We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11
WEEK 2 Pascaline - also known as Arithmetic Machine or
Adding Machine. It was invented between 1642
FUNCTIONS OF A COMPUTER and 1644 by a French mathematician- A computer has four main functions; they are: philosopher Biaise Pascal. It is believed that it was the first mechanical and automatic - Input - Processing calculator. - Output - Storage Difference Engine - In the early 1820s, it was Input is the data entered in to a computer from designed by Charles Babbage who is known as the input devices like keyboard, mouse, scanner "Father of Modern Computer". It was a etc. Input data can be a character, word, mechanical computer which could perform number, or image. simple calculations. It was a steam driven calculating machine designed to solve tables of Processing is the task of performing the logical numbers like logarithm tables. and arithmetic operations is called processing. The CPU (Central Processing Unit) will perform Analytical Engine - This calculating machine was all types of calculations based on the instructions also developed by Charles Babbage in 1830. It given. It is then send to the storage unit. was a mechanical computer that used punch- cards as input. It was capable of solving any Output is the process of producing the useful mathematical problem and storing information information for the user after processing input as a permanent memory. data is called output. Tabulating Machine - It was invented in 1890, by Storage is the process of storing instructions and Herman Hollerith, an American statistician. It data permanently is called storage. This stored was a mechanical tabulator based on punch data can be retrieved whenever needed. cards. It could tabulate statistics and record or HISTORY OF COMPUTERS sort data or information. This machine was used in the 1890 U.S. Census. Abacus - The history of computer begins with the birth of abacus which is believed to be the first Differential Analyzer - It was the first electronic computer. It is said that Chinese invented Abacus computer introduced in the United States in around 4,000 years ago. It was a wooden rack 1930. It was an analog device invented by which has metal rods with beads mounted on Vannevar Bush. This machine has vacuum tubes them. The beads were moved by the abacus to switch electrical signals to perform operator according to some rules to perform calculations. It could do 25 calculations in few arithmetic calculations. Abacus is still used in minutes. some countries like China, Russia and Japan. Mark I - The next major changes in the history of Napier's Bones - It was a manually-operated computer began in 1937 when Howard Aiken calculating device which was invented by John planned to develop a machine that could Napier (1550-1617). In this calculating tool, he perform calculations involving large numbers. In So, the tool became known as used 9 different 1944, Mark I computer was built as a partnership ivory strips or bones marked with numbers to between IBM and Harvard. It was the first multiply and divide. "Napier's Bones. It was also programmable digital computer. the first machine to use the decimal point. Eniac - The giant ENIAC (Electrical Numerical Fifth Generation Computers - In fifth generation Integrator and Calculator) machine was (1980-till date) computers, the VLSI technology developed by John W. Mauchly and J. Presper was replaced with ULSI (Ultra Large Scale Eckert, Jr. at the University of Pennsylvania. It Integration). It made possible the production of used 18, 000 vacuums, punch-card input, microprocessor chips with ten million electronic weighed thirty tons and occupied a thirty-by- components. This generation computers used fifty-foot space. parallel processing hardware and AI (Artificial Intelligence) software. used real time, time WEEK 3 sharing and distributed operating system. GENERATIONS OF COMPUTER Some of the popular fifth generation computers First Generation Computers - The first are; generation (1946-1959) computers were slow, -Desktop -Laptop huge and expensive. In these computers, vacuum tubes were used as the basic -NoteBook -UltraBook components of CPU and memory. These -ChromeBook computers were mainly depended on batch operating system and punch cards. Magnetic THE FOUR BASIC TYPES OF COMPUTERS tape and paper tape were used as output and input devices in this generation. 1. Supercomputer 2. Mainframe Computer
Second Generation Computers - The second 3. Minicomputer 4. Microcomputer
generation (1959-1965) was the era of the Supercomputer - The most powerful computers transistor computers. These computers used in terms of performance and data processing are transistors which were cheap, compact and the Supercomputers. These are specialized and consuming less power; it made transistor task specific computers used by large computers faster than the first generation organizations. These computers are used for computers. research and exploration purposes, like NASA Third Generation Computers - The third uses supercomputers for launching space generation computers used integrated circuits shuttles, controlling them and for space (ICs) instead of transistors. A single IC can pack exploration purpose. The supercomputers are huge number of transistors which increased the very expensive and very large in size. power of a computer and reduced the cost. The Mainframe computer - Although Mainframes computers also became more reliable, efficient are not as powerful as supercomputers, but and smaller in size. certainly they are quite expensive nonetheless, Fourth Generation Computers - The fourth and many large firms & government generation (1971-1980) computers used very organizations uses Mainframes to run their large scale integrated (VLSI) circuits; a chip business operations. The Mainframe computers containing millions of transistors and other can be accommodated in large air-conditioned circuit elements. These chips made this rooms because of its size. Super-computers are generation computers more compact, powerful, the fastest computers with large data storage fast and affordable. These generation computers capacity, Mainframes can also process & store used real time, time sharing and distributed large amount of data. Banks educational operating system. institutions & insurance companies use mainframe computers to store data about their constitute a personal computing environment customers, students & insurance policy holders. are laptops, mobiles, printers, computer systems, scanners etc. Minicomputer - Minicomputers are used by small businesses & firms. Minicomputers are TIME SHARING COMPUTING ENVIRONMENT also called as “Midrange Computers”. These are The time sharing computing environment allows small machines and can be accommodated on a multiple users to share the system disk with not as processing and data storage simultaneously. Each user is provided a time slice capabilities as super-computers & Mainframes. and the processor switches rapidly among the These computers are not designed for a single users according to it. Because of this, each user user. believes that they are the only ones using the Microcomputer - Desktop computers, laptops, system. that constitute a personal computing personal digital assistant (PDA), tablets & environment are laptops, mobiles, printers, smartphones are all types of microcomputers. computer systems, scanners etc. The micro-computers are widely used & the CLIENT SERVER COMPUTING ENVIRONMENT fastest growing computers. These computers are the cheapest among the other three types of In client server computing, the client requests a computers. The Micro-computers are specially resource and the server provides that resource. designed for general usage like entertainment, A server may serve multiple clients at the same education and work purposes. time while a client is in contact with only one server. Both the client and server usually communicate via a computer network but sometimes they may reside in the same system.
DISTRIBUTED COMPUTING ENVIRONMENT
A distributed computing environment contains
multiple nodes that are physically separate but linked together using the network. All the nodes in this system communicate with each other and handle processes in tandem. Each of these nodes OTHER COMPUTING DEVICES contains a small part of the distributed operating TYPES OF COMPUTING ENVIRONMENTS system software.
A computer system uses many devices, arranged CLOUD COMPUTING ENVIRONMENT
in different ways to solve many problems. This The computing is moved away from individual constitutes a computing environment where computer systems to a cloud of computers in many computers are used to process and cloud computing environment. The cloud users exchange information to handle multiple issues. only see the service being provided and not the PERSONAL COMPUTING ENVIRONMENT internal details of how the service is provided. This is done by pooling all the computer In the personal computing environment, there is resources and then managing them using a a single computer system. All the system software. processes are available on the computer and executed there. The different devices that CLUSTER COMPUTING ENVIRONMENT KEYBOARDS TO GIVE COMMANDS TO THE COMPUTER The clustered computing environment is similar to parallel computing environment as they both BAR CODE READER have multiple CPUs. However a major difference -IT IS A KIND OF AN OPTICAL SCANNER is that clustered systems are created by two or more individual computer systems merged -IT CAN READ BAR CODES together which then work parallel to each other. -A SOURCE OF LIGHT IS PASSED THROUGH A BAR WEEK 4 CODE, AND ITS ASPECTS AND DETAILS ARE DISPLAYED ON THE SCREEN COMPUTER HARDWARE JOY STICK Computer hardware - is a collective term used to describe any of the physical components of an -IT IS A DEVICE WHICH COMPRISES A STICK analog or digital computer. The term hardware WHICH IS ATTACHED AT AN ANGLE TO THE BASE distinguishes the tangible aspects of a computing SO THAT IT CAN BE MOVED AND CONTROLLED device from software, which consists of written, machine-readable instructions or programs that -MOSTLY USED TO CONTROL THE MOVEMENT IN tell physical components what to do and when to VIDEO GAMES execute the instructions. -APART FROM A COMPUTER SYSTEM, A JOYSTICK INPUT DEVICES IS ALSO USED IN THE COCKPIT OF AN AEROPLANE, WHEELCHAIRS, CRANES, TRUCKS, - Keyboard - Barcode Reader ETC. TO OPERATE THEM WELL - Joy Stick - Microphone MICROPHONE - Mouse -USING A MICROPHONE, SOUND CAN BE STORED IN A DEVICE IN ITS DIGITAL FORM Input devices - are hardware components used to enter data, instructions, or commands into a - IT CONVERTS SOUND INTO AN ELECTRICAL computer system. They allow users to interact SIGNAL with the computer, enabling it to receive and process data from the outside world. -TO RECORD OR REPRODUCE A SOUND CREATED USING A MICROPHONE, IT NEEDS TO BE KEYBOARD CONNECTED WITH AN AMPLIFIER -A SIMPLE DEVICE COMPRISING KEYS AND EACH MOUSE KEY DENOTES EITHER AN ALPHABET, NUMBER OR NUMBER COMMANDS WHICH CAN BE GIVEN -IT IS ALSO KNOWN AS A POINTING DEVICE TO A COMPUTER FOR VARIOUS ACTIONS TO BE -USING MOUSE WE CAN DIRECTLY CLICK ON THE PERFORMED VARIOUS ICONS PRESENT ON THE SYSTEM AND -IT HAS A MODIFIED VERSION OF TYPEWRITER OPEN UP VARIOUS FILES AND PROGRAMS KEYS -A MOUSE COMPRISES 3 BUTTONS ON THE TOP -THE KEYBOARD IS AN ESSENTIAL INPUT DEVICE AND ONE TRACKBALL AT THE BOTTOM WHICH AND COMPUTER AND LAPTOPS BOTH USE HELPS IN SELECTING AND MOVING THE MOUSE AROUND, RESPECTIVELY OUTPUT DEVICES PRINTERS
- Monitor - Printer -A DEVICE WHICH MAKES A COPY OF THE
PICTORIAL OR TEXTUAL CONTENT, USUALLY - Projector - Headphones OVER A PAPER IS CALLED A PRINTER - Speakers -FOR EXAMPLE, AN AUTHOR TYPES THE ENTIRE The output devices take care of displaying the BOOK ON HIS/HER COMPUTER AND LATER GETS result after data processing by the input device. A PRINT OUT OF IT, WHICH IS IN THE FORM OF It may be in image, graphic, textual or audio PAPER AND IS LATER PUBLISHED form. These devices show the visual elements on -MULTIPLE TYPES OF PRINTERS ARE ALSO the display AVAILABLE IN THE MARKET, WHICH CAN SERVE MONITOR DIFFERENT PURPOSES
-THE DEVICE WHICH DISPLAYS ALL THE ICONS, TYPES OF PRINTERS
TEXT, IMAGES, ETC. OVER A SCREEN IS CALLED - Dot Matrix Printer - Laser Printers THE MONITOR - Chain Printer - Inkjet Printers -WHEN WE ASK THE COMPUTER TO PERFORM AN ACTION, THE RESULT OF THAT ACTION IS - Non-Impact Printers DISPLAYED ON THE MONITOR SPEAKERS - AN OUTPUT DEVICE THAT -VARIOUS TYPES OF MONITORS HAVE ALSO PRODUCES SOUND AFTER RECEIVING A BEEN DEVELOPED OVER THE YEARS COMMAND FROM THE COMPUTER. THEY SUPPORT THE COMPUTERS AS WELL AS OTHER TYPES OF MONITORS HARDWARE DEVICES. NOW WE ALSO HAVE CATHODE-RAY TUBE - The pixels make up the WIRELESS SPEAKERS WITH BLUETOOTH image on the CRT display. The smaller pixels TECHNOLOGY. mean the image is more clear. Even a single PROJECTOR - This is an optical device that character like ‘k’ is made of numerous pixels on presents visuals on the screen, stationary and the screen. A screen can have limited pixels at moving both. They are present at movie once, it is usually 80 by 20 characters horizontally theatres, auditoriums, etc. It connects to the and vertically. computer and displays the image on it on a larger LIQUID CRYSTAL DISPLAY - Flat-Panel Display screen. Monitor These are high-level video devices with HEADPHONES - Similar to speakers, this device low volume, lightweight, and low power has a lower sound frequency. They can’t be requirements. From wall hanging to easily heard in large areas like grounds and parks smartwatches, they are everywhere. There are but are only accessible to a single person using either emissive displays or non-emissive the device. A headset is another name for them. displays. Liquid Crystal Displays (LCDs) are a type of non-emissive display. STORAGE DEVICES
COMPONENTS USED TO STORE, RETRIEVE, AND
MANAGE DIGITAL DATA. THEY ALLOW COMPUTERS AND OTHER DIGITAL DEVICES TO SAVE INFORMATION FOR BOTH SHORT-TERM (TEMPORARY) AND LONG-TERM (PERMANENT) RAM (Random Access Memory): RAM is used to USE. STORAGE DEVICES HOLD EVERYTHING store data that is actively being processed by the FROM OPERATING SYSTEMS AND APPLICATIONS CPU. The more RAM a system has, the more data TO USER FILES LIKE DOCUMENTS, PHOTOS, AND it can handle at once. VIDEOS. SRAM (Static RAM): This is faster than DRAM KEY FUNCTIONS OF STORAGE DEVICES: because it doesn't need to be refreshed regularly, but it is more expensive. SRAM is DATA STORAGE - They hold data permanently or typically used in cache memory. temporarily, depending on the device type. DRAM (Dynamic RAM): This is slower and needs DATA RETRIEVAL - Users can access and retrieve to be refreshed thousands of times per second, data when needed. but it is less expensive and is the most common DATA BACKUP - Important data can be stored in type of RAM used in computers. secondary or external devices for protection SDRAM (Synchronous Dynamic RAM): This type against loss. of RAM is synchronized with the system clock, TYPES OF STORAGE DEVICES: which improves performance by reducing waiting times for synchronization with the CPU. PRIMARY STORAGE - It is also known as internal memory and main memory. This is a section of ROM (Read-Only Memory): ROM is a non- the CPU that holds program instructions, input volatile memory, meaning it retains its contents data, and intermediate results. It is generally even when the power is off. ROM stores the smaller in size. RAM (Random Access Memory) firmware (basic instructions) that allows the and ROM (Read Only Memory) are examples of computer to boot up and perform basic primary storage. functions.
SECONDARY STORAGE - Secondary storage is a PROM (Programmable ROM): Can be
memory that is stored external to the computer. programmed once by the user, but after It is mainly used for the permanent and long- programming, the data cannot be changed. term storage of programs and data. Hard Disks, EPROM (Erasable Programmable ROM): Can be CDs, DVDs, Pen/Flash drives, SSD, etc, are erased using UV light and reprogrammed. examples of secondary storage. EEPROM (Electrically Erasable Programmable TERTIARY STORAGE - a type of Memory that is ROM): Can be erased and rewritten using rarely used in personal computers and due to electrical signals, allowing for easier updates to this, tertiary memory is not considered to be an firmware. important one. Tertiary memory works automatically without human intervention. MAGNETIC STORAGE DEVICES - use magnetism to store data. These devices store data as tiny CATEGORIES OF STORAGE DEVICES magnetized regions on a disk or tape. They are PRIMARY STORAGE DEVICES - used to generally slower than other forms of storage but temporarily hold data that the computer is offer a large amount of storage capacity. actively using. These devices are directly Floppy Disk: An older storage device with a small accessible by the CPU, making them extremely capacity (usually 1.44 MB). It’s rarely used today fast. However, the data is typically volatile, due to its low capacity and slow access times. meaning it’s lost when the device is powered off. Hard Disk Drive (HDD): A popular magnetic Memory Card: Similar to SD cards, memory cards storage device that stores large amounts of data are used in various portable devices like gaming on spinning platters. It’s widely used for storing consoles and phones. files and applications on computers. The access Multimedia Card (MMC): An older type of time is slower compared to SSDs, but HDDs memory card that was used in devices like digital provide larger capacities at lower costs. cameras and mobile phones, though it has Magnetic Card: Often used for financial largely been replaced by SD cards. transactions, these cards store small amounts of OPTICAL STORAGE DEVICES data that can be read by card readers. Examples include credit cards and hotel keycards. Optical storage devices use lasers to read and write data. Data is stored as tiny pits and lands Tape Cassette: Used for data backup and on the surface of the disc, which are interpreted archiving. While tapes are slow to access and by a laser. read, they offer enormous capacity and are commonly used in enterprise settings for long- CD (Compact Disc): A widely used optical storage term data storage. format, primarily for music and software. CDs store around 700 MB of data. SuperDisk: A high-capacity alternative to floppy disks, offering larger storage (around 120 MB) CD-R (Recordable): Can be written to once. though it’s largely obsolete now. CD-RW (Rewritable): Can be erased and FLASH MEMORY DEVICES rewritten multiple times. Flash memory is a non-volatile type of storage, DVD (Digital Versatile Disc): Similar to CDs but meaning that it retains data even when the with more capacity (up to 4.7 GB for a single- power is turned off. Flash memory is faster and layer DVD). DVDs are commonly used for movies more durable than magnetic storage because it and larger software programs. has no moving parts. DVD-R (Recordable): Can be written to once. Pen Drive (USB Flash Drive): A small, portable device used to store and transfer data. It DVD-RW (Rewritable): Can be erased and connects via a USB port and is highly portable, rewritten multiple times. making it ideal for transferring files between Blu-ray Disc: Offers much larger storage capacity computers. (25 GB for a single- layer disc) and is primarily SSD (Solid State Drive): A storage device that used for high-definition video and data storage. uses flash memory to provide faster data access Blu-ray discs are commonly used for HD movies speeds compared to traditional hard drives. SSDs and large data backups. are faster and more reliable than HDDs, as they CLOUD AND VIRTUAL STORAGE have no moving parts. They are widely used in laptops and servers. Cloud and virtual storage store data remotely and can be accessed from anywhere with an SD Card (Secure Digital Card): A small, portable internet connection. Cloud storage is provided memory card used in cameras, smartphones, by companies that host servers, allowing users to and other electronic devices for storage. upload and download files as needed. Cloud Storage: This involves storing data on All computing devices runs an operating system. servers hosted by third party service providers For personal computers, the most popular like Google Drive, Dropbox, and Microsof operating systems are Microsoft’s Windows, OneDrive. Cloud storage is flexible allowing users Apple’s OS X, and different versions of Linux. to access their data from anywhere with an Smartphones and tablets run operating systems internet connection. as well, such as Apple’s iOS, Google’s Android, Microsoft’s Windows Mobile, and Unix. Virtual Storage: Virtual storage uses software to pool resources from multiple physical storage Application software is the category of devices, making it appear as a single storage programs that do something useful for the user. device. This is commonly used in enterprise It is not needed by the computer to operate but environments for scalability and data is needed by the end-users to use. management. Virtual storage allows for efficient Application software developers used different data management and backup solutions. kinds of computer languages such as C#, Java, WEEK 5 PHP, Ruby, Unity, etc.
COMPUTER SOFTWARE For computer based software, we call it
Programs. While for mobile based software, we Software is the set of instructions that tell the call it Applications. hardware what to do. Software is created through the process of programming. Without Common Application Software the software, the hardware would not be 1.Word processing - This class of software functional. provides for the creation of written documents. Types of Software Functions include the ability to type and edit text, format fonts and paragraphs, and add, Software can be broadly divided into two move, and delete text throughout the categories: document. 1. Systems Software 2. Spreadsheet - This class of software provides 2. Application Software. a way to do numeric calculations and analysis. Systems Software manages the hardware and The working area is divided into rows and create the interface between the hardware and columns, where users can enter numbers, text, the user. This is needed in order to operate and or formulas. use our computer. 3. Presentation - This class of software provides Functions of System Software for the creation of slideshow presentations. Harkening back to the days of overhead The operating system provides several essential projectors and transparencies, presentation functions, including: software allows its users to create a set of slides 1.managing the hardware resources of the that can be printed or projected on a screen. computer; 4. Image editing - Image editing software 2.providing the user-interface components; encompasses the processes of altering images, whether they are digital photographs, traditional 3.providing a platform for software developers photo-chemical photographs, or illustrations. to write applications. 5. Video editing - Software used for performing execute itself and spreads by infecting other the post-production video editing of digital video programs or files. sequences on a non-linear editing system. It has -when executed, replicates itself by modifying replaced traditional flatbed celluloid film editing othercomputer programs and inserting its own tools and analogue video tape-to-tape online code. editing. 2. Worm –I s a type of malware that can self- Kinds of Software Uses replicate without a host program. 1.Open Source 2. Freeware -worms typically spread without any human 3.Shareware 4. Commercialized/Licensed interaction or directives from the malware authors Harmful Software 3. Trojan Horse - A Trojan horse is a malicious 1.The Malware (Malicious Software) program that is designed to appear as a 2.Malware creation is on the rise due to the legitimate program; once activated following sheer volume of new types created daily and the installation. lure of money that can be made through -The term comes from the a Greek story of the organized Internet crime. Trojan War, in which the Greeks give a giant 3. Malware was originally created as wooden horse to their foes, the Trojans, experiments and pranks, but eventually led to ostensibly as a peace offering. vandalism and destruction of targeted computer 4. Spyware -Spyware is a kind of malware that is machines. designed to collect information and data on 4. Today, much of malware is created for profit users and observe their activity without users' through forced advertising, stealing sensitive knowledge. information, spreading email spam, -Spyware is often hidden from the user in order pornography, or to extort money. to gather information about internet interaction, Harmful Software keystrokes (also known as keylogging), passwords, and other valuable data. 1.Virus 5. Adware - Adware is any software application 2.Worm in which advertising banners are displayed while 3.Trojan Horse a program is running. The ads are delivered through pop-up windows or bars that appear on 4.Spyware the program's user interface. Adware is 5.Adware commonly created for computers, but may also be found on mobile devices. 6.Zombie Computers 6. Zombie Computers - A zombie (also known as 7.Ransomware a bot) is a computer that a remote attacker has accessed and set up to forward transmissions Types of Malware (including spam and viruses) to other computers 1. Virus - the most common type of malware and on the Internet. it is defined as a malicious program that can 7. Ransomware - Is a malware designed to infect Control over system performance - Recording a user's system and encrypt the data. delays between request for a service and Cybercriminals then demand a ransom payment response from the system. from the victim in exchange for decrypting the Job accounting - Keeping track of time and system's data. resources used by various jobs and users. WEEK 6 Error detecting aids - Production of dumps, OPERATING SYSTEM traces, error messages, and other debugging and error detecting aids. An operating system (OS) is a collection of software that manages computer hardware Coordination between other software and resources and provides common services for users - Coordination and assignment of computer programs. The operating system is a compilers, interpreters, assemblers and other vital component of the system software in a software to the various users of the computer computer system. systems.
An Operating System (OS) is an interface Programming Languages - The computer system
between a computer user and computer is simply a machine and hence it cannot perform hardware. An operating system is a software any work; therefore, in order to make it which performs all the basic tasks like file functional different languages are developed, management, memory management, process which are known as programming languages or management, handling input and output, and simply computer languages. controlling peripheral devices such as disk drives Over the last two decades, dozens of computer and printers. languages have been developed. Each of these Important Functions of an OS languages comes with its own set of vocabulary and rules, better known as syntax. Furthermore, •Memory Management while writing the computer language, syntax has •Processor Management to be followed literally, as even a small mistake will result in an error and not generate the •Device Management required output. •File Management Following are the major categories of •Security Programming Languages:
•Control over system performance •Machine Language
•Job accounting •Assembly Language
•Error detecting aids •High Level Language
•Coordination between other software and •System Language
users •Scripting Language Application of the OS Security - By means of Machine Language or Code - This is the language password and similar other techniques, it that is written for the computer hardware. Such prevents unauthorized access to programs and language is affected directly by the central data. processing unit (CPU) of a computer system. Assembly Language - It is a language of an Real-time Processing - This technique facilitates encoding of machine code that makes simpler the user to have with the computer system. This and readable. technique eases data processing. This technique is also known as the direct mode or the Data Processing - Collection, manipulation, and interactive mode technique and is developed processing collected data for the required use is exclusively to perform one task. It is a sort of known as data processing. It is a technique online processing, which always remains under normally performed by a computer; the process execution. includes retrieving, transforming, or classification of information. Online Processing - This technique facilitates the entry and execution of data directly; so, it does However, the processing of data largely not store or accumulate first and then process. depends on the following: The technique is developed in such a way that reduces the data entry errors, as it validates data •The volume of data that need to be processed at various points and also ensures that only •The complexity of data processing operations corrected data is entered. This technique is widely used for online applications. •Capacity and inbuilt technology of respective computer system Time-sharing Processing - This is another form of online data processing that facilitates several •Technical skills users to share the resources of an online •Time constraints computer system. This technique is adopted when results are needed swiftly. Moreover, as Methods of Data Processing the name suggests, this system is time based. the different methods of data processing. Distributed Processing - This is a specialized data processing technique in which various •Single user programming computers (which are located remotely) remain •Multiple programming interconnected with a single host computer making a network of computer. •Real-time processing Software Development Life Cycle (SDLC) - •Online processing Software Development Life Cycle (SDLC) is a •Time sharing processing process used by the software industry to design, develop and test high quality software. The SDLC •Distributed processing aims to produce a high-quality software that Single User Programming - It is usually done by meets or exceeds customer expectations, a single person for his personal use. This reaches completion within times and cost technique is suitable even for small offices. estimates.
Multiple Programming - This technique provides
facility to store and execute more than one program in the Central Processing Unit (CPU) simultaneously. Further, the multiple programming technique increases the overall working efficiency of the respective computer.