Vous êtes sur la page 1sur 32

INTRODUCTION TO COMPUTERS

What is a computer?

The word computer comes from the word compute which means calculate.
Thereby, a computer is an electronic device that can perform arithmetic operations at high
speed.
A computer is also called a data processor because it can store, process and retrieve data
whenever desired.

Characteristics of computers

1. Automatic given a job, the computers can work automatically without human interventions.

Speed computers can perform data processing, jobs very fast, usually
measured in Microseconds (10^-6), nano seconds (10^-9), pico seconds (10^12).

Accuracy accuracy of a computer is consistently high and the degree of its accuracy depends
upon its design. Computers errors caused due to incorrect input data or unreliable problems are
often referred to as gigo.
Diligence computer is free from monotony, tiredness and lack of concentration. It can
continuously work for hours without creating error and without grumbling.
Versatility- computer is capable of performing almost any task, if the task can be reduced to a
finite series of logical steps.
Power of remembering computer can store and recall any amount of information because of
its secondary storage capability. It forgets or loses certain information only when it is asked to
do so.
No i.q. - a computer does only what it is programmed to do. It cannot take its own decision in
this regard.
No feelings- computers are devoid of emotions. Their judgment is based on the instructions
given to them in the form of programs written by us.

Computer parts
There are many parts that work together to make a computer work.

Hardware - physical parts of the computer, including processor and memory chips, input/output
devices, tapes, disks, modems, cable, etc.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)


The Central Processing Unit - the chip or chips that interpret and execute program instructions
and manage the functions of input, output, and storage devices.

Computer case - contains the major components of the computer. It helps protect them.

Monitor-A display screen to provide output to the user. It is where you view the information
you are working on.

Keyboard - Used to enter information into the computer and for giving commands.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Mouse - An input device operated by rolling its ball across a flat surface. The mouse is used to
control the on-screen pointer by pointing and clicking, double-clicking, or dragging objects on
the screen.

Touchpad - A pressure-sensitive and motion sensitive device used in place of a mouse.


CD ROM drive -The drive that plays CDs and reads data that has been stored on the cd.

CD - Compact disk a type of optical storage device.

Floppy disk drive - A device that holds a removable floppy disk when in use; read/write heads
read and write data to the diskette.

Hard disk - Magnetic storage device in the computer.

Ram -Random access memory - Ram is a computers temporary memory, which exists as chips
on the motherboard near the CPU. It stores data or programs while they are being used and
requires power.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Printer - An output device that produces a hard copy on paper. It gives information to the user
in printed form.

Barcode reader - An input device that converts a pattern of printed bars into a number that a
computer can read. They are often used by businesses to quickly input price and product
information.

Scanner - A device that allows pictures to be placed into a computer.

Microphone - Allows the user to record sounds as input to their computer.

Speakers - Used to generate or reproduce voice, music, and other sounds.

Sound card - Connects the speakers and Microphone to the computer.


Modem - The place where the computer is connected to the phone line.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Network card - A circuit board that connects the computer to the rest of the network usually
using special cables.
Software - Programs that tell the computer what to do. It provides instructions that the CPU
will need to carry out.
DOS - Disk operating system - This software connects the hardware with the programs you
want to run.
MS-DOS:
Microsoft dos (disk operating system) is a command line user interface. Ms-dos
1.0 was released in 1981 for IBM computers.

Windows - A family of operating systems developed and produced by Microsoft corp. It


provides a software graphical user interface (GUI) used on IBM and compatible computers.
The CPU and RAM

Features of a CPU
1. Cache Memory
2. Clock speed: This is the speed at which the processor executes the instructions. If the clock
speed is higher, the processing speed also will be higher and such computers are faster and
efficient. Clock speed is measured in Megahertz (MHz), which means the number (in millions)
of instructions executed per second. For instance, if the clock speed is 450 MHz, it means it
can execute 450 million instructions per second. Higher the clock speed, better the
performance.
3. MMX (Multimedia Extensions): MMX is the set of instructions built onto the CPU specifically
for improving the multimedia capabilities or graphic applications. In multimedia kits, all the

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

audio and video facilities are available for which within the CPU multimedia features must
exist.
4. Micro processors:
It is a small processor that embodies all elements of its cousins in larger mainframe
computers: register, ALU, control unit, cache memory and so on.
These are usually manufactured by computer manufacturers such as Intel, Motorola
and so on that specialize in the manufacture of microprocessors.
There are many classes of microprocessors that are used in personal computers. They
are 8 bit, 16 bit, 32bit, 64 bit and so on. Normally, the machine of 8 bits processes 1
byte at a time and so on. If the bit pattern increases, the speed of the processor also
increases.
The electric path or line through which the data is transmitted within the computer is
called BUS.
The PC transfers the data to its input, output devices through ports that are connected
to the buses.

A port is a hardware device that allows a series of bits to be transferred to a bus from
any input device or to any output device.
Many microprocessors are quite powerful and used in scientific computers also.
Microprocessors have undergone a lot of change over the years.
5. Density:
Density refers to the number of transistors available within the CPU.
Density of the processor is very important for data processing. Millions of transistors
make up the CPU. All calculations are performed by synchronizing the transistors. If
the distance is more between two transistors, time take to process the data will also
be more.

Likewise, if the distance between two transistors is less, time taken to process the
data is less.
6. Slot: Different computers use different sockets or slots for the motherboard to fit along with
the processor. Based on the types of processors, there are two main types of slots for
connecting to the motherboard. They are socket 7 and slot 1,
7. Complementary Metal-oxide Semiconductor - The CMOS and CMOS battery allow a
computer to store information even when the computer powers down. The battery
provides uninterrupted power.
8. BIOS: BIOS stands for Basic Input Output System, a small chip on the motherboard that loads
the hardware settings required to load various devices like keyboards, monitors or disk drives.
Most new PCs come with flash BIOS- these BIOS can be software upgraded to support new
devices.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

9.

SIMM/ DIMM: SIMMs (single in-line memory modules) as a random access memory.
A dual in-line memory module (DIMM) comprises a series of random access memory
integrated
circuits.
These are used in the Computers as a random access memory. These began to replace SIMMs
as the predominant type of memory module as Intel's Pentium processors began to control
the market. The main difference between SIMMs and DIMMs is that SIMMs has a 32-bit data
path, while DIMMs have a 64-bit data path.

10. PCI slots: Stands for "Peripheral Component Interconnect." It is a hardware bus designed by
Intel and used in both PCs and Macs. Most add-on cards such as SCSI, Firewire, and USB
controllers use a PCI connection. Some graphics cards use PCI, but most new graphics cards
connect to the AGP slot. PCI slots are found in the back of your computer and are about 3.5"
long and about 0.5" high. So before you go buy that Firewire expansion card, make sure you
have at least one PCI slot available.
11. AGP slots: The Accelerated Graphics Port (often shortened to AGP) is a high-speed point-topoint channel for attaching a video card to a computer's motherboard, primarily to assist in
the acceleration of 3D computer graphics
12. SCSI:
Short
for small computer system interface.
SCSI
interfaces
provide
for
faster data transmission
rates
(up
to
80megabytes per
second)
than
standard serial and parallel ports. In addition, you can attach many devices to a single SCSI
port, so that SCSI is really an I/O bus rather than simply an interface.
Computer Architecture plays a main role in data processing. From the computer to other peripherals,
many electronic connections are done through which data passes.
Evolution of computers

Blaise pascal invented the first mechanical adding machine in 1642.


Baron gotfried invented the first calculator for multiplication in 1671.
Keyboard machines originated around 1880 in the united states.
Around 1880, herman hollerith came up with the punched cards that were extensively used as
the input media in india till 1970s.
Charles babbage is considered to be the father of modern digital computers
He designed difference engine in 1822.
He designed a fully automatic analytical engine in 1842 for performing basic arithmetic
operations.
His efforts established a number of principles that are fundamental to the design of any digital
computer.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Generation in a computer talk is a step in technology. It provides a framework for the growth of
computer industry.
Originally it was used to distinguish between various hardware technologies, but now it has
been extended to include both hardware and software.
Till today, there are 5 computer generations.

Generation

Key HW
technologies

Key SW
technologies

Key characteristics

First (1942- 1955)

Vacuum tubes

Machine and
Assembly
Languages;
stored programs
concept; mostly
scientific
application

Bulky in size; highly


unreliable; limited
commercial use;
commercial
production difficult
and costly; difficult
to use

Second (19551975)

Electromagnetic
relay memory
Punched cards
Secondary
Storage
Transistors;
magnetic core
memory;
magnetic tapes;
and disks
secondary
storage.

Batch operating
systems; highlevel
programming
languages;
scientific and
commercial
applications.

Faster, smaller,
more reliable and
easier to program
than previous
generation
systems;
commercial
production was
costly
Faster, smaller,
more reliable,
easier and cheaper
to produce
commercially,
easier to use and
easier to upgrade
than previous
generation
systems; scientific,
commercial and
interactive on-line
applications.

Third ( 1964-1975)

ICs with SSI and


MSI technologies;
larger magnetic
core memory;
larger capacity
magnetic disks
and tapes
secondary
storage; mini
computers

Time sharing
OS;
standardization
of high level
programming
languages;
unbundling of
SW from HW

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Some
representative
systems
ENIAC, EDVAC,
EDSAC, UNIVAC I,
IBM 701

Honey well 400,


IBM 7030, CDC
1604, UNIVAC LARC

IBM 360/370, PDP8, PDP- 11, CDC


6600

Fourth (1975- 1989)

Fifth Generation
(1989- present)

ICs with VLSI


technology;
MICRoprocessors;
semi conductor
memory; larger
capacity hard
disks, in- built
secondary;
magnetic tapes
and floppy disks
as portable
storage media;
personal
computers; high
speed NWs
ICs with VLSI
technology,
larger capacity
unit hard disks,
optical disks as
portable readonly storage
media; notebook
computers;
powerful desktop
PCs and work
stations; very
powerful
mainframes,
Internet

OS for PCs; GUI;


Multiple
windows on a
single terminal
screen; UNIX
OS, C
Programming
language; PCbased
applications;
Network based
applications

Small, affordable,
reliable and easy to
use PCs, more
powerful and
reliable mainframe
systems; general
purpose machines;
easier to produce
commercially.

IBM PC and its


clones, Apple II,
TRS- 80, CRAY

WWW,
Multimedia
applications;
Internet based
applications

Portable
computers; more
powerful; cheaper;
reliable; and easier
to use; desktop
machines; very
powerful
mainframes; very
high uptime due to
hot pluggable
components;
general purpose
machines; easier to
produce
commercially.

IBM notebooks,
Pentium PCs, SUN
workstations, IBM
SP/2, etc

Size of computers

Super computers
Most powerful, most expensive and fastest.
Used for defense, aircraft, computer generated weather report, petroleum industry, etc.
Speed is measured in nano seconds.
Processors perform task simultaneously and can connect to 10,000 terminals at a time.
Main frame computers
1. Power, cheaper in cost and fast computers.
2. Airline booking, railway reservation and network banking.
3.the speed is measured in megaflops.
4. Multiprogramming- capability to SWitch between programs.
5. Can support upto 10,000 terminals at a time.
Micro computers
1. Fully ledged computer system
2. Uses MICRo processor as CPU
3. Runs on various os dos, windows, etc.
4. Personal computers for the general purpose of the users.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)


Mini computers
1. Performs the same activities of mainframe on a smaller scale.
2. Caters to multiple users accessing at the same time.
3. Serves as information processors in small to medium sized firms or processors in computer
network for large firms.
Electronic devices used in various generations

Concepts

Chipset- many technologies, met on mother board are glued together via these controllers
which we call the chipset.

Data flow on the mother board the CPU is the brain of the pc. The buses are the nervous
system of Mother board. They connect CPU to all other components. The buses are pcs express
ways, which transmits data between different components.

CPU it is a processor because it moves and calculates data.


It is central because it is centre of pc data processing.
It is an unit because its a chip which contains millions of transistors.

Clock speed- It is the speed at which the processor executes instructions. Measured in HZ.

Clock frequency- There is a small crystal on mother board; which continually ticks to the CPU at
a steady number of clock ticks/ second. At each clock tick something happens in the CPU. Thus
more ticks/ second more data are processed.

BIOS - Small chip on the mother board which loads the hardware settings required to load
various input and output devices. Most PCs come with flash bios that can be software upgraded
to support new devices.
CMOS - To store date, time and system set parameters. These are loaded every time the
computer is started. A small lithium iron battery powers the CMOS and BIOS in the mother
board.
Bits - Computer remembers everything in bits. They think in bits.
Binary helps us understand bits.
1 bit/second means it can change 2v to 5v and 5v to 2v on one second.
A computer can change volts very fast.

10

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

CISC and RISC - The first CPUs had so called CISC (complex instruction set computer). This
means computer can understand many complex instructions. RISC are brief and the same length
and process, much faster than CISC.
Mother board - The mother board or (PCB) is the main circuit board on the computer.
Directs as a direct channel for the various components to communicate.
Components:
Processor slots
Expansion slots
Ports
Expansion Slots

Common expansion cards:


Graphics card (for connecting to a monitor)
Network card (for transmitting data over a network)
Sound card (for connecting to a Microphone and speakers)
Most PCs offer 4-8 expansion slots.
There are several different types of expansion slot:
ISA: older technology, for modems and slow devices
PCI: for graphics, sound, video, modem or network cards
AGP: for graphics cards
Basic organization of a computer

Input unit

An input unit perform the following functions:

1. It accepts (reads) instructions from outside world.

11

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

2. It converts these data/ instructions in computer acceptable form.


3. It supplies the converted data/ instructions to the computer for further processing.

Output unit

1. It accepts the results produced by the computer, which are in coded form and hence cannot
be understood by us.

2. It converts these coded results to human acceptable form.

3. It supplies the converted results to outside world.


Two types of storage:Primary storage

1. Used to hold running program instructions.

2. Fast in operation

3. Small capacity

4. Expensive

5. Volatile (loses data on power cut)


Storage unit

1. Data and instructions are required for processing from the input devices.

2. Intermediate results of processing.

3. Final results of processing before they are released to an output device.


Secondary storage

1. Used to hold stored program instructions.

2. Slower than primary storage

3.large capacity

4. Lot cheaper than primary storage

5. Retains data even without power.


Primary Memory

Secondary Memory

Primary memory is volatile with an exception


of ROM.
It is costlier
It is close to CPU
Capacity is low
Processing is faster
It is in chip form
Primary memory is not portable
Primary memory is not to be formatted by the
user.
Data cannot be saved in primary memory
Primary memory is in direct access

Secondary memory is non volatile.

12

It is relatively cheaper.
It is relatively far from CPU
Capacity is high
Processing is relatively slower
It is in tape or disk form
Secondary memory is portable
It is to be formatted
Essentially used with an intention of saving
Secondary memory will be of direct/
sequential access.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

ALU

ALU is the place where actual execution of instructions takes place during processing operation.

Control unit

Control unit controls and coordinates the operations of all other components of the computer
system.
Registers

Special memory units called registers are used to hold information on a temporary basis as the
instructions are interpreted and executed by CPU.

Registers are part of the CPU ( not the main memory).

The amount of the data that it can hold is measured in bits.


Storage evaluation criteria
Property
Desirable

Primary
Storage

Secondary
Storage

Small

Large

Storage
capacity
Access time

Large

Fast Access Fast


Time

Slow

Cost per bit of


storage

Low cost
per bit

High

Low

Volatility

Non
volatile
Random
Access

Volatile

Non volatile

Random
access

Sequential
access

Access

RAM- Random Access Memory

Primary storage of a computer is referred to as ram.

Ram chips are volatile memory.

A computers MB is designed in a manner that the memory capacity can be enhanced by adding
more memory chips.

The additional ram chips which plug into special sockets on the MB are known as single- in- line
memory modules (SIMM).
ROM- Read Only Memory

ROM a non volatile memory chip.

Data stored in ROM can only be read and used they cannot be changed.

ROMs are mainly used to store programs and data which do not change and are frequently
used. Eg- system boot program.

13

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Types of ROM

Manufacturer- programmed ROM: data is burnt by the manufacturer on the electronic


equipment under which it is used.

Programmable ROM store only read only.

Erasable pROM- user can erase programs and the ROM can be reprogrammed.

Ultraviolet epROM

Electrically epROM (flash memory)


Cache (pronounced as cash)

Used to cover up memory- processor speed mismatch

Library- example
To understand the basic idea behind a cache system, let's start with a super-simple example that
uses a librarian to demonstrate caching concepts. Let's imagine a librarian behind his desk. He is
there to give you the books you ask for. For the sake of simplicity, let's say you can't get the books
yourself -- you have to ask the librarian for any book you want to read, and he fetches it for you
from a set of stacks in a storeroom (the library of congress in Washington, D.C., is set up this way).
First, let's start with a librarian without cache.
The first customer arrives. He asks for the book Alchemist. The librarian goes into the
storeroom, gets the book, returns to the counter and gives the book to the customer.
Later, the client comes back to return the book. The librarian takes the book and returns it
to the storeroom. He then returns to his counter waiting for another customer. Let's say
the next customer asks for Alchemist (you saw it coming...). The librarian then has to
return to the storeroom to get the book he recently handled and give it to the client.
Under this model, the librarian has to make a complete round trip to fetch every book -even very popular ones that are requested frequently. Is there a way to improve the
performance of the librarian?
Yes, there's a way -- we can put a cache on the librarian. In the next section, we'll look at
this same example but this time, the librarian will use a caching system.
Let's give the librarian a backpack into which he will be able to store 10 books (in
computer terms, the librarian now has a 10-book cache). In this backpack, he will put the
books the clients return to him, up to a maximum of 10. Let's use the prior example, but
now with our new-and-improved caching librarian.
The day starts. The backpack of the librarian is empty. Our first client arrives and asks
for Alchemist. No magic here -- the librarian has to go to the storeroom to get the book.
He gives it to the client. Later, the client returns and gives the book back to the librarian.
Instead of returning to the storeroom to return the book, the librarian puts the book in his
backpack and stands there (he checks first to see if the bag is full -- more on that later).
Another client arrives and asks for Alchemist. Before going to the storeroom, the librarian
checks to see if this title is in his backpack. He finds it! All he has to do is take the book
from the backpack and give it to the client. There's no journey into the storeroom, so the
client is served more efficiently.
What if the client asked for a title not in the cache (the backpack)? In this case, the
librarian is less efficient with a cache than without one, because the librarian takes the
time to look for the book in his backpack first. One of the challenges of cache design is to

14

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

minimize the impact of cache searches, and modern hardware has reduced this time delay
to practically zero. Even in our simple librarian example, the latency time (the waiting
time) of searching the cache is so small compared to the time to walk back to the
storeroom that it is irrelevant. The cache is small (10 books), and the time it takes to
notice a miss is only a tiny fraction of the time that a journey to the storeroom takes.
Limitations of primary storage

Volatile

Expensive and so limited capacity


Secondary storage

Cost per bit is low, hence overcomes the disadvantages of primary storage.

Operating speed is slower than primary storage

Used to store data on a permanent basis.

Also known as auxiliary memory.

Secondary
Storage

Sequential
access
device

Direct
Access
Devices

Magnetic
tape

Magnetic
disks

Floppy
Disks

Optical
disks

Hard disks

DVD

Wincheste
r Disk

CD- RW

Disk Pack

WORM
Disks

Zip disk

Memory
storage
devices
Memory
Card
Flash drive

CD ROM

Sequential access storage devices

1. Data can only be retrieved in the same sequence in which it is stored.

2. Access time varies according to the storage location of the information being processed.

15

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

3. Suitable for sequential processing applications where most, if not all of the data records
needs to be processed one after the other.
4. Example- magnetic tape.

Direct access storage devices

Devices where any storage location may be selected and accessed at random.

Permits access to individual information in a more direct or immediate manner.

Equal access time from any storage location.

Suitable for online booking systems, on- line banking systems, etc.

Magnetic, optical disks are examples.


Magnetic tape basics

Commonly used sequential access storage device.

Physically, the tape medium is a plastic ribbon which is usually 1.2 inch, 1.4 inch wide and 50 to
2400 ft long.

Plastic ribbon is coated with magnetizable recording material such as iron oxide or chROMium
dioxide.

Data are recorded in the form of tiny invisible magnetized and non magnetized spots (0 s and
1s ) on the coated surface.

Tape ribbon is stored in reels or cassettes.


Advantages of magnetic tapes

Storage capacity is virtually unlimited because as many tapes as required can be used for storing
very large data.

Cost per bit is very low.

Tapes can be erased and used many times.

Compact and light in weight.

Easy to handle and store


Limitations

Not suitable for data that has to be accessed randomly.

Has to be stored in a dust free environment as dust could cause reading problems.

Stored in properly controlled temperature and humidity levels.

Tape ribbon may get twisted due to warping, resulting in loss of stored data.

Should be properly labeled.


Magnetic disk

Commonly used direct access storage device.

Physically, its a thin circular plate made of metal or plastic that is usually coated on both sides
with a magnetizable recording material such as iron oxide.

Data are recorded by tiny invisible magnetized and non- magnetized spots on the coated
surface of the disk.

Disk is stored on a protected envelope.

16

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Disk organization

Disk formatting
Process of preparing a new disk by the computer system in which the disk is to be used.
Os- formatting - creates a fat that is a table with the sector and track locations of data.
leaves sufficient space for fat to grow
scans and marks bad sectors.
Disk drive is the unit used reading/ writing of data on / from a disk.
Types of magnetic disks
Floppy disks

Round piece of flexible plastic cards, coated with magnetic oxide.

So called because they are made of flexible plastic plates which can bend.

Also known as floppies or diskettes.

Plastic disk is encased in a plastic jacket that gives handling protection to the disk surface.
Hard disks

Round, flat piece of rigid metal (frequently Aluminum) disks coated with magnetic oxide.

Come in many sizes

Depending on how theyre packed, they can be 3 types.

Zip disks, winchester disks and disk packs.

Primary on- line secondary storage for most devices.


Advantages of magnetic disks

Direct access of data

Can be used by multiple users through a shared device.

Used for on- line and off-line storage of data.

Low cost

Less storage space.

Large amounts of data


Optical Disks uses laser beam technology for reading/ writing data
CD- ROM

Stands for compact disk read only memory

17

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Information stored cannot be altered


Pre stamped and pre recorded by the supplier by a process called mastering.
Holds a storage capacity of about 650mb

Disadvantages

Stored in dust free environment.

Tapes are must cheaper.

Disk crash could lead to huge loss.

Security is an issue.
Worm disks/ CD-R (CD Recordable)

Stands for write once, read many.

Data can be written only once on them, but can be read many times.

Allow users to create their own cd- ROM disks by using a cd- r drive that can be attached to a
computer as a regular peripheral device.

Data can be recorded in multiple recording sessions.

Used for permanent archiving. Eg- banks.


CD read/ write (CD-RW)

Same as cd-r and same storage capacity.

Can be erased and written afresh.


DVD- digital video disk

Looks like cd- ROM but has a capacity of 4.5 gb- 8.5 gb.

Designed primarily to store and distribute movies.


Advantages of optical disks

Cost per bit is low because of their enormous storage capacity.

Extended data storage life.

No mechanical read/ write heads. Hence more reliable.

Danger of data getting erased is removed.

It is largely read only. Data once stored cannot be erased.


Flash drive (pen drive)
memory card
Input/ output devices

1. Provides means of communication between a computer and outer world.

2. Also known as peripheral devices because they surround the CPU and memory of a computer
system

3. Input devices are used to enter data from the outside world into primary storage.

4. Output devices supply results of processing from primary storage to others.

18

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Commonly used input devices

Keyboard : allow data by pressing a set of keys. Qwerty keyboard is most popular.

Mouse

Track ball (similar to mouse with a ball, used in laptops)

Joy stick- used for video games, flight simulators, for controlling industrial robots.

Electronic pen

Touch screen

Most simple and easiest to learn.

Enables users to choose from various options by simply touching with their finger the desired
icon or menu item displayed on the screen.

Most preferred human computer interface used in information kiosks like atm.

Optical character recognition devices

Scanner equipped with a character recognition software that converts the bit map images to
equivalent ASCII codes.

Enables word processing of input text also requires less storage for storing the document as text
rather than as an image.

OCR is extremely complex because it is difficult to make a computer recognize an unlimited


number of typefaces and fonts.

2 types :OCR a ( American )and OCR - b (European)


Optical mark reader

Scanner capable of recognizing pre- specified type of mark by pencil or pen.

Very useful for grading tests with objective type questions, or for any input data that is of choice
or selection nature.

Technique used for recognition of marks involves focusing a light on the page being scanned
and detecting the reflected light pattern from the marks.
Bar code reader

Scanner used for reading bar- coded data.

Bar codes represent alpha- numeric data by a combination of adjacent vertical lines by varying
their width and spacing between them.

Scanner uses laser- beam to stroke across pattern of bar code. Different patterns of bar reflect
the beam in different ways sensed by a light sensitive detector.

Universal Product Code (UPC) is the most widely known bar code system.
Magnetic ink character recognition (MICR)

MICR is used by banking industry for faster processing of large volumes of cheque.
Banks identification code (name, branch, etc), a/c number, cheque number and pre printed
(encoded) using characters from a special character set on all cheques.
Special ink is used that contains magnetizable particles of iron oxide.
MICR sorts data on cheques and sorts them for distribution to other banks or for further
processing.
MICR 0 to 9 and 4 special characters

19

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Digitizer

For converting pictures, maps and drawings in digital form for storage in computers.

Commonly used by architects to design cars, buildings, robots, mechanical parts, etc.

Digitizing maps in paper form.


Image scanner

Input device that translates paper documents into an electronic format for storage in a
computer.

Electronic format for a stored image is in bit map representation.

Stored image can be altered or manipulated with image processing software


Types of output

Hard copy output

Soft copy output


Monitors

Monitors are the most popular output devices used for producing soft copy output.

Display the output on a screen

Monitor associated with a keyboard is called VDT (video display terminal). It is the most popular
I/O device.

A monitor is a peripheral device which displays computer output on a screen.

Screen output is referred to as soft copy.

Types of monitors:
Cathode-ray tube (crt)
Liquid crystal display (lcd or flat-panel)
Printers for hard copy output
A printer is a peripheral device that produces a physical copy or hard copy of the computers
output.

Types of printers
Impact Printers
1) Impact printers utilize striking device to transfer ink from an inked ribbon onto the paper
being printed to form images or characters.
2) The characters are formed by whole alpha numeric images produced by a process known as
full character or formed character printer.
3) The characters are also formed by a dot matrix method which arranges a series of dots to
assume the shape of each character being printed.
4) Impact printing can be serial printing or line printing.
Non Impact Printers
1) A non- impact printer forms characters by chemical or electronic means.
2) They are fast in operation and printing a page.

20

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

3) Three types of non impact printers are significant; they are thermal printers, ink- jet printers
and laser printers.
4) Non- impact printers produces very high quality prints from a wide selection of character
fonts.
Daisy Wheel Printers
1) A wheel with each possible character strikes a ribbon with the desired character facing.
2) The paper, making a mark according to the character engraved on the wheel.
3) They were the first printers available and are no longer in common use.
4) Totally obsolete.
5) Very slow
6) Could only produce the characters engraved on their wheels.
Dot Matrix Printers
1) A Pin strikes a ribbon, causing a mark on the paper.
2) A series of pins can create characters by striking the ribbon with the pins in the shape of the
desired character.
3) Some types of printing jobs require press- through copies, requiring some form of impact.
4) This is the only form of printer that still uses the impact method.
5) Impact printers are slow by nature and noisy.
6) They also have a much harder time drawing graphics, produce very low quality output.
Laser Printer
1) A Laser printer is a popular type of personal computer printer that uses a non- impact (keys
dont strike the paper), photocopier technology.
2) When a document is sent to the printer, a laser beam draws the document on a seleniumcoated drum using electrical charges.
3) After the drum is charged, it is rolled in toner, a dry powder type of ink. The toner adheres to
the charged image on the drum. The toner is transferred onto a piece of paper and fused to
the paper with heat and pressure.
4) After the document is printed, the electrical charge is removed from the drum and the excess
toner is collected. Most laser printers print only in monochrome. A color laser printer is up to
10 times more expensive than a monochrome laser printer.
5) IBM introduced the first printer in 1975 for use with its main frame computers. In 1984,
Hewlett-Packard revolutionized laser printing technology with its first laser Jet, a compact,
faster and reliable printer that personal computer users could afford.
6) Since then laser printers have decreased further in price and increased in quality.
Inkjet Printers
1) The Laser printer is different form an inkjet printer in a number of ways. The toner in a laser
printer is dry. In an Inkjet. It is wet.
2) Over time, an inkjet printer is about ten times more expensive to operate than a laser printer
because ink needs replenishing more frequently.

21

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

3) The printed paper from an inkjet printer will smear if wet, but a laser printed document will
not. Both types of printer operate quietly and allow fonts to be added by using font cartridges
or installing soft fonts.
4) If the printing need is minimal, an inkjet printer is sufficient. But if printing volume is high, a
laser printer is preferable.
Line printers
1) A line printer operates at much higher speeds and prints what appears to be a full line
at a time.
2) Line printers are only used where high speed and volume is necessary and where
quality is the lesser requirement. Two types of line printers include:
Chain Printers
1) It has a chain that revolves at a constant speed in a horizontal axis.
2) The complete chain has a complement of 48 characters (numbers, alphabets, special symbols)
cast on 5 times.
3) It is confronted by a set of as many hammers as the number of print position (say 48 X 5= 160)
4) These hammers are magnetically controlled.
5) The continuous stationery and ribbon are inter- posted between a segment of the chain and
the set of hammers.
6) When a required character on the chain faces its print position, the corresponding hammer is
actuated.
Drum Printers
1)These printers use a solid cylinder there are as many rows on it as the number of print
positions.
2)Each band has cast on it the complement of 48 numerals, alphabets and special characters.
3)The Drum rotates at a constant speed confronted by a set of as many hammers as the
number of bands with the inked ribbon and continuous stationery inter- post.
4) In one rotation of the drum there would be appropriate strikes by the set of the hammers.
5)In the first strike As are printed in the appropriate print positions followed by
B,C.Z,0,19 and special symbols one by one.
Thermal Printers
1) A printer that uses heat to transfer an impression onto paper. There are two kinds of thermal
printers:
Thermal wax transfer: a printer that adheres a wax-based ink onto paper.
2) A thermal print head melts wax-based ink from the transfer ribbon onto the paper. When
cool, the wax is permanent. This type of thermal printer uses an equivalent panel of ink for
each page to be printed, no matter if a full page or only one line of print is transferred.
3) Monochrome printers have a black page for each page to be printed, while color printers have
either three (CMY) or four (CMYK) colored panels for each page. Unlike thermal dye transfer
printers, also called dye sublimation printers, these printers print images as dots, which means
that images must be dithered first.

22

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

4) As a result, images are not quite photo-realistic, although they are very good. The big
advantages of these printers over thermal dye transfer printers are that they don't require
special paper and they are faster.
5) Direct thermal: a printer that prints the image by burning dots onto coated paper when the
paper passes over a line of heating elements. Early fax machines used direct thermal printing.
Plotter

A plotter is a printer that uses a pen that moves over a large revolving sheet of paper.

It is used in engineering, drafting, map making, and seismology.


Audio output: sound cards and speakers

Audio output is the ability of the computer to output sound.

Two components are needed:

sound card plays contents of digitized recordings

speakers attach to sound card


Audio input: speech recognition

Speech recognition is a type of input in which the computer recognizes words spoken into a
microphone.

Special software and a microphone are required.

Latest technology uses continuous speech recognition where the user does not have to pause
between words.
Microfiche

The major advantages of Microfiche include storage in a small space, stability of the format, and
no special knowledge needed to read it. As long as a Microfiche machine is available to magnify
the print to readable size, anyone who can read the language can read a Microfiche. Because of
its small size, Microfiche can be archived in storage cabinets, saving floor space. Thousands of
government documents are archived on Microfiche for this very reason.

Microfiche, like microfilm, is also a stable archival format. When kept in a temperaturecontrolled environment, it is rated to last 500 years a crucial advantage in saving cultural
documents
Software

Hardware refers to physical devices of a computer system.

Software refers to collection of programs.

Program is a sequence of instructions written in a language that can be understood by the


computer.

Software package is a group of programs that solve a specific program or perform a specific type
of job.

System software- extend the processing capability

Help hw components work together and provide support for the development and execution of
system SW.

Programs included in a system SW are called system programs.

Examples : operating systems, programming language, translators, utility programs

23

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Application software

Solve a specific problem or to do a specific task.

Programs included are called application programs.

Examples- word processing, tally, etc


Ways of acquiring SW

Buy pre-written SW

Order customized SW

Develop customized SW

Downloading public domain SW

Firmware

Firmware is SW substituted for HW and stored in ROM.

Firmware technology has enabled production of various types of smart machines having
microprocessor chips with embedded SW.
Middleware

Basic idea is to have a separate SW layer to:

Act as glue between client and server part of application.

Provide programming abstraction

Mask heterogeneity of underlying HW, NW and OS.

Encourage 3 tier SW architecture against 2 tier.


Virtual Memory and Main Memory
Basis
Meaning

24

Virtual Memory
Virtual memory is a technique that
allows the execution of a process,
even though the logical address
space requirement of the process
is greater than the physically
available main memory.

Main Memory
Main Memory is a part of the
computer hardware which stores
program and data that are active
in use.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Storage Capacity

Memory Utilization

Virtual memory extends primary


memory by treating disk storage as
a logical extension of the main
memory, thus increasing the
storage capacity.
Virtual Memory helps in efficient
main memory utilization. More
programs can be run at the same
time.

Main Memory
storage capacity.

has

limited

Main Memory can run a single


program at a time hence CPU is
not fully utilized.

RAM and ROM


Basis
Used for

Volatility
Users
Things stored

Reading and Re-writing

Power interruptions

RAM
ROM
RAM is used as main computer ROM is used for storing micro
memory.
programs
and
control
instructions that allows special
operations to be performed by
the machine.
RAM is volatile or temporary ROM is non volatile or
memory
permanent memory
Programmers and machine both use Only machines use ROM
RAM
Data and programs can be stored in ROM does not allow data to be
RAM either through input devices or stored instead they are written
through auxiliary storage devices
by its manufacture once for all.
The data and instructions written on Instructions written on ROM can
the RAM can be read and re-written. be read but cannot be rewritten.
Power interruptions destroy RAM Power interruptions do not
contents or data stored.
destroy the contents of ROM.

Bubble Memory Is composed of small magnetic domains (bubbles) formed on a thin single- crystal film of
synthetic gamel. These magnetic bubbles, which are actually magnetically, charged cylinders, only few
thousandths of a centimeter in size, can be moved across the garnet film by electric charges. The presence or
absence of a bubble can be used to indicate whether a bit is on or off.
Since the data stored in a bubble memory is retained when power to the memory is turned off, it can be used
for auxiliary storage. Bubble memory has high potential because of its low production costs and its direct
access capabilities, thus it may become widely employed as a main memory technology. Since its small, light
weight and does not use much power, bubble memory is finding a great deal of use an auxiliary storage in
portable computers. It is expected that as more portable computers are developed, bubble memory will
become more widely used.

25

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Inter block Gap (IBG):


1) A block is a unit of transfer which means from the tape to the CPU, bunches of characters are
carried.
2) In order the blocks are read, the tape is expected to run at a constant speed.
3) While a block is picked for processing, it involves consumption of time. During that time, the
tape is running at a constant speed. If the next block is juxtaposed (beneath the next block)
here is a possibility of skipping the block.
4) In order to prevent this, a gap is necessary between adjacent blocks. This block is called IBG.
5) However, to minimize the wastage, due to empty run, a combination of retardation and
acceleration are carried out.

Utilities and libraries


Utility programs are also known as service programs. They perform tasks that are common to all
data processing jobs. These programs are stored in a DASD and called by the OS when required.
Examples of Utility program are:

Sorting records in a particular sequence


Merging several files into a single file
Editing the data or text
Copying files from disk to tape or disk to floppy.
Printing
Comparing two sets of data.

Libraries are collections of frequently used programs. These programs are usually small in size
and not fully fledged programs. They are subordinate to the main programs and called subroutines.
A sub- routine may be defined as a sub set of instructions that appears over and again in the
program of is employed in several programs. E.g. computation of square root, translating
amounts in figures to amount in words, printing headers, etc.
Diagnostic routines
The programs held in hand in finding out errors in applications programs and assist in debugging.
They help in executing the program lines step by step, trace the logic and trap errors.
Spooling software
1. The purpose of spooling software is to compensate for the speed differences between the
computer and its peripheral devices.
2. Spooling software is usually encountered in large system and network computing
environments. For instance, during the time it takes to type in or print out all the words on
this page, the computer could begin and finish processing dozens of programs.

26

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

3. The computer would be horribly bottlenecked if it had to wait for slow input and output
devices before it could resume processing. It just does not make sense for a large computer,
which may be worth lacs of rupees, to spend any time sitting idle because main memory is full
of processed but unprinted jobs and the printer attached to the system cannot move fast
enough.
4. To preclude the computer from being slowed down by input and output devices, many
computer systems employ spooling software. These programs take the results of computer
programs and move them from primary memory to disk. The area on the disk where the
program results are sent is commonly called the output spooling area.
5. Thus, the output device can be left to interact primarily with the disk unit, not the CPU.
Spooling utilities can also be used on the input side, so that programs and data to be
processed are temporarily stored in an input spooling area on disk.
6. Assume for example that a floppy disc, a line printer and a disk are used in a spooling
operation on a computer system to process the pay-roll and prepare invoices by loading both
programs into the main memory. While the line printer is printing an invoice line, the
processor switches to the pay roll application and transfers input data from floppy disc to
magnetic disk.
7. Afterwards the processor reverts back to the invoice application. As the printer is being used
for printing invoices, pay roll application will be executed and output data would be recorded
on the Magnetic disk for later conversion when the printer becomes available. As a result, the
CPU can give the output at the maximum speed, while several relatively slow input and output
unit cooperate simultaneously to process it.
Translators
1. These are also known as translating programs. They transform the lines of instructions written
by the programmer into codes that can be read by the machine.
2. Translators are the common reference for the different software such as interpreters,
assemblers, compilers, etc.
3. Translators refer also to software that can convert statements from one language to those in
another. The term language processor is also used for meaning translator.
Text Editors
These are programs that allow text to be created as a file and modified. These are most useful to
professional programmers who have to create new programs or modify the earlier ones. These
programs allow the facility of cutting and pasting text blocks as also other features such as spell
check, syntax verification and so on.

27

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Language Classification

A programming language that is once removed from a computer's machine language.


Machine languages consist entirely of numbers and are almost impossible for humans to read
and write. Assembly languages have the same structure and set of commands as machine
languages, but they enable a programmer to use names instead of numbers.
Each type of CPU has its own machine language and assembly language, so an assembly
language program written for one type of CPU won't run on another. In the early days of
programming, all programs were written in assembly language. Now, most programs are
written in a high-level language such as FORTRAN or C. Programmers still use assembly
language when speed is essential or when they need to perform an operation that isn't
possible in a high-level language.
A human language. For example, English, French, and Chinese are natural
languages. Computer languages, such as FORTRAN and C, are not.
Probably the single most challenging problem in computer science is to develop computers
that can understand natural languages. So far, the complete solution to this problem has
proved elusive, although a great deal of progress has been made. Fourth-generation
languages are the programming languages closest to natural languages.
Compiler and Interpreter
Basis
Functioning

Conversion of source

Source code requirement


Speed
Object code generation

28

Compiler
It scans the whole program at
a time and list out the error if
any.
Whole of the source code is
converted to object code at a
time by a compiler.

Interpreter
It scans the program line by
line and stops scanning if any
error occurs.
Source
programs
are
converted line by line into
object by interpreter and
immediately executed.
No need of source code after Source code required for
combination.
every execution.
Execution is faster
Execution is slower
The object code is generated Interpreter generates object
when program is free.
code for the line immediately
if it is error free.

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Decision Support System (DSS)


A DSS is an information processing system frequently used by accountants, managers and auditors to
assist them in the decision making process. DSS of computer systems that combines data analytical
tools and user friendly software to support semi structured and un-structured decision making. They
are generally used at the management level of an organizational level for decision making. Semi
Structured and un-structured situations are non- repetitive problems for which no standard solutions
exist and also t hey doesnt have well defined processing rules. Flexibility is the vital key in developing
decision making system for semi- structured problems, since different managers are likely to
approach the process differently. Advances in hardware technologies, interactive computing design,
graphics capabilities and programming languages contributed to this evolution.
A DSS has 4 basic components:1. The User: The user of a DSS is generally a manager with an unstructured or semi
structured problem to solve A manager may be at any level of authority in the
organization. They do not need a computer background to use the DSS for solving a
problem because a special planning language performs the communication functions
within the DSS.
2. Databases: There is more than one database included in DSS. These databases contain
both routine and non routine data from both internal and external sources. The data
from external sources may contain or relate to the operating environment surrounding
the organization like economical condition, industry competitions, etc. Database may
also capture data from other sub systems such as marketing, production and
personnel.
3. Model base: Data manipulations and computations with data provided to be DSS by
the user and the database is done by the model base. It includes mathematical model
and analytical techniques to process and manipulate the database. The model base
may dictate the type of data included in the database and the type of data provided by
the users. Analysis provided by the routines in the model base is the key to support the
users decision.
4. Planning languages: Two types of planning languages commonly used in DSS are:
General purpose planning language: They allow the user to perform many routine
tasks like data retrieval analyzing etc. Example- Language in most electronic spread
sheets.
Special purpose planning language: Their task is limited to performance of pre
determined / preprogrammed instructions. They can do their jobs better. ExampleSAS, SPSS.

29

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Expert systems
Expert systems are systems that allow a person not having specialized knowledge or experience to
make decisions, comparable to that of an expert. Expert systems contain the knowledge used by an
expert in a specific field in the form of If/ then rules and an engine capable of drawing inference
from this knowledge base.
Components of Expert system are:1. Knowledge base: it is the computer equivalent to all the knowledge and insight that an expert
or a group of expert develop through years of experience in their field.
2. Inference Engine: it is the basic logic and reasoning mechanism that stimulates the expert
logic process and deliver advice. It uses data obtained from both the knowledge base and user
to make associations and inferences from its conclusions and recommend a course of action.
3. User interface: This part or program allows the user to design, create, update, use and
communicate with the expert system.
4. Explanation facility: This facility provides the user with an explanation of the logic the expert
system used to arrive at its conclusions.
5. Knowledge acquisition facility: Building a knowledge base referred to as knowledge
engineering involves both a human expert and a knowledge engineer. The knowledge
engineer is responsible for extracting an individuals expertise and using the knowledge
acquisition facility to enter it into the knowledge base.
Advantages:
1. It is a cost effective alternative to human experts.
2. It can outperform a single expert as it is a representative of numerous experts.
3. It can produce better quality decision and more consistent decisions as they are not
distracted, over worked or stressed out.
4. Expert system assist users in identifying potential decision making problems, which increases
the probability that sound decisions, will be made.
5. They can increase productivity.
6. They preserve the expertise of an expert leaving the organization.
Object Oriented Concepts

In old style programming, you had:

data, which was completely passive

functions, which could manipulate any data

An object contains both data and methods that manipulate that data

30

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

An object is active, not passive; it does things

An object is responsible for its own data

But: it can expose that data to other objects

An object contains both data and methods that manipulate that data

The data represent the state of the object

Data can also describe the relationships between this object and other objects
Example: A Checking Account might have

A balance (the internal state of the account)

An owner (some object representing a person

You could (in a game, for example) create an object representing a rabbit

It would have data:

How hungry it is

How frightened it is

Where it is

And methods:

eat, hide, run, dig

Every object belongs to (is an instance of) a class

An object may have fields, or variables -The class describes those fields

An object may have methods -The class describes those methods

A class is like a template, or cookie cutter

An Abstract Data Type (ADT) bundles together:

some data, representing an object or "thing"

the operations on that data

Example: a Checking Account, with operations deposit, withdraw, get Balance, etc.

Classes enforce this bundling together

31

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Classes are arranged in a treelike structure called a hierarchy

The class at the root is named Object

Every class, except Object, has a super class

A class may have several ancestors, up to Object

When you define a class, you specify its super class

If you dont specify a super class, Object is assumed

Every class may have one or more subclasses.

Inheritance: Inheritance is the property whereby one class extends another class by including
additional methods and/or variables. The original class is called the super class of the extending class,
and the extending class is called the subclass of the class that is extended. Since a subclass contains all
of the data and methods of the super class plus additional resources, it is more specific. Conversely,
since the super class lacks some of the resources of the subclass, it is more general or abstract, than its
subclasses.

Encapsulation means as much as shielding. Each object-oriented object has a shield around it. Objects
can't 'see' each other. They can exchange things though, as if they are interconnected through a hatch.
It separates the external aspects of an object from the internal implementation details of the object,
which are hidden from other objects. The object encapsulates both data and the logical procedures
required to manipulate the data.

32

SREERAM ACADEMY (FORMERLY SREERAM COACHING POINT)

Vous aimerez peut-être aussi