1 Computer Concepts 1
1 Computer Concepts 1
1 Computer Concepts 1
electricity bills, Deposits and withdrawals of money from banks, Business data
processing, Medical diagnosis, Weather forecasting, etc. are some of the areas
where computer has become extremely useful.
But as you will see later it does much more than that. It can be compared to
a magic box, which serves different purpose to different people.
Computer : It is an electronic device which processes given data to derive
the required and useful information. During the processing the computer has to
perform various functions like receives data(input) processes data(process)
produces output(information) stores results (storage)
1.1.2 Characteristics of Computers
The characteristics which make computer make indispensable are
1. Speed
The computer is able to process the data and gives the output in fractions
of seconds, such that required information is given to the user on time enabling
the user to take right decisions on right time. A powerful computer is capable of
executing about 3 million calculations per second.
2. Accurancy
The accuracy of computers is consistently high enough which avoids any
errors. If it all there are errors, they are due to errors in instructions given by the
programmer.
3. Reliable
The output generated by the computer is very reliable, but it is reliable only
when the data, which is passing as input to the computer and the program,
which gives instructions are correct and reliable.
4. Storage Capacity
The computer has a provision to store large volumes of data in the small
storage devices, which have capacity to store huge amounts of data and help
the retrieval of data an easy task.
5. Versatile
Computers are very versatile machines. Computers are capable of
performing almost any task ,provided the task can be reduced to a series of
logical steps.
4 Computer Science and Engineering
6. Automation
Once the instructions fed into computer it works automatically without any
human intervention until the completion of execution of program or meets logical
instructions to terminate the job.
7. Diligent
A computer is free from tiredness, lack of concentration, fatigue, etc. It
can work for hours without creating any error. If millions of calculations are to
be performed, a computer will perform every calculation with the same accuracy.
Due to this capability it overpowers human being in routine type of work.
1.1.3 The Computer Generations :
The evolution of computer started from 16th century and resulted in the
form that we see today. The present day computer, however, has also undergone
rapid change during the last fifty years. This period, during which the evolution
of computer took place, can be divided into five distinct phases, basis of the
type of switching circuits known as Generations of Computers.
1. First Generation Computers (1950’s)
These computers which used vacuum tubes (valves) as major electronic
component . The advantage of vacuum tubes technology is that it made the
advent of Electronic digital computer. Vacuum tubes were only electronic devices
available during those days which made computing possible.
2. Second Generation Computers (1960’s)
Around 1955 a device called Transistor replaced the bulky electric tubes
in the first generation computer. Transistors are smaller than electric tubes and
have higher operating speed. They have no filament and require no heating.
Manufacturing cost was also very low. Thus the size of the computer got reduced
considerably.
3.Third Generation Computers (1970’s)
The third generation computers were introduced in 1964. They used
Integrated Circuits (ICs). These ICs are popularly known as Chips. A single IC
has many transistors, registers and capacitors built on a single thin slice of silicon.
So it is quite obvious that the size of the computer got further reduced. Computers
of this generation were small in size, low cost, large memory and processing
speed is very high.
Paper - I Computer Fundamentals and MS-Office 5
which are critical and need great accuracy and response like Satellite launching,
weather forecasting etc.
According to the operational principle of computers, they are categorized
as analog, digital and hybrid computers.
Analog Computers: These are almost extinct today. These are different
from a digital computer because an analog computer can perform several
mathematical operations simultaneously. It uses continuous variables for
mathematical operations and utilizes mechanical or electrical energy.
Digital Computers: They use digital circuits and are designed to operate
on two states, namely bits 0 and 1. They are analogous to states ON and OFF.
Data on these computers is represented as a series of 0s and 1s. Digital computers
are suitable for complex computation and have higher processing speeds. They
are programmable. Digital computers are either general purpose computers or
special purpose ones. General purpose computers, as their name suggests, are
designed for specific types of data processing while general purpose computers
are meant for general use.
Hybrid Computers: These computers are a combination of both digital
and analog computers. In this type of computers, the digital segments perform
process control by conversion of analog signals to digital ones.
According to the sizes of the computers ,the computers are classified as
follows.
Supercomputers: The highly calculation-intensive tasks can be effectively
performed by means of supercomputers. Quantum physics, mechanics, weather
forecasting, molecular theory are best studied by means of supercomputers.
Their ability of parallel processing and their well-designed memory hierarchy
give the supercomputers, large transaction processing powers.
Ex. PARAM developed in India.
Servers: They are computers designed to provide services to client
machines in a computer network. They have larger storage capacities and
powerful processors. Running on them are programs that serve client requests
and allocate resources like memory and time to client machines. Usually they
are very large in size, as they have large processors and many hard drives. They
are designed to be fail-safe and resistant to crash.
Paper - I Computer Fundamentals and MS-Office 7
Notebooks: They fall in the category of laptops, but are inexpensive and
relatively smaller in size. They had a smaller feature set and lesser capacities in
comparison to regular laptops, at the time they came into the market. But with
passing time, notebooks too began featuring almost everything that notebooks
had. By the end of 2008, notebooks had begun to overtake notebooks in terms
of market share and sales.
Personal Digital Assistants (PDAs): It is a handheld computer and
popularly known as a palmtop. It has a touch screen and a memory card for
storage of data. PDAs can also be used as portable audio players, web browsers
and smart phones. Most of them can access the Internet by means of Bluetooth
or Wi-Fi communication.
Tablet Computers: Tablets are mobile computers that are very handy to
use. They use the touch screen technology. Tablets come with an onscreen
keyboard or use a stylus or a digital pen. Apple’s iPad redefined the class of
tablet computers.
1.3 Anatomy of Computers
The Computer mainly consists the functions input, process, output and
storage. These functions were described in the manner of diagram as follows.
The Block diagram of computer consists mainly i.e.,
Secondary Storage
Control Unit
Output
Input
Main memory unit
unit
Arithmetic &
logical unit
· Input unit
· CPU(Control unit, Main Memory and ALU)
· Output unit,
· Secondary Storage unit
1. Input: This is the process of entering data and programs in to the
computer system. Therefore, the input unit takes data from us to the computer
in an organized manner for processing through an input device such as keyboard,
mouse, MICR, OCR, Etc.,
2. Main Memory: It is also known as internal memory. It is very
fast in operation. It is used to store data and instructions. Data has to be fed
into the system before the actual processing starts. It contains a part of the
operating system Software, one or more execution programs being executed,
the data being processed and required by the programs for execution , and
processed data awaiting output.
3. Output: This is the process of producing results from the data for getting
useful information. Similarly the output produced by the computer after processing
must also be kept somewhere inside the computer before being given to you in
human readable form through the screen or printer. Again the output is also
stored inside the computer for further processing.
4. Control Unit (CU) : The next component of computer is the Control
Unit, which acts like the supervisor seeing that things are done in proper fashion.
Control Unit is responsible for co-ordinating various operations using time
signal. The control unit determines the sequence in which computer programs
and instructions are executed. Things like processing of programs stored in the
main memory, interpretation of the instructions and issuing of signals for other
units of the computer to execute them. It also acts as a switch board operator
when several users access the computer simultaneously. Thereby it coordinates
the activities of computer’s peripheral equipment as they perform the input and
output.
5. Arithmetic Logical Unit (ALU) : After you enter data through the
input device it is stored in the primary storage. The actual processing of the data
and instruction are performed by Arithmetic Logical Unit. The major operations
performed by the ALU are addition, subtraction, multiplication, division, logic
and comparison. Data is transferred to ALU from storage unit when required.
After processing the output is returned back to storage unit for further processing
or getting stored.
10 Computer Science and Engineering
Ex : (1011)2 (11010)2
2.Octal Number System :- It is base of 8 and it has only eight digits i.e
0 ,1,2,3,4,5,6 and 7. The value of the numbers is represented as power of 8 i.e.
the radix of the system. These power increases with the position of the digits as
follows.
Paper - I Computer Fundamentals and MS-Office 11
Ex : (259)10 (184)10
Ex : (5D)16 (1A5)16
Conversions
We can convert from any system to any other system as follows.
1. Decimal to Binary
Divide the decimal number by 2 repeatedly and note the remainders from
bottom to top.
12 Computer Science and Engineering
2 13
2 6 1 (1101)2
2 3 0
1 1
2 37
2 18 1
(100101)2
2 9 0
2 4 1
2 2 0
1 0
2.Decimal to Octal:
Divide the decimal number by 8 repeatedly and note the remainders
from bottom to top.
Ex1: convert (50)10 to (?)8
8 50
6 2
(62)8
Paper - I Computer Fundamentals and MS-Office 13
8 124
8 15 4 (174)8
1 7
3.Decimal to hexadecimal:
Divide the decimal number by 16 repeatedly and note the remainders
from bottom to top.
Ex1: Convert (50)10 to (?)16
16 50
3 2
(32)16
16 380
16 23 C
1 7 (17C)16
= 16 + 8 + 0 +2 + 0 = (26)10
Ex2: Convert (1101)2 into (?)10
1101 = 1 x 23 + 1 x 22 +0 x 21 + 1 x 20
= 1x8+1 x4+0x2+1x1
= 8 + 4 + 0 +1 = (13)10
5.Octal to Decimal: Multiply the Octal number with the weights of octal
system according to their position and note the sum.
Ex1: Convert (62)8 into (?)10
(62)8 = 6 x 81 + 2 x 80
= 6x8+2x1
= 48 + 2 = (50)10
Ex2: Convert (174)8 into (?)10
(174)8 = 1 x 82 + 7 x 81 + 4 x 80
= 1 x 64 + 7 x 8 + 4 x 1
= 64 + 56 + 4 = (124)10
6. Hexadecimal to Decimal: Multiply the hexadecimal number with the
weights of hexadecimal system according to their position and note the sum.
Ex1: Convert (5D)16 into (?)10
(5D)16 = 5 x 161 + D x 160
= 5 x 16 + 13 x 1
= 80 + 13 = (93)10
Ex2: Convert (1A5)16 into (?)10
(1A5)16 = 1 x 162 + A x 161 + 5 x 160
= 1 x 256 + 10 x 16 + 5 x 1
= 256 + 160 + 5 = (421)10
Paper - I Computer Fundamentals and MS-Office 15
Mouse contains at least one button and sometimes as many as three, which
have different functions depending on what program is running.
1.5.2.9 Light Pen
Light pen is an input device that utilizes a light-sensitive detector to
selectobjects on a display screen.
1.5.2.10 Speech input devices
Speech or voice input devices convert a person’s speech into digital form.
These input devices, when combined with appropriate software, form voice
recognition systems. These systems enable users to operate microcomputers
using voice commands.
1.5.3 Output Devices
Output devices receive information from the CPU and present it to the user
in the desired form. Output devices include display screen, loudspeakers,
printers, plotters, etc.
1.5.3.1 Display Screen
When a program is keyed in, the screen (which is similar to a television
screen) displays the characters. The user can read the program line by line and
make corrections before it is stored or printed on a printer. It is also possible to
bring to the screen a portion of the program stored in the external storage for
editing. Screen sizes differ from system to system. The standard size is 24 lines
by 80 characters. Most systems have provision for scrolling. This facilitates the
user to move the text vertically or horizontally on the screens thus bringing to the
screen the hidden text. Thus the user can scan through the entire file either to
review or to select a particular portion. The cursor on the screen is controlled
by the cursor keys on the keyboard,
1.5.3.2 Printer
Printer is a device that prints text or illustrations on paper and in many
cases on transparencies and other media. There are many different types of
printers. In terms of the technology utilized, printer fall into the following categories.
(i) Ink-jet Printer
Ink-jet printers work by spraying ionized ink on a sheet of paper. Magnetized
plates in the ink’s path direct the ink onto the paper in the desired shapes. Inkjet
printers are capable of producing high quality print approaching to that produced
18 Computer Science and Engineering
by laser printers. A typical ink-jet printer provides a resolution of 300 dots per
inch, although some newer models offer higher resolutions.
In general, the price of ink-jet printers is lower than that of laser printers.
However, they are also considerably slower. Another drawback of ink-jet
printers is that they require a special type of ink that is apt to smudge on inexpensive
copier paper.
Because ink-jet printers require smaller mechanical parts than laser printers,
they are specially popular as portable printers. In addition, colour ink-jet printers
provide an inexpensive way to print full-colour documents.
printing usually prints at 1,200 or 2,400 dpi. Some laser printers achieve higher
resolutions with special techniques known generally as resolution enhancement.
In addition to text, laser printers are very adept at printing graphics.
However, you need significant amounts of memory in the printer to print high-
resolution graphics. To print a full-page graphic at 300 dpi, for example, you
need at least 1 MB (megabyte) of printer RAM. For a 600-dpi graphic, you
need at least 4 MB RAM.
The speed of laser printers ranges from about 4 to 20 pages of text per
minute (ppm). A typical rate of 6 ppm is equivalent to about 40 characters per
second (cps).
(iii) Line Printer
Line printers are high-speed printers capable of printing an entire line at
one time. A fast line printer can print as many as 3,000 lines per minute. The
disadvantages of line printers are that they can print only one font, they cannot
print graphics, the print quality is low, and they are very noisy.
(iv) Thermal printer
Thermal printers are printers that produce images by pushing electrically
heated pins against special heat-sensitive paper. Thermal printers are inexpensive
and are used in most calculators and many fax machines. They produce low-
quality print, and the paper tends to curl and fade after a few weeks or months.
1.5.3.3 Plotter
Plotter is a device that draws pictures on paper based on commands from
a computer. Plotters differ from printers in that they draw lines using a pen. As a
result, they can produce continuous lines, whereas printers can only simulate
lines by printing a closely spaced series of dots. Multicolour plotters use different-
coloured pens to draw different colours.
1.5.3.5 3D-Audio
3D audio is a technique for giving more depth to traditional stereo sound.
Typically, 3D sound, or 3D audio, is produced by placing a device in a
room with stereo speakers. The device dynamically analyses the sound coming
from the speakers and sends feedback to the sound system so that it can readjust
the sound to give the impression that the speakers are further apart.
3D audio devices are particularly popular for improving computer audio
where the speakers tend to be small and close together. There are a number of
3D audio devices that can be attached to a computer’s sound card.
Paper - I Computer Fundamentals and MS-Office 21
read/write memory. The storage of data and instructions inside the primary storage
is temporary. It disappears from RAM as soon as the power to the computer is
switched off. The memories, which loose their content on failure of power supply,
are known as volatile memories. So now we can say that RAM is volatile memory.
(b) Read Only Memory (ROM) : There is another memory in computer,
which is called Read Only Memory (ROM). Again it is the ICs inside the PC
that form the ROM. The storage of program and data in the ROM is permanent.
The ROM stores some standard processing programs supplied by the
manufacturers to operate the personal computer. The ROM can only be read
by the CPU but it cannot be changed. The basic input/output program is stored
in the ROM that examines and initializes various equipment attached to the PC
when the switch is turned ON. The memories, which do not lose their content
on failure of power supply, are known as non-volatile memories. ROM is non-
volatile memory.
(c) PROM : There is another type of primary memory in computer, which
is called Programmable Read Only Memory (PROM). You know that it is not
possible to modify or erase programs stored in ROM, but it is possible for you
to store your program in PROM chip. Once the programs are written it cannot
be changed and remain intact even if power is switched off. Therefore, programs
or instructions written in PROM or ROM cannot be erased or changed.
(d) EPROM : This stands for Erasable Programmable Read Only Memory,
which overcome the problem of PROM and ROM. EPROM chip can be
programmed time and again by erasing the information stored earlier in it.
Information stored in EPROM can be erased by exposing it to ultraviolet light.
This memory can be reprogrammed using a special programming facility. When
the EPROM is in use, information can only be read.
(e) EAPROM : This stands for Electrically Alterable Programmable Read
Only Memory. This concept is same as that of EPROM. The only difference is
that the memory can be altered using electrical signals. The whole of the memory
need not be erased.
(f) Cache Memory : The speed of CPU is extremely high compared to
the access time of main memory. Therefore, the performance of CPU decreases
due to the slow speed of main memory. The decreases the mismatch in operating
speed, a small memory chip is attached between CPU and Main memory whose
access time is very close to the processing speed of CPU. It is called CACHE
memory. CACHE memories are accessed much faster than conventional RAM.
It is used to store programs or data currently being executed or temporary data
24 Computer Science and Engineering
frequently used by the CPU. It is also very expensive to have bigger size of
cache memory. Its size is therefore, normally kept small.
(g) Registers : The CPU processes data and instruction with high speed.
There is also movement of data between various units of the computer. It is
necessary to transfer the processed data with high speed. So the computer uses
a number of special memory units called registers. They are not part of the main
memory but they store data or information temporarily and pass it on as directed
by the control unit.
Secondary Storage(Auxiliary Memory)
You are now clear that the operating speed of primary memory or main
memory should be as fast as possible to cope up with the CPU speed. These
high-speed storage devices are very expensive and hence the cost per bit of
storage is also very high. Again, the storage capacity of the main memory is also
very limited.
Often it is necessary to store hundreds of millions of bytes of data for the
CPU to process. Therefore, additional memory is required in all the computer
systems. This memory is called auxiliary memory or secondary storage.
In this type of memory the cost per bit of storage is low. However, the
operating speed is slower than that of the primary memory. Huge volume of
data are stored here on permanent basis and transferred to the primary storage
as and when required. Most widely used secondary storage devices are magnetic
tapes, magnetic disks and floppy disks, Compact disks and Pen drives etc.,
Magnetic Tape
Magnetic tapes are used for large computers like mainframe computers
where large volume of data is stored for a longer time. In PCs also you can use
tapes in the form of cassettes. The cost of storing data in tapes is inexpensive.
Tapes consist of magnetic materials that store data permanently. It can be 12.5
mm to 25 mm wide plastic film-type and 500 meter to 1200 meter long which is
coated with magnetic material. The deck is connected to the central processor
and information is fed into or read from the tape through the processor. It is
similar to cassette tape recorder.
Advantages of Magnetic Tape
Compact : A 10-inch diameter reel of tape is 2400 feet long and is able to
hold 800, 1600 or 6250 characters in each inch of its length. The maximum
capacity of such type is 180 million characters. Thus data are stored much more
compact on tape
Paper - I Computer Fundamentals and MS-Office 25
Magnetic Disk
You might have seen the gramophone record, which is circular like a disk
and coated with magnetic material. Magnetic disks used in computer are made
on the same principle. It rotates with very high speed inside the disk drive. Data
are stored on both the surface of the disk. Magnetic disks are most popular for
direct access storage. Each disk consists of a number of invisible concentric
circles called tracks. Information is recorded on tracks of a disk surface in the
form of tiny magnetic sports. The presence of a magnetic sport represents one
bit (1) and its absence represents zero bit (0). The information stored in a disk
can be read many times without affecting the stored data. So the reading operation
is non-destructive. But if you want to write a new data, then the existing data is
erased from the disk and new data is recorded.
Floppy Disk
Flash drives are also very thin, often having a depth of less than a centimeter.
Because of their small form factor, they are highly portable and can easily fit in a
pocket or on a keychain (hence the name “keychain drive”).
Nowadays flash drives can store several gigabytes of information. Since
they are small in size but have large storage capacities, flash drives have replaced
most previous portable data storage mediums such as floppy disks and removable
hard disks like Zip disks. Because they have a built-in USB connection, flash
drives also don’t require a special disk drive to be used. Instead, they can be
used on any computer with a USB port, which nearly all modern computers
have. Below is the diagram of a pen drive.
how they are to be used. We can say that it is the collection of programs, which
increase the capabilities of the hardware. Software guides the computer at every
step where to start and stop during a particular job. The process of software
development is called programming.
You should keep in mind that software and hardware are complementary
to each other. Both have to work together to produce meaningful result. Another
important point you should know that producing software is difficult and
expensive.
1.7.3 Software Types
Computer software is normally classified into two broad categories.
· Application Software
· System software
Application Software: Application Software is a set of programs to carry
out operations for a specific application. For example, payroll is an application
software for an organization to produce pay slips as an output. Application
software is useful for word processing, billing system, accounting, producing
statistical report, analysis of numerous data in research, weather forecasting,
etc. In later modules you will learn about MS WORD, Excel, Power Point, etc.
All these are application softwares.
Another example of application software is programming language. Among
the programming languages COBOL (Common Business Oriented Language)
is more suitable for business application whereas FORTRAN (Formula
Translation) is useful for scientific application. We will discuss about languages
in next section.
System Software: You know that an instruction is a set of programs that
has to be fed to the computer for operation of computer system as a whole.
When you switch on the computer the programs written in ROM is executed
which activates different units of your computer and makes it ready for you to
work on it. This set of program can be called system software. Therefore system
software may be defined as a set of one or more programs designed to control
the operation of computer system.
System software are general programs designed for performing tasks such
as controlling all operations required to move data into and out of the computer.
It communicates with printers, card reader, disk, tapes etc. monitor the use of
various hardware like memory, CPU etc. Also system software are essential for
the development of applications software. System Software allows application
Paper - I Computer Fundamentals and MS-Office 29
packages to be run on the computer with less time and effort. Remember that
it is not possible to run application software without system software.
Development of system software is a complex task and it requires extensive
knowledge of computer technology. Due to its complexity it is not developed in
house. Computer manufactures build and supply this system software with the
computer system. DOS, UNIX and WINDOWS are some of the widely used
system software. Out of these UNIX and Windows-NT are multi-user operating
systems whereas DOS and WINDOWS are single-user systems.
1.7.4 What is Language ?
You are aware with the term language. It is a system of communication
between you and me. Some of the basic natural languages that we are familiar
with are English, Hindi, Oriya etc. These are the languages used to communicate
among various categories of persons. But how you will communicate with your
computer. Your computer will not understand any of these natural languages for
transfer of data and instruction. So there are programming languages specially
developed so that you could pass your data and instructions to the computer to
do specific job. You must have heard names like FORTRAN, BASIC, COBOL
etc. These are programming languages. So instructions or programs are written
in a particular language based on the type of job. As an example, for scientific
application FORTRAN and C languages are used. On the other hand COBOL
is used for business applications.
1.7.5 Programming Languages
There are two major types of programming languages. These are Low
Level Languages and High Level Languages. Low Level languages are further
divided in to Machine language and Assembly language.
Low Level Languages
The term low level means closeness to the way in which the machine has
been built. Low level languages are machine oriented and require extensive
knowledge of computer hardware and its configuration.
(a) Machine Language
Machine Language is the only language that is directly understood by the
computer. It does not needs any translator program. We also call it machine
code and it is written as strings of 1’s (one) and 0’s (zero). When this sequence
of codes is fed to the computer, it recognizes the codes and converts it in to
electrical signals needed to run it. For example, a program instruction may look
like this:
30 Computer Science and Engineering
1011000111101
It is not an easy language for you to learn because of its difficult to understand.
It is efficient for the computer but very inefficient for programmers. It is considered
to the first generation language. It is also difficult to debug the program written in
this language.
Advantage
The only advantage is that program of machine language run very fast
because no translation program is required for the CPU.
Disadvantages
1. It is very difficult to program in machine language. The programmer has
to know details of hardware to write program.
2. The programmer has to remember a lot of codes to write a program
which results in program errors.
3. It is difficult to debug the program.
(b) Assembly Language
It is the first step to improve the programming structure. You should know
that computer can handle numbers and letter. Therefore some combination of
letters can be used to substitute for number of machine codes.
The set of symbols and letters forms the Assembly Language and a translator
program is required to translate the Assembly Language to machine language.
This translator program is called ‘Assembler’. It is considered to be a second-
generation language.
Advantages
1. The symbolic programming of Assembly Language is easier to understand
and saves a lot of time and effort of the programmer.
2. It is easier to correct errors and modify program instructions.
3. Assembly Language has the same efficiency of execution as the machine
level language. Because this is one-to-one translator between assembly language
program and its corresponding machine language program.
Disadvantages:
1. One of the major disadvantages is that assembly language is machine
dependent. A program written for one computer might not run in other computers
with different hardware configuration.
Paper - I Computer Fundamentals and MS-Office 31
virus is not directly damaging information, the process of replication can slow
your computer and Internet connection.
Worm
An unwanted computer program that duplicates itself across a computer
network. It uses up the network’s storage space and resources and can interfere
with the ability of network to function at all. Most worms begin as e mail
attachments that infect a computer when they’re opened.
Trojan horse
A Trojan horse is a malicious software program that hides inside other
programs. It enters a computer hidden inside a legitimate program, such as a
screen saver. It then puts code into the operating system, which enables a hacker
to access the infected computer. Trojan horses do not usually spread by
themselves; they are spread by viruses, worms, or downloaded software.
Blended threat
A blended threat is a combination of some or all of the malicious programs
discussed in the sections above. Blended threats often begin when someone
interacts with a virus (such as opening an unsafe e mail attachment). The virus
automatically propagates using worm behavior, and then installs a Trojan horse
on the infected computer.
How do I prevent viruses?
Prevention of infection is much better. Install an antivirus program. To be
most effective, an antivirus program should always be turned on, should scan
incoming e mail, and should scan file access.
How do I know if my computer has a virus?
There is no single indicator of a virus infection, but some of the more common
effects include poor computer performance, pop-up ads displaying (even when
you have turned on a pop-up blocker or disconnected from the Internet).
Summary
The difference between Computers and human beings are:
1) Computer is a dumb machine and it cannot do any work without instruction
from the user. It is you to decide what you want to do and in what sequence. So
a computer cannot take its own decision as you can.
34 Computer Science and Engineering
1. Both compiler and interpreter are program translators used for translating
higher level language into machine language. While compiler scans the entire
program first and then translates it into machine code, an Interpreter translates
the program line by line.
2. FORTRAN (Formula Translation) and BASIC (Beginners All-purpose
Symbolic Instruction Code) are some of the high level languages.
To improve the system performance and to maintain standards we must
use utilities such as File management programs, Disk management programs,
Memory management software, Backup programs, data recovery programs ,
Data compression programs and Anti virus programs.
Short Answer Type Questions
1. What is a Computer?
2. What are the components used in Second generation computers?
3. What are the types computers based on purpose?
4. What are the types computers based on operation?
5. What are the different number systems?
6. Convert (42)10 into (?)2
7. Convert (84)10 into (?)8
8. Convert (143)10 into (?)16
9. Convert(1100)2 into (?)10
10. Convert(253)8 into (?)10
11. Convert(2B)16 into (?)10
12. Convert(120)8 into (?)2
13. Convert(7F)16 into (?)2
14. Convert(111010)2 into (?)8
15. Convert(111110)2 into (?)16
16. Convert(4C)16 into (?)8
17. Convert (125)8 into (?)16
18. Why binary numbers are used in computers.
36 Computer Science and Engineering