Professional Documents
Culture Documents
REMEDIAL
CLASS
NOTES
CONTENTS
COMPUTER CONCEPTS
1.0 Introduction
1.1 Objectives
1.2 Need for Computer Literacy
SOFTWARE
3.0 Introduction
3.1 Software.
3.1.1 System Software
3.1.2 Application Software
3.2 Machine Language
3.3 Assembly Language
3.4 High Level Language
3.5 Question/ Answer Key
COURSE INTRODUCTION
Computers are used in much application, like banking, military, medical instruments.
In this course we are going to discuss the fundamental concept of computers, its working,
how computer are useful for a society and its capability. How computers are classified,
what is the relationship between software and hardware and what is the use of storage
device and their capabilities are discussed.
Peripheral devices are responsible for carrying out input and output operations. The
input devices include keyboard, mouse, light pen etc.. The output devices are printers,
plotters and the monitors to name a few. Computer is an information process device,
Hence devices for storing information are needed. Main memory holds programs and
data. Main memory is volatile and limited in size. Secondary storage devices are non-
volatile and have sizes which are orders of magnitude more than the size of the main
memory. Examples of secondary storage are hard disk, floppy disk, CD ROM computers
store information in the digital form. In order to make a computer communicate with the
analog world, a device called MODEM (Modulator Demodulator) is used. Modem
converts the digital information to analog information for messages going out of a
computer and vice-versa for incoming messages. Different computers might be equipped
with different resources. For example a computer might have a printer attached and
another. Computer might have useful programs. Sharing of resource will logically see
that every computer will be able to use all the resources (whether available locally or
not). Resource sharing becomes possible of the computer are connected together. LAN (
Local Area Network ) provide for resource sharing.
COMPUTER CONCEPTS
STRUCTURE
1.0 Introduction
1.1 Objectives
1.2 Need for Computer Literacy
1.3 Computer Capabilities
1.4 Computer Concepts
1.5 A Typical PC Characteristics
1.6 Question/ Answer Key
1.0 INTRODUCTION
No other technology has made such a rapid growth and change in science and
technology in a short duration of time as the computer technology. Computers have a
become a part and parcel of every human beings life. One can imagine the power and
position of computers by looking into the statements " By the year 2099, there will be no
clear distinction between humans and machines, we will have merged". Within the next
20 years, computers will be powerful like our human brain.
Though computers by themselves have no intelligence and do not have the ability to
learn, they have created situations that make us feel as if computers are better than human
beings. In some ways, computers are fast, store large volumes of data and are more
efficient than human beings. Computers are largely self-directing i.e. they have the
ability to follow the set of instructions given to them ( of course, by human
beings!)without human interaction.
OBJECTIVES
After studying this unit you should be able understand computer capabilities,
functional blocks of a computer the difference between data and information, speed and
accuracy capabilities. How data is manipulated.
But over the period the scenario has changed. Millions of computers ranging from
small micro-sized units to super-computers are found in offices, factories, schools,
homes, hospitals, banks, retail stores and almost every where.
By looking at the typical sample examples listed above, the presence of computers in
your daily life cannot be ignored or under estimated.
Computers can have both good and bad effects on the individuals.
Computer applications will expand greatly in the years to come. There will be vast
potential for widespread benefits as well as undesirable side effects. Educated citizens
should not rely solely on computer specialists to prevent the possible dangers and bring
about the positive potential. Rather, citizens should learn about computers so that they
can reap the benefits and they can insist the designers of ill-conceived computer systems
to assume the responsibility for effects these systems have on people.
The following are the areas of knowledge required for computer literacy:
1. Computers themselves: You should understand the organization,
capabilities and limitations of the various machines or hardware that make
up a modern computer system.
2. What computers do: You should be familiar with some of the most
common applications of computers in today's society.
3. How computers are put to work: You need to know the analysis, design
and program preparation procedures that must be carried out in order to
produce software. Basic knowledge of hardware is also very essential.
4. The social impact of computers at work: Finally you should know how
individuals and organizations may be affected by present and future
computer applications.
COMPUTER CAPABILITIES
Most people are aware that a computer is a machine that can perform arithmetic
operations, but it is much more than just an arithmetic number crunching device. It is
also a machine that can choose, copy, move compare and perform various non-arithmetic
operations on many alphabetic, numeric and other symbols that humans use to represent
things. The computer manipulates these symbols in the desired way through a sequence
of instructions, called a program.
A computer works one step at a time. It can add, subtract, compare digits and,
letters, move and copy numbers and letters. There's nothing profound in these
operations. What's significant is the computer speed. This speed is measured as
milliseconds, microseconds, nanoseconds and pico seconds (Recent study says computer
speed is being doubled every six months).
The speed required for computers to execute a basic operation like addition varies
from a few microseconds for the smallest machines to 80 nano seconds or less for the
larger ones.
In addition to being very fast, computers are also very accurate. It is estimated that
you or I would make one error in every 500 to 1,000 operations with a calculator. But the
circuits in a computer require no human interaction between processing operations and
have no mechanical parts to wear out and malfunction. Thus these circuits can perform
hundreds of thousands (or millions) or operations every second and can run errorless for
hours and days together at a time.
Beyond this, computers also have built-in self-checking capabilities that permit them
to monitor the accuracy of their internal operations.
If the input data are correct and relevant, and if the program of processing the
instructions is reliable, then the computer can generally be expected to produce accurate
output. The phrase " Garbage in, Garbage-out" or GIGO is used often by people who
work with computers to illustrate the importance of input data and correct instruction.
The first computers were built to manipulate numbers in order to solve arithmetic
problems. Along with numbers we also use alphabets and different symbols in our daily
life. Luckily, early computer experts made the important discovery that a machine that
can accept, store and process numbers can also manipulate non-numeric symbols.
Manipulating these familiar symbols is possible if an identifying code number is assigned
to the symbol to be stored and processed. Thus, the letter A can be represented by a
code, as can the letter B, the addition symbol and so on. Of course, one must give the
computer instructions for it to manipulate the coded and stored symbols in a desired way.
The word " data" is the plural of datum, which means fact. Data then, are facts or
raw material of information. Data are represented by symbols.
The following schematic representation shows you the processing of raw data to
provide information:
Data processing consists of gathering the raw data input, evaluating and bringing
order to it and placing it in proper perspective so that useful information is produced. All
data processing, whether done by hand or computer system consists or three basic
activities: capturing the input data, manipulating the data and managing the output
results.
the total sales of each department broken down into sales by product type and by
sales person.
Once the data have been captured and manipulated, one or more operations may be
needed.
i) Storing and retrieving: Retaining data for future reference in storing,
storage media such as paper ( in sheet, punched card or punched tape
form), microfilm, or magnatic disks and tapes are generally used.
Recovering stored data and / or information is the retrieving activity. One
slow approach is for people to search file cabinets. A much faster method
is to use electronic enquiry devices that are connected directly to a
computer and mass storage unit containing the data.
ii) Communicating and reproducing: Transferring data from one location
or operation to another for use or for further processing is data
communication a process that continues until information in a usable
form, reaches the final user. Some times of course, its necessary to copy
or duplicate data. This reproduction activity may be done by hand or by
machine.
COMPUTER CONCEPTS
There's nothing new about the data processing steps just stated above. They have
been performed down through the ages, first by hand, then by machine assisted manual
and electromechanical punched card methods and now by computers.
The four functions which follow are all that a computer can perform but they also
include most data processing steps:
i) Input / Output operation: A computer can accept data(input) from and
supply processed data(output) to a wide range of input/ output devices.
Such devices as keyboards and display screens make human - machine
communication possible. Multiple output documents may be reproduced
by printers.
A is
Compared
With B
A<B A>B
A=B
TYPICAL PC CHARACTERISTICS
Some of the major characteristics of a typical personal computer are summarised
below. This should give a glimpse of a desktop computer and introduce you to some of
the terms used with personal computer.
FEATURE TYPICAL BRIEF DESCRIPTION
CPU type 8088, 80286, 80386, 80486, The CPU determines how
Pentium-I, II, III much memory the system
can address, what kind of
software it can run, and
how fast it can go
Bus type PC Bus (8-bit ISA), AT Bus The bus determines what
(16-bit ISA), Proprietary kind expansion circuit
32-bit Micro Channel, boards will work in the
EISA, Local or VESA bus, machine. Most buses are
PC-Card, PCI incompatible with the
others (exception: EISA
bus computers can use ISA
cards), which makes it
important that you know
which kinds of boards
you’re buying
BIOS American Megatrends, Inc BIOS (Basic Input/Output
manufacturer (AMI), IBM, Compaq, System) is the low-level
Phoneix, Award system software that
determines how
compatible your computer
is.
CPU Speed 4.77 MHz (PC speed) upto Megahertz (MHz) is a
200 MHz rough measure of system
speed. All other things
being equal, a 10 MHz
machine is faster than a 5
MHz machine. (All other
things generally aren’t
equal)
Video board Monochrome Adapter The video board affects
(MDA), Color/Graphics what kind of software you
Adapter (CGA), Enhanced can run and how quickly
Graphics Adapter (EGA), data can get on the screen.
Video Graphics Array It can be easily changed,
(VGA) 8514 Adapter, and the oldest PC can use
Extended Graphics Array anything from a
(XGA), Diamond Viper monochrome board up to a
ATI Mach 32. VGA or 8514. Changing
multitasking environments.
Amount of 640K - whatever There are several kinds of
memory memory or RAM (Random
Access Memory)
conventional, extended,
and expanded. They all
solve different problems.
Some software won’t run
without a particular
amount of one or more of
these kinds of memory.
Most PCs come with 64 or
128 MB of RAM.
Answers:
1. Computer 2. Data 3. Sorting 4. Fact
Answers:
1. True 2. False 3. False
COMPUTER SYSTEM
ORGANIZATION
STRUCTURE
2.0 Introduction
2.1 The System Concept
2.2 Organization of Computer System
2.2.1 Input Devices
2.2.2 Central Processing Unit (CPU)
2.2.3 Output Devices
2.3 Computer Limitation
1.1 Classification of Computers
1.2 Question/ Answer Key
INTRODUCTION
Lets take a look at our computer definition. A computer is a fast and accurate
symbol manipulating system that is organized to accept, store, process and produce
results under the direction of a stored program of instructions.
This section explains the computer is a system and how a computer system is
organized. Organization of computers input devices, Keyboard, mouse and classification
of Computers.
The figure above shows the basic organization of computer system. The system
included input, processing and output devices. Let us see each component of the system
in more details.
INPUT DEVICES
Computer systems use many devices for input purposes. Some allow direct human/
machine communication. The keyboard of a workstation connected directly to or online
to a computer: Devices that read data magnetically recorded on specially coated plastic
tapes or floppy plastic disks are popular. Regardless of the type of device used, all are
components for interpretation and communication between people and computer systems.
There are few important input devices which we will learn in details.
Keyboard: Is the most friendly input device through which data programs are keyed
in and certain commands to software can be given from the keyboard.
The keyboard consists key switches there is one key switch for each letter, symbol
number etc. much like a typewriter when a key is pressed, the key switch is activated.
The keyboard has an electronic circuit to determine which key has been pressed. Then
the 8-bit binary code is generated and sent to the computers. The binary code may
be an ASCII ( American Standard Code for Information Interchange), EBCDIC
( Extended Binary Coded - Decimal Interchange Code) or Hex code.
Computer Keyboard
19 Prep. By MOHAMMAD DANISH (Lecturer , CSE Deptt.) AFSET
Remedial Class Notes
Keyboards are classified into two types depending on the number of keys present in
them.
a) Ordinary Keyboard: consists of 86 keys.
b) Extended Keyboards: consists of 101 keys ( Windows ready )
a) Serial Keyboard: It sends the data, bit by bit in a serial fashion and the computer
converts the data into a parallel type.
b) Parallel Keyboard: It sends the data as a byte in parallel form, the bits are sent
simultaneously on different lines( wires).
Mouse: A mouse is a graphical input device the term mouse is used because of its
shape. The mouse has two or three buttons on its top. The function of each button is
defined by the software. The mouse also has a small rotating ball at the bottom. When
the mouse is moved on a rubber pad, the ball rolls whose movement is converted into an
electrical signal and seat to the CPU on the CPU this movement is interpreted and
displayed on the screen of the monitor (CRT) in the form of movement of the arrow mark
. This movement of arrow mark is used to highlight the graphical index on the
screen. When a desired command shown on the screen is approached by the arrow mark
due to the movement of the ball in the mouse the click button is pressed to highlight the
same.
Fig. 3. Mouse
a) The Primary Storage Section: This section is used for four purposes.
1. Data are fed into an input storage area where they are held until ready
to be processed.
2. A working storage space that holds the data being processor and the
intermediate results of such processing.
3. An output storage area holds the finished results of the processing
operations until they can be released.
All calculations are performed and all comparisons (decisions) are made in
the arithmetic – logic section of the unit are temporarily placed in a designated
working storage area until needed at a later time data may thus move from
primary storage to the secondary storage many times before the processing is
finished. Once completed, the final results are released to an output storage
section and from there to an output device.
c) Control Section :
The control section maintains order and directs the operation of the entire
system. Although it does not perform any actual processing on the data, the
control unit acts as a central nervous system for the other components of the
computer. At the beginning of processing, the first program instruction is selected
and fed into the control section from the program storage area. There it is
interpreted, and from their signals are sent to other components to execute the
necessary actions.
OUTPUT DEVICES
Output devices:- Like the input devices, output devices are instruments of
interpretation and communication between humans and the computer system. Printer is
Considered as output device.
All input/output and secondary storage units are sometimes called peripheral devices.
COMPUTER LIMITATIONS
Computers although they are very useful, they have some limitations.
As a machine, the computers does what it's programmed to do and nothing else. This
doesn’t mean that it must be stupid clever programs can be written to direct the
computers to store the results of previous decisions. But a seemingly flawless program
that has operated without a problem for months can suddenly produce non-sense. A
reliable program that’s supplied with incorrect data may also produce non-sense.
The computer can only process applications which can be expressed in a finite
number of steps leading to a previously defined goal. Each step must be specifically and
clearly define, if the steps in the problem solution cannot be precisely stated, the job
cannot be done. The computer may not be of much help to people in areas where
qualitative material or evaluation is important.
For example, The market decision may be of a qualitative nature because sales
volume data may rest on future social, political, technological and economical events.
However, the computer can let the manager know how the product will fare under
assumed price, cost and sales volume condition.
Writing programs is a human task it can be time consuming and expensive. Thus,
non-recurring jobs are often not efficient areas for business data processing applications.
Rather as a general rule its most economical to prepare business programs for large-
volume, repetitive applications such as payrolls that will be used many times.
CLASSIFICATION OF COMPUTERS
Computers are classified by the type of data they are designed to process. Data may
be obtained either as a result of counting or through the use of same measuring
instrument. Data that are obtained by counting are called discrete data, examples of
discrete data are total number of students in a classroom. Data that must be obtained
through measurement are called continuous data. For example, of continuos data are the
speed of an automobile measure by speedometer or the temperature of a patient as
measured by a thermometer.
symbols. Just as digital watches directly count off the seconds and minutes in an hour,
digital processors also count discrete values to achieve the desired output results.
In contrast to digital processors, however, there are also analog machines that do not
compute directly with numbers. They deal with variables that are measured along a
continuo scale and are recorded to some predetermined degree of accuracy. Temperature
for example may be measured to the nearest tenth of a degree on the Celsius scale,
voltage may be measured to the nearest of hundredth of a volt. A service station petrol
pump may contain analog processor.
Analog computers may be accurate to within 0.1 percent of the correct value. But
digital computers can obtain whatever degree of accuracy is required simply by
calculating additional places to the right of the decimal point. For example; A pi(π ) has
a value of 3.1416. Actually the true value of pi is 3.14159.... ( this number could go on
for pages)
Desirable features of analog and digital machines are sometimes combined to create
a hybrid computing system in a hospital intensive-care unit, for example analog devices
may measure a patients heart function, temperature and other vital signs. These
measurements may then be convicted into members and supplied to a digital component
in the system.
MICRO COMPUTERS:
A Micro computer is the smallest general-purpose processing system that can
execute program instructions to perform a wide variety of tasks.
Features:
1. PC is the simplest and cheapest type of computer and it uses an INTEL 8088 (
micro processor chip) as CPU, 640 KB, RAM, 8KB ROM ( ROM can be
extended upto 64 KB) and floppy disk as secondary memory; processing
speed of a PC lies in the range 1-5 MIPS ( micro-instructions per second )
2. PC/XT ( Personal computer extended technology) contains hard disk, floppy
disk drives ( 360/1.2 MB), Intel 8088 CPU, 640 KB RAM and 8 KB ROM.
This is costlier than a PC because of the hard disk it contains. PC/XT is a
single user system. Processing speed of a PC lies in the range 1-5 MIPS and
hard disk capacity lies in the range 20-80 MB.
3. PC/AT (Personal computer advanced technology) contains. Intel 80286 as
CPU, 640 KB RAM (expandable to 4 MB), 64 KB ROM (expandable to 128
KB), hard disk drive and floppy disk drive (360 KB/1.2 MB), its CPU is
powerful than the CPU of PC/XT and four to five terminals can be connected
to it to make it multiuser. Processing speed of PC/AT lies in the range 1-5
MIPS and hard disk capacity lies in the range 20-80 MB.
4. Super AT( or super micros) uses a 32-bit CPU, Intel 80386 & 80486. The
RAM capacity of super macros lies in the range 2-8 MB in 80386 CPU can be
extended upto 32 MB and in case of 80486 upto 64 MB. The hard disk
capacity of super macro lies in the range 200 –800 MB. The processor speed
of 80386 CPU lies in the range 3-5 MIPS and that of 80486 CPU is 12 MIPS
to 25 MHz clock UNIX is used as operating system.
MINI COMPUTERS:
The salient features are:-
1. The word length is 32 bits and their processing speed lies in the range 10-30
MIPS.
2. RAM capacity lies in the range 8 MB – 96 MB ( in same it can be extended
upto 128-256 MB)
3. The hard disk capacity lies in the range 380 MB – 2GB ( gig bytes)
4. Most mini-computers use Motorola 68030 and 68040 CPU.
The Minicomputers which are faster and more powerful than microcomputers can
support upped 64 or even 100 terminals and some minicomputers are Uni. Processor and
some others are multi processor systems. These are used for payroll preparation and
scientific computation, multi-user and interactive applications in college universities
research organizations, industries, sophisticated real time(industrial) control, interactive
engineering design work etc..
IBMAS/400/B60
MAIN-FRAME COMPUTERS:-
The mainframe computers are faster and more powerful than mini computers. These
computers are used where large amount of data are to be processed or very complex
calculations are to be made and these tasks are beyond the computing capacity of mini
computers.
SUPERCOMPUTERS:
The salient features are:
1. Their word length is 64-96 bits; memory capacity is 256 MB & more; hard
disk capacity 1000 MB and more
2. Processing speed lies in the range of 400 MIPS – 10000 MIPS. In a single
machine cycle tow 64 – bit data can be added
Super computers are much faster and more powerful than mainframe computers.
Super computers are specially designed to maximize the number of FLOPS ( Floating
Point Operations Per Second). Their FLOPS rating is usually more than igiga flops per
second. A super computer contains a number of CPU’s which operate in parallel and
make it faster. They are used for massive data processing & solving very sophisticated
problems.
They are used for weather forecasting weapons research and development, rocket
launching, seismology, atomic, nuclear and plasnia physics.
Example:-
Configuration.
4. CRAY XMP/14 is a minicomputer
Answers :
1. False 2. False 3. True 4. False
SOFTWARE
STRUCTURE
3.0 Introduction
3.1 Software
3.1.1 System Software
3.1.2 Application Software
3.2 Machine Language
3.3 Assembly Language
3.4 High Level Language
3.5 Question/ Answer Key
INTRODUCTION
Software is a set of instructions to perform a task. Hardware is an electrical or
electromechanical components of a computer. Software and hardware plays an important
role for a computer. This unit discusses software and types of languages used on a
computer.
SOFTWARE
Software is defined as a set of programs that activate the hardware of the computer.
A program is nothing but as sequence of instructions where each instruction is a
command given to the computer to perform a certain specified operation or given data.
SYSTEM SOFTWARE
It is a collection of programs executed as needed to perform functions such as:
i) Receiving and interpreting user commands.
ii) Entering and editing applications programs and storing them as files in
secondary storage.
iii) Controlling I/O units to receive input information and produce output
results.
iv) Translating programs from source from entered by the user into object
from consisting of machine instructions.
v) Linking and running user – written applications programs with
standard routines that exist on the system.
APPLICATION SOFTWARE
Application software is the software that has been written to processor perform a
specific job.
MACHINE LANGUAGE
A computer understands information composed of only zeros and ones hence it uses
binary digits for its operation. A program written in the form of 0’s and 1’s is called
machine language program. There is a specific binary code for each instruction. For eg:
to add the contents of register A and register B, the binary code is 10000000 for Intel
8085 microprocessors. The binary code for certain operations differs from computer to
computer.
ASSEMBLY LANGUAGE
Writing programs in machine language is very difficult, tiresome and boring job for
a programmer, it is error phone. To solve this problem and to facilitate programmer
easily understandable languages have been developed. Assembly language is one of
them. Programs can easily be written in alphanumeric symbols instead of Zeros & Ones
meaningful and easily remarkable symbols are selected for this purpose.
Example: ADD, for addition, SUB for subtraction CMP for comparison.
Assembler
A program which translates an assembly language program into a machine language
program is called an assembler.
Assembly language Assembler Machine language
(Source Program) (Object program)
Disadvantages
1. Programming is difficult and time consuming
2. The assembly language is machine oriented i.e the programmer must have the
knowledge of the hardware of the computer
3. The program written in assembly language for one computer cannot be run on
another computer
The instructions written in high level language are called statements. The statements
more clearly resemble English Mathematics as compared to mnemonics.
Example:
Many high level languages have been developed, some are for general purpose and
some for special purposes.
Example:
PASCAL, PL/1, ADA AND C are general purpose languages.
COBOL is for business purposes
PROLOG is for logical reasoning
BASIC for new comers
SNOBOL for text processing
COMPILER
A program which translates high-level languages into a machine language program is
called compiler. For example, WATFOR (FORTRAN compiler), TURBO PASCAL
compiler.
INTERPRETER
An interpreter is a program which translates statements of a high level language
program into machine code.
In translates one statement of the program at a time. It reads one statement of a high-
level language program translates it into machine code and executes it. Then it goes to
the next statement.On the other hand a compiler translates the whole program into
machine code-
(Source (Object
Program) program)
Answers :
PRINTERS
STRUCTURE
4.0 Introduction
4.1 Objectives
4.2 Printers
INTRODUCTION
This deals with computer hardware that are used for outputing data from a computer
and it also introduces various types of printers.
OBJECTIVES
The objectives of this unit are
PRINTERS
34 Prep. By MOHAMMAD DANISH (Lecturer , CSE Deptt.) AFSET
Remedial Class Notes
One of the most convenient and useful methods by which the computer can deliver a
hard copy is by means of printing. For the sake of convenience, the printer should have
the ability to print alphabetic character, decimal digits, and common punctuation marks
etc..
Functions of a Printer
The printer receives data characters from the computer and prints the characters on
the paper. In addition, the printer also receives control characters from the computer.
These control characters are not printable characters. They convey some sort of control
information to the printer ( bold, italic underline etc.). Some of the control characters
widely used are:
CR (Carriage Return) : Specifies that the pointer head carriage should return to the
first print column. Any subsequent data character received will be printed starting from
the first column.
LF (Line Feed): informs the printer to skip one line on the paper.
FF (Form Feed): Instructs the printer to skip the paper to the beginning of the next
page or form. In addition to these the printer has to send acknowledging signal back to
the computer indicating the status.
TYPES OF PRINTERS
35 Prep. By MOHAMMAD DANISH (Lecturer , CSE Deptt.) AFSET
Remedial Class Notes
There are several types of printers that are designed for different types of
mechanisms based on the approach of printing and speed; printers may be classified as:
1. Character printers
2. Line printers
3. Page printers
2. Non-impact printers
Impact printers: The printers which use the familiar type written approach of
hammering a typeface against paper and inked ribbon are called impact printers.
Non-impact printers: The printers which do not hit or impact a ribbon to print, are
called non-impact printer such printer uses thermal, electrostatic, chemical and inkjet
technologies.
Character printers: This category of printers generally functions in the same way
as a typewriter. There are many types of character printers some of them are:
Daisy-wheel printers: In daisy–wheel printer the raised letters are attached at the
ends of spokes of a wheel. A motor spins the wheel at a rapid rate. The wheel is rotated
until the desired letter is in position over the paper and then solenoid-driven hammer hits
the ‘spoke’ against the ribbon to print the letter. The daisy-wheel printers are impact
printers. The advantages of the daisy-wheel printers are high print quality,
interchangeable fonts and print speed upto 55 characters per second. However the print
quality is not as good as that produced by the spinning golf ball.
Drum printers:-
A drum type printer consists of a rapidly spinning drum which has a complete raised
character set constructed around it for each character position across the paper.
Each band contains all the possible characters, Magnetically driven hammers are
provided in each character position to hit the paper and ribbon against the spinning drum
for printing the desired characters. An entire line of characters can be printed during each
rotation of the drum.
With the help of the drum printer upto 2000 lines/min can be printed. The quality of
printing is not good and there is also high noise pollution.
Chain printers:
Each link of the print chain is a character's font. For printing a character, a print
hammer is located behind the paper. As the print chain rotates, the properly timed
hammers strike the paper and the ribbon together against the desired character set several
times on the chain, the speed of chain printers can be improved. Speed of chain printers
reaches up to 2500 characters per minute.
A dot-matrix printers each character as a pattern of dots. The print head comprises a
matrix of tiny needles having seven rows with nine needles in each row. The tiny needles
hammer out the characters in the form of patterns of tiny dots. The print needles are
arranged in a vertical column so that characters are printed out one dot column at a time
as the print head is moved across the line. The quality of the print is not so good.
However the quality of printing can be improved by printing a line twice with the dots for
the second printing offset slightly from those of the first. Print speed of dot matrix impact
printers is max of 350 cps.
Page printers: The page printers are non-impact printers having speeds over 20,000
lines per minute. The technique called Electro-photographic technique is developed from
the paper copier technology. The important type of page printers are:
1. Electromagnetic printers:
The magnetic recording technique is used in this type of printers. A
magnetic image of the matter to be printed is written on a drum surface.
The surface of the drum is then passed through magnetic powder which
adheres only to the charged areas. This powdered surface is now pressed
Answers: I
1(d) 2(d) 3(d) 4(a) 5(a)
II
1)False 2) True 3) True 4) True 5) True
MEMORY
STRUCTURE
5.0 Introduction
5.1 Objectives
5.4 UPS
INTRODUCTION
OBJECTIVES
• To introduce devices for storing information ( Volatile and Non-volatile )
• UPS provides the back up during power failure
TYPES OF MEMORY
The memory is used for storing information. It is classified into two groups
1) Primary memory and
2) Secondary memory
storage unit. Each location or word has a built in and unique number assigned to it. This
number which is used to identify the location, is called the address of the location.
The primary memory actually functions when the computer operates and is
present in the computer in two different forms RAM & ROM.
The facility of read/write from a RAM chip entitles it to call read/write memory.
When the power is switched off, the information stored in RAM is lost.
Cache Memory: A very high speed memory used to increase the speed of
processing is employed between CPU and main memory whose access time is close to
the processing speed of the CPU. This type of memory is called a high-speed buffer or
cache memory. However, cache memory is not addressable by the user of the computer
system.
Cache memory makes the main memory of the computer appear to be faster and
larger than what it really is. The cache memory is normally very small due to its high
cost of construction; cache memory improves the memory transfer rate and also increases
the processor space.
ACCESSING METHODS
The memory of a computer is not actually concentrated in one place, Storage
devices are scattered throughout the machine. For instance, the operation registers are
flip flop registers which are used in the arithmetic and control units of the computer.
The storage devices are used to introduce information to the computer from the “
outside world” and to store results from the computer. The procedures for locating
information may be divided into two classes:
A random access storage devices : is one in which any location in the device may
be selected at random access to the information stored in direct and approximately equal
access time is required for each location.
A sequential access storage device: is one in which the arrival at the location
desired may be preceded by sequencing through other locations, so that access time
varies according to location.
For example, If we try to read a word stored on a real of magnetic type and the piece of
tape on which the word is stored is near the center of the reel, it is necessary to sequence
through all the intervening tape before the word can be read.
Another way to subdivide storage devices is according to whether they are static or
dynamic
A static storage: is one in which the information does not change position example
flip flop, tape are of static storage devices.
Each row represents one character. The maximum numbers of holes per row is
known as number of channels on the tape. An eight-channel tape is generally used in
computers.
A line of sprocket holes in the middle of the tape is provided for the purpose of
feeding the tape through the tape punching and reading device.
Disadvantages
Advantages
Magnetic tape:
This is most popular storage device for large data that are sequentially accessed and
processed magnetic tape is a half-inch (1.27-cm) wide plastic ribbon, which is coated on
the side with an iron oxide material which can be magnetized. The tape ribbon is housed
in a cassette. The computer tape can be erased and reused indefinitely. The stored data
on the tape gets automatically erased as and when fresh data, is recorded in the same area
of the tape.
Data transfer rate: The product of tape density and tape speed is known as the data
transfer rate of the magnetic tape. The number of frames per inch length of the tape is
called tape density. The tape density of a magnetic tape is expressed in characters per
inch (CPI) or bytes per inch. The tape speed is measured in inches per sec. Data transfer
rate of a magnetic tape may even exceed 1 million bytes per second.
1. As magnetic tape is a sequential access devices, the data recorded on tape can
not be addressed directly. The data item at the end of the tape will require
abnormal access time because all the characters before the data item need by
processed. This is why magnetic tape device is not found suitable in case data
is frequently required to be accessed at random.
2. It is not possible to interpret, the stored data to know the content of the
information.
3. Dust free environment is needed for magnetic tapes and the reel containers.
a) Tape Cassettes: A high quality digital cassette similar in appearance to the home
cassettes.
b) Cartridges: The large cassette which contains long strips of magnetic tape is called
cartridge. It is very convenient to mount the tape there is proper protection against
dirt and contamination.
Both cassettes and cartridges have low data transfer rate, i,e , less than 10,000
bytes/sec.
Magnetic Disk: It is a thin, circular metal coated on both sides with a magnetic
material similar to a gramophone record. A number of magnetic disks mounted about
half-an-inch apart from each other on a central shaft which may rotate at speed of 2400 or
more revolutions per minute (RPM), consists a disk pack. Magnetic disk packs are the
most popular medium for direct access secondary storage.
Information is stored on both sides of the disks except the upper surface of the top
disk and lower surface of the lower disk. Each face of the disk is divided into a number
of invisible concentric circles called tracks. A set of corresponding tracks in all the
surfaces is called a cylinder. Each track is sub divided into sectors.
The information stored on a disk can be read a number of items and reading
operation is non-destructive. To write a new data, the previously stored data has to be
erased. The storage capacity of a disk pack primarily depends on the number of disks it
contains. The storage capacity also depends on the track per inch of surface and the
number of bits per inch of track.
Magnetic Drum: Magnetic drum is also a direct access storage device that can be
used for both sequential and random processing. It is basically a cylinder with a
magnetizable outer surface. A motor rotates the cylinder on its axis at a rapid speed but
constant rate. The surface of the drum is divided onto a number of tracks upon which
data is stored as magnetized spots similar to that of a disk. Data is stored on the
magnetizable surface of the cylinder as minute magnetized spots arranged in binary form
in the series of parallel circular tracks. Recording of data on the rotating drum and
reading data from the drum is achieved by a set of secondary read/write heads positioned
very near to the drum surface. Writing a new data on the drum erases the previously
stored data simultaneously at that location. Data once recorded on the drum remains
intact until it is erased.
The drum rotates at a speed of few hundred to few thousand rotations per minute
and its access times is fast. Random access is possible to select any particular track of the
drum but once this track is identified, the data is recorded or retrieved sequentially. To
reduce the access time, sometime heads are divided into two sets. Heads are positioned
diametrically opposite i.e for a drum of 20 track 40 heads are provided.
As compared to magnetic disks, data transfer rates are faster. Due to limited storage
capacity, use of magnetic drum storage is on decline.
Winchester Disk: Winchester disk are also used as a storage device. In this unit,
disks are permanently housed and hermetically sealed in contamination free containers.
The disks are coated with a special lubricant which minimizes the friction between the
read/write heads and the disk surface .Computers using these sealed housings are said to
employ Winchester technology. The Winchester technology enables greater precision of
alignment, an increase in the number of tracks on the disk surface and a higher storage
density per track.
Winchester disks are fast and highly valuable and low priced compared with
conventional hard disk drives. They are available in sizes varying form 5.25” to 14” in
diameter and there capacities are 10,12 and 20 megabytes. Dual disk drive doubles the
capacity. Winchester disks are used in large computers.
Floppy Disk: A floppy disk is a circular Mylar disk coated and magnetically
sensitive film. Since the thickness of the Mylar disk is only a few thousandth of an inch
it is named as floppy. The floppy diskette is coated with a magnetic material and enclosed
in a protective jacket. The floppy disks are used for backup of files and to transfer files
from one computer to another computer
If only one side of the diskette is used to store information such a diskette is called as
a single sided disk. If both the side of the diskette is used to store information such a
diskette is called as a double-sided disk.
The diskette surface is logically divided into a fixed number of tracks (concentric
circles). Data can be read and written on the specified tracks and not in between the
tracks. Each track is divided into a number of sectors. The number of sectors in a track
depends on the size.
Users label
Clamping hole
Index hole
Head slot
The outermost track is numbered as track 0. The subsequent tracks are numbered
sequentially. The Index hole is used as a reference point to indicate the beginning of a
track.
There is a facility to use a diskette only for reading previously stored information
and to prevent any attempt to write new information on it through the write protect notch.
If this notch is open writing on the diskette is permitted.
There are two basic types of UPS in modern use. The first, known as 'Off-line',
passes through incoming mains power to the output sockets while the supply is good. It
monitors the line constantly for a major voltage drop that signifies power failure. It then
switches on it's inverter (the part that produces output alternating current from it's battery)
and supplies output power until the mains voltage has been restored and is stable for a
period of time. There is by definition a momentary power loss during switchover, but
typically of around five milliseconds, which is insignificant to most loads. According to
how much you pay for your UPS, you may get some conditioning of the mains power
that is passed through under normal conditions, and you may get a genuine sine-wave
output as opposed to the square-wave or trapezoidal wave that you will find on the
cheaper products.
The second type is known as an 'On-line' design because it's inverter is 'on-line'
permanently. In this design, all the incoming power is always converted to direct current,
which both tops up the batteries and feeds the inverter. The inverter is constantly
producing fresh alternating current to supply the load. When the mains goes off, the
batteries are still holding up the incoming DC supply to the inverter, so the load continues
to be supplied with absolutely no break whatsoever. The inverter is a constant-duty
inverter, so this costs a little more. In any reputable on-line UPS, there is also a fail-safe
mechanism known as a 'Static Bypass' which on detecting failure in the inverter will
throw the load on the mercy of the mains supply, rather than letting it drop altogether.
This design inherently cleans the supply by virtue of reducing it to DC, then reconverting
it to fresh AC.
UPSs above 5KVA in size are almost universally on-line in design. It is difficult to
produce an on-line economically below around 600VA, so most UPSs below this size
are off-line.
Better UPSs of both designs will crop high incoming voltages and step-up low
incoming voltages without resorting to battery. When these are off-line units they are
called 'line-interactive' devices - they are nonetheless fundamentally off-line devices.
Almost all UPSs in their standard form will provide between five and ten minutes
supply at full load. As a very rough estimate you can say that they will usually supply ten
to twenty minutes supply at half load. Some UPS have a facility for extended batteries.
Most on-line do, most off-line don't, but that's very general and you'll find both which
can support extended batteries. When considering UPS that support extra batteries, look
for extension battery cabinets that incorporate battery chargers, otherwise you get a small
charger that can't cope properly with a vast battery bank.
At a certain point, depending on manufacturer and size, you'll find it becomes more
cost-effective to revert to a 10-minute UPS and a generator fitted with mains-failure
autostart. This then gives you an effectively unlimited run time.
1. The amount of data that can be stored in the storage unit is called the storage
capacity.
2. The small storage areas in the storage are called location.
3. Primary storage is generally refereed to as RAM
4. The information stored inside a ROM gets lost when the power supply is switched off
5. In sequential access device, access time for all locations is same
6. Magnetic disk and magnetic drum are typical sequential access storage devices
7. Magnetic tape is the most suitable storage media for random access secondary storage
8. Floppy disks are popular external storage media used with small computers
9. Each character is represented on a column by a set of holes punched in various rows
10. Winchester disks are permanently housed in sealed, contamination-free containers.
Answers:
I 1(a) 2(c) 3(d) 4(a) 5(c)
II 1)True 2)True 3)True 4)False 5)False
6)False 7)False 8)True 9)True 10)True
NETWORKS AND
MULTIMEDIA
STRUCTURE
6.0 Introduction
6.1 Objectives
6.2 Local Area Network (LAN)
6.3 Multimedia
6.4 Client Server Paradigm
6.5 Modem
6.6 Check your progress
Introduction
This deals with communication between different computers .Computer networking
(connecting computers) allows for sharing of resources such as data and peripheral
devices. Several topologies of computer networks is also presented.
Objectives
• To understand how resources (data and peripherals ) can be shared by
networking
• To understand how different services can be provided through
client/server approach
• To show how the digital and the analog worlds can be bridged through
MODEM
• How multimedia kit adds multimedia capabilities to a compute
If you have two or more people that routinely need to easily share information and
resources you are a candidate to install a LAN, Although LAN’s add a level of
complexity to an office computer environment, the payback in productivity can make it
well worth the effort.
Simply put, a LAN allows you to share resources, Instead of attaching a printer to
each machine in your office, across a LAN you can share a single printer, Files that
everyone in the office needs to access frequently can be kept on the central disk drive,
and a backup routine can be implemented to ensure that these central files can be
retrieved in case of trouble, with the appropriate software, a single internet connection
can be shared by all machines on the LAN to gain access to email and the Web, LAN’s
can reduce the amount of money you spend on extra equipment and associated costs, and
can help improve the way people in your office use and share information.
NETWORK TOPOLOGY:
The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements
of a network.
1. Bus topology: A network topology in which all nodes, i.e., stations are connected
together by a single bus.
2. Fully connected topology: A network topology in which there is a direct path
(branch) between any to nodes. Note: In a fully connected network with n nodes,
there are n (n-1)/2 direct paths.
3. Mesh topology: A network topology in which there are at least two nodes with two
or more paths between them.
4. Ring topology: A network topology in which every node has exactly two branches
connected to it.
5. Star topology: A network topology in which peripheral nodes are connected to a
central node, which rebroadcasts all transmissions received from any peripheral node
to all peripheral nodes on the network, including the originating node. Note1: All
peripherals nodes may thus communicate with all others i.e., channel, linking any
peripheral node to the central node only. Note2: The failure of a transmission line,
i.e., channel, linking any peripheral node to the central node will result in the isolation
of that peripheral node from all others. Note3: If the star central node is passive, the
originating node must be able to tolerate the reception of an echo of its own
transmission, delayed by the two-way transmission time
6. Tree topology: A network topology that, from a purely topologic viewpoint,
resembles an interconnection of star networks in that individual peripheral nodes are
required to transmit to and receive from one other node only, toward a central node,
and are not required to act as repeaters or regenerators.
Token ring
Typically, a suite of application programs can be kept on the LAN server, Users who
an application need frequently can download it once and then run it from their local hard
disk. Users can order printing and other services as needed through applications run on
the LAN server. A user can share files with others at the LAN server, read and write
access is maintained by a LAN administrator.
Ethernet:
Ethernet is the most widely-installed local area network (LAN) technology.
Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox and
then developed further by Xerox, DE C, and Intel. An Ethernet LAN typically uses
coaxial cable or special grades of twisted pair wires. The most commonly installed
Ethernet system are called 10base-T and provided transmission speeds up to 10 MBPS.
Devices are connected to the cable and compete for access using a Carrier Sense Multiple
Access with Collision Detection (CSMA/CD) protocol.
Token ring:
A token ring network is a local area network (LAN) in which all computers are
connected in a ring or star topology and a binary digit-or token-passing scheme is used in
order to prevent the collision of data between two computers that want to send messages
at the same time. The token ring protocol is the second most widely used protocol on
local area networks after Ethernet. The IBM Token Ring protocol led to a standard
version specified as IEEE 802.5. Both protocols are used and are very similar. The IEEE
802.5 token ring technology provides for data transfer rates of either 4 or 16 megabits per
second.
When a computer has a message to send, it inserts a token in an empty frame ( this
may consist of simply changing a 0 to a 1 in the token bit part of the frame) and inserts a
message and a destination identifier in the frame. The frame is then examined by each
successive workstation. If the workstation sees that it is the destination for the message,
it copies the message from the frame and changes the token back to 0. When the frame
gets back to the originator, it sees that the token has been changed to 0 and that the
message has been copied and received. It removes the message from the frame.
The token scheme can also be used with bus topology LANs
The standard for the token ring protocol is Institute of Electrical and Electronics
Engineers (IEEE) 802.5. The Fiber Distributed –Data Interface (FDDI) also uses a token
ring protocol.
Multimedia
A package of hardware and software that adds multimedia capabilities to a computer.
Typically a multimedia kit includes a CD-ROM or DVD player, a soundcard, speakers,
and a bundle of CD-ROMs.
To play a multimedia CD-ROM disc you need to have a suitable computer and a CD-
ROM drive. Nearly all latest computers will have built-in CD-ROM drive. You can buy
an external drive for as little as Rs2,500.
CD-ROM is very flexible, and all the material is stored in digital form. That is, the
text, pictures, sound and animation. These are called assets and once they are created it is
very simple to use them in different situations and in different multimedia products.
Essentially the same assets can be used to produce point-of-sale material, a training
package or a corporate presentation. Many of the assets can be also made available on
the Internet.
Multimedia is increasingly used in catalogue and training packages and has already
established itself as an important medium that is growing at quite a pace. It will certainly
replace a lot of written material in the next few years. Whether it will eventually replace
books only time will tell.
Multimedia is one of the most powerful ways to get your message across. The
opportunities are many; point-of-sale material, service manuals, training packages, for
staff or franchisees, direct mail packages, a new product launch, a product catalogue or
an annual report-presentations of all kinds.
Multimedia is much easier than a video to update. The new information can be
incorporated very easily. For example old product lines can be dropped and new added.
It is ideal in toady's changing markets.
The client/server model has become one of the central ideas of network computing.
Most business applications being written today use the client/server model. So does the
Internet’s main program, TCP/IP. In marketing, the term has been used to distinguish
distributed computing by smaller dispersed computers from the “monolithic” centralized
computing of mainframe computers. But this distinction has largely disappeared as
mainframes and their applications have also turned to the client/server model and become
part of network computing.
In the usual client/server model, one server, sometimes called a daemon, is activated
and awaits client requests. Typically, multiple client programs share the services of a
common server program. Both client programs and server programs are often part of a
larger program or application. Relative to the Internet, your Web browser is a client
program that requests services (the sending of Web pages or files) from a Web server
(which technically is called a Hypertext Transport Protocol or Hypertext Transfer
Server Process:
A server process (program) fulfills the client request by performing the task
requested. Server programs generally receive requests from client programs, execute
database retrieval and updates, and manage data integrity and dispatch responses to client
requests. Sometimes server programs execute common or complex business logic. The
server-based process “may” run on another machine on the network. This server could
be the host operating system or network file server; the server is then provided both file
system services and application services. Or in some cases, another desktop machine
provides the application services. The server process acts as a software engine that
manages shared resources such as databases, printers, communication links or high
powered-processors. The server process performs the back-end tasks that are common to
similar applications.
Client Process:
The client is a process (program) that sends a message to a server process (program),
requesting that the server perform a task (service). Client programs usually manage the
user-interface portion of the application, validate data entered by the user, dispatch
requests to server programs, and sometimes execute business logic. The client-based
process is the front-end of the application that the user sees and interacts with. The client
process contains solution-specific logic and provides the interface between the user and
the rest of the application system. The client process also manages the local resources
that the user interacts with such as the monitor, keyboard, workstation CPU and
peripherals. One of the key elements of a client workstation is the graphical user
interface (GUI). Normally a part of operating system i.e. the window manager detects
user actions, manages the windows on the display and displays the data in.
The different types of servers are, the simplest form of servers are disk servers and
file servers. With a file server, the client passes requests for files or file records over a
network to the file server. This form of data service requires large bandwidth and can
slow a network with many users down considerably. Traditional LAN computing allows
users to share resources, such as data files and peripheral devices, by moving them from
standalone PC’s onto a Networked File Server(NFS). The more advanced form of
servers are database servers, transaction server and application servers( Orfali and Harkey
1992). In database servers, clients passes SQL ( Structured Query Language) requests as
messages to the server and the results of the query are returned over the network. The
code that processes the SQL request and the data resides on the server allowing it to use
its own processing power to find the requested data, rather than pass all the records back
to a client and let it find its own data as was the case for the file server. In transaction
servers, clients invoke remote procedures that reside on servers which also contains an
SQL database engine. There are procedural statements on the server to execute a group
of SQL statements ( transactions) which either all succeed or fail as a unit. The
applications based on transaction servers are called On-line Transaction Processing
(OLTP) and tend to be mission-critical applications which require 1-3 second response
time, 100% of the time and require tight controls over the security and integrity of the
MODEM
The word MODEM is an acronym for Modulator – Demodulator, Modems accept
digital data supplied by the local PC, and convert it to a modulated analog wave form that
can be transmitted over a normal analog phone line. And conversely, modems also
accept a modulated analog wave from the telephone line convert it to a digital form, and
pass it on to the local PC.
A 28,800 or 33,600 BPS modem can send data over a phone line up to fourteen times
faster than a 2400 BPS modem, and a 56k modem over twenty times faster couple this
with the built-in data compression ability of modern high speed modems which will
compress ordinary text data by about 2:1, and some types of data by up to 4:1, and you
can see that throughput can be 25 to 50 times greater (or more!) than for a 2400 BPS
modem. This tremendous increase in speed can dramatically decrease your online time
and your phone charges, and makes it feasible to transfer graphics screens such as WWW
pages in time acceptable to most users.
CD is an acronym for compact disc.
CD Audio
CD-ROM (Compact Disc-Read only memory)
CD-I (Compact Disc-Interactive) and
CD-RAM/XA (CD-ROM Extended Architecture)
moment. Once the clear piece of polycarbonate is formed, a thin, reflective aluminum
layer is sputtered onto the disc, covering the bumps. Then a thin acrylic layer is sprayed
over the aluminum to protect it. The label s then printed on to the acrylic.
A CD has a single spiral track of data, circling from the inside of the disc to the
outside. The fact that the spiral track starts at the centre means that the CD can be
smaller than 12 centimeters if desired, and in fact there are now plastic baseball cards and
business cards that you can put in a CD player. CD business cards hold about 2
megabytes of data before the size and shape of the card cuts off the spiral.
CD-ROM: The compact disk read only memory is an optical disk memory device. It
is a read-only storage medium. It is a cheaper storage medium that stores upto 650MB of
data.
The speed with which CD-ROM rotates is constantly varies, so that at any radial
position of detector, the track has same speed. The advantages of CD-ROM’s are its high
storage capacity, mass copy of information stored, removable from the computer etc..
The main disadvantage is longer access time as compared to that of a magnetic hard
disk. Data can not be written into it because it is a read only memory. It is suitable only
for storing information that need not be changed.