0% found this document useful (0 votes)
13 views47 pages

PPS Module No. 1

The document provides an introduction to computer terminology, including definitions of hardware and software, key components of a computer, and the functions of an operating system. It covers various types of operating systems, problem-solving approaches, programming fundamentals, and database management systems, including SQL commands. Additionally, it explains network communication and internet connectivity methods.

Uploaded by

bubble.love1601
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views47 pages

PPS Module No. 1

The document provides an introduction to computer terminology, including definitions of hardware and software, key components of a computer, and the functions of an operating system. It covers various types of operating systems, problem-solving approaches, programming fundamentals, and database management systems, including SQL commands. Additionally, it explains network communication and internet connectivity methods.

Uploaded by

bubble.love1601
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Module No.

- 1
Introduction to Computer Terminology,
Algorithm and Flowchart
What is mean by computer ?
A computer is an electronic device that processes information. It takes input
(data), processes it according to instructions, and gives output (results).
• Key Components of a Computer:
1.Input Devices: These let you give instructions to the computer.
Examples: Keyboard, mouse, microphone.
2.Processing Unit (CPU): This is the brain of the computer that processes
data and performs calculations.
3.Memory/Storage:
1.RAM (Temporary Memory): Used for immediate tasks.
2.Hard Drive/SSD (Permanent Storage): Stores files and programs.
4.Output Devices: Show the results of processing. Examples: Monitor,
printer, speakers.
What is Hardware?

• Hardware refers to the physical components of a computer system that you can
see and touch. These are the tangible parts that make up the machine.
• Examples of Hardware:
1.Input Devices: Devices like a keyboard, mouse, or scanner, which allow you to
input data into the computer.
2.Output Devices: Devices like monitors, printers, or speakers, which display or
produce results.
3.Internal Components:
1. CPU (Central Processing Unit): The brain of the computer that processes instructions.
2. RAM (Random Access Memory): Temporary memory for running tasks.
3. Hard Drive/SSD: Storage for saving files and programs.

4.Peripherals: External devices like USB drives, cameras, and external hard drives.
What is Software ?

Software refers to the programs and instructions that tell the hardware what to
do.
• Types of Software:
1.System Software:
1. Controls the hardware and provides a platform for other software.
2. Examples: Operating systems (Windows, macOS, Linux).
2.Application Software:
1. Designed for specific tasks like writing documents or editing photos.
2. Examples: Microsoft Word, Photoshop, web browsers.
3.Programming Software :
refers to a set of tools and utilities that assist programmers in developing,
debugging, and maintaining computer programs by providing a platform to
write and manage source code efficiently.
Computers software and hardware components
Operating System
• An operating system (OS) is software that acts as a bridge between you
(the user), your computer’s hardware, and the applications you use.
• An Operating System (OS) is system software that manages computer
hardware, software resources,
• Examples of Operating Systems:
• Windows: Popular for personal computers.
• macOS: Used in Apple devices.
• Linux: Open-source and widely used in servers and by tech enthusiasts.
• Android: Powers most smartphones.
• iOS: The operating system for Apple’s iPhones and iPads.
Services of Operating System/Functions Of Operating
System
• Process Management
• Description: Handles the creation, execution, and termination of
processes.
• Features:
• Multi-tasking (running multiple programs simultaneously).
• Scheduling processes for efficient CPU utilization.
• Memory Management
• Description: Manages the system's memory (RAM), ensuring efficient allocation
to processes.
• Features:
• Allocates and deallocates memory to processes.
• Tracks memory usage and prevents memory leaks.

• File System Management


• Description: Organizes, stores, retrieves, and manages data on storage
devices.
• Features:
• Provides file directories and structures.
• Implements file permissions and security.
• Device Management
• Description: Controls and communicates with hardware devices like printers,
keyboards, and storage drives.
• Features:
• Uses device drivers to communicate with hardware.
• Allocates devices to processes when needed.

• Security and Access Control


• Description: Protects data and resources from unauthorized access and threats.
• Features:
• Implements user authentication (passwords, biometrics).
• Provides permissions and restrictions for files and processes.
• I/O System Management
• Description: I/O scheduling refers to the process of managing and prioritizing
input/output (I/O) operations in an operating system.

• Secondary-Storage Management:
• Description: Systems have several levels of storage which includes primary
storage, secondary storage, and cache storage. Instructions and data must be
stored in primary storage or cache so that a running program can reference it.

• Job accounting
• Description: Keeping track of time & resources used by various jobs and users.
Types Of Operating System

• Batch Operating System

• Definition: In a batch OS, similar jobs are grouped together into batches,
and the operating system processes them one at a time without user
interaction.

• Key Features:

1) No direct interaction between the user and the system.

2) Jobs are executed sequentially in a batch.


Multi-Tasking/Time-Sharing Operating System

• Definition: These operating systems allow multiple users or tasks to run


simultaneously by dividing CPU time among tasks.

• Key Features:

1) Quick switching between tasks so users feel their programs are running
simultaneously.

2) Better utilization of CPU resources.


Real-Time Operating System (RTOS)

• Definition: An OS designed to process tasks in a fixed, predictable time.


It’s commonly used in systems that require immediate response.

• Key Features:

• Hard Real-Time: Tasks must be completed within strict deadlines (e.g.,


medical devices, missile systems).

• Soft Real-Time: Some delays are acceptable (e.g., video streaming).

• Example: VxWorks, FreeRTOS.


Distributed Operating System

• Definition: This OS manages a group of independent computers


connected in a network, making them appear as a single system.

• Key Features:

• Shared resources and processing power across the network.

• Users don’t need to know which computer is handling their request.

• Example: LOCUS, Amoeba.


Network Operating System (NOS)

• Definition: An OS that enables computers to connect and share resources


like files, printers, and applications over a network.

• Key Features:

• Centralized control of network resources.

• Security features like user authentication.

• Example: Windows Server, UNIX.


Mobile Operating System

• Definition: These operating systems are specifically designed for mobile


devices like smartphones and tablets.

• Key Features:

• Optimized for touchscreen interfaces and low power consumption.

• Support for mobile apps and communication functions.

• Example: Android, iOS.


Hardware & Software Packages

• Hardware Processing Packages

• Hardware processing packages refer to bundles of physical devices or


components that work together to perform data processing and
computation. These components are integrated to support a unified
objective, such as enabling efficient computing or handling specific tasks.
• Software Processing package :

• is a group of related software programs bundled together to achieve a shared


goal. These packages often include:

• Executable Programs: The main applications to perform specific tasks.

• Documentation: Manuals or guides to help users understand and use the


software effectively.

• Example Files: Pre-made files that showcase the functionality of the software.
Software Package File Types and Formats
• Software packages come in various file types and formats, depending on how the software is
distributed, installed, or executed.

• MSI Files (Microsoft Installer) :

• MSI files are database files that carry information about software installation. These files install using
the Windows Installer service, which enables more complex installation operations such as the
installation of drivers or services.

• MSI files are used for installing, updating, or removing software on Windows. They are specifically
designed for easier and more controlled software installations.

• MSI files store all the files, instructions, and metadata required for installation in a structured format.

• They allow administrators to deploy software on multiple systems simultaneously (useful in


enterprise settings).

• Example: MyApp.msi
• EXE (Executable Files)

• EXE files are the most common format for Windows programs. They are directly
executable, meaning they can run on the system without additional steps.

• EXE files contain the program's code and instructions that the computer
executes.

• They often include installation wizards to guide users through the software
setup process.

• Example: Double-clicking setup.exe


• Internet and It’s Connectivity

• The internet is most often used for three main purposes :

1) Communication

2) Buying and Selling

3) Searching for information

• Internet Connection Methods

• Internet access can be provided using different broadband technologies


including satellite, cable, telephone wires, wireless or mobile connections.
• 1) Dial-Up Connection :

• Dial-up is a method that uses a telephone line , which you connect to a phone
jack, just as you connect your telephone to the wall.

• Dial-up is the slowest connection method and it requires your computer to have
a dialup modem.

• To use internet we have dial the telephone number using computer.

• 2) BroadBand Internet Connection :

• Broadband refers high speed internet connection , faster than dial-up

• It can be delivered through different technologies , including DSL(Digital


Subscriber Line), cable , satellite or fibre optic cables.
• 3) Fibre Optic Cable :

• Fibre optic communication transmits data by sending pulses of light through


ultrathin optical fibre.

• Because light travels so quickly , this technology can transmit internet data at
super-fast speeds.

• (ISP) Internet Service Providers – That connect you to the internet for a fee.
• Network Communication & Networking :

• Network communication refers to the process of exchanging data between


devices (also called nodes) in network.

Transmission
Source Transmitter Receiver
System

Origin System
Destination
• 1) The Source :

• Device generates the data to be transmitted

• E.g. – PC

• 2) Transmitter :

• The data generated by the source is not transmitted directly as it is generated.

• Transmitter transforms and encode the information and also sends out data signals to
the transmission system.

• 3) Transmission System :

• That can be from a simple transmission line to a complex network that connects the
source with the destination.
• 4) The Receiver :

• That accepts signal coming from the transmission system and converts it in such a way
that target device can handle it.

• E.g. Modem (Modulator – Demodulator ) :

• Converts the analog signals into Digital signals – Demodulator

• Converts the digital signals into analog signals - Modulator


• Problem Solving Aspect

• Problem solving is a process of transforming the description of a problem into the


solution of that problem by using our knowledge of the problem domain and by relying
on our ability to select and use appropriate problem solving technologies/strategies,
tools. Requirement

• Steps : 1) Identify and define problem


Analysis
2) Generate possible solutions
Design
3) Evaluate alternatives
Code
4) Decide a solution
Testing
5) Implement a solution

6) Evaluate the result Documentation


• Design Steps :

1) Top-Down Approach

2) Bottom-Up Approach

1) Top-Down Design Approach - Top-down approach involves breaking down a large,


complex system or problem into smaller , more manageable components.

• Advantages – Better planning , ease of debugging

e.g. – Large scale systems like ERP , control systems

Railway Reservation

Train Station Passenger Tickets


1) Bottom-up Approach -

• The bottom-up approach focuses on building the system by starting with the smaller,
detailed components and then integrating them to form a complete system.

• Advantages – Flexibility , Reusability.

• E.g. : Software Libraries , compilers.


1) Layers Of OSI Model : Open System Interconnection
Layers Of OSI Model : Open System Interconnection
Allow access to network resources
Provides network services and user
Sender Application interfaces for communication.
Software
Presentation Translate , encrypts and compresses data
Upper Layers
Session Manages and controls communication
sessions between devices.
Ensures reliable data delivery with error
Transport detection, flow control, and data
Heart Of OSI
segmentation.
Moves packages from source to destination
Network Responsible for routing, addressing, and delivering
data between different networks.

Hardware/Lower layers Data Link Organizes bits intro frames

Receiver Handles the physical connection between


Physical
devices and the transmission of raw data
as electrical, optical, or radio signals.
1) Programming Fundamentals :
Computer
Languages

Low level language/ Middle level High Level


Machine language language Language

• Algorithm : An algorithm is a set of rules or steps to solve a problem , while a flowchart


is a visual representation of that.

• A step-by-step process that defines how a program is executed.

• It is a procedure for solving problem.

• E.g. – Print 1 to 20
• Step-1 : Start

• Step-2 : Initialize a variable i to 1.

• Step-3 : Repeat the following steps until i is greater than 20:

• Step-4 : Print the value of i.

• Step-5 : Increment i by 1.

• Step-6 : End

• Flowchart :

• A flowchart is a diagram that visually represents the steps of a process, algorithm, or


workflow. It uses symbols and arrows to show the sequence of actions, decisions, and
outcomes in a logical order.
• Flowchart Symbols :

Start or end of a Connecto


program in flowchart r

Computational steps or
processing function of a Flowlines , showing the flow
program of a program

Input entry or output


display operation

Decision
making
and
branching
• Types of Flowchart -

• 1) Sequential Flowchart

• 2) Selection Flowchart

• 3) Iteration Flowchart

• ASCII (American Standard Code for Information Interchange)

• Definition: ASCII is a character encoding standard that represents text using numeric
values. Each character (letters, digits, symbols, and control characters) is assigned a
unique integer value between 0 and 127.

• E.g. Character ‘A’ – 65 (Decimal), 1000001 (Binary value)


• Pseudo Code

• Definition: Pseudo code is a high-level description of an algorithm that uses a mix of


natural language and programming constructs. It is not actual code but provides a
blueprint for writing real code in a specific programming language.

• E.g.

BEGIN

INPUT first_number

INPUT second_number

sum ← first_number + second_number

OUTPUT sum

END
• Introduction to Database

• A database is an organized collection of data that can be easily accessed, managed, and updated. It
stores information in such a way that it allows for efficient retrieval and manipulation of data.

• Key Features of DBMS

• Data Storage, Retrieval, and Update: DBMS allows users to store data systematically, retrieve it
when needed, and update it easily.

• Data Security: DBMS ensures data is protected from unauthorized access.

• Data Integrity: Maintains the accuracy and consistency of data.

• Data Redundancy Control: Minimizes data duplication.

• Data Backup and Recovery: Provides mechanisms for data recovery in case of system failure.

• Multi-user Access Control: Allows multiple users to access the database simultaneously without
conflicts.
Types of DBMS Architecture :

• Database management system describe the functioning and the design of the DBMS.

• Since the database is not always directly accessible by the user or an application.

• Different architectures based on how the user is connected to the database.

This architecture follow a tier-based application :

DBMS Architecture

Single-Tier Two-Tier Three-Tier


Architecture Architecture Architecture
1) Single-Tier Architecture :

Mainframe Direct Connection


User

Database

• No multiple users are accessing the database developer.

• Direct and simple way to modify or access the database for application development.
2) Two-Tier Architecture :

User

User

User

• The two-tier architecture is the same as the basic client-server.

• In the 2 tier architecture , applications on the client end directly communicate with the
database on the serverside. E.g. ODBC , JDBC

• Multiple users can use it at the same time, hence can be used in organization.

• Faster access to the database due to the direct connection and improved performance
3) Three-Tier Architecture :

• The 3 tier architecture contains another layer between the client and server. In this
client can’t directly communicate with the server.

• The end-user has no idea about the existence of the database beyond the application
server.

• It is used in large web applications.


3) SQL (Structured Query Language) :

• The SQL server enables us to directly interact with the database on our local system &
execute operations without any network connection.

• SQL commands can perform various tasks like create a table , add data to tables, drop
the table , modify the table and set permissions for users.

• Types Of SQL Commands :

Types of SQL Commands

TCL DCL DML DDL DQL


1) DDL (Data Definition Language) –

• Used to design the database structure.

• Is used to construct and modify the structure of database objects.

• DDL refers to a set of SQL instruction for creating , modifying & deleting database
structures.

• E.g. create , alter , drop , truncate, rename.

2) DML (Data Manipulation Language) –

• DML commands deal with manipulating data in database.

• E.g. insert , update , delete


3) DCL (Data Control Language) –

• It is a query language that allows users to retrieve and edit data held in databases.

• E.g. Grant & Revoke

4) Transaction Control Language –

• Used to manage transactions in database.

• E.g. Commit, Rollback , Savepoint.

• Select
Security Aspects –

• Computer security refers to protecting and securing computers and their related data,
networks, software, hardware from unauthorized access, misuse, theft, information loss
and other security issues.

• Types of Computer Security –

1. Cyber Security

2. Information Security

3. Application Security

4. Network Security
1) Cyber Security –

• Cyber security means securing our computers , electronic devices, network ,


programs , systems from cyber attacks.

2) Information Security –

• Information security means securing/protecting our systems information from theft ,


illegal use and privacy from unauthorized use.

3) Application Security –

• Application security means securing our applications and data so that they don’t get
hacked and also the databases of the application remain safe and private to the owner
itself so that user’s data remains confedential.
4) Network Security –

• Network security means securing a network & protecting the user’s information about
who is connected through the network.

You might also like