COMPUTER APPLICATION CH 1( computer memory, OS, codes)
COMPUTER APPLICATION CH 1( computer memory, OS, codes)
COMPUTER MEMORY
Primary memory (or main memory) includes RAM (Random Access Memory)
and ROM (Read-Only Memory). RAM is volatile, meaning it loses its data
when the computer is turned off, but it provides fast access to data, making
it essential for running applications and the operating system. ROM, on the
other hand, is non-volatile and contains essential instructions needed for
booting the computer.
Secondary memory refers to storage devices like hard drives, SSDs (Solid
State Drives), and optical discs. This memory is non-volatile, retaining data
even when the computer is powered off. While secondary memory offers
more storage capacity, it is slower than primary memory in terms of data
access.
Overall, computer memory plays a pivotal role in determining the speed and
efficiency of a computer system, influencing how quickly data is processed
and accessed by the CPU.
The memory in a computer can be divided into five hierarchies based on the
speed as well as use. The processor can move from one level to another
based on its requirements. The five hierarchies in the memory are registers,
cache, main memory, magnetic discs, and magnetic tapes. The first three
hierarchies are volatile memories which mean when there is no power, and
then automatically they lose their stored data. Whereas the last two
hierarchies are not volatile which means they store the data permanently.
1. Registers:
Location: Registers are small storage locations built directly into the CPU
(Central Processing Unit).
Speed: Registers are the fastest type of memory in a computer. They operate
with access times that are significantly quicker than other memory types,
such as, cache
Size: Registers are very limited in size, typically holding a few bytes (32 or 64
bits). This small size is due to the need for high speed and the complexity of
the circuitry.
Purpose: Registers store the data currently being processed by the CPU. They
hold operands for arithmetic operations, addresses for memory access, and
instructions for control flow. Because of their speed, registers are crucial for
the immediate execution of instructions, reducing the time required for data
to be moved in and out of memory.
2. Cache Memory:
Location: Cache memory is located either on the CPU chip itself (L1 and L2
caches) or close to it (L3 cache).
Speed: Cache memory is extremely fast, though slightly slower than the CPU
registers. It bridges the speed gap between the ultra-fast CPU registers and
the slower main memory (RAM).
Size: Cache is larger than registers but still relatively small, usually ranging
from a few kilobytes (KB) to several megabytes (MB), depending on the level
(L1, L2, L3).
Size: RAM is much larger than cache, typically ranging from a few gigabytes
(GB) to dozens of GBs in modern computers.
Purpose: RAM temporarily stores data and instructions that are currently in
use or that the CPU may soon need. Because RAM is volatile, its contents are
lost when the computer is powered off. The large size of RAM allows for
multitasking and the smooth operation of applications that require significant
memory, such as video editing software and games.
4. Secondary Storage:
Location: Secondary storage devices, such as hard drives (HDDs) and solid-
state drives (SSDs), are connected to the motherboard through various
interfaces like SATA, NVMe, or USB.
Purpose: Secondary storage holds data, programs, and files that are not
currently in use by the CPU. It is non-volatile, meaning it retains data even
when the computer is turned off. This storage is essential for long-term data
retention, storing the operating system, applications, personal files, and
backups.
Speed: Tertiary and off-line storage are the slowest in the memory hierarchy.
Optical drives and tapes have slower read/write speeds compared to internal
storage devices. Cloud storage speed depends on internet connectivity.
Size: These storage types can vary greatly in size. Optical discs might hold a
few gigabytes, while cloud storage and magnetic tapes can store vast
amounts of data, often terabytes or more.
Purpose: Tertiary and off-line storage are used for data that is not frequently
accessed. This includes backups, archives, and data transport. In the case of
cloud storage, it also provides redundancy and remote access to data. These
storage solutions are typically more cost-effective per byte compared to
primary and secondary storage, making them ideal for long-term data
storage and backup purposes.
The memory hierarchy ensures that the most frequently used data is stored
in the fastest memory, reducing the time the CPU spends waiting for data to
be retrieved from slower memory. This layered approach optimizes overall
system performance by balancing speed, cost, and storage capacity.
OPERATING SYSTEM
1. Process Management:
2. Memory Management:
3. Device Management:
The OS controls and manages hardware devices such as printers, disk drives,
monitors, keyboards, and mice. It provides drivers and software interfaces
that allow applications to interact with hardware devices without needing to
know the details of how the hardware works. The OS also manages I/O
operations, ensuring that data is transmitted to and from devices correctly.
4. User Interface:
The OS provides a user interface (UI) that allows users to interact with the
computer. This can be a command-line interface (CLI), where users type
commands, or a graphical user interface (GUI), where users interact with the
system through graphical elements like windows, icons, and menus. The UI
makes it easier for users to perform tasks on the computer without needing
to understand the underlying hardware.
6. Networking:
7. Resource Allocation:
Windows: A widely used OS for personal computers, known for its user-
friendly interface.
macOS: Apple’s OS for Mac computers, known for its smooth integration with
other Apple products.
iOS: Apple’s mobile OS used on iPhones and iPads, known for its security and
user experience.
CONCLUSION
Codes used computer in computer: BCD, EBCDIC, ASCII, Gray Code, Unicode.
This encoding method simplifies the conversion between binary and decimal
systems, making it useful in applications where precision with decimal
arithmetic is required, such as in financial calculations and digital clocks.
BCD is often used in digital systems to facilitate human-readable numerical
displays and accurate arithmetic operations.
IMPORTANCE
2. Human Readability:
BCD is often used in digital displays, such as calculators and digital clocks,
where decimal numbers are directly represented, making it easier to
interface with human-readable outputs.
6. Error Detection:
BCD encoding can simplify error detection and correction in digital systems
by providing a clear mapping of decimal digits to binary values, which helps
identify and correct data entry errors.
BCD is ideal for applications that require exact decimal representation, such
as financial transactions, where precision is crucial, and traditional binary
representation may introduce inaccuracies.
8. Standardization in Digital Systems:
Key Points:
Variations: EBCDIC has several variations and code pages, each tailored for
different languages and regional requirements, which can lead to
compatibility issues between systems using different versions of EBCDIC.
Usage: Although less common today, EBCDIC is still used in legacy IBM
systems and applications. It was historically important for data interchange
and text processing in IBM mainframes.
IMPORTANCE
1. Legacy System Support:
2. Character Representation:
3. Data Interchange:
4. Historical Significance:
5. Business Applications:
6. Control Characters:
7. Specialized Variants:
EBCDIC has specialized code pages for different languages and regions,
allowing it to support diverse character sets and internationalization needs
within IBM systems.
8. Data Integrity:
For environments where EBCDIC is the standard, using this encoding ensures
data integrity and consistency, as conversion to other encodings could
potentially introduce errors or data corruption.
ASCII (AMER STQND CODE FOR INFORMATION INTERCHANGE)
Key Points:
7-Bit Encoding: ASCII uses 7 bits to represent each character, which allows
for 128 distinct symbols. Extended versions of ASCII use 8 bits, providing 256
possible characters and accommodating additional symbols and characters.
Control Characters: ASCII includes a set of control characters used for text
formatting and device control, such as line breaks and tabulation.
ASCII’s role in early computing has set the stage for more advanced
encoding systems, but it remains a fundamental standard for text
representation.
IMPORTANCE
Foundational for Modern Encodings: ASCII serves as the basis for more
advanced character encoding systems, such as UTF-8, which extends ASCII
to support a broader range of characters while maintaining backward
compatibility.
Efficient Text Representation: The compact 7-bit encoding allows for efficient
storage and transmission of text data, minimizing resource usage in systems
with limited capacity.
Control Characters: ASCII includes control characters for text formatting and
device control (e.g., line feed, carriage return), which are essential for
managing text layout and communication protocols.
GRAY CODE
Gray code, also known as reflected binary code, is a binary numeral system
in which two successive values differ in only one bit. This single-bit change
minimizes errors in digital systems during transitions between values.
Key Points:
Single-Bit Change: In Gray code, only one bit changes at a time when moving
from one value to the next, reducing the risk of errors that can occur when
multiple bits change simultaneously.
Conversion: Gray code can be converted to binary code and vice versa,
which is useful for systems that need to interface with both types of
encoding
Error Detection: The single-bit change property makes Gray code effective
for minimizing errors in digital communication and mechanical encoding
systems.
IMPORTANCE
Gray code ensures that only one bit changes at a time when transitioning
between successive values. This minimizes the risk of errors that can occur
when multiple bits change simultaneously, which is particularly useful in
noisy environments.
Gray code is widely used in rotary and optical encoders, where accurate
position and speed measurements are crucial. The single-bit change reduces
the chance of misinterpreting encoder signals during rotation.
In digital circuits, Gray code can reduce power consumption associated with
switching because fewer bits change state at once, leading to lower
switching activity and power dissipation.
UNICODE
Key Points:
IMPORTANCE
Unicode ensures that text data is consistent and compatible across different
platforms, applications, and devices, reducing issues related to text
corruption or misinterpretation.
It allows for the inclusion of multiple languages within the same document or
application, facilitating the development of international and multilingual
software and websites.
4. Consistent Encoding:
Unicode provides a unique code point for every character, which simplifies
text processing and reduces the likelihood of encoding errors compared to
legacy encoding systems.
8. Future-Proofing:
COMPUTER SYSTEM
Software: This includes system software (like the operating system, which
manages hardware resources and provides a platform for running
applications) and application software (programs that perform specific tasks,
such as word processors or web browsers).
Data: Data are the raw facts and figures that the computer processes. In a
computer system, data is typically input, processed, stored, and then output
as information.
Users: Users interact with the computer system, providing input and using
the output generated by the system. They can be individuals or other
systems interacting through network connections.
System Software: This type includes the operating system (OS) and utility
programs. The OS (like Windows, macOS, or Linux) manages the computer’s
hardware, provides a user interface, and allows other applications to run.
Utility programs help maintain the system, such as antivirus software or disk
cleanup tools.
Application Software: These are programs designed for specific user tasks,
such as word processors (Microsoft Word), spreadsheets (Excel), web
browsers (Google Chrome), and multimedia players. They allow users to
perform activities like writing, editing, browsing the internet, or playing
games.
Software can be further divided into custom (tailored for specific users or
tasks) and off-the-shelf (general-purpose software for mass use). Unlike
hardware, software can be easily updated or modified, making it more
flexible in adapting to changing needs.
COMPUTER APPLICATION
In short, computer applications provide users with tools to carry out specific
functions efficiently, making them an essential part of daily computing
activities across personal, educational, and professional domains.
NUMBER SYSTEM
HARDWARE Vs SOFTWARE
CLASSIFICATION OF COMPUTERS
CPU
FUNCTIONS OF CPU
IMPORTANCE OF SOFTWARE
I/O DEVICES