C - Fakepathcomputer Technologies and Programming
C - Fakepathcomputer Technologies and Programming
Lecture 1
Basic aspects of information technology
CATEGORIES OF COMPUTER
Computer traditionally has been divided into four categories, based on their
function, physically size, cost and performance.
Modern digital computers are all conceptually similar, regardless of size. They
can be divided into several categories on the basis of cost and performance: the
personal computer or microcomputer is a relatively low- cost machine, usually of
desk- top size. The workstation is a microcomputer with enhanced graphics and
communication capabilities which makes it useful for office work.
The minicomputer is generally too expensive for personal use, with capabilities
suited to a business, school or laboratory.
The mainframe computer is a large, expensive machine with the capability of
serving the needs of major business enterprises, government departments, scientific
research establishments. The largest and fastest of these are called supercomputers.
Minicomputers are larger than microcomputers and are generally used in
business and industry for specific tasks, such as processing payroll. Minicomputer
is a computer intermediate in size between a mainframe computer and a
microcomputer. The Digital Equipment Corporation VAX and the IBM AS/400 are
the examples for it.
A minicomputer occupies a large area within a room and supports 10 to 100
users at a time. Minicomputers are used by medium- sized businesses and
academic institution. They are rapidly being replaced by microcomputers.
Minicomputer is a mid- level computer built to perform complex computations.
Minicomputers are also connected to other minicomputers on a network and
distribute processing among all the attached machines. They are used heavily in
transaction processing applications and as interfaces between mainframe computer
systems and wide area networks.
Mainframes are large, fast and expensive computers. They are generally used in
business by government to provide centralized storage, processing and
management for large amounts of data. Mainframe computer is a large computer. It
occupies a specially air- conditioned room and supports typically 100 to 500 users
at one time. The IBM 370 and IBM 3090 are examples of mainframe computers.
Mainframe computer is a high- level computer designed for the most intensive
computational tasks. The most powerful mainframes are called supercomputers.
They perform highly complex and time- consuming computations. These
computers are used in both pure and applied research by scientists, large businesses
and the military.
Generation of computers
The period of first generation was from 1946-1959. The computers of first
generation used vacuum tubes as the basic components for memory and circuitry
for CPU (Central Processing Unit). These tubes, like electric bulbs, produced a lot
of heat and the installations used to fuse frequently. Therefore, they were very
expensive and only large organizations were able to afford it.
In this generation, mainly batch processing operating system was used. Punch
cards, paper tape, and magnetic tape was used as input and output devices. The
computers in this generation used machine code as the programming language.
The main features of the first generation are −
Vacuum tube technology
Unreliable
Supported machine language only
Very costly
Generated a lot of heat
Slow input and output devices
Huge size
Need of AC
Non-portable
Consumed a lot of electricity
The period of second generation was from 1959-1965. In this generation,
transistors were used that were cheaper, consumed less power, more compact in
size, more reliable and faster than the first generation machines made of vacuum
tubes. In this generation, magnetic cores were used as the primary memory and
magnetic tape and magnetic disks as secondary storage devices.
In this generation, assembly language and high-level programming
languages like FORTRAN, COBOL were used. The computers used batch
processing and multiprogramming operating system.
The main features of second generation are −
Use of transistors
Reliable in comparison to first generation computers
Smaller size as compared to first generation computers
Generated less heat as compared to first generation computers
Consumed less electricity as compared to first generation computers
Faster than first generation computers
Still very costly
AC required
Supported machine and assembly languages
The period of third generation was from 1965-1971. The computers of third
generation used Integrated Circuits (ICs) in place of transistors. A single IC has
many transistors, resistors, and capacitors along with the associated circuitry.
The IC was invented by Jack Kilby. This development made computers smaller in
size, reliable, and efficient. In this generation remote processing, time-sharing,
multiprogramming operating system were used. High-level languages
(FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were
used during this generation.
The main features of third generation are −
IC used
More reliable in comparison to previous two generations
Smaller size
Generated less heat
Faster
Lesser maintenance
Costly
AC required
Consumed lesser electricity
Supported high-level language
The period of fourth generation was from 1971-1980. Computers of fourth
generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having
about 5000 transistors and other circuit elements with their associated circuits on a
single chip made it possible to have microcomputers of fourth generation.
Fourth generation computers became more powerful, compact, reliable, and
affordable. As a result, it gave rise to Personal Computer (PC) revolution. In this
generation, time sharing, real time networks, distributed operating system were
used. All the high-level languages like C, C++, DBASE etc., were used in this
generation.
The main features of fourth generation are −
VLSI technology used
Very cheap
Portable and reliable
Use of PCs
Very small size
Pipeline processing
No AC required
Concept of internet was introduced
Great developments in the fields of networks
Computers became easily available
The period of fifth generation is 1980-till date. In the fifth generation, VLSI
technology became ULSI (Ultra Large Scale Integration) technology, resulting in
the production of microprocessor chips having ten million electronic components.
This generation is based on parallel processing hardware and AI (Artificial
Intelligence) software. AI is an emerging branch in computer science, which
interprets the means and method of making computers think like human beings. All
the high-level languages like C and C++, Java, .Net etc., are used in this
generation.
AI includes −
Robotics
Neural Networks
Game Playing
Development of expert systems to make decisions in real-life situations
Natural language understanding and generation
The main features of fifth generation are −
ULSI technology
Development of true artificial intelligence
Development of Natural language processing
Advancement in Parallel Processing
Advancement in Superconductor technology
More user-friendly interfaces with multimedia features
Availability of very powerful and compact computers at cheaper rates
Lecture 2
Technical means of information processing
Computer architecture . The main components of the computer
What is hardware? Webster’s dictionary gives us the following definition
of the hardware – the mechanical, magnetic, electronic, and electrical
devices composing a computer system.
Computer hardware can be divided into four categories:
1)input hardware
2)processing hardware
3)storage hardware
4)output hardware
The purpose of the input hardware is to collect data and convert them
into a form suitable for computer processing. The most common input
device is a keyboard. It looks very much like a typewriter. The mouse is a
hand held device connected to the computer by small cable. As the mouse is
rolled across the mouse pad, the cursor moves across the screen. When the
cursor reaches the desired location, the user usually pushes a button on the
mouse once or twice to signal a menu selection or a command to the
computer.
The light pen uses a light sensitive photoelectric cell to signal screen
position to the computer. Another type of input hardware is optic-electronic
scanner that is used to input graphics as well as typeset characters.
Microphone and video camera can be also used to input data into the
computer.
The purpose of processing hardware is retrieve, interpret and direct the
execution of software instructions provided to the computer. The most
common components of processing hardware are the Central Processing
Unit and main memory.
The Central Processing Unit (CPU) is the brain of the computer. It reads
and interprets software instructions and coordinates the processing activities
that must take place. The design of the CPU affects the processing power
and the speed of the CPU affects the processing power and the speed of the
computer. With a well-designed CPU in your computer, you can perform
highly sophisticated tasks in a very short time.
Memory is the system of component of the computer in which
information is stored. There are two types of computer memory: RAM and
ROM.
RAM (random access memory) is the volatile computer memory, used for
creating loading, and running programs and for manipulating and
temporarily storing data.
ROM (read only memory) is nonvolatile, nonmodifiable computer
memory, used to hold programmed instructions to the system.
The more memory you have in your computer, the more operations you
can perform.
The purpose of storage hardware is to store computer instructions and
data in a form that is relatively permanent and retrieve when needed for
processing. The most common ways of storing data are Hard disk, floppy
disk and CD-ROM.
Hard disk is a rigid disk coated with magnetic material, for storing
programs and relatively large amounts of data.
Floppy disk (diskette)–thin, usually flexible plastic disk coated with
magnetic material, for storing computer data and programs. There are two
formats for floppy disks: 5.25 and 3.5. 5.25 is not used in modern computer
systems because it has relatively large size, flexibility and small capacity.
3.5 disks are formatted 1.4 megabytes and are widely used.
CD-ROM (compact disk read only memory) is a compact disc on which
a large amount of digitized read-only data can be stored.
The purpose of output hardware is to provide the user with the means to
view information produced by the computer system. Information is output in
either hardcopy or softcopy form. Hardcopy output can be held in your hand,
such as paper with text (word or numbers) or graphics printed on it.
Softcopy output is displayed on a monitor.
Monitor is a component with a display screen for viewing computer data,
television programs, etc.
Printer is a computer output device that produces a paper copy of data or
graphics.
Modem is an example of communication hardware – an electronic device
that makes possible the transmission of data to or from computer via
telephone or other communication lines.
Processing hardware
The purpose of processing hardware is retrieve, interpret and direct the
execution of software instructions provided to the computer. The most common
components of processing hardware are the Central Processing Unit and main
memory.
The Central Processing Unit (CPU) is the brain of the computer. It reads and
interprets software instructions and coordinates the processing activities that must
take place. The design of the CPU affects the processing power and the speed of
the CPU affects the processing power and the speed of the computer. With a well-
designed CPU in your computer, you can perform highly sophisticated tasks in a
very short time.
It should be noted that there is not a single processor on the computer -
it can be up to them on the computer! Videoplata, sound card, a large number of
external ones devices (eg printer) are equipped with their own processors. This is
often the case processor processors with central processing, from productivity
point of view they can also compete. But all of them It should be noted that there is
not a single processor on the computer -it can be up to them on the computer.
Videoplata, sound card, a large number of external ones devices (eg printer) are
equipped with their own processors. This is often the case processor processors
with central processing, from productivity point of view they can also compete.
However, unlike the Central Processor, they are all specialized in a narrow
framework.
One of them is engaged in voice processing, and the other is setting up 3-
dimensional images. The central and distinctive feature of the Central Processor is
its universality. If needed, if the central processor can perform any task, the music
file's code, even if the processor of the video clip is desirable can not clarify.
Any processor - a silica crystal of special technology and, therefore, sometimes
they are called "stones". But inside this "stone." as well as a large number of
transistors connected by bridges to contacts they become separate elements. It's
these elements that make the computer "think", more Actually, perform counting
tasks on the numbers included in the computer to help.
CONTROL UNIT
The control unit (often called a control system or central controller)
manages the computer’s various components; it reads and interprets the
program instructions, transforming them into a series of control signals
which activate other parts of the computer. Control systems in advanced
computers may change the order of some instructions so as to improve
performance.
A key component common to all CPUs is the program counter, a special
memory cell that keeps track of which location in memory the next
instruction is to be read from.
The control system’s functions are as follows- note that this is a simplified
description, and some of these steps may be performed concurrently or in a
different order depending on the type of CPU:
1. Read the code for the next instruction from the cell indicated by the
program counter.
2. Decode the numerical code for the instruction into a set of commands or
signals for each of the other systems.
3. Increment the program counter so it points to the next instruction.
4. Read whatever data the instruction requires from cells in memory (or
perhaps from an input device). The location of this required data is typically
stored within the instruction code.
5. Provide the necessary data to an ALU or register.
6.If the instruction requires an ALU or specialized hardware to complete,
instruct the hardware to perform the requested operation.
7. Write the result from the ALU back to a memory location or to a register
or perhaps an output device.
8. Jump back to step (1).
Since the program counter is conceptually just another set of memory cell,
it can be changed by calculations done in the ALU. Adding 100 to the
program counter would cause the next instruction to be read from a place
100 locations further down the program.
Instructions that modify the program counter are often known as “jumps”
and allow for loops and often conditional instruction execution.
It is noticeable that the sequence of operations that the control unit goes
through to process an instruction is in itself like a short computer program-
and indeed, in some more complex CPU designs, there is another yet smaller
computer called a micro sequencer that runs a microcode program that
causes all of these events to happen
Lecture 3
Development models of Information Systems
An information system (IS) is a formal, sociotechnical, organizational
system designed to collect, process, store, and distribute information. In a
sociotechnical perspective, information systems are composed by four
components: task, people, structure (or roles), and technology.
A computer information system is a system composed of people and computers
that processes or interprets information. The term is also sometimes used to simply
refer to a computer system with software installed.
Information Systems is an academic study of systems with a specific
reference to information and the complementary networks of hardware and
software that people and organizations use to collect, filter, process, create and also
distribute data. An emphasis is placed on an information system having a definitive
boundary, users, processors, storage, inputs, outputs and the aforementioned
communication networks.
Any specific information system aims to support operations, management and
decision-making. An information system is the information and communication
technology that an organization uses, and also the way in which people interact
with this technology in support of business processes.
Some authors make a clear distinction between information systems,
computer systems, and business processes. Information systems typically include
an ICT component but are not purely concerned with ICT, focusing instead on the
end use of information technology. Information systems are also different from
business processes. Information systems help to control the performance of
business processes.
Alter argues for advantages of viewing an information system as a special type of
work system. A work system is a system in which humans or machines perform
processes and activities using resources to produce specific products or services for
customers. An information system is a work system whose activities are devoted to
capturing, transmitting, storing, retrieving, manipulating and displaying
information.
As such, information systems inter-relate with data systems on the one hand
and activity systems on the other. An information system is a form of
communication system in which data represent and are processed as a form of
social memory. An information system can also be considered a semi-formal
language which supports human decision making and action.
Information systems are the primary focus of study for organizational informatics.
The six components that must come together in order to produce an information
system are: (Information systems are organizational procedures and do not need a
computer or software, this data is erroneous, i.e., an accounting system in the
1400s using a ledger and ink utilizes an information system)
1. Hardware: The term hardware refers to machinery. This category includes
the computer itself, which is often referred to as the central processing unit
(CPU), and all of its support equipment. Among the support, equipment are
input and output devices, storage devices and communications devices.
2. Software: The term software refers to computer programs and the manuals
(if any) that support them. Computer programs are machine-readable
instructions that direct the circuitry within the hardware parts of the system
to function in ways that produce useful information from data. Programs are
generally stored on some input/output medium, often a disk or tape.
3. Data: Data are facts that are used by programs to produce useful
information. Like programs, data are generally stored in machine-readable
form on disk or tape until the computer needs them.
4. Procedures: Procedures are the policies that govern the operation of a
computer system. "Procedures are to people what software is to hardware" is
a common analogy that is used to illustrate the role of procedures in a
system.
5. People: Every system needs people if it is to be useful. Often the most
overlooked element of the system are the people, probably the component
that most influence the success or failure of information systems. This
includes "not only the users, but those who operate and service the
computers, those who maintain the data, and those who support the network
of computers."
6. Feedback: it is another component of the IS, that defines that an IS may be
provided with a feedback (Although this component isn't necessary to
function).
Data is the bridge between hardware and people. This means that the data we
collect is only data until we involve people. At that point, data is now information.
Types of information system
Lecture 4
Computer networks
A computer network is a set of computers connected together for the
purpose of sharing resources. The most common resource shared today is
connection to the Internet. Other shared resources can include a printer or a file
server. A network is a collection of computers connected to each other by means of
data transmission. Data transmission means can consist of the following elements:
computers connected to each other by cable, satellite, telephone, fiber-optic, radio,
etc. various types of transducers based on transmitters, as well as other elements
and devices.
The architecture of a computer network defines the principles of operation
and installation of hardware and software of network elements.
Modern networks can be classified according to a number of characteristics:
the distance between computers; topology, purpose; the number of services
provided; principles of centralized or decentralized management; non-switching,
telephone switching, circuit switching, data, packet and datagram switching
methods; according to the types of transmission medium, etc.
Depending on the distance between computers, networks are divided into
two classes: local and global networks.
Any global network can be connected to other global networks, local area
networks, as well as computers that are connected to it separately and remotely, or
separate I / O devices.
There are four main types of global networks: urban, regional, national and
transnational. Printing or copying devices, cash registers and bank machines,
displays and fax machines located at certain distances from each other may be used
as input and output devices. Global networks will expand the scope of local
networks, including networks located in different buildings, cities, regions and
countries. Typically, global networks limit their reach to the range of services
provided by a regional company. These companies include Bell, Pacific Bell,
AT&T, Sprint, MCI and others. an example can be given.
Global networks are connected by serial lines, which also have lower data
rates than local networks. Typically, global networks include the following
devices:
Routing. These provide connectivity between local area networks
and manages the global network through the interface.
ATM switches. Cells between local and global networks
Used for high speed switching.
X.25 Switches and Frame Relay. Number signals are sent
connects personal and public data transmission channels.
Modems. Personal and public data to which analog signals are sent
connects transmission channels to each other.
Channels, data service modules (CSU, DSU - Channel Service
Unit, Data Service Unit). Whether the equipment is located in the client area
(CPE - Customer Processing Equipment), it is used by the client as the final
equipment of the digital channel. These devices are connected to a central
telephone exchange (CO - Central Office), ie the switching node of the telephone
company closest to the customer.
Switching servers. These are usually calling servers (dual in, out
server), which allows remote users to communicate with the required client
and connect to its local network. An example of this is the AS5200 Cisco series
communication server.
Multiplexers. Several at once through one physical channel allows you to
send signals.
The centralized management scheme of computing processes on the basis of
medium and large computers (Main frame) has recently been replaced by "client-
server" technology.
In a centralized management scheme, all computing resources, data and their
processing programs are concentrated in one computer. Users access machine
resources through terminals (displays). The terminals are connected to the
computer either via an interface or through telephone lines (if the terminals are
located at a distance). The main function of the terminal is to describe the
information provided to the user. The advantages of such a scheme are ease of
management, the possibility of software improvements and information security.
The disadvantages are low reliability (computer failure means the collapse of the
entire computing process), the difficulty of increasing hardware and software, and,
as a rule, a decrease in efficiency as the number of network users increases, and so
on.
In the client-server architecture, the terminal is replaced by one or more
powerful computers (computer-servers), which are owned by the client, and the
mainframe, which is allocated to solve common information processing problems.
The advantages of such a model are its more vividness and reliability of the
computing system, the ability of the user to work with several applications
simultaneously, high efficiency of information processing, providing the user with
a high-quality interface, etc.
Because LCNs operate within an organization (corporation, enterprise), such
networks are often referred to as corporate systems or networks. In this case
Computers are usually located inside a room, building or adjacent buildings.
Regardless of the network on which a computer operates, the function of the
software installed on that computer can be divided into two groups: those that
manage the computer's own resources and those that manage the exchange with
other computers.
Usually the computer's own resources are managed by the operating system.
Network resources are managed by network software, which is implemented either
as a separate package in the form of a network program or through a network
operating system.
A hierarchical approach is used in network software. Here, the free levels
and the interfaces between them must be predefined. As a result, it is possible to
improve the program of any level, provided that other levels are not touched. In
general, the function of any level can be simplified and, if necessary, completely
eliminated.
The International Organization for Standardization (ISO) has proposed the
Open System Interconnection (OSI) model, which provides for the interconnection
of open systems in order to regulate the operation of network software and to
organize the interaction of any computer system.
The OSI benchmark model defines the following seven levels:
Physical layer;
Network layer;
Transport layer;
Session layer;
Presentation layer;
Application layer
A computer is an electronic device that processes input data and produces result
(output) according to a set of instructions called program.
A computer performs basically five major functions irrespective of its size and
make.
It accepts data or instructions by way of input
It stores data
It processes data as required by the user
It controls operations of a computer
It gives results in the form of output
In order to carry out the operations mentioned above the computer allocates the
task among its various functional units.
Let consider each node of this structure.Computer receive data and instraction
(command).Through input device,which get processes in CPU and result is shown
thr4ough output devices.
The main and secondary memory are use to store data inside the computer.There
are basic components that is computer process.Now lets consider following parts:
1) INPUT DEVICES
– Whatever is put into a computer system.
• Converts the external world data to a binary format, which can be understood by
CPU.These are used to enter data and instructions into the computer. Let us discuss
some of them.
KEYBOARD
This is the most common input device which uses an arrangement of buttons or
keys. In a keyboard each press of a key typically corresponds to a single written
symbol. However some symbols require pressing and holding several keys
simultaneously or in sequence. While most keyboard keys produce letters, numbers
or characters, other keys or simultaneous key presses can produce actions or
computer commands. In normal usage, the keyboard is used to type text and
numbers while in a modern computer, the interpretation of key press is generally
left to the software. A computer keyboard distinguishes each physical key from
every other and reports the key-presses to the controlling software. Keyboards are
also used for computer gaming, either with regular keyboards or by using
keyboards with special gaming features. Apart from alphabet keys (26 keys), there
are several other keys for various purposes such as;
Number keys - The 10 number keys 0-9 are there on each keyboard.
Sometimes, there are two sets of these keys.
Direction keys - There are four direction keys : left, right, up and down
which allow the curser to move in these directions. Unlike alphabet and number
keys, these keys do not display any thing.
Function keys - There are generally 12 functions keys F1-F12. These keys
have special tasks and the tasks may change from program to program. Just like
direction keys, these too do not print anything.
Other keys - There are several other non-printable keys for various different
purposes. These include caps lock, tab, ctrl, pause, delete, backspace, spacebar,
shift, enter etc which are used for special purposes.
Whenever a key is pressed, a specific signal is transmitted to the computer. The
keyboard uses a crossbar network to identify every key. When a key is pressed, an
electrical contact is formed. These electric signals are transmitted to a
microcontroller in a coded form to the computer describing the character which
corresponds to that key. The theory of codes in itself is a vast field of study.
However, in Appendices I, II, III and IV we have discussed the most common
codes namely BCD, ASCII, ISCII and Unicode.
MOUSE
Touch screen
This device allow interacting with the computer without any
intermediate device. You may see it at as KIOSKS installed in
various public places.
Graphics tablet
This device is used to enter data using a stylus. Most commonly it is
used to enter digital signatures.
Joystick
It is an input device consisting of a stick that pivots on a base and
translates its angle or direction as data. Joysticks are often used to
control inputs in video games.
Microphone
It is used to input audio data into the computer. They are mainly
used for sound recording.
Biometric Sensors
It is used to recognize individuals based on physical or
behavioral traits. Biometric sensor is used to mark attendance of
employees/students in organizations/institutions. It is also
popular as a security device to provide restricted entry for
secured areas.
2) OUTPUT DEVICES:
These are used to display results on video display or are used to print the result.
These can also be used to store the result for further use.
Monitor or VDU :
It is the most common output device. It looks like a TV.Its
display may be CRT, LCD, Plasma or touch sensitive.
Speakers :
These are used to listen to the audio output of computer.
Printers :
These are used to produce hard copy of output as text or
graphics.
Inkjet/Deskjet/Bubblejet printers:
These all are low cost printers which use a controlled stream
of inkfor printing
Laser Printers:
These printers use laser technology to produce printed
documents. These are very fast printers and are used for
high
quality prints.
Plotters:
These are used to print graphics. It is mainly used in
computeraided designing
Data bus
MAR MDR
RRR
Data bus
Address bus
Lecture 5
Information on the Internet is stored on servers. Servers have their own addresses
and are managed by specialized programs. With their help you can send mail and
files, search for information in the database, etc. it is possible to carry out.
Information exchange between servers is carried out through high-speed
communication channels. Individual users have access to Internet information
resources, usually through telephone network providers or corporate networks.
Any organization that can communicate with customers as a provider and have
access to the World Wide Web can participate.
Then there is the idea of accessing the network via a telephone line with the help of
connecting sessions. With the help of the phone, you can already connect to a
computer, which is a permanent "citizen" of the network, connect to it, and thus
become part of the Internet. Naturally, in this case, there are many organizations
that provide paid services to all users. Thus, the first providers are formed.
The role of providers can be played by anyone with a strong server, a large number
of incoming telephone lines, or rather a certain amount of money to buy a
dedicated communication channel. This channel is the main factor that
distinguishes the provider from the end user. Providers use special high-speed
communication channels, such as fiber-optic cable or satellite, to transmit
information over the Internet. Thanks to these communication channels, hundreds
and thousands of users can work on the Internet at the same time in a very
comfortable environment. Of course, at certain moments the capacity of the
channel is not enough, in which case they either improve it and increase the
capacity, or the communication connection deteriorates significantly .... Depending
on the type of connection and the bandwidth of the communication channel
between user and provider Types of stay are divided into 2 major groups:
Joining a session. In this type of connection, the user is not permanently connected
to the network, but communicates with the network for a short time via a telephone
line. In this case, the appropriate amount of money is paid for each hour of
connection to the network, and the data in the network is transmitted in analog
form.
Lecture 6
Introduction to programming
Stages of execution of the task on the computer. Algorithm and its types.
Like the BASIC programming language, Visual Basic was designed for an
easy learning curve. Programmers can create both simple and
complex GUI applications. Programming in VB is a combination of visually
arranging components or controls on a form, specifying attributes and actions for
those components, and writing additional lines of code for more functionality.
Since VB defines default attributes and actions for the components, a programmer
can develop a simple program without writing much code. Programs built with
earlier versions suffered performance problems, but faster computers and native
code compilation has made this less of an issue. Though VB programs can be
compiled into native code executables from version 5 on, they still require the
presence of around 1 MB of runtime libraries. Core runtime libraries are included
by default in Windows and later, but extended runtime components still have to be
installed. Earlier versions of Windows require that the runtime libraries be
distributed with the executable.
Visual Basic can create executables (EXE files), ActiveX controls, or DLL
files, but is primarily used to develop Windows applications and to interface
database systems. Dialog boxes with less functionality can be used to provide pop-
up capabilities. Controls provide the basic functionality of the application, while
programmers can insert additional logic within the appropriate event handlers. For
example, a drop-down combination box automatically displays a list. When the
user selects an element, an event handler is called that executes code that the
programmer created to perform the action for that list item. Alternatively, a Visual
Basic component can have no user interface, and instead provide ActiveX objects
to other programs via Component Object Model (COM). This allows for server-
side processing or an add-in module.
Characteristic
The code windows in Visual Basic, showing a function using the If, Then,
Else and Dim statements.
Visual Basic builds upon the characteristics of BASIC.
Code comments are done with a single apostrophe (') character. ' This is a
comment
Boolean constant True has numeric value −1.[21] This is because the Boolean
data type is stored as a two's complement signed integer. In this construct −1
evaluates to all-1s in binary (the Boolean value True), and 0 as all-0s (the
Boolean value False). This is apparent when performing a
(bitwise) Not operation on the two's complement value 0, which returns the
two's complement value −1, in other words True = Not False. This inherent
functionality becomes especially useful when performing logical operations
on the individual bits of an integer such as And, Or, Xor and Not.[22] This
definition of True is also consistent with BASIC since the early 1970s
Microsoft BASIC implementation and is also related to the characteristics of
CPU instructions at the time.
Programming algorithms with different structures.
VB Statements
H Assignments are the Same as in C
H Case is not significant
– Case will be adjusted for you on keywords
– For Variable Names, Case is ignored
H The Usual Operators can be used
– AND is the same as both & and && depending
on context
– OR = | and ||
– NOT = !
VB IF Statements :
If Then
<List of Statements> Else
<List of Statements> EndIf If
VB While Statements
While <condition> do
<List of Statements>
Wend
VB For Statements
Lecture 8
Software for information processing
SOFTWARE AND FIRMWARE
A computer requires more than just the actual equipment or hardware we see and touch. It
requires Software- programs for directing the operation of a computer or electronic data.
PROGRAMS
What is a computer program (or just a program)?
It is a set of instructions arranged in sequence. Computer program is an algorithm.
It directs the computer to perform necessary operations for the solution of a problem or the
completion of a task. The instructions in the program must be written in a language the computer
can understand in a particular computer language. The computer follows the instructions one at a
time in order.
Computer programs handle data, which is held in the computer’s memory. Data can be of two
types:
1.Variable data which may change during the execution of program.
2.Constant data which cannot change during the execution of the program.
The program and the data are stored in a binary code in the memory of the computer (as a
sequence of bits). A bit is a single cell holding a value of 0 or 1. As the computer is an electronic
machine, the bit is an electrical potential which is off (for 0) or on (for 1).
Computer’s memory is organized in such a way that each 8 bits compose a byte, which is
taken as a unit of computer’s information and memory.
A byte can have address which allows us to refer to a particular collection of bits. The
address of a byte is its decimal number converted to 16-base system.
The compiler needs to know how many bytes must be given to store the data. This is done
when constants and variables are declared within the program.
Software is the final computer system component. These computer programs instruct the
hardware how to conduct processing. The computer is merely a general –purpose machine which
requires specific software to perform a given task. Computers can input, calculate, compare, and
output data as information. Software determines the order in which these operations are
performed. Programs usually fall in one of two categories: system software and applications
software.
System software controls standard internal computer activities. An operating system, for
example, is a collection of system programs that aid in the operation of a computer regardless of
the application software being used. When a computer is first turned on, one of system programs
is booted or loaded into the computers memory. This software contains information about
memory capacity, the model of the processor, the disk drivers to be used. Once the system
software is loaded, the applications software can be brought in.
System programs are designed for the specific pieces of hardware. These programs are called
drivers and coordinate peripheral hardware and computer activities. User needs to install a
specific driver in order to activate a peripheral device. For example, if you intend to buy a printer
or a scanner you need to worry in advance about the driver program. By installing the driver you
‘teach’ your mainboard to ‘understand’ the newly attached part.
Applications software satisfies your specific need. The developers of applications software
rely mostly on marketing research strategies trying to do their best to attract more users (buyers)
to their software. As the productivity of the hardware has increased greatly in recent years, the
programmers nowadays tend to include as much as possible in one program to make software
interface look more attractive to the user. This class of programs is the most numerous and
perspective from the marketing point of view.
Data communication within and between computer systems is handled by system software.
Communication software transfers data from one computer system to another. These programs
usually provide users with data security and error checking along with physically transferring
data between the two computer’s memories. During the past five years the developing electronic
network communication has stimulated more and more companies to produce various
communications software, such as Web-Browsers for Internet.
Firmware is a term that is commonly used to describe certain programs that stored in ROM.
Firmware often refers to a sequence of instructions (software) that is substituted to hardware. For
example, in an instance where cost is more important than performance, the computer system
architect might decide not to use special electronic circuits (hardware) to multiply two numbers,
but instead write instructions (software) to cause the machine to accomplish the same function by
repeated use of circuits already designed to perform addition.
Often programs, particularly systems software, are stored in an area of memory not used for
applications software. These protected programs are stored in an area of memory called – read –
only memory (ROM), which can be read from but not written on.
OPERATING SYSTEM.
An operating system (OS) is a program that runs a computer, manages all the other
programs in it. DOS, (the Disk Operating System), Windows 98, Windows 2000, Windows 8, 10
are all examples of operating systems.
All operating systems perform the same basic tasks: control to the computer hardware,
files and folders management, applications management, built-in utility programs support.
When programs need some hardware resources, they address to the operating
system(OS), which in its turn, accesses the hardware through the BIOS or through the device
drivers(OS “sit” between the programs and the Basic Input Output System(BIOS)) and after that
the BIOS controls the hardware. The Windows 2000 NOS bypasses the system BIOS and
controls the hardware directly.
To organize and manage files the operating system uses the file management system. A
file is a collection of data that is given a single name and treated as a single unit. In fact all of the
information that a computer stores is in the form of a file.
There are many types of files, including program files, data files, and text files. The
way an operating system organizes information into files is called the file system. Most operating
systems use a hierarchical file system, which organizes files into directories under a tree
structure.
The beginning of the directory system is called the root directory. An operating system
creates a file structure on the computer hard drive where user data can be stored and retrieved.
When a file is saved, the operating system saves it, attaches a name to it, and remembers where it
put the file for future use.
When a user requests a program, the operating system locates the application and loads
it into RAM (Random-Access Memory, or main memory) of the computer.
COMPUTER VIRUS
Do you know what a computer virus is? You think it is a microbe. No, it is not. A
computer virus is a program, which is capable to create copies of itself and “inject” them into
different objects of a computer system (files, system sectors). The copies of a virus can be
different from the ‘master’. These usually fully functional copies allow a virus to spread very
quickly.
Viruses are usually classified by the place where they reside on a computer (e.g. file
viruses, boot viruses, boot-sector viruses, network viruses), the infection method (e.g. memory
resident/non-resident, slow/fast etc), their destruction capabilities (“harmless”, not dangerous,
very dangerous) and any special features of the virus algorithm (e.g. polymorphic, stealth, etc).
A “harmless” virus is a virus which does not affect a computer’s operation. This
should not lead to a conclusion that some viruses are to be considered as being “good”. Even if
such viruses may not cause direct damage, they at least cause “economic” damage in a sense that
you have to spend time to get rid of them.
A virus is called “not dangerous” if it only manifests itself by using e.g. disk-space
and performing some “entertaining” graphics, sounds or other effects.
A dangerous virus affects a computer’s operation, for example, by slowing it down
more and more.
Very dangerous viruses usually perform destructive actions, such as corrupting data,
deleting data and or messing up settings that are vital for proper computer operations.
Polymorphic viruses (self-encrypting viruses or ghost viruses) are able to change their
main body from copy to copy by making use of encryption algorithms and modifications of the
decryption routine. Through these code variations the virus hopes, that virus-scanners
(antiviruses) will not be able to detect all instances of the virus.
Stealth viruses are capable, while being active, to hide their presence modifications
they have done to files or system sectors. This is usually achieved by the virus through
intercepting DOS calls to access files or sectors and “giving back” the “clean” information.
To fight with computer viruses there were created programs called antiviruses
programs (AVP) or virus-scanners. AVP Scanner can test your system for virus presence in:
System memory; Files, including archive and packed files; System sectors, e.g. Master Boot
Record (MBR) of harddisks and Boot sectors of floppy and harddisks.
Virus-scanner can detect and remove thousands of viruses (it also handles highly
polymorphic viruses). AVP recursively scans in packed and archive files, tests and disinfects
resident viruses in system memory, checks files and system sectors discover changes in them.
PROGRAMMING LANGUAGES
Programming - theoretical and practical activities related to the creation of programs.
Programming is a collective concept and can be regarded both as a science and as an art,
on this a scientific and practical approach to program development is based. The program is the
result of intellectual work, for which creativity is characteristic, and it, as is known, has no clear
boundaries. In any program there is an individuality of its developer, the program reflects a
certain degree of art of the programmer. At the same time, programming also involves routine
work that can and must have strict execution rules and standards.
A programming language is a formal sign system designed to describe algorithms in a
form that is convenient for the executor (for example, a computer). The programming language
defines a set of lexical, syntactic and semantic rules used in the compilation of a computer
program. It allows the programmer to accurately determine what events the computer will
respond to, how data will be stored and transmitted, and what actions should be performed on
these data under different circumstances
A programming language is an artificial language designed to express computations
that can be performed by a machine, particularly a computer. Programming languages can be
used to create programs that control the behaviour of a machine, to express algorithms precisely,
or as a mode of human communication.
A programming language is a very concise language with strict rules in which a
computer program must be written. There are two kinds of programming languages:
1) low-level languages and high-level languages.
Low-level languages (assembly language) are similar to the binary codes that the
computer uses itself. Both assembly language and machine code are complex to use and are often
designed for a particular processor and can’t be easily transferred to another. The advantages of
low-level languages are their speed as they need little or no translation.
High-level languages use English-like words what made programming very much
easier. They are BASIC, PASCAL, FORTRAN, C, C++, ADA, and COBAL. Each language has
a unique set of keywords and a special syntax for organizing program instructions. A vocabulary
is a set of grammatical rules for instructing a computer to perform specific tasks.
High-level programming languages are more complex than the languages the computer
actually understands, called machine languages. Each different type of CPU has its own unique
machine language.
Lying between machine languages and high-level languages are languages called
assembly languages. Assembly languages are similar to machine languages, but they are much
easier to program in because they allow a programmer to substitute names for numbers. Machine
languages only consist of numbers.
Lying above high-level languages are languages called fourth-generation languages
(usually abbreviated 4GL). 4GLs are far removed from machine languages and represent the
class of computer languages closest to human languages.
Regardless of that language you use, you need to convert your program into machine
language so that the computer can understand it. There are two ways to do this: 1) interpret the
program, 2) compile the program
An interpreter takes a single line of source code, translates it and carries out the
instruction immediately. This process is repeated line by line until the whole program is
translated and run.
A compiler translates the whole program before the program is run and turns it into a
self- contained program which can be run independently.