Comp Theory
Comp Theory
[concise version]
d) Storage devices – These are the parts of the computer that holds information. There are two
types of memory. The primary storage device is the part of motherboard in the CPU. ROM
holds the booting programs to start the computer. RAM (random access memory)
remembers everything that is read, input, or output. But, because the computer’s memory is
on a temporary area—it forgets everything when turned off—it must have another place to
store information permanently. This secondary storage device is usually a disk. Examples of
secondary storage devices are blu-ray disc, CD-ROM, CD-RW, pendrive etc.
Types of
Computer
Embedded PC Workstation
PDA
PC – Desktop Computer
• Analogue Computer: Analogue Computer measures and answers the questions how
much. The input data is not a number infect a physical quantity like temperature , pressure,
spped and velocity.. These are used for logical and arithmetic operations. These computers
work on digital signal , so that bad noises or signals can be eliminated.
o Signals are of voltages.
o Accuracy 1% % approximately.
o High speed.
o Output is continuous
Analogue Signal
o Time is wasted in transmission time.
o Examples are voltmeter, ammeter, oscilloscope etc.
Voltmeter
Oscilloscope
Electrocardiogram –
ECG device
Super Computers
Unlike other variety of computers supercomputers are used for the scientific research and complex
performance specific operations like weather maps, construction of atom bombs, finding oil,
earthquake prediction, and sciences where a lot of calculations must be done. Historically, a
supercomputer is associated with the fastest computer available or the largest in size.
Supercomputing means "mass computing at ultra high speed." The speed of Supercomputer is
measured in FLOPS (Floating Point Operation Per Seconds) unlike other types of Computers where
speed of those computers are measured in MIPS (Million Instructions Per Second). Those
contemporary personal computers perform in the tens or hundreds of millions of calculations per
second; they still cannot solve certain problems fast enough. Construction of supercomputers is an
awesome and very expensive task.
Characteristics:
_ Used in fields that require vast amounts of complex mathematical calculations (e.g. simulating and
nuclear research ).
Minicomputers
These computers were developed and used in the early 1960s and announced a new era in
computing. These are small general purpose system. They are relatively low cost and small. It can
support the input and output requirements of many users at a time. It can be used in networked
environment as server computer. Historically, a mini is associated with de-centralized computing.
Characteristics:
Examples of application _ In networking the operations in an automobile sales and service outlet.
_ In manufacturing, for inventory control, accounts and process control.
Microcomputers
Microcomputers are designed to serve only a single user at a time, although they can often be
modified with software or hardware to concurrently serve more than one user. In the 1980's when
networking started to integrate into the offices PC'S became connected with network servers, and
also mainframes and supers.
Microcomputers fit well on or under desks or tables, so that they are within easy access of the user.
Bigger computers like minicomputers, mainframes, and supercomputers take up large cabinets or
even a dedicated room.
A microcomputer comes equipped with at least one type of data storage, usually RAM. Although
some microcomputers (particularly early 8-bit home micros) perform tasks using RAM alone, some
form of secondary storage is normally desirable.
Microcomputers, or PC's as they are often called, are abundant on our desks, tables, offices,
suitcases, everywhere. This is the most visible form of computers in the present world and comes in
all forms and breeds. There are many generations of particular design and technical specifications
from the start of this particular design.
Characteristics:
_ In an office for processing documents, designing and processing data e.g. payroll, inventory etc.
Laptops/notebooks
A laptop computer or simply laptop (also notebook computer, notebook and notepad) is a small
mobile computer, typically weighing 1.4 to 5.4 kg, although older laptops may weigh more. Laptops
usually run on a single main battery or from an external AC/DC adapter that charges the battery
while also supplying power to the computer itself even in the event of a power failure.
Laptops contain components that are similar to their desktop counterparts and perform the same
functions, but are miniaturized and optimized for mobile use and efficient power consumption,
although typically less powerful for the same price. Laptops usually have liquid crystal displays
(LCD display) or LED display. It is often utilized in battery-powered electronic devices because it
uses very small amounts of electric power.
Mainframe Computer
Mainframes are computers used mainly by large organizations for critical applications, typically
bulk data processing such as census, industry and consumer statistics, ERP, and financial
transaction processing. The term probably originated from the early mainframes, as they were
housed in enormous, room-sized metal boxes or frames. Nearly all mainframes have the ability to
run (or host) multiple operating systems and thereby operate not as a single computer but as a
number of virtual machines. In this role, a single mainframe can replace dozens or even hundreds of
smaller servers, reducing management and administrative costs while providing greatly improved
scalability and reliability. Mainframes can add or hot swap system capacity non disruptively and
granularly.
Characteristics
_ It is used in large organizations such as insurance companies and banks where many people
access the same data frequently.
Embedded Computers
Embedded computers can be compared to "computers on a chip". These are used in automatic
washing machines, automatic temperature controlling AC machine, ticket machines at the subway,
camera's, cars, motors, sewing machines, clocks etc. So specific programming or task are fabricated
in the IC or small chip to regulate, control of check something. Embedded computing is associated
with self contained pre-programmed computing.
Computer hardware is tangible physical part of a computer and related devices. Internal hardware
devices include motherboards, hard drives, and RAM. External hardware devices include monitors,
keyboards, mice, printers, and scanners.
The internal hardware parts of a computer are often referred to as components, while external
hardware devices are usually called peripherals. Together, they all fall under the category of
computer hardware.
While there are thousands of parts even in the smallest computers that make up its hardware, you
are not required to know them all. You only need to know about basic computer hardware. Basic
computer hardware consists of the following parts:
1. CPU (Central Processing Unit): The CPU is considered the brain of the computer. It performs all
types of data processing operations, stores data, intermediate results and instructions (program). It
controls the operation of all parts of computer. A CPU has 3 components as listed below.
(A) CU (Control Unit) The control unit (CU) is a component of a computer's central processing unit
(CPU) that directs operations of the processor. It tells the computer's memory, arithmetic logic unit
and input and output devices how to respond to a program's instructions. However, the Control
Unit doesn’t process any data.
(B) ALU (Arithmetic Logic Unit) Think of the ALU as the logical part of the brain. When any
mathematical calculation or decision/logic needs to be carried out, the instruction is passed on to
the ALU. The ALU thinks in bits (i.e. binary digits – ‘0’s and ‘1’s.) It is made up of a group of memory
locations built directly into the CPU called registers. These are used to hold the data (binary
information) that are being processed by the current instruction.
(C) Memory (Primary memory) is memory that is part of the computer itself and necessary for its
functioning. It consists of mainly two types of memories: Random Access Memory (RAM) and Read
Only Memory (ROM).
RAM is the internal memory of the CPU for storing data, program and program result. It is
read/write memory which stores data until the machine is working. As soon as the machine is
switched off, data is erased. RAM is volatile. Volatile means that the data stored in memory is lost
when we switch off the computer or if there is a power failure. Hence a backup Uninterruptible
Power System (UPS) is often used with computers. UPS is not a part of CPU. There are different
types of RAM available. Some of them are described below.
Dynamic Random Access Memory (DRAM): A type of physical memory which is used in most
personal computers. The term dynamic indicates that the memory must be constantly refreshed or
it loses its contents. This type of memory is more economical.
Static Random Access Memory (SRAM): A type of memory that is faster and less volatile than
DRAM, but requires more power and is more expensive. The term static is derived from the fact that
it does not need to be refreshed like DRAM.
Synchronous Dynamic Random Access Memory (SDRAM): A type of DRAM that has a much higher
processing speed.
(ii) Read Only Memory (ROM) The memory from which we can only read but cannot write on it.
This type of memory is non-volatile. The information is stored permanently in such memories
during manufacture. A ROM, stores such instructions that are required to start a computer. This
operation is referred to as bootstrap. The different types of ROM are given below.
MROM (Masked ROM): The very first ROMs were hard-wired devices that is contained a pre-
programmed set of data or instructions. These kinds of ROMs are known as masked ROMs which
are inexpensive. The MROM cannot be programmed by the user.
PROM (Programmable Read only Memory): PROM is read-only memory that can be modified only
once by a user. The user buys a blank PROM and enters the desired contents using a PROM
program.
EPROM (Erasable and Programmable Read Only Memory): The EPROM is a type of a PROM which
can be programmed by the user multiple times. EPROM is erased by exposing it to ultra-violet light
for a duration of up to 40 minutes. Usually, an EPROM eraser achieves this function.
EEPROM (Electrically Erasable and Programmable Read Only Memory): The EEPROM is
programmed and erased electrically. It can be erased and reprogrammed about ten thousand times.
Both erasing and programming take about 4 to 10 milliseconds.
2. Secondary Storage (External Storage Devices): Floppy diskettes, hard disk, tapes and optical
disks come under the category of external storage devices or ancillary storage devices. These
devices are very sensitive to environmental conditions (humidity and temperature) as well as to
external magnetic fields and need to be stored carefully. They are not compulsory for the
functioning of the computer but are useful for expanding the computer’s memory.
(A) Floppy Disk Floppy disks are primarily used on PCs. Information on a floppy disk is recorded in
the magnetized states of particles of iron oxides evenly placed upon concentric circles known as
tracks.
(B) Hard Disk is a non-removable enclosed magnetic disk included in most PCs. It contains a stack
of metal platters, each coated with iron oxide, that spin on a spindle and the entire unit is encased
in a sealed chamber.
(C) Magnetic Tape is plastic tape, usually made of Mylar that is coated with iron oxide, thereby
enabling the introduction (writing); retention (memory) and reading of magnetically recorded
information. The best use of tape storage is for data that you do not use very often.
(D) Optical Disc Drive is an optical disc drive (ODD) is a disk drive that uses laser light or
electromagnetic waves for reading or writing data to or from optical discs (normally CD-ROM). A
CD-ROM is a pre-pressed optical compact disc which contains data. The name is an acronym which
stands for "Compact Disc Read-Only Memory". Computers can read CD-ROMs, but cannot write to
CD-ROMs which are not writable or erasable.
(E) USB flash drive is also commonly known as a USB drive, USB stick, pen drive and a variety of
other names. It is a data storage device that includes flash memory with an integrated USB
interface. USB flash drives are typically removable and rewritable, and physically much smaller
than an optical disc.
3. Peripherals/ Peripheral devices: These are devices connected to the computer externally. If a
peripheral device is disconnected, the computer will still be able to work; only functions performed
by this peripheral device will not be available. They are categorized into 2 types : Input device and
Output device. Here are the most used types of peripheral devices:
(A) Keyboard is the most common and very popular input device which helps in inputting data to
the computer. It consists of keys that are capable of inputting alphabets, numbers and special
characters. You can also navigate using the keyboard and perform shortcut functions.
(B) Mouse is the most popular pointing device and cursor-control device having a small palm size
box with a round ball at its base which senses the movement of mouse and sends corresponding
signals to CPU when the mouse buttons are pressed.
(C) Monitors are commonly called as Visual Display Unit (VDU), are the main output device of a
computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form. The
sharpness of the image depends upon the number of pixels.
Impact Printers: The impact printers print the characters by striking them on the ribbon which is
then pressed on the paper.
Non-Impact Printers: Non-impact printers print the characters without using ribbon. These
printers print a complete page at a time so they are also called as Page Printers. Laser Printers,
Inkjet Printers.
(E) Joy Stick is a device used to move cursor position on a monitor screen. It is mainly used in
Computer Aided Designing (CAD) and playing computer games.
(F) Scanner allows you to scan printed material and convert it into a file format that may be used
within the PC.
(G) Plotter is used to create high-quality visuals on paper. Plotters were used in applications such
as computer-aided design, though they have generally been replaced with wide-format
conventional printers. A plotter gives a hard copy of the output. It draws pictures on a paper using a
pen. It can be used to create presentation-charts, graphics, tables and high quality technical
drawings. There are two types of plotter. Drum Plotter: The paper is placed over the drum that
rotates back and forth. A carriage holding one or more pens is mounted horizontally across the
drum. The carriage with the pens moves horizontally over the paper. Each pen could be filled with
different colours. This plotter has the ability to produce colour pictures. Flat Bed Plotter: In flat bed
plotter, the paper does not move. The carriage holding the pens should provide all motions. Inkjet
plotters can also produce large drawings with different colours.
2.2 Software :
In this section you will learn about the different types of software. The programs, procedures,
routines, and symbolic languages that control the functioning of the hardware and direct its
operation is called Software. It is a collection of computer programs and related data that provides
the instructions for telling a computer what to do and how to do it. It is an interface between the
computer hardware and the user.
• Device drivers such as computer BIOS and device firmware provide basic
functionality to operate and control the hardware connected to or built into the
computer.
• The operating system ( Microsoft Windows, Mac OS X and Linux) allows the parts of a
computer to work together by performing tasks like
transferring data between memory and disks or rendering output onto a display
device. It also provides a platform to run high-level system software and application
software. Window systems are components of a graphical user interface (GUI), and
more specifically of a desktop environment, which supports the implementation of
window managers, and provides basic support for graphics hardware, pointing
devices such as mice, and keyboards. The mouse cursor is also generally drawn by
the windowing system.
Utility software helps to analyze, configure, optimize and maintain the computer.
o To translate the user input data and instructions into binary code.
Operating System :
It creates a platform through which the user interacts with the computer.
• File Management: This is a function that manages data files. An operating system
contains file management programs that provide the ability to create, delete, enter,
change, ask, and access of files of data. They also produce reports on a file.
System Support Program: The System Support Programs perform routine and
repetitive functions. Examples of System Support Programs are Monitor, Linker, Loader,
and Editor.
• Monitor: - A monitor is a program which resides in a ROM. It carries out the following
functions :
• Loader: - A loader is a program which loads object code into system memory.
• Editor: - Editors are some interactive programs which are loaded into memory and
allow the user to write a program, generate text etc. A text editor allows user to write
source program or text into RAM. It can be copied from RAM to a file on the magnetic
disk.
• Compiler: A compiler is a translating program that translates the whole of the high-
level language source program into machine language before loading into the
computer memory.
Compiler Interpreter
1. Translates the entire source code into machine 1. Translates the source cede line by line,
code in one go when all the syntax errors are indicated errors at each step every line
removed, execution takes place. is checked for syntax error and then
converted to equivalent machine code.
2. It has capability to store compiled code for 2. Cannot retain object code.
future usage.
• Some General Application software are MS-Office, Oracle, Foxpro, Tally etc.
• Data Processing Software : These software package systems are readily available to
carry out the task of data processing in applications such as accounting, inventory,
payroll etc. (Tally)
Data Management Software: These allow huge amount of data handling. (My-SQL, Oracle
etc.)
• Word Processing and Editing Software: Word Processing software packages are most
useful for preparation of text documents on computers. (MS-Word)
• Productivity and CAD/CAM software: CAD/CAM software packages not only support
the design of the parts but also help manufacturing . (AutoCAD)
• Real time Software: A real time software package is useful to control a process. (
Software used in embedded system like cell phones, TV tuning etc.)
• Transaction Processing Software: Transaction Processing Software is utilized to
provide day-to-day transactions. (Software for booking tickets on Railway
Reservation System, depositing tax etc.)
• Web Application Software: This is the newest trend of software to utilize the Internet
and get the application. (Internet Explorer, Google Chrome etc.)
2.2.5 Utilities:
Utility software is system software designed to help analyze, configure, optimize or maintain a
computer. A single piece of utility software is usually called a utility or tool. Utility software usually
focuses on how the computer infrastructure (including the computer hardware, operating system,
and application software and data storage) operates.
• Backup utilities can make a copy of all information stored on a disk, and restore either the
entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of accidental
deletion).
• Data compression utilities output a shorter stream or a smaller file when provided with a
stream or file.
• Data synchronization utilities establish consistency among data from a source to target data
storage and vice versa. There are several branches of this type of utility:
o File synchronization utilities maintain consistency between two sources. They may
be used to create redundancy or backup copies but are also used to help users carry
their digital music, photos and video in their mobile devices.
o Revision control utilities are intended to deal with situations where more than one
user attempts to simultaneously modify the same file.
• Disk cleaners can find files that are unnecessary to computer operation, or take up
considerable amounts of space. Disk cleaner helps the user to decide what to delete when
their hard disk is full.
• Disk compression utilities can transparently compress/uncompress the contents of a disk,
increasing the capacity of the disk.
• Disk defragmenters can detect computer files whose contents are broken across several
locations on the hard disk, and move the fragments to one location to increase efficiency.
• Disk partitions can divide an individual drive into multiple logical drives, each with its own
file system which can be mounted by the operating system and treated as an individual
drive.
• Network utilities analyze the computer's network connectivity, configure network settings,
check data transfer or log events.
• Screensavers were desired to prevent phosphor burn-in on CRT and plasma computer
monitors by blanking the screen or filling it with moving images or patterns when the
computer is not in use. Contemporary screensavers are used primarily for entertainment or
security.
• An antivirus utility is a program that prevents, detects, and removes viruses from a
computer's memory or storage devices. One popular antivirus program is Norton Antivirus.
An antivirus utility scans for programs that attempt to modify the boot program, the
operating system, and other programs that are normally read from but not modified.
Antivirus utilities normally look for virus signatures to identify a virus. A virus signature, or
virus definition, is a known specific pattern of virus code. Users of antivirus utilities must
update the virus definition files as often as possible to ensure that such files contain
patterns for newly discovered viruses. However, a polymorphic virus modifies its program
code each time it attaches itself to another program or file, so that even an antivirus utility
cannot detect it by its virus signature. Antivirus utilities may also detect viruses by
inoculating existing program files. To inoculate a program file, the antivirus utility records
its file size and file creation date in a separate inoculation file, and uses this information to
detect if a virus has altered the inoculated program file. However, a stealth virus infects a
program file, but still reports the size and creation date of the original, uninfected program.
If an antivirus utility cannot remove the virus, it often quarantines the infected file in a
separate area of a hard disk until the virus can be removed. Most antivirus utilities can
create a recovery disk to remove or repair infected programs and files (e.g., boot sector
virus). In extreme cases, a hard disk may need to be reformatted to remove a virus.
Unit – 3 Internet
Computer network connects two or more autonomous computers. The computers can be
geographically located anywhere. Network in small geographical Area (Room, Building or a
Campus) is called LAN (Local Area Network) Network in a City is called MAN (Metropolitan
Area Network. Network spread geographically (Country or across Globe) is called WAN (Wide
Area Network). Internet is a type of WAN which refers to www and related applications.
Meaning of Internet:
The Internet is a global system of interconnected computer
networks that use the standard Internet protocol suite (TCP/IP) to serve
billions of users worldwide. It is a network of networks that consists of
millions of private, public, academic, business, and government networks,
of local to global scope, that are linked by a broad array of electronic,
wireless and optical networking technologies.
World Wide Web (WWW): The World Wide Web is a system of interlinked hypertext documents
accessed via the Internet. With a web browser, one can view web pages that may contain text,
images, videos, and other multimedia, and navigate between them via hyperlinks. A computer is
comprised of hardware parts and peripherals but works like an intelligent body. A computer has
different layers through which a user can interact with the processor of the computer and perform
versatile operations. Computer is made up of hardware which is regulated by software as per the
user’s instructions. A special layer of software called OS or Operation System is installed on the
layer of hardware so that the device gets switched on (booting up) to start its various functions.
Many personal computer operating systems include software-based firewalls to protect against
threats from the public Internet. Many routers that pass data between networks contain firewall
components and, conversely, many firewalls can perform basic routing functions.
Firewalls are part of a good defense in depth strategy. The idea is to place several layers of
protection between your machines and the potential threats. There are some obvious threats from
the outside, so you should naturally place a firewall between the outside and your internal
network(s). Because a firewall is placed at the intersection of two networks, it can be used for many
other purposes besides simply controlling access. For example:
1) Firewalls can be used to block access to particular sites on the Internet, or to prevent certain
users or machines from accessing certain servers or services.
2) A firewall can be used to monitor communications between your internal network and an
external network. For example, you could use the firewall to log the endpoints and amount of data
sent over every TCP/IP connection between your organization and the outside world.
3) A firewall can even be used to eavesdrop and record all communications between your internal
network and the outside world.
Network Components:
• Physical Media: Optical Fiber Cables, Coaxial Cable, Radio Wave (for wireless
connection), twisted pair cable.
Bus Topology: Commonly referred to as a linear bus, all the devices on a bus
topology are connected by one single cable.
• Star & Tree Topology: When installed, the star topology resembles spokes in a bicycle
wheel.
• Larger networks use the extended star topology also called tree topology. When used with
network devices like bridges, switches, and routers, this topology significantly reduces the
traffic on the wires by sending packets only to the wires of the destination host.
•
• Ring Topology: A frame travels around the ring, stopping at each node. If a node wants to
transmit data, it adds the data as well as the destination address to the frame.
• The frame then continues around the ring until it finds the destination node, which
takes the data out of the frame.
• Single ring – All the devices on the network share a single cable
• Dual ring – The dual ring topology allows data to be sent in both directions.
•
• Mesh Topology: The mesh topology connects all devices (nodes) to each other
for redundancy and fault tolerance. It is used in WANs to interconnect LANs and
for mission critical networks like those used by banks and financial institutions.
Implementing the mesh topology is expensive and difficult.
Internet Protocols:
Set of rules or language use by computer and networking devices to communicate with one another
Networking Protocols
SMTP - Simple Mail Transfer Protocol, a protocol for sending e-mail messages between
servers.