usage of networks
● The next was the development of Transmission Control Protocol (TCP). This enabled different
machines and networks across the world to assemble data packets. It was in the 1980s that
the TCP/IP approach was adapted by researchers and technologists, following the footsteps
of the U.S. Department of Defence
● With the introduction of personal computers, the demand for commercial Internet usage
increased. This was the time when Ethernet and other Local Area Networks cam in the
foreground
● In 1993, the web browser was introduced, which followed the point-and-click approach and
is now a widely used operation for Internet users
● The late 1990s was the time when thousands of Internet Service Providers has taken up the
market and most of them were from the U.S.
● And then the 21st century brought in an amalgamation of technology and wireless Internet
accessibility for its users. Wherein, wireless broadband services came in as a boon for
Internet users
● Dial-Up – In such connections, users are required to link their phone line to a computer to
access the Internet. Under this connection, the user cannot make or receive phone calls
through tier home phone service.
● Broadband – Provided either through cable or phone companies, Broadband is a high-speed
internet connection which is widely used today.
● Wireless Connection – Wi-fi and Mobile service providers fall under this category. Internet
connectivity is made via radio waves and the Internet can be connected anywhere,
irrespective of the location. Given below are a few examples of wireless connection:
o Wi-fi – Wireless Fidelity or wi-fi allows high-speed internet connectivity without the
use of wires.
o Mobile Phones – All smartphones are now equipped with an option for Internet
connectivity which can be availed using Internet vouchers and packs. No external
connection or wire is required for these.
o Satellite – Where broadband connections are unavailable, satellites are used for
wireless Internet connectivity.
o Integrated Services Digital Network – ISDN allows users to sent audio or video data
using telephone lines.
● TCP/IP Network Model – Transmission Control Protocol (TCP) and Internet Protocol (IP) are
the most widely used protocols for connecting networks. It divides any message into a series
of packets which are sent from source to destination
● File Transfer Protocol – Program files, multimedia files, text files, documents, etc. can be
transferred from one device to another, using FTP
● Hypertext Transfer Protocol – Used for transferring a hypertext from one device to two or
more devices. HTML tags are used for creating links and these links may be in the form of
text or images
● Easy Access to Information – Information on anything and everything are available online.
The Internet makes it convenient to learn about new things at any point in time and get
details on various subjects, irrespective of time and place
● Platform for Online Education – With the advanced technology, even students and adults
wish to learn new things and gaining knowledge at various online portals has become more
accessible
● Job Hunting – Employers can look for employees on the internet and the job seekers can
apply online for jobs using the Internet
● Platform to become an Entrepreneur – Today, thousands of people have started their own
websites and getting good business and users/customers by making their own websites and
selling products or services. This has become accessible due to Internet connectivity
● Visual and Graphical Representation of Things – Various researches have shown that a
person tends to get more engaged with a graphical representation of things. Internet has
made this facility also convenient for both user and creator
● Reduced the parameter of Distance – Social media has reduced the distance between
people as communication has become much easier because of Internet connection
With the Internet being an extremely essential part of daily life, it is important that a person is well
aware of the disadvantages of the Internet and its excess usage.
Cons of Internet
● Dependency – The dependency of people for looking things and information online has
increased massively since the introduction of Internet and its easy access
● Cyber Crime – People do not just use internet for learning purposes, cybercrime has also
been at a distinctive high because of effortless availability of resources
● Distraction – People can easily find online games, interesting information, etc. online which
may be a cause of distraction for may
● Bullying and Trolls – Online platforms are being used for unethical practises like bullying
people and trolling them
Computer Networks
Network Topologies
Given below are the eight types of Network Topologies:
● Point to Point Topology – Point to Point topology is the simplest topology that connects two
nodes directly together with a common link.
● Bus Topology – A bus topology is such that there is a single line to which all nodes are
connected and the nodes connect only to the bus.
● Mesh Topology – This type of topology contains at least two nodes with two or more paths
between them.
● Ring Topology – In this topology every node has exactly two branches connected to it. The
ring is broken and cannot work if one of the nodes on the ring fails.
● Star Topology – In this network topology, the peripheral nodes are connected to a central
node, which rebroadcasts all the transmissions received from any peripheral node to all
peripheral nodes on the network, including the originating node.
● Tree Topology – In this type of topology nodes are connected in the form of a tree. The
function of the central node in this topology may be distributed.
● Line Topology – in this topology all the nodes are connected in a straight line.
● Hybrid Topology – When two more types of topologies combine together, they form a
Hybrid topology.
Network Devices
Discussed below are a few important network devices from the exam point of view:
Operating System
An Operating System is the interface between the computer hardware and the end-user. Processing
of data, running applications, file management and handling the memory is all managed by the
computer OS. Windows, Mac, Android etc. Are examples of Operating systems which are generally
used nowadays.
All modern computing devices including Laptops, Tablet, mobile phones, etc. comprise an Operating
System which helps in the smooth working of the device.
● Initially, the computers made did not have an Operating system and to run each program a
different code was used. This had made the processing of data more complex and time
taking
● In 1956, the first operating systems were developed by General Motors to run a single IBM
computer
● It was in the 1960s that IBM had started installing OS in the devices they launched
● The first version of the UNIX operating system was launched in the 1960s and was written in
the programming language C
● Later on, Microsoft came up with their OS on the request of IBM
● Today, all major computer devices have an operating system, each performing the same
functions but with slightly different features
Types of Operating System
1. Batch Operating System
● There is no direct communication between the computer and the OS.
● There is an intermediate, the Operator, which needs to distribute the work into batches and
sort similar jobs.
● Multiple users can use it.
● Can easily manager a large amount of work.
● Multiple people at various terminals can use a program at the same time.
● The main motive is to minimize the response time.
● When two or more systems are connected to each other and one can open files which are
not present in their system but in other devices connected in the network.
● Its usage has now increased over the years.
● They use multiple central processors to serve real-time applications.
● Failure of one system does not affect the other systems connected in the network.
● They have one main server which is connected to other client servers.
● All the management of files, processing of data, access to sharing files, etc. are performed
over this small network.
● It is also a secure operating system for working with multiple users.
● With the advancement in the field of technology, smartphones now are released with an
Operating system.
● They are designed in a manner that they can help a small device work efficiently
Functions of Operating System
● It helps with memory management. It keeps a track of the files being saved in the Main
memory and the primary memory of the computer device
● Whenever a computer is turned on, the Operating system automatically starts to work. Thus,
the booting and rebooting process of a computer device is also an important function of the
OS
● It provides a user interface
● Managing of basic peripheral devices is done by the operating system
● Using the password protection option of an operating system, the data in the device can be
kept secure
● It coordinates with the software and the user
● Easy navigation and organisation of files and programs are managed by the OS
● Any kind of program which needs to be run through the system is done by the operating
system
● If any kind of error or bug is found during the program is detected using the operating
system
Microsoft Office
Microsoft Office is a software which was developed by Microsoft in 1988. This Office suite
comprises various applications which form the core of computer usage in today’s world.
2. MS Excel
3. MS PowerPoint
5. MS Outlook
● It was released on January 16, 1997.
● It is a personal information management system.
● It can be used both as a single-user application or multi-user software.
● Its functions also include task managing, calendaring, contact managing, journal logging and
web browsing.
● It is the email client of the Office Suite.
● The file extension for an Outlook file is “.pst”
6. MS OneNote