TU BBA 1st Semester Computer Full Note PDF
TU BBA 1st Semester Computer Full Note PDF
TU BBA 1st Semester Computer Full Note PDF
Online service is a business that provides access to the Internet, a global computer
network, and also offers a wide range of content not available on the Internet. This
content includes news, databases and software, games, and electronic publications.
Computer users subscribe to online services and pay a fee for use. The services charge
additional fees for the use of certain content. Online services also sell advertising space.
Online services provide e-mail (electronic mail) features, including individual customer
addresses and software that sends, receives, and stores messages. Subscribers can use
bulletin boards to post or read messages on various topics. In chat rooms, individuals
can discuss shared interests by exchanging messages instantly. Most services have
technical experts available online or by telephone to help subscribers solve problems
they encounter in using the service.
The Internet also serves as a distribution system for e-books (electronic books).
An e-book consists of digital files formatted so that when a reader downloads
(transfers) them to a special handheld device-or to a computer with special
software-the words and pictures appear much as they would on a printed page.
A customer can buy e-books at the publisher's Web site or at a site owned by a
bookstore. Some electronic library sites include text-only e-books. These e-books
can be viewed without the use of special devices or software.
Business transactions. Many companies use the Internet to carry out business
transactions commonly referred to as e-commerce. Retailers sell nearly every
type of product over the Internet. Users generally pay for such purchases with
credit cards. Software publishers view the Net as a convenient and inexpensive
way to distribute their products. Over the Internet, users can buy new computer
programs, sample programs before purchasing them, or receive upgrades to
programs they already own. Music publishers sell copies of songs as
downloadable digital files. Transactions between companies and consumers are
commonly known as B2C (business to consumer) transactions. Additionally,
many companies use the Internet to engage in B2B (business to business)
transactions. By linking together in a vast network, buyers and sellers can share
Downloaded from www.edusanjal.com
information, keep track of inventories, assess needs, and compare products far
more efficiently than they could using traditional business communications.
The Internet has important uses within the financial community. Many banks
and stockbrokers offer their customers software to make and track investments
from their computer. Consumers can use similar software to pay many types of
bills. Individuals can also file tax returns and pay taxes over the Internet.
Economic transactions over the Internet use encryption technology to protect
the privacy and security of the users.
A popular type of Internet business is the online auction. Online auctions enable
people to post descriptions of items they wish to sell, along with a suggested
opening bid. Visitors to the auction site may place a bid on any posted item.
Consumer auction sites offer almost every imaginable type of item. But most
forbid the sale of dangerous or illegal materials. Business auction sites, also
called trading exchanges, have captured a large share of B2B transactions. Such
sites may, for example, offer manufacturers the chance to bid on raw materials.
How the Internet works Computer networks enable computers to communicate and
share information and resources. The simplest networks consist of a user's computer,
known as the client, and a server. The client makes requests of the server, which, in
turn, provides the requested resources, such as information or software. The Internet
works in much the same way, on a far vaster scale. To connect to the Net, a user logs on
by instructing his or her computer's communications software to contact the ISP or
online service. To protect the user's security, this process usually requires a secret
password. The Internet was built around telephone connections that were, for the most
part, the same as those used for voice communications. But the ever-increasing volume
of Internet traffic, and the large size of video and sound files, require faster
communications links. High-speed links, often called broadband connections, can deliver
large amounts of information more quickly than traditional telephone lines can. Among
the most common broadband connections are
(1) cable television connections,
(2) fiber-optic telephone lines, (
Downloaded from www.edusanjal.com
3) ISDN (integrated services digital network) and DSL (digital subscriber line), and
(4) satellite connections. Cable television connections use the same cables that deliver
television signals to carry Internet traffic. They require the use of a special cable
modem. Fiber-optic telephone lines employ thin, high-capacity fibers to transmit vast
amounts of information as patterns of light. ISDN and DSL use new technologies to
increase the information-carrying capacity of traditional copper phone lines. Satellite
connections use wireless communications with orbiting satellites. They enable people to
use the Internet even in locations with no land-based communications lines.
Once connected to the ISP or online service, the user has several options. The user's
communications software alone may provide access to such functions as e-mail and
newsgroups. Most such software also includes a simple word processing program that
enables a user to compose, revise, or read messages. A piece of software known as a
browser enables a user to gain access to millions of Web sites. Each site has a separate
electronic address, known as a uniform resource locator (URL). Many search engines
and other programs throughout the Internet maintain and constantly update directories
of addresses.
The addresses themselves are organized into various top level domains (major
categories). In a URL, the top level domain takes the form of a of an extension of two or
more letters, such as .ca for Canada, .com for commercial, .edu for educational, or
.museum for museum. An organization called The Internet Corporation for Assigned
Names and Numbers (ICANN) coordinates the assignment of top level domains. In the
United States, a domain name includes a top level domain and a second level domain. In
the domain name worldbook.com, for example, world book is the second level domain.
By typing an address, or by clicking on a link, a user transmits a request through the ISP
or online service and onto the larger Internet. When the request arrives at the desired
destination, the server responds by sending the user the requested information. This
information is often in the form of a starting page called a home page, which often
resembles the table of contents of a book or magazine. From a home page, the user can
search for further information by using links to other pages within the same Web site or
to other Web sites. Most browsers include systems for bookmarking (recording) the
addresses of favorite or frequently visited sites. A user who has bookmarked a site
simply clicks on the appropriate bookmark to visit the site again. Many individuals
maintain personal Web sites under domain names that include their own names.
Several companies register domain names. Many ISP's and online services also register
domain names for their customers for an added charge. Many files, especially
illustration, motion-picture, and sound files, travel over the Internet in compressed
form. One compression technique stores data that represent a less precise version of an
image or sound than the original file does. Another technique saves space by removing
Downloaded from www.edusanjal.com
image or sound data that are repeated, then merging all the repeated sections together
into a separate file. When the original file is decompressed, the repeated sections return
to their proper places.
Many parents worry about violent or pornographic material available on the Net.
Criminals may lurk in chat rooms, seeking to arrange face-to-face meetings with
unsuspecting victims. Special programs known as parental control software, also
called Internet filters, can help parents restrict access to sites that may be
unsuitable for children.
In the United States, the Children's Internet Protection Act requires that public schools
using federal funds to provide students access to the Internet install such filters by July
2002. Schools that fail to comply with the act could lose federal education aid.
Security is an important concern for those who use the Internet. Mischievous
programmers known as hackers often try to break into large computer systems.
Some damage databases stored in these systems or attempt to steal information
or electronic funds. Others may seek access to personal financial information.
Many people feel concerned about the security and confidentiality of credit card
numbers used to make purchases over the Internet. To protect themselves and
their services from unwanted intruders, many ISP's and online services,
corporations, and even individuals erect software and hardware barriers called
firewalls. Such barriers seal off a server or other computer from intrusion.
Software itself can become a danger on the Internet. Programs known as viruses,
e-mail bombs, Trojan horses, and worms have spread across the Internet and
can cause damage to data on systems that receive them. Some of these
programs have spread to computers around the world in a matter of hours.
Many companies produce software designed to protect users from viruses and
Downloaded from www.edusanjal.com
other such destructive programs. Most publishers of virus protection software
update their programs when new types of viruses are detected. Customers can
often download these updates over the Internet.
Legal issues. The distribution of e-books, digital music, and digital video poses
important legal questions, particularly because digital files can be so easily
pirated-that is, copied and distributed without permission or payment. Web
users can e-mail copies of e-books and digital recordings anywhere.
Unauthorized Web sites offer pirated e-books, recordings, or videos. Some
Internet companies provide sites where people can freely share digital copies of
music. At first, this sharing was free, and the traditional music industry claimed
that the practice was illegal. Several music distributors participated in lawsuits
against the companies. As a result, these companies have begun to charge
customers for downloads and pay fees to music publishers.
Internet availability. As the Internet and Web have become more popular and
powerful, concern has grown about equality of access to their resources.
Computers are costly, as are ISP and online service subscriptions. To ensure
more equal access to the Net, many public libraries and schools provide Internet-
capable computers for individual use. In many cities around the world,
establishments known as Internet cafes offer people the use of Internet-ready
computers for a fee based on time of use. Such establishments are especially
popular in areas of the world where many people do not have computers or
even telephones.
A word processor is a program that enables you to perform word processing functions. Word
processors use a computer to create, edit, and print documents. Of all computer applications,
word processors the most common. To perform word processing, you need a computer, the
word processing software and a printer. A word processor enables you to create a document,
store its electronically on a disk, display it on a screen, modify it by entering commands and
characters from the keyboard, and print it on a printer. The greatest advantage of word
processing over using a typewriter is that you can make changes without retyping the entire
documents. If you make a typing mistake, you simply back up the cursor and correct your
mistake. If you want to delete a paragraph, you simply remove it, without leaving trace. It is
equally easy to insert a word, sentence, or a paragraph in the middle of a document. The word
processors also make it easy to move sections of text from one place to another within the
document, or between documents. When you have made all the changes you want, you can
send the file to a printer to get a hardcopy.
Word processors vary considerably, but all word processors support the following basic
features:
Word processors that support only these features (and may be a few others) are called text
editors. Most word processors, however, support additional features that enable you to
manipulate and format documents in more sophisticated ways. These more advanced word
processors are sometimes called full-featured word processors. Full-featured word processors
usually supports following features:
File management – Many word processors contains file management capabilities that
allow you to create, delete, move and search for files.
Font specifications – Allows you to change fonts within a document. For example, you
can specify bold, italics, and underlining. Most word processors also let you change the
font size and even the typeface.
Footnotes and cross-reference – Automates the numbering and placement of footnotes
and enables you to easily cross-reference other sections of the documents.
Graphics – Allows you to embed illustrations and graphs into a document. Some word
processors let you create the illustrations within the word processor; others let you insert
an illustration produced by a different program.
Headers and footers – Header is a line or lines of text that appears at the top of each
page of a document. Once you specify the text that should appear in the header, the word
processor automatically inserts it. Most word processors allow you to use special symbols
in the header that represent changing values. For example, you can enter a symbol for the
page number, and the word processor will automatically replace the symbol with the
Downloaded from www.edusanjal.com
correct number on each page. If you enter the data symbol, the word processor will insert
the current date, which will change if necessary each time you print the document. Most
word processors allow you to specify different headers, for example, one for odd
numbered pages (odd headers) and another for even numbered page (even headers).
Headers are also called running heads. Footers are one or more lines of text that appears
at the bottom of every page of a document. All features available for headers are
available for footers also. Footers are sometimes called a funning foot.
Page numbering – The word processor automatically keeps track of page numbers so
that the correct number appears on each page.
Layout – Allows you to specify different margins within a single document and to
specify various methods for indenting paragraphs.
Macros – A macro is a character or word that represents a series of keystrokes. The
keystroke can represent text or commands. The ability to define macros allows you to
save yourself a lot of time by replacing common combinations of keystrokes.
Merges – Allows you to merge text form one file into another file. This is particularly
useful for generating many files that have the same format but different data. Generating
mailing labels is the classic example of using merges.
Spell checker – A utility that allows you to check the spelling of words. It will highlight
any words that it does not recognize.
Tables of contents and indexes – Allows you to automatically create a table of contents
and index based on special codes that you insert in the documents.
Thesaurus – A built-in thesaurus that allows you to search for synonyms without leaving
the word processor.
Windows – Allows you to edit two or more documents at the same time. Each document
appears in a separate window. This is particularly valuable when working on a large
project that consists of several different files.
WYSISYG (what you see is what you get) – With WYSIWYG, a document appears on
the display screen exactly as it will look when printed.
Mail merging – This is a feature supported by many word processors that enables you to
do mass mailings or mailing campaigns. To use a mail-merge system, you first store a set
of information, like a list of names and addresses, in one file. In another file, you write a
letter, substituting special symbols in place of names and addresses (or whatever other
information will come from the first file). When you execute the merge command, the
word processor automatically generates letters by replacing symbols in the second file
with the appropriate data from the first file. The power and flexibility of mail merge
systems varies considerably from one word processor to another. Some word processors
support a full set of logical operators that enable you to specify certain conditions under
which information should be merged. Also, some merge systems allow you to merge data
from several files at once. Mail merge is sometimes called print merge.
Downloaded from www.edusanjal.com
For example: ms-word, AmiPro, word star, word perfect etc.
Modem, pronounced MOH duhm or MOH dehm, is a device that enables computers to
transmit and receive information over the telephone network. The word modem stands
for modulator-demodulator. A modem modulates (translates) a computer's digital
electrical signals into tones that can travel over telephone lines. A modem at the other
end demodulates (retranslates) the tones back into computer information. Modems can
send and receive not only text information, but also sound, still pictures, and moving
pictures. Modems and telecommunications software make it possible for computer
users throughout the world to communicate with each other. To begin this
communication, a modem first sends a signal representing a telephone number. The
telephone network directs the transmission to the device represented by that number.
Communication can take place directly with another computer's modem, or through the
vast computer network called the Internet (see INTERNET). The faster a modem works,
the easier it is to receive complex information. Modem speed is measured in units called
bits per second (bps). Speedy, inexpensive modems available to home computer users
helped bring about an explosion of online communications in the middle and late
1990's.
Output device:
Inkjet printer is a device used to print text and illustrations created using a computer. It
uses a high-speed nozzle to spray a thin jet of fast-drying ink onto paper that is fed
through the printer. Before spraying the ink, the printer separates it into droplets by
heating or vibrating it. The printer responds to instructions from software in the
computer. This software instructs the printer to rapidly turn the jet on and off and
controls the jet's direction in order to form the desired printed output. Most inkjet
printers can print in either black or full color. To produce a full range of color, printers
usually have separate tanks holding black, red, blue, and yellow inks. Some printers use
only red, blue, and yellow inks. In such printers, a mixture of the three inks produces
black. Most inkjet printers produce the sharpest images when used with special paper.
However, inkjet printers can print on a variety of papers, and even on fabric. Inkjet
printers can produce detailed, colorful images, yet they are relatively inexpensive to buy
and operate. Thus, many users of home computers own inkjet printers. The printers are
also used in business applications and desktop publishing (the use of personal
computers to design and edit publications).
Scanner is a machine that translates printed pages, photographs, and other materials
into digital (numeric) code for use by computers. The machine scans the material one
tiny area at a time. An electronic device called a charge-coupled device measures the
amount of light reflected from each area. The scanner then translates the measurement
into digital code. Most scanners can digitally reproduce both black-and-white and color
materials. A flat bed scanner scans material through a plate of glass on which the
material lies flat. A drum scanner scans material that has been mounted on a rotating
cylinder. A scanner usually separates color images into the four colors used to produce a
full-color effect in printing. These colors are yellow, magenta (purplish red), cyan (blue),
and black. The scanner is programmed to produce the yellow, magenta, and cyan
components. The computer creates the black component using the color information.
One common use of scanners is to convert text that was not produced on computers
into a form that computers can process and store. If scanned text is to be edited, special
computer software is used to convert individual letters, numbers, and other symbols.
This software uses a technique known as optical character recognition. Printing
companies use scanners in the production of printing plates and cylinders. The digital
files produced by a scanner can be output to digital printers, or to plate making
machines called image setters or plate setters.
STORAGE DEVICES:
Smart card is a plastic card embedded with at least one computer chip. Such
chips store information and may also perform mathematical calculations. Smart
cards are used with many electronic devices, including automated teller
machines (ATM's), cellular telephones, and handheld computers. Some people
refer to cards that store information on a magnetic stripe as "smart" cards.
However, the International Organization for Standardization (ISO), an association
that sets standards of quality to help world trade, regards only cards with a
computer chip as smart cards. Smart cards can store much more information
than magnetic-stripe cards can. A magnetic-stripe identification card might hold
a person's name, address, social security number, and insurance information. A
smart identification card could also store a person's fingerprints and keep track
of drug prescriptions. Some smart cards store a money value that can be used
for purchases. Such cards can then have value returned to them by electronic
transfers from a bank account. Smart cards used with handheld computers might
Downloaded from www.edusanjal.com
hold an electronic dictionary, a tiny modem that enables the computer to
communicate with other computers, or a specialized computer program. Some
smart cards are used as security devices. They are used along with another code
or password to enable a person to use an ATM or other electronic device.
Computer storage disk is the standard medium for storing data. There are two
main kinds of storage disks
(1) Magnetic disks and
(2) Optical disks.
Magnetic disks are either removable or fixed. The primary kind of removable
magnetic disk is the floppy disk, sometimes called a diskette. This disk consists of
a circular piece of flexible plastic film covered with magnetic particles and
enclosed in a rigid plastic housing. The computer user inserts the housing and
disk into the computer. A machine called a disk drive spins the disk past a device
known as a read/write head.
Inside the computer, all data are encoded as electric charges representing the
numbers 0 and 1. To store data on the disk, the head orients the magnetic
particles in patterns representing 0's and 1's. To copy data from the disk, the
head uses the patterns of magnetism to produce charges representing 0's and
1's. The main kind of fixed magnetic disk is the hard disk that is permanently
installed inside virtually every personal computer. Many computers have a stack
of disks, each with its own read/write head. The primary type of optical disk is
the CD-ROM (Compact Disc-Read Only Memory). To store data on a CD-ROM, a
laser beam cuts tiny pits into the disk. The pits and flat spaces represent 0's and
1s. To copy data, a laser beam shines on the pits and flat spaces. The intensity of
Accounting Information Systems (AIS) collect, record, store, and process data to produce
information for decision makers. Accounting information systems are a set of interrelated
components, that interact, to achieve a goal. Most accounting information systems are
composed of smaller subsystems and vice-versa, every organization has goals. Accounting
Information Systems can use advanced technology, be a simple paper-and-pencil system or be
something in between. Technology is simply a tool to create, maintain, or improve a system. An
accounting information systems topics impact corporate strategy and culture.Accounting
information systems offers value and is a very important part of the value chain. Although
“adding value” is a commonly used buzzword, in its genuine sense, it means making the value of
the finished component greater than the sum of its parts. It can mean, making it faster, making it
more reliable, providing better service or advice, providing something in limited supply,
providing enhanced features or customizing it. Value is provided by performing a series of
activities referred to as the value chain which includes primary activities and support
activities. These activities are sometimes referred to as “line” and “staff” activities
respectively.Information technology can significantly impact the efficiency and effectiveness
with which the preceding activities are carried out. An organization’s value chain can be
connected with the value chains of its customers, suppliers, and distributors.The functions of
Accounting Information Systems are to:
Accounting information systems are the structures and architecture on which accounting
information is captured, processed and reported. They happen to be computer-oriented in this
day and age. To understand and create useful systems you must understand business, business
processes, accounting, and a bit of technology.
Relevance
Reliability
Completeness
Timeliness
Understand-ability
Verifiability
Accessibility
1. Basic Concepts:
The modern computer can be defined as an electronic machine that is designed to accept,
store data and instructions, and process the data according to the instructions to produce
desired results.
INPUT
PROCESS
OUTPUT
Microcomputers are the smallest computer systems. Their size ranges from
calculator to desktop size. Microcomputers can perform the same operation
and use the same type of instructions as any other computer. The
microcomputer CPU is a microprocessor. The microprocessor manufactured
by a company named Intel Corporation was extensively used in
microcomputers. Some of Intel’s popular brand names of microprocessor is
Intel 80586 known as Pentium.Microcomputers are also referred to as
Personal Computers, Desk Top Computers or Lap Top Computers or Home
Computers.
Minicomputers are also small general-purpose systems, but most micros they
typically serve multiple users. Such systems are called multi-user systems.
They are usually more powerful and more expensive than micros.
Microprocessor manufactured by a company named, Motorola is popularly
used in minicomputers – MC68000 series.
Mainframe computers are systems that offer faster processing speeds and
greater storage capacity than a typical mini. There is quite a bit of overlap
possible in the performance of large minis and smaller mainframes.
Mainframe computers are also multi-user systems.
Supercomputers, designed to process scientific jobs like weather forecasting,
artificial intelligence research etc. They are the largest, fastest and most
expensive system in the world.The company named ‘Control Data
Corporation’, marketed Cyber series of supercomputers and another company
named ‘Cray Research Incorporation’ marketed the Cray series of
supercomputers.
Today, however, due to the technological advances being made, the different
computer models emerging have the capacity for equal functions. For example, a
powerful Micro can perform the task of a Mini and so on.There are different types
of computers depending on the size
o History of computers:
The computer that we use today is the result of man’s long search for a device to help
in performing computations. The search dates back to the 17th century. A series of
scientific breakthroughs by many persons have contributed to produce this electronic
machine, the computer.
The word ‘Computer’ is derived form the word ‘Compute’, which means to
‘Calculate’.
o If we look at the history of computers, it can be traced back to 3000 B.C. The
Stone Age man used small found stones (pebbles) for counting cattle.
o Later, a device called Abacus was developed by the Chinese. This is supposed to
be the first mechanical computing device.
o In 1617, John Napier, a Scottish mathematician developed a device which is
called Napier’s bones. With the help of this device, multiplication and addition
were possible.
o In 1642, Blaise Pascal, a French mathematician invented the first mechanical
calculator.
o In 1673, Gottfried Wilhelm Leibniz, a German invented the Leibniz calculator
which was used for addition, subtraction and multiplication.
o A French weaver’s son named Joseph Marie Jacquard made the next significant
contribution in 1804. After observing his father making different weaving patterns
on the loom, he thought of storing these patterns for future use. So he developed a
plate with multiple holes to control the weaving patterns, not knowing that one
day his idea of storing the weaving patterns would be used to store data and
would be called the Punch Card.
o IV Generation Computers (1970 onwards): From 1970 onwards, we are in the era of
Fourth generation computers, in which the electronic component was further miniaturized
through Large Scale Integrated (LSI) of circuits on the silicon chip. Now the
advancement of chip technology has come to be known as Very Large Scale Integration
(VLSI), where millions of transistors are packed in a single chip. The VLSI chips are
getting refined every day. The size of the chip is shrinking and the components, which
are packed in a chip, are multiplying, as a result the size of the computer reducing. What
used to be a room-sized computer at one time is now available as desktop computer or
Laptop computer with much more computational power. Along with the reduction in size,
there is significant reduction in prices too.
o V Generation Computers: From 1982 onwards, research is on to develop a Fifth
generation computer that will have the thinking power just like that of the human brain.
These computers, which are based on Artificial Intelligence (AI), are designed to be
‘Thinking” computers capable of storing large amount of data to be retrieved as and when
required to solve a problem.
Network Concept
Objective of Computer Networks: Networks satisfy a broad range of purposes and meet
various requirements. Some of the common objectives of Computer Communication networks
are:
1. Dedicated Server: In a dedicated server, one or more computers are set aside as file
servers and not used for anything else. Users’ access shared directories and resources on
the dedicated server, but not on each other’s systems.
2. Non dedicated Server: A server can operate in a non-dedicated mode. Here, the machine
used as server can also operate as a workstation. Some amount of memory is kept aside
for the local mode.
Notes: Nodes are the computers on the network, which are provided to the users
to carry out their tasks using the network. A node, which is more powerful and
The workstation works only for the person sitting in front of it, whereas a server
serves all the people on the network to share its resources. A workstation usually has
an inexpensive, small hard disk to carry out local tasks. Some workstations, called
diskless workstations, have no disk drive of their own. Such workstation also called
dumb terminals; rely completely on the LAN for their access. The network operating
system lets the nodes work as if all the resources at the server belong to the node
itself.
LAN Cables: This is the medium over which the information travels from computer to
computer. From the computer onto the medium (cable) and to take up the information
from the medium and make it available to the computer in the form it can read.
Network Operating System Software (NOS): To control the movement of information
on the network. Networks, which are more complex, require components like Hubs,
Switches and Routers to carry out different network functions.
On the network, each computer is called a node or a workstation unless there are
certain computers designed as servers. Each computer contains a network interface
card. LAN cables connect all the nodes and servers together to form the network. In
addition to its local disk operating system, each node requires networking software
that enables the nodes to communicate with the servers. In return, the file servers run
network software that communicates with the nodes.
Network Interface (NIC) Card: This is card used to connect the cables to the
computers. These cards help the computer to transfer the data at a faster rate and
in the form of packets. These cards are plugged into the computer motherboard.
These cards are generally called as Ethernet cards.
Types of Network
One which has all the computers connected to the network such a way that each computer can
behave as a server as well as a node. The other type of network has one or more computers
designated as servers and the remaining computer function only as nodes. Networks are
classified upon the geographical area they span into the following categories:
Wide Area Network (WAN): A public network connecting different cities and towns
mostly through telephone links or microwave links through a satellite. As the LAN of a
company grows and expands to computers and users in other locations, it becomes a wide
area network (WAN). By geographical scopes WAN is different tram a WAN. WAN can
transmit devises plant nits, cities and nations WAN provides lay distance transmission
and data, voice etc. They use public, private and leased communication devices and no
can be used to transmit manages over long distances. In this transmitting and receiving
equipments are geographically distributed.
Types of LAN Cables: LAN cables, also called the Ethernet media is the lifeline of a
network. All the communication between the servers and node takes place over this
media. There are four major types of cables in use today:
1. Coaxial Cable: Coaxial cable is easily identified in your every day life. You always find
it connected to the television sets and audio equipment. Thick and thin refer to the
Downloaded from www.edusanjal.com
diameter of the coaxial cable. Standard Ethernet cable (thick coax) is over a centimeter in
diameter. The thin coax is about half of thick coax in diameter. The thick coax has a
greater degree of noise immunity and is quite strong. This requires a vampire tap (a
piercing connector) and a drop cable to connect to the network. Though thin coax carries
signal over the shorter distance, it is preferred over thick coax, because thin coax needs
simple BNC connector (bayonet locking Connector) and is very flexible and is cheaper
than the thick coax and more flexible and soft and ideal for office cabling environment.
2. Unshielded Twisted Pair Cable (UTP): Twisted pair cable is just what its name
implies: Insulated wire with a minimum number of twisted per foot. Twisting the wires
reduces the electrical interference. Unshielded twisted pair is very familiar type of cable.
It is often used as the telephone cable.
UTP cables comes in variety of grades called level 5, level 4 and level 3, offering
better performance than an ordinary telephone cable. Level 5 cable is the highest,
most expensive grade, meant for100 mbps networks. Level 4 and level 3 cables
are less expensive, but cannot support the same data throughput speeds. Level 4
cables can support up to 20 mbps and level 3 up to only 16 mbps. This wide
variety of cables shows the evolution of the Ethernet technology. Thick coax was
one of the cabling systems used in the Ethernet but was difficult to work with an
expensive. This lead to the development of the thin coax, which is easier to work
with and less expensive. Today the most popular cable is Unshielded Twisted Pair
(UTP) cable. This looks like a telephone cable but comes in variety of grades.
3. Fiber Optic Cable: Fiber optic cables are used for specialized applications. Fiber optic
cable is more expensive, but it is invaluable for situations where large amount of
interference is present, such as on a factory floor. Fiber optic cable is often used in inter-
building applications to insulate networking equipment form electrical damage caused by
lightning because it does not conduct electricity. Fiber optic cable can be used over
distances up to 2 kilometers.
Fiber optic cable as the name implies, uses light rather than electricity to carry
information. Fiber can send data over very long distances at very high speed. It is
expensive and difficult to work with. Splicing the cable to install connectors itself
is a quite tough job. Also diagnostic tools for finding cable fault are very few and
difficult to use. Fiber optic cable consists of a core of glass fiber, whose diameter
is measured in microns, surrounded by a glass cladding. This in turn is covered by
a protective sheath. The first fiber optic cables were made of glass fiber, whose
diameter is measured in microns, surrounded by glass cladding. This in turn is
covered by a protective sheath. The light source for fiber optic cable is a light
emitted diode (LED) which encodes the information by varying the intensity of
light. A detector at the other end of the cable is senses the intensity variations and
converts them back into electrical signals.
The kind of cable you use depends mostly one kind of network interface card you
choose. The cables are connected to the computers through the connectors. There
are basically two types of connectors: BNC and UTP
Downloaded from www.edusanjal.com
Comparison of MNC and UTP cable
BNC cabling UTP cabling
1. Derived from the Thick Ethernet coaxial 1. Derived from the telephone cable
cable
2. Flexibility of adding nodes 2. Decided by the HUB ports
3. Lower Price and no need of HUB 3. Needs HUB
4. Difficult to locate faults 4. Introduction of HUM makes fault
finding much easier
5. Terminators needed 5. Terminators not needed
6. The cabling is comparatively less reliable 6. Inherently more reliable
7. Single segment length (node to node) up to 7. Single segment length up to 200
180 meters meters
4. HUBS: Consider a thin wire segment with the bus terminators and fixed 8 taps. Imagine
that the thin wire is miniaturized using silicon technology. Also 8 fixed taps are taken
through 8 pin of the silicon. This miniaturized segment can be housed in a box. Each tap
is provided with reliable RJ 45 connector. This is what we term as the HUB. But
internally it is same as the wire segment with fixed taps.
5. Stackable Hubs: As the hubs become popular, the network reliability and manageability
improved. Thus the workgroup size increased and higher port density Hubs were needed.
Thus one could have used many be 48 or 64 port Hub. But scalable and modular
approach was desirable. The developments in silicon technology made this possible.
Central Processing Unit (CPU):The computer has a control unit, which controls the computer’s
action, i.e. all the input from input devices and output-to-output devices and a memory unit
where the computer stores things to be remembered. The control unit of the computer
controls the data and instruction that is to be stored or retrieved from its memory unit. It has
an Arithmetic and Logic Unit (ALU), which does all the calculations and logical functions. The
control unit, Arithmetic Logic unit and Memory unit together form the Central Processing Unit
(CPU) or the computer. The memory unit of the computer is further divided into Random
Access Memory (RAM), Read Only Memory (ROM) and Cache memory. Random Access
Memory (RAM) is used to store the data and instructions that are currently being processed.
This memory can be randomly accessed and is called the immediate access memory. The RAM
however, is volatile, i.e. the memory is erased when the power supply is cut off. The CPU of a
modern computer is fully electronic i.e. it dies not contain any moving parts. It is made up of
Function of CPU:
The CPU fetches the instruction from memory, decodes the instruction and executes
the instruction by communicating with the Input/output devices and the memory. The
figure shows the basic architecture of a computer. This architecture was developed by
John Von Neumann, referred to as the Neumann Architecture.
It consists of three main sections: Arithmetic & Logic Unit (ALU), Timing & Control Unit and
registers.
Arithmetic Logic Unit (ALU): The arithmetic logic unit performs a set of
arithmetic and logic operations. The arithmetic operations of the ALU include
ADDITION, SUBSTRACTION, INCREMENT, DECREMENT and
COMPARE.. The logical operations of the ALU include AND, OR, EX-OR,
NOT, SHIFT/ROTATE, CLEAR and COMPLEMENT.While the accumulator
holds on of the operands, the temporary register is used to hold the other data
temporarily during arithmetic and logic operations. The result is stored in the
accumulator and the flags are set or reset according to the result of the operation.
As the flags are affected by the arithmetic and logic operations, the flags generally
reflect the data conditions in the accumulator and are as follow:
Zero Flag(Z): This flag is set (1) if the ALU operation results in the accumulator
being equal to 0 else the flag will be reset (0), if the result is not 0. This flag is
modified by the results in the accumulator as well as in the other registers.
Parity Flag (P): This flag indicates whether the total number of 1’s in the
accumulator after the execution of arithmetic or a logical operation is odd or even.
If the total number of 1’s is even, the flag will be set (1), so as to indicate even
parity. If the total number of 1’s is odd, the flag will be reset (0), so as to indicate
odd parity.
Carry Flag (C): The 7th bit of an accumulator indicates whether the result of any
operation has over flown. If there is any overflow from 7th bit, the carry flag will
be set (1) otherwise it will be reset (0). The carry flag also serves as a borrow flag
for subtraction.
1. Timing of the Control Unit: This unit controls and synchronizes all the
operations inside and outside of the microprocessor in the system. The timing and
control signals that regulate the transfers and transformations in the system
associated with each instruction are derived from the master clock (CLK). The
control unit also accepts the control signals generated by other devices associated
with the microprocessor system. These control signals generated from outside of
the microprocessor also alters the state of the microprocessor. Most of the
microprocessor utilizes an external quartz crystal to determine the clock
frequency (CLK) form which other timing and control signals are developed. The
speed of the microprocessor is related directly to the clock speed, since most of
the internal functions are timed by the reference signal.
The registers available inside the microprocessor can be classified into: registers
accessible to user and registers not accessible to the user. The registers available
to the user can be further classified into: general purpose registers and special
purpose registers.
Computer InstructionThe data in the 8085 is in the form of a 8-bitintiger called byte. The data
word format isIn the above format, bit D0 refers to the least significant bit (LSB) while bit D7
refers to the most significant bit (MSB). An instruction must convey the information of the type
of operation to be preformed, indicated by the opcode and the address of the memory locations
or registers containing the data (operand) on which the operation is to be performed. Thus the
instruction format of 8085 can be further classified into single byte instructions, two byte
instructions and three byte instructions.
Single Byte Instructions: The single byte instructions had only one field called the opcode field.
Ex: MOV A, C. This instruction is decoded as the hexadecimal number 79H with the least
significant bit being 9 and the most significant bit being 7, together forming 79H. Other
examples of single byte instructions include DCR B, INR D, ADD E etc.
Two Byte Instructions: The two byte instruction have 2 fields i.e.; the opcode field and the data
or address field. Ex: MVI A, 05. In the above example, the first byte is the opcode, which when
decoded will be in the hexadecimal form of 3E while the 2nd byte is the data byte 05. Other two
byte instructions include OUTPORT ADDRESS, INPORT ADDRESS.
Three Byte Instructions: The three byte instructions also have only two fields i.e. the opcode
field and the address/data field. Ex: LXIH 8000. In the above example, the hexadecimal
equivalent for this instruction is 21, 00 and 80 H. The 1st byte 21 H is the opcode byte. The 2nd
byte 00H is the lower order address while the 3rd byte 20H is the higher order address byte. Other
three byte instructions include LXIB 8050, STA 9000, LHLD 9050 etc.
Instruction Set: The instruction set can be divided into five categories based on the function, the
instructions carry out. They are:
3. Logical Operations: The 8085 instruction set includes logical operations like AND, OR,
EX-OR and not operations. The above logical operations have some common features
like
o They assume that the accumulator has one of the operands
o The result is always stored in the accumulator
o The zero, parity and sign flags are affected according to the result
1. Logical AND the content of the register i.e. ANA register i.e., ANA B
2. Logical OR the contents or the register i.e. ORA register i.e., ORA B
3. Exclusive-OR (EX-OR) the contents or the register i.e., SRA register i.e., SRA B
4. Complement the accumulator i.e. CMA A
5. Rotate accumulator content left i.e., RLC
6. Rotate accumulator content right i.e., RRC
7. Rotate accumulator content left through carry i.e., RAL
8. Rotate accumulator content right through carry i.e. RAR
Downloaded from www.edusanjal.com
9. Compare register i.e., CMP B
4. Branching Operations: The flexibility and versatility of the stored program concept on
which computers are based, however results primarily from the computer’s ability to
transfer control or branch to an instruction, which in not in a sequential order. This is
achieved with instructions from the branching group. All these instructions act on the
program counter and it is possible to execute a block of instructions many times.
Use of labels: During the course of writing the program for a particular problem, if the
program needs to jump to an instruction, which appears in the later part of the program,
then instead of giving the address, a label or name can be given in the jump instruction.
Later when that part of the program is written, the same label can be referred at the
statement to which the execution has to jump.
Conditional Jumps: Conditional jumps allow the processor to make decisions on certain
conditions indicated by the flags. After every logic and arithmetic operation, flags are set
or reset to reflect the status of result. The conditional jump instructions check the flag
status and make decisions about the sequence of the program. The 8085 has five flags of
which auxiliary carry flag, zero flag, sign flag and parity flag. All conditional jump
instructions in the 8085 are three type instructions, quite similar to the unconditional
jump instructions.
Secondary storage devices are used to store the data and instructions permanently. They are
also used in most computer systems to supplement the limited storage capacity of the RAM.
Secondary storage devices can be in direct connection with the processor. They accept data
and/or program instructions from the processor, retain them, and then return them to the
processor as required to complete a processing task.There are two types of secondary storage
devices:
I. Direct Access Storage Devices – E.g., Disk Drives where data is stored on circular disks
made of magnetizable material.
Downloaded from www.edusanjal.com
II. Sequential Access Storage Devices – E.g., Tape Drives where data is stored on tapes
made of magnetizable material.
Direct Access Storage Devices (DASD): The data stored in the direct access
storage unit can be accessed by the processor directly, i.e. to access the 100th
record, it can position itself directly over the 100th record. Data stored in a disk
can be directly accessed. Every disk has a directory of what is stored in the disk.
The directory contains the name given to the data file and its disk address (storage
location). When data is needed by the processor, the read/write head of the disk
drive identifies the disk address of that data file and moves to the specified track
and then onto the proper sector, where the data is stored. Magnetic disk drives and
optical disk drives are examples of some direct access storage device. Access
Time: The time taken to position the read/write head on the proper track is called
seek-time. The time required spinning and position the required data is called
search-time or rotational delay. The time required to read the data into main
memory is called data transfer time.Data Access Time = Seek Time + Rotational
Time + Data Transfer Time.
Sequential Access Storage Device (SASD): The data store in the sequential
access storage units can be accessed by the processor sequentially, i.e. to access
the 100th records; it has to read the previous 99 records. Magnetic tape drives are
sequential access storage devices. These devices store data on magnetic tapes.
Magnetic Disks: All magnetic disks are round platters coated with magnetizable
recording material. They can be of different sizes and storage capacities. The disks
are made of rigid material (hard disk) or flexible plastic material (floppy disk)
Data is stored on all disks in a number of invisible concentric circles called tracks. The
tracks begin at the outer edge of the disk and continue towards the center, independent of
each other. Each track has a designated number.
The number of tracks per inch varied depending on the capacity of the disk.
Each track in the disk is divided into sectors and each sector is given a unique
identification number.
The number of sectors per track varies depending on the capacity of the disk.
Hard Disk: A hard disk consists of several platters mounted on a spindle. This
unit of multiple disks is made to rotate at speeds of 3000 rpm and more. When
multiple disks are packaged together, a number of read/write heads are used, to
write or retrieve data. The heads fly on a cushion of air above the surface as they
access the disks. Hard disks are of two types: Fixed Disk (Winchester Disk) and
Removable Disk (Disk pack).
Cylinder: Cylinder refers to all tracks on magnetic disks that are accessible by a
single movement of the access mechanism. The access mechanism, which has
multiple read/write heads, will position itself on the same track of different disks
surfaces. This area, which is accessible to the various read/write heads form a
cylinder.
Floppy Disk: The flexible (or floppy) disks are the most popular secondary
storage medium used in the micros. The floppy disk is made to rotate at speeds of
300 rpm and more. The read/write head is in contact with the spinning disk.
Data is written as tiny magnetic spots on the disk surface. Writing new data on a disk
erases data previously stored at that location, but otherwise magnetic spots remain
indefinitely. Reading of recorded data is accomplished by the magnetized spots
passing under read/write head and inducing electric pulses in it.
Size (inches) Description Capacity (Bytes)
5.25 Double-sided High-density (DSHD) This floppy 1.2 MB
has 96 track per inch and 15 sectors
3.5 Double-sided 1.44 MB
Magnetic Tape: Magnetic tapes are used where sequential processing and accessing is
required. It is a medium to store large files and for backup purposes. In large
organizations, tapes are used as back-up storage. Data is stored as tiny spots on the
magnetizable material that coats one side of a plastic tape. Since tape is a
continuous length medium, to differentiate between different data records gaps or spaces
are left in between records called Inter Record Gap (IRG). Several records are combined
RAM Features:
Data that needs to be processed and the instructions, which are used for processing, are
held in the RAM.
RAM is a cluster of semiconductor devices. The elements or RAM changes with the
proper application (changes) of the electric current.
Each element of RAM is a memory location in which data can be stored. Each location
has a unique address. Using this address data can be directly retrieved or stored.
Since RAM must hold both – the Data to be processed and the instructions for
processing, its size or capacity is one of the measures of the power of the computer. The
Downloaded from www.edusanjal.com
capacity of the memory is measured in kilobytes of KB (1024 bytes), Megabytes or MB
(1024 Kilobytes), Gigabytes or GB (1024 megabytes).
The contents of RAM need to be stored periodically on to a secondary memory since
power failure will erase the contents of RAM because of which this memory is called
volatile memory.
Read Only Memory (ROM): The storage elements in the ROM are not
available to the user. These elements contain certain per-coded
instructions, which are used by the computer. These storage locations are
only read and cannot be erased or changed. Now, certain ROM chips are
available which can be erased.
PROM: Programmable Read Only Memory; these ROMs may be programmed
once, after which they become permanent.
EPROM: Erasable Programmable Read Only Memory; these ROMs can be
erased by a special and elaborate process of exposing it to ultra-violet rays.
Cache Memory: Some computer contains memory chips, which are faster than
main memory. The cache memory is used to store operating instructions and data
that are likely to be needed next or instructions that are frequently required. This
increases the speed of processing. Cache Memory chip is a static memory chip.
Cache size varies form 64 KB to 32 MB.
Operating system is the most important program that runs on a computer. Every general-
purpose computer must have an operating system to run other programs. Operating systems
perform basic tasks, such as recognizing input from the keyboard, sending output to the display
screen, keeping track of files and directories on the disk, and controlling peripheral devices such
as disk drives and printers.
Windows version 1.0 first appeared in 1985. In this version, the windows were tiled, or
presented next to each other rather than overlapping. Windows version 2.0, introduced
in 1987, was designed to resemble IBM’s OS/2 Presentation Manager, another GUI
operating system. Windows version 2.0 included the overlapping window feature. The
As a user, you normally interact with the operating system through a set of commands. For
example, the DOS operating system contains commands such as COPY and RENAME for
copying files and changing the names of files, respectively. The commands are accepted and
executed by a part of the operating system called the command processor or command line
interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at
objects that appear on the screen.
V Functions of an Operating System
In a multitasking operating system where multiple programs can be running at the same
time, the operating system determines which applications should run in what order and
Kinds of computers
Computers vary greatly in size, speed, and ability. They may be grouped into four
categories:
(1) personal computers,
(2) mainframes and supercomputers,
3) dedicated computers, and
(4) embedded computers.
personal computers :Personal computers are used by one person at a time. The largest
personal computers, or PC's, can fit on a desktop. Some of these machines have more than one
microprocessor. In addition to one or more primary processors, a computer may have one or
more co-processors to handle special types of work. For example, math co-processors help
speed up complex numerical calculations. Graphics co-processors help process photographs
and other illustrations, or they speed up operations involving the display of information. Sound
co-processors perform the mathematical calculations to process digitized sound. Large and
middle-sized businesses commonly use PC's in networks. A network consists of a group of
computers connected by telephone lines or other communications lines. In a client-server
network, a powerful central computer distributes information to a number of PC's. The central
computer is called the server. The PC's are the clients but are usually referred to as
workstations or simply PC's. The central computer may be a PC, a machine like a PC with extra
storage capacity, or an even larger type of computer.
Word processors were computers that resembled electronic typewriters. They were
designed mainly for typing, editing, and printing letters and other documents. Since the
1980's, PC's with word-processing programs have almost entirely replaced dedicated
word processors.
(4)embedded computers. Embedded computers are control units built into the devices they
control. Virtually all embedded computers are single microprocessors. Such devices as digital
wristwatches, telephones, videotape recorders, and automobile ignition systems contain
embedded computers. In addition, embedded computers help control the flight of aircraft,
maintain the orbits of artificial satellites, and guide missiles to their targets. They also control
the movements of industrial robots. There are many more embedded computers than any
other kind. For every personal computer, there are hundreds of embedded computers.
The manufacture, development, sales, and servicing of computer hardware and software make
up one of the largest industries in the world.
Manufacturing. From a few dozen companies in the early 1960's, the computer industry
has grown to tens of thousands of firms throughout the world. These companies
manufacture computers and such peripheral equipment as modems and printers. They
also develop and publish software and provide computer supplies, such as magnetic
disks. Many companies make computer components, including processors. Others make
the circuit boards and cables used to create networks. The largest computer
manufacturer in the United States-and the world-is International Business Machines
Corporation (IBM). Other leading U.S. computer makers include Apple Computer, Inc.;
Dell Computer; the Hewlett-Packard Company; and Sun Microsystems Incorporated. The
largest computer manufacturers outside the United States are Fujitsu and NEC
Corporation, both of Japan. The leading computer companies in Europe include Groupe
Bull of France and Siemens AG of Germany. The largest software company in the United
States and the world is Microsoft Corporation.
Research and development. The constant increase in computer power is a major reason
for the computer industry's success. This increase has resulted from research and
development at businesses and universities throughout the world. Continuing research
seeks to produce even faster processors, swifter means of communications, storage
media that can hold more information, and better ways to encrypt or to compress
information. Data are compressed through special coding techniques that reduce the
number of bytes needed to carry information. Most data compression techniques are
lossless, which means that a compressed file can be expanded back into its original form
without any loss of information. But a few techniques are lossy, which means that some
nonessential information is deliberately discarded to achieve greater compression.
Sales. Computers are sold in a variety of ways. Large manufacturers of computers have
teams of sales professionals. These teams contact corporations and institutions to sell
combinations of hardware and software. Another method of selling computers involves
a value-added reseller (VAR). A VAR buys computer systems and components from a
variety of sources. It then assembles and sells finished products, often tailoring the
equipment to a buyer's specifications. Most VAR's also include software with their
computers. Retail outlets play an important role in the sale of personal computers.
Computer specialty stores, mail-order houses, and general merchandise stores also sell
many computers. Much hardware and software is sold over the Internet.
Many career opportunities exist outside the computer industry itself. Data processors who
work for companies that use computers enter information into those computers. Workers in
many factories oversee computers that control machines. Computer training is also an
important industry.
Some of the computer industry's most successful individuals are self-taught. But most
computer careers call for a college degree. College courses that help prepare students for
careers in computers include programming, electrical engineering, systems analysis, and data
processing
User Interface
INTRODUCTION
In addition to a computer's speed the usability of the software and the ergonomic design
of the physical components are important considerations. Usability is the ease with
which a person learns to use an application, as well as how efficient and effective it is.
Ergonomics determines how people function in relation to their environment, and with
respect to computers, how to make input and output devices easy, comfortable, and
efficient to use. For example, curved ergonomic keyboards prevent wrists from bending
at unnatural angles, making the user more comfortable and input faster.
A variety of devices are used to enter data. Most personal computers (PCs) include a
keyboard because it is easy to use and efficient for everyday tasks such as word
processing. A mouse, trackball, and joystick are other input devices that help the user
point, select, and move objects on a video display monitor. Handwriting can be entered
on a computer's screen using light pens, wands that contain sensors to translate the
user's motions into data. Touch screens in which infrared light sensors detect a user's
fingers are used in environments where keyboards are unsuitable, such as cash
dispensing machines. Sound and speech recognition are popular for some applications,
but these input devices are still imperfect and usually understand and respond to only a
small vocabulary of commands.The most familiar output devices are printers and color
video display monitors. Audio output is also common, as well as sophisticated
connections to synthesizers that produce a wide range of musical sounds (see MIDI).
COMMAND AND GRAPHICAL INTERFACE :Dialog between the user and the
computer is usually accomplished by command-line or graphical user interfaces (GUIs).
Command-line interfaces require the user to type brief commands on a keyboard to
direct the computer's actions. GUIs use windows to organize files and applications
represented by icons (small pictures) and menus that list commands. The user directly
manipulates these visual objects on the video display monitor by pointing, highlighting,
and dragging or by moving them with a mouse or trackball. GUIs are easier to learn
than command-line interfaces, since commands need to be memorized and tend to vary
between different computer systems. Entering commands with a GUI is slower,
however, so GUIs usually have optional command-line equivalents as a quick
alternative for more experienced users.
Virtual reality (VR) provides users with the illusion of being in a three-dimensional (3D)
world. There are two types of VR systems: immersive and non immersive. Immersive
systems involve wearing a head-mounted display or helmet and data gloves that
translate the user's hand motions into data the computer can process. This VR interface
enables the user to directly experience a simulated environment. The user can turn,
pick up, throw, or push computer-generated objects using gestures similar to those they
would normally use. In VR, users are aware of the simulated environment and their
actions through visual, auditory, and some tactile sensations. Immersive VR is used for
applications such as pilot training systems, computer games, and medical training. No
immersive VR systems display alternate environments for the user to navigate through
but do not require users to wear specialized equipment. Instead, users rely on
conventional devices such as video display monitors, keyboards, and a mouse to
manipulate the simulated environment.