ITF Unit 1 and Unit 2 Notes SEP
ITF Unit 1 and Unit 2 Notes SEP
Boolean Algebra: Basic Definitions, Axiomatic Definition, Basic Theorems and properties, Venn
Diagram.
The binary number system uses only two digits: 0 and 1. The
numbers in this system have a base of 2. Digits 0 and 1 are
called bits and 8 bits together make a byte. The data in
computers is stored in terms of bits and bytes. The binary
number system does not deal with other numbers such as
2,3,4,5 and so on. For example: 100012, 1111012, 10101012 are
some examples of number`s in the binary number system.
BCA-Toppersnotes 1
Information Technology Fundamentals
Conversion from one Number Base System to Another Number Base System
From
BCA-Toppersnotes 2
Information Technology Fundamentals
1. Conversion from Binary Number System to Decimal Number System (From 2 to 10)
Example-1: Convert binary number 110010102 into decimal number.
Solution: Binary to decimal is,
= (11001010)2
= 1x27+1x26+0x25+0x24+1x23+0x22+1x21+0x20
= 128+64+0+0+8+0+2+0
= (202)10
Example-2: Convert binary number 1010.10112 into decimal number.
Solution: Binary to decimal is,
= (1010.1011)2
=1x23+0x22+1x21+0x20+1x2-1+0x2-2+1x2-3+1x2-4
= 8+0+2+0+0.5+0+0.125+0.0625
= (10.6875)10
2. Conversion from Binary Number System to Octal Number System (From 2 to 8)
Example-1 : Convert binary number 100101102 into octal number.
Solution: Method: Grouping Method
Binary to octal is,
= (1010111100)2
= (001 010 111 100)2
= (1 2 7 4)8
= (1274)8
Example-2: Convert binary number 0110 011.10112 into octal number.
Solution: Method: Grouping Method
Binary to octal is,
= (0110 011.1011)2
= (0 110 011 . 101 1)2
= (110 011 . 101 100)2
= (6 3 . 5 4)8
= (63.54)8
3. Conversion from Binary Number System to Hexadecimal Number System (From 2 to 16)
Example-1 : Convert binary number 1010101101001 2 into Hexadecimal number.
Solution: Method: Grouping Method
Binary to hexadecimal is,
= (1010101101001)2
= (1 0101 0110 1001)2
= (0001 0101 0110 1001)2
= (1 5 6 9)16
= (1569)16
Example-2 − Convert binary number 001100101.1101112 into hexadecimal number.
Solution: Method: Grouping Method
Binary to hexadecimal is,
= (001100101.110111)2
= (0 0110 0101 . 1101 1100)2
= (0110 0101 . 1101 1100)2 [ ∵ 12 = C, 13 = D in Hex]
= (6 5 . D C)16
= (65.DC)16
BCA-Toppersnotes 3
Information Technology Fundamentals
∴ 2910 = 111012
Example-2 : Convert Decimal fractional number 0.37510 into Binary number.
Solution: Method: Successive Multiplication by 2 Method
0.375 x 2 = 0.750 0 After Multiplication write down Integer part and read the integers
0.750 x 2 = 1.500 1 from top to bottom.
0.500 x 2 = 1.000 1 ∴ 0.375 10 = 0.0112
Example-3 : Convert Decimal fractional number 123.45610 into Binary number.
Solution: We convert the whole number and fractional parts separately and then combine the results.
Step 1: Convert 123 in Binary Step 2: Convert fraction 0.456 to binary
0.456 × 2 = 0.912
0.912 × 2 = 1.824
0.824 × 2 = 1.648
0.648 × 2 = 1.296
0.296 × 2 = 0.592
0.592 × 2 = 1.184
0.184 × 2 = 0.368
0.368 × 2 = 0.736
From top to bottom, write the integer parts of the
results to the fractional part of the number in base 2.
Write the remainders from bottom to top. (0.456)10 = (0.01110100...)2
(123)10 = (1111011)2 Step 3: Combine the whole number and
fractional parts to obtain the overall result.
(123.456)10 = (1111011)2 + (0.01110100...)2
= (1111011.01110100...)2
5. Conversion from Decimal Number System to Octal Number System (From 10 to 8)
Example-1 : Convert Decimal number 2910 into Octal number.
Solution: Divide the number repeatedly by 8 until the quotient becomes 0.
BCA-Toppersnotes 4
Information Technology Fundamentals
Write the remainders from bottom to top. From top to bottom, write the integer parts of the
(123)10 = (173)8 results to the fractional part of the number in base 8.
(0.456)10 = (0.35136152...)8
Step 3: Combine the whole number and fractional
parts to obtain the overall result.
(123.456)10 = (173)8 + (0.35136152...)8
= (173.35136152...)8
6. Conversion from Decimal Number System to Hexadecimal Number System (From 10 to 16)
Example-1 : Convert Decimal number 2910 into Hexadecimal number.
Solution: Divide the number repeatedly by 16 until the quotient becomes 0.
= (234.724609375)10
BCA-Toppersnotes 5
Information Technology Fundamentals
9. Conversion from Octal Number System to Hexadecimal Number System (From 8 to 16)
Example-1 : Convert octal number 5408 into hexadecimal number.
Solution: Step 1: OCTAL TO BINARY Step 2: BINARY TO HEXADECIMAL
In the first step, we convert In the second step, we
the octal number to binary. convert the binary number to
To convert an octal number hexadecimal.
to binary, we write 3 bit Starting from the least significant bit, we partition the
binary equivalent of each octal digit in the binary number into groups of 4 bits and proceed to
same order. the left.
(540)8 = (101100000)2 ∴(101100000)2 = (160)16
Example-2 − Convert octal number 352.5638 into Hexadecimal number.
Solution: Step 1-OCTAL TO BINARY Step 2-BINARY TO HEXADECIMAL
In the first In the second
step, we step, we
convert the convert the
octal number to binary. binary number to hexadecimal. Starting from the
To convert an octal number to binary, we binary point, we partition the binary number into
write 3 bit binary equivalent of each octal groups of 4 bits. In the whole number part, we
digit in the same order. proceed to the left and in the fractional part, we
(352.563)8 = (011101010.101110011)2 proceed to the right.
(011101010.101110011)2 = (EA.B98)16
Step 3: Using the equalities, we obtained in steps 1
and 2, we reach the following result.
∴(352.563)8 = (EA.B98)16
10. Conversion from Hexadecimal Number System to Binary Number System (From 16 to 2)
Example-1 : Convert Hexadecimal number 156916 into Binary number.
Solution: To convert a hexadecimal number to binary, we write 4 bit binary
equivalent of each hexadecimal digit in the same order.
∴(1569)16 = (1010101101001)2
Example-2 : Convert Hexadecimal number 65.DC16 into Binary number.
Solution: To convert a hexadecimal number to binary, we write 4 bit binary
equivalent of each hexadecimal digit in the same order.
∴(65.DC)16= (01100101.11011100)2
11. Conversion from Hexadecimal Number System to Decimal Number System (From 16 to 10)
Example-1 : Convert Hexadecimal number 1D16 into Decimal number.
Solution: We multiply each digit with its place value and add the products.
(1D)16 = (1 × 161) + (13 × 160)
= 16 + 13
= (29)10
Example-2 : Convert Hexadecimal number 7B.74B16 into Decimal number.
Solution: We multiply each digit with its place value and add the products.
(7B.74B)16 = (7 × 161) + (11 × 160) + (7 × 16-1) + (4 × 16-2) + (11 × 16-3)
= (123.4558105468)10 ≈ (123.456)10
12. Conversion from Hexadecimal Number System to Octal Number System (From 16 to 8)
Example 1: Convert Hexadecimal number 1BC16 into an octal number.
Solution: STEP 1-HEXADECIMAL TO BINARY
In the first step, we convert the hexadecimal number to binary.
BCA-Toppersnotes 6
Information Technology Fundamentals
Starting from the least significant bit, we partition the binary number into groups of 3 bits and
proceed to the left.
∴(000110111100)2 = (674)8
Example 2: Convert Hexadecimal number EA.B9816 into an octal number.
Solution: STEP 1-HEXADECIMAL TO BINARY
In the first step, we convert the hexadecimal number to binary.
To convert a hexadecimal number to binary, we write 4 bit binary equivalent of each hexadecimal
digit in the same order.
(EA.B98)16 = (11101010.101110011000)2
STEP 2-BINARY TO OCTAL
In the second step, we convert the binary number to octal.
Starting from the binary point, we partition the binary number into groups of 3 bits. In the whole
number part, we proceed to the left and in the fractional part, we proceed to the right.
∴(11101010.101110011000)2 = (352.563)8
Binary Codes: The symbolic arrangement of data or instructions in a computer program or the set of such
instructions. Binary Codes help us to represent characters in a coded form in the memory of computer. These
codes represent specific formats which are used to record data. Many Coding Schemes have been developed
over the years, but in our study, we will discuss the following coding techniques:
Computer Codes
BCA-Toppersnotes 7
Information Technology Fundamentals
Table for Decimal digit and corresponding Binary Coded Decimal (8421 Code)
BCD
Decimal Digit
8421
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
In the BCD numbering system, the given decimal number is segregated into chunks of four bits for each
decimal digit within the number. Each decimal digit is converted into its direct binary form (usually
represented in 4-bits).
Example 1: Convert 12310 in BCD. Example 2: Convert (101100111)BCD = ( ? )10
Solution: From the truth table above, Solution: From the truth table above,
1 - 0001 0001 0110 0111
2 - 0010
1 6 7
3 - 0011
∴ BCD of 12310 is 0001 0010 0011 ∴ (101100111)BCD = (167)10
Gray Code
The Gray Code is a sequence of binary number systems, which is also known as reflected binary code. We
Call it after Frank Gray. It is Unweighted Code. The reason for calling this code as reflected binary code is the
first N/2 values compared with those of the last N/2 values in reverse order. In this code, two consecutive
values are differed by one bit of binary digits. Gray codes are used in the general sequence of hardware-
generated binary numbers. These numbers cause ambiguities or errors when the transition from one number
to its successive is done. This code simply solves this problem by changing only one bit when the transition is
between numbers is done.
The gray code is a very light weighted code/ Unweighted Code because it doesn't depend on the value of the
digit specified by the position. This code is also called a cyclic variable code as the transition of one value to
its successive value carries a change of one bit only.
Generally referred as Odd one detector or Unit difference/distance detector/code or Reflective Binary Codes
(RBC)/ Cyclic Code/Minimum Distance Code.
How to generate gray code?
The prefix and reflect method are recursively used to generate the Gray code of a number. For generating
gray code:
1. We find the number of bits required to represent a number.
2. Next, we find the code for 0, i.e., 0000, which is the same as binary.
3. Now, we take the previous code, i.e., 0000, and change the most significant bit of it.
4. We perform this process reclusively until all the codes are not uniquely identified.
5. If by changing the most significant bit, we find the same code obtained previously, then the second
most significant bit will be changed, and so on.
BCA-Toppersnotes 8
Information Technology Fundamentals
∴ (123)10 = (1111011)2
Step 2: Convert binary to Gray Code
Method 1:
Binary code: 1111011
Method-1:
g6=b6=1
g5=b6⊕b5=1⊕1=0
g4=b5⊕b4=1⊕1=0
g3=b4⊕b3=1⊕1=0
g2=b3⊕b2=1⊕0=1
g1=b2⊕b1=0⊕1=1
g0=b1⊕b0=1⊕1=0
∴ Gray code : 1000110
Method-2:
b6 b5 b4 b3 b2 b1 b0 Binary
1 1 1 1 0 1 1 code
b6 b6⊕b5 b5⊕b4 b4⊕b3 b3⊕b2 b2⊕b1 b1⊕b0
1 1⊕1 1⊕1 1⊕1 1⊕0 0⊕1 1⊕1
↓ ↓ ↓ ↓ ↓ ↓ ↓
1 0 0 0 1 1 0 Gray
g6 g5 g4 g3 g2 g1 g0 code
∴ Gray code: 1000110
∴ (123)10 = (1000110)GrayCode
BCA-Toppersnotes 9
Information Technology Fundamentals
ASCII
ASCII, abbreviation of American Standard Code for Information Interchange, a standard data-transmission code that
is used by smaller and less-powerful computers to represent both textual data (letters, numbers, and punctuation
marks) and noninput-device commands (control characters). Like other coding systems, it converts information into
standardized digital formats that allow computers to communicate with each other and to efficiently process and store
data.
The ASCII code was originally developed for teletypewriters but eventually found wide application in personal
computers. The standard ASCII code uses seven-digit binary numbers; i.e., numbers consisting of various sequences of
0’s and 1’s. The code can represent 128 different characters, since there are 128 different possible combinations of
seven 0’s and 1’s. The binary sequence 1010000, for example, represents an uppercase “P,” while the sequence
1110000 represents a lowercase “p.”
Digital computers use a binary code that is arranged in groups of eight rather than of seven digits, or bits. Each such eight-
digit group is called a byte. Because digital computers use eight-bit bytes, the ASCII code is commonly embedded in an
eight-bit field consisting of the seven information bits and a parity bit that is used for error-checking purposes or to
represent special symbols. The use of an eight-bit system increased the number of characters the code could represent
to 256. The eight-bit system, which is known as the extended ASCII code, was introduced in 1981 by the International
Business Machines Corporation (IBM) for use with its first model of personal computer. This extended ASCII code soon
became the industry-wide standard for personal computers. In it, 32 code combinations are used for machine and
control commands, such as “start of text,” “carriage return,” and “form feed.” The next group of 32 combinations is
used for numbers and various punctuation symbols. Another group of 32 combinations is used for uppercase letters
and a few other punctuation marks, and the last 32 are used for lowercase letters. This the table for ASCII Characters.
BCA-Toppersnotes 10
Information Technology Fundamentals
Unicode
• Unicode is a universal character encoding standard for the representation of text which includes letters,
numbers and symbols in multi-lingual environments. The Unicode consortium based in California developed
the Unicode standard.
• Unicode uses 32 bits to represent a symbol like data
• Unicode allows 232 = 4294967296 different combinations
• Unicode can uniquely represent any character or symbol present in any language like Chinese, Japanese
etc., in addition to letters; mathematical and scientific symbols are also represented in Unicode codes.
• An advantage of Unicode is that it is compatible with ASCII-8 codes. The first 256 codes in Unicode are
identical to the ASCII-8 Codes.
• Unicode is implemented by different character encodings. UTF-8 is the most commonly used encoding
scheme. UTF stands for Unicode Transformation Format. UTF-8 uses 8 bits to 32 bits per code.
Binary Arithmetic
Binary arithmetic is basically the mathematics of binary numbers allow to perform various arithmetic
operations on binary numbers. We know that the binary number system has two digits, i.e., 0 and 1 which
are used to represent the ON or OFF states of the digital systems. Hence, binary arithmetic forms the
foundation of the digital computing.
The following four main binary arithmetic operations −
✓ Binary Addition
✓ Binary Subtraction
✓ Binary Multiplication
✓ Binary Division
Let’s discuss each of these binary arithmetic operations in detail along with solved examples.
Binary Addition
In binary arithmetic, the process of adding two binary numbers is called binary addition. Where, the binary
numbers consist of only 0 and 1. In the binary addition, a carry is generated when the sum is greater than 1.
Rules of Binary Addition
The addition of two binary numbers is performed according to these rules of binary arithmetic –
Explanation
➢ Add 1 (rightmost bit of first number) and 0 (rightmost bit of the second number). It gives 1 + 0 = 1
(thus, write down 1 as sum bit).
BCA-Toppersnotes 11
Information Technology Fundamentals
➢ Add 0 (second rightmost bit of first number) and 1 (second rightmost bit of the second number). It
gives 0 + 1 = 1 (write down 1 as sum bit).
➢ Add 1 (third rightmost bit of first number) and 1 (third rightmost bit of second number). It gives 1 +
1 = 10 (write down 0 as sum and 1 as carry).
➢ Add 1 (leftmost bit of the first number), 1 (leftmost bit of second number) and 1 (carry). It gives 1 +
1 + 1 = 11 (write down 1 as sum and 1 as carry).
➢ Write the end around carry 1 in the sum.
Thus, the result is 11011.
Explanation
✓ Add 0 (rightmost bit of first number) and 1 (rightmost bit of second number). It gives 0 + 1 = 1 (write
down 1 as sum).
✓ Add 1 (second rightmost bit of first number) and 1 (second rightmost bit of second number). It gives
1 + 1 = 10 (write down 0 as sum and 1 as carry).
✓ Add 0 (third rightmost bit of first number), 0 (third rightmost bit of second number), and 1 (carry). It
gives 0 + 0 + 1 = 1 (write down 1 as sum).
✓ Add 1 (leftmost bit of first number) and 1 (second leftmost bit of second number). It gives 1 + 1 = 10
(write down 0 as sum and 1 as carry).
✓ Add 1 (leftmost bit of second number) and 1 carry. It gives 1 + 1 = 10 (write down 0 as sum and 1 as
the end around carry).
✓ Hence, the sum of 1010 and 11011 is 100101.
Binary Subtraction
In binary arithmetic, binary subtraction is a mathematical operation used to find the difference between
two binary numbers.
In binary subtraction, each bit of the binary numbers is subtracted, starting from the rightmost bit.
Also, a borrow bit can be taken from higher bits if require.
Rules of Binary Subtraction
The binary subtraction is performed as per the following rules of binary arithmetic –
0–0=0
1–0=1
0 – 1 = 1(borrow 1 from the next higher bit)
1–1=0
Example 1: Subtract 1100 from 1101.
Solution: The subtraction of given binary numbers is given below −
BCA-Toppersnotes 12
Information Technology Fundamentals
Explanation
✓ Subtract 0 (rightmost bit of second number) from 1 (rightmost bit of first number). It gives 1 – 0 = 1
(write down 1 as difference).
✓ Subtract 0 (second rightmost bit of second number) from 0 (second rightmost bit of first number). It
gives 0 – 0 = 0 as result.
✓ Subtract 1 (third rightmost bit of second number) from 1 (third rightmost bit of first number). It
gives 1 – 1 = 0 as result.
✓ Subtract 1 (leftmost bit of second number) from 1 (leftmost bit of first number). It gives 1 – 1 = 0 as
result.
✓ Thus, the difference of 1101 and 1100 is 0001.
Explanation
✓ Subtract rightmost bits: 1 – 1 = 0.
✓ Subtract second rightmost bits: 0 – 1 = 1. A borrow 1 is taken from the next higher bit.
✓ Subtract third rightmost bits: 0 – 0 = 0. The 1 borrow is given to previous bit.
✓ Subtract leftmost bits: 1 – 1 = 0.
✓ Thus, the difference of 1101 and 1011 is 0010.
Binary Multiplication
In binary arithmetic, binary multiplication is the process of multiplying two binary numbers and obtain their
product.
In binary multiplication, we multiply each bit of one binary number by each bit of another binary number
and then add the partial products to obtain the final product.
Rules of Binary Multiplication
The multiplication of two binary numbers is performed as per the following rules of binary arithmetic −
0×0=0
0×1=0
1×0=0
1×1=1
It is clear that the binary multiplication is similar to the decimal multiplication.
Example 1: Multiply 1101 and 11.
Solution: The binary multiplication of given numbers is described below –
Explanation
✓ Multiply the rightmost bit of the second number, 1 by each bit of the first number (1101).
✓ Now, shift the partial product one position to the left to perform the next multiplication.
BCA-Toppersnotes 13
Information Technology Fundamentals
✓ Multiply the leftmost bit of the second number, 1 by each bit of the first number (1101).
✓ Finally, sum up all the partial products to obtain the final product.
✓ Hence, the product of 1101 and 11 is 100111.
Explanation
✓ Multiply rightmost bit of the second number (0) by each bit of the first binary number (11011).
✓ Shift the partial product one position to the left.
✓ Multiply the second rightmost bit of the second number (1) by each bit of the first binary number
(11011).
✓ Again, shift the partial product one position to the left.
✓ Multiply the leftmost bit of the second number (1) by each bit of the first number.
✓ Then, sum up all the partial products to obtain the final product.
✓ Hence, the product of 11011 and 110 is 10100010.
Binary Division
Binary division is one of the basic arithmetic operations used to find the quotient and remainder when
dividing one binary number by another.
Rules of Binary Division
The following rules of binary arithmetic are utilized while diving one binary number by another −
0 ÷ 0 = Undefined
0 ÷ 1 = 0 with Remainder=0
1 ÷ 0 = Undefined
1 ÷ 1 = 1 with Remainder=0
Binary Division Procedure
• Start dividing from the leftmost bits of the dividend by the divisor.
• Multiply the quotient obtained by the divisor and subtract from the dividend.
• Bring down the next bits of the dividend and repeat the division process until all the bits of given
divided are used.
Example 1: Divide 110011 by 11.
Solution: The division of the given binary numbers is given below –
In this example of binary division, the quotient obtained is 10001 and the remainder is 0
BCA-Toppersnotes 14
Information Technology Fundamentals
BCA-Toppersnotes 15
Information Technology Fundamentals
The main difference between 1’s complement and 2’s complement is that 1’s complement has two representations of
0 (zero) — 00000000, which is positive zero (+0), and 11111111, which is negative zero (-0); whereas in 2’s complement,
there is only one representation for zero — 00000000 (0) because if we add 1 to 11111111 (-1), we get 100000000,
which is nine bits long. Since only eight bits are allowed, the left-most bit is discarded(or overflowed), leaving 00000000
(-0) which is the same as positive zero.
9's Complement
The 9's complement is used to find the subtraction of the decimal numbers. The 9's complement of a number
is calculated by subtracting each digit of the number by 9.
For example, suppose we have a number 1423, and we want to find the 9's complement of the number. For
this, we subtract each digit of the number 1423 by 9.
So, the 9's complement of the number 1423 is 9999-1423= 8576.
10's Complement
The 10's complement is also used to find the subtraction of the decimal numbers. The 10's complement of a
number is calculated by subtracting each digit by 9 and then adding 1 to the result. Simply, by adding 1 to its
9's complement we can get its 10's complement value.
For example, suppose we have a number 1423, and we want to find the 10's complement of the number. For
this, we find the 9's complement of the number 1423 that is 9999-1423= 8576, and now we will add 1 to the
result.
So, the 10's complement of the number 1423 is 8576+1=8577.
BCA-Toppersnotes 16
Information Technology Fundamentals
Boolean Algebra
Boolean algebra is a division of mathematics that deals with operations on logical values and incorporates
binary variables. Boolean algebra traces its origins to an 1854 book by mathematician George Boole.
The distinguishing factor of Boolean algebra is that it deals only with the study of binary variables. Most
commonly Boolean variables are presented with the possible values of 1 ("true") or 0 ("false"). Variables can
also have more complex interpretations, such as in set theory. Boolean algebra is also known as binary
algebra or Switching algebra.
The axiomatic definition of Boolean algebra is a set of postulates that establish the fundamental properties
and operations of Boolean algebra. Boolean algebra is a mathematical structure that deals with logical
operations on binary variables, usually represented as 0 and 1.
Features:
• Boolean algebra is a branch of mathematics that deals with operations on logical values with binary
variables.
• The Boolean variables are represented as binary numbers to represent truths: 1 = true and 0 = false.
• Elementary algebra deals with numerical operations whereas Boolean algebra deals with logistical
operations.
• Boolean algebra utilizes conjunction, disjunction, and negation, as opposed to addition, subtraction,
multiplication, and division.
• The primary modern use of Boolean algebra is in computer programming languages.
• In finance, Boolean algebra is used in binomial options pricing models, which helps determine when an
option should be exercised.
BCA-Toppersnotes 17
Information Technology Fundamentals
Then the Truth tables for a 2-input AND Gate, a 2-input OR Gate and a single input NOT Gate are given as:
Note: The NAND and the NOR Gates are a combination of the AND and OR Gates respectively with that of
a NOT Gate (inverter). And these gates are called UNIVERSAL GATES, because any kind of logic circuit can
be constructed using these gates.
BCA-Toppersnotes 18
Information Technology Fundamentals
Note: As well as the standard logic gates there are also two special types of logic gate function called an
Exclusive-OR Gate and an Exclusive-NOR Gate. The Boolean expression to indicate an Exclusive-OR or
Exclusive-NOR function is to a symbol with a plus sign inside a circle, ( ⊕ ).
BCA-Toppersnotes 19
Information Technology Fundamentals
1. Annulment property: When the variable is AND with 0, it will give the result 0, and when the variable is OR with 1,
it will give the result 1, i.e.,
B.0 = 0
B+1=1
2. Identity property: When the variable is AND with 1 and OR with 0, the variable remains the same, i.e.,
B.1 = B
B+0=B
3. Idempotent property: When the variable is AND and OR with itself, the variable remains the same or unchanged,
i.e.,
B.B = B
B+B=B
4. Complement property: When the variable is AND and OR with its complement, it will give the result 0 and 1
respectively.
B.B’ = 0
B + B’ = 1
5. Double negation property: This law states that, when the variable comes with two negations, the symbol gets
removed and the original variable is obtained.
((B’))’ = B
Distributive Law:
According to distributive law, if we perform the OR operation of two or more variables and then perform the AND
operation of the result with a single variable, the result will be similar to performing the AND operation of that single
variable with each two or more variable and then perform the OR operation of that product. For three variables, the
distributive law is written as:
A(B + C) = AB + AC
A + (B.C) = (A + B)(A + C)
Associative Law:
The associative law states that the operation can be performed in any order when the variable’s priority is the same.
As ‘multiplication’ and ‘division’ have the same priority. For three variables, the associative law is written as:
A + (B + C) = (A + B) + C
A.(B.C) = (A.B).C
Commutative Law:
This law states that no matter in which order we use the variables. It means the order of variables doesn’t matter. For
two variables, the commutative law is written as:
A+B=B+A
A.B = B.A
Absorption Law:
This law allows us to absorb similar variables. The absorption law is written as:
B + (B.A) = B B.(B + A) = B A + A’.B = A + B A.(A’ + B) = A.B
BCA-Toppersnotes 20
Information Technology Fundamentals
AND Law:
These laws use the AND operation. Therefore, they are known as AND laws. The AND law is written as:
A.0 = 0
A.1 = A
A.A = A
A.A’ = 0
OR Law:
These laws use the OR operation. Therefore, they as known as OR laws. The OR law is written as:
A+0=A
A+1=A
A+A=A
A + A’ = 1
Boolean Variables
Variables used in Boolean algebra that store the logical value of 0 and 1 are called the boolean variables. They are
used to store either true or false values.
Boolean Function
A function of the Boolean Algebra that is formed by the use of Boolean variables and Boolean operators is called the
Boolean function. It is formed by combining Boolean variables and logical expressions such as AND, OR, and NOT.
Literal
A variable or the complement of the variable in Boolean Algebra is called the Literal.
Complement
The inverse of the Boolean variable is called the complement of the variable. The complement of 0 is 1 and the
complement of 1 is 0.
BCA-Toppersnotes 21
Information Technology Fundamentals
Operating Systems: Introduction, Functions of an operating System, Classification of Operating Systems, System
programs, Application programs, Utilities, The Unix Operating System, Basic Unix commands and booting.
Using Mouse
Using a mouse with a GUI-based operating system is straightforward and allows for intuitive interaction.
Parts of a Mouse:
1. Left Button: Used for selecting and clicking on items.
2. Right Button: Opens context menus (a list of options related to
the item clicked).
3. Scroll Wheel: Allows for scrolling through content.
4. Additional Buttons (on some mice): Used for navigation or
custom actions.
BCA-Toppersnotes 22
Information Technology Fundamentals
2. Clicking
• Single-Click (Left): Select an item or open a menu.
o Example: Click a file to highlight it.
• Double-Click (Left): Open files, folders, or applications.
o Example: Double-click a Word document to open it.
• Right-Click: Opens a context-specific menu.
o Example: Right-click on the desktop to access "Display Settings."
3. Drag and Drop
• Click and Hold: Click on an item, hold the button, move the mouse, then release to "drop."
o Example: Dragging a file into a folder.
4. Scrolling
• Roll the scroll wheel to move up or down through pages or lists.
o Example: Scrolling through a website or a document.
5. Selecting Multiple Items
• Click and Drag: Hold the left button while dragging to create a selection box.
• Ctrl + Click: Select multiple non-adjacent items.
• Shift + Click: Select a range of items.
6. Mouse Shortcuts
• Double-Click on Title Bar: Maximizes or restores the window.
• Right-Click + Drag: Often opens an action-specific menu when you drop the item.
BCA-Toppersnotes 23
Information Technology Fundamentals
4. Web Browsing
• Right-Click on a Web Page:
o Options include:
▪ "Back" or "Forward" to navigate.
▪ "Reload" to refresh the page.
▪ "View Page Source" (advanced users).
• Right-Click on Links: Open in a new tab or copy the link.
• Right-Click on Images: Save, copy, or inspect the image.
5. Text Editing
• Right-Click in Text Areas: Provides options like:
o Cut, Copy, or Paste text.
o Change formatting (in some text editors).
o Spell check or dictionary suggestions.
6. Specialized Uses
• Right-Click on Task Manager (Taskbar):
o Access options like "Task Manager" or customize the taskbar.
• Right-Click in Software:
o Access specific features depending on the software (e.g., layers in Photoshop or charts in Excel).
How to Customize Right-Click Options
Some operating systems allow customization of the context menu:
• Windows: Use third-party tools like "ShellExView" to manage context menu entries.
• macOS: Customize through System Preferences for certain apps.
Moving Icons
Moving icons on the screen is a simple and commonly used feature in GUI-based operating systems. Here's how you
can do it:
Steps to Move Icons:
1. Select the Icon
o Point the mouse cursor to the icon you want to move.
o Press and hold the left mouse button.
2. Drag the Icon
o While holding the left button, move the mouse to drag the icon to the desired location on the screen.
3. Release the Button
o Let go of the left mouse button to drop the icon in the new location.
BCA-Toppersnotes 24
Information Technology Fundamentals
▪ macOS: Right-click on the desktop → Select "Show View Options" → Adjust alignment
settings.
2. Avoid Overlapping:
o Icons may not overlap other icons. If there isn't enough space, the system may rearrange them.
3. Use Keyboard Shortcuts (Optional):
o Select the icon → Press Ctrl + Arrow Keys (Windows) or use specific settings (macOS/Linux).
4. Group Icons into Folders:
o If you’re organizing, you can create a folder to store multiple related icons.
Icons in GUI-based operating systems represent files, applications, or system functions, making it easier to navigate
and perform tasks.
1. Desktop Icons
• Computer/My Computer/This PC
o Provides access to drives, devices, and file management tools.
o Use: Double-click to open and browse storage devices or manage files.
• Recycle Bin
o Stores deleted files temporarily.
o Use: Double-click to view and restore deleted files or empty the bin to permanently delete them.
• File/Folder Icons
o Represent documents, images, or other stored data.
o Use: Double-click to open; right-click for options like copy, move, or delete.
Icons on the taskbar or Start menu allow quick access to frequently used applications.
BCA-Toppersnotes 25
Information Technology Fundamentals
• Volume
o Use: Adjust sound levels or mute audio.
• Battery/Power
o Use: Check battery status or power options (for laptops).
• Wi-Fi/Network
o Use: Connect to or manage networks.
• Folder
oRepresents a container for organizing files.
oUse: Double-click to open and view contents.
• Document Icon
o Represents a text file or Word document.
o Use: Open the file in its respective application.
5. Application Icons
• Cut/Copy/Paste
o Use: Manage files by cutting, copying, or pasting them to a new location.
• Delete (Trash Icon)
o Use: Remove files.
Note: Icons can be customized in many operating systems to change their appearance or replace them with user-
preferred designs.
Status Bar
The status bar is an essential component of many GUI-based applications and operating systems. It provides
information about the current state of the application or system and may include quick access to certain features.
A status bar is a horizontal bar typically located at the bottom of an application window or screen. It displays real-
time information about the current state of the application, system, or a specific task.
BCA-Toppersnotes 26
Information Technology Fundamentals
1. Application-Specific Information
o Shows details relevant to the active application, such as:
▪ Word Processors (e.g., MS Word): Word count, page number, language settings.
▪ Browsers (e.g., Chrome): Link previews when hovering over a hyperlink.
▪ Media Players: Track duration, playback status.
2. System Status Indicators
o Provides updates about system operations, such as:
▪ Network connectivity.
▪ Battery status.
▪ Background processes.
3. Progress Indicators
o Displays the progress of tasks like file downloads, installations, or uploads.
4. Shortcut Tools
o Includes quick access buttons to commonly used features like zoom, layout options, or file saving.
5. Error and Warning Messages
o Alerts users about errors, warnings, or updates directly in the status bar.
1. Web Browsers
o Displays the target URL when hovering over a link.
o Shows loading progress for web pages.
2. File Explorers
o Indicates the number of selected files or the size of the selected files.
3. Image Editors (e.g., Photoshop)
o Shows the current zoom level, file size, and color mode.
4. Taskbar in Operating Systems
o Acts as a global status bar showing notifications, time, volume, and quick access to settings.
1. Enable or Disable
o Many applications allow you to hide or show the status bar through their View menu.
2. Modify Features
o Advanced applications let you choose what information appears on the status bar.
• Real-Time Updates: Keeps users informed about the application's state or task progress.
• Quick Access: Offers shortcuts to essential features.
• Efficiency: Saves time by providing useful insights at a glance.
BCA-Toppersnotes 27
Information Technology Fundamentals
In GUI-based operating systems and applications, menus and menu selection are essential components that help
users interact with the system or software by offering organized options for various actions.
What is a Menu?
A menu is a list of options or commands presented to the user. Menus are typically displayed when a user interacts
with a part of the interface, such as by clicking on a menu bar, right-clicking, or selecting a button.
1. Menu Bar
o A horizontal bar at the top of the screen, often found in most applications.
o Contains menu items that, when clicked, reveal further options.
o Example menu items: File, Edit, View, Help.
2. Contextual (Right-Click) Menus
o Pop up when you right-click on an item or area.
o Show options relevant to the specific context.
o Example: Right-click on a file might show options like Open, Rename, Delete.
3. Drop-Down Menus
o A menu that appears below a menu bar item when clicked or hovered over.
o It usually contains sub-options.
o Example: File → Save As, View → Zoom In.
4. Pop-up Menus
o Appear when triggered by specific actions (e.g., clicking a button or right-clicking on an area).
o Temporary and disappear when an option is selected.
5. Submenus
o Menus that appear when a menu item is selected, revealing additional options.
o Example: File → New → Document (a submenu under the "New" option).
6. Toolbar Menus
o Small icons arranged on a toolbar, often for quick access to frequently used functions (e.g., saving,
printing).
o Clicking an icon triggers a command directly.
1. Mouse Interaction:
o Clicking: Click on a menu item to select an option.
o Hovering: Hovering over a menu item may reveal a submenu or highlight the option.
2. Keyboard Interaction:
o Alt + Key Shortcut: In many programs, pressing Alt along with an underlined letter will open the
associated menu item. For example, Alt + F to open the File menu.
o Arrow Keys: After opening a menu, you can use arrow keys to navigate through options.
o Enter: Press Enter to select an option from the menu.
o Esc: Press Esc to close the menu without selecting.
1. File Menu
o New: Create a new document or project.
o Open: Open an existing file.
o Save/Save As: Save the current work or save it with a new name.
o Exit/Close: Close the application.
BCA-Toppersnotes 28
Information Technology Fundamentals
2. Edit Menu
o Undo/Redo: Revert or apply changes.
o Cut/Copy/Paste: Move or duplicate text/data.
o Find/Replace: Search for text or data.
3. View Menu
o Zoom In/Out: Adjust the zoom level.
o Toolbars: Show or hide specific toolbars.
o Full Screen: Toggle full-screen mode.
4. Help Menu
o Help Topics: Access documentation or help guides.
o About: View information about the software (version, credits).
1. Accelerators (Hotkeys):
o Specific keyboard shortcuts assigned to menu items (e.g., Ctrl + C for Copy, Ctrl + V for Paste).
2. Mnemonics:
o A letter within a menu option is often underlined to indicate that it can be activated by pressing Alt +
[Letter].
o Example: In the File menu, Alt + F opens the menu.
3. Dynamic Menus:
o Menus can update based on user context or changes in the application.
o Example: In a word processor, the Insert menu might show options for tables only when you're
editing a document.
• Organized Navigation: Menus provide a structured way to access functions, making it easier for users to find
what they need.
• Efficiency: They allow quick access to features with minimal effort, especially when using keyboard shortcuts.
• Consistency: Most operating systems and applications use similar menu structures, so users can apply their
knowledge across different software.
Running an Application:
1. Running an Application Using the Start Menu (Windows) or Applications Folder (macOS/Linux)
Windows:
1. Click the Start Menu:
o On the taskbar, click the Start button (Windows icon) or press the Windows key on your keyboard.
2. Search for the Application:
o Type the name of the application (e.g., Microsoft Word, Notepad) in the search bar.
3. Select the Application:
o From the search results, click the application you want to run. This will launch the application.
macOS:
1. Open the Applications Folder:
o Click the Finder icon (smiley face) in the Dock, then go to Applications from the sidebar or Go >
Applications from the top menu.
2. Double-Click the Application:
BCA-Toppersnotes 29
Information Technology Fundamentals
BCA-Toppersnotes 30
Information Technology Fundamentals
Troubleshooting:
• Application Not Launching:
o Make sure the application is installed correctly.
o Check if the application has any pending updates.
o Try restarting your system or reinstalling the app if necessary.
• Permissions Issues:
o Some applications may require administrator privileges. Right-click on the application and select Run
as Administrator (Windows) or use Sudo in Linux/macOS Terminal.
Viewing files, folders, and directories is a fundamental task in any GUI-based operating system. Here's a guide to how
you can navigate, view, and manage files and folders on different systems:
1. Viewing Files and Folders in GUI (Windows, macOS, Linux)
Windows:
1. File Explorer:
o To view files and folders, open File Explorer (press Windows + E or click the File Explorer icon from
the taskbar).
2. Navigating Folders:
o Quick Access: Displays recently used files and folders.
o This PC: Shows your local drives, such as the C: drive, Documents, Pictures, and Downloads.
o Left Sidebar: Use the sidebar to quickly navigate to common locations like Desktop, Documents,
Downloads, or connected devices.
3. Viewing Files:
o Icons View: Click View in the top menu and choose from different layouts like Large Icons, Medium
Icons, or List to change how files are displayed.
o Preview: You can see a preview of a file by clicking on it (for supported file types like images, text
files).
4. Opening Folders:
o Double-Click a folder to open it and view its contents.
BCA-Toppersnotes 31
Information Technology Fundamentals
macOS:
1. Finder:
o Open Finder (click the smiley face icon in the Dock).
2. Navigating Folders:
o Sidebar: Use the sidebar in Finder to quickly navigate to locations like Documents, Desktop,
Downloads, and connected drives.
o Go Menu: Use the Go menu at the top to access specific locations like Applications, Home, or
Network.
3. Viewing Files:
o Icons View: In Finder, you can choose Icon View, List View, or Column View to organize how files and
folders are displayed.
o Preview: You can press the Spacebar to see a quick preview of a file without opening it.
4. Opening Folders:
o Double-Click a folder in Finder to open it and view its contents.
Linux (Ubuntu):
1. File Manager (Nautilus):
o Open File Manager (also called Nautilus in Ubuntu) by clicking the File icon in the launcher.
2. Navigating Folders:
o Home Folder: By default, you start in the Home directory, which contains your personal files and
folders.
o Sidebar: The sidebar provides quick access to Documents, Downloads, Pictures, and Other Locations
(including network drives).
3. Viewing Files:
o Icons View: You can switch between different views like Icon View, List View, or Grid View from the
toolbar or right-click context menu.
4. Opening Folders:
o Double-Click on a folder to open and view its contents.
BCA-Toppersnotes 32
Information Technology Fundamentals
2. Finder Search:
o In Finder, type in the search bar at the top-right and filter by Name, Kind, or Date Modified.
Linux:
1. Search Bar in File Manager:
o Use the search bar in the top-right corner of Nautilus to search for files or folders.
2. Find Command (Terminal):
o You can use the find command in the Terminal for advanced searching. For example:
find /path/to/search -name "filename"
BCA-Toppersnotes 33
Information Technology Fundamentals
Linux (Ubuntu):
1. Creating a File:
o Open a file manager (e.g., Nautilus).
o Navigate to the directory where you want to create a new file.
o Right-Click in an empty area and select Create Document (if available) or use a text editor like Gedit
or LibreOffice Writer to create a new file manually.
o After creating the file, you can choose a name for it and save it.
2. Creating a Folder:
o In Nautilus (file manager), navigate to the directory where you want the folder.
o Right-Click in an empty area and select New Folder.
o A new folder will appear with the name Untitled Folder or something similar, and you can
immediately rename it.
BCA-Toppersnotes 34
Information Technology Fundamentals
o Use short, descriptive names without special characters that might cause issues.
macOS:
1. Renaming a File or Folder:
o Right-Click the file or folder in Finder.
o Select Rename from the context menu.
o The name will become editable. Enter the new name and press Enter.
Alternatively:
o Click on the file or folder name to highlight it, then click again to edit the name.
2. Tips for Renaming:
o Be mindful of file extensions, as changing them can make files unreadable.
o You can use spaces, but avoid special characters in the file/folder name.
Linux (Ubuntu):
1. Renaming a File or Folder:
o Right-Click the file or folder in Nautilus.
o Select Rename from the context menu.
o The name will become editable. Type the new name and press Enter.
Alternatively:
o Click once on the file or folder name to highlight it, then click again to edit the name.
2. Tips for Renaming:
o Avoid using special characters in names to prevent issues with the system (e.g., *, ?, |, etc.).
o Be cautious about changing file extensions unless you're certain about the file type.
BCA-Toppersnotes 35
Information Technology Fundamentals
1. Opening Windows
Windows:
1. Opening a Window (Application or File):
o Start Menu: Click the Start button (Windows icon) at the bottom-left corner, search for an app, and
click it to open.
o Taskbar: If an application is pinned to the Taskbar, click its icon to open it.
o File Explorer: Open File Explorer by clicking its icon on the taskbar or pressing Windows + E. Navigate
to the folder you want to open.
o Keyboard Shortcut: Press Win + R to open the Run dialog, type the name of the application or folder,
and press Enter.
o Double-Click: Double-click any file, folder, or shortcut on the desktop or in File Explorer to open it.
2. Multiple Windows:
o You can have multiple applications or files open at the same time. Each one will open in a separate
window.
o Alt + Tab: Use Alt + Tab to cycle through open windows and select the one you want.
macOS:
1. Opening a Window (Application or File):
o Spotlight Search: Press Command + Space to open Spotlight. Type the name of the application or file
and press Enter.
o Dock: Click on an application icon in the Dock to open it.
o Finder: Open Finder, navigate to the folder you want to open, and double-click it.
o Applications Folder: Open the Applications folder in Finder and double-click on an app to launch it.
2. Multiple Windows:
o macOS supports multiple windows for each app. For example, you can open multiple Finder windows
or different documents in Microsoft Word.
o Command + Tab: Use Command + Tab to switch between open applications.
Linux (Ubuntu):
1. Opening a Window (Application or File):
o Application Menu: Click the Activities or Show Applications button to search for an application or
browse your installed programs.
o File Manager: Open Nautilus or any file manager, navigate to a folder, and double-click it to open.
o Terminal: Press Ctrl + Alt + T to open a Terminal window.
o Keyboard Shortcut: Press Alt + F2, type the name of the application (e.g., firefox), and press Enter to
open it.
2. Multiple Windows:
o Linux allows you to open multiple windows of the same application (e.g., multiple terminal windows
or file manager windows).
o Alt + Tab: Use Alt + Tab to switch between open windows.
2. Closing Windows
Windows:
1. Closing a Window (Application or File):
o Click the X: Click the X button at the top-right corner of a window to close it.
o Alt + F4: Press Alt + F4 to close the active window or application. If no windows are open, it will bring
up the Shut Down dialog.
o Taskbar: Right-click the application icon in the Taskbar and select Close window.
2. Closing All Windows (Minimized/Multiple):
o Task View: Click the Task View button next to the Start menu or press Win + Tab to see all open
windows and close them individually or select to close all from the Task Manager.
BCA-Toppersnotes 36
Information Technology Fundamentals
macOS:
1. Closing a Window (Application or File):
o Click the Red Button: In the top-left corner of the window, click the red close button to close the
window.
o Command + Q: Use Command + Q to quit the entire application (closing all windows within that app).
o Command + W: Use Command + W to close the current window within an application, but leave the
app running.
2. Close All Windows of an App:
o Force Quit: If an application is unresponsive, press Command + Option + Esc to open the Force Quit
Applications window and select the app to force close it.
Linux (Ubuntu):
1. Closing a Window (Application or File):
o Click the X: In the top-right corner of a window, click the X button to close the window.
o Ctrl + Q: Use Ctrl + Q to quit the active application (if supported).
o Alt + F4: Press Alt + F4 to close the current window or application.
2. Close All Windows of an App:
o System Monitor: If an application is not responding, you can open System Monitor (similar to Task
Manager in Windows) and force-close the application from there.
BCA-Toppersnotes 37
Information Technology Fundamentals
Using Help
Using the Help feature is essential for troubleshooting, learning about software functionality, and finding solutions to
common issues. Here's a description on how to access and use the Help feature in Windows, macOS, and Linux
operating systems:
BCA-Toppersnotes 38
Information Technology Fundamentals
BCA-Toppersnotes 39
Information Technology Fundamentals
Creating Shortcuts:
Creating shortcuts is a great way to quickly access files, folders, applications, and even websites without having to
navigate through multiple menus or folders. Below is a description on how to create shortcuts in Windows, macOS,
and Linux operating systems.
BCA-Toppersnotes 40
Information Technology Fundamentals
3. Create Alias:
o From the context menu, select Make Alias.
o An alias (shortcut) will be created in the same location as the original file, with the word "alias"
appended to the name.
4. Move the Alias to the Desktop:
o Drag the alias to the Desktop or any location where you want it for quick access.
Creating a Shortcut for an Application in the Dock:
1. Drag the Application to the Dock:
o Find the application in Finder (or Launchpad) and drag it to the Dock.
o This will create a shortcut in the Dock for quick access.
4. Organizing Shortcuts
1. Folder for Shortcuts:
o You can create a Shortcut folder (e.g., on your Desktop or Start Menu) where you can place all your
shortcuts for easy access.
2. Group Shortcuts:
o On Windows, you can right-click on your Desktop, select New > Folder, and then group related
shortcuts in this folder.
o On macOS, you can create a folder on the Desktop and move your aliases (shortcuts) into it.
3. Pinning Shortcuts:
o On Windows, you can pin a shortcut to the Taskbar or Start Menu for quicker access.
o On macOS, you can pin application shortcuts to the Dock.
BCA-Toppersnotes 41
Information Technology Fundamentals
o In Linux, you can create a launcher or pin shortcuts to the Panel (using the GNOME or Unity desktop
environments).
5. Customizing Shortcuts
• Change the Name: You can right-click on a shortcut and select Rename to give it a more meaningful name.
• Change the Icon: In Windows and macOS, you can change the icon of a shortcut:
o Windows: Right-click on the shortcut > Properties > Change Icon.
o macOS: Right-click on the alias > Get Info > click the icon and paste a new icon.
Common Utilities
Common utilities are essential programs or tools that help users perform basic tasks, troubleshoot issues, or manage
system resources on an operating system. These utilities are typically included by default in most operating systems
or can be easily installed. Here’s a breakdown of common utilities across Windows, macOS, and Linux.
BCA-Toppersnotes 42
Information Technology Fundamentals
BCA-Toppersnotes 43
Information Technology Fundamentals
4. Cross-Platform Utilities
Web Browsers (Chrome, Firefox, Edge)
• Description: Essential utilities for accessing the internet.
• Key Features:
o Browse websites, manage bookmarks, and use extensions.
o Sync data (bookmarks, passwords) across devices.
o Manage browsing history and privacy.
Text Editors (Notepad++, Sublime Text, VS Code)
• Description: Tools for editing plain text and code.
• Key Features:
o Syntax highlighting for code editing.
o Advanced search and replace functions.
o Extensions for various programming languages.
Cloud Storage (Google Drive, Dropbox, OneDrive)
• Description: Cloud services for storing and syncing files across devices.
• Key Features:
o Upload, download, and share files securely.
o Synchronize files between multiple devices.
o Access files from any web browser or app.
Compression Tools (WinRAR, 7-Zip, The Unarchiver)
• Description: Utilities for compressing and decompressing files.
• Key Features:
o Create and extract compressed archives (ZIP, RAR, TAR).
o Password protection and encryption for archives.
o Multi-platform support for sharing compressed files.
5. Utility Apps for Troubleshooting
Antivirus/Malware Tools
• Windows: Windows Defender, Malwarebytes
• macOS: Malwarebytes, Avast
BCA-Toppersnotes 44
Information Technology Fundamentals
Operating System:
The Operating System is a system program −
• An operating system is a program that acts as an interface between the software and the computer
hardware.
• It is an integrated set of specialized programs used to manage overall resources and operations of
the computer.
• It is a specialized software that controls and monitors the execution of all other programs that reside
in the computer, including application programs and other system software.
Objectives of Operating System
The objectives of the operating system are −
• To make the computer system convenient to use in an efficient manner.
• To hide the details of the hardware resources from the users.
• To provide users a convenient interface to use the computer system.
• To act as an intermediary between the hardware and its users, making it easier for the users to access
and use other resources.
• To manage the resources of a computer system.
• To keep track of who is using which resource, granting resource requests, and mediating conflicting
requests from different programs and users.
• To provide efficient and fair sharing of resources among users and programs.
**Characteristics of Operating System
Here is a list of some of the most prominent characteristic features of Operating Systems −
• Memory Management − Keeps track of the primary memory, i.e. what part of it is in use by whom,
what part is not in use, etc. and allocates the memory when a process or program requests it.
• Processor Management − Allocates the processor (CPU) to a process and deallocates the processor
when it is no longer required.
• Device Management − Keeps track of all the devices. This is also called I/O controller that decides
which process gets the device, when, and for how much time.
• File Management − Allocates and de-allocates the resources and decides who gets the resources.
• Security − Prevents unauthorized access to programs and data by means of passwords and other
similar techniques.
• Job Accounting − Keeps track of time and resources used by various jobs and/or users.
• Control Over System Performance − Records delays between the request for a service and from
the system.
BCA-Toppersnotes 45
Information Technology Fundamentals
• Interaction with the Operators − Interaction may take place via the console of the computer in the
form of instructions. The Operating System acknowledges the same, does the corresponding
action, and informs the operation by a display screen.
• Error-detecting Aids − Production of dumps, traces, error messages, and other debugging and
error-detecting methods.
• Coordination Between Other Software and Users − Coordination and assignment of compilers,
interpreters, assemblers, and other software to the various users of the computer systems.
Functions of Operating Systems
Following are some of important functions of an operating System.
• Memory Management
• Processor Management
• Device Management
• File Management
• Security
• Control over system performance
• Job accounting
• Error detecting aids
• Coordination between other software and users
Memory Management
Memory management refers to management of Primary Memory or Main Memory. Main memory is a
large array of words or bytes where each word or byte has its own address.
Main memory provides a fast storage that can be accessed directly by the CPU. For a program to be
executed, it must in the main memory. An Operating System does the following activities for memory
management −
• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are not in use.
• In multiprogramming, the OS decides which process will get memory when and how much.
• Allocates the memory when a process requests it to do so.
• De-allocates the memory when a process no longer needs it or has been terminated.
Processor Management
In multiprogramming environment, the OS decides which process gets the processor when and for how
much time. This function is called process scheduling. An Operating System does the following activities
for processor management −
• Keeps tracks of processor and status of process. The program responsible for this task is known as
traffic controller.
• Allocates the processor (CPU) to a process.
• De-allocates processor when a process is no longer required.
Device Management
An Operating System manages device communication via their respective drivers. It does the following
activities for device management −
• Keeps tracks of all devices. Program responsible for this task is known as the I/O controller.
• Decides which process gets the device when and for how much time.
• Allocates the device in the efficient way.
• De-allocates devices.
File Management
A file system is normally organized into directories for easy navigation and usage. These directories may
contain files and other directions.
BCA-Toppersnotes 46
Information Technology Fundamentals
This type of operating system does not interact with the computer directly. There is an operator which
takes similar jobs having the same requirement and group them into batches. It is the responsibility of the
operator to sort jobs with similar needs.
• It is very difficult to guess or know the time required for any job to complete. Processors of the
batch systems know how long the job would be when it is in queue
• Multiple users can share the batch systems
• The idle time for the batch system is very less
• It is easy to manage large work repeatedly in batch systems
BCA-Toppersnotes 47
Information Technology Fundamentals
• It is sometimes costly
• The other jobs will have to wait for an unknown time if any job fails
Examples of Batch based Operating System: Payroll System, Bank Statements, etc.
Each task is given some time to execute so that all the tasks work smoothly. Each user gets the time of CPU
as they use a single system. These systems are also known as Multitasking Systems. The task can be from
a single user or different users also. The time that each task gets to execute is called quantum. After this
time interval is over OS switches over to the next task.
• Reliability problem
• One must have to take care of the security and integrity of user programs and data
• Data communication problem
These types of the operating system is a recent advancement in the world of computer technology and
are being widely accepted all over the world and, that too, with a great pace. Various autonomous
interconnected computers communicate with each other using a shared communication network.
Independent systems possess their own memory unit and CPU. These are referred to as loosely coupled
systems or distributed systems. These system’s processors differ in size and function. The major benefit of
working with these types of the operating system is that it is always possible that one user can access the
files or software which are not actually present on his system but some other system connected within
this network i.e., remote access is enabled within the devices connected in that network.
• Failure of one will not affect the other network communication, as all systems are independent
from each other
• Electronic mail increases the data exchange speed
• Since resources are being shared, computation is highly fast and durable
• Load on host computer reduces
• These systems are easily scalable as many systems can be easily added to the network
• Delay in data processing reduces
BCA-Toppersnotes 48
Information Technology Fundamentals
• These types of systems are not readily available as they are very expensive. Not only that the
underlying software is highly complex and not understood well yet
These systems run on a server and provide the capability to manage data, users, groups, security,
applications, and other networking functions. These types of operating systems allow shared access of
files, printers, security, applications, and other networking functions over a small private network. One
more important aspect of Network Operating Systems is that all the users are well aware of the underlying
configuration, of all other users within the network, their individual connections, etc. and that’s why these
computers are popularly known as tightly coupled systems.
Examples of Network Operating System are: Microsoft Windows Server 2003, Microsoft Windows Server
2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD, etc.
• Maximum Consumption: Maximum utilization of devices and system, thus more output from all
the resources
• Task Shifting: The time assigned for shifting tasks in these systems are very less. For example, in
older systems, it takes about 10 microseconds in shifting one task to another, and in the latest
systems, it takes 3 microseconds.
• Focus on Application: Focus on running applications and less importance to applications which are
in the queue.
BCA-Toppersnotes 49
Information Technology Fundamentals
• Real-time operating system in the embedded system: Since the size of programs are small, RTOS
can also be used in embedded systems like in transport and others.
• Error Free: These types of systems are error-free.
• Memory Allocation: Memory allocation is best managed in these types of systems.
Disadvantages of RTOS:
• Limited Tasks: Very few tasks run at the same time and their concentration is very less on few
applications to avoid errors.
• Use heavy system resources: Sometimes the system resources are not so good and they are
expensive as well.
• Complex Algorithms: The algorithms are very complex and difficult for the designer to write on.
• Device driver and interrupt signals: It needs specific device drivers and interrupts signals to
respond earliest to interrupts.
• Thread Priority: It is not good to set thread priority as these systems are very less prone to
switching tasks.
Examples of Real-Time Operating Systems are: Scientific experiments, medical imaging systems, industrial
control systems, weapon systems, robots, air traffic control systems, etc.
Application Programs vs System Programs
There are mainly two categories of programs i.e. application programs and system programs. A diagram
that demonstrates their place in the logical computer hierarchy is as follows −
Application Programs
These programs perform a particular function directly for the users. Some of the common application
programs include Email, web browsers, gaming software, word processors, graphics software, media
player etc.
All of these programs provide an application to the end users, so they are known as application
programs. For example: a web browser is used to find information while a gaming software is used to
play games.
The requests for service and application communication systems used in an application by a programmer
is known as an application program interface (API).
BCA-Toppersnotes 50
Information Technology Fundamentals
System Programs
The system programs are used to program the operating system software. While application programs
provide software that is used directly by the user, system programs provide software that are used by
other systems such as SaaS applications, computational science applications etc.
• Using system programming, a programmer can make assumptions about the hardware of the
system that the program runs on.
• A low level programming language is used in system programming normally. This is so that the
programs can operate in low resource environments easily.
• Most system programs are created to have a low runtime overhead. These programs may have
small runtime library.
• Some parts of the system programs may be directly written in assembly language by the
programmers.
• A debugger cannot be used on system programs mostly. This problem can be solved by running
the programs in a simulated environment.
Some examples of system programs are operating system, networking system, web site server, data
backup server etc.
Utility Software
The Utility Software is system software that helps to maintain the proper and smooth functioning of a
Computer System. It assists the Operating System to manage, organize, maintain, and optimize the
functioning of the computer system.
Utility Software performs certain tasks like virus detection, installation, and uninstallation, data backup,
deletion of unwanted files, etc. Some examples are antivirus software, file management tools,
compression tools, disk management tools, etc.
3. Compression Tools
An important part of a computer is storage space, it is very important to maintain this storage. Therefore,
we use certain utility software to compress big files and decrease their size, these are compression tools.
The format of the files changes while compressing and we cannot access or edit them directly. In addition,
BCA-Toppersnotes 51
Information Technology Fundamentals
we can easily decompress the file and get the original file back. Examples of compression tools are WinZip,
WinRAR, WinAce, PeaZip, 7-Zip, etc.
6. Disk Defragmenter
This utility software helps to reduce the fragmentation and hence, reduces the access speed.
Defragmenting refers to rearranging files and storing them in contiguous memory locations. Moreover,
saves time in reading from files and writing files to disk. Examples of disk defragmenters are Perfect disk,
Deflaggler, etc.
7. Backup Utility
This utility software helps to back up the files, folders, databases, or complete disks. Moreover, backup
refers to duplicating the disk information so that the data can be restored if any data loss happens.
Enhances performance.
• Manages space.
• Manages files and data.
• Helps to customize interface and desktop.
• Helps to remove useless files.
• Keep the system safe and secure.
• Helps to recover files after a loss.
In conclusion, we can say that it makes the working of a computer system efficient.
UNIX Introduction
What is UNIX?
UNIX is an operating system which was first developed in the 1960s, and has been under constant
development ever since. By operating system, we mean the suite of programs which make the computer
work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops.
UNIX systems also have a graphical user interface (GUI) similar to Microsoft Windows which provides an
easy to use environment. However, knowledge of UNIX is required for operations which aren't covered by
a graphical program, or for when there is no windows interface available, for example, in a telnet session.
Multitasking: A UNIX operating system is a multitasking operating system that allows you to initiate more
than one task from the same terminal so that one task is performed as a foreground and the other task as
a background process.
BCA-Toppersnotes 52
Information Technology Fundamentals
Multi-user: UNIX operating system supports more than one user to access computer resources like main
memory, hard disk, tape drives, etc. Multiple users can log on to the system from different terminals and
run different jobs that share the resources of a command terminal.
Portability: This feature makes the UNIX work on different machines and platforms with the easy transfer
of code to any computer system.
File Security and Protection: Being a multi-user system, UNIX makes special consideration for file and
system security. UNIX has different levels of security using assigning username and password to individual
users ensuring the authentication, at the level providing file access permission viz. read, write and execute
and lastly file encryption to change the file into an unreadable format.
Command Structure: UNIX commands are easy to understand and simple to use. Example: "cp", mv etc.
While working in the UNIX environment, the UNIX commands are case-sensitive and are entered in lower
case.
Open Source: UNIX operating system is open source it means it is freely available to all and is a community-
based development project.
Types of UNIX
There are many different versions of UNIX, although they share common similarities. The most popular
varieties of UNIX are Sun Solaris, GNU/Linux, and MacOS X. Linux in its turn is packaged in a form known
as a Linux distribution. There are several Linux distributions, both free and commercial.
The kernel
The kernel of UNIX is the hub of the operating system: it allocates time and memory to programs and
handles the filestore and communications in response to system calls.
As an illustration of the way that the shell and the kernel work together, suppose a user types rm myfile
(which has the effect of removing the file myfile). The shell searches the filestore for the file containing
the program rm, and then requests the kernel, through system calls, to execute the program rm on myfile.
When the process rm myfile has finished running, the shell then returns the UNIX prompt % to the user,
indicating that it is waiting for further commands.
The shell
The shell acts as an interface between the user and the kernel. When a user logs in, the login program
checks the username and password, and then starts another program called the shell. The shell is a
command line interpreter (CLI). It interprets the commands the user types in and arranges for them to be
carried out. The commands are themselves programs: when they terminate, the shell gives the user
another prompt (% on our systems).
The user can customise his/her own shell, and users can use different shells on the same machine. Most
accounts on our clusters have the bash shell by default.
The bash and tcsh shells have certain features to help the user inputting commands.
The programs
One of the main features of Linux is that it includes a variety of small programs to meet various needs.
Typically, each of these programs does one thing and does it well. This modular design allows the
functionality of small programs to be mixed and matched. As you become more familiar with Linux, you
will find that this design provides you great flexibility and power to accomplish almost any task. Typically
these programs operate on top of the shell, but they may also interface directly with the kernel.
BCA-Toppersnotes 53
Information Technology Fundamentals
Booting
Booting is the process of starting a computer. It can be initiated by hardware such as a button press or by a
software command. After it is switched on, a CPU has no software in its main memory, so some processes
must load software into memory before execution. This may be done by hardware or firmware in the CPU or
by a separate processor in the computer system.
Restarting a computer also is called rebooting, which can be "hard", e.g., after electrical power to the CPU is
switched from off to on, or "soft", where the power is not cut. On some systems, a soft boot may optionally
clear RAM to zero. Hard and soft booting can be initiated by hardware such as a button press or a software
command. Booting is complete when the operative runtime system, typically the operating system and some
applications, is attained.
Sequencing of Booting
Booting is a start-up sequence that starts the operating system of a computer when it is turned on. A boot
sequence is the initial set of operations that the computer performs when it is switched on. Every computer
has a boot sequence.
1. Bootloader
2. Boot Device
3. Boot Sequence
1. Boot Loader: Computers powered by the central processing unit can only execute code found in the
system's memory. Modern operating systems and application program code and data are stored on
nonvolatile memories. When a computer is first powered on, it must initially rely only on the code and data
stored in nonvolatile portions of the system's memory. The operating system is not really loaded at boot time,
and the computer's hardware cannot perform many complex systems actions.The program that starts the
chain reaction that ends with the entire operating system being loaded is the boot loader or bootstrap loader.
The boot loader's only job is to load other software for the operating system to start.
BCA-Toppersnotes 54
Information Technology Fundamentals
2. Boot Devices: The boot device is the device from which the operating system is loaded. A modern PC BIOS
(Basic Input/Output System) supports booting from various devices. These include the local hard disk drive,
optical drive, floppy drive, a network interface card, and a USB device. The BIOS will allow the user to configure
a boot order. If the boot order is set to:
• CD Drive
• Hard Disk Drive
• Network
The BIOS will try to boot from the CD drive first, and if that fails, then it will try to boot from the hard disk
drive, and if that fails, then it will try to boot from the network, and if that fails, then it won't boot at all.
3. Boot Sequence: There is a standard boot sequence that all personal computers use. First, the CPU runs an
instruction in memory for the BIOS. That instruction contains a jump instruction that transfers to the BIOS
start-up program. This program runs a power-on self-test (POST) to check that devices the computer will rely
on are functioning properly. Then, the BIOS goes through the configured boot sequence until it finds a
bootable device. Once BIOS has found a bootable device, BIOS loads the boot sector and transfers execution
to the boot sector. If the boot device is a hard drive, it will be a master boot record (MBR).
The MBR code checks the partition table for an active partition. If one is found, the MBR code loads that
partition's boot sector and executes it. The boot sector is often operating system specific, and however, in
most operating systems, its main function is to load and execute the operating system kernel, which continues
start-up. Suppose there is no active partition, or the active partition's boot sector is invalid. In that case, the
MBR may load a secondary boot loader which will select a partition and load its boot sector, which usually
loads the corresponding operating system kernel.
Types of Booting
There are two types of booting in an operating system.
1. Cold Booting
2. Warm Booting
1. Cold Booting: When the computer starts for the first time or is in a shut-down state and switch on the
power button to start the system, this type of process to start the computer is called cold booting.
During cold booting, the system will read all the instructions from the ROM (BIOS) and the Operating
System will be automatically get loaded into the system. This booting takes more time than Hot or
Warm Booting.
2. Warm Booting: Warm or Hot Booting process is when computer systems come to no response or
hang state, and then the system is allowed to restart during on condition. It is also referred to as
rebooting. There are many reasons for this state, and the only solution is to reboot the computer.
Rebooting may be required when we install new software or hardware. The system requires a reboot
to set software or hardware configuration changes, or sometimes systems may behave abnormally or
may not respond properly. In such a case, the system has to be a force restart. Most
commonly Ctrl+Alt+Del button is used to reboot the system. Else, in some systems, the external reset
button may be available to reboot the system.
BCA-Toppersnotes 55