0% found this document useful (0 votes)
23 views

Computer notes (1)

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Computer notes (1)

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Vocational Training Institute Layyah

INTRODUCTION TO COMPUTER SYSTEM

Q. # 1 What is a Computer?
Computer is an electronic device that is used to solve various problems according to a
set of instructions given to it.
History of Computer
Computer was gradually developed. First electronic computer was developed in 1946
at the University of Pennsylvania, USA. It was a huge machine, Ten feet High, Ten feet Wide
and some hundred feet long. Since the invention of computer, improvement in its designed
took place in four generations spanning over a period 30 year. IBM made first personal
computer in 1981. Since then revolutionary developments in the PC technology have brought
computer within the reach of a home and office user. Today a personal computer is affordable
and can solve our daily computing problem.

Q. # 2 Write a Note on Generations of Computer?


Generations of Computer
The first electronic computers were produced in 1940s.Development of a computer is
a continuous process. Since then a series of radical breakthrough in electronics has occurred.
First Generation Computers (1946-59)
The duration of first generation computer is from 1946 to 1959. First generation
computer utilized the vacuum tube electronic computers and thermionic valves. They were
large in size and used to generate a lot of heat. Low capacity storages consisted of magnetic
drums and delay lines. Their processors were operated in milli seconds and speed range. The
computers ENIAC, EDVAC, UNIVAC and Mark-1. The memory size of these computers
was limited. They were bulky in size, costly and unreliable. Early computers using electronic
valves (circa 1940s).
Second Generation computers (1959-65)
The second Generation Computers were in operation during 1959 to 1965. They were
based on semiconductor diodes and transistors. They were smaller in size as compared to
those of the first generation computers and generated comparatively less amount of heat. A
number of hardware improvements higher capacity internal storage consisted of core memory
storage instead of magnetic drum and delay lines. Their processors were operated in the
micro second speed range. Transistors replaced vacuum tubes and gave birth to the second
generation of computer like and more reliable as compared to the first generation computers.
Third Generation Computers (1965-1973)
Third Generation is the generic term used to describe those machines in which the
integrated circuit (Ics) replaced the transistor as the basic components. The duration of third
generated computers is from 1965 to 1973. These computers are smaller in size having high
capacity of internal storage with the option of adding more memories. These computers are
more powerful, reliable and compact computers using simple integrated circuits.
They can be used for high-level languages. These machines used more versatile programs
like real time operating system, multiprogramming and database management.
Fourth Generation Computers (Since 1973)
We are now living in the age fourth generation computers. The fourth generation
started from 1973. In this generation the size and cost of computer has dramatically dropped,
where as the memory and the speed of computers has increased drastically. These computers
are based on microprocessor.

Fifth Generation Computers (1990s)

1 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Till fourth generation of computers, the main stress was on improving the hardware
from valves to transistors and then to integrated circuits. However the major shortcoming of
computers, the lack of thinking power was challenging the scientists for a long time. The fifth
generation computers are a step in this direction. These computers will be introduced shortly.

Q. # 3 Write a note on Classification of Computer?


Classification of Computer:
Computers are classified into three categories.
1. Digital computer
2. Analog computer.
3. Hybrid computer.
Digital Computers
A digital computer represents data or physical quantities in the form of discrete
number or digit (e.g. 0,1,2,3…). These numbers are used to perform arithmetic calculations
and also make logical decisions to reach a conclusion depending on the data, they receive
from the user. Digital computers came in many sizes and shapes. In digital computers
quantities are counted rather than measured. In general, digital computers are easy to program
and are in general purpose use.

Analog Computers
Analog computer actually is a measuring device. An analog computer measures
continuous type of data and uses a physical quantity, such as electric current, speed weight
etc. A traditional watch or clock is an analog device in which time is represented in a
continuous fashion.
Hybrid Computers
The third type of computer Hybrid Computer because Hybrid Computer is the
combination of the properties of both analog and digital computers. The computers consist
partly of the components of a digital computer and partly of analog computer to combine the
characteristics of both types (for example speed of analog computers and memory &
accuracy of digital computers). This is usually found in science laboratories as the controlling
device in an industrial process.

Q. # 4 How Many Types of Digital Computers


Classification of Digital Computers:
Digital computers are divided into following categories.
• Super Computer.
• Main Frame Computers.

2 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

• Mini Computers.
• Micro Computers.

Super Computers
Super computers are the largest, fastest and most expensive computers developed in
1980s to handle complicated problems. These have extraordinary amounts of computing
power required by the large organizations, scientific laboratories aerospace industries,
research laboratories, etc. Examples are CRAY-1 and control Data CYBER 205
supercomputers.
Mainframe Computers
These computers are most expensive, largest and fastest. These computer systems are
used by large organization. Large manufacturing companies, stock market, banks, air lines,
hotels, large hospitals and a number of federal agencies. They can also be used for data entry.
Both scientific and business applications are possible with this largest fastest system.
Mini Computers
Physically smaller computers compared with mainframes. They are used for special
purposes or smaller scale general-purpose work. Mini computer is a computer whose size,
speed and capabilities lie between those of a mainframe and microcomputer. Originally, the
mini computer was used for specific applications, such as controlling a piece of
manufacturing equipment. With advance in software and hardware, coupled with price
reduction, the mini computer has become general purpose. Many are capable of both batch
and real time processing and are attractive to organization of all sizes. For the small business,
the mini computers provide an attractive alternative to processing data manually or
mechanically. Some large companies have turned in their large computer for a number of
mini computers that operate independently at different location. This is called decentralized
data processing.
The capacity of the main memory of the mini computer processor is 16bits. Some mini
computer have 8bits words, and used a few super minicomputer have 32 to 64 bits words.
Examples of minicomputers are IBM8370, IBM AS400, honey well Bull’s DPS700 or
DPS800, NCR tower 32/800 etc.
Micro Computers
It is a small computer some time known as personal computer. It is based on a
microprocessor. These include large memories, rapid updating, multi user and multitasking
capabilities. A microcomputer is often called as a computer on a chip because its entire
circuitry is contained on one tiny silicon chip:
A typical microcomputer has 4KB(Kilo Bytes) to 2MB(Mega Bytes) memory in the central
processor, a keyboard for input data and magnetic medium for storage programs. The speed
of the microcomputer is

3 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

4MHz (Mega Hertz) to 25MHz. They usually work with 8bits and 16 bits words. Generally
these are cheap computers.
The microcomputer contains the same type of hardware and software as large computer
system. Example of microcomputers are IBM PC, XT/AT, PS/I, PS/2 and apple Macintosh,
TRS-80.

Q. # 5 Distinguish Between Computer Hardware and Computer Software?


Computer Hardware:
Computer hardware is physical parts of computer are called computer hardware.
These are the things that can be seen and touched. The CPU, monitor drives, mouse keyboard
printers etc.are examples of Computer hardware.
Computer Software:
A set of computer instruction given to the computer to solve a problem is called
software. The computer instructions are stored inside the computer memory in the form of
binary digits. These instructions can’t be seen or touched and are therefore called software.

Q. # 6 Write a Short Note on Central Processing Unit?


Central Processing Unit (CPU)
CPU is the main part of the computer system. It performs all operations on the data
according to the program instructions. It carries out instructions and tells other parts of the
computer system what to do. It also controls the order of execution of instruction of the
computer program. CPU consists of two main parts:
1. Control Unit
2. Arithmetic & Logic Unit

DATA PROCESSING CYCLE

Memory
Unit A.L.U

Input Data Results

Input Device Output


C.U
Device

C.P.U
Control Unit (C.U):
Control Unit controls the execution of instructions given to the computer. It fetches
program instructions and data from the memory. It decodes an instruction, executes it and
then passes control to the next instruction to be executed.
Control Unit also co-ordinates the input /output operations of the CPU. For Example:-
it receives data from the input device and sends it to the main memory. It transfers data from

4 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

the main memory to the Arithmetic Logic Unit (ALU). Finally, it sends the results to the
main memory or to the output unit.

Arithmetic & Logic Unit (ALU):


Arithmetic Logic Unit (ALU) is a part of the CPU. All arithmetic and logic operation
on the data are perform in the ALU.ALU consists of two parts: Arithmetic section and logic
section.
Arithmetic section
Arithmetic section of the ALU performs basic arithmetic operations such as addition,
subtraction, multiplication and division.
Logic section
Logic section of the ALU performs logical operations.
A logical operation is one in which data is compared. For example, whether the first number
is greater, less then, equal to or not equal to then the second number.

INPUT/OUTPUT DEVICES
Q. # 7 What are Input Devices? Give a Brief Description of Most Common Input
Devices.
Input Devices
The devices that are used to enter data and instructions into the computer system are
called input devises. Before data or instructions are entered inside the computer, they must be
converted into computer code. The input devices take data and instructions, convert them into
the computer code and then store them into the main memory. Some of the mainly used input
devises are:
Key Board
Keyboard is the most commonly used input device. It is used to enter data and
program instructions into the computer.

The keyboard is like a typewriter. Though the panel of keys on keyboard is divided
into four parts, which are given below with alphabetic characters A to Z and numeric digits
‘0’ to ‘9’ and many other keys with special functions.
• The Numeric Alphanumeric and Character keypad
• The Numeric Keypad
• The Special Function keypad
• Screen Navigation and editing key
Mouse
Mouse is an input device. It used for controlling screen cursor. It has two or three
buttons on its top and a ball inside its body. The ball rotates as the mouse is rolled over a flat
surface.

5 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Normally, a pad is used as a flat surface. As the mouse is rolled over a flat surface or
a mouse pad, the mouse cursor or pointer moves on the screen. A command or an option on
the screen is selected by pointing the mouse cursor on it and clicking one of the buttons of the
mouse.
Digital Scanner
Scanner is an input device. It is also called Optical Reader or Digital Scanner. It scans
or reads text and pictures printed on a paper and enters them directly into the computer
memory.

The advantage of a scanner is that the user need not type the input data in. This is a
fast and accurate method for entering data into the computer. The scanner takes
electronic images of text or pictures from the paper. It breaks each image into light and dark
dots and stores them into the computer memory in machine codes.
Joy Stick
A joystick is used for controlling the cursor movement for execution of the video
game programs. Most of the personal computers accept inputs from joystick. It is mostly used
in games.
A simple Joystick consists of a long handle with four micro-switches arranged in four
directions namely, east, west, north and south with respect to the joystick. When the joystick
is moved in any of these directions, the switch in that direction is activated. This result
passing of a signal to the cursor, which moves in the screen in the directions in which the
stick is moved. The distance moved by the cursor depends upon the strength of the signals,
which can be controlled by the joystick.

6 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

However, if the joystick is moved in northeast direction, the switches in both, north and east
directions are activated and cursor moves accordingly. In other words activating the
appropriate direction switches controls the direction of the cursor movement. Whenever the
joystick is moved, the micro-switch produces a “clock” sound indicating the activation of the
particular direction switch.
Electric Light Pen
A light pen is an input device attached to some video display terminal. It consist of a
photo-cell placed in a small tube which can sense a position on display tube when the end of
the pen is held against the screen. In specially designed display screen, data can be entered
with a light pen. When this electric light pen is brought near the screen, the light emitted is
sensed by the photocell. The electrical response is communicated to the computer to
determine the part of the displayed items, which is exciting the photocell. A spot appears on
the display screen at the location determined by the position of the pen. A computer program
compares the dot position generated by the device with computer-generated data. In this way
new data can be entered or existing data can be modified.
Digital Camera
A digital camera is also used as an input device. It is used to input pictures directly
into the computer. Like traditional cameras, digital cameras have a lens, a shutter and an
optical viewfinder. In digital cameras, image falls on a charge-coupled device (CCD). A
photosensitive computer chip transforms light patter4ns into dots. A high quality digital
camera divides a picture into millions of dots. After the image has been captured, it is saved
into a removable memory cad or on a floppy disk
The pictures taken with digital cameras are generally not of very high quality. These
pictures are usually used for viewing on the computer screen or for web publishing.

Q. # 8 What Are Output Devices? Briefly Describe Various Types of Output Devices.
Output Devices
The devices that are used to receive processed data from the computer are called
output devices some of the mainly used output devices are:
Monitors or Visual Display Unit (VDU)
The monitor or Visual Display Unit (VDU) is the most commonly used output device.
It is like a TV screen. It can display alphanumeric characters, special characters and graphics.

The screen uses a Cathode Ray Tube (CRT). CRT in color monitors consists of three
guns, one each for red, green and blue color. These guns generate red, green and blue light on
the screen. The combination of these three colors makes the full color spectrum and display
bright colored picture. These types of monitors are also called RGB monitors.
Printers

7 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Printers are used to produce output in the form of text and graphics on paper. The
output on a paper is called hardcopy. Printers are the most commonly used output devices for
making hard copies of the output.
Different printers have different printing mechanism, depending upon their printing
technique, printers are classified into two groups:
1. Impact Printers
2. Non-impact printers
Impact printers print on the paper with the strikes of hammer or pins on a ribbon. These
printers work like a typewriter; they are mostly used with personal computers.

Non-Impact printers use thermal, electrostatic, laser and inkjet technologies for printing.
These printers are faster and produce high quality output as compared to the impact printers.

Q. # 9 Write A Short Note on Dot Matrix (Impact) Printers.


Dot-matrix Printers
Dot-matrix printer is an impact printer. It makes a hardcopy by printing one character
at a time. It uses 100-300 dots per inch to print output on the paper. The output form the CPU
in digital signals makes the pins pressed forward by a magnetic device and the required
character is printed. The dot-matrix printers also print in color using color ribbons.

Dot matrix printers are also used to create character shape of alphabets of other
languages such as Urdu, Arabic, Chinese and Hindi etc. The printing speed of dot matrix
varies from 200 to 1000 or more characters per minute. Dot matrix printers are mostly used
with personal computes because they are less expensive. They also have the ability to print
graphics such as charts and pictures. The characters with different fonts can also be printed.

Q. # 10 Write A Short Note On Non-Impact Printers.


The types of non impact printers are as follows
• LASER Printers
• Ink Jet Printer
• Plotters
LASER Printers
LASER Printer is a non-impact printer. In these printers, a laser beam prints image of
characters and pictures on the paper. LASER stands for Light Amplification by Stimulated
Emission of Radiation. The laser beam prints an image made up of microscopic dots. The
density of these dots varies from 300 to 2000 Dots Per Inch (DPI). LASER Printers print one
page at a time. They are also called page printers. A full page is assembled in the printer
buffer and its image is printed on the paper.

8 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

LASER Printers have very fast print speed. The printing speed of these printers ranges
from 5 to 300 pages per minute. Laser printers produce a very high quality text and graphics.
Color laser printers are also available to print text and graphics in different colors.

Ink-Jet Printers
An Inkjet printer is a recent invention. It prints by shooting very tiny drops of ink on
the paper to form a character. Ink Jet printers are considerably slower than LASER printer
and can print at speed ranging from 1 to 6 pages per minute. They are cheap printers. The
cost of printing one page on an inkjet printer can be two to four time costly then LASER
printing.

Plotters
The plotter is an output device. It is an example of non-Impact printer. The purpose of
plotter is drawing diagrams, designs, pictures, patterns and symbols. Some plotters can
automatically pick up a new pen and draw in as many as some different colors.

Q. # 11 What is ROM? Briefly Describe its Function in the Computer.


Read Only Memory (ROM)

ROM stands for Read only memory. The instructions written in ROM can only read
but can’t be changed or deleted. It is not possible to write new information or instructions
into the ROM. This is the reason why it is called Read Only Memory.

ROM stores data and instructions permanently. When the power is turned off, the
instructions stored in ROM are not lost. The ROM is, therefore, also called non-volatile
memory.
The instructions are written into the ROM chips at the time of its manufacturing.
When the computer is switched on, the instructions in the ROM are automatically loaded into
the memory of the computer. These instructions prepare the computer for human users.

9 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Q. # 12 What is RAM? Briefly Describe its Function in the Computer.


Random Access Memory (RAM)
RAM stands for Random Access Memory. It is also called primary memory or main
memory.

RAM is used to store data and program instructions being executed the computer.
RAM can’t store data and instructions permanent. When the computer is turned on, it uses
RAM to Write and Read data and program. When the computer is turned off, all programs
and data are erased from the RAM. It is, therefore, also known as volatile memory.

Q. # 13 What Are Computer Storage Devices?


Storage Devices
The internal memory or primary storage of the computer is volatile. The data or
information cannot be stored in it permanently. When the computer is switched off, the
contents of the internal memory are erased. Storage devices are non-volatile memories. They
are used to store data and program permanently. A large amount of data can be stored
permanently on these devices. They are also called secondary storage, auxiliary storage,
backing storage or external storage.
The input/output devices are used to store and retrieve data on the secondary storage.
There are three types of secondary storage device:
1. Magnetic Tape
2. Magnetic Disk
3. Optical Disk

Q. # 14 Write a Short Note On Magnetic tape.

Magnetic Tape
Magnetic tape is the oldest device used for storing data permanently. It is made of
plastic that is coated with magnetic material. The data is stored on the magnetic tape in the
form of magnetic spots.
The process of reading and writing data on the tape is very slow. The amount of data that can
be stored on a tape depends on the length, type and density of the tape. Magnetic tapes are
used in reels of different sizes, e.g. 200, 600, 122 and 2400 feet in length etc. On a 2400 feet
reel, 120 million characters can be stored.
Tape drives are used to read and write data on the tape.

Q. # 15 What is Magnetic Disk?


Magnetic Disk
A magnetic disk is a thin, circular Mylar (plastic like material) or metal plate coated
with magnetic material. Like the magnetic tape, it is also used to store data permanently in
the form of magnetic spots. Nowadays, most computers use magnetic disk as a secondary

10 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

storage. Before storing data or programs on the disk, the disk is prepared. The preparation of
a disk for data storage is known as formatting. Without formatting, a disk can’t store data.
Formatting is done with the help of a special program in the operating system. The
operating system divides the disk in to different circles called tracks. Each track is further
divided into sectors. The operating system labels sector of each track with an address. The
data is stored in sectors. In one sector 512 bytes are stored. The computer goes directly to the
specified sector and reads or writes data.
The main advantages of magnetic disks are:
1. Data can be accessed directly or randomly in a disk.
2. A large amount of data can be stored in a small area.
3. It has a faster data accessing speed.

Magnetic disks are nowadays available in the following four sizes and types.
1. 5.25 inch Mini Floppy Disk.
2. 3.5 inch Micro Floppy Disk.
3. ZIP Disk.
4. Hard Disk or Fixed Disk.

Q. # 16 What is Floppy Disk?


Floppy Disk.
Floppy diskette is also called simply a diskette or a disk. It is a small flexible plastic
disk that is coated with magnetic that is coated with magnetic material. It was invented by
IBM in early 1960s.The floppy disks are available in the two sizes 5.25-inch diameter disk
and 3.5-inch diameter disk. The 3.5-inch diameter disk is also called micro floppy disk. It is
covered in a hard plastic jacket. The read/write window of micro disk is always closed with a
metal shutter. The shutter and the hard plastic jacket provide the protection to disk against
damaging from dust and mishandling. The shutter automatically opens when the disk is
inserted into the disk drive.
The jacket of the micro disk has a notch at one of the corners. Moving a small tab
upward closes the notch, and the micro disk becomes write-protected. Data can only be read
from a write –protected disk. The 3.5-inch micro disk is shown in the figure below.

Q. # 17 What is a ZIP Disk?


ZIP Disk
ZIP disk is removable magnetic disk. It is like a micro floppy disk. It has a large
storage capacity. One ZIP disk can store about 1000 MB of data. ZIP drive is used to read

11 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

/write data on a ZIP disk. ZIP disks are usually used to keep backup of data of to move large
data from one computer to another.

Q. # 18 Describe the Construction and Working of the Hard Disk?


Hard Disk
The hard disk is also called the fixed disk. It consists of one or more metal plates
that are coated with magnetic material. The plates of the disk are fixed permanently in the
drive.
The hared disk has following characteristics:
➢ The storage capacity of the hard disk is much greater than that of the floppy disk. In
microcomputer, the storage capacity of a hard disk is generally 15 Gigabytes (15 GB) or
more.
➢ The data access speed is much faster than that of the floppy disk.
➢ The hard drives are sealed and there are less chances of disk damage due to dust and
mishandling.
Nowadays, most application programs and operating systems require a hared disk for
installation.

Q. # 19 Differentiate between Sequential Access Devices and Random Access Devices.


Devices.
Sequential access devices store data in a sequence. Data is accessed by examining all
the data in the sequence till the desired data is reached. This results in wasting of CPU time
and is not an efficient method of data storage. Magnetic tape is an example of sequential
access devices. Random access devices allow direct storage of data without examining any
other data. These devices are also called direct storage devices.
Magnetic disk and computer memory are random access devices.

Q. # 20 What is an Optical Disk? Distinguish Between CD ROM and DVD ROM.


Optical Disk
Optical disks are also called Compact Disk (CD). The optical disk uses laser
technology to store data. The word ‘laser’ stands for Light Amplification through Stimulated
Emission of Radiation. Laser is a highly concentrated beam of light. It is used to make tiny
holes on the surface of the disk. These holes represent digital or binary data. The presence of
a hole represents a ‘1’ and absence of it represents a ‘0’.
An Optical drive reds data by focusing laser beam on the surface of the disk. The
drive detects light fluctuations caused by the holes and translates these into binary data. An
optical disk can store large amounts of data. It is removable and can be used from one
computer to another like a floppy disk. The data storage on the compact disk is safe and it is
not damaged by the magnetic field.
Several types of compact disks are available. Two most common types are:
1. CD-ROM
2. DVD-ROM
CD-ROM
CD-ROM stands for Compact disk Read Only Memory. The data on a CD-ROM can
only be read and cannot be removed or changed. It is the most commonly used type of
optical disk. It has the storage capacity of up to 650 MB. It is used for storage large amounts
of data and application programs.
DVD ROM
DVD stands for Digital Video Disk Red Only Memory. A DVD operates similar to a
CD ROM disk. A DVD uses a laser with shorter wavelength. A laser with shorter wavelength

12 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

can read smaller holes on and optical disk. Small size holes on the disk surface increases its
data storage capacity. A DVD can store data up to 5 GB. Its storage capacity is seven times
more than that of the CD ROM.

Q. # 21 What is Computer Software? What are it Various Types?


Computer Software

A set of computer instructions given to the computer to solve a problem is called


software. The computer instructions are stored inside the computer memory in the from of
binary digits. They cannot be seen or touched and are therefore called software or computer
software. The computer software is prepared in computer programming languages. Word
processing programs and Spreadsheet programs are examples of computer software.

Q. # 22 What Are Computer Programming Languages? Briefly Describe Their Types.


Programming Languages
The computer language is a way of communication between the user and the
computer. Computer instruction are written in programming languages. Each computer
language has certain rules. These rules are called the syntax of the language. The computer
instructions are written in a computer language according to the syntax t of that language.
Types of Programming Languages
There are two main types of computer programming languages. These are:
❖ Low Level Languages
❖ High Level Languages

Low Level Languages


The computer programming languages that are close to the machine code are called
Low Level Languages. The machine language and assembly language are examples of low-
level languages. Writing a computer program in low-level language requires vast knowledge
of the computer hardware. The programs written in Machine Languages are very fast in
execution but these languages are difficult to lean.
These languages rare generally used to write special programs that control the
computer hardware.
High Level Languages
The computer programming languages which are close to human languages are called
high-level languages. There are two types of high-level languages. These are procedural
languages and object oriented languages.
Procedural Languages.
In procedural languages, the computer programs follow a predetermined procedure.
The computer instructions are executed in the order in which they are written. The programs
written in these languages tell the computer what to do and how to do. The most popular
high-level procedural languages are:
Fortran
Fortran stands for Formula Translation. It was developed in 1957, and is the oldest
high-level programming language. It is mainly used for scientific and engineering
applications.

13 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

COBOL
COBOL stands for Common Business Oriented Language. It was specifically
designed for business applications. It is suitable for managing large amount of data and
records.
BASIC
Basic stands for Beginners All purpose Symbolic Instruction. The students mainly use
it in educational institutions. It is very easy to learn and use.
PASCAL
This language is named in the honor of Pascal, a French Mathematician who invented
the first mechanical calculator. This language is suitable for both scientific and business
applications.
C Language
C-language is a general-purpose language. It was developed at Bell Laboratories in
the USA, in the early 1970s. The majority of application software and system software are
developed in the C Language. Worksheet packages like Lotus- 123 and Excel, Database
Packages like dBase, FOX Pro and Operating Systems like UNIX were prepared in C.
Object Oriented Programming Languages
Object Oriented Programming (OOP) is the latest method for writing computer
programs. In object oriented programming, a computer program is written as a collection of a
number of objects. Each object performs a specific task. It consists of data and functions. The
functions are also called methods. The function or methods are written to manipulate the data.
The programs written in object-oriented programming are easy to understand and modify. It
is also an easy method of writing a computer program. Object Oriented Programming is
performed in an object oriented programming language.
The most commonly used Computer Object Oriented Language are:
✓ PASCAL with objects
✓ C++
✓ JAVA Objects Language

Q. # 23 What is an Operating System? What is Meant by Booting of Computer?


Operating System
Operating system is a computer program that prepares the computer to be used by
human user. It manages the computer hardware, central processing unit, memory, drives and
printers etc. It also runs application software. Operating system programs reside in the main
memory of the computer and control all operations of the computer.
Booting of the Computer
When the computer is turned on, the BIOS instructions are automatically loaded into
the computer memory and begin to execute. The BIOS then transfers the control to the disk
for loading the operating system. The programs of the operating system are loaded into the
main memory from the disk. This process is called booting of the computer. Commonly used
operating systems are Unix. Mac OS, MS-DOS, OS/2
UNIX
Unix was developed in 1969 at AT&T Laboratories, USA. It is mainly used in
universities and research organizations. It is difficult to learn and use. Unix was designed to
work on networks. Many different versions of Unix are available. Sun-OS, XENIX and Linux
are different variants of Unix Operating System.
DOS
DOS stands for Disk Operating system. Microsoft Corporation developed it in 1981.
It was specially designed for use on personal computers. It can run only on program at one
time. It is therefore, a single user and single tasking operating system.

14 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Microsoft Windows
Windows is a graphical user interface operating system. It is multi-user and
multitasking environment and it can run more than one program simultaneously and more
than one user can work on it simultaneously. Nowadays, commonly used application
programs like WinWord, Excel, Power Point, and Internet Browser are written for Windows
environment.

Q. # 24 Write a Short Note on Device Drivers.


Device Drivers
The program that contains specific instructions to operate and control a device
attached to the computer is called device driver. A device driver is loaded into the computer
memory and it enables the device to communicate with the computer. Most operating systems
contain device drivers for most input and output devices. Manufactures of a device also
provide device drivers for the device on a floppy disk or on a CD-ROM.When the device is
connected to computer, the operating system asks for the device driver of the devices. The
device driver is copied from the floppy disk pr CD-ROM to the operating system on the hard
disk of the computer. This process is called installation of the device.
Windows operating system has a large number of device drivers for commonly used
devices. When a device is attached to the computer, the Windows automatically detects the
device and installs its driver.

DATA COMMUNICATION
Q. # 25 What is Data Communication? Briefly Describe Basic Elements of a
Communication System
Data Communication System
The transfer of data or information from one location to another is called data
communication. In this process data is sent electronically from one location to another.
Elements of Data Communication System
Three basic elements are needed for this process. These are:
✓ Transmitter or sender,
✓ Receiver
✓ Transmission medium.
Transmitter:
The computer or device that is used for sending the data is called transmitter. In
electronic data communication, computer is usually used as transmitter.
Receiver:
The device or computer that receives the data is called receiver. The receiver can be a
computer, printer or a fax machine.
Medium:
The means through which data is sent from one location to another is called
transmission medium. If the receiver and the transmitter are within a building, a wire
connects them. If they are located at different locations, they may be connected by telephone
lines, fiber optics or microwaves.

Q. # 26 What are data communication protocols? What function do they perform?

15 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Communication Protocols
The set of rules for exchange of data between computers connected in a network is
called network is called network protocols or communication protocols. The data
communication software are used to transfer data from one computer to another. The
software that follows same communication protocols can communicate and exchange data.
The communication protocols perform the following function to ensure exchange of data
between two computers.

Q. # 27 What is data Transmission Mode? Distinguish between Simples, Half Duplex


and Full Duplex modes of data transmission.
Data Transmission Modes.
The manner in which data is transmitted form one place to another is called data
transmission mode.
There are three ways or modes for transmitting data from one place to another. These
are:
➢ Simplex mode
➢ Half –duplex mode
➢ Full-duplex mode

Simplex Mode
In simplex mode, data is transmitted in only one direction. A terminal can only send
data and cannot receive it or it can only receive data but cannot send it. Simplex mode is
usually used for a remote device that is meant only to receive that. It is not possible to
confirm successful transmission of data in simplex mode. This mode is not widely used.
Receiver Sender

Figure: Simplex Mode


Half –duplex mode
In Half-duplex mode, data can be transmitted in both directions but only in one
direction at a time.
Sender / Sender/
Receiver Receiver
Figure: Half Duplex
In this mode, data can be sent and received alternatively. Each time for sending or
receiving data, direction of data communication is reversed. This slows down data
transmission rate.
In half duplex mode, transmission of data can be confirmed.
Full-duplex mode
In Full-duplex mode, data can be transmitted in both directions simultaneously. It is a
faster mode for transmitting data. Full duplex transmission is simultaneous transmission in
both directions. It provides a faster mode of data communication as no time is wasted in
changing directions of data transmission.
Sender / Sender/
Receiver Receiver
. Figure: Full Duplex Mode

16 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Q. # 28 Distinguish Between Analog and Digital Modes of Data Transmission.


Analog Data Transmission
The transfer of data in the form of electrical signals or continuous waves is called
analog data transmission. An analog signal is measured in volts and its frequency in Hertz
(Hz).

Digital Data Transmission


The transfer of data in the form of digital signal is called digital data transmission.
Digital signal consists of strings binary digits, 0s and 1s. Electrical pulses are used to
represent binary digits. For example +6 Volts may represent a ‘1’ and –6 Volts represent a
‘0’.Data transmission between computers is in the form of digital signals. Telephone lines are
used to transfer data between computers located at distant places. In telephone line, the data
is transferred in the form of analog signals. The modem is used to convert digital signal to
analog and also to convert analog signals to digital.

Q. # 29 What is Data? What Are Its Type?


Data
Data is defined as a combination of characters, numbers and symbols collected for a
specific purpose.
Types of Data
Data can be of the following three types.
➢ Numeric data
➢ Alphabetic data
➢ Alphanumeric data
Numeric Data
Numeric data consists of digits from 0 to 9, + (plus) and – (minus) signs and
decimal point (.). The numeric data can be represented in different number systems e.g.
decimal, hexadecimal, octal and binary number system. Examples of numeric data are:
457, + 456, - 720, 12.13 etc.

17 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Alphabetic Data
Alphabetic Data consists of only capital letters (A to Z), small letters (a to z) and
blank space. It is also called non-numeric data. Examples of alphabetic data are:
Farzana Shaheen, Pakistan etc.
Alphanumeric Data
Alphanumeric Data consists of digits (0 to 9), alphabets (both capital and small
letters) and special characters or symbols etc. For example,
457, 1BA4, $460, Rs.6000, 12.3%, Pakistan, Amir Sheikh

Q. # 30 Write A Comprehensive Essay On MODEM.


MODEM
The device that converts digital signals into analog signals and analog signals into
digital signals is called modem. The word modem stands for Modulation and Demodulation.
The process of converting digital signals to analog signals is called Modulation. The process
of reconverting analog signals to digital signals is called Demodulation. Modems are used
with computers to transfer data from one computer to another through telephone lines.
Telephone lines can carry analog signals. To transfer data from one computer to
another telephone lines, digital signals are converted to analog signals. The analog signals are
then again converted to the digital signal before another computer can receive them.
➢ Digital Connection
➢ Analog Connection
Digital Connection
The connection of the modem to the computer is called digital connection. The
modem is connected to the computer through RS 232 Serial Port. The digital connection
consists of a Transmit Data (TXD) line, a Receive Data (RXD) line and several hardware
hand-shaking control lines.
The control lines manage flow of data. The control lines determine that the statues
of the computer and the modem. They also determine the direction of flow of data, that is if
the compt6uer is to send data or it is to receive data.
Analog Connection
The connection between the modem and the telephone line is analog connection.
The modem converts digital signals into tones for transmitting through the telephone lines.
The frequency of tones is from 300 too 3400 Hz, this is called voice band.
Main features of MODEM
The modems have several features. These are:
Speed
The rate at which modem can send data is called speed of the modem. It is
measured in bits per second (bps). Typically modem speeds are300 b[s to 56 Kbps.
Self Testing
Internal programs or firmware are provided in modems that check digital and
analog connections of the modem. These programs also cheek internal electronics of the
modem. These programs are called self-testing programs. Self-testing programs ensure
accurate data transmission by the modem.
Voice Over Data
Modern modems also allow voice conversation while data is being transmitted.
This requires both the source and the destination modem to have this feature.
Synchronous or Asynchronous Transmission
Modem can have either synchronous or asynchronous transmission. Usually
modem transmissions asynchronous.

18 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

COMPUTER NETWORKING
Q. # 31 What is a Computer Network?
Computer Network
Two or more computers connected together through a communication medium form a
computer network. The computers are connected in a network to exchange information and
data. The computers connected in a network can also use resources of other computers.

Q. # 32 What Is The Network Topology?


Network Topology
The arrangement of computers in a network is called network topology. It the physical
layout of the connected computer. There are three basic methods of connecting computers in
a network. These are:
➢ Bus topology
➢ Star topology
➢ Ring topology

Q. # 33 Describe The Bus Topology. Describe its Advantages and Disadvantages.


Bus Topology
In bus topology, the computers or network nodes are connected to a common
communication medium. A special type of central wire is used as the communication
medium. This central wire is called bus. The computers are attached to the bus. The ends of
the bus are closed with terminators. The terminators are used to absorb signals.

Bus topology is commonly used for small and simple networks.


Working Of Bus Topology
The computer that sends data also attaches the address of the destination computer
with the data. All computers connected to the bus receive the data but only that computer
accepts it whose address matches the address attached with the data. Other computers discard
the data. In this topology only one computer at a time can send a data. Therefore the speed of
the network reduces as the number of computers attached to the bus topology.
Advantages
1- It is simple and reliable for very small networks.
2- It is easy to use and understand.
3- It requires to minimum length of communication cable.
4- It is easy to extend, as two cables can be jo0ined to make a larger cable.
5- A repeater can also be used to extend the length of the bus.
Disadvantages
1. it can support only a small number of computers. As the number of computers
increased, the network gets slower.

19 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

2. it is difficult to troubleshoot a bus. A cable-break, fault in any one computer or


a loose connection can breakdown the whole network.

Q. # 34 Describe The Star Topology. Also Describe Its Advantages and Disadvantages.
Star Topology
In star topology, all computers or nodes are directly connected to a central device. The
central device that connects the nodes is called hub.

Working Of Star Topology


Each computer on a star network communicates with the central hub. The hub sends
the data to the destination computer or computers. It means that data is shared between
different computers through the central hub.
Advantages
1. It is easy to modify a star network. New computers can be added to the central hub or
any computer can be removed without affecting the network.
2. It is usually easy to troubleshoot a star network.
3. If any computer in the star topology breaks down, the network is not affected.
Disadvantages
1. If the central hub fails, the whole network breaks down.
2. Star network requires more communication cable than any other network.
3. Star network topology is very costly.

Q. # 35 Describe the Ring Topology. Describe its Advantages and Disadvantages.


Ring Topology
In ring topology, each computer or node is connected to the next computer and the
last computer is connected to the first. Thus, a ring of computers is formed.
Working Of Ring Topology
Every computer receives data from the previous computer and transmits it to the next
computer till the destination computer receives the data. Since each computer
re-transmits what it receives, signal-loss does not occur.

Advantages
1. All computers on the ring have equal access to the network.

20 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Disadvantages
1- Failure of one computer can affect the whole network.
2- It is difficult to troubleshoot the ring network.
3- Adding or removing a computer affects the whole network.

Q. # 36 Briefly Describe various Communication Media.


Communication Media.
Following are the most widely used communication media:
Coaxial Cable
Coaxial cable consists of a copper (or aluminum) wire that is surrounded by an
insulating material. The insulated copper (or aluminum) wire is surrounded by copper mesh.
Copper mesh protects the cable from external electromagnetic waves. Coaxial cables are
mainly used for long distance telephone lines and local area networks. These cables transfer
data from one location to the other at a high rate.
Un-Shielded Twisted Pair Cable (UTP)
Unshielded Twisted Pair Cable or UTP cable consists of four individual pairs of wires
that are covered by a plastic insulation. Each pair consists of two insulated wires twisted
around each other. Twisting is done to protect the cable from external electromagnetic waves.
UTP cables are used in Ethernet LANS (IEEE 802.3).
Fiber-Optic Cable
Fiber-optic cable is made of fiberglass. It transmits data in the form of light pulses at a
high speed i.e. equal to speed of light. Fiber-optic cables can carry more data and over longer
distances than UTP or coaxial cables. Fiber-optic cable is now the most commonly used
media for data transmission.
VSAT
VSAT stands for Very small Aperture Terminal (Transmitter/ Receiver). It consists
of a small 3 to 6 ft. dish antenna that communicates with other VSATs through a satellite. A
VSAT can both receive and send signals to the satellite. A VSAT network consists of a
central earth station and several remote VSATs. The central earth station is called the hub. A
VSAT communicates with hub through a satellite. The hub or the central station controls the
flow of all data.
Satellite
Satellite communication system consists of several earth stations and a satellite. The
earth station consists of large dish antennas that can send as well as receive signals.
Satellite works as a relay station. It receives signals from one earth station and sends
then to the next earth station. The signals are sending to another earth station by cable or
some other physical link. The earth station transmits then to the satellite. The satellite
amplifies the signals and sends then to other earth stations. In this manner data is
communicated from one continent to other.
Sub-Marine Cable
This media is used as an alternative of satellites. In this mode of communication, a
large of fiber- optic cables lead on the seabed is used to transmit data across the continents.
These cables can carry huge amount of data. These cables are also economical.

Q. # 37 What are Local Area Networks (LAN)?


Local Area Networks (LAN)
A network of several personal computers connected together through Ethernet cards is
called Local Area Network. As the suggests, a local area network cover short distances,
usually one office or building or a group of buildings. The computers in the LAN have
been connected to a central hub.

21 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

The network makes star topology. The computers are usually connected through UTP
cables. The maximum length of UTP cable through which it can transmit data is 100 meters.
This means that no computer should be more than 100 meters away from the hub. Because of
this limitation, such networks are used to connect computers placed in one building and are
called Local Area Networks. The figure below shows a local area network (LAN).

A LAN can have more than one hub. A UTP cable or a fiberglass cable can be used to
connect two hubs. The cable connecting two hubs is called spine. If fiberglass cables are
used, the two hubs can be several kilometers apart.
Use and Benefits of LAN
There are several uses and benefits of local area networks. Some of them are:
❖ Each computer in the network can use the resources of other computers.
❖ The information moves directly from computer to computer. This saves time and
increases efficiency of an office.
❖ Computers can share resources and devices such as fax modems, printers. Thus one
office may have only one high quality laser printer and all computers can use it.
❖ The data transmission speed in a LAN is very high. It varies from 2 to 1000 million
bits per second (Mbps). 8 bits represents one byte or one character. One byte usually
takes ten bits (i.e., 8 data bits + 1 star bit + 1 stop bit). Thus maximum data transfer
speed is about 100 million bytes per second (100 MBps). However, since many
computers share the same communication medium simultaneously, the data transfer
rate is much less than this. It is generally a few hundred thousand bytes per second.
❖ In addition to data transmission, human voice can also be transmitted over a LAN.

Q. # 38 Explain Wide Area Network (WAN).


Wide Area Network (WAN)
A wide area network (WAN) is a network of geographically distant computers and
terminals. Wide area networks cover long distances. They connect computers in different
cities, countries and continents.
Device to Connect Computers in WAN
The simplest device to connect computers over a long distance is modem card. If two
computers have modem cards, they can communicate through telephone lines. Modems have
limited data transfer rate. The maximum rate at which a modem can transfer data is about
50,000 bauds while a LAN card can transfer data at 100 million bauds.
Another limitation of data transfer through modems is that modems use telephone
lines as communication medial. Telephone lines are designed to carry human voice. Human
voice requires a carrying capacity of only 4000 bytes of data per second. The telephone lines
cannot carry data faster than about 4000 bytes per second. This limits the data transmission
data through modems using telephone lines.

22 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Most widely used protocol in WANs is CCITT X.25. It provides high data
transmission rate. Several hundred million bytes of data can be transferred through WAN
links.

THE INTERNET
Q. # 39 What is The Internet? Describe Its Brief History.
The Internet
The Internet is a network of a large number of computer networks around the world. It
is a data communication system. Through this system millions of computers have been linked
together.
The Internet consists of both the hardware and the software. The hardware comprises
the computer and the connections between them. The software consists of programs that let
these computers communication with each other.
More than 65,000computr networks and 20 million computer are permanently
attached to the Internet. Connections to the Internet are available in about 150 countries and
50 people have access to it.
All three major media of communication are used to connect the networks and the
computers in the Internet, i.e.
➢ Telephone
➢ Fiber-optic cables
➢ Satellite communications
There are generally three types of computer in the Internet. These are host, server and user.
Host
Store information in the form of text, pictures, sound and video films.
Server
Allow users to connect to the Internet. Servers also help the user to store and share
information on the Internet.
User
Use the information stored on the hosts and pass messages to other computers attached to
the Internet.
Who Developed the Internet?
The government of the United States started a project in 1960s to develop an
efficient system of data communications. Under this project, a network of 4 computers was
established in September 1969 in the United States.
Who Owns the Internet?
There is no single organization or government who controls the Internet.
Different government agencies, universities, research organization and business concerns run
the host computers.
Who Uses the Internet?
Anyone who has an access to the Internet can obtain information available on
the Internet. Millions of people now have access to the Internet. They use it to get
information, play games and communicate messages to friends and family. Many business
companies also use the Internet to advertise and sell goods.
How to connect the Internet?
The Internet can be accessed by connection a personal computer to the server
of an Internet Service Provider (ISP) through telephone lines. To link up to an ISP, following
is required:
Computer

23 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Any computer can be used but it is easier to use a computer running under windows
Operating System.
MODEM
It is an electronic deices that links a user computer to the server of the ISP via
telephone lines.
Dial up Software
Dial up networking software establishes the server of the ISP.
This software is built into the Windows Operating System.
Web Browser
A web browser is required for browsing or surfing the Internet. Following are web
browsers
Internet Explorer, Netscape Navigator, Opera, NeoPlanet etc.
Membership of ISP
Membership of an ISP permits a member to connect to its server.

Q. # 40 What is World Wide Web (WWW)?


World Wide Web (WWW).
The millions of linked documents stored on computer permanently connected to the
Internet throughout the world are called the World Wide Web. It is abbreviate as www or 3w.
The documents on the web contain information in the form of texts graphics, wide clips and
sounds. These documents are also called Internet. The computers containing these documents
are called web sites or sites.
URL (Universal Resource Locator).
Each web site has a unique name called site address. Site addressee is also called
domain names or URL a domain name or URL is made up of two or more names separated
by dots, e.g.
http://www.saving.gov.pk
Where

HTTP:
It is the standard protocol through which a URL is accessed. The “HTTP” is the
abbreviation of Hyper Text transfer protocol.
WWW
Indicates a World Wide Web site.

Savings Specifies name of the organization, Gov Classifies type of the organization
The most common types of the organization:
Com Commercial
Edu Educational
Net Network provider
Gov Government department
Mil Military
Org Non-commercial organization
PK shows the country of origin. It is not used for the US based and international organization
.Some leading country codes are:
Au Australia
Ca Canada
Fr France
De Germany

24 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Hk Hong king
Jp Japan
Uk United Kingdom
It Italy
Sa Saudi Arabia

How To Create A Page


Web pages are written in hypertext. Hypertext provides several facilities that are not
available in conventional text document. A hypertext document can:
1- Show text in different fonts and colors
2- Have sounds, video clips and animation,
3- Provide links to other documents on the web.
The links to other documents or pages are called hyperlinks. Hyperlinks in web Pages
connect all pages available on the web and make it the World Wide Web. The user can
directly go to the linked page. Just by clicking on the hyperlink. Hypertext documents are
prepared using special languages. The most popular hypertext language is Hypertext Markup
Language or HTML,
How To Locate A Page
Each web page is stored on a computer permanently connected to the Internet in a
file. Each file is given a unique address. It is called Universal Resource Locator or URL.
URL is sometimes pronounced a, “earl”. It has a particular format.
http://www.intel .com/home/index.html.

http:// The URL begins with the protocol. http stands for Hyper Text Transfer
Protocol.
This indicates how the document is to be transmitted.
www.intel.Com It specifies the name of the domain or the server provider that contains
the document.
Home/index. Html Last part of the URL specifies the directories, sub-directories and file
name of the web document. The extension html indicates the document has been prepared in
Hyper Text Markup Language.
How To Access A Web Page
Each web page is stored at its Universal Resource Locator. Any user or client
computer connected to the Internet can access these documents. Viewing these pages is called
Web Browsing. Web Navigation or Web Surfing. A special program called browser is used to
view these files. Most commonly used browser is Internet Explorer and Netscape navigator.
Once a client computer on the Internet addresses an HTML document, the document is
automatically transferred to the client computer and its browser begins to display it. The
client can retrieve and view the information from the host computer. The retrieving of data
from host computer is called the downloading. The user can store the accessed data from
Host computer on his own computer permanently. The downloaded data may be in text
format, pictures, sound or video clip.

Q. # 41 What is The E-Mail


E-Mail
E-mail stands for electronic mail. It consists of a message that is received or sent
through the Internet. Although e-mail is mainly used for sending messages in plain text but
graphics, sounds, video clips, and other computer data files can also be attached to it.
E-mail is a fast and very efficient way to communicate. Long text messages can be
sent off anywhere in the world in just a few minutes.

25 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

E-Mail Address
E-mail address is person-to-person communication. Every person that uses the
internet gets unique e-mail address. The ISP usually provides the e-mail address when its
membership is obtained. E-mail to person is sent to his or her e-mail address.
[email protected]
Name It specifies the name of the person. It may be the
Name of an organization. It is usually based upon
User’s real name. At one site, it is the unique name
And is given to one person only.
Site address It specifies the address of the Internet service provider (ISP)
To which the user belong.
For example, my name is Tauqueer Qureshi and I have an account with world on line
(WOL). My user name is Tauqueer and the site address of the ISP is wol.net.pk.Therefore,
my e-mail address will be: Tauqueer@wol. Net.pk
It is read as: Tauqueer at WOL dot Net dot Pk

Advantages of E-Mail
E-mail has several advantages compared to ordinary mail. Some of these are:
1- It reaches the destination in a few minutes.
2- It is cheep to use .It some one has an Internet account, he gets this facility without
any extra cost.
3- One message can be sent to any number of persons.
4- Pictures, document, and other computer files can also be sent along with the
message.
5- It can be sent anywhere in the world to anyone who uses the Internet.
Disadvantages
E-mail also has some limitation.
E-mail does not always reach its destination. A slight error in the e-mail address
can prevent its delivery. Also many people do not check their e-mail regularly.
Thus whereas an envelop gets read when it reaches a person, e-mail message need
not be read immediately.

Q. # 42 What is E-Commerce?
E-Commerce
To carry out financial transactions using wide area networks is called e-commerce or
electronic commerce. With the help of wide area networks, business can be carried our on
international basis. Goods can be purchased and sold from anywhere in the world .The
business using e-commerce is growing at a rapid rate. It is estimated that volume of e-
commerce is increasing by 10%to 15% every month.
Following are some examples of e-commerce activity.
Online Shopping
Manufacturers place a list of their products on their web page on the Internet. They
also place pictures, qualities, and prices of the items; any one can browse the site, and place
order to purchase any items. The manufacturer then sends the purchase goods through mail.
This is called online shopping.
The volume of online shopping is increasing. All large departmental stores in
developed countries are already providing online shopping facility to their customers.
Online Banking

26 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

In online banking a customer can use the Internet to access his account in a bank. He
can check his balance and can transfer money from his account to another account. He can
also pay their utility bills over the Internet.

Q. # 43 What is a password? Give Examples.


Password
A password is a secret word, a number, or a combination of the two that must be
typed on the keyboard to get access to the computer system. In a computer, a Password is
applied to limit the use of a computer system or software. Only that person who knows the
password can use the system. These are called the persons authorized to use the system.
A password protected system or software asks for the password before its execution.
If the person is authorized to use the system and knows the password, he types it. The system
of software confirms the password and its executions starts if correct password is entered.
Otherwise, the system or software does not execute. The authorized persons can change
password. The authorized persons must keep their passwords secret. They should not forget
their passwords.
While adopting a password for a system or software, the following points must be
kept in mind:
❖ The password should not be a commonly used word.
❖ The password must be a combination of alphabetic letters and numeric digits.
❖ The password should be written down in notebook because if it is forgotten, the
system cannot be run.
❖ The password should be change at least once a month.

Examples of Password Protection


1. Different computers have different set-up of configurations i.e. the arrangement of
their parts. These configurations are given in the set-up of the computers. Pressing Del key
after starting the computer usually accesses the computers set-up.
The user of the computer sets the configurations according to his needs and can
protect them with a password. Only the person who knows the password can enter the set-up
of the computer and make changes in it. Thus the computer set-up is protected from being
changed by unauthorized persons. The authorized person can, however, also change the
password.
2. When one gets the membership of an Internet Service Provider (ISP), he or she is
given a user name and a password. The user name is usually the name of the person and the
password is the secret code that he uses to access the ISP.
While the user name of the person remains the same, the password can be changed. All ISPs
a procedure for changing it.

Q. # 44 What is a Computer Virus? How Does it affect The Computer?


Computer Virus
A Computer virus is a small program that interferes with normal functions of the
computer. Usually a virus program is attached to a computer file. The file to which a virus is
attached is called infected file. When the infected file is copied on a disk, the virus is also
copied and it hides itself on the disk

27 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Activation of a Virus
The running of a virus program residing in a computer is called activation of the virus.
The virus program executes when it is activated. The method of activation of a computer
virus is defined in the virus program itself.
Different computer viruses are activated different ways. For example, some viruses
activate on a fixed date. Usually these viruses are part of some application software. When
the application software date matches the virus program date, the virus is activated. For
example, Friday the 13th virus activates only if the date is 13th and the day is Friday.
How Computer Gets a Virus
Transfer of a virus program into the hard disk of a computer is called infecting of the
computer with a virus.There are many ways through which a computer can get a virus. Most
common ways are: Nowadays, the most common way of transfer of virus to a computer is
through the Internet. For example,
❖ A virus can be attached to an e-mail message. When this e-mail message carrying the
virus is downloaded onto a computer, the virus is also downloaded.
❖ A virus can also be attached to some software on the Internet. When this software is
downloaded from the Internet into your computer, the virus is also transferred.
When a virus-affected file is copied from one computer to another through a floppy disk, the
virus is also transferred.
Action of a Virus
Different computer viruses create different problems in different ways. The most common
problems are:
❖ A virus may destroy all data stored in the hard disk by either formatting it without
warning or by destroying some of its sectors.
❖ A virus may change the boot sector of the hard disk. If the boot sector of a disk is
affected, it cannot boot the computer.
❖ The computer viruses are automatically loaded into the main memory of the computer
and remain in the memory. This slows down the data accessing speed of the
computer.
❖ A virus can destroy BIOS of the computer.
How To Control Virus Infection
Following a few precautions can prevent damage to the computer. These precautions
are:
✓ Install latest anti-virus software on the computer.
✓ Always check a floppy disk with anti-virus software before using in the computer.
✓ Never open an unknown e-mail sent to you in your e-mail box.
✓ Always use the licensed software.
✓ The floppy disk that has important information or program can be protected from
viruses by making it read only. The disk becomes read only if the write-protected
notch is closed.

Q. # 45 What are Anti-Virus Programs?


Anti Virus Software
Anti-virus software is a special program that can detect and remove viruses from the
computer.
A large number of anti-virus programs are available for DOS and Windows. These programs
contain a list of all known viruses. Since many new viruses are written and spread, the anti-
virus programs are also updated regularly. The manufactures of these programs place updates
of these programs on the Internet. These updates can be downloaded from the Internet free of
cost.

28 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

The commonly used anti-virus programs are:


Norton anti virus program
Mac Fee anti-virus program
Dr. Solmon anti-virus program

Q. # 46 What Steps Can be Taken to Improve The Working Life of The Computer?
The working life of the computer can be improved by observing the following precautions:
1) The computer should be placed in an air-conditioned room.
2) The computer room should be clean and free from dust.
3) Handle the computer carefully.
4) Do not disturb the computer while it is on. Any jerk can damage the hard disk or any
other part of the computer.
5) Shut down the computer properly. Follow the correct procedure to shutdown the
computer after closing all opened programs and files. If the computer is shut down
abruptly, the hard disk will be damaged.
6) Do not place the floppy disks near the computer monitor. The monitor of the
computer produces a very strong electromagnetic field. This electromagnetic field can
damage the data stored in the disks.

Q. # 47. What Should Be Done If the Computer Suddenly Breaks Down?


The computer breaks down when it develops a fault. It stops responding when its
switch is turned on. In this situation, the steps mentioned below should are taken. Large
organizations usually have a computer support department that helps in computer
maintenance in the organization. Some organizations make computer maintenance contracts.
If the computer is in a large organization, always call the support department or the persons
responsible for computer maintenance. The telephone numbers and addresses of the
maintenance persons should be kept handy.
The computers bought for personal use at home or in an office are covered by
warranty for about one year. In case of a breakdown of the computer written the warranty
period, contact the seller for repairs.
In any case do not open the computer yourself if you are not a trained technician or
are not authorized to do so. Opening of the computer may cancel the warranty of the
computer. Being an untrained person, you may damage a computer part. Also, the monitor
operates at very high voltages and poses danger of electric shock.
However, before contacting anyone for repairs, there are some simple checks that
must be performed. The computer may not be responding for some simple reasons. These
checks are:

1) Check the power cable of the computer and the power outlet.
The power cable may be loose or not connected.
2) Check all external connections of the monitor, keyboard, and mouse with the CPU.
3) If you are working on the network and your computer gets disconnected from the
network, it may be that someone has pulled the network cable and the computer has
been disconnected from network.

29 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

Q. # 48 Why the Computer Should be Properly Shut Down? What Happens if the
Computer Shuts
Down Suddenly?
It is always necessary to shut down the computer properly. Before switching off the
computer, the running programs and the open files should be closed. Computer operating
systems usually provide a method for shutting down the computer operating systems usually
provide a method for shutting down the computer. In Windows 95/98/2000, shut down is
provided in the start Menu. When the shut Down switch is activated, the Window does the
following:
It closes down all open files and running programs. It places the heads of the hard
disk in the safe area. If the heads are allowed to stay on data area, a small shock to the hard
disk may damage the data.
In case of sudden power failure, the computer shuts down suddenly. Sudden power
switch-off may cause the following:
1) The open data files and application programs may be damaged.
2) Some computer component may be permanently damaged due to sudden power
fluctuation.
3) Windows operating system may get corrupted.
The new version of windows operating system i.e. Windows 98, 2000 and Windows
NT, automatically detect whether the computer was not shut down properly last time, it
scans the hard disk and fixes the error developed on the hard disk due to improper shut
down.

Q. # 49 What is UPS?
Un-Interruptible Power Supply
UPS stand for Un-interruptible Power Supply. It is device that takes electric power
from the switchboard and provides continuous power supply. It is attached to the computer to
protect it from power fluctuations and sudden power breakdowns. UPS contains batteries.
These batteries are charged when the UPS gets power from the main supply. When the main
supply stops, the UPS gets the power from the batteries. It converts it to 220V and supplies it
to the computer. The change of the source is without any break. The duration for which a
UPS can supply power during power breakdown depends upon its type. Its duration ranges
from 30 to 45 minutes.
UPS is attached to the computer for the safety of computer against power failure or
power fluctuations. UPS become necessary in computer networks and are attached with the
Central computer or Server. This provides safety to data of users on the network.

Q. # 50 What is Meant by Privacy of Computer Data? How is Data Protection And


Privacy Provided?
What are Data Protection Laws?
Privacy & Data Protection
Privacy is the right of a person to keep his or her personal information away from
other people. If a computer system holds such information then it is the right of the person
that this information is not used or given to anyone without his or her permission. The
measures that are taken to prevent the misuse of such personal data are called data protection
measures.
Almost all large departments and organizations maintain their data on commuters.
Their data usually consists of personal information about their employees. Similarly,

30 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

computers in a police department hold records of people. The computers in a bank hold
record of financial dealings of persons.
The personal data is maintained on computers of different organizations but the owner
of the personal data is the person to whom it belongs. This data can be used only for the
purpose for any other purpose is against the privacy of a person.
Data Protection Laws
Anyone who has access to a computer system can get personal information about a
person. He or someone else may use this information against that person. It is, therefore,
important that measures be taken to prevent misuse of such personal data. In developed
countries, the law provides such data protection.
For example, in the United Kingdom, the Data Protection Act provides a framework
of data protection. Main features of this Act are:
1. Proper measures shall be taken to prevent unauthorized access, alteration,
disclosure and loss of personal data.
2. The information in personal shall be obtained and used for lawful purpose only.
3. The personal data can be used only for the purpose for which it has been
obtained.
4. The personal data shall be deleted from the computer if it is no longer needed.
5. Personal data about a person cannot be obtained and processed without his or her
permission
6. The person whose data is maintained has the right to have access to his or her
personal data.
It is clear that the real owner of personal data is the person to whom it belongs. The
data protection law protects the privacy of a person. It also makes it sure that the personal
data of a person is not misused.

Q. # 51 What is Software Copyright?


Software Copyright
Software copyright is the right to use software on the computer. According to the
software copyright, the software remains the property of the company that company that
made the software. It only gives license for use of the software to those who purchase it.
Usually one copy of the software against the conditions of the license is illegal. The
development of a computer program is costly. The software company that develops a
program gets it costs back by selling the software.
The programs are sold on floppy disks or on CD-ROMS. One copy of a program can
be installed on as possible. Thus if someone buys one of program and distribute it for use on
many computers, the software company will not get the reward for its efforts. The software
for our growing needs. The development in the filed of software will stop. The software
copyright protects the rights of software developers and ensures that they get their money
back. The programs are usually sold to be used only by those who purchase it. The copyright
law imposes this condition. There are many organizations that work to control the illegal
copying and use of software. FAST (Federation Against Software Theft) is an organization
that prevents illegal use of software.

Q. # 52 What is Site License?


Site License
The permission to use a computer program on a fixed number of computers at one
place in one organization is called site license. Large organization has many computers in one
building. These computers are usually interconnected. If one program is to be used ob many
or all of these computers, the organization purchases only one copy of the software along

31 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah


Vocational Training Institute Layyah
INTRODUCTION TO COMPUTER SYSTEM

with the license to use it on the fixed number of computers. The cost of a site license is less
than buying equal number of individual copies of a program.

Q. # 53 Differentiate Between Freeware and Shareware.


Freeware
The software that are available without cost are called the freeware. These software
are produced by educational or welfare organization and are available free of cost. The
demonstration programs are an example of freeware.
Shareware
The software that is available on trial basis for a limited period is called shareware.
Different software companies provide a free copy of their newly developed software for
evaluation. They allow the use of the software is illegal and it must be removed from the
hard disk. Usually the shareware software automatically gets corrupted after the trial or
evaluation period. After the evaluation period, the user must purchase the software if he
needs it.
Both freeware and shareware can be downloaded from the Internet and the main
difference between Freeware and Shareware is that:
Freeware
Are available free of cost for unlimited period. The users have not to pay any amount
for these software.
Shareware
Are also available free of cost, but for a limited period. The users have to purchase the
new copy of software after that period.

32 Written by: Muhammad Aslam (Sr. Lab Assistant) VTI, Layyah

You might also like