Computer notes (1)
Computer notes (1)
Q. # 1 What is a Computer?
Computer is an electronic device that is used to solve various problems according to a
set of instructions given to it.
History of Computer
Computer was gradually developed. First electronic computer was developed in 1946
at the University of Pennsylvania, USA. It was a huge machine, Ten feet High, Ten feet Wide
and some hundred feet long. Since the invention of computer, improvement in its designed
took place in four generations spanning over a period 30 year. IBM made first personal
computer in 1981. Since then revolutionary developments in the PC technology have brought
computer within the reach of a home and office user. Today a personal computer is affordable
and can solve our daily computing problem.
Till fourth generation of computers, the main stress was on improving the hardware
from valves to transistors and then to integrated circuits. However the major shortcoming of
computers, the lack of thinking power was challenging the scientists for a long time. The fifth
generation computers are a step in this direction. These computers will be introduced shortly.
Analog Computers
Analog computer actually is a measuring device. An analog computer measures
continuous type of data and uses a physical quantity, such as electric current, speed weight
etc. A traditional watch or clock is an analog device in which time is represented in a
continuous fashion.
Hybrid Computers
The third type of computer Hybrid Computer because Hybrid Computer is the
combination of the properties of both analog and digital computers. The computers consist
partly of the components of a digital computer and partly of analog computer to combine the
characteristics of both types (for example speed of analog computers and memory &
accuracy of digital computers). This is usually found in science laboratories as the controlling
device in an industrial process.
• Mini Computers.
• Micro Computers.
Super Computers
Super computers are the largest, fastest and most expensive computers developed in
1980s to handle complicated problems. These have extraordinary amounts of computing
power required by the large organizations, scientific laboratories aerospace industries,
research laboratories, etc. Examples are CRAY-1 and control Data CYBER 205
supercomputers.
Mainframe Computers
These computers are most expensive, largest and fastest. These computer systems are
used by large organization. Large manufacturing companies, stock market, banks, air lines,
hotels, large hospitals and a number of federal agencies. They can also be used for data entry.
Both scientific and business applications are possible with this largest fastest system.
Mini Computers
Physically smaller computers compared with mainframes. They are used for special
purposes or smaller scale general-purpose work. Mini computer is a computer whose size,
speed and capabilities lie between those of a mainframe and microcomputer. Originally, the
mini computer was used for specific applications, such as controlling a piece of
manufacturing equipment. With advance in software and hardware, coupled with price
reduction, the mini computer has become general purpose. Many are capable of both batch
and real time processing and are attractive to organization of all sizes. For the small business,
the mini computers provide an attractive alternative to processing data manually or
mechanically. Some large companies have turned in their large computer for a number of
mini computers that operate independently at different location. This is called decentralized
data processing.
The capacity of the main memory of the mini computer processor is 16bits. Some mini
computer have 8bits words, and used a few super minicomputer have 32 to 64 bits words.
Examples of minicomputers are IBM8370, IBM AS400, honey well Bull’s DPS700 or
DPS800, NCR tower 32/800 etc.
Micro Computers
It is a small computer some time known as personal computer. It is based on a
microprocessor. These include large memories, rapid updating, multi user and multitasking
capabilities. A microcomputer is often called as a computer on a chip because its entire
circuitry is contained on one tiny silicon chip:
A typical microcomputer has 4KB(Kilo Bytes) to 2MB(Mega Bytes) memory in the central
processor, a keyboard for input data and magnetic medium for storage programs. The speed
of the microcomputer is
4MHz (Mega Hertz) to 25MHz. They usually work with 8bits and 16 bits words. Generally
these are cheap computers.
The microcomputer contains the same type of hardware and software as large computer
system. Example of microcomputers are IBM PC, XT/AT, PS/I, PS/2 and apple Macintosh,
TRS-80.
Memory
Unit A.L.U
C.P.U
Control Unit (C.U):
Control Unit controls the execution of instructions given to the computer. It fetches
program instructions and data from the memory. It decodes an instruction, executes it and
then passes control to the next instruction to be executed.
Control Unit also co-ordinates the input /output operations of the CPU. For Example:-
it receives data from the input device and sends it to the main memory. It transfers data from
the main memory to the Arithmetic Logic Unit (ALU). Finally, it sends the results to the
main memory or to the output unit.
INPUT/OUTPUT DEVICES
Q. # 7 What are Input Devices? Give a Brief Description of Most Common Input
Devices.
Input Devices
The devices that are used to enter data and instructions into the computer system are
called input devises. Before data or instructions are entered inside the computer, they must be
converted into computer code. The input devices take data and instructions, convert them into
the computer code and then store them into the main memory. Some of the mainly used input
devises are:
Key Board
Keyboard is the most commonly used input device. It is used to enter data and
program instructions into the computer.
The keyboard is like a typewriter. Though the panel of keys on keyboard is divided
into four parts, which are given below with alphabetic characters A to Z and numeric digits
‘0’ to ‘9’ and many other keys with special functions.
• The Numeric Alphanumeric and Character keypad
• The Numeric Keypad
• The Special Function keypad
• Screen Navigation and editing key
Mouse
Mouse is an input device. It used for controlling screen cursor. It has two or three
buttons on its top and a ball inside its body. The ball rotates as the mouse is rolled over a flat
surface.
Normally, a pad is used as a flat surface. As the mouse is rolled over a flat surface or
a mouse pad, the mouse cursor or pointer moves on the screen. A command or an option on
the screen is selected by pointing the mouse cursor on it and clicking one of the buttons of the
mouse.
Digital Scanner
Scanner is an input device. It is also called Optical Reader or Digital Scanner. It scans
or reads text and pictures printed on a paper and enters them directly into the computer
memory.
The advantage of a scanner is that the user need not type the input data in. This is a
fast and accurate method for entering data into the computer. The scanner takes
electronic images of text or pictures from the paper. It breaks each image into light and dark
dots and stores them into the computer memory in machine codes.
Joy Stick
A joystick is used for controlling the cursor movement for execution of the video
game programs. Most of the personal computers accept inputs from joystick. It is mostly used
in games.
A simple Joystick consists of a long handle with four micro-switches arranged in four
directions namely, east, west, north and south with respect to the joystick. When the joystick
is moved in any of these directions, the switch in that direction is activated. This result
passing of a signal to the cursor, which moves in the screen in the directions in which the
stick is moved. The distance moved by the cursor depends upon the strength of the signals,
which can be controlled by the joystick.
However, if the joystick is moved in northeast direction, the switches in both, north and east
directions are activated and cursor moves accordingly. In other words activating the
appropriate direction switches controls the direction of the cursor movement. Whenever the
joystick is moved, the micro-switch produces a “clock” sound indicating the activation of the
particular direction switch.
Electric Light Pen
A light pen is an input device attached to some video display terminal. It consist of a
photo-cell placed in a small tube which can sense a position on display tube when the end of
the pen is held against the screen. In specially designed display screen, data can be entered
with a light pen. When this electric light pen is brought near the screen, the light emitted is
sensed by the photocell. The electrical response is communicated to the computer to
determine the part of the displayed items, which is exciting the photocell. A spot appears on
the display screen at the location determined by the position of the pen. A computer program
compares the dot position generated by the device with computer-generated data. In this way
new data can be entered or existing data can be modified.
Digital Camera
A digital camera is also used as an input device. It is used to input pictures directly
into the computer. Like traditional cameras, digital cameras have a lens, a shutter and an
optical viewfinder. In digital cameras, image falls on a charge-coupled device (CCD). A
photosensitive computer chip transforms light patter4ns into dots. A high quality digital
camera divides a picture into millions of dots. After the image has been captured, it is saved
into a removable memory cad or on a floppy disk
The pictures taken with digital cameras are generally not of very high quality. These
pictures are usually used for viewing on the computer screen or for web publishing.
Q. # 8 What Are Output Devices? Briefly Describe Various Types of Output Devices.
Output Devices
The devices that are used to receive processed data from the computer are called
output devices some of the mainly used output devices are:
Monitors or Visual Display Unit (VDU)
The monitor or Visual Display Unit (VDU) is the most commonly used output device.
It is like a TV screen. It can display alphanumeric characters, special characters and graphics.
The screen uses a Cathode Ray Tube (CRT). CRT in color monitors consists of three
guns, one each for red, green and blue color. These guns generate red, green and blue light on
the screen. The combination of these three colors makes the full color spectrum and display
bright colored picture. These types of monitors are also called RGB monitors.
Printers
Printers are used to produce output in the form of text and graphics on paper. The
output on a paper is called hardcopy. Printers are the most commonly used output devices for
making hard copies of the output.
Different printers have different printing mechanism, depending upon their printing
technique, printers are classified into two groups:
1. Impact Printers
2. Non-impact printers
Impact printers print on the paper with the strikes of hammer or pins on a ribbon. These
printers work like a typewriter; they are mostly used with personal computers.
Non-Impact printers use thermal, electrostatic, laser and inkjet technologies for printing.
These printers are faster and produce high quality output as compared to the impact printers.
Dot matrix printers are also used to create character shape of alphabets of other
languages such as Urdu, Arabic, Chinese and Hindi etc. The printing speed of dot matrix
varies from 200 to 1000 or more characters per minute. Dot matrix printers are mostly used
with personal computes because they are less expensive. They also have the ability to print
graphics such as charts and pictures. The characters with different fonts can also be printed.
LASER Printers have very fast print speed. The printing speed of these printers ranges
from 5 to 300 pages per minute. Laser printers produce a very high quality text and graphics.
Color laser printers are also available to print text and graphics in different colors.
Ink-Jet Printers
An Inkjet printer is a recent invention. It prints by shooting very tiny drops of ink on
the paper to form a character. Ink Jet printers are considerably slower than LASER printer
and can print at speed ranging from 1 to 6 pages per minute. They are cheap printers. The
cost of printing one page on an inkjet printer can be two to four time costly then LASER
printing.
Plotters
The plotter is an output device. It is an example of non-Impact printer. The purpose of
plotter is drawing diagrams, designs, pictures, patterns and symbols. Some plotters can
automatically pick up a new pen and draw in as many as some different colors.
ROM stands for Read only memory. The instructions written in ROM can only read
but can’t be changed or deleted. It is not possible to write new information or instructions
into the ROM. This is the reason why it is called Read Only Memory.
ROM stores data and instructions permanently. When the power is turned off, the
instructions stored in ROM are not lost. The ROM is, therefore, also called non-volatile
memory.
The instructions are written into the ROM chips at the time of its manufacturing.
When the computer is switched on, the instructions in the ROM are automatically loaded into
the memory of the computer. These instructions prepare the computer for human users.
RAM is used to store data and program instructions being executed the computer.
RAM can’t store data and instructions permanent. When the computer is turned on, it uses
RAM to Write and Read data and program. When the computer is turned off, all programs
and data are erased from the RAM. It is, therefore, also known as volatile memory.
Magnetic Tape
Magnetic tape is the oldest device used for storing data permanently. It is made of
plastic that is coated with magnetic material. The data is stored on the magnetic tape in the
form of magnetic spots.
The process of reading and writing data on the tape is very slow. The amount of data that can
be stored on a tape depends on the length, type and density of the tape. Magnetic tapes are
used in reels of different sizes, e.g. 200, 600, 122 and 2400 feet in length etc. On a 2400 feet
reel, 120 million characters can be stored.
Tape drives are used to read and write data on the tape.
storage. Before storing data or programs on the disk, the disk is prepared. The preparation of
a disk for data storage is known as formatting. Without formatting, a disk can’t store data.
Formatting is done with the help of a special program in the operating system. The
operating system divides the disk in to different circles called tracks. Each track is further
divided into sectors. The operating system labels sector of each track with an address. The
data is stored in sectors. In one sector 512 bytes are stored. The computer goes directly to the
specified sector and reads or writes data.
The main advantages of magnetic disks are:
1. Data can be accessed directly or randomly in a disk.
2. A large amount of data can be stored in a small area.
3. It has a faster data accessing speed.
Magnetic disks are nowadays available in the following four sizes and types.
1. 5.25 inch Mini Floppy Disk.
2. 3.5 inch Micro Floppy Disk.
3. ZIP Disk.
4. Hard Disk or Fixed Disk.
/write data on a ZIP disk. ZIP disks are usually used to keep backup of data of to move large
data from one computer to another.
can read smaller holes on and optical disk. Small size holes on the disk surface increases its
data storage capacity. A DVD can store data up to 5 GB. Its storage capacity is seven times
more than that of the CD ROM.
COBOL
COBOL stands for Common Business Oriented Language. It was specifically
designed for business applications. It is suitable for managing large amount of data and
records.
BASIC
Basic stands for Beginners All purpose Symbolic Instruction. The students mainly use
it in educational institutions. It is very easy to learn and use.
PASCAL
This language is named in the honor of Pascal, a French Mathematician who invented
the first mechanical calculator. This language is suitable for both scientific and business
applications.
C Language
C-language is a general-purpose language. It was developed at Bell Laboratories in
the USA, in the early 1970s. The majority of application software and system software are
developed in the C Language. Worksheet packages like Lotus- 123 and Excel, Database
Packages like dBase, FOX Pro and Operating Systems like UNIX were prepared in C.
Object Oriented Programming Languages
Object Oriented Programming (OOP) is the latest method for writing computer
programs. In object oriented programming, a computer program is written as a collection of a
number of objects. Each object performs a specific task. It consists of data and functions. The
functions are also called methods. The function or methods are written to manipulate the data.
The programs written in object-oriented programming are easy to understand and modify. It
is also an easy method of writing a computer program. Object Oriented Programming is
performed in an object oriented programming language.
The most commonly used Computer Object Oriented Language are:
✓ PASCAL with objects
✓ C++
✓ JAVA Objects Language
Microsoft Windows
Windows is a graphical user interface operating system. It is multi-user and
multitasking environment and it can run more than one program simultaneously and more
than one user can work on it simultaneously. Nowadays, commonly used application
programs like WinWord, Excel, Power Point, and Internet Browser are written for Windows
environment.
DATA COMMUNICATION
Q. # 25 What is Data Communication? Briefly Describe Basic Elements of a
Communication System
Data Communication System
The transfer of data or information from one location to another is called data
communication. In this process data is sent electronically from one location to another.
Elements of Data Communication System
Three basic elements are needed for this process. These are:
✓ Transmitter or sender,
✓ Receiver
✓ Transmission medium.
Transmitter:
The computer or device that is used for sending the data is called transmitter. In
electronic data communication, computer is usually used as transmitter.
Receiver:
The device or computer that receives the data is called receiver. The receiver can be a
computer, printer or a fax machine.
Medium:
The means through which data is sent from one location to another is called
transmission medium. If the receiver and the transmitter are within a building, a wire
connects them. If they are located at different locations, they may be connected by telephone
lines, fiber optics or microwaves.
Communication Protocols
The set of rules for exchange of data between computers connected in a network is
called network is called network protocols or communication protocols. The data
communication software are used to transfer data from one computer to another. The
software that follows same communication protocols can communicate and exchange data.
The communication protocols perform the following function to ensure exchange of data
between two computers.
Simplex Mode
In simplex mode, data is transmitted in only one direction. A terminal can only send
data and cannot receive it or it can only receive data but cannot send it. Simplex mode is
usually used for a remote device that is meant only to receive that. It is not possible to
confirm successful transmission of data in simplex mode. This mode is not widely used.
Receiver Sender
Alphabetic Data
Alphabetic Data consists of only capital letters (A to Z), small letters (a to z) and
blank space. It is also called non-numeric data. Examples of alphabetic data are:
Farzana Shaheen, Pakistan etc.
Alphanumeric Data
Alphanumeric Data consists of digits (0 to 9), alphabets (both capital and small
letters) and special characters or symbols etc. For example,
457, 1BA4, $460, Rs.6000, 12.3%, Pakistan, Amir Sheikh
COMPUTER NETWORKING
Q. # 31 What is a Computer Network?
Computer Network
Two or more computers connected together through a communication medium form a
computer network. The computers are connected in a network to exchange information and
data. The computers connected in a network can also use resources of other computers.
Q. # 34 Describe The Star Topology. Also Describe Its Advantages and Disadvantages.
Star Topology
In star topology, all computers or nodes are directly connected to a central device. The
central device that connects the nodes is called hub.
Advantages
1. All computers on the ring have equal access to the network.
Disadvantages
1- Failure of one computer can affect the whole network.
2- It is difficult to troubleshoot the ring network.
3- Adding or removing a computer affects the whole network.
The network makes star topology. The computers are usually connected through UTP
cables. The maximum length of UTP cable through which it can transmit data is 100 meters.
This means that no computer should be more than 100 meters away from the hub. Because of
this limitation, such networks are used to connect computers placed in one building and are
called Local Area Networks. The figure below shows a local area network (LAN).
A LAN can have more than one hub. A UTP cable or a fiberglass cable can be used to
connect two hubs. The cable connecting two hubs is called spine. If fiberglass cables are
used, the two hubs can be several kilometers apart.
Use and Benefits of LAN
There are several uses and benefits of local area networks. Some of them are:
❖ Each computer in the network can use the resources of other computers.
❖ The information moves directly from computer to computer. This saves time and
increases efficiency of an office.
❖ Computers can share resources and devices such as fax modems, printers. Thus one
office may have only one high quality laser printer and all computers can use it.
❖ The data transmission speed in a LAN is very high. It varies from 2 to 1000 million
bits per second (Mbps). 8 bits represents one byte or one character. One byte usually
takes ten bits (i.e., 8 data bits + 1 star bit + 1 stop bit). Thus maximum data transfer
speed is about 100 million bytes per second (100 MBps). However, since many
computers share the same communication medium simultaneously, the data transfer
rate is much less than this. It is generally a few hundred thousand bytes per second.
❖ In addition to data transmission, human voice can also be transmitted over a LAN.
Most widely used protocol in WANs is CCITT X.25. It provides high data
transmission rate. Several hundred million bytes of data can be transferred through WAN
links.
THE INTERNET
Q. # 39 What is The Internet? Describe Its Brief History.
The Internet
The Internet is a network of a large number of computer networks around the world. It
is a data communication system. Through this system millions of computers have been linked
together.
The Internet consists of both the hardware and the software. The hardware comprises
the computer and the connections between them. The software consists of programs that let
these computers communication with each other.
More than 65,000computr networks and 20 million computer are permanently
attached to the Internet. Connections to the Internet are available in about 150 countries and
50 people have access to it.
All three major media of communication are used to connect the networks and the
computers in the Internet, i.e.
➢ Telephone
➢ Fiber-optic cables
➢ Satellite communications
There are generally three types of computer in the Internet. These are host, server and user.
Host
Store information in the form of text, pictures, sound and video films.
Server
Allow users to connect to the Internet. Servers also help the user to store and share
information on the Internet.
User
Use the information stored on the hosts and pass messages to other computers attached to
the Internet.
Who Developed the Internet?
The government of the United States started a project in 1960s to develop an
efficient system of data communications. Under this project, a network of 4 computers was
established in September 1969 in the United States.
Who Owns the Internet?
There is no single organization or government who controls the Internet.
Different government agencies, universities, research organization and business concerns run
the host computers.
Who Uses the Internet?
Anyone who has an access to the Internet can obtain information available on
the Internet. Millions of people now have access to the Internet. They use it to get
information, play games and communicate messages to friends and family. Many business
companies also use the Internet to advertise and sell goods.
How to connect the Internet?
The Internet can be accessed by connection a personal computer to the server
of an Internet Service Provider (ISP) through telephone lines. To link up to an ISP, following
is required:
Computer
Any computer can be used but it is easier to use a computer running under windows
Operating System.
MODEM
It is an electronic deices that links a user computer to the server of the ISP via
telephone lines.
Dial up Software
Dial up networking software establishes the server of the ISP.
This software is built into the Windows Operating System.
Web Browser
A web browser is required for browsing or surfing the Internet. Following are web
browsers
Internet Explorer, Netscape Navigator, Opera, NeoPlanet etc.
Membership of ISP
Membership of an ISP permits a member to connect to its server.
HTTP:
It is the standard protocol through which a URL is accessed. The “HTTP” is the
abbreviation of Hyper Text transfer protocol.
WWW
Indicates a World Wide Web site.
Savings Specifies name of the organization, Gov Classifies type of the organization
The most common types of the organization:
Com Commercial
Edu Educational
Net Network provider
Gov Government department
Mil Military
Org Non-commercial organization
PK shows the country of origin. It is not used for the US based and international organization
.Some leading country codes are:
Au Australia
Ca Canada
Fr France
De Germany
Hk Hong king
Jp Japan
Uk United Kingdom
It Italy
Sa Saudi Arabia
http:// The URL begins with the protocol. http stands for Hyper Text Transfer
Protocol.
This indicates how the document is to be transmitted.
www.intel.Com It specifies the name of the domain or the server provider that contains
the document.
Home/index. Html Last part of the URL specifies the directories, sub-directories and file
name of the web document. The extension html indicates the document has been prepared in
Hyper Text Markup Language.
How To Access A Web Page
Each web page is stored at its Universal Resource Locator. Any user or client
computer connected to the Internet can access these documents. Viewing these pages is called
Web Browsing. Web Navigation or Web Surfing. A special program called browser is used to
view these files. Most commonly used browser is Internet Explorer and Netscape navigator.
Once a client computer on the Internet addresses an HTML document, the document is
automatically transferred to the client computer and its browser begins to display it. The
client can retrieve and view the information from the host computer. The retrieving of data
from host computer is called the downloading. The user can store the accessed data from
Host computer on his own computer permanently. The downloaded data may be in text
format, pictures, sound or video clip.
E-Mail Address
E-mail address is person-to-person communication. Every person that uses the
internet gets unique e-mail address. The ISP usually provides the e-mail address when its
membership is obtained. E-mail to person is sent to his or her e-mail address.
[email protected]
Name It specifies the name of the person. It may be the
Name of an organization. It is usually based upon
User’s real name. At one site, it is the unique name
And is given to one person only.
Site address It specifies the address of the Internet service provider (ISP)
To which the user belong.
For example, my name is Tauqueer Qureshi and I have an account with world on line
(WOL). My user name is Tauqueer and the site address of the ISP is wol.net.pk.Therefore,
my e-mail address will be: Tauqueer@wol. Net.pk
It is read as: Tauqueer at WOL dot Net dot Pk
Advantages of E-Mail
E-mail has several advantages compared to ordinary mail. Some of these are:
1- It reaches the destination in a few minutes.
2- It is cheep to use .It some one has an Internet account, he gets this facility without
any extra cost.
3- One message can be sent to any number of persons.
4- Pictures, document, and other computer files can also be sent along with the
message.
5- It can be sent anywhere in the world to anyone who uses the Internet.
Disadvantages
E-mail also has some limitation.
E-mail does not always reach its destination. A slight error in the e-mail address
can prevent its delivery. Also many people do not check their e-mail regularly.
Thus whereas an envelop gets read when it reaches a person, e-mail message need
not be read immediately.
Q. # 42 What is E-Commerce?
E-Commerce
To carry out financial transactions using wide area networks is called e-commerce or
electronic commerce. With the help of wide area networks, business can be carried our on
international basis. Goods can be purchased and sold from anywhere in the world .The
business using e-commerce is growing at a rapid rate. It is estimated that volume of e-
commerce is increasing by 10%to 15% every month.
Following are some examples of e-commerce activity.
Online Shopping
Manufacturers place a list of their products on their web page on the Internet. They
also place pictures, qualities, and prices of the items; any one can browse the site, and place
order to purchase any items. The manufacturer then sends the purchase goods through mail.
This is called online shopping.
The volume of online shopping is increasing. All large departmental stores in
developed countries are already providing online shopping facility to their customers.
Online Banking
In online banking a customer can use the Internet to access his account in a bank. He
can check his balance and can transfer money from his account to another account. He can
also pay their utility bills over the Internet.
Activation of a Virus
The running of a virus program residing in a computer is called activation of the virus.
The virus program executes when it is activated. The method of activation of a computer
virus is defined in the virus program itself.
Different computer viruses are activated different ways. For example, some viruses
activate on a fixed date. Usually these viruses are part of some application software. When
the application software date matches the virus program date, the virus is activated. For
example, Friday the 13th virus activates only if the date is 13th and the day is Friday.
How Computer Gets a Virus
Transfer of a virus program into the hard disk of a computer is called infecting of the
computer with a virus.There are many ways through which a computer can get a virus. Most
common ways are: Nowadays, the most common way of transfer of virus to a computer is
through the Internet. For example,
❖ A virus can be attached to an e-mail message. When this e-mail message carrying the
virus is downloaded onto a computer, the virus is also downloaded.
❖ A virus can also be attached to some software on the Internet. When this software is
downloaded from the Internet into your computer, the virus is also transferred.
When a virus-affected file is copied from one computer to another through a floppy disk, the
virus is also transferred.
Action of a Virus
Different computer viruses create different problems in different ways. The most common
problems are:
❖ A virus may destroy all data stored in the hard disk by either formatting it without
warning or by destroying some of its sectors.
❖ A virus may change the boot sector of the hard disk. If the boot sector of a disk is
affected, it cannot boot the computer.
❖ The computer viruses are automatically loaded into the main memory of the computer
and remain in the memory. This slows down the data accessing speed of the
computer.
❖ A virus can destroy BIOS of the computer.
How To Control Virus Infection
Following a few precautions can prevent damage to the computer. These precautions
are:
✓ Install latest anti-virus software on the computer.
✓ Always check a floppy disk with anti-virus software before using in the computer.
✓ Never open an unknown e-mail sent to you in your e-mail box.
✓ Always use the licensed software.
✓ The floppy disk that has important information or program can be protected from
viruses by making it read only. The disk becomes read only if the write-protected
notch is closed.
Q. # 46 What Steps Can be Taken to Improve The Working Life of The Computer?
The working life of the computer can be improved by observing the following precautions:
1) The computer should be placed in an air-conditioned room.
2) The computer room should be clean and free from dust.
3) Handle the computer carefully.
4) Do not disturb the computer while it is on. Any jerk can damage the hard disk or any
other part of the computer.
5) Shut down the computer properly. Follow the correct procedure to shutdown the
computer after closing all opened programs and files. If the computer is shut down
abruptly, the hard disk will be damaged.
6) Do not place the floppy disks near the computer monitor. The monitor of the
computer produces a very strong electromagnetic field. This electromagnetic field can
damage the data stored in the disks.
1) Check the power cable of the computer and the power outlet.
The power cable may be loose or not connected.
2) Check all external connections of the monitor, keyboard, and mouse with the CPU.
3) If you are working on the network and your computer gets disconnected from the
network, it may be that someone has pulled the network cable and the computer has
been disconnected from network.
Q. # 48 Why the Computer Should be Properly Shut Down? What Happens if the
Computer Shuts
Down Suddenly?
It is always necessary to shut down the computer properly. Before switching off the
computer, the running programs and the open files should be closed. Computer operating
systems usually provide a method for shutting down the computer operating systems usually
provide a method for shutting down the computer. In Windows 95/98/2000, shut down is
provided in the start Menu. When the shut Down switch is activated, the Window does the
following:
It closes down all open files and running programs. It places the heads of the hard
disk in the safe area. If the heads are allowed to stay on data area, a small shock to the hard
disk may damage the data.
In case of sudden power failure, the computer shuts down suddenly. Sudden power
switch-off may cause the following:
1) The open data files and application programs may be damaged.
2) Some computer component may be permanently damaged due to sudden power
fluctuation.
3) Windows operating system may get corrupted.
The new version of windows operating system i.e. Windows 98, 2000 and Windows
NT, automatically detect whether the computer was not shut down properly last time, it
scans the hard disk and fixes the error developed on the hard disk due to improper shut
down.
Q. # 49 What is UPS?
Un-Interruptible Power Supply
UPS stand for Un-interruptible Power Supply. It is device that takes electric power
from the switchboard and provides continuous power supply. It is attached to the computer to
protect it from power fluctuations and sudden power breakdowns. UPS contains batteries.
These batteries are charged when the UPS gets power from the main supply. When the main
supply stops, the UPS gets the power from the batteries. It converts it to 220V and supplies it
to the computer. The change of the source is without any break. The duration for which a
UPS can supply power during power breakdown depends upon its type. Its duration ranges
from 30 to 45 minutes.
UPS is attached to the computer for the safety of computer against power failure or
power fluctuations. UPS become necessary in computer networks and are attached with the
Central computer or Server. This provides safety to data of users on the network.
computers in a police department hold records of people. The computers in a bank hold
record of financial dealings of persons.
The personal data is maintained on computers of different organizations but the owner
of the personal data is the person to whom it belongs. This data can be used only for the
purpose for any other purpose is against the privacy of a person.
Data Protection Laws
Anyone who has access to a computer system can get personal information about a
person. He or someone else may use this information against that person. It is, therefore,
important that measures be taken to prevent misuse of such personal data. In developed
countries, the law provides such data protection.
For example, in the United Kingdom, the Data Protection Act provides a framework
of data protection. Main features of this Act are:
1. Proper measures shall be taken to prevent unauthorized access, alteration,
disclosure and loss of personal data.
2. The information in personal shall be obtained and used for lawful purpose only.
3. The personal data can be used only for the purpose for which it has been
obtained.
4. The personal data shall be deleted from the computer if it is no longer needed.
5. Personal data about a person cannot be obtained and processed without his or her
permission
6. The person whose data is maintained has the right to have access to his or her
personal data.
It is clear that the real owner of personal data is the person to whom it belongs. The
data protection law protects the privacy of a person. It also makes it sure that the personal
data of a person is not misused.
with the license to use it on the fixed number of computers. The cost of a site license is less
than buying equal number of individual copies of a program.