Fundamentals of Computer-Unit 1.edited
Fundamentals of Computer-Unit 1.edited
1.1 Introduction:
A computer can be defined as a multipurpose, programmable, electronic data processing device that is
capable of accepting input (data), processing it, and producing refined data (information) as output at
enormous speed.
Features:
1) Speed:
It has a high speed of executing an instruction. CPU of a computer can perform more than millions of
operations per second. It takes only a few seconds for calculation that will take hours to complete.
Today, a powerful computer can perform billions of operations in just one second.
2) Storage:
A computer has a very large storage capacity where users can store any type of data, which can be
used at any time. The computer has an inbuilt memory where it can store a large amount of data.
Users can also store data in secondary storage devices such as hard disk, pen drive, DVD, etc. in
terms of KB (Kilobyte), MB (Megabyte), GB (Gigabyte), TB (Terabyte), etc.
3) Accuracy:
Accuracy refers to the degree of correctness and exactness of operation performed by the computer.
A computer can process a large amount of data and generate error-free results. The accuracy of the
result completed by the computer is consistently high due to digital techniques. An error is very
small. The errors in computing may be due to logical mistakes by a programmer or due to inaccurate
data.
4) Versatility:
It means the capacity to perform a completely different type of work. It can perform a simple
mathematical calculation to highly complex and logical manipulation. Users may use a computer to
prepare payroll slips. Next moment users may use it for inventory management or to prepare
electrics bills.
5) Diligence:
A computer is free from tiredness, lack of concentration, etc. It can work for hours without creating
any errors. If millions of calculations are to be performed, a computer will perform every calculation
with the same speed and accuracy.
6) Automation:
A computer is said to be an automatic machine. A computer is programmed to perform a series of
complex tasks automatically. The computer stores a set of instructions as well as data and one
instruction is enough for a computer to complete a task without further instructions.
7) Power of remembering:
A computer has the power of storing any amount of information or data. Any information can store
and record as long as required for any number of years. It depends on the entire how much data
what to store in a computer and where to use these data.
8) No IQ:
A computer is a dumb machine and it cannot do any work without instruction from the users. It
performs the instruction at high speed with full accuracy. It is a user to decide what user wants to do
in which sequence. So, a computer cannot take its own decision as a user can.
9) No Feelings:
A computer does not have a feeling for knowledge and experience because it does not get tired after
long hours of working. A computer doesn't differentiate between users.
1
Types and Generations of computer:
Types of computer:
There are different types of computers developed till today. These computers are classified or grouped
into different types according to their purpose (Use), size, technology (Model), working principle
(Function), and brand.
a) Based on Purpose:
Based on purpose, computers are classified into two types. They are;
b) Based on Size:
Based on the size, computers are classified into four types. They are;
1) Super Computer:
A Supercomputer is a multi-user, multi-processor, more efficient, faster, and most expensive
computer than others. These computers are an extremely fast computer that can perform 100 of
millions of instruction per second. It is a special-purpose computer i.e. capable of handling huge
amounts of calculation. Most supercomputers are used by government agencies or processing
large programs and a high amount of data very quickly. These computers are used in weather
forecasting, oil exploration, weapon research, and aircraft research.
Characteristics/features of a supercomputer:
Large in size.
These computers are capable of handling huge amounts of calculations that are beyond
human capabilities i.e. the human is unable to solve such extensive calculation.
Many individuals can access supercomputers at the same time.
The supercomputer can support the extremely high computational speed of CPU.
These are the most expensive computer.
2) Mainframe Computer:
These computers are generally known for their large size, amount of storage, processing power,
and high level of reliability. They are used by large size organization for critical applications
requiring a high volume of data processing. These computers are mainly used in banking,
insurance company, airlines, air traffic control, etc.
2
3) Mini Computer:
These computers are smaller, less expensive, and less powerful than super and mainframe but
more expensive and powerful than a microcomputer. These computers are used by the medium-
size organization for business transaction process, database management, programming, etc.
These computers are designed to serve multiple users simultaneously.
4) Micro Computer:
A microcomputer is the smallest, cheapest, and versatile digital computer, used in different fields.
A microcomputer uses a microprocessor as it’s processing unit. They have small memory, less
processing power, physically small, and permit and few peripheral to be attached.
1) XT Computer:
XT stands for extra or extended technology. It is an old technology with a very slow processing
speed. It is a text-based system with no GUI (Graphical User Interface). The input/output (IO)
device was not flexible and is slower than present devices. A processor like Intel 8080, 8086,
8088 used this technology.
2) AT Computer:
AT stands for advanced technology. AT computer is faster in processing and can run both GUI
based and CUI (Character User Interface). IO devices are interactive, flexible, and faster. It was a
medium speed processing device. Processors using AT technology were Intel 80286, 80386,
80486, Pentium I, and Pentium II.
3) PS/2 Computer:
PS/2 stands for personal system-2. It is the modification of AT computer, making the computer
faster than AT. It was mostly used in laptops with a rechargeable and battery-operated system
with faster and flexible IO devices.
1) Analog Computer:
The computer which works with a natural and physical value like frequency, current flow,
temperature, etc. for continuously changing data is called an analog computer. It is a special-
purpose computer which is mostly used for scientific work, medical work, etc. Generally, it has
less storage capacity and its accuracy is poor, compared to the digital computer. Examples of
analog computers are thermometer, speedometer, voltmeter, etc.
3
Characteristics/features of analog computer:
Analog computer works with natural or physical values.
It is used for a special or specific purpose.
It has no or low storage capacity.
Normally, it cannot be reprogrammed.
It has low accuracy and reliability.
It is non-versatile.
It operates by measuring or comparing.
The Analog signal is in the form of curve line graphs.
Analog signal
2) Digital computer:
The computer which works with binary digits i.e. o and 1 and discrete data is called the digital
computer. It is a general-purpose computer and it can also be used for commercial purposes. It is
mostly used in the creation of reports, results, tabulation, graphics, presentation, etc. Examples of
a digital computer are IBM PC, IBM Compatibles, calculator, etc.
Digital signal
10. Desktop computer is an example of a digital 10. Presley is an example of analog computer.
computer.
3) Hybrid Computer:
A hybrid computer is the combination of analog and digital computer which can perform any type
of work. It can transfer the data from analog to digital or vice-versa. It is a special purpose
computer. It is an expensive computer that is used in weather forecasting, rocket lunching
process, oil exploration, hospitals, etc.
4
Characteristics/features of hybrid computer:
A hybrid computer can process both continuous and discrete data.
It is the combination of the best features of analog and digital computers.
It is a special purpose computer.
It can transfer the data from digital to analog and vice-versa.
It is mostly used in scientific research, hospitals, etc.
It usually has a high cost compared to analog and digital computers.
e) Based on Brand:
Based on the brand, computers are classified into three types. They are;
1) IBM Computer:
IBM computers stand for “International Business Machine” which is made by IBM company. IBM
company was established by Dr. Herman Hollerith in 1923 A.D. and it is the largest computer
manufacturing company in the world till today. It is leading the market of mainframe, mini and
personal computer. The IBM computers are more reliable, durable, and have a high processing
capacity. It is also called IBM branded computer as its whole parts are developed by IBM itself.
Generally, these computers are more expensive than other computers. IBM computers are very
famous for data processing and store.
2) IBM Compatible:
The word compatible means ' can exist together and work successfully'. So in IBM compatible, the
components of the computer are developed by different companies and finally, they are
assembled and a computer is made. So, it is also called an assembled PC. Although the
architecture of IBM compatible is similar to IBM's PC, they are very cheaper than branded PC or
compatible PCs are Dell, Lenovo, and Toshiba, etc.
3) Apple/Macintosh:
Apple Corporation is one of the largest computer manufactures which is in the USA. It has made
many PCs with good qualities and user-friendly, and the internal architecture of Apple computers
is different than that of IBM PC. The software made for Apple computers cannot be used in IBM
PC or vice versa. Even the floppy disks or hard disk formatted in one can’t be recognized by
others. These computers are famous for graphic design and animation. Some of the most popular
Apple/Macintosh products are Macbook Pro, iMac, etc.
Generations of computer:
Computer generation is the stepwise development in technology for the growth of computer hardware.
The term generation is fully based on the development of hardware technology. But nowadays it has
been extended to include both hardware and software that performs together in the computer system.
Computer generation describes as a stage of technology of development innovation. Its classification is
mainly based on technology, manufacturing, language used, etc. There are five generations of computers
which are as follows.
5
9. Not portable.
10. Slow input, and output device.
6
10. Primary memory used: Semi-conductor memory (RAM, ROM, etc.)
11. Secondary memory used: Magnetic disk and optical disk (Hard disk, DVD, pen drive, etc.)
12. Internet: Email and advanced operating systems are developed.
Memory Unit:
Memory unit is the amount of data that can be stored in the storage unit. This storage capacity is
expressed in terms of Bytes. The following table explains the main memory storage units.
0, 1 Bit 1 Bit
4 Bit 1 Nibble
8 Bits or 2 Nibble 1 Byte
1024 Bytes 1 Kilobyte (KB)
1024 Kilo Bytes 1 Megabytes (MB)
1024 Megabytes 1 Gigabytes (GB)
1024 Gigabytes 1 Terabytes (TB)
1024 Terabytes 1 Petabytes (PB)
1024 Petabytes 1 Exabyte (EB)
Classification of Memory:-
Memory
7
Primary Memory:
It is also known as the main storage or main memory of the computer. It is used to holds or stores data
and applications for a short period while the computer is running. Primary storage normally has limited
storage capacity. It is expensive. The types of primary memory are:-
a) Register:-
A register is the primary memory of the computer system. They are mainly used to store data during
the time of processing inside ALU. The register within the CPU is a special purpose temporary
storage location. The main types of registers are general-purpose register and special purpose
register. The important register within the CPU is the programmed counter (PC).
b) Cache Memory:-
Cache memory is extremely fast memory i.e. built into a computer's CPU or located next to it on a
separate chip. The CPU use cache memory to store instructions that are repeatedly required to run
programs improving overall system speed. The advantage of cache memory is that the CPU doesn't
have to use the motherboards system bus for data transfer. Wherever data must be passed through
the system bus, the data transfer speed slows to the motherboard’s capability. The CPU can process
data much faster by avoiding the bottleneck created by the system bus.
Cache memory is a temporary memory that a computer microprocessor can access more quickly
than it can access regular RAM. It is the micro-processer process data, it looks first in the cache
memory and if it finds the data there, it doesn't have to do the more time-consuming reading of data
from larger memory. There are two processes in cache: cache hit and cache miss.
i. Cache hit:- At first time processor sends the address to desire data to the cache. If data is available
then the event is called a cache hit.
ii. Cache miss:- When the processor sends an address that is not present in the cache, the event is
called a cache miss. After cache miss data of main storage is copied to cache for next cache hit.
CPU Main Memory
Features of cache memory:-
It is a temporary memory.
It is a small size memory.
It is a fast memory.
It increases the speed of the computer.
Cache Memory
Its internal cache is inside the microprocessor and external caches are
Fig: Cache Memory
outside micro-processor.
L1 and L2 cache:
L1 and L2 are levels of cache memory in a computer. If the computer processer can find the data it's
needed for its next operation in cache memory it will save time compared to having to get it from RAM.
L1 is "level one" cache memory. Usually built on to the microprocessor chip itself. For example, the Intel
MMX microprocessor comes with thirty-two thousand bytes of L1.
L2 i.e. "level two" cache memory is on a separate chip that can be accessed more quickly than the larger
main memory. A popular L2 cache memory size is in terms of megabytes.
8
ii. DRAM (Dynamic Random Access Memory):-
DRAM is mostly formed by using a capacitor. It is the less expensive kind of RAM. It requires an
electric current to maintain its electrical state. The electrical charge of DRAM decreases the data
store in it can be lost. It needs to recharge or refreshed again and again to maintain its data. The
processor can't access the data of DRAM when it's being refresh, so it is slow.
i. PROM (Programmable Read-Only Memory):- A memory chips on which data can be written only
once. Once a program has been written into a PROM it remains forever. The data stored in the
PROM can't be modified. So, it is called a one-time programmable device.
ii. EPROM (Erasable programmable Read Only Memory):- It can be erased by exposing it to ultra-
violet light. The ultraviolet light clears it contains, making it's possible to reprogram the memory.
iii. EEPROM (Electrically Erasable Programmable Read-Only Memory):- A memory chip that can
be programmed and erase electrically. It can be erased and reprogrammed about ten thousand
times. Both erasing and programming takes about four to ten millisecond. In EEPROM any
location can be selectively erased and programmed. The process of programming is flexible but
slow.
9
Secondary Memory:
Secondary memory is also known as auxiliary memory or non-volatile memory i.e. not directly accessible
by CPU because it is not accessed by the input/output channels or devices. It is used to store programs
and data for long term storage or when data are not immediately used. Secondary memory
storage/memory is cheaper than primary memory. The types of secondary memory are:
a) Magnetic Tape:-
It contains a thin plastic ribbon, semi-colored; only one side of the ribbon is used for storing data.
The storing side is coated with magnetic oxide. Magnetic tape has been a measuring device for
storing audio, video, and binary for several decades and is still part of data storage in some systems
or some devices.
b) Magnetic Disk:-
The magnetic disk is the most widely used storage medium for computers. The magnetic disk
contains a circular disk made up of metal. Both sides of the disk are used for data storage. A magnetic
disk offers high storage capacity. The magnetic disk is classified into two types: Hard disk and Floppy
disk.
i. Hard Disk:-
A hard disk is a non-volatile memory. A hardware device that permanently stores and retrieves
data on a computer. It uses two to four metallic disk which is usually made using aluminum. The
hard disk is most popular for its high-speed access and reliability of data. It has a high storage
capacity compared to main memory. The hard disk is used for the long-term storage of programs
and data files. It has a storage capacity in terms of Gigabyte (GB) such as 20GB, 40GB, 80GB,
160GB, and 320GB, etc.
c) Optical Disk:-
An optical disk is an electronic data storage removable disk that uses laser and optical technologies
to read and write data. It is mostly used for storing huge amounts of data like video, music, software,
game, office applications. The optical disk is durable and light-weight. The read light speed is slower
in optical disk compare to the hard disk and flash memory. Some examples are CD, DVD, and BD.
i. CD:-
CD stands for compact disk it is an optical disk that is used to store text, graphics, audio, video,
and other files. It is a non-volatile optical storage device. It is readable by the computer with a
CD-ROM drive. There are three types of a CD they are:
CD-ROM:- It is an optical ROM in which pre-recorded data can be read. It is famous for the
distribution of computer software and application. The pre-recorded data of CD-ROM can't write
or erase by the user.
CD-R/W:-
CD-R/W is a re-writeable optical disk which is also called an erasable optical disk. It allows the
user to record and erase data. So, the disk can be used over and over again.
CD-R:-
It is a blank CD where we can store data once. After storing once it is converting in CD-ROM.
10
ii. DVD:-
DVD stands for the digital versatile disk. It is an optical disk which we can store much more data
than CD-ROM. It can store up to 20GB of data. The capacity depends on whether it is single layer
single side, Double-layer double side. It can store any type of data such as graphics, audio, video,
etc. The read and write speed of the DVD is slower than the CD. The types of DVDs are DVD-ROM,
DVD-R/W, and DVD-R.
iii. BD:-
BD stands for the blue-ray disk. It is the name of a new generation optical disk. It is developed to
enable recording, re-writing, and playback of high definition (HD) videos, as well as a high
amount of data. It offers more than 5 times the storage capacity of present DVDs. It has three
types: BD-ROM, BD-R/W, and BD-R.
d) Flash Memory:-
Flash memory is an electrically erasable programmable memory that is used to transfer data
between computers and other digital devices. It is also called non-volatile memory because it is
retained data when power is lost. Flash memory is small in size, light-weight, fast and durable. There
are mainly two types of flash memory they are: Pen drive, Memory card.
i. Pen Drive:-
A pen drive or a USB (universal serial bus), the flash drive is portable. Pen drives have replaced the
floppy drive and become the most popular storage devices in present days. Micro, light-weight and
handy is the main feature of the pen drive.
a) Electronic Keyboard:
An electronic keyboard is one of the primary input devices in a personal computer. It enables the
user to enter data and commands into a computer for the processing system. The modern keyboard
connects with the CPU by cable or by the infrared transmitter. The keys on computer keyboards are
often classified as follows:
11
i. Alphanumeric keys – letters and numbers
ii. Punctuation keys – comma, period, semicolon, and so on.
iii. Special keys – function keys, control keys, arrow keys, Caps Lock key, and so on.
The layout of keys on the modern-day English keyboard is called the QWERTY design.
b) Computer Mouse:
A computer mouse is a small, palm-sized, plastic device. It has two or three buttons on the top with
either a rotating ball or an optical sensor at the bottom. It is designed to be gripped by one hand and
is attached to a terminal or microcomputer by a cable. When the user rolls the mouse across a flat
surface, the screen cursor mover in the direction of the mouse's movement as a result of electrical
signals through the electrical cable connected to the mouse. It is used to make menu selections and
draw freehand shapes on a screen.
a) Trackball:
A trackball is a stationary pointing device that contains a movable ball rotated with a finger or palm.
It consists of a ball resting on two rollers at right angles to each other, which translates the ball's
motion into vertical and horizontal movements on the screen. A trackball also has one or more
buttons to initiate other actions. The trackball unit is held stationary while the ball is manually
rotated by hand in any direction. The major advantage of a trackball is that it takes a little desktop
surface.
b) Joystick:
A joystick is an input device consisting of a stick that pivots on a base and reports its angle or
direction to the device it is controlling. Joysticks are often used to control video games, and usually
have one or more push-buttons whose state can also be read by the computer. Joysticks are also used
for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs,
surveillance cameras and zero turning radius lawnmowers.
c) Touchpad:
A touchpad is a device for pointing on a computer display screen. It works by sensing the user's
finger movement and downward pressure. It can also be found on personal digital assistants (PDAs)
and some portable media players, such as the iPod using the click wheel. The first touchpad was
invented by George E. Gerpheide in 1988.
d) Pointing stick:
A pointing stick is an isometric miniature joystick that is primarily used in laptops as a cursor
pointing device. The pointing stick moves and manipulates the computer cursor like a joystick. Its
height is designed to be slightly above the keys. Pointing sticks are commonly found on ThinkPad
laptops.
e) Digitizer Tablet:
A digitizer tablet (also known as a digitizer or graphics tablet) is a tool used to convert hand-drawn
images into a format suitable for computer processing. Images are usually drawn onto a flat surface
with a stylus and then appear on a computer monitor or screen. Digitizer tablets can also be used as
an input device, receiving information represented in drawings and sending output to a
CAD(computer-aided design) application and PC-based software like AutoCAD. Digitizers are often
used by designers, architects, and engineers.
f) Light Pen:
A light pen is a light sensitive pen-like device used to point to displayed objects and to draw images
on the screen. The light pen contains a photocell placed in a small tube. As the user touches the point
of the pen over the surface of the screen, it detects the light emitted from the screen. When the
photocell is activated, the electrical pulses sent to the computer identifies the menu option that is
triggering the photocell. It enables a user to write words or draw pictures directly into the computer.
It can also be used to choose a displayed menu option.
12
g) Digital Camera:
A digital camera is an electronic device used to capture and store photographs digitally, instead of
using photographic film like conventional cameras. This allows us to take pictures and to store a
digital photographic image that can be read by the computer. We can transfer the images directly
from the camera onto the computer.
h) Webcam:
The webcam is a camera connected to a computer that allows anyone to connected to the Internet to
view still pictures or motion video of a user. Webcam software typically captures the images as JPEG
or MPEG files and uploads them to the webserver. Webcam capabilities have been added to instant
messaging text chat services such as Yahoo Messenger and one-to-one live video communication
over the Internet.
j) Image Scanner:
An image scanner is a light-sensing device that translates images and other printed information into
digital form so that they can be stored or manipulated by the computer. It works by shining light on
the image being scanned and measuring the light that is reflected with the help of optical sensors.
There are four types of scanners. They are a flatbed scanner, sheetfed scanner, drum scanner, and
handheld scanner. Among these, drum scanners are the most expensive and perform the worst.
Flatbed scanners are the most popular as their price/performance is the best.
13
n) OMR: Optical Mark Recognition:
OMR recognizes marks made by human beings on a document or specially printed papers used in
examinations, surveys, etc. It is generally used when a large number of applicants apply and data has
to be processed immediately and with accuracy. Data is read from the document with an OMR reader.
The datasheet is scanned through a scanner that shines a beam of light on the form paper and detects
the areas of limited light transmittance i.e.; marked areas as they reflect less light in comparison to
blank areas. It gives less than 1% error.
a) Computer monitor:
The computer monitor is the most popular output device used today for producing soft-copy output.
It is like a television device connected to a computer that displays viewable images generated by a
computer. Computer monitors display a wide variety of information, including text, icons (pictures
representing commands), photographs, computer-rendered graphics, video, and animation. The
basic types of monitors used today are:
i. LCD (Liquid Crystal Display):
LCD (Liquid Crystal Display) computer monitors save a lot of space and can even be mounted on
walls. They provide a wide viewing angle and come in sizes typically ranging from 17-inches to
60-inches.
Characteristics of Monitor:
1. Size: The most important aspect of a monitor is its screen size. Like television, screen size is
measured in diagonal inches, the distance form one comer to the opposite corner diagonally. A
typical size for small VGA monitors is 14 inches. It means 14 inches size from the lower left to the
upper right corner.
2. Resolution:
The resolution of a computer monitor is expressed by the number of pixels on the screen, expressed
as a matrix. For example, a resolution of 640×480 means that, there are 640 pixels horizontally
across the screen and 480 pixels vertically down the screen. The resolution of a monitor indicates
how densely the pixels are packed. Many suppliers of video adapters provide greater resolution and
more colors.
14
Type of adapter Pixels
VGA 640×480
SVGA 800×600
XGA 1024×768
SXGA 1280×1024
UXGA 1600×1200
3. Bandwidth: The bandwidth of computer monitor means the range of signal frequencies that can be
handled by the monitor. This determines how much data it can process and therefore how fast it can
refresh at higher resolutions. The better the bandwidth better is the pictorial quality.
4. Refresh Rate:
The data shown on the screen of the monitor seem to be stationary but actually the picture on the
screen is not stationary. The picture is being drawn time to time by the monitor so fast that our eyes
can’t see the drawing process and the picture seems to be stationary. Refresh rate means the number
of times per second the screen is refreshed or redrawn.
5. Dot pitch: Dot pitch is the amount of space between each pixel. The smaller the dot pitch, sharper
the image. The dot pitch of color monitor for personal computer ranges form about 0.15 to 0.30 mm.
6. Convergence: Each pixel is composed of three dots: a red, blue and green one. Convergence is the
sharpness of each pixel. In graphics, convergence refers to how sharply an individual color pixel on a
monitor appears.
Video Standard:
1. VGA: Perhaps the most common video standard today, VGA, for video graphics array, will support 16
to 256 colors, depending on resolution. At 320×200 pixels it will support 256 colors; at the sharper
resolution of 640×480 pixels it will support 16 colors.
2. SVGA: SVGA, for super video graphics array, will support 256 colors at higher resolution than VGA.
SVGA has two graphics modes: 800×600 pixels and 1,024×768.
3. XGA: Also referred to as high resolution display, XGA, for extended graphics array, supports up to
16.7 million colors at a resolution of 1,024×768 pixels. Depending on the video display adapter
memory chip, XGA will support 256, 65,536, or 16,777,216 colors.
b) Speakers:
The speakers are the most commonly used sound output devices. They are used to receive sound
output. The speakers are used to play music and songs from the computer. Some speakers are also
inbuilt inside the system unit and they give different sounds while using the computer. Various types
of speakers are available in the market. The quality of the sound output depends on the speaker's
quality.
c) Digital projector:
A digital projector is an electronic device that is normally connected to a computer through a cable
enabling it to display an enlarged and projected image on a screen. A digital projector uses very
bright light to project images. Such devices are commonly used in presentation, classroom training,
home theatre, and live event applications. Projectors are widely used in many schools and other
educational settings, connected to an interactive whiteboard to interactively teach pupils.
d) Voice-output devices:
Voice-output devices make sounds that resemble human speech but are pre-recorded vocalized
sounds. The most widely used voice-output devices are stereo-speakers and head-phones. These
devices are connected to a sound card in the system unit. The sound card is used to capture as well as
playback recorded sounds.
15
Hard Copy Output:
Hard copy output refers to recording letters, graphics, or pictures on a permanent medium such as paper
or film. The principal hard copy output devices are printers and graphic plotters.
a) Printer:
A printer is an output device that produces text and graphics on a physical medium such as paper.
Printed information is called a hard copy because the information exists physically and is a
permanent form of output. Computer printers are commonly divided into two general classes
according to the way they produce images on paper. They are;
i. Impact printer:
Impact printer is a printer that uses a mechanical hammering device to produce each
character. Each hammer is embossed with the shape of an alphanumeric character and is
transferred through the inked ribbon onto the paper, resulting in a printed character. They
are relatively slow, noisy, and inexpensive. They can withstand a dusty environment,
vibrations, and extreme temperature. The most popular kinds of impact printers are drum
printers and a dot-matrix printer.
a. Drum printer:
A drum printer is an impact printer that consists of a cylindrical drum on which
characters are embossed and it rotates at a uniform speed. There is a magnetically
driven hammer in each character position of the line. A character is printed by striking
a hammer against the embossed character on the surface. The hammer hits the ribbon
and paper against the desired character on the drum when it comes into the printing
position. It is capable of printing at a very high speed ranging from 125 to 3000 lines
per minute and is very expensive.
b. Dot-matrix printer:
Dot-matrix printer is an impact printer that uses a movable print head consisting of
pins. These pins, when pressed against a ribbon and paper, cause small dots to be
printed. The more pins that a print head contains, the higher the printer's resolution.
The speed of the dot matrix printer is measured in characters per second(cps). Dot-
matrix printers are inexpensive and relatively fast, but they do not produce high-
quality output.
a. Ink-jet printer:
The ink-jet printer is a high-quality non-impact printer that forms characters by
spraying small drops of ink onto the paper. A special ink with high iron content is
used. The droplets of ink are charged electrically after being lead onto a nozzle. The
droplets are then guided to thin proper positions on paper by electrically charged
deflection plates. Inkjets are usually inexpensive, quiet in operation, and produce
high-quality output.
b. Laser printer:
Laser printers are high-speed, high-quality printers that use a laser beam to form
images on paper using toner ink as a medium. The light beam gets electrically charged
and exposed areas attract the toner ink particles. The toner particles are then
deposited on and permanently fixed to the paper using heat or pressure. Finally, the
electrical charge is removed from the drum and the excess toner is collected. By
omitting this final step and repeating only the toner-application and paper-handling
16
steps, the printer can make multiple copies. Laser printers are very expensive but they
produce high-quality output.
b) Plotter:
The plotter is a printer that interprets commands from a computer to make line drawings on paper
with one or more automated pens. Unlike a regular printer, the plotter can draw continuous point-to-
point lines directly from vector graphics files or commands. There are several different types of
plotters: a drum plotter draws on paper wrapped around a drum which turns to produce one
direction of the plot, while the pens move to provide the other direction; a flatbed plotter draws on
paper placed on a flat surface, and an electrostatic plotter draws on negatively charged paper with
positively charged toner. They are most frequently used for CAE(Computer-aided engineering)
applications, such as CAD(computer-aided design) and CAM (computer-aided manufacturing).
Types of Software:
System software
Application software
1) System Software:
System software includes the programs that are dedicated to managing the computer itself. It is also
known as background software as most of them run in the background to support the foreground
process. It acts as an interface between computer users, computer hardware, and application
software. There are four types of system software.
a) Operating system: It is software that co-ordinates with computer resources. It also acts as an
interface between the user and computer hardware and application software. Every general-
purpose computer must have an operating system. Without an operating system, the user can't
communicate with computers. The commands which are given by the user's delays to the
microprocessor by the operating system. LINUX, UNIX, Windows, etc. are examples of the
operating system.
b) Utility Software: Utility software helps to manage, maintain, and control computer resources.
The operating system typically contains the necessary tools for this but separately, utility
software can provide to improve functionality. Utility software includes antivirus, backup,
disrepair, file management, security, and networking programs.
17
c) Language translator: Language translator translates programming code or programming
instruction into machine code that the computer can understand and process. The input is
known as source code, the translator translates source code into a low-level language called
object code. Compiler, interpreter, and assembler are the most common example of a language
translator.
d) Device driver: A driver is a software, provided by a hardware maker that tells the computer's
operating system and software how to work with that hardware. Computer operating systems
usually come with 'pre-installed' device drivers for the current models of popular devices.
Drivers are hardware-dependent and need operating system software.
2) Application software:
It is used to perform various applications on the computer. These software's are also called end-user
program because they enable the users to complete different tasks. Such as creating documents,
databases, and publications, designing graphics, spreadsheet running a business, etc. In the present
situation, millions of application software packages are available for a wide-range of applications.
Application software can further be subdivided into two categories: packaged software and
customized software.
a) Packaged software:
Packaged software is a computer application consisting of one or more programs created to
perform a particular type of work. It is user friendly and designed to satisfy the needs of more
than one organization. Packaged software may be purchased from software vendors. Some
presentation, spreadsheet, and desktop publishing.
b) Customized software:
Customized software is designed specifically for a particular organization. It is written on the
demand of an individual's need and servers only a single organization. It is written in high-level
languages. Customized software is known as bespoke software. Customized software is tailored
to meet the specific needs of an organization. Some of the examples of customized/tailored
software are payroll package, inventory package, and library information system.
18
browser. However, web-based applications also may be client-based, where a small part of the
program is downloaded to a user’s desktop, but processing is done over the internet on an external
server. Web application are also known as web apps.
It includes light applications like Flash games, online calculators, calendars, web-based email and so
on, as well as more intensive applications such as web-based word processors and spreadsheet
applications (like Google Docs and Google Spreadsheet).
4) Mobile Application:
A mobile application (mobile app is short) is a software application developed specifically for use on
small, wireless computing devices, such as smart phones and tablets.
It executes when we press an icon on the mobile device, such as an iPad or Android phone. The
mobile application usually fall into three basic categories:
a. Native: a mobile application that runs only on the specific hardware for which it is designed.
b. Web based: a mobile application that makes use of the Internet’s connectivity to provide some or
all of its functionality.
c. Hybrid: A combination of native and Web-based apps.
19
6) Word Processor:
Word processor is software that allows users to create edit, format, and print documents. It also
helps for designing and presenting the documents in attractive formats. It enables the user to write
text, store it electronically, display on a screen, modify by entering commands and characters from
the keyboard and print it. It has a variety of uses application within a business environment home
and education context. It allows the user to make corrections without retyping entire matters. MS
Word is the most popular word processor.
Features:
It is used for creating, saving and closing, printing a document.
It is used for formatting text, paragraph table, page, etc. such as font type, font size, bolding,
underline, etc.
It is used for drawing pictures, charts, tables, and graphics.
It is used for inserting symbols, objects, word art, clip art, graphics, etc.
Correcting spelling and grammar.
Compare words in a document to those store in a programmer's dictionary files.
It is used for working with text boxes and frames.
7) Spreadsheet:
The spreadsheet is a computer application package for organization, analysis, and storage of data of
value arranging row and column. Each value can have a pre-defined relationship to the other values.
This program is used to process numeric data. It provides an easy method for analyzing data and
presenting high-quality graphics output. MS-excel is the most popular spreadsheet application
software.
Features:
It allows us for keeping records in the worksheet and workbook.
It provides various mathematical and logical functions for data manipulation.
It provides various charts for presenting data.
It combines the feature of the general ledger with the flexibility of powerful analysis and
reporting functions.
It allows sharing workbooks with multiple users to edit the same workbook at the same time.
Shutting data in either ascending or descending order based on a different field.
Formatting of data for making it attractive by using different tools font color, font size, etc.
8) Presentation:
A presentation is a collection of electronics, slides that can have text, pictures, graphics, tables,
sound, and video. This collection can run automatically can be controlled by a presenter.
Presentation programs can be used in business and schools for discussing a topic or for teaching. It is
trying to replace the use of traditional visual aid technology. MS-PowerPoint, IBM lotus, power dot,
etc. are the most popular presenting software.
Features:
Different forms of information such as text, graphics, audio, video, and animation can be
presented.
Different forms of charts, tables, and objects can be embedded in the slides of a presentation.
It provides the features like custom animation, slide transition, and custom setup show.
It provides features like slide layout theme, design template, ready mate template.
Simple comparing operations like copy, paste, cut, find and replace.
Data: The unorganized form of the information is known as data. Data may be in different forms like the
alphabet, digits, pictures, video clips, audio clips, and other symbols. Data may or may not give any sense
or meaning.
20
Database: Database is a collection of interrelated data of entities or object which is stored in a computer
in tabular form. The database gives useful information for an organization during data manipulation.
Objectives of DBMS:
To provide a storage area for the mass amount of relevant data.
To make access the data for the end-user.
To modify the database.
To eliminate data redundancy.
It allows multiple users to be activated at the same time.
To protect the data from physical harm and unauthorized access.
Advantages of DBMS:
1) Data sharing: Data store in a database can be shared. For example, with a DBMS, the data for the
entire company is effectively made available to all managers and end-users, which need them.
2) Reduce data Redundancy: In traditional file processing, the same data may be duplicated at
many times or places, which is also called data redundancy. A DBMS reduces the duplication of
data from a database.
3) Integrity can be maintained: Integrity ensures that the data stored in a database is correct or
accurate. So, the problem of ensuring that the data in the database is correct. Inconsistency
between two entries is an example of a lack of integrity. But DBMS avoids the data inconsistency
problem, so it improved the data integrity.
4) Data Independence: The DBMS keeps the description of data separate from applications that
use the data. Thus, changes in the data definition can occur without requiring changes in every
application program that uses the data. This reduces the maintenance cost of the database and
makes the database independent of the storage media. And also the database is not dependent on
the storage media.
5) Data Availability: In a traditional file processing system, data is scattered in many files and due
to non-uniformity in file design, the same data may have different identification. This makes, it
difficult to obtain the relevant data. DBMS helps to overcome this problem.
6) Standard can be enforced: With a DBMS, it is easier to enforce the standard in naming the
format of data, the structure of data.
7) Security can be improved: In any organization, there should be many confidential data; such
data should not be available to all users. In a DBMS, certain restrictions can be applied for
security by giving different authorities to different users.
8) Inconsistency can be avoided: When the same data is duplicated and changes are made at one
site, and not on other sites, it cause data inconsistency. But DBMS reduces the inconsistency
problem by eliminating two entries regarding the same data.
9) Providing multiple user interfaces: DBMS provides a variety of interfaces for various users. It
provides query language interface, forms, and command interfaces so that users interact easily
with the database. Some DBMS also provides menu-driven interfaces for stand-alone users.
Forms and menu-driven interfaces are collectively called GUI (Graphical User Interface).
21
10) Concurrent access of data (data can be shared): Concurrent access means to the same data
simultaneously by more than one user. Data can be shared among several different users. DBMS
supports concurrent access to data.
Disadvantages of DBMS:
1) The initial investment is high for implementing DBMS.
2) Proper training is required for staff to work properly in the database system.
3) When some fault occurs in one part of the database it affects the other parts as well.
4) It is complex to understand and implement.
5) The overhead cost of providing security, recovery, and integrity functions.
6) Cost for the maintenance of the hardware, software, backup, recovery, and its upgrade remains
forever.
7) The problem arises if the database is not properly designed or if the database application system is
not properly implemented.
Language translator/Processor:
A language translator is system software that translates programs written in any programming language
into machine language programs. It is also known as a language processor. A program code written using
any programming language is called a source program. A program code obtains after converting source
code by using a language translator is called object code or machine code. There are three types of a
language translators.
1. Assembler:
An assembler translates a program written in assembly language into machine language. It is used to
translate mnemonics code of assembly language into machine code. A computer only understands
machine language. So, the assembly language program must be translated into a machine language
program before execution.
2. Compiler:
The language process that translates the complete, source program into a machine language program
at a single attempt is called a compiler. The program translated into machine code is called an object
program. While translating programs, it checks the Syntax that means the grammar of the source
code of a high-level language program and translates it into machine language. If there is a syntax
error in the source code then the compiler produces a syntax error and causes errors. The source
code file must be free from syntax error for the complete completion process. A programming
language such as C, C++, C#, Visual Basic, etc. used a compiler. Java has both compiler and or
interpreter.
3. Interpreter:
An interpreter is a language translator that translates and executes one statement of instructions at a
time before translating the next statements. If there is an error in the source code, it terminates its
translating process and displays an error message. A programming language such as LISP, BASIC
used an interpreter.
22
Differentiate between Compiler and Interpreter
Compiler Interpreter
1. It translates high-level language programs 1. It translates high-level language programs into
into machine language programs at a single machine language programs by one
attempt. instruction at a time.
2. It finds the syntax errors after compiling the 2. It finds the syntax errors after translating a
whole program line of the programs at a time.
3. It is difficult to trace errors and causes of the 3. It is easy to trace errors and causes of the
errors. errors.
4. The compiling process is faster than the 4. The interpreting process is slower than the
interpreter. compiler.
5. It is more efficient than an interpreter. 5. It is less efficient than the compiler
6. It creates the object code. 6. It doesn’t create object code.
7. Examples: C, C++, Visual Basic, etc. 7. Examples: BASIC, LISP, etc.
File Processing:
File processing consists of creating, storing, and/or retrieving the contents of a file from a
recognizable medium. For example, it is used to save word-processed files to a hard drive, to store a
presentation on floppy disk, or to open a file from a CD-ROM.
23
Type Uses
Data is processed within seconds when the input is given. Used for
Real-time Processing small amounts of data.
Eg: withdrawing money from ATM
Data is broken down into frames and processed using two or more
CPUs within a single computer system. Also known as parallel
Multiprocessing
processing.
Eg: weather forecasting
Why DBMS?
1. A Database Management System Is an Extension of Human Logic
2. Computers Can Quickly Answer Lots of Questions
3. Some Questions Can Be Really Complicated
4. We Are Easily Overwhelmed With Information
5. Automation Is the Key to Efficiency
6. A DBMS Is Better Than Manual Processes in so Many Ways
7. Making and Saving Money
24
Thus, an organization has to develop several application programs each with associated
application-specific data files.
Checking accounts
programs
Checking account
data files
Fig: Flat-file based approach to data processing
b) Database System:
A database system consists of a database, database management system, and application
programs.
Simply, we can say that application software that uses DBMS for data management is called a
database system.
Library programs
Examination programs
Database Model:
The basic structure or design of the database is the data model.
A data model is a collection of conceptual tools for describing data, data relationships, data
semantics, and consistency.
There are different database models which are used to design and develop the database of the
organization.
a) Hierarchical model
b) Network model
c) Entity-relationship model
d) Relational model
e) Object-oriented model
f) Object-relational data model
a) Hierarchical Model:
It is the oldest type of data model which is a record-based representational or implementation
data model.
In this mode, different records are interrelated through the hierarchical or tree-like structure.
A parent record has several children but a child can have only one parent.
It can represent only one-to-one and one-to-many relationships.
For example:
Vehicle
2- 4-
Wheeler Wheeler
25
b) Network Model:
A1
B1 B2
C1 C2 C3 C4 C5 C6
D1 D2 D3 D4
The network database model was a progression from the hierarchical database model and was
design to solve some of that model problem, specifically the lack of flexibility.
Instead of only allowing each child to have one parent, this model allows each child to have
multiple parents (it calls the children members and the parent owner).
It addresses the need to model more complex relationships such as many to many, many to one.
This model has its problem such as; it is more difficult to implement and maintain. Although
more flexible than a hierarchical model, it still has a flexible problem.
c) Relational Model:
It is the best and the most common database model developed by E.F. Codd.
The relational database model defines the structure or organization of data and a set of
operations on the data.
It is a simple model in which the database is represented as a collection of 'Relation', where the
relation is represented by a two-dimensional table. Because of its simplicity, it becomes a
commonly used database model. The following table represents a simple relation.
Table student
Roll NO First name Mid name Last name Address Phone
1 Samridhha Raman Ghimire Pithuwa 056-533333
2 Aarushi Sharma Bharatpur 056-522222
3 Nikita Khanal Tandi 056-566666
As shown in the above table, this model stores the data in more than one table with rows and
columns. The table is also called Relation. The primary key provides rapid access to data. The
relational database can relate the data of one table to the data of another table through the use of
a common field. Nowadays most of the new applications are built using the relational database
model.
26
The object-oriented data model is based on an object-oriented programming paradigm
(language).
It is based on the concept of encapsulating the data and the functions that operate on those data
in a single unit called an object.
The internal parts of objects are not visible externally.
Here, one object communicates with other objects by sending a message.
2. Communication Processor:
A front end processor (FEP), or a communications processor, is a small-sized computer which
interfaces to the host computer a number of networks, such as SNA, or a number of peripheral
devices, such as terminals, disk units, printers and tape units. Data is transferred between the
host computer and the front end processor using a high-speed parallel interface. The front end
processor communicates with peripheral devices using slower serial interfaces, usually also
through communication networks. The purpose is to off-load from the host computer the work of
managing the peripheral devices, transmitting and receiving messages, packet assembly and
disassembly, error detection, and error correction.[1] Two examples are the IBM 3705
Communications Controller and the Burroughs Data Communications Processor.
3. Communication Media:
Communication media refers to the means of delivering and receiving data or information. In
telecommunication, these means are transmission and storage tools or channels for data storage
and transmission.
Different media are employed for transmitting data from one computer terminal to the central
computer or to other computer systems inside some kind of network. There are two forms of
communication media:
The communication media acts as a channel for linking various computing devices so that they
may interact with each other. Contemporary communication media facilitate communication and
data exchange among a large number of individuals across long distances via email,
teleconferencing, internet forums and many other forms of communication.
27
Network Media (Transmission media):
A Transmission media refers to the wire, cables, and other means through which data travels
from its source to destination.
Transmission media are often called network media.
STP UTP
1. It contains an extra metal foil outside the 1. It doesn’t contain an extra covering.
plastic cover of each peer.
2. It can carry data signals for a longer distance. 2. It can't carry data signals for longer distances
compared to STP.
3. It is expensive. 3. It is cheaper.
4. E.g. Telephone and LAN (To provide data and 4. E.g. Used in Telephones (Only voice).
voice).
2) Co-axial cable:
Co-axial cable (Coax) carries a data signal of higher frequency and at a faster speed than twisted
pair cable.
It is commonly used in cable TV systems and broadband transmission.
Coax has a large bandwidth which means it can Handel plenty of traffic at high speeds.
Co-axial cable is two types.
i. Thin Coax:- 10 base 2 (10 Mbps within 200m)
ii. Thick Coax:- 10 base 5 (10 Mbps within 500m)
3) Fiber Optics:
A fiber optics cable transmits signals in the form of light.
Optical fiber used reflection to guide light through a channel.
It consists of two main parts.
i. Core: The core is made up of plastic or glass.
ii. Cladding: Cladding acts as a protective cover to the core.
It is used for services like telecommunication, video conference, and interactive services.
28
1) Microwaves:
A microwave system uses very high-frequency radio signals to transmit data through the air.
The transmit station must be visible contact with the receive station.
Therefore repeater station must be placed so the data signal can travel farther than a distance
limit.
2) Infrared:
Infrared signals can be used for short-range communication in a closed area using a line of sight
communication.
It is used in optic fiber communication wireless LAN, wireless mouse, computer, and printer.
3) Radio:
Electromagnetic waves in the frequency range of 3 kHz to 1 GHz are commonly known as radio
waves.
There are two types of configuration for electromagnetic wave transmission and reception,
directional and Omni-directional.
4) Communication Satellite:
A communication satellite is an artificial satellite stationed in space for telecommunication. Modern
communication satellites use a variety of orbits including geostationary orbits, Molniya orbits, other
elliptical orbits, and low Earth orbits. It works as a microwave relay station. It is placed in outer
space and moves its orbit like other satellites. The satellite is visible from any point of the earth so
the sender and receiver can easily communicate with each other by using an antenna aiming at the
satellite. Placing the satellite along the earth's orbit takes a very high cost.
5) Bluetooth Technology:
Bluetooth technology is a wireless technology that connects electronic devices while they are close to
each other. Bluetooth creates a personal-area network (PAN). Cell phones can be paired with
wireless Bluetooth headsets. Bluetooth technology is also compatible with personal computers,
laptops, printers, GPS receivers, digital cameras, telephones, video games, etc.
6) Wi-Fi Technology:
Wi-Fi (Wireless Fidelity) is a popular wireless technology that uses radio waves to provide wireless
high-speed network connections. Wi-Fi uses both single-carrier direct-sequence spread spectrum
radio technology and multi-carrier orthogonal frequency-division multiplexing (OFDM) radio
technology. Wi-Fi is supported by many applications and devices such as Laptops, Notebooks, mobile
phones, etc. The major operating system supports Wi-Fi. It creates a personal-area network (PAN)
and Home network. Bluetooth and Wi-Fi are different in several ways. Wi-Fi technology boasts faster
data transfer speeds and range, making it a good replacement for Ethernet systems.
4. Communication Software:
Communication software is an application or program designed to pass information from one system
to another. Such software provides remote access to systems and transmits files in a multitude of
formats between computers. Communication software forms a part of communication systems with
software components classified according to functions within the Open Systems Interconnection
Model (OSI Model). The best defined examples of communication software are file transfer protocol
(FTP), messaging software and email.
5. Types of Network:
The computer network can be classified based on network architecture and geographical area
coverage.
29
a) Network Architecture:
On the basis of network architecture, the computer network can be classified into:
Peer to peer network
Client/Server network
Fig: Peer to
Peer network
2) Client-server network:
The client-server architecture contains at least one dedicated server and the client computer.
The server provides services to clients and clients always receive services from the server.
These services may be data, webpage, emails, etc.
As the network increase in size and traffic more than one server is needed to ensure each task to
be performed more efficiently.
30
Server
Advantage of LAN:
i. Data transmission is greater than MAN and WAN.
ii. It has higher security to resources at the network.
iii. It is easier to establish, manage, and operate.
Disadvantage of LAN:
i. It is limited only to a small area.
ii. Fewer backup resources compare MAN and WAN.
iii. It is not suitable for long distances and connects less number computer.
Advantage of MAN:
i. It is spread to a large area than LAN.
ii. It has comparability more number of computer than LAN.
iii. It can connect multiple systems and networks.
Disadvantage of MAN:
i. It uses expensive devices compared to LAN.
ii. It is more complex to establish, manage, and provide security.
iii. Transmission speed is slower compared to LAN.
31
Network
connection
Advantage of WAN:
i. It is spread to a large area than LAN and MAN.
ii. More computer tee mirrors can connect than LAN and WAN.
iii. It also connects dissimilar systems or networks.
Disadvantage of WAN:
i. It uses expensive devices compared to LAN and MAN.
ii. Transmission speed is usually slower compare to LAN and MAN.
iii. Maintaining security is complex (public network).
Internet
6. Network Protocol:
A network protocol is an established set of rules that determine how data is transmitted between
different devices in the same network. Essentially, it allows connected devices to communicate with
each other, regardless of any differences in their internal processes, structure or design.
32
1.9 Internet and world wide web (www):
7. Introduction to internet:
Internet is a network of networks. Millions of computers all over the world are connected through
the internet. If the computer is connected to the internet, one user can connect to millions of
computers. It is very much similar to a telephone connection where one can talk with any person
anywhere in the world.
8. Internet access:
Internet access is the process of connecting to the internet using personal computers, laptops or
mobile devices by users or enterprises. Internet access is subject to data signaling rates and users
could be connected at different internet speeds. Internet access enables individuals or organizations
to avail internet services/web-based services.
Internet access is often provided at home, schools, workplaces, public places, internet cafes, libraries
and other locations. The internet began to gain popularity with dial-up internet access. In a relatively
short time, internet access technologies changed, providing faster and more reliable options.
Currently, broadband technologies such as cable internet and ADSL are the most widely used
methods for internet access. The speed, cost, reliability and availability of internet access depends on
the region, internet service provider and type of connection.
Access to computers or smart devices is one of the important factors for understanding the level of
internet access for a region. However, internet access is not uniformly distributed within or between
countries. A digital divide exists between many countries and regions. Good internet access is
associated with regions with high-income populations, a high development index and high
technological development.
9. Internet Basics:
How does the Internet work?
At this point you may be wondering, how does the Internet work? The exact answer is pretty
complicated and would take a while to explain. Instead, let's look at some of the most important
things you should know.
It's important to realize that the Internet is a global network of physical cables, which can include
copper telephone wires, TV cables, and fiber optic cables. Even wireless connections like Wi-Fi and
3G/4G rely on these physical cables to access the Internet. When you visit a website, your computer
sends a request over these wires to a server. A server is where websites are stored, and it works a
lot like your computer's hard drive. Once the request arrives, the server retrieves the website and
sends the correct data back to your computer. What's amazing is that this all happens in just a few
seconds!
33
are handled differently depending on which transport protocol is used in combination with IP. The
most common transport protocols are TCP and UDP.
What is an IP packet?
IP packets are created by adding an IP header to each packet of data before it is sent on its way. An IP
header is just a series of bits (ones and zeros), and it records several pieces of information about the
packet, including the sending and receiving IP address. IP headers also report:
Header length
Packet length
Time To Live (TTL), or the number of network hops a packet can make before it is discarded
Which transport protocol is being used (TCP, UDP, etc.)
In total there are 14 fields for information in IPv4 headers, although one of them is optional.
34
Protocols attach packet headers at different layers of the OSI model:
Packets can take different routes to the same place if necessary, just as a group of people driving to
an agreed-upon destination can take different roads to get there.
What is TCP/IP?
The Transmission Control Protocol (TCP) is a transport protocol, meaning it dictates the way data is sent
and received. A TCP header is included in the data portion of each packet that uses TCP/IP. Before
transmitting data, TCP opens a connection with the recipient. TCP ensures that all packets arrive in
order once transmission begins. Via TCP, the recipient will acknowledge receiving each packet that
arrives. Missing packets will be sent again if receipt is not acknowledged.
TCP is designed for reliability, not speed. Because TCP has to make sure all packets arrive in order,
loading data via TCP/IP can take longer if some packets are missing.
TCP and IP were originally designed to be used together, and these are often referred to as the TCP/IP
suite. However, other transport protocols can be used with IP.
What is UDP/IP?
The User Datagram Protocol, or UDP, is another widely used transport protocol. It's faster than TCP, but
it is also less reliable. UDP does not make sure all packets are delivered and in order, and it doesn't
establish a connection before beginning or receiving transmissions.
35
12. WWW, web page, HTML, Web browsers, searching the web, internet chat:
WWW:
It is the collection of linked documents or pages, stored in millions of computers, distributed across
the world. It offers a smooth and easy to use the graphical interface to access the information
available on the internet. It is a distributed file management system with a program to access and
send information.
Web Page:
A web page (or webpage) is a hypertext document provided by a website and displayed to a user in
a web browser. A website typically consists of many web pages linked together in a coherent
fashion. The name "web page" is a metaphor of paper pages bound together into a book.
HTML:
HTML is short for Hypertext Markup Language. Hypertext is simply a piece of text that works as a
link. Markup Language is a way of writing layout information within documents. Basically an HTML
document is a plain text file that contains text and nothing else.
Web browsers:
A software application used to access information on the World Wide Web is called a Web Browser.
When a user requests some information, the web browser fetches the data from a web server and
then displays the webpage on the user’s screen.
Internet chat:
Online chat may refer to any kind of communication over the Internet that offers a real-time
transmission of text messages from sender to receiver. Chat messages are generally short in order to
enable other participants to respond quickly.
Uses of E-mail:
E-mail allows individuals and groups to communicate with one another in a very short time. The uses
of E-mail are;
Information exchange
Staying in touch professionally and socially
Transmitting documents
Publish an online newsletter, special promotions, or events
Drive traffic to the web site
Make a new product or personnel announcements and press releases
Offer discounts for various products or service using e-commerce
Care for customers for staying in touch with clients, cheaply, and quickly.
Encourage participation in government, civic, and community projects
Acting like an entertainment aspect like tells a joke, sharing pictures and movies
36
Advantages of E-mail:
Delivery of message is very fast.
The cost of e-mail is almost free.
Multiple copies of the same message can be sent to a group of the recipient at the same times.
Image, audio, video, and other documents and files can be attached to the message.
Because it is written, we can compose and review it before sending it.
We can check e-mail from any computer in the world.
Disadvantages of E-mail:
A small error in the address of the links between the sender and receiver is enough to prevent the
delivery of the message.
Although email is delivered constantly, the recipients may or may not read the email on time.
Viruses are easily spread by email attachments.
Electronic mailing system depends on electricity computer and computer network.
Electronic mailing system depends on electricity computer and computer network. Thus, failure
of any of them can prevent the user from sending and receiving email.
Types of E-mail:
There are two types of email. They are;
a) Web-Based:
Web-based E-mail is referred to as a service that is operated using the browser. Users can send
or receive E-mails by using the browser. Such E-mails can be accessed anywhere throughout the
world. First of all the user must be authenticated then the user is allowed to access the service
of E-mail through the webpage. E-mail providers like Hotmail.com, yahoomail.com, gmail.com,
rediffmail.com, etc. are providing web-based E-mail services.
b) POP E-mail:
POP stands for Post Office Protocol. POP E-Mail is accessed using E-mail client software.
Software like Outlook express, K-mail, Eudora mail, etc. is used for sending and receiving E-
mails. To use POP E-mail accounts, one has to register for it. This type of service is generally
provided by the local ISP. They also provide a username, password as well as the protocol to
access E-mail.
An email address is a unique identifier for an email account. It is used to both send and receive email
messages over the Internet. Similar to physical mail, an email message requires an address for both the
sender and recipient in order to be sent successfully.
37
The Email System:
Email infrastructure simplified. Email systems consist of computer servers that process and store
messages on behalf of users who connect to the email infrastructure via an email client or web interface.
When someone sends an email, the message is transferred from his or her computer to the server
associated with the recipient’s address, usually via a number of other servers.
In more detail (please refer to the illustration on the above):
1. A user (Alice) sends an email message and connects to an SMTP (Simple Mail Transfer Protocol)
server as configured in her email client or Mail User Agent (MUA).
2. On the SMTP server, a Mail Transfer Agent (MTA) looks at the recipient address and looks up the
domain part of the address to determine its destination.
3. After querying a Domain Name System (DNS) server for the name of the Mail exchanger (MX) for the
recipient’s domain name…
4. …the SMTP server will send the message to that server via the SMTP protocol.
5. The receiving server will store the message and make it available to the recipient (Bob), who can
access it via web, POP, or IMAP.
38
Be mindful and respectful of linguistic background – while the language for online fora discussions
is mostly English (unless otherwise specified), remember not everybody is a native English
speaker / writer.
Keep subject lines concise and clear so that members can respond appropriately and easily search
the archives.
Include only relevant portions of the original message in replies.
Only send a message to the entire list if everyone can benefit from it. Do not send “thank you” and
“me too” replies to the full list.
Avoid administrative messages, such as remove me from the list (use the web interface to change
your personal settings).
If relevant, add “Long Message” to the subject line or at the beginning of the message body.
Do not spam several lists or libraries with the same message.
Don’t publicly post commercial messages.
Use caution when discussing products. Information posted on the lists and in the libraries is
available for all members to see. Comments are subject to libel, slander, and antitrust laws.
Please carefully read the items listed in the disclaimer and legal rules below, particularly regarding
the copyright ownership of information posted.
1.11 Multimedia:
18. Introduction, multimedia in education, entertainment:
Introduction:
Multimedia can be termed as a presentation that involves two or more media performing at the same
time where media can be text, graphics, audio, video, and animation. Multimedia can be defined as
the integration of many media together. The main objective of multimedia is presenting any
presentation interactively.
Components of Multimedia:
1) Text:
Text can be of any type, that may be a world, a single line, or a paragraph. It is the original word and
it is the form of writing of printed work. The text data for multimedia can be developed using any
text editor. The text can have a different type, size, color, and style to meet the professional
requirement of multimedia software.
2) Graphics or Images:
The term graphics refers to the picture or image. Unlike text, graphics don't have a single agreed
format. The image or picture can express the idea of how it works or easily deliver the message. A
proverb saying "A picture is of thousand words", means a picture can describe more than the text.
3) Audio:
Audio has a greater role to play in multimedia development. It is one of the most important features
of multimedia that enhance multimedia usability to its full potential. Several types of sound can be
used in multimedia. They are human voices, instrumental notes, natural sounds, and many more.
While using video and animation, audio is almost important.
39
4) Video:
Video is the running frames of still images. Each frame is composed of some event. The computer
reads a particular video clip as a series of still pictures, called frames. Thus, video clop is made of a
series of separate frames, where each frame is slightly different than the previous one. Video is one
of the widely used components of multimedia for delivering ideas and information.
5) Animation:
A computer-based animation is a sequence of still vector images displayed in rapid succession to
provide the visual effect. The animation is created to express ideas where complex explanations need
to be effectively delivered. It is one of the most important components of multimedia to communicate
difficult aspects of the content. Animation can be of two types. They are; Two dimensional and three
dimensional. Some excellent software available for animation is Animator Pro, Auto CAD, Maya 3D,
3D Max, etc.
Application of Multimedia:
1) Education:
Multimedia is widely used in the teaching, learning process. The teaching methodology by only
hearing the lectures in the class makes it difficult to understand the topic so if we can able to use the
multimedia presentation of the topic, we can easily gain the concept. Nowadays, many e-books are
available in the market which consists of multimedia like an electronic encyclopedia, electronic
dictionary, etc.
2) Entertainment:
The entertainment industry has used multimedia technology widely. The mind-blowing graphics like
iRobot, Terminator, Titanic, etc. world endowed movies includes high-resolution graphics and
animation which makes the movies interesting and full of entertainment.
3) Web page:
In the early days, the only text was used on the web page which was static. After the advancement of
multimedia technologies, nowadays web page includes graphics, video, and animation which make s
the web page dynamic, interesting, and eye-catching.
4) Business:
These days different marketing advertisement has been used for the convincing customer about the
products and services. With the help of multimedia, the company can elaborate on the features of
products and services they are given in an easy understanding approach.
5) Office automation:
The activities like meeting, group discussion, conference, and seminar which are the core component
s for the strategic planning for the company must be held in various periods. These jobs can be easily
done with the help of multimedia even though they are dispersed in various geographical locations
with the help of audio conferencing, video conferencing, and sharing the documents.
6) Communication:
Today's communication era. Communication plays a vital role in our daily life in transforming
information. E.g. chatting in the previous days was just simply the text but nowadays chatting can be
done with the use of multimedia like audio chatting and video chatting it is the advantage of
multimedia.
40
Types of computer securities:
1. Hardware security
2. Software security
Hardware security is vulnerability protection that comes in the form of a physical device rather
than software that is installed on the hardware of a computer system. Hardware security can pertain
to a device used to scan a system or monitor network traffic.
Software security is an idea implemented to protect software against malicious attack and other
hacker risks so that the software continues to function correctly under such potential risks. Security
is necessary to provide integrity, authentication and availability.
IT policy in Nepal:
The latest IT policy has been enforced since 2067. It was updated after nine years. The previous
policy 'IT policy 2057' was canceled and the new policy comes into existence. The new policy
emphasizes outsourcing as its principal base. This policy also emphasizes on the use of IT for e-
governance and agencies that deals with health, education, and business which can work with IT-
related strategic plan. The main goals of the IT system of Nepal are as follows:
Computer Ethics:
The concept of computer ethics was originated in 1950 by MIT professor "Nobert Wiener" for the
first time. He was the inventor of an information feedback system called "cyber ethics" in the book
"The human use of human beings" he published. This book laid the basic foundation of computer
ethics and made "Nobert Wiener" the father of computer ethics.
Computer ethics are the moral and practical issues or general behavior that every computer user
must follow as the norms in the society in the use of ICT. Besides the law, it includes the
consideration of both personal and social policies for the better and safe use of computer related
technologies. So, computer ethics is the set of moral principles practical behaviors that regulate the
use of computers.
41
We should not use the computer to steal data and itself.
We should not use others computer resources without permission.
We should not snoop around in other’s files and data.
42