Computer Hardware Assembly and Maintenance Theory 663
Computer Hardware Assembly and Maintenance Theory 663
COMPUTER HARDWARE
ASSEMBLY AND MAINTENANCE
JOB ROLE
CURRICULUM COMMITTEE
Dr. A. Murli Rao, Dr. Sunil Kumar Khatri, Mr. Arun Kumar Dubey,
Joint Director, Director, Amity Institute of Assistant Professor,
IGNOU Information Techonology, Bharati Vidyapeeth College of
New Delhi Amity University, NOIDA Engineering, New Delhi
Mr. Abhishek Datta, Mr. Nishant Jain, Ms. Radhika B,
Manager, G.Network Consultant (e-Governance), Academic Officer (ICT)
Solutions, Gurgaon AICTE, New Delhi NIOS, NOIDA
LESSON WRITERS
Dr. Sunil Kumar Khatri, Dr. Deepti Mehrotra, Mr. Arun Kumar Dubey,
Director, Amity Institute Professor, Amity School of Assistant Professor, Bharati
of Information Technology, Engineering &Technology, Vidyapeeth College of
Amity University, NOIDA NOIDA Engineering, New Delhi
Mr. Raj Kumar Pal, Mr. Yogesh Kumar, Ms. Samiksha Tripathi,
Technology Head, PGT (Computer Science), Innovation Consultant,
Mira Model School, Delhi Public School, Cotiviti India,
New Delhi Kuwait NOIDA
EDITORS
Dr. A. Murli Rao, Dr. Deepti Mehrotra, Mr. Arun Kumar Dubey,
Joint Director, Professor,Amity School of Assistant Professor, Bharati
IGNOU Engineering & Technology, Vidyapeeth College of
New Delhi NOIDA Engineering, New Delhi
Ms. Samiksha Tripathi, Mr. Nishant Jain, Ms. Radhika. B
Innovation Consultant, Consultant (e-Governance), Academic Officer (ICT),
Cotiviti India,NOIDA AICTE,New Delhi NIOS, NOIDA
COURSE COORDINATOR
Ms. Radhika B
Academic Officer (ICT)
NIOS, NOIDA
LASER TYPESETTING
M/s MS Computers
Patparganj, Delhi-110072
A Word With You
Dear Learner,
Congratulations for having chosen this course. This course is National Skill Qualification
Framework (NSQF) compliant level 4 of the Job Role: Field Technician (Computing and
Peripherals).
This course is specially designed keeping in your needs and level in mind. We have ensured that
the course contents are presented in a simple, clear and logical manner. We expect you that
as a Field Technician or Service Technician you would be able to diagnose the problem in
Computer and troubleshoot Computer, attend to customer complaints, install newly purchased
products, and configure peripherals such as printers, scanners and network devices.
We are confident that you will enjoy studying this course through Open and Distance learning
system. I hope you will find this book informative, interesting and useful.
We wish you all the very best for a bright and successful future.
Notes
1
INTRODUCTION TO COMPUTERS
Computer has become indispensable in today’s life. It has become difficult to imagine the
world without computer. Everywhere computers are used whether it is office, bank,
school, college, business, hospitals etc. You must have seen Computers at your home,
school or office. Can you guess what type of a device it is?
Computer is an electronic device which accepts input, processes it and produces the
desired results. Computer is a machine which performs mathematical operations and
logical decisions at an extremely fast speed. Computer not only do calculations but also
handles different applications at a time.
In this lesson, you will learn about computers, its parts, and its uses in real life.
OBJECTIVES
After reading this lesson you will be able to:
z define Computer.
z describe generations of Computers.
z list types of Computers.
z explain the uses of Computers.
Computer is a general purpose device that is programmed for some task. Do you know
what are the two major characteristics of a Computer? Major charctersistics of a
Notes Computer are (i) it responds to a specific set of instructions in a well-defined manner;
(ii) it can execute a pre-recorded list of instructions (a program).
Automatic: A computer as a machine can not start itself but it can perform some work
without human intervention. For example, you have large amount of data and you want
to perform some calculation on it. For getting the result, you have to run the appropriate Notes
software and all the calculation will be done by Computer.
Diligence: Unlike human being, computer is free from dullness and lack of concentration.
It can work for hours without any error until job is finished.
z First Generation: The period of first generation was 1946-59. The computers of
first generation used vacuum tubes as the basic components for memory and circuitry
for CPU (Central Processing Unit). In this generation mainly batch processing
operating system were used. Punched cards, paper tape, and magnetic tape were
used as input and output devices. Example : ENIAC (Electronic Numerical Integrator
And Computer was the first general purpose electronic digital computer ), EDVAC
(Electronic Discrete Variable Automatic Computer), UNIVAC (Universal Automatic
Computer - world’s first commercially available computer), IBM-701 and IBM-
650.
z Second Generation: The period of second generation was 1959-65. In this generation
transistors were used. It is cheaper, consumed less power, more compact in size,
more reliable and faster than the first generation machines made of vacuum tubes.
These were also the first computers that stored instruction in their memory. The
computers used batch processing and multiprogramming operating system. Example:
IBM 1620 , IBM 7094, CDC 1604, CDC 3600, UNIVAC 1108
z Third Generation: The period of third generation was 1965-71. The computers of
third generation used Integrated Circuits (IC’s) in place of transistors. A single IC
Notes has many transistors, resistors and capacitors along with the associated
circuitry. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1,
BASIC, ALGOL-68 etc.) were used during this generation. Example: IBM-360 series,
Honeywell-6000 series, PDP(Programmed Data Processor), IBM-370/168 and TDC-
316
z Fourth Generation: The period of fourth generation was 1971-80. The computers
of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits
having about 5000 transistors and other circuit elements and their associated circuits
on a single chip made it possible to have microcomputers of fourth generation. All
the high-level languages like C, C++, DBASE etc., were used in this generation.
Example: DEC 10, STAR 1000,PDP 11, CRAY-1(Super Computer) and CRAY-X-
MP(Super Computer)
z Fifth Generation: The period of fifth generation is 1980 onwards. In the fifth
generation, the VLSI technology became ULSI (Ultra Large Scale Integration)
technology, resulting in the production of microprocessor chips having ten million
electronic components. This generation is based on parallel processing hardware
and AI (Artificial Intelligence) software used for Robots designing.
Notebook computers -It is a lightweight computer. A notebook size is also very less
in comparison to Desktop Computer and Tower Computer. The display of notebook
computer is different from Desktop Computer. Notebook computers price is very Notes
high in comparision with Desktop computer. It is easy to move from one place to
another place. Notebook computer power is same as Desktop Computer. It is made
of same configuration like 1 GB RAM, 1 TB HDD, DVD, etc...
Laptop computer -This type computer is little different from Notebook computers.
Its configuration is near about same as Notebook Computer and it can be in the
range of high configuration (4 GB RAM, 1 TB HDD, etc.) to low configuration (500
MB RAM, 500 GB HDD, etc.). Most of the times Laptop Computers are also called
Notebook Computers.
Tablets - are smaller than laptop PCs, very lightweight, and easy to carry. But they
lack the processing power of a laptop as well as a keyboard input. They rely instead
on a stylus and touch screen.
z Minicomputer: A multi-user computer capable of supporting up to hundreds of
users simultaneously. These computers are bigger in size and costlier than
Microcomputers. Minicomputers are used in universities and big organisations.
through online. There are so many online contents study materials which can be viewed
by using internet.
Notes
Retailing: Most of the retailers product are based on barcode. That’s the reason they need
computers to read barcode and calculate amount on it. This system helps retailers to sum
up so many items within seconds.
Energy: In the energy sectors, companies use computers to calculate items and figure out
the place of natural resources. Computers also help in finding the correct geographical
location of company’s delivery places, vehicles information and communicating with
customers.
Transportation: Companies are using computers in the vehicles to provide more services
to the consumers. Consumers can easily determine the fuel level, AC system, temperature
with the help of this system. Some vehicles do not require driver to reach at destination on
predetermined path in some countries.
Agriculture: Farmers can check the requirements of their crops on computers. They use
it for billing, checking market value of crop, cost of fields and stock value of agricultural
firm. Computers help in prediction of weather conditions and estimation of agricultural
production also.
Weather: High Performance Computers (HPC) are also used for executing the weather
models ( Programs), analyzing weather conditions based on the data collected from
various sources like satellite/ GTS/ Internet data and forecasting weather conditions in
advance (3 days advance, weekly advance and even monthly advance) like (i) Rainfall
prediction, (ii) Temperature prediction, (iii) Wind speed prediction, (iv) Snowfall prediction
etc.
Government: Indian government is implementing E-Governance project in each
department. This project can be implemented using Computer only and all information
will be available online for citizens. Government employee use it for delivering good and
transparent services to citizens. Data entry operations, billing, calculation, presentation
are also performed through computers in organization.
9. Which computer is a very large computer capable of handling and processing very
large amounts of data quickly?
TERMINAL EXERCISE
1. What is a computer?
2. List down the important functions of a computer.
3. Explain any two characteristics of computer.
3. Explain the generations of computers.
4. How microcomputer is different from minicomputer?
5. What are the types of computers?
5. What are the applications of computer?
6. What is the use of computers in education?
1.1
1. Hardware, software
3. Hardware
1.2
5. First
6. ENIAC
9. Mainframe
Notes
2
COMPUTER COMPONENTS
As you have learnt till now that computer is an electronic device that takes input from the
user, does the processing of the data and gives the information. The Computer system
consists of both hardware and software which works in coordination to give us the correct
data. It works on the principle of GIGO, i.e. Garbage in Garbage out. It means give wrong
input to the computer then the output will be not appropriate as it cannot think and act like
human beings. Have you ever seen computer components? Computer has lot of components
inside and each component does a specified job. In this lesson you will learn about
computer components in detail.
OBJECTIVES
After reading this lesson, you will be able to:
z explain components of computer.
z list input devices of computer.
z list output devices of computer.
z explain about types of memory used in computer.
z describe software.
Notes z Processor
z Main memory
z Secondary memory
z Input devices
z Output devices
For desktop computers, the processor, main memory, secondary memory, power supply
and supporting hardware are housed in a metal case. Many of the components are connected
to main circuit board of the computer, called the motherboard. The power supply supplies
power to most of the components. Various input devices and output devices are attached
through connectors at the rear of case. Figure 2.1 depicts some of the hardware components
of a computer.
Cards: These mainly include video cards, sound cards, graphics cards etc. all of which
are installed on the motherboard in their respective slots. These are mainly required for
running multimedia applications involving video, audio and graphical images. LAN
(Local Area Network) cards and network cards are necessary for computer networking,
i.e. connecting your computer to a local network or to the Internet.
Fans: Most computer cabinets make use of at least two fans - a processor fan and a
cabinet fan. Their main purpose is to lower the internal temperature and keep the
processing components as cool as possible.
USB Ports: USB (Universal Serial Bus) ports in simple terms are the ports which you use
for connecting your MP3 players, digital cameras, flash drives, etc. to your computer.
Today, most computers come with a minimum of 4 USB ports although certain high end
machines can have up to 8 or even 10 USB ports.
CD/DVD Drives: If you wish to run any type of CD or DVD on your computer, installing
a CD drive or a DVD drive is a must. There are different types of CD/DVD drives
available, each offering the user a variety of features and options.
Cables: Internal cables which are used to connect the hard drive, CD/DVD drive, etc. are
of two types - a data cable and a power cable. Each one has a different physical structure
and a different function.
A computer can process data, pictures, sound and graphics. It can solve highly complicated
problems quickly and accurately.
Input Unit
Computers need to receive data and instructions in order to solve any problem. Therefore
Notes
it needs data and instructions. The input unit consists of one or more input devices.
Keyboard is one of the most commonly used input device. Other commonly used input
devices are mouse, joystick, light pen etc. You will be learning about input devices in
section 2.3
Storage Unit
The storage unit of the computer holds data and instructions that are entered through the
input unit. It preserves the intermediate and final results before these are sent to the output
devices. It also saves the data for later use. The various storage devices of a computer
system are divided into two categories. Can you guess those two categories? Primary
storage and Secondary storage. Primary storage device stores the data temporarily
where as secondary storage device stores the data permanently.
Output Unit
The output unit of a computer provides the information and results of a computation to
outside world. Printers, monitor or Visual Display Unit (VDU) are the commonly used
output devices. Other output devices are plotters, speakers etc.
Control unit and ALU of the computer are together known as Central Processing Unit
(CPU).
Keyboard
You must have used computer keyboard. It is one of the commonly used input device. It
is text based input device that allows the user to input alphabets, numbers and other
characters. It consists of a set of keys mounted on board.
Mouse
Fig. 2.4. depicts a mouse. Mouse is an electro-mechanical device used to point a
particular place on the screen and select in order to perform one or more actions. It can
be used to select menu commands, start programs etc. It is also called as pointing device.
The most conventional kind of mouse has two buttons on top: the left one being used most
frequently.
Notes
Mouse Actions:
z Left Click: Used to select item
z Drag and Drop: It allows you to select and move an item from one location to
another.
Joystick
A joystick is a vertical stick which moves the graphic cursor in the direction the stick is
moved. It typically has button on the top that is used to select option pointed by cursor.
Joystick is used as an input device primarily used with video games, training simulator
and controlling robots.
Scanner: It is used to scan hard copy and sends this as an information to the computer.
Bar Code Reader: Now-a-days you see a bar code on material at every shop which is
read by a bar code reader and appropriate information is sent to computer.
Touch Screen: It allows user to make selection by simply touching the screen.
Light Pen : Light pen is an input device that utilizes a light sensitive detector to select
Notes
objects on a display screen. Light pen is similar to a mouse except that with a light pen you
can move the pointer and select objects on the display screen by directly pointing to the
objects with pen.
Printer
Printers are used to produce paper output (hardcopy). Based on technology used, it can
be classified as Impact or Non-impact printers.
Impact Printers use the typewriting printing mechanism where hammer strikes the paper
through a ribbon in order to produce output. Dot-matrix and Character printers fall under
this category.
Non-Impact printers do not touch the paper while printing. It uses chemical, heat or
electric signals to print the symbols on paper. Inkjet, Deskjet , Laser printers falls under
this category.
Plotters : Plotter is a special kind of output device that is like a printer, produce images
on paper, but does so in a different way. Plotters are designed to produce large drawings
Notes or images, such as construction plans for buildings.
The Audio output is the ability of the computer to output sound. Two components are
needed:
Computer memory is the part of computer that serves as a repository of information that
must be managed and maintained well. It is also known as computer storage.
Computer stores its information in three levels:
z Physical register in the CPU, located at the top level. The information in the registers
can be accessed in one CPU clock cycle.
z Primary Memory (executable memory), located at the middle level. For example
RAM.
z Secondary Memory, located at a lower level. For example disk and tape.
It is temporary memory that is used at the time of execution of program. Random Access
Memory (RAM) is most common type of memory in computers.
RAM
Figure 2.7 depicts Random Access Memory. It is volatile memory. In this memory,
information is stored till the power supply is given. Data in a computer's primary storage
is stored for vey fast retrieval. It is called Random Access Memory because any data in
RAM can be accessed just as fast as any other data.
CD-R
A CD-R, a type of recordable CD, is an optical secondary storage device. It is also known
as a WORM -- write once read many -- medium.
Software
Operating System: Operating System (OS) is system software that manages computer
hardware as well as software resources and provides common services for computer
programs. The operating system is a component of the system software in a
computer system. Application programs usually require an operating system to function.
Utilities - Utilities are small programs designed for the smooth functioning of the
computer systems eg. disk cleanup, disk defragmenter, file searching etc.
General Purpose Application software - These softwares are used in schools and at
home for general uses like typing a letter, making a small project or presentation eg. - word
processor, spreadsheets, databases, desktop publishing packages, graphics packages etc.
TERMINAL EXERCISE
1. Explain any four input devices.
Notes 5. Explain in short the different types of System software and Application software.
7. Differentiate between
2.1
1. Random Access Memory
2. CPU (Central Processing Unit)
3. Processor, Memory, Input or Output devices
2.2
4. Input Devices
5. Mouse
6. Output, Input
7. System, Application
8. General
9. Utility
10. Operating system
Notes
3
DATA REPRESENTATION IN THE
COMPUTER
Computer is not a human being. But how does it understand your instuctions? Did you
think about it any time? Computer understands only 1’s and 0’s. Whatever instruction or
input you are giving to computer it converts each instuction / input as 1’s and 0’s. With
the help of these two digits computer can represent video, picture and numbers also.
In this lesson, you will learn methods of data representation in a computer. You will also
learn different types of number systems in data representation.
OBJECTIVES
After reading this lesson you will be able to:
Data representation refers to the method used to represent information stored in a computer.
Computer stores different types of information like number, text, graphics, video, sound,
charts, images etc.
All types of information stored in a computer are stored internally in the form of 0’s and
1’s. It is very interesting that only with 1 and 0 everything is represented. Computers use
numeric codes to represent all the information.
Binary Numbers
Do you know the origin of the word “Bi”? It is a latin word. Do you know the meaning
of the latin word “Bi”? Bi means two. Binary numbers are 0’s and 1’s. Any positive
integer (whole number) can be easily represented by a sequence of 0's and 1's. Numbers
in this form are said to be in base 2 and these are called binary numbers.
Text
Text can be represented easily by assigning a unique numeric value for each symbol used
in the text. For example, the widely used American Standard Code for Information
Interchange (ASCII explained in section 3.3) defines 128 different symbols (all the
characters found on a standard keyboard, plus a few extra), and assigns each symbol to
a unique numeric code between 0 and 127. In ASCII, “A” is 65, “B” is 66, “a” is 97, “b”
is 98, and so forth. When you save a file as “plain text”, it is stored using ASCII. ASCII
format uses 1 byte per character. 1 byte gives only 256 (128 standard and 128 non-
standard) possible characters The code value for any character can be converted to base
2. Any written message made up of ASCII characters can be converted to a string of 0’s
and 1’s.
Graphics
Graphics that are displayed on a computer screen consist of pixels: the tiny “dots” of color
that collectively “paint” a graphic image on a computer screen. The pixels are organized
into many rows on the screen. In one common configuration, each row is 640 pixels long,
and there are 480 such rows. Another configuration is 800 pixels per row with 600 rows,
which is referred to as a “resolution of 800×600”. Each pixel has two properties: its
location on the screen and its colour.
A graphic image can be represented by a list of pixels. Imagine all the rows of pixels on
the screen laid out end to end in one long row. This gives the pixel list, and a pixel's
location in the list corresponds to its position on the screen. A pixel's color is represented
by a binary code, and consists of certain number of bits. In a monochrome (black and
white) image, only 1 bit is needed per pixel: 0 for black, 1 for white, for example. A 16
color image requires 4 bits per pixel. Modern display hardware allows for 24 bits per
pixel, which provides an array of 16.7 million possible colors for each pixel.
Notes
Digital computers internally use binary (base 2) number system to represent data and
perform arithmetic calculations. The binary number system is very efficient for computers,
but not for humans. Representing even relatively small numbers with binary system
requires working with long strings of ones and zeroes.
When you write decimal (base 10) numbers, you use a positional notation system. Each
digit is multiplied by an appropriate power of 10 depending on its position in the number:
For example:
For whole numbers, the rightmost digit position is the one’s position (100 = 1). The
numeral in that position indicates how many ones are present in the number. The next
Notes position to the left is ten’s, then hundred's, thousand’s, and so on.
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
10 1010
In a positional notation system, the number base is called the radix. Thus, the base ten
system that you normally use has a base of 10. When writing numbers in a base other than
ten, or where the base is not clear from the context, it is normal to specify the base using
a subscript. Thus, in a case where the base is not understood, decimal numbers would be
written like this:
In binary, counting follows similar procedure, except that only two symbols 0 and 1 are
used. Thus, after a digit reaches 1 in binary, an increment resets it to 0 but also causes an
increment of the next digit to the left (i.e., 10).
Since binary is a base-2 system, each digit represents an increasing power of 2, with the
rightmost digit representing 20, the next representing 21, then 22, and so on. To determine
the decimal representation of a binary number simply take the sum of products of binary
digits and the powers of 2 which they represent. For example, the binary 100101 is
converted to decimal form as follows:
1001012 = [ ( 1 ) × 25 ] + [ ( 0 ) × 24 ] + [ ( 0 ) × 23 ] + [ ( 1 )
× 2 2 ] + [ ( 0 ) × 21 ] + [ ( 1 ) × 2 0 ] Notes
1001012 = [ 1 × 32 ] + [ 0 × 16 ] + [ 0 × 8 ] + [ 1 × 4 ] + [ 0 × 2 ] + [ 1 × 1 ]
1001012 = 3710
To determine the decimal representation of a octal number simply take the sum of
products of octal digits and the powers of 8 which they represent.
= 549610
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
= 10646210
All four number systems are equally capable of representing any number.
(19)10 = (23)8
Notes
Decimal to Hexadecimal Conversion
4. With the bits, record them in order from bottom to top as that will be the number in
base 16.
Even though many people used to think of computers as "number crunchers", people
figured out long ago that it is important to handle character data. Character data is not
just alphabetic characters, but also numeric characters, punctuation, spaces, etc. Most
keys on the central part of the keyboard (except shift, caps lock) are characters.
21 15 NAK 45 2D -
22 16 SYN 46 2E .
23 17 ETB 47 2F /
24 18 CAN 48 30 0
49 31 1 79 4F O Notes
50 32 2 80 50 P
51 33 3 81 51 Q
52 34 4 82 52 R
53 35 5 83 53 S
54 36 6
84 54 T
55 37 7
85 55 U
56 38 8
86 56 V
57 39 9
87 57 W
58 3A :
88 58 X
59 3B ;
89 59 Y
60 3C <
61 3D = 90 5A Z
62 3E > 91 5B [
63 3F ? 92 5C \
64 40 @ 93 5D ]
65 41 A 94 5E ^
66 42 B 95 5F _
67 43 C 96 60 `
68 44 D
97 61 a
69 45 E
98 62 b
70 46 F
99 63 c
71 47 G
100 64 d
72 48 H
101 65 e
73 49 I
102 66 f
74 4A J
103 67 g
75 4B K
76 4C L 104 68 h
77 4D M 105 69 i
78 4E N 106 6A j
108 6C l 119 77 v
109 6D m 120 78 w
110 6E n 121 79 x
111 6F o 122 7A y
112 70 123 7B z
113 71 p 124 7C {
114 72 q 125 7D |
115 73 r 126 7E {
116 74 s 127 7F ~
117 75 t
3.3.2 EBCDIC
EBCDIC (Extended Binary Coded Decimal Interchange Code) is a character encoding
set used by IBM mainframes. EBCDIC uses the full 8 bits available to it. So, parity
checking cannot be used on an 8 bit system. Also, EBCDIC has a wider range of control
characters than ASCII.
The character encoding is based on Binary Coded Decimal (BCD). The contiguous
characters in the alphanumeric range are formed up in blocks of up to 10, from 0000
binary to 1001 binary. Non alphanumeric characters are almost all outside the BCD
range. There are four main blocks in the EBCDIC code page: 0000 0000 to 0011 1111
is reserved for control characters; 0100 0000 to 0111 1111 are for punctuation; 1000
0000 to 1011 1111 for lowercase characters and 1100 0000 to 1111 1111 for uppercase
characters and numbers.
TERMINAL EXERCISE
1. Convert the following decimal number into binary number.
a) 333 b) 24 c) 643
2. Convert the following decimal number into octal number.
a) 422 b) 78 c) 36
3. Convert the following decimal number into hexadecimal number.
a) 92 b) 54 c) 39
3.1
1. Binary ( 0 or 1) 2. Two 3. 7
4. 10 5. A
3.2
6. 4 7. 0 to 7
8. ASCII
9. American Standard Code for Information Interchange
10. Extended Binary Coded Decimal Interchange Code.
Notes
4
ANATOMY OF A COMPUTER SYSTEM
Structure, parts and connectivity among various internal parts of a computer system, will
be discussed in this lesson. As the input, output and storage devices have already been
discussed in the previous lessons, the main focus in this lesson will be on the working and
functioning of the internal components, modules and sub-assemblies of the system box.
The system box has a number of components
inside it like CPU, motherboard, RAM,
expansion cards etc. All these components,
along with the external devices, perform a
task together.
OBJECTIVES
After reading this lesson, you will be able to:
z identify the components in the system unit, CPU and motherboard.
z distinguish among the data bus, address bus and the control bus.
z operate the commonly used various plug and play devices.
A 64-bit processor generally has data and addressing registers that are 64 bits wide that
allows storing 264 different values. Hence, a processor with 64-bit memory addresses can
directly access 264 bytes of byte addressable memory. However, a CPU might have
external data buses or address buses with different sizes from the registers, even larger
(the 32-bit Pentium had a 64-bit data bus, for instance).
Notes
A generalization would be to suggest that 64-bit architecture would double the amount of
data a CPU can process per clock cycle, compared to 32 bit. Users would note a
performance increase because a 64-bit CPU can handle more memory and larger files.
One of the most attractive features of 64-bit processors is that it can address up to 1
Terabyte (1024GB) of memory.
The processor of the computer system is comprised of Arithmetic Logic Unit(ALU) and
Control Unit (CU). The processor is responsible for synchronization of instructions and
logical and arithmetic operations on the data. In a microcomputer, both ALU and CU are
integrated on a single microprocessor chip. The sytem unit also includes circuit boards,
memory chips, ports and other components. A microcomputer’s system cabinet may also
house disk drives, hard disks, etc., but these are not considered to be part of the CPU.
(1) Declare X, Y, Z • Control bus is used to carry signals that decides what
work has to be done like reading, storing, calculation,
(2) Read X and Y camparison etc.
(3) Z=X+Y • Data bus is used to carry data
(4) Display Z • Address bus is used to carry memory address of the
data is carried by the data bus
1. The control unit recognizes that the program has been loaded into the primary
memory and it begins to execute the first line in the program. This is accomplished
with the help of control signals initiated by the control unit via the control bus.
The control unit reads line (1) and directs the primary memory using the control
bus to assign memory addresses to variables X, Y and Z (which is communicated
via address bus). In simple words, X, Y and Z are three memory variables that
are created in RAM for storage purpose.
2. The control unit reads the line (2) and directs the input device, using the control
bus, to enter data for X and Y. It also sends the memory addresses of X and Y via
the address bus. The values entered travel via the data bus to the control unit. And
then again using all the three busses the data gets stored in their respective
corresponding addresses in the primary memory.
3. The control unit reads the line (3) using Databus, Control bus, and Address bus
and retrieves the values of variable X and Y from primary memory and sends to
the ALU for the addition of X and Y. The sum is again moved with the help of bus Notes
to primary memory and gets stored in Z variable.
4. The control unit reads the line (4). Data bus Control bus and Address bus retrieves
the value of Z variable from primary memory and send it to the output unit to
display the sum.
Following are some of the additional components that support the working of the CPU:
Bus
Bus is a transmission path in which signals/data travers within a Computer i.e.,address,
data,and control bus together constitute the System Bus. In the previous section, you have
learnt about the usage of address bus, data bus and control bus. The CPU performs
primarily the following four operations:
Address bus: The address bus is a group of wires or lines which is generally identified as
A0, A1, A2, and so on. It is unidirectional. Bits flow in only one direction, from the CPU
to the peripheral devices. In a computer system, each peripheral or memory location is
identified by a binary number, called an address, and the address bus carries an address
of a memory location or a peripheral device. The size of the address bus determines the
maximum RAM capacity which the processor can address.
Data bus: The data bus is a group of wires used for data flow. These lines are bidirectional
i.e., data flow in both directions between CPU and the peripheral devices.
Suppose CPU has 32-bit data bus which implies that it can manipulate 32 bit data. And
sometimes we may call it a 32-bit processor. That means 232 different characters can be
represented. The data bus influences the microprocessor architecture considerably. It
determines the word length and register size of a processor.
Control Bus: The control bus is comprised of various signal lines that carry synchronization
signals. These are not group of lines like address or a data bus, but individual lines that
provide a pulse to indicate an operation in the CPU. The signals are device specific and
are used to activate that device for the specific operation.
4.1.2 Registers
Notes The ALU and Control Unit (CU)communicate with each other and perform operations in
memory locations using a register. Registers are used to quickly accept, store, and transfer
data and instructions that are being used immediately by the CPU. Do you know the
types of Registers?
Types of Registers
1. Memory Address Register (MAR): This register holds the memory addresses of data
and instructions. It is used to access data and instructions from memory during the
execution phase of an instruction. Suppose CPU wants to store some data in the memory
or to read the data from the memory. It places the address of the required memory location
in the MAR.
3. Accumulator Register: This Register is used for storing the results that are produced
by ALU.
The MDR is a two-way register. When data is fetched from memory and placed into the
MDR, it is written to in one direction. When there is a write instruction, the data to be
written is placed into the MDR from another CPU register, which then puts the data into
memory.
5. Index Register: A register which holds a number that can be added to (or, in some
cases, subtracted from) the address portion of a computer instruction to form an effective
address. Also known as a base register used for modifying operand addresses during the
run of a program.
Cache Memory
The speed of CPU is extremely high compared to the access time of main memory.
Therefore, the performance of CPU decreases due to the slow speed of main memory. To
minimise the mismatch in operating speed, a small memory chip is attached between CPU
and main memory whose access time is very close to the processing speed of CPU. It is
called Cache memory. Cache memories are accessed much faster than conventional
RAM. It is used to store programs or data currently being executed or temporary data Notes
frequently used by the CPU. It is also very expensive to have larger size of cache memory.
Main memory access by the CPU may take as long as 180 ns. However, it may take 45
ns to access external cache memory or, even less for internal (Level 1) or on-board (Level
2) cache. While the CPU is processing information retrieved from cache, the cache
controller is refreshing cache with data and instructions from main memory or a storage
device. Fig. 4.3 depicts cache memory chips.
4. Which register is used for storing the results that are produced by ALU?
4.1.3 Memory
Memory is a storage area in Computer which holds data and instructions. The measuring
unit of memory is byte where
1 Byte = 8 bits
1024 Byte = 1 Kilo Byte (KB)
1024 KB = 1 Mega Byte (MB)
1024 MB = 1 Giga Byte (GB)
1024 GB = 1 Tera Byte (TB) and so on.
Have you heard the types of memory? There are two types of computer memories:
Primary and Secondary. Primary memory is accessible directly by the processor. ROM
and RAM are the parts of a primary memory. ROM stores some basic programs, pre-
programmed by the manufacturer, while RAM is the area where data gets stored
temporarily.
The storage capacity of the main memory is also very limited. Often it is necessary to store
hundreds of millions of bytes of data for the CPU to process. Therefore, additional
memory is required in all the computer systems. This memory is called auxiliary memory
or secondary storage or secondary memory. In this type of memory the cost per bit of
storage is low. However, the operating speed is slower than that of the primary memory.
Huge volume of data are stored here on permanent basis and transferred to the primary
storage as and when required. Most widely used secondary storage devices are magnetic
tapes, magnetic disks, flash drives, CD-ROM etc.,
ROM
The ROM is Read Only Memory that can only be read by the CPU but it cannot be
changed or modified as the name suggests. The Basic Input/Output System (BIOS) is
stored in the ROM that checks and initializes various peripherals attached to the PC when
the switch is turned ON. "BIOS" is a pre-programmed
software that controls the computer's start up processes
and other basic components such as keyboard, monitor/
display, disk drives, etc. The programs that are
preloaded in the ROM are also known as firmware. A
conventional ROM looks like as shown in Fig. 4.4.
The memories, which do not lose their content on
failure of power supply, are known as non-volatile
memories. ROM is a non-volatile memory. This area
is only readable by the user and cannot be used for
storing data. Fig . 4.4 ROM
1. PERMANENT ROM
a) Masked ROM: In this ROM, a bit pattern is permanently recorded by the masking
and metallization process. It is an expensive and specialized process.
RAM
RAM stands for Random Access Memory. It randomly selects and uses any location of
the memory directly to store and retrieve data. It takes same time to retrieve any address
of the memory as it takes for the first address. It is also called read/write memory. The
storage of data and instructions inside the primary storage is temporary, i.e. data or
instruction stored in RAM disappears from RAM as soon as the power to the computer
is switched off. So now we can say that RAM is a volatile memory. You can store and
retrieve data much faster with primary memory compared to secondary memory.
Secondary memory such as floppy disk, magnetic disk, etc., are external and located
outside the motherboard whereas RAM is located on the motherboard.
The term "DDR" stands for Double Data Rate. DDRSDRAM was capable of two data
transfers per clock cycle, giving it twice the theoretical peak bandwidth of previous
Notes SDRAM (Synchronous Dynamic Random Access Memory or Synchronous DRAM is a
type of memory that synchronizes itself with the computer’s system clock). DDR2 RAM
provides 4 data transfers per cycle, while DDR3 increases the number to 8. Assuming a
base clock speed of 100Mhz, DDR RAM will provide 1600 MB/s of Bandwidth, DDR2
provides 3200 MB/s, and DDR3 provides 6400 MB/s. Examples of DDR2 and DDR3
RAM are shown below in the Fig. 4.5.
These are also known as Magnetic Disk. It is an external storage unit that is located inside
the system box. It looks like as given in Fig. 4.6. You might have seen the gramophone
record, which is circular like a disk. Magnetic disks
used in computer are made on the same principle. It
rotates with very high speed inside the disk drive.
Data are stored on both the surface of the disk. Each
disk consists of a number of invisible concentric
circles called tracks. Information is recorded on tracks
of a disk surface in the form of tiny magnetic spots.
The presence of a magnetic spot represents one bit (1)
and its absence represents zero bit (0). The information
stored in a disk can be read many times without Fig. 4.6 Hard disk
affecting the stored data.
4.1.4 Motherboard
Motherboard also known as main board, it provides the connectivity and holds the various
internal components in the system box. Computer major components that work to process
data, are located on the motherboard as shown in fig. 4.7.
Notes
Form Factors
In order to bring about uniformity in the design of motherboard so that further designing
and assembly of a computer system may be eased, designs of motherboards of computer
systems have been standardized. These standardizations are called Form Factor. A
motherboard form factor defines the type and location of components, the power supply
capacity and the processor type, that will fit onto the motherboard. There are several
motherboard form factors, each with different layouts, components, and specifications.
Any specific motherboard will be suitable only for certain processors and types of
memories, based on type of processor and memory sockets installed on the motherboard.
The form factor is also a deciding factor for the use of video, sound cards, hard drive
controllers (PATA and SATA) and support for various port types (parallel, serial, USB,
etc). Therefore, if you want to assemble a computer, it must be ensured that the
motherboard, the power supply, processor, memory and the box are compatible with each
other. Form factors like ATX and BTX are commonly used in the motherboard industries.
z ATX: It is a short form of Advanced Technologies Extended form factor. With the
need for a more integrated form factor which defined standard locations for the
keyboard, mouse, I/O, and video connectors, in the mid 1990's, the ATX form factor
was introduced. The ATX form factor brought about specific changes to the
motherboard, along with the case and power supply. Some of the design specification
improvements of the ATX form factor included a single 20-pin connector for the
power supply, a power supply to blow air into the case instead of out for better air
flow, less overlap between the motherboard and drive bays, and integrated I/O Port
connectors soldered directly onto the motherboard. The ATX form factor was overall
a better design for upgrading a system.
z BTX: Balanced Technology Extended form factor, unlike its predecessors is not
an evolution of a previous form factor but a total break away from the popular and
Notes dominating ATX form factor. BTX was developed to take advantage of technologies
such as Serial ATA, USB 2.0, and PCI Express. Changes to the layout with the BTX
form factor include better component placement for back panel I/O controllers and it
is smaller than micro ATX systems. The BTX form factor enables the industry to
develop smaller size systems with an increased number of system slots. Today the
industry accepts the ATX form factor as the standard.
Memory Slots
The motherboard has slots or sockets for system memory as shown in fig 4.8. Depending
on the motherboard form factor, special sockets accept the memory card. These memory
cards come in various types of DRAM or SDRAM
memory sticks, also called modules. These sticks are
Single Inline Memory Module (SIMM), Dual Inline
Memory Module and RAMBUS Inline Memory
Module (RIMM). SIMM is the oldest technology,
while DIMM and RIMM are the current standards.
Both of these physical memory slot types move data 64
bits or 128 bits at a time. For example, a motherboard
having 6 memory slots, 4 DIMM slots for DDR2 and Fig. 4.8 Memory Slot
2 DIMM slots for DDR3. The slots look similar, but DIMM for DDR2 have 184 pins
while DIMM for DDR3 have 240 pins.
Processor Slots
Every motherboard contains at least one CPU socket, and
its location depends on the form factor. A common CPU
socket type is a zero insertion force (ZIF) socket, which is
square in shape, has a placement lever that holds the CPU
securely when closed, and makes it easy to put CPU in the
socket when open. Various types of CPU sockets like PGA
(Pin Grid Array), SPGA (Staggered Pin Grid Array) and
LGA (Land Grid Array) are used on the motherboard for
the CPU placement. These socket types uses different
technologies for connection between the processor and the Fig. 4.9 Processor Slot
motherboard. Fig. 4.9 shows a typical slot for a processor.
5. 1024 KB = 1 _____________.
(i) MB (ii) GB
(iii) TB (iv) ZB
6. ROM is ________________ .
(i) Volatile memory (ii) Non-volatile memory
Notes
(iii) Secondary memory (iv) Temporary memory
7. The hard disk is a part of motherboard.
(i) True (ii) False
(iii) cannot say
8. ZIF is ______________________ .
(i) Zero Insertion Point (ii) Zero Insertion Force
(iii) Zero Insertion Fact (iv) None of these
The function of the CMOS battery is to maintain important information for the BIOS to
begin the start-up sequence in computers. Remember, BIOS is pre-programmed software
loaded in ROM. It stores the date and time and the system configuration details.
4.1.6 Drives
There are different types of drives:-
Hard Disk Drive (HDD): Have you seen Hard Disk Drive? A hard disk drive usually
looks like a small size book but actually is a much heavier device as shown in Fig. 4.11.
The rear end of the hard drive contains a port for a cable that connects it to the
motherboard. It also has a connection for power supply.
Popular optical drive formats include CD-ROM, CD-R, CD-RW, DVD, DVD-RAM,
DVD-R, DVD+R, DVD-RW, DVD+RW, DVD-R DL, DVD+R DL, BD-R, and BD-
RE. The front of the optical drive has a small open/close button that ejects and retracts
the drive bay door.
The sides of the optical drive have pre-drilled, threaded holes for easy mounting in the
5.25 inch drive bay in the system box. The optical drive is mounted so that the end with
the connections faces inwards of the computer and the end with the drive bay faces
outwards. The rear end of the optical drive contains a port for a cable that connects it to
the motherboard. It also has a connection for power
supply.
tape drive provides sequential access storage, unlike a disk drive, which provides random
access storage. A disk drive can move to any position on the disk in a few milliseconds,
but a tape drive must physically wind tape between reels to read any one particular piece Notes
of data. As a result, tape drives have very slow average seek times.
4.1.7 Chipset
The chipset is made up of one or more electronic components that connect(s) and
control(s) the motherboard components, such as processor, expansion bus, and internal
memory. All components communicate with the processor through the chipset, which is
also called the hub of data transfer. Chipsets are a series of chips soldered onto the
motherboard and are not upgradable without a replacement. Every processor has different
chipset. The speed of the motherboard is determined by the speed of the chipset.
4.1.8 Ports
All the input and output devices like keyboard, printer and the mouse are connected to the
system through ports. These ports are the interfaces for external devices on the motherboard.
The CPU communicates with the outside devices, using these ports. Different ports of a
computer are shown in fig. 4.14. Modern computers don't require many of these ports
these days as most external connections go through the generic USB ports. However,
some of these ports may be found to be existing on the motherboard. Usage and
functioning of each of these ports are explained below:
(a) USB port: Universal Serial Bus (USB) is a popular port for high speed wired
communication between electronic systems peripherals and devices with or without
Notes a computer. It eliminates the mix of different ports for different devices like printers,
keyboards, mouse, and other peripherals. That means USB-bus allows many
peripherals to be connected using a single standardized interface socket. USB also
allows hot swapping means that the devices can be plugged and unplugged without
rebooting the computer or turning off the device. That means, when plugged in,
everything configures automatically.
(b) PS/2 Port: ATX boards have 2 PS/2 ports, one for the mouse and the other for the
keyboard. These are of same size and shape but with a different colour. This is
because the mouse and keyboard connectors are not interchangeable. Plugging the
keyboard in to the mouse connector and vice versa will make both of them useless.
The usual way for these to be plugged in is to plug the mouse into the green port
and the keyboard into the purple port.
(c) Serial Port: The serial port is a type of connection that is used for peripherals
such as mouse, gaming controllers, modems, and older printers. It is sometimes
called a COM port or an RS-232 port which is its technical name. There are two
types of serial ports -- DB9 and DB25. DB9 is a 9-pin connection, and DB25 is a
25-pin connection. A serial port can only transmit one bit of data at a time, whereas
a parallel port can transmit many bits at once. The serial port is typically the
slowest port you will find on a PC. Today's computers have replaced serial ports
with much faster and more compatible USB ports.
(d) Parallel Port: The parallel port is mainly used for scanners and printers, and is
associated with LPT1. It uses a 25-pin connector (DB-25) and is rather large
compared to most new interfaces. Parallel ports send data in parallel i.e. more than
one bit at a time. If the channel is 8 bits wide then a parallel port would send 8 bits
at a time. These ports are much faster than serial ports. Parallel ports also are fast
becoming extinct as the USB ports are taking over their place.
(e) Audio Port: The Sound card that is built into the expansion board has three
connectors. These are Speaker out, Line in and Mic in.
(ii) Line in is for external sources of audio that you want to hear through your
computer.
(f) VGA Port: It has the accommodation for the pins that are available with the
monitor cable. If you have a VGA graphics card then this port will be on the back
of your graphics card.
4.1.9 Cables
You must have seen various cables are used for connecting components in the system box.
Each cable has specific configuration and interfaces. Major cables used in the system box,
are as follows:
interface? For instance, SATA drives have their own independent bus, so there is no
competition for bandwidth as there is with PATA drives. It also uses smaller, thinner
Notes cables, which allows for better airflow inside the computer. SATA cables can be as long
as one meter, while PATA cables have a maximum length of 40cm. This gives manufacturers
more liberty when designing the internal layout of their computers. Serial ATA uses only
7 conductors, while Parallel ATA uses 40. This means there is less likelihood of
electromagnetic interference with SATA devices.
4.1.10 SMPS
SMPS stands for Switch Mode Power Supply. SMPS is one of the most important
components in the system box. As every electronic component is driven by power, SMPS
device receives the main power supply and then converts it into the required voltages that
the system requires. Successful operation of such device depends on the functioning of the
power supply.
It is a device that takes input from the normal power supply of 240V AC current and
converts into 5 V DC and 12 V DC current or as required by the computer. In simple words
it steps down the voltage as a computer requires a lesser voltage power. It is also known
as a power supply unit (PSU) located inside the system box. It supplies power to the
motherboard and also to the other installed devices.
4.1.13 Connectors
Motherboard Power Connectors: Just like other components, motherboard requires
power to operate. The ATX main power connector will have 20 or 24 pins. The power
supply may also have a 4-pin or 6-pin ATX power connector that connects to the
motherboard. A 20-pin connector will work in a motherboard with a 24-pin socket.
SATA Power Connectors: SATA power connectors use a 15-pin connector. Serial
advanced technology attachment (SATA) power connectors are used to connect to hard
disk drives, optical drives, or any devices that have a SATA power socket.
Molex Power Connectors: Hard disk drives and optical drives that do not have SATA
power sockets use a Molex power connector.
Berg Power Connectors: The 4-pin Berg power connector supplies power to a floppy
drive Cards.
4.1.14 Cards
Display Adaptor Card: Images that are formed on the monitor use a technology that is
provided by a display adaptor card. The key elements of a display adaptor card are the
video controller and the memory. The memory is used to store the information of the image
before it gets displayed on the screen. The controller does the change that takes place on
the image before it gets displayed on the screen.
Two types of display adaptors are available in the market. One type is for display in text
mode and the other is for graphics mode. In text mode, individual characters get printed
on the screen while in graphics mode the images get formed using dots called pixels.
Resolution indicates the number of pixels on the screen. It is an important element that
differentiates among various display adaptor cards. Higher the resolution (more the
number of pixels), better the quality of pictures displayed on the screen. The different
types of display adaptor cards are:
z EGA: Enhanced Graphics Adapter, is a card that supports 16 colours at a time. It
provides a resolution of either 640 x 200 pixels or 640 x 350 pixels.
z VGA: Video Graphics Array system provides resolution of 720 x 400 pixels. In text
mode and graphics mode, the resolution is either 640 x 480 with 16 colours or 320 x
200 with 256 colours.
z SVGA: Super Video Graphics Array, is a higher version of VGA. It provides resolution
of:
Notes
(a) 640 x 480 pixels with 256 to 65536 colours
(b) 1024 x 768 pixels with 256 colours
(c) 800 x 600 pixels with 256 to 65536 colours
(d) 1280 x 1024 pixels with 16 colours
Video Card/Graphics Card: The video card handles video and graphics that are
displayed on the monitor. Users who plan to watch DVD's, or edit home videos or play
games need a graphics card. Sometimes the graphic processors are built into the
motherboard.
A video adapter card, is the interface between a computer and a display monitor. Video
adapter cards use Peripheral Component
Interconnect(PCI), Advance Graphics Port (AGP), and
Peripheral Component Interconnect Express(PCIe)
expansion slots on the motherboard for connectivity
The ability to retain data is key to flash memory applications such as digital films for
digital cameras, mobile phones, tablets and other transportable devices. Flash memory
technology is a mix of EPROM and EEPROM technologies. The term "FLASH" was
chosen because a large chunk of memory could be erased at one time. The name, therefore,
distinguishes flash devices from EEPROMs, where each byte is erased individually.
NOR and NAND are the two forms of flash memory.
NOR Flash memory: The world's leading manufacturers of flash devices (Intel, AMD)
use NOR cell configurations. NOR is mostly found in cellular phones (to store the phone's
operating system) and Personal Digital Assistant (PDAs). It is also used in computers to
store the BIOS program.
Notes
NAND Flash memory: To reduce cell area, the NAND configuration was developed.
NAND Flash memory reads and writes in high-speed, sequential mode, handling data in
small, block sizes ("pages"). NAND Flash can retrieve or write data as single pages, but
cannot retrieve individual bytes like NOR Flash. NAND Flash memory is commonly
found in solid-state hard drives, audio and video Flash media devices, television set-top
boxes, digital cameras, cell phones (for data storage) and other devices where data is
generally written or read sequentially. For example, most digital cameras use NAND-
Flash based digital film, as pictures are usually taken and stored sequentially. NAND
Flash memory is less expensive than NOR Flash memory.
z ROM is a non volatile memory where the BIOS programs are pre loaded by the
manufacturer and are used in booting of the system.
Notes
z Motherboard is a printed circuit board that provides connectivity and slots for various
internal and external components directly or indirectly.
z USB ports are interfaces of connection for external devices. These ports allow any
device to be connected without any driver to be installed separately. These implements
plug and play technology.
TERMINAL EXERCISE
1. What are the major components of a computer system?
4. Describe the various types of cables used inside the system box.
6. What is SMPS?
8. What is flash memory? Differentiate between NOR and NAND flash memories.
4.1
1. (i) ALU
2. (iii) CPU
3. (i) System
4. (iii) Accumulated register
4.2
5 (i) MB
Notes
6. (ii) Non-volatile memory
7. (ii) False
8. (ii) Zero Insertion Force
4.3
9. (ii) Memory
10. (iii) Hard Disk Drive
4.4
11. (ii) Cable
12. (ii) Network Interface Card
13. (i) non-volatile
Notes
5
TOOLS FOR ASSEMBLING COMPUTER
A computer system contains many different components. When you assemble a computer,
you have to fit / connect these components with each other. For this job, you need to use
a number of tools. Therefore it is necessary for you to be familiar with these tools to use
them appropriately.
In the previous lesson, you have learnt about anatomy of a Computer System and various
components of a Computer System. You also learnt about their function in a Computer
System. In this lesson, you will learn about the tools needed to assemble a computer using
these components.
OBJECTIVES
After reading this lesson you will be able to:
z identify various tools used in assembling a computer.
z enlist the uses of each tool.
5.1 TOOLS
From practical point of view, you will not need many tools to assemble a computer. In fact,
these days a PC can be assembled using only one screwdriver. But
the things are easier if you have some additional tools also. Having these tools will make
the job fun and will save you a lot of time. Fig. 5.1 shows some of the tools.
Notes
Couplers
Notes Now-a-days, all the components and cables are available in such a form that there is no
need to cut any cables. However, there may be some situations where you will have to cut
some cables, there you will require a wire cutter.
5.1.4 Couplers
If you need to make a cable joint inside a Computer in some situation, do it using couplers.
This ensures safety from short circuits.
5.2 PRECAUTIONS
A computer runs on electricity and expensive electronic components are used in it.
Therefore, it is very important to be careful and take precautions while assembling (or
disassembling) a computer. Here, we enlist a few such precautions:
1. Switch off and unplug the computer before starting any work on it.
2. Keep the screwdriver handle clean. A greasy handle could cause an injury or damage
from unexpected slippage.
3. Always use screwdrivers that have insulated handles designed for electrical work.
4. Prepare a place to keep any screws that you may remove. A container or piece of
paper with labels for each part (casing, motherboard, CD drive, etc) is ideal to
avoid confusion between the similar-looking screws. Notes
5. If a component does not come out easily, do not forcefully remove it. Instead,
check that you are removing it correctly and that no wires or other parts are in the
way.
7. Do not apply any extra force to fit any screw. If a screw is not fitting with normal
turn of the screwdriver, it means the screw is either misfit for that place or it has
not been properly positioned.
8. Do not use pliers on the handle of a screwdriver for extra turning power.
9. Do not use defective screwdrivers (i.e., ones with rounded or damaged edges or
tips; split or broken handle; or bent shaft).
10. Do not hold the screws or any such item in one hand while using the screwdriver
with the other. If the screwdriver slips out of the slot, it may injure your hand.
z Screwdriver set which is the most important tool in the toolkit used for computer
assembly.
3. Mohit is learning computer system assembly. He does not have any pliers in his
toolkit. What kind of difficulties may he have to face during practicals?
4. List any four precautionary measures to be taken while working with screwdrivers.
5. Why should you not apply extra force to fit the screws?
5.1
1. D
2. A
3. D
Notes
6
ASSEMBLING A PERSONAL
COMPUTER
In the previous lesson, you have learnt various tools used in computer assembly and
precautions to be taken while assembling and dis-assembling a computer. Now you are
ready for assembling a computer. Assembling and dis-assembling a computer are not
very difficult jobs. With some practice and careful handling of devices and knowledge in
computer hardware components one can easily do this.
In this lesson you will learn step-by-step procedure for assembling a personal computer
and dis-assembling a personal computer.
OBJECTIVES
After reading this lesson you will be able to:
z open the case.
z install and uninstall power supply.
z attach the required components to the motherboard.
z install and uninstall internal drives.
z attach internal cables.
1. Motherboard
2. Computer Case (body) and Power Supply (Switched Mode Power Supply)
5. Processor Fan
6. SATA Cables / ID
7. CPU / Processor
8. Power Cables
9. Case Fan
2
1
5, 6
9 7
3 10 8
In the lesson 4, you have learnt about the components of computer system in detail. Those
components are depticted in Fig 6.1.
1. Cabinet (with SMPS): Cabinet is also called as system box or system unit. It is a
rectangular box which contains most of the components of a computer system.
Now-a-days cabinet has built-in SMPS (Switch Mode Power Supply). SMPS takes
the 240V AC (Alternating Current) input and supplies the required voltages to the
components of computer system.
2. Processor: A processor is the brain of a computer. The speed of a computer depends
mainly on the processor speed. The processor speed is measured in megahertz
(mHz) or gigahertz (gHz).
3. Heat sinks and Cooling fans: When a computer starts, lot of heat is generated. To
reduce the heat inside the computer, heat sinks are mounted on the processors.
Notes
4. Motherboard: As you know already that motherboard is the main circuit board in
which all the components (like CPU, memory, mass storage interfaces, connectors
for input and output devices etc.,) of a computer system are attached. The
specifications of a motherboard depends on many factors like the chipset it has,
maximum RAM it can support, bus speed, processor to be used etc.
5. RAM: Random Access Memory (RAM) is also referred as main memory or primary
memory. RAM is used to store the data temporarily when the computer is on.
6. Hard Disk Drive (HDD): HDD is a data storage device. HDD stores all the software
and data which we want to use in the computer. Hard disks capacities varying from
a few GB to a few TB. This is also called secondary memory.
These are the components to be fixed inside the system box. Other than above some
external devices like keyboard, mouse and monitor are also required.
i. Screwdriver set
iv. Couplers
To open the computer-system case, first remove the screws on the side panel. Then slide
the side panel carefully to remove it.
Notes
z Remove any kind of packaging materials that could possibly have been delivered
inside the case.
z Remove the cover on the suitable drive bay in the front of panel to mount our DVD
drive.
Place the ground level strap on your wrist and attach the other end to the computer
system case.
Caution:
If you don't wear ground level strap, static electrical energy could damage computer
system parts.
Notes
Put the HDD in one of the suitable case / slot/ bay (refer fig 6.4) available and tighten the
screws.
Place the optical disk drive in the suitable bay (refer fig 6.5) and tighten the screw.
Mount the processor on the processor socket as shown below. By observation you will
find some cut on one side of the processor socket and a corresponding cut on the processor.
Notes Processor can be mounted on the matching sides only. Mount the processor and push a
little.
(a) (b)
Fig. 6.7 (a-b) Placing the processor
After placing it correctly, push the clip down (as shown in figure 6.7 (b) so that the
processor gets placed properly.
Put RAM sticks in the memory slots on the mother board. Before this you may have to
open the side locks of the memory slots if they are not already open. One stick can be
placed in one memory slot. Here you will find corresponding cuts on the memory stick and
the memory slot so that memory sticks can be inserted only in the correct manner. Then
close the side locks.
Now you can place the motherboard in the cabinet and tighten the screws.
Notes
It is very simple to do. Just put it after all the components have been placed but before
connecting cables and tight the screws.
Notes
If all the components are set to their place, then connect the power cables and data cables
suitably. The details of cables may vary from motherboard to motherboard. Therefore,
you have to refer to the documentation (which you must have received with the
motherboard) to find the correct connections.
Now your hardware is assembled. You should once again ensure that all the screws are
tightly fixed and cables are properly connected. Now connect the keyboard, mouse and
monitor to your computer case and connect one end of the power cord to the computer and
other end of cord with s pin plug to the power supply socket.
Similarly give power supply to the monitor. After that switch on the computer and use the
bootable CD / DVD or pendrive to install the operating system and configure your
computer for use. Notes
Step 4: Processor
To remove the processor, open the clip and the flap (recall how did you install the processor)
and carefully pull the processor out of its slot in the motherboard.
Unscrew the optical drive and pull it out from the front side of the cabinet.
Disconnect the hard disk drive from the mother board by pulling out the SATA / ID cable
from the HDD. Unscrew the drive and remove it from the cabinet.
To remove the RAM chip, push down the tabs which are holding the chip in memory
slots. If this process is done successfully, the chip will automatically come out from the
memory slot.
Step 8: Motherboard
Before removing the motherboard, make sure that all the power cables have been detached
from it and no external device is connected to it. Then you can unscrew the motherboard
and carefully remove it from the cabinet.
z Motherboard is the main circuit board in which all components like CPU, memory
input and output devices etc., of a computer system are attached.
z Hard Disk Drive stores all the software and data which we want to use in computer.
z Serial Advanced Technology Attachment (SATA) cable connects HDD and opical
drive to the motherboard.
TERMINAL EXERCISE
Notes
1. Write short note on assembling a Computer?
2. What are the components or parts you have to unplug before dis-assembling your
Computer?
6.1
1. Temporarily
Notes
7
PREPARING SYSTEM FOR
INSTALLATION
In the previous lesson, you have learnt about how to assemble a Computer System. Once
we have assembled, the computer has to be made ready for use by installing various
softwares. But one must be aware of the hardware and software requirements before
preparing for installation. When you first startup your computer, setup the Basic Input/
Output System (BIOS). Whenever you build the system or make any changes in its
components, you need to run the BIOS setup. It additionally manages flow of information
between the computer’s software package and its connected peripheral devices.
Once the system is switched on, a set of operations is performed, which is known as
booting. After booting you will proceed in the identification of Hard Disk Drive (HDD)
and the device driver. In this lesson you will learn in detail about various aspects of
installation in a computer system.
OBJECTIVES
After reading this lesson you will be able to:
z list the functions of BIOS.
z explain the types of booting.
z differentiate different types of Hard Disk Drives (HDD).
z list out the purposes of device drivers.
Systems having flash BIOS facility use a special variety of BIOS memory referred to as
associate EEPROM, which means "Electrically Erasable Programmable Read-Only
Memory”. It can be easily deleted and changed employing a special program. This
method is named as flashing the BIOS, which provides easy access at reduced cost.
The biggest disadvantage of upgrading BIOS with flash process is that BIOS is more
exposed and sometimes if power supply interrupts then it may lead to corrupted BIOS
chip. System can be corrupted if you boot with the incorrect flash BIOS chip consisting
of wrong data/instructions.
CMOS checksum is used as an error-detecting code. CMOS checksum error shows that
boot up settings which were set earlier have been changed. On every occasion the system
is booted, the system recalculates and compares it to the stored result. If they are totally
different, then the system is aware that the CMOS has been corrupted warns you with a
some message, like “CMOS confirmation Error”.
As technology has evolved, various alternative kinds of batteries are used to supply power
to the CMOS. BIOS setup is stored in CMOS in-built memory. Plug and Play BIOS carry
a non-volatile memory to carry extended system configuration information which holds
the resource configurations of system devices once
Plug and Play is employed. CR2032 lithium coin
cells are used to supply power to memory and real-
time clock.
It is therefore advisable to keep a copy of the CMOS memory data. In normal conditions
the battery can last for a long period of time keeping their BIOS setting intact. Backup is
required only if there is any modification.
CMOS backup is not same as the regular backup. Alternative ways that are used for
CMOS backup are:
z Manual Backup: It is done manually, by recording all current settings of the BIOS.
Though it is a lengthy process but it is reliable.
Notes
z CMOS Backup Utilities: In this the various utilities automatically take the backup
of the data at regular interval of time, which can be further stored to a storage device.
If something happens accidentally, some of these utilities restore the complete CMOS
settings.
7.3 BOOTING
When a computer is switched on, a set of instructions (operations) are performed by a
computer. This complete process is known as booting. This process is repeated every time
a machine is switched on after being turned off. This power-on self testing takes few
seconds to complete. This process involves initializing peripheral devices and loading the
operating system.
System starts with a little set of instructions in ROM and then subsequently the operating
system is loaded on to the RAM. As the system is switched off, software as well as data
are stored on nonvolatile storage devices.
Many systems use computer networks for booting. In this case, operating system is kept
on the server, and a portion of it is shifted to the user’s system with the help of Trivial File
Transfer Protocol. After the transfer, the operating system takes over the control of the
booting process of the user’s machine.
Types of Booting
1. Warm Booting: A warm booting is started from the operating system. To perform
warm boot in Windows operating system, you have to select, restart from the Start
menu. In warm booting, there is no need of pressing a button on the computer
itself.
2. Cold Booting: To perform a cold booting or hard booting you have to start up the
computer which is turned off. A cold booting is done by pressing the power button
to switch on the system.
In both types of booting the system clears the RAM and starts the boot sequence
from scratch. Warm booting might not clear all caches, which stores temporary
informations. If you are troubleshooting your computer, you have to perform cold
booting.
C. No restriction
5. Operating system is in the Random Access Memory when system is turned on.
Disk Utilities
Many disk utilities that are designed to setup the hard drive can find and setup a hard
drive; For instance, the fdisk utility will show extra data regarding the scale of the disk
drive and and also partition of data.
You can have the list of all precise data concerning your Hard Disk, like specifying the
manufacturer, model, type, and size of the drive.
7.4.2 Jumpers
Jumpers allow the system to close or open an electrical
circuit. It is made of small pins set that can be covered
by jumper block. A Jumper is also known as
appropriately sized conductive sleeve.
over one or more devices. The advantage of this system is that when hard disk is changed
from slave to master or vice versa, settings need not to be changed.
Notes
With the design of this new system, connecting hard drives becomes easier as master/slave
jumper settings are not required to be configured again and again. Cable Select also
known as CS, is completely different from traditional IDE cables.
With the advancement in the technology, enhancement in the concept of CS has also
happened. You are able to set each drive to CS connect.
To deploy cable select, each of the hard disks must be set to the "cable select" (CS) setting,
typically employing a jumper, with the usage of a special cable which typically has three
connectors, with the center one supposed for the motherboard. The remaining two
connectors are used alternatively to connect to the drives which can act as master or slave.
The drives can be inter-changed by altering the connector on the cable they use.
Application
Modern hardware and operating system drivers work in numerous environments. Drivers
may interface with many devices such as: printers, video adapters, Network and sound
cards, image scanners or digital cameras etc.
7. We use small tools like tweezers or very small plier to change the settings of
jumper.
8. Device driver is a set of instructions, that helps in using peripheral devices which
is connected with the system.
TERMINAL EXERCISE
1. What is a BIOS Attack?
7.1
1. C
2. A
3. False
4. True
5. False
7.2
6. False
7. True
8. True
Notes
8
OPEARTING SYSTEM INSTALLATION
Operating System acts as an interface between the Computer System and the user. It is the
platform on which all other applications are installed. Hence Operating System installation
ensures that the hardware meet the least requirements for running the system efficiently.
You are also aware that data in Computers is stored in the form of files. To manage,
organize these files on various storage media, we have file systems. File system is a
method of managing various files in the computer. This lesson will make you understand
the system requirements, file system and installation steps for Windows and Linux
(Ubuntu) Operating Systems.
OBJECTIVES
After reading this lesson you will able to:
z list file system used in Windows operating system.
z install Windows 7 operating system.
z list the types of file system used in Linux.
z install Linux (Ubuntu) Operating System.
Notes The File Allocation Table (FAT) 32 and FAT were used in earlier versions of Windows
Operating systems. It was developed by Microsoft to manage data on storage media. FAT
contains names of files, date and time stamps, names of directories and attributes of files.
The FAT system is compatible with all major operating systems. It was the default file
system for all Windows opearting system prior to Windows 2000. But FAT suffers from
few problems such as over-fragmentation, file corruption and limits to file names and size.
Microsoft required an operating sytem which gives additional steadiness and wellbeing
measures. The Windows objective was to design operating system that ought to be as
secure as Unix, supported expanded filenames, had network capability and did not waste
storage space. In 1993, Microsoft released Windows nongovernmental association 3.1
with NTFS (New Technology File System) version 1.0. NTFS provides a well-formed
File system that is largely used by Windows 2000 and XP and was developed by MS
Corporation for its Windows NT line of operating systems, beginning with Windows NT
3.1 and Windows 2000, including Windows XP, Windows Server 2003, and all their
successors to date.
z journaling - NTFS is a journaling file system (uses NTFS log to record changes).
z hard links - allows different file names to directly refer to the same file contents.
8.1.2 WINDOWS 7
Windows 7 uses the NTFS (New Technology File System) which is the most regularly
utilized system these days. This is a file of an extraordinary configuration that is found on
the MFT (Master File Table) zone of an allotment. The master file table (MFT) is a
database in which information about every file and directory on an NT File System
(NTFS) volume is stored. There is at least one record for every file and directory on the
NTFS logical volume. Each record contains attributes that tell the operating system (OS)
how to deal with the file or directory associated with the record. This zone is just
accessible to OS administration applications and concentrated devices that can address
the hard drive straightforwardly. For e.g., windows kernel, device drivers etc. The MFT
is a table that rundowns all files with their traits and security parameters. The MFT
likewise stores locations of divisions (hard drive clusters) where file substances (fragments)
are physically present.
Windows
This is the imperative folder that is placed on the computer’s hard disk partition. It keeps
Notes
all executables, drivers and libraries of the system. That is the reason it is emphatically
prescribed not to erase files from folder. This folder may have an alternate name.
Users
This folder contains client (users) profiles. Naturally it is found in the root folder of the
system partition. It contains various standard folders. These folders contain different
client subfolders including desktop, documents, pictures, favorites. Other subfolder is
utilized to store data of different applications, programs, appdata, application data,
cookies, local settings and others. You should not change their substance unless you are
truly certain what you are doing.
Boot
This folder contains working system boot files. It is covered up, and it is not prescribed
to change its content.
Program data
Applications store their information, setup files and other data in this folder. One should
not erase anything from this folder.
Recuperation
This folder contains data needed to log into the System Recovery Console. It is concealed
and you can not change its content.
Recycle.bin
This folder is Windows Recycle Bin which contains the erased files. The folder is covered
up, however you can securely erase its content and in addition the folder itself. The files
in this folder can be restored.
Windows 7 Installation
To start the installation of WINDOWS 7 on any supported PC, you must start with the
modifying your BIOS settings to make your PC boot from a CD/DVD or USB drive
before it boots from the primary hard disk.
Notes
Notes
5. Then the option for upgrading or reinstallation of the windows appears (shown
in Fig. 8.5)
Notes
6. If you are upgrading, then the compatibility report is checked and displayed as shown
in Fig. 8.6
7. Choose the drive in which Windows has to be installed and drive partition can be
selected from advanced options (shown in Fig. 8.7).
Notes
Notes
11. The boot process continues and the system will start its services as shown in
Fig. 8.11
Notes
12. Then you are redirected to the boot page and video performance is checked by the
boot process (as shown in Fig. 8.12).
13. Enter username and computer name in the screen (refer Fig. 8.13) that appears.
Notes
15. The screen appears showing that Enter the product key and Click Next (as shown in
Fig. 8.15)
Notes
16. Time zone can be changed according to the place (as shown in Fig. 8.16)
17. You can select the type of network whether home or office (as shown in Fig. 8.17).
Notes
18. Choose home network and complete the remaining configuration if you need (as
shown in Fig. 8.18).
19. Then you get a key for the home devices sharing, then Welcome screen appears (refer
Fig. 8.19).
Notes
20. The Windows 7 installation is complete, now you can view the desktop. Fig. 8.20
depicts Windows 7 desktop.
Mount Points
Windows operating system uses drives (C, D, E etc.,) to access disk space. Linux uses
mount points. In Linux mounted disk space, all folders will be under the root of the file
system. i.e., ‘/’ forms the root of the file system. Examples of mount points : /bin, /root,
/home.
Inode entry
For most clients and for most typical framework association errands, it can be recognized
that records and lists are in a tree structure, whereas machine does not understand tree-
structures.
In a record framework, which is simply the collection of records (inode numbers and hard
links pointing to the actual data) a report is identified with an inode number, a kind of
serial number containing information about the genuine data that makes up the record: to
which this archive has a spot, and it is set on the hard disk tracks. A special type of link
called hard link is used to point to the actual contents of the file stored on disk tracks. Hard Notes
links are stored beside the inode number for a particular file in the inode entry.
Each part has its own specific set of inodes; all through a framework with different
segments, records with the same inode number can exist.
Each inode depicts a data structure on the hard drive, securing the properties of a record,
including the physical zone of the report data. Exactly when a hard drive is instated to
recognize data stockpiling, generally in the midst of the starting framework foundation
methodology or when adding extra plates to a current framework, a settled number of
inodes is made. This number will be the best measure of records, of diverse sorts (tallying
registries, one of a kind records, joins etc.) that can exist. We ordinarily have 1 inode, each
2 to 8 kilobytes of limit.
At the time another record is made, it gets a free inode. In inode, the accompanying
data is:
z File size.
(i) Modify your BIOS settings to make your PC boot from a CD/DVD or USB drive
before it boots from the primary hard disk.
(ii) Create a bootable copy of the Ubuntu disk image on a CD, USB flash drive and
then insert it into the CD/DVD drive or USB port if using a USB drive.
Notes
2. You can choose the time-zone manually (shown in Fig. 8.22) or let the system detect
it based on your location.
3. You can choose your keyboard type/layout (shown in Fig. 8.23) or let the system
detect it .
Notes
4. Select the option “Erase and Use the Entire disk” (shown in Fig. 8.24) and click
Forward button. All information on the drive chosen will be deleted.
5. Enter your details in the next screen. Fill the data (name, password, machine name,
etc) and click on continue button (shown in Fig. 8.25).
Notes
6. A Progress bar showing the status of Installation is displayed (shown in Fig. 8.26)
Notes
10. The login screen appears (shown in Fig. 8.30). Enter the password.
Notes
4. ................... is used to point to the actual contents of the file stored on disk tracks.
TERMINAL EXERCISE
1. What are the Windows 7 Home and Professional Editions system requirements?
2. What are the features of NTFS?
3. Follow the step-wise procedure and install Windows 7Home Edition.
4. Describe LINUX file system.
8.1
1. FAT
8.2
3. Data segments & swap segments
4. Hard links
Notes
9
NETWORK BASICS
In the 21st century, worldwide telephonic networks, growth of computer industry and
launching of communication satellites, are integrating together. The merging of the
computer technology with the communication system has given birth to a whole array of
networking technologies. The use of a computer to serve a business need is rapidly being
replaced by a network of computers, catering to various needs of a business organisation.
In this lesson you will learn about various types of networks, their topologies,
communication media, addressing concepts, and network protocols.
Notes OBJECTIVES
After reading this lesson, you will be able to
z Communication from one system to another can be done only by using portable
storage devices.
To address these above mentioned problems, networks came into existence. It is a group
of computers connected to each other physically or logically for data communication.
z Lower cost: Another benefit is saving money. Small computers have a much better
price/performance ratio than larger ones. Mainframes are roughly ten times faster
than the fastest single chip microprocessors, but mainframes cost thousand times
more. This imbalance has caused many system designers to build systems consisting
of powerful personal computers, one per user, with data kept on one or more shared
file server machines. This benefit leads to networks with many computers located in Notes
the same building. Such a network is called a LAN (local area network).
Computer networks provide a powerful communication medium. A file that was updated/
modified on a network can be seen by the other users on the network immediately.
These networks have to follow certain rules and regulations to communicate among
themselves. The set of rules that governs the communication between the computers in a
network is called protocol. The ruling protocol standard followed by internet is TCP/IP
(Transmission Control Protocol/Internet Protocol).
Other than the public networks, one can build up a private network which can be accessed
if the user has access rights to it. There are business organisations which have their own
networks where the users are authenticated using valid User Ids and passwords.
Therefore, the benefits and applications of these networks can be enjoyed by only their
employees who have access to these privileges.
software. Such computers are called dumb terminals. They get operated directly with the
help of server. On the other hand the computers that can work independently on the
Notes network are called intelligent terminals.
Server: A server is a computer that provides data, software and hardware resources that
are to be shared on the network. A network can have more than one server. Each server has
a unique name in the network. All network users identify the server by its name. It is of
two types: (1) Non dedicated server - It acts as a server and workstation (2) Dedicated
server - It can be used as a server only.
Intranet: Intranet is a private network.
Inter space: It is client-server software that allows computers in a network to share online
audio, video and text through dynamic 3D environment. It provides a real time
communication platform on the Internet today.
Metropolition Area Network (MAN): It covers an area larger than a LAN. Generally,
when the network is spread across a city, then it is called a MAN. For example, a school
having branches in different parts of the city are connected to form a network. The
computers in each of these branches get connected to form separate LANs. These LANs
get connected to each other to form a MAN as shown in Fig. 9.3. It usually uses
microwave link for communication. It covers an area larger than LAN but smallar than
WAN. e.g. cable television network available in many cities.
Notes
Wide Area Network (WAN): It covers an area larger than a MAN. Various computer
networks located in different countries can be connected with each other to share
information through WAN. It usually uses satellite for communication. For example the
computer network of a multi national organisation with the head office at California
connects to a network of its branches in London. This forms a WAN as shown in fig 9.4
Peer to peer: Every computer on the network acts as a workstation as well as a server.
Any computer on the network can access the shared resources. These networks provide
low level security. Fig 9.5 shows an example of a peer to peer network.
Notes
Client Server: It consists of client computers and server computers as shown in fig 9.6.
A workstation is generally known as a client. A server computer provides services for the
client requests. It also handles the security and administrative responds to the tasks of the
network. These networks provide high level security. The client computers are dependent
on the server computer.
z Wired media
z Wireless media
Wired media talks of the physical connectivity that takes place using cables while wireless
media uses waves through air, water or vacuum. Now let us know about wired media.
Although UTP cable is the least expensive cable, it may be susceptible to radio and
electrical frequency interference (it should not be used too close to electric motors,
fluorescent lights, etc.).
Shielded Twisted Cables (STP) is a better option than UTP. Each pair of wires in
STP is individually shielded with foil. There is a shield around each individual pair,
as well as around the entire group of wires. They have 16-155 Mbps of speed and
can be extended up to maximum 100 meters. Cables require special connectors for
grounding but this cabling method resists electrical interference and is less susceptible
Notes to overhear.
2. Coaxial cable: It has a single copper conductor at its centre. A plastic layer provides
insulation between the centre conductor and a braided metal shield. The metal shield
helps to block any outside interference from
fluorescent lights, motors, and other
computers. An image of coaxial cable is
shown in fig. 9.8. Although coaxial cabling
is difficult to install, it is highly resistant to
signal interference.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications
for thick coaxial cable carrying ethernet signals. The 5 refers to the maximum segment
length being 500 meters. Thick coaxial cable has an extra protective plastic cover
that helps to keep moisture away from the centre conductor. This makes thick coaxial
a great choice when running longer lengths in a linear bus network. One disadvantage
of thick coaxial is that it is difficult to install.
3. Fiber optic cable: Fiber optic cabling consists of a central glass core surrounded by
several layers of protective materials as
shown in Fig. 9.9. It transmits light rather
than electronic signals eliminating the
problem of electrical interference. This makes
it ideal for certain environments that contain
a large amount of electrical interference. It
has also been made the standard for
connecting networks between buildings, due
to its immunity to the effects of moisture and
lighting. It has the ability to transmit signals
over much longer distances than coaxial and
Fig. 9.9 Fibre optics cable
twisted pair cables. It also has the capability
to carry information at vastly greater speeds.
This capacity broadens communication possibilities to include services such as video
conferencing and interactive services.
processes and routes data at the data link layer (layer 2) of the OSI model. A switch is a
telecommunication device that receives a
Notes message from any device connected to it
and then transmits the message only to
the device for which the message was
meant. Do you think switch is more Fig. 9.10 Switch
intelligent than a hub? Yes. It is more
intelligent than hub because hub simply
broadcasts the message to all computers which are connected to it. An eights port switch
is shown in Fig 9.10.
Repeater: Repeaters are used in a network to regenerate digital signals distorted by
transmission loss. It has the ability to reconstruct a signal to near its original quality. In
a network, a repeater, can relay messages between sub networks that use different protocols
or cable types. It works similar to amplifier in an analog network. When two computers
are connected in a network using cables and the distance is greater than the specification,
then to avoid data loss repeaters should be used in between.
Router: It is a device that forwards data packets between computer networks. A router is
connected to two or more data lines from different networks. When a data packet comes in
one of the lines, the router reads the
address information in the packet to
determine its ultimate destination.
Then, using information in its routing
table it directs the packet to the next Fig. 9.12 Router
network elements on its journey. It
works with IP addresses. A router's image is shown in Fig. 9.12.
z Packet switching: With message switching there is no limit on block size. In contrast,
packet switching places a tight limit on the block size. Data is divided in the form of
packets stored in the main memory. The packet size is fixed and there is no limit on
data. Communication medium is wireless. This type of system was originally designed
to provide reliable transmission through a communications network where switches
or lines may suddenly become unavailable or alternative routes may have to be chosen.
A packet consists of a "header" section which contains information such as the network
address of the destination terminal, a data section containing the information to be
transferred and a "tail" section containing checking information. A stream of data is
therefore split into a number of packets when these techniques are employed. Packets
may vary in length from a few bytes up to several thousand. Once a message has
been transmitted, the packets which comprise it may take different routes through
the communications system and arrive at the receiver at different times. In this scenario
it is up to the receiver to reassemble the packets into the correct order, to obtain the
complete message. This is done based on pre-defined identifiers/ headers and rules.
A network topology is the physical layout of computers, cables and other components of
a network. There are number of network topologies, and a computer network may be built
using multiple topologies. Various topologies of networks are given below:
z Bus topology
z Star topology
z Ring topology
z Mesh topology
z Hybrid topology
z Wireless topology
Bus topology: This topology uses one cable as the main trunk to connect all the
computers together as shown in Fig. 9.14. It is very easy to set up and requires no
additional hardware like hub. The cable is also called the trunk, a backbone, or a segment.
With bus topology, when a computer sends
out a signal, the signal travels the cable length
in both directions from the source computer.
When the signal reaches the end of the cable
length, it bounces back and returns in the
direction it came from. This is known as
signal bounce. If another signal is sent from
the opposite direction at the same time, the
two signals collide and get destroyed. In such
a situation, the signals get retransmitted. It Fig. 9.14 Bus topology
happens till the signals get transmitted to the destination system. For this reason,
terminators are placed at both the ends of the trunk.
The terminators are used to absorb the signal when it reaches the end of the trunk. This
prevents signal bounce. There are two situations when the network collapses, first when
there is no termination, due to signal bounce it happens and second when the cable breaks,
even then the network goes down. A bus is a passive topology, which means the signal
travels visiting each of the computers one by one without getting regenerated in any way
by them. These have no role in functioning of the bus.
3. Installation is difficult.
Mesh topology: It is not very common in computer networking today. In a mesh topology,
every computer has a connection to every other computer of the network.
Notes
Advantages of mesh topology
1. Provides multiple paths between computers. So even if one cable link breaks,
communication takes place using the other links.
2. Installation is difficult.
Hybrid topology: It is a mixture of the topologies discussed so far. A very popular hybrid
topology is a star-bus topology, in which a number of star topologies are connected by a
central bus. Another very popular topology is a star-ring topology. It looks like a star that
acts like a ring.
Wireless topology : A wireless topology is one in which few cables are used to connect
the computers. The network is made up of transmitters that broadcast the packets using
radio frequencies. The
network contains special
transmitters called cells or
access points which extend a
radio sphere in the shape of a
bubble around the transmitter.
It can extend to multiple rooms
and possibly floors in a
building. The computers and
network devices have a special
transmitter-receiver, which
allows them to receive
Fig. 9.17 Wireless topology
broadcasts and transmit
requested data back to the access point as shown in fig 9.17. The access point is connected
to the physical network by a cable, which allows communicating with systems on the
wired network.
in the reverse order i.e. from layer 1 to layer 7. Finally layer 7 will be responsible to get
back the message into its original form to be read at the destination computer.
Notes
A summary of the function of each layer is given in the Fig. 9.18.
Link layer (layer 1): Deals with all physical components of network connectivity
between the network and the IP protocol.
Internet layer (layer 2): The work in this layer is managed by IP. It contains all
functionality that manage the movement of data between two network devices over a
routed network.
Transport layer (layer 3): The work in this layer is managed by TCP. It manages the flow
of traffic between two hosts or devices, ensuring that data arrives at the application on the
host for which it is targeted.
Application layer (layer 4): Acts as final endpoint at either end of a communication
session between two network hosts.
TCP provides:
1. End to end reliability.
2. Data packet re-sequencing.
3. Flow control.
IP provides for:
1. Addressing.
2. Type of service specification.
3. Fragmentation and re-assembly.
4. Security.
TERMINAL EXERCISE
1. State the benefits of a computer network.
2. What is internet? Discuss the origin of internet.
3. Differentiate between peer to peer and client server network.
4. State the difference between LAN and MAN.
5. What is STP? How does it differ from UTP?
6. State any two differences between star topology and ring topology.
7. What are the seven layers of OSI network architecture?
8. Explain TCP/IP network architecture.
9.1
1. (i) real time communication platform
2. (ii) node
9.2
3. (i) regenerates a signal
Notes
10
NETWORK CONFIGURATION
In the previous lesson you have learnt the basics of network. Now you are ready for
learning Network configuration. Network configuration describes a broad range of
activities associated with establishing and maintaining a network. In this lesson you will
understand how to configure wired and wireless networks on Windows and Unix
operating systems and also on how to configure network applications like Outlook
Express. This lesson will also expalin how to connect smart devices such as smart TV and
smartphone to your PC.
OBJECTIVES
After reading this lesson you will be able to:
3) Plug Ethernet cable in to LAN port of device (modem and router) and other end of
Ethernet cable plug in to networking port (LAN Port) of computer.
4) Turn on or start your computer and verify LAN driver of your computer if it is not
installed then install LAN driver for your computer ( use LAN driver setup file for
your computer and double click on it and follow the steps and click ok).
2) Your device (modem and router) and computer/laptop should have Wi-Fi facility.
3) Install Wi-Fi driver in your laptop/computer( Use Wi-Fi driver setup file for your
laptop/computer and double click on it and follow the steps and click ok).
6) In list of network, select your device (Modem and Router) that you want to connect.
7) If security key required , enter key and connect to your device(modem and router). Notes
8) On command line type “ipconfig” if IP address is same as IP address is provided
by ISP’s range of IP address then ok.
4. If required, computers cases should be replaced and connect a network cable between
router and each computer’s adapter.
5. In the router’s WAN port, users of broadband Internet should plug their modems.
All the newly attached network equipment are noticed by Windows 7 when it wakes
up. The level of security is determined by your choice.
Different files are shared between different PCs by the permission of Homegroup.
If things are not working properly, a new driver for your network adapter might be
required. If new networks are not been recognized by any of the computers, try restarting
them all again.
After clicking on Local Area Network, follow the steps given below for manual
configuration of IP4 in Windows7 operating system.
a) Click on properties.
c) Select “use the following IP address” and enter IP address , Subnet Mask and
Default Gateway for network configuration.
d) Select “Use the following DNS server addresses” and enter preferred DNS server
and alternate server for network configuration.
Notes
5. The address of the computer is a gateway to the outside world is gateway address.
Configuration Tools
Various interactive GUI network configuration tools are available on Linux operating
system. Those are netconf, linuxconf, netconfig and ifconfig. These tools or programs
modify values in /etc directory.
Analysis Tools
z traceroute – It is used to find the network route from your machine to some other
machine on your network or the internet.
z nslookup – It is used to find more information about hosts from DNS servers.
z arp – Users read or modify their arp cache, using this program.
z dig(1) - For debugging or testing, it sends domain name query packets to name
servers.
2. Select the “Wired” tab and then click on “Auto eth0” and then click “Edit” to
check the IPV4 settings.
3. IPV4 Settings. As shown in the following image select the method as manual if
you want to manually enter the DNS settings.
Notes
DNS Server address is to be assigned. click on Add button to assign the address,
network and gateway adresses. Then provide the DNS server address as shown
below and click Apply.
2. Write "sudo ifconfig" (without quotes) command into terminal to find your new
address. The inet address broadcast addness, and mask address will be shown by
Ifconfig command.
Notes
1. From Control Panel → Networking and Internet → Network and Sharing Centre
→ Manage Wireless Networks, then click Add.
2. Choose type of profile you want to create. Select the “Create an ad-hoc network
profile” if you want to connect two computers (computer-to-computer) together.
Choose “Manually create a network profile” to connect to machine to a wireless
router or an access point. A screen will appear similar to the following figure.
3. Type the name of the access point (also called SSID) in the network name field,
and select the settings.(ex: WAP)
Notes
4. Select the Next button.
Notes
5. Choose server type and enter incoming and outgoing mail servers.
Notes
Once you have completed these steps outlook will take some time for receiving all your
emails to your Inbox. Once the process is completed your outlook is ready to send / receive
Notes any emails.
1. Pop up management
z If you do not want the pop ups to come up then you can select the blocking level as
high.
z If you want to allow pop-ups from secure sitls then keep the level as low: as shown
in Fig. 10.19.
3. Security Management - Use security settings tab to define the level of security
you want while browsing.
Notes
SSL Issue: While exploring a secured website on Internet Explorer 8 sometimes the
Notes
message Page cannot be displayed popped up. To resolve this problem go to internet
options of tools menu and select the content tab, after that select Clear SSL state button
and press OK.
2. Enable the Wi-Fi mode and select Wi-Fi as its input on the television.
4. On your computer, select WiFi connection to the TV. To connect the television
with your Wi-Fi, if required provide the security key or password and re-boot the
network.
5. Four-digit Pin that is generated by television is to be feed on the system. After this
a connection is established between television and system.
You can connect a smart phone to your computer with Bluetooth technology, if you do not
want to use USB cable.
TERMINAL EXERCISE
1. Discuss the steps for installing a wired network in Windows 7.
6. What are the various options to be set while configuring Internet Explorer?
10.1
1. nslookup is used to find more information abouts hosts from DNS servers.
2. Netstat is used for providing information about the systems network connection.
Notes
11
PROBLEM DIAGNOSIS, TROUBLE-
SHOOTING AND MAINTENANCE
While using computers many times we face problems. Sometimes the computer runs very
slow, sometimes the system is not turning on, sometimes some external device is not
working. As a hardware professional you have to be ready to solve these common
problems. This lesson gives the knowledge and competency to diagnose the faults for
systematic repair and maintenance of computers and computer peripherals.
OBJECTIVES
After reading this lesson you will be able to:
z troubleshoot hardware.
z troubleshoot software.
Notes
For reinstalling Windows, a System Image can be used as a copy of drive. A system restore
image can be used anytime for restoring the Windows if the hard disk or Windows stops
working. System restore option can be used for the complete restoration of the system,
you can not choose a specific file for restoration, all your current data will be backed up
in one go.
System Restore option can be used to restore the system to a point where the current
setting of the system was running. You can actually restore your system to an earlier point
by using the systems restore point which was created in your system by default. The
restore point is always created automatically for the events such as Windows update etc.
To restore system files and settings using a recommended restore point:
1. Click to open system restore.
2. If prompted enter the password and username for authentication.
3. Choose the recommended restore point.
4. Review the restore point and click OK.
The table below explains some of the commonly used options of the Control
Panel –
System and Security To set and change System and Security settings.
System settings include:
z Action Center
z System
z Windows Update
z Power Options
z Backup and Restore
z Administrative Tools
Security settings include:
z Windows Firewall
z Bit Locker Drive Encryption
Network and Internet To change the network and Internet settings like creating
new network group or joining an existing network group,
Notes
adding new Internet connection or removing an existing
one. This category includes:
z Homegroup
z Internet Options
z Personalization
z Display
z Desktop Gadgets
z Folder Options
z Fonts
Hardware and Sound To add or remove hardware devices and to change sound
settings. This category includes:
z AutoPlay
z Sound
z Power Options
z Display
z Default Programs
z Desktop Gadgets
z Speech Recognition
The Control Panel can also be displayed in other two views (i) Large Icons view, and (ii)
Small Icons view.
2. Never touch a computer peripheral with wet hands. Make sure your hands are clean
and dry when you handle them.
5. Never use your teeth to clean or cut wires or any other electronic and electric parts.
Troubleshooting of Monitor
If your monitor is not working or not getting power, then first check whether the monitor
is ON. Then verify whether the power switch is ON and also check if the monitor is in
power saving or sleeping mode. In case it is not getting on then check it whether all
peripherals are connected or not.
To change the display settings, select Start menu --> open Control Panel then choose
Display. Then choose Change Display Settings. The following window will be displayed.
Change the resolution, orientation, text size etc., from this window and click OK.
Printer Troubleshooting
There are lot of printers available in the market. If the pritner is not functioning follow the
troubleshooting steps given below. Notes
z If your printer is not printing, then first check whether the printer cable is attached
with your computer or not and, also check whether your printer is ON. In case the
printer you are using is a network printer then check whether it is accessible in your
network. In case, there is still a problem, then you try to update the printer driver.
z Load the paper in case your printer is not having paper on printer tray. Printers may
have more than one tray, load the paper accordingly and take printouts.
z Also check if there is any paper jam in the printer, if yes then clear the paper jam and
restart the printer.
z To test whether printer is working properly, open Control Panel → Devices and
Printers. It will display devices and printers attached to your computer. Now right
click on your printer name and choose Printer Properties. Printer Properties dialog
box will be displayed. Choose Print Test Page
It will display the message that "A test page has been sent to your printer". Your test page
will be printed.
Notes
In case, the printer does not print the test page you can use Printer Troubleshooter.
From start menu, select Devices and Printers → select Printer → Right click on the
Printer Name and choose Troubleshoot . It will detect the printer problem and fix the
problem if any.
CD Troubleshooting
In case if you inserted any CD or DVD on the drive, and it is not working:, then remove
CD /DVD from your Computer, insert it again and check.
z Verify whether the CD is placed properly.
Keyboard Troubleshooting
If your keyboard is not responding then try the following
Mouse Troubleshooting
If your mouse is not responding then try the following
If you are using wireless mouse/ keyboard check whether you have placed correct type of
batteries and whether the batteries are optimally charged.
Video Troubleshooting
If you get a black screen on your personal computer then perform the following checks:
z If monitor's light is on, check your screen's brightness. If your screen's brightness is
turned down then turn it up.
z If the power cord is unplugged, then plug the power cable.
z If the display is not proper and unclear than it could be related to display settings or
problem in graphics card.
Sound Troubleshooting
Suppose you are unable to hear any sound, from computer then perform the following
steps-
z Check if external speakers (if you have) are connected to proper audio port.
z Check to see if the speakers are turned on, if not then turn them on.
z Check to see if the volume is turned up, if not then turn it up i.e., check whether the
speaker is mute, if yes then unmute it.
z Try unplugging and re-plugging the speaker again.
If you still face problem then you should check the driver (sound device driver).
No Power
1. If the computer does not power up at all, reset the BIOS first and then try. This can
Notes be done by restarting/rebooting and immediately pressing F5/F8 keys on the keyboard.
And it will go to BIOS. Then press / enter RESET.
2. If it still does not power up, disconnect all the peripherals and wires except processor
and power supply, then try to switch it on from the motherboard's front panel connector.
3. If still does not power up, change the power supply and try.
4. If still does not power up, remove the motherboard with processor from casing and
lay it on antistatic surface and plug a power supply and try.
5. If same problem still exists, replace the processor and try.
6. If even this does not solve the problem, the motherboard itself is faulty.
Reinstall/Update Drivers
Numerous hardware related issues happen due to driver clashes, degenerate driver parts,
and drivers which need to be overhauled for utilization. At the point when something does
not work, reinstall the appropriate driver.
Update softwares
One general guideline to remember while doing programming related troubleshooting is
to verify you have the latest adaptations of your applications, drivers and working
framework. Additionally install good anti-virus software which automatically scans and
cleans your computer as and when required.
The softwares you were using might be an old version. Check the current version and
download application patches. Recently launched applications may have bugs. When the
application developer or product maker gets to know about some bug in the application,
they develops and posts patches, fixes, and administration packs on its site to rectify the
same. When you have programs that contain bugs, check the site of your product maker
- they may have posted the fix you require. You should download the patch(es) and install
them on your computer.
Preliminary Measures
When you have any problem with your computer, the first thing you need to do is to restart
the machine but before restarting please save your files (word, excel etc.).
Reinstall
If a specific program/software starts working in an unexpected manner (or) is not working
properly even after a few attempts, reinstalling the particular program/software is
required. Before re-installing a software, you have to uninstall it (through Control Panel
→ Add / Remove Programs).
Pinging
Ping command - to check the reachability of the host on an Internet protocol. i.e., to verify
that computer can communicate with other computer (device) on the network. It displays
the time taken for the hop to connect, the number of packets received, the number of
packets lost and the number of packets sent.
Notes
Traceroute
Traceroute is a command used by a computer network administrator to check the number
of hops and if the packet is being lost or the internet connection is unable to be established.
As the command suggests, it traces the route completely and checks each and every hop
of the route.
Ifconfig
Ifconfig is a system administration tool used for the configuration of interface mostly in
Unix like architecture. By using this command a user can configure each and every Notes
interface connected to the hardware whether it is input/ output interface.
Netstat
Netstat command, also known as the network statistics command is used to display the
network connections for transmission of packets. It also displays the routing table with the
complete network protocol statistics.
Testing Speed
The broadband speed of the internet connection can be tested easily with various
applications like speedtest.net. It tracks and displays the number of hops, the upload speed
and the download speed. It works for both symmetric and asymmetric internet connections.
Notes
Death of Screen
Sometimes the computer shows Blue Screen of Death." It is also called as STOP Error.
STOP 0x0000008e and STOP 0x0000007b are two of the most basic mix-ups of this
type.
Notes
In this case, you can try rebooting your PC in safe mode and then it will try to
AutoCorrect.
Strange Noises
Sometimes your system makes strange noise due to harddrive problem or fan may be
making noise. In this case, first check the CPU fan and case fans are working properly.
If not then replace them. If hard drives makes noise, backup your data otherwise you may
loss your data.
z Ifconfig - by using this command a user can configure each and every interface
connected to the hardware whether it is input/output interface..
Notes
z Types of network attacks are passive attack and active attack.
TERMINAL EXERCISE
3. What are the various causes for having No Power in the system?
4. Discuss the steps to be taken if power is there but display is not coming?
5. What are the preliminary measures to ensure that system is working properly?
11.1
1. Requested page is not available in server
2. Netstat
4. ping
Notes
12
NEW TRENDS IN COMPUTING
This lesson is aimed to provide awareness about some of the latest technologies in the
domain of computing and IT. With increase in usage of internet connectivity and need of
high end computing, today's world is witnessing a shift from the era of mainframe
computing and individual computing to a new era of mobile and green computing where
the computing power, software and data are not necessarily located in office premises,
rather, these can be stored somewhere in a "cloud" and can be accessed via internet at
anytime and anywhere.
OBJECTIVES
After reading this lesson, you will be able to
z define virtualization.
12.1 VIRTUALIZATION
Literal meaning of virtualization is simulation. Virtualization allows the pooling and
sharing of the computational power (processor, server) and storage of multiple computers,
network and other resources among multiple users. This simulation technique is adopted
to give user a feel that all infrastructure (whether hardware or software) belong to user
only. This is achieved by simulating the computational facility by creating a virtual
Notes version of given resource like for hardware platform virtual version of storage device,
network resources can be made, and for software platform virtual version of operating
system and other software is created. This virtual version provides a complete execution
environment. An user is able to interact with these virtual resources as if it were a real
single logical resource.
A concept of virtualization can be made clear with a common example of division of hard
disk into different partitions. A partition is a logical division of a hard disk and it creates
an effect of two separate hard disks to the user. This partition makes the management of
files easier.
Virtualization is the ability to create a virtual copy of a device or some type of resource
like server, storage, device, network and even operating system, etc. It divides the multiple
resources into different execution environments. Thus, one of the main objectives of
virtualization is to centralize administrative tasks while improving scalability and
workloads.
12.1.1 Architecture
Virtualization can be achieved at different levels. If you consider hardware, the organization
needs:
z A large data storage system where complete data of an organization can be kept with
complete security. Further, there should be a secured and reliable intra department
access to database as per the policy.
z A high end server that can retrieve the data from the storage and process it with fast
speed.
All these are required with an objective that the process is completed almost at the same
instant the user has entered the necessary input data. As discussed earlier it is not possible
to provide dedicated resources to each user, however we can give an illusion of dedicated
resource through virtualization. Let's see how the server, network and storage virtualization
is done.
Notes
Advantages of Virtualization
z Improved hardware utilization: As the same resource is used by many users,
utilization of resources is increased. Notes
z Lesser hardware cost: You need lesser number of hardware resources, thus overall
cost is reduced .
Disadvantages of Virtualization
z The various advantages of virtualization can be appreciated only if these benefits are
achieved without compromising the overall security, reliability and availability of
the IT infrastructure.
z The virtualized environment is considered more vulnerable as there are more chances
of potential attack to gain unauthorized access to resources from guest operating
systems.
z Cloud services allow individuals and businesses to use software and hardware that
are managed by third parties at some remote locations. Examples of cloud services
include online file storage, social networking sites, webmail, and online business
applications. Thus, through cloud computing, one can increase its storage capacity,
usage of high end server or add computational capabilities without investing in new
Notes infrastructure, training new personnel, or licensing new software.
The cloud computing model allows access to information and computer resources from
anywhere where a network connection is available. Cloud computing provides a shared
pool of resources, including data storage space, networks, computer processing power,
and specialized corporate and user applications. Cloud computing encompasses any
subscription-based or pay-per-use service, that too, in real time over the Internet, thereby
it extends existing IT capabilities of any organization by letting organization to pay just
for the service it needs. The best feature of cloud computing is that it provides the end user
many flexibilities like:
The following definition of cloud computing has been developed by the U.S. National
Institute of Standards and Technology (NIST):
3. Resource pooling
4. Rapid elasticity
5. Measured service.
On-demand Self-service: As an user can request and manage your own computing
resources as per your need i.e., the user can choose the computing capabilities, such as
server time, network bandwidth, storage capacity etc. These requests are fulfilled
automatically without requiring human interaction.
Broad Network Access: You can access the given service over the internet or private
network. Thus it is required that all cloud services should be always available over the
network and accessed through standard mechanisms that promote use by heterogeneous Notes
thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Resource Pooling: Pooled resources mean that user can select any resource from a pool
of computing resources. Examples of resources include storage, processing, memory,
network bandwidth, and virtual machines. The cloud service provider need pool all
computing resources to serve multiple users using a multi-tenant model, with different
physical and virtual resources. These resources are dynamically assigned and reassigned
according to user demand. The user generally has no control or knowledge over the exact
location of the provided resources but may be able to specify location at a higher level of
abstraction (e.g., country, state, or data centre ). Thus, for the end user, resource usage is
independent of its location.
Rapid Elasticity: The services, which are provided, can be rapidly and elastically
changed. To the user all these services are available and can choose any one of them. It
should appear to the user that all services are unlimited and can be purchased in any
quantity at anytime from anywhere.
Measured Service: Cloud systems automatically control and optimize resource use by
leveraging a metering capability according to the type of service (e.g., storage, processing,
bandwidth, and active user accounts) i.e., the service provider will charge the user as per
the usage of IT services. Resource usage can be monitored, controlled, and reported
providing transparency for both the service provider and user who are utilizing the
service. The resource service which is provided can be scaled larger or smaller; and
according to the use of a service (type of service and amount of time which this service is
used, also on number of user) the customers are billed.
You can say, through cloud computing, service provider provide access to software,
platform or infrastructure on a basis of demand raised by user and user has to pay for it
on a metered basis.
Cloud Software as a Service (SaaS): This service provides user a capability to use any
applications (which are developed by service provider) by executing it on a cloud
infrastructure i.e., any pre-made application, along with the required software, operating
system, hardware and network, is provided by the service provider. The applications are
accessible from various client devices through Internet via a thin client interface such as
a web browser (e.g., web-based email). The consumer does not manage or control the
underlying cloud infrastructure including network, servers, operating systems, storage,
or even individual application capabilities, with the possible exception of limited user-
specific application configuration settings.
Examples: Many of the most popular cloud-based applications are business productivity
tools such as email (e.g., Gmail, Hotmail), online productivity software (e.g., Google
Notes Docs, Microsoft Office 365), conferencing services (e.g., Microsoft LiveMeeting,WebEx),
and customer relationship management software (e.g., Salesforce).
Cloud Platform as a Service (PaaS): This service provides user a capability to deploy
user-created or acquired applications onto the cloud infrastructure. This application is
created using programming languages and tools supported by the cloud service provider.
Thus cloud service provider provides an operating system, hardware, and network where
the user installs or develops their own software and applications. The consumer does not
manage or control the underlying cloud infrastructure including network, servers,
operating systems, or storage, but has control over the deployed applications and possibly
application hosting environment configurations.
Examples:Google App Engine allows developers to create and run web applications that
run on top of a custom Google platform and use Google's computing resources.
Examples: cloud storage (e.g., Data centres), providing users access to scalable online
storage
Private Cloud: The cloud infrastructure is used exclusively by an organization. These are
usually used by large organizations which have multiple business units. It may be
managed by the organization itself or by some other third party. It can be deployed either
in premises (on-site) or off premises (off site).
Public Cloud: The cloud infrastructure is made available for the use to the general public
or a large industry group and is owned by an organization selling cloud services.
Examples of public clouds are Amazon EC2, Amazon S3, Google, Microsoft Azure etc.
Hybrid Cloud: The cloud infrastructure is a composition of two or more clouds (private,
community, or public) that remain unique entities but are bound together by standardized
or proprietary technology that enables data and application portability (e.g., “cloud Notes
bursting” for “load-balancing” between clouds).
Mobile computing is an umbrella term used for describing the technologies that enable
people to access network services any place, any time, and anywhere. It is an extension
of mobile voice communication technology which is capable of sending and receiving data
across the cellular network.
OR
OR
Here you need a computing environment which is mobile and moves along with the user.
For that you need a computing environment which fulfils the three important needs
namely:
z Wireless communication
z Mobility
z Portability
Mobility: Mobile computing needs that device should be able to remain connected with
network while changing its location. Different aspects of mobility are:
z User Mobility: users communicate “any time, anywhere, with anyone” (example:
read/write email on web browser).
z Device Mobility: a small battery driven devices that can be connected any time,
anywhere to the network.
z Session Mobility: A user session should be able to move from one user-agent
environment to another.
Notes
z Service Mobility: User should be able to move from one service to another.
Portability: It is not feasible to carry a desktop because of its size, weight and heat
dissipation. You need a portable device that is small, light weighted, durable, capable to
be operational under wide environmental conditions and having a battery with long life.
Mobile Data Communication: Whenever a user is using a mobile, he / she will be using
different networks at different places at different times as discussed earlier. Some
common examples are GSM, CDMA, Ethernet, Wireless LAN, Bluetooth etc.
Mobile laptop and notebook computers can use one of two types of wireless access
services when away from the home or office. The most commonly used and least
expensive is Wireless Fidelity also known as WiFi. The WiFi uses radio waves to
broadcast an Internet signal from a wireless router to the immediate surrounding area. An
alternative to WiFi is cellular broadband. This type of mobile computing technology
utilizes a cellular modem to connect to cell towers for Internet access.
Mobile Device: Mobile telephony took off with the introduction of cellular technology
which allowed the efficient utilization of frequencies, enabling the connection of a large
number of users. There are many different types of mobile computing devices designed to
make it easier to travel and conveniently access technology on the go. Notebooks are small
laptop computers that typically feature built-in wireless networking, and are great choices
for those who want to work even while travelling. Mobile computing devices with a
smaller size, such as smart phones or tablet computers, are becoming very popular as they
are much easier to carry and now-a-days, these devices include many advanced features
of computing, even comparable to those found on a laptop computer. Common devices
that are used in mobile computing are
z Notebook PCs
z Personal digital assistant/enterprise digital assistant
z Smartphone
z Tablet computer
z Ultra-Mobile PC
z Wearable computer
z Palmtops
z Cell phones
z Pagers
z Sensors
Mobile Software: Mobile applications commonly called mobile apps are the applications
that run on a mobile device. These usually run on web browser (HTML, JavaScript,
Notes Flash, server-side components, etc). Designing software of mobile application is a
challenging task.
One of the major constraint is that user of this technology demands intuitive user
interfaces, fast response times, and deep relevant content, high processing (specially for
gaming and multimedia application) but the device which are used for mobile applications
usually have limited processing speed, storage, power backup and display facilities.
z Smart mobile phone: widely used for playing games, up-to date information, e-mail
facility.
z Finding a local printer in the office even without being physically plugged.
z Taxi/Police/Fire Squad Fleet: use this computing facility for remaining connected,
for controlling and communicating.
z Emergency Services: Received information regarding the address, type and other
details of an incident can be dispatched quickly, via a CDPD (Cellular Digital Packet
Data) system using mobile computers, to one or several appropriate mobile units
which are in the vicinity of the incident.
z Disaster Alarm: With help of satellite communication and sensors one might be able
to alarm disaster early Example: Tsunami.
Notes
z Military / Security: can be widely used during war for communication and controlling
the weapons in real time environment.
z Solving complex and other software applications that demand high computing by
providing widespread access to powerful computers and storage.
Notes
z Integrating existing systems together.
As explained in the beginning of the lesson, this decade has emphasized on community
learning, which use to develop a low cost high performance computing system, popularly
called clusters. These clusters share their resources to overcome the resource related
problems in application domains. Grid is an infrastructure that involves the integration of
different application such that they collaborate with each other to get complex problem
solved with an ease. It involves integration of various resources of computers, networks,
database and scientific instruments, owned and managed by multiple organizations. This
is an environment which provides a secure resource sharing across organizational
boundaries i.e., through intra cluster communications.
Grid resources are registered within one or more grid information services. The end
users submit their application requirements to the Grid brokers, who then discover the
suitable resources, by querying the information services, schedules the application jobs
for execution on these resources and then monitors their processing until they are
complete. Software tools and services, providing these capabilities to link computing
facilities and data sources in order to support distributed analysis and collaborations, are
collectively known as grid middleware.
z Direct Effects: This effect includes issues related to environmental changes that
arise because of the design, production, distribution, maintenance and disposal of
ICT goods and services.
z Indirect Effects: This effect includes issues related to environmental changes that
arise because of the application and use of ICTs in different domains of society.
z Systemic Effects: This effect includes issues related to environmental changes that
arise because of the changes in economic and social structures due to use of ICT
products and services.
Impact of computer on environment needs to be studied from its manufacturing to its
usage and disposal stages. As thousands of computers are used in every domain of life,
great amount of power is used and a great amount of both paper and electronic wastes are
produced.
Common hazards that arise as result of massive usage of computers and other computing
devices in our life are:
1. Computers and office equipment play an increasingly large role in energy consumption.
Desktop computers, fan, screen savers, scanners and other electronic technology
account for the fastest growing source of energy consumption. Even in presently,
people do not use energy saving CRT and processor. Further, they keep the computer
"ON" even when not in use and also do not adopt power saving strategies such as
'sleep' and 'standby' modes. As a result, such a system remains active 24 hours per
day, 7 days per week.
Possible solution: all computers in offices or home or any organization should have
z LCD energy saving monitors,
2. Paper usage: Eventhough it is believed that using an automated system will reduce
the paper work in any organization but practically it is observed that it has increased
Notes the paper consumption as
z It is common practice that the people take print outs of emails or meeting
agendas
Possible Solutions:
Solution: manufactures should use non toxic and recyclable material for
manufacturing the products
4. Disposal of unused devices: The hardware technology changes very fast and as a
result often people feel to replace their existing system. Disposal of these devices
constitutes 20-50 million tons per year (about 5% of the total waste of the planet).
This waste is also known as e-waste. The improper disposal of computers and
components may lead to entry of these toxic material in our food chain and water
z Reuse: Organizations like play way schools, libraries etc may not need a
high end latest configuration system, and instead of disposing the entire system,
one can donate a computer or even its components to organizations who need
lesser quality computers
z Recycle: The companies that can recycle the plastics and other components,
can also recycle the e-waste components.
z It should reduce the usage of hazardous materials for manufacturing any product.
z Enhance the energy efficiency of any product by reducing the power consumption of
that product.
z Promote the recyclability.
z Usage of biodegradable products and factory waste.
Many corporate IT departments have taken lot of green computing initiatives to reduce the
environmental impact. Green ICT and its services present opportunities to deliver low
carbon footprints and mitigate carbon emissions because of the unique ability to make
energy consumption and green house gas emissions visible through its products and
services.
z Virtualization allows pooling and sharing of the computational power and storage of
multiple computers, network and other resources among multiple users.
z Cloud computing model allows access to information and computer resources from
anywhere where a network connection is available.
TERMINAL EXERCISE
1. What is cloud computing?
12.1
1. Vitualization
12.2
3. Mobile 4. Grid 5. Green
Notes
13
ENGAGE WITH CUSTOMERS
In this lesson, the details and best practices of customer engagement and interactions are
being discussed in detail. It will serve as a guide for employees who handle where
customer interaction and engagement.
OBJECTIVES
“What do our customers expect from us?” “What aspects of production could be changed
while not affecting the satisfaction level of customers?” These are the questions to ask
oneself when defining customer requirements and expectations. In our market-based
economy, there is nothing more important than satisfying customer expectaions and
establishing long-term business relationships with clients, which is why meeting or
exceeding the requirements of customers, with precision, time and time again, is essential
to a successful or flourishing enterprise.
Understanding the basic needs and a requirement of the customer is vital to managing a
successful business. It’s a competitive world out there, and attention to detail and being
helpful goes a long way. The needs and requirements for service and support differ greatly,
by customer, by site, by usage, and by many other aspects too numerous to mention.
For effective understanding of customer’s requirement, you need to look into following
aspects:
z Ask open and close ended questions to understand the problem faced
Specific questions such as how or why questions, will invite positive interactions
and will lead to better understanding of problem faced by the customer. Open ended
questions are easy for the responder to answer and can lead to more specific questions.
Closed questions, which require only a simple yes or no answer, yield less but specific
information. Both are important and employees should develop the skill to ask right
questions for effective resolution of problems faced by the customer.
Customer relation executives should clearly understand the warranty clauses for
various products sold to the customers. They should enquire about the warranty
coverage from the customers. In case there is a mismatch in the customers version
and what the company policy is, the executive should inform the customer about it
and ask him for the next steps (paid visits, purchase, extended warranty) etc.
While interacting with customers, it’s a good opportunity to educate them about
various other products of the organization without making it sound like a sales pitch.
Also inform them about the annual maintenance contract. These are agreements with
customers to maintain and service equipment located at customers end. Such
agreements are typically and preferably conveyed at the time the product is purchased.
Service may initially be provided without separate charge during the warranty period,
and then made available at pre-set rates in the years after any warranty has expired.
Customer service and contact with a client mean that the customer will be heard and their
problems will not go unanswered or ignored. It also means getting to know your client,
likes-dislikes, ideas, background, etc. The other most important aspect to do is to listen to Notes
what the customer is saying. If people do not understand what is appealing the customer,
they will not be successful in handling them. Do research on customers, their habits, and
what they want and expect.
One commonality among all companies or organizations that provide good service is the
development of a system and attitude promoting customer friendly service. By “customer
friendly” we mean viewing the customer as the most important part of your job. The
saying, “The customer is always right” is derived from this customer friendly environment.
The two main tasks of successful customer relations are to communicate and develop
relationships. Positive dialogue/communication with your customers and developing
ongoing relationships with your customers are perhaps the two most important qualities
to strive for in customer service.
When a customer asks you to do something that you do not know how to do or do not have
the authority to do, become a facilitator by leading the customer to the person or
department who can help them is solving the problem. Many inexperienced customer
service representatives think by sympathizing with the customer’s trouble, he/she will win
over the customer rather than actually doing something to solve the customer’s problem.
If a customer expresses annoyance or frustration, do not make it worse by consoling with
him/her. Understand the customer problem but seek to solve the problem.
Summarize the problem in a problem statement and get it validated by the customer
so that its clears that you are solving the right problem.
If you can suggest a solution, do it. If not tell the customer what actions you will take
and what actions will follow. Never make the mistake of promising something you
are not able to do. Suggest the customer alternative solutions, if they exist. Customers
appreciate the opportunity to choose the ways of problem solving. Make sure that
the promised measures are taken. If you do not fulfill what was promised and ignore
the customer’s complaint, the problem will grow. Next time it will be more difficult
to solve.
Emphasizing what you can do for the customer and what’s unique about your solution
creates a perception of value that can raise your proposal above the rest, even if
other solutions might cost less.
If the customer is facing problem with a particular product module which requires
replacement or repair, the customer service executive should apologize for the trouble
caused to the customer. Any such problem should be prioritized so that customer
feels comfortable. It should be resolved as soon as possible as it is impacting the
customer experience about the product as well as the organization.
z Explain to the customer about repair process, time taken and charges if any
Notes Having good systems in place ensures repairs are carried out correctly, within a
reasonable time, and that the customer is kept informed. This is essential to ensuring
the customer has confidence in your work. Where there are no legal obligations,
offer a solution that in the circumstances best meets the needs of your business. For
example, if the law says a customer is entitled to a repair, you may be willing to offer
a replacement if that is what the customer wants and is not causing too much financial
burden.
If there are value added services, inform and educate the customer about it and the
applicable charges. Take customer’s approval before putting extra financial burden
on the customer. If the customer is not ready to take the additional services, do not
force the argument further.
The executives dealing with customers must provide a detailed note to customers
about the problems and issues encountered by customer, what actions the company
has taken to rectify the problem and the cost involved which needs to be paid by the
customer. A copy of the same shall be retained by the company after taking signatures
from the customer.
Proper invoice and bills shall be provided to the customer for all the parts purchased
by the company or by the customer. It should include parts replaced or add on
components/parts purchased.
Every company has a detailed policy on customer interaction, clearly outlining the
timelines for servicing a customer initiated complaint in Service Level Agreement
(SLA). It’s a major objective for quality improvement for customer service agreement
and must be tracked properly for improving the customer experience.
For new customers, the requirements shall be accurately identified to streamline the
purchase process and enhance customer experience. Also executives shall be able to
identify the resources and records at their end to let the customers know about the
availability and timelines in a crisp manner.
13.7 SKILLS
Apart from important aspects as discussed in above sections while engaging with
customers, there are certain generic and professional skills which can enhance the
customer experience and engagement further.
z Generic Skills
Field executives dealing with customers should be able to read the product and module
serial numbers and interpret the details like manufacturing date, model number etc.
in an easy and fluid way. They should be able to document the issues on job sheet and
also enter the details of work being done.
z Professional Skills
Professional skills include interpersonal skills which will help in developing the rapport
with the customers. It improves the listening capabilities and executives are more Notes
aware about the problems and possible solutions. Communication skills are very
important in order to seek inputs and assess the problem, making customer bit more
relaxed about the issues and informing them about the contractual obligations in an
easy manner. Behavioral skills include personal grooming, etiquettes on maintaining
appropriate physical distance during conversation, being patient and courteous with
customers. Decision making skills are also very important in situations where
supervisor is not available or customer is being restless.
3. Which of the following is not a professional skill required for customer engagement:
A. Interpersonal skill
B. Communication skill
C. Decision making skill
D. Computer Programming
TERMINAL EXERCISE
1. Suggest important ways in which customer service executives should interact with
customers.
2. What best practices should be followed while suggesting solutions to the customers.
3. Elaborate four professional skills which are required for effective customer
engagement.
4. What is the importance of documentation while dealing with customer initiated
complaints or requests?
13.1
1. A 2. A 3. D 4. B 5. D
Notes
14
COORDINATE WITH COLLEAGUES
The organizations of today have become lean with minimal hierarchical structures
defined within the organization. This has lead to increased importance of inter personal
skills, both with our colleagues and superiors in order to obtain smooth work flow and
achieve the company targets in an efficient way. This lesson is about the salient points
which are required for individual’s level of communication with colleagues and other
departments within the organization. It lays down objectively the qualities and abilities
which determine the ability to work as a team member to achieve the required deliverables
on schedule.
OBJECTIVES
After reading this lesson you will be able to:
z interact with superiors smoothly.
z coordinate with colleagues efficiently.
z explain teamwork and multitasking.
z make decisions.
The immediate supervisor of a department helps to set the tone for everything that goes
on there. When you interact with your supervisor, the way that she/he treats you will
determine how you work. So it’s important to develop a cordial relationship with the
supervisor. This will lead to a much more soothing and cooperative environment in the
organization. It will also lead to excellent results for the organization as well as individual.
To have a good coordination and communication with the supervisor, the individual must
proactively focus on following aspects:
Notes
z Understand and assess work requirements
z Understand the targets and incentives
z Understand new operating procedures and constraints
z Report problems in the field
z Resolve personnel issues
z Receive feedback on work standards and customer satisfaction
z Communicate any potential hazards at a particular location
z Meet given targets
z Deliver work of expected quality despite constraints
z Receive positive feedback on behavior and attitude shown during interaction
yourself whether the details you are about to convey would be better left unsaid. After
analyzing the matter beforehand, you find that you must express problems of a personal
nature to your superior, then be polite and ask for an appointment and thank your Notes
supervisor for the help and time he has provided.
Many employers define “good communication” as an ability to get along with others and
behave pleasantly in the workplace. This attribute might seem more a personality trait
than a communication skill, but for many employers it counts for more. Fortunately, you
can learn to project a positive attitude, regardless of how you actually feel, and that in
itself is an important business communication skill.
In turn, you should consistently show that you are willing to help others, get their work
done. Some people worry more about being taken advantage of others than they do about
the welfare of the group. Most co-workers consider this kind of an attitude as a
“negative” one, and it will virtually always lose you the support of others–and often your
job.
Apart from above mentioned general guidelines, to have an effective coordination and
communication with the colleagues, the individual must proactively focus on following
aspects:
z Interact with colleagues from different functions and understand the nature of the
work.
z Pass on customer complaints to colleagues in respective geographical area.
z Assist colleagues with resolving problems.
z Resolve conflict for smooth work flow.
z Follow company policy for cross functional interactions.
understanding of the services and / or products together with the communication skills to
deal with customers. It also involves teamwork so that colleagues learn from each other
as the organization gains experience and services and/or products develop. Notes
Look forward at work by supporting and developing your colleagues. You can begin with
showing genuine interest in their lives, asking them for opinions and caring about them.
Share about yourself and build trust. Involve others in your projects or collaborate on
ideas. Share your knowledge and proficiency while learning from your colleagues. You
will make work a better place to be.
z Clearly express the causes of the conflict – openly acknowledging there will be differing
perceptions of the problem(s).
z Make a clear statement of why you want the conflict resolved and reasons to work on
conflict.
z Address the issues face-to-face (notes, email correspondence, memos are not a
productive way to resolve differences).
z Take time out if necessary. In the resolution of a conflict, our emotions may interfere
with arriving at a productive resolution. If this transpires, take a time-out and resume
Notes resolving the conflict at another designated time.
Employees should orient themselves towards companies goal while understanding the
company policies and also improving upon their knowledge with respect to the skill set
required to accomplish the tasks effectively.
Employees have a wide range of pay, but those who work for the same company are often
paid on the same day. Policies and procedures are outlined when employees will be paid.
Employees should also be aware if direct deposit is available, as well as the guidelines on
bonus pay and reimbursement for mileage and other work-related expenses.
Companies that offer health benefits also include key aspects, such as pricing for
individuals and families, in their list of employee policies and procedures. Many
companies also have a mandatory waiting period of anywhere from 30 to 90 days before Notes
benefits become available to an employee. Employees should be aware of these policies
and should discuss with HR or other concerned department in case of any confusion.
Employee policies and procedures consist of every imaginable situation and topic,
ensuring that employees understand all aspects of working for a company. That includes
policies on acceptable attire, safety, termination and resignation, working from home and
overtime. It is important that employees are trained on these aspects from time to time and
it’s the responsibility of the employees to discuss these with colleagues and superiors if
required.
z The performance review process that will be used for your position.
Talk to your supervisor if you are unsure of the work that you are expected to perform or
the standards you are expected to meet in order to gain a better understanding of his or her
expectations. If there are things you think you need help with to be successful, discuss
them with your supervisor. These could be instructions, training, support/cooperation
from coworkers, etc.
Organizational structure provides guidance to all employees by laying out the official
reporting relationships that govern the workflow of the company. A formal outline of a
company’s structure makes it easier to add new positions in the company, as well,
providing a flexible and ready means for growth.
You can measure communications in many ways using informal and formal channels. A
good communicator makes use of the measurement systems available within your
organization, but also uses the most powerful form of measurement – feedback. By
inviting feedback you can not only measure the success of the communication, but also
enter into valuable two-way dialogue, which will help your future communications and
engage the audience with your message and the company.
consequences that follow from each option; 3) evaluating the desirability of each of the
consequences; 4) assessing the likelihood of each consequence; and 5) making a choice
Notes using a “decision rule”.
Problem solving and decision-making are important skills for business and life. Problem-
solving often involves decision-making, and decision-making is especially important for
management and leadership. There are processes and techniques to improve decision-
making and the quality of decisions.
An important area where decision making process becomes critical is at the time of
unforeseen disruptions in the work flow. Employees should be able to take informed
decisions at such times. Normally, every organization develops its own set of best
practices to deal with such emergency situations. Employees should be aware of such best
practices and should be able to communicate to the supervisor if that is required. They
should be aware of their responsibilities and should make appropriate judgment regarding
whether to inform the superior or to handle the situation along with other colleagues.
After going through this lesson, you can apply these principles at their respective
workplace to make it more robust, dynamic and interesting place to work.
TERMINAL EXERCISE
1. Suggest important ways in which organizations can foster team work and team
coordination skills within the employees.
2. What are the important aspects which are required for smooth work flow for cross
functional interaction?
14.1
1. D 2. A 3. B