XI Computer Combined
XI Computer Combined
1 INTRODUCTION TO COMPUTER
COMPUTER:
Computer is an electronic device that allows the accessing and
processing of the huge amount of data into the meaningful
information.
OR
Computer is an electronic machine that stores, retrieve and process
the information of the data.
Characteristics of computer:
i. Speed:Computer perform all its task with a great speed of nano (1x10
-09
) and pico second (1x10-12)
ii. Accuracy: Computer performs all jobs with higher accuracy
and without any mistake
iii. Diligence:Computer never gets tired nor get bore bu doing same
task multiple times
iv. versatility:Computer has an ability to perform multiple task at a time
v. Highstorage: Computer have great and highest storage to store
data. once information stored in it, it never forgets.
vi. NoIQ:Since Computer is a machine that cannot take decision by
itself as it has no IQ
vii. Un-employment: Since computer is an automatic machine
and through which a huge amount of work can be done
through computer in minimum amount of time therefore Un-
employment ratio has been raised due to automation.
INPUT DEVICES:
All those devices that are designed to enter data (input) to the
computer are termed as input devices. These devices pass the
data from the user to the computer. Input devices convert
human understandable language into machine language. Three
basic types if Input devices are:
ii. Pointing
Devices iii.
Scanning Devices
CLASSIFICATION OF KEYS:
We can classify the keys of keyboard into the following
different categories
Numeric keypad
Alphanumeric
keypad Screen
Navigation keys
Functional keys
Modifier keys
NUMERICKEYPAD:
Numeric keypad is placed at the right hand side in a keyboard. It
consists of the mathematical digits and some other logical operators like +
-*/. A decimal point is also included in numeric keyboard.
ALPHANUMERICKEYPAD:
Alphanumeric keypad is placed in the mid of the keyboard. It consist on
A-Z English alphabets and 0-9 mathematical digits. This
keypad is so commonly to work on Microsoft office.
SCREENNAVIGATIONKEYS:
Screen navigation keys are used to highlight the different files and the
folders on the screen. It is commonly used in the absence of the
mouse.
FUNCTIONALKEYS:
Functional keys are placed at the top of the keyboard. It
consists of 12 different keys which are used for very special
purpose. The functions of every key is totally depend on the
software.
Like F1, F2, F3 F12
MODIFIERKEYS:
Modifier keys are used for the special purpose. Modifier keys are placed
adjacent to the alphanumeric keys. Modifier keys are used with
other keys to complete the desire actions.
ADDRESS BUS:
A collection of wires connecting the CPU or with man
memory that is used to identify particular locations (address) in
main memory where data is stored is called Address
bus.
The number of bits is the address bus can determine the
amount of memory the CPU can address. Example : Modern
PCs have as many as 36 address lines which enable them
theoretically to access 64 GB of main memory Address bus is a
UNI- DIRECTION.
CONTROL BUS:
It is physical connection that carries control information b/w the
CPU and other devices with in a computer. The control
bus carries signals that report the status
of various devices. Example: one line of the bus is used to indicate
whether the CPU is
current reading from a writing to main memory
DATA BUS:
It is communication route through which data can travel
computer’ b/w the memory and peripherals.
s Each wire transmits a single bit at a time, so 8 bits bus can travel
8 bits at a time. Similarly 16 bits bus can transfer
16 bits simultaneously and so on.
Ports:
Ports are connecting sockets on the outside of the system
unit. This allows you to plug in other devices, such as
monitor, keyboard, modem or printer.
Ports are of several
types:
USB ports:
The USB (universal serial Bus) port is rapidly gaining
popularity for PCs, because the USB port allows 127 peripheral
devices to be
connected to the one general- purpose port (Fig. 1.29). USB
ports are useful for peripherals such as digital cameras,
digital speakers, scanners, high-speed
modems, and joysticks. The USB
port allows peripheral devices to be connected or disconnected even
while the PC is running’s.
OUTPUT DEVICES:
Output devices convert machine-readable information into
people- readable form.
Output takes two forms:
1. Monitors.
2. Sound output devices
Monitors:
This is the most commonly used form of output device when a
permanent record is not required. A monitor is a television – like
device to display text and graphics from a computer. The
monitor is also referred as screen, video display terminal (VDT).
Console, and cathode-ray tube (CRT).
There are two main types of monitors.
1. Cathode-ray tube (CRT) monitor
2. Flat panel monitor.
The following chart shows these types and some common
verities of monitors included in these categories
Monitor
Color
Liquid Crystal display
Monochrom
SVGA
Paper-white
Electroluminescent
XGA
Amber
Gas-plasma display
Green SXGA
UXGA
Cathode-Ray Tube Monitors:
The cathode-ray tube (CRT) is an output display device that
resembles a television screen.This is the type of monitor used with
microcomputers. CRTs contain an electron “gun” that fires a beam
of electrons. The inside of the front of the CRT screen is coated
with phosphor. When a beam
of electrons from the electron
gun hits the phosphor, it lights up tiny points of phosphor
for a short period of time. Each tiny point of light is called pixel (a
contraction of picture elements.)
Printer:
A printer is basically an output device which prints a hard
copy of the electronic data that is stored in the
computer or any other devices. The electronic data may include
documents, text, images or even the
combination of all three. Particular printers are available for
printing particular data types.
Electromechanical No electromechanical
devices are used device is used.
Dot-matrix printer,
Daisy wheel printers, inkjet printers, photo
line printer are printers, laser printers are
examples . examples .
More expensive as
less compared to Impact printer
expensive
STORAGE:
Storage/ memory is the place where data is kept- computer
storage is refer as the media that are used to store the data
and information for later use.
TYPES OF STORAGE:
There are two types of storage.
1) Primary storage (Internal memory)
2) Secondary storage (External memory)
PRIMARY STORAGE:
The set of chips that is located on mother board and reside in
the CPU generally known as internal memory.
Internal memory is faster than external memory. Internal memory is
also known as main memory or primary memory. Internal memory
is volatile memory except ROM. RAM and ROM are the types of
internal memory. Internal memory has less storage than external
memory.
EXTERNAL STORAGE:
All those storage devices that plugged into the CPU externally
to increase the storage of the system are known as external
memory. External memory is slower than internal
memory. External memory is also known as
secondary or auxiliary storage. External memory is non-volatile
(permanent) memory. Magnetic tape, hard disk and CD-ROM are
external storage devices.
RAM:
RAM stands for random access memory. It is one of the types
of primary memory. That must be
requiring performing the operational activities. By the way of
increasing storage capacity of RAM the speed of computer can also
be increased. RAM is a volatile memory it means that
the data stored in RAM can be lost in the absence of electricity.
TYPES OF RAM:
The RAM can be classifying into two different types.
1. Dynamic RAM
2. Static RAM
.
ROM:
ROM stands for read only memory. That permits you only to read data.
It is a type of primary memory. That is permanent in
characteristics means ROM always retains the data it holds even
when the computer is turned off. That’s why it is called non-volatile
memory. It is a pre- programmed memory and it is
responsible to start up the computer and perform diagnostics. It
has special programs called firmware for this purpose stored in it.
SOFTWARE:
The instructions that tell a computer what to do is called a
software. Software comprises the entire set of programs,
procedures, and routines associated with the operation of a
computer system, the term was coined to
differentiate these instructions from hardware –i-e., the
physical components of computer system. As
set of instructions that directs a computer hardware to perform a
task is called a program or software program.
Types of software:
There are two types of software:
System Software
Application software
i. Security –
The operating system uses password protection to
protect user data and similar other techniques. it also
prevents unauthorized access to programs and user
data.
ii. Error detecting aids –
Operating system constantly monitors the system to
detect errors and avoid the malfunctioning of computer
system.
iii. Coordination between other software and users –
Operating systems also coordinate and assign
interpreters,
compilers, assemblers and other software to the various
users of the computer systems
CLI
S.NO GUI
Stands for
1 Command Line Interface Graphical User
interface Commands
2 It is the interface in which Users dont type Commands as
user have to type they are saved in form of Icon
commands for any task
Environment
3 It is Single User single It is single user Multi task
task operating system operating system
User friendly
4 It is difficult to use It is user friendly
because of command because of graphics
Resources requirement
5 CLI does not require high GUI required much
graphics and other resources resources beacuse of
to operate Graphics
EXAMPLE
6 DOS is CLI based Operating Windows 7 is GUI based
system operating system
Difference between CLI and GUI
ApplicationSoftware
Application Software is used to complete specific tasks, such as
creating documents, databases, spreadsheets and
presentations. Computer games, media players and web
browsers are also the examples of application software. User
needs to install application software to accomplish specific
tasks. Application software are not pre- installed on operating
system. They are installed separately. For example, making
spreadsheet is not possible with Windows. For
that application software such as MS Excel is used. There are
different types of application software.
i. Productivity Software
ii. Business Software
iii. Entertainment
Software iv.
Educational
Software
TYPES OF COMPUTER:
Classification of Computers
Technology/ Type
of Data Siz Purpose
Handled e
Genera
Analog Super l
Comput Purpos
er e
Digita
Mainfram Special
e Purpos
l Compute e
r
Hybri Micro
Compute
r
d
Mini
Compute
r
ANALOGUE COMPUTER:
Analogue computers deals with continuously varying physical
quantities such as current, voltage, temperature e.t.c. They are
used for simulating or
monitoring and controlling continuous process in industry or
scientific research. The accuracy of data used in analogue
computer is directly related to the precision of its
measurements.
DIGITAL COMPUTER:
Digital computers represent physical quantities with the help
of digits or numbers. These numbers are used to perform the
arithmetic calculations and also logical decision making to
reach to the conclusion depending on the information that was
collected from the user.
HYBRID COMPUER:
This type of computer combines the characteristics of the both
the analogue computer and the digital
computer. They have speed of analogue computer and the accuracy
of the digital computer and they are equipped with
the special conversion devices It utilizes the
analogue and discrete representation of data.
For example the speed of analogue computer and the memory and
accuracy of digital computer.
DIFFERENCES BETWEEN
ANALOGUEAND DIGITALCOMPUTER:
S.NO ANALOG COMPUTER DIGITAL COMPUTER
REPRESENTATION OF DATA
1 Analog computer represents dataDigital
Continuously
computer represents data discretely a
SIGNAL TYPE
2 Its signal type is continuously using
Its signal
electro
type
magnetic
is sequence
wave of voltage pulses
PURPOSE
3 They are special purpose computer
They are general purpose computer
SPEED
4 They are considered as faster computer
They are
but
slower
their than
output
Analog
is notcomputer
always correct
but th
LAPTOP COMPUTER:
It is the smallest computer in size. It is just look like an office briefcase.
They are also called as portable computer. Due to their small size
and light weight they become popular among the
computer user. They are very useful for the businessman during the
travelling. A typical laptop computer have all the facilities just like
the micro computer. The most smallest laptop are called as
palmtop.
MICRO COMPUTER:
They are basically very small machines, low in price, easy to
operate and they are cheaper and there is no difficulty
in their maintenance. The CPU of the micro computer are called as
micro processor. The micro computer is also known as personal
computer because they are designed for the
personal use of individual at home or the school small business.
MINI COMPUTER:
They are more powerful than micro computers. They are very
popular in multiuser or shared system. In which many user
can utilized the single computer by attaching terminals to it. The
mini computers may be best choice for medium organization. These
computers are used for the scientific and research work.
SUPER COMPUTER:
They are the most powerful and expensive computers. The calculation
needed in scientific research and development areas can be
managed without a super computer that is nuclear physics,
explosions, experimental oil field, satellite controlling. E.t.c.
According to Purpose
According to purpose, computers are either general
purpose or special purpose.
(a) General Purpose Computers
Most computers in use today are General Purpose
Computers. These computers can process variety of
tasks. These computers can
store and execute different programs in
their memory. Therefore, various tasks like word
processing (typing & editing), payrolls, accounts,
inventory
control, manipulating facts in a database, making
scientific calculations and
statistical data analysis, and controlling
security system of an
organizations are achieved by these computers. Desktops,
laptops, tablets and smart phones are examples of General
Purpose Computers.
(ii) Networking
Networking is the act of joining computers and its
accessories so that exchange of information and sharing
of resources take place. In today's world, networking
plays a vital role in computers and telecommunication fields.
Modern organizations create a
networking environment and device
connectivity for fast, inexpensive and reliable communication.
Fundamentalof Topologies
The physical layout in which computers are connected is called
topology. The topology of network describes the way computers are
connected. Topology is a major design consideration for computer
networking.
Client/Server Model:
A client/server model uses on e or more computers as servers, and
the other computers on the network are clients. The server is a
high-capacity, high- speed computer with a large hard disk
capacity. It contains the network operating system, the software
required to run the network. The server also contains network
versions of programs and large data files. Clients-all the computers
that can access the server – send requests to the server. Here are
some common services that clients request.
1. Storing and retrieving files on the server’s hard disk.
2. Running programs that are stored on the server’s hard disk.
3. Printing to a network printer.
The client/server model works with any size topology of LAN and
does not tend to slow down with heavy use.
Peer-to-peer model
The word peer denotes one who is equal in standing with another.
A peer-to- peer LAN is one in which all computers on the network
communicate directly with one another without relying on a server.
Peer-to-peer networks are less expensive than client/server
networks and work effetely for up to 25
computers. Beyond that they slow down under heavy use. They are
thus appropriate for networking in small groups.
Components of a LAN
In addition to computer, local area networks are made up of several
standard components.
1. Connection or cabling system. LANs do not use the telephone
network. Instead, they use some other cabling or connection
system, either wired or optic cable. Wireless connections may
be infrared, radio-wave transmission, Bluetooth, or WiFi
wireless network are especially useful if computers are
portable and are moved often.
2. Microcomputers with Network Interface Cards: Two or more
microcomputers are required, along with network interface
cards. A network interface card enables the computer to
send and receive messages over a cable. Network. They
network card can be inserted into an expansion slot in a PC.
Alternatively, a network card in a stand- alone box may serve
a number of devices.
3. Network Operating System: The network operating system is
the system software that manages the activity of a network.
The network operating system supports access by multiple
users and provides for recognition of users based on
passwords and terminal identification. Depending on
whether the LAN is client/server or peer-to-peer, the
operating system may be stored on the file server, on each
microcomputer on the network, or a combination of both.
Examples of popular network operating system software are
novel’s Netware, Microsoft’s Windows NT/2000, UNIX and Linux.
Peer-to-peer networking can also be accomplished with Microsoft
Windows 95/98/Me/XP or Microsoft Windows for Workgroups.
4. Other Shared Devices: printers, fax machines, Scanners,
storage devices, and other peripherals may be added to
the network as necessary and shared by all users.
Router, Bridges, and Gateways: In principle, a LAN may stand alone.
Today, however, it invariably connects to other networks, especially
the internet.
Network designers determine the types of hardware and software
necessary as interfaces to make these connections. Routers,
bridges, and gateways are used for this purpose.
Chapter# 3
Data Communication
Communicationortelecommunicationsis the process of transmitting
and receiving data across a distance. The data transferred can be
voice, sound, images, video, text, or a combination thereof
(multimedia). It is also the study and application of computer
devices used to transmit and receive data. The three basic
elements of any communication system are:
1. A transmitter (source) which creates the message to be transmitted:
2. A medium through which message or the data is transmitted
from on location to another.
3. A receiver which receives the message.
DATA:
Data is a collection of raw facts and figures. Almost any kind of fact
or set of facts can become computer data: a letter to a friend, text
and pictures for a 200-page book, a budget, a colorful graph, or a
set of employee records.
Characteristics of Data
Transmission
1. Signal type
2. Transmission mode
3. Direction of transmission
Signal Type
Analogue and Digital signal
Data is transmitted by two types of signals, each requiring different kinds of
communication technology. The two types of signals are analogue and digital.
Analogue signals:
Analogue data signals are in the form of continuously varying
waveforms which may be periodic or non-periodic. There are two
factors that govern the characteristics of an analogue signals.
1. Amplitude: Amplitude is the height of a wave on one side of
the equilibrium position. Amplitude is actually the strength or
volume—the loudness of a single. A soft voice has low
amplitude. The amplitude is measured in volts.
2. Frequency: Frequency is the number of times a wave repeats
in a second. Frequency is measure in hertz (Hz) or cycles per
second (c/s). Most telephone lines currently carry an analogue
signal because they are designed to carry voice.
Digitalsignals:
A digital signal uses on/off present/absent electrical pluses in
discrete rather than a continuous waveform. This two-state kind of
signal works perfectly in representing the two-state binary language
of Os and Is that computer use (see Fig. 3.3).
Transmission Modes:
Asynchronous and Synchronous
Data may be sent by asynchronous or synchronous transmission.
Asynchronous Transmission:
In asynchronous transmission, data is sent one byte at a time. Each
byte (which consists of 8 bits is preceded by a “start” bit and a
“stop” bit. In effect, each byte is wrapped in its own “electronic
envelope’. Asynchronous transmission is inexpensive and so is
widely used with microcomputers. However, it is also relatively slow.
Synchronous Transmission
In synchronous transmission, blocks or “packets” of several bytes at
a time are transmitted without “start” or “stop” bits. Header and
trailer bits are inserted at the beginnings and ends of blocks.
Synchronous transmission is used by large computers to transmit
great volumes of data at high speed.
Direction of Transmission
Another characteristic of data transmission is direction. Data is sent
in one direction, or it is sent in two directions in two types of ways.
These three types of transmission are called simplex, half-duplex,
and full-duplex.
Simplex transmission:
In simplex transmission, data is transmitted only in one direction.
Device connected to such a circuit is either a send-only or a receive-
only device.
Half-duplex Transmission
In half-duplex transmission, data communication is two-way, but
the data travels in only one direction at a time.
Full-Duplex Transmission
In full-duplex transmission, data is transmitted in both directions
simultaneously. This method resembles two trains passing in
opposite directions on side-by-side tracks.
Data communication speed and media:
The data-handling capacity of a media is referred to as its band
wish. Bandwidth is the range of frequencies that is available for the
transmission of data. Types of bandwidth are:
1. Narrowband: these media communicate data with relatively
slow speed. Example are telegraph lines.
2. Voice band: these media are faster than narrowband. Most
telephone lines which are used to carry microcomputer
transmission, are voice band.
3. Broadband (also called wideband): these media transmit large
volumes of data at high, speed via microwave, satellite, coaxial
cable, and fiber optic cable.
Communication media refers to the medium through which
data transmission from transmitter to the receiver takes place.
The most common media for data communication are twisted-
pair cable, coaxial cable, fiber optic cable, microwave, and
satellite.
ISO'sOSIModel
The Open Systems Interconnection model is a conceptual model
developed by ISO. It characterizes and standardizes the
communication functions of a telecommunication and computing
network.
This model divides a communication system into seven abstraction layers.
2 Presentation
It receives information from the application
layer and converts it to uniform network
format (ASCII or Unicode) which is
and destination. Encryption and decryption are
also
the responsibility of this layer. This layer
also reduces number of transfer bits by
compression.
3 Session This layer establishes, maintains and ends a
session or logical connection between
applications on two computers. It manages
who can transmit data at a certain time and for
how long. This layer adds
checkpoints. If session fails only data after the
most recent checkpoint need to be
transmitted.
4 Transpor It ensures the reliable transmission of data.
t Transport ow control and quality oflayer
manages error control, the service. If the data
is not properly
transmitted it requests to resend
5 Network The function of this layer is the selection of the
shortest and suitable path from source to
destination, from the number of routes
available. It is
also responsible to convert logical
address (IP address) to physical address
(MAC address).
6 Data This layer is responsible to transmit data using
Link physical addresses. Data Link Layer ensures
error free transmission of packets. Packet in
this layer is
referred as Frame
7 Physical It is responsible for converting electrical
signals into bits. nes the cable types to be used
as transmissionIt also de media, cards,
topology and other physical
aspects
Chapter #4
BooleanAlgebra
BOOLEAN ALGEBRA:
The term Boolean algebra is a convenient and systematic way of
expressing and analyzing the operations of logical circuits.
BOOLEAN CONSTANT:
Boolean algebra uses binary values o and 1 as Boolean constants.
BOOLEAN VARIABLE:
The variable used in the Boolean algebra are represented by letters such
as A, B, C, x, y , z with each variable having one of two and only two
distinct possible values 1 and 0.
BOOLEAN COMPLEMENT:
The complement is the inverse of a variable and it is indicated by a bar
over the variable.
BOOLEAN EXPRESSIONS:
Boolean expression is an arrangement of different variable and logical
operators used to express the operation of logic circuit.
Examples:
̅
AB + A C + ABC
AC + ABC + AB
Whereas A, B, C, D are the variables and the + sign is the logical operator.
TRUTH TABLE:
The truth table is a systematic listing of the values for the dependent
variable in terms of all the possible values of independent variable. It can
also be defined as a table representing the condition of input and output
circuit involving two or more variable.
A B A+ B+
B A
0 0 0 0
0 1 1 1
1 0 1 1
1 1 1 1
LOGICAL OPERATORS:
Following are the different logical operators which are used in Boolean functions.
1. OR
2. AND
3. NOT
OR OPERATOR:
OR operator is represented by the + sign. It is used for the logical addition
or the Boolean sum. The + symbol or the OP operation is used by listing
all possible combinations of for example A and B and the resulting value C
in the equation.
OR
Gate
A B A+ B+
B A
0 0 0 0
0 1 1 1
1 0 1 1
1 1 1 1
AND OPERATOR:
AND operator is represented by a “.” sign. It is used for the logical
multiplication. Example:
AND
Gate
A B A.B B.A
0 0 0 0
0 1 0 0
1 0 0 0
1 1 1 1
NOT operator:
NOT operator is represented by (-) sign. It is used for the logical
inverse. Example If A and B are the variables.
Then
NOT
Gate
A ̅
A
0 1
1 0
DEMORGAN’S THEOREM:
De-morgan is a mathematician who introduce two different important
terms. That becomes the important part of the Boolean algebra. They help
in simplifying the complicated logical expressions.
The Demorgan’s theorems are:
̅ ̅ ̅
A+B = A . B
A B ̅ ̅ A+B ̅ ̅ ̅
A B A+B A.B
0 0 1 1 0 1 1
0 1 1 0 1 0 0
1 0 0 1 1 0 0
1 1 0 0 1 0 0
ii. Co mp ement of product of
of variables
l variabl
es is ways
al equal
to the sum of
complement
̅ ̅ ̅
A.B = A + B
̅ ̅ ̅
A.B = A + B
A B ̅ ̅ A.B ̅ ̅ ̅
A B A.B A+B
0 0 1 1 0 1 1
0 1 1 0 0 1 1
1 0 0 1 0 1 1
LAW OF 1 1 0 0 1 0 0
BOOLEAN ALGEBRA:
Following are three different basic laws of the Boolean algebra.
i. Commutative law
ii. Associative law
iii. Distributive law
COMMUTATIVE LAW:
The commutative law states thattheorderinwhichthevariableareANDedorORed
makesnodifference.
The commutative law of addition and multiplication are as under.
For examples
a. A+B=B+A
b. A.B=B.A
ASSOCIATIVE
LAW:
The associative law states that theadditionandmultiplicationofmorethantwo variablesmakessameresultregardlessofthegroup
For example
a. A+ (B+C) = (A+B) +C
b. A.(B.C) = (A.B).C
DISTRIBUTIVE LAW:
This law states that the ANDing of two variables and then ORing the result
with a variable will result in the same value as ANDing of ORed of the
variable with individual variables
A(B+C) =
AB+AC RULES OF ALGEBRA:
BOOLEAN RULE NO
1:
A+0=A
A variable ORed with 0 is always equal to the
variable. Proof
RULE NO 2:
A variable ORed with 1 is always
equal to 1 RULE NO 3:
A.0=0
A variable ANDed with 0 is always
equal to 0. RULE NO 4:
A.1=A
A variable ANDed with 1 always equal to the
variable RULE NO 5:
A+A=A
A variable ORed with itself is always equal to the
variable. RULE NO 6:
A.A=A
A variable ANDed with itself is always equal to the
variable. RULE NO 7:
̅
A+ A = 1
A variable ORed with its complement is always equal to
11 RULES NO 8:
̅
A. A = 0
A variable ANDed with its complement is always equal
to 0 RULE NO 9:
̿
A =A
The double complement of a variable is always equal to the
variable. RULE NO 10:
A+A.B=A
This rule can be proved by applying the
distributive law. RULE NO 11:
̅
A + A .B = A + B
RULE NO 12:
(A+B).(A+C) = A +
[HINT]:Prove Rules 10--- B.C
12 by Boolean Technique TruthTable.
and
KARNAUGH MAPS:
The Karnaugh map is a type of map that provides the systematic method
to simplify the Boolean expressions and if properly used will produce the
simplest SOP or POS possible expression.
There are two main standard forms of the Boolean
expression. The Sum of Product (SOP)
The Product of sum (POS)
Variants of K-Map
i. 2 Variables
ii. 3 Variables
iii. 4 Variable
2 Variables
3 Variables
4 Variables
Chapter # 5
Components of a Digital Computer
Despite the difference in performance among various types, a digital
computer can be broadly classified as a collection of four basic units. These
are:
Input unit
Output unit
Central processing unit (CPU)
Memory unit
Ablockdiagramrepresentationofaboveisshownin
Input units: the input unit provides an interface between the users and the
machine, for inputting data and instructions etc. one of the most common
examples is the keyboard. Data can be input in many more forms audio,
visual, graphical etc.
Output units: like the input, the output unit also provides an interface
between the user and the machine. A common example is the monitor of
a personal computer. The output unit receives the data from the central
processing unit in the form of binary bits. This is then converted into a
desired form (graphical, audio, visual etc.) understandable by the user.
Central processing unit (CPU): the central processing unit is the brain of
the computer system. It has two principal sections: an arithmetic/logic
unit and a control unit. If also contains several registers and a network of
buses connecting various components. The CPU works closely with
memory unit carryout processing.
MEMORY UNIT: Memory also called main memory, RAM, primary or internal
storage holds.
1. Programs and data passed to the computer system for processing.
2. Intermediate processing results.
3. Output ready for transmission to a secondary-storage or output device.
Addressing of Memory Locations:
The computer has to keep track of all the information stored in its
memory so that it is able to recall the information correctly as and when
required. To understand the procedure of storing and retrieval of
information by a computer, the memory unit may be considered as made
of small compartments, usually called cells of memory locations. In each
of these locations, a computer work (representing a data or an instruction)
can be stored.
Thus, a memory location can hold a data or an instruction. Each of these
locations is assigned a particular number called its address. For example,
if a computer has a memory of 64 K words then this memory unit have
64x1024 = 65,536 memory locations. Each location is storing a computer
word.
These memory locations can be addressed, the addresses varying from 0
to 65, 535, the starting address being taken as zero.
Computer Register:
A register is a temporary storage device which holds data (or an
instruction) as long as it is being manipulated or being interpreted). Each
register with in the CPU performs a specific roles.
Accumulator (AC)
This register is generally referred to as Register AC. It is used for storing
data and for doing arithmetic and logic operations. The result of an
arithmetic or logical operation is automatically stored in this register.
INSTRUCTIONS:
An instruction is an order for the computer to perform a certain specified
operation. It may be an order for computer to read a data item from an
input unit or write a data item through an output unit. On the other hand
an instruction may specify an arithmetic operation such as addition,
subtraction, multiplication or division of two
numbers. Other instructions data internally within the computer. A final
group of instruction is used to compare data and based on these
comparisons computer is capable of taking decisions.
2. ADDRESS
The operations code of an instruction specifies the operation to be
performed. Since the operation is to be performed on data or on a set
of data, the instruction must also tell where the data is stored. The
data may be stored in a register or in a memory location. The data on
which the operation to be formed is called an operation.
A computer instruction contains the following information.
1. Operation to be performed.
2. Address or addresses of memory locations containing the operand
or operands.
3. Address of the register or memory location which is to store the result.
INSTRUCTION FORMATS
The types of commonly used instructions are:
1. Three-Address instruction.
2. Two-address instruction.
3. One-Address instruction.
4. Zero-Address instruction.
Three-AddressInstruction
Address 3
Opcode Address 1 Address 2
(destinatio
n
Address)
DisadvantagesofThree-AddressInstruction:
Certain disadvantages of three-address instruction are:
1. The execution of these instructions is very slow because the CPU
has to access three addresses which consumes a lot of valuable
time of CPU.
2. The available memory of the system is reduced considerably
because more storage locations are needed by each of these
instructions.
3. Some of the instructions may not require address of operand and
also that of destination. For example STOP does not require any
address.
TWO-ADDRESS INSTRUCTION
An improvement over three address instructions was achieved by using
tow-address instructions. In this type of instruction, one operand is placed
in a specified register such as an accumulator and the address of the next
instruction is obtained from another register called program counter (PC).
This implies that such an instruction should have the following parts:
a. Operation code.
b. Address of one of the operands, say Address 1
c. Address of the storage location where the result is to be stored. This address
general form of a two-address instruction is:
One-Address Instruction
The efforts to simplify the instructions continued which resulted in
development of single address instructions. As the name suggests, this
instruction has address of
one operand only, the other operand is stored in Accumulator. The results
of operation are left in the Accumulator itself, from where these can be
moved to main memory by another instruction. The address of the next
instruction is obtained from the program counter as is the case with the
three or two-address instructions. The general form of a one-address
instruction is:
Opcode Address 1
Zero-Address Instruction
Finally zero-address instruction were developed. These zero-address
instructions are also called stack instructions and consist of opcode only.
The addresses of operand and destination are implied. The general form a
of zero-address instruction is
Opcode
Fetch Cycle:
The fetch cycle is that duration of time in which an instruction stored in
the memory is brought to an appropriate register, all the happening under
the commands from control unit of the CPU. The process of bringing an
instruction from memory to a register is called a fetch cycle and has to be
completed in a specified duration of time.
Execute Cycle:
The process of execution of an instruction by the CPU in a specified interval of time
is called execute cycle. The instruction fetched from memory in placed in
a register where it is decoded and executed by ALU (Arithmetic/Logic Unit)
in this execute cycle.
The CPU when fetching an instruction is said to be in fetch stage.
Chapter
06 SECURITY,COPYRIGHTAND THE LAW
Computer Crime:
Computer crime is often defined as any crime accomplished through
knowledge or use of computer technology. Although the types of
computer- related crimes are numerous and widespread, a few
categories of online criminal activity continue to attract the most
attention and affect the most people.
Those activities include the
Softwarepiracy, theftofhardware, theftoftimeandservices, hackingand
electronictrespassingandthespreadingofcomputerviruses.
Software piracy:
Software piracy is the illegal duplication of copyright software. Millions of
computer users have made copies of programs they don’t legally
down in most cases, copying software is as easy as duplicating a
cassette tape or photocopying a book. Software pirates give up the
right to receive upgrades and technical support, but they gain the
sue of the program without paying for it.
Theft of hardware:
The appearance of small, lightweight microcomputers and laptops throughout
organizations greatly simplified this type of theft. Professional
criminals can steal a laptop or cellular phone from someone’s car.
They can also steal shipment of microprocessor chips off a loading
dock.
Hacking:
Hacker can be a person who has in-depth knowledge of computer systems,
networks, and programs. Hacker may be someone who uses his or
her extensive skills to identify and overcome a network loophole.
Hackers constantly seek further knowledge and freely share what
they have discovered, but hackers can also help us to improve the
data and network security.
Government and business organizations are now hiring ethical
hackers, also known as white hat hackers, to prevent data theft.
Computer Viruses:
A computer viruses is a program designed to alter or destroy the
data stored on a computer system. Computer viruses can be passed
from one computer to another on floppy disks, over networks, and
over remote modern connections.
Worm:
A worm is a program whose purpose is to duplicate itself. An
effective worm will fill entire disks with copies of itself.
Trojanhorse:
‘A Trojan horse refers to illegal instructions covertly placed in the middle
of a useful program. The program does do something useful
but also, via the Trojan horse instructions, does something
destructive in the background.
TimeBombs:
Time bombs and logic bombs are designed to sit harmlessly on a
system until a certain event or data causes the program to
become active.
Fileinfectors:
Most viruses are file infectors that speared from program to program
and do damage to files (such as EXE or COM files), data, and directories.
ANTI VIRUS:
Anti Virus is a type of software that is used to remove the virus program
from the disk. Anti virus software have been developed to get
rid of the computer virus that can destroy the valuable
data and causes the computer to malfunction. Some of the anti
virus programs are Norton anti virus MacAfee PC clean AVG
Past papers questions
Q.1 Define Search engine?
i)SEARCH ENGINE: search A engine is an engine which contains information
and detail of different field of world. It is a complete database of what is on the
web because the database is compiled automatically. A search engine uses
software agents, sometimes called spiders or software robots to explore the web
to retrieve information and add it to the database. To find information with
search engine, user type a query using keywords.
Example: Alta vista, Hot bot, Google.
ii) MODEM: The Modem is the device that is used to convert digital data
into analog and vice versa. The simplest form of data transmission involve the
connection of terminal to a computer via telephone line. Computer generates
data in digital signals while telephone line uses analog signal, therefore, there is
a need to convert digital signals into analog form the technique by which a data
signal can convert into analog signal is called Modulation, while reverse process
is called De-modulation.
& TYPES:
iii) R ITS Rom stands for Read Only Memory. It is built in computer
OM
memory containing data that normally can be read only. It is also called Non-
volatile memory that its data is not lost when computer power is turned off.
TYPES:
i. PROM
ii. EPROM
iii. EEPROM
Q.9 What are scanning devices? Name some backup storage devices?
SCANNING DEVICES:
Scanning devices are light sensitive equipment to record data in the form of barcode, optical
marks or ever just plain text of graphics. This data is then converted into
electronic form that can be processed by computer.
BACKUP STORAGE DEVICES: floppy disk, CD, USB, hard disk.
ADVANTAGES:
i. Sharing of Data: Network enables user to share files with others.
ii. Centralized Data: different departments of an organization may be
separated physically, but their data can be stored on central computer by
network which is accessed by computers located in different departments.
iii. Sharing of Equipment: Network also enables users to share equipment like
printers and large hard disk.
iv. Improves communications: it also improves communications speed and accuracy.
Cache
A component in the computer that stores dataRAMso that future requests for that data can be serv
Faster A form of computer data storage
Expensive
that stores data and machine
Capacity is lower
code currently being used
Holds frequently used data by the
Not as fast
Not as expensive
Capacity is higher
WORD PROCESSOR SPREAD Holds programs and data that
SHEET
i. It is computerized type writer i. It isare
a program used to
Q.19 Difference between word processor and
used spreadsheet?
manipulate
to create different writer data in tabular form.
documents.
ii. It is used to enter, store, modify, ii. We can implement calculation
format, copy and print text. function in spreadsheet program.
iii. They are used to create letters, iii. It is used to create financial
memos, proposals, term papers report, salary sheet, Mark sheet,
and and documents
documents like this. like this.
iv. Example: MS-WORD, Word iv. Example: MS-EXCEL, super calc.
prefect.
Q.18 Define the term word.
Ans: like a byte, computer word is also a combination of fixed number of bits, it
is another basic unit of memory. It is similar to a byte moreover a computer
word is fixed for each computer and varies from computer to computer.
Computer stores information in the form of word known as word length.