Introduction
Introduction
What is a computer?
A computer is a programmable electronic device that accepts raw data as input and processes it with a set
of instructions (a program) to produce the result as output.
A computer is designed to execute applications and provides a variety of solutions through integrated
hardware and software components. It works with the help of programs and represents the decimal
numbers through a string of binary digits. It also has a memory that stores the data, programs, and result
of processing. The components of a computer such as machinery that includes wires, transistors, circuits,
hard disk are called hardware. Whereas, the programs and data are called software.
Definition of Terms
Data/raw facts/raw information can be defined as a representation of facts, concepts, or
instructions in a formalized manner, which should be suitable for communication, interpretation,
or processing by human or electronic machine.
Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or special
characters (+,-, /,*, <,>, = etc.)
What is Information?
Information is organized or classified data, which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following
characteristics −
Timely − Information should be available when required.
Accuracy − Information should be accurate.
Completeness − Information should be complete.
o Motherboard: It is the part that connects all other parts or components of a computer.
o Storage Device: It permanently stores the data, e.g., hard drive.
o Input Device: It allows you to communicate with the computer or to input data, e.g., a
keyboard.
o Output Device: It enables you to see the output, e.g., monitor.
Introduction to computers
Advantages of Computers:
1. Multi-tasking –
Multitasking Multi-tasking is one among the main advantage of computer.
Person can do multiple task, multiple operation at a same time, calculate
numerical problems within few seconds. Computer can perform millions or
trillions of work in one second.
2. Speed –
computers can work at incredible speed. A powerful computer is capable of
performing 5 million simple instructions per second. Nowadays computer
has vital role in human life. One of the most advantages of computer is its
incredible speed, which helps human to finish their task in few seconds.
3. Diligence- unlike human beings, computers are highly consistent. They do
not suffer from human traits such as boredom and tiredness resulting in lack
of concentration. Computer are therefore better than human in performing
voluminous and repetitive jobs.
4. Cost/ Stores huge –
Centralized database of storing information is that the major advantage
which will reduce cost.
5. Accuracy –
One among the basis advantage of computer is which will perform not only
calculations but also with accuracy.
6. Data Security –
Protecting digital data is understood as data security.
7. Task completer –
Completes tasks that might be impossible for humans to complete.
8. Communication –
Computer helps the user in better understanding and communication with
the other devices.
9. Productivity –
The level of productivity gets automatically doubled as the computer can
done the work at very fast.
10.Reduces work load –
Information are often accessed by more then one person with the necessity
for work to be duplicated.
11.Reliability –
Computers can perform same sort of work repeatedly without throwing up
Introduction to computers
APPLICATIONS OF COMPUTERS
Computers play a role in every field of life. They are used in homes, business, educational
institutions, research organizations, medical field, government offices, entertainment, etc.
a) Home
Computers are used at homes for several purposes like:
Online bill payment,
watching movies or shows at home,
home tutoring, social media access,
Playing games, internet access, etc.
Communication through electronic mail.
They help to avail work from home facility for corporate employees.
Computers help the student community to avail online educational support.
b) Medical Field
Computers are used in hospitals to:
Maintain a database of patients’ history,
diagnosis, X-rays,
Live monitoring of patients, etc.
Surgeons nowadays use robotic surgical devices to perform delicate operations, and
conduct surgeries remotely.
Virtual reality technologies are also used for training purposes.
Monitoring the fetus inside the mother’s womb.
c) Entertainment
Computers help to watch movies online,
Play games online; act as a virtual entertainer in playing games,
Listening to music, etc. Videos can be fed from computers to full screen televisions.
Photo and video editing.
d) Industry and marketing
Computers are used to perform several tasks in industries and marketing like:
Managing inventory,
designing purpose,
creating virtual sample products,
Interior designing, video conferencing, etc.
Online marketing has seen a great revolution in its ability to sell various products to
inaccessible corners like interior or rural areas.
Stock markets have seen phenomenal participation from different levels of people
through the use of computers.
e) Education
Computers are used in education sector through:
Online classes,
online examinations,
referring e-books,
Online tutoring, etc.
Introduction to computers
f) Government
In government sectors, computers are used in:
Data processing,
Maintaining a database of citizens and supporting a paperless environment.
g) Government
The country’s defense organizations have greatly benefitted from computers in their use for:
missile development,
satellites,
Rocket launches, etc.
h) Banking
In the banking sector, computers are used to:
Store details of customers and conduct transactions, such as withdrawal and deposit of
money through ATMs.
Banks have reduced manual errors and expenses to a great extent through extensive use
of computers.
i) Business
Nowadays, computers are totally integrated into business. The main objective of business is
transaction processing, which involves transactions with suppliers, employees or customers.
Computers can make these transactions easy and accurate.
Search Engines and Browsing
To stay competitive, businesses must utilize search engines such
as Google or yahoo to obtain real time information and news and
conduct research.
Financial Transactions / e-commerce
Retail purchases, credit card transactions, automatic debits are
processed over computers, and through the internet today. Banks,
credit card companies, and other financial institutions are some of
the best examples of computer uses in business. E-commerce is a
rapidly growing industry, promising to become one of the top
computer-related professions in the future.
Storage, Archival and Retrieval
Thousands and thousands of manuscripts, files, charts, or other
document types can be stored on a tiny microchip. Before,
businesses needed file cabinets or warehouses to store pertinent
records and data. But now, data management is easy, thanks to
computers and software that enable businesses to encrypt,
organize, store, and easily retrieve critical information.
Design and Presentation
Introduction to computers
j) Training
Many organizations use computer-based training to train their employees, to save money and
improve performance. Video conferencing through computers allows saving of time and
travelling costs by being able to connect people in various locations.
k) Arts
Computers are extensively used in dance, photography, arts and culture. The fluid movement of
dance can be shown live via animation. Photos can be digitized using computers.
l) Science and Engineering
Introduction to computers
Computers with high performance are used to stimulate dynamic process in Science and
Engineering. Supercomputers have numerous applications in area of Research and Development
(R&D). Topographic images can be created through computers. Scientists use computers to plot
and analyze data to have a better understanding of earthquakes.
Introduction to computers
History of Computers
First Generation Computers (Vacuum tube technology)
The first generation (1946-1959) of computers.
Features:
Computers were slow, Huge and expensive.
Consumes more power
In these computers, vacuum tubes were used as the basic components of CPU and
memory.
These computers were mainly depended on batch operating system and punch cards.
Magnetic tape and paper tape were used as output and input devices in this generation;
Some of the popular first generation computers are;
o ENIAC ( Electronic Numerical Integrator and Computer)
o EDVAC ( Electronic Discrete Variable Automatic Computer)
o UNIVACI( Universal Automatic Computer)
o IBM-701
o IBM-650
Second Generation Computers (Transistor Technology)
The second generation (1959-1965) was the era of the transistor computers.
Features:
These computers used transistors which were cheap, compact and consuming less power;
it made transistor computers faster than the first generation computers.
In this generation, magnetic cores were used as the primary memory and magnetic disc and
tapes were used as the secondary storage.
Assembly language and programming languages like COBOL and FORTRAN
Batch processing and multiprogramming operating systems were used in these computers.
Some of the popular second generation computers are;
o IBM 1620
o IBM 7094
o CDC 1604
o CDC 3600
o UNIVAC 1108
o IBM-360 series
o Honeywell-6000 series
o PDP(Personal Data Processor)
o IBM-370/168
o TDC-316
Fourth Generation Computers (very large scale integrated (VLSI) circuits)
The fourth generation (1971-1980) computers used very large scale integrated (VLSI) circuits;
a chip containing millions of transistors and other circuit elements. These chips made this
generation computers more compact, powerful, fast and affordable. These generation computers
used real time, time sharing and distributed operating system. The programming languages like C,
C++, and DBASE were also used in this generation.
Some of the popular fourth generation computers are;
o DEC 10
o STAR 1000
o PDP 11
o CRAY-1(Super Computer)
o CRAY-X-MP(Super Computer)
Fifth Generation Computers
In fifth generation (1980-till date) computers, the VLSI technology was replaced with ULSI (Ultra
Large Scale Integration). It made possible the production of microprocessor chips with ten million
electronic components. This generation computers used parallel processing hardware and AI
(Artificial Intelligence) software. The programming languages used in this generation were C,
C++, Java, .Net, etc.
Some of the popular fifth generation computers are;
o Desktop
o Laptop
o NoteBook
o UltraBook
o ChromeBook
Introduction to computers
CLASSIFICATION OF COMPUTERS
We can classify the computers into the following 3 categories:
Classifications of Computers System:-
a) On the Basis of Size and Capacity, [Supercomputer, Mainframe, Mini, and Micro
Computer].
b) On the Basis of Purposes, [General and Special Purpose].
c) On the Basis of Hardware Design and Type [Analog, Digital, and Hybrid Computer].
Information security is securing information from unauthorized access, modification & deletion
Application Security is securing an application by building security features to prevent from
Cyber Threats such as SQL injection, DoS attacks, data breaches and etc.
Computer Security means securing a standalone machine by keeping it updated and patched
Network Security is by securing both the software and hardware technologies
Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks
Reasons for cybersecurity
To prevent theft of data, such as that of military secrets from government
computers;
Shielding from vandalism, including the destruction of data by a computer virus;
Prevent fraud, such as employees at a bank channeling funds into their own
accounts;
Protection invasion of privacy, such as the illegal accessing of protected
personal financial or medical data from a large database.
To maintain customer trust
Viruses
A computer worm is a software program that can copy itself from one
computer to another, without human interaction. The potential risk here is that it will use up your
computer hard disk space because a worm can replicate in greate volume and with great speed.
Phishing
Rootkit
Also known as a keystroke logger, keyloggers can track the real-time activity
of a user on his computer. It keeps a record of all the keystrokes made by user keyboard. Keylogger
is also a very powerful threat to steal people’s login credential such as username and password.
Also known as a keystroke logger, keyloggers can track the real-time activity of a user on his
computer. It keeps a record of all the keystrokes made by user keyboard. Keylogger is also a
very powerful threat to steal people’s login credential such as username and password.
Computer Security Practices
Computer security threats are becoming relentlessly inventive these days. There is much need for
one to arm oneself with information and resources to safeguard against these complex and growing
computer security threats and stay safe online. Some preventive steps you can take include:
COMPUTER MEMORY
Memory is the most essential element of a computing system because without it computer can’t
perform simple tasks. Computer memory is the storage space in the computer, where data is
to be processed and instructions required for processing are stored. Computer memory is of
two basic types – Primary memory (RAM and ROM) and Secondary memory (hard drive, CD,
etc). Non-volatile memory. The memory is divided into large number of small parts called cells.
Each location or cell has a unique address, which varies from zero to memory size minus one.
For example, if the computer has 64k words, then this memory unit has 64 * 1024 = 65536
memory locations( Data structures containing such different sized words refer to them as WORD (16
bits/2 bytes), DWORD (32 bits/4 bytes) and QWORD (64 bits/8 bytes) respectively. ). The address of
these locations varies from 0 to 65535.
Memory is primarily of three types −
Cache Memory
Primary Memory/Main Memory
Secondary Memory
Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the CPU. It acts
as a buffer between the CPU and the main memory. It is used to hold those parts of data and
program which are most frequently used by the CPU. The parts of data and programs are
transferred from the disk to cache memory by the operating system, from where the CPU can
access them.
Advantages
The advantages of cache memory are as follows −
Introduction to computers
RAM
ROM
KEY DIFFERENCE
Primary memory is also called internal memory whereas Secondary
memory is also known as a Backup memory or Auxiliary memory.
Primary memory can be accessed by the data bus whereas Secondary
memory is accessed by I/O channels.
Primary memory data is directly accessed by the processing unit
whereas Secondary memory data cannot be accessed directly by the
processor.
Comparing primary and secondary storage devices, Primary storage
devices are costlier than secondary storage device whereas Secondary
storage devices are cheaper compared to primary storage device.
When we differentiate primary and secondary memory, Primary memory
is both volatile & nonvolatile whereas Secondary memory is always a
non-volatile memory.
Introduction to computers
It is also called read-write memory or the main memory or the primary memory. The programs
and data that the CPU requires during the execution of a program are stored in this
memory.
It is a volatile memory as the data is lost when the power is turned off. RAM is further classified
into two types- SRAM (Static Random Access Memory) and DRAM (Dynamic Random Access
Memory).
Stores crucial information essential to operate the system, like the program essential to boot the
computer.
It is not volatile.
Always retains its data.
Used in embedded systems or where the programming needs no change.
Used in calculators and peripheral devices.
ROM is further classified into four types- MROM, PROM, EPROM, and EEPROM.
EEPROM (Electrically erasable programmable read-only memory) – The data can be erased by
applying an electric field, with no need for ultraviolet light. We can erase only portions of the
chip.
MROM(Mask ROM) – Mask ROM is a kind of read-only memory, that is masked off at the
time of production. Like other types of ROM, mask ROM cannot enable the user to change the
data stored in it. If it can, the process would be difficult or slow.
Difference between RAM and ROM
Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than the main
memory. These are used for storing data/information permanently. CPU directly does not access
these memories, instead they are accessed via input-output routines. The contents of secondary
memories are first transferred to the main memory, and then the CPU can access it. For example,
disk, CD-ROM, DVD, etc.
COMPUTER SOFTWARE
Computer software, is a collection of computer programs and related data that provides the instructions
for telling a computer what to do and how to do it.
Any set of instructions that guides the hardware and tells it how to accomplish each task.
Computer software, or just software, is a collection of computer programs and related data that
provides the instructions for telling a computer what to do and how to do it. • Any set of instructions
that guides the hardware and tells it how to accomplish each task
Type of Software
The software has mainly divided into two categories: Application software and System
software.
Application Software
Security –
The operating system uses password protection to protect user data and similar other
techniques. it also prevents unauthorized access to programs and user data.
Monitors overall system health to help improve performance. records the response time
between service requests and system response to having a complete view of the system
health. This can help improve performance by providing important information needed
to troubleshoot problems.
Job accounting –
Operating system Keeps track of time and resources used by various tasks and users,
this information can be used to track resource usage for a particular user or group of
users.
The operating system constantly monitors the system to detect errors and avoid the
malfunctioning of a computer system.
Operating systems also coordinate and assign interpreters, compilers, assemblers, and
other software to the various users of the computer systems.
Memory Management –
The operating system manages the Primary Memory or Main Memory. Main memory is
made up of a large array of bytes or words where each byte or word is assigned a certain
address. Main memory is fast storage and it can be accessed directly by the CPU. For
a program to be executed, it should be first loaded in the main memory. An Operating
System performs the following activities for memory management:
It keeps track of primary memory, i.e., which bytes of memory are used by which user
program. The memory addresses that have already been allocated and the memory
addresses of the memory that has not yet been used. In multipr1` ogramming, the OS
decides the order in which processes are granted access to memory, and for how long.
It Allocates the memory to a process when the process requests it and deallocates the
memory when the process has terminated or is performing an I/O operation.
Introduction to computers
Processor Management –
Keeps track of the status of processes. The program which performs this task is known
as a traffic controller. Allocates the CPU that is a processor to a process. De-allocates
processor when a process is no more required.
Device Management –
File Management –
A file system is organized into directories for efficient or easy navigation and usage.
These directories may contain other directories and other files. An Operating System
carries out the following file management activities. It keeps track of where information
is stored, user access settings and status of every file, and more… These facilities are
collectively known as the file system.
Utility: Utility Program-Usually utility software installed during the installation of OS.
Utility program helps in analyze, configure, secure, optimize and maintain the system.
List of utility program-Disk checker, disk cleaner, disk derangement, disk space analyzer,
disk backup etc.
Open Source: Open source software is available with source code. Software is an
intellectual or collaborative effort of programmers to improve the quality of software.
Usually, the software is available with a license for those programmers who want to
change the functionality according to their choice. Examples are- Apache, Tomcat,
Ubuntu, MySQL (database), and Firefox etc.
Introduction to computers
COMPUTER NETWORKS