Fundamentals of Information Technology
Fundamentals of Information Technology
Bharati Vidyapeeth
101 : FUNDAMENTALS OF
Writers Team
Dr. H. M. Padalikar 1 to 6
REVIEW
COURSE SUBJECT FACULTY
Introduction to Computer
1.1 Introduction
1.2 Definition of computer
1.3 Basics of Computer
1.4 Characteristics of Computer
1.5 Evolution of Computer
1 11-25
1.6 Block Diagram of Computer:
1.7 Generations of Computer
1.8 Classification of Computers:
1.9 Applications of Computer
1.10 Capabilities and limitations of computer:
Questions
Computer Arithmetic
2.1 Introduction
2.2 Binary Number
2.3 Binary Arithmetic:
2.4 Number System:
2 2.5 Converting from one number system to another 26-51
2.6 1’s Complements and 2’s Complements:
2.7 Computer Codes
2.8 Rules and laws of Boolean algebra,
2.9 Basic Gates
Questions
Storage Fundamentals
4.1 Introduction:
4.2 Computer Storage
4 4.3 Secondary Memory 68-78
4.4 Primary Vs. Secondary Storage
4.5 Data storage & retrieval methods.
Questions
Unit Contents Page No.
Software
5.1 Introduction
5.2 Software and its needs
5 5.3 Types of software 79-98
5.4 Programming Languages
5.5 Algorithms and Flowchart
Questions
Data Communication
6.1 Introduction
6.2 Communication Process
6.3 Data Transmission speed
6.4 Types of Data Transmission
6.5 Types of Serial Transmission
6.6 Data Transmission Medias
6 99-129
6.7 Types of Network
6.8 TYPES OF NETWORKS
6.9 NETWORK TOPOLOGIES
6.10 Computer Protocols, Concepts relating to networking:
6.11 Internet
6.12 Business Data Processing
Questions
Fundamentals of
Information Technology
Learning Objectives
This chapter describes the basics of computer and its characteristics. The
main objective of this chapter is to make you understand
• what is computer and what characteristics of computer
• What is number system and what are binary, octal, decimal and
hexadecimal number systems.
• Binary arithmetic
• Boolean algebra
1.1 INTRODUCTION
A machine that takes input data and processes it to produce the output is
called a computer. This is the oldest view of computer, whereas, todays computer,
called as smart device, can do a lot other than producing output. It can help you
in managing your schedule and make you alert accordingly to predict the weather
information. In every aspect, our day to day life is covered by a computer. If you
look at your day to day activities, then computer is ready to help you. To weak
up, we are using alarm of a mobile. If you go for a walk, it can measure how
much you burn your calories and what is your blood sugar and heart bits.
Artificial intelligence is an area where a computer is competing human being
and getting smarter every day. Off course, human natural brain is there in making
artificially strong computer. This chapter introduces you the basics of computer.
“A machine that takes the input and process the data and produces the result
for solving our problem can be called as computer.”
Computer can be defined as “An electronic machine that takes data in a
particular format as input and performs some computations on it and produces
the output in required format is called as computer”.
“An electronic device that performs operations on data involved calculations
and produces the result. Operations based on instructions provided by a software Introduction to
Computer 11
Fundamentals of or hardware program or by a user”. This machine is designed to execute
Information Technology applications and provides a variety of solutions by combining integrated
hardware and software components
NOTES According to Oxford dictionary a computer is defined as “An electronic
device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.”
Computer system takes the input data by using input devices such as
keyboard, mouse etc. and process the data by using central processing unit called
as CPU. The output is send to output device like printer or display unit etc. before
and after processing the data, it uses the internal or external memory for storing
it input data and output. For processing computer requires some instructions or
set of instructions called as program is also stored in memory. As per these
instructions or program, it creates output.
These, devices used for input, processing, storing and output are called as
components of computer which are shown in figure 1.0.
Introduction to
12 Computer
Fundamentals of
Information Technology
1.4 CHARACTERISTICS OF COMPUTER
NOTES
Characteristics of a Computer: computer can be compared with a human
being to understand its characteristics. The computer performs the operations
that human being performs like listening, answering and commutating etc.
computer accepts the input is similar to listening, once the input is correct it can
process the data and gives the result similar to answering etc. the main difference
between computer and human being is that human being is having natural
intelligence and computer is having artificial intelligence. But computer can
perform the operation very fast and accurately. Thus, the characteristics of a
computer are as follows.
1. Speed
Computer can perform any operation very quickly and fast. Computer
requires only few microseconds to perform a operation where a human
being may takes hours to complete a task. The speed of a computer is
determined in terms of microseconds (i.e.10-6 of a second) or
nanoseconds (i.e. 10-9 of a second). Thus, we can imagine how fast a
computer can perform a task.
2. Accuracy
Computer can produce the result very accurately. The degree of
accuracy of a computer is very high and each and every calculation is
performed with the same accuracy. This accuracy is also measured on
the basis of design of a computer. If the input data is wrong then result
or output may be wrong. This wrong output is only because of wrong
input and not because of computer. Computer always gives accurate
result.
3. Diligence
Even if human being is having natural intelligence, he can become
tired of doing similar work after few hours but this is not the case with
computer. A computer is free from tiredness, fatigue and lack of
concentration. Computer can work together for hours without fail and
errors. Even if there are thousands and millions of operations to be
performed, it can perform every calculation with the same accuracy
and speed. This is one of the reasons that computers are being used
for tedious and complicated tasks.
4. Versatility
Computer can perform various types of operations simultaneously and
parallel. One user can input the data at the same time other user may Introduction to
Computer 13
Fundamentals of be taking printout of sales report, whereas third user may be making a
Information Technology online payment.
5. Memory
NOTES
These characteristics can also be known as power of remembering.
Computer can store any amount of data or information. Once the data
is stored into the computer’s memory it can be retrieved any time as
you want and this data can be stored for a long time. This memory is
of two types. One is primary memory which is having limited size and
is used for bringing data for immediate calculation. Other type of
memory is called as secondary memory where we can store any
amount of data on disks etc.
6. No Intelligent quotient
Computer is a machine which cannot do anything on its own. It
requires instructions to be given by the user and then it will execute
these instructions. Once the instructions are given, it can execute these
instructions without any error. As it has no Intelligence, it cannot take
decision on its own.
7. No Feeling
Computer is not having any emotions, knowledge or feeling like
human beings. But computer cannot be tired like human being; it can
work with any complaint as it has no feeling.
In the early days our ancestor used fingers to count but it was very limited.
When the counting requires beyond 10, they used sticks or some symbols to count
further, thus our decimal number system came into existence. First man made
mechanical computer was made before 2300 BC called as Abacus. This Abacus
as shown figure 1.1 was the first mechanical computer used for counting.
Introduction to
16 Computer
Fundamentals of
Information Technology
1.7 GENERATIONS OF COMPUTER
NOTES
The inventions of computer started from 16th century and present computer
is very surprisingly used in all aspects of our life due to fast development in
hardware and software technology. The hardware components used to make
computer was noted by generations of computer. Today there are two types of
generations known as hardware and software generations. Let us see first
hardware generations.
• First Generations computers (1945 - 1955)
Vacuum tubes very used to make computers in this period. Vacuum
tubes devices were only the advanced devices available in those days
which were used to make computers.
CPU and memory components of a computer are made up huge
number of vacuum tubes. These tubes were getting very hot and used
to produce huge amount of heat during its operation. Frequent
maintenance was also required to keep the computer operational and
this task was very expensive. This generation computers were not
affordable to all but only few big organizations.
These computers were used on batch processing method. Punched
cards, Paper tape, Magnetic tape were used as Input & Output devices.
The languages used for this generation were assembly and machine
language.
Some of the machines developed in this period were
ENIAC - Electronic Numerical Integrator And Calculator
EDSAC – Electronic Delay Storage Automatic Calculator
EDVAC – Electronic Discrete Variable Automatic Computer
UNIVAC – Universal Automatic Computer
IBM 701
1.8.2. Minicomputers
Minicomputers’ are smaller in size as compare to mainframe computers.
Introduction to The price of minicomputers is very less than mainframe. This type of computers
20 Computer
shown in figure 1.8 can also store huge amount of information and high speed Fundamentals of
processors but less amount of processing speed and storage as compare to Information Technology
mainframe computers. Small scale and medium scale industries use these type
of computers. NOTES
1.8.3. Microcomputers
This type of microcomputers is very popular amongst the people around
the globe. This type of computers are having limited amount of processing speed
and storage as compare to mainframe and minicomputers. This type of computers
is used in small business, for personal use. These computers are very affordable;
therefore, today’s market is captured by microcomputers. Desktop and laptops
are two famous models of this type are shown in figure 1.9.
Introduction to
Computer 21
Fundamentals of
Information Technology
NOTES
Introduction to
22 Computer
3. Applications of computer in Marketing Fundamentals of
Information Technology
Due to advancement in technology digital marketing has become a
buss word today. A company can reach to the people on the web
showing their product and feature to attract them. Experts and NOTES
professionals in the field of marketing use ICT to plan, manage and
monitor campaigns. By analyzing and manipulating data on
computers, they can increase the precision of marketing campaigns,
personalize customer and prospect communications, and improve
customer relationship management. Marketing people are using
computer technology to launch their product on the web and target the
people at the same time they can use the data for market research to
make a decision policy about their product, quality, price and
comparative analysis of their product.
Limitations of Computer
A computer, unlike a human being, has no brain or thinking power and intuition.
If you ask any question, a person can give answer after thinking but
computer cannot give unless and until it is instructed to do so. So computer can
Introduction to not do anything on its own.
24 Computer
A computer, unlike a human being cannot understand the wrong statement Fundamentals of
or wrong input. Once the program is checked then it can produce out even if the Information Technology
input in wrong.
So limitations of computer can be listed as NOTES
*****
Introduction to
Computer 25
Fundamentals of
Information Technology
2.1 INTRODUCTION
Table 2.3 bit binary numbers and decimal equivalent Computer Arithmetic 27
Fundamentals of These numbers of bits are very important in coding the program and
Information Technology instructions. In the next section we will see how they are used.
Numbers of bits are used to form instruction given to computer for
NOTES execution. Speed of the computer depends on how many bits (binary digits) are
executed by CPU at a time. Now there are 64 bits instructions set available in
the market.
Therefore data is represented in binary form and the relation between bit
and byte can be seen as follows
28 Computer Arithmetic
In binary number addition there are four combinations of additions Fundamentals of
Information Technology
NOTES
Computer Arithmetic 29
Fundamentals of
Information Technology
NOTES
30 Computer Arithmetic
Suppose we have subtract Fundamentals of
Information Technology
NOTES
Computer Arithmetic 31
Fundamentals of Similarly let us multiply two binary numbers.
Information Technology
NOTES
This number we call as fifty six thousand eight hundred seventy nine.
32 Computer Arithmetic
Fractional part: Fraction numbers are also having weight with respect to Fundamentals of
the number system. each digit of the fraction is multiplied by its base starting Information Technology
with power -1. It can be explained in the following table
Let us represent decimal number 28.56 NOTES
Similarly identify the following numbers are from given number system or not
Computer Arithmetic 35
Fundamentals of Convert (010011)2 to decimal number.
Information Technology
NOTES
Ex.2. (2452)8 = 2 x 83 + 4 x 82 + 5 x 81 + 2 x 80
= 2 x 512 + 4 x 64 + 5 x 8 + 2 x 1
= 1024 + 256 + 40 +2
= (1322)10
36 Computer Arithmetic
2.5.3 Conversion of Hexadecimal number to Decimal number Fundamentals of
Information Technology
As the base of this hexadecimal number system is 16, every digit is
multiplied by the power of 16 and can be converted into decimal number.
NOTES
For Ex.1. 6524: we cannot call this number as usual in decimal form
because this number is in hexadecimal form. We have to convert this number in
decimal number as follows.
(6524)16 = 6 x 163 + 5 x 162 + 2 x 161 + 4 x 160
= 6 x 4096 + 5 x 256 + 2 x 16 +4x1
= 24576 + 1280 + 32 + 4
= (25892)10
Therefore, (6524)16 – (25892)10
Computer Arithmetic 37
Fundamentals of For Example: let us convert (25)10 into binary form. It can be done as
Information Technology follows.
NOTES
38 Computer Arithmetic
2.5.5 Conversion of octal number into binary number. Fundamentals of
Information Technology
To convert octal number to binary form, following steps are used.
1. Convert octal number into decimal number first.
2. Convert decimal number into binary number. NOTES
Computer Arithmetic 39
Fundamentals of
Information Technology
NOTES
40 Computer Arithmetic
Let us convert (7321)16 hexadecimal number into binary form. Fundamentals of
Information Technology
Step 1. Convert hexadecimal number into decimal number
(7321)16 = 7x163 + 3x 162 + 2 x 161 + 1 x 160
NOTES
= 7 x 4096 + 3 x 256 + 2 x 16 + 1 x 1
= 28672+768+32+1= (29473)10
Step 2. Now, convert decimal number resulted in step 1 to binary form.
1’s Complement
1’s complement is a binary number obtained by changing binary digits 0 to
1 and 1 to 0.
For example
Computer Arithmetic 41
Fundamentals of 2’s Complement
Information Technology
2’s complement is obtained by two steps.
Step 1. Make 1’s complement of a number.
NOTES
Step 2. Add 1 into 1’s complemented number.
For example
42 Computer Arithmetic
Fundamentals of
Information Technology
NOTES
For example
Direct subtraction
Computer Arithmetic 43
Fundamentals of Comparison between 1’s and 2’s complement
Information Technology
NOTES
44 Computer Arithmetic
2. Complement of a variable is represented by an overbar (-). Thus, Fundamentals of
complement of variable B is represented as . Thus if B = 0 then = 1 Information Technology
and B = 1 then = 0.
3. OR operation - here + sign is not a normal addition but it is treated as NOTES
or operation.
For example, variables A, B, C etc., giving us a logical expression of
A + B = C, but each variable can ONLY be a 0 or a 1.
4. Logical AND operation is symbolically defined by dot or period. For
example, A . B is called logical and expression.
2.8.2.5 OR law
These laws use the OR operation. Therefore they are called as OR laws.
(i) A+0=A (ii) A+1=1 (iii) A + A = A (iv) A + Ac = 1
Computer Arithmetic 45
Fundamentals of 2.9 Basic Gates
Information Technology
CPU unit of a computer performs the logical operations by using integrated
circuits and electronic circuits and software. These complex operations are
NOTES performed by implementation of Boolean logic gates.
A logic gate is a basic building block of a digital circuit that has two inputs
and one output. The relationship between the input and the output is based on a
certain logic. These gates are implemented using electronic switches like
transistors, But, in practice basic logic gates are built using CMOS technology,
FETS and MOSFET (Metal Oxide Semiconductor FET)s. Logic gates are used
in microprocessors, microcontrollers, and embedded system applications and in
electronic and electrical project circuits. The basic logic gates are categorized
into seven: AND, OR, XOR, NAND, NOR, XNOR and NOT.
2.9.2 OR Gate
The OR gate performs a logical conjunction based on the combinations of
its inputs. The output of the OR gate is true only when one or more inputs are
true. If all the inputs of the gate are false, then only the output of the OR gate is
false. The symbol and truth table of an OR gate with two inputs is shown below.
Example No 1
Construct a Truth Table for the logical functions at points C, D and Q in the
following circuit and identify a single logic gate that can be used to replace the
whole circuit.
48 Computer Arithmetic
Fundamentals of
Information Technology
NOTES
2.10 QUESTIONS
*****
Computer Arithmetic 51
Fundamentals of
Information Technology
Learning objectives
This chapter describes the various input output devices used for connecting
computer. After learning this chapter student will study
• What is input and output devices
• Role of input and output devices
• Various types of scanners, plotters, printers etc.
• Example of input and output devices
3.1 INTRODUCTION
Input
52 Output Devices
Fundamentals of
Information Technology
NOTES
The traditional input device was keyboard for data input. As the technology
advances there are many input devices are available in the market. These devices
are plug and play just you have to connect it to the machine and have to install a
software called as driver to use it. Following are some of the examples of
input devices.
3.2.1 Keyboard
The keyboard is a device which is directly connected on to the motherboard
(system board). It allows data entry into computer system. A set of keys are
available in the form of small set of buttons. These buttons have a label indicating
the character. A typical structure is shown in figure 3.2.
Input
Output Devices 53
Fundamentals of The layout specifically QWERTY form. Now a day, there are different kinds
Information Technology of keyboards are available. It includes wireless, with wired, multimedia
keyboards etc. It commonly used in personal computers and workstations.
NOTES
3.2.2 Pointing Devices
A pointing device is used to point out a cursor on the screen. This device is
used to control the movement of a cursor on the screen. Following are some of
the examples of pointing devices.
3.2.2.1 Mouse
This mouse is simply an input device built to help the user to control the
movement of the cursor on the screen. The mouse pointer is as natural and
efficient way of pointing a cursor on the screen.
3.2.2.2 Joystick
Joystick is commonly used for video games, flight simulators, training
simulators, and for controlling industrial robots. Joysticks device is shown in
figure 3.4 are basically sticks attached to a base unit that measures the distance
Input the stick is moved left, right, up, down, or diagonally.
54 Output Devices
Fundamentals of
Information Technology
NOTES
Input
56 Output Devices
Fundamentals of
Information Technology
NOTES
Input
Output Devices 57
Fundamentals of 3.2.2.10 OMR scanner
Information Technology
The Optical Mark Reader scanner as shown in figure 3.12 is capable of
recognizing a pre-specified type of mark by pencil or pen. It is very useful for
NOTES grading tests with objective type questions, or for any input data that is of a choice
or selection nature.
3.2.2.12 MICR
Magnetic Ink Character Recognition (MICR) is used by banking industry
for faster processing of large volume of cheques. It includes Bank’s identification
code (name, branch, etc.), account number and cheque number are pre-printed
(encoded) using characters from a special character set on all cheques. The typical
scanner is shown in figure 3.14.
Input
58 Output Devices
Fundamentals of
Information Technology
NOTES
3.2.2.13 Digitizer
It is an input device used for converting (digitizing) pictures, maps and
drawings into digital form for storage in computers. It commonly used in the area
of Computer Aided Design (CAD) by architects and engineers to design cars,
buildings medical devices, robots, mechanical parts, etc.
Input
Output Devices 59
Fundamentals of
Information Technology
NOTES
3.4.1 Monitors
Monitors are the most popular output devices used for producing soft-copy
Input output. It displays the output on a television like screen. Monitor associated with
60 Output Devices a keyboard is called a video display terminal (VDT). It is the most popular I/O
device as it displays what kind of input is being entered by the use using different Fundamentals of
input devices. There are two types of monitors one is CRT monitors and second Information Technology
is flat panel monitors. Cathode-ray-tube (CRT) monitors look like a television
and are normally used with non-portable computer systems. The CRT Monitor NOTES
shown in figure 3.18
3.4.2 Printers
The most common output devices for producing hard-copy output. Printer
is one of the most important peripheral components of the computer. There are
different types of printers classified basically on the printing technology. The
printers are evaluated on the basis of the following factors:
• Printer Resolution:-It is measured in dots per inch(dpi). It indicates the
number of vertical and horizontal dots that can be printed. Higher the
resolution better is the quality.
• Speed: It is the number of pages printed per minute.
• Graphics and printer-language support: It should support one or more
printer languages such as Adobe PostScript and Hewlett Packard’s
LaserJet Printer Control Language(PCL).
• Paper Capacity: The number of pages that can be accommodated in the
paper tray. The different sizes of pages that can be printed by the printer. Input
Output Devices 61
Fundamentals of • Duty Cycle: It is the number of sheets of paper the printer is rated to
Information Technology print per month.
• Printer memory: It is used to store complex graphics and full color
NOTES images require larger amounts of memory.
• Cost of Paper: It indicates the cost of any special paper.
• Cost of Consumables: It indicates the total cost per page for printing.
There are two types of printers Impact and Non – Impact Printers.
b) Drum Printer
It is a line printer that print one line at a time. In technological it have
a solid cylindrical drum with characters embossed on its surface in the
form of circular bands. It has a set of hammers mounted in front of the
drum in such a manner that an inked ribbon and paper can be placed
between the hammers and the drum. The drum printer shown in
figure 3.21
c) Laser Printer
It is a page printer that print one page at a time. The typical laser printer
is shown in figure 3.22. It consists of a laser beam source, a multi-
sided mirror, a photoconductive drum and toner (tiny particles of
oppositely charged ink). To print a page, the laser beam is focused on
the electro statically charged drum by the spinning multi-sided mirror.
The Toner sticks to the drum in the places the laser beam has charged
the drum’s surface. Toner is then permanently fused on the paper with
heat and pressure to generate the printer output. Laser printers produce
very high quality output having resolutions in the range of 600 to 1200
dpi. It can print many special characters, different sizes of print, and
graphics such as charts and graphs. Most laser printers are
monochrome, but color laser printers are also available. It has low
speed laser printers can print 4 to 12 pages per minute. Very high-speed
laser printers can print 500 to 1000 pages per minute. Laser Printers
Input
are more expensive than other printers. Output Devices 63
Fundamentals of
Information Technology
NOTES
b) Chain/Band Printers
This a Line printer that print one line at a time. It consists of a metallic
chain/band on which all characters of the character set supported by
the printer are embossed. It also has a set of hammers mounted in front
of the chain/band in such a manner that an inked ribbon and paper can
be placed between the hammers and the chain/band. It can only print
pre-defined sets of characters that are embossed on the chain/band used
with the printer. It doesn’t have a facility to print any shape of
characters, different sizes of print, and graphics such as charts
and graphs.
3.4.3 Plotters
Plotters are an ideal output device for architects, engineers, city planners,
and others who need to routinely generate high-precision, hard-copy graphic
output of widely varying sizes. The plotters having similar structure as shown in
figure 3.24 Input
Output Devices 65
Fundamentals of
Information Technology
NOTES
Speakers
The built-in speakers in most PC cases are used just for making system
sounds, such as warning beeps and action indicators. To play more sophisticated
sounds on your PC, you need a set of external speakers. Usually speakers come
in pairs, and there is a plug that connects them to your sound card. Arrange the
speakers with one on the left and one on the right of your desk or work area to
get a stereo effect.
Questions
Short Questions
1. What is input – output devices? Explain its role in processing.
2. Explain sound card. State its applications.
3. Describe plotter and its working.
4. Explain the functionality of non impact printers.
5. Explain the functionality of impact printers.
***** Input
Output Devices 67
Fundamentals of
Information Technology
Learning Objectives
This chapter describes about primary and secondary storage systems. The
main objectives of this chapter
• What is primary and secondary memory?
• What are data storage and retrieval methods?
• Types of primary and secondary storage devices
4.1 INTRODUCTION
A storage or memory of a computer is used to store the data. This data may
be numbers or programs or software like operating system and its utilities, word
processor, turbo c etc. to store this data and instructions before and after
processing requires space which is called as memory or storage. The smallest
unit of memory is cell. This cell has unique address and location inside the
memory. The address depends on the size of the memory.
The memory of a computer is similar to human brain where data is stores
in terms of neurons. We can recall the data to answer the question. Similarly,
computer’s memory works. The difference between human memory and
computer memory is that, human memory can be recalled depending on human
psychology (i.e. Tendency, nature, reaction etc.), but computers data can be
recalled with any problem provides storage is in good condition. Let us see
computers memory in detail.
This type of memory (figure 4.3) is also known as external memory or non-
volatile. It is slower than the main memory. These are used for storing
data/information permanently. CPU directly does not access these memories;
instead they are accessed via input-output routines. The contents of secondary
memories are first transferred to the main memory, and then the CPU can access
it. For example, disk, CD-ROM, DVD, etc.
4.3.1.1 Disks
NOTES
There is a significant difference in the data stored in previous days i.e. 15-
20 years before and today’s data. In computer field, it has becoming challenge
to organize and storing data. Data generated today is huge in amount and
therefore, collecting, storing and organizing data has become very critical. Before
2000, 80% of the data was in text format whereas todays data is in the form of
text, audio, video, graphics etc. Storage
Fundamentals 75
Fundamentals of The process of collecting, storing, locating, searching the data as per
Information Technology requirement, is called data storage and retrieval. There are basically two types
of data stored 1) In the form of File (File Management System) and 2) in the
NOTES form of database (Data Base Management System).
In data stored in file management system as a file format and is very rigid
to retrieve and takes much time fetch the data. It is also difficult to organize the
data when size of the data is very big.
Today’s data is mostly stored and organized as a database management
system. The process of collecting, storing and retrieving the data is organized
way is called as database. This data stored in the form of database is very flexible,
simple to retrieve and in-depended application. The data in this form is more
secure than file format.
NOTES
Figure 4.7: showing sequential and random access file record writing
Storage
Figure 4.8: of Indexed Sequential file Fundamentals 77
Fundamentals of
Information Technology
4.6 QUESTIONS
NOTES
*****
Storage
78 Fundamentals
Fundamentals of
Information Technology
Chapter 5. Software
NOTES
Learning objectives
The objectives of this chapter are
• To understand what is software
• To know what are types of software
• To know applications of software
• To know programming languages and its types
• To know flow chart and algorithms
5.1 INTRODUCTION
Software is needed to help user for completion of task. With software user
cannot use computer. There are different types of software which are executed
for some specific reason. This software’s are communicating with each other and
helps user. Following are the needs of software.
• For making computer ready for use
• For converting user language instructions to computer understandable
language.
• For making and using connected devices to computer.
• For helping user to complete their task of creating documentation or
making different types of reports.
Software 79
Fundamentals of • Keeping financial or mathematical records using software like excel or
Information Technology ready made software’s available in market.
• For entreating people, software’s like video player etc.
NOTES
• For assisting doctors, engineers much software are available.
If we look any area then it is observed that there are plenty number of
software’s are available today
Runs applications
• Multitasking
• Foreground & background applications
In early days operating systems were character based means user had to
give each and every command at the command prompt. User had to remember
each command which was very difficult for user. Then experts developed
graphical user interface called as GUI to interact with computer. This GUI is very
famous today and is universally accepted. Microsoft Windows, Linux, Mac OS,
Android are very famous operating systems today in the market.
There are basically three types of Operating systems
1. Stand Alone Operating system.
2. Embedded Operating Systems.
3. Network Operating Systems.
Search Tools
This utility is developed to search for documents and other files on the hard
disk drive. Third - party search tools are also available.
For example Windows 8 has Search charm to search for files, apps, and
Store items
84 Software
Backup and Recovery Utility Programs Fundamentals of
Information Technology
This utility program Make the backup and restoration process easier. It
creates a duplicate copy of important files as backup. This utility can use a
recordable or rewritable CD or DVD disc, a USB flash drive, or an external hard NOTES
drive.
NOTES
Software 89
Fundamentals of
Information Technology
5.4 PROGRAMMING LANGUAGES
NOTES
Program is a group of sequential instructions written for a particular task.
These instructions are written in a language so that computer can accept and
executes is called programming languages. Basically there are three types of
programming languages 1) High Level Language 2) Assembly Language and 3)
Machine language.
Computer only understands machine language therefore; any program
written in any high level language is required to convert into machine language.
User can write a program in high level language like c++, C#, Java or Dotnet, it
is required to convert into assembly and then in machine language. So a student
of computer field must learn these types of languages.
A language has its own grammar and rule of writing a statement called as
syntax and also is has semantics. In order to learn anu language we have to learn
its grammar, syntax and semantics.
NOTES
For arithmetic-logical instructions, both the op field and the funct field are
used to
Specify the particular operation that is to be performed.
Similarly let see the data transfer instructions by using R-format
Software 91
Fundamentals of Advantages of Machine Language –
Information Technology
1. Execution of the instruction of machine languages are done very fast
because they are directly executed by the machine.
NOTES 2. Efficient use of primary memory.
Disadvantages of Machine Language –
1. Architecture designs of computers are different and therefore, machine
language is also differing from computer to computer.
2. Programs of machine languages are very difficult to write
3. It is difficult to correct or modify machine language programs.
Checking machine instructions to locate errors is very difficult and
time consuming
4. A programmer needs to remember the operation codes (opcode), and
must keep track of the storage locations of data and instructions for
writing machine language programs. Hence, it becomes very difficult
for him/her to concentrate fully on the logic of the problem. This
frequently results in programming errors.
5.5.1 Algorithms
An algorithm is a finite set of instructions, sometimes called a procedure
or a function that is used to perform a certain task. For each and every task we
can write an algorithm. Problem may be very simple or difficult.
Algorithms must be very efficient in terms of the resources they use.
Efficiency of the algorithm depends on less use or efficient use of resources like
memory and time for execution. If algorithms are poorly written then it may take
more time to execute.
Some of the important points about algorithms are
1. Algorithms have effectively computable operations
2. Algorithms produce a output
3. Algorithms halt in a finite amount of time
Let us see some of the example of algorithms
1. Suppose we have to write a algorithms of finding result of a student
on getting four different subjects. If average is less than 50 then student
is declared as fail and pass otherwise. Then algorithm of the above is
Step 1: Input M1,M2,M3,M4
Step 2: Average <---- (M1+M2+M3+M4)/4
Step 3: if Average is less than 50 (Avrage < 50)
94 Software
then Fundamentals of
print “Fail” Information Technology
else
print “Pass” NOTES
endif
Step 4: Stop
5.5.2 Flowchart
Flowchart is a pictorial representation of algorithm. Once we draw flowchart,
it is very easy to write a program. The flow chart is drawn by using symbols.
NOTES
NOTES
*****
98 Software
Fundamentals of
Information Technology
Learning Objectives
After studying this chapter student will learn
• What is data communication and requirement of it?
• What are the data communication modes and medium?
• What are types of networks and topologies?
• What is protocol and different types of protocols?
• What is internet, brewers and servers
• What if business data processing?
6.1 INTRODUCTION
Data is nothing but information transferred from one place to another place
without human existence. This type of data transfer is very old method and in
the ancient age it was transferred by using pigeon. Some centuries ago, there was
some special person appointed to transfer the information from one person to
another. In the 18th century, the technology was being used to data transfer
through telegraph machine in 1838. After some years, alexander Graham Bell
invented telephone machine to transfer the data in voice format which was
revolutionary experiment. Due to advancement in technology, today we are
having network technology, where we can transfer any amount of data from any
place to any place within no time. Network technology has given us the
opportunity of transferring the data with having barrier of size of data and
location. Let us study, how this data communication is being taken place in
today’s world.
Today’s data is known as digital data and the data transferred from one
location to the other is called digital data transfer. The data when transferred
successfully from one digital device known as sender device to another digital
device known as receiver device is called as data commination. The process of
transferring the data between two devices is known as communication process.
Data communication 99
Fundamentals of The data transfer takes place when the communication between two devices is
Information Technology established. This communication is possible today because of network.
Networking is the convenient way of making information accessible to
NOTES anyone, anytime & anywhere. Data can be in the form of graphics, sound, video
or in the form of animation
In order to transfer the data at least two devices must be ready to
communicate and then following points are required to transfer the data
• A Transmission Medium
• A set of Rules & Procedure for proper communication (Protocol)
• Standard Data Representation
• Transmission of bits either Serial or Parallel
• Bit synchronization using Start/stop bits in case of Asynchronous
Transmission
• In Synchronous Transmission the agreed pattern of Flag
• Signal encoding rules viz. NRZ or RZ
• Other higher layer protocol
We will see the how these communication processes work in detail.
When data is transferred, means actually bits (binary digits) are transferred
between two devices over a transmission medium where these devices are
connected. There are two basic data transmission methods 1) Parallel
transmission and 2) serial transmission.
The number of bits transferred in one second is called as bit rate or
transmission speed. Today’s networks speed is measures as 32 Mbps, 64 Mbps
etc. 32 Mbps is 32 Megabytes data is transferred in one second. This data
transmission is called as bandwidth.
We actually enter the data through keyboard; each character is encoded into
an equivalent binary coded pattern, using one of the standard coding schemes
that are used for the interchange of information. To represent all characters of
the keyboard, a unique pattern of 7 or 8 bits in size is used. The use of 7 bits
means that 128 different elements can be represented, while 8 bits can represent
256 elements. A similar procedure is followed at the receiver that decodes every
received binary pattern into the corresponding character. This encoding and
decoding of data is very important for successful data communication.
All the required characters are coded by using two types of codes like
100 Data communication
Extended Binary Coded Decimal (EBCDIC) and the American Standard Code Fundamentals of
for Information Interchange codes (ASCII). Both coding schemes cater to all the Information Technology
normal alphabetic, numeric, and punctuation characters, collectively referred to
as printable characters and a range of additional control characters, known as NOTES
non-printable characters.
DATA FLOW:
Simplex
Half Duplex
Full Duplex
There are two basic data transmission types parallel and serial. In parallel
data is transferred simultaneously and in serial transmission data is transferred
bit by bit. We will see these types of transmission in detail.
NOTES
ADVANTAGES
1. It has low weight.
2. It is very inexpensive.
3. It is easy to install and maintain.
DISADVANTAGES:
1. Because of high attenuation (weakening of signal), it is incapable
carrying a signal over long distances without the use of repeaters.
2. It has low bandwidth (data carrying capacity) capabilities.
Coaxial Cable
There are two conductors namely center conductor and outer conductor with
an insulating material between the two. Basically, coaxial cables are used for the
transmission of Radio Frequency energy. The system offers tight control over
electrical impedance.
The coaxial cable (shown in figure 6.6) is commonly used in WAN/LAN.
Coaxial cable for interconnecting equipment’s of LAN and WAN. Entertainment
equipment such as monitors, TVs, cameras, recording equipment and broadcast
equipment are interconnected using coaxial cables.
NOTES
ADVANTAGES
1. It provides higher bandwidths as compared to twisted pair cable.
2. The data transmission characteristics of coaxial cables are considerably
better than those of twisted pair cables.
3. The coaxial cables can be used for broadband transmission.
DISADVANTAGES
1. Expensive compared to twister pair cables.
2. The coaxial cables are not compatible with twisted pair cables.
Optical Fiber
This fiber optic cable (figure 6.7) is made up of a glass or silica core. The
core of the optical fiber is surrounded by glass or silica, called as cladding. The
refractive index of core will be always higher than the refractive index of
cladding.
Optical fiber is constructed for light propagation through transparent wire.
This cable is constructed because of the reason that light wave cannot traverse
long distance in air without any losses
ADVANTAGES
1. It is immune to electrical and magnetic interference i.e., noise in any
form because the information is travelling on a modulated light beam.
2. It guarantees secure transmission and has a very high transmission
capacity.
3. It is highly suitable for harsh industrial environments.
108 Data communication
DISADVANTAGES Fundamentals of
Information Technology
1. Optical fibers are quite fragile and may need special care in installation.
2. Because of noise immunity, optical fibers are virtually impossible to tap.
NOTES
3. They are the most expensive of all the cables
MICROWAVE
Microwave transmission (figure 6.8) occurs when wireless signal are
transmitted in the air between sender and receiver. The transmission depends on
the height of the antenna. The antennas are mounted on the tower. The height of
the towers is also important. If the height of tower on which antenna mounted is
high then transmission will be at higher range.
Advantages
1. This transmission media proves cheaper than digging trenches for
laying cables.
2. It offers ease of communication over difficult terrain.
Disadvantages
1. Microwave communication is an insecure communication.
2. Microwave signals is susceptible to weather effects like rains,
thunderstorms etc.
RADIO WAVE
Radio wave transmission (figure 6.9) occurs when information is
transmitted by using radio frequencies continuously in the form of sine waves.
Here sender or transmitter takes a message in the form of voice, pictures,
and encodes it into a sine wave and transmits as radio waves. The receiver
decodes the message from the sine wave.
Both sender and receiver use antennas to radiate and capture the radio
signal.
NOTES
Advantages
1. This transmission media proves cheaper than digging trenches for
laying cables.
2. It offers ease of communication over difficult terrain.
Disadvantages
1. Radio wave communication is an insecure communication.
2. Radio wave signals is susceptible to weather effects like rains,
thunderstorms etc.
SATELLITE
Satellite transmission (figure 6.10) is based on microwave relay system.
Satellite sends the waves to the earth station consisting of satellite dish works as
an antenna and communication equipment to transmit and receive data from
satellites
Advantages
1. The area coverage through satellite transmission is quite large.
2. The laying and maintenance of intercontinental cable is difficult and
expensive and this is where the satellite proves to be the best
alternative.
Disadvantages
1. The costs associated with satellites are significantly high.
110 Data communication
MODEM AND ITS WORKING Fundamentals of
Information Technology
A modem is called as modulator and demodulator device connected to a
computer for making successful communication with other computers via
telephone lines. NOTES
NOTES
1. Peer-to-peer network.
In this architecture one computer will send data and information to the other.
There is no server computer to control the other.
2. Client-server network.
In client-server architecture as shown in figure 6.16, Server machine is
having total control of exchanging data and information. Any machine can send
data and information to the other but under the control of server machine.
NOTES
NOTES
NOTES
6.9.8 Protocols
A protocol is means for successful communication between two or more
devices. A successful communication requires some common language, syntax
and semantics. So a protocol defines the rules that govern the communication
between two computers. A protocol consists of format of a statement (syntax)
and meaning of the command or instruction (semantics).
Network protocols when transfer the message must look at
• Message format
122 Data communication • How the networking devices share information with other networks
• How to handle the errors occurred during communication Fundamentals of
Information Technology
• How to terminate the data transfer session
Following are very popular protocols used in networking.
NOTES
1. HTTP protocol for communication between web browsers and servers.
This is also called as application protocol.
Application Layer
The Application Layer of the TCP/IP Model consists of various protocols
that perform all the functions of the OSI model’s Application, Presentation and
Session layers. This includes interaction with the application, data translation
and encoding, dialogue control and communication coordination between
systems.
HTTP – This protocol id used to transfer web pages from web/HTTP server
to web/HTTP client. Web browsers from client side are used to request pages
from server.
FTP – This protocol transfers file between two hosts. Out of this two hosts,
one host is FTP server and other is FTP client. Client host requires authentication
before connected to server for accessing file structure. After successful
authentication, file operation can be performed be client host.
Telnet – this protocol is used to access the resources of a remote host, telnet
server runs a telnet server application receives a connection from a remote client.
This protocol provides text based command line interface. Both the client and
server hosts use this facility available as a telnet application.
SMTP – This is special protocol for sending e-mails. Client’s mail is acting
as SMTP client and at server end it is SMTP server. Mails can be send between
two servers using SMTP.
DNS – Domain Name server protocol maps the name of the web site with
IP address. This IP address is numeric combination of 32 bits like 172.17.224.16
whereas this IP address has the web site name such as www.bvdumca.edu.in.
When you give web site name in browser DNS maps the website with IP address.
Once this is done HTTP session is established.
Transport Layer
There is no difference between the transport layer of ISO/OSI and four
model of TCP/IP protocol suite. These network layers take the user data and add
a header and then pass it down to the transport layer. And transport layer sends
this user data across the network to destination node.
124 Data communication
The two protocols named TCP and UDP are available in this protocol. TCP Fundamentals of
is reliable for connection established between two nodes to control the flow of Information Technology
data in segments. The protocol names UDP then, transfers the data without fail.
NOTES
Network Layer
Network layer of the ISO/OSI model is Internet layer of the TCP/IP four
layer model. This layer provides logical addressing, path determination and
forwarding of data.
IGMP protocol
IGMP (Internet Group Management Protocol) is a communication protocol
used by host computer and adjacent routers on IPv4 network to establish
multicast group membership.
ICMP Protocol
The Internet Control Message Protocol (ICMP) that is used to send error
messages across at this layer.
The word data processing is used when the raw data is processed and the
meaningful information is produced and provided to the intended user. When
this processing is used in the business purpose then it is called business data
processing. Now a day’s people use on line software for creating their document
by using word, or spreadsheet software and they use utility like graphics to
display the results. This graphics utility programs take the data as input, process
it and displays the result on the screen.
So the data processing does the three basic steps 1) input data 2) processing
of data and 3) display or print output of data. Data communication 127
Fundamentals of 6.11.1 Data storage hierarchy
Information Technology
Data is stored and accessed in the form of bits. So the binary digit called as
bit will be at the bottom of data storage hierarchy. Bits are combined onto number
NOTES of bytes to be transferred from one location to the other which is next level. These
bytes are required to create a record. A record is a combination of attributes or
fields. The record may be having students detail consisting of student name,
program, gender, birth date, admission date etc. this record structure is the third
level in storage hierarchy. These records are stored in a file called as database
file which is the fourth level. The files are stored as a database which is
fifth level.
Thus data storage hierarchy is shown in the following table
6.12 QUESTIONS
*****