Comp 231 Notes
Comp 231 Notes
SECONDARY
STORAGE
CONTROL UNIT
ARITHMETIC AND
LOGIC UNIT
Inputting:
Process of entering data into Computer.
Storing:
Saving of data on memory.
Processing:
1. Primary Storage :
RAM ROM
RAM is volatile i.e. its contents are It is non-volatile i.e. its contents are
lost when the device is powered off. retained even when the device is
powered off.
The two main types of RAM are The types of ROM include PROM,
static RAM and dynamic RAM. EPROM and EEPROM.
RAM allows the computer to read ROM stores the program required to
data quickly to run applications. It initially boot the computer. It only
allows reading and writing. allows reading.
2. Secondary Storage:
Also known as ‘auxiliary storage’. It can retain information even when
a computer system switches off or resets.
Secondary storage device holds the programs, instructions, data and
information permanently and transfer them to further processing. Magnetic
Type of Keyboard:
1. Mechanical Keyboard.
2. Flexible Keyboard.
3. Wireless Keyboard.
Above keyboard may be PS/2 (Personal System 2) or USB (Universal Serial
Bus).
Type of Click:
1. Single Click : To select the Object.
2. Double Click : To open the Menu.
3. Right Click : To open the properties for selected items.
4. Left Click : To select the item.
5. Scroller : Wheel for scrolling the screen/page/window.
c) Track Ball :
It’s working like Mouse.
This is pointing stick on Laptop.
d) Joy Stick :
It is a pointing device. Same work like track ball.
Useful as a remote control, for playing video games, and a flight simulator to
control the industrial robot, trolleys.
9
e) Light pen :
Use directly on screen or pad to operate.
Use as like ink pen (electronic pen).
By pressing buttons select the object/menu.
Used in digital signature for driving license.
f) Touch screen :
Uses LCD (Liquid Crystal Display) Screen.
Operate it by touching on screen with finger or stick.
Used at railway station, air port, Bank for ATM, Hotels for billing, Post office
etc.
g) Scanner :
It is used to direct data entry into computer system.
It translate document into an electronic format and stores it on
memory.
Scanning image may be text, picture, graphs, or even hand written
document.
Editing, cropping images or photos.
Type of scanner:
a) Flatbed Scanner :
Like Xerox machine.
Glass plate-Image-Light source-Light beam-Reflects.
b) Handheld Scanner :
This type of scanner uses LED (Light Emitting Diode).
I) OCR: Optical Character Reader.
10
11
OUTPUT DEVICES
1. Monitor :
It is used for soft copy.
It is like a Television screen.
Also called as VDT (Video Display Terminal).
Type:
CRT (Cathode Ray Tube) Monitor:
Heavy, not easily portable, and occupies more space on desk.
Flat screen Monitor: LED (Light Emitting Diode) & LCD (Liquid
Crystal Display) type
Flat panel monitors are thinner, lighter, and easily portable.
2. Plotter:
Useful to plot or design graphs, maps etc.
It is ideal output device for architects, engineers, city planners, and others
who need to generate high precision hardcopy graphics output.
Type:
1. Drum Plotter:
It consists one or more pen holders mounted perpendicular to the
drum surface. A graph plotting program controls the movement of drum and
pen.
12
Type:
a) Voice Reproduction System.
b) Speech Synthesizer.
a) Voice Reproduction System:
This system gives an output from a pre-recorded audio eg. This is used
in ATM for guidance. Normally also used in telephone enquiries, mobile
enquiries, alarm clock, toys, in pc for animated multimedia presentation.
b) Speech Synthesizer:
It converts text information into spoken sentences. It is useful for
reading Braille for blind person and the person who cannot speak.
5. Printer:
Most popular output device for hard copy.
Type:
i) Impact Printer.
ii) Non-impact Printer.
i) Impact Printer:
Use a device to strike an inked ribbon, pressing ink from the ribbon onto
paper.
13
Advantages:-
Its working is so smoother and quieter.
It has ability to print special characters, graphs, charts, maps in any shape
and size.
It is a high quality printer.
It is faster printer than others.
Disadvantages: -
It does not give multiple copies by using carbon.
Speed range 4 to 12 ppm (pages per minutes).
HARDWARE
Any physical part or equipments of a computer system is known as
hardware.e.g.CPU, motherboard, RAM, power supply, printer, scanner, et
Secondary Storage Devices:-
Commonly known as additional memory or auxiliary memory. It is a
non-volatile memory.
e.g. punched paper tape, punched card, magnetic tape, magnetic disk,
optical disk etc.
Magnetic Tape:
It has small cassette cartridge made up of plastic ribbon which
magnetized with iron oxide and chromium dioxide. Data stored on disk is
like spot i.e. 0’s and 1’s.
Magnetic Disk:
It uses circular plastic material thin film coated with both sided and
also magnetized with iron oxide. User can erase the data easily.
Floppy Disk:
16
17
i) System Software :-
A set of one or more programs design to control the operations and
extend the processing capabilities of a computer system. System software
helps to run the computer hardware and computer system. It includes
operating systems, device drivers, diagnostic tools, servers, windowing
systems, utilities and more.
Functions:
1) It supports in development of application software.
2) It supports in execution of application software.
3) It monitoring the use of hardware resources like CPU, Memory, and
peripheral devices.
4) It controls and communicates with the peripheral devices.
Types of System Software: -
a) Operating System :-
It is a set of programs that controls the hardware resources of a computer
system and provides it to user with an interface.
18
1) Word-processing Software :-
Used for creating, editing, viewing, formatting, storing, retrieving and
printing document.
2) Spreadsheet Software :-
Used for numerical data analysis.
3) Database Software :-
A set of programs that enables us to create a database, maintain it, organize
it data in desired fashion.
4) Graphics Software :-
19
What is a virus?
A virus or worm is a computer program that can spread across
computers and networks by making copies of itself, usually without the user’s
knowledge.
Viruses can have harmful effects. These can range from displaying
irritating messages to stealing data or giving other users control over your
computer.
How does a virus infect computers?
A virus program has to be run before it can infect your computer.
Viruses have ways of making sure that this happens. They can attach
themselves to other programs or hide in code that is run automatically when
you open certain types of file. Sometimes they can exploit security flaws in
your computer’s operating system to run and to spread them automatically.
You might receive an infected file in an email attachment, in a download from
the internet, or on a disk. As soon as the file is launched, the virus code runs.
Then the virus can copy itself to other files or disks and make changes on
your computer.
Trojan horses
Trojan horses are programs that pretend to be legitimate software, but
actually carry out hidden, harmful functions. For example, DLoader-L arrives
in an email attachment and claims to be an urgent update from Microsoft for
Windows XP. If you run it, it downloads a program that uses your computer
to connect to certain websites, in an attempt to overload them (this is called
adenial of service attack).Trojans cannot spread as fast as viruses because
they do not make copies of themselves. However, they now often work hand-
in-hand with viruses. Viruses may download Trojans which record
keystrokes or steal information. On the other hand, some Trojans are used
as a means of infecting a computer with a virus.
20
21
The internet:
You may download programs or documents that are infected.
Security vulnerabilities in your operating system can also allow viruses to
infect your computer via the internet connection, without your having to do
anything at all.
Email:
22
23
24
25
Heuristics:
Heuristic software tries to detect viruses – both known and unknown
– by using general rules about what viruses look like. This software doesn’t
rely on frequent updates. However, heuristics can also be prone to false
alarms.
Vaccines:
26
27
29
PROCESSOR
Processor Speed:-
Control unit and Arithmetic Logic Unit perform operations at incredible
speed. These operations are usually synchronized by an electronic clock
known as system clock.
To fetch, decode and execute a single program instruction; several
clock cycles are required. Clock speed is measured in Hz (Hertz).
Types of Processor:-
1) CISC: - Complex Instruction Set Computer.
It has many processing features.
✓ It makes the job of machine language programmers easier.
✓ They are expensive to produce.
✓ Most personal computers use CISC processors today.
✓ Design of this type of processors is so complex.
2) RISC: - Reduced Instruction Set Computer.
It reduces the complexity of designing of a CISC processor.
30
Features:
✓ It uses transistors, logic gates, and switches etc.
✓ Because of transistors the clock speed increases.
✓ A transistor switches faster, generates more heat and consumes
more power.
✓ It has multiple cooler running.
✓ It has more energy efficient processing core.
✓ It works in parallel.
31
32
33
Data Communication :
It is a method by which data transfers from one location to another.
Communication is the process of transferring a message from one
point to another.
Computer Network:
A computer network is a network of computers that are of
geographically distributed, but connected in a manner to enable meaningful
transmission and exchange of data among them.
Whenever more than one computer are connected (internally) to each
other then there is a network called as computer network.
34
SENDER RECEIVER
(source) (sink)
Data Transmission modes:-
a) Simplex b)Half-duplex c)Full-duplex
a) Simplex:
A simplex communication system can transmit data in one
direction only.e.g.keyboard and printer.
Sender Receiver
Simplex
b) Half-duplex:
A half-duplex communication system can transmit data in both
direction; but in only one direction at a time.e.g. Telephone.
It alternately sends and receives data. It requires two wires.
c) Full-duplex:
A full-duplex communication system can transmit data in both
directions. In this communication it allows data to flow in both directions
simultaneously.
It requires switching circuit and relay. It requires four wires.
Data Transmission Speed:
Bandwidth:
Data transfer rate of a communication system.Amount of data transfer
per unit of time.Bandwidth is measured in bits per seconds; bits/sec, bps
(band).
Basic categories of communication channel:
There are three communication channels:
35
3)Broad band: Used for to transmit large volume data at high speed. Cost of
data transfer service is increases with the speed. Which are used in high
speed computer.
36
Co-axial cable.
Adv.:-High bandwidth, high speed, cleaner and crisper data transmission
without any distortion or loss of signal.
Disadv:-Requires long cables, digging in land.
3) Optical Fibers:
These are hair thin threads of glass or plastic, used as data
transmission medium like copper wire or co-axial cables. They transmit light
37
38
2) Satellite Communication:
These are placed in outer space. They are launched by rockets or space
shuttles (INSAT-Indian Satellite in Outer Space).
In this satellite communication microwave signal (GHz) is transmitted
from a transmitter on earth to a satellite positioned in space.
39
1) Dial-Up:
40
❑ Modem
Modulates a digital signal into an analog signal for transmission via
analog medium, and then demodulates the signal into digital for receiving.
Acronym for modulator-demodulator. A modem is a device or Program that
enables a computer to transmit data over telephone lines. Computer
information is stored digitally, whereas information transmitted over
telephone lines is transmitted in the form of analog waves. A modem converts
between these two forms.
41
43
HOST
✓ Network Types:
44
Host
computer
Target PC“dumb
terminal”
45
Host
computer
Target PC File downloaded to user File server
Client/Server Connection:
▪ Applications and databases reside on specialized host
computers.
▪ Servers do most or all of the processing and transmit the
results to the client.
Client Server
Internet
Global collection of the computers connected to each other. A
worldwide network of computers. Several thousands of individual computer
networks are interconnected to form the internet. Internet provides electronic
mail, telnet (remote login to computer), file transfer services and enormous
amount of information through various discussion groups and information
retrieval facilities.
It is a worldwide system of computer networks. A network of networks
in which users at any one computer can, if they have permission, get
information from any other computer ( and sometimes talk directly to users
at other computer ).
Internet used in ARPANET (Advance Research Project Agency) systems
of the U.S. department of defense. It is first WAN and had four sites in
1969.Then this ideas of ARPANET used by research organizations and
universities to share and exchange information. In 1989 US government
lifted its restrictions on use of internet and allows using for commercial
purpose.
Internet Basic services:
1) Electronic-Mail: e-mail:
An internet user enables to send or receive mail to another internet
user within minutes it reaches its destination.
It is similar with postal mail service.
Internet users have an e-mail address just like postal address. It have
logical mailbox, and get the feedback also.
Messages in e-mail service not only in text, documents but also images,
video, audio data too and it should be digitized.
47
48
Search Engine:
49
50
51
From the table above we can see that some search engines like Yahoo
and MSN Search provide both crawler-based results and human-powered
listings, therefore become hybrid search engines. A hybrid search engine will
still favor one type of listings over another as its type of main results.
There is another type of search engines that is called meta-search
engines.
Meta-search engines, such as Dogpile, Mamma, and Metacrawler,
transmit user-supplied keywords simultaneously to several individual search
engines to actually carry out the search. Search results returned from all the
search engines can be integrated, duplicates can be eliminated and
additional features such as clustering by subjects within the search results
can be implemented by meta-search engines.
Meta-search engines are good for saving time by searching only in one
place and sparing the need to use and learn several separate search engines.
"But since meta-search engines do not allow for input of many search
variables, their best use is to find hits on obscure items or to see if something
can be found using the Internet."
Several sites provide software known as Search Engines to get the
retrieve information from web pages. Also it locates the specific information
on the web.ex. Google search, yahoo, altavista, web crawler etc.
Web portal: Individual website for sending e-mails only.
Uses of Internet:
1) On line communication.
2) Software sharing: (By using share software tools like mail server,
compilers, code libraries, and O.S.ex.FTP).
3) Exchange of views on topics of common interest: Newsgroups.
4) Posting of information of general interest.
Career opportunities, conference, event announcements, recruitment.etc.
52
Forms:
54
Database:
A database is an organized collection of data, typically in digital form.
The data are typically organized to model relevant aspects of reality (for
example, the availability of rooms in hotels), in a way that supports processes
requiring this information (for example, finding a hotel with vacancies).
The term database is correctly applied to the data and their supporting
data structures, and not to the database management system (DBMS). The
database data collection with DBMS is called a database system.
DATABASE SYSTEM
A database system is a computer based record keeping System whose
overall purpose is to record and maintain information that is relevant to the
organization necessary for making decisions.
55
56
57
59
60
61
62
63
64
65