Computer Note
Computer Note
Maerial
on
Computer Application
[For 1st & 2nd Sem Diploma Students (All Branch)]
As per the Syllabus of SCTE & VT, Odisha, Bhubaneswar
By :
Sri Manmath Ku. Prusty
( Lecturer in I.T )
.
Syllabus of
COMPUTER APPLICATION (BET104)
(First / Second Semester Diploma in Engg.(All Branches))
Sl. No Of
Topic Name
No Periods
1. Computer Organisation 05
2. Computer Software 07
3. Computer Network and Internet 08
File Management and Data
4. 05
Processing
5. Problem Solving Methodology 05
Overview of C Programming
6. 15
language
7. Advanced features of C 15
Total : 60
1. COMPUTER ORGANISATION
Introduction to Computer
Evolution of Computers
Generation of Computers
Classification of Computers
Basic Organisation of Computer (Functional Block diagram)
Input Devices, CPU & Output Devices.
Computer Memory and Classification of Memory
2. COMPUTER SOFTWARE
Software concept
System software
Application software
Overview of Operating System
Objectives and Functions of O.S
Types of Operating System
Batch Processing, Multiprogramming, Time Sharing OS
Features of DOS, Windows and UNIX
Programming Languages
Compiler, Interpreter
Computer Virus
Different Types of computer virus
Detection and prevention of Virus
Application of computers in different Domain
3. COMPUTER NETWORK AND INTERNET
Networking concept, Protocol, Connecting Media,
Date Transmission mode
Network Topologies,
Types of Network,
Networking Devices like Hub, Repeater, Switch, Bridge, Router, Gateway.
Internet Services like E-Mail, WWW, FTP, Chatting, Internet Conferencing,
Electronic Newspaper & Online Shopping,
Different types of Internet connectivity and ISP
4. FILE MANAGEMENT AND DATA PROCESSING
Concept of File and Folder
File Access and Storage methods.
Sequential, Direct, ISAM
Data Capture, Data storage
Data Processing and Retrieval
5. PROBLEM SOLVING METHODOLOGY
Algorithm, Pseudo code and Flowchart
Generation of Programming Languages
Structured Programming Language
Examples of Problem solving through Flowchart
6. OVERVIEW OF C PROGRAMMING LANGUAGE
Constants, Variables and Data types in C
Managing Input and Output operations.
Operators, Expressions, Type conversion & Typecasting
Decision Control and Looping Statements (If, If-else, If-else-if, Switch, While,
Do-while, For, Break, Continue &Goto)
Programming Assignments using the above features.
7. ADVANCED FEATURES OF C
Functions and Passing Parameters to the Function (Call by Value and Call by
Reference)
Scope of Variables and Storage Classes
Recursion Function and Types of Recursion
One Dimensional Array and Multidimensional Array
String Operations and Pointers
Pointer Expression and Pointer Arithmetic
Programming Assignments using the above features.
Structure and Union (Only concepts, No Programming)
Chapter-1
( COMPUTER ORGANISATION )
1.1 Introduction :A computer is an electronics device which accepts users data as input, process
the data as per the users instruction and produces the output in the user required format.
1.2 Evolution of computer:
a. ABACUS: The first mathematical device developed for arithmetic calculation and it was invented by
Chinese in BC
b. Pascal Machine (Pascaline): It was inventedBy Blaise Pascal. It was used as a mathematical
calculator for Addition and Subtraction purpose.
c. Leibnitz Machine: It was developed by German mathematician in 1964 which can perform
multiplication and division operation.
d. Babbage’s Machine (Difference Engine): In 1863 UK’s Charles Babbage developed this Machine
which can perform arithmetic operations and store data.
f. Hollerith Punched Card: The USA scientist Herman Hollerith developed punched card machine in
1980. It was the first electromechanical punched card data processing machine which is used to compile
information. This was very much popular for data processing work.
g. ENIAC(Electronic Numerical Integrator& Computer): It was developed in 1946 in USA by John
Presper Eckert & John W. Mauchly. It uses 18000 vacuum tubes, several registers & capacitors. It was the
first electronic general purpose computer.
h. EDSAC(Electronic Delay Storage Automatic Calculator): Von Numeric first time introduces the
concept of stored program in memory. It was developed in 1949 and the first digital computer to store
instructions in memory.
i. EDVAC(Electronic Discrete Variable Automatic Calculator): It was developed in 1949 by John
Presper Eckert & John W. Mauchly. It was a binary serial computer with automatic addition, subtraction,
multiplication, programmed division etc.
j. UNIVAC(Universal Automatic Computer): It was developed in 1951 in USA. It had both numeric and
alphabetic data processing. It is first general purpose computer for commercial use.
1.3 Generation of Computer:
The development of computers is classified into different generations depending upon the device
technology, architecture and mode of operations.
a). First Generation (1940-55):
The main component used is vacuum tubes and it use’s Magnetic Drum for memory
The Operating System is very slow.
It’s size is very large and more heat generated from it.
It uses machine level languages for its operation.
Ex. UNIVAC, EDSAC etc.
b). Second Generation (1956-63):
The main component used is Transistors in place of vacuum tubes.
Transistors are smaller, faster and cheaper than vacuum tubes.
It uses Magnetic cores for storage.
The Operating System is faster than first generation computers.
It’s size is smaller and less heat generated from it than first generation computers.
Ex. IBM 1620, UNIVAC-III etc.
c). Third Generation (1964-71):
The main component used is Integrated Circuits (IC) in place of Transistors.
User interacts with computer through Key board.
Computers are smaller and cheaper than second generation computers.
Semi conductors are used for storage.
BASIC, PASCAL Languages are used.
Ex. IBM 360, Honeywell-6000I etc.
d). Fourth Generation (1971-89):
The main component used are LSI, VLSI etc.
Computers are smaller and powerful.
Microprocessors are used.
Magnetic disk, Optical disk Floppy disks are used for storage.
High level languages like C, C++ etc are used.
Mouse and other devices used.
e). Fifth Generation (1989-Onwords):
These are based on Artificial Intelligence and still in development.
Uses parallel processing and super conductors are used.
Voice recognitions are used today.
All modern computers are goes under this category.
Generation Key Storage Operating Language Example
Component Device System
First Vacuum Tubes Magnetic Batch Machine level UNIVAN,
(1940-55) Drum Processing ENIAC, ABC
Second Transistors Magnetic Core Time sharing, Assembly level IBM 700, IBM
(1956-63) Multitasking 650, ATLAS,
ICL 1901
Third Integrated Main Storage Real Time High IBM/360/370,
(1964-71) Circuit (IC) level(BASIC NCR 395
,FORTRAN,
COBOL)
Fourth LSI, VLSI, Semiconductor Time Sharing, High level Apple, IBM PC,
(1971-89) Microprocessor Real time, (Oracle, SQL Microsoft PC
Network etc) etc
Fifth ULSI, AI Semiconductor Time Sharing, High level Artificial
(1989- Real time, (Oracle, SQL Intelligence,
Onwords) Network etc) Robotics
Features:
Portable.
Required minimum power.
Wide verity of memory size.
Appropriate processing speed which can handle most of the tasks.
Affordable price.
Ex: Desktop, Laptop, Notebook, Tablet, Smart phone etc.
1.5 Basic Organization of Computer/ Functional Block Diagram/ Von-
Numan Architecture:
It describes the architecture of a general digital computer and it consists of following units
(a) Input Unit
(b) CPU (Central Processing Unit)
(c) Output Unit
(d) Memory Unit ALU
CU
Input Unit Output Unit
Memory
Memory
Unit
(ii) ROM:
o ROM stands for Read only memory because in this memory only read operation is possible.
o The user is not allowed to write anything here, it was written by the manufacturer.
o It is non-volatile in nature i.e its content will not be lost when power goes off.
o ROM is also divided in to several types
(a) PROM : Programmable ROM- here user is allowed to reprogram but only once.
(b) EPROM : Erasable Programmable ROM : here contents of ROM can be erased and
reprogrammed multiple times. Here the contents can be deleted using Ultraviolet light but
the entire content can be erased at a time.
(c) EEPROM : Electrically Erasable Programmable ROM : here contents of ROM can be
erased by electrical signals. Here the advantage is user can erase the selected contents as
per the requirement.
Non-volatile
Q-4: What is Microprocessor & what is Microcomputer?
Ans : The central processing Unit built on a single IC is called Microprocessor. It is the main part of the
computer and it contains a Arithmetic Logic Unit, Control Unit and a set of Registers.
A Computer may contains a no. of Microprocessors connected in Parallel but when a digital
computer in which one Microprocessor acts as a CPU is called Microcomputer.
Q-5: What is Multiprocessor System?
Ans : A computer system in which a multiple no. of processing Units are Connected in parallel in order to
increase the processing speed of that computer is called a Multiprocessor. A Multiprocessor may have
common memory and I/O Resources.
Q-6 : What is Flash Memory?
Ans : it is a non-volatile memory, which can electrically erasable and reprogrammable.
The main features of Flash memory are it has fast reprogramming capability and entire contents can be
erased in one operation. It is suitable for storing Firmware.
Q-7 : What is Register Memory?
Ans : The Microprocessor contains a set of general purpose and special purpose registers, which are used
to store the intermediate results during some arithmetic and logical operations. These are smaller in size
but faster in nature.
Q-8 : What is Cache Memory?
Ans : Since the size of register memory is small in size and memory access time to access the main memory
is more so an intermediate memory called cache memory is used.
It is used to store the frequently used data and Instructions.
Q-9 : what is Backup Memory?
Ans : It is an additional memory, which is used to store data in parallel with storage of data in secondary
memory.
It is a separate file that stores a duplicate copy of all data so that user can recover data when data loss
occurs in secondary memory.
Q-10 :Define GFLOPS?
Ans : GFLOPS stands for Giga Floating Point Operations Per Second. It is used to measure the processing
speed of the super computers.
Q-11 :Define MIPS?
Ans : MIPS stands for Million Instructions Per Second. It is used to measure the processing speed of the
digital computers. More MIPS means more faster.
Q-12 :Define MICR?
Ans : MICR stands for Magnetic Ink Character Recognition. It is used to recognize special characters printed
in magnetic ink and input rapidly to a computer. This technique is mainly used by banking system (in ATM)
and other business organizations for identification purpose.
Q-13 :Define OMR?
Ans : OMR stands for Optical Mark Reader. It is used to recognize optical marks on a specific type of paper
called OMR sheet. This device mostly used now days for conducting objective type examinations.
Q-14 :Define Softcopy & Hardcopy?
Ans : If the output of a computer is on the screen/ monitor for viewing then it is called as softcopy. If the
output is taken on a paper in a printed form then is called as hardcopy. A softcopy have no physical
existence where as a hardcopy have physical existence.
Q-15 :What is CPS and LPM?
Ans : CPS stands for Character per Second and LPM stands for Lines per Minutes. Both are units for
measuring the printing speed of a printer.
Objective Questions
1. Who is the father of computer?
A. Ada Byron B. Charles Babbage C. Blaise Pascal D. Herman Hollerith
2. A personal computer is an example of which computer?
A. Main-frame computer B. Super computer C. Mini computer D. Micro computer
3. Which of the following is different from other?
A. Camera B. Scanner C. Speaker D. Microphone
4. Which of the following is not an Output Device?
A. Projector B. Monitor C. Plotter D. Scanner.
5. Integrated Circuit is used as the main component in which of the following Generation.
A. First B. Second C. Third D.Fourth.
6. First generation computer uses which of the following component as main component.
A. Vacuum Tube B. Integrated Circuit C. VLSI D. Transistor.
7. The basic architecture of computer was developed by
A. John. Von Neumann B. Charles Babbage C. Blaise Pascal D. Garden Moore.
8. For printing Flex, Banner, Charts we use which of the following devices.
A. Scanner B. Printer C. Plotter D. Any of the above.
9. Execution of a program is not possible until it is present in which of the following memory.
A. RAM B. ROM C. Secondary D. Register.
10. Which of the following memory is volatile in nature?
A. RAM B. ROM C. Secondary D. Back-up.
11. in order to store frequently used data and instructions we use which of the following memory.
A. RAM B. ROM C. Cache D. Register.
12. Any type of storage that is used for holding information between steps in its processing is
A. CPU B. Primary storage C. Intermediate Storage D. Internal storage
13. The section of the CPU that selects, interprets and sees to the execution of program instructions:
A. Memory Unit B. Register Unit C. Control Unit D. ALU
14. Which computer has been designed to be as compact as possible?
A. Mini Computer B. Super Computer C. Micro Computer D. Mainframe Computer
15. Which of the following is not correct?
A. GFLOPS (Giga Floating Point Operations per Second)
B. MICR (Magnetic Intelligent Character Recognizer)
C. ICR (Intelligent Character Recognition)
D. MIPS (Million Instructions per Second)
16. The smallest unit of information, a computer can understand and process is known as
A. Bit B. Byte C. Nobble D. Digit
17. Aabcus was developed by
A. India B. China C. America D. Germany
18. The output quality of a printer is measured by
A. Pixel per Inch B. Dots per Inch C. Words per line D. digits per line.
19. Which of the following is a commonly used input device?
A. Keyboard B. Mouse C. Monitor D. Scanner
20. In which generation of computer, Mouse was used first time?
A. First B. Second C. Third D. Fourth.
Answers
1. (B), 2.(D), 3.(D), 4.(D), 5. (C), 6.(A), 7. (A), 8.(C), 9.(A), 10.(A), 11.(C), 12. (C),
13. (D), 14. (C), 15. (B), 16. (A), 17. (B), 18. (B), 19. (A), 20.(D)
Chapter-2
Instruction :Instruction is a command given to the computer by the user to perform a particular task.
Program : Program is a group of Instructions written using some set of rules to perform a particular task.
Software : Software is a set of programs combined together by some meaningful way for a particular
task.
Types of Software:
There are 2 types of software (a) System Software (b) Application Software
(a) System Software : A set of program which are designed to control the operation of computer
Hardware.
Example: Operating system, Compiler, Interpreter, Assembler, Driver Programs etc.
(b) Application Software : A set of programs which are used to solve different users application.
Example: Railway Reservation system, Microsoft Word, Excel, PowerPoint, Notepad, video player etc.
Operating System : Operating system is a system software, which is installed in a computer to acts as
an interface between computer and user.
Operating system is used to manage all the computer hardwareand all the other programs in a computer.
It provides the Graphical User Interface, so that user interacts with computer easily.
The Operating System does the following works-
(a) Resource Management
(b) Process Management
(c) Memory Management
(d) Device Management
(e) Information Management
Objectives of Operating system:
(a) It hides the hardware and their complexity so that the user interacts with operating system not
hardware.
(b) it does the effective allocation of resources among different processes.
(c)A user can interact with system through good and easy user interface.
(d) To make a computer system convenient to use in an effective manner.
(e) To keep track of details of all activities.
Functions of Operating system: Operating system performs the following functions-
(a) Process Management
User
(b) Memory Management Application Program
(a) Single User Operating System:The single user operating system are designed to manage the
computer so that one user can effectively do one thing at a time.
Example: Microsoft DOS. (Desk Operating System)
(b) Multiuser Operating System:The multiuser operating system is designed to manage a no. of users
to the computer to take advantages of different computer resources at a time.
Example: Windows, UNIX etc.
1. Batch Processing O.S:
Batch is a group of processes of similar types.
it supports the processing of jobs in a batch but one at time.
The task of this operating system is to select the job in a queue and assign the system resources
one by one.
Here there is a very less interaction between user and computer system.
Printing is an example of this type.
The main problem in this operating system is to prepare a batch and more time wasted for this.
VII. The speed of this operating system depends upon the type of batch and jobs.
2. Multiprogramming O.S:
In order to avoid the delay that occurs in batch processing system and to provide maximum CPU
utilization multiprogramming technique is used.
In this technique, multiple processes are loaded in the memory simultaneously and execution
begins from the first process.
If the first process waits for any recourse, then it waits and execution of second process starts till
the first process gets the resources and so on until all programs finished running.
It increases CPU efficiency but requires proper memory management since processes are
interchanged from ready state to wait state & wait state to ready state.
3. Time sharing / Multi taskingO.S:
It allows multiple users to work in multiple terminals simultaneously by making time slice of CPU
time and distributed among different terminals.
Here each process is allocated with resources for a particular time slot.
The switching between terminals is done so frequently that each user/ terminal thinks that he is
getting the system resources continuously.
It is a multitasking Operating system intended for real time applications in which the total
correctness of an operation depends not only logical correctness but also upon the time in which it
performed.
Such operating systems are used for industrial control, scientific research, spacecraft etc.
This type of operating system also supports multiprogramming/ multiuser environment.
5. Multiprocessing O.S:
In multiprocessing operating system, it works with two or more processing units within a single
computer. This operating system has the ability to allocate tasks between them.
This operating system enables several programs to run continuously.
UNIX is an example of multiprocessing operating system.
6. Network O.S:
Network Operating system is a software that includes special functions for connecting computers
and devices in to a LAN. It controls a network and its traffic and control access of resources by
multiple users in a network such as File, Storage devices etc.
Example: Windows NT, UNIX, Mac O.S etc.
DOS (Desk Operating System)
WINDOWS :
Microsoft window is a series of operating systems and graphical user interfaces made by Microsoft.
It is most widely used operating system for personal computer.
It has different versions like Windows-1.0, 2.0, 3.0, 3.1, 95, 98, 2000, XP, 7, 10 etc.
Features :
Windows provides Graphical User Interface (GUI) to the users for interact with computer.
It provides various commands in the form of menu and icons.
It allows use of Mouse.
It is easy to use and learn, because commands do not need to be memorized.
Difference between DOS, Window &Unix.
Different Between Windows & DOS.
.
Window DOS
It provides Graphical User Interface It provides Character User Interface
It is a powerful and fast O.S It is a less powerful and slow O.S
It provides inbuilt commands in All types of commands are to be
various applications which can be typed in DOS Prompt.
used by mouse click.
All commands available in DOS are All commands available in Window
available in Windows. are not available in DOS.
It is a Multiuser & Multitasking O.S. It is a Single user O.S.
It supports Graphics It does not supports Graphics
It is costly It is cheaper.
Different Between UNIX & DOS.
UNIX DOS
It is a powerful and fast O.S It is a less powerful and slow O.S
It is a Multiuser & Multitasking O.S. It is a Single user O.S.
It supports Visual Display &Graphics. It does not supports Graphics
It supports Networking of It does not supports Networking of
Computers. Computers.
Its Security Level is High. Its Security Level is very less.
It supports the Kernel & Shell It don’t have the Kernel & Shell
Concept. Concept.
It is costly. It is cheaper.
Programming Languages:
The languages in which Programs are written are classified into following 3 types.
(a) Machine level Language/ Low level Language
(b) Assembly Language
(c) High level Language
Computer Virus:
A computer virus is a software program that has been intentionally created to make harm to a computer
system.
A computer virus can corrupt data, delete data, copy & destroy data on an individual computer.
It has the ability to replicate (making its duplicate copy automatically) itself.
It can spared from one computer to another through internet, network, storage devices and affects all the
programs, memory of computer.
It may results system failure, wasting computer resources, corrupting data, increasing maintenance cost
etc.
Computer virus also has some common forms such as worms, Trojan horses, keyloggers, spywares, rootkit,
logic booms etc.
Types of Virus:
1. Resident Virus: these are permanent virus which are normally present in RAM and interrupts all
the programs executed by the system. It corrupts the program & file while open, close, copy or
rename etc.
2. Boot Virus: Boot Virus affects the boot sector of a hard disk. It deletes the boot records/ programs
which are responsible for loading the operating system in memory. This virus loaded in to the
memory when the computer boots.
Ex. From, Disk Killer, Store Virus, Stones etc.
3. Program Virus:This virus affects executable files having extension like .exe, .com, .bin, .sys etc.
These are loaded in to memory during the execution of programs along with them and remain
present in memory. They make copy of itself and making the memory full.
Ex. Sunday, Cascade etc.
4. Macro Virus: These viruses infect files that are created by programs that contains macros. These
virus propagates from one computers to another through the Infected files and affects the normal
templates.
Ex. Relax, Melissa, Nuclear etc.
5. MultipartileVirus: These are the mixture of Program virus & boot virus. They first infects the
program files and hide in memory and gradually infects the boot sector of Hard disk.
Ex. Flip, Tequila etc.
6. Polymorphic Virus: These virus encrypts or encode themselves in a different way using different
algorithm/ Technique every time while infects a system so it is very difficult for a antivirus to detect
this types of virus. They are creating a large no. of copies of themselves.
Ex. Cascade, evil, Proud, virus etc.
7. Directory Virus: These virus changes the paths that indicates the location of a file. You are
unknowingly running the virus while original file is previously moved by the virus. It once infect, it
becomes impossible to locate the original file.
8. Network Virus:These virus rapidly spread through LAN & internet. When these viruses affect a
computer it first infects the computer fully and moves to the next computer through network and
continue.
9. Worms: A worm is technically not a virus but a program very similar to a virus. It has the ability to
self-replicate causes harm to a system. It can be executed without the help of any other program.
10. Trojan Horse: These are some special types of malicious codes which are not similar to virus or
worms. It spared by internet automatically even you don’t touch it.
11. Logic Bombs: These are some special types of malicious codes not exactly virus used to destroy
data on a computer when certain conditions occur.
Some commonly used virus is Brain, Friday13, Happy Birthday, April 1st, black Monday, I Love U,
Monkey etc.
The presence of virus can be detected by anti-virus software through experts and by the symptoms.
Preventions:
Don’t allow outside CD & pen drive without scanning.
Always install suitable antivirus software.
Don’t visit website which are not reputed.
Don’t open unknown mail.
Antivirus:
Ex. Norton, Macfee, e-trust, PC-clean, Microsoft security essential, Quick hill etc.
So always choose relative antivirus software and update regularly.
Examples of computer application that uses Client-Server model are Email, Network Printing, World Wide
Web (www) etc.
Protocols:
A protocol is a set of rules that is used for communication between computers in a network.
These are guidelines used for controlling the access of computers.
Types of Network Protocols:
The most commonly used network protocols are
(a) Ethernet (b) Local Talk (c) Token Ring (d) FDDI (e) ATM
(a) Ethernet:
Ethernet protocol is the most widely used protocol.
It uses Access methods called CSMA/CD (Carrier Sense Multiple Access/ Collision Detection).
Here each computer senses the medium before transmit. If the network is free, then it sends a
signal.
If two computers send simultaneously then collision occurs.
If network is not free, then it waits a random amount of time and then transmits.
Ethernet protocol uses linear BUS, STAR & TREE topology.
Data transmitted through twisted pair, Co axial & Fiber optics cable.
Speed is normally 10mbps.
Transmission Media:
A transmission medium can be defined as anything that can carry information from a source to a
destination. It is divided into following types-
b. Coaxial Cable:
Coaxial cable carries signals of higher frequency ranges than twisted pair cables.
These are mostly used for cable TV system and for connecting the computers with in an office
building or a short distance to form a network.
The Coaxial cable consists of a single copper conductor at its center which is encapsulated inside a
plastic layer that provides insulation the conductor and metal shield.
The metal shield works as second conductor and also protects the signal from outside noise and
this is also enclosed with a plastic cover.
The coaxial cable is highly registrant to signal interference and can support greater cable length
between devices.
Its speed varies from 200 mbps to 500 mbps.
It is difficult to install.
c. Fiber Optics Cable:
The Fiber optics cable is constructed in several layers. The core is the actual glass or fiber conductor
which is covered with a refractive coating called cladding. The next layer is a protective covering
made of PVC to protect the core and cladding.
It transmits signal in the form of light.
Advantage:
Best suited for networks that do not have a Hub.
Easy to Install
Can span over large distance
Every node has equal chance to transmit data.
Disadvantage:
Unidirectional in nature.
Difficult to add or remove nodes from the network.
If one node fails, the entire network is shut down.
Difficult to find errors
Communication is slower.
(b) Bus Topology:
In Bus Topology, each computer is connected to a single cable and nodes share the same
communication channel.
When a node wants to send a message to another node, it first checks whether the line is free or
not. If the line is free then it transmits the signals else waits until the channel becomes free.
Advantage:
Easy to install and control a new device to the network.
Requires less cable hence less expensive
Failure in one node doesn’t affect the other nodes.
Disadvantage:
Failure in the main cable results shutting down the entire network.
As the no of nodes increases, the speed of the network slows down.
(c) Star Topology:
In Star Topology every node is connected to a central hub within a point to point connection and all
the data/ message passes from one node to another through the central hub.
The Hub acts as a signal repeater. When a node has to send a message to another node it first
sends the message to the Hub then the Hub regenerates the message and forward to the
destination node.
Advantages:
Easy to install
New nodes can easily connected
Failure in one node does not affect the other nodes in the network.
Easy to detect errors.
Disadvantages:
Requires more cable than Bus topology.
If the central Hub fails then the entire network fails.
More expensive than Bus topology.
(d) Mesh Topology:
Mesh Topology is also called completely connected network. Here every node is connected to every
other nodes on the network using a separate physical link.
Here a message can take any of the several possible paths from source to destination.
Advantages:
Failure in any cable or node does not affect the network.
Communication is faster since there is a dedicated link between every pair of nodes.
Data transmission is very secure.
Easy to detect errors.
Disadvantages:
Most expensive due to the use of huge no of cables.
Difficult to Install.
(e) Tree Topology:
Here each node is directly connected to its parent and child node only.
Message can transmitted from one node to another node through the parent nodes.
Here if one node is affected then only its subordinate nodes are affected and others are not
affected.
It is mostly used for cable TV network.
(f) Hybrid Topology:
Since all the above topology have some advantages and disadvantages, so it is very useful to use
combination of two or more topology while creating an network.
Hence the combination of two or more topologies is called as Hybrid Topology.
Two very commonly used Hybrid network topologies include Star-Ring and Star-Bus Topology.
Hybrid network depends upon the organization structure.
1. Simplex:
In simplex mode, data can transmitted in only one direction and that is only from sender to
receiver.
It is useful in situation where flow of data required in one way, not in opposite direction.
Example: Radio, TV broadcasting, Data transfer between keyboard and computer, computer to
printer etc.
Fig: Simplex Mode.
2. Half Duplex:
In Half Duplex mode, data can be transmitted in both direction but one at a time.
Here there is only one Transmission channel between sender and receiver.
When one device sending data, the other will receive data and while second device send data first
will receive data.
Example: Web Browsing, Walkie-talkies, citizen band radio etc.
3. Full Duplex:
In Full Duplex mode, data can be transmitted in both the direction simultaneously.
Here both sender and receiver can send and receive data at a time.
Example: Telephone & Mobile communication.
Disadvantage: it is slower because each time 2 extra bits send and there exists time gap between each
data byte.
(b) Synchronous Data Transmission:
In synchronous data transmission, the bit stream is combined into a longer frame with multiple bits
without time gap.
The receiver separates the byte from the bit stream by counting.
Here data bits are send one after another without start bit, stop bit and gap.
Here timing between sender and receiver is very important.
It is much faster than Asynchronous data transmission because of time gap, start bit and stop bit.
(Fig: Synchronous Data Transmission)
Short Notes:
(c) Server:
Any device than runs server software is considered as server. A server basically accepts requests
and gives responses to any devices called clients.
Client-Server models are also called request response model, where a client sends a request to the
server which performs some action and sends response back to the client.
Servers are used to manage network resources.
Example: Database Server, Web Server, Application Server, Mail Server, File Server etc.
(h) FTP:
FTP stands for File Transfer Protocol.
It uses both standard and program used to transfer files.
User uses FTP to send and receive files in some sites.
(i) Chatting:
Chatting may refers to any types of communication over the internet that offers a real time
transmission of text message from sender and receiver.
Here both sender and receiver are remaining online simultaneously.
Chat messages are generally short in size in order to enable quick response.
It is a text based online communication.
It is a point to point communication as well as multicast communication from one sender to many
receivers.
Example: Whatsapp, Messenger etc.
File:
A file is the most basic unit of data storage in a disk.
File is a common storage unit for data storage.
All the programs and data are stored in computer in the form of files and the read and write
operation are done on files.
All types of data like text, image, video and audio are stored in the form of files but in different
formats.
A file can be identified by some codes called extensions present at the end of file name.
Example: Image file- abc.jpg, abc.gif, abc.png etc.
Text file – abc.doc, excel files – anc.xlsx etc.
Folder:
Folder is a collection of files and it may be empty.
It is used to organized files in hierarchical structure.
It is used for better file management.
Data Retrieval:
Data is one of the most important assets of any origination.Data recovery refers to the whole process
carried out for restoring data that has been lost, accidentally deleted, corrupted or not accessible due to
any reason.
Data lost occurs due to one of the following—
File was mistakenly deleted.
File was corrupted or deleted by virus.
Another program deleted the file.
File is password protected.
Different methods of Data Recovery:
(a) Physical damage to storage devices:
Different physical damage may occurs to the storage media that may be breaking of tapes, CD layer
being scratched, failure in Hard disk motor or head etc.
In case of physical damage the data may be recovered by replacing the damaged parts.
But in this method getting all original data is difficult.
(b) Media error or corrupt partition/ File system:
In this case data on the hard disk is not readable due to error in operation or virus.
In this case specialized data recovery software like Test Disk can be used to repair the damaged file
system or partition table.
In this case the end user should have sufficient knowledge about software.
(c) Online data recovery:
This is another popular method of data recovery.
In this method, data recovery is performed over the internet without necessarily having computer
or drive possessing.
When we do any online operations data is regularly backed-up online and therefore if any data lost
occurs then you can be able to recover data from the last backed-up version.
I-Sem/COMMON/2016(W) (New)
COMPUTER APPLICATION
(Code: BET-104)
Full Mark:70 Time: 3 hours
Answer any five questions.
1. (a) Define the term DPI, CPS. 2
(b) Discuss about key features of different types of classes of Digital Computer. 5
(c) Define memory hierarchy. Explain the main feature of the various types of memory
present at different level of this hierarchy. 7
2. (a) Define Protocol. 2
(b) Discuss about Batch processing, Multi programming and Time sharing OS.
5
(c) Discuss about Synchronous and Asynchronous transmission mode.
7
3. (a) Define Data Validation. 2
(b) Make a comparison between Algorithm, Pseudo code and Flowchart by using an
example.5
(c) Discuss about different types of internet connectivity. 7
4. (a) Define ISAM. 2
(b) Write short notes on any two. 5
(i) Hub (ii) Repeater (iii) FTP (iv) Topology.
(c) Write a program in C to find the factorial of a number by using recursion.
7
5. (a) Define Array. 2
(b) Explain the different types of decision control statement in C. write a C program to
find sum of first 100 numbers by using while, do while and for loop.
5
(c) Write a program in C to find the sum of the series.
1 1 1 1
1+ + + + …………….+ 7
2 3 4 𝑛
6. (a) Define Pointer. 2
(b) Write the difference between Structure and Union.
5
(c) Write a C program to print the prime numbers between 1 to 100.
7
7. (a) Name any two optical input device. 2
(b) Discuss about the different methods of detecting and preventing the computer Virus.
5
(c) Draw the functional block diagram of a computer and discuss about function of
different components.
7
II-Sem/COMMON/2016(S) (New)
COMPUTER APPLICATION
(Code: BET-104)
Full Mark:70 Time: 3 hours
Answer any five questions.
1. (a) Define operating system. 2
(b) Give a brief idea about the classification of computers. 5
(c) What is computer virus and what are its different types. How it can be detected and
prevented? 7
2. (a) Define Compiler and Interpreter . 2
(b) What do you mean by software? Differentiate betweenSystem software and
Application software.5
(c) What is the use of memory in a computer? Give a clear description about its
classification.7
3. (a) Define network and internet. 2
(b) Briefly explain the uses of bridge and router in network. 5
(c) What is a file? Describe the file access methods: Sequential, Direct and ISAM.
7
4. (a) What do you mean by type-casting in C? 2
(b) What is Pseudo code and why it is used? 5
(c) Draw the flowchart and write a program in C to calculate the factorial of a number.
7
5. (a) What are different data types used in C. 2
(b) Differentiate between call by value and call by reference.
5
(c) Give a comparison study of DOS, Windows and Unix operating system .
7
6. (a) What is FTP and why it is used? 2
(b) Write short notes on (any two).
(i) E-mail (ii) On-line shopping (iii) Chatting 5
(c) Write a program in C to multiply two 3X3 matrices.
7
7. (a) What is a Pointer in C. 2
(b) What do you mean by String? Write a program in C to concatenate two strings.
5
(c) What is looping? What are the different types of looping used in C ? Write their
systems with example.
7
II-Sem/COMMON/2016(S) (New)(BP)
COMPUTER APPLICATION
(Code: BET-104)
Full Mark:70 Time: 3 hours
Answer any five questions.
1. (a) List out the main blocks of a computer system. 2
(b) Define virus. Write down how to detect and prevent the virus. 5
(c) Why memory is needed? Explain different types of memory. 7
2. (a) Define algorithm. 2
(b) Differentiate between compiler and Interpreter. 5
(c) What is file? Discuss different file access and storage methods. 7
3. (a) Define Router. 2
(b) What is Operating System? Explain Batch processing and Time sharing operating
system. 5
(c) Define network. Explain different types of networks.
7
4. (a) What do you mean by Pointer? 2
(b) Discuss different generation of computer. 5
(c) Define Topology. Explain different types of topology used in networking.
7
5. (a) Define Protocol. 2
(b) Explain different operators used in ‘C’ language. 5
(c) Write a C program to find out largest among three numbers with Flowchart.
7
6. (a) What do you mean by FTP. 2
(b) Write a C program to find out Factorial of a given number.
5
(c) Discuss different network devices in detail. 7
7. Write short notes on any Four: (31/2x4=14)
(a) Software.
(b) Array.
(c) E-mail.
(d) Looping statement in C language.
(e) Online Shopping.
(f) Flowchart.
II-Sem/COMMON/2016(S) (Old)
COMPUTER APPLICATION
(Code: BET-104)
Full Mark:80 Time: 3 hours
Answer any five questions.
1. (a) What is MICR. 2
(b) Draw the block diagram of computer and discuss about the function of different
parts of a computer. 5
(c) Write the difference between RAM and ROM. 8
2. (a) Name any two anti-virus software . 2
(b) What is Network? Discuss about different advantages of Internet.
5
(c) Discuss about different types of software used for a computer. 8
3. (a) State the function of a compiler. 2
(b) Define OS and describe its different functions. 5
(c) Make a comparison between Multiprogramming and Time sharing OS.
8
4. (a) What is recursion? 2
(b) Write a program in C, implementing the recursion.
5
(c) Write a program in C to find out the following.
X-1+X-2+X-3+………….…..+X-100 8
5. (a) What is library function? 2
(b) Draw the flowchart to find the greatest of 100 numbers. 5
(c) Write a program in C, to find the greatest of 100 numbers.
8
6. (a) Define Looping? 2
(b) Write a program in C to find the solution of quadratic equation.
5
(c) Write a program in C, to print a number in reverse order.
8
7. Write short notes on (anyfour):
(i) Printer (ii) Algorithm (iii) Data types in C (iv) Virus (v) Hard disk.