computer architecture
computer architecture
2 RAID
RAID (Redundant Arrays of Independent Disks) is a technique that makes use
of a combination of multiple disks for storing the data instead of using a
single disk for increased performance, data redundancy, or to protect data in
the case of a drive failure. The term was defined by David Patterson, Garth A.
Gibson, and Randy Katz at the University of California, Berkeley in 1987. In
this article, we are going to discuss RAID and types of RAID their
Advantages and disadvantages in detail.
What is RAID?
RAID (Redundant Array of Independent Disks) is like having backup copies of
your important files stored in different places on several hard drives or
solid-state drives (SSDs). If one drive stops working, your data is still safe
because you have other copies stored on the other drives. It’s like having a
safety net to protect your files from being lost if one of your drives breaks
down.
Software Based: In software-based RAID, the controller doesn’t have its own
special hardware. So it use computer’s main processor and memory to do its
job. It perform the same function as a hardware-based RAID controller, like
managing the hard drives and keeping your data safe. But because it’s
sharing resources with other programs on your computer, it might not make
things run as fast. So, while it’s still helpful, it might not give you as big of a
speed boost as a hardware-based RAID system
Firmware Based: Firmware-based RAID controllers are like helpers built into
the computer’s main board. They work with the main processor, just like
software-based RAID. But they only implement when the computer starts up.
Once the operating system is running, a special driver takes over the RAID
job. These controllers aren’t as expensive as hardware ones, but they make
the computer’s main processor work harder. People also call them
hardware-assisted software RAID, hybrid model RAID, or fake RAID.
uptime mode, i.e. how available is the system for actual use?
RAID is very transparent to the underlying system. This means, that to the
host system, it appears as a single big disk presenting itself as a linear array
of blocks. This allows older technologies to be replaced by RAID without
making too many changes to the existing code.
● RAID-1 (Mirroring)
Raid Controller
1. RAID-0 (Stripping)
● Instead of placing just one block into a disk at a time, we can work
with two (or more) blocks placed into a disk before moving on to the
next one.
Raid-0
Evaluation
● Reliability: 0
recovered.
● Capacity: N*B
Advantages
● It is easy to implement.
Disadvantages
● A single drive loss can result in the complete failure of the system.
● It’s not a good choice for a critical system.
2. RAID-1 (Mirroring)
● More than one copy of each block is stored in a separate disk. Thus,
every block has two (or more) copies, lying on different disks.
Raid-1
capable of reliability.
Evaluation
Assume a RAID system with mirroring level 2.
● Reliability: 1 to N/2
1 disk failure can be handled for certain because blocks of that disk
would have duplicates on some other disk. If we are lucky enough
and disks 0 and 2 fail, then again this can be handled as the blocks
of these disks have duplicates on disks 1 and 3. So, in the best case,
● Capacity: N*B/2
Only half the space is being used to store data. The other half is just
Advantages
● It covers complete redundancy.
Disadvantages
● It is highly expensive.
● In Raid-2, the error of the data is checked at every bit level. Here, we
use Hamming Code Parity Method to find the error in the data.
technique. One word is used to store bits of each word and another
Disadvantages
● It has a complex structure and high cost due to extra drive.
● Here Disk 3 contains the Parity bits for Disk 0, Disk 1, and Disk 2. If
Advantages
● Data can be transferred in bulk.
Disadvantages
● It requires an additional drive for parity.
Raid-4
● In the figure, we can observe one column (disk) dedicated to parity.
● Parity is calculated using a simple XOR function. If the data bits are
0,0,0,1 the parity bit is XOR(0,0,0,1) = 1. If the data bits are 0,1,1,0
results in parity 1.
Raid-4
● Assume that in the above figure, C3 is lost due to some disk failure.
values of all the other columns and the parity bit. This allows us to
Evaluation
● Reliability: 1
way parity works). If more than one disk fails, there is no way to
● Capacity: (N-1)*B
One disk in the system is reserved for storing the parity. Hence,
(N-1) disks are made available for data storage, each disk having B
blocks.
Advantages
● It helps in reconstructing the data if at most one data is lost.
Disadvantages
● It can’t help reconstructing data when more than one is lost.
Evaluation
● Reliability: 1
way parity works). If more than one disk fails, there is no way to
● Capacity: (N-1)*B
Hence, (N-1) disks are made available for data storage, each disk
having B blocks.
Advantages
● Data can be reconstructed using parity bits.
Disadvantages
● Its technology is complex and extra space is required.
● Raid-6 helps when there is more than one disk failure. A pair of
this level. Ideally, you need four disk drives for this level.
● There are also hybrid RAIDs, which make use of more than one
RAID level nested one after the other, to fulfill specific requirements.
Raid-6
Advantages
● Very high data Accessibility.
Disadvantages
● Due to double parity, it has slow write data transactions.
Advantages of RAID
● Data redundancy: By keeping numerous copies of the data on many
Disadvantages of RAID
● Cost: RAID implementation can be costly, particularly for arrays with
large capacities.
challenging.
● Decreased performance: The parity calculations necessary for some
decrease in speed.
Conclusion
In Conclusion, RAID technology in database management systems distributes
and replicates data across several drives to improve data performance and
reliability. It is a useful tool in contemporary database setups since it is
essential to preserving system availability and protecting sensitive data.
Interrupt
Interrupts play a crucial role in computer devices by allowing the processor to
react quickly to events or requests from external devices or software. In this
article, we are going to discuss every point about interruption and its various
types in detail.
What is an Interrupt?
The interrupt is a signal emitted by hardware or software when a process or
an event needs immediate attention. It alerts the processor to a high-priority
process requiring interruption of the current working process. In I/O devices
one of the bus control lines is dedicated for this purpose and is called the
Interrupt Service Routine (ISR).
When a device raises an interrupt at let’s say process i, the processor first
completes the execution of instruction i. Then it loads the Program Counter
(PC) with the address of the first instruction of the ISR. Before loading the
Program Counter with the address, the address of the interrupted instruction
is moved to a temporary location. Therefore, after handling the interrupt the
processor can continue with process i+1.
While the processor is handling the interrupts, it must inform the device that
its request has been recognized so that it stops sending the interrupt request
signal. Also, saving the registers so that the interrupted process can be
restored in the future, increases the delay between the time an interrupt is
received and the start of the execution of the ISR. This is called Interrupt
Latency.
Types of Interrupt
Event-related software or hardware can trigger the issuance of interrupt
signals. These fall into one of two categories: software interrupts or
hardware interrupts.
1. Software Interrupts
2. Hardware Interrupts
is enabled when the bit is set and disabled when the bit is clear, but
● The device is informed that its request has been recognized and the
Step 1:- Any time that an interrupt is raised, it may either be an I/O interrupt
or a system interrupt.
Step 2:- The current state comprising registers and the program counter is
then stored in order to conserve the state of the process.
Step 3:- The current interrupt and its handler is identified through the
interrupt vector table in the processor.
Step 4:- This control now shifts to the interrupt handler, which is a function
located in the kernel space.
Step 5:- Specific tasks are performed by Interrupt Service Routine (ISR) which
are essential to manage interrupt.
Step 6:- The status from the previous session is retrieved so as to build on
the process from that point.
Step 7:- The control is then shifted back to the other process that was
pending and the normal process continues.
● Polling: In polling, the first device encountered with the IRQ bit set
processor over the bus. This enables the processor to identify the
device that generated the interrupt. The special code can be the
interrupt requests.
● Interrupt Acknowledgment: Upon detecting an interrupt request,
program.
handler ordinary with the aid of placing this system counter (PC) to
vector desk.
to the active level and maintains it there. When the CPU instructs it
to do so, usually after the device has been serviced, it denies the
signal.
Benefits of Interrupt
● Real-time Responsiveness: Interrupts permit a system to reply
processing.
concurrently.
Conclusion
● The events known as interrupts alert the CPU to handle the request.
hardware interrupts.
Auxiliary memory
Magnetic Disks
All disks revolve together at high speed and are not stopped or initiated for
access purposes. Bits are saved in the magnetized surface in marks along
concentric circles known as tracks. The tracks are frequently divided into areas
known as sectors.
In this system, the lowest quantity of data that can be sent is a sector. The
subdivision of one disk surface into tracks and sectors is displayed in the figure.
Magnetic Tape
Bits are listed as a magnetic stain on the tape along various tracks. There are
seven or nine bits are recorded together to form a character together with a
parity bit. Read/write heads are mounted one in each track therefore that
information can be recorded and read as a series of characters.
Magnetic tape units can be stopped, initiated to move forward, or in the
opposite, or it can be reversed. However, they cannot be initiated or stopped
fast enough between single characters. For this reason, data is recorded in
blocks defined as records. Gaps of unrecorded tape are added between records
where the tape can be stopped.
The tape begins affecting while in a gap and achieves its permanent speed by
the time it arrives at the next record. Each record on tape has a recognition bit
design at the starting and end. By reading the bit design at the starting, the
tape control recognizes the data number.
System?
Virtual address space refers to the room of addresses which usually refers
processes. Operating systems allocate this set of addresses for the processes
to use in order to access their designated virtual memory. The address space
operating system’s processes each have their own distinct virtual memory
space, where all of their addresses are kept. Every process, therefore, creates
the illusion that they have dedicated physical memory as a result of this
characteristic.
Operating System
● Page: A page is a fixed-size memory block that is used to manage
virtual memory.
memory frames.
space.
Paging
processes in the form of pages from the secondary storage into the main
procedure into pages. Additionally, frames will be used to split the main
memory. This scheme permits the physical address space of a process to be
non – contiguous.
In paging, the physical memory is divided into fixed-size blocks called page
frames, which are the same size as the pages used by the process. The
process’s logical address space is also divided into fixed-size blocks called
pages, which are the same size as the page frames. When a process requests
memory, the operating system allocates one or more page frames to the
process and maps the process’s logical pages to the physical page frames.
The mapping between logical pages and physical page frames is maintained
translate logical addresses into physical addresses. The page table maps
through the CPU and used by a technique to get the right of entry to
to the reminiscence.
● Physical Address Space: This is the set of all bodily addresses that
In a paging scheme, the logical deal with the region is cut up into
corresponding body within the physical deal with the vicinity. The going for
walks tool keeps a web internet web page desk for every method, which
When a method accesses memory, the CPU generates a logical address, that
is translated to a bodily address using the net page table. The reminiscence
controller then uses the physical cope to get the right of entry to the
reminiscence.
Management
● Logical to bodily address mapping: In paging, the logical address
● Fixed web page and frame length: Paging makes use of a set web
● Page desk entries: Each page within the logical address area of a
● Page table stored in important memory: The web page desk for
for green get right of entry to and change by the operating device.
However, this could additionally introduce overhead, because the
It breaks physical memory into fixed-size blocks called “frames” and logical
memory into blocks of the same size called “pages.” When a program runs,
its pages are loaded into any available frames in the physical memory.
uniform. Each program has a page table, which the operating system uses to
program accesses data, the system uses this table to convert the program’s
Paging allows for better memory use and makes it easier to manage. It also
loaded into memory only when needed. This way, even large programs can
= 2 G words (1 G = 230)
● If Logical Address Space = 128 M words = 27 * 220 words, then
● The Logical Address Space is also split into fixed-size blocks, called
pages.
Example
● Physical Address = 12 bits, then Physical Address Space = 4 K
words
In a paging scheme, the physical cope with the area is divided into
manner is running, its logical address space is split into constant-size pages,
which might be mapped to corresponding frames within the physical address
space.
Frame Range: This is the variety of the frame within the physical cope with
the area that consists of the byte or phrase being addressed. The wide
variety of bits required to represent the body range relies upon the scale of
the physical cope with the area and the size of each frame. For instance, if the
physical cope with area carries 2^20 frames and each frame is 4KB (2^12
bytes) in size, then the frame range could require 20-12 = 8 bits.
Frame Offset: This is the wide variety of the byte or word within the body
this is being addressed. The number of bits required to represent the frame
offset relies upon the size of every frame. For instance, if everybody is 4KB in
size, then the frame offset could require 12 bits. So, a physical address in this
returned.
divided into fixed-size blocks called pages, and processes are allocated
memory in terms of these pages. Each page is of the same size, and the size
blocks (pages), which might be usually a whole lot smaller than the
size of the process’s facts segments. This lets in for greater efficient
use of memory in view that there are fewer unused bytes in each
block.
effectively allocated when it’s far needed. This allows for extra
efficient use of memory in view that only the pages that are
physical memory.
● Protection and sharing of memory: Paging allows for the
procedure has its own web page table that maps its logical deal
table for each manner and perform a deal with translation whenever
CPU for each page and physical address is the real address of the frame
requires physical address for accessing the page. Logical address comprises
Conclusion
In conclusion, paging is a memory management technique that helps
breaks the memory into small, fixed size chunks called pages. It helps in
System?
● The Virtual Address Space’s working starts with the allocation of
● The Virtual Address Space has two spaces and their individual jobs.
when needed.
● All the process variables and data of the process are stored in the
● The operating system uses the Page Table to get the virtual address
● The Virtual Addresses have both the virtual page number of the
individual pages and the page offset which is used to combine with
the physical page number from the page table to get the actual
physical address.
● When the required page is not present in the Physical memory the
OS fetched it from the secondary memory which is the hard disk and
Systems.
CPU [Central Processing Unit]. It is the brain of the computer. It is the part
that does most of the work in a computer system. Just like how our brain
controls our body and processes information, the CPU carries out instructions
computing device.
storage functions for a computer system. A CPU can be installed into a CPU
socket. These sockets are generally located on the motherboard. CPU can
perform various data processing operations. CPU can store data, instructions,
● Control Unit
As the name suggests this unit can store instructions, data, and intermediate
unit or the main memory or the primary storage or Random Access Memory
memory in the computer, which are primary memory and secondary memory.
● Data and instructions are stored in memory units which are required
for processing.
● The final results of processing are stored in the memory units before
these results are released to an output device for giving the output
to the user.
● All sorts of inputs and outputs are transmitted through the memory
unit.
Control Unit
As the name suggests, a control unit controls the operations of all parts of
the computer but it does not carry out any data processing operations.
the memory unit and then decodes the instructions after that it executes
those instructions. So, it controls the functioning of the computer. Its main
task is to maintain the flow of information across the processor. Some main
● The control unit is responsible for managing all the units of the
computer.
● The main task of the control unit is to obtain the instructions or data
that is input from the memory unit, interpret them, and then direct
storing data.
Note: The CPU may contain more than one ALU and it can be used for
produce an output. CPU work Fetch, Decode, and Execute are the
● Fetch: the first CPU gets the instruction. That means binary
● Execute: After the decode step the instructions are ready to execute.
● Store: After the execute step the instructions are ready to store in
the memory.
Parallel processing
instruction can be read from memory. The system can have two or more
processing capacity and increases with parallel processing, and with it, the
Shift registers
work one bit at a time in a serial fashion, while parallel registers work
simultaneously with all bits of the word. At high levels of complexity, parallel
arithmetic, shift and logic operations can be divided into three units and
Floating-point operations
can be divided into three circuits operating in parallel. Logic, shift, and
are independent of each other, therefore one number is shifted while another
throughput.
storing operations just like a multiplication command will do stuff like loading
● Instruction may take more than a single clock cycle to get executed.
Advantages of CISC
● Widely used: CISC processors have been in use for a longer time
than RISC processors, so they have a larger user base and more
available software.
Disadvantages of CISC
● Slower execution: CISC processors take longer to execute
manufacture.
sets.
The main idea behind this is to simplify hardware by using an instruction set
composed of a few basic steps for loading, evaluating, and storing operations
just like a load command will load data, a store command will store the data.
Characteristics of RISC
Advantages of RISC
processors.
Disadvantages of RISC
RISC CISC
which directs the operation of the processor. It was included as part of the
the control unit to tell the computer’s memory, arithmetic/logic unit, and
input and output devices how to respond to the instructions that have been
sent to the processor. It fetches internal instructions of the programs from the
main memory to the processor instruction register, and based on this register
contents, the control unit generates a control signal that supervises the
information which it converts into control signals, which are then sent to the
central processor. The computer’s processor then tells the attached hardware
what operations to perform. The functions that a control unit performs are
dependent on the type of CPU because the architecture of the CPU varies
● It interprets instructions.
● Hardwired
In the Hardwired control unit, the control signals that are important for
logical circuits, in which we can not modify the signal generation method
instruction contains the basic data for control signal generation. In the
instruction opcode.
As a result, few output lines going out from the instruction decoder obtains
active signal values. These output lines are connected to the inputs of the
matrix that generates control signals for execution units of the computer.
This matrix implements logical combinations of the decoded signals from the
instruction opcode with the outputs from the matrix that generates signals
representing consecutive control unit states and with signals coming from
the outside of the processor, e.g. interrupt signals. The matrices are built in a
single time point but during the entire time interval that corresponds to the
instruction execution cycle. Following the structure of this cycle, the suitable
signals generated by the control signal generator matrix are sent back to
This matrix combines these signals with the timing signals, which are
control unit, the control units is in the initial state of new instruction fetching.
Instruction decoding allows the control unit enters the first state relating
execution of the new instruction, which lasts as long as the timing signals
and other input signals as flags and state information of the computer remain
unaltered.
A change of any of the earlier mentioned signals stimulates the change of the
control unit state. This causes that a new respective input is generated for
the control signal generator matrix. When an external signal appears, (e.g. an
interrupt) the control unit takes entry into a next control state that is the
state concerned with the reaction to this external signal (e.g. interrupt
processing).
The values of flags and state variables of the computer are used to select
suitable states for the instruction execution cycle. The last states in the cycle
are control states that commence fetching the next instruction of the
program: sending the program counter content to the main memory address
buffer register and next, reading the instruction word to the instruction
that ends program execution, the control unit enters an operating system
of the hardwired control unit is the existence of the control store that is used
instruction words are fetched into the instruction register in a normal way.
generator.
The last mentioned field decides the addressing mode (addressing
be much shorter than with the single level control store. It gives a
pipeline and minimizing the number of clock cycles required for each
instruction.
complex workloads.
● Lower cost: A well-designed control unit can reduce the cost of the
maintain.
registers and memory, and requiring more clock cycles for each
instruction.
complex workloads.
● Poor support for parallelism: A poorly-designed control unit may
injection attacks.
manufacturing complexity.
1.4
The method that is used to transfer information between internal storage and
external I/O devices is known as I/O interface. The CPU is interfaced using
between CPU and peripherals to supervise and synchronize all the input and
Mode of Transfer:
The binary information that is received from an external device is usually
stored in the memory unit. The information that is transferred from the CPU
to the external device is originated from the memory unit. CPU merely
processes the information but the source and target is always the memory
unit. Data transfer between CPU and the I/O devices may be done in different
modes. Data transfer to and from the peripherals may be done in any of the
1. Programmed I/O.
Example of Programmed I/O: In this case, the I/O device does not
have direct access to the memory unit. A transfer from I/O device to
CPU and store instruction to transfer the data from CPU to memory.
In programmed I/O, the CPU stays in the program loop until the I/O
discussed below.
2. Interrupt- initiated I/O: Since in the above case we saw the CPU is
In the meantime the CPU can proceed for any other program
program to process the I/O transfer, and then return to the task it
1. The I/O transfer rate is limited by the speed with which the
transfer.
3. Terms:
address.
them.
synchronous interrupts.
idle and it has no control over the memory buses. The DMA
3. Release the control of the bus back to CPU So, total time
5. Inform the CPU that the device has 1 byte to transfer (i.e. bus grant
request)
Advantages:
with external devices. This means that different devices can be connected to
a computer using the same interface, which makes it easier to swap out
from a computer without affecting the other components. This makes it easier
to upgrade or replace a faulty device without affecting the rest of the system.
Efficiency: I/O interfaces can transfer data between the computer and the
external devices at high speeds, which allows for faster data transfer and
processing times.
range of devices, which means that users can choose from a variety of
Disadvantages:
users who are not familiar with the technical aspects of computer hardware.
with a wide range of devices, there can still be compatibility issues with
Security risks: I/O interfaces can be a security risk if they are not properly
information between the internal storage devices i.e. memory and the
and output for the computer, it is also called Input-Output devices. For
Example: A keyboard and mouse provide Input to the computer are called
input devices while a monitor and printer that provide output to the computer
are called output devices. Just like the external hard-drives, there is also
availability of some peripheral devices which are able to provide both input
and output.
Input-Output Interface
to provide special communication links for the interfacing them with the
CPU. To resolve the differences between peripheral devices and CPU, there is
and CPU.
3. In peripheral devices, data code and formats are differ from the
between CPU and peripheral devices to supervise and synchronize all input
input-output devices.
I/O Request
I/O request packets are basically used for communications between the device
drivers and the operating system. It allows a particular process to get unblocked
and be completely executed.
In the first step, a process is initiated that issues a blocking read on the file
descriptor of a previously used file. The code of the operating system or the
kernel has a system-call code that works towards checking the accuracy of the
parameters. If the buffer cache already has the data, then the data is returned
and the request is completed. In the situation that the data is not found in the
buffer cache, a physical I/O is performed. This ensures that the process is
removed from the run queue and placed in the wait queue. Thereafter, the
device driver receives the request through the I/O subsystem. It is up to the
device driver then to make space for the incoming data and schedule I/O. The
device controller then works on the device hardware to carry out the process of
data transfer. The DMA controller manages and operates the transfer of data to
the kernel memory. When the transfer is finished, this creates an interrupt which
is received by an interrupt handler through the interrupt-vector table. It scans
the data for important information and then returns the interrupt. This signal is
then received by the device driver, which completes the request and also
determines the status of the request. Lastly, it is up to the kernel to remove the
process from the wait queue into the ready queue and the data is transferred to
the address space. This step unblocks the process. So now, when the process is
assigned to the CPU, it resumes work and is completed.
Input devices are the devices that are used to send signals to the computer
for performing tasks. The receiver at the end is the CPU (Central Processing
Unit), which works to send signals to the output devices. Some of the
● Keyboard Devices
● Pointing Devices
● Composite Devices
● Game Controller
● Visual Devices
Keyboard
The keyboard is the most frequent and widely used input device for entering
data into a computer. Although there are some additional keys for performing
currently keyboards with 104 keys or 108 keys are also available for
Types of Keys
● Typing Keys: The letter keys (A-Z) and number keys (09) are among
these keys.
● Control Keys: These keys control the pointer and the screen. There
keys (Esc).
● Special Keys: Enter, Shift, Caps Lock, NumLk, Tab, etc., and Print
● Function Keys: The 12 keys from F1 to F12 are on the topmost row
of the keyboard.
Mouse
The most common pointing device is the mouse. The mouse is used to move
a little cursor across the screen while clicking and dragging. The cursor will
stop if you let go of the mouse. The computer is dependent on you to move
A mouse is an input device that lets you move the mouse on a flat surface to
The left mouse button can be used to select or move items, while the right
Mouse
Joystick
A joystick is a pointing device that is used to move the cursor on a computer
screen. A spherical ball is attached to both the bottom and top ends of the
stick. In a socket, the lower spherical ball slides. You can move the joystick in
Joystick
Track Ball
Track Ball is an accessory for notebooks and laptops, which works on behalf
Light Pen
A light pen is a type of pointing device that looks like a pen. It can be used to
optical system are enclosed in a tiny tube. When the tip of a light pen is
moved across a monitor screen while the pen button is pushed, the photocell
sensor element identifies the screen location and provides a signal to the
CPU.
Light Pen
Scanner
A scanner is an input device that functions similarly to a photocopier. It’s
the computer’s hard disc for subsequent manipulation. The scanner collects
images from the source and converts them to a digital format that may be
saved on a disc. Before they are printed, these images can be modified.
Scanner
printed text. OCR optically scans the text, character by character turns it into
It is a device that is generally used in banks to deal with the cheques given to
the bank by the customer. It helps in reading the magnetic ink present in the
code number and cheque number. This process is very fast compared to any
other process.
A bar code reader is a device that reads data that is bar-coded (data that is
mark things, number books, and so on. It could be a handheld scanner or part
of a stationary scanner. A bar code reader scans a bar code image, converts it
connected.
Bar Code Reader
Web Camera
Because a web camera records a video image of the scene in front of it, a
webcam is an input device. It is either built inside the computer (for example,
camera because it can take images and record video. These cameras come
video in real-time over the Internet. It can shoot images and HD videos,
however, the video quality isn’t as good as other cameras (In Mobiles or other
Digitizer
Microphone
The microphone works as an input device that receives input voice signals
and also has the responsibility of converting it also to digital form. It is a very
Output Devices are the devices that show us the result after giving the input
graphic audio, video, etc. Some of the output devices are described below.
Monitor
sharpness.
The two kinds of viewing screens used for monitors are described below.
elements that make up a CRT display. The higher the image quality
wrist.
Television
Television is one of the common output devices which is present in each and
every house. It portrays video and audio files on the screen as the user
Printer
Printers are output devices that allow you to print information on paper.
● Impact Printers
● Character Printers
● Line Printers
● Non-Impact Printers
● Laser Printers
● Inkjet Printers
Printer
Impact Printer
the paper, in impact printers. The following are the characteristics of impact
printers:
● Quite noisy
Character Printer has the capability to print only one character at a time. It is
of two types.
● Daisy Wheel
Line Printers
Line Printers are printers that have the capability to print one line at a time. It
is of two types.
● Drum Printer
● Chain Printer
Non-Impact Printers
Characters are printed without the need for a ribbon in non-impact printers.
Because these printers print a full page at a time, they’re also known as Page
● Faster
● Excellent quality
Laser Printers
Laser Printers use laser lights for producing dots which will produce
Inkjet Printers
Inkjet printers are printers that use spray technology for printing papers.
printing.
Speakers
Speakers are devices that produce sound after getting a command from a
Bluetooth speakers.
Projector
Projectors are optical devices that have the work to show visuals on both
Plotter
Plotter is a device that helps in making graphics or other images to give a real
view. A graphic card is mandatorily required to use these devices. These are
the pen-like devices that help in generating exact designs on the computer.
Braille Reader
Braille Reader is a very important device that is used by blind users. It helps
people with low vision or no vision to recognize the data by running their
fingers over the device to understand easily. It is a very important device for
Video Card
A video Card is a device that is fitted into the motherboard of the computer. It
Headphones
large areas. These are also called headsets having a lower sound frequency.
There are so many devices that contain the characteristics of both input and
output. They can perform both operations as they receive data and provide
USB Drive
USB Drive is one of the devices which perform both input and output
operations as a USB Drive helps in receiving data from a device and sending
it to other devices.
Modem
Modems are one of the important devices that helps in transmitting data
CD and DVD
CD and DVD are the most common device that helps in saving data from one
computer in a particular format and send data to other devices which works
Headset
Facsimile
A facsimile is a fax machine that consists of a scanner and printer, where the
scanner works as an input device and the printer works as an output device.