Chapter 1
Chapter 1
Chapter 1
science
Chapter one
Basic computer concepts
General outline Chapter One Out Line
Computer Concept A. Computer Development
Internet Of Things
Basic computer concepts
Computer science is the study of computers, including both hardware and software design.
Development of computer
a. Abacus
Abacus is known to be the first mechanical calculating device.
Which was used to be performed addition and subtraction easily and speedily.
Abacus is made up of the wooden frame in which rod where fitted across with rounds
beads sliding on the rod.
b. Pascal Calculator
In the year 1642, Blaise Pascal a French scientist invented the adding machine called
Pascal’s calculator, which represents the position of the digit with the help of gears in it.
Development of computer
Analytical Engine
A scientist from England knows to be Charles Babbage invented such the machine.
This device is known as Analytical engine and it is the first mechanical computer.
It includes such feature which we use in today’s computer language.
For this great invention of the computer, Sir Charles Babbage is also known as the father
of the computer
Computer
A Computer is a General-purpose machine, commonly consisting of digital
circuitry, that accepts (inputs), stores, manipulates, and generates (outputs) data
as numbers, text, graphics, voice, video files, or electrical signals, in accordance
with instructions called a program
Father of the computer – Charles Babbage.
Father of the modern computer – Alan Turing.
Basic Architecture of Computer: John Von Neumann (1947-49).
First Programmer: Lady Ada Lovelace (1880).
First Electronic Computer: ENIAC (1946) – J.P. Eckert & J.W. Mauchly.
The first computer for the home user introduced – IBM in 1981.
Computer definition
The computer is not an acronym; it is a word derived from the word "compute", which
means to calculate.
A computer is an electronic device that is used for fast calculation.
It were just calculating machines that needed a lot of space for establishment.
"A computer is a general purpose electronic device that is used to perform arithmetic and
logical operations automatically.
Computer functions
3. Process data
4. Generate output
Some software enables the user to enhance the system's functionality as well.
There is a collection of programs that are used by the computer to perform certain tasks.
Efficiency,
maintainability,
reusability, and
portability.
Hardware
It refers to the physical devices or the physical component of the computer system that is tangible.
The functions of hardware are entering, processing, storing and displaying the result.
Firmware
Firmware is software that runs on very small processors that makes a hardware device
function correctly.
Firmware often is used to produce small useful behaviors for a much bigger piece of hardware
Example, your WiFi radio has firmware that allows it to provide radio signal information in a format that is
useful for your computer’s main processor.
Wristwatches, calculators, computer mouses and car key fobs all have firmware.
COMPUTER PROGRAMMING
A language that is acceptable to a computer system is called a computer language or
programming language
On the same pattern, communication with computers is carried out through a language.
Just as every language like English, Hindi has its own grammatical rules;
every computer language is also bounded by rules known as syntax of that language.
The user is bound by that syntax while communicating with the computer system.
Computer languages are broadly classified as:
Low Level Language: The term low level highlights the fact that it is closer to a language
Assembly language programming is simpler and less time consuming than machine level programming, it is
easier to locate and correct errors in assembly language than in machine language programs.
programmers must have knowledge of the machine on which the program will run.
High Level Language
Low level language requires extensive knowledge of the hardware since it is machine
dependent.
To overcome this limitation, high level language has been evolved which uses normal
English, which is easy to understand to solve any problem.
High level languages are computer independent and programming becomes quite easy
and simple.
The program statements are not closely related to the internal characteristics of the
computer
Various high level languages are given below:
High Level Language
a. BASIC (Beginners All Purpose Symbolic Instruction Code): It is widely used, easy to learn general purpose
language.
Mainly used in microcomputers in earlier days.
b. COBOL (Common Business Oriented language): A standardized language used for commercial
applications.
c. FORTRAN (Formula Translation): Developed for solving mathematical and scientific problems.
One of the most popular languages among scientific community.
d. C: Structured Programming Language used for all purpose such as scientific application, commercial
application, developing games etc.
e. C++: Popular object oriented programming language, used for general purpose.
Low level language High level language
Is machine dependent • Is machine independent
programming becomes difficult • uses normal English, which is easy to
understand to solve any problem.
• programming becomes quite easy and
simple.
1st generation Machine language O &1
2nd generation Assembly language Symbols and
mnemonics
3rd generation High level language COBOL, FORTRAN, C,
C++, FORTH, BASIC,
PASCAL
Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by
attaching to other programs) or wreak havoc.
Some e-mail viruses don't even require a double-click -- they launch when you view the
infected message in the preview pane of your e-mail software
1. Trojan horses: A Trojan horse is simply a computer program.
The program claims to do one thing (it may claim to be a game) but instead does damage
when you
run it (it may erase your hard disk).
Trojan horses have no way to replicate automatically.
2. Worms: A worm is a small piece of software that uses computer networks and security
holes to replicate itself.
A copy of the worm scans the network for another machine that has a specific security hole.
It copies itself to the new machine using the security hole, and then starts replicating from
there, as well.