ETCS 111 Note
ETCS 111 Note
Shafiq ul Abidin
Unit 1
Compiled by:
Prof. Shafiq ul Abidin, Department of IT
HMR Institute of Technology & Management
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
1. What is a computer?
Computer is a device that transforms data into meaningful information. Data can be
anything like marks obtained by you in various subjects. It can also be name, age, sex,
weight, height, etc. of all the students in a class.
Computer can also be defined in terms of functions it can perform. A computer can i)
accept data, ii) store data, iii) process data as desired, and iv) retrieve the stored data
as and when required and v) print the result in desired format.
The major characteristics of a computer are high speed, accuracy, diligence, versatility
and storage.
The computer performs basically five major operations of functions irrespective of their
size and make. These are
2) it stores data,
1. Input: this is the process of entering data and programs into the computer
system.
2. Control Unit (CU): The process of input, output, processing and storage is
performed under the supervision of a unit called 'Control Unit'. It decides when to
start receiving data, when to stop it, where to store data, etc. It takes care of step
-by-step processing of all operations in side the computer.
3. Memory Unit: Computer is used to store data and instructions.
4. Arithmetic Logic Unit (ALU): The major operations performed by the ALU are
addition, subtraction, multiplication, division, logic and comparison.
5. Output: This is the process of producing results from the data for getting useful
information.
The ALU and the CU of a computer system are jointly known as the central processing
unit (CPU). You may call CPU as the brain of any computer system.
2. Peripheral Devices
Peripheral devices are connected to the computer externally. These devices are used
for performing some specific functions.
1. Input Devices
2. Output Devices
3. Other Peripherals
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Input Devices
Input devices accept data and instructions from the user. Following are the examples of
various input devices, which are connected to the computer for this purpose.
1.Keyboard
2. Mouse
3. Light Pen
4. Optical/magnetic Scanner
5. Touch Screen
7. Track Ball
8. Joy Stick
9. Scanner
Keyboard:
A keyboard (as shown in figure) is the most common input device. Several kinds of
keyboards are available, but they resemble each other with minor variations. The
keyboard in most common use is the QWERTY board.
Generally standard keyboard has 104 keys. In these keyboards, the cursor control keys
are duplicated to allow easier use of the numeric pad.
Mouse:
Fig: Mouse
The most common mouse uses an internal, magnetically coated ball, to detect the
movement of the mouse across a flat surface, usually a desktop. Now a days Optical or
laser mouse is used to detect the movement. All windows based applications today are
designed to work with a mouse. A mouse is used to replace hard -to-remember key
combinations with easier "Point and Click" actions. However, it cannot substitute all
keyboard operations. It can be alternative for commands based operations.
Light Pen:
Optical Scanner:
These devices are used for automatic data collection. The devices of this category
completely eliminate manual input of data. For example, the bar-code reader is actually
just a special type of image scanner. An image scanner translates printed images into
an electronic format that can be stored in a computer’s memory, and with the right kind
of software, one can alter a stored image. Another example of scanner is optical
character recognition (OCR) device, used by banks to convert the scanned image of a
typed or printed page into text that can be edited on the computer.
Digital cameras can be used for the same purposes as dedicated scanners. When
compared to a true scanner, a camera image is subject to a degree of distortion,
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
reflections, shadows, low contrast, and blur due to camera shake (reduced in cameras
with image stabilisation). Resolution is sufficient for less demanding applications. Digital
cameras offer advantages of speed, portability and non-contact digitizing of thick
documents without damaging the book spine. As of 2010 scanning technologies were
combining 3D scanners with digital cameras to create full-color, photo-realistic 3D
models of objects.[citation needed]
In the biomedical research area, detection devices for DNA microarrays are called
scanners as well. These scanners are high-resolution systems (up to 1 µm/ pixel),
similar to microscopes. The detection is done via CCD or a photomultiplier tube.
Scanners usually attach to your personal computer with a Small Computer System
Interface ( SCSI ). An application such as PhotoShop uses the TWAIN program to read
in the image.
Fig: Scanner
Touch Screen:
Touch panel displays and pads are now being offered as alternatives to keyboard. Here
the input can be given through the computer screen, that accepts the input through
monitor; users touch electronic buttons displayed on the screen or they may use light
pen.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Micro Phone:
Microphone is an input device, which takes voice as input. The voice communication is more
error-prone than information through keyboard. There are two types of microphones available
(as shown in figure ):
Track Ball:
Trackball, a pointing device, is a mouse lying on its back (as shown in figure ). To move
the pointer, you rotate the ball with your thumb, your fingers, or the palm of your hand.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
There are usually one to three buttons next to the ball, which you use just like mouse
buttons. The advantage of trackballs over mouse is that the trackball is stationary so it
does not require much space to use it. In addition, you can place a trackball on any type
of surface, including your lap. For both these reasons trackballs are popular pointing
devices for portable computers.
Joystick:
A joystick is an input device consisting of a stick that pivots on a base and reports its
angle or direction to the device it is controlling. A joystick, also known as the control
column, is the principal control device in the cockpit of many civilian and military
aircraft, either as a center stick or side-stick. It often has supplementary switches to
control various aspects of the aircraft's flight.
Joysticks are often used to control video games, and usually have one or more push-
buttons whose state can also be read by the computer. A popular variation of the
joystick used on modern video game consoles is the analog stick. Joysticks are also
used for controlling machines such as cranes, trucks, underwater unmanned vehicles,
wheelchairs, surveillance cameras, and zero turning radius lawn mowers. Miniature
finger-operated joysticks have been adopted as input devices for smaller electronic
equipment such as mobile phones.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Digital Camera: A digital camera (or digicam) is a camera that encodes digital
images and videosdigitally and stores them for later reproduction. [1] Most cameras sold
today are digital,[2] and digital cameras are incorporated into many devices ranging
from PDAsand mobile phones (called camera phones) to vehicles.
Digital and film cameras share an optical system, typically using a lens with a
variablediaphragm to focus light onto an image pickup device. [3] The diaphragm and
shutter admit the correct amount of light to the imager, just as with film but the image
pickup device is electronic rather than chemical. However, unlike film cameras, digital
cameras can display images on a screen immediately after being recorded, and store
and delete images from memory. Many digital cameras can also record moving videos
with sound. Some digital cameras can crop and stitch pictures and perform other
elementary image editing.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Output Devices
Output devices return processed data that is information, back to the user. Some of the
commonly used output devices are:
Monitor:
Out of all the output devices, monitor (as shown in figure) is perhaps the most important
output device because people interact with this device most intensively than others.
Computer information is displayed, visually with a video adapter card and monitor.
Information processed within the CPU, that needs to be visually displayed, is sent to
video adapter. The video adapter converts information from the format used, in the
same manner as a television displays information sent to it by a cable service.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Two basic types of monitors are used with microcomputers, which are as follows:
1. CRT
2. LCD
Cathode Ray Tube (CRT): CRT or Cathode Ray Tube Monitor is the typical monitor
that you see on a desktop computer. It looks a lot like a television screen, and works the
same way. This type uses a large vacuum tube, called cathode ray tube (CRT).
Liquid Crystal Displays (LCD): This type of monitors are also known as flat panel
monitor. Most of these employ liquid crystal displays (LCDs) to render images. These
days LCD monitor are very popular. When people talk about the capabilities of various
monitors, one critical statistic is the resolution of the monitor. Most monitors have a
resolution of at least 800 x 600 pixels. High-end monitors
can have resolutions of 1024 x 768 pixels or even 1280 x 1024 pixels. Thus monitors
are available either in low resolution or in high resolution.
Printer:
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
After a document is created on the computer, it can be sent to a printer for a hard copy
(printout). Some printers offer special features such as colored and large page formats.
Some of the most commonly used printers are:
1. Laser Printer
2. Ink Jet Printer
3. Dot Matrix Printer
4. Line Printer
Laser Printer: A laser printer produces high quality print that one normally finds in
publishing. It is extremely fast and quiet. Moreover, the operation of a laser printer is
easy with automatic paper loading and no smudging or messing up of ink ribbons. The
fastest laser printer can print up to 200 pages per minute in monochrome (black and
white) and up to 100 pages per minute in colour.
Ink- Jet Printer: An ink-jet printer creates an image directly on paper by spraying ink
through as many as 64 tiny nozzles. Although the image it produces is not generally
quite as sharp as the output of a laser printer, the quality of ink-jet images is still high.
In general, ink-jet printer offers an excellent middle ground between dot matrix and laser
printer. Like laser printer, an ink-jet printer is quiet and convenient, but not particularly
fast.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Typically, an ink-jet printer is more expensive than a dot-matrix printer, but costs only
half as much as a laser printer.
Dot Matrix Printer: The dot matrix printer was very popular at one point of time. It is a
very versatile and inexpensive output device. In dot matrix printer the print head
physically "hits" the paper through the ribbon and produces text (or images) by
combinations of dots; hence the name dot matrix printer. Its speed is measured in
characters per second (CPS). Although it is less expensive, it is louder, slower and
produces lower print quality.
Line Printer: A line printer is generally used with large computer systems to produce
text based data processing reports. Line printers are high-speed printers with speeds
ranging anywhere from 100 to about 3800 lines per minute. In the past, print quality on
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
line printers was not high. Developments in technology are improving the print quality on
Impact Printer: An impact printer is a type of printer that operates by striking a metal or
plastic head against an ink ribbon. The ink ribbon is pressed against the paper, marking
the page with the appropriate character, dot, line, or symbol. Common examples of
impact printers include dot matrix, daisy-wheel printers, and ball printers.
Dot matrix printers work by striking a grid of pins against a ribbon. Different characters
are printed by using different pin combinations. Daisy-wheel printers use a circular
wheel with "petals" that each have a different character or symbol on the end. In order
to print each character, the wheel spins to the appropriate petal and a hammer strikes
the petal against the ribbon and the page. Similarly, ball printers use a spherical ball
with raised characters on the outside. The ball spins to each character before printing it
on the page.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
While impact printers still have some uses (such as printing carbon copies), most
printers are nownon-impact printers. These printers, such as laser and inkjet printers
are much quieter than impact printers and can print more detailed images.
Non Impact Printer : Early printers, such as dot matrix and daisywheel printers were
called impact printers, since they operated by striking an ink ribbon against the paper.
Most modern printers, including inkjet and laser printers, don't include an ink ribbon and
are considered to be non-impact printers.
Non-impact printers are generally much quieter than impact printers since they don't
physically strike the page. For example, inkjet printers spray tiny drops of ink onto the
page, while laser printers use a cylindrical drum that rolls electrically charged ink onto
the paper. Both of these methods are non-impact and provide an efficient printing
process that produces little sound. The low impact nature of inkjet and laser printers
also means they are less likely to need maintenance or repairs than earlier impact
printers.
An impact printer is a printer that strikes a print head against an ink ribbon to mark the
paper. Common examples include dot matrix and daisy-wheel printers.
Plotter:
A plotter is a special kind of output device that, like a printer, produces images on paper,
but does so in a different way. Plotters are designed to produce large drawings or
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
images, such as construction plans for buildings or blueprints for mechanical objects. A
plotter can be connected to the port normally used by a printer.
An array of different colored pens in a clip rack and a robotic arm is part of plotter. The
instructions that a plotter receives from a computer consist of a color, and beginning and
ending coordinates for a line. With that information, the plotter picks up the appropriate
pen through its arm, positions it at the beginning coordinates drops the pen down to the
surface of the paper and draws to the ending coordinates. Plotters draw curves by
creating a sequence of very short straight lines.
Plotters usually come in two designs:
1. Flat Bed: Plotters of small size to be kept on table with restriction of paper size.
2. Drum: These plotters are of big size using rolls of paper of unlimited length.
Speaker:
Speakers (as shown in figure) are another type of output device, which allow you to
listen to voice like music, and conversation with people.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Fig: Speaker
OMR is basically a system that gathers information by using a hardware device that
detects a reflection or an absence of reflection from a card or piece of paper. OMR
enables the processing of hundreds or thousands of documents every hour
automatically.
OMR processing is popular for tests, where students receive a special card containing
several empty circles and a packet that contains the questions and possible answers to
each of the questions. The student must complete the test by using a pencil to fill in
each blank circle with what he or she believes is the correct answer. For example, if the
answer is "B", the student would have to fill in the "B Circle" in order to get the answer
correct.
Once the card or form has been completed a user would feed the cards into a system
that grades or gathers information from the card. An example of an OMR system is the
Scanmark 5500 from Scantron, a system that is capable of processing 5,500
documents every hour.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
OMR scanning is fast: An OMR scanner can maintain a throughput of 2000 to 10,000
forms per hour. This activity can be controlled and processed by a single PC
workstation, which can handle any volume the scanner can generate. Increasing the
throughput simply requires upgrading the scanner. Double entry is not required.
OMR scanning is cost effective: With OMR technology, organizations can accomplish a
wide variety of administrative tasks rapidly and accurately from a central location, with
minimum initial and ongoing outlay of funds.
All OCR systems include an optical scanner for reading text, and
sophisticated software for analyzing images. Most OCR systems use a combination
of hardware (specialized circuit boards) and software to recognize characters, although
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
some inexpensive systems do it entirely through software. Advanced OCR systems can
read text in large variety of fonts, but they still have difficulty with handwritten text.
The potential of OCR systems is enormous because they enable users to harness the
power of computers toaccess printed documents. OCR is already being used widely in
the legal profession, where searches that once required hours or days can now be
accomplished in a few seconds.
Applications of OCR : OCR engines have been developed into many kinds of object
oriented OCR applications, such as receipt OCR, invoice OCR, check OCR, legal billing
document OCR.
Data entry for business documents, e.g. check, passport, invoice, bank
statement and receipt
There are two major MICR fonts in use: E-13B and CMC-7. E-13B has a 14 character
set, while CMC-7 has 15—the 10 numeric characters, plus control characters.
The MICR E-13B font is the standard in Australia, Canada, the United Kingdom, the
United States, and other countries. (The "13" in the font's name comes from the 0.013-
inch grid used to design it. [2]) 0.013-inch is one typographic point. Besides decimal
digits, it also contains the following symbols: ⑆ (transit: used to delimit a bank
branch routing transit number), ⑇ (amount: used to delimit a transaction amount), ⑈
(on-us: used to delimit a customer account number), and ⑉ (dash: used to delimit parts
of numbers—e.g., routing numbers or account numbers).
Major European countries, including France and Italy, use the CMC-7 font, developed
by Groupe Bull in 1957.
The use of MICR can enhance security and minimize the losses caused by some types
of crime. If a document has been forged - for example, a counterfeit check produced
using a color photocopying machine, the magnetic-ink line will either not respond to
magnetic fields, or will produce an incorrect code when scanned using a device
designed to recover the information in the magnetic characters. Even a legitimate check
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
can be rejected if the MICR reader indicates that the owner of the account has a history
of writing bad checks.
Retailers commonly use MICR readers to minimize their exposure to check fraud.
Corporations and government agencies also use the technology to speed up the sorting
of documents.
MICR characters are printed in the form of either an e-13b or cmc-7 font. each font
series is made up of a series of numbers and symbols specifically designed for
readability on check sorting machines which read at extremely high rates of speed. the
symbols provide a beginning and ending point for each group of numbers allowing the
machine to quickly determine what each series of number signifies. line placement,
character placement, skew and quality are several critical components of printing micr;
the line must be precisely positioned in the micr clear band area. to create consistency
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
in the check clearing process it is critical that each character is readable and that the
What is resolution?
Resolution is the term used to describe the number of dots, or pixels, used to display an
image.
Higher resolutions mean that more pixels are used to create the image, resulting in a
crisper, cleaner image.
Refers to the sharpness and clarity of an image. The term is most often used to
describe monitors, printers, and bit-mapped graphic images. In the case of dot-
matrix and laser printers, the resolution indicates the number of dots per inch. For
example, a 300-dpi (dots per inch) printer is one that is capable of printing 300
distinct dotsin a line 1 inch long. This means it can print 90,000 dots per square inch.
For graphics monitors, the screen resolution signifies the number of dots (pixels) on the
entire screen. For example, a 640-by-480 pixel screen is capable of displaying 640
distinct dots on each of 480 lines, or about 300,000 pixels. This translates into different
dpi measurements depending on the size of the screen. For example, a 15-
inch VGAmonitor (640x480) displays about 50 dots per inch.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Printers, monitors, scanners, and other I/O devices are often classified as high
resolution, medium resolution, orlow resolution. The actual resolution ranges for each of
these grades is constantly shifting as the technology improves.
Storage Devices
RAM stands for Random Access Memory and t is read/write memory. Information can
be written into and read from a RAM. It is a volatile memory. It retains the stored
information as long as it is supplied with power. When power supply is switched off or
interrupted the stored information in the RAM is lost. RAMs of various capacities are
available for example, 1K, 4K, 16K, 64K, 1M, 4M and so on.
Types of RAMs
There are two important types of RAMs - static RAM and dynamic RAM. Static RAMs
retain stored information as long as power supply is on . But a dynamic RAM loses its
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
stored information in a very short time even though the power supply is on. Therefore,
dynamic RAMs have to be refreshed periodically, generally every 2 millisecond. The
dynamic RAMs are cheaper and have high packing density and moderate speed. They
consume less power. They are used where large capacity memories are needed. Static
RAMs are costlier and consume more power. They do not need refreshing circuiting.
They have higher speed than dynamic RAMs. Static RAM and dynamic RAM are also
written as SRAM and DRAM.
1. SRAM is a static RAM because each bit of SRAM remains stored until
power
supply to the computer goes off.
2. For SRAM each bit is stored in flip-flop.
3. SRAM does not need any extra circuit for maintaining bit value (logic 1 or
0) in flip-flops.
4. With respect to same size of DRAM, SRAM can store fewer amounts of
data.
5. SRAM cells are large with respect to DRAM cells.
6. SRAM is faster than DRAM because SRAM does not need any refreshing
circuit before accessing the bits of SRAM.
7. This memory is made of transistors.
8. It is very costly as compared to DRAM.
9. It has less storage density.
Programmable ROMs called PROMs are also available. Further, different types of
PROMs such as Erasable PROM called EPROM, electrically erasable PROM called
E2PROM are available. Users can write information in PROMs, EPROMs and
E2PROMs. Once programmed the recorded information into an EPROM or E2PROM
can be erased to record different information, whereas in a PROM the information once
written by the user can not be changes. Such information is required while executing
user programs. An example of PROM is 74S287.
A variation of ROM chip is programmable read only memory. ROM chip are supplied by
the computer system manufacture and it is not possible for a customer to modify the
programs stored inside the ROM chip. However, it is possible for a user to customize a
system by converting his own programs to micro programs and storing them in a PROM
chip. Once the users programs are stored in a PROM chip, they can usually be
executed in a fraction of the time previously required. PROMs are programmed to
record information using a special facility known as a pro-programmer. However, once
the chip has been programmed, the recorded information can not be changed, i.e. the
PROM becomes a ROM and it is only possible to read the stored information. PROM is
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
also non-volatile storage, i.e. the stored information remains intact even if power is
switched off.
PRIMARY MEMORY
SECONDARY MEMORY
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
1. RAM is both read and write enable means users can write into and read
from a RAM.
2. RAM is volatile in nature means its content gets erased when power
supply to the computer is switched off.
3. A user can write information in RAM temporarily.
4. It is necessary for holding of data at the time of processing.
Cache Memory
Cache memory, also called CPU memory, is random access memory (RAM) that a
computer microprocessor can access more quickly than it can access regular RAM.
As the microprocessor processes data, it looks first in the cachememory and if it finds
the data there (from a previous reading of data), it does not have to do the more time-
consuming reading of data from larger memory.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Cache memory is fast and it is expensive. It is categorized in levels that describe its
closeness and accessibility to the microprocessor. Level 1 (L1) cache, which is
extremely fast but relatively small, is located close to the processor. Level 2 (L2) cache
is located half-way between the process and the system bus; it is fairly fast and
medium-sized. Level 3 (L3) cache is relatively large and close to RAM.
Hard Disk
A magnetic disk on which you can store computer data. The term hard is used to
distinguish it from a soft, or floppy, disk. Hard disks hold more data and are faster
than floppy disks. A hard disk, for example, can store anywhere from 10 to more than
100 gigabytes, whereas most floppies have a maximum storagecapacity of 1.4
megabytes.
A single hard disk usually consists of several platters. Each platter requires
two read/write heads, one for each side. All the read/write heads are attached to a
single access arm so that they cannot move independently. Each platter has the same
number of tracks, and a track location that cuts across all platters is called a cylinder.
For example, a typical 84 megabyte hard disk for aPCmight have two platters (four
sides) and 1,053 cylinders.
In general, hard disks are less portable than floppies, although it is possible to
buy removable hard disks.
A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk drive,"
that stores and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk drive,"
that stores and provides relatively quick access to large amounts of data on an
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
A disk is divided into tracks, cylinders, and sectors. A track is that portion of a disk
which passes under a single stationary head during a disk rotation, a ring 1 bit wide.
A cylinder is comprised of the set of tracks described by all the heads (on separate
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
platters) at a single seek position. Each cylinder is equidistant from the center of the
disk. A track is divided into segments of sectors, which is the basic unit of storage.
On Sun systems a sector is 512 bytes (1 disk block) of data, with header and trailer
information. The latter make it possible for the controller to identify sectors, detect data
errors, and perform error corrections when necessary. The actual layout of a disk sector
will vary depending on the controller, but should look something like that shown in Fig.
2.3. There are two Preambles and a Postamble (whose sizes may vary due to rotational
speed, etc., and are disk dependent). The Header field lets the controller know where
the head is positioned, and the ECC field is for error correction.
The number of sectors per track varies with the radius of the track on the platter. The
outermost tracks is larger and can hold more sectors than the inner ones. These outer
tracks also spin faster under the head than do the inner ones, because while the
angular speed remains the same, the larger circumference results in more sectors
spinning by in the same period for the outer tracks. Disk blocks are numbered starting at
the outermost track, so put the data you expect to access most often on partition, or
slice, 0.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Magnetic Tape
Magnetic tape revolutionized broadcast and recording. When all radio was live, it
allowed programming to be prerecorded. At a time whengramophone records were
recorded in one take, it allowed recordings in multiple parts, which mixed and edited
with tolerable loss in quality. It is a key technology in early computer development,
allowing unparalleled amounts of data to be mechanically created, stored for long
periods, and to be rapidly accessed.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Today, other technologies can perform the functions of magnetic tape. In many cases
these technologies are replacing tape. Despite this, innovation in the technology
continues and tape is still widely used.
Over years, magnetic tape can suffer from deterioration called sticky-shed syndrome.
Caused by absorption of moisture into the binder of the tape, it can render the tape
unusable.
Sequential Medium
The major drawback of tape is its sequential format. Locating a specific record requires
reading every record in front of it or searching for markers that identify predefined
partitions. Although most tapes are used for archiving rather than routine updating,
some drives allow rewriting in place if the byte count does not change. Otherwise,
updating requires copying files from the original tape to a blank tape (scratch tape) and
adding the new data in between.
Blu-ray is an optical disc format designed to display high definition video and store large
amounts of data.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
The format's name comes from the fact that a blue laser reads from and writes to the
disc rather than the red laser of DVD players. The blue laser has a
405 nanometer (nm)wavelength that can focus more tightly than the red lasers used for
writable DVD. As a consequence, a Blu-ray disc can store much more data in the same
12 centimeter space. Like the rewritable DVD formats, Blu-ray uses phase
change technology to enable repeated writing to the disc.
Blu-ray also features data streams at 36 megabits per second (Mbps), fast enough for
high quality video recording. Blu-ray discs will not play on current CD and DVD players,
because those players lack the blue-violet laser required to read the discs. If the
appropriate lasers are included, however, Blu-ray players can play the other two
formats. Blu-ray disc players (BDPs) are available from a number of anufacturers,
including Panasonic, Pioneer, Samsung and Sony. Sony's Playstation 3 also has a Blu-
ray drive installed.
What is Blu-ray?
Blu-ray, also known as Blu-ray Disc (BD) is the name of a new optical disc format that is
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
rapidly replacing DVD. The format was developed to enable recording, rewriting and
playback of high-definition video (HD), as well as storing large amounts of data. The
format offers more than five times the storage capacity of traditional DVDs and can hold
up to 25GB on a single-layer disc and 50GB on a dual-layer disc.
The name Blu-ray is derived from the underlying technology, which utilizes a blue-violet
laser to read and write data. The name is a combination of "Blue" (blue-violet laser) and
"Ray" (optical ray). According to the Blu-ray Disc Association the spelling of "Blu-ray" is
not a mistake, the character "e" was intentionally left out so the term could be registered
as a trademark.
The correct full name is Blu-ray Disc, not Blu-ray Disk (incorrect spelling) The correct
shortened name is Blu-ray, not Blu-Ray (incorrect capitalization) or Blue-ray (incorrect
spelling) The correct abbreviation is BD, not BR or BRD (wrong abbreviation)
As with conventional CDs and DVDs, Blu-ray plans to provide a wide range of formats
including ROM/R/RW. The following formats are part of the Blu-ray Disc specification:
BD-ROM - read-only format for distribution of HD movies, games, software, etc.
BD-R - recordable format for HD video recording and PC data storage.
BD-RE - rewritable format for HD video recording and PC data storage.
There's also plans for a BD/DVD hybrid format, which combines Blu-ray and DVD on
the same disc so that it can be played in both Blu-ray players and DVD players.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
To ensure that the Blu-ray Disc format is easily extendable (future-proof) it also includes
support for multi-layer discs, which should allow the storage capacity to be increased to
100GB-200GB (25GB per layer) in the future simply by adding more layers to the discs.
Generation of Computers
The first computers of this generation were developed for the atomic energy industry.
which allowed the device to run many different applications at one time with a central
program that monitored the memory. Computers for the first time became accessible to
a mass audience because they were smaller and cheaper than their predecessors.
As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of the Internet. Fourth generation
computers also saw the development of GUIs, the mouseand handheld devices.
Computer Languages
Languages are a means of communication. Normally people interact with each other
through a language. On the same pattern, communication with computers is carried out
through a language. This language is understood both by user and the machine. Just as
every language like English, Hindi has its grammatical rules; every computer language
is bound by rules known as SYNTAX of that language. The user is bound by that syntax
while communicating with the computer system.
Low Level Languages :The term low level means closeness to the way in which
machine understand. The low level languages are:
a. Machine Language:
This is the language (in the form of 0’s and 1’s, called binary numbers) understood
directly by the computer. It is machine dependent. It is difficult to learn and even more
difficult to write programs.
b. Assembly Language:
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
This is the language where the machine codes comprising of 0’s and 1’s are substituted
by symbolic codes (called mnemonics) to improve their understanding. It is the first
step to improve programming structure. Assembly language programming is simpler
and less time consuming than machine level programming, it is easier to locate and
correct errors in assembly language than in machine language programs. It is also
machine dependent. Programmers must have knowledge of the machine on which the
program will run.
High Level Languages : You know that low level language requires extensive
knowledge of the hardware since it is machine dependent. To overcome the limitation,
high level language has been evolved which uses normal English like, easy to
understand statements to solve any problem. Higher level languages are computer
independent and programming becomes quite easy and simple.
Various high level languages are given below:
BASIC (Beginners All Purpose Symbolic Instruction Code): It is widely used, easy
to learn general purpose language. Mainly used in microcomputers in earlier
days.
C++: Popular object oriented programming language, used for general purpose.
JAVA
LISP
Prolog
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Introduction to Software
As you are aware, computer cannot do anything on its own. It is the user who instructs
computer; what to do, how to do and when to do. In order to perform any task, you have
to give a set of instructions in a particular sequence to the computer. These sets of
instructions are called Programs. Software refers to a set of programs that makes the
hardware perform a particular set of tasks in particular order. Software can be classified
mainly into following categories and sub-categories are shown in Figure
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
System software:
System software is any computer software that provides the infrastructure over which
programs can operate, i.e. it manages and controls computer hardware so that
application software can perform. Operating systems, such as GNU, Microsoft
Windows, Mac OS X or Linux, are prominent examples of system software.
System software is software that basically makes the computer work. Besides operating
systems, other examples are anti-virus software, communication software and printer
drivers. Without the system software the computer doesn't work. In contrast to system
software, software that allows you to do things like create text documents, play games,
listen to music, or surf the web is called application software.
In general application software are programs that enable the end-user to perform
specific, productive tasks, such as word processing or image manipulation. System
software performs tasks like transferring data from memory to disk, or rendering text
onto a display device.
System Software can be classified as operating system, device drivers and utility
software. An operating system creates an interface between user and the system
hardware, while other system software will refine or allow greater interaction with the
machine's hardware.
System software helps run the computer hardware and computer system. It includes
operating systems, device drivers, diagnostic tools, servers, windowing systems,
utilities, language translator, data communication programs, data management
programs and more. The purpose of systems software is to insulate the applications
programmer as much as possible from the details of the particular computer complex
being used, especially memory and other hardware features, and such accessory
devices as communications, printers, readers, displays, keyboards, etc.
Specific kinds of system software include:
Loading programs
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
When you switch on the computer the programs stored in ROM are executed which
activates different units of your computer and makes it ready for you to work on it. This
set of programs can be called system software.
System software means sets of programs, responsible for running the computer,
controlling various operations of computer systems and management of computer
resources. Operating System (OS) falls under this category.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Although operating system provides all the features users need to use and maintain
their systems, inevitably, they still do not meet everyone’s expectations. This has led to
another type of system software called "Utilities". These are programs that bridge the
gap between the functionality of an OS and the needs of users. Utility programs are a
broad category of software such as compress (zip)/uncompress (unzip) files software,
anti virus software, split and join files software, etc.
Single User Operating Systems :- DOS, MSDOS, CP/M and early versions of Mac
Multiuser Systems: - Windows NT, Windows XP, Unix, Linux, Zenix
Application Software:
Application software is a set of programs, which are written to perform specific tasks, for
example: An application package for managing library known as library information
system is used to manage information of library such as: keeping book details, account
holder details, book issue details, book return details etc. Another application package
for managing student details is called student’s information system, manages
student’s roll no, name, parents name, address, class, section, processing of
examination results etc. Application software can be broadly classified into two types:
For Example: Student information details, Payroll packages, inventory control etc.These
packages are developed using high-level computer language.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Language Translators
Languages translators are of three types: Compiler, Interpreter, Assembler
Compiler
Source code is not included, therefore compiled code is more secure than interpreted
code
Produces an executable file, and therefore the program can be run without need of
the source code
Object code needs to be produced before a final executable file, this can be a slow
process
The source code must be 100% correct for the executable file to be produced
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Fig: Compiler
Interpreter
An interpreter program executes other programs directly, running through program code
and executing it line-by-line. As it analyses every line, an interpreter is slower than
running compiled code but it can take less time to interpret program code than to
compile and then run it — this is very useful when prototyping and testing code.
Interpreters are written for multiple platforms, this means code written once can be run
immediately on different systems without having to recompile for each. Examples of this
include flash based web programs that will run on your PC, MAC, games console and
Mobile phone.
Source code is required for the program to be executed, and this source code can
be read making it insecure
Interpreters are generally slower than compiled programs due to the per-line
translation method
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Assembler
Conversely, one instruction in a high level language will translate to one or more
instructions at machine level.
Assembly code is often very efficient (and therefore fast) because it is a low level
language
Assembly code is fairly easy to understand due to the use of English-like mnemonics
Assembly tends to be optimised for the hardware it's designed for, meaning it is
often incompatible with different hardware
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
In high level languages, some built in header files or libraries are stored. These libraries
are predefined and these contain basic functions which are essential for executing the
program. These functions are linked to the libraries by a program called Linker. If linker
does not find a library of a function then it informs to compiler and then compiler
generates an error. The compiler automatically invokes the linker as the last step in
compiling a program.
Not built in libraries, it also links the user defined functions to the user defined libraries.
Usually a longer program is divided into smaller subprograms called modules. And
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
these modules must be combined to execute the program. The process of combining
Loader: Loader is a program that loads machine codes of a program into the system
for loading programs. It is one of the essential stages in the process of starting a
program. Because it places programs into memory and prepares them for execution.
Loading a program involves reading the contents of executable file into memory. Once
loading is complete, the operating system starts the program by passing control to the
loaded program code. All operating systems that support program loading have loaders.
Exercise
1. What is a computer? Draw a block diagram to illustrate the basic organisation of a computer
system and explain the functions of various units.
4. What is a software? Discuss its various categories with the help of diagram.
5. Distinguish between system and application software.
6. Write short notes on:
(a) Laser Printer
(b) High level language
(c) Compiler
(d) Plotter
7. Write a note on Computer language and its classification.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Unit 2
Compiled by:
Prof. Shafiq ul Abidin, Department of IT
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
What is OS?
resources and provides common services for computer programs. The operating
Single User Operating System (Example - DOS, MSDOS, CP/M and earlier versions
of Mac)
Multiuser Operating System (Examples - Windows 2000, Windows XP, Unix, Linux)
Real-time
algorithms so that they can achieve a deterministic nature of behavior. The main
events. They have an event-driven or time-sharing design and often aspects of both. An
event-driven system switches between tasks based on their priorities or external events
Multi-user
A multi-user operating system allows multiple users to access a computer system at the
same time. Time-sharing systems and Internet servers can be classified as multi-user
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
systems as they enable multiple-user access to a computer through the sharing of time.
Single-user operating systems have only one user but may allow multiple programs to
A multi-tasking operating system allows more than one program to be running at the
same time, from the point of view of human time scales. A single-tasking system has
only one running program. Multi-tasking can be of two types: pre-emptive and co-
operative. In pre-emptive multitasking, the operating system slices the CPU time and
dedicates one slot to each of the programs. Unix-like operating systems such as Solaris
multitasking is achieved by relying on each process to give time to the other processes
tasking. 32-bit versions of both Windows NT and Win9x, used pre-emptive multi-tasking.
Distributed
could be linked and communicate with each other gave rise to distributed computing.
Distributed computations are carried out on more than one machine. When computers
Embedded
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
They are designed to operate on small machines like PDAs with less autonomy. They
are able to operate with a limited number of resources. They are very compact and
Multi-user
Allows two or more users to run programs at the same time. Some operating systems
permit hundreds or even thousands of concurrent users.
A multi-user operating system is a computer operating system (OS) that allows multiple
users on different computers or terminals to access a single system with one OS on it.
These programs are often quite complicated and must be able to properly manage the
necessary tasks required by the different users connected to it. The users will typically
be at terminals or computers that give them access to the system through a network, as
well as other machines on the system such as printers. A multi-user operating system
differs from a single-user system on a network in that each user is accessing the same
OS at different machines.
Multiprocessing
Refers to a computer system's ability to support more than one process (program) at the
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Refers to the utilization of multiple CPUs in a single computer system. This is also
called parallel processing.
Multitasking
Multithreading
Real Time
Batch Processing
An example of batch processing is the way that credit card companies process billing.
The customer does not receive a bill for each separate credit card purchase but one
monthly bill for all of that month��s purchases. The bill is created through batch
processing, where all of the data are collected and held until the bill is processed as a
batch at the end of the billing cycle.
The opposite of batch processing is transaction processing or interactive processing. In
interactive processing, the application responds to commands as soon as you enter
them.
Executing a series of non interactive jobs all at one time. The term originated in the
days when users entered programs on punch cards. They would give a batch of these
programmed cards to the system operator, who would feed them into the computer.
Batch jobs can be stored up during working hours and then executed during the evening
or whenever the computer is idle. Batch processing is particularly useful for operations
that require the computer or a peripheral device for an extended period of time. Once a
batch job begins, it continues until it is done or until an error occurs. Note that batch
processing implies that there is no interaction with the user while the program is being
executed.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Online activity may be real time sometimes but there are online systems that are not real time
Real time systems are those where the user gets immediate response to his reaction and there
is no time delay
If you are typing something and it appears on the screen of another person online after a lag
of few micro seconds, it is online but not real time
Time Sharing
Time sharing is a technique which enables many people, located at various terminals, to
use a particular computer system at the same time. Time-sharing or multitasking is a
logical extension of multiprogramming. Processor's time which is shared among multiple
users simultaneously is termed as time-sharing. The main difference between
Multiprogrammed Batch Systems and Time-Sharing Systems is that in case of
Multiprogrammed batch systems, objective is to maximize processor use, whereas in
Time-Sharing Systems objective is to minimize response time.
Multiple jobs are executed by the CPU by switching between them, but the switches
occur so frequently. Thus, the user can receives an immediate response. For example,
in a transaction processing, processor execute each user program in a short burst or
quantum of computation. That is if n users are present, each user can get time
quantum. When the user submits the command, the response time is in few seconds at
most.
Operating system uses CPU scheduling and multiprogramming to provide each user
with a small portion of a time. Computer systems that were designed primarily as batch
systems have been modified to time-sharing systems.
Advantages of Timesharing operating systems are following
Problem of reliability.
Distributed systems use multiple central processors to serve multiple real time
application and multiple users. Data processing jobs are distributed among the
processors accordingly to which one can perform each job most efficiently.
The processors communicate with one another through various communication lines
(such as high-speed buses or telephone lines). These are referred as loosely coupled
systems or distributed systems. Processors in a distributed system may vary in size and
function. These processors are referred as sites, nodes, computers and so on.
The advantages of distributed systems are following.
With resource sharing facility user at one site may be able to use the resources available
at another.
Speedup the exchange of data with one another via electronic mail.
If one site fails in a distributed system, the remaining sites can potentially continue
operating.
When you purchase a mobile device the manufacturer will have chosen the operating
system for that specific device. Often, you will want to learn about the mobile operating
system before you purchase a device to ensure compatibility and support for the mobile
applications you want to use.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
The Android mobile operating system is Google's open and free software stack that
includes an operating system, middleware and also key applications for use on mobile
devices, including smartphones. Updates for the open source Android mobile operating
system have been developed under “dessert-inspired” codenames (Cupcake, Donut,
Eclair, Gingerbread, Honeycomb, Ice Cream Sandwich) with each new version arriving
in alphabetical order with new enhancements and improvements .
Bada is a proprietary Samsung mobile OS that was first launched in 2010. The
Samsung Wave was the first smartphone to use this mobile OS. Bada provides mobile
features such as multipoint-touch, 3D graphics and of course, application downloads
and installation.
Apple's iPhone OS was originally developed for use on its iPhone devices. Now, the
mobile operating system is referred to as iOS and is supported on a number of Apple
devices including the iPhone, iPad, iPad 2 and iPod Touch. The iOS mobile operating
system is available only on Apple's own manufactured devices as the company does not
license the OS for third-party hardware. Apple iOS is derived from Apple's Mac OS
operating system.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
A joint open source mobile operating system which is the result of merging two products
based on open source technologies: Maemo (Nokia) and Moblin (Intel). MeeGo is a
mobile OS designed to work on a number of devices including smartphones, netbooks,
tablets, in-vehicle information systems and various devices using Intel Atom and ARMv7
architectures.
The Palm OS is a proprietary mobile operating system (PDA operating system) that was
originally released in 1996 on the Pilot 1000 handheld. Newer versions of the Palm OS
have added support for expansion ports, new processors, external memory cards,
improved security and support for ARM processors and smartphones. Palm OS 5 was
extended to provide support for a broad range of screen resolutions, wireless
connections and enhanced multimedia capabilities and is called Garnet OS.
. Symbian OS (Nokia)
Symbian is a mobile operating system (OS) targeted at mobile phones that offers a
high-level of integration with communication and personal information management
(PIM) functionality. Symbian OS combines middleware with wireless communications
through an integrated mailbox and the integration of Java and PIM functionality (agenda
and contacts). Nokia has made the Symbian platform available under an alternative,
open and direct model, to work with some OEMs and the small community of platform
development collaborators. Nokia does not maintain Symbian as an open source
development project.
8. webOS (Palm/HP)
WebOS is a mobile operating system that runs on the Linux kernel. WebOS was initially
developed by Palm as the successor to its Palm OS mobile operating system. It is a
proprietary Mobile OS which was eventually acquired by HP and now referred to as
webOS (lower-case w) in HP literature. HP uses webOS in a number of devices
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
including several smartphones and HP TouchPads. HP has pushed its webOS into the
enterprise mobile market by focusing on improving security features and management
with the release of webOS 3.x. HP has also announced plans for a version of webOS to
run within the Microsoft Windows operating system and to be installed on all HP
desktop and notebook computers in 2012.
These commands are automatic loaded into the memory when operating system is
loaded into the memory. Thus these are also called memory-resident commands. The
command available are all combined together and are stored in Command.com file,
which is a executable command file. These internal command are further grouped
according to their properties. These are as follows.
1. CLS
7. COPY CON
2. DIR
8. TYPE 12. MD
3. VER
9. COPY 13. CD
4. VOL
10. REN 14. RD
5. DATE
11. DEL
6. TIME
1. CLS:- (Clear the screen) This command is used to clear the screen or wipe out
every thing written on the screen.
2. DIR:- (Directory) Dir command is used for listing files and directories present in
the current disk.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Switches:-
/P Page wise
/W Widths wise
Output:-
C:\>VER
4. VOL:-(Volume) Displays the disk volume label and serial number, if it exist.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Type DATE without parameters to display the current date setting and
a prompt for a new one. Press ENTER to keep the same date.
Note:- We enter new date in the format of MM-DD-YY.
Type TIME with no parameters to display the current time setting and a prompt for a
new one. Press ENTER to keep the same time.
After copy con we must specify a suitable file name. Press enter. Start typing the
informations of the file. After gathering the information we press ^Z (CTRL+Z)
button or F6 button to save the file. After pressing enter key computer will show a
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
message like 1 file(s) copied. This means that file is stored in the disk. Suppose we
don't want to save the file or we just want to abort from file creation job, then we
simply press ^C (CTRL+C) button to abort without saving the file, intend of pressing
^Z button.
8. TYPE:- This command is used to display the contents or text of any file to the
display device.
9. COPY :- Copy command is used for copy any file to another location or to copy
the files to another directory. This command may also be used for copying any file to
another disk with different file name.
10. REN:- (Rename) This command is used to change the name of any file or
directory.
Note that you cannot specify a new drive or path for your destination.
11. DEL:- This command is used for erasing any file from the disk.
Now this directory can be used for keeping various sort of reports. Under this
directory we can create another directory which is known as subdirectory.
13. CD:- (Change Directory):- We can enter or exit from any directory using this
command.
Prompt will change with the directory name. If we keep two dots after CD command
than we will exit from the directory.
Syntax:-C:\> CD..
C:\REPORT> CD..
C:\>
14. RD:-(Remove directory):- This command is used when we want to remove any
unusable directory form our disk.
15. PATH:- This command is used for display or sets directories for executable files.
NOTE:- If we need any help for above DOS commands the we put a '/?' symbol after
writting the command at DOS prompt .
External commands are known as Disk residence commands. Because they can be
store with DOS directory or any disk which is used for getting these commands.
Theses commands help to perform some specific task. These are stored in a secondary
storage device. Some important external commands are given below-
1. MORE:-Using TYPE command we can see the content of any file. But if length of
file is greater than 25 lines then remaining lines will scroll up. To overcome through
this problem we uses MORE command. Using this command we can pause the
display after each 25 lines.
2. MEM:-This command displays free and used amount of memory in the computer.
3. SYS:- This command is used for copy system files to any disk. The disk having
system files are known as Bootable Disk, which are used for booting the computer.
This command will transfer the three main system files COMMAND.COM, IO.SYS,
MSDOS.SYS to the floppy disk.
4. XCOPY:- When we need to copy a directory instant of a file from one location to
another the we uses xcopy command. This command is much faster than copy
command.
5. MOVE:- Move command is used for moving one file or multiple files from one
location to another location or from one disk to another disk.
C:\>
6. FC:-(File Compare) This command is capable for comparing two set of files and
display difference between two files.
7.CHKDSK:-(Check disk) - This command is used to check the status of a disk and
show the report of result status.
Instead of using CHKDSK, try using SCANDISK. SCANDISK can reliably detect
and fix a much wider range of disk problems.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
8. SORT:- This command is useful when we want to sort a file. When we run this
command the result can be get to display device or file.
Syntax:- C:\> SORT /R < Input file name> <output file name>
Suppose we have a file Player.txt which having the list of a cricket player team and
we want to sort the list of players, then we uses this command
C:\> SORT Player.txt
If we not specify the output file name then result will show to the screen.
/R- switch is used for sorting the file in descending order like from Z to A or from 9 to
0.
9. FIND:- The FIND command is used to search a file for a text string.
---------- gulab.txt
A clock in a office can never get stolen
11. ATTRIB:- Sets the various type of attribute to a file. Like Read only, Archive,
Hidden and System attribute.
12. LABEL:- If you are not happy with the volume label of hard disk, you can change
it.
13. DOSKEY:- Once we install doskey , our dos will star to memorize all commands
we uses. We can recall those commands using up or down arrow keys. It also gives the
facility to create macros, which creates a short key for long keyword or command.
Creating Macros:-
C:\>doskey t=time
C:\>t
C:\>time
Current time is 3:39:05.97p
Enter new time:
To list out all macros defined just type DOSKEY/MACROS at dos prompt and press
enter.
C:\>DOSKEY/MACROS
$D=date
T=time
14. FORMAT:- This command creates new Track & Sectors in a disk. Every
Windows 2000
to appeal to small business and professional users as well as to the more technical and
Windows 2000 Professional, aimed at individuals and businesses of all sizes. It includes
Web server and/or a workgroup (or branch office) server. It can be part of a two-way
Windows 2000 Advanced Server, aimed at being a network operating system server
and/or an application server, including those involving large databases. This server
facilitates clustering and load-balancing. NT 4.0 servers with up to eight-way SMP can
Windows 2000 Datacenter Server, designed for large data warehouses, online
Windows 2000 is reported to be more stable (less apt to crash) than Windows 98/NT
systems. A significant new feature is Microsoft's Active Directory, which, among other
locally or on the network, and to give users access to shared files in a consistent way
Windows NT 4.0 and Windows 2000 are two operating systems created by Microsoft
and marketed for business users. The two operating systems were released several
years apart: Windows NT 4.0 in 1996, and Windows 2000 in 2000. Owing in part to the
significant amount of time that passed between the releases of the two operating
systems, Windows 2000 has several features that Windows NT 4.0 does not.
Task Scheduler
The Task Scheduler enables you to automatically perform routine tasks on a chosen
computer. The Task Scheduler does this by monitoring whatever criteria you choose to
Component Services
administrators.
Event Viewer
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Event Viewer. View information about significant events, such as a program starting or
Print Management
Print Management. Manage printers and print servers on a network and perform other
administrative tasks.
Local Security
Windows Firewall with Advanced Security. Configure advanced firewall settings on both
System Configuration
System Configuration. Identify problems that might be preventing Windows from running
correctly.
Windows Utilities
Paint
WordPad
Calculator
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Calculator picks up a bunch of new functionality, including this handy mortgage calculator.
Windows Calendar
Help protect your PC and remove malicious software (including Blaster, Sasser, and
Mydoom).
Craft video footage, photos, and music into a movie, then share it with your friends.
Keep in touch with the people you care about most. Video Call or Chat, Skype helps
Allows you to install a downloaded copy of Windows 7 onto your computer directly from
A collection of games and applications for your Windows touch-enabled PC, including
The Windows Registry is a hierarchical database that stores configuration settings and
options on Microsoft Windows operating systems. It contains settings for low-level
operating system components and for applications running on the platform that have
opted to use the registry. ...
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Overview of Linux OS
On August 25, 1991, a Finn computer science student named Linus Torvalds made the
What is Linux?
Linux is, in simplest terms, an operating system. It is the software on a computer that enables
applications and the computer operator to access the devices on the computer to
perform desired functions. The operating system (OS) relays instructions from an
application to, for instance, the computer's processor. The processor performs the
instructed task, then sends the results back to the application via the operating system.
Explained in these terms, Linux is very similar to other operating systems, such as
Windows and OS X.
But something sets Linux apart from these operating systems. The Linux operating
system represented a $25 billion ecosystem in 2008. Since its inception in 1991, Linux
has grown to become a force in computing, powering everything from the New York
participating in the Linux economy share research and development costs with their
and companies has resulted in a large and efficient ecosystem and unheralded software
innovation.
Over 1,000 developers, from at least 100 different companies, contribute to every kernel
release. In the past two years alone, over 3,200 developers from 200 companies have
This article will explore the various components of the Linux operating system, how they
are created and work together, the communities of Linux, and Linux's incredible impact
on the IT ecosystem.
Where is Linux?
One of the most noted properties of Linux is where it can be used. Windows and OS X
are predominantly found on personal computing devices such as desktop and laptop
computers. Other operating systems, such as Symbian, are found on small devices
such as phones and PDAs, while mainframes and supercomputers found in major
academic and corporate labs use specialized operating systems such as AS/400 and
Linux, which began its existence as a server OS and Has become useful as a desktop
Linux is already successful on many different kinds of devices, but there are also many
technological areas where Linux is moving towards, even as desktop and server
development continues to grow faster than any other operating system today.
Linux Architecture
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Hardware layer - Hardware consists of all peripheral devices (RAM/ HDD/ CPU etc).
Shell - An interface to kernel, hiding complexity of kernel's functions from users. Takes
commands from user and executes kernel's functions.
Kernel - Kernel is the core part of Linux. It is responsible for all major activities of this
operating system. It is consists of various modules and it interacts directly with the
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
underlying hardware. Kernel provides the required abstraction to hide low level hardware
details to system or application programs.
System Library - System libraries are special functions or programs using which
application programs or system utilities accesses Kernel's features. These libraries
implements most of the functionalities of the operating system and do not requires kernel
module's code access rights.
In Linux all files organized into directories and directories are connected through the
hierarchical order. The Linux file structure branches into several directories beginning
root - The root directory presents in all file system structure is the ancestor of all files
bin – It holds the essential command and binaries files needed to run the system in
In Linux, a file may have read, write and execute permission. When a file is created then
There are three categories of users who can have access to a file or directory.
Owner
Group
Others
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
associated to a number:
Read( r) = 4
Write (w) = 2
Execute ( x) = 1
Each category has its own set of read, write and execute permission for example
First dash shows file types whereas first set of rwx is for owner, second set of rwx for group and
third set of rwx for others.
chmod
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
This command sets the r/w/x permissions for all (owner, group and others).
This command sets r/w/x permissions for owner and r/w permissions for group and
others.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
management system. The name RPM variously refers to the .rpm file format, files in this
format, software packaged in such files, and the package manager itself. RPM was
intended primarily for Linux distributions; the file format is the baseline package format
RPM was originally written in 1997 by Erik Troan and Marc Ewing, based on pms, rpp,
and pm experiences.
Deb Packages
Debian packages are standard Unix/Linux archieves that include two tar archives
optionally compressed with gzip (zlib), Bzip2, lzma, or xz (lzma2): one archive holds the
Debian packages can be converted into other packages and vice versa using alien, and
Unit 3
Compiled by:
Prof. Shafiq ul Abidin, Department of IT
HMR Institute of Technology & Management
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Flowchart
A flowchart is a diagram that represents a process or algorithm. The steps are
represented by a series of boxes or other specialized symbols, then connected with
arrows.
The Document Symbol is used to represent any type of hard copy input or
output (i.e. reports).
The Connector Symbol represents the exit to, or entry from, another part
of the same flowchart. It is usually used to break a flow line that will be
continued elsewhere. It's a good idea to reference page numbers for easy
location of connectors.
Advantages:
It provides a clear overview of the entire program and problem and solution.
Limitations:
2. Alterations and Modifications: If alterations are required the flowchart may require
re-drawing completely.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Where N! = 1?2?3?....N .
Computer Network
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
A network consists of two or more computers that are linked in order to share resources
electronic communications.
The computers on a network may be linked through cables, telephone lines, radio
(network nodes) pass data to each other along data connections. The connections
(network links) between nodes are established using either cable media or wireless
Network devices that originate, route and terminate the data are called network nodes.
[1] Nodes can include hosts such as servers and personal computers, as well as
networking hardware. Two devices are said to be networked when a device is able to
Computer networks support applications such as access to the World Wide Web,
shared use of application and storage servers, printers, and fax machines, and use of
email and instant messaging applications. Computer networks differ in the physical
media used to transmit their signals, the communications protocols to organize network
Types of Networks
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
There are different types of computer networks. Some of the common ones include;
1. Local Area Network LAN – These types of computer networks connect network
devices over a relatively short distance. Quite often, a networked office building,
home or school contains a single LAN although it is normal to come across a
building that contains a few small LANs. On a few occasions, a LAN may also
span over a group of nearby buildings. Such computer networks are usually
owned by one organisation.
2. Wide Area Network WAN – As the name suggests, a WAN spans over a large
physical distance. It may be regarded as a collection of LANs dispersed over a
geographical area. The internet is a very good example of a WAN. LANs are
connected to a WAN through a device referred to as a router. In IP networking,
both the LAN and WAN addresses are maintained by the router. Most WANs
exist under distributed or collective ownership and management and unlike the
LANs, are not necessarily owned by one organisation.
3. Metropolitan Area Network MAN – This is a network that spans over a physical
area like a city that is smaller than a WAN but larger than a LAN. Quite often,
such computer networks are owned and operated by single entities such as
government bodies or large corporations.
Network Topologies
The mesh network topology employs either of two schemes, called full mesh and partial
mesh. In the full mesh topology, each workstation is connected directly to each of the
others. In the partial mesh topology, some workstations are connected to all the others,
and some are connected only to those other nodes with which they exchange the most
data.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
The tree network topology uses two or more star networks connected together. The
central computers of the star networks are connected to a main bus. Thus, a tree
Logical (or signal) topology refers to the nature of the paths the signals follow from node
to node. In many instances, the logical topology is the same as the physical topology.
But this is not always the case. For example, some networks are physically laid out in a
The following sections discuss the physical topologies used in networks and other related topics.
Linear Bus
Star
Linear Bus
A linear bus topology consists of a main run of cable with a terminator at each end (See
fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear
cable.
Star
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch, or concentrator (See fig. 2).
Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and controls all
functions of the network. It also acts as a repeater for the data flow. This configuration is
common with twisted pair cable; however, it can also be used with coaxial cable or fiber
optic cable.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
More expensive than linear bus topologies because of the cost of the hubs, etc.
A tree topology combines characteristics of linear bus and star topologies. It consists of
fig. 3). Tree topologies allow for the expansion of an existing network, and enable
Money. A linear bus network may be the least expensive way to install a network;
you do not have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter lengths of cable.
Cable type. The most common cable in schools is unshielded twisted pair, which
is most often used with star topologies.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Protocols
network. In order for two computers to talk to each other, they must be speaking the
same language. Many different types of network protocols and standards are required
to ensure that your computer (no matter which operating system, network card, or
application you are using) can communicate with another computer located on the next
desk or half-way around the world. The OSI (Open Systems Interconnection) Reference
Model defines seven layers of networking protocols. The complexity of these layers is
beyond the scope of this tutorial; however, they can be simplified into four layers to help
systems use well-defined formats for exchanging messages. Each message has an
HTTP defines how messages are formatted and transmitted, and what actions
Web servers and browsers should take in response to various commands. For
example, when you enter a URL in your browser, this actually sends an
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
HTTP command to the Web server directing it to fetch and transmit the
requested Web page.
HTTPS- Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the
Hyper Text Transfer Protocol (http). HTTPS allows secure ecommerce
transactions, such as online banking.
When a user connects to a website via HTTPS, the website encrypts the session
with a Digital Certificate. A user can tell if they are connected to a secure website
if the website URL begins with https:// instead of http://.
FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used
to transfer files between computers on a network. You can use FTP to exchange
files between computer accounts, transfer files between an account and a
desktop computer, or access online software archives. Keep in mind, however,
that many FTP sites are heavily used and require several attempts before
connecting.
FTP is the easiest way to transfer files between computers via the internet, and
utilizes TCP, transmission control protocol, and IP, internet protocol, systems to
perform uploading and downloading tasks.
SMTP stands for Simple Mail Transfer Protocol. It's a set of communication
guidelines that allow software to transmit email over the Internet. Most email
software is designed to use SMTP for communication purposes when sending
email, and It only works for outgoing messages. When people set up their email
programs, they will typically have to give the address of their Internet service
provider's SMTP server for outgoing mail. There are two other protocols - POP3
and IMAP - that are used for retrieving and storing email.
you with a PPP connection so that the provider's server can respond to your
requests, pass them on to the Internet, and forward your requested Internet
responses back to you. PPP uses the Internet protocol (IP) (and is designed to
handle others).
POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a
mail server. Most e-mail applications (sometimes called an e-mail client) use the
POP protocol, although some can use the newer IMAP (Internet Message Access
Protocol).
There are two versions of POP. The first, called POP2, became a standard in the
mid-80's and requires SMTP to send messages. The newer version, POP3, can
be used with or without SMTP.
TCP (Transmission Control Protocol) is a set of rules (protocol) used along with
the Internet Protocol (IP) to send data in the form of message units between
computers over the Internet. While IP takes care of handling the actual delivery
of the data, TCP takes care of keeping track of the individual units of data (called
packets) that a message is divided into for efficient routing through the Internet.
IP Internet Protocol (IP) is the method or protocol by which data is sent from one
computer to another on the Internet. Each computer (known as a host) on the
Internet has at least one IP address that uniquely identifies it from all other
computers on the Internet.
Transmission media is a pathway that carries the information from sender to receiver.
We use different types of cables or waves to transmit data. Data is transmitted normally
through copper wires, optical fibers, atmosphere, water and vacuum Different Medias
have different properties like bandwidth, delay, cost and ease of installation and
Coaxial Cable
Single copper conductor in the center surrounded by a plastic layer for insulation and a
braided metal outer shield
Twisted pair
Four pairs of wires twisted to certain specifications. Available in shielded and unshielded
versions.
Fiber-optic –
A cable, consisting of a center glass core surrounded by layers of plastic, that transmits
data using light rather than electricity.
Atmosphere/Wireless
Uses Electromagnetic waves. whose frequency range is above that of microwaves, but
below that of the visible spectrum.
• Wiring configurations
• Speed
• Reliability
• Security
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
• Budget
Network Devices
networking devices. Units which are the last receiver or generate data are called hosts
All these terms refer to devices facilitating the use of a computer network. Specifically,
Routers
A router is a network device that connects together two or more networks. A common
use of a router is to join a home or business network (LAN) to the Internet (WAN).
The router will typically have the Internet cable plugged into it, as well as a cable, or
Alternatively, the LAN connection might be wireless (WiFi), making the device a wireless
Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI)
reference model for networking to move packets between networks using their logical
addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on
the network). Because routers operate at a higher OSI level than bridges do, they have
better packet-routing and filtering capabilities and greater processing power, which
A common use of a router is to join a home or business network (LAN) to the Internet
(WAN).
The router will typically have the Internet cable plugged into it, as well as a cable, or
cables to
HUB
Networks using a Star topology require a central point for the devices to connect.
Originally this device was called a concentrator since it consolidated the cable runs from
As shown in Figure; the hub is a hardware device that contains multiple, independent
ports that match the cable type of the network. Most common hubs interconnect
Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic
BNC hubs also exist. The hub is considered the least common denominator in device
concentrators. Hubs offer an inexpensive option for transporting data between devices,
but hubs don't offer any form of intelligence. Hubs can be active or passive.
An active hub strengthens and regenerates the incoming signals before sending the
Switches
Switches are a special type of hub that offers an additional layer of intelligence to basic,
physical-layer repeater hubs. A switch must be able to read the MAC address of each
frame it receives. This information allows switches to repeat incoming data frames only
Switches operate at both the physical layer and the data link layer of the OSI Model.
Bridges
A bridge is a network device that typically links together two different parts of a LAN.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Whereas a router is usually used to link a LAN to a WAN (such as the Internet), a bridge
A bridge is used to join two network segments together, it allows computers on either
segment to access resources on the other. They can also be used to divide large
networks into smaller segments. Bridges have all the features of repeaters, but can
have more nodes, and since the network is divided, there is fewer computers competing
Bridges can also connect networks that run at different speeds, different topologies, or
different protocols. But they cannot, join an Ethernet segment with a Token Ring
segment, because these use different networking standards. Bridges operate at both
the Physical Layer and the MAC sublayer of the Data Link layer. Bridges read the MAC
header of each frame to determine on which side of the bridge the destination device is
located, the bridge then repeats the transmission to the segment where the device is
located.
card(NIC).
Most modern computers have these devices built into the motherboard, but in some
Modem
Before the days of broadband Internet connections, most computers connected to the
The problem with using telephone lines is that they are designed to carry voices, which
are analogue signals. They are not designed for digital data.
The solution was to use a special device to join the digital computer to the analogue
telephone line. This device is known as a modem.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
In an organization, the data is the most basic resource. To run the organization efficiently, the
proper organization and management of data is essential. The formal definition of the major
terms used in databases and database systems is defined in this section.
Data
The term data may be defined as known facts that could be recorded and stored on Computer
Media. It is also defined as raw facts from which the required information is produced.
Information
Data and information are closely related and are often used interchangeably. Information is nothing but
refined data. In other way, we can say, information is processed, organized or summarized data.
According to Burch et. al., "Information is data that have been put into a meaningful and useful content
and communicated to a recipient who uses it to made decisions". Information consists of data, images,
text, documents and voice, but always in a meaningful content. So we can say, that information is
something more than mere data.
Data are processed to create information. The recipient receives the information and then makes a
decision and takes an action, which may triggers other actions.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
In these days, there is no lack of data, but there is lack of quality information. The quality information
means information that is accurate, timely and relevant, which are the three major key attributes of
information.
Accuracy: It means that the information is free from errors, and it clearly and accurately reflects the
meaning of data on which it is based. It also means it is free from bias and conveys an accurate picture to
the recipient.
Timeliness: It means that the recipients receive the information when they need it and within the
required time frame.
Relevancy: It means the usefulness of the piece of information for the corresponding persons. It is a very
subjective matter. Some information that is relevant for one person might not be relevant for another
and vice versa e.g., the price of printer is irrelevant for a person who wants to purchase computer.
So, organization that have good information system, which produce information that is accurate, timely
and relevant will survive and those that do not realize the importance of information will soon be out of
business.
Database
A database is a collection of interrelated data stored together with controlled redundancy to serve
one or more applications in an optimal way. The data are stored in such a way that they are
independent of the programs used by the people for accessing the data. The approach used in
adding the new data, modifying and retrieving the existing data from the database is common
and controlled one.
It is also defined as a collection of logically related data stored together that is designed to meet
information requirements of an organization. We can also define it as an electronic filling system.
The example of a database is a telephone directory that contains names, addresses and telephone
numbers of the people stored in the computer storage.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Databases are organized by fields, records and files. These are described briefly as follows:
Fields
It is the smallest unit of the data that has meaning to its users and is also called data item or data
element. Name, Address and Telephone number are examples of fields. These are represented in
the database by a value.
Records
A record is a collection of logically related fields and each field is possessing a fixed number of
bytes and is of fixed data type. Alternatively, we can say a record is one complete set of fields
and each field have some value. The complete information about a particular phone number in
the database represents a record. Records are of two types fixed length records and variable
length records.
Files
A file is a collection of related records. Generally, all the records in a file are of same size and
record type but it is not always true. The records in a file may be of fixed length or variable
length depending upon the size of the records contained in a file. The telephone directory
containing records about the different telephone holders is an example of file.
DBMS is a program or group of programs that work in conjunction with the operating system to
create, process, store, retrieve, control and manage the data. It acts as an interface between the
application program and the data stored in the database.
Define, create and organise a database: The DBMS establishes the logical relationships among
different data elements in a database and also defines schemas and subschemas using the DDL.
Input data: It performs the function of entering the data into the database through an input
device (like data screen, or voice activated system) with the help of the user.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Process data: It performs the function of manipulation and processing of the data stored in the
database using the DML.
Maintain data integrity and security: It allows limited access of the database to authorised
users to maintain data integrity and security.
Query database: It provides information to the decision makers that they need to make
important decisions. This information is provided by querying the database using SQL.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Beyond Syllabus
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
The decimal number system is used in general. However, the computers use binary number
system. The octal and hexadecimal number systems are used in the computer.
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,
and 1 in the thousands position, and its value can be written as
1000 + 200 + 30 + 4
1234
As a computer programmer or an IT professional, you should understand the following number systems
which are frequently used in computers.
3. Hexa Decimal Number System Base 16. Digits used : 0 to 9, Letters used
A to F
Each position in a binary number represents a 0 power of the base (2). Example 20
Last position in a binary number represents a x power of the base (2). Example 2x where
x represents the last position - 1.
Example
Each position in an octal number represents a 0 power of the base (8). Example 80
Last position in an octal number represents a x power of the base (8). Example 8x where x
represents the last position - 1.
Example
Letters represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F =
15.
Each position in a hexadecimal number represents a 0 power of the base (16). Example
160
Last position in a hexadecimal number represents a x power of the base (16). Example
16x where x represents the last position - 1.
Example
Step 2 19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 1 − Divide the decimal number to be converted by the value of the new base.
Step 2 − Get the remainder from Step 1 as the rightmost digit (least significant digit) of
new base number.
Step 3 − Divide the quotient of the previous divide by the new base.
Step 4 − Record the remainder from Step 3 as the next digit (to the left) of the new base
number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in
Step 3. The last remainder thus obtained will be the Most Significant Digit (MSD) of the new
base number.
Example −
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7 / 2 3 1
Step 4 3 / 2 1 1
Step 5 1 / 2 0 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that
the first remainder becomes the Least Significant Digit (LSD) and the last remainder becomes
the Most Significant Digit (MSD).
Steps
Step 1 − Determine the column (positional) value of each digit (this depends on the
position of the digit and the base of the number system).
Step 2 − Multiply the obtained column values (in Step 1) by the digits in the
corresponding columns.
Step 3 − Sum the products calculated in Step 2. The total is the equivalent value in
decimal.
Example
Step 2 − Convert the decimal number so obtained to the new base number.
Example
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5 / 2 2 1
Step 4 2 / 2 1 0
Step 5 1 / 2 0 1
Step 1 − Divide the binary digits into groups of three (starting from the right).
Step 2 − Convert each group of three binary digits to one octal digit.
Example
Step 2 101012 28 5 8
Step 1 − Convert each octal digit to a 3 digit binary number (the octal digits may be
treated as decimal for this conversion).
Step 2 − Combine all the resulting binary groups (of 3 digits each) into a single binary
number.
Example
Step 1 − Divide the binary digits into groups of four (starting from the right).
Step 2 − Convert each group of four binary digits to one hexadecimal symbol.
Fundamentals of Computing (ETCS 111) Prof. Shafiq ul Abidin
Example
Step 2 − Combine all the resulting binary groups (of 4 digits each) into a single binary
number.
Example