Computer fundamentalsII
Computer fundamentalsII
Computer Applications
Syllabus
Unit I:
Introduction to Computers
Introduction to Computers (definition, characteristics & uses), Evolution of
computers, System unit (memory, ALU & control unit), Input / Output
devices, Storage devices( Memory- primary & secondary).
Introduction to Software, its type (system, application &j utility);
Processing Activities.
Unit II:
Windows
Concept of Operating System, Introduction to Windows, features (Desktop &
background.
Creating a folder, Compressing/ Zipping files (WinZip), Virus & Antivirus.
Unit III:
Networking
Computer and Networks, Need for networking, Components of
Unit IV:
Web Resources & Security
Chatting & Conferencing; Using Search engines, using Boolean
Characteristics:
Speed
Accuracy
Diligence
Versatility
Power of remembering
No IQ
No feelings
TYPES OF COMPUTERS
Types of Computers based on Principles of Operation
Analog Computers :Analog Computer is a computing device that works
on continuous range of values. The results given by the analog
computers will only be approximate since they deal with quantities that
vary continuously. It generally deals with physical variables such as
voltage, pressure, temperature, speed, etc.
Digital Computers :On the other hand a digital computer operates on
General purpose computers are used for any type of applications. They
can store different programs and do the jobs as per the instructions
specified on those programs. Most of the computers that we see today,
are general purpose computers.
Hybrid Computers: A hybrid computer combines the desirable
features of analog and digital computers. It is mostly used for
automatic operations of complicated physical processes and
machines. Now-a-days analog-to-digital and digital-to-analog
converters are used for transforming the data into suitable form for
either type of computation.
For example, in hospital’s ICU, analog devices might measure the
patients temperature, blood pressure and other vital signs. These
measurements which are in analog might then be converted into
numbers and supplied to digital components in the system. These
components are used to monitor the patient’s vital sign and send
signals if any abnormal readings are detected. Hybrid computers
are mainly used for specialized tasks.
Types of Computers based on Configuration
There are four different types of computers when we classify them
and also the most expensive ones. These computers can process
billions of instructions per second. Normally, they will be used for
applications which require intensive numerical computations such as
stock analysis, weather forecasting etc. Other uses of supercomputers
are scientific simulations, (animated) graphics, fluid dynamic
calculations, nuclear energy research, electronic design, and analysis of
geological data (e.g. in petrochemical prospecting). Perhaps the best
known super computer manufacturer is Cray Research. Some of the
"traditional" companies which produce super computers are Cray, IBM
and Hewlett-Packard.
Mainframe Computers :Mainframe computers can also process data at
very high speeds vi.e., hundreds of million instructions per second and
they are also quite expensive. Normally, they are used in banking,
airlines and railways etc for their applications.
Mini Computers :They are lower to mainframe computers in terms of
speed and storage capacity. They are also less expensive than
mainframe computers. Some of the features of mainframes will not be
available in mini computers. Hence, their performance also will be less
than that of mainframes.
Micro Computers :The invention of microprocessor (single chip CPU)
gave birth to the much cheaper micro computers. They are further
classified into
Desktop Computers
Laptop Computers
Handheld Computers( PDAs)
Evolution of Computers
A hard disk drive (HDD; also hard drive or hard disk) is a device
comprising one or more rigid rotating discs, often referred to as
platters, coated with magnetic material and with a magnetic head
able to vary its distance from the axis of rotation in close proximity to
each magnetic surface, with motors, mechanisms and circuitry
which enable the heads to write data magnetically to the surfaces
and read it from them; all enclosed in a protective housing. The
heads normally float on a very thin film of air that forms very close to
the rapidly rotating platters and rotates with them, close enough for
data to be transferred magnetically but without the wear that would
be caused by contact.
Performance characteristics
Access time
Seek time
Rotational latency
Storage capacity
Amount of data that can be stored in the storage unit.
Memory
Place/location having an address to store data.
Primary memory:
Internal storage area.
Primary memory can be accessed randomly (any location takes nearly the
same amount of time)
It is referred as random access memory (RAM)
Data can be accessed in any order.
But not sufficient to store large volume of data
Retrieval time is consistent and short.
It is volatile (data is lost)
Static RAM
Dynamic RAM
Types of ROM
PROM
Programmable read only memory/one time programmable
EPROM
Erasable programmable read only memory
Can be erased by exposure to UV light
EEPROM
Electrically erasable programmable read only memory
Can be erased electronically
Flash memory
Modern type of EEPROM
Can be rewritten faster and frequently than EEPROM
Secondary Memory:
External memory
Also called auxiliary memory/backup storage
Not directly accessible to the CPU.
Requires the use of computer’s I/O channels.
Stores data that is not in active use
It is slower than primary memory (RAM, ROM)
Has high storage capacity and non volatile
Magnetic Tape:
Floppy disk
Hard disks
Contain one or more metal platters which are sealed inside a case
Read only
CD-ROM
CD-R
CD-RW
DVD (digital versatile disc)
Others:
USB drive
Cache memory
System software provides the basic functions for computer usage and helps
run the computer hardware and system.
It is responsible for managing a variety of independent hardware
often complex details of the particular computer being used, including such
accessories as communications devices, printers, device readers, displays
and keyboards.
It includes a combination of the following:
Device drivers
Operating systems
Servers
Utilities
Window systems
Application software
What is language?
System of communication.
Assembly language
Two parts:
1) OPCODE (operation code)
2) OPERAND (where to find or store the data/instructions)
Disadvantages:
Machine dependent
Difficult to program
Error prone
Difficult to modify
Advantages :
Fast execution
No translation needed
ASSEMBLY LANGUAGE
require deep knowledge of the internal structure of the system
Use of letter symbols-mnemonics (memory aid) for numeric operation codes of
machine language.
The computer can be taught to recognize certain combinations of letters or
numbers. The computer does its own translating.
A section keeps a list of addresses for numbers.
Source program :program written in assembly language
Object program :program after conversion.
One to one correspondence
Advantages :
Easier to understand and use
Easy to locate and correct errors
Easier to modify
No worry about addresses
Efficiency of machine language.
Limitations:
Machine dependent
Knowledge of hardware
Machine level coding
HIGH LEVEL LANGUAGE
Instead of being machine dependent they are problem oriented.
Use easy English like words.
Features:
Independent of the given computer system
Macro instructions
Familiar words and symbols
Depends only on the compiler.
Not experimental.
Advantages :
Machine independent
Easy to learn and use
Fewer errors
Lower program preparation cost
Better documentation
Easy to maintain.
Limitations:
Lower efficiency (time and memory)
Lack of flexibility
Translators
COMPILER
Translates whole program into object program
Step:
First they are copied into the main memory of the system.
INTERPRETER
Step by step compilation
Easy to write
Less memory
Assembler
Data Processing
Data Processing
Computer data processing is any process that a computer
program does to enter data and summaries, analyze or otherwise
convert data into usable information.
The process may be automated and run on a computer.
Data processing may or may not be distinguished from data
conversion, when the process is merely to convert data to another
format, and does not involve any data manipulation.
It involves recording, analyzing, sorting, summarizing, calculating,
disseminating and storing data.
Because data is most useful when well-presented and actually
informative, data-processing systems are often referred to as
information systems.
Data Processing System is a system which processes data which
has been captured and encoded in a format recognizable by the
data processing system or has been created and stored by another
unit of an information processing system.
Elements of data processing
They are the graphical boxes that pop-up on the screen when the user
clicks on a program icon on the desktop.
A document window can also be accessed when clicking on a file name
listed within a directory, such as My Documents.
Once the document window is opened, the file then can be reviewed,
edited or saved as a different type of document.
Dialog Window
Within the screensaver tab you can view the currently set screensaver
The desktop is the primary user interface of a computer. When you boot up
your computer, the desktop is displayed once the startup process is
complete.
It includes the desktop background (or wallpaper) and icons of files and
folders you may have saved to the desktop.
In Windows, the desktop includes a task bar, which is located at the bottom
of the screen by default. In Mac OS X, the desktop includes a menu bar at
the top of the screen and the Dock at the bottom.
FEATURES OF DESKTOP
1.They enable you to see on the display screen exactly how the document
The Trojan Horse, at first glance will appear to be useful software but will
actually do damage once installed or run on your computer. Those on the
receiving end of a Trojan Horse are usually tricked into opening them
because they appear to be receiving legitimate software or files from a
legitimate source. When a Trojan is activated on your computer, the results
can vary. Some Trojans are designed to be more annoying than malicious
(like changing your desktop, adding silly active desktop icons) or they can
cause serious damage by deleting files and destroying information on your
system. Trojans are also known to create a backdoor on your computer that
gives malicious users access to your system, possibly allowing confidential
or personal information to be compromised. Unlike viruses and worms,
Trojans do not reproduce by infecting other files nor do they self-replicate.
File compression
It is commonly used when sending a file from one computer to another over a
connection that has limited bandwidth.
The compression basically makes the file smaller and, therefore, the sending
of the file is faster. Of course, when compressing a file and sending it to
another computer that computer has to have a program that will decompress
the file so it can be returned to "normal" and used.
The next step to compressing a single file is the combining of multiple files
into a single compressed archive. By performing this combination process the
archive both serves to make the transmission faster for all the files and
manages to keep them together for convenience.
Finally, the next step after combining multiple files into a single archive is to
maintain the organization of those files once inside the archive. If, for
example, multiple files need to be in multiple directories (folders) in order to
correctly work on the receiving computer then one characteristic of such an
archive would be to keep that directory structure intact within the archive and
having the decompression program maintain the directory structure when
decompressing the archive.
WinZip
It is an archiving and compressing application for Microsoft
windows, developed by WinZip computing.
Probably the single most popular archive format. Many programs
support this archive type (both free and commercial).
Data transmission, digital transmission, or
digital communications:
It is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-
multipoint communication channel. The data is represented as an electromagnetic signal,
such as an electrical voltage, radio wave, microwave, or infrared signal.
Modem:
A modem is a device or program that enables a computer to transmit data over, for example,
telephone or cable lines. Computer information is stored digitally, whereas information
transmitted over telephone lines is transmitted in the form of analog waves. A modem
converts between these two forms.
Fortunately, there is one standard interface for connecting external modems to computers
called RS-232. Consequently, any external modem can be attached to any computer that
has an RS-232 port, which almost all personal computers have. There are also modems that
come as an expansion board that you can insert into a vacant expansion slot. These are
sometimes called onboard or internal modems.
Basic hardware components
Apart from the physical communications media, networks comprise additional
basic hardware building blocks interconnecting their terminals, such as
Bridges - it connects multiple network segments at the data link layer (layer 2) of
the OSI model. )
Switches - it is a device that forwards and filters OSI layer 2 datagrams (chunks
of data communication) between ports (connected cables) based on the MAC
addresses in the packets. A switch is distinct from a hub in that it only forwards the
frames to the ports involved in the communication rather than all ports connected. )
Routers - it is an internetworking device that forwards packets
between networks by processing information found in the datagram
or packet (Internet protocol information from Layer 3 of the OSI
Model). ).
Communication Channels:
Twisted pair
Short for Hyper Text Transfer Protocol, the underlying protocol used by the
World Wide Web.
HTTP defines how messages are formatted and transmitted, and what
actions Web servers and browsers should take in response to various
commands.
For example, when you enter a URL in your browser, this actually sends an
HTTP command to the Web server directing it to fetch and transmit the
requested Web page.
Web Browser
Structure of a Network:
Server based:
It uses a server (which controls the user access to the network resources).
It may include many servers & many nodes.
These servers can be called file server/ n/w server/ application server/ server.
Peer to peer :
Also called workgroup.
All nodes have equal relationships to all others & all have similar types of software that
support sharing of resources.
Network Types
A local area network (LAN) is a network that connects computers
and devices in a limited geographical area such as home, school,
computer laboratory, office building, or closely positioned group of
buildings. Each computer or device on the network is a node. The
defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller
geographic range, and no need for leased telecommunication lines.
Personal blogs
The personal blog, an ongoing diary or commentary by an individual, is
the traditional, most common blog. Blogs often become more than a way
to just communicate; they become a way to reflect on life, or works of art.
Blogging can have a sentimental quality. Some sites, such as Twitter,
allow bloggers to share thoughts and feelings instantaneously with
friends and family, and are much faster than emailing or writing.
Defamation
Employment
Political dangers
Personal safety
Behavior
E-Commerce
Electronic commerce, commonly known as e-commerce,
eCommerce or e-comm, refers to the buying and selling of
products or services over electronic systems such as the Internet
and other computer networks.
However, the term may refer to more than just buying and selling
products online. It also includes the entire online process of
developing, marketing, selling, delivering, servicing and paying for
products and services.
The amount of trade conducted electronically has grown
extraordinarily with widespread Internet usage.
Electronic commerce
It is the buying and selling of product or service over electronic systems such as the
Internet and other computer networks.
Electronic commerce draws on such technologies as electronic funds transfer, supply
chain management, Internet marketing, online transaction processing, electronic data
interchange (EDI), inventory management systems, and automated data collection
systems.
Modern electronic commerce typically uses the World Wide Web at least at one point in
the transaction's life-cycle, although it may encompass a wider range of technologies
such as e-mail, mobile devices and telephones as well.
Electronic commerce is generally considered to be the sales aspect of e-business. It
also consists of the exchange of data to facilitate the financing and payment aspects of
business transactions.
E-commerce is business in the online environment. Here all transactions, deals take
place over the internet.
Advantages:
Overcome Geographical Limitations
Gain New Customers With Search Engine Visibility
Lower Costs
Locate the Product Quicker
Eliminate Travel Time and Cost
Provide Comparison Shopping
Enable Deals, Bargains, Coupons, and Group Buying
Provide Abundant Information
Remain Open All the Time
Disadvantages of Ecommerce
Any one, good or bad, can easily start a business. And there are
processes.
As there is minimum chance of direct customer to company
cards.
Some Examples Of EPS:- Online reservation
Online bill payment
cash Trusted third party, e.g. online bank, holds customers’ cash
accounts
Off-line Customer holds cash on smart card or software wallet Fraud
Volume Label
In the context of computer operating systems, volume is the term used to describe a
single accessible storage area with a single file system, typically (though not
necessarily) resident on a single partition of a hard disk.
Booting
It is to ring a computer into operational state, so that it can start accepting instructions
from the user.
A bootable disk is any floppy/CD/ HD that contains the files required to boot a DOS
system.
A boot disk is also known as system disk contains system files.
These files are required for the working of DOS operation.
A system file “command. COM” comprises of MSDOS.SYS, IO.SYS and command.
COM itself.
Command. COM is a command processor which helps in getting the drive name i.e.
the system prompt sign, from where we can operate on any of the commands.
MSDOS.SYS & IO.SYS are hidden files.
Bootstrapping
(from an old expression "to pull oneself up by one's bootstraps") is a
technique by which a simple computer program activates a more
complicated system of programs.
In the start up process of a computer system, a small program (such as
BIOS, earlier called the bootstrap loader) initializes and tests that a basic
requirement of hardware, peripherals and external memory devices are
connected. It then loads a program from one of them and passes control to
it, thus allowing the loading of larger programs (such as an operating
system).
Wild Card
. Indicates a sequence of characters.
? Indicates a single character.
E.g.: *.*, A*.*, ?.*, a?.* etc
Directory
Like split drawers in filing cabinet.
The grouping of files is done in a directory.
Subdirectory
Like file folders within each drawer.
Files stored in sub directory are isolated by other files.
Root directory
It is represented by \
Parent directory
It is the immediate previous directory of a sub directory.
To reach a parent from a sub dir (..)
Dos Prompt
The very initial character that is viewed when you start functioning
on the computer.
Suppress line numbers:
Hyphenate:
If a word is too long to fit on the end of a line, Microsoft Word moves
the word to the beginning of the next line instead of hyphenating it.
However, you can use the hyphenation feature to insert hyphens to
eliminate gaps in justified text or to maintain even line lengths in
narrow columns.
Widow/orphan control
The widow/orphan control in Microsoft Word is a feature that will
a page so you can continue onto the next page. However, one
problem that often arises is that lines of a paragraph, table rows and
so on are split between two pages.
You can prevent Word 2007 from splitting up the lines of a
them to split.