0% found this document useful (0 votes)
9 views12 pages

Computer Basics - Von Neumann Architecture. Centr..

The document provides an overview of computer basics, including the Von Neumann architecture, CPU components, memory hierarchy, and types of memory such as RAM and ROM. It discusses the evolution and classification of computers, their applications across various fields, and the significance of number systems in computing. Key characteristics of computers, such as speed, accuracy, and reliability, are also highlighted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views12 pages

Computer Basics - Von Neumann Architecture. Centr..

The document provides an overview of computer basics, including the Von Neumann architecture, CPU components, memory hierarchy, and types of memory such as RAM and ROM. It discusses the evolution and classification of computers, their applications across various fields, and the significance of number systems in computing. Key characteristics of computers, such as speed, accuracy, and reliability, are also highlighted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Let's break down each of these computer basics topics in detail.

Computer Basics:
1. Von Neumann Architecture
The Von Neumann architecture, also known as the Princeton architecture, is a fundamental
design for electronic digital computers. It was conceived by mathematician John von Neumann
in 1945.
Key Features:
●​ Stored Program Concept: Both instructions (program) and data are stored in the same
memory space. This allows the computer to easily modify its own programs, a powerful
concept that enables general-purpose computing.
●​ Sequential Execution: Instructions are typically fetched and executed one after another
from memory.
●​ Single Address Space: A single bus is used for both data and instructions. This means
that at any given time, the CPU can either fetch an instruction or fetch/store data, but not
both simultaneously. This can lead to a bottleneck, known as the "Von Neumann
bottleneck."
Components:
●​ Central Processing Unit (CPU): The "brain" of the computer that executes instructions.
○​ Arithmetic Logic Unit (ALU): Performs arithmetic operations (addition,
subtraction, etc.) and logical operations (AND, OR, NOT).
○​ Control Unit (CU): Directs and coordinates the operations of the computer,
fetching instructions from memory, decoding them, and then executing them.
○​ Registers: Small, high-speed storage locations within the CPU used to temporarily
hold data and instructions during processing.
●​ Memory Unit: Stores both data and instructions.
●​ Input/Output (I/O) Unit: Facilitates communication between the computer and the
outside world (e.g., keyboard, mouse, monitor, printer).

2. Central Processing Unit (CPU)


As mentioned above, the CPU is the "brain" of the computer, responsible for executing
instructions and carrying out the bulk of the processing.
Components (as part of Von Neumann):
●​ Arithmetic Logic Unit (ALU): Performs all arithmetic computations (addition, subtraction,
multiplication, division) and logical comparisons (AND, OR, NOT, XOR, greater than, less
than, equal to).
●​ Control Unit (CU): The conductor of the CPU. It fetches instructions from memory,
decodes them (understands what the instruction means), and then controls the flow of
data within the CPU and between the CPU and other components to execute the
instruction. It generates control signals to coordinate operations.
●​ Registers: High-speed storage locations directly within the CPU. They are used to
temporarily hold data, instructions, memory addresses, and the results of computations
that are currently being processed. Examples include:
○​ Program Counter (PC): Holds the memory address of the next instruction to be
fetched.
○​ Instruction Register (IR): Holds the instruction currently being executed.
○​ Accumulator (AC): Stores the results of ALU operations.
○​ Memory Address Register (MAR): Holds the address of the memory location to
be accessed.
○​ Memory Data Register (MDR): Holds the data to be written to or read from
memory.

3. Memory Hierarchy
Memory hierarchy is a way to organize and manage computer memory based on speed, cost,
and capacity. The goal is to provide the CPU with fast access to data while keeping the overall
cost down.
Levels (typically from fastest/most expensive/smallest to slowest/cheapest/largest):
●​ Registers: Smallest, fastest, most expensive. Directly inside the CPU.
●​ Cache Memory (L1, L2, L3): Faster than main memory, smaller capacity, more
expensive. Acts as a high-speed buffer between the CPU and main memory. Stores
frequently accessed data and instructions.
○​ L1 Cache: Smallest and fastest cache, often integrated directly into the CPU chip.
○​ L2 Cache: Larger and slightly slower than L1, can be on-chip or a separate chip.
○​ L3 Cache: Largest and slowest cache, typically shared by multiple CPU cores.
●​ Main Memory (RAM): The primary working memory of the computer. Larger capacity
than cache, slower than cache, less expensive. Volatile (data is lost when power is off).
●​ Secondary Storage (Hard Drives, SSDs, Optical Discs): Non-volatile (data persists
even when power is off). Largest capacity, slowest, cheapest per unit of storage. Used for
long-term storage of programs and data.
Principle of Locality: The memory hierarchy works efficiently due to the principle of locality,
which states that: * Temporal Locality: If an item is referenced, it will tend to be referenced
again soon. * Spatial Locality: If an item is referenced, items whose addresses are close by will
tend to be referenced soon.

4. Random Access Memory (RAM)


RAM is the primary working memory of a computer. It's called "random access" because any
byte of memory can be accessed directly and in the same amount of time, regardless of its
physical location.
Characteristics:
●​ Volatile: Data stored in RAM is lost when the computer's power is turned off.
●​ Read/Write: Data can be both written to and read from RAM.
●​ Fast: Much faster than secondary storage.

5. Types of RAM
●​ SRAM (Static RAM):
○​ Uses latches (flip-flops) to store data.
○​ Does not need to be refreshed periodically.
○​ Faster than DRAM.
○​ More expensive and consumes more power than DRAM.
○​ Typically used for cache memory (L1, L2, L3).
●​ DRAM (Dynamic RAM):
○​ Uses capacitors to store data.
○​ Needs to be refreshed periodically (thousands of times per second) to retain data,
as capacitors slowly discharge.
○​ Slower than SRAM.
○​ Less expensive and consumes less power than SRAM.
○​ Typically used for main memory (system RAM).
○​ Sub-types of DRAM:
■​ SDRAM (Synchronous DRAM): Synchronized with the CPU clock,
improving performance.
■​ DDR SDRAM (Double Data Rate SDRAM): Transfers data on both the rising
and falling edges of the clock signal, effectively doubling the data transfer
rate compared to SDRAM. Subsequent versions (DDR2, DDR3, DDR4,
DDR5) offer increased speeds and reduced power consumption.

6. Read Only Memory (ROM)


ROM is a type of non-volatile memory used in computers and other electronic devices. As the
name suggests, data stored in ROM is generally permanent and cannot be easily modified or
overwritten.
Characteristics:
●​ Non-volatile: Data persists even when the power is turned off.
●​ Read-only: Primarily used for reading data.
●​ Stores Firmware: Typically stores the firmware (low-level software) required to boot up
the computer, such as the BIOS (Basic Input/Output System) or UEFI (Unified Extensible
Firmware Interface).

7. Types of ROM
●​ Mask ROM (MROM):
○​ Programmed during the manufacturing process.
○​ Data is permanently "etched" into the chip.
○​ Cannot be changed after manufacturing.
○​ Used for large production runs where the content is fixed (e.g., embedded
systems).
●​ PROM (Programmable ROM):
○​ Blank chips that can be programmed once by the user using a special device called
a PROM programmer.
○​ Once programmed, the data cannot be changed.
●​ EPROM (Erasable Programmable ROM):
○​ Can be erased by exposing the chip to strong ultraviolet (UV) light.
○​ Once erased, it can be reprogrammed.
○​ Identifiable by a small quartz window on top of the chip.
●​ EEPROM (Electrically Erasable Programmable ROM):
○​ Can be erased electrically (byte by byte or in blocks) and reprogrammed without
removing it from the circuit.
○​ Slower to write than RAM.
○​ Used for storing BIOS/UEFI settings, firmware for microcontrollers, and flash
memory.
●​ Flash Memory:
○​ A type of EEPROM that can be erased and reprogrammed in blocks, rather than
byte by byte.
○​ Much faster for erasing and writing than traditional EEPROM.
○​ Widely used in solid-state drives (SSDs), USB flash drives, memory cards, and
smartphones.

8. Characteristics of Computers
Computers possess several key characteristics that make them powerful and versatile tools:
●​ Speed: Computers can perform calculations and process data at incredibly high speeds
(millions or billions of operations per second).
●​ Accuracy: They are highly accurate and can perform computations without errors,
provided the input data and programs are correct.
●​ Diligence: Unlike humans, computers do not suffer from boredom, fatigue, or lack of
concentration. They can perform repetitive tasks tirelessly and consistently.
●​ Versatility: Computers are capable of performing a wide range of tasks, from complex
scientific calculations to word processing, gaming, and multimedia. They can be adapted
to various applications.
●​ Reliability: Modern computers are generally highly reliable and can operate for long
periods without failure.
●​ Automation: Once programmed, computers can perform tasks automatically without
human intervention.
●​ Storage Capability: Computers can store vast amounts of data for long periods, which
can be retrieved quickly when needed.

9. Evolution of Computers
The evolution of computers can be traced through significant breakthroughs and technological
advancements:
●​ Early Mechanical Calculators:
○​ Abacus: Ancient calculating tool.
○​ Pascaline (1642): Blaise Pascal's mechanical calculator for addition and
subtraction.
○​ Leibniz Calculator (1671): Gottfried von Leibniz improved on Pascaline, adding
multiplication and division.
○​ Jacquard Loom (1801): Joseph Marie Jacquard used punched cards to control
patterns in weaving, a precursor to programmable machines.
○​ Difference Engine & Analytical Engine (1820s-1830s): Charles Babbage's
designs for mechanical general-purpose computers. Ada Lovelace worked on
algorithms for the Analytical Engine.
●​ Electromechanical Computers (Pre-1940s):
○​ Mark I (1944): Howard Aiken and IBM developed the first large-scale automatic
digital computer in the US, using electromechanical relays.
●​ Electronic Computers (Post-1940s): The invention of the electronic vacuum tube
marked a significant shift.
10. Generation of Computers
Computer evolution is often categorized into "generations," each defined by a major
technological advancement in their core components:
●​ First Generation (1940s-1950s): Vacuum Tubes
○​ Technology: Vacuum tubes for circuitry and magnetic drums for memory.
○​ Characteristics: Enormous size, generated a lot of heat, consumed a lot of power,
slow processing speed, limited programming capabilities (machine language),
expensive.
○​ Examples: ENIAC, UNIVAC I.
●​ Second Generation (1950s-1960s): Transistors
○​ Technology: Transistors replaced vacuum tubes.
○​ Characteristics: Smaller, faster, more reliable, less heat, lower power
consumption, programmed using assembly language and early high-level
languages (FORTRAN, COBOL). Magnetic core memory.
○​ Examples: IBM 7000 series, CDC 1604.
●​ Third Generation (1960s-1970s): Integrated Circuits (ICs)
○​ Technology: Integrated Circuits (ICs) combined multiple transistors on a single
silicon chip.
○​ Characteristics: Much smaller, faster, more powerful, multi-programming
capabilities, introduction of operating systems, development of more high-level
languages.
○​ Examples: IBM System/360, DEC PDP-8.
●​ Fourth Generation (1970s-Present): Microprocessors (VLSI)
○​ Technology: Microprocessors, using Very Large Scale Integration (VLSI)
technology, packed millions of transistors onto a single chip.
○​ Characteristics: Personal computers (PCs) became widely available, graphical
user interfaces (GUIs), networking, internet, increased processing power, smaller
size, affordability.
○​ Examples: Apple Macintosh, IBM PC.
●​ Fifth Generation (Present and Beyond): Artificial Intelligence (AI) / Parallel
Processing
○​ Technology: Focus on parallel processing, super conductors, artificial intelligence
(AI), natural language processing, quantum computing.
○​ Characteristics: Aim for intelligent systems that can learn, reason, and understand
natural language. Development of more powerful and intuitive user interfaces.
○​ Examples: AI-powered systems, quantum computers (in development).

11. Classification of Computers


Computers can be classified based on various factors, including their size, processing power,
purpose, and type of data they process.
Based on Size and Power:
●​ Microcomputers (Personal Computers - PCs): Smallest, least expensive, designed for
individual users. Examples: Desktops, laptops, tablets, smartphones.
●​ Minicomputers (Midrange Computers): Larger than microcomputers, offer more
processing power and storage. Used by small to medium-sized organizations for specific
tasks or departmental needs.
●​ Mainframes: Large, powerful, and expensive computers used by large organizations for
critical applications, data processing, and handling massive amounts of data. Support
thousands of users simultaneously.
●​ Supercomputers: The fastest and most powerful computers, designed for highly
complex calculations and scientific simulations. Used in research, weather forecasting,
nuclear science, etc.
Based on Purpose:
●​ General-Purpose Computers: Can perform a wide variety of tasks by changing the
software. Most common type (e.g., PCs).
●​ Special-Purpose Computers: Designed to perform a specific task or set of tasks very
efficiently. Often embedded within other devices (e.g., computers in washing machines,
car engines, medical equipment).
Based on Type of Data Processing:
●​ Analog Computers: Process continuous physical quantities (e.g., voltage, temperature,
pressure). Used in specialized applications like scientific research and industrial control
systems.
●​ Digital Computers: Process discrete data (represented as binary digits - 0s and 1s). The
most common type of computer today.
●​ Hybrid Computers: Combine features of both analog and digital computers. Used in
specialized applications where both continuous and discrete data processing is required
(e.g., medical equipment, process control).

12. Computer System


A computer system is a complete, functional computing solution composed of interconnected
components that work together to perform tasks.
Core Components:
●​ Hardware: The physical, tangible components of the computer (CPU, memory, storage
devices, input/output devices, motherboard, etc.).
●​ Software: The intangible set of instructions, programs, and data that tell the hardware
what to do.
●​ Users: The people who interact with the computer system.
●​ Data: Raw facts and figures that are processed by the computer.
●​ Connectivity (Optional but crucial for modern systems): Networking components that
allow computers to communicate with each other and the internet.

13. Applications of Computers


Computers are ubiquitous and have revolutionized nearly every aspect of modern life. Here are
some key application areas:
●​ Education: Online learning, research, educational software, virtual classrooms.
●​ Business: Accounting, inventory management, data analysis, e-commerce,
communication, marketing, customer relationship management (CRM).
●​ Healthcare: Medical imaging, patient record management, diagnostics, research, remote
surgery, telemedicine.
●​ Science and Engineering: Simulations, data analysis, modeling, design (CAD/CAM),
research.
●​ Entertainment: Gaming, multimedia playback, movie production, music creation.
●​ Communication: Email, instant messaging, social media, video conferencing,
telecommunications.
●​ Government: Public services, defense, law enforcement, record keeping.
●​ Banking and Finance: Online banking, stock trading, ATMs, financial analysis.
●​ Manufacturing: Robotics, automation, computer-aided design (CAD), supply chain
management.
●​ Transportation: Navigation systems, air traffic control, self-driving cars, logistics.
●​ Arts and Design: Graphic design, animation, digital art, music composition.

14. Number Systems


A number system is a way of representing numbers. Different number systems use different
bases or radixes.
●​ Decimal (Base-10): Uses 10 digits (0-9). The most common system for humans. Each
position represents a power of 10.
○​ Example: 123_{10} = 1 \times 10^2 + 2 \times 10^1 + 3 \times 10^0
●​ Binary (Base-2): Uses 2 digits (0 and 1). The fundamental system for computers. Each
position represents a power of 2.
○​ Example: 1011_2 = 1 \times 2^3 + 0 \times 2^2 + 1 \times 2^1 + 1 \times 2^0 = 8 + 0
+ 2 + 1 = 11_{10}
●​ Octal (Base-8): Uses 8 digits (0-7). Each position represents a power of 8. Sometimes
used as a shorthand for binary.
○​ Example: 17_8 = 1 \times 8^1 + 7 \times 8^0 = 8 + 7 = 15_{10}
●​ Hexadecimal (Base-16): Uses 16 digits (0-9 and A-F, where A=10, B=11, ..., F=15). Each
position represents a power of 16. Widely used in computer programming for representing
memory addresses and color codes due to its compact representation of binary data (4
binary digits = 1 hex digit).
○​ Example: A5_{16} = 10 \times 16^1 + 5 \times 16^0 = 160 + 5 = 165_{10}

15. Conversion between Number Bases


General Principle for Converting from Any Base to Decimal:
Sum the products of each digit and its corresponding power of the base.
●​ Example (Binary to Decimal): 1101_2 = (1 \times 2^3) + (1 \times 2^2) + (0 \times 2^1) +
(1 \times 2^0) = 8 + 4 + 0 + 1 = 13_{10}
General Principle for Converting from Decimal to Any Base (e.g., Binary, Octal,
Hexadecimal):
Use the division-remainder method. Divide the decimal number by the target base, record the
remainder, and repeat the process with the quotient until the quotient becomes 0. The new
number is formed by reading the remainders from bottom to top.
●​ Example (Decimal to Binary - 13_{10}):
○​ 13 / 2 = 6 R 1
○​ 6 / 2 = 3 R 0
○​ 3 / 2 = 1 R 1
○​ 1 / 2 = 0 R 1
○​ Reading remainders from bottom to top: 1101_2
Conversion between Binary, Octal, and Hexadecimal:
These are easy because their bases are powers of 2.
●​ Binary to Octal: Group binary digits into sets of 3 from right to left, then convert each
group to its octal equivalent. (Since 2^3 = 8)
○​ Example: 110101_2 = 110_2 \ 101_2 = 6_8 \ 5_8 = 65_8
●​ Octal to Binary: Convert each octal digit to its 3-digit binary equivalent.
○​ Example: 65_8 = 110_2 \ 101_2 = 110101_2
●​ Binary to Hexadecimal: Group binary digits into sets of 4 from right to left, then convert
each group to its hexadecimal equivalent. (Since 2^4 = 16)
○​ Example: 11010110_2 = 1101_2 \ 0110_2 = D_{16} \ 6_{16} = D6_{16}
●​ Hexadecimal to Binary: Convert each hexadecimal digit to its 4-digit binary equivalent.
○​ Example: D6_{16} = 1101_2 \ 0110_2 = 11010110_2

16. Arithmetic System


The arithmetic system refers to how computers perform basic arithmetic operations (addition,
subtraction, multiplication, division) using binary numbers.
●​ Binary Addition: Similar to decimal addition, with carries.
○​ 0 + 0 = 0
○​ 0 + 1 = 1
○​ 1 + 0 = 1
○​ 1 + 1 = 0 (carry 1)
●​ Binary Subtraction: Can be done directly or more commonly using two's complement for
negative numbers (see Signed Numbers).
●​ Binary Multiplication: Similar to decimal multiplication, but with binary addition of partial
products.
●​ Binary Division: Similar to decimal long division.

17. Signed and Unsigned Numbers


●​ Unsigned Numbers: Represent only non-negative (positive) integers. All bits in the
binary representation are used to represent the magnitude of the number. An n-bit
unsigned number can represent values from 0 to 2^n - 1.
○​ Example (8-bit unsigned): 00000000_2 (0) to 11111111_2 (255)
●​ Signed Numbers: Represent both positive and negative integers. Various methods are
used:
○​ Sign-Magnitude Representation: The leftmost bit (Most Significant Bit - MSB) is
used to represent the sign (0 for positive, 1 for negative), and the remaining bits
represent the magnitude.
■​ Disadvantages: Two representations for zero (+0 and -0), complicates
arithmetic.
○​ One's Complement Representation: To find the one's complement of a binary
number, flip all the bits (0 becomes 1, 1 becomes 0).
■​ Still has two representations for zero.
○​ Two's Complement Representation: The most widely used method for
representing signed integers in computers. To find the two's complement of a binary
number:
1.​ Find the one's complement.
2.​ Add 1 to the one's complement.
■​ Advantages: Only one representation for zero, simplifies arithmetic
(subtraction can be performed by adding the two's complement of the
subtrahend).
■​ An n-bit two's complement number can represent values from -2^{n-1} to
2^{n-1} - 1.
■​ Example (8-bit two's complement): -128 to 127.

18. Concept of Overflow


Overflow occurs when the result of an arithmetic operation exceeds the maximum (or minimum)
value that can be represented within the given number of bits (or the specific data type).
●​ For Unsigned Numbers: If adding two unsigned numbers results in a sum greater than
2^n - 1 (for an n-bit system), overflow occurs. The carry-out from the MSB indicates
overflow.
●​ For Signed Numbers (Two's Complement): Overflow occurs if:
○​ Adding two positive numbers results in a negative number.
○​ Adding two negative numbers results in a positive number.
○​ It's detected by checking the carry-in and carry-out of the most significant bit (MSB).
If they are different, an overflow has occurred.

19. Binary Coding


Binary coding is the process of representing various types of data (numbers, characters,
instructions, images, sounds) using binary digits (bits - 0s and 1s).
●​ ASCII (American Standard Code for Information Interchange): A common character
encoding standard that uses 7 or 8 bits to represent English characters, numbers, and
symbols.
●​ Unicode: A more comprehensive character encoding standard that supports characters
from virtually all writing systems worldwide. It uses variable-length encoding (e.g., UTF-8,
UTF-16).
●​ Image Encoding: Pixels are represented by binary values representing color and
intensity.
●​ Audio Encoding: Sound waves are sampled and quantized, and the resulting values are
represented in binary.
●​ Instruction Encoding: CPU instructions are represented as binary opcodes and
operands.

20. Logic Gates


Logic gates are the fundamental building blocks of digital electronic circuits. They perform basic
logical operations on one or more binary inputs and produce a single binary output.
●​ Input/Output: Typically 0 (false/low voltage) or 1 (true/high voltage).
●​ Types of Logic Gates:
○​ AND Gate: Output is 1 only if all inputs are 1.
■​ Truth Table: A \ B \ | \ Y 0 \ 0 \ | \ 0 0 \ 1 \ | \ 0 1 \ 0 \ | \ 0 1 \ 1 \ | \ 1
○​ OR Gate: Output is 1 if any input is 1.
■​ Truth Table: A \ B \ | \ Y 0 \ 0 \ | \ 0 0 \ 1 \ | \ 1 1 \ 0 \ | \ 1 1 \ 1 \ | \ 1
○​ NOT Gate (Inverter): Output is the inverse of the single input.
■​ Truth Table: A \ | \ Y 0 \ | \ 1 1 \ | \ 0
○​ NAND Gate (NOT AND): Output is 0 only if all inputs are 1 (inverse of AND). It's a
universal gate.
○​ NOR Gate (NOT OR): Output is 1 only if all inputs are 0 (inverse of OR). It's a
universal gate.
○​ XOR Gate (Exclusive OR): Output is 1 if inputs are different.
○​ XNOR Gate (Exclusive NOR): Output is 1 if inputs are the same.

21. Boolean Algebra


Boolean algebra is a branch of algebra in which the values of the variables are the truth values
"true" and "false," usually denoted 1 and 0 respectively. It provides a mathematical framework
for analyzing and designing digital circuits.
Key Concepts:
●​ Variables: Represented by letters (A, B, X, Y) and can only have two values (0 or 1).
●​ Operators:
○​ AND (• or no symbol): Logical multiplication. A \cdot B or AB.
○​ OR (+): Logical addition. A + B.
○​ NOT (Overbar or '): Logical complement. \bar{A} or A'.
●​ Basic Laws/Postulates:
○​ Commutative Laws: A + B = B + A; A \cdot B = B \cdot A
○​ Associative Laws: (A + B) + C = A + (B + C); (A \cdot B) \cdot C = A \cdot (B \cdot
C)
○​ Distributive Laws: A \cdot (B + C) = (A \cdot B) + (A \cdot C); A + (B \cdot C) = (A
+ B) \cdot (A + C)
○​ Identity Laws: A + 0 = A; A \cdot 1 = A
○​ Complement Laws: A + \bar{A} = 1; A \cdot \bar{A} = 0
○​ Idempotent Laws: A + A = A; A \cdot A = A
○​ Null Laws: A + 1 = 1; A \cdot 0 = 0
○​ Absorption Laws: A + (A \cdot B) = A; A \cdot (A + B) = A
○​ De Morgan's Theorems: \overline{A + B} = \bar{A} \cdot \bar{B}; \overline{A \cdot
B} = \bar{A} + \bar{B}
●​ Applications: Used to simplify complex logical expressions, design and analyze digital
circuits, and understand the behavior of logic gates.

22. Software
Software is a set of instructions, data, or programs used to operate computers and execute
specific tasks. It is the intangible component of a computer system.
Categories:
●​ System Software: Designed to manage and control the computer hardware and provide
a platform for application software.
○​ Operating System (OS): The most crucial system software (explained next).
○​ Device Drivers: Programs that enable the OS to communicate with specific
hardware devices (e.g., printer drivers, graphics card drivers).
○​ Utilities: Programs that assist in maintaining and optimizing computer performance
(e.g., antivirus software, disk defragmenters, file compression tools).
○​ Firmware: Software permanently stored on a hardware device (e.g., BIOS, router
firmware).
●​ Application Software: Designed to perform specific tasks for the user.
○​ Word Processors: Microsoft Word, Google Docs.
○​ Spreadsheets: Microsoft Excel, Google Sheets.
○​ Web Browsers: Chrome, Firefox, Edge.
○​ Media Players: VLC, Windows Media Player.
○​ Games: All video games.
○​ Graphic Design Software: Adobe Photoshop, GIMP.
○​ Business Applications: CRM, ERP systems.

23. Hardware
Hardware refers to the physical components of a computer system that you can touch and see.
It's the tangible part of the computer.
Main Categories:
●​ Input Devices: Allow users to enter data and commands into the computer.
○​ Examples: Keyboard, mouse, microphone, scanner, webcam, touch screen.
●​ Output Devices: Display or present information from the computer to the user.
○​ Examples: Monitor, printer, speakers, projector.
●​ Processing Devices (CPU): The "brain" of the computer that executes instructions.
○​ Examples: CPU (Processor).
●​ Memory Devices: Store data and instructions temporarily or permanently.
○​ Examples: RAM, ROM.
●​ Storage Devices (Secondary Storage): Store data permanently for long-term use.
○​ Examples: Hard Disk Drives (HDDs), Solid State Drives (SSDs), USB flash drives,
optical drives (CD/DVD/Blu-ray).
●​ Motherboard: The main circuit board that connects all the other hardware components
and allows them to communicate.
●​ Power Supply Unit (PSU): Supplies electrical power to all components of the computer.
●​ Expansion Cards: Circuit boards that add extra functionality to the computer (e.g.,
graphics card, network card, sound card).

24. Operating System (OS) Concept


An operating system (OS) is the most important software that runs on a computer. It manages
computer hardware and software resources and provides common services for computer
programs. It acts as an intermediary between the user and the computer hardware.
Key Functions/Concepts:
●​ Process Management:
○​ Process: An instance of a computer program that is being executed.
○​ Multitasking: The ability of an OS to run multiple processes concurrently (by
rapidly switching between them).
○​ Scheduling: The OS determines which process gets access to the CPU and for
how long.
●​ Memory Management:
○​ Manages the allocation and deallocation of memory to different processes to
prevent conflicts and optimize memory usage.
○​ Virtual Memory: Uses disk space as an extension of RAM, allowing programs to
run even if they require more memory than physically available.
●​ File Management:
○​ Organizes and manages files and directories on storage devices.
○​ Handles file creation, deletion, renaming, access permissions.
●​ Device Management:
○​ Manages communication between the computer and its input/output devices
(printers, scanners, etc.) through device drivers.
●​ User Interface (UI):
○​ Provides a way for users to interact with the computer.
○​ Graphical User Interface (GUI): Uses visual elements like windows, icons, menus,
and pointers (e.g., Windows, macOS, Linux with desktop environments).
○​ Command Line Interface (CLI): Users interact by typing commands (e.g.,
MS-DOS, Unix shell).
●​ Security: Provides mechanisms to protect the computer system from unauthorized
access and malicious software (e.g., user authentication, access control).
●​ Error Handling: Detects and handles errors that occur during system operation.
●​ Bootstrapping (Boot Process): The sequence of operations that a computer performs
when it is switched on, from loading the BIOS/UEFI to launching the operating system.
This comprehensive overview should give you a solid foundation in computer basics!

You might also like