Computing Applications
Computing Applications
FEBRUARY 9, 2017
Rashid REHMAT
PREMIER INSTITUTE OF LAHORE (GCUF) Rashid_jica@hotmail.com
Information & Communication Technology MIT| Rashid Rehmat
COMPUTER OVERVIEW
ICT (Information and Communication Technology)
ICT is the technology required for information processing, in particular, the use of electronic computers,
communication devices and software applications to convert, store, protect, process, transmit and
retrieve information from anywhere, anytime.
Information refers to the knowledge obtained from reading, investigation, study or research. We need
information to make decisions and to predict the future. For example, scientists can detect the
formation of a tsunami using the latest technology and warn the public to avoid disasters in the affected
areas.
Communication is an act of transmitting messages. It is a process whereby information is exchanged
between individuals using symbols, signs or verbal interactions. Previously, people communicated
through sign or symbols, performing drama and poetry. With the advent of technology, these ‘older’
forms of communication are less utilized as compared to the use of the Internet, e-mail or video
conferencing. Communication is important in order to gain knowledge. With knowledge, we are more
confident in expressing our thoughts and ideas.
Technology is the use of scientific knowledge, experience and resources to create processes and
Proc
products that fulfill human needs. Technology is vital in communication.
Defining Computers
essin
A digital electronic device that converts input (data) into output (information) which is useful to people
g/
Inp Com Ou
ut putin tp
g ut
Types of computers (on the basis of their function and nature)
There are three main types of computer:
Analog computer represents data as a continuous spectrum of values, and gives output in form
of voltage signals i.e. between -15 and +15 volts. Slide Rule, Curvimeter were early analog
computers.
Digital computer uses number to represent information. Two digits 0 and 1 combine to make
data. Most of the modern computers are digital. Mark-I was first general purpose digital
computer built in 1940s by Aiken. Examples of digital computers are IBM PC, Apple Mac etc.
Hybrid Computers are the computers which processes both digital and analog data. It can be a
digital computer that accepts analog signals and process them in digital form. Some of the
applications of hybrid computers are Devices used in petrol pumps, machines used in hospitals
to measure B.P
Classification (Categorization) of computers
Computers can be categorized on the basis of size and speed as:
Computers used by individual users
Desktop Computer is personal computer designed for regular use at a single location on or near a desk
or table due to its size and power requirements. Desktop computers are available in horizontally-
oriented casing and tower casing e.g. Microsoft PC
Workstations are the specialized, powerful desktop computers designed for engineers, architects. It's
intended for business or professional use (rather than home or recreational use). Workstations and
applications designed for them are used by small engineering companies, architects, graphic designers,
and any organization, department, or individual that requires a faster microprocessor, a large amount of
random access memory (RAM), and special features such as high-speed graphics adapters. The most
common operating systems for workstations are UNIX and Windows NT.
Notebook Computers are small, portable computers, weighs between 3 and 8 pounds and is about 8 ½
by 11 inches. A notebook can effectively be turned into a desktop computer with a docking station, a
hardware frame that supplies connections for peripheral input/output devices such as a printer or larger
monitor. A laptop is a small, portable computer -- small enough that it can sit on your lap.
Nowadays, laptop computers are more frequently called notebook computers, though
technically laptops are somewhat larger in size than notebooks, in both thickness and weight.
Tablet Computer, commonly known as tablet, is a portable, thin, flat mobile computer with a touch
screen display, which is usually in color, processing circuitry, and a rechargeable battery in a single
device. Tablets often come equipped with sensors, including digital cameras, and a microphone.
The touch screen display uses the recognition of finger or pen (stylus) gestures to replace
the mouse, track pad and keyboard used in laptops. Tablets run specialized versions of office products.
Tablets are typically larger than smart phones or personal digital assistants with screens 7 inches (18 cm)
or larger, measured diagonally.
Handheld Devices are computing equipment that can be used in the hand, such as PDA, smart phone or
tablet computer.
PDA: - (Personal digital assistant) is a term for a small, mobile, handheld device that provides
computing and information storage and retrieval capabilities for personal or business use, often
for keeping schedules, calendars and address book information handy.
Smart Phones typically combine the features of a mobile phone, such receiving voice calls and
creating text messages, with digital mobile devices like personal digital assistants (PDAs), such as
an event calendar, media player, video games, GPS navigation, digital camera and digital video
camera. They are often called the hybrid of cell phone and PDA. It can be used for Web surfing,
or e-mail access e.g. Black Berry
Computers used by Organizations
Network Server is a centralized computer (often simply a powerful desktop) that provides data and
network resources to all computers (clients) connected in the network. Multiple servers in cluster are
called server farms.
Super Computers are the most powerful, largest and fastest computers, used to handle large and
complex calculations, processing trillions of operations per second. They are used in research
organizations, weather forecasting e.g. Cray-1 and Cray-2
Mainframe computers (big computers or big irons) are computers used primarily by large organizations
for bulk data processing, such as census, enterprise resource planning, and transaction processing. They
are large and expensive computer capable of supporting hundreds, or even thousands, of users
simultaneously, with the help of terminals (dumb or intelligent). They are often used in air Lines, banks,
universities etc. IBM S/390 is an example of mainframe.
Terminal consists of a monitor, keyboard and mouse, by using which number of users can access the
systems. It can be dumb or intelligent.
Mini-Computers (mid-range computers), a term no longer much used, are the computers of a size
intermediate between a microcomputer and a mainframe. They are capable of supporting hundreds of
users simultaneously, with the help of terminals e.g. Hewlett-Packard HP 3000 series, HP 2100 series,
HP1000 series.
Micro-Computer is a computer with a central processing unit (CPU) as a microprocessor, designed for
individual use. The term was introduced in the 1970s to differentiate desktop computer systems from
larger minicomputers. It is often used synonymously with the term "desktop computer," but it may refer
to a server or laptop as well e.g. Microsoft PC, Laptop computers.
Micro-Controllers also called embedded computer, is a compact microcomputer designed to govern the
operation of embedded systems in motor vehicles, robots, office machines, complex medical devices,
mobile radio transceivers, vending machines, home appliances, and various other devices.
ICT and Society
Military
Controlling smart weapons
Geospatial analysis
Analyzing data for army leaders
Home
Helping students to do their homework
Playing video games
Enabling people to be in contact through social media
Surgeons
Surgical education through virtual surgery
Surgery simulators are used to train medical students
Education
Teachers use computers to research for teaching materials, participate in online forums and
online conferences as well as to aid their teaching.
Students use the computers as a reference tool. They use computers to browse the Internet to
look for information.
School administrators use computers for administrative purposes to make sure that the entire
operation runs smoothly.
Main parts of a computer system
Four main parts of a computer system are:
• In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the
Macintosh. Microprocessors also moved out of the realm of desktop computers and into many
areas of life as more and more everyday products began to use microprocessors.
• As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of the Internet.
• Fourth generation computers also saw the development of GUIs, the mouse and handheld
devices.
Fifth Generation (1989 to Present and Beyond) Artificial Intelligence
• Fifth generation computing devices, based on artificial intelligence, are still in development,
though there are some applications, such as voice recognition, that are being used today. The
use of parallel processing and superconductors is helping to make artificial intelligence a reality.
• Quantum computation and molecular and nanotechnology will radically change the face of
computers in years to come. The goal of fifth-generation computing is to develop devices that
respond to natural language input and are capable of learning and self-organization.
• In the area of computer networking, both wide area network (WAN) and local area network
(LAN) technology developed at a rapid pace, stimulating a transition from the traditional
mainframe computing environment toward a distributed computing environment in which each
user has their own workstation for relatively simple tasks (editing and compiling programs,
reading mail) but sharing large, expensive resources such as file servers and supercomputers.
• RISC technology (a style of internal organization of the CPU) and plummeting costs for RAM
brought tremendous gains in computational power of relatively low cost workstations and
servers.
• This period also saw a marked increase in both the quality and quantity of scientific
visualization.
Least Significant Bit (LSB):- is the lowest bit in a series of numbers in binary; the LSB is located at the far
right of a string.
For example, in the binary number: 10111001, the least significant bit is the far right is 2^0=1.
Most Significant Bit (MSB):- is the bit in a multiple-bit binary number with the largest value.
Terabyte
Multiply the ≈ 1,000
digit in each column by the column GBfor that
multiplier value orcolumn
1 to give:
As (8^2 = 64), (8^1 = 8) and (8^0 =1), this gives a multiplier value for each column.
(TB)
1x64 = 64 2x8 =16 6x1 = 6
Then simply add these results to give the million
decimal value. MB or 1
64 + 16 + 6 = 8610
7 0
5
111 000
101
7058 = 1110001012
The above conversion can also be done by first converting the octal number into decimal, then decimal
to binary.
Binary to Octal:-
– Group bits in threes, starting on right
– Convert to octal digits
Example: 10110101112 =? 8
1 011 010
111
1 3 2
7
10110101112 = 13278
1 0 A
F
0001 0000
1010 1111
10AF16 = 00010000101011112
The above conversion can also be done by first converting the hexadecimal number into decimal, then
decimal to binary.
Binary to hexadecimal:-
– Group bits in fours, starting on right
– Convert to hexadecimal digits
Example: 10101110112 =? 16
10 1011
1011
B B
10101110112 = 2BB16
1 F
0
1C 7 4
1 4
0001 1111
0000
1100
1F0C16 = 174148
Similarly, to convert octal to hexadecimal, octal number is first converted into binary and then binary is
converted into hexadecimal number. If we just reverse the order of above example we can perform this
conversion.
174148 =1F0C16
Binary Arithmetic
In binary number system there are only 2 digits 0 and 1, and any number can be represented by these
two digits. The arithmetic of binary numbers means the operation of addition, subtraction,
multiplication and division. Binary arithmetic operation starts from the least significant bit i.e. from the
right most side.
Binary Addition
It is a key for binary subtraction, multiplication, division. There are four rules of binary addition.
In fourth case, a binary addition is creating a sum of (1 + 1 = 10) i.e. 0 is written in the given column and
a carry of 1 over to the next column.
Example − Addition
Binary Subtraction
Subtraction and Borrow, these two words will be used very frequently for the binary subtraction. There
are four rules of binary subtraction.
Example − Subtraction
Binary Multiplication
Binary multiplication is similar to decimal multiplication. It is simpler than decimal multiplication
because only 0s and 1s are involved. There are four rules of binary multiplication.
Example − Multiplication
Binary Division
Binary division is similar to decimal division. It is called as the long division procedure.
Example − Division
Boolean Logic
Boolean logic is a form of algebra in which all values are reduced to either TRUE
(1) or FALSE (0). Boolean algebra is a mathematical system for the manipulation
of variables that can have one of two values. In formal logic, these values are
“true” and “false.” In digital systems, these values are “on” and “off,” 1 and 0, or
“high” and “low.” Boolean expressions are created by performing operations on
Boolean variables.
Boolean operators
Common Boolean operations include AND Operation, OR Operation and NOT
Operation. A Boolean operator can be completely described using a truth table.
The truth table for the Boolean operators AND
The AND operator is also known as a Boolean product. It is used for logical multiplication. It gives TRUE
result only if both the inputs are ‘TRUE ‘or ‘1’
The truth table for the Boolean operators
The OR operator is the Boolean sum. It is used to perform logical sum. It returns TRUE of ‘1’ if any of the
inputs is 1.
The truth table for the NOT operators
The OR operator is the Boolean sum. It is used to perform logical sum. It returns TRUE of ‘1’ if any of the
inputs is 1.
Boolean Function
A Boolean Function is described by an algebraic expression called Boolean expression which consists of
binary variables, the constants 0 and 1, and the logic operation symbols. Consider the following
example.
Here the left side of the equation represents the output Y. So we can state equation no. 1
The output will be high (1) if A = 1 or BC = 1 or both are 1. The truth table for this equation is shown by
Table (a). The number of rows in the truth table is 2nwhere n is the number of input variables (n=3 for
the given equation). Hence there are 2^3 = 8 possible input combination of inputs.
Logic Gates
Boolean functions are implemented with the help of digital computer circuits called gates. A Logic
gate is an electronic device that produces a result based on two or more input values.
AND Gate
OR Gate
NOT Gate
• One input signal and one output signal, also called as inverter.
• Output is always opposite state of the input.
• Logic equation Y = A
• Where is A is the complement of A.
Combinational Circuits
Combinational logic circuits give us many useful devices. One of the
simplest is the half adder, which finds the sum of two bits. We can
gain some insight as to the construction of a half adder by looking at
its truth table
As we see, the sum can be found using the XOR operation and the
carry using the AND operation.
Memory
Computer memory is any physical device capable of storing information temporarily or permanently. For
example, Random Access Memory (RAM), is a volatile memory that stores information on an integrated
circuit used by the operating system, software, and hardware.
store firmware (software that is closely tied to specific hardware and unlikely to need frequent updates).
It contains the basic input output system or BIOS (POST). Different type of ROM are:
PROM: programmable ROM
Only written once then its contents cannot be deleted
EPROM: erasable PROM
Erasable Programmable Read Only Memory designed for recovering the problems of PROM and
ROM. Users can delete the data of EPROM thorough ultraviolet light and it erases chip is
reprogrammed.
EEPROM: electronically EPROM
Electrically Erasable Programmable Read Only Memory similar to the EPROM but it uses
electrical beam for erase the data of ROM. It can be erased using electronic impulses and
written again
RAM is an acronym for Random Access Memory, a type of fast access computer memory that can
be accessed randomly; that is, any byte of memory can be accessed without touching the preceding
bytes. RAM is the most common type of memory found in computers and other devices, such
as printers. Memory is divided into units or words; each is usually a standard size or fixed-length. When
the computer is running, both Program Data (variables) are stored in the memory. RAM is Volatile in
nature, means all the data disappears when power is off.
Following two technologies are used to build RAM
SRAM: static RAM
Faster and expensive
No need to refresh its contents
Cache memory: fast memory inside CPU chip
DRAM: dynamic RAM
Most commonly used technology to build RAM
Need to be refreshed periodically
Main memory
Differences between ROM and RAM
Random Access Memory (RAM) Read Only Memory (ROM)
Volatile - Data is lost if the computer crashes or Non-volatile - Data is never lost
is turned off.
Data is temporary - it is only there as long as Data is permanent - it can never be changed
the computer is on and it can be changed
Data can be written to or read from. Data can only be read
Virtual memory
Virtual memory is a feature of an operating system (OS) that allows a computer to compensate for
shortages of physical memory by temporarily transferring pages of data from random access memory
(RAM) to disk storage.
Processor
CPU (Central Processing Unit) of a computer is a piece of hardware that carries out the instructions of a
computer program. The CPU is like the brains of the computer - every instruction, no matter how simple,
has to go through the CPU.
Basic elements of a processor
CU (Control Unit):
Control unit controls the flow of data into and from the Central Processing Unit. It generates signals to
the computer system to execute the programs. It does not itself execute the programs; rather it directs
other parts of system to do so. It must communicate with ALU, memory and other parts of computer
system. It also controls the flow of information through the processor and coordinates the activities of
other units.
ALU (Arithmetic/Logic Unit)
ALU is an electronic circuit that that performs all Arithmetic i.e. addition, subtraction, multiplication,
division and Logical operations such as equal to, less than, greater than. The process of performing
arithmetic and logical operations with the help of computers is called Electronic Data Processing (EDP).
Registers
Registers are fast storage locations that hold data or instructions temporarily. Type of registers includes:
• Data registers: Holds data coming from or to be sent to RAM
• Instruction registers: Used for storing and decoding instructions
• Accumulator Registers: Stores the result of latest calculation
• Address Registers: Keeps the track of where data is stored in memory
• Program counter: has the address of next instruction to be executed
Cache Memory
Cache memory, also called CPU memory that a computer microprocessor can access more quickly than
it can access regular RAM. This memory is typically integrated directly with the CPU chip or placed on a
separate chip that has a separate bus interconnect with the CPU.
• L1 is "level-1" cache (2KB-64KB) memory, usually built onto the microprocessor chip itself. For
example, the Intel MMX microprocessor comes with 32 thousand bytes of L1. Instructions are
first searched in this cache. L1 cache is very small in comparison to others, thus making it faster
than the rest.
• L2 (that is, level-2) cache (256KB-512KB) memory is on a separate chip (possibly on an
expansion card). If the instructions are not present in the L1 cache then it looks in the L2 cache,
which is a slightly larger pool of cache, thus accompanied by some latency.
System clock refers to a microchip that regulates the timing and speed of all computer functions. The
speed of a computer processor is measured in clock speed, for example, 1 MHz is one million cycles, or
vibrations, a second
Instruction Set is the complete set of all the instructions in machine code that can be recognized and
executed by a CPU (Built-in)
Machine Cycle
A series of steps taken by CPU to execute an instruction is called machine cycle. It includes:
Instruction cycle
Fetch: CU fetches instructions or data from memory
Decode: CU breaks down (or decodes) instructions into computer commands/instruction sets
(ADD,SUB,LOAD)
Inside the
Execution cycle
Execute: ALU actually processes the commands
Store: result is stored in memory
Data Bus
Data bus the most common bus which is used to carry data. It is an electric path that connects CPU,
memory, I/O devices and storage. The bus contains parallel group of lines, greater the number of lines,
greater the speed of data transfer. For example a bus with 16 lines carries 16 bits (2 bytes) and 32 lines
(32 bits or 4 bytes) of data.
Address Bus
Address bus is a computer bus that is used to carry address information. It is a set of wires like data bus
that only connect CPU and memory. Whenever the processor needs date from the memory, it places
address of data to be accessed on address bus; it fetches data from the specified address and places on
data bus.
Number of lines in address bus determines the maximum number of memory addresses. For example
maximum number of memory locations for address bus with 8 lines is 2^8=256 and 32 lines can access
4GB of memory
Control bus
Control bus is used to carry control information from control unit to other units. It directs the transfer of
data to the ALU from memory. It also controls the functioning of I/O and storage devices
PORT
A port is a connector at the back of a computer where you plug in an external device such as a printer,
keyboard, or scanner.
• Video port(s): to connect monitors
• Audio ports: to connect speakers and/or headphones
• USB ports: keyboards, pointing devices, printers, cameras, disk drives, portable storage devices,
etc.
• Serial Port (COM Ports) allows serial devices such as mouse, modem, keyboard
• Parallel Ports (LPT Ports) lets an external parallel device printers to communicate with the
computer by transmitting more bits (8 or 25) of data at the same time therefore, these ports are
much faster than serial ports
RISC and CISC processors
RISC (Reduced instruction set computer) and CISC (Complex instruction set computer) are the types of
instruction set for the processors. Processors with RISC architecture were having less number of
instructions as compared to processors with CISC architecture.
Expansion Slots in a Pc
An expansion slot is a socket on the motherboard that is used to insert an expansion card (or circuit
board), which provides additional features to a computer such as video, sound, advanced graphics,
Ethernet or memory.
PERIPHERAL DEVICES
A device which is used to put information into and get information out of the computer is called a
Peripheral Device.
Input devices: mouse, keyboards, etc.
Output devices: monitors, printers, etc.
Input/output devices: touchscreens.
Input Devices
PREMIER INSTITUTE OF LAHORE (GCUF) 17 | P a g e
Information & Communication Technology MIT| Rashid Rehmat
Input Devices are the devices which are used to enter data into the computer. Common input devices
are:
• Keyboard
• Pointing Devices
• Data Scanning Device
Keyboard:-
The most common input device, used to enter text, characters and other commands into the computer.
Most of the standard keyboards are QWERTY. This name comes from the order of the first six keys on
the top left letter row of the keyboard (Q W E R T Y). The QWERTY design is based on a layout created
for typewriters.
The major groups of keys on the keyboard are:
• Alphanumeric Keys: used to enter alphabets and numbers
• Modifier Keys: used to modify input in combination i.e. ALT, CTRL, SHIFT
• Numeric Keypad: contains the numbers from 0…..9
• Function Keys: set of 12 keys used to perform some specific function
• Cursor-movement Key: are the keys used to move right, left, up and down (Arrow Keys)
Functions of ALT, CTRL and SHIFT Keys
CTRL, ALT and SHIFT keys are used to change (alter) the function of any other pressed key. They are
called modifier keys. CTRL+C: is used to copy and file or text, ALT+F4: is used to close any program or file
you are working on, SHIFT+3: is used to enter # sign
Function of Other important keys
Start key: (Windows logo key) is used to show start menu containing all the program files
Enter key: used to enter commands and move cursor to next line
Esc key: short for escape, is used to exit from programs and tasks
CAPS Lock key: Toggle key that, when activated, causes all alphabetic character to uppercase
Tax Key: enables the cursor to jump couple of spaces to the right
Backspace key: deletes the characters at the left of the cursor
Space Bar key: moves the cursor one space to the right
Delete key: deletes the character at the current position and one at right of the cursor position. It is also
used to delete selected object.
Keyboard Controller
Keyboard controller is a small chip inside the keyboard, which sends signals to the system when a key is
pressed.
On key press, Keyboard controller, a small chip notes that a key has been pressed.
Keyboard Controller places a code into a part of its memory called, Keyboard Buffer (temporary
storage)
Keyboard controller then sends signal to the system software
System reads the code from the keyboard buffer and passes it to the CPU
Track ball is used in military applications, video games and now in some new mobile phones like T-
Mobiles, blackberry etc.
3. Touch Pad
A touchpad, track pad or mouse pad is a pointing device with a specialized surface that can translate the
motion and position of a user's fingers to a relative position on the operating system that is outputted to
the screen. Touchpads are a common feature of laptop computers. Because they vary in size, they can
also be found on personal digital assistants (PDAs) and some portable media players.
4. Touch Screen Stylus
Touch Screen is an input device that accepts input from users through fingertips directly on computer
screen. ATM Machines and PTCL Billing machines are the examples of touch screen
5. Stylus
Stylus is an input device that uses pressure to enter information or to click and point Styluses are used
with PDAs, Tablet PCs and Graphics tablets
Game controllers
A game controller is a device used with games or entertainment systems to provide input to a video
game, typically to control an object or character in the game. There are several type of gaming devices
such as gamepads, joysticks, gaming wheels and force feed etc.
Data Scanning Devices
Image Scanning Device
An image scanner is a digital device used to scan images, pictures, printed text and objects and then
convert them to digital images. ... The most widely used type of scanner in offices or homes is a
flatbed scanner, also known as a Xerox machine.
Barcode Reader
A barcode reader is also called a price scanner or point-of-sale (POS ) scanner, is a hand-held or
stationary input device used to capture and read information contained in a bar code . A barcode reader
consists of a scanner , a decoder (either built-in or external), and a cable used to connect the reader
with a computer.
Optical Character Recognition (OCR)
An electronic device used for reading printed characters and changed into machine readable form.
OCR (optical character recognition) is the recognition of printed or written text characters by a
computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in
image, and then translation of the character image into character codes, such as ASCII, commonly used
in data processing.
Output Devices:-
Output Devices are the devices which are used to get information from the computer e.g. monitor,
printer, speaker etc.
1) Printers
A printer is any device that prints text or illustrations on paper. There are two main types of printers
Impact Printers: printer which make impact or strike the paper while printing i.e. Dot Matrix printer,
daisy wheel printer and line printers, and band printers
Dot-matrix printer: A type of printer that produces characters by striking pins against an ink
ribbon to print closely spaced dots in the appropriate shape. They are expensive, noisy, slow,
and produce low-quality output. However, they can print to multi-page forms (that is, carbon
copies), something laser and ink-jet printers cannot do. The speed of dot-matrix printers is
measured in characters per second (cps). The slowest printer can print 50-70 cps and fastest can
print up to 500cps.
Line Printers
It works like a dot-matrix printer but uses a special wide print head that can print an entire line
of text at one time. Line printers produce low-resolution print, but are incredibly fast; the fastest
printer can print 3,000 lines of text per minute.
Band Printer
A band printer features a rotating band embossed with alphanumeric characters. To print a
character, the machine rotates the band to the desired character, and then a small hammer taps
the band pressing the characters against the ribbon. They are fast and robust. A good quality
band printer can generate 2000 lines of text per minute.
Non-Impact Printers: printers which don’t make impact or strike the paper while printing i.e. laser
printer, ink-jet printers, thermal printers
Laser printer
Laser printer Forms images using an electrostatic process. It produces high-quality text and
graphics by repeatedly passing a laser beam back and forth over a "drum". They can print
between 3 and 30 pages per minute
Inkjet printer
Inkjet is one of the most popular printers, which make images by forcing droplets through
nozzles. Top speed of an ink-jet printer is 20 pages per minute
Plotters
A Plotter is a special kind printer. It is like a printer because it produces images on paper, but they are
typically used to print large format, such as construction drawings created by an architect. Following are
the types of plotters
• Table or Flatbed Plotters: pen is used to write of paper wrapped on a drum
• Roller Plotter (Drum Plotters): two arms at right angle draw at stationary piece of paper
• Electrostatic Plotters: draws on negatively charged paper with positively charger toner
2) Monitor
Monitor is an output device which is used to display information to the user on screen
Basic types of monitors
The two basic types of monitors are:
Cathode Ray Tube (CRT) monitors
CRT works by moving an electron beam across the back of the screen to light up phosphor dots on the
inside of the glass tube, thereby illuminating the active portions of the screen.
LCD/Flat Panel monitors
LCD (Liquid Crystal Display) uses two sheets of polarizing material with a liquid crystal solution between
them. An electric current passed through the liquid causes the crystals to align so that light cannot pass
through them. Color LCD displays use two basic techniques for producing color:
Passive matrix is the less expensive of the two technologies.
Thin film transistor (TFT) or active-matrix, produces color images that are as sharp as traditional
CRT displays, but the technology is expensive
are active speakers, meaning they have an internal amplifier which allows you to increase the volume, or
amplitude, of the sound. Speakers usually come in pairs, which allow them to produce stereo sound
from two separate audio channels.
Computer Software
A set of programs and instructions used to operate computers is called software. It is the part of
computer which we cannot touch. There are two main types of software.
Application Software
System Software
System Software
PREMIER INSTITUTE OF LAHORE (GCUF) 22 | P a g e
Information & Communication Technology MIT| Rashid Rehmat
System Software is a set of programs that coordinates the functions of the hardware and various other
programs i.e. Operating system, utilities, device drivers etc.
Functions of system software
loading programs and data into memory
executing programs
saving data to disks
displaying information on the monitor
Transmitting data through a port to a peripheral device
Different types of system software
System software may include
Operating System: a software that acts as an intermediary between user and computer e.g.
Window XP
Utilities: a program that performs specific task related to the management of computer
functions such as copying files between storage devices, repair of damaged data files, translating
files so programs can read them, guard against viruses and harmful programs, Compress files so
they take up less space. File Compression, Zip file, antivirus, screen savers, disk fragmentation
are the examples of utilities
Disk Drivers: programs that enable I/O devices to communicate with the computer such as
keyboard, mice, printer. Some device drivers are included in the operating systems, many are
bundled with peripherals, and others are sold as separate products.
Compilers and translator programs: enable programmers to create other software. These are
the system software which convert high level language program into machine language.
Application Software
A set of programs that help users solve particular computing problems is called application software i.e.
Microsoft office, Adobe, Video games etc.
Commercial Software
Any software that must be purchased or paid for in some way are called commercial software.
Commercial software come in many different forms:
Standalone programs
Standalone program is an application having many features but perform one type of task such as word
processing software, email program, graphics programs.
Software suite or package
Software suits or packages are integrated tools that are designed to work together e.g. MS office, Corel
family, Graphics software etc.
Shareware
These are the software shared to the users for trial, which may be deactivated after a certain period,
after which the user is bound to purchase the software to get full services.
Freeware Software
Freeware is a close cousin to Shareware. It is the software that is made available to the users for free. It
may sound like a Public Domain Software but it is not. In case of freeware and shareware, the original
author maintains an ownership concern, even though it is free. The user has to abide by the license
agreement, and is not allowed to modify or sell it to others.
Public Domain Software
Public domain software is freeware (no compensation is expected usually) and their source code is
available for free for anyone to use for any purpose.
Open Source Software
Open source software is the program distributed with source code with editable formats, allowing users
to modify or customize the source code at will e.g. Apache (web server)
Word processing software
A word processor is computer software application that performs the task of composing, editing,
formatting, and printing of documents e.g. Microsoft word. Word processor’s interface may have
following features:
Menu bar: it displays titles on menus (lists of commands and options). Latest word processors
have ribbon and tabs instead of menu items.
Title Bar: Tile bar is at the top of the document showing the name of the documents
Status Bar: Displays the status related to your position in the document, page count and the
status of keyboard keys
Tool Bar: Displays buttons which represent frequently used commands
Ruler: used to show the position of the text, margins, tabs, indents, other elements on the page
Scroll Bars: Lets you scroll through the document if it is too large
Spreadsheet Program
Spreadsheet software is a software application capable of organizing, storing and analyzing data in
tabular form, performing calculations using formulas e.g. Microsoft Excel
In a spreadsheet, spaces that hold items of data are called cells. Each cell is labeled according to its
placement (for example, A1, A2, A3...) and may have an absolute or relative reference to the cells
around it. A spreadsheet is generally designed to hold numerical data and short text strings.
Presentation Software
Presentation program is software used to display information in the form of a slide show. It is often used
to prepare lectures and presentations for demonstration e.g. MS Power Point
Database software
Database program is software used to create database so that information could be easily stored,
accessed or modified e.g. MS Access
Graphics Software
Graphics software refers to a program or collection of programs that enable a person to manipulate
images on a computer. Computer graphics can be classified into Bitmap and Vector images:
Raster Graphics (Bitmap)
Bitmap is an image which is drawn using a pixel grid/2-D array of pixels, where each grid has a color. It is
used to store drawings and pictures. Resizing a bitmapped image can reduce its quality. Common bitmap
formats are GIF, TIFF, JPG, BMP, etc. Following are the programs which work with bitmap graphics:
Paint Program
A paint program is a software graphics program that allows the user to draw or paint bitmapped
images on a computer. Though most are discontinued, examples include: Kolour Paint, X Paint,
Deluxe Paint, Map Paint, and Microsoft Paint etc.
Photo-editing software
Photo-editing software is a graphics program which is used to modify and manipulate digital images.
It works at the pixel level in order to enhance pictures and images e.g. Adobe Photoshop, GIMP etc.
Vector Graphics
Vector images use set of vectors drawn using mathematical formulas describing the properties of shapes
drawn. Resizing image will not reduce quality. Common vector images formats are DXF and IGES.
Draw Programs
Draw programs are graphics programs which are used to create vector based images. The objects
drawn in this program are treated as distinct objects. This tool is used when accuracy is critical.
Adobe Illustrator is an example of draw programs
Computer Aided Design (CAD)
CAD is a computerized version of hand-drafting process. CAD software is used by architects,
engineers, drafters, artists, and others to create precision drawings or technical
illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-
dimensional (3-D) models. AutoCAD is an example of such software
3D modeling software
3D modeling is the process of using software to create a mathematical representation of a 3-
dimensional object or shape, which is then animated frame by frame. The created object is called a
PREMIER INSTITUTE OF LAHORE (GCUF) 24 | P a g e
Information & Communication Technology MIT| Rashid Rehmat
3D model and these 3-dimensional models are used in a variety of industries. The film, television,
video games, architecture, construction, product development, science and medical industries all
use 3D models to visualize, simulate, and render graphic designs. 3D Max, Maya are the examples of
3D modeling software
Acquiring images into the computer
Images can be loaded into the computer through
Scanners
An image scanner is a device that optically scans images, printed text, handwriting or an object and
converts it to a digital image and then stores it into the computers. Commonly used in offices are
variations of the desktop flatbed scanner where the document is placed on a glass window for scanning.
Clip art
Clip art, in the graphic arts, is pre-made images used to illustrate any medium. Most office suites include
a selection of clip art. Clip art comes in many forms, both electronic and printed. However, most clip art
today is created, distributed, and used in an electronic form. Additional clip art is available online.
Digital cameras
A digital camera a device that produces digital images that can be stored in a computer, displayed on a
screen and printed. Image created by a digital camera is usually a JPG file
Digital video cameras
A camera that captures moving images and converts them into electronic signals so that they can be
saved on a storage device is called Digital Video Camera or Video Camcorder, or Digital Camcorder.
Important Features of Software
• Documentation: Instructions for installing and using software—may be printed manuals or
digital files (Read Me, Help Files)
• Updating and Upgrading Software: Free updates provided by companies for bug fixes and
improvements several times a year, often provided every year or two
• Compatibility Requirement: Specify computer or OS required for a software package i.e.
Windows 7 required, Requires 2 GB of RAM
• Disclaimer—end-user license agreement(EULA)—protects companies from errors in programs
• Licensing: Buy software license not program
Real-time operating system (RTOS): very fast and relatively small OS, used to run real-time applications
and computers embedded in machinery, robots, scientific instruments and industrial systems. An
important part of an RTOS is managing the resources of the computer so that a particular operation
executes in precisely the same amount of time every time it occurs
Examples: QNX, Real-time Linux
Single-user/single-tasking operating system: allows a single user to perform only a single task at a time
e.g. DOS
Single User/Multitasking OS: allows a single user to perform multiple tasks at a time e.g. Windows OS,
Macintosh OS etc.
Multi-User/Multi-tasking OS: allows multiple users to use programs running simultaneously on a single
network server called Terminal Server. Examples of such OS are Linux, UNIX, and Windows Terminal
Server.
Basic Input Output System (BIOS)
The BIOS , an acronym for Basic Input/output System and also known as the System BIOS, ROM BIOS or
PC BIOS) is a type of firmware used to perform hardware initialization during the booting process
(power-on startup) and to provide runtime services for operating systems
Functions of operating system
Processor management
Various programs compete for the attention of the microprocessor. The OS plays the role of the honest
referee, making sure that each application gets the necessary attention required for its proper
execution. It tries to optimally manage the limited processing capacity of the microprocessor to the
greatest good of all the users & apps.
Memory management
Memory management is straight forward for a single-user, single tasking. In case of multi-tasking,vthe
OS ensures that each application has enough private memory and applications do not run into other
application’s private memory. The OS is responsible for efficient utilization of hierarchical system
memory (e.g. RAM, cache, etc.).
Device management
Applications talk to devices through the OS. OS talks to and manages devices through I/O device drivers
Example: When we print to a laser printer, we do not need to know its details. All we do is to tell the
printer device driver about what needs to be printed and it takes care of the details.
Storage management
A file system is a collection of directories, subdirectories, and files organized in a logical order. The OS is
responsible for maintaining the file system through indexing of filenames and their disk location. The OS
can find any file in a logical and timely fashion
Application Interface
Application developers do not need to know much about the hardware. The OS provides all applications
with a straight-forward and consistent interface to hardware
Example: An application uses the OS to store data on the disk drive without knowing exact physical
characteristics of the disk.
User interface
User interface are the means by which the user and a computer system interact using a consistent user
interface provided by the OS, in particular the use of input devices and software. There are two main
types of user interfaces:
Storage devices
Storage Devices are the data storage devices that are used in the computers to store the data. The
computer has many types of data storage devices. Some of them can be classified as the removable data
Storage Devices and the others as the non-removable data Storage Devices.
Storage Hierarchy
A ranking of computer memory devices, with devices having the fastest access time at the top of the
hierarchy, and devices with slower access times but larger capacity and lower cost at lower levels. The
hierarchical arrangement of storage in current computer architectures is called the memory hierarchy.
The levels of memory in a computer from fastest to slowest speed, they are:
• Processor registers – fastest possible access (usually 1 CPU cycle), only hundreds of bytes in size
• Level 1 (L1) cache – often accessed in a few cycles, usually tens of KB
• Level 2 (L2) cache – higher latency L1 by 2-10 times, often 512KB or more
• Main memory – may take hundreds of cycles, but can be multiple GB’s
R
• Secondary and Tertiary storage – several seconds latency, can be huge
C
R
e
Kinds of storage devices
Ha
• Magnetic devices use a magnet
Optical devices use lasers A
g
c
•
• Solid-state devices have physical switches
ar
Magnetic Disk M
.
dh
e
Di
PREMIER INSTITUTE OF LAHORE (GCUF) 28 | P a g e
sk
Information & Communication Technology MIT| Rashid Rehmat
Magnetic disk is a metal or plastic disk coated with magnetic material. Data is recorded into the
magnetic material in machine code. Disks have become popular due to their random access. There are
four different types of magnetic disks
Diskette Drives
A diskette or a floppy disk is a random access, removable data storage medium that can be used with
personal computers. The term usually refers to the magnetic medium housed in a rigid plastic cartridge
measuring 3.5 inches square and about 2millimeters thick. Also called a "3.5-inch diskette," it can store
up to 1.44 megabytes (MB) of data.
Hard Disk
A hard drive is a primary storage device in a computer. It is a magnetic disk on which you can store
computer data. The term hard is used to distinguish it from a soft, or floppy disk. Hard disk holds more
data and is faster than floppy disks. In general, hard disks are less portable than floppies, although it is
possible to buy removable hard disks. Today’s computers typically come with a hard disk that contains
several billion bytes (GBs) of storage. It has following features:
• spins at 5400, 7200, 10000, 15000 RPM;
• takes 6 to 12 milliseconds to find data;
• holds up to 1.5 TB data
Removable high capacity magnetic disks
Although manufacturers always are concerned about software piracy, many recommended that users
create a backup of programs before installing them on a computer, to guard against system failures,
such as a head crash, and human errors, such as inadvertently deleting key files. The three types of high-
capacity disks were developed by three different manufacturers for backup purposes: Super Disk™ is
from Imation, HiFD™ is from Sony Electronics, Inc., and the Zip® drive is from Iomega.
The Zip-drive is a medium-to-high-capacity (at the time of its release) removable floppy disk
storage system that was introduced by Iomega in late 1994. Originally, Zip disks launched with capacities
of 100 MB, but later versions increased this to first 250 MB and then 750 MB.
Magnetic Tape
A magnetic tape is also a storage device from which you can access data serially like an audio cassette
from which you can hear the songs in the order in which they are stored. When you want to access
some particular data from the tape, the device has to scan through all the data you do not need but that
data is stored before the required one. The access speed can be quite slow when the tape is long and
what you want is not near the start. So the best use of the magnetic tape is for the data that you do not
use very often.
How Data is Stored on a Disk
The surface of magnetic disks and tapes
is coated with millions of tiny iron
particles (acting as a magnet, taking) so
that data can be stored on them.
Read/write head is a magnet that
generates magnetic field in iron on the
storage medium as the head moves on
the disk or tape. The read/write head records strings of 0’s and 1’s by alternating the direction of
current in the electromagnets (Positive charge means 1, and negative charge is 0).
To read the process is reversed. The head passes over the disk while no current is flowing through the
magnet. Head possesses no charge but storage medium is covered with magnetic field, which represent
bits of data. The storage medium charges the magnet in the head which causes a small current to flow
through the head in one direction or other depending on the field polarity. The storage medium senses
the direction of flow of charges, and data is sent from read-write head to the memory.
How Data is organized on a Disk
Before data can be stored on a magnetic disk, the disk must first be divided into numbered (labeled)
areas so the data can be easily retrieved. Dividing the disk so that the data could be easily written and
retrieved is known as formatting the disk. The format program divides each data surface into tracks and
sectors
Tracks
Concentric rings, called tracks, are written on the disk during the formatting process. Floppy
disks have 40 or 80 tracks per side. Fixed disks and disk packs can have from 300 to over 1,000 tracks per
side. Each track is assigned a number. The outermost track on a disk is assigned number 0. The
innermost track is assigned the highest consecutive number.
Sectors
Each track is divided into sectors. Sectors are numbered divisions of the tracks designed to make
data storage more manageable. Without sectors, each track would hold more than 4500 bytes of
information and small files would use an entire track
S
Formatting e
T
Disk formatting is the process of preparing a hard disk or other storage medium for use, including setting
up an empty file system.
Operating system can easily locate data on the disks because each track and sector is labeled. (Logical c
formatting)
r
Levels of formatting:
t
a
Low-level: drawing tracks and sectors on disk
High-level: creating file system and boot sector (sometimes called quick or logical format-labeling tracks
and sectors)
o
c
A commonly used logical format performed by windows is on FAT file system because it relied on
standardized file allocation table (FAT) to keep track on the information on the disk. When a disk is
formatted with FAT, following four areas are created on the disk
• The Boot Sector: contains a program that rums when you first start the computer r
k
• File Allocation Table: is a log that records the location of each file and the status of each sector
• Root Folder: is a master folder on any disk
• Data Area: this is where data and program files are actually stored on the disk
File System
A file system is a logical method of configuring data on a disk’s surface. Common file systems include:
1. File Allocation Table (FAT)
2. FAT32
3. NTFS
4. EXT2/EXT3 (Linux)
Digital versatile disc, read only memory (DVD-ROM) is a read-only digital versatile disc (DVD) commonly
used for storing large software applications. It is similar to a compact disk-read only memory (CD-ROM)
but has a larger capacity. A DVD-ROM stores around 4.38 GB of data. A DVD-ROM permanently stores
data files which cannot be changed, written over or erased. A personal computer (PC) with a DVD-ROM
or a DVD-RAM drive is designed to read a DVD-ROM disc.
Compared to a CD-ROM, a DVD-ROM has the same 5 inch diameter and 1.2 millimeter (mm) thickness.
But because a DVD-ROM uses a shorter wavelength laser with tighter compacted pits, the disc capacity
is increased. In fact, the smallest DVD-ROM can store approximately 7 times more data than a CD-ROM.
Recordable Optical Technologies
Here is some writeable CD or writeable DVD technologies:
CD-Recordable (CD-R)
A CD-Recordable drive allows you to create your own data or audio discs that can be read by most
CD-ROM drives. After information has been written on the CD-R, it cannot be deleted.
CD-Rewritable (CD-RW)
Using CD-RW, you can overwrite the existing data with new data. In other words you can change the
contents of CD-RW in same manner as a floppy disk. It has same capacity as a standard CD, and most
can be written over 100 times. However, unlike CD-R, CD-RW cannot be played on every CD-ROM
and most of them cannot store audio data.
Phonto-CD
Kodak developed the PhotoCD system to store digitized photographs on a recordable compact disk.
Many film developing stores have PhotoCD drives that can record your photos on a CD. You can
continue adding photos in it until it is full.
DVD-Recordable
Like CD-R, a DVD-R system lets you record data on special recordable DVD, using a special drive.
After information has been written on the DVD-R, it cannot be changed.
DVD-RAM
The newest optical technology to reach consumers, sophisticated DVD-RAM drives let you record,
erase and re-record data on special disc. Using video editing software, you can record your own
digitized videos onto a DVD-RAM disc, they play them back in DVD player. DVD-RAM drives can read
DVDs, DVD-R, CD-R discs, CD-RW and standard CDs.
Solid State Devices
A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data. It
is neither magnetic nor optical; it uses integrated circuits to store data physically.
SSD may be volatile or non-volatile depending upon the circuit they use. SSDs have no moving
mechanical components. This distinguishes them from traditional electromechanical magnetic disks such
as hard disk drives (HDDs) or floppy disks, which contain spinning disks and movable read/write
heads. Compared with electromechanical disks, SSDs are typically more resistant to physical shock, run
silently, have lower access time, and lower latency.
Flash Memory
Flash memory is electronic (solid-state) non-volatile computer storage medium that can be electrically
erased and reprogrammed.
• Found in cameras and USB drives
• Combination of RAM and ROM
• Long term updateable storage
Smart Cards
A plastic card with a built-in microprocessor, used typically to perform financial transactions.
• Credit cards with a chip
• Chip stores data
• May be used as electronic cash
• Hotels use for electronic keys
Introduction to Databases
Database
A collection of information that is organized so that it can easily be accessed, managed, and updated is
called as Database
Where are databases used?
At Home
• Maintaining address-books
• Managing household budgets
• Maintaining a home book-library
Business of Offices
• Inventory tracking system
• Human resources/ payroll
• Discipline specific databases
Government and public organization
• Police
• Vehicle Registry
• Banks
• Tax records/ National IDs
• All dynamic websites
World Wide Web
• Google
• Amazon
• YouTube
• Websites having search facility
Elements of databases
A database stores information in an organized way, and makes it easy to get information in and out.
Tables store data within the database.
Forms make it easy to put data into tables.
Queries pull out specific data.
Reports put data in an easily-read format.
SQL
SQL is used for:
example
SELECT isbn,
constructed (divided into database tables in the case of relational databases).
dateThe
2) Retrieving/ manipulating database data title, price,
SQL queries are used to retrieve and manipulate data
Data Mining
FROM Book
database
Data mining is the process of (automatically) extracting useful information from data retrieved
WHERE price >
from the data ware houses. Data mining is also known as Knowledge Discovery in Databases
(KDD).
100.00 AND (date
Data mining is a process used by companies to turn raw data into useful information. By
table:
= '2004-04-16'
using software to look for patterns in large batches of data, businesses can learn more about
OR date = '2005-
their customers and develop more effective marketing strategies as well as increase sales and
decrease costs. Following application use data mining for information extraction and analysis:
1) Recommender systems 04-16') ORDER BY
Book
title;
Recommender systems or recommendation systems are a subclass of information
filtering system that seek to predict the "rating" or "preference" that a user would give
to an item.
Recommender systems have become increasingly popular in recent years, and are
utilized in a variety of areas including movies, music, news, books, research articles, search
queries, social tags, and products in general.
There are also recommender systems for experts, collaborators, jokes, restaurants, garments,
financial services, life insurance, and Twitter pages.
2) Pattern mining
Pattern mining is one of the most important topics in data mining. The core idea is to extract
relevant "nuggets or chunk" of knowledge describing parts of a database. NZ cricket team uses
SAS data mining software for making team strategy
Enterprise Software
Enterprise software, also known as enterprise application software (EAS), is computer software used to
satisfy the needs of an organization rather than individual users. Such organizations would include
businesses, schools, interest-based user groups, clubs, charities, or governments.
Enterprise application software includes content, communication, and collaboration software; CRM
software; digital and content creation software, ERP software; office suites; project and portfolio
management; and SCM software.
Commonly used DBMS
MySQL Database
MySQL was found in the year of 1995. Sun Microsystems acquired MySQL in 2008 and Sun Microsystems
was acquired by oracle in 2010. MySQL comes among the largest open source company of the world.
MySQL is so famous due its high efficiency, reliability and cost.
Oracle Database
Oracle database is developed by Oracle Corporation and it is the fourth generation of Relational
database management system (RDBMS). Oracle database is used mostly by big companies that need to
manage a large amount of data. Oracle database is very flexible and it most useful features are integrity
constrains, triggers, shared SQL.
DB2: DB2 database is developed by IBM Corporation. DB2 is also used to store data for large companies.
It is a RDBMS and its extended version also supports object –oriented features. The main problem with
DB2 is its cost.
Microsoft SQL Server
As its name shows, it was developed by Microsoft. It is an RDBMS that is used to create computer
database for MS-Windows. MS SQL Server create database that can be accessed from workstations with
internet. Microsoft has produced many versions of SQL server depending upon the customer demands.
Other enterprise database application include
IBM DB2. ...
SAP Sybase ASE. ...
Microsoft Dynamics
PostgreSQL. ...
MariaDB Enterprise. ...
High-Level Language
A High-level language program consists of English-like statements that are governed by a strict syntax. It
has two primary components such as built-in language primitives and grammatical rules a translator
Advantages:
Portable or machine independent
Programmer-friendly
Disadvantages:
Not as efficient as low-level languages
Need to be translated
Translation
Programs today are normally written in one of the high-level languages. To run the program on a
computer, the program needs to be translated into the machine language of the computer on which it
will run.
Systems software that converts a programmer’s source code into machine language is called Language
Translator.
The program in a high-level language is called the source program. The translated program in machine
language is called the object program.
Interpreter Machi
A language translator that translates one program statement at a time into machine cod
Progra ne
m Interpre langua
stateme ter ge
nt statem
ent Statemen
t
execution
Compiler
A language translator that converts a complete program into machine language
Machin
StepComput
1: Translate e
er Compil languag
Machin
program
progra er e
e
Stepm2: Execute
languag program progra
m
e Program
progra
execution
m
Programming Paradigms
A Paradigm is a way in which a computer language looks at the problem to be solved.
Today, computer languages are categorized according to the approach they use to solve a problem. We
divide computer languages into four paradigms: procedural, object-oriented, functional and declarative.
Classes
Objects of the same type (files, for example) need a set of
methods that show how an object of this type reacts to
stimuli from outside the object’s “territories”. To create
these methods, a unit called a class is used
Methods
In general, the format of methods is very similar to the
functions used in some procedural languages. Each method
has its header, its local variables and its statement. This
means that most of the features we discussed for procedural
languages are also applied to methods written for an object-
oriented program. In other words, we can claim that object-
oriented languages are actually an extension of procedural
languages with some new ideas and some new features.
The C++ language, for example, is an object-oriented extension of the C language.
Inheritance
In the object-oriented paradigm, as in nature, an object can inherit from another object. This concept is
called Inheritance.
When a general class is defined, we can define a more specific class that inherits some of the
characteristics of the general class, but also has some new characteristics.
For example, when an object of the type Geometrical Shapes is defined, we can define a class called
Rectangles. Rectangles are geometrical shapes with additional characteristics.
Polymorphism
Polymorphism means “many forms”. Polymorphism in the object-oriented paradigm means that we can
define several operations with the same name that can do different things in related classes.
For example, assume that we define two classes, Rectangles and Circles, both inherited from the class
Geometrical Shapes. We define two operations both named area, one in Rectangles and one in Circles,
that calculate the area of a rectangle or a circle. The two operations have the same name
Prolog
Using this rule and the two
PREMIER INSTITUTE OF LAHORE (GCUF) 39 | P a g e
following facts,
we can deduce a new fact:
Information & Communication Technology MIT| Rashid Rehmat
One of the famous declarative languages is Prolog (Programming in Logic), developed by A. Colmerauer
in France in 1972. A program in Prolog is made up of facts and rules. For example, the previous facts
about human beings can be stated as:
For example: Data is input by either a statement or a predefined function such as scanf in the C
language. Data is output by either a statement or a predefined function such as printf in the C language.
Expressions
An expression is a sequence of operands and operators that reduces to a single value. For example, the
following is an expression
with a value of 13:
An operator is a language-
specific token that requires
an action to be taken. The
most familiar operators are
drawn from mathematics.
Relational operators compare data to see
if a value is greater than, less than, or equal
to another value. The result of applying
relational operators is a Boolean value (true
or false). C, C++ and Java use six relational
operators:
Statements
A statement causes an action to be performed by the program. It translates directly into one or more
executable computer instructions. For example, C, C++ and Java define many types of statements.
An assignment statement assigns a value to a variable. In other words, it stores the value in the
variable, which has already been created in the declaration section.
A compound statement is a unit of code consisting of zero or more statements. It is also known as a
block. A compound statement allows a group of statements to be treated as a single entity.
Structured programming strongly recommends the use of the three types of control statements:
sequence, selection and repetition
Need Analysis is the stage when a need or problem is identified and understood. At this early stage, the
programmer looks at the program design to what the user needs for an interface and starting point and
what the user needs the program to do. Typically, the end-user should have a lot of input in the needs
analysis stage. Once the programmer has determined the programs starting and stopping points, he or
she can begin to design the code.
Phase II: Program Design
Program Design is the stage at which
programmers begin roughing out the
logic they will use when the actual
coding begins. Many tools are used in
the program design process, although
programmers often rely on whiteboards
and the back of napkins. Three of the
design tools are IPO charts (for
structured programming), circles and
message pipes (OOP), and pseudo
codes.
Algorithm:
Set of finite steps that solves a problem
Heuristics
Set of steps that usually solves a problem; these algorithms are not always perfect, but work
well most of the time.
The goal of heuristics is to develop a simple process that generates accurate results in an
acceptable amount of time.
Program’s design details:
2 ways to show details:
i) Pseudo code: describes logic and processing flow in human-language statements
ii) Flow chart: graphically represents logic flow.
Most projects use both methods
Phase III: Development
Development, also called coding involves writing and testing source code. The software development
phase is similar to the system life cycle’s development phase, but instead of determining the system’s
overall layout, the programmer writes the code that implement the user’s requirements. The
programmer might write source code in text editor and heuristics. This problem solving technique is
something like a recipe for problem-solving approach rather than an algorithm that solves a specific
problem. Program testing may include the following:
1) Perform desk checking
2) Quality assurance
3) Debug the program
4) Run real world data
Phase IV: Implementation
Implementation involves installing software and allowing users to test it. This step often includes a lot of
documenting, both inside the code and in form of manuals for the users. Many programmers will tell
you that they do most of their debugging at this stage. Certainly the implementation stage is when any
misconceptions the programmer has about the code are found and fixed. Following type of
documentation is done:
1) Prepare user documentation
2) Prepare operator documentation
3) Write programmer documentation
Phase V: Maintenance
Maintenance starts as soon as the program is installed. Work continues on products for several reasons.
Some minor bugs may not have been fixed at the time the program was released. The programmers may
also add major new functioning, in response to either market demands or user requests. This the
longest phase of the program development life cycle, sometimes spanning many years.
Margins
A margin is the space between the text and the edge of the printed paper at the top, bottom, left, and
right of the page. To change the margin by using exact numbers
On the Ribbon, select the Page Layout tab > in the Page Setup group > click Margins
Select one of the predesigned margins or select Custom Margins and change the settings in the
new window
Page Size
Page size option is used to choose the paper size for the current section or the whole document. To
change the page size, move on the Ribbon, select the Page Layout tab > in the Page Setup group > click
Page Size
Thesaurus
Thesaurus is a dictionary of synonyms and antonyms. To find a synonym quickly, just right-click inside
the word you want to change, hover your mouse pointer over Synonyms and select the appropriate
word.
Document Views
Print Layout: This is a view of the document as it would appear when printed. It includes all tables,
text, graphics, and images.
Full Screen Reading: This is a full view length view of a document.
Web Layout: This is a view of the document as it would appear in a web browser.
Outline: This is an outline form of the document in the form of bullets.
Draft: This view does not display pictures or layouts, just text
Create a New Document
There are several ways to create new documents, open existing documents, and save documents in
Word:
Microsoft Office Button / New / Blank document
By pressing CTRL+N from the keyboard
Save and exit file
While you are creating a document, it is often important to save it for future use. The saved document
becomes a file. We can save a word document by following different ways
Microsoft Office Button / Save or Save as
by pressing Ctrl+S on the keyboard
Click the File icon on the Quick Access Toolbar
Word Document will save as a Word 2007 document (.docx) and is not compatible with older versions
unless the compatibility package was installed on the computer that tries to open the file
Exit Word
Exit is a command on the File menu used for quitting the Microsoft Word application when you are
through working in your document. When you exit Word, the open document is also closed.
There are several ways of exiting/quitting the Word application. The methods use:
Microsoft Office Button->Close/Exit word
The Close button on the title bar
Shortcut keys ALT+F4
Open and close file
Open a file
We can open a saved file from the computer hard disk by following ways
Microsoft Office Button -> Open -> Choose from the list
Pressing CTRL +O from the keyboard
Close a Document Using the Close Window Button on the Menu Bar
Simply click the Close Window (X) button to the extreme right of the Menu bar. The active document
will be closed, leaving the Word program still running. Word or the Office Assistant will prompt you to
save your document, if you have unsaved changes in the document.
Close a Document Using Shortcut Keys
To close the current document without exiting Word, you can use any of the following shortcut keys, if
you are a keyboard fan:
Press Ctrl and F4 keys simultaneously on the keyboard (Ctrl + F4).
Press Ctrl and W keys simultaneously on the keyboard (Ctrl + W).
Inserting, deleting text
Inserting Text:
Put your cursor where you want to add the text and begin typing
Deleting the text
We can delete any text by simply pressing delete key from the keyboard. Text to be deleted should
be selected for deleting
Cut, Copy and Paste Data
Copy and Paste Text: Highlight the text you wish to copy and right click and click Copy (or Ctrl+C ),
put your cursor where you want the text in the document and right click and click Paste (or Ctrl+V ).
Cut and Paste Text: Highlight the text you wish to cut and right click and click Cut (or Ctrl+X ) , put your
cursor where you want the text in the document and right click and click Paste (or Ctrl+V ).
controlling the style of the document: Font, Paragraph, and Styles. A style is a format enhancing tool
that includes font typefaces, font size, effects (bold, italics, underline, etc.), colors and more.
Change Font Typeface and Size
Click the arrow next to the font name and choose a font and size. You can preview how the new font will
look by highlighting the text, and hovering over the new font typeface.
Font Styles and Effects
Font styles are predefined formatting options that are used to emphasize text: Bold, Italic, and
Underline.
Select the text and click the Font Styles included on the Font Group of the Ribbon, or
Select the text and right click to display the font tools
Bold: by pressing CTRL + B or through font group
Italic: by pressing CTRL +I or through font group
Underline: by pressing CTRL + U or through font group
Change Text Color
Select the text and click the Colors button included on the Font Group of the Ribbon, or
Highlight the text and right click and choose the colors tool.
Select the color by clicking the down arrow next to the font color button.
Highlight Text
Select the text
Click the Highlight Button on the Font Group of the Ribbon, or
Select the text and right click and select the highlight tool
To change the color of the highlighter click on down arrow next to the highlight button.
Copy Formatting (Format Painter)
If you have already formatted text the way you want it and would like another portion of the document
to have the same formatting, you can copy the formatting. To copy the formatting, do the following:
Select the text with the formatting you want to copy.
Copy the format of the text selected by clicking the Format Painter button on the Clipboard
Group of the Home Tab
Apply the copied format by selecting the text and clicking on it.
Clear Formatting
Select the text you wish to clear the formatting.
Click the Styles dialogue box on the Styles Group on the Home Tab.
Click Clear All.
Paragraph Setting
Formatting paragraphs allows you to change the look of the overall document. You can access many of
the tools of paragraph formatting by clicking the Page Layout Tab of the Ribbon or the Paragraph Group
on the Home Tab of the Ribbon.
Change Paragraph Alignment
Click the Home Tab
Choose the appropriate button for alignment on the Paragraph Group.
o Align Left (CTRL+L): the text is aligned with your left margin
o Center(CTRL+E) : The text is centered within your margins
o Align Right (CTRL+R) : Aligns text with the right margin
o Justify (CTRL+J): Aligns text to both the left and right margins.
Indent Paragraphs
Indenting paragraphs allows you set text within a paragraph at different margins. There are several
options for indenting:
To indent paragraphs, you can do the following:
• Click the Indent buttons to control the indent.
• Click the Indent button repeated times to increase the size of the indent.
• Click the dialog box of the Paragraph Group
• Click the Indents and Spacing Tab
• Select your indents
• Alignment also can be changed within this Tab.
Insert Page
Insert option is used to insert a fully formatted cover page or a new page at the cursor position. We can
find this option in inset tab->pages
Page Break
Page break option is available in inset tab->pages. It is used to start the new page at the current position
in the document
Date and time
MS word feature which is used to insert current date and time into the current document by clicking the
Insert tab-> Click on Date & Time->Select the appropriate language and format.
Spelling and Grammar
Microsoft Word makes it easy to check that your document is spelt correctly and uses good grammar.
You can either correct the spelling as you type, or run the Spelling and Grammar check at any time while
producing your document. Click the Spelling and Grammar button in the Proofing group of the
Review tab (press F7) to correct spelling.
Check Spelling and Grammar as you Type
Word 2007 checks for spelling and grammar errors whilst you type. Spelling errors are underlined in red
and grammar errors are underlined in green.
This feature makes it easy to recognize errors and correct them on the move.
Right click on the error
A shortcut menu appears offering suggestions to the error
Select the required change. Word corrects the text and removes the red or green underline
Mail Merge
Facility provided by most word processing program whereby a form-letter can be sent to many
recipients, each letter personalized for each recipient. The program takes each recipients name and
address (from a mailing list) and enters it in its usual place on the letter, and also prints out mailing
labels. To use Mail Merge:
Select the Mailings on the Ribbon.
Select the Start Mail Merge command.
Select Step by Step Mail Merge Wizard.
Tables
You can add a table to your Word 2007 document, using either a grid in a drop-down menu or a dialog
box. The grid method is the fastest way to create a simple table, although it is limited to eight rows and
ten columns.
INSERTING AND DELETING ROWS OR COLUMNS IN TABLES
You can add and delete cells, columns, and rows in your Word 2007 tables. Word makes this easy by
offering various commands in the Rows & Columns group of the Table Tools Layout tab.
DELETING CELLS, COLUMNS, OR ROWS IN A WORD 2007 TABLE
The key to deleting part of a table is to first position the insertion pointer in the part of the table you
want to remove. Then use the Delete button’s drop-down menu to choose the table element you want
to remove (this button is located in the Rows & Columns group of the Layout tab). The table’s contents
are also deleted when you delete parts of a table.
The Delete Cells command displays a dialog box asking what to do with the other cells in the row or
column: move them up or to the left. Keep in mind that deleting a cell may make your table
asymmetrical.
Cell
The “intersection” of each row and column is called a cell.
Cell Address
In the image above the cursor is on the “home” cell – A1. Notice Row 1 and Column A are “bold,”
and colored “orange.” This indicates what is called the “address of the cell.
Name Box
Notice right above cell A1, that A1 is displayed in a small box called the Name Box. Whenever you
“click” on a cell the address of that cell will be shown in the Name Box.
How to select cells, ranges, rows, or columns
To select Do this
A single cell Click the cell, or press the arrow keys to move to the cell.
A range of Click the first cell in the range, and then drag to the last cell, or hold down SHIFT
cells while you press the arrow keys to extend the selection. You can also select the first
cell in the range, and then press F8 to extend the selection by using the arrow keys.
To stop extending the selection, press F8 again.
A large range Click the first cell in the range, and then hold down SHIFT while you click the last
of cells cell in the range. You can scroll to make the last cell visible.
All cells on a Click the Select All button.
worksheet
To select the entire worksheet, you can also press CTRL+A. If the
worksheet contains data, CTRL+A selects the current region.
Pressing CTRL+A a second time selects the entire worksheet
Create a New Workbook
There are several ways to create new workbook, open existing workbook, and save documents in Excel:
Microsoft Office Button / New / Blank Workbook
By pressing CTRL+N from the keyboard
Save and exit file
While you are creating a worksheet, it is often important to save it for future use. The saved worksheet
becomes a file. We can save a work sheet by using Microsoft Office Button / Save or Save as or by
pressing Ctrl+S on the keyboard or clicking the File icon on the Quick Access Toolbar Word Document
will save as a Excel 2007 document (.xlsx) and is not compatible with older versions unless the
compatibility package was installed on the computer that tries to open the file
Exit Excel
Exit is a command on the File menu used for quitting the Microsoft Excel application when you are
through working in your document. When you exit Word, the open document is also closed. Use
Microsoft Office Button->Close/Exit word or close button on the title bar or press shortcut keys ALT+F4
Open and close file
Open a file
We can open a saved file from the computer hard disk by following ways
Microsoft Office Button -> Open -> Choose from the list
Pressing CTRL +O from the keyboard
Close a workbook using the Close Window Button on the Menu Bar
Simply click the Close Window (X) button to the extreme right of the Menu bar. The active document
will be closed, leaving the Excel program still running.
Close a Document Using Shortcut Keys
To close the current worksheet without exiting excel, you can use any of the following shortcut keys, if
you are a keyboard fan:
Press Ctrl and F4 keys simultaneously on the keyboard (Ctrl + F4).
Press Ctrl and W keys simultaneously on the keyboard (Ctrl + W).
Use the settings on the Fill tab to set the background color of the selected cells. You can also use
the Pattern Color and the Pattern Style lists to apply two-color patterns or shading for the background
of the cell. You can also find this option in font group of home tab as fill color.
Protection
The Protection tab provides the settings that you can use to protect your worksheet data and formulas:
However, neither of these options takes effect unless you also protect your worksheet. To protect a
worksheet, on the Review tab, click Protect Sheet in the Changes group.
Formula Writing
A formula performs calculations or other actions on the data in your worksheet. A formula always starts
with an equal sign (=), which can be followed by numbers, math operators (like a + or - sign for addition
or subtraction), and built-in Excel functions, which can really expand the power of a formula. Here are
some additional examples of formulas that you can enter in a worksheet.
=A1+A2+A3 Adds the values in cells A1, A2, and A3.
=SUM(A1:A10) Uses the SUM function to return sum of the values in A1 through A10.
=UPPER("hello") Converts the text "hello" to "HELLO" by using the UPPER function.
Click one of the comparison operators. For example, to show numbers within a lower and
upper limit, select between.
In the Custom AutoFilter box, type or select the criteria for filtering your data. For example,
to show all numbers between 1,000 and 7,000, in the is greater than or equal to box,
type 1000, and in the is less than or equal to box, type 7000.
REPLACING DATA
To find and replace data in a worksheet, Choose Find & Select in the Editing group on the Home tab, and
then select Replace (or press Ctrl+H). The Find and Replace dialog box appears with the Replace tab on
top. Here you can replace the data you intended to.
PowerPoint is a presentation software package. With PowerPoint, you can easily create slide shows.
Trainers and other presenters use slide shows to illustrate their presentations. This tutorial teaches
PowerPoint basics. This lesson introduces you to the PowerPoint window. You use the window to
interact with PowerPoint.
The Ribbon is the completely new user interface in PowerPoint 2007, designed to make it easier and
faster to create fantastic presentations. The Ribbon together with the Microsoft Office Button and Quick
Access Toolbar will give you access to everything you'll need to do for a presentation.
The main tabs are Home, Insert, Design, Animations, Slide Show, Review and View. When we cover the
main tabs in more detail, you'll learn about the other tabs - Contextual tools and Program tabs - that
only appear when you need them while performing certain tasks.
Creating a Basic Presentation
We can create a Title Slide for your presentation using the Blank Presentation template. You will be
working in Slide View. Open the PowerPoint program. PowerPoint automatically opens a new
presentation. A new title slide will appear for you to work with. Alternatively, let's say you are already
working in Power point and want to create a new presentation. In the Open window, click the Microsoft
Office Button. From the drop-down list, select New or press CTRL +N from the keyboard.
Adding text to a slide
The Title Slide layout contains text boxes for a title and a subtitle. Try typing text into these boxes. Click
in the Title text box. A dashed line border with a circle in each corner and a square box at each midpoint
appears around the text box indicating that it is selected. Type a title. Click the Subtitle text box and type
a subtitle. Congratulations! You've just created your first slide in PowerPoint.
Adding another slide
In the Slides Group in the Home tab, click on the top part of the New Slide button. A new slide is added
which by default is the Title and Content layout slide. Alternatively, to add a new slide with a different
layout than the default, click the bottom part of New Slide button with the arrow beside the text, "New
Slide". A drop-down list appears with all the slide layouts you can choose from. Click on the layout you
want to use. A new slide with that layout is now added.
Moving from slide to slide
let’s say you've created several slides for your presentation. You've finished working on the last slide,
and now you want to take a look at your other slides. Here's how you move from slide to slide in Slide
View.
To move to a previous slide:
Click the upper double-arrow button on the lower right corner of the PowerPoint window. The
previous slide will appear.
To move to the next slide:
Click the lower double-arrow button on the lower right corner of the PowerPoint window
Formatting and checking texts the formatting options available in PowerPoint are very
similar to other Office 2007 programs. To format your text, first select it. Once the text you wish to
format is highlighted, use the options in the Font and Paragraph groups under the Home tab to format
your text.
Most of the formatting options are the same in all Office 07 programs, however there are a few that are
unique to PowerPoint.
Text Adds a shadow behind the selected text to help it stand out on the
Shadow slide.
Character Adjusts the spacing between characters.
Spacing
Text Change the orientation of text to vertical, stacked, or rotate it to the
Direction desired direction.
Align Text Change how text is aligned within the text box.
Convert to Convert text to a Smart Art graphic to visually communicate
Smart Art information. Smart Art graphics range from graphical lists and
Graphic process diagrams to more complex graphics, such as Venn diagrams
and organization charts.
You can click the down arrow on either the paragraph or the font group to access the menu.
You can select the number of columns and rows by dragging the mouse over the grid. Notice that while
you drag the mouse, the table dynamically draws itself in the slide, giving you a preview of what the
table will look like when you decide on a size:
Illustrations
This section of the Insert tab on the Ribbon lets you add special graphics.
Picture: add a photograph to your slide; choose any image file on your computer.
Clip Art: choose from artwork already made and available.
Photo Album: this creates instant photo slideshows. Just add images and they will be applied to
slides.
Shapes: add any of more than 100 pre-made shapes.
SmartArt: a new feature which allows quick construction of charts and nice-looking graphics
with text.
Chart: create a chart from an Excel table.
Text
Networking
Networks is a set of technologies – including hardware, software and media – that can be used to
connect computers together, enabling them to communicate, exchange information and share
resources in real time [Peter Norton]
Some benefits of networks are:
Resource sharing (cost savings): Sometimes in organizations workers may need to use the same
data at the same time e.g. company’s quarterly sales report to be viewed by many users. For this
companies can common data is stored on a network servers, which is a central computer with a
large storage and other resources which users (clients) have to share. If the server stores data
files for users to access, it is commonly called a file server.
Peripheral Devices like printer and photocopiers can also be shared using networks instead of
installing a printer to each client. Printers can be shared either by connecting a printer directly
to the network or it can be attached to a print server, which is a computer that manages one or
more computers
A home area network (HAN) is a network that is deployed and operated within a small boundary,
typically a house or small office/home office (SOHO). It enables the communication and sharing of
resources (like the Internet) between computers, mobile, televisions, video games, home security
systems, “smart appliances”, fax machines, and other digital devices that are wired over a network.
Intranet and Extranet:
An intranet is a private network accessible only to an organization's staff. An extranet is a private
network that uses Internet technology and the public telecommunication system to securely share part
of a business's information or operations with suppliers, vendors, partners, customers, or other
businesses.
How are networks structured?
Networks can be categorized by the roles the servers and PCs play in terms of hierarchical and security
interaction. Some networks use servers (server-based networks) and some don’t (peer-to-peer).
Server-based Networks
To understand server based networks it is important to understand the term node. A node is processing
location that can be a PC other some other device such as a printer. Usually server based networks
contain many nodes and one or more servers, which control user access to networks resources i.e. file
server, network server, application server, database server etc.
Client-Server Networks
A client/server network is a server based
system where one or more computers
called clients connect to a central
computer named a server to share or use
resources. Examples of computer
applications that use the client–server
model are Email, network printing, and
the World Wide Web.
Peer-to-Peer Networks
In peer-to-peer (P2P) all nodes on a
network have equal relationship to all
others, and all have similar type of
software that supports the sharing of
resources. Instead of having a central
server to act as a shared drive, each
computer acts as the server for the files
stored upon it. Many client operating
systems like Windows 9x, Windows
2000, Windows Me, Windows Xp and
Macintosh OS, have builtiin support for
P2P networking.
Network Topologies
An important feature of any LAN is its topology-the logical layout of the cables and the devices that
connect nodes of the network.
Data moves in a network in a structure called packet (datagram), which are the pieces of a message
broken down into units the sending PC. Payload is the actual data that is being transmitted between two
nodes. Network topologies help move data packets as efficiently as possible and also avoid collision.
Topology types:
Bus Topology
Bus Topology is the simplest of network topologies. In this type of topology, all the nodes (computers as
well as servers) are connected to the single cable (called bus), by the help of interface connectors. This
central cable is the backbone of the network and is known as Bus (thus the name). Every workstation
communicates with the other device through this Bus.
A signal from the source is broadcasted and it
travels to all workstations connected to bus cable.
Although the message is broadcasted but only the
intended recipient, whose MAC address or IP
address matches, accepts it. If the MAC /IP address
of machine doesn’t match with the intended
another. Every node not only sends its own signals but also relays data from other nodes. In fact a true
mesh topology is the one where every node is connected to every other node in the network. This type
of topology is very expensive as there are many redundant connections, thus it is not mostly used in
computer networks. It is commonly used in wireless networks. Flooding or routing technique is used in
mesh topology. Mesh can be partial of full.
Advantages of Mesh Topology
Each connection can carry its own data load.
It is robust.
Fault is diagnosed easily.
Provides security and privacy
Disadvantages of Mesh Topology
Installation and configuration is difficult.
Cabling cost is more.
Bulk wiring is required.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
When information is sent over the Internet, it is generally broken up into smaller pieces or "packets".
The use of packets facilitates speedy transmission since different parts of a message can be sent by
different routes and then reassembled at the destination. It is also a safety measure to minimize the
chances of losing information in the transmission process. TCP is the means for creating the packets,
putting them back together in the correct order at the end, and checking to make sure that no packets
got lost in transmission. If necessary, TCP will request that a packet be resent.
Internet Protocol (IP) is the method used to route information to the proper address. Every computer on
the Internet has to have its own unique address known as the IP address. Every packet sent will contain
an IP address showing where it is supposed to go. A packet may go through a number of computer
routers before arriving at its final destination and IP controls the process of getting everything to the
designated computer.
Note: IP does not make physical connections between computers but relies on TCP for this function. IP
is also used in conjunction with other protocols that create connections.
IPX/ SPX: A proprietary protocol of Novell, used in most versions of NetWare network operating
system for networking offices throughout the world. Newer versions of NetWare also support TCP/IP.
NetBIOS/ NetBEUI: A relatively simple protocol that has not real configurable parameters, it sends
messages to every computer that can receive them. It is an excellent protocol for networking small
offices or homes, but not for large environments.
Transmission Media
With computer networks, media refers to the means which are used to link a network’s nodes together.
Transmission media or channels may be wired or wireless.
Wired/Guided Media
Three types of wired (guided) channels are the following.
Twisted-pair cable:
A twisted pair cable is made of two plastic insulated copper
wires twisted together to form a single media. Out of these two
wires, only one carries actual signal and another is used for
ground reference. The twists between wires are helpful in
reducing noise (electro-magnetic interference) and crosstalk. It
is used for both voice and data transmission.
Coaxial Cable:
PREMIER INSTITUTE OF LAHORE (GCUF) 61 | P a g e
Information & Communication Technology MIT| Rashid Rehmat
Coaxial is called by this name because it contains two conductors that are parallel to each other. Copper
is used in this as centre conductor which can be a solid wire or a standard one. It is surrounded by PVC
installation, a sheath which is encased in an outer conductor of metal foil, or both.
Outer metallic wrapping is used as a shield against noise and as the second conductor which completes
the circuit. The outer conductor is also encased in an insulating sheath. The outermost part is the plastic
cover which protects the whole cable.
Here the most common coaxial standards.
Broadband:-
This uses analog transmission on standard cable television cabling. It transmits several
simultaneous signal using different frequencies. It covers large area when compared with
Baseband Coaxial Cable.
Fiber Optic Cable:-
Fiber-optic cable consists of thin strands of glass or plastic that transmits beams of light rather than
electricity; it is very fast and noise-resistant. Fiber optic are Used for both analog and digital signals.
These are similar to coaxial cable. It uses electric
signals to transmit data. At the centre is the glass
core through which light propagates. In multimode
fibers, the core is 50 microns, and in single mode
fibers, the thickness is 8 to 10 microns.
The core in fiber optic cable is surrounded by glass cladding with lower index of refraction as compared
to core to keep all the light in core. This is covered with a thin plastic jacket to protect the cladding. The
fibers are grouped together in bundles protected by an outer shield. Fiber optic cable has bandwidth
more than 2 gbps(Gigabytes per Second). Fiber optic are however, very expensive and difficult to install.
Wireless Media:-
Wireless networks use radio or infrared signals that travel through the air (called
other) for transmitting data. Office LANs can use radio signals to transmit data between nodes in a
building. Laptops equipped with cellular modems allow users to connect to the office networks when
they travel. Corporate WANs often use microwave transmission to connect LANs within the same
metropolitan area. WANs that cover long distances often use satellites and microwave communication.
Network Hardware:
All networks are made up of basic hardware building blocks to interconnect
network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers.
Network Interface Cards (NICs):
A network card, network adapter, or NIC (network interface card)
is a piece of computer hardware designed to allow computers to communicate over a computer
network. It provides physical access to a networking medium and often provides a low-level addressing
system through the use of MAC addresses. Each network interface card has its unique id. This is written
on a chip which is mounted on the card.
Hub:
PREMIER INSTITUTE OF LAHORE (GCUF) 62 | P a g e
Information & Communication Technology MIT| Rashid Rehmat
A hub is an affordable connection point for different type of devices on a network. This is not a
particularly fast connection because it broadcasts the packets it receives to all nodes attached to its
ports. This technology is becoming obsolete due to reduction in price of switches. Hub is also considered
to be a dumb device.
Bridges:
A bridge is a device that connects two LANs or two segments of the same LAN. A bridge looks
at the information in each packet header and forwards data that is travelling from one LAN to another.
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model.
Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do
not copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific
ports. Once the bridge associates a port and an address, it will send traffic for that address to that port
only.
Switches:
Switch is a telecommunication device grouped as one of computer network components.
Switch is like a Hub but built in with advanced features. It uses physical device addresses in each
incoming messages so that it can deliver the message to the right destination or port. Like Hub, switch
don’t broadcast the received message to entire network, rather before sending it checks to which
system or port should the message be sent. In other words switch connects the source and destination
directly which increases the speed of the network. Modern switches can even function as routers,
allowing multiple LANs to be interconnected by linking each LAN’s switches together. This is called an
uplink
Routers:
A router is a complicated device that stores the routing information for network. A router
looks at each packet’s header to determine where the packet should go and them determines the best
route for the packet to take towards its destination. A router will not allow broadcast traffic to cross the
device unless modified to do so. Thus, a packet must be addressed to a specifically identified
destination to pass through a router. A router is connected to at least two networks, commonly two
LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or
more networks connect. Routers have NAT (Network Address Table) to hide company’s internal node IP
addresses from the internet for security purposes.
Gateway:
Firewalls:
Firewalls are the most important aspect of a network with respect to security. A firewalled
system does not need every interaction or data transfer monitored by a human, as automated processes
can be set up to assist in rejecting access requests from unsafe sources, and allowing actions from
recognized ones. The vital role firewalls play in network security grows in parallel with the constant
increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting viruses, etc.
Simplex Mode
Half duplex Mode
Full duplex Mode
SIMPLEX Mode
In this type of transmission mode data can be sent only through one direction i.e. communication is
unidirectional. We cannot send a message back to the sender. Unidirectional communication is done in
Simplex Systems.
Examples of simplex Mode is loudspeaker, television broadcasting, television and remote, keyboard and
monitor etc.
In full duplex system there can be two lines one for sending the data and the other for receiving data.
Internet
Internet is the network of networks—it is the global system of interconnected computer networks that
use the Internet protocol suite (TCP/IP) to link devices worldwide.
History of Internet
The Internet was the result of thinking by people in the early 1960s who saw great potential value in
allowing computers to share information on research and development in scientific and military fields.
J.C.R. Licklider of MIT first proposed a global network of computers in 1962, and moved over to the
Defense Advanced Research Projects Agency (DARPA) in late 1962 to head the work to develop it.
Leonard Kleinrock of MIT and later UCLA developed the theory of packet switching, which was to form
the basis of Internet connections. Lawrence Roberts of MIT connected a computer with a California
computer in 1965 over dial-up telephone lines.
The early Internet was used by computer experts, engineers, scientists, and librarians. There was
nothing friendly about it. There were no home or office personal computers in those days, and anyone
who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use
a very complex system.
Major Services of Internet
Internet provides different services, each having distinct features and purposes. The most commonly
used internet services include:
World Wide Web (WWW)
Electronic Mail (E-mail)
News
File Transfer Protocol
Chat
Instant Messaging
Online Services
Peer-t-Peer Services
User connects their computers modem to telephone lines or DSL in order to set up an account with an
ISP, which provides users with internet backbone.
World Wide Web (WWW)
World Wide Web or ‘Web’ was created in 1989 by a British
computer scientist, Sir Tim Berners-Lee, at Physics Laboratory in
Geneva, Switzerland, as a method for incorporating footnotes,
figures and cross-references into online documents. The web
creator wanted to create a simple way to access any document
on a network without searching through indexes or directories.
Millions of documents are collected, all stored on different
places, are linked together in some manner by creating a web of
interconnected information.
The Web is the worldwide collection of text pages, digital photographs, music files, videos, and
animations, identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be
accessed via the Internet. The basic building blocks of the Web are pages of text, like this one— Web
page as we call them. A collection of Web pages on the same computer is called a website. Every web
page (including this one) has highlighted phrases called links (or hypertext links) all over it. Clicking one
of these takes you to another page on this website or another website entirely.
How Web Works?
Web documents can be linked together because they are created in a format known as hypertext.
Hypertext system provides easy way to manage large collection of data, which can include text files,
pictures, sounds, movies, and more.
To support hypertext documents, Web uses a special protocol, called hypertext transfer protocol (HTTP).
A hypertext documents is a specially encoded file that uses the hypertext markup language, HTML. This
language allows a documents author to embed hypertext links, also called hyperlinks or just links in the
document. This means you can jump from one document to another simply by clicking on hot spots.
A web browser or a browser is application software designed to find hypertext documents on the web
and then open the documents on user’s computer. Two of the most popular are Firefox and Microsoft's
Internet Explorer.
Internet telephony
Internet telephony is a type of communications technology that allows voice calls and other telephony
services like fax, SMS and other voice-messaging applications to be transmitted using the Internet as a
connection medium. Skype for business, IMO, Face Time etc can be the examples of inter
Search Engine
Search engine is a service that allows Internet users to search for content via the World Wide Web
(WWW). A user enters keywords or key phrases into a search engine and receives a list of Web content
results in the form of websites, images, videos or other online data. The list of content returned via a
search engine to a user is known as a search engine results page (SERP). Examples of search engines
include google.com, yahoo, ask.com etc.
E-mail Program
To send and receive e-mail messages, you can use an e-mail program, also known as an e-mail client,
such as Microsoft Outlook or Mozilla Thunderbird. When using an e-mail client, you must have a server
that stores and delivers your messages, which is provided by your ISP or in some cases, another
company. An e-mail client needs to connect to a server to download new e-mail, whereas email stored
online (see next section) updates automatically when you visit the site.
E-mail Online
An alternative way of sending and receiving e-mail (and the more popular solution for most people) is an
online e-mail service or webmail. Examples include Hotmail (now Outlook.com), Gmail, and Yahoo Mail.
Many of the online e-mail services, including the ones we just mentioned, are free or have a free
account option.
Writing an e-mail
When writing an e-mail message, it should look something like the example window below. As you can
see, several fields are required when sending an e-mail:
The To field is where you type the e-mail address of the person who is the recipient of your
message.
The From field should contain your e-mail address.
If you are replying to a message, the To and From
fields are automatically filled out; if it's a new
message, you'll need to enter them manually.
The CC or Carbon Copy field allows you to send a
copy of the message to another e-mail address, but
is not mandatory.
The Subject Line, although not required, should
consist of a few words describing the e-mail's
contents.
Finally, the Message Body is the location you type
your main message.
Definitions:
Although the terms e-commerce and e-business are often used interchangeably, there are differences.
E-commerce is the buying and selling of goods and services on the Internet or other computer network.
Business transactions that involve the exchange of money are covered by the term e-commerce.
E-business includes all aspects of running a business that sells goods and services, including
marketing, earning and retaining customers, procurement, developing business partners and customer
education. E-business became an extension of e-commerce to encompass all aspects of businesses
that function online.
Note: E-business involves e-commerce, but e-commerce does not cover all aspects of e-business.
Goals of e-Business
Advantages of E-Business
Costs and Setup: E-businesses are becoming famous for their low-cost start-up compared with a
tradition business. It has become easier to start a business: all you need is a computer and internet.
Speed and Efficiency: Online ordering systems can process payments and orders in real-time, usually
faster, more accurately and cheaper than human workers e.g. products, such as music, files, e-books.
Flexible Business Hours: E-business breaks down the time barriers that location-based businesses
encounter, as the Internet is available 24 hours a day, seven days a week, your business never closes.
Eliminates Geographic Boundaries: e-business also allows you to broaden your reach. An online
business can reach customers in the four corners of the Earth
Reduces Transaction Cost: Running an online business reduces the cost per transaction because it takes
less manpower to complete an online transaction
Everyone is Equal: When you are interacting with your clients or vendors using e-business, it is difficult
for them to tell how big your business is.
Order Entry: An Internet order interface that is hooked directly into your real-time inventory software
can allow customers to order products from your company 24 hours a day, seven days a week.
Customer Service: E-Business can save you money on your customer service as well. By making your
client's account information available on the Internet, customers can check their accounts any time.
Marketing: An e-business presence can help put your company in touch with this growing retail sector.
Less security: The biggest obstacle in the growth of E-business is the issue of security. Internet
is not a secured medium of communication. There may be credit card theft
Technological dependence: is threat of sudden technical difficulties that can disturb business
flow at any time
Minimal consumer interaction: e-business blocks sensory consumer interactions
No physical interaction with items purchased: unable to examine products
Not for Everyone: Some people might not have any internet access
Less Privacy: personal information is compromised
Social Networking
A social networking service (also social networking site, or SNS or social media) is an online platform
which people use to build social networks or social relations with other people who share similar
personal or career interests, activities, backgrounds or real-life connections. Examples of such websites
include Facebook, Twitter, LinkedIn and Google+ etc
ARTIFICIAL INTELLIGENCE
Artificial intelligence
Artificial intelligence (AI) is ability of computers to mimic or duplicate the functions of the human brain.
AI-based computer systems have many applications in different fields, such as:
– Medical diagnoses
Artificial intelligence systems is defined as the people, procedures, hardware, software, data, and
knowledge needed to develop computer systems and machines that demonstrate the characteristics of
intelligence
– Perceptive system: approximates the way humans hear, see, or feel objects
• Use heuristics
Expert Systems:
Hardware and software that stores knowledge and makes inferences, similar to a human expert. Like
human experts, computerized expert systems use heuristics, or rules of thumb, to arrive at conclusions
or make suggestions
Robotics:
Devices that perform tasks requiring a high degree of precision or that are deadly or hazardous for
humans. Contemporary robotics combines high-precision machine capabilities with sophisticated
controlling software. Many applications of robotics exist today. Robots can be used in situations that are
hazardous or inaccessible to human. The Rover was a remote controlled robot used by NASA to explore
the surface of Mars. Three basic parts of a robot include sensors, computer and actuators.
Vision Systems:
Hardware and software that permit computers to capture, store, and manipulate visual images and
pictures i.e. identifying people based on facial features
Neural Network:
Computer systems that can simulate the functioning of a human brain are called as neural networks.
They have an ability to solve complex problems for which all the information is not present
Allows the computer to understand and react to statements and Commands made in a “natural”
language, such as English, Urdu, Punjabi Voice recognition involves converting sound waves to words
Learning System
Combination of software and hardware that allows the computer to change how it functions or reacts to
situations based on feedback it receives. Learning systems software requires feedback on the results of
actions or decisions. Feedback is used to alter what the system will do in the future
Voice recognition
Information Security
Security
Security can be defines as the policies, procedures and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems. Following are the goals of
information security:
– Data Confidentiality
– Data Integrity
– System Availability
Viruses: program that attaches itself to other software programs or file in order to be executed
Trojan horse: program that appears to be harmless but then does something other than expected
Key Loggers: Record every keystroke on computer to steal serial numbers, passwords, launch
Internet attacks
Spyware: Small programs install themselves secretly on computers to monitor user Web surfing
activity
URL Spoofing: URL spoofing is the attempt to mislead a user to a different (often malicious) website
by imitating or “spoofing” a legitimate URL.
DNS Spoofing: The Domain Name System (DNS) is a system that associates domain names with IP
addresses. In a DNS server spoofing attack, attacker modifies the DNS server in order to reroute a
specific domain name to a different IP address. In many cases, the new IP address will be for a server
that is actually controlled by the attacker and contains files infected with malware. DNS server
spoofing attacks are often used to spread computer worms and viruses.
IP Spoofing: In an IP address spoofing attack, an attacker sends IP packets from a false (or
“spoofed”) source address in order to disguise itself. Denial-of-service attacks often use IP spoofing
to overload networks and devices with packets that appear to be from legitimate source IP
addresses.
MAC Spoofing: MAC spoofing is a technique for changing a factory-assigned Media Access Control
(MAC) address of a network interface on a networked device. The MAC address that is hard-coded
on a network interface controller (NIC) cannot be changed.
Email/Caller ID Spoofing: Email spoofing is the creation of email messages with a forged sender
address. Because the core email protocols do not have any mechanism for authentication, it is
common for spam and phishing emails to use such spoofing to mislead the recipient about the origin
of the message.
Worms: Independent programs that copy itself from one computer to other computers over a network.
Phishing:
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and
credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy
entity in an electronic communication i.e. Greeting Cards, Lottery Wins etc.
Protection against Attacks
Firewalls:
A network security system that monitors and controls the incoming and outgoing network
traffic based on predetermined security rules. Firewalls can be implemented in
both hardware and software, or a combination of both. Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the Internet,
especially intranets. All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria.
Antivirus:
Antivirus software is a type of utility used for scanning and removing viruses from your
computer. While many types of antivirus programs exist, their primary purpose is to protect computers
from viruses and remove any viruses that are found. Antivirus require continuous updating
Countermeasures:
Limited number of login tries: prevents attackers from trying lots of combinations quickly
Computer Crime
Definition:
The act of using a computer to commit an illegal act or gaining unauthorized computer access
Examples:
Stealing time on company computers, breaking into government Web sites, Stealing credit
card information