100% found this document useful (2 votes)
7 views85 pages

Foundations Of Computing Pradeep K. Sinha instant download

The document is a comprehensive overview of the book 'Foundations of Computing' by Pradeep K. Sinha, which covers essential topics in computing studies, including computer characteristics, data representation, digital systems design, computer architecture, software, programming languages, operating systems, databases, and data communications. It serves as a resource for students and professionals preparing for computing examinations. The book includes detailed chapters with points to remember and questions for review.

Uploaded by

lzrxztdsty845
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
7 views85 pages

Foundations Of Computing Pradeep K. Sinha instant download

The document is a comprehensive overview of the book 'Foundations of Computing' by Pradeep K. Sinha, which covers essential topics in computing studies, including computer characteristics, data representation, digital systems design, computer architecture, software, programming languages, operating systems, databases, and data communications. It serves as a resource for students and professionals preparing for computing examinations. The book includes detailed chapters with points to remember and questions for review.

Uploaded by

lzrxztdsty845
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 85

Foundations Of Computing Pradeep K.

Sinha
install download

https://ebookmeta.com/product/foundations-of-computing-pradeep-k-
sinha/

Download more ebook from https://ebookmeta.com


We believe these products will be a great fit for you. Click
the link to download now, or visit ebookmeta.com
to discover even more!

Handbook of Pediatric Surgery 2nd Edition Chandrasen K.


Sinha

https://ebookmeta.com/product/handbook-of-pediatric-surgery-2nd-
edition-chandrasen-k-sinha/

Self lubricating composites Second Edition P K Rohatgi


Editor Emad Omrani Editor Pradeep L Menezes Editor

https://ebookmeta.com/product/self-lubricating-composites-second-
edition-p-k-rohatgi-editor-emad-omrani-editor-pradeep-l-menezes-
editor/

Mainframe Experimentalism Early Computing and the


Foundations of the Digital Arts Hannah Higgins (Editor)

https://ebookmeta.com/product/mainframe-experimentalism-early-
computing-and-the-foundations-of-the-digital-arts-hannah-higgins-
editor/

On Stage The theatrical dimension of video imaged 1st


Edition Mathilde Roman Charles Penwarden

https://ebookmeta.com/product/on-stage-the-theatrical-dimension-
of-video-imaged-1st-edition-mathilde-roman-charles-penwarden/
Applied Numerical Methods with MATLAB for Engineers and
Scientists, 5th Edition Steven Chapra

https://ebookmeta.com/product/applied-numerical-methods-with-
matlab-for-engineers-and-scientists-5th-edition-steven-chapra/

Privatization of Public Services Impacts for Employment


Working Conditions and Service Quality in Europe 1st
Edition Christoph Hermann Jörg Flecker

https://ebookmeta.com/product/privatization-of-public-services-
impacts-for-employment-working-conditions-and-service-quality-in-
europe-1st-edition-christoph-hermann-jorg-flecker/

Melody of the Mahaveli Short stories 1st Edition S


Vaithialingam Sellathamby Sriskandarajah

https://ebookmeta.com/product/melody-of-the-mahaveli-short-
stories-1st-edition-s-vaithialingam-sellathamby-sriskandarajah/

Operation Agreement Jewish Commandos and the Raid on


Tobruk John Sadler

https://ebookmeta.com/product/operation-agreement-jewish-
commandos-and-the-raid-on-tobruk-john-sadler/

Germanic Genitives 1st Edition Tanja Ackermann

https://ebookmeta.com/product/germanic-genitives-1st-edition-
tanja-ackermann/
Discovering GIS and ArcGIS 3rd Edition Shellito

https://ebookmeta.com/product/discovering-gis-and-arcgis-3rd-
edition-shellito/
FOUNDATIONS OF
COMPUTING
Fifth Edition

Essential for
Computing Studies, Profession and Entrance
Examinations
FOUNDATIONS OF
COMPUTING
Fifth Edition

Essential for
Computing Studies, Profession and Entrance
Examinations

Pradeep K. Sinha
Priti Sinha

www.bpbonline.com
FIRST EDITION 2023
Copyright © BPB Publications, India
ISBN: 978-93-5551-254-3

All Rights Reserved. No part of this publication may be reproduced, distributed or


transmitted in any form or by any means or stored in a database or retrieval
system, without the prior written permission of the publisher with the exception to
the program listings which may be entered, stored and executed in a computer
system, but they can not be reproduced by the means of publication, photocopy,
recording, or by any electronic and mechanical means.

LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY


The information contained in this book is true to correct and the best of author's
and publisher's knowledge. The author has made every effort to ensure the
accuracy of these publications, but publisher cannot be held responsible for any
loss or damage arising from any information in this book.

All trademarks referred to in the book are acknowledged as properties of their


respective owners but BPB Publications cannot guarantee the accuracy of this
information.

Distributors:
BPB PUBLICATIONS
20, Ansari Road, Darya Ganj
New Delhi-110002
Ph: 23254990/23254991

MICRO MEDIA
Shop No. 5, Mahendra Chambers,
150 DN Rd. Next to Capital Cinema,
V.T. (C.S.T.) Station, MUMBAI-400 001
Ph: 22078296/22078297

DECCAN AGENCIES
4-3-329, Bank Street,
Hyderabad-500195
Ph: 24756967/24756400

BPB BOOK CENTRE


376 Old Lajpat Rai Market,
Delhi-110006
Ph: 23861747

Published by Manish Jain for BPB Publications, 20 Ansari Road, Darya Ganj, New
Delhi-110002 and Printed at Akash Press, New Delhi
www.bpbonline.com
Table of Contents
LETTER TO READERS

PREFACE

ABOUT LECTURE NOTES PRESENTATION SLIDES

ABBREVIATIONS

CHAPTER 1: CHARACTERISTICS, EVOLUTION, AND


CLASSIFICATION OF COMPUTER
What is a Computer?
Characteristics of Computers
Evolution of Computers
Computer Generations
First Generation (1942-1955)
Second Generation (1955-1964)
Third Generation (1964-1975)
Fourth Generation (1975-1989)
Fifth Generation (1989-Present)
Classification of Computers
Notebook Computers (Laptops)
Personal Computers (PCs)
Workstations
Mainframe Systems
Supercomputers
Client and Server Computers
Handheld Computers
Points to Remember
Questions
CHAPTER 2: INTERNAL DATA REPRESENTATION IN
COMPUTERS
Number Systems Used in Computers
Binary Number System
Octal Number System
Hexadecimal Number System
Converting from One Number System to Another
Converting from Another Base to Decimal
Converting from Decimal to Another Base (Division-Remainder
Technique)
Converting from a Base Other Than 10 to Another Base Other
Than 10
Shortcut Method for Binary to Octal Conversion
Shortcut Method for Octal to Binary Conversion
Shortcut Method for Binary to Hexadecimal Conversion
Shortcut Method for Hexadecimal to Binary Conversion
Fractional Numbers
Character Coding Schemes
BCD Code
EBCDIC
Zoned and Packed Decimal Numbers
ASCII
Unicode
Collating Sequence
Binary Arithmetic
Why Binary?
Binary Addition
Binary Subtraction
Binary Multiplication
Binary Division
Why Do Computers Use Additive Method?
Points to Remember
Questions

CHAPTER 3: DIGITAL SYSTEMS DESIGN


Boolean Algebra
Fundamental Concepts of Boolean Algebra
Postulates of Boolean Algebra
The Principle of Duality
Theorems of Boolean Algebra
Boolean Functions
Minimization of Boolean Functions by Algebraic Manipulations
Complement of a Function
Canonical Forms of Boolean Functions
Conversion between Canonical Forms
Minimization of Boolean Functions by Map Simplification
Logic Gates
Logic Circuits
Converting Expressions to Logic Circuits
The Universal NAND Gate
The Universal NOR Gate
Design of Combinational Circuits
Design of Half-Adder
Design of Full-Adder
A Parallel Binary Adder
Flip-Flops
Types of Flip-flops
Excitation Tables
Edge-Triggered Flip-Flops
Master-Slave Flip-Flop
Uses of Flip-flops
Sequential Circuits
Flip-flop Input Equations
State Table
State Diagram
Design of Sequential Circuits
Design of Binary Counter
Points to Remember
Questions
CHAPTER 4 : COMPUTER ARCHITECTURE
Basic Functions of a Computer
Basic Computer Organization
Basic Functional Units
System Concept
Basic Processor and Memory Architecture
CPU Architectures
Basic Components of CPU
CPU Instruction Set
CPU Registers
Processor Speed
Types of Processors
Memory Architectures
Storage Evaluation Criteria
Main Memory Organization
Main Memory Capacity
Types of Memory Chips
Minimizing Memory-Processor Speed Mismatch
Cache Memory
Memory Interleaving
Hybrid Approach
Memory and I/O Buses
Memory Buses
I/O Buses
Interconnection Architectures
Unibus Architecture
Dual Bus Architecture
DMA Architecture
Multiprocessor System Architectures
Shared Memory Systems
Distributed Memory Systems
Parallel Processing Systems
Points to Remember
Questions
CHAPTER 5: SECONDARY STORAGE
Classification of Secondary Storage
Magnetic Tapes
Basic Principles of Operation
Types of Magnetic Tapes
Advantages and Limitations of Magnetic Tapes
Uses of Magnetic Tapes
Magnetic Disks
Basic Principles of Operation
Types of Magnetic Disks
Advantages and Limitations of Magnetic Disks
Uses of Magnetic Disks
Optical Disks
Basic Principles of Operation
Types of Optical Disks
Advantages and Limitations of Optical Disks
Uses of Optical Disks
Memory Storage Devices
Solid State Drive (SSD)
Flash Drive (Pen Drive)
Memory Card (SD/MMC)
RAM Disk
Hybrid Secondary Storage Drives
Mass Storage Devices
Disk Array
Automated Tape Library
CD-ROM Jukebox
RAID Storage
RAID Techniques
RAID Levels
Storage Interfaces
SCSI (Small Computer System Interface)
SAS (Serial Attached SCSI)
SATA (Serial Advanced Technology Attachment)
Fiber Channel (FC)
FireWire
iSCSI (Internet SCSI)
FC versus iSCSI
DAS, SAN, and NAS
DAS (Direct Attached Storage)
SAN (Storage Area Network)
NAS (Network Attached Storage)
Data Backup
What is Data Backup?
Why Backup Data?
Types of Backup
Backup Policy
Backup versus Archiving
Hierarchical Storage System (HSS)
On-line, Near-line, and Off-line Storage
Hierarchical Storage Management (HSM)
Points to Remember
Questions

CHAPTER 6: INPUT-OUTPUT DEVICES


Input Devices
Keyboard Devices
Point-and-Draw Devices
Data Scanning Devices
Digitizer
Electronic-card Reader
Speech Recognition Devices
Vision-Input Systems
Output Devices
Monitors
Printers
Plotters
3D Printers
Computer Output Microfilm (COM)
Screen Image Projector
Voice Response Systems
Ergonomically Designed Devices
I/O Interfaces
Device Controllers
Serial and Parallel Ports
SCSI Interface
USB (Universal Serial Bus) Standard
Points to Remember
Questions

CHAPTER 7: SOFTWARE
Basic Concepts and Terminologies
What is Software?
Relationship between Hardware and Software
Types of Software
Logical System Architecture
Firmware
Middleware
Acquiring Software
Buying Pre-written Software
Ordering Customized Software
Developing Customized Software
Downloading Public-domain Software
Software Development Life Cycle (SDLC)
Advantages of SDLC Model
Limitations of SDLC Model
Lightweight SDLC Models
Software Design Approaches
Software Implementation
Software Testing and Debugging
What are Testing and Debugging?
Types of Program Errors
Debugging a Program for Syntax Errors
Debugging a Program for Logic Errors
Software Testing Concepts
Testing Methodologies
Test-set-generation Techniques
Test-case-selection Techniques
Software Deployment
Changeover Operations
Changeover Methods
System Evaluation
Software Maintenance
Definition
Need for Software Maintenance
Types of Software Maintenance
Importance of Software Maintenance
Controlling Modifications
Tools for Effective Software Maintenance
Software Documentation
What is Documentation?
Need for Documentation
Forms of Documentation
Documentation Standard
Software Engineering
What is Software Engineering?
Need for Software Engineering
Goals of Software Engineering
Principles of Software Engineering
Some Popular Application Software Packages
Word-processing Package
Spreadsheet Package
Graphics Package
Personal-assistance Package
Education Software
Entertainment Software
Points to Remember
Questions

CHAPTER 8: PLANNING THE COMPUTER PROGRAM


Purpose of Program Planning
Algorithm
What is an Algorithm?
Sample Algorithms
Quality of Algorithms
Representation of Algorithms
Flowcharts
What is a Flowchart?
Why Use Flowcharts?
Flowchart Symbols
Sample Flowcharts
Levels of Flowcharts
Flowcharting Rules
Advantages and Limitations of Flowcharts
Decision Tables
What is a Decision Table?
Sample Decision Table
Advantages and Limitations of Decision Tables
Pseudocode
What is Pseudocode?
Pseudocodes for Basic Logic (Control) Structures
Sample Pseudocode
Indentation
Advantages and Limitations of Pseudocode
Data Structures
Types of Data Structures
Array
Linked List
Stack
Queue
Hash Table
Tree
Binary Tree
Binary Search Tree
Graph
Heap
Points to Remember
Questions

CHAPTER 9: PROGRAMMING LANGUAGES


Analogy with Natural Languages
Machine Language
Advantages and Limitations of Machine Language
Assembly Language
Assembler
Advantages of Assembly Language over Machine Language
Limitations of Assembly Language
Typical Uses of Assembly Language
Assembly Languages with Macro Instructions
High-level Language
Compiler
Linker
Interpreter
Intermediate Language Compiler and Interpreter
Advantages and Limitations of High-level Languages
Object-Oriented Languages
What is Object-Oriented Programming (OOP)?
Fundamental Concepts of OOP
Key Elements of Object-Oriented Paradigm
Procedure-oriented versus Object-oriented Programming
Advantages of OOP
Some High-level Languages
Dealing with So Many High-level Languages
Why So Many High-level Languages?
Characteristics of a Good Programming Language
Selecting a Language for Coding an Application
Other Types of Languages
Scripting Languages
Fourth and Fifth Generation Languages (4GLs and 5GLs)
Markup Languages
Interface Definition Languages (IDL)
Other Related Concepts
Subprogram
Preprocessor
Postprocessor
Points to Remember
Questions

CHAPTER 10: OPERATING SYSTEMS


Basic Concepts
What is an Operating System?
Main Functions of an Operating System
Measuring System Performance
Process Management
Process Management in Early Systems
Multiprogramming
Multitasking
Multithreading
Multiprocessing
Time-sharing
Mutual Exclusion
Deadlock
Memory Management
Uniprogramming Memory Model
Multiprogramming Memory Models
Memory Fragmentation
Paging
Virtual Memory
File Management
File Structure
File Access Methods
File Operations
File Naming
Directories
Disk Space Allocation Methods
Device Management
Controlling I/O Devices
Simple and Easy User Interface to I/O Devices
Spooling
Command Interpretation
Shell
Operating System Structure
Layered Structure
Kernel
Monolithic Kernel versus Microkernel
Resident and Non-Resident Operating System Modules
OS Capability Enhancement Software
Translating Programs
Library Programs
Utility Programs
Some Popular Operating Systems
UNIX
MS-DOS
Microsoft Windows
Microsoft Windows Server (Earlier Known as Windows NT)
Linux
Mac OS
iOS
WatchOS
Android OS
Real-time, Network and Distributed Operating Systems
Real-time Operating Systems
Network and Distributed Operating Systems
Points to Remember
Questions

CHAPTER 11: DATABASE AND DATA SCIENCE


Data versus Information
Data Storage Hierarchy
Standard Methods of Organizing Data
File-oriented Approach
Database-oriented Approach
File Management System
File Types
File Organizations
File Utilities
Database Management System
Database Models
Main Components of a DBMS
Creating and Using a Database
Database Security
Client-Server Database Systems
Distributed Database Systems
Active Database Systems
Multimedia Database Systems
Requirements for Multimedia Database Systems
Data Science
Stages in Data Science
Data Warehousing
Need for a Data Warehouse
Building a Data Warehouse
Data Warehousing Terminologies
Data Mining
Classification of Data Mining Algorithms
Data Mining Techniques
Data Warehousing versus Data Mining
Points to Remember
Questions

CHAPTER 12: DATA COMMUNICATIONS AND COMPUTER


NETWORKS
Basic Concepts
Basic Elements of a Communication System
Data Transmission Modes
Data Transmission Speed
Data Transmission Media
Digital and Analog Data Transmission
Modulation Techniques
Modems
Analog versus Digital Transmission
Data Transmission Services
Communication Processors
Multiplexers
Concentrators
Front-End Processors (FEP)
Asynchronous and Synchronous Transmission
Asynchronous Transmission
Synchronous Transmission
Switching Techniques
Circuit Switching
Message Switching
Packet Switching
Routing Techniques
Place Where Routing Decisions are Made
Static and Dynamic Routing
Network Topologies
Network Types (PAN, LAN, CAN, MAN, and WAN)
Communication Protocols
Roles of a Communication Protocol
Concept of Layered Protocols in Network Design
Network Interface Card (NIC)
The OSI Model
Example of Message Transfer in the OSI Model
Internetworking Tools
Wireless Networks
Types of Wireless Computing Systems
Issues in Wireless Computing Systems
Wireless Applications
Wireless Communication Technologies
Wireless Technologies and Standards
Distributed Computing Systems
Grid Computing
Cloud Computing
Grid versus Cloud
Service Layers of Cloud Computing
Types of Clouds
Points to Remember
Questions

CHAPTER 13: THE INTERNET AND INTERNET OF THINGS


Definition and History
Its Basic Services
Electronic Mail
File Transfer Protocol (FTP)
Telnet
Usenet News
The World Wide Web (WWW)
WWW Browsers
Web Services
Internet Search Engines
Major Elements of Internet Search Engines
Types of Internet Search Engines
Some Popular Internet Search Engines
Uses of the Internet
Other Related Concepts
Intranet
Proxy Server
Internet Telephony
Microbrowser
Next Generation Internet Protocol (IPV6)
Internet of Things (IoT)
Benefits of IoT
IoT Applications (Uses of IoT)
Challenges in Adoption of IoT
Points to Remember
Question

CHAPTER 14: MULTIMEDIA COMPUTING


What is Multimedia?
What is a Multimedia Computer System?
Multimedia Components
Text
Graphics
Animation
Audio
Video
Multimedia Applications
Applications in Education Sector
Applications in Entertainment Sector
Applications in Corporate Sector
Applications in Science and Engineering Sector
Data Compression
Types of Compression Techniques
Basic Compression Techniques
Some Standard Multimedia Compression Techniques
Multimedia Synchronization
Temporal Specification
Temporal Synchronization
Media Center Computer
Media Center PC Features and Functionalities
Points to Remember
Questions

CHAPTER 15: INFORMATION SECURITY


Security Policies versus Mechanisms
Security Goals
External, Internal, and Communication Security
Potential Attacks to Computer Systems
Passive Attacks
Active Attacks
Cryptography
Basic Concepts and Terminologies
Basic Requirements
Symmetric and Asymmetric Cryptosystems
Authentication
What is Authentication?
Types of Authentication Needed
Approaches to Authentication
User Login Authentication
One-way Authentication of Communicating Entities
Two-way Authentication of Communicating Entities
Access Control
What is Access Control?
Access Control Terminologies
Protection Domains
Access Matrix
Implementation of Access Matrix as Access Control Lists
Digital Signature
Firewall
What is a Firewall?
Types of Firewalls
Advantages and Limitations of Firewalls
Software Piracy Protection
What is Software Piracy?
Mechanisms to Protect Software Piracy
e-Mail Security
Pretty Good Privacy (PGP)
Privacy Enhanced Mail (PEM)
Secure/Multipurpose Internet Mail Extensions (S/MIME)
Spam E-mail and Anti-spam Software
IP Security (IPSec)
What is IPSec?
IPSec Functionality
IPSec Features
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
SSL Connection and Session
SSL Architecture
SSL Record Protocol
SSL Change Cipher Spec Protocol
SSL Alert Protocol
SSL Handshake Protocol
Transport Layer Security (TLS)
Secure Electronic Transaction (SET)
Parties Involved in an Electronic Transaction
An Electronic Transaction Process
Security Requirements of an Electronic Transaction Process
How SET Meets These Security Requirements?
Dual Signature Mechanism of SET
Management of Public Keys
Certification Authority (CA)
Public Key Infrastructure (PKI)
Steganography
What is Steganography?
Mechanism to Detect Steganographically-hidden Message
Guidelines for Secure Systems Design
Cyber Laws, Cyber Forensics, and CERT
Cyber Laws
Cyber Forensics
CERT
Points to Remember
Questions

CHAPTER 16: APPLICATION DOMAINS


Electronic Governance (E-governance)
What is E-governance?
Benefits of E-governance
Issues and Challenges in E-governance
E-governance Applications
Geo-informatics
Geo-informatics Applications
Medical Informatics
Medical Informatics Applications
Bioinformatics
What is Bioinformatics?
Branches of Bioinformatics
Points to Remember
Questions

GLOSSARY

INDEX

KNOW YOUR AUTHOR


LETTER TO READERS

Dear Reader,
A book that connects well with your thoughts and learning
process can be written undoubtedly by an author who
shares the same thoughts, understanding, and passion for
learning as yours.
Over three decades ago, I introduced my first book with a strong
conviction to the above statement. That commitment continues even
today. I am committed to writing quality books in Computer Science
and associated areas for my readers. To date, I have authored six
textbooks targeted towards this endeavor, and plan to author more
in future.
Wide popularity of my books clearly indicates the support that I have
received from my readers. I express my gratitude and regards to all
my readers for their support and feedback. Your support provides
greater strength and inspires me to work harder towards my
commitment. I look forward to your continued encouragement.
Yours truly,
Pradeep K. Sinha
January 2023
Preface

Audience
The current edition of Foundations of Computing is based on the
feedback from academia, industry, and candidates preparing for
entrance examinations.

Academia
Several academic institutions today offer degree/diploma/certificate
programs in Computer Science (CS),Computer Applications
(CA), Information Technology (IT), and other related areas.
Few examples of such programs are BE (CS), BE (IT), B.Tech (CS),
B.Tech (IT), MCA, MCS, MCM, M.Sc. (IT), BCA, BCS, B.Sc. (IT), DCA,
PGDCA, C-DAC's Pre-DAC and Diploma programs, and DOEACC
Certificate Courses.
The primary objective of these education programs is to impart
knowledge of the various topics in CS, CA, and IT to their students
to meet the industry's demand for IT professionals. Hence, these
programs include various foundation courses in CS, CA, and IT, such
as Computer Organization, Programming Fundamentals, Digital
Systems Design, Data Structures, Operating Systems, Software
Engineering, Computer Networks, and Information Security. Since
long time, both students and faculty members have wished for a
single comprehensive book that can provide a good coverage of the
essentials of these foundation courses in a consistent style.
Foundations of Computing is designed to meet this requirement of
academia.

Industry
Different IT professionals specialize in different areas. A few such
areas are System Analysis and Design, Application Programming,
System Programming, Data Science, Network Management, and
System Administration. A professional working in one such area
often needs the understanding of other areas for effective delivery of
his/her tasks. For example, a system administrator needs to refer to
topics in operating systems, networking, security, and computer
architecture to perform his/her job effectively. Similarly, an
application programmer needs to refer to topics in software
engineering, operating systems, security, networking, database
management, and computer architecture to develop good
applications. Often, IT professionals refer to the topics in other areas
for broadening their knowledge for their professional growth. This
requires them to refer to multiple books by different authors. Since
long time, they have desired to have a single book that covers all
these topics in sufficient depth. They expect the book to serve as a
good handbook (reference material) for various topics in CS, CA, and
IT to save them from the hassles of purchasing and referring to
multiple books. Foundations of Computing is designed to meet this
requirement of IT professionals.

Entrance Examination Candidates


To have a bright future in any profession today, one cannot ignore
having a sound foundation in IT, because IT is an integral part of all
types of professions. Hence, entrance examinations for admissions
to several educational institutions/programs and entrance tests for
many types of jobs (such as engineering, management, banking,
law, administrative services, journalism, etc.) test basic
understanding of computing concepts of the candidates. For a long
time, candidates preparing for such entrance tests and competitive
examinations have desired for a single book that they can use to
prepare for various topics in computing. Foundations of Computing is
designed to meet this requirement of candidates preparing for
various types of entrance examinations and tests.

Usages
Although, Foundations of Computing is suitable for a wide range of
readers, its four primary usages are as follows:

Textbook
Foundations of Computing is suitable for use as a textbook for the
various foundation courses taught in Master's, Bachelor's, Diploma,
and Certificate programs in Computer Science (CS), Computer
Applications (CA), and Information Technology (IT). Textbook style
of presentation of the topics covered in the book and the Lecture
Notes Presentation Slides included with the book make it suitable for
use as a textbook for such courses. Hence, we recommend its use as
a textbook for several foundation courses taught in CS, CA, and IT
programs.
Reference Book for Students
Where Foundations of Computing is not a prescribed textbook,
students will still find it useful to have it as a reference book. As the
book covers most of the important topics that students of CS, CA,
and IT programs learn during their education programs, they will
find it handy and useful as a reference book during the entire period.
The book will also serve as a good reference book after they
complete their education programs and enter into their professional
career. Hence, we recommend every student of CS, CA, and IT
programs to keep a copy of the book handy and refer to it whenever
required during and even after their education programs.
Reference Book for Professionals
As Foundations of Computing covers the important topics of IT
profession, IT professionals will find it a useful reference book for
addressing their needs. Hence, we recommend every IT professional
to keep a copy of the book and refer to it whenever required during
their professional career.
Preparation Book for Entrance Examination
Candidates
Candidates preparing for entrance examinations for admissions to
several educational institutions/programs and entrance tests for
many types of jobs will find the book handy and useful for preparing
for various topics of CS, CA, and IT. Such candidates will find the
book and its Lecture Notes Presentation Slides the most suitable
material for this purpose. Once they qualify in their desired
examination, they can use the book later as a good reference book
while pursuing their education programs or professional career.

Features

Overall Features
The layout, organization, and contents of the book are carefully
designed to present the various topics of foundation courses in CS,
CA, and IT in an interesting, logical, and informative manner. The
book does not concentrate on any particular computer system or
hardware. Instead, it discusses, in a general setting, the
organization, functions, programming, and usage principles
applicable to all types of computer systems.
All concepts presented in the book are illustrated with practical
examples whenever required. The book also contains numerous
diagrams for better illustration. These features enable the readers to
grasp the presented concepts easily and to use the book effectively
for self-study.
Each chapter contains a section on ‘Points to Remember’that
highlights the important points covered in the chapter.
Each chapter also contains a number of review questions that test
the understanding of the topics covered in the chapter.
The book contains a separate list of abbreviations used in the book,
and a glossary of important terms.
To make the contents interesting to read and easily understandable,
the style of presentation used throughout the book is motivational,
non-mathematical, and explanatory in nature.
The book contains a set of presentation slides for each chapter in
the form of Lecture Notes Presentation Slides. It can serve as lecture
aid, self-paced learning aid, and revision material.
All these features make the book ideal for all types of audience
mentioned earlier.

New Edition Features


Readers will find this edition of the book more useful than its
previous editions because:
We have added new topics and classifications to various
chapters, introducing the readers to the latest trends and
technologies in computing.
We have updated the contents to make it up-to-date.
We have updated the lecture notes presentation slides.
The size of the book is made more handy.
Statistical data indicates that with every new edition of the book, the
number of readers has soared much higher than its previous edition.
This is because every new edition incorporates the suggestions
received from the readers, making the book more suitable for a
larger audience. We expect this edition to have a similar impact.

Contents
The book begins with an introduction to computers. Chapter 1
explains the characteristics of this versatile tool, and its evolution
from its early days to different types and forms in which it is
available today.
Chapter 2 deals with the internal data representation in computers
and the manner in which computers perform various basic
operations (comparison, sorting, addition, subtraction, multiplication,
division, etc.) on these data. It begins with the fundamental
concepts of number systems and examples of popular number
systems that are commonly used by computer professionals. It then
presents the popular coding schemes, which computers use to
record data internally.
Chapter 3 deals with the design of digital systems. It begins with an
introduction to Boolean algebra. It then explains how Boolean
algebra, logic gates and flip-flops are used to design digital circuits.
It illustrates the design of digital circuits (both combinational and
sequential) with suitable examples.
Chapter 4 presents an overview of computer system architecture. It
first introduces the basic functional units of a computer system and
then deals with the architectures of processor and memory.
Subsequently, it presents interconnection architectures for
interconnecting the processors, memory, and I/O units. It also deals
with multiprocessor system architectures.
Chapter 5 presents the terminologies, principles of operation, uses,
and trade-offs of different types of secondary storage devices. It also
describes memory storage devices, mass storage devices, RAID
storage, storage interfaces, various options available for processor-
to-storage connectivity (DAS, SAN, and NAS), data backup, and
Hierarchical Storage System (HSS).
Chapter 6 presents the structure and functioning of various types of
I/O devices. It also describes the commonly used types of I/O
interfaces for connecting I/O devices to computer systems.
Chapter 7 introduces the concept of software and explains the need
for both hardware and software for a computer to do useful job. It
describes the various types of software, and the different ways to
acquire or develop software. It presents Software Development Life
Cycle (SDLC) phases, software design approaches (top-down,
bottom-up, and out-of-the-middle), software testing methodologies,
software deployment methods, software maintenance, software
documentation, and software engineering. It also introduces some
popular application software packages.
Chapter 8 deals with the tools that are commonly used for planning
the logic of computer programs. These include flowcharts, decision
tables, and pseudocodes. It also presents the various types of data
structures used in programming. These include array, linked list,
stack, queue, hash table, tree, binary search tree, graph, and heap.
Chapter 9 deals with the programming languages that are commonly
used for writing computer programs. It describes the various
program development tools such as compiler, linker, interpreter,
intermediate language compiler and interpreter, preprocessor, and
postprocessor. It then explains how to choose a programming
language for coding an application.
Chapter 10 presents the need, functionalities, and major
components of an operating system. It deals with the basic design
principles of major components of an operating system, including
process management, memory management, file management,
device management, and command interpretation modules. It also
introduces some popular operating systems (Unix, MS-DOS, MS-
Windows, Linux, MacOS, iOS, WatchOS, Android OS), and some
special types of operating systems (real-time, network, and
distributed operating systems).
Chapter 11 deals with database and data science. It explains the
difference between data and information, and the process of
converting data into information. It describes data storage hierarchy,
standard methods of organizing data, difference between File
Management Systems (FMS) and Database Management Systems
(DBMS), and types of database systems. It also presents the basic
concepts of data science and the stages involved in finding useful
patterns in data to help decision makers make meaningful decisions.
Finally, it introduces the concept of data warehousing and data
mining, and explains the difference between them.
Chapter 12 deals with data communication technologies and their
use in building various types of computer networks. It describes the
techniques, channels, and devices, which communication systems
use to communicate data from one location to another. It then
describes the various types of computer networks, communication
protocols, internetworking tools, wireless communication
technologies, and wireless networks. It also describes a few
paradigms of distributed computing systems, such as grid computing
and cloud computing.
Chapter 13 describes the Internet, its various uses, and tools and
technologies available to the Internet users for making effective use
of the resources on the Internet. It also describes the Internet of
Things (IoT), the new generation of the Internet.
Chapter 14 explains multimedia computing systems and their
applications. It deals with the hardware and software requirements
for processing various multimedia data types (text, graphics,
animation, audio, and video), data compression techniques, and
multimedia synchronization techniques. It also introduces media
center computer, which is a popular electronic equipment used in
homes.
Chapter 15 deals with the security requirements of computer
systems and the various policies and mechanisms, which computer
systems use to deal with them. It describes potential attacks to
computer systems (passive and active type attacks), cryptography
(symmetric and asymmetric cryptosystems), authentication
mechanisms (in stand alone and networked systems), access control
mechanisms, digital signature, firewall, software piracy protection, e-
mail security, IPSec., Secure Socket Layer (SSL), Transport Layer
Security (TLS), Secure Electronic Transaction (SET), Public Key
Infrastructure (PKI), and steganography. It also presents the
guidelines for designing secure systems, and introduces cyber laws,
cyber forensics, and CERT (Computer Emergency Response Team).
Chapter 16 deals with a few popular application domains including e-
governance, geoinformatics, medical informatics, and bioinformatics.
Acknowledgement
A book of this type naturally evolves from a number of ideas from
previous books dealing with the subject matter presented in this
book. The authors express their thanks to all these authors, too
numerous to acknowledge individually.
We are indebted to all the readers and other experts who have used
the earlier editions of this book and have provided valuable inputs
about its contents. Their inputs have helped in gradually improving
the quality of the book from one edition to another.
We are thankful to Mr. Gaur Sunder for providing valuable inputs on
technical contents of the book. His inputs have helped in improving
the book's quality.
We are thankful to Mr. Akash Mondal and Mr. Harshit Poddar for
designing the cover of this edition of the book, and to Mr. Rajeev
Rudrakshi for his help in improving the quality of the Lecture Notes
Presentation Slides.
We are thankful to Mrs. Sushma Pawar, Mrs. Prajakta Kulkarni, Mrs.
Arpita Kulkarni and Mr. Sandeep Kesavan for their support activities.
We are also thankful to Mr. Manish Jain and other members of BPB
Publications for their support and help in publishing the work.
Finally, we would like to thank our son, Deeptanshu, for his loving
support and understanding during the entire period of this long
project.
We dedicate the book to our parents whose sacrifices, love, and
affection made us capable of carrying out such work.
Pradeep K. Sinha
Priti Sinha
January 2023
About Lecture Notes
Presentation Slides
Foundations of Computing is widely adopted as a textbook for
various courses in Computer Science, Computer Applications,
Computer Engineering, Information Technology, and related areas by
many universities, colleges, and training institutions. Faculty
members and students have praised the book's contents and its
presentation style. They have also provided valuable feedback to
increase its usefulness.
Need for lecture notes in the form of presentation slides, is an
important feedback received from many faculty members. On the
other hand, several students have requested for a quick review
material based on the book's contents to enable them to quickly
recall the knowledge gained from the book just before an
examination or interview.
To address these requirements, we have thoughtfully prepared and
included lecture notes presentation slides with the book. It contains
chapter-wise Portable Document Format (PDF) files. Each chapter's
PDF file has presentation slides covering the main points of that
chapter.
The lecture notes presentation slides is not a substitute for the
textbook. They complement each other. Hence, real benefits can be
derived when the book and lecture notes presentation slides are
used as mentioned here.
We believe that the book and the lecture notes presentation slides
together form the best instructional package currently available to
faculty members for teaching the topics covered in the book.

Use by Faculty Members


Faculty members should prepare for their lectures using the book.
However, to save time in drawing diagrams and writing notes on the
board during a lecture, they can use the presentation slides of a
chapter being taught in one of the following manner:
1. If a projection system connected to a PC or laptop is available
in the classroom, they can display the corresponding
presentation slides on a board/screen while delivering the
lecture.
2. If a projection system is not available, they can take a hardcopy
printout of the presentation slides and photocopy them on OHP
sheets. They can then use an Overhead Projection (OHP)
system in classroom to display the corresponding slides while
delivering the lecture.
3. If neither a projection system, nor an OHP system is available
for use in classroom, they can print handout material containing
multiple presentation slides on a single page.

Use by Students
Students should primarily use the book for acquiring knowledge on
the topics covered. This is because the lecture notes presentation
slides cover only the main points and not full details and explanation
of the subject being dealt with. Hence, students can use the lecture
notes presentation slides to:
1. Browse through the main points of a chapter before going to
the class on the day that chapter is to be taught. This will
enable them to have better understanding of the topics being
taught in the class.
2. Review just before an examination or interview the main points
of the topics they have already learnt through the book.
Normally, students do not have sufficient time just before their
examination or interview to go through the contents of the
book.
How to Access the Lecture Notes Presentation
Slides
Follow the following steps to access the lecture notes presentation
slides:

1. Scan the QR Code with your smart device


2. Google Drive will open
3. Click on Shared With Me
4. You will see the Presentation Slides
5. You can either download them or save them to your Drive
Readers who do not have a smart device with the facility to scan the
QR Code can type the link https://rebrand.ly/0aa3e4 in their
browser and download the PDF file containing the presentation
slides on their laptop/desktop/mobile phone.
Abbreviations

1, 2, 3, 4, 5
1G First Generation
2G Second Generation
3D Three Dimensional
3G Third Generation
4G Fourth Generation
4GL Fourth Generation Language
5G Fifth Generation
5GL Fifth Generation Language

A
A Accumulator register
A/D Analog-to-Digital
ABC Atanasoff Berry Computer
ACL Access Control List
ACM Association for Computing Machinery
AHCI Advanced Host Controller Interface
AI Artificial Intelligence
AL Arbitrated Loop
ALGOL ALGOrithmic Language
ALU Arithmetic Logic Unit
AM Amplitude Modulation; Manufacturing
AMD Advanced Micro Devices
AMPS Advanced Mobile Phone System
ANSI American National Standards Institute
AOL America OnLine
APL A Programming Language
ARPANE Advanced Research Project Agency Network
T
AS Authentication Server
ASCII American Standard Code for Information Interchange
ASD Adaptive Software Development
ASP Agile Software Process
ATA Advanced Technology Attachment
ATM Automatic Teller Machine; Asynchronous Transfer Mode

B
B2B Business to Business
BARC Bhabha Atomic Research Centre
BASIC Beginners All-purpose Symbolic Instruction Code
BCD Binary Coded Decimal
BIOS Basic Input Output System
BIPS Billions of Instructions Per Second
B-ISDN Broadband ISDN
BLOBs Binary Large OBjects
BMP Basic Multilingual Plan
BNA Burroughs Network Architecture
BOT Beginning-Of-Tape
BPI Bytes Per Inch
BPS Bytes Per Second
BSD Berkeley Software Distribution
BSNL Bharat Sanchar Nigam Limited

C
C# C sharp
CA Certification Authority
CAD Computer Aided Design
CAE Computer Aided Engineering
CAM Computer Aided Manufacturing
CAN Campus Area Network
CASE Computer Aided Software Engineering
CAV Constant Angular Velocity
CBC Cipher Block Chaining
CBQ Content Based Querying
CBR Content Based Retrieval
CCITT Consultative Committee for International Telephony and
Telegraphy
CD Compact Disk
C-DAC Centre for Development of Advanced Computing
CDC Control Data Corporation
CDMA Code Division Multiple Access
CDPD Cellular Digital Packet Data
CD-R CD-Recordable
CD- Compact Disk Read Only Memory
ROM
CD-RW CD Read/Write
CERT Computer Emergency Response Team
CGA Color Graphics Adapter
CGI Common Gateway Interface
CHS Cylinder Head Sector
CISC Complex Instruction Set Computer
CL Command Language
CLI Common Language Infrastructure; Command Line
Interface
CLR Common Language Runtime
CLV Constant Linear Velocity
CNC Computer Numeric Control
COBOL COmmon Business Oriented Language
CODAS Conference On DAta SYstems Languages
YL
COM Computer Output Microfilm; Component Object Model
CORBA Common Object Request Broker Architecture
Another Random Scribd Document
with Unrelated Content
The Project Gutenberg eBook of
London in the Time of the Stuarts
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

Title: London in the Time of the Stuarts

Author: Walter Besant

Release date: June 19, 2019 [eBook #59782]

Language: English

Credits: Produced by Chris Curnow, Robert Tonsing, and the


Online
Distributed Proofreading Team at http://www.pgdp.net
(This
file was produced from images generously made
available
by The Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK LONDON IN THE


TIME OF THE STUARTS ***
The cover image was created by the transcriber from a scan of the
original book cover and is placed in the public domain.

M. Morelli.

CHARLES I (1600–1649)
From the painting by van Dyck in the National Gallery, London.
LONDON
IN THE TIME OF THE STUARTS

BY

S I R WA LT E R B E SA N T

LONDON

A D A M & C H A R L E S B LA C K
1903
PREFACE
Abundant as is the mass of material for the study of history and
manners in the sixteenth century,[1] there is even a greater
abundance for the history, political and social, of the century of the
Stuarts. There are, however, two difficulties to be faced in such an
inquiry. The first is that the history of London is far more closely
connected with the history of the nation during the seventeenth than
during the sixteenth century. It may, indeed, be advanced that at no
time, not even when London deposed Richard II. and set up Henry
IV., was the City so closely involved in all the events of the time as in
the seventeenth century. The City at that time reached the highest
point of its political importance, an importance which vanished in the
century that followed.
Therefore the historian of London has before him the broad fact
that for sixty years, viz. from the accession of Charles I. to the
expulsion of James II., he should be pursuing the history of the
country. In this place, however, there is not space for such a history;
it has already been well told by many historians; and I have neither
the time nor the competence to write the history of this most
eventful period. I have therefore found it necessary to assume a
certain knowledge of events and to speak of their sequence with
reference especially to the attitude of the City; the forces which
acted on the people; their ideas; their resolution and tenacity under
Charles I.; their servility and obedience under Charles II.; and their
final rejection of the doctrines of passive resistance, Divine right,
and obedience which made the departure of James possible, and
opened the door for constitutional government and the liberties of
the people.
The second difficulty is, that while the century contains an
immense mass of material in the shape of plays, poems, fiction,
pamphlets, sermons, travels, sketches, biographies, trials, reports,
proclamations, ordinances, speeches, and every other conceivable
document for the restoration of the century, the period was sharply
divided into two by the Civil Wars and the Protectorate, the latter
being at best a stop-gap, while events were following each other
and the mind of the nation was developing. It was, in fact, a
revolutionary change which took place. The change was deepened
by the Great Fire of 1666, after which a new London arose, not so
picturesque, perhaps, as the former London, but reflecting the ideas
of the time in its churches, which, from Mass houses became
preaching rooms; and in its houses, which offered substantial
comfort, more light, loftier rooms, standing in wider and better
ordered streets, agreeing with the increase of wealth and the
improvement in the general conditions of life. The first half of the
century is, in fact, a continuation of the Elizabethan period with
decay in literature and development in religion; the second half
belongs to the eighteenth century, where we find a development of
the last forty years of the seventeenth.
I have endeavoured to meet this difficulty by making such a
selection from the things belonging to the daily life as have not been
dwelt upon in the study of the sixteenth century with those points
which, while they were developed or dropped in the eighteenth,
have not been in that volume considered at length.
The events of the greatest importance to the City, apart from
those which belong to the whole nation, were the repeated
visitations of Plague, and the Great Fire. The former came and went;
it destroyed the people, chiefly the common people, by thousands;
its immediate effect was a dearth of craftsmen and servants, a rise
in wages, and an improvement in the standard of life in the lower
levels. The lessons which it taught and continually enforced were
learned most imperfectly. They were simple—the admission into the
courts and lanes of the crowded City of light and air; the invention of
some system of sanitation which would replace the old cesspool and
the public latrine; and the introduction of a plentiful supply of water
for the washing of the people, as well as for their drink and for the
flooding of the streets. Somewhere or other—it must be between
Dowgate and Mincing Lane—there is still existing under ground the
great Roman Cloaca; it is an additional proof of the desertion and
desolation of the City after the Romans went away that the Cloaca
was forgotten, choked up, and its mouth covered over; the creation
of the foreshore covered it up. Had it been found, say, in the
thirteenth or fourteenth century, the whole modern sanitary system
might have been invented and developed by its means, and so the
Plague would have been stayed. I have attempted to present an
adequate account of the Plague from contemporary evidence. As
regards the Fire I have essayed a restoration of the City before and
after that event.
Turning to events political, I have already stated the difficulties
which confront the historian of London in this century. The reader
will not look here for a detailed history of the Civil War or the
Protectorate. I hope, however, that he will find some indication of
the way in which the people of London regarded the events which
were working out their redemption for them, in ways which were
unexpected, by trials which were hard to bear, and after a time
when all seemed lost.
Considering London alone, the Restoration seems to me to have
been a natural, a wholesome, and a most fortunate reaction against
the successive rule of Presbyterian, Independent, and Captain or
Colonel. It must have become quite clear even to men like Milton,
who was one of the last to lift his voice against the return of a king,
that a Commonwealth was too far in advance of the people, and that
a military despotism was intolerable.
In the same way the Revolution was a swing back of the
pendulum; it was quite as natural and as salutary as the rebellion
against Charles and the Restoration of his son. I read this lesson
clearly in the history of London, and I assume it for the history of
the country.
Meantime let it be remembered that the seventeenth century
secured the country for two hundred years, i.e. to the present day at
least, and, so far as can be prophesied, for an indefinite period yet
to come, from the personal interference of the sovereign. That is an
enormous gain to the country. We are no longer called upon to
discuss the Prerogative. The attempted encroachments of George
III. appear as mere trifles compared with the monstrous claims of
Charles the First and the almost incredible acts of tyranny recorded
of his son and successor. And in the achievement of this great result
London in the seventeenth century played a noble part and earned
the deepest gratitude of all those who came, or shall come, after.
WALTER BESANT.
CONTENTS
STUART SOVEREIGNS
PAG
CHAP. E
1. James I. 3
2. Charles I. 22
3. The City and the Civil War 53
4. The Commonwealth 64
5. The Restoration 74
6. The Reign 82
7. James II. 103
8. William III. 117
9. Queen Anne 127

RELIGION, GOVERNMENT, AND TRADE


1. Religion 137
2. The Church and Dissent 154
3. Superstitions 159
4. Sanctuary 168
5. City Government and Usages 172
6. Trade 190
7. Irish Estates 206

THE GREAT PLAGUE AND FIRE


1. The Plague 215
2. Plague and Medicine 233
3. Aspect of the City before the Fire 240
4. The Fire of London 244
5. Contemporary Evidence 258
6. London after the Fire 269

MANNERS AND CUSTOMS


1. Food and Drink 287
2. Dress and Manners 298
3. Weddings and Funerals 308
4. Places of Resort 311
5. Theatre and Art 318
6. Sports and Amusements 328
7. Coaches 338
8. Punishment and Crime 345
9. Public Morality 355
10. General Notes 359

APPENDICES
1. The Court 365
2. List of London Clergy ejected 371
3. Almshouses 374
4. Composition of the Lords and Commons 376
5. Enlargement of the Streets 377
6. The New Buildings of London 380
7. Gardens 383

INDEX 387

KEY TO OGILBY AND MORGAN’S MAP OF LONDON,


1677 397
ILLUSTRATIONS
PAGE
Charles I. Frontispiece
James I. 3
Triumphal Arch erected at the time of the
Coronation of James I. 4
The Gunpowder Conspirators 7
Gunpowder Treason 8
King James I. Entertaining the Spanish
Ambassador at Whitehall 10
Henry, Prince of Wales 11
A Facsimile of the Order for the Burning of the
Book of Sports 14
The Destruction of Cheapside Cross and the
Burning of the Book of Sports 16
Charles I. 22
Cheapside—Queen Henrietta Maria’s Entry into
London 23
Henrietta Maria 26
George Villiers, First Duke (Second Creation) of
Buckingham 30
King Charles I. Thrown Overboard 36
“England’s Miraculous Preservation Emblematically
Described” 38
“The True Maner of the Execution of Thomas Earle
of Strafford” 39
Thomas Wentworth, First Earl of Strafford 40
A Plan of London and Westminster after the Fire 41
A Soldier of the Time of King James the First
armed with a Caliver 45
The Trial of King Charles I. Facing page 46
Sir Thomas Fairfax and his Wife 48
Trial of King Charles I. 49
Execution of Charles I. 51
Prince Rupert 60
Cromwell Dissolving Parliament 65
Hackney Coachman 66
Oliver Cromwell 67
General Monk, First Duke of Albemarle 69
View of General Monk’s House in Grub Street 70
Letter from General Monk to the Speaker of
Parliament (facsimile) 71
Mob at Temple Bar 74
The Coronation of Charles II. in Westminster
Abbey Facing page 76
Charles II. 77
Incidents in the Rebellion of the Fifth Monarchy
Men under Thomas Venner, and the Execution
of their Leaders 79
Hungerford Market, near York Buildings, Strand Facing page 88
“The Solemn Mock Procession of the Pope,
Cardinalls, Jesuits, Fryers, etc., through ye
City of London” 90
Lord Mayor and Aldermen 93
Nell Gwynne 101
The Coronation of James II. in Westminster Abbey Facing page 102
Titus Oates Flogged at the Cart Tail 103
Titus Oates in the Pillory 104
Duke of Monmouth 105
The Execution of Monmouth 106
James II. 109
The Seven Bishops on the Way to the Tower 111
Parliament in the reign of James II. 112
Judge Jeffreys 113
The Arrest of Jeffreys 115
Entry of the Prince of Orange into London Facing page 116
William III. 119
Mary II. 120
London Street Cries 123
Queen Anne 127
Thanksgiving Service in St. Paul’s 129
Henry Sacheverell, D.D. 132
St. Paul’s Cross 138
William Laud, Archbishop of Canterbury 140
A Trimmer 142
Execution of William Laud, Archbishop of
Canterbury 143
John Bunyan’s Meeting-house, Zoar-street, Gravel-
lane, Southwark 154
Touching for King’s Evil 165
St. Bartholomew’s 170
Warwick House, Cloth Fair 173
Craven House, Drury Lane 174
Arundel House 175
Cornhill, London 180
Watchman—Bellman 181
The Apprentices’ Enforced Toilet Facing page 188
Custom House 191
“The Soveraigne of the Seas” 192
The First Royal Exchange—Exterior and Interior Facing page 196
Coins of the Period Facing page 200
Old Grocers’ Hall used for Bank of England 201
A Perspective View of the Bank of England 203
Paul Pindar’s House Facing page 211
Lord Craven 219
Rescued from the Plague Facing page 220
Samuel Pepys 221
Daniel Defoe 224
Part of Cheapside with the Cross, etc., as they
Appeared in 1660 241
The Great Fire of London 245
The Cathedral Church of St. Paul as it was before
ye Fire of London 247
A View of the Monument of London, in
Remembrance of the Dreadful Fire in 1666 249
A Plan of the City and Liberties of London after Between pages
the Dreadful Conflagration in the Year 1666 252 and 253
Sir Christopher Wren 254
Sir John Evelyn’s Plan for Rebuilding the City of
London after the Great Fire in 1666 255
Sir Christopher Wren’s Plan for Rebuilding the City
of London after the Dreadful Conflagration in
1666 255
John Evelyn 259
The Great Fire of London Facing page 260
Temple Bar, the West side 263
Between pages
London after the Fire
268 and 269
Somerset Palace, 1650 270
Durham House, Salisbury House, and Worcester
House 271
The Charter House Hospital 273
Newgate, 1650 277
Remains of Prince Rupert’s Palace, Beech Street 279
St. Ethelburga within Bishopsgate 281
Specimen of Armorial Architecture 282
House in Great St. Helen’s formerly the Residence
of Sir Jno. Lawrance, Lord Mayor of London
A.D. 1665 288
Tavern Scene 292
Two Costume Portraits 298
An English Lady of Quality—Lady of the Court of
England 300
Citizen’s Wife—Citizen’s Daughter 301
English Gentlewoman—Noble Gentlewoman of
England 303
Maypole Dance in the Time of Charles I. 305
Merchant’s Daughter—Merchant’s Wife of London 306
Procession in the City 306
“Corpe Bearer” 309
St. James’s Park 313
Interior of St. Paul’s 316
Inside of the Duke’s Theatre, Lincoln’s Inn Fields 320
Inside of the Red Bull Playhouse 322
Musical Instruments of the Period Facing page 326
Sports of the Period Facing page 328
Dress of the Lord Mayor and Lady Mayoress of
London in 1640 333
Coaches in St. James’s Park 339
SOVEREIGNS
C HAPTER I
JAMES I

James found the City, after a hundred years of Tudor rule, reduced to
an admirable condition of submission and loyalty. He was proclaimed
in the City and by the City, the citizens of London claiming once
more a voice in electing an accessor to the crown. The King returned
thanks to the Mayor and Aldermen in a letter which lacks, one
perceives at once, the royal style of Elizabeth.

JAMES I. (1566–1625)
After the portrait by Paul von Somer.

Trustie and Wel-beloved, wee greet you hartily well: being


informed of your great forwardnesse in that just and honourable
action of proclaiming us your sovereigne Lord and King,
immediately after the decease of our late dearest Sister, the
Queen; wherein you have given a singular good proofe of your
ancient fidelitie (a reputation hereditary to that our Citie of
London), being the chamber of our imperial crowne, and ever
free from all shadowes of tumultes, and unlawful courses; we
could not omit, with all the speed possible we might, to give you
hereby a taste of our thankful Mind for the same: and with all
assurance, that you cannot crave anything of us fit for the
Maintenance of you all in general, and every one of you in
particular, but it shall be most willingly performed by us, whose
speciall care shall ever be to provide for the continuance and
increase of your present happines, desiring you in the mean
time to go constantly forward in all doing, in and whatsoever
things you shall find necessary and expedient for the good
Government of our sayde city, in execution of justice, as you
have been used to doe in our sayde deceased Sister’s tyme, till
our pleasure be known to you in the contrary. Thus not
doubting but you will doe, as you may be fully assured of our
gratious favours towards you, in the first degree, we bid you
hartily farewell. Haly Roodhouse, the 28th of March, 1603.
TRIUMPHAL ARCH ERECTED AT THE TIME OF THE CORONATION OF
JAMES I.
From a contemporary print. E. Gardner’s collection.

James left Edinburgh on the 5th of April, arriving at Theobalds,


where he rested for four days, on May the 7th; it had taken more
than a month to ride from Edinburgh, i.e. he had ridden about
twelve miles a day. At Waltham he was met by one of the sheriffs
with sixty servants; at Stamford Hill by the Mayor and Aldermen in
velvet and gold chains and 500 citizens richly apparelled. At that
moment the Plague broke out; the Coronation was shorn of its
splendour; the pageants and shows were laid aside; only the Mayor,
Aldermen, and twelve citizens were present in Westminster Abbey;
and James had to postpone his public entry into the City for a
twelvemonth.
With the accession of James revived the hopes of the Catholics;
they built upon the inexperience and the ignorance of the King;
perhaps upon his fears; they magnified their own strength and
numbers; and they quite misunderstood the feeling of the country,
which grew more and more in distrust and hatred of the Catholics.
They began, moreover, just as they had done in the reign of
Elizabeth, by plots and conspiracies. The first of these plots was that
called the “Main,” in which Raleigh, unfortunately for himself and his
own reputation, was concerned. With him was Lord Cobham. As to
Raleigh’s guilt, this is not the place to inquire. As is well known, after
twelve years he was suffered to come out of the Tower, and was
allowed to command a fleet bound for the coast of South America in
quest of gold-mines. The story of his voyage, of his ill success, of his
son’s death, of his return, of his arrest, may be read in the history of
England. But the tragedy of October 29, 1618, when at eight o’clock
in the morning Sir Walter Raleigh was led out to die, moved to the
depths every English heart, and should not be passed over in any
history of London. It was remembered by all that he was the lifelong
enemy of Spain, nor could the attacking of a friendly power in time
of peace appear as any other than a laudable act to the English
mind. That the traitor who arrested and betrayed him, his kinsman
who became a paid spy, who also took money from the very man he
was watching, that this man, Sir Lewis Stukeley, afterwards fell into
misery and madness appeared to everybody an open and visible
punishment inflicted by God Himself.
Let us consider the meaning of the fines which play so large a part
in the history of these times. If a man is a Roman Catholic he is on
no account allowed to attend a church or assembly where any kind
of service other than the Catholic is performed. That rule is never, I
believe, relaxed under any circumstances. It is a rule, therefore,
which can be easily used for the discovery of Catholics. Thus (23
Elizabeth) it was enacted that every person over sixteen years of age
who should refrain from attending at church, chapel, or some usual
place of common prayer, against the tenor of a certain statute of the
first year of her Majesty’s reign, for uniformity of common prayer,
and should be lawfully convicted thereof, should forfeit, for each
month in which he or she should so refrain, the sum of twenty
pounds of lawful money. The convictions under this statute illustrate
to some extent the proportion of Roman Catholics to Protestants
then existing in the country. Thus in the Middlesex Session Rolls
(Middlesex County Record Society) may be found a long list of
persons brought before the Middlesex magistrates charged with this
offence. During the last twenty-four years of Queen Elizabeth’s reign
there were 408 convictions of this offence in Middlesex alone. They
were gentlemen and gentlewomen, clerks, yeomen, tradesmen,
wives, widows, and spinsters. They came from many parts of
Middlesex, but especially from Westminster, Clerkenwell, Tottenham,
Stepney, and Holborn. A fine of twenty pounds a month—about £100
of our money—would be far beyond the means of most of the
persons convicted. For instance, on one page of the Rolls there are
the names of twenty-six persons all convicted of not going to church
for two or three months. Of these, twelve are gentlemen, three are
wives of gentlemen, five are yeomen, one is a spinster, four are
clerks, and one is a cook. What happened when the fine could not
be paid? The number of convictions proves, first, that there were
some, but not, in proportion to the whole, many Roman Catholics
left in London and the parts around; next, that they were easily
detected by their absence from church; thirdly, that there was a hot
search after them; and fourthly, that though we find, here and there,
a person following a trade or a craft, the Catholics were for the most
part gentlefolk.
The secret professors of the ancient faith knew of places where a
priest was concealed, and where Mass was sung or whispered with
closed doors. There were five or six of these priests tried and
condemned before the Middlesex magistrates. Thus John Welden in
March 1587, William Hartley in 1588, Robert Walkinson in 1598 were
tried and found guilty simply for being priests, i.e. because, “being
subjects of the Queen, they were ordained by authority derived from
the See of Rome, in contempt of the Crown and Dignity of the said
Queen.” They were executed as traitors with the cruelties of detail
which we know. Other persons were charged with receiving,
comforting, and maintaining priests. Thus George Glover and Mary
Baylie his wife maintained and comforted Thomas Tycheburne, clerk
and priest, and they received the pardon of the Queen; Catharine
Bellamy, wife of Richard Bellamy, gentleman, moved and seduced by
instigation of the devil, received and entertained Robert Southwell—
it does not appear whether she was punished for the offence; and
Dorothea White, either sister or wife of Humphrey White of
Westminster, gentleman, thus received and entertained William
Tedder, priest. Dorothea was hanged—one supposes—because she
did not make submission.
If we inquire into the comparative importance of the recusants, it
seems that it must have been too small to constitute a real danger.
The number, 408, convicted in a quarter of a century over the whole
of Middlesex—London not included—that is, no more than an
average of sixteen in a year, at a time when the search after them
was keen and untiring—hardly warrants the fears which were
entertained by the Queen’s Council as to the power and numbers of
the secret Catholics, or the hopes of support from the south which
were entertained during the rising of the north; or the expectations
at Rome and at the Court of Spain of a widespread insurrection all
over England and a return to the ancient faith. At the same time it is
reasonable to believe that there were many thousands who, while
they adhered outwardly, went to church and heard the sermon,
would have welcomed the return of the Mass and the Romish form.
THE GUNPOWDER CONSPIRATORS
From title-page of Warhafftige Beschreibung der Verrätherei, etc. (De
Bry), Frankfurt, 1606.

Action in the case of the recusants was followed by the famous


Gunpowder Plot. There can be no doubt that the Catholics were
maddened by disappointment, by persecution, by the failure to
obtain toleration, and by the fines to which they were subjected. The
conspirators proposed, as is well known, to blow up the King, the
Lords, and the Commons when the Parliament should assemble. This
plot, like that of Raleigh, belongs to the history of the country.
Gunpowder Treason.
From a contemporary print. E. Gardner’s collection.

When the Common Council established a Court of Conscience in


the City, it was with the design of saving poor debtors from the costs
of being sued in the superior courts. But this Court was confined to
debtors who were Citizens and Freemen of London and the Liberties.
Some persons, intending to subvert the good and charitable intent of
the Court, took hold of certain ambiguous words and endeavoured
by means of these to render the intentions of the Court useless. A
new and amending Act was passed which cleared up these
difficulties and put the Court of Conscience on a sounder footing.
The Act was well meant, but for more than two hundred years after
it the miserable annals of the Debtors’ Prisons are filled with stories
of the exorbitant and extortionate costs charged by attornies, and
with the sufferings of the debtors in consequence.
The honour in which the City was held was illustrated when the
King joined the Clothworkers’ Company, and when the Merchant
Taylors, in jealousy, showed him their roll of members containing
seven kings, one queen, seventeen princes and dukes, two
duchesses, one archbishop, thirty earls, five countesses, one
viscount, fourteen bishops, sixty-six barons, two ladies, seven
abbots, seven priors, and an immense number of knights and
esquires. The King gave them his son Henry as a member.
The New River was completed after eight years of work. The
length of the canal was 60 miles; it was crossed by 800 bridges, and
five years were spent in the construction; the people were slow in
taking their water from the new supply, probably because they
detested changing their ways. The City was at first supplied with
water from the Walbrook and the Fleet; there were also wells and
springs on the rising ground of the Strand; in Moorfields, at
Shoreditch, and elsewhere there were wells sunk within the City
walls; and there were “bosses” or taps of fresh water brought in
from Tyburn. All this, however, was not enough; the principal
sources of supply, the Fleet and Walbrook, had long since ceased to
be of any use. Powers therefore were sought to bring more water
into the City, and were granted to bring water from Hampstead and
from the river Lea; these powers were not, however, used. Improved
works were set up at Tyburn; water mills were placed in the
Thames, by which water was forced up and conveyed as far as
Leadenhall. Finally, after a great deal of hesitation the City made use
of these powers to construct a canal from springs at Chadwell and
Amwell in Herts, and accepted the office of Hugh Middleton, a
goldsmith, to execute the work. Middleton would have failed,
however, but for the help of James, who agreed to pay half the cost
of the work if Middleton gave him half the property. This was done in
an assignment of thirty-six “King’s shares.” Charles parted with them
for an annuity of £500. A few years ago an undivided share sold for
£94,900. Yet Middleton died in reduced circumstances, unable to pay
a loan which the City had advanced him on the progress of his work.
The flight of the Earls of Tyrone and Tyrconnel in 1607 left without
an owner a large tract of land in the north of Ireland which was
confiscated to the Crown. It was proposed to colonise the district,
and a scheme was drawn up for the “Plantation of Ulster.” The King
proposed that the City should take part in this work; the citizens
were assured that their own City was dangerously overcrowded with
workmen and traders of all kinds, that the plantation would be an
outlet much wanted, that the country was well watered and fertile,
good for breeding cattle, well stocked with game and with fisheries;
they were even told to consider how great a work had been done by
the people of Bristol in settling Dublin. A fuller account of the Irish
Estates will be found later on (p. 206).
The conduct of a State Banquet at the Court of King James is
minutely related in the following account of the Banquet presented
to the Spanish Ambassador by the King.

KING JAMES I. ENTERTAINING THE SPANISH AMBASSADOR AT


WHITEHALL, 1623
From a contemporary print. E. Gardner’s Collection.
“The Audience Chamber was elegantly furnished, having a
buffet of several stages, filled with various pieces of ancient and
modern gilt plate of exquisite workmanship. A railing was placed
on each side the room in order to prevent the crowd from
approaching too near the table. At the right hand upon entering
was another buffet, containing rich vessels of gold, agate, and
other precious stones. The table might be about five yards in
length, and more than one yard broad. The dishes were brought
in by gentlemen and servants of the King, who were
accompanied by the Lord Chamberlain, and before placing them
on the table they made four or five obeisances. The Earls of
Pembroke and Southampton officiated as gentlemen-ushers.
Their Majesties, with the Prince Henry, entered after the
Constable and the others, and placed themselves at their
throne, and all stood in a line to hear the grace said; the
Constable being at the King’s side, and the Count de
Villamediana on the Queen’s. Their Majesties washed their
hands in the same basin, the Lord Treasurer handing the towel
to the King, and the High Admiral to the Queen. The Prince
washed in another basin, in which water was also taken to the
Constable, who was waited upon by the same gentlemen. They
took their seats in the following manner: their Majesties sat at
the head of the table, at a distance from each other, under the
canopy of state, the Queen being on the right hand, on chairs of
brocade with cushions; and at her side, a little apart, sat the
Constable, on a tabouret of brocade with a high cushion of the
same, and on the side of the King the Prince was seated in like
manner. On the opposite side of the table and on the right sat
Count Villamediana, and next to him the Senator Rovida
opposite the Constable; and on the same side with the senator,
nearly fronting the Prince, were seated the President Richardot
and the Audiencier, a space in front being left vacant owing to
the absence of the Count d’Arembergue, who was prevented by
the gout from attending. The principal noblemen of the kingdom
were likewise at the table, in particular the Duke of Lennox; the
Earl of Arundel; the Earl of Suffolke, Lord Chamberlain; the Earl
of Dorset, Lord Treasurer; the Earl of Nottingham, High Admiral;
the Earls of Devonshire, of Southampton, and of Pembroke; the
Earl of Northumberland; the Earl of Worcester, Master of the
Horse; the Earls of Shrewsbury, of Sussex, of Derby, and of
Essex, and the Lord Chancellor—all being Knights of the Garter;
also Barons Cecil and Wotton and the Lord Kinross, a privy
councillor; Sir Thomas Erskine, Captain of the Guard; Sir John
Ramsay and James Lindsay, Scotchmen; and other barons and
gentlemen of quality. There was plenty of instrumental music
and the banquet was sumptuous and profuse. The first thing
the King did was to send the Constable a melon and half-a-
dozen oranges on a very green branch, telling him that they
were the fruit of Spain transplanted into England; to which the
latter, kissing his hand, replied that he valued the gift more as
coming from his Majesty than as being the fruit of his own
country; he then divided the melon with their Majesties, and
Don Blasco de Aragon handed the plate to the Queen, who
politely and graciously acknowledged the attention. Soon
afterwards the King stood up, and with his head uncovered
drank to the Constable the health of their Spanish Majesties,
and may the peace be happy and perpetual. The Constable
pledged him in like manner, and replied that he entertained the
same hope and that from the peace the greatest advantages
might result to both crowns and to Christendom. The toast was
then drunk by the Count Villamediana and the others present,
to the delight and applause of their Majesties. Immediately
afterwards, the Constable, seeing that another opportunity
might not be afforded him, rose and drank to the King the
health of the Queen from the lid of a cup of agate of
extraordinary beauty and richness, set with diamonds and
rubies, praying his Majesty would condescend to drink the toast
from the cup, which he did accordingly, and ordered it to be
passed round to the Prince and the others; and the Constable
directed that the cup should remain in his Majesty’s buffet. At
this period the people shouted out, ‘Peace, peace, peace! God
save the King! God save the King! God save the King!’ and a

You might also like