BAM 125 DATA PROCESSING I (Information Technology) by Victor Akingbehin
BAM 125 DATA PROCESSING I (Information Technology) by Victor Akingbehin
BAM 125 DATA PROCESSING I (Information Technology) by Victor Akingbehin
BAM 125
PREPARED
BY
Page 2 of 66
MODULE 1
INFORMATION COMMUNICATION TECHNOLOGY
Computer
Computers can also store data for later uses in appropriate storage devices, and retrieve
whenever it is necessary. Modern computers are electronic devices used for a variety of
purposes ranging from browsing the web, writing documents, editing videos, creating
applications, playing video games, etc. They are designed to execute applications and
provide a variety of solutions by combining integrated hardware and software components.
Development of Computer
(1) ABACUS
Alternatively referred to as the counting frame, an abacus is a mechanical device used to assist a
person in performing mathematical calculations and counting.
Yes, even today in certain parts of the world the abacus is still used as a primary counting device
or as a backup to more modern counting devices,
Page 3 of 66
(2) THE PASCAL’S CALCULATOR
In 1642, at the age of 19, a French mathematician name Biaise Pascal, invented the
Pascaline. The Pascaline is the first mechanical and automatic calculator. It represents
the position of digit with the help of gears in it. The machine is sometimes called adding
machine or Pascal‘s calculator.
The Analytical Engine was a mechanical computer that can solve any mathematical
problem. It was invented by Charles Babbage a scientist form England invented in 1833.
It uses punch cards similar to those used by the Jacquard loom and can perform simple
Page 4 of 66
conditional operations. For this great invention of the computer, Sir Charles Babbage is
also known as the father of the computer.
Punch cards were widely used through much of the 20th century in what became known
as the data processing industry, where specialized and increasingly complex unit record
machines, organized into data processing systems, used punched cards for data input,
output, and storage. Many early digital computers used punched cards, often prepared
using keypunch machines, as the primary medium for input of both computer programs
and data. Punched cards are now obsolete as a recording medium, as the last election in
which they were used was the 2014 midterms, according to the Pew Research Center.
Page 5 of 66
(5) ENIAC
Short for Electronic Numerical Integrator and Computer, the ENIAC was the first
electronic computer used for general purposes, such as solving numerical problems. It was
designed and invented by John Presper Eckert and John Mauchly at the University of
Pennsylvania to calculate artillery firing tables for the US Army's Ballistic Research
Laboratory. Its construction began in 1943 and was not completed until 1946. Although it
was not completed until the end of World War II, the ENIAC was created to help with the
war effort against German forces. During the war, there was a shortage of male engineers, so
the programming was done by a team of six women computers: Betty Jean Jennings (Bartik),
Marilyn Wescoff, Ruth Lichterman, Elizabeth Snyder, Frances Bilas, and Kathleen McNulty
In 1953, the Burroughs Corporation built a 100-word magnetic-core memory, which added to
the ENIAC's memory capabilities, which at the time only held a 20-word internal memory.
By 1956, the end of its operation, the ENIAC occupied about 1,800 square feet and consisted
of almost 20,000 vacuum tubes, 1,500 relays, 10,000 capacitors, and 70,000 resistors. It also
used 200 kilowatts of electricity, weighed over 30 tons, and cost about $487,000.
Computers categorized into several types based on generations and size of computers. Both
types of categories work well up till now. The major types of computers are:
1. Super computer
2. Mainframe Computer
3. Minicomputer
4. Microcomputer
Page 6 of 66
COMPUTER GENERATIONS CLASSIFIED INTO FIVE TYPES SUCH AS
FOLLOWING:
1. First Generation
2. Second Generation
3. Third Generation
4. Fourth Generation
5. Fifth Generation
First Generation Computers were working during the 1940-1956 with proper maintenance of
Vacuum Tubes on those computers. Vacuum Tubes most useful to process the data in
memory. First generation computers use more power from electricity, as such, it produce
high heat, those devices vulnerable to the attacks malfunction. First generation computers
perform several operations per bit; thus, take more time due to the simple programming
skills. Those types of computers take the input from punched cads and give output to the
users on screens. The UNIVAC was the first commercial computer design with vacuums
tubes in first generation in U.S that developed to use at U.S. census Bureau.
Page 7 of 66
Second Generation Computers
Second Generation computers were working in between the 1956-1963 with Transistors. The
size of the computers decreases than first generation and available with cheap cost. Second
generation computers maintain binary and assembly level languages. The famous high level
languages COBOL, FORTRAN and etc developed in second generation computers. Second
generation computers designed for atomic energy industry.
Page 8 of 66
Third Generation Computers:
Third generation computers were working during the 1964-1971 with Integrated Circuits
those IC‘s placed at the place of transistors. IC‘s maintain transistors along with the silicon
chips and semiconductors. They can increase the system performance and efficiency. This
generation computers use keyboard and Operating system, thus, provide high efficiency to
the users.
Fourth generation computers, built in the year 1971, work with Microprocessors, It consists
of several ICs placed in single environment to complete operations quickly. It has proper
input and output controls so, number of people are working with fourth generation
computers. This generation designed by the IBM Company in the year 1981 and Apple
Company, 1984 respectively. Fourth generation computers occupy limited space.
Page 9 of 66
Fifth Generation Computer
Fifth generation computers were designed on Artificial Intelligence technology mode. The
major applications will go to install in fifth generation computers those are voice
reorganization techniques and parallel processing techniques. Those may be useful to the
Nano technology, quantum technology, etc. Fifth generation computing devices offer self-
learning and self-organization features to the users.
Page 10 of 66
Analog, Digital and Hybrid Computers
1. Analogue Computer
2. Digital Computer
3. Hybrid Computer
1. Analogue Computer
Analogue Computers are designed to process the analogue data. Analogue data is continuous
data that changes continuously and cannot have discrete values such as speed, temperature,
pressure and current.
The analogue computers measure the continuous changes in physical quantity and generally
render output as a reading on a dial or scale.
Analogue computers directly accept the data from the measuring device without first converting
it into numbers and codes. Speedometer and mercury thermometer are examples of analogue
computers.
2. Digital Computer
Digital Computer is designed to perform calculations and logical operations at high speed. It
accepts the raw data as digits or numbers and processes it with programs stored in its memory to
produce output. All modern computers like laptops and desktops that we use at home or office
are digital computers.
3. Hybrid Computer
Page 11 of 66
Hybrid Computer has features of both analogue and digital computer. It is fast like analogue
computer and has memory and accuracy like digital computers. It can process both continuous
and discrete data. So it is widely used in specialized applications where both analogue and
digital data is processed. For example, a processor is used in petrol pumps that converts the
measurements of fuel flow into quantity and price.
1. A calculator can conduct just arithmetic operations. On the contrary, a computer can
successfully perform arithmetic as well as logical operations.
2. The memory installed in computer very much larger than the memory that a calculator is
equipped with.
3. A computer can also be used for entertainment and for other tasks too, but this is not
possible with a calculator.
Input and Output Functions of a Computer: The input computer function accepts data
from input devices and sends it to the computer processor, while the output function
communicates the results of processing. A class of hardware devices known as
peripherals is used to perform these functions. Common input peripherals include the
keyboard, mouse, stylus and touchscreen. Digital cameras, microphones, scanners and
Page 12 of 66
joysticks can also be used to input information into a computer. Output peripherals
include monitors, speakers and 2D and 3D printers.
Data Processing Computer Function: Data processing is the most basic function of a
computer. This function is performed by the central processing unit (CPU), which
consists of electronic circuits that can read and execute code instructions to perform a
wide range of tasks, from performing complex mathematical calculations to sorting the
entries in a database. The CPU can be seen as the brain of the computer, accepting input
data and instructions, executing commands, storing results in memory and sending data to
output devices. It controls the sequence of operations and the use of data storage. In
addition to the CPU, some of the processing function of a computer may be performed by
an arithmetic logic unit (ALU), which performs arithmetic and binary logic operations, or
a graphics processing unit (GPU) that's responsible for creating graphical output that
displays data in visual form. Gaming computers are heavily dependent on GPUs to
generate complex dynamic graphics.
Data Storage Computer Function: One of the most useful functions of a computer is
data storage. Besides storing data that has been input through peripherals, computers also
need a way to save the results of data processing. All this is accomplished through
peripheral storage devices, which may be internal or external. Internal storage includes
RAM (random access memory), which is used during processing and temporary in
nature. Information stored in RAM memory is not retained if the computer is turned off.
Persistent, long-lasting data storage is provided by external devices like CDs, DVDs,
hard drives and flash drives.
Benefits of computers to the society
Page 13 of 66
MODULE 2
There are six main elements that make up a computer system. They all interact with each other
and perform the task at hand. Let us take a look at all of them.
1. Hardware
These are all the physical aspects of a computer system. They are tangible, i.e. you can see and
touch them. Hardware components are the electronic or mechanical instruments, like keyboard,
monitor, printer etc. They help the users interface with the software, and also display the result
of the tasks being performed.
Hardware can actually be of four types, depending on which function they perform. The four
types of hardware are:
• Input Hardware: For users to input data into the computer system. Examples: Keyboard,
mouse, Scanner.
• Output Hardware: To translate and display the result of the data processing. Example:
Monitor Screen, Printer, etc.,
• Processing and Memory Hardware: Where data and information are processed and
manipulated to perform the task at hand. It is also the workspace of the computer, where it
temporarily stores data. Examples: Central Processing Unit (CPU), Read Only Memory
(RAM). Secondary Storage Hardware: Where the computer system stores data
permanently. Example: Hard disk, Pen drive, etc.,
2. Software
Software is nothing but a set of programs (computer instructions), which helps the user to do a
set of specific tasks. It helps the user interact with the computer system with the help of
hardware. Software, as you can imagine, is the intangible aspect of the computer system.
Basically, there are six main types of software, which are as follows:
• Operating System: These specialized programs allow the communication between software
and hardware. The operating systems run all the other computer programs, and even
regulate the startup process of the computer. Examples: Windows XP, Macintosh, etc.,
Page 14 of 66
• Application Software: These are designed to perform a specific task or a bunch of tasks.
They can be user-designed (specific to the user‘s needs) or readymade application software.
Example: PowerPoint, Tally etc.
• Utility Software: Like operating systems, it is system software. It helps maintain and protect
the computer system. For example, Anti-virus software is utility software.
• Language Processors: Software that interprets computer language and translates it into
machine language. It also checks for errors in language syntax and fixes the problems.
• System Software: This types of software control the hardware, the reading of the data and
other such internal functions.
• Connectivity Software: The special software that facilitates the connection between the
computer system and the server. This allows the computer to share information and
communicate with each other.
3. People
The people interacting with the computer system are also an element of it. We call this element
the Liveware. They are the ultimate ―users‖ of the computer systems. There are three types of
people that interact with the system, namely:
• Programmers: Professionals who write the computer programs that allow users to interact
with the computer. They must have technical knowledge of computers and computer
languages.
• System Analyst: They mainly design data processing systems, and solve problems that
arise in data processing
• End-Users: Also known as operators, they are the people who interact with the computer
system.
4. Procedures
These are a set of instructions, written in code, to instruct a computer on how to perform a task,
run a software, do calculations etc. There are three types of procedures in a computer they are:
• Software Oriented Procedure: Provides instructions to launch and run software programs
• Internal Procedures: Directs the flow of information and sequences the data.
Page 15 of 66
5. Data
Data is essentially the raw facts and figures that we input in the computer. The data gets
processed via the computer system and becomes information, which is processed and organized
data. Information can then be used for decision-making purposes. The measurement of data is
done in terms of ―bytes‖. One kilobyte (KB) is approximately 1000 bytes, 1 megabyte (MB) is 1
million bytes and finally, 1 gigabyte (GB) is approximately 1 billion bytes.
6. Connectivity
This is when the computers are linked to a network. It facilitates sharing of information, files,
and other facilities. Computers can connect to a network via LAN cables, Bluetooth, Wi-Fi,
satellites etc. The internet is the most obvious example of connectivity in a computer system.
Page 16 of 66
electronically via cables or wireless connection to the main computer, but are separate from
the main operating functions of the computer.
1. Printers
Printers provide the means for the computer to output information in portable form.
Whether a document, a photograph or even an image on canvas (for more sophisticated
devices) a printer allows us to reproduce information and share it with others.
2. Scanners
Scanners are input devices that give the means to insert information into a computer. They
can be used for visual information such as photographs or drawing, or teamed with type
reading software to import documents and translate the hard copy to text that can be edited
in word processing programs. Some scanners are sensitive enough to produce images that
are many millions of megabytes in size from an image as small as a slide.
3. Audio Peripherals
Audio peripherals are both input and output devices. Microphones make it possible to put
our voice into the computer and onto the web, or record an instrument. They need a special
jack (usually called a "stereo-mini") though better microphone can be used with the proper
adapters or external hardware. Most high-end recording studios now operate exclusively
with computerized inputs and sound boards. Speakers are another peripheral that output
music and other audio.
4. Video
Video cameras work with the microphones to create a complete audio/visual input that can
be edited on the computer and viewed, or uploaded to a video website. To view video, the
visual output is the monitor, not considered a peripheral as it is vital to computer function.
Some computers have a microphone and camera built in, in which case they are not
commonly considered peripherals.
5. External Drives
External drives or memory can be much larger in size (in terms of gigabytes of storage)
than the hard drives on a computer, or small in memory and portable enough to slide into a
shirt pocket. They provide storage for digital information that is too voluminous for the
hard drive within the computer, and the means to physically transport this information
easily.
The CENTRAL PROCESSING UNIT of a computer is a piece of hardware that carries out the
instructions of a computer program. It performs the basic arithmetical, logical, and input/output
operations of a computer system. The CPU is like the brains of the computer - every instruction,
no matter how simple, has to go through the CPU. So let's say you press the letter 'k' on your
keyboard and it appears on the screen - the CPU of your computer is what makes this possible.
The CPU is sometimes also referred to as the central processor unit, or processor for short. So
when you are looking at the specifications of a computer at your local electronics store, it
typically refers to the CPU as the processor. When we start to look at the various components of
a CPU and how they function, remember that this is all about speed. When we use a computer,
we want the instructions to be carried out very fast. As the instructions become more
complicated (for example, creating a 3D animation or editing a video file), we demand more
from the CPU. Thus, the technological advances we have seen in processor technology have
largely been driven by the need for speed.
The CPU processes instructions it receives in the process of decoding data. In processing this
data, the CPU performs four basic steps:
1. Fetch: Each instruction is stored in memory and has its own address. The processor takes this
address number from the program counter, which is responsible for tracking which instructions
the CPU should execute next.
2. Decode: All programs to be executed are translated into Assembly instructions. Assembly code
must be decoded into binary instructions, which are understandable to your CPU. This step is
called decoding.
3. Execute: While executing instructions, the CPU can do one of three things: Do calculations with
its ALU, move data from one memory location to another, or jump to a different address.
4. Store: The CPU must give feedback after executing an instruction, and the output data is written
to the memory.
CPU Components
A typical CPU has a number of components. The first is the arithmetic logic unit (ALU), which
performs simple arithmetic and logical operations. Second is the control unit (CU), which
manages the various components of the computer. It reads and interprets instructions from
memory and transforms them into a series of signals to activate other parts of the computer. The
control unit calls upon the arithmetic logic unit to perform the necessary calculations.
Page 18 of 66
Top view of an Intel CPU - because it is a single integrated unit,
the components are not visible from the outside.
Third is the cache, which serves as high-speed memory where instructions can be copied to and
retrieved. Early CPUs consisted of many separate components, but since the 1970s, they have
been constructed as a single integrated unit called a microprocessor. As such, a CPU is a
specific type of microprocessor. The individual components of a CPU have become so integrated
that you can't even recognize them from the outside. This CPU is about two inches by two inches
in size.
Bottom view of an Intel CPU - the gold plated pins provide the
connections to the motherboard.
Page 19 of 66
CPUs are located on the motherboard. Motherboards have a socket for this, which is specific
for a certain type of processor. A CPU gets very hot and therefore needs its own cooling system
in the form of a heat sink and/or fan.
Storage Units
Page 20 of 66
1. Bit
The smallest unit of data in a computer is called Bit (Binary Digit). A bit has a single binary
value, either 0 or 1. In most computer systems, there are eight bits in a byte. The value of a bit is
usually stored as either above or below a designated level of electrical charge in a single
capacitor within a memory device.
2. Nibble
Half a byte (four bits) is called a nibble.
3. Byte
In most computer systems, a byte is a unit of data that is eight binary digits long. A byte is the
unit most computers use to represent a character such as a letter, number or typographic symbol
(for example, ―g‖, ―5‖, or ―?‖). A byte can also hold a string of bits that need to be used in some
larger unit of application purposes (for example, the stream of bits that constitute a visual image
for a program that displays images or the string of bits that constitutes the machine code of a
computer program).
In some computer systems, four bytes constitute a word, a unit that a computer processor can be
designed to handle efficiently as it reads and processes each instruction. Some computer
processors can handle two-byte or single-byte instructions. A byte is abbreviated with a ―B‖. (A
bit is abbreviated with a small ―b‖). Computer storage is usually measured in byte multiples. For
example, an 820 MB hard drive holds a nominal 820 million bytes – or megabytes – of data.
Byte multiples are based on powers of 2 and commonly expressed as a ―rounded off‖ decimal
number. For example, one megabyte (―one million bytes‖) is actually 1,048,576 (decimal) bytes.
Page 21 of 66
4. Word
Word "size" refers to the amount of data a CPU's internal data registers can hold and process at
one time. Modern desktop computers have 64-bit words. Computers embedded in appliances and
consumer products have word sizes of 8, 16 or 32 bits.
5. Octet
In some systems, the term octet is used for an eight-bit unit instead of byte. In many systems,
four eight-bit bytes or octets form a 32-bit word. In such systems, instructions lengths are
sometimes expressed as full-word (32 bits in length) or half-word (16 bits in length).
6. Kilobyte
A Kilobyte (kb or Kbyte) is approximately a thousand bytes (actually, 2 to the 10th power, or
decimal 1,024 bytes).
7. Megabyte
As a measure of computer processor storage and real and virtual memory,
a megabyte (abbreviated MB) is 2 to the 20th power byte, or 1,048,576 bytes in decimal
notation.
8. Gigabyte
A Gigabyte (pronounced Gig-a-bite with hard G‘s) is a measure of computer data storage
capacity and is ―roughly‖ a billion bytes. A gigabyte is two to the 30th power, or 1,073,741,824
in decimal notation.
9. Terabyte
A Terabyte is a measure of computer storage capacity and is 2 to the 40th power of 1024
gigabytes.
10. Petabyte
A Petabyte (PB) is a measure of memory or storage capacity and is 2 to the 50th power bytes or,
in decimal, approximately a thousand terabytes (1024 terabytes).
11. Exabyte
An Exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes. The
prefix exa means one billion billion, or on quintillion, which is a decimal term. Two to the
sixtieth power is actually 1,152,921,504,606,846,976 bytes in decimal, or somewhat over a
quintillion (or ten to the eighteenth power) bytes. It is common to say that an Exabyte is
approximately one quintillion bytes. In decimal terms, an Exabyte is a billion gigabytes.
12. Zettabyte
A Zettabyte (ZB) is equal to one sextillion bytes. It is commonly abbreviated ZB. At this time,
no computer has one Zettabyte of storage. It has 1024 Exabytes.
13. Yottabyte
A Yottabyte is equal to one septillion bytes. It is commonly abbreviated YB. At this time, no
computer has one Zettabyte of storage. It has 1024 Zettabytes.
Page 22 of 66
BUSES
A bus is a high-speed internal connection. Buses are used to send control signals and data
between the processor and other components.
Address bus - carries memory addresses from the processor to other components such as
primary storage and input/output devices. The address bus is unidirectional.
Data bus - carries the data between the processor and other components. The data bus
is bidirectional.
Control bus - carries control signals from the processor to other components. The control bus
also carries the clock's pulses. The control bus is unidirectional.
Typically, there are two major classifications of software, namely System Software and
Application Software.
1. System Software
System software aids the user and the hardware to function and interact with each other.
Basically, it is software to manage computer hardware behavior so as to provide basic
functionalities that are required by the user. In simple words, we can say that system
software is an intermediator or a middle layer between the user and the hardware. This
computer software sanctions a platform or environment for the other software to work in.
This is the reason why system software is very important in managing the entire computer
system. When you first turn on the computer, it is the system software that gets initialized
and gets loaded in the memory of the system. The system software runs in the background
and is not used by the end-users. This is the reason why system software is also known as
‗low-level software‘.
Page 23 of 66
Some common system software examples are:
o Android
o CentOS
o iOS
o Linux
o Mac OS
o MS Windows
o Ubuntu
o Unix
Page 24 of 66
types of device drivers: Kernel Device Drivers and User Device Driver. Some
examples of device drivers are:
o BIOS Driver
o Display Drivers
o Motherboard Drivers
o Printer Drivers
o ROM Drivers
o Sound card Driver
o USB Drivers
o USB Drivers
o VGA Drivers
o VGA Drivers
o Virtual Device Drivers
Page 25 of 66
o Razer Cortex
o Windows File Explorer
o WinRAR
o WinZip
2. Application Software
Word Processors: These applications for documentation. Along with that it also
helps I storing, formatting and printing of these documents. Some examples of
word processors are:
o Abiword
o Apple iWork- Pages
o Corel WordPerfect
o Google Docs
o MS Word
o Clipper
o dBase
o FileMaker
o FoxPro
o MS Access
o MySQL
Page 26 of 66
Multimedia Software: It is the software that is able to play, create or record
images, audio or video files. They are used for video editing, animation, graphics,
and image editing, Some examples of Multimedia Software are:
o Adobe Photoshop
o Inkscape
o Media Monkey
o Picasa
o VLC Media Player
o Windows Media Player
o Windows Movie Maker
o Delta Drawing
o GCompris
o Jumpstart titles
o KidPix
o MindPlay
o Tux Paint
Graphics Software: As the name suggests, Graphics Software has been devised to
work with graphics as it helps the user to edit or make changes in visual data or
images. It comprises of picture editors and illustration software. Some examples
are:
o Adobe Photoshop
o Autodesk Maya
o Blender
o Carrara
o CorelDRAW
o GIMP
o Modo
o PaintShop Pro
Web Browsers: These applications are used to browse the internet. They help the
user in locating and retrieving data across the web. Some examples of web
browsers are:
o Google Chrome
o Internet Explorer
o Microsoft Edge
o Mozilla Firefox
Page 27 of 66
o Opera
o Safari
o UC Browser
Other than these, all the software that serves a specific purpose fall under the category of
Application Software.
However, there exists one more classification of the software. The software can also be
classified based on their availability and sharabilty.
1. Freeware
Freeware software is available without any cost. Any user can download it from the
internet and use it without paying any fee. However, freeware does not provide any liberty
for modifying the software or charging a fee for its distribution. Examples are:
Adobe Reader
Audacity
ImgBurn
Recuva
Skype
Team Viewer
Yahoo Messenger
Page 28 of 66
2. Shareware
It is software that is freely distributed to users on a trial basis. It usually comes with a
time limit and when the time limit expires, the user is asked to pay for the continu ed
services. There are various types of shareware like Adware, Donationware, Nagware,
Freemium, and Demoware (Cripplewareand Trialware). Some examples of shareware are:
Adobe Acrobat
Getright
PHP Debugger
Winzip
3. Open-source
These kinds of software are available to users with the source code which means that a
user can freely distribute and modify the software and add additional features to the
software. Open-Source software can either be free or chargeable. Some examples of open -
source software are:
Page 29 of 66
4. Software
They are also known as Closed-source software. These types of applications are usually
paid and have intellectual property rights or patents over the source code. The use of these
is very restricted and usually, the source code is preserved and kept as a secret.
Page 30 of 66
Low Level and High Level Programming Languages
Low- level languages (are machine dependent. That is, the code written can only be understood
by the particular computer or processor that it was used to write the code) Examples include:
First generation (Machine Language) and Second Generation (Assemble Language).
A high-level language is any programming language that enables development of a program in a
much more user-friendly programming context and is generally independent of the computer's
hardware architecture. High-level Language has a higher level of abstraction from the computer
and focuses more on the programming logic rather than the underlying hardware components-
such as memory addressing and register utilization.
The key difference between Source Program and Object Program is that Source program is a
human-readable program written by a programmer while object program is a machine
executable program created by compiling a source program.
Source programs can be either compiled or interpreted for execution. Compilers helps to convert
object programs back to its original source programs. It is important to note that the terms source
program and object program are used as relative terms. If you take a program transformation
program (like a compiler), what goes in is a source program and what comes out is an object
program. Therefore, an object program produced by one tool can become a source file for
another tool.
Source Program
The programmer writes the source program using High Level Language. Therefore, it is easily
readable by the human. Source programs usually contain meaningful variable names and helpful
comments to make it more readable. A machine cannot directly execute a source program. A
compiler helps to transform source program to executable code for execution by the machine.
Alternatively, is to use an interpreter. It executes a source program line by line without pre-
compilation.
Page 31 of 66
Figure 01: A Source Program
Object Program
Object program is usually a machine executable file, which is the result of compiling a source
file using a compiler. Apart from machine instructions, they may include debugging information,
symbols, stack information, relocation, and profiling information. Since they contain instructions
in machine code, they are not easily readable by humans. But sometimes, object programs refer
to an intermediate object between source and executable files. Tools known as linkers help to
link a set of objects into an executable (For example, C language). As mentioned above, .exe and
bytecode files are object files produced when using Visual Basic and Java respectively. The .exe
files directly execute on windows platform while bytecode files need an interpreter for execution.
Most software applications are distributed with the object or executable files only. It is possible
to convert the object or executable files back to its original source files by decompilation. For
example, the decompiler tools can decompile java.class files(bytecode) in to its original .java
files.
Page 32 of 66
Translator
A program written in High-Level Language is called as source code. To convert the source
code into machine code, translators are needed. A translator takes a program written in source
language as input and converts it into a program in target language as output. It also detects and
reports the error during translation.
Roles of translator are:
• Translating the High Level Language program input into an equivalent machine language
program.
• Providing diagnostic messages wherever the programmer violates specification of the high-
level language program.
ii. Interpreter
Page 33 of 66
Differences between compiler and interpreter
S/N Compiler Interpreter
1 Performs the translation of a program as a whole. Performs statement by
statement translation.
2 Execution is faster. Execution is slower.
3 Requires more memory as linking is needed for the Memory usage is efficient as
generated intermediate object code. no intermediate object code is
generated.
4 Debugging is hard as the error messages are generated Debugging is hard as the error
after scanning the entire program only. messages are generated after
scanning the entire program
only.
5 Programming languages like C, C++ uses compilers. Programming languages
like Python, BASIC, and Ruby
uses interpreters.
Bespoke Software
Bespoke software is an essential factor in each company. You, as the owner of your own
company, you should have custom software; you cannot work using commercial software of any
kind. Custom Software is one that adapts to the needs of your company, which has the necessary
features and the optimization that you need to provide a better service to your customers. Several
factors contribute, but let‘s see some advantages and benefits that custom software can offer you.
Bespoke Software Uses
The custom software indicated by your name customizes to the last detail. Within the custom
software, we find certain elements present in 80% of the solutions contracts of programming
companies. These are:
Special Software: Custom Software is not only a whim, and also a system designed
especially for your company, it is software that facilitates the work and also increases the
speed in which it works. So, when looking for special and unique software for your
business, it is the best option with no useless functions, or strange buttons that you don‘t
know.
Reduction of Costs and Times: One of the main advantages of having Custom Software
is cost savings, especially when it comes to labor. More so, time optimization is
essential, with a unique system for you, you can save ampule of time – which you can use
to improve other aspects of your company and even to continue growing it.
Employee/Boss Satisfaction: Undoubtedly with specialized software, satisfaction will be
something unquestionable. Starting with the employee, who will feel more comfortable
and safe working with a system focused only and absolutely on the functions of the
company.
Custom software
Error Reduction and Productivity Increase: Two things go hand-in-hand; the number of
mistakes made with the custom software will be much smaller, which will generate an increase
in the productivity of your company. This will also increase sales, profitability of your business
and the income will show you that with the particular software you have made a significant
investment. A Total Control of your Company: With custom software, you can request what you
need. Therefore, if you need to have total control over everything that enters and leaves your
company, this will be possible. So, you will not miss anything; you can always be calm, it is
error-proof. But mainly, it is a customized system to execute all the processes of the company
and help in the solution of errors that may occur.
Conclusion
Custom Software is indispensable for any company, regardless of its size. And, it will allow you
to enjoy significant advantages, highlighting the optimization of times and the increase in sales
and profits. It is dedicated and specialized software for the needs of your business, which makes
few mistakes and generates satisfaction in your employees. A Customized Software will always
be far superior to any commercial software as this adapts to the functions and characteristics of
your company; able to deal with all aspects and problems of the company - something that the
software Generic is not able to do.
Page 35 of 66
Activity 1
2.10 Demonstrate the use of task bar and the start button
Page 36 of 66
MODULE 3
Data processing
Data processing occurs when data is collected and translated into usable information. Usually
performed by a data scientist or team of data scientists, it is important for data processing to be
done correctly as not to negatively affect the end product or data output. Data processing starts
with data in its raw form and converts it into a more readable format (graphs, documents, etc.),
giving it the form and context necessary to be interpreted by computers and utilized by
employees throughout an organization. Data Processing is a method of manipulation of data. It
means the conversion of raw data into meaningful and machine-readable content. It basically is a
process of converting raw data into meaningful information. ―It can refer to the use of automated
methods to process commercial data.‖ Typically, this uses relatively simple, repetitive activities
to process large volumes of similar information. Raw data is the input that goes into some sort of
processing to generate meaningful output.
2. Data preparation
Once the data is collected, it then enters the data preparation stage. Data preparation, often
referred to as ―pre-processing‖ is the stage at which raw data is cleaned up and organized for the
following stage of data processing. During preparation, raw data is diligently checked for any
errors. The purpose of this step is to eliminate bad data (redundant, incomplete, or incorrect data)
and begin to create high-quality data for the best business intelligence.
3. Data input
The clean data is then entered into its destination (perhaps a CRM like Salesforce or a data
warehouse like Redshift), and translated into a language that it can understand. Data input is the
first stage in which raw data begins to take the form of usable information.
Page 37 of 66
4. Processing
During this stage, the data inputted to the computer in the previous stage is actually processed for
interpretation. Processing is done using machine learning algorithms, though the process itself
may vary slightly depending on the source of data being processed (data lakes, social networks,
connected devices etc.) and its intended use (examining advertising patterns, medical diagnosis
from connected devices, determining customer needs, etc.).
5. Data output/interpretation
The output/interpretation stage is the stage at which data is finally usable to non-data scientists. It
is translated, readable, and often in the form of graphs, videos, images, plain text, etc.). Members
of the company or institution can now begin to self-serve the data for their own data analytics
projects.
6. Data storage
The final stage of data processing is storage. After all of the data is processed, it is then stored
for future use. While some information may be put to use immediately, much of it will serve a
purpose later on. Plus, properly stored data is a necessity for compliance with data protection
legislation like GDPR. When data is properly stored, it can be quickly and easily accessed by
members of the organization when needed.
Page 38 of 66
processing applications. An Information System (IS) is the field that studies such as
organizational computer systems.
3. Batch Processing
Batch Processing means a type of Data Processing in which a number of cases are processed
simultaneously. The data is collected and processed in batches, and it is mostly used when the
data is homogenous and in large quantities. Batch Processing can be defined as concurrent,
simultaneous, or sequential execution of an activity. Simultaneous Batch processing occurs when
they are executed by the same resource for all the cases at the same time. Sequential Batch
processing occurs when they are executed by the same resource for different cases either
immediately or immediately after one another.
Concurrent Batch processing means when they are executed by the same resources but partially
overlapping in time. It is used mostly in financial applications or at the places where additional
levels of security are required. In this processing, the computational time is relatively less
because by applying a function to the whole data altogether extracts the output. It is able to
complete work with a very less amount of human intervention.
Page 39 of 66
4. Online Processing
In the parlance of today‘s database systems, ―online‖ that signifies ―interactive‖, within the
bounds of patience.‖ Online processing is the opposite of ―batch‖ processing. Online processing
can be built out of a number of relatively more simple operators, much as traditional query
processing engines are built. Online Processing Analytical operations typically involve major
fractions of large databases. It should, therefore be surprising that today‘s Online analytical
systems provide interactive performance. The secret to their success is precomputation.
In most Online Analytical Processing systems, the answer to each point and click is computed
long before the user even starts the application. In fact, many Online processing systems do that
computation relatively inefficiently, but since the processing is done in advance, the end-user
does not see the performance problem. This type of processing is used when data is to be
processed continuously, and it is fed into the system automatically.
5. Real-Time Processing
The current data management system typically limits the capacity of processing data on as and
when basis because this system is always based on periodic updates of batches due to which
there is a time lag by many hours in happening of an event and recording or updating it. This
caused a need for a system that would be able to record, update and process the data on as and
when basis, i.e. in real-time which would help in reducing the time lag between occurrence and
processing to almost nil. Huge chunks of data are being poured into systems off organizations,
hence storing and processing it in a real-time environment would change the scenario.
Most organizations want to have real-time insights into the data so as to understand the
environment within or outside their organization fully. This is where the need for a system arises
that would be able to handle real-time data processing and analytics. This type of processing
provides results as and when it happens. The most common method is to take the data directly
from its source, which may also be referred to as stream, and draw conclusions without actually
transferring or downloading it. Another major technique in real-time processing is Data
virtualization techniques where meaningful information is pulled for the needs of data processing
while the data remains in its source form.
Page 40 of 66
Advantages of Computer Data Processing
Computer-oriented data processing systems or just computer data processing systems are not
designed to imitate manual systems. They should combine the capabilities of both humans and
computers. Computer data processing systems can be designed to take advantage of four
capabilities of computers.
1. Accuracy. Once data have been correctly entered into the computer component of a data
processing system, the need for further manipulation by humans is eliminated, and the
possibility of error is reduced. Computers, when properly programmed, aren't able to make
computational errors. Of course, computer systems remain vulnerable to the entry by humans
of invalid data.
3. Capacity of storage. Computers are able to store vast amounts of information, to organize
it, and to retrieve it in ways that are far beyond the capabilities of humans. The amount of data
that can be stored on devices such as magnetic discs is constantly increasing. All the while, the
cost per character of data stored is decreasing.
4. Speed. The speed, at which computer data processing systems can respond, adds to their
value. For example, the travel reservations system mentioned above is not useful if clients
have to wait more than a few seconds for a response. The response required might be a
fraction of a second.
Thus, an important objective in the design of computer data processing systems is to allow
computers to do what they do best and to free humans from routine, error-prone tasks. The
most cost-effective computer data processing system is the one that does the job effectively
and at the least cost. By using computers in a cost-effective manner, we will be better able to
respond to the challenges and opportunities of our post-industrial, information-dependen
Computer data processing obviously has many advantages over manual processing. Many
offices, in particular small offices, still retain manual methods, sometimes with good reason. For
computers are not without their disadvantages:
• They have to be paid for. A small business system, with a decent printer, software, etc., will
probably cost around two or three thousand pounds.
Page 41 of 66
• Existing procedures have to be converted to computer processing. The change-over can be
protracted, and can cause many headaches.
• Computer processing is more inflexible than manual processing. Once set up, the computer
procedures cannot be as easily changed to cope with the changing requirements of a business.
• Computer security can be a major problem. Businesses have been defrauded of large sums of
money by employees tampering with their computer systems.
Apart from computer security, these disadvantages are declining in importance with the steady
reduction in costs and improvement in reliability and features of computer systems.
Page 42 of 66
MODULE 4
Page 43 of 66
Controls over Source Documents
There are a number of possible controls that can be used to reduce the risk that source documents
are not properly recorded in an accounting system. One of the more common controls is to pre-
number documents, so that missing documents are easier to track down. Another control is to
reconcile the balances in accounts to the supporting source documents to see if either some
document have not been recorded, or if some transactions recorded in the accounts do not appear
to have any supporting source documents.
How Long to Retain Source Documents
Various regulations mandate that some source documents be retained for a number of years. It
may also be prudent to retain these documents irrespective of regulations, if only to provide
evidence in the event of a lawsuit, or to provide better customer service. For these reasons, a
company should adopt a document destruction policy that strictly controls the shredding or other
form of elimination of source documents until a certain number of years have passed.
Page 44 of 66
The official definition of the term ―cash register‖ is ―a business machine that usually has a
money drawer, indicates the amount of each sale, and records the amount of money received.‖
A cash register logs transactions that occur in your store, creating a record of the money coming
in and going out. It can also calculate and add taxes, generate receipts, and offer basic sales
tracking. Many major grocery stores and department stores use cash registers. The cash register
was first invented back in 1879 by whiskey, wine and cigar merchant James Ritty as a
preventative measure towards employee theft. And while we‘re willing to bet employee theft was
a lot more rampant back then, it‘s still a concern for retailers. In fact, employee theft is the
second-most leading cause of shrinkage for retailers, according to data by the National Retail
Federation. Cash registers have come a long way since their early iterations. Now, we have
electronic cash registers that you commonly see in restaurants. While a basic cash register is set
up to handle cash transactions, newer ones have more robust options.
Generally speaking, cash registers are only a few hundred dollars in cost, but if you want
additional functions like credit card readers, barcode scanners or scales, then you‘ll need to
invest in additional hardware.
Optical Mark Recognition: The acronym ―OMR‖ stands for Optical Mark Recognition.
This popular and highly accurate recognition technology is used for collecting data from
―fill-in-the-bubble‖ types of questions on student tests, surveys, ballots, assessments,
evaluations, and many other types of forms. OMR can be confused with other types of
recognition including: OCR (Optical Character Recognition) – reading machine printed
characters, and ICR (Intelligent Character Recognition) – reading handwritten characters.
Optical Mark Recognition enables the respondent to select an answer to a question by
filling in a ―bubble‖ or ―mark‖ associated with an answer choice. For instance, in the
image on the right the respondent selected Excellent in a box to indicate that the location
was Excellent.
In addition to multiple choice questions, OMR can be used to capture names, ID numbers, and
other non-multiple-choice data as illustrated in the image to left. In this case, the respondent
filled in his or her name as ―KP CRABTREE‖. Collecting this type of data with OMR is much
more accurate than trying to recognize a respondent‘s handwritten name using ICR technology.
Page 46 of 66
METHODS OF DATA VALIDATION
Data Transmission
Data transmission is the transfer of data from one digital device to another. This transfer occurs
via point-to-point data streams or channels. These channels may previously have been in the
form of copper wires but are now much more likely to be part of a wireless network. Data can be
transmitted electronically over phone lines, by wireless, etc.
Computer security
Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system.
Safety Measures
Page 47 of 66
The computer wizards/professionals and users should be aware of safety precaution to be taken
when using the computer. To avoid health problems and accidents in the computer room the
following safety measure should be considered.
Good Ventilation: Air conditioner is necessary in the computer room to make the computer
performs well. The computer generates a lot of heat, hence the need for the air conditioner or
fan. It is also necessary for the computer user to be comfortable. The design of workstations
should be such that people are maintaining neutral posture.
Setting Computers: When setting a computer room the following must be taken into
consideration:
Dust free environment: Dust should be prevented as often as possible in the computer. The
floor must always be kept clean the computer and its peripheral should be covered using the dust
cover after use.
Protection from power problems: The surge protectors, the use of stabilizer and UPS must be
upheld to prevent any form of damage caused by power fluctuations.
Good Lightening: The computer room should be well illuminated, use of florescent tubes and
bulbs to provide light to make the room bright for all the activities carried out by the computer
uses is essential.
Computer Security: This involves putting in places a reliable security measures to protect both
the physical measures to prevent crime‖
Page 48 of 66
Fire Prevention in Computer and Server Rooms
There are some things that you can do to prevent a fire from breaking out—in some cases, fire
prevention is more powerful than any fire protection system. If you put in place practices that all
but eliminate any unintentional fire emergency, you may never have to use your fire suppression
system or evacuation plans.
It is recommended that you follow the most recent version of the National Fire Protection
Association‘s NFPA 75: Standard for Fire Protection of Information Technology Equipment. In
addition, you can follow these tips for preventing fire within your property:
Fire suppression systems are designed specifically for protecting sensitive electronic equipment
from a fire. With fast-acting suppression technology, these systems minimize the damage, clean-
up, and downtime. They are ideal for protecting things, such as:
o Financial records
o Data storage
o Computer equipment
o Data processing equipment
o Health care records
Page 49 of 66
Some fire suppression systems activate in as little as 10 seconds to suppress a detected
emergency. This not only minimizes damage to equipment—using clean agent chemicals rather
than technologically destructive water—but also contains the fire to its ignition site.
You may have heard the terms ransomware, trojan and virus used in news reports and wondered
what they actually mean. These words all refer to a type of malicious software used to infect
computers and devices.
Malware (short for malicious software) is fast becoming one of the biggest threats online and has
been used in some of the world‘s largest cyber-attacks including the 2017 WannaCry attack that
affected more than 200,000 victims in 150 countries. Malware is typically installed on a
computer when a user clicks on a link, downloads a malicious attachment or opens a rogue
software program. Once installed, attackers can use the malware to spy on your online activities,
steal personal and financial information or use your device to hack other systems.
Page 50 of 66
This form of attack has proved hugely profitable and is becoming more sophisticated as
criminals blend old and new variants to cause maximum damage. There are lots of different
types of malware available, with some more harmful than others. 230,000 new malware samples
are produced every day and each strain has its own individual way of infecting and damaging
computers.
1. Virus
A computer virus is a type of malicious software that once activated, will replicate itself from
folder to folder, inserting its own code. A virus can spread rapidly and will usually infect a
system with the intention of stealing personal and financial information, sending spam or locking
the system down.
2. Worm
A worm is very similar to a virus in that it replicates itself within a system but unlike a virus, it
doesn‘t spread to other programs. Once installed, the worm silently goes to work and infects the
machine without the user‘s knowledge. Worms can replicate themselves hundreds of times over,
depleting system resources and damaging devices.
3. Trojan
A Trojan is a type of malware that disguises itself as legitimate software but really serves a
malicious purpose. A Trojan may claim to be a free update, game, or an anti-virus program,
tricking the user into installing it onto their device. Once installed, the Trojan works quietly in
the background to steal sensitive data, install a backdoor or take other harmful actions.
4. Ransomware
In recent years, ransomware has become the malware of choice and by the end of the year, it‘s
expected to cost the world more than $8 billion in damages. Ransomware is a type of malicious
software that encrypts a victim‘s data and blocks access until a ransom is paid. The most
common delivery method for ransomware is by clicking on a link within an email or opening a
malicious attachment.
Page 51 of 66
5. Spyware
Spyware is a type of software that installs itself on a device and secretly monitors a victim‘s
online activity. It collects all sorts of data, including passwords, credit card numbers and
browsing activity.
6. Adware
Adware is a type of malware that once downloaded will unexpectedly show advertisements on
the victim‘s computer. Adware doesn‘t tend to steal data like other forms of malware, but it can
be extremely frustrating as the user is forced to see ads they would prefer not to. The ads range
from small banner ads to invasive pop windows that can‘t be closed down.
7. Botnet
A bot is a device that has been infected with malicious software to do something harmful without
the user‘s knowledge. Botnets are networks of these infected devices that work together under
the control of an attacker. Botnets can be used to conduct phishing campaigns, send out spam or
used to carry out Distributed Denial of Service (DDoS) attacks.
To prevent your devices from being infected with malware, there are a number of steps you can
take:
Page 52 of 66
One of the most important ways to protect against malware is to install anti-virus software. Anti-
virus software will protect your device from malicious software that poses a threat to the system.
It will scan your computer to detect and clean the malware and provide automatic updates to
provide enhanced protection against newly created viruses.
In addition to installing anti-virus software, it‘s vital to ensure that your software is regularly
updated to stop attackers gaining access to your computer through vulnerabilities in older and
outdated systems.
Page 53 of 66
3. Only buy Apps from trusted sources
Buying apps from trustworthy sources reduces the chance of your device being infected with
malware. Big brands will take great care to ensure they do not damage their reputation by
distributing malware. To check the authenticity of a source, you can check the full name, list of
published apps and contact details in the app description within the Google Play or Apple app
store.
Page 54 of 66
Phishing remains the easiest way for hackers to install malware on your device. Phishing
scams trick people into opening emails or clicking on a link that may appear to come from a
legitimate business or reputable source. The link may direct you to a fake website where you are
prompted to enter your personal details or take you to a website that directly infects your
computer with malware. If in doubt, don‘t click the link.
5. Install Firewall
Another way to protect your device from malware is to use a firewall. A firewall prevents
malicious attacks by blocking all unauthorised access to or from a private computer network. In
addition to anti-virus software, a firewall provides an extra barrier against malware, reducing the
chance of attack.
Page 55 of 66
It‘s important to back up on a regular basis to ensure that you can still retrieve all your valuable
data and files if your computer is infected with malware. This will help mitigate any damage and
ensure that you are not held victim to a ransomware attack.
Phishing is the number one cause of all cyber-attacks and continues to prove one of the easiest
ways to steal valuable data and deliver malware. MetaPhish has been created to provide a
powerful defense against these threats and enables organizations to find out just how susceptible
their company is to phishing. If you would like to find out more about how MetaPhish can be
used to protect your business, then contact us for further information.
System Security
The objective of system security is the protection of information and property from theft,
corruption and other types of damage, while allowing the information and property to remain
accessible and productive. System security includes the development and implementation of
security countermeasures. There are a number of different approaches to computer system
security, including the use of a firewall, data encryption, passwords and biometrics.
1. Firewall
One widely used strategy to improve system security is to use a firewall. A firewall consists of
software and hardware set up between an internal computer network and the Internet. A
computer network manager sets up the rules for the firewall to filter out unwanted intrusions.
These rules are set up in such a way that unauthorized access is much more difficult.
Page 56 of 66
A system administrator can decide, for example, that only users within the firewall can access
particular files, or that those outside the firewall have limited capabilities to modify the files.
You can also set up a firewall for your own computer, and on many computer systems, this is
built into the operating system.
2. Encryption
One way to keep files and data safe is to use encryption. This is often used when data is
transferred over the Internet, where it could potentially be seen by others. Encryption is the
process of encoding messages so that it can only be viewed by authorized individuals. An
encryption key is used to make the message unreadable, and a secret decryption key is used to
decipher the message.
Encryption is widely used in systems like e-commerce and Internet banking, where the databases
contain very sensitive information. If you have made purchases online using a credit card, it is
very likely that you've used encryption to do this.
3. Passwords
The most widely used method to prevent unauthorized access is to use passwords. A password is
a string of characters used to authenticate a user to access a system. The password needs to be
kept secret and is only intended for the specific user. In computer systems, each password is
associated with a specific username since many individuals may be accessing the same system.
Good passwords are essential to keeping computer systems secure. Unfortunately, many
computer users don't use very secure passwords, such as the name of a family member or
important dates - things that would be relatively easy to guess by a hacker. One of the most
widely used passwords - you guessed it - 'password, definitely, not a good password to use.
So what makes for a strong password?
Longer is better - A long password is much harder to break. The minimum length should
be 8 characters, but many security experts have started recommending 12 characters or
more.
Avoid the obvious - A string like '0123456789' is too easy for a hacker, and so is
'LaDyGaGa'. You should also avoid all words from the dictionary.
Mix it up - Use a combination of upper and lowercase and add special characters to make
a password much stronger. A password like 'hybq4' is not very strong, but 'Hy%Bq&4$'
is very strong.
Remembering strong passwords can be challenging. One tip from security experts is to come up
with a sentence that is easy to remember and to turn that into a password by using abbreviations
and substitutions. For example, 'My favorite hobby is to play tennis' could become something
like Mf#Hi$2Pt%.
Regular users of computer systems have numerous user accounts. Just consider how many
accounts you use on a regular basis: email, social networking sites, financial institutions, online
shopping sites and so on. A regular user of various computer systems and web sites will have
Page 57 of 66
dozens of different accounts, each with a username and password. To make things a little bit
easier on computer users, a number of different approaches have been developed.
Class Activity:
How would you protect computer systems from invasion by virus?
Page 58 of 66
MODULE 5
PRINCIPLES OF DATA COMMUNICATION AND ITS APPLICATION
Telecommunication
Parallel transmission
Within a computing or communication device, the distances between different subunits are too
short. Thus, it is normal practice to transfer data between subunits using a separate wire to carry
each bit of data. There are multiple wires connecting each sub-unit and data is exchanged using a
parallel transfer mode. This mode of operation results in minimal delays in transferring each
word.
• In parallel transmission, all the bits of data are transmitted simultaneously on separate
communication lines.
• In order to transmit n bits, n wires or lines are used. Thus each bit has its own line.
• All n bits of one group are transmitted with each clock pulse from one device to
another i.e. multiple bits are sent with each clock pulse.
• Parallel transmission is used for short distance communication.
Page 59 of 66
• As shown in the fig, eight separate wires are used to transmit 8 bit data from sender to
receiver.
It is costly method of data transmission as it requires n lines to transmit n bits at the same
time.
Serial Transmission
When transferring data between two physically separate devices, especially if the separation is
more than a few kilometers, for reasons of cost, it is more economical to use a single pair of
lines. Data is transmitted as a single bit at a time using a fixed time interval for each bit. This
mode of transmission is known as bit-serial transmission.
• In serial transmission, the various bits of data are transmitted serially one after the other.
• It requires only one communication line rather than n lines to transmit data from sender to
receiver.
• Thus all the bits of data are transmitted on single line in serial fashion.
• In serial transmission, only single bit is sent with each clock pulse.
• As shown in fig., suppose an 8-bit data 11001010 is to be sent from source to destination. Then
least significant bit (LSB) that is 0 will be transmitted first followed by other bits. The most
significant bit (MSB) i.e. 1 will be transmitted in the end via single communication line.
• The internal circuitry of computer transmits data in parallel fashion. So in order to change this
parallel data into serial data, conversion devices are used.
• These conversion devices convert the parallel data into serial data at the sender side so that it
can be transmitted over single line.
• On receiver side, serial data received is again converted to parallel form so that the interval
circuitry of computer can accept it.
Page 60 of 66
• Serial transmission is used for long distance communication.
Bit Synchronization is a function that is required to determine when the beginning and end of
the data transmission occurs. Bit synchronization helps the receiving computer to know when
data begin and end during a transmission. Therefore bit synchronization provides timing control.
Asynchronous Transmission
• Asynchronous transmission sends only one character at a time where a character is either a
letter of the alphabet or number or control character i.e. it sends one byte of data at a time.
• Bit synchronization between two devices is made possible using start bit and stop bit.
• Start bit indicates the beginning of data i.e. alerts the receiver to the arrival of new group of
bits. A start bit usually 0 is added to the beginning of each byte.
• Stop bit indicates the end of data i.e. to let the receiver know that byte is finished, one or more
additional bits are appended to the end of the byte. These bits, usually 1s are called stop bits.
Page 61 of 66
• Addition of start and stop increase the number of data bits. Hence more bandwidth is consumed
in asynchronous transmission.
• There is idle time between the transmissions of different data bytes. This idle time is also
known as Gap
• The gap or idle time can be of varying intervals. This mechanism is called Asynchronous,
because at byte level sender and receiver need not to be synchronized. But within each byte,
receiver must be synchronized with the incoming bit stream.
2. The transmission can start as soon as data byte to be transmitted becomes available.
3. Moreover, this mode of data transmission in easy to implement.
Page 62 of 66
Disadvantages of asynchronous transmission
1. This method is less efficient and slower than synchronous transmission due to the overhead of
extra bits and insertion of gaps into bit stream.
2. Successful transmission inevitably depends on the recognition of the start bits. These bits can
be missed or corrupted.
Synchronous Transmission
• Synchronous transmission does not use start and stop bits.
• In this method bit stream is combined into longer frames that may contain multiple bytes.
• In the absence of start & stop bits, bit synchronization is established between sender & receiver
by ‗timing‘ the transmission of each bit.
• Since the various bytes are placed on the link without any gap, it is the responsibility of
receiver to separate the bit stream into bytes so as to reconstruct the original information.
• In order to receive the data error free, the receiver and sender operates at the same clock
frequency.
Page 63 of 66
• In order to receive the data error free, the receiver and sender operates at the same clock
frequency.
2. The sender and receiver have to operate at the same clock frequency. This requires proper
synchronization which makes the system complicated.
Page 64 of 66
Comparison between Asynchronous and Synchronous
The terms internet and World Wide Web are often used interchangeably, but they are not exactly
the same thing; the internet refers to the global communication system, including hardware and
infrastructure, while the web is one of the services communicated over the internet. The internet
is a globally connected network system facilitating worldwide communication and access to data
resources through a vast collection of private, public, business, academic and government
networks. It is governed by agencies like the Internet Assigned Numbers Authority (or IANA)
that establish universal protocols. The terms internet and World Wide Web are often used
interchangeably, but they are not exactly the same thing; the internet refers to the global
communication system, including hardware and infrastructure, while the web is one of the
services communicated over the internet. The internet is a globally connected network system
facilitating worldwide communication and access to data resources through a vast collection of
private, public, business, academic and government networks. It is governed by agencies like the
Internet Assigned Numbers Authority (or IANA) that establish universal protocols.
E-MAIL, in full electronic mail, messages transmitted and received by digital computers
through a network. An e-mail system allows computer users on a network to send text, graphics,
sounds, and animated images to other users. On most networks, data can be simultaneously sent
to a universe of users or to a select group or individual. Network users typically have an
electronic mailbox that receives, stores, and manages their correspondence. Recipients can elect
to view, print, save, edit, answer, forward, or otherwise react to communications.
Page 65 of 66
Mini Project: Carry out a visit to a standard internet café.
Page 66 of 66