ElT - Text-BOOK-2
ElT - Text-BOOK-2
Editor
Dr. Suresh Pabboju
Professor & Head,
Department of IT, CBIT, Gandipet, Hyderabad-500 075.
Course Writers
Mrs. Pragnavi Erva
Assistant Professor,
Department of Computer Science Engineering,
University College of Engineering, OU, Hyderabad.
Mrs. V. Sukanya, M.Tech., IIIT
Assistant Professor,
Department of Computer Science Engineering,
University College of Engineering, OU, Hyderabad.
Director
Prof. Chintha Ganesh
UNIT –I
Information Concepts and Processing: Definition, Need, Qualities, value of information.
Categories of information in business organization, levels of information, data concepts, logical
and physical concepts, data processing, Introduction to office automation.
Number Systems: Binary numbers, octal numbers, hexadecimal numbers, Radix- decimal, octal,
hexadecimal, conversion from one from to another-Examples, Representation of decimal, octal,
hexadecimal numbers: fractional numbers and signed numbers, 1’s and 2’s complement forms,
Binary arithmetic –addition, subtraction ,multiplication and division-Examples. Codes –Various
types-ASCII and 8 bit EBCDIC.
UNIT –II
An overview of Computer Systems: Component of a computer systems, various I/O and
auxiliary storage devices, system software, Introduction to system software, Distinction between
system software and Application software. Introductory ideas of loaders and linkers, High level
languages. Different language, Introduction to Assemblers, Compilers and Interpreters, relative
merits of compilers v/s interpreters.
UNIT –III
Operating System: Evolution, introduction to Operating System, function and facilities,
single tasking and multitasking OS, single user and multi-user OS, characteristics of MS-DOS
and Unix operating systems, DOS and UNIX commands for file and process management.
UNIT –IV
Text editors: Overview of editing process Graphical User Interfaces-Introduction to Windows,
Word processing software packages and features, spread sheet packages and features.
Database: Introduction to database and database packages. Desktop Publishing: Introduction to
Desktop publishing and desk top publishing packages.
With effect from the academic year 2017-2018
UNIT –V
Computer Communications: Computer to computer communication through networking.
Introduction to computer networks and networking software, types of Networks, Internet and
Intranet, Electronic mail.
Multimedia and Virtual reality: Introduction to Multimedia and Virtual reality Specifications
of a typical desktop computer systems, Recent Developments in ICT Recommended.
Suggested Reading:
1. Satish Jain, Information Technology, BPB Publications, 2015.
2. Alexis Leon and Mathews Leon , Fundamentals of Information Technology,2nd Edition,
Vikas publishers, 2009.
3. V. Rajaraman, Fundamentals of Computers, 5th Edition, Prentice Hall India, 2011.
TABLE OF CONTENTS
Information systems are used in almost every imaginable profession. Small and medium
scale business owners use information systems to reach customers. Sales representatives use
information systems to advertise products, communicate with customers, and analyse sales trends.
From a small scale sector to huge multinational companies, businesses of all sizes could not survive
without information systems to perform their operations. Regardless of your college major or
chosen career, information systems are indispensable tools to help you achieve your career goals.
Data consists of raw facts, such as employee ID number, total hours worked in a week. As shown
in Table 1.1, several types of data can represent these facts. When facts are arranged in a
meaningful manner, they become information.
Information is a collection of facts organized so that they have additional value beyond the value
of the individual facts. For example, sales managers might find that knowing the total monthly
sales suits their purpose more (i.e., is more valuable) than knowing the number of sales for each
sales representative. Providing information to customers can also help companies increase revenues
and profits.
Table 1.1: Types of data
Data Represented By
Alphanumeric data Numbers, letters and other characters
Image data Graphic images and pictures
Audio data Sound, Noise, or tones
Video data Moving images or pictures
Data represents real-world things. Hospitals and healthcare organizations, for example,
maintain patient medical data, which represents actual patients with specific health situations. In
many cases, hospitals and healthcare organizations are converting data to electronic form.
However, data—raw facts—has little value beyond its existence.
Data and information work the same way. Rules and relationships can be set up to organize
data into useful, valuable information. The type of information created depends on the relationships
defined among existing data. For example, a sales manager could add specific product data to his
sales data to create monthly sales information organized by product line. The manager could use
this information to determine which product lines are the most popular and profitable.
1
1.2 Data Processing
Data processing is the act of handling or manipulating data in some fashion. Regardless of
the activities involved in it, processing tries to assign meaning to data. Thus, the ultimate goal of
processing is to transform data into information. Data processing is the process through which facts
and figures are collected, assigned meaning, communicated to others and retained for future use.
Therefore, data processing can be defined as a series of actions or operations that converts data into
valuable information.
The Data processing activities are distinguished in four functional categories i.e., data input, data
processing, data output and storage, constituting is known as data processing cycle.
Input: The term input refers to the activities required to record data and to make it available for
processing. The input can also include the steps necessary to check, verify and validate data
contents.
Processing: The term processing denotes the actual data manipulation techniques such as
classifying, sorting, calculating, summarizing, comparing, etc. that convert data into information.
Output: It is a communication function which transmits the information, generated after processing
of data, to persons who need the information. Sometimes output also includes decoding activity
which converts the electronically generated information into human-readable form.
Storage: It involves the filing of data and information for future use.
The above mentioned four basic functions are performed in a logical sequence as shown in Fig. 1.1.
in all data processing systems
Processing
(Sorting,
Raw data calculating) Useful data and
Information
Storage
2
Feedback
3
1.4 Characteristics of valuable Information:
To be valuable to the decision makers, information should have the characteristics described
in Table 1.2. These characteristics make the information more valuable to an organization. Many
shipping companies, for example, can determine the exact location of inventory items and packages
in their systems, and this information makes them responsive to their customers. In contrast, if an
organization’s information is not accurate or complete, people can make poor decisions, which
leads to failure of an organization. Furthermore, if information is not relevant, not delivered to
decision makers in a timely fashion, or too complex to understand, it can be of little value to the
organization.
Depending on the type of data you need, some characteristics become more valuable than
others.
Table 1.2: Characteristics of Valuable information
Characteristics Definition
Accessible Information should be easily accessible by authorized users so they can
obtain it in the right format and at the right time to meet their needs.
Accurate Accurate information is error free. In some cases, inaccurate information
is generated because inaccurate data is fed into the transformation
process. (This is commonly called garbage in, garbage out [GIGO].)
Complete Complete information contains all the important facts. For example, an
investment report that does not include all important costs is not
complete.
Economical Information should also be relatively economical to produce. Decision
makers must always balance the value of information with the cost of
producing it.
Flexible Flexible information can be used for a variety of purposes. For example,
information on how much inventory is on hand for a particular part can
be used by a sales representative in closing a sale.
Relevant Relevant information is important to the decision maker. Information
showing that lumber prices might drop might not be relevant to a
computer chip manufacturer.
Reliable Reliable information can be trusted by users. In many cases, the
reliability of the information depends on the reliability of the data-
collection method. In other instances, reliability depends on the source of
the information.
Secure Information should be secure from access by unauthorized users.
Simple Information should be simple, not overly complex. Sophisticated and
detailed information might not be needed. In fact, too much information
can cause information overload, whereby a decision maker has too much
information and is unable to determine what is really important.
4
Timely Timely information is delivered when it is needed. Knowing last week’s
weather conditions will not help when trying to decide what coat to wear
today.
Verifiable Information should be verifiable. This means that you can check it to
make sure it is correct, perhaps by checking many sources for the same
information.
5
MISs were first developed in the 1960s and typically use information systems to produce
managerial reports. In many cases, these early reports were produced periodically—daily, weekly,
monthly, or yearly. Because of their value to managers, MISs have proliferated throughout the
management ranks. For instance, the total payroll summary report produced initially for an
accounting manager might also be useful to a production manager to help monitor and control
labour and job costs.
1.6.3 Decision Support Systems (DSS)
A Decision Support Systems (DSS) is an organized collection of people, procedures,
software, databases, and devices that support operations planning and problem-specific decision
making. Whereas an MIS helps an organization “do things right,” a DSS helps to “do the right
thing.”
A DSS goes beyond a traditional MIS by providing immediate assistance in solving
problems. A DSS can help by suggesting alternatives and assisting in final decision making. To
conduct an analysis, business owners and managers use an interface -- a dashboard -- to select a
particular graphic representation of a key performance indicator that measures the progress toward
meeting a specific goal. For example, a manufacturing dashboard might display a graphic
representing the number of products manufactured on a particular line
Decision support systems are used when the problem is complex and the information needed
to determine appropriate action is difficult to obtain and use. A DSS recognizes that different
managerial styles and decision types require different systems. For example, two production
managers in the same position trying to solve the same problem might require different information
and support.
A DSS can include a collection of models used to support a decision maker or user (model
base), a collection of facts and information to assist in decision making (database), and systems and
procedures (user interface or dialogue manager) that help decision makers and other users interact
with the DSS.
1.6.4 Transaction Processing Systems (TPS)
Since the 1950s, computers have been used to perform common business applications. Many
of these early systems were designed to reduce costs by automating routine, labor-intensive
business transactions. A transaction is any business-related exchange such as payments to
employees, sales to customers, or payments to suppliers. Thus, processing business transactions was
the first computer application developed for most organizations. A transaction processing system
(TPS) is an organized collection of people, procedures, software, databases, and devices used to
record completed business transactions.
One of the first business systems to be computerized was the payroll system. Other routine
applications include sales ordering, customer billing and customer relationship management, and
inventory control. Because these systems handle and process daily business exchanges, or
transactions, they are all classified as TPSs.
The TPS, unlike a batch system, requires that users interact with the system in real time to
direct the system to collect, store, retrieve and modify data. A user enters transaction data by means
of a terminal, and the system immediately stores the data in a database and produces any required
output.
6
1.7 Levels of Information
Within an organisation planning, control and decision-making is carried out at various levels
within the structure of the organisation.
The three levels at which information can be used are strategic, tactical and operational and
there is a direct correlation between the levels of importance of individuals or groups within an
organisation and the level of information that is being communicated.
1.7.1 Strategic Information
Strategic information is used at the very top level of management within an organisation.
These are chief executives or directors who have to make decisions for the long term.
Strategic information is broad based and will use a mixture of information gathered from
both internal and external sources.
In general a timescale may be from one to five years or even longer depending on the
project. Some oil related projects are planned from the outset to last for 25 or more years. A
supermarket building a new superstore will look at a timescale of 20 years or so, whilst even a small
business may have a five-year strategy.
Strategic plans will have little or no detail in them and more detailed strategic plans will be
made slightly lower down the managerial ladder. A good strategic plan will be easier to flesh out
lower down than a poor or vague strategic plan. Similarly, well-constructed and more detailed
plans will be easier to implement than poorly constructed plans.
1.7.2 Tactical Information
The next level down is the tactical level, and tactical planning and decision-making takes
place within the guidelines set by the strategic plan.
Tactical information will be mostly internal with a few external sources being used. Internal
information is likely to be function related: for example, how much ‘down time’ a production line
must allocate for planned maintenance.
Tactical information is used by middle management (employees) when managing or
planning projects.
The timescale is usually at least between 6 months and 5 years (depending on the scale of
the strategic project). Circumstances vary but a small project may have a tactical timescale of
between one and six months.
Tactical plans have a medium level of detail and will be very specific; they deal with such
matters as who is doing what and within what specific budgets and timescales.
These plans have medium scope and will address details at the operational level. They will
generally have specific objectives and be geared towards implementation by operational level
employees.
1.7.3 Operational Information
The lowest level is operational and operational planning takes place based on the tactical
7
plans.
The lowest level of management or workers in an organisation implements operational
plans. These may be section leaders or foremen in a large organisation or workers such as shop
assistants, waiting staff, and kitchen staff, etc., in smaller businesses where there is no supervisory
layer.
The timescale is usually very short, anything from immediately, daily or at most a week or
month.
Results of operational work will usually be passed upwards to let the tactical planners
evaluate their plans.
1.8 Introduction to Office Automation
Office automation technologies offer significant opportunities to increase the productivity
and effectiveness of professional, administrative and clerical personnel. The availability of these
technologies, range of capabilities, and low cost in comparison to traditional technologies have
encouraged to maximize the use of office automation technology whenever practical.
The office automation is defined from a functional perspective as any information
technology application, Office automation is intended to provide elements which make it possible to
simplify, improve, and automate the organization of the activities of a company or a group of
people (management of administrative data, synchronization of meetings, etc.).
Considering that company organizations require increased communication, today, office
automation is no longer limited to simply capturing handwritten notes. In particular it also includes
multiple functions that emphasize:
Enhancing communications of information/messages among components or individuals
Providing personal services such as calendaring or decision support tools to management or
professionals
Providing analytical tools (such as spreadsheets and related graphics) for managerial and
professional personnel
Providing support for the creation, communication, storage, retrieval, distribution and
control of office information (such as correspondence and reports).
Accordingly, an office automation design concept may incorporate traditional hardware and
software, telecommunications and/or more specialized office automation equipment such as word
processors and micro/mini computers. An office systems design may also incorporate ancillary
technologies such as reprographics (copiers and facsimile), dictation systems or optical character
readers.
1.8.1 Office suite tools
The term "office suite" refers to all software programs which make it possible to meet office
needs. In particular, an office suite therefore includes the following software programs:
Word processing
Spreadsheet
Presentation tool
Database
8
Scheduler
The main office suites are:
OpenOffice (freeware)
AppleWorks
Corel WordPerfect
IBM/Lotus SmartSuite
Microsoft Office
Sun StarOffice
9
2. NUMBER SYSTEMS
(UNIT-I)
Introduction
A number system in computer ideology is regarded as the method or system of
representation of digits to be understood by the machine/computer. The digital computer represents
all kinds of data and information in binary numbers. This implies every value/number that you are
giving as input to the computer system and getting the data as output has a defined number system.
The value/data the total number of digits used in a number system is called its base or radix. The
base is written after the number as subscript; for instance (1000110)2 (1000110 base 2), 5610 (56 to
base of 10), (71)8 (71 base 8) etc.
Computer architecture supports following number systems.
i. Binary number system (Base 2)
ii. Octal number system (Base 8)
iii. Decimal number system (Base 10)
iv. Hexadecimal number system (Base 16)
10
Fig. 2.3 Digit Notation
11
Fig. 2.4 Weight definition
2.5.1 Converting Binary to Decimal
Example 1: Convert (10110) 2 into a decimal number.
The binary number given is 1 0 1 1 0
Positional weights 43210
The positional weights for each of the digits are written below each digit. Hence the decimal
equivalent number is given as:
1 × 24 + 0 × 23 + 1 × 22 + 1 × 21 + 0 × 20
= 16 + 0 + 4 + 2 + 0
= (22)10.
Hence we find that here, for the sake of conversion, we have to multiply each bit with its positional
weights depending on the base of the number system.
2.5.2 Converting Octal to Decimal
Example 2: Convert (3462)8 into a decimal number.
The octal number given is 3 4 6 2
Positional weights 3210
The positional weights for each of the digits are written below each digit. Hence the decimal
equivalent number is given as:
3 × 83 + 4 × 82 + 6 × 81 + 2 × 80
= 1536 + 256 + 48 + 2
= (1842)10.
2.5.3 Converting Hexadecimal to Decimal
Example 3: Convert (42AD)16 into a decimal number.
The hexadecimal number given is 4 2 A D
Positional weights 3210
The positional weights for each of the digits are written in below each digit. Hence the decimal
equivalent number is given as:
4 × 163 + 2 × 162 + 10 × 161 + 13 × 160
= 16384 + 512 + 160 + 13
= (17069)10.
12
The positional weights for each of the digits are written in italics below each digit. Hence the
decimal equivalent number is given as:
1 × 23 + 0 × 22 + 1 × 21 + 0 × 20 + 0 × 2 –1 + 1 × 2 –2 + 1 × 2 –3
= 8 + 0 + 2 + 0 + 0 + 0.25 + 0.125
= (10.375)10.
13
Fig. 2.5 Converting Decimal to Binary
14
2.7.3 Converting Decimal to Hexadecimal
Let’s convert 254.65510 to hexadecimal with an accuracy of three fractional digits. When
doing this conversion, all of the divisions and multiplications are done using decimal. If the results
end up between 1010 and 1510, then the decimal numbers are substituted with their hex symbol
equivalent (i.e., A to F). Fig. 2.7 shows the step-by-step process of converting a decimal number to
hex with a fractional accuracy of three digits.
15
Fig. 2.8 shows the step-by-step process of converting a fractional binary number to octal.
16
Fig. 2.10 shows the step-by-step process of converting fractional octal number to binary.
Fig. 2.11 shows the step-by-step process of converting a fractional hexadecimal number to binary.
17
Fig. 2.12 Converting Octal to Hexadecimal
18
Binary Number 1 0 1 1 0 0 1 0
1's Complement 0 1 0 0 1 1 0 1
2's Complement of a binary number is found by adding 1 to the LSB of the 1's Complement.
2's Complement= (1's Complement) +1
Binary number 10110010
1'scomplement 01001101
Add 1 + 1
____________________________
2's complement 01001110
Fig. 2.15 shows the process when adding two 4-bit numbers.
19
2.10.2 Subtraction (Borrows)
Fig. 2.16 shows how subtraction is performed on two individual bits.
Fig. 2.17 shows this process when subtracting two 4-bit numbers.
Unsigned Numbers
The range would be defined as 0 < Nunsigned < (2n - 1):
Fig. 2.18 shows the process for a 16-bit number.
20
Signed Numbers - Signed Magnitude
Fig. 2.19 Decimal Values That a 4-bit, Signed Magnitude Code Can Represent
21
as a code. The digital data is represented, stored and transmitted as group of binary bits. This group
is also called as binary code. The binary code is represented by the number as well as alphanumeric
letter.
Excess-3 code
The Excess-3 code is also called as XS-3 code. It is non-weighted code used to express
decimal numbers. The Excess-3 code words are derived from the 8421 BCD code words adding
(0011)2 or (3)10 to each code word in 8421. The excess-3 codes are obtained as follows −
22
Fig. 2.23 Excess-3 code
Gray Code
It is the non-weighted code and it is not arithmetic codes. That means there are no specific
weights assigned to the bit position. It has a very special feature that, only one bit will change each
time the decimal number is incremented as shown in fig. As only one bit changes at a time, the gray
code is called as a unit distance code. The Gray code is a cyclic code. Gray code cannot be used for
arithmetic operation.
23
Fig. 2.25 BCD code
Advantages of BCD Codes
It is very similar to decimal system.
We need to remember binary equivalent of decimal numbers 0 to 9 only.
Disadvantages of BCD Codes
The addition and subtraction of BCD have different rules.
The BCD arithmetic is little more complicated.
BCD needs more number of bits than binary to represent the decimal number. So BCD is
less efficient than binary.
24
UNIT - II
UNIT-II
3. An Overview of Computer System
INTRODUCTION
In this lesson we present an overview of the basic design of a computer system: how the
different parts of a computer system are organized and various operations performed to perform
a specific task. You would have observed that instructions have to be fed into the computer in a
systematic order to perform a specific task. Computer components are divided into two major
categories, namely, hardware and software. In this lesson we will discuss about hardware, i.e.,
the machine itself and its connected devices such as monitor, keyboard, mouse etc., as well as
software that makes use of hardware for performing various functions.
OBJECTIVES
After going through this topic you would be able to:
Explain basic organization of computer system
Explain different types of input and output devices
Define Software and its classification
Distinguish between system software and application software.
Describe computer language and its classification
Describe the differences between assembler, compiler and interpreter
25
Fig. 3.1 Block diagram of Computer Organisation
The computer performs basically five major operations of functions irrespective of their
size and make. These are a) it accepts data or instruction by way of input, b) it stores data, c) it
can process data as required by the user, d) it gives results in the form of output, and e) it
controls all operations inside a computer. We discuss below each of these operations.
Input: this is the process of entering data and programs into the computer system.
Control Unit (CU): The process of input, output, processing and storage is performed under the
supervision of a unit called 'Control Unit'. It decides when to start receiving data, when to stop it,
where to store data, etc. It takes care of step-by-step processing of all operations in side the
computer.
Arithmetic Logic Unit (ALU): The major operations performed by the ALU are addition,
subtraction, multiplication, division, logic and comparison.
Output: This is the process of producing results from the data for getting useful information.
The ALU and the CU of a computer system are jointly known as the central processing unit
(CPU). You may call CPU as the brain of any computer system.
26
3.3 Peripheral Devices
Peripheral devices are connected to the computer externally. These devices are used for
performing some specific functions. Peripheral devices are as follows:
Input Devices
Output Devices
Other Peripherals.
i. Keyboard
ii. Mouse
iii. Optical/magnetic Scanner
iv. Touch Screen
v. Light Pen
vi. Microphone for voice as input
vii. Track Ball
i. Keyboard
A keyboard (as shown in figure 3.3) is the most common input device. Several kinds of
keyboards are available, but they resemble each other with minor variations. The key board in
most common use is the QWERTY board. Generally standard keyboard has 104 keys. In these
keyboards, the cursor control keys are duplicated to allow easier use of the numeric pad.
27
Fig. 3.3 Keyboard
ii. Mouse
A mouse is an electro-mechanical, hand-held device (as shown in figure 3. 4). It is used
as a pointer. It can perform functions like selecting menu commands, moving icons, resizing
windows, starting programs, and choosing options.
The most common mouse uses an internal, magnetically coated ball, to detect the
movement of the mouse across a flat surface, usually a desktop. Now a days Optical or laser
mouse is used to detect the movement. All windows based applications today are designed to
work with a mouse. A mouse is used to replace hard -to-remember key combinations with easier
"Point and Click" actions. However, it cannot substitute all keyboard operations. It can be
alternative for commands based operations.
28
alter a stored image. Another example of scanner is optical character recognition (OCR) device,
used by banks to convert the scanned image of a typed or printed page into text that can be
i. Monitor
Out of all the output devices, monitor (as shown in figure 1.7) is perhaps the most
important output device because people interact with this device most intensively than others.
29
Fig. 3.7 CRT and LCD Monitor
Computer information is displayed, visually with a video adapter card and monitor.
Information processed within the CPU, that needs to be visually displayed, is sent to video
adapter. The video adapter converts information from the format used, in the same manner as a
television displays information sent to it by a cable service. `
Two basic types of monitors are used with microcomputers, which are as follows:
CRT
LCD
ii. Printer
After a document is created on the computer, it can be sent to a printer for a hard copy
(printout). Some printers offer special features such as colored and large page formats. Some of
the most commonly used printers are:
Laser Printer
Ink Jet Printer
Dot Matrix Printer
Line Printer
30
Laser Printer:
A laser printer produces high quality print that one normally finds in publishing. It is
extremely fast and quiet. Moreover, the operation of a laser printer is easy with automatic paper
loading and no smudging or messing up of ink ribbons. The fastest laser printer can print up to
200 pages per minute in monochrome (black and white) and up to 100 pages per minute in
color.
Line Printer:
A line printer is generally used with large computer systems to produce text based data
processing reports. Line printers are high-speed printers with speeds ranging anywhere from 100
to about 3800 lines per minute. In the past, print quality on line printers was not high.
Developments in technology are improving the print quality on line printers.
iii. Plotter
A plotter is a special kind of output device that, like a printer, produces images on paper,
but does so in a different way. Plotters are designed to produce large drawings or images, such as
construction plans for buildings or blueprints for mechanical objects. A plotter can be connected
to the port normally used by a printer.
31
An array of different colored pens in a clip rack and a robotic arm is part of plotter. The
instructions that a plotter receives from a computer consist of a color, and beginning and ending
coordinates for a line. With that information, the plotter picks up the appropriate pen through its
arm, positions it at the beginning coordinates drops the pen down to the surface of the paper and
draws to the ending coordinates. Plotters draw curves by creating a sequence of very short
straight lines.
iv. Speaker
Speakers are another type of output device, which allow you to listen to voice like music,
and conversation with people.
3.4 Software
As you are aware, computer cannot do anything on its own. It is the user who instructs
computer; what to do, how to do and when to do. In order to perform any task, you have to give a
set of instructions in a particular sequence to the computer. These sets of instructions are called
Programs. Software refers to a set of programs that makes the hardware perform a particular set
of tasks in particular order. Software can be classified mainly into following categories and sub-
kcategories are shown in fig. 3.9
32
3.4.1 System Software
When you switch on the computer the programs stored in ROM are executed which
activates different units of your computer and makes it ready for you to work on it. This set of
programs can be called system software.
System softwares are sets of programs, responsible for running the computer, controlling
various operations of computer systems and management of computer resources.
i. Generalized Packages
These are user friendly softwares written to cater to user’s very general needs such as
preparing documents, drawing pictures, database to manage data/information, preparing
presentations, play games etc. It is a group of programs that provide general purpose tools to
solve specific problems. Some of the generalized packages are listed below:
33
Presentations : Presentation Graphics, MS-Power Point, OpenOffice.org Impress
Database Management System: MS-Access, OpenOffice.org Base, MS-SQL Server,
ORACLE
Graphics Tools: Paint shop pro, Adobe Photo shop
i. Machine Language:
This is the language (in the form of 0’s and 1’s, called binary numbers) understood
directly by the computer. It is machine dependent. It is difficult to learn and even more difficult
to write programs.
34
iii. High Level Language:
You know that low level language requires extensive knowledge of the hardware since it
is machine dependent. To overcome the limitation, high level language has been evolved
which uses normal English like, easy to understand statements to solve any problem. Higher
level languages are computer independent and programming becomes quite easy and simple.
35
executes the whole program and may involve many passes. In contrast, an interpreter reads a
statement from the input, converts it to an intermediate code, executes it, then takes the next
statement in sequence. If an error occurs, an interpreter stops execution and reports it. whereas a
compiler reads the whole program even if it encounters several errors.
The software (set of programs) that reads a program written in assembly language and
translates it into an equivalent program in machine language is called as Assembler.
3.6.2 Linker
Linker is a computer program that links and merges various object files together in order
to make an executable file. All these files might have been compiled by separate assemblers. The
major task of a linker is to search and locate referenced module/routines in a program and to
determine the memory location where these codes will be loaded, making the program
instruction to have absolute references.
3.6.3 Loader
Loader is a part of operating system and is responsible for loading executable files into
memory and execute them. It calculates the size of a program (instructions and data) and creates
memory space for it. It initializes various registers to initiate execution.
36
colon, expected keyword, etc. - although interpreting some compiler diagnostics is a skill in
itself.
Error correction can be very time-consuming and frustrating, particularly in the case
where spurious errors occur, e.g. many errors are highlighted in the source but the cause of the
error is a single, simple mistake. An example of this would be errors that are generated by, say, a
compiler, if a programmer simply misses out a semi-colon.
Another important difference is that interpreters can be 2 to 10 times slower than
compilers. One reason for this is that they translate the same statements within a loop over and
over again. Compilers can produce much more efficient object code than interpreters thus
making the compiled programs to run faster.
Interpreters however are easier to use, particularly for beginners, since errors are
immediately displayed, corrected by the user, until the program is able to be executed. On the
whole compilers tend to be more difficult to use.
37
UNIT - III
UNIT-III
4. OPERATING SYSTEMS
37
the monitor, which would then load the next job.Control would also return to the monitor if an error
was encountered.
It improved utilisation of computing resources, enabling jobs to be executed quickly, with little
or no idle time and a greatly reduced setup time. One issue that came to the fore at this time was the
need to protect the memory occupied by the monitor program from a running program. In addition, the
execution of certain machine level instructions, such as I/O instructions, was deemed to be the preserve
of the monitor.
Fig. 4.1 The monitor program was an early form of operating system
38
sophistication, since they are responsible for managing memory usage for, and scheduling the
execution of, multiple programs.
In order for the processor's time to be divided fairly between the programs competing for its
use, the operating system interleaves the execution of each program in short time slots. This process is
known as time-sharing, and it prevents one program from hogging the processor to the detriment of
other programs.
4.2.1 Definition
An operating system is a program that controls the execution of application programs and acts
as an interface between the user of a computer and the computer hardware.
• A more common definition is that the operating system is the one program running at all times
on the computer (usually called the kernel), with all else being application programs.
• An operating system is concerned with the allocation of resources and services, such as
memory, processors, devices and information. The operating system correspondingly includes
39
programs to manage these resources, such as a traffic controller, a scheduler, memory
management module, I/O programs, and a file system.
Every computer must have an operating system to run other programs. The operating system
coordinates the use of the hardware among the various system programs and application programs for a
various users. It simply provides an environment within which other programs can do useful work.
The operating system is a set of special programs that run on a computer system that allows it
to work properly. It performs basic tasks such as recognizing input from the keyboard, keeping track
of files and directories on the disk, sending output to the display screen and controlling peripheral
devices.
40
OS is designed to serve two basic purposes:
It controls the allocation and use of the computing System’s resources among the various user
and tasks.
It provides an interface between the computer hardware and the programmer that simplifies and
makes feasible for coding, creation, debugging of application programs.
The Operating system must support the following tasks.
Provides the facilities to create, modification of programs and data files using an editor.
Access to the compiler for translating the user program from high level language to machine
language.
Provide a loader program to move the compiled program code to the computer’s memory for
execution.
Provide routines that handle the details of I/O programming.
4.2.3 History of OS
Operating system has been evolving through the years.
4.2.4 Examples of OS
• Windows (GUI based, PC)
• GNU/Linux (Personal, Workstations, ISP, File and print server, Three-tier client/Server)
• MacOS (Macintosh), used for Apple’s personal computers and work stations (MacBook, iMac).
• Android (Google’s Operating System for smartphones/tablets/smartwatches)
• iOS (Apple’s OS for iPhone, iPad and iPod Touch)
4.3 Functions of OS
41
4.3.2 Program Execution:
A number of steps need to be performed to execute a program. Instructions and data must be
loaded into main memory, I/O devices and files must be initialized, and other resources must be
prepared.
The OS handles these scheduling duties for the user.
4.3.3 Access to I/O Devices:
Each I/O device requires its own peculiar set of instructions or control signals for operation.
The OS provides a uniform interface that hides these details so that programmers can access
such devices using simple reads and writes.
4.3.4 Controlled access to files:
For file access, the OS must reflect a detailed understanding of not only the nature of the I/O
device (disk drive, tape drive) but also the structure of the data contained in the files on the
storage medium.
In the case of a system with multiple users, the OS may provide protection mechanisms to
control access to the files.
4.3.5 System access:
For shared or public systems, the OS controls access to the system as a whole and to specific
system resources.
The access function must provide protection of resources and data from unauthorized users and
must resolve conflicts for resource contention.
4.3.6 Error detection and response:
A variety of errors can occur while a computer system is running. These include internal and
external hardware errors, such as a memory error, or a device failure or malfunction; and
various software errors, such as division by zero, attempt to access forbidden memory location,
and inability of the OS to grant the request of an application.
In each case, the OS must provide a response that clears the error condition with the least
impact on running applications.
The response may range from ending the program that caused the error, to retrying the
operation, to simply reporting the error to the application.
4.3.7 Accounting:
A good OS will collect usage statistics for various resources and monitor performance
parameters such as response time.
On any system, this information is useful in anticipating the need for future enhancements and
in tuning the system to improve performance.
On a multiuser system, the information can be used for billing purposes.
42
4.4 OS Tasks
Operating system performs the following tasks
● Process management
● Main memory management
● File management
● Secondary storage management
● I/O system management
More than one program is kept in main memory simultaneously. So operating system will
note down beginning and starting address for each program in memory. When some space is free
in memory OS loads new program into memory.
When a program completes its execution, space occupied by that program is deallocated,
means it becomes available.
43
4.4.3 File Management
Computer store information on several types of storage media in form of files
The operating system provides uniform logical view of information storage called file.A file
is allocation of related information defined by its creator.
The OS performs the following activities in connection with file management.
● Creation and deletion of files
● Support of printers for manipulating files.
● Mapping of files on to secondary storage.
● Creation of directories for files.
Only the device driver known the peculiarities of specific devices to which it is assigned.
● Operating system manages all
● I/O devices
● Data transfer and
● Delete I/O completion
44
4.5 Objectives of OS
Convenience: An OS makes a computer more convenient to use.
Efficiency: An OS allows the computer system resources to be used in an efficient manner.
Ability to evolve: An OS should be constructed in such a way as to permit the effective
development, testing, and introduction of new system functions without interfering with
service.
45
Fig. 4.4 Multi-Tasking
4.7 Single and Multi User OS
Single-user operating systems have no facilities to distinguish users, but may allow multiple
programs to run in tandem.A multi-user operating system extends the basic concept of multi-tasking
with facilities that identify processes and resources, such as disk space, belonging to multiple users,
and the system permits multiple users to interact with the system at the same time. Time-sharing
operating systems schedule tasks for efficient use of the system and may also include accounting
software for cost allocation of processor time, mass storage, printing, and other resources to multiple
users.
Table 4.2: Comparison between Single User and Multi-User Operating System:
Single User Multi-User
Definition A single user Operating A multi-user operating system
system provides facilities to has been designed for more
be used on one computer by than one user to access the
only one user. computer at the same or
Single user, single task: A different time.
single task is performed by Time sharing systems: These
one user at a time. systems multi-user systems in
Example-The Palm OS for which CPU time is divided
Palm handheld computers. among the users. The division
made on the basis of a
schedule.
Types Simple Complex
46
4.8 Characteristics of MS-DOS
MS-DOS is an operating system created by Microsoft in 1982 to run on X86 systems and was
the dominant operating system on the market until the rise of Windows. Microsoft produced several
different versions of the OS which culminated with version 6.22 in 1994, but Windows still carries an
updated version of the code as its command-line interface. Many of the operating system’s
characteristics have survived into modern systems and influence OS design even today.
47
4.9 Characteristics of UNIX Operating Systems
In general most UNIX operating systems have the following characteristics…
Multi-user & Multi-tasking - most versions of UNIX are capable of allowing multizple users to log
onto the system each capable of running multiple tasks. This is standard for almost any OS now-a-days.
Over 30 Years Old - There is something to be said for the fact that UNIX is over 30 years old and it's
popularity and use are at all time highs. Over these 30 years many variations have spawned off and
many have died off, but much of today’s modern UNIX systems can be traced back to the original
versions. It has endured the test of time. For reference, Windows at best is half as old (Windows 1.0
was released in the mid 80's, but many would argue that it was not by any means stable or complete
enough until the 3.x family which was released in the early 90's).
Large Number of Applications - Although it may not seem it, there is an enormous amount of
applications available for UNIX operating systems. They range from commercial applications such as
CAD, Maya, Word-perfect, to many free applications.
Free Applications and Even Free Operating System - All of the applications available under UNIX,
many of them are free. The compilers and interpreters that we use in most of the programming courses
here at UMBC now these free versions that can be downloaded off of the Internet free of charge. As
well, most of the development that we do in programming courses is done under the Linux OS. Since
Linux is one of the free versions of UNIX, it too can be downloaded and installed free of charge.
Less Resource Intensive - In general, most UNIX installations tend to be much less demanding on the
system resources. In many cases the old family computer that can barely run whatever version of
windows is more than sufficient to run the latest version of Linux.
Internet Development - Much of the backbone of the Internet is run by UNIX servers of one type or
another. Many of the more general web-servers out there also run UNIX with the Apache webserver -
another free application.
48
/home/demo
The home directory is named after the user account, so the above example is what the value
would be if you were logged into the server with an account called demo. This directory is within a
directory called /home, which is itself within the top-level directory, which is called "root" but
represented by a single slash "/".
cd /usr/share
pwd
/usr/share
Now that we are in a new directory, let's look at what's inside. To do this, we can use the ls command:
ls
As you can see, there are many items in this directory. We can add some optional flags to the
command to modify the default behavior. For instance, to list all of the contents in an extended form,
we can use the -lflag (for "long" output):
49
ls -l
total 440
drwxr-xr-x 2 root root 4096 Apr 17 2014 adduser
drwxr-xr-x 2 root root 4096 Sep 24 19:11 applications
drwxr-xr-x 6 root root 4096 Oct 9 18:16 apport
drwxr-xr-x 3 root root 4096 Apr 17 2014 apps
drwxr-xr-x 2 root root 4096 Oct 9 18:15 apt
drwxr-xr-x 2 root root 4096 Apr 17 2014 aptitude
drwxr-xr-x 4 root root 4096 Apr 17 2014 apt-xapian-index
drwxr-xr-x 2 root root 4096 Apr 17 2014 awk
...
This view gives us plenty of information, most of which looks rather unusual. The first block
describes the file type (if the first column is a "d" the item is a directory, if it is a "-", it is a normal file)
and permissions. Each subsequent column, separated by white space, describes the number of hard
links, the owner, group owner, item size, last modification time, and the name of the item. We will
describe some of these at another time, but for now, just know that you can view this information with
the -l flag of ls.
To get a listing of all files, including hidden files and directories, you can add the -a flag. Since
there are no real hidden files in the /usr/share directory, let's go back to our home directory and try that
command. You can get back to the home directory by typing cd with no arguments:
cd ls -a
. .. .bash_logout .bashrc .profile
As you can see, there are three hidden files in this demonstration, along with . and .., which are
special indicators. You will find that often, configuration files are stored as hidden files, as is the case
here.
For the dot and double dot entries, these aren't exactly directories as much as built- in methods
of referring to related directories. The single dot indicates the current directory, and the double dot
indicates this directory's parent directory. This will come in handy in the next section.
cd /usr/share
This is an example of changing a directory by giving an absolute path. In Linux, every file and
directory is under the top-most directory, which is called the "root" directory, but referred to by a single
leading slash "/". An absolute path indicates the location of a directory in relation to this top-level
50
directory. This lets us refer to directories in an unambiguous way from any place in the filesystem.
Every absolute path mustbegin with a slash.
The alternative is to use relative paths. Relative paths refer to directories in relation to the
currentdirectory. For directories close to the current directory in the hierarchy, this is usually easier and
shorter. Any directory within the current directory can be referenced by name without a leading slash.
We can change to the locale directory within /usr/share from our current location by typing:
cd locale
We can likewise move multiple directory levels with relative paths by providing the portion of
the path that comes after the current directory's path. From here, we can get to the LC_MESSAGES
directory within the en directory by typing:
cd en/LC_MESSAGES
To go back up, travelling to the parent of the current directory, we use the special double dot
indicator we talked about earlier. For instance, we are now in the /usr/share/locale/en/LC_MESSAGES
directory. To move up one level, we can type:
cd ..
This takes us to the /usr/share/locale/en directory.
A shortcut that you saw earlier that will always take you back to your home directory is to use cd
without providing a directory:
cd pwd /home/demo
To learn more about how to use these three commands, you can check out our guide on
exploring the Linux filesystem.
Viewing Files
In the last section, we learned a bit about how to navigate the filesystem. You probably saw
some files when using the ls command in various directories. In this section, we'll discuss different
ways that you can use to view files. In contrast to some operating systems, Linux and other Unix-like
operating systems rely on plain text files for vast portions of the system.
The main way that we will view files is with the less command. This is what we call a "pager",
because it allows us to scroll through pages of a file. While the previous commands immediately
executed and returned you to the command line, less is an application that will continue to run and
occupy the screen until you exit.
We will open the /etc/services file, which is a configuration file that contains service
information that the system knows about:
less /etc/services
The file will be opened in less, allowing you to see the portion of the document that fits in the
area of the terminal window:
51
# Network services, Internet style
# Note that it is presently the policy of IANA to assign a single well-known
# port number for both TCP and UDP; hence, officially ports have two entries
# even if the protocol doesn't support UDP operations.
# Updated from http://www.iana.org/assignments/port-numbers and other
# Sources like http://www.freebsd.org/cgi/cvsweb.cgi/src/etc/services.
# New ports will be added on request if they have been officially assigned
# By IANA and used in the real-world or are needed by a debian package.
# If you need a huge list of used numbers please install the nmap package.
echo 7/tcp
...
To scroll, you can use the up and down arrow keys on your keyboard. To page down one whole
screens-worth of information, you can use either the space bar, the "Page Down" button on your
keyboard, or the CTRL-f shortcut.
To scroll back up, you can use either the "Page Up" button, or the CTRL-b keyboard shortcut.
To search for some text in the document, you can type a forward slash "/" followed by the search
term. For instance, to search for "mail", we would type:
/mail
This will search forward through the document and stop at the first result. To get to another
result, you can type the lower-case n key:
n
To move backwards to the previous result, use a capital N instead:
N
When you wish to exit the less program, you can type q to quit:
q
While we focused on the less tool in this section, there are many other ways of viewing a file
that come in handy in certain circumstances. The cat command displays a file's contents and returns
you to the prompt immediately. The head command, by default, shows the first 10 lines of a file.
Likewise, the tailcommand shows the last 10 lines by default. These commands display file contents in
a way that is useful for "piping" to other programs.
Feel free to see how these commands display the /etc/services file differently.
52
File and Directory Manipulation
We learned in the last section how to view a file. In this section, we'll demonstrate how to
create and manipulate files and directories.
cd touch file1
Now, if we view the files in our directory, we can see our newly created file:
ls file1
If we use this command on an existing file, the command simply updates the data our
filesystem stores on the time when the file was last accessed and modified. This won't have much use
for us at the moment.
We can also create multiple files at the same time. We can use absolute paths as well. For
instance, if our user account is called demo, we could type:
touch /home/demo/file2 /home/demo/file3
ls
file1 file2 file3
cd mkdir test
We can make a directory within the test directory called example by typing:
mkdir test/example
For the above command to work, the test directory must already exist. To tell mkdir that it
should create any directories necessary to construct a given directory path, you can use the - p option.
This allows you to create nested directories in one step. We can create a directory structure that looks
like some/other/directories by typing:
mkdir -p some/other/directories
The command will make the some directory first, then it will create the other directory inside of
that. Finally it will create the directories directory within those two directories.
53
Moving and Renaming Files and Directories with "mv"
We can move a file to a new location using the mv command. For instance, we can move file1
into the test directory by typing:
mv file1 test
For this command, we give all of the items that we wish to move, with the location to move
them at the end. We can move that file back to our home directory by using the special dot reference to
refer to our current directory. We should make sure we're in our home directory, and then execute the
command:
cd mv test/file1 .
This may seem unintuitive at first, but the mv command is also used to rename files and
directories. In essence, moving and renaming are both just adjusting the location and name for an
existing item.
So to rename the test directory to testing, we could type:
mv test testing
Note: It is important to realize that your Linux system will not prevent you from certain destructive
actions. If you are renaming a file and choose a name that already exists, the previous file will be
overwritten by the file you are moving. There is no way to recover the previous file if you accidentally
overwrite it.
Unlike a mv operation, after which file3 would no longer exist, we now have both file3 and file4.
Note: As with the mv command, it is possible to overwrite a file if you are not careful about the
filename you are using as the target of the operation. For instance, if file4 already existed in the above
example, its content would be completely replaced by the content of file3.
In order to copy directories, you must include the -r option to the command. This stands for
"recursive", as it copies the directory, plus all of the directory's contents. This option is necessary with
directories, regardless of whether the directory is empty.
For instance, to copy the some directory structure to a new structure called again, we could
type:
cp -r some again
Unlike with files, with which an existing destination would lead to an overwrite, if the target is
an existing directory, the file or directory is copied into the target:
54
cp file1 again
This will create a new copy of file1 and place it inside of the again directory.
[ Read 0 lines ]
Along the top, we have the name of the application and the name of the file we are editing. In
the middle, the content of the file, currently blank, is displayed. Along the bottom, we have a number
of key combinations that indicate some basic controls for the editor. For each of these, the ^ character
means the CTRL key.
To get help from within the editor, type:
CTRL-G
When you are finished browsing the help, type CTRL-X to get back to your document.
Type in or modify any text you would like. For this example, we'll just type these two sentences:
Hello there.
Here is some text.
To save our work, we can type:
CTRL-O
This is the letter "o", not a zero. It will ask you to confirm the name of the file you wish to save
to:
File Name to Write: file1
55
As you can see, the options at the bottom have also changed. These are contextual, meaning
they will change depending on what you are trying to do. If file1 is still the file you wish to write to, hit
"ENTER".
If we make some additional changes and wish to save the file and exit the program, we will see
a similar prompt. Add a new line, and then try to exit the program by typing:
CTRL-X
If you have not saved after making your modification, you will be asked whether you wish to
save the modifications you made:
Save modified buffer (ANSWERING "No" WILL DESTROY CHANGES) ?
Y Yes
N No ^C Cancel
You can type "Y" to save your changes, "N" to discard your changes and exit, or "CTRL-C" to
cancel the exit operation. If you choose to save, you will be given the same file prompt that you
received before, confirming that you want to save the changes to the same file. Press ENTER to save
the file and exit the editor.
You can see the contents of the file you created using either the cat program to display the
contents, or the less program to open the file for viewing. After viewing with less, remember that you
should hit qto get back to the terminal.
less file1
Hello there.
Here is some text.
Another line.
Another editor that you may see referenced in certain guides is vim or vi. This is a more
advanced editor that is very powerful, but comes with a very steep learning curve. If you are ever told
to use vim or vi, feel free to use nano instead. If you wish to learn how to use vim, read our guide to
getting started with vim.
56
You will see details such as the version of the operating system installed on your computer, the
status of your RAM memory or the processor you have. There's also some network information, like
the IP and the MAC addresses of your network cards.
4.11.2. Display the list of currently running processes
To view the list of currently running processes, you have to use the tasklist command. Type
tasklist and press Enter. Command Prompt should display a list similar to the one below, where you see
details about the names of running processes, theirPID (Process identifier) and the memory they use.
4.11.3. Stop a process using taskkill
To kill or stop a running process, you have to use the taskkill command. Let's assume that you
want to stop the Snipping Tool application t hat is running on your computer. Its process is called
SnippingTool.exe . In order to kill it, you should use Command Prompt to run the command "taskkill
/im snippingtool.exe" . The /im parameter is used to identify and stop a process by typing its name.
There are times when you need to open a program twice or even several times. Every new
window of a specific program (for example, Internet Explorer) creates a separate process called
instance that has attached a unique PID (Process identifier).
To stop a single instance of a process, you need to specify its PID (Process identifier). Let's
assume that there are two instances of Internet Explorer open on your computer. The process' name is
iexplore.exe , but you want to close only one of its two running instances.
If you want to kill the process that has a PID of 6984, you will type taskkill /PID 6984 and then
press Enter .
Another interesting parameter that you can use for the command taskkill is /t . This parameter
allows you to terminate a specified process and any child processes which were started by it.
Take the same example: the Internet Explorer process. Let's assume that you have three
processes and you want to kill all of them using the parameter /t . You should type the command
"taskkill /t /im iexplore.exe" and then press Enter . Check the screenshot below to see the confirmation
of the command you just typed.
Note that if you misuse the commands listed in this article, you can risk losing the data opened
in the running processes. It is important to be careful and have a backup available for your data.
Therefore proceed carefully and don't say we did not warn you. :)
Also, keep in mind that, in order to kill any running process, you need to have administrative
permissions and run the Command Prompt as administrator. Check out the
57
[Enter] is required after any DOS command, it is assumed in all commands found below.
58
may result in errors, such as the command: copy edlin a:myomy.bat. Try it and see what happens.
59
Lists all files with a filename of 'FORMAT' and an extension beginning with 'C'.
Wild-card characters can be used in combination.
Example:
C> dir a:labe?.*
Lists all five-letter files with the first four letters 'LABE' and any extension.
C> dir c:*.ex?
Lists all files with an extension beginning with 'EX'.
Experiment with '*' and '?' to improve your ability to find files quickly. These wild-card
characters can also be used with several other DOS commands.
IMPORTANT WARNING: This command is easy to use, but it is the most dangerous one you
will encounter in DOS (apart form FORMAT). If you aren't careful, you may delete a file which you--
or someone else-- needs. And, unless you have saved a backup of that file, the erased file is gone for
good. For this reason it is good practice to use only complete file specifications with the ERASE
command (and to keep backups of your most valuable files). As a safety precaution, never use the
wild-card characters '*' and '?' in ERASE commands.
BEWARE: I will rescind your laboratory privileges for a full week if you ever knowingly use
either the command: erase c:*.*, or the command: erase *.*. Guess what happens?
60
BRIT1.DAT
BRIT2.DAT
BRIT3.DAT
Three versions of a data file for a map of Britain.
61
This command is very simple to use, just remember two points: the file name and extension
must be complete for the source file and no drive specification is given for the target. Renaming can
only occur on a single disk drive (otherwise COPY must be used).
62
UNIT - IV
UNIT-IV
5. TEXT EDITOR
Introduction
A text editor is a type of computer program that edits plain text. Such programs are
sometimes known as "notepad" software, following the naming of Microsoft Notepad. Text
editors are provided with operating systems and software development packages, and can be
used to change configuration files, documentation files and programming language source code.
63
traditionally target different platforms. Still, numbers for server use of Windows (that are
comparable to competitors) show one third market share, similar to that for end user use.
64
Many homes have word processors on their computers, in the home word processing
tends to be educational, planning or business related, dealing with assignments or work being
completed at home, or recreational. Examples include: writing short stories, letter writing,
resume, CV creation, card creation, In education word processing is used in a variety of different
ways in the production of assignments, notes, exams, and for practicing its uses.
5.4 Features
Word processing typically implies the presence of text manipulation functions that extend
beyond a basic ability to enter and change text. For the purpose of this module when discussing
and explaining word processing features the software Microsoft Office Word (*Word) will be
used as the example. Text Manipulation Describe how to change the appearance of a document
by text manipulation Text manipulation usually refers to the ability to change words, sentences
and paragraphs which have been typed. The manipulation can involve the changing of the
characters (letters and symbols), adding line breaks, direction of the text and changing the case
(CAPITAL letter or small letter) of the characters.
65
A) Data Tables Ordinary tables containing data relevant to the topic discussed in the word
processing document. B) Pre-set Tables or Internal Cross-referencing Internal Cross-referencing
within documents is completed in pre-set tables. Examples include: a. Contents tables include
section titles listed next to their page numbers (like the first page of these notes). b. Tables of
figures with caption titles and their page numbers. c. Cross-referencing with section or page
numbers. d. Footnote numbering.
5.4.4 Mail Merge and Label Printing
Describe the uses of mail merge and the benefits of label printing Mail merge is the batch
mailing of letters - using a letter template and a data file or address database. Instead of a
business or college creating multiple copies of the same letter to send out in the post, one letter
and one data file is created. The letter and data file are merged together - which means the names
and address are automatically added to each of the letters and envelopes from the database or
data file.
Mail merge can automatically create a batch of labels for the data file and print the labels
to labels stickers or directly to envelopes depending on the capacity of a printer.
5.4.5 Other word processing functions include:
Spell checking (actually checks against word lists),
Grammar Checking (checks for what seem to be simple grammar errors),
Thesaurus function (finds words with similar or opposite meanings Shift F7).
Collaborative editing, which allows two people to work on one document,
automatically leaving each other notes to show where editing has taken place.
66
now become an essential tool in developing a computerized management information system.
Income statements, annual reports, balance sheet, cost analysis and budgets are some of the
applications where worksheets are typically used.
67
6. DATABASE
(UNIT-IV)
Introduction to Database and Packages
A database is an organized collection of data, stored and accessed electronically.
Database designers typically organize the data to model aspects of reality in a way that supports
processes requiring information, such as (for example) modeling the availability of rooms in
hotels in a way that supports finding a hotel with vacancies.
The database management system (DBMS) is the software that interacts with end users,
applications, and the database itself to capture and analyze data. A general-purpose DBMS
allows the definition, creation, querying, update, and administration of databases. A database is
generally stored in a DBMS-specific format which is not portable, but different DBMSs can
share data by using standards such as SQL and ODBC or JDBC. The sum total of the database,
the DBMS and its associated applications can be referred to as a "database system".
Often the term "database" is used to loosely refer to any of the DBMS, the database
system or an application associated the database.
68
Right-click the model (or a package) in the Browser, and select New Database Package.
Stereotype Extends the semantics of the object. You can enter a stereotype directly in this
field, or add stereotypes to the list by specifying them in an extension file.
Owner Specifies the name of the database package owner, which you choose from the
list of users.
Privilege Lets you specify whether the functions and procedures in the database package
execute with the privileges and in the schema of the user who owns it (definer),
or with the privileges and in the schema of CURRENT_USER (invoker).
Table Specifies the table with which the database package is associated.
Template Specifies the template on which the ;8database package is based. If you use a
template, then the remaining tabs of the property sheet will be completed by the
template. If you make any modifications to the other tabs, then the User-Defined
button to the right of the field is depressed and the package is detached from the
template and will no longer be automatically updated when you modify the
definition of the table with which it is associated.
Keywords Provide a way of loosely grouping objects through tagging. To enter multiple
keywords, separate them with commas.
69
The following tabs are also available:
i. Procedures – Lists the procedures associated with the database package.
ii. Variables - Lists the variables associated with the database package.
iii. Cursors - Lists the cursors associated with the database package.
iv. Exceptions – Lists the exceptions associated with the database package.
v. Types - Lists the types associated with the database package.
vi. Initialization - Lets you define initialization code for the database package body. Typically
initialization holds statements that initialize database package variables. Initialization takes
place after database package creation and compilation in the server.
vii. Specification - [hidden by default] Contains the public specification of the database.
viii. Preview - Displays the SQL code that will be generated for the database package.
70
vii. Database Package Templates
Instead of modeling each individual database package by hand, you can use a template
and have Power Designer generate packages specific to each table. Database packages defined
through a template are updated automatically when you make changes to the table definition, and
you can quickly create packages for multiple tables from the Rebuild Table Database Packages
dialog.
71
terms when you begin working with desktop publishing software. These terms come
primarily from the printing/publishing industry.
6.2.3 Features
Fonts: A good DTP package will include a large variety of fonts which can be whatever size the
user requires.
Styles: Styles allow the user to define the font style, size and color of text. Once a style has been
defined it can be applied to be any part of the text whenever necessary. This saves Time when
text is being formatted and helps to keep its appearance consistent throughout a publication.
Borders: Borders can be used to make objects stand out. This may just be a colored line or
something more sophisticated.
Color: A good DTP package will include a large choice of colors which can be used to fill in
areas of a page or make text, borders and lines stand out more. Various tints, shades and patterns
of color are usually offered along with the facility for creating a customized color scheme for a
publication.
Clipart: DTP package often have a library of artwork supplied with them from which graphics
can be copied and pasted into a publication.
Character Spacing: The spacing between characters can be adjusted by using a feature called
kerning. All DTP packages offer this facility along with options to shrink and stretch text.
Line Spacing: The spacing between lines can be changed by adjusting the leading.
Design Wizards: Design wizards are provided to give step by step help when creating common
types of publication such as newspapers, newsletters, flyers and greeting cards.
Text Columns: DTP packages all offer a facility which allows the user to set up the pages of a
publication to have a certain number of text columns. This is useful when producing a newsletter
or newspaper.
72
UNIT - V
UNIT-V
7. COMPUTER COMMUNICATIONS
Introduction:
It is not the processing power of computer, but the power of communication among that has
revolutionized the information age. The marriage of computing and data communication
technologies (means and methods by which data is transferred from one location to another) is one
of the most existing developments in today's information age. This development has given birth to
computer networks. A computer network is a network of geographically distributed multiple
computers connected in such a way that meaningful transmission and exchange if information
become possible among them. Sharing of information, sharing of resources (both hardware and
software), and sharing processing load are some of the major objectives of a computer network. The
goal of this chapter is to introduce the various aspects of data communication technology and to
discuss how this technology is combined with computer technology to form computer networks.
Following are some of the important concepts, which you will learn from this chapter:
73
7.1 Basic Elements of a Communication System
Communication is the process of transferring messages from one point to another. As shown
in fig 7.2 the three basic elements of any communication process are:
For example, when you speak to your friend on the telephone, you are the sender. The
telephone line through which your voice is transmitted is the medium and your friend is the
receiver. This is a simple example of voice communication. The same concepts holds good for data
communication also.
Data Communication is the function of transporting data from one point to another. In this
case, the sender and receiver are normally machines, in particular, computer devices (computers,
terminals, peripheral devices like line printers, plotters, disks, etc.) and the transmission medium
may be telephone lines, microwave links, etc. However, the messages that are transmitted are data,
not voice conversations. Thus, the electronic systems that transfer data from one point to another
are called data communication systems. Unlike computers that process and rearrange data, data
communication systems transmit data from one point to another without any change.
74
Fig. 7.3 Computer Networks and Node
Computer network is a telecommunication channel using which we can share data with other
computers or devices, connected to the same network. It is also called Data Network. The best
example of computer network is Internet.
Computer network does not mean a system with one Control Unit connected to multiple
other systems as its slave. That is Distributed system, not Computer Network.
A network must be able to meet certain criterias, these are mentioned below:
i. Performance
ii. Reliability
iii. Security
i. Performance
It can be measured in the following ways:
Transit time: It is the time taken to travel a message from one device to another.
Response time: It is defined as the time elapsed between enquiry and response.
ii. Reliability:
It decides the frequency at which network failure take place. More the failures are, less is the
network's reliability.
iii. Security:
It refers to the protection of data from any unauthorised user or access. While travelling
through network, data passes many layers of network, and data can be traced if attempted. Hence
security is also a very important characteristic for Networks.
75
7.3 Introduction to Networking Software:
Networking is referred as connecting computers electronically for the purpose of sharing
information. Resources such as files, applications, printers and software are common information
shared in a networking. The advantage of networking can be seen clearly in terms of security,
efficiency, manageability and cost effectiveness as it allows collaboration between users in a wide
range. Basically, network consists of hardware component such as computer, hubs, switches, routers
and other devices which form the network infrastructure. These are the devices that play an
important role in data transfer from one place to another using different technology such as radio
waves and wires.
There are many types of network available in the networking industries and the most
common network is Local Area Network (LAN) and Wide Area Network (WAN). LAN network is
made up of two or more computers connected together in a short distance usually at home, office
buildings or school. WAN is a network that covers wider area than LAN and usually covers cities,
countries and the whole world. Several major LAN can be connect together to form a WAN. As
several devices are connected to network, it is important to ensure data collision does not happened
when this devices attempt to use data channel simultaneously. A set of rules called Carrier Sense
Multiple Access / Collision detection are used to detect and prevent collision in networks.
76
7.4.1. Personal Area Network (PAN):
A personal area network (PAN) is a wireless network that connects information technology
devices within a range of 33 feet or so. One device serves as the controller during wireless PAN
initialization, and this controller device mediates communication within the PAN. The controller
broadcasts a beacon that synchronizes all devices and allocates time slots for the devices. With a
PAN, you can connect a laptop, digital camera, and portable printer without physical cables. You
can download digital image data from the camera to the laptop and then print it on a high-quality
printer—all wirelessly.
Ford and Microsoft collaborated to develop the Sync service for in-car communications and
entertainment. The Sync service creates a wireless connection to cell phones and MP3 players. Sync
enables car occupants to place “hands free” cell phone calls using voice commands. Users can also
request specified songs from a connected media player using voice commands.
77
Fig. 7.6 Local Area Network (LAN)
78
Fig. 7.8 Campus Area Network (CAN)
79
7.4.6. Wide Area Network (WAN):
Slightly more complex than a LAN, a WAN connects computers together across longer
physical distances. This allows computers and low-voltage devices to be remotely connected to
each other over one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around the
world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple
administrators or the public.
80
The most widely used part of the Internet is the World Wide Web (often abbreviated
"WWW" or called "the Web"). Its outstanding feature is hypertext, a method of instant cross-
referencing. In most Web sites, certain words or phrases appear in text of a different color than the
rest often this text is also underlined. When you select one of these words or phrases, you will be
transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons,
images, or portions of images that are "clickable." If you move the pointer over a spot on a Web site
and the pointer changes into a hand, this indicates that you can click and be transferred to another
site.
Using the Web, you have access to billions of pages of information. Web browsing is done
with a Web browser, the most popular of which are Chrome, Firefox and Internet Explorer. The
appearance of a particular Web site may vary slightly depending on the browser you use. Also, later
versions of a particular browser are able to render more "bells and whistles" such as animation,
virtual reality, sound, and music files, than earlier versions.
The Internet has continued to grow and evolve over the years of its existence. IPv6, for
example, was designed to anticipate enormous future expansion in the number of available IP
addresses. In a related development, the Internet of Things (IoT) is the burgeoning environment in
which almost any entity or object can be provided with a unique identifier and the ability to transfer
data automatically over the Internet.
7.5.2 Intranet:
An intranet is an internal corporate network built using Internet and World Wide Web
standards and technologies. Employees of an organization use it to gain access to corporate
information. After getting their feet wet with public Web sites that promote company products and
services, corporations are seizing the Web as a swift way to streamline even transform their
organizations. These private networks use the infrastructure and standards of the Internet and the
World Wide Web. Using an intranet offers one considerable advantage: Many people are already
familiar with Internet technology, so they need little training to make effective use of their corporate
intranet.
An intranet is an inexpensive yet powerful alternative to other forms of internal
communication, including conventional computer networks. One of an intranet’s most obvious
virtues is its ability to reduce the need for paper. Because Web browsers run on any type of
computer, the same electronic information can be viewed by any employee. That means that all
sorts of documents (such as internal phone books, procedure manuals, training manuals, and
81
requisition forms) can be inexpensively converted to electronic form on the Web and be constantly
updated. An intranet provides employees with an easy and intuitive approach to accessing
information that was previously difficult to obtain. For example, it is an ideal solution to providing
information to a mobile salesforce that needs access to rapidly changing information.
A growing number of companies offer limited access to their private corporate network for
selected customers and suppliers. Such networks are referred to as extranets; they connect people
who are external to the company. An extranet is a network that links selected resources of the
intranet of a company with its customers, suppliers, or other business partners. Again, an extranet is
built around Web technologies.
Security and performance concerns are different for an extranet than for a Web site or
network-based intranet. User authentication and privacy are critical on an extranet so that
information is protected. Obviously, the network must perform well to provide quick response to
customers and suppliers. Below Table is summarizes the differences between users of the Internet,
intranets, and extranets.
Secure intranet and extranet access applications usually require the use of a virtual private
network (VPN). A virtual private network (VPN) is a secure connection between two points on the
Internet. VPNs transfer information by encapsulating traffic in IP packets and sending the packets
over the Internet, a practice called tunneling. Most VPNs are built and run by ISPs. Companies that
use a VPN from an ISP have essentially outsourced their networks to save money on wide area
network equipment and personnel.
82
Fig. 7.13 Difference between Internet and Intranet
83
to the user’s PC. Post office protocol (POP) is used to transfer messages from e-mail servers to your
PC. E-mail software typically includes more information man agement features than online e-mail
services, and lets you save your e-mail on your own PC, making it easier to manage and organize
messages and to keep the messages private and secure. Another protocol called Internet message
access protocol (IMAP) allows you to view e-mail using Outlook or other e-mail software without
downloading and storing the messages locally. Some users prefer this method because it allows
them to view messages from any Internet-connected PC.
Business users that access e-mail from smartphones such as the BlackBerry take advantage
of a technology called Push e-mail. Push e-mail uses corporate server software that transfers, or
pushes, e-mail out to the handset as soon as it arrives at the corporate e-mail server. To the
BlackBerry user, it appears as though e-mail is delivered directly to the handset. Push e-mail allows
the user to view e-mail from any mobile or desktop device connected to the corporate server. This
arrangement allows users flexibility in where, when, and how they access and manage e-mail.
Since text-based communications lack the benefit of facial expression, voice inflection, and
body language, users have developed methods of expressing emotion through typed characters. Text
messaging has also led to abbreviations for common expressions that save typing time.
Lists some expressions and abbreviations frequently used in personal e-mail messages, text
messaging, and other forms of text communications. These abbreviations are normally not
appropriate for business correspondence.
Some companies use bulk e-mail to send legitimate and important information to sales
representatives, customers, and suppliers around the world. With its popularity and ease of use,
however, some people feel they are drowning in too much e-mail. 18 Over a trillion e-mail
messages are sent from businesses in North America each year. This staggering number is up from
40 billion e-mail messages in 1995. Many messages are copies sent to long lists of corporate users.
Users are taking steps to cope with and reduce the mountain of e-mail. Some companies have
banned the use of copying others on e-mails unless it is critical. Some e-mail services scan for
84
possible junk or bulk mail, called spam, and delete it or place it in a separate file. More than half of
all e-mail can be considered spam. Some business executives receive 300 or more spam e-mails in
their corporate mailboxes every morning. Mukesh Lulla, president of TeamF1, a networking and
security-software company, receives 300 to 400 e-mail messages daily, not including spam. 19
While spam-filtering software can prevent or discard unwanted messages, other software products
can help users sort and answer large amounts of legitimate e-mail. For example, software from
ClearContext, Seriosity, and Xobni rank and sort messages based on sender, content, and context,
allowing individuals to focus on the most urgent and important messages first.
85
8. MULTIMEDIA
(UNIT-V)
Basics of Multimedia
• When different people mention the term multimedia, they often have quite different, or even
opposing, viewpoints.
– A PC vendor: a PC that has sound capability, a DVD-ROM drive, and perhaps the superiority of
multimedia-enabled microprocessors that understand additional multimedia instructions.
– A Computer Science (CS) student: applications that use multiple modalities, including text,
images, drawings (graphics), animation, video, sound including speech, and interactivity.
• Multimedia involves multiple modalities of text, audio, images, drawings, animation, and video.
i. Video Teleconferencing.
ii. Distributed lectures for higher education.
iii. Tele-medicine.
iv. Co-operative work environments.
v. Searching in (very) large video and image databases for target visual objects.
vi. Augmented reality: placing real-appearing computer graphics and video objects into scenes.
vii. Including audio cues for where video-conference participants are located.
viii. Building searchable features into new video, and enabling very high- to very low- bit-rate
use of new, scalable multimedia products.
ix. Making multimedia components editable.
x. Building ―inverse-Hollywood applications that can recreate the process by which a video
was made.
xi. Using voice-recognition to build an interactive environment, say a kitchen-wall web
browser.
86
Fig. 8.1 Multimedia
Multimedia: Any combination of texts, graphics, animation, audio and video which is a result of
computer based technology or other electronic media.
i) Features of Multimedia:
Interactivity: When the end user is able to control the elements of media that are
required, and subsequently obtains the required information in a non‐linear way .
Navigation: Enables the user to explore and navigate from one web page to another.
Hyperlink: Non‐linear navigation of jumping for the required information.
Easy to use, Easy to understand:
Advantages Disadvantages
- Reduces travelling cost and saves time;
- Increases productivity and improves the quality of teaching and learning;
- Make quick and spontaneous decisions;
87
- Increases satisfaction in teaching or at the workplace
- Video requires more bandwidth than audio. Therefore, Video teleconferencing is
expensive. (Use Video compression to solve)
- Requires a network to support short ‐ delay as audio and video are asynchronous
and it is realtime. (Use Optimum multimedia network; fibre optics or ISDN)
ii) Multimedia Store and Forward Mail: Allow users to generate, modify and rreceive documents
that contain multimedia. Eg. Gmail, Hotmail, Yahoo etc .
v) Advertising and Purchasing: Most of the web sites visited have many advertisements with
multimedia features with the objective of marketing merchandise or offering services online.
vi) Digital Library: With the existence of the digital or virtual library, students no longer need to
go to libraries but can search and obtain information that they require through the Internet.
viii) Other Applications: Video on Demand, Kiosks, Hybrid Applications, applications for:
recreation, commerce, training etc.
88
people. Yet there is a certain amount of cynicism towards virtual reality or ‘VR’ for short which in
the early days, promised so much but did not always deliver.
We have also included a section about augmented reality: this is a similar form of
technology in which the lines are blurred between the real world and computer generated imagery,
e.g. video. Sound, video or images are overlaid onto a real world environment in order to enhance
the user experience.
Virtual reality is considered to have wide ranging benefits for the healthcare sector but, it
can be used in other sectors as well which include:
- Education
- Gaming
- Architecture
- The military
In many ways, this technology has far more possibilities than originally thought. But it is
important not to confuse fact with fiction.
Whilst virtual reality may appear a futuristic concept which dwells in the realm of science
fiction it is, nevertheless, a very real form of technology. And this real form of technology has the
potential to deliver real-world benefits to a great many people.
89
means that for many people, virtual reality is difficult to grasp or even take seriously.
This topic aims to educate and inform anyone interested in virtual reality. This includes the
casual observer through to the teenager fixated on virtual reality gaming through to the healthcare
professional or engineer.
We have also included a section about the human factors issues of virtual reality for those of
you who work in usability, user experience (UX) or any other user-centred discipline.
90
be true. There are people who view virtual reality with little enthusiasm and dismiss it as 'science
fiction', seeing it as having no practical application in the real world.
Variety of Uses:
But there are in fact, a wide variety of applications for virtual reality which include:
- Architecture
- Sport
- MedicineThe Arts
- Entertainment
Virtual reality can lead to new and exciting discoveries in these areas which impact upon our
day to day lives. One example of this is the use of virtual reality in medicine, such as surgical
simulations, which helps with training the next generation of surgeons.
8.5.1 Computer Hardware and Software for the Generation of Virtual Environments
The computer technology that allows us to develop three-dimensional Virtual Environments
(VEs) consists of both hardware and software. The current popular, technical, and scientific interest
in VEs is inspired, in large part, by the advent and availability of increasingly powerful and
affordable visually oriented, interactive, graphical display systems and techniques. Graphical image
generation and display capabilities that were not previously widely available are now found on the
desktops of many professionals and are finding their way into the home. The greater affordability
91
and availability of these systems, coupled with more capable, single-person-oriented viewing and
control devices (e.g., head-mounted displays and hand-controllers) and an increased orientation
toward real-time interaction, have made these systems both more capable of being individualized
and more appealing to individuals.
Limiting VE technology to primarily visual interactions, however, simply defines the
technology as a more personal and affordable variant of classical military and commercial graphical
simulation technology. A much more interesting, and potentially useful, way to view VEs is as a
significant subset of multimodal user interfaces. Multimodal user interfaces are simply human-
machine interfaces that actively or purposefully use interaction and display techniques in multiple
sensory modalities (e.g., visual, haptic, and auditory).
92
example, a haptic display may require a physical simulation that includes compliance and texture.
An acoustic display may require sound models based on impact, vibration, friction, fluid flow, etc.
Each sensory modality requires a simulation tailored to its particular output. Next, a unified
representation is necessary to coordinate individual sensory models and to synchronize output for
each sensory driver. This representation must account for all human participants in the VE, as well
as all autonomous internal entities. Finally, gathered and computed information must be
summarized and broadcast over the network in order to maintain a consistent distributed simulated
environment.
93
Suggested Reading:
1. Satish Jain, Information Technology, BPB Publications, 2015.
2. Alexis Leon and Mathews Leon , Fundamentals of Information Technology,2nd Edition,
Vikas publishers, 2009.
3. V. Rajaraman, Fundamentals of Computers, 5th Edition, Prentice Hall India, 2011.
4. Abraham Silberschatz, Peter Galvin, Greg Gagne, “Operating System Concepts”, Ninth Edi-
tion, John Wiley and sons publications, 2013.
94