Professional Documents
Culture Documents
Index
I. Content ......................................................................II
V. Application .............................................................129
Book at a Glance
I/JNU OLE
Contents
Chapter I ....................................................................... ...............................................................................1
Number System and Codes ......................................................................................................................... 1
Aim ....................................................................... ........................................................................................ 1
Objectives ....................................................................... .............................................................................. 1
Learning outcome .......................................................................................................................................... 1
1.1 Introduction ..............................................................................................................................................2
1.2 Binary System ..........................................................................................................................................2
1.2.1 Binary to Decimal Conversion ................................................................................................ 4
1.3 Decimal to Binary Conversion .................................................................................................................5
1.4 Octal Number System ..............................................................................................................................7
1.4.1 Octal to Decimal Conversion ...................................................................................................7
1.4.2 Decimal to Octal Conversion ...................................................................................................7
1 .4.3 Octal to Binary Conversion ..................................................................................................... 8
1.4.4 Binary to Octal Conversion ..................................................................................................... 9
1.5 Hexadecimal Number System ..................................................................................................................9
1.5.1 Hex to Decimal Conversion ...................................................................................................10
1.5.2 Decimal to Hex Conversion ....................................................................................................11
1.5.3 Hex to Binary Conversion ..................................................................................................... 12
1.5.4 Binary to Hex Conversion ..................................................................................................... 12
1.5.5 Hex to Octal Conversion ........................................................................................................12
1.5.6 Octal to Hex Conversion ........................................................................................................12
1.6 Codes....................................................................... .............................................................................. 13
1.6.1 BCD Code ..............................................................................................................................13
1.6.2 ASCII Code ............................................................................................................................13
1.6.3 Code Gray ..............................................................................................................................13
1.6.4 Excess 3 13
1.7 Binary Arithmetic ...................................................................................................................................14
1.7.1 Addition ................................................................................................................................. 14
1.7.1.1 Addition of Signed Numbers ...................................................................................15
1.7.1.2 Subtraction .............................................................................................................. 15
1.7.2 Multiplication .........................................................................................................................16
1.7.3 Division ..................................................................................................................................16
Summary ....................................................................... .............................................................................33
References ....................................................................... ...........................................................................18
Recommended Reading .............................................................................................................................18
Self Assessment ...........................................................................................................................................19
II/JNU OLE
2.4 Logic circuits/networks ..........................................................................................................................28
Summary ....................................................................... .............................................................................33
References ....................................................................... ...........................................................................33
Recommended Reading .............................................................................................................................33
Self Assessment ...........................................................................................................................................34
III/JNU OLE
4.4 Programming Languages ....................................................................................................................... 55
4.4.1 Machine Language .................................................................................................................55
4.4.2 Assembly Language ...............................................................................................................55
4.4.3 High Level Language .............................................................................................................55
4.4.4 Fourth Generation Language ................................................................................................. 55
4.4.5 Natural Language ...................................................................................................................56
4.5 Systems Software ...................................................................................................................................56
4.5.1 BIOS ...................................................................................................................................... 56
4.5.2 Operating System (OS) ..........................................................................................................56
4.5.3 Utility Software ......................................................................................................................58
4.6 Application Software ............................................................................................................................. 58
Summary ....................................................................... .............................................................................60
References ....................................................................... ...........................................................................60
Recommended Reading .............................................................................................................................60
Self Assessment ...........................................................................................................................................61
IV/JNU OLE
6.4.1 History of DOS ..................................................................................................................... 84
6.4.2 Components of MS-DOS .......................................................................................................84
6.4.3 Internal Command ................................................................................................................. 85
6.4.4 External Commands ...............................................................................................................88
6.5 UNIX....................................................................... .............................................................................. 90
6.5.1 MEM ......................................................................................................................................90
6.5.2 FILTER .................................................................................................................................. 91
6.5.3 ATTRIB ..................................................................................................................................92
6.5.4 DELTREE .............................................................................................................................. 92
6.5.5 EDIT ...................................................................................................................................... 92
6.6 Batch Files .............................................................................................................................................92
6.7 Batch System ......................................................................................................................................... 93
6.8 Time Sharing Systems............................................................................................................................ 94
6.9 Multiprogramming .................................................................................................................................95
6.10 Spooling .............................................................................................................................................96
6.11 Essential Properties of the Operating System Batch ............................................................................96
6.11.1 Time Sharing ........................................................................................................................96
6.11.2 Interactive ............................................................................................................................ 96
6.11.3 Real time system .................................................................................................................. 97
6.11.4 Distributed ............................................................................................................................97
Summary ....................................................................... .............................................................................98
References ....................................................................... ...........................................................................98
Recommended Reading .............................................................................................................................99
Self Assessment .........................................................................................................................................100
V/JNU OLE
Fundamentals of Information Technology
VI/JNU OLE
List of Figures
Fig. 1.1 Positional value (weight) of each bit ................................................................................................ 2
Fig. 1.2 1’s complement .................................................................................................................................3
Fig. 1.3 (a) Decimal to binary conversion ..................................................................................................... 5
Fig. 1.3 (b) Decimal to binary conversion ..................................................................................................... 5
Fig. 1.4 (a) Decimal to binary conversion ..................................................................................................... 6
Fig. 1.4 (b) Decimal to binary conversion ..................................................................................................... 6
Fig. 1.5 Octal number system ........................................................................................................................ 7
Fig. 1.6 (b) Decimal to octal conversion ........................................................................................................8
Fig. 1.7 Hexadecimal number showing positional values (weight) of digits ...............................................10
Fig. 1.8 (a) Decimal to hex conversion .........................................................................................................11
Fig. 1.8 (b) Decimal to hex conversion .........................................................................................................11
Fig. 2.1 Logic gates (a) Basic logic gates; (b) Compound logic gates (c) Truth tables for compound gates 24
Fig. 2.2 Not gate........................................................................................................................................... 25
Fig. 2.3 AND gate ........................................................................................................................................ 25
Fig. 2.4 OR gate ...........................................................................................................................................26
Fig. 2.5 NAND gate .....................................................................................................................................26
Fig. 2.6 NOR gate ........................................................................................................................................ 27
Fig. 2.7 XOR gate ........................................................................................................................................ 27
Fig. 2.8 Logic circuit ....................................................................................................................................30
Fig. 2.9 Logic circuit ....................................................................................................................................32
Fig. 2.10 Logic circuit ..................................................................................................................................32
Fig. 3.1 Schematic representation of a computer system ............................................................................37
Fig. 3.2 Disk sectors..................................................................................................................................... 45
Fig. 3.3 Track sectors ...................................................................................................................................45
Fig. 3.4 Logical layout of magnetic disk ..................................................................................................... 46
Fig. 5.1 OSI reference model .......................................................................................................................70
Fig. 5.2 Bus topology ...................................................................................................................................73
Fig. 5.3 Star topology................................................................................................................................... 74
Fig. 5.4 Ring topology ................................................................................................................................. 74
Fig. 5.5 Tree topology ..................................................................................................................................75
Fig. 5.6 Mesh topology ................................................................................................................................ 76
Fig. 6.1 Conceptual view of a computer system ..........................................................................................83
Fig. 6.2 Memory layout for a simple batch system ......................................................................................93
Fig. 6.3 Memory layout for a multiprogramming system ............................................................................95
Fig. 6.4 Spooling ..........................................................................................................................................96
Fig. 7.1 Block diagram of CPU ................................................................................................................. 105
Fig. 7.2 Relative File - Organisation ..........................................................................................................108
Fig. 7.3 Files and folders arranged in a hierarchy ......................................................................................109
Fig. 7.4 Sample data capture form ..............................................................................................................114
Fig. 7.5 Form filled by the customer ...........................................................................................................114
VII/JNU OLE
Fundamentals of Information Technology
List of Tables
Table 1.1 Counting binary numbers ...............................................................................................................3
Table 1.2 Binary equivalent of octal digit ......................................................................................................9
Table 1.3 Binary and decimal equivalent of each hex digit .........................................................................10
Table 1.4 Gray code ..................................................................................................................................... 13
Table 1.5 One-bit binary addition ................................................................................................................ 15
Table 2.1 Truth table .................................................................................................................................... 31
Table 5.1 Types of networks ........................................................................................................................ 77
Table 6.1 History of OS ............................................................................................................................... 84
Table 6.2 Some Special $ Parameters Are Given Below ............................................................................. 88
Table 7.1 Types of Data ............................................................................................................................. 104
Table 7.2 File terminology ..........................................................................................................................111
Table 7.3 Records ........................................................................................................................................111
Table 7.4 Fields ...........................................................................................................................................112
Table 7.5 Types of validation ......................................................................................................................116
Table 8.1 Types of threats and consequences............................................................................................. 123
VIII/JNU OLE
Abbreviations
ASCII - American Standard Code for Information Interchange
BCD - Binary Coded Decimal
BJT - Bipolar Junction Transistor
CML - Current Mode Logic
CMOS - Complementary Metal Oxide Semiconductor
D Flip Flop - Data Flip Flop
DEMUX - Demultiplexer
DL - Diode Logic
DTL - Diode Transistor Logic
ECL - Emitter Coupled Logic
F - False
FET - Field Effect Transistor
FF - Flip Flops
H (1) - High
Hex - Hexadecimal
IC - Integrated Circuit
IGFET - Insulated-gate FET
IIL - Integrated Injection Logic
JFET - Junction FET
K-map - Karnaugh Map
L (0) - Low
LSB SLiegans-itfcantBit
MOSFET - Metal-oxide- semiconductor FET
MSB SMigon-sitfcantBit
MUX - Multiplexer
NMOS - N-channel MOSFETs
PMOS - P-channel MOSFETs
P-N Junction - Positive type (P) and Negative type (N)
POS - Product of Sums
RTL - Resistor Transistor Logic
SOP - Sum-of-Products Equations
S-R Flip-Flop - SET-RESET Flip Flop
T Flip Flop - Toggle Flip Flop
T - True
TTL - Transistor Transistor Logic
XS-3 - Excess-3 Binary-coded Decimal
IX/JNU OLE
Chapter I
Number System and Codes
Aim
The aim of this chapter is to:
Objectives
The objectives of this chapter are to:
Learning outcome
At the end of this chapter, you will be able to:
• understand number system into decimal, binary, octal and hex number systems
1/JNU OLE
Fundamentals of Information Technology
1.1 Introduction
Number system is simply the ways to count things. Aim of any number system is to deal with certain quantities which
can be measured, monitored, recorded, manipulated arithmetically, observed and utilised. Each quantity has to be
representedbyitsvalueaseffciently andaccuratelyasisnecessaryforanyapplication.Thenumericalvalueofa
quantity can be basically expressed in either analog (continuous) or digital (step by step) method of representation.
Inanalogmethod,aquantityisexpressedbyanotherquantitywhichisproportionaltothefrst. Forexample,the
voltageoutputofanampliferismeasuredbyavoltmeter.
Theangularpositionoftheneedleofthevoltmeterisproportionaltothevoltageoutputoftheamplifer.Yetanother
example is of a thermometer. The height to which the mercury rises is proportional to the temperature. In both these
examples, the value of voltage and temperature can be anywhere between zero and the maximum limit. In digital
method, the value of a quantity is expressed by some symbols which are called digits, and not by a quantity which
isproportionaltothefrst. Inadigitalwatch,thetime,whichchangescontinuously,isexpressedbydigitswhichdo
not change continuously. It is clear from the examples that the accuracy of the value of an analog quantity generally
depends upon the judgement of the observer.
Digital technology is different from analog technology. Many number systems are being used in digital technology.
Most common amongst them are decimal, binary, octal, and hexadecimal systems.
We are most familiar with the decimal number system, because we use it every day.
It is the base-10 or radix-10 system. Note that there is no symbol for “10” or for the base of any system. We count
123456789,andtheninserta0inthefrst columnandaddanewleftcolumn,startingat1again.Thenwe
count1-9inthefrst columnagain.(Peopleusethebase-10systembecausewehave10fngers!). Eachcolumnin
our system stands for a power of 10 starting at 100.
All computers use the binary system. Following section provides an overview of the binary system.
24 2 3
22 21 20 2-1 2-2 2-3 Positional values or weight
1 1 0 0 1 0 1 1
2/JNU OLE
Any number can be expressed in binary form in the usual way. Table 2.1 shows expression of binary numbers.
1’s complement
The 1’s complement of a binary number is obtained just by changing each 0 to 1 and each 1 to 0.
Binary number 1 0 1 1 1 0 1 0
1-complement 1 0 1 1 1 0 1 0
2’s complement
The 2’s complement of a binary number is obtained adding 1 to the 1’s complement of this number:
2’s complement = 1’s complement+1
Binary number 1 0 1 1 1 0 1 0
1’s complement 0 1 0 0 0 1 0 1
+ 1
2’s complement 0 1 0 0 0 1 1 0
3/JNU OLE
Fundamentals of Information Technology
Signed numbers
In a signed number, the left most bit is the so called sign bit: 0=positive number 1=negative number.
Sign-value notation
In this notation, the left-most bit is the sign bit and the others are used to represent the absolute value notation.
1’s complement
In this notation, the positive numbers have the same representation as the sign-value notation, and the negative
numbers are obtained by taking the 1’s complement of the positive correspondents.
2’s complement
The positive numbers have the same representation as the sign-value notation, and the negative numbers are obtained
by taking the 1’s complement of the positive correspondents.
Positive All 00011001 (+25)
Negative Sign-value 10011001
1’s complement 11100110
2’s complement 11100111
Example1
Find the decimal equivalent of the binary number (11111)2
The equivalent decimal number is
=1X24+1X23+1X22+1X21+1X20
=16+8+4+2+1
= (31)10
• To differentiate between numbers represented in different number systems, either the corresponding number
systemmaybespecifed alongwiththenumberorasmallsubscriptattheendofthenumbermaybeadded
signifying the number system. Example (1000)2 represents a binary number and is not one thousand.
Example 2
Consider the conversion of (100011.101)2
1 0 0 0 1 1.1 0 1
= 25+0+0+0+21+20+2-1+0+2-3
=32+2+1+0.5+0.125
=(35.625)10
Consider the following examples.
1111.00 = 15
11110.0 = 30
111100.0 = 60
From these examples, it is clear that if the binary point is shifted towards right side, then the value of the
number is doubled.
Now consider the following examples.
111.100 = 7.5
11.1 100 = 3.75
1.1 1100 = 1.875
From these examples it is clear that if the binary point is shifted towards the left side, then the value of the
number is halved.
4/JNU OLE
1.3 Decimal to Binary Conversion
A decimal number is converted into its binary equivalent by its repeated divisions by 2. The division is continued
tillwegetaquotientof0.Thenalltheremaindersarearrangedsequentiallywithfrst remaindertakingtheposition
of LSB and the last one taking the position of MSB. Consider the conversion of 27 into its binary equivalent as
follows.
2 27
2 13 - 1
2 6 - 1
2 3 - 0
2 1 - 0
0 - 1
1 1 0 1 1
Thus 2710= 110112
Ifthenumberalsohassomefgures ontherightofthedecimalpoint,thenthispartofthenumberistobetreated
separately.Multiplythis partrepeatedlyby two.Afterfrst multiplicationby2,either1 or0willappearon theleft
of the decimal point. Keep this 1 or 0 separately and do not multiply it by 2 subsequently. This should be followed
for every multiplication. Continue multiplication by 2 till you get all 0s after the decimal point or up to the level of
the accuracy desired. This will be clear from the following example. Consider the conversion of 27.62510 into its
binary equivalent. We have already converted 27 into its binary equivalent which is (11011) 2
. Now for the conversion
of 0.625, multiply it by 2 repeatedly as follows:
Thus, 27.62510 = 11011.101
.625
x2
1.250
.250
x2
0.500
.500
x2
1.000
.000
1 0 1
5/JNU OLE
Fundamentals of Information Technology
Let us try another example, conversion of (58.0725)10 into binary. Split this number in two parts, i.e., 58 and .0725
and convert them into binary separately as described above.
2
58
2 29 — 0
2 14 — 1
2 7 —0
2 3 —1
2 1 —1
0 - 1
1 1 1 0 1 0
.0725
x2
0.1450
.1450
x2
0.2900
.2900
x2
.5800
0.5800
x2
1.1600
.1600
x2
0.3200
1 0 1 1 0
Representing numbers in binary is very tedious, since binary numbers often consist of a large chain of 0's and 1's.
Convenient shorthand forms for representing the binary numbers are developed such as octal system and hexadecimal
6/JNU OLE
system. With these number systems long strings of 0's and 1's can be reduced to a manageable form. The section
below gives an overview of these systems.
4 3 2 1 0 -1 -2
8 8 8 8 8 8 8 Weights
1 0 6 2 7 4 5 Octal Number
Octal number does not include the decimal digits 8 and 9. If any number includes decimal digits 8 and 9, then the
number can not be an octal number.
7/JNU OLE
Fundamentals of Information Technology
8 126
8 15 — 6
8 1 —7
8 0 —1
1 7 6
.38
x8
3.04
.04
x8
0.32
.32
x8
.56
2.56
x8
4.48
.48
3 0 2 4
8/JNU OLE
converted into its binary equivalent.
1 001
2 010
3 011
4 100
5 101
6 110
7 111
Using this conversion of octal digit into 3-bit binary number, any octal number can be converted into its binary
equivalent by simply replacing each octal digit by a 3-bit binary number. For example, conversion of 567, into its
binary equivalent is:
567 = 101110111
9/JNU OLE
Fundamentals of Information Technology
Relationship of hex digits with decimal and binary numbers is given in Table 1.3. Note that to represent the largest
hex digit we require four binary bits. Therefore, the binary equivalent of all the hex digits has to be written in four
bit numbers.
0 0 0000
1 1 0001
2 2 0010
3 3 0011
4 4 0100
5 5 0101
6 6 0110
7 7 0111
8 8 1000
9 9 1001
A 10 1010
B 11 1011
C 12 1100
D 13 1101
E 14 1110
F 15 1111
10/JNU OLE
1.5.2 Decimal to Hex Conversion
A decimal number is converted into hex number in the same way as a decimal number is converted into its equivalent
binary and octal numbers. The part of the number on the
left of the decimal point is to be divided repeatedly by 16 and the part an the right of
the decimal point is to be repeatedly multiplied by 16. This will be clear from the
examples of conversion of (579.26)10 into hex equivalent. Split the number into two parts, 579 and .26.
16 579
16 36 — 3
16 2 —4
0 —2
2 4 3
.26
x 16
4.16 .16
x 16
2.56 .56
x 16
8.96
.96
4 2 8
Thus 579.2610=243.42816
11/JNU OLE
Fundamentals of Information Technology
(BA6)16 = B A 6
= 1011 1010 010
= (101110100110)2
This method can also be applied to hex to decimal and decimal to hex conversions. For example, consider the
conversion of 3C16, into its decimal equivalent:
12/JNU OLE
1.6 Codes
We had an overview of binary, octal and hexadecimal number system. For any number system with n base B and
digits N0 (LSB), N1 N2...... N10 (M SB), the decimal equivalent N10 is given by
Whennumbers,lettersorwordsarerepresentedbyaspecifc groupofsymbols,itissaidthatthenumber,letteror
word is being encoded. The group of symbols is called as the code.
Few codes will be discussed in the following sections.
1.6.4 Excess 3
• Excess-3 binary-coded decimal (XS-3), also called biased representation or Excess-N, is a numeral system used
onsomeoldercomputersthatusesapre-specifed numberN asabiasingvalue.Itisawaytorepresentvalues
with a balanced number of positive and negative numbers. In XS-3, numbers are represented as decimal digits,
and each digit is represented by four bits as the BCD value plus 3 (the "excess" amount)
13/JNU OLE
Fundamentals of Information Technology
We are considering binary arithmetic in the context of building digital logic circuits to perform arithmetic. Not only
dowehavetodealwiththefactoffnite precisionarithmetic,wemustconsiderthecomplexityofthedigitallogic.
When there is more than one way of performing an operation we choose the method which results in the simplest
circuit.
1.7.1 Addition
Addition of binary numbers can be carried out in a similar way by the column method
But before this, view four simple cases. In the decimal number system, 3 + 6 = 9 symbolizes the combination of 3
with 6 to get a total of 9.
14/JNU OLE
• We only need to write the rules for one column of bits; we start at the right and apply the rules to each column
insuccessionuntilthefnal sumisformed.CallthebitsoftheaddendandaugendAandB,andthecarryin
from the previous column Ci. Call the sum S and the carry out Co.
• The truth table for one-bit binary addition looks like this:
A B Ci S Co
0 0 0 0 0
0 0 1 1 0
0 1 0 1 0
0 1 1 0 1
1 0 0 1 0
1 0 1 0 1
1 1 0 0 1
1 1 1 1 1
This says if all three input bits are zero, both S and Co will be zero. If any one of the bits is one and the other two
are zero, S will be one and Co will be zero. If two bits are 1's, S will be zero and Ci will be one. Only if all three
bits are 1's, both S and Co will be 1's.
1.7.1.2 Subtraction
Addition has the property of being commutative, that is, a+b = b+a. This is not true of subtraction. 5 – 3 is not the
sameas3–5.Forthisreason,wemustbecarefuloftheorderoftheoperandswhensubtracting.Wecallthefrst
operand, the number which is being diminished, the minuend; the second operand, the amount to be subtracted from
the minuend, is the subtrahend. The result is called the difference.
51 minuend
– 22 subtrahend
29 difference
• It is possible to perform binary subtraction using the same process we use for decimal subtraction, namely
subtracting individual digits and borrowing from the left.
• This process quickly becomes cumbersome as you borrow across successive zeroes in the minuend. Further, it
doesn’t lend itself well to automation.
• Jacobowitz describes the “carry” method of subtraction which some of you may have learned in elementary
school, where a one borrowed in the minuend is “paid back” by adding to the subtrahend digit to the left. This
means that one need look no more than one column to the left when subtracting.
• Subtraction can thus be performed a column at a time with a carry to the left, analogous to addition. This is a
processwhichcanbeautomated,butweareleftwithdiffculties whenthesubtrahendislargerthantheminuend
or when either operand is, signed.
15/JNU OLE
Fundamentals of Information Technology
• Since we can form the complement of a binary number easily and can add signed numbers easily, the obvious
answer to the problem of subtraction is to take the 2’s complement of the subtrahend, then add it to the minuend.
That is 51–22 = 51+ (–22).
• Not only does this approach remove many of the complications of subtraction by the usual method, but it also
means special circuits to perform subtraction need not be built All that is needed is a circuit which can form the
bitwise complement of a number and an adder.
1.7.2 Multiplication
A simplistic way to perform multiplication is by repeated addition. In the example below, we could add 42 to the
product register 27 times. In fact, some early computers performed multiplication this way. However, one of our
goals is speed, and we can do much better using the familiar methods we have learned for multiplying decimal
numbers. Recall that the multiplicand is multiplied by each digit of the multiplier to form a partial product, and
then the partial products are added to form the total product. Each partial product is shifted left to align on the right
with its multiplier digit.
42 multiplicand
x 27 multiplier
294frstpartialproduct(42X7)
84 second partial product (42 X 2)
1134 total product
Binary multiplication of unsigned (or positive 2’s complement) numbers works exactly the same way, but is even
easier because the digits of the multiplier are all either zero or one. That means the partial products are either zero
or a copy of the multiplicand, shifted left appropriately. Consider the following binary multiplication:
0111 multiplicand
x 0101 multiplier
0111 partifarlsptroduct 1(10X11)
0000 second partial product (0111 X 0)
0111 third partial product (0111 X 1)
0000 fourth partial products (0111 X 0)
0100011 total product
Notice that no true multiplication is necessary in forming the partial products. The fundamental operations required are
shifting and addition. This means we can multiply unsigned or positive integers using only shifters and adders.
1.7.3 Division
As with the other arithmetic operations, division is based on the paper-and-pencil approach we learned for decimal
arithmetic. We will show an algorithm for unsigned long division that is essentially similar to the decimal algorithm
we learned in grade school. Let us divide 0110101 (5310) by 0101 (510). Beginning at the left of the dividend, we
movetotherightonedigitatatimeuntilwehaveidentifedaportionofthedividendwhichisgreaterthanorequal
to the divisor. At this point, a one is placed in the quotient; all digits of the quotient to the left are assumed to be zero.
The divisor is copied below the partial dividend and subtracted to produce a partial remainder as shown below.
Now digits from the dividend are “brought down” into the partial remainder until the partial remainder is again
greater than or equal to the divisor. Zeroes are placed in the quotient until the partial remainder is greater than or
equal to the divisor, and then a one is placed in the quotient, as shown below.
16/JNU OLE
The divisor is copied below the partial remainder and subtracted from it to form a new partial remainder. The
process is repeated until all bits of the dividend have been used. The quotient is complete and the result of the last
subtraction is the remainder.
This completes the division. The quotient is (1010)2 (1010) and the remainder is (11)2 (310), which is the expected
result. This algorithm works only for unsigned numbers, but it is possible to extend it to 2’s complement numbers.
As with the other algorithms, it can be implemented using only shifting, complementation, and addition.
Digital computers can perform arithmetic operations using only binary numbers. And hence the above section of
binary arithmetic is the basic step of digital electronics.
17/JNU OLE
Fundamentals of Information Technology
Summary
• There are mainly four number systems mainly binary, octal, decimal and hexadecimal which have 2, 8, 10 and
16 digits respectively. But it is the ease in applications that decides which kind of number system should tie
defnedandused.Everycomputerusestwoormoreoftheabovementionednumbersystemssimultaneously.
• The binary number system has only two digits; 0 and 1. A binary digit is called bit. A binary number can be
converted into its equivalent octal, decimal and hex numbers as described in the text. And octal, decimal and
hex numbers can be converted into equivalent binary umbers.
• The octal number system has 8 digits; 0 through 7. An octal number can be converted into its equivalent binary,
decimal and hex numbers and vice versa as described in the text.
• The hex number system has 16 digits; 0 through 9, A through F. As in the other systems, the hex numbers can
be converted as described in the text into their binary, octal and decimal equivalents and vice versa.
• It is possible to arrange sets of binary digits to represent numbers, letters of the alphabet or other information
by using a given code. Some of the important codes are BCD and ASCII codes. In the BCD code, each decimal
digit is replaced by its 4-bit binary equivalent.
• Conversion of BCD code into its decimal equivalent and vice versa is quite easy. Therefore, it is quite often
used in computers.
• The ASCII code is the most widely used alphanumeric code. It is a 7-bit binary number-and has7 =2 128 possible
7-bitbinarynumberswhicharequitesuffcient todescribethecapitalandsmalllettersofthealphabet,digits,
punctuation marks and other symbols.
• The process of dividing a binary number is once again the same as followed in the decimal system.
References
• Number Systems and Codes [Pdf] Available at: <http://www.inf.fu-berlin.de/lehre/WS00/19504-V/Chapter1.
pdf> [Accessed 19 June 2013]
• Number Systems, Base Conversions, and Computer Data Representation[Pdf] Available at: <http://www.eecs.
wsu.edu/~ee314/handouts/numsys.pdf> [Accessed 19 June 2013]
• Das, S., 2010. A Complete Guide to Computer Fundamentals, Laxmi Publications, Ltd.
• Meena, K., 2009. Principles of Digital Electronics, PHI Learning Pvt. Ltd.
• 2011. Binary Numbers: Tutorial,[Video online] Available at: <http://www.youtube.com/watch?v=biqp0HjJmfk>
[Accessed 19 June 2013].
• 2011. Binary, Hexadecimal, Octal conversion , [Video online] Available at: <http://www.youtube.com/
watch?v=2UwxdCLFW70> [Accessed 19 June 2013].
Recommended Reading
• Godse, A.P. & Godse, D.A., 2008. Digital Logic and Design and Application, Technical Publications.
• Godse, A.P. & Godse, D.A., 2005. Digital Systems, Technical Publications.
• Tokheim, 2004. Digital Electronics Principles and Applications, Tata McGraw-Hill Education.
18/JNU OLE
Self Assessment
1. Aim of any number system is to deal with certain quantities which can be measured, monitored, ________________,
manipulated arithmetically, observed and utilised.
a. recorded
b. stored
c. read
d. used
4. The 2’s complement of a binary number is obtained adding 1 to the ________________ of this number.
a. complement
b. end
c. beginning
d. 1’s complement
5. Binary number can be converted into its decimal equivalent by simply adding ________________of various
positions in the binary number which has bit 1.
a. weights
b. number
c. ten
d. two
6. A decimal number is converted into its binary equivalent by its repeated ________________ by 2.
a. addition
b. division
c. multiplication
d. subtraction
7. Advantage of the octal number system is the ease with which any octal number can be converted into its
______________equivalent.
a. decimal
b. hex
c. binary
d. tetra
19/JNU OLE
Fundamentals of Information Technology
9. What should be added to last group of 3 bits if the MSB side does not have 3 bits while converting numbers
from binary to octal?
a. Zero
b. One
c. Two
d. Nine
10. In subtraction number which is being diminished is called the minuend; the amount to be subtracted from the
minuend is the called the________________.
a. difference
b. subtrahend
c. subtraction
d. minus
20/JNU OLE
Chapter II
Logic Gates
Aim
The aim of this chapter is to:
Objectives
The objectives of this chapter are to:
• defnelogiccircuits
Learning outcome
At the end of this chapter, you will be able to:
21/JNU OLE
Fundamentals of Information Technology
2.1 Introduction
Digital computers understand the language of 1s and 0s. This number system is also called as binary number system
(bi means two). Note that the operation of digital circuits can be described in two corresponding voltage levels. The
more positive level is denoted by high (H = 1) and the other is denoted by low (L = 0). And the logical operations
are represented by true (T) and false (F). For instance, H = 1 = T and L = 0 = F is a positive logic whereas H = 0 =
F and L = 1 = T is a negative logic.
A digital circuit having one or more input signals but only one output signal is called “a gate”. A gate, which
implements Boolean algebraic equations, is called “Logic gates”.
The basic building blocks of digital electronics are logic gates which perform simple binary logic functions (AND,
OR, NOT, etc.). From these devices, more complex circuits can be constructed to do arithmetic, that act as memory
elements.
2.2.2 OR Gate
The OR gate has two or more inputs and a single output. The output of an OR gate is in 1 state if any of the inputs
is in the 1 state.
22/JNU OLE
2.2.4 NAND Gate
• The Negated AND, NOT AND or NAND gate is the opposite of the digital AND gate, and behaves in a manner
•thatcorrespondstotheoppositeofANDgate,asshowninthetruthtable.ALOWoutputresultsonlyifboth
the inputs to the gate are HIGH. If one or both inputs are LOW, a HIGH output results. The NAND gate is a
universal gate in the sense that any Boolean function can be implemented by NAND gates.
• Digital systems employing certain logic circuits take advantage of NAND’s functional completeness. In
complicated logical expressions, normally written in terms of other logic functions such as AND, OR, and NOT,
writing these in terms of NAND saves on cost, because implementing such circuits using NAND gate yields a
more compact result than the alternatives.
• NAND gates can also be made with more than two inputs, yielding an output of LOW if all of the inputs are
HIGH, and an output of HIGH if any of the inputs is LOW.
2.2.7 XNOR
XNOR is a digital logic gate whose function is the inverse of the Exclusive OR (XOR) gate. The two-input versions
implement logical equality, behaving according to the truth table. A high output results if both of the inputs to the
gate are the same. If one but not both inputs are high, a low output results.
NOT A ?
Different 1 means open NOT ?
(same as kind of switch 0 means closed A=
A ? 0 1
invert) 1 0
(a)
NAND A A-B
B
NOR X-NOR gate
A A +B
B
XOR InputA
A A B
+
Output
B InputB
= AB + AB
23/JNU OLE
Fundamentals of Information Technology
(b)
A B Output
0 0 1
0 1 1
1 0 1
1 1 0
NAND
A B Output
0 0 1
0 1 0
1 0 0
1 1 0
NOR
A B Output
0 0 0
0 1 1
1 0 1
1 1 0
XOR
A B Output
0 0 0
0 1 1
1 0 1
1 1 0
XNOR
(c)
Fig. 2.1 Logic gates (a) Basic logic gates; (b) Compound logic gates (c) Truth tables for compound gates
(Source:http://www.beam-wiki.org/wiki/NOR;http://www.pdf-fnder.com/Digital-Electronics-I:-Logic,-Flip-
Flops,-and-Clocks.html).
24/JNU OLE
2.3 Truth Tables
Truth tables are used to show logic gate functions. The NOT gate has only one input, but all the others have two
inputs.
When constructing a truth table, the binary values 1 and 0 are used. Every possible combination, depending on
number of inputs, is produced. Basically, the number of possible combinations of 1s and 0s is 2n where n= number
of inputs. For example, 2 inputs have 22 combinations (i.e. 4), 3 inputs have 23 combinations (i.e. 8) and so on. The
next section shows how these truth tables are used.
• NOT gate
A NOT X A X
INPUT A OUTPUT X
0 1
1 0
Truth table
The output (X) is true (i.e. 1 or ON) if: INPUT A is NOT TRUE (i.e. 0 or OFF) Truth table for: X = NOT A
• AND gate
A
A
AND X X
B B
25/JNU OLE
Fundamentals of Information Technology
Truth table
The output (X) is true (i.e. 1 or ON) if: INPUT A AND INPUT B are BOTH TRUE (i.e. 1 or ON) Truth
table for: X = A AND B
• OR gate
A
A
OR X X
B B
Truth table
The output (X) is true (i.e. 1 or ON) if: INPUT A OR INPUT B is TRUE (i.e. 1 or ON) Truth table for: X = A OR B
• NAND gate
A
A
NAND X X
B B
26/JNU OLE
INPUT A INPUT B OUTPUT X
0 0 1
0 1 1
1 0 1
1 1 0
Truth table
The output (X) is true (i.e. 1 or ON) if: INPUT A AND INPUT B are NOT BOTH TRUE (i.e. 1 or ON) Truth table
for: X = NOT A AND B
• NOR gate
A A
NOR X X
B B
Truth table
The output (X) is true (i.e. 1 or ON) if: INPUT A OR INPUT B are NOT BOTH TRUE (i.e. 1 or ON) Truth table
for: X = NOT A OR B
• XOR gate
•
A
A
XOR X X
B B
27/JNU OLE
Fundamentals of Information Technology
Truth table
The output (X) is true (i.e. 1 or ON) if: INPUT A OR (NOT INPUT B) OR (NOT INPUT A) OR INPUT B is TRUE
(i.e. 1 or ON) Truth table for: X = A OR (NOT B) OR (NOT A) OR B
Example 1
Produce a truth table from the following logic circuit (network).
A P
NOR
B
To show how this
works, we will split
the logic circuit into
OR X two parts (shown by
the dotted line).
AND
C
Q
First part
There are 3 inputs; thus we must have 23 (i.e. 8) possible combinations of 1s and 0s.
Tofnd thevalues(outputs)atpointsPandQ,itisnecessarytoconsiderthetruthtablesfortheNORgate(output
P) and the AND gate (output Q) i.e.
P = A NOR B
Q = B AND C
28/JNU OLE
We thus get:
INPUT A INPUT B INPUT C OUTPUT P OUTPUT Q
0 0 0 1 0
0 0 1 1 0
0 1 0 0 0
0 1 1 0 1
1 0 0 0 0
1 0 1 0 0
1 1 0 0 0
1 1 1 0 1
Truth table
Second part
There are 8 values from P and Q which form the inputs to the last OR gate.
Hence we get X = P OR Q which gives the following truth table:
Truth table
Thisnowgivesusthefnaltruthtableforthelogiccircuitgivenatthestartoftheexample:
Truth table
Example 2
Consider the following problem.
A system used 3 switches A, B and C; a combination of switches determines whether an alarm, X, sounds: If switch
A or switch B are in the ON position and if switch C is in the OFF position then a signal to sound an alarm, X is
produced. It is possible to convert this problem into a logic statement.
29/JNU OLE
Fundamentals of Information Technology
So we get:
• If (A = 1 OR B = 1)
Thefrstpartistwoinputs(A andB)joinedbyanORgate.
• AND
Theoutputfromthefrstpartandthethirdpartarejoinedbyan ANDgate.
• (C = NOT 1) then X = 1
The third part is one input (C) which is put through a NOT gate.
So we get the following logic circuit (network):
OR
B
AND X
30/JNU OLE
Example 3
A manufacturing process is controlled by a built in logic circuit which is made up of AND, OR and NOT gates only.
The process receives a STOP signal (i.e. X = 1) depending on certain conditions, shown in the following table:
A stop signal (X = 1) occurs when: either Volume, V > 1000 litres and Speed, S <= 15 m/s or Temperature, T <=
750ºC and Speed, S > 15 m/s
Draw the logic circuit and truth table to show all the possible situations when the stop signal could be received.
First of all, it is necessary to turn the problem into a series of logic statements:
• statement 1 can now be re-written as:
V = 1 AND S = NOT 1 since V > 1000 (binary value = 1) and S <= 15 (binary value = 0)
In the following logic circuit note that V has been placed at the bottom of logic diagram – this is done to avoid
crossing over of lines which makes it look neater and less complex. It is not essential to do this and is only done
for the reasons given.
31/JNU OLE
Fundamentals of Information Technology
T NOT
Statement 2
AND
S NOT OR X
Statement 1
AND
V
Truth table
32/JNU OLE
Summary
• Digital computers understand the language of 1s and 0s.
• A digital circuit having one or more input signals but only one output signal is called “a gate”.
• Thefunctionofeachgateisdefnedbyatruthtable,whichspecifestheoutputstateforeachpossiblecombination
of input states.
• Boolean algebra, the mathematics of two valued variables, is the theoretical tool used to simplify complex
logical expressions.
• A circuit, which performs a logic negation, is called a NOT circuit or inverter since it inverts the output with
respect to the input.
• Logic signals interact by means of gates.
• A gate, which implements Boolean algebraic equations, is called “Logic gates”.
• Digital systems employing certain logic circuits take advantage of NAND’s functional completeness.
• ThethreefundamentalgatesAND,OR,andNOT,arenamedafter•thethreefundamentaloperationsoflogic
that they carry out.
• Logic gates can be combined together to produce more complex logic circuits (networks).
• When constructing a truth table, the binary values 1 and 0 are used.
• When several gates are combined to perform a complex logical operation, a good design uses as few as
possible.
• Thefowofdigitalsignalsiscontrolledbytransistorsinvariousconfgurationsdependingonthelogic
family.
• The OR gate has two or more inputs and a single output.
• A manufacturing process is controlled by a built in logic circuit which is made up of AND, OR and NOT gates
only.
References
• Rafquzzaman, M.,2005. Fundamentals of Digital Logic and Microcomputer Design , 5th ed., John Wiley &
Sons.
• Balabanian, N. & Carlson, B., 2007. Digital Logic Design Principles, John Wiley & Sons.
• 2012. An Introduction to Logic Gates , [Video online] Available at: <http://www.youtube.com/
watch?v=95kv5BF2Z9E> [Accessed 29 May 2013].
• 2012. Logical Gates, Part 1, [Video online] Available at: <http://www.youtube.com/watch?v=6s0AR3_-
i0k>[Accessed 29 May 2013].
• Logic gates [Pdf] Available at: <http://education.cambridge.org/media/577240/cambridge_igcse_computer_
studies__revision_guide___cambridge_education___cambridge_university_press_samples.pdf> [Accessed
29 May 2013].
• Logic Gates [Pdf] Available at: <http://ptgmedia.pearsoncmg.com/images/chap3_0130619701/elementLinks/
chap3_0130619701.pdf> [Accessed 29 May 2013].
Recommended Reading
• Saha, A. & Manna, N., 2009. Digital Principles and Logic Design Engineering series , Jones & Bartlett
Learning.
• Godse, A. P. & Godse, D. A., 2009. Digital Electronics and Logic Design, Technical Publications.
• Godse, A. P. & Godse, D. A., 2009. Digital Logic Circuits, Technical Publications.
33/JNU OLE
Fundamentals of Information Technology
Self Assessment
2. A digital circuit having ___________or more input signals but only one output signal is called “a gate”.
a. two
b. one
c. three
d. four
3. A circuit, which performs a logic negation, is called a ___________circuit or inverter since it inverts the output
with respect to the input.
a. NOR
b. AND
c. NOT
d. OR
7. What can be combined together to produce more complex logic circuits (networks)?
a. Digital systems
b. Binary signals
c. Logic gates
d. Truth tables
34/JNU OLE
8. Which gate has only one input, but all the others have two inputs?
a. NOT
b. OR
c. AND
d. NOR
35/JNU OLE
Fundamentals of Information Technology
Chapter III
Computer Components and Information Processing Cycle
Aim
The aim of the chapter is to:
Objectives
The objectives of the chapter are to:
Learning outcome
After end of this chapter, you will be able to:
36/JNU OLE
3.1 Introduction
Thefrst chapterdescribedhowdataisrepresentedforcomputers.Dataintheformofbinarydigitsisusedbythe
computer to give desired results. But how does the computer receive and use the data, how it is processed, how are
the results generated and conveyed?
Tounderstandtheinformationprocessingcycleofacomputer,wefrst needtostudyaboutthepartsorcomponents
of a computer.
3.2 Components
As with most products, computers are designed in a variety of ways. There are, however, major similarities regardless
of the brand (e.g. Dell, Gateway, IBM) of the computer. A computer system accepts data as an input: processes that
data and provides data as output. During the processing the data must be stored. The processing is controlled by a
sequence of instructions - the program - which is stored in the computer. The basic components of a computer system
arethereforeinputdevices,processor,backingstoragedevicesandoutputdevices. Thisft togetherasdepictedin
thefollowingfguresasaschematicrepresentation,aswellastheactualrepresentationofacomputer.
INPUT
Keybord
Digitizer (e.g. mouse)
Sorcon
OUTPUT
Video (Screen)
Audio (Speaker)
Printer/Plotter
3.3.1 Keyboard
• Keyboard is the most common data entry device having more than 100 keys on it. Almost all general-purpose
computers are supplied with a keyboard.
• When you press a key, a number (code) is sent to the computer to tell it which key you have pressed. Keyboards
are often used in conjunction with a screen on which the data entered are displayed.
• The keys on a keyboard are usually arranged in the same order as those on a typewriter. This layout of keys is called
QWERTYbecauseQ-W-E-R-T-Y istheorderinwhichthelettersoccuronthetoprowofthekeyboard.
37/JNU OLE
Fundamentals of Information Technology
• Keyboardsarewidelyusedbecausetheyprovidefexiblemethodofdataentryandcanbeusedinmost
applications. However, they do have limitations like entry using keyboard is a slow form of data entry process
and is prone to error.
38/JNU OLE
Analogue image converters
• Photographs taken with regular cameras and videos recorded with camcorders store their images as analogue
data.
• There are special kinds of hardware that can take these images (scanning photographs or converting camcorder
tapes) and convert them to digital images which, like any other digital image, can be processed by computers.
39/JNU OLE
Fundamentals of Information Technology
Smart cards
• These have a memory store in the form of a very thin integrated circuit sealed into them.
• These can be used to store data about a customer, which can be updated as transactions are made using the
card.
40/JNU OLE
3.4.2 Control Unit (CU)
This unit controls the internal functioning of a computer and input/output units. The role of control unit in CPU
isthatofa‘manager’or‘atraffc cop.’Inotherwords,itcontrolsandco-ordinatesallhardwareoperations.The
componentsofCU(greatlyoversimplifedforillustrativepurposes)are:
• Decoders interpret program instructions (object code written in machine language).
• Timer (or clock) sequences all CPU activities.
• Logical gates and circuits distribute signals which activate various components of the CPU.
• Program counter/register keeps track of the next instruction to be executed
• Registers is a group of (usually) bistable devices that are used to store information like instructions, address
and so on, within a computer system for high-speed access.
Primary CU
Functions of primary CU are:
• Read and interpret machine language instructions
• Control the transmission of data between ALU, registers, cashes, primary memory, and auxiliary memory
• Control the sequence of execution of program instruction (i.e. govern branching, jumping around within a
program) which allows repetition and selection
• Direct ALU as to what math or logic operations to perform.
There are several types of RAM, the most popular of which include:
? Dynamic RAM (DRAM), although its name sounds sophisticated, is the oldest and simplest (and therefore
the slowest) type of RAM used today. The word ‘dynamic’ comes from the fact that it must be electronically
‘refreshed’ constantly in order to maintain the stored data.
? StaticRAM(SRAM),unlikeDRAM,doesnotneedtoberefreshed:itsstorageisfxed (aslongaspower
is supplied to the computer). This newer, more dependable, type of RAM is faster but more expensive than
DRAM. SRAM is often used for cache memory.
? Enhanced Data Output DRAM (EDO RAM) is a type of RAM that improves the memory access time on faster
microprocessors such as the Intel Pentium. EDO RAM was initially optimised for the 66 MHz Pentium.
? Synchronous DRAM (SDRAM) is a new form of RAM that can be synchronised to the clock speed of the
computer, a powerful feature that optimises data access by the system buses.
41/JNU OLE
Fundamentals of Information Technology
? Ram bus DRAM (RDRAM) is Intel’s designated successor to SDRAM having an effective speed of 800 MHz
and a peak data transfer rate of 1.6 GBps. However, it has yet to prove itself, and there are several rivals,
e.g. DDR SDRAM, that are slower but have 64b bus widths thus providing comparable transfer rates.
However, computers can only process digital data (discrete signals): therefore, input usually involves analogue to
digitalconversion(A/Dhardware)andoutputreversestheprocessusingD/Aconverters.Outputcanbesub-classifed
as either direct (to/from I/O devices) or indirect (to/from secondary storage). Output can also be divided into another
twokinds:hardcopyoutput(paper,microflm, etc.)providesapermanentrecordwhilesoftcopyoutput(visual,
audio, tactile, or action) is transient. Action output facilitates control of electromechanical devices, e.g. robotics.
Forthesakeofconvenience,letusfollowthegivenclassifcationtodiscusstheoutputdevices.
42/JNU OLE
3.5.1 Visual Output Devices (Soft copy)
• Cathode Ray Tube Displays (CRTs)
? These are the most commonly seen output device. The computer screen is made of CRTs. They are also
called monitors or visual display terminals (VDTs).
? Monitors look identical to a television screen. They produce fast and virtually costless output of
information.
? CRTs use faster scan technology to portray images as bitmapped graphics on a phosphorescent screen.
Electronsarefred atthescreenandlightuptinydotsofphosphor,whichthenglowforashortperiodof
time. Each point is called a picture element or pixel.
? Sincethephosphorsglowmomentarily,theelectronicgunkeepsonfring theelectronbeamatregular
intervals. This refreshing mechanism is measured in Hertz (Hz) or cycles per second. A low refresh rate
leadstoscreenficker.
? Monochrome monitors use one colour images (usually black) on a one colour background (usually white),
e.g. old mainframe monitors. These are now virtually obsolete in PCs.
? On the other hand, colour monitors use a triad of red, green, and blue phosphor dots which are stimulated
in varying degrees to produce a wide range of colours.
? Composite video monitors (like TVs) have one electron gun. However, composite video has lower resolutions
than RGB monitors. RGB monitors use three electron beams which give a higher resolution display. Virtually,
all modern monitors are RGB.
? The quality of the screen display or its resolution depends on the number of pixels on the screen. Resolution
indicates the ability to show details: the more pixels per inch, the higher the resolution.
• Bitmapped CRTs allows individual pixels to be addressed thereby producing greater screen control: this is
theoriginofWYSIWYG(WhatYouSeeIsWhatYouGet)applicationsthatcanincorporatehighresolution
graphics (e.g. all modern PC monitors).
• On the other hand, old fashioned character-addressable CRTs only address or manipulate groups of pixels
(thatformalphanumeric)andareinherentlynon-WYSIWYGandhavecrudegraphics(e.g.mainframeand
minicomputer monitors).
• VectorGraphicsscreenscreateimagesbytheelectronguntracingbetweenspecifed pointsonthescreenrather
than scanning every row: they are limited to special types of graphics monitors.
• FlatPanelDisplay,frst introducedinwatchesandclocksin1970s,isatechnologynowappliedtodisplay
terminals.TheyeliminatefickerandradiationandminimisesizeproblemsofCRTs.Further,theyarepopularfor
their low energy consumption. However, the quality of the images is relatively poor. Hence, they are commonly
used in portable devices because of compactness and low energy requirements.
• Liquid Crystal Display (LCD) is the most popular type, which has a thin layer of liquid crystal molecules divided
into small squares forming pixels that are held by two glass sheets. When power is applied to a square it turns
opaque.LCDsusedtocomeinlimitedsize,brightnessandclarity,butcurrenttechnologyhassignifcantly
improved.
• Gas-plasma displays give the best image (though low contrast), but they cannot be battery operated.
• Project Display is a small sized screen of the displays discussed above. Project displays provides an enlarged
image and could be projected on a large screen. These systems can be connected directly to the processor and
the output will be displayed on the large screens.
43/JNU OLE
Fundamentals of Information Technology
• In the constructive synthesis method, the basic elements of speech, called ‘phonemes’ (only 40 in the English
language)areusedtoconstructspeechoutputgovernedbytiming,pitchandinfectioncontrols.Thishasminimal
memory requirements.
Number of characters printed at one time, measured in ppm (pages per minute):
? Serial (bi-directional) printers print one alphanumeric or graphics pixel at a time.
? Chain printers transfer one line of alphanumeric or pixels at a time.
? Page printers (laser printers) utilise a combination of raster scan and xerographic technologies to produce
one whole page at a time.
Plotters
Though a few printers listed above are capable of producing graphics, there are a few special plotters exclusively
to print a good quality drawing and graphs. There are two types of plotters:
• Flatbed plotters have a drawing instrument (pen, ink-jet, electrostatic head, or heater element) that moves both
horizontallyandvertically,underthecontrolofinputvoltages,overafatpieceofstationarypaper.
• Drum plotters have a drawing pen that move vertically, while the paper on a drum rotates under it.
3.5.4ComputerOutputMicroflms(COM)
• Specialcomputerscanproducetheiroutputdirectlyontomicroflm. Inthisway,vastamountsofdatainhuman
readable form can be stored in a very small space without the need of large quantities of paper.
• Themicroflm isreadbyusingaspecialdevicewhichmagnifes thetextandpicturessothattheycanbeseen
with naked eyes.
44/JNU OLE
The primary storage has already been discussed: the secondary storage devices are as follows.
• A track sector is the area of intersection of a track and a sector, shown in grey.
• The head of disk is a small coil and reads or writes on the position of the disk rotating below it: therefore, the
data is stored in concentric set of rings called tracks. The width of a track is equal to the width of the head. To
minimisetheinterferenceofmagneticfelds andtominimisetheerrorsofmisalignmentofhead,theadjacent
tracks are separated by inter track gaps. As we go towards the outer tracks, the size of a track increases but to
simplify electronics same numbers of bits are stored on each track
45/JNU OLE
Fundamentals of Information Technology
Sector
• Floppy disks and hard disks are commonly used types of magnetic disk. Several other kinds of removable
magneticmediaareinuse,suchastheZipdisk.Allofthesehaveamuchhighercapacitythanfoppy disks,but
each type of media requires its own drive.
Hard Disks
• These consist of 1 or more metal platters which are sealed inside a case. The metal is one which is magnetic.
• The hard disk is usually installed inside the computer's case, though there are removable and cartridge types,
also.
• Technically, a hard drive controls the motion of the hard disks containing the data. Though, most people use
‘hard disk’ and ‘hard drive’ interchangeably.
Floppy Disks
• Afoppy diskismadeofafexible thinsheetofplasticmaterialwithamagneticcoatingandgroovesarranged
in concentric circles with tracks.
• Disk is removable from the reading device attached to the computer and therefore provides unlimited storage
capacity.
• Thefoppydisks areavailableintwosizes-5.25inchesand3.5incheswithcapacityrangingfrom360KB to
1.44MBperdisk.However,useoffoppy diskshascompletelystopped,duetothevolatilityandavailability
of other improved mediums.
46/JNU OLE
Characteristics of optical disks
• They are formed of layers
• Data is in a spiral groove, starting from the centre of disk
• Data is in digital format (1s and 0s)
• 1sand0sareformedbyhowthediskabsorbsorrefectslightfromthetinylaserbeam.
Write Once
• The optical disks that you can record on your own computer are CD-R, DVD-R, and DVD+R disks, and called
as writable or recordable disks.
• Here, the metal and data layers are separate and metal layer can be of gold, silver, or a silver alloy.
• Gold layers are best because gold does not corrode. Naturally, the best is more expensive. Sulphur dioxide in
air can seep in and corrode silver over time.
• Thedatalayerisanorganicdyethatthewritinglaserchanges.Oncethelasermodifes thedye,itcannotbe
changed again. Ultraviolet light and heat can degrade the organic dye.
• Awritablediskisusefulasabackupmediumwhenlong-termstorageofdataisrequired.Itislesseffcient for
data that changes often, since a new recording is required each time the changed data is saved.
47/JNU OLE
Fundamentals of Information Technology
Rewrite
• An option for backup storage of changing data is rewritable disks, i.e. CD-RW, DVD-RW, DVD+RW,
DVD+RAM.
• Thedatalayerforthesedisksusesaphase-changingmetalalloyflm. Thisflm canbemeltedbythelaser'sheat
to level out the marks made by earlier data and then again the new data can be recorded with laser.
• We can erase and write on these disks as many as 1000 times, for CD-RW, and even 100,000 times for the
DVD-RW types.
48/JNU OLE
3.6.8 Smart Cards
• A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated
circuits.
• There are two broad categories of ICCs. Memory cards containing only non-volatile memory storage components,
and perhaps dedicated security logic. Microprocessor cards containing volatile memory and microprocessor
components.
• The card is made of plastic. The most common smart card applications are: credit cards, electronic cash, computer
security systems and so on.
Thus, we now have a complete picture of what the computer consists of and how all the components work together
as a process. The idea of how data is received, and how it is processed to give the desired outputs in a required
format should be clear.
49/JNU OLE
Fundamentals of Information Technology
Summary
• The core components of a computer are input devices, processor, backing storage devices and output devices.
• Data to be processed by computer needs to be converted in a machine readable form which can be done using
various input devices listed.
• Input can be provided by using any of the options like keyboard, pointing devices, pen input devices, video and
audio input devices or graphical capture.
• This data is then processed at the CPU which comprises of the Arithmetic Logic Unit, Control Unit and the
Primary Memory, i.e. RAM, ROM and cache.
• The processed data can be obtained by various output devices. Options for output are visual output devices like
themonitor,audiooutputdevices,hardcopiesthroughprintersandcomputeroutputmicroflms
• The processed data can also be stored in various secondary storage devices. These storage devices are magnetic
disks,magnetictapes,opticaldisks,fashmemory,USBdrives,smartcards,etc.
• Storage is useful for further reference and back up.
References
• Shelly, B. G. & Vermaat, E. M., 2009. Discovering Computers: Living in a Digital World : Fundamentals, 6th
ed. Cengage Learning.
• Shim, K. J., 2002.Information Systems and Technology for the Noninformation Systems Executive: An Integrated
Resource Management Guide for the 21st Century, CRC Press.
• Information Processing 10, 20, 30 Curriculum Guidelines[Pdf] Available at: <http://www.edcentre.ca/resources/
info10/currmain.pdf> [Accessed 28 May 2013].
• Computer Fundamentals and Troubleshooting , [Pdf] Available at: <http://infosecawareness.in/downloads/
handbooks/computer-fundamentals-and-troubleshooting.pdf> [Accessed 28 May 2013].
• Prof. Kumar, A., 208. Lecture -1 Introduction to Computer Architecture [Video online] Available at: <http://
www.youtube.com/watch?v=4TzMyXmzL8M> [Accessed 28 May 2013].
• Janossy, J., Computer components [ Video online] Available at: <http://www.youtube.com/watch?v=kZH3H7XIUuc>
[Accessed 28 May 2013].
Recommended Reading
• Norton, P., 2002. Introduction To Computers (Sie), Tata McGraw-Hill Education.
• Shelly, B. G. & Vermaat, E. M., 2008. Discovering Computers 2009, Cengage Learning.
• Shelly, B. G. & Vermaat, E. M., 2011. Discovering Computers, Brief: Your Interactive Guide to the Digital
World, Cengage Learning
50/JNU OLE
Self Assessment
1. The layout of keys is called QWERTY because
a. QWERTYiseasytotype
b. Q-W-E-R-T-Yistheorderinwhichthelettersoccuronthetoprowofthekeyboard.
c. It is the name of the keyboard
d. It is the basic design of keyboard
4. Track balls, joysticks and track pads are all types of ____________ devices.
a. pen
b. converting
c. signal
d. pointing
7. ____________is a dedicated bank of high-speed RAM chips used to cache data from primary memory.
a. RAM
b. ROM
c. Flash memory
d. Memory cache
51/JNU OLE
Fundamentals of Information Technology
52/JNU OLE
Chapter IV
Hardware and Software
Aim
The aim of the chapter is to:
Objectives
The objectives of the chapter are to:
Learning outcome
After end of this chapter, the students should be able to:
53/JNU OLE
Fundamentals of Information Technology
4.1 Introduction
All physical contents of computer are hardware. This form is given to all electrical and mechanical devices attached
to the computer for the purpose of input, process, and storage and output operations. Primary hardware is the CPU
and its other units i.e. circuits and IC's. Secondary harware is the memory or storage area of computer.
Software is a general term used for computer Programs. A computer program is a planned, step by step set of
instructions that directs the computer what to do and how to do. It turns the data into information - that makes a
computer useful.
4.2 Hardware
The electrical, electronic, mechanical, and magnetic components that make up the computer system are together termed
as ‘hardware.’ These include components that are responsible for user input, display, and mathematical processing. The
CPU, disk drives, internal chips and wiring, modem, peripheral devices like the monitor, keyboard, mouse, printer,
speakers and so forth are together termed as computer hardware. Most of the components of hardware have been
described and discussed in chapter 2. But an important component to be described here is the ‘Motherboard.’
4.2.1 Motherboard
A motherboard is the central Printed Circuit Board (PCB) in many modern computers and holds many crucial
components of the system, while providing connectors for other peripherals. The motherboard is sometimes
alternatively known as the main board or system board. It is the main component inside the case, consisting of large
rectangular board with integrated circuitry that connects the rest of the parts of the computer including the CPU,
the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports
or the expansion slots.
4.3 Software
Computer software, or just software, is the collection of computer programs and related data that instructs a computer
to perform desired task or action. We can also say software refers to one or more computer programs and data held
inthestorageofthecomputerforsomespecifc purposes.Thetermwascoinedtocontrasttotheoldtermhardware
(meaning physical devices). In contrast to hardware, software is intangible, meaning it "cannot be touched."
The process of software development is called programming. Knowledge of programming languages is must to
developvariousprograms. Wewillfrst haveabriefoverviewaboutprogramminglanguagesandthenonthetypes
of software.
54/JNU OLE
4.4 Programming Languages
Programming languages are developed with the primary objective of facilitating a large number of people to use
computers without the need to know in detail the internal structure of the computer. Languages are also designed
to be machine independent. Ideally, one should be able to execute a program on any computer regardless of its
manufacturer or model. We can choose any language for writing a program according to the need. But a computer
executes programs only after they are represented internally in binary form (sequences of 1s and 0's). Programs
written in any other language must be translated to the binary representation of the instructions before they can be
executed by the computer.
55/JNU OLE
Fundamentals of Information Technology
Using any of the suitable programming language, one can write a software program. As described earlier, there are
two types of software, which are discussed underneath;
4.5.1 BIOS
• The BIOS (Basic Input Output System) is the most fundamental software of a computer system. It isfrmware the
that ‘boots’ your computer, i.e. it starts computer when it is switched on. (This feature is the basis of the BIOS
being called a ‘bootstrap program,’ particularly in older computer terminology.)
• Itchecksyoursystemhardware,loadstheoperatingsystemandfles systemfromsecondarystorageintoRAM,
executes the operating system and then turns control of the system over to the operating system.
• TheBIOSalsoassiststheoperatingsystembygoverningthefow ofdatatoandfromperipheraldevices,thus
acting as an interface between input/output devices and the operating system.
• The BIOS typically is provided on EEPROM (Electrically Erasable Programmable Read Only Memory).
This makes it possible to upgrade system BIOS by ‘fashing yourBIOS’ , i.e. writing a new program to the
frmware.
56/JNU OLE
• Memory: Memory must be managed also by the operating system. All those rotating turns of CPU use leave
datawaitingaroundinbuffers.Caremustbetakennottolosedata.Onewaytohelpoutthetraffc jamistouse
virtual memory. This includes disk space as part of main memory. While it is slower to put data on a hard disk,
it increases the amount of data that can be held in memory at one time. When the memory chips get full, some
ofthedataispagedouttotheharddisk. Thisiscalledswapping. Windowsusesaswapfleforthispurpose.
• Input and output: Flow control is also part of the operating system's responsibilities. The operating system
must manage all requests to read data from disks or tape and all writes to these and to printers. To speed up the
outputtoprinters,mostoperatingsystemsnowallowforprintspooling,wherethedatatobeprintedisfrst
putinafle. Thisfreesuptheprocessorforotherworkinbetweenthetimeswhendataisgoingtotheprinter.
Aprintercanhandlelimitedatatime.Withoutprintspooling,onehastowaitforaprintjobtofnish before
doing anything else. With it, one can request several print jobs and go on working. The print spool will hold all
the orders and process them in turn.
• Monitoring system activities: Following are the activities monitored by the OS:
? System performance :A user or administrator can check to see whether the computer or network is getting
overloaded. Changes could be made to the way tasks are allocated. System performance would include
response time and CPU utilisation.
? System security: Some system security is part of the operating system, though additional software can add
more security functions. For multiple users who are not all allowed access to everything, there must be a
logon or login procedure where the user supplies a user name or ID and a password. An administrator must
set up the permissions list of who can have access to what programs and data.
• Fileanddiskmanagement:Keepingtrackofwhatfles arewhereisamajorjob.Anoperatingsystemcomes
withbasicfle managementcommands,where,auserneedstobeabletocreatedirectoriesforstoringfles. A
userneedstocopy,move,delete,andrenamefles. Thisisthecategoryofoperatingsystemfunctionsthatthe
user actually sees the most. A more technical task is that of disk management. Under some operating systems,
hard disk can be divided up or partitioned into several virtual disks. The operating system treats each virtual disk
as a physically separate disk. Managing several physical and/or virtual disks can get pretty complex, especially
if some of the disks are set up with different operating systems.
57/JNU OLE
Fundamentals of Information Technology
Word Processing
• Word processing is the most used computer application, which has largely replaced the typewriter. It facilitates
revision and correction of documents before they are printed.
• An existing document can be used as a template, or pattern, for a new one. So the user doesn't have to recreate
standard documents from scratch each time. This is a major time-saver and helps keep things consistent.
• MicrosoftWord,WordPerfect,LotusWordPro,andOpenOffce Writeraresomeexamplesofwordprocessing
programs.
? Purpose - to produce documents
? Main advantage
i. easy to edit documents
ii. can reuse existing documents as a template.
Spread sheets
• Aspreadsheetistheapplicationofchoiceformostdocumentsthatorganisenumberslikebudgets,fnancial
statements, grade sheets, and sales records.
• A spreadsheet can perform simple or complex calculations on the numbers entered in rows and columns. Examples
ofspreadsheetprogramsareMSExcel,Lotus1-2-3,QuattroPro,andOpenOffceCalc.
? Purpose - organising numbers
? Main advantage
iii. can calculate using formulas
iv. auto-update of related numbers when data changes
v. can display data in graphs and charts.
58/JNU OLE
Database Management Software
• A database is a collection of data that is to be managed, rearranged, and to be added to later. With a database
one can sort the data by name or city or postal code or by any individual item of information recorded.
• One can create forms to enter or update or just display the data or create reports that show just the data of interest,
like members who owe dues and so on.
• Both spreadsheets and databases can be used to handle much the same information, but each is optimised to handle
adifferenttypemosteffciently. Thelargerthenumberofrecords,themoreimportantthedifferencesare.
• ExamplesofdatabasesareMS Access,dBase,FoxPro,Paradox, Approach,Oracle,OpenOffceBase.
? Purpose - managing data
? Major Advantages
vi. can change the way data is sorted and displayed.
Graphics Software
• Graphicsprogramsdealwithpictures,staticormoving,fat or3D.Thereareanamazingnumberofdifferent
formats for images in the world and no one program can handle them all.
• Adobe Photoshop is the most widely used graphics program for professionals. Paint Shop Pro is popular because
it offers most of Photoshop's features at a lower cost and with a friendlier interface. There are many other
programs, of which, some specialise in handling photographs or animations or creating logos.
? Purpose - to create and edit images
? Major Advantages
vii. important tool for professionals in photo or image processing
viii. easily creates illustrations, logos.
59/JNU OLE
Fundamentals of Information Technology
Summary
• A computer system is a combination of hardware and software.
• Computer hardware is the physical part of a computer.
• These include components that are responsible for user input, display, and mathematical processing. The CPU,
motherboard, disk drives, internal chips and wiring, modem, peripheral devices like the monitor, keyboard,
mouse, printer, speakers and so on are together termed as computer hardware.
• Computer software is the intangible part unlike the hardware.
• Softwaresareclassifedassystemsandapplicationsoftware.
• Both the systems software and the application software are responsible for roles as their names suggests. Systems
software operates the hardware and maintains a platform for running application soft wares.
• As people need language to write, computer also requires languages to write software programs (both system
software programs and application software programs.) They are known as programming languages.
• Programming languages are categorised as machine language, assembly language, high level language, and
natural language. Appropriate language is chosen to write programs for systems or application software.
References
• Bose, K. S., 1996. Hardware And Software Of Personal Computers, New Age International.
• Gookin, G., 2011. PCs For Dummies, John Wiley & Sons.
• Introduction To Computers: Hardware and Software [Pdf] Available at: <http://pages.cpsc.ucalgary.
ca/~tamj/2005/231W/notes/acrobat/computers_economy.pdf> [Accessed 28 May 2013].
• BASIC CONCEPTS IN COMPUTER HARDWARE AND BASIC CONCEPTS IN COMPUTER HARDWARE
AND SOFTWARE [Pdf] Available at: <http://wikieducator.org/images/1/11/Basic_Concepts_in_Computer_
Hardware_and_Software.pdf> [Accessed 28 May 2013].
• Intro to Computer Hardware Chapter 1.wmv [Video online] Available at: <http://www.youtube.com/
watch?v=ZOKsmiLcSlo> [Accessed 28 May 2013].
• Lecture - 3 Introduction To System : Hardware [Video online] Available at: <http://www.youtube.com/
watch?v=FOyuMclwymw> [Accessed 28 May 2013].
Recommended Reading
• Schneidewind, F. N., 2012. Computer, Network, Software, and Hardware Engineering with Applications, John
Wiley & Sons.
• Sichel, E. D., 1997. The computer revolution: an economic perspective, Brookings Institution Press.
• Preez, D. A., Dyk, V. V. & Cook, A., 2008. FCS Computer Hardware & Software L3, Pearson South Africa
60/JNU OLE
Self Assessment
1. The electrical, electronic, mechanical and ____________components that make up the computer system are
together termed as ‘hardware’.
a. maintenance
b. magnetic
c. automatic
d. logical
2. Which component of the motherboard mediates communication between the CPU and the other components
of the system, including main memory?
a. Chip set
b. RAM
c. Bios
d. Bus controller
3. Functions of an operating system are; state which one of the following is false?
a. Allocating resources
b. Monitoring system activities
c. Creating resources
d. File and disk management
4. Multitasking, multiprocessor and multi-user operating systems are sub types of which operating system?
a. Network operating system
b. Distributed system
c. Batch operating system
d. Multi programming operation system
5. Data is paged out to the hard disk in case memory chips get full, this is known as ____________
a. mapping
b. swapping
c. fagging
d. fapping
7. Identifythesystemsoftwaredesignedtohelpanalyze,confgure,optimiseandmaintainthecomputer;
a. Windows
b. DOS
c. Operating system
d. Utility software
61/JNU OLE
Fundamentals of Information Technology
10. ____________are easy to learn and use as compared to the programming languages.
a. System soft wares
b. Machine language
c. Application soft wares
d. Operation soft wares
62/JNU OLE
Chapter V
Communication and Networks
Aim
The aim of the chapter is to:
Objectives
The objectives of the chapter are to:
• elucidateclient-to-peerandpeer-to-peernetworkconfguration
Learning outcome
After end of this chapter, you will be able to:
63/JNU OLE
Fundamentals of Information Technology
5.1 Introduction
A standalone computer in today’s context is not very useful, but coupled with communication technology; it opens
up an enormous repository of information to its users. The concept of data communication evolved from sharing
the computation power of a computer along with various resources available in a computer environment such as
printers, hard disk and so on.
With increasing demand for exchange of information across the globe, the need for data communication has increased
in many folds. Due to physical constraints involved in connecting two remote points, physical data communication
has emerged as an instant solution.
Computernetworksmaybedefned as,“acollectionofcomputersanddevicesinterconnectedbycommunication
channels that facilitate communication among users and allows users to share resources.”
64/JNU OLE
5.4.1 Wired Channels (Twisted-pair Wire, Coaxial Cable and Fibre-optic Cable)
These media are also called guided media since they provide a conduit from one device to another, a signal travelling
along any of these media is directed and contained by the physical limits of the medium.
Opticalfbre isaglassorplasticcablethatacceptsandtransportssignalsintheformoflight.Letuslookmore
closely at each of the medium.
Twisted-pair Wire
• Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals in the form
of electrical current. Twisted-pair wire are of two types: Unshielded Twisted Pair (UTP) and Shielded Twisted
Pair (STP).
? Unshielded Twisted Pair (UTP) is the most common type and also used in telephone lines. A twisted pair
consists of two conductors (copper) each with its own coloured plastic insulation and twisted around each
other.Twistedpairconfguration reducesinterferencefromelectricalfeld ascomparedtoparallelpair
confguration. Unshieldedtwistedpairiscurrentlythecablestandardformostnetworks.Itisrelatively
inexpensive, easy to install, very reliable, and easy to maintain and expand. UTP support a maximum data
rate of 155 Mbps.
? Shielded Twisted Pair (STP) wire has a metal foil or braided mesh covering that encases each pair of
insulated conductors. The metal casing prevents the penetration of electromagnetic noise and the quality of
transmission improves. In all other respects it resembles UTP.
Coaxial Cable
• Coaxial cable (simply called coax) has a central core conductor of solid or standard wire (usually copper) enclosed
in an insulating sheath, which is, in turn, encased in an outer conductor of metal foil, braid or a combination of
the two (also usually copper).
• The outer metallic wrapping serves both as a shield against noise and as the second conductor, which completes
the circuit.
• This outer conductor is also enclosed in an insulating sheath, and the whole cable is protected by a plastic cover.
Coaxial cable carries signals of higher frequency ranges than twisted-pair wire. Often many coaxial cables are
bundled together.
• As a result of extra insulation, coaxial cable is much better than twisted pair wiring at resisting noise. Also, it
is faster than UTP (supports a maximum data rate of 200 Mbps).
Fibre-optic Cable
• Thecableconsistsofacoremadeoffne glassorplasticfbre. Thecoreissurroundedbyarefractivelayer
calledthecladdingthateffectivelytrapsthelightandkeepsitbouncingalongthecentralfbre. Inmostcases,
the cladding is covered by a buffer layer that protects it from moisture.
• The entire cable is encased in an outer jacket. Both core and cladding can be made of glass or plastic but must
be of different densities. In addition, the core must be ultra pure and completely regular to ensure distortion-
free signals.
• Since light has higher frequency on the electromagnetic spectrum than other types of radiation such as radio waves,
asinglefbre-opticchannelcancarrymoreinformationthanmostothermeansofinformationtransmission.
• Hundredsofstrandsofopticalfbres(eachasthinashumanhair)canbehousedinasinglefbre-opticcable.They
represent the most promising type of transmission medium and their usage is fast increasing with the time.
65/JNU OLE
Fundamentals of Information Technology
Themajoradvantagesoffbre-opticcableare:
• Noiseresistance:sincefbre-optictransmissionuseslightratherthanelectricity,noise(electromagnetic
interference) is not a factor.
• Less signal attenuation: s signal can run for miles without requiring regeneration.
• Higherbandwidth:afbre-optic cablecansupportmuchhigherbandwidththanbothtwisted-pairandcoaxial
cable. It can support data rates of the order of gigabits per second (Gbps).
• The data rates are limited not by the medium but by the signal generation and reception technology available.
Themaindisadvantagesoffbre-opticcableare:
• high cost
• diffcultiesintheirinstallation/maintenance
• fragility.
Radio Link
• Radio link, also called as broadcast radio, deals with transmission of data over long distance. A transmitter is
required to send messages and a receiver to receive them.
• Depending upon the type of the service, it uses a range of frequencies (3 kHz to 30MHz). In the lower frequencies
of radio spectrum, several broadcast radio bands are reserved for conventional AM/FM radio, broadcast television
and private radio services.
• Radio link can support a bandwidth up to 2 Mbps. It is easy to install and involves low recurring costs.
Microwave Link
• Microwave link, also called as microwave radio, utilises point to point radio transmissions at the super-high
frequency (SHF) and extremely high frequency (EHF) bands. Microwaves do not follow the curvature of the
earth and therefore require line-of-sight transmission and reception equipment.
• Microwave dishes, which contain transceivers (sending and receiving devices) and antennas are set up on towers
or buildings to establish the link.
• Microwave stations need to be placed at some distances (a few kilometres) from each other with no obstruction
in between. The size of the dish varies with the distance.
• A string of microwave relay stations is used with each station receiving incoming messages, boosting the signal
strength, and relaying the signal to the next station.
• Microwave link supports a bandwidth up to 45Mbps and is widely used in data communication.
Satellite Communication
• To overcome line-of-sight constraint of microwave earth stations, communication satellites (microwave ‘sky
stations’) are used. Communication satellites are microwave relay stations in orbit around the earth.
• Transmitting a signal from a ground station to a satellite is called up linking; the reverse is called down
linking.
66/JNU OLE
• Geosynchronous satellites are most commonly used in data communication. A geosynchronous satellite is placed
in geostationary earth orbit (nearly 36,000 km directly above the equator) where it travels at the same speed as
the earth and appears to an observer on the ground to be stationary.
• Consequently,microwaveearthstationsarealwaysabletobeamsignalstoafxed locationabove.Theorbiting
satellite has solar powered transceivers to receive the signals, amplify them and re-transmit them to another
earth station.
• Satellite communication provides transmission capabilities to and from any location on earth, no matter how
remote.
• This advantage makes high quality communication available to less developed regions without requiring huge
investment in ground-based infrastructure.
• Satellite communication supports high bandwidths capable of carrying large amounts of data and ensures low
error rates.
This mode of operation is known as Broadcasting. Some broadcast networks also support transmission to a subset
of machines and this is known as Multicasting. One possible way to achieve multicasting is to reserve one bit to
indicate multicasting and the remaining (n-1) address bits contain group number. Each machine can subscribe to
anyorallofthegroups.Broadcastnetworksareeasilyconfgured forgeographicallylocalisednetworks.Broadcast
networks may be static or dynamic, depending on how the channel is allocated.
Packet Radio broadcasting differs from satellite network broadcasting in several ways. In particular, stations have
limited range introducing the need for radio repeaters, which in turn affects the routing, and acknowledges schemes.
Also the propagation delay is much less than for satellite broadcasting.
LAN(LocalAreaNetwork)isacomputernetworkthatspansoverarelativelysmallarea.MostLANsareconfned
to a single building or group of buildings within a campus. However, one LAN can be connected to other LANs
over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-
area network (WAN). There are many different types of LANs, Ethernets being the most common for PCs. A more
detailed description of LAN will be covered later in the chapter.
67/JNU OLE
Fundamentals of Information Technology
To understand the transmission technology better, we also need to understand the concept of ‘bandwidth’ and its
signifcanceindatatransmission.
5.5.3 Bandwidth
• The bandwidth of a communication channel determines its information-carrying capacity. Bandwidth implies
how much data in form of text, voice, video and so on, can be sent through a communication channel in a given
amount of time.
• Foranalogsignals,bandwidthisexpressedinhertz(Hz)andspecifes therangeoffrequenciesthatthechannel
is capable of transmitting without interference or signal loss.
• Here bandwidth indicates the difference between the lowest and highest frequencies transmitted.
• For example, a microwave link within the range of 800-900 megahertz has a bandwidth of 100 megahertz.
The wider the bandwidth, the faster is the data transmission. The narrower the bandwidth the greater the loss
of transmission power, which is overcome by using relays or repeaters that rebroadcast the original signals.
Broadband connections are characterised by very high speed.
• For digital signals, bandwidth is measured in bits per second (bps). The type of the communication channel
determines the channel’s bandwidth.
68/JNU OLE
Forexample,fbre-opticcableusedforhighspeedinternetaccesshasmorebandwidththanconventionalcopper-wire
telephone lines. High quality voice, music and video transmissions require high bandwidth of the communication
channel. Bandwidth plays a critical role while designing a network.
5.6NetworkConfguration
Confguration referstothedesignofcomputerswithinanetworktoobtainmaximumeffciency. Therearetwo
typesofnetworkconfguration:
Networkprotocolsarestandardsthatallowcomputerstocommunicate.Aprotocoldefnes howcomputersidentify
one another on a network, the form that the data should take in transit, and how this information is processed once
itreachesitsfnal destination.Protocolsalsodefne proceduresforhandlinglostordamagedtransmissionsor
"packets.”
69/JNU OLE
Fundamentals of Information Technology
• The OSI model was set by the International Standards Organisation (ISO) in 1984, and it is now considered the
primary architectural model for inter-computer communications.
• The Open Systems Interconnection (OSI) reference model describes how information from a software application
in one computer moves through a network medium to a software application in another computer.
• The OSI reference model is a conceptual model composed of seven layers specifying particular network functions
andintotheselayersarefttedtheprotocolstandardsdevelopedbytheISOandotherstandardbodies.
• The OSI model divides the tasks involved with moving information between networked computers into seven
smaller, more manageable task groups. A task or group of tasks is then assigned to each of the seven OSI
layers.
• Each layer is reasonably self-contained so that the tasks assigned to each layer can be implemented independently.
This enables the solutions offered by one layer to be updated without affecting the other layers.
OSI MODEL
Application Layer
Facilitates communication between
software application like outlook, IE
DATA
Presentation Layer
Data Representation and Encryption
Session Layer
Interhost Communication L
A
SEGMENTS Y
Transport Layer
End-to-End connection and reliability E
R
Network Layer S
PACKETS path determination and logical
addressing
Physical Layer
Media, signal and binary
BITS transmmission
Asseeninthefgure,thereare7layersoftheOSImodel. Theseareasfollows:
Application Layer (Layer 7)
• Theapplicationlayerisprobablythemosteasilymisunderstoodlayerofthemodel.Thistoplayerdefnes the
language and syntax that programs use to communicate with other programs.
• Theapplicationlayerrepresentsthepurposeofcommunicatinginthefrstplace.
• For example, a program in a client workstation uses commands to request data from a program in the server.
Commonfunctionsatthislayerareopening,closing,readingandwritingfles, transferringfles ande-mail
messages, executing remote jobs and obtaining directory information about network resources and so on.
70/JNU OLE
• For example, it provides a common denominator between ASCII and EBCDIC machines as well as between
differentfoatingpointandbinaryformats.Sun’sXDRandOSI’sASN.1aretwoprotocolsusedforthis
purpose.
• This layer is also used for encryption and decryption and it also provides security features through encryption
and decryption.
71/JNU OLE
Fundamentals of Information Technology
• The main network device found at the data link layer is a bridge. This device works at a higher layer than the
repeater and therefore is a more complex device.
• It has some understanding of the data it receives and can make a decision based on the frames it receives as to
whether it needs to let the information pass, or can remove the information from the network. This means that
theamountoftraffconthemediumcanbereducedandtherefore,theusablebandwidthcanbeincreased.
72/JNU OLE
The parameters that are to be considered while selecting a physical topology are:
• Ease of installation
• Easeofreconfguration
• Ease of troubleshooting.
Bus Topology
• In Bus topology, all devices are connected to a central cable, called the bus or backbone. The bus topology
connects workstations using a single cable.
• Each workstation is connected to the next workstation in a point-to-point fashion. All workstations connect to
the same cable.
Backbone
Cable tap
Terminator
Drop cable
Star Topology
• Star topology uses a central hub through which all components are connected. In a Star topology, the central
hub is the host computer, and there is a terminal at the end of each connection.
• Nodescommunicateacrossthenetworkbypassingdatathroughthehub.Astarnetworkusesasignifcantamount
of cable as each terminal is wired back to the central hub, even if two terminals are side by side but several
hundred meters away from the host. The central hub makes all routing decisions, and all other workstations
can be simple.
73/JNU OLE
Fundamentals of Information Technology
Ring Topology
• In ring topology, all devices are connected to one another in the shape of a closed loop, so that each device is
connected directly to two other devices, one on either side of it.
• Each terminal is connected to two other terminals (the next and the previous), with the last terminal being
connectedtothefrst. Dataistransmittedaroundtheringinonedirectiononly;eachstationpassingonthedata
to the next station till it reaches its destination.
• Information travels around the ring from one workstation to the next. Each packet of data sent on the ring is
prefxed bytheaddressofthestationtowhichitisbeingsent.Whenapacketofdataarrives,theworkstation
checks to see if the packet address is the same as its own, if it is, it grabs the data in the packet. If the packet
does not belong to it, it sends the packet to the next workstation in the ring.
• The common implementation of this topology is token ring. A break in the ring causes the entire network to
fail. Individual workstations can be isolated from the ring.
74/JNU OLE
Advantages of Ring Topology
• Easy to install and modify the network
• Faultisolationissimplifed
• Unlike bus topology, there is no signal loss in ring topology because the tokens are data packets that are re-
generated at each node.
Tree Topology
• Tree topology is a LAN topology in which only one route exists between any two nodes on the network. The
pattern of connection resembles a tree in which all branches spring from one root.
• Tree topology is a hybrid topology. It is similar to the star topology but the nodes are connected to the secondary
hub,whichinturnisconnectedtothecentralhub.Inthistopology,groupsofstar-confgured networksare
connected to a linear bus backbone.
75/JNU OLE
Fundamentals of Information Technology
Mesh Topology
• Mesh topologies are used in critical connection of host computers (typically telephone exchanges). Alternate
paths allow each computer to balance the load to other computer systems in the network by using more than
one of the connection paths available.
• A fully connected mesh network therefore has n (n-1)/2 physical channels to link n devices. To accommodate
these, every device on the network must have (n-1) input/output ports.
76/JNU OLE
• Area covered is small
• Data transfer rates are high, usually 1Mbps-100Mbps (Million of bits per second)
• Each device connected in the network can communicate with any other device in network
• Cost of setting up the network is usually low.
Computers connected to a wide-area network are often connected through public networks, such as the telephone
system. They can also be connected through leased lines or satellites.
MAXIMUM
NETWORK SIZE TRANSMISSION MEDIA
DISTANCE
Local Area Network Confnedtobuildingor Cable is used Covers up to 10 km
campus
Metropolitan Area Networkconfnedtocity Different hardware & Covers the area of a city
Network or town transmission media are used or town
Wide Area Network Larger than MAN Telephone lines, radio waves, Covers a number of
leased lines or satellites cities or countries
Thus, computers in a networked environment provide numerous advantages when compared to computers in a
standaloneenvironment.Theimmensebenefts thatthecomputernetworksprovideareintheformofexcellent
sharingofcomputationalresources,computationalload,andincreasedlevelofreliability,economyandeffcient
person-to-person communication.
77/JNU OLE
Fundamentals of Information Technology
Summary
• Computer network is a collection of computers and a device interconnected by communication channels that
facilitate communication among users and allows users to share resources.
• Communication channels which use a physical medium for transmission (twisted pair wire, coaxial cable, and
fbreopticcable)arecalledwiredchannels.Communicationchannelswhichdonotrequireanyphysicalmedium
for transmission (radio, microwave and communication satellite) are called wireless channels.
• The basis for all communication, a channel both wired and wireless, is the electromagnetic spectrum. The
spectrum covers frequencies for voice, radio waves, infrared light, visible light, and ultraviolet light and X,
gamma and cosmic rays.
• Confguration referstothedesignofcomputerswithinanetworktoobtainmaximumeffciency. Therearetwo
typesofnetworkconfguration,client-to-serverandpeer-to-peer.
• There are two types of transmission technologies, broadcast networks and point-to-point or switched
networks
• Standards for network communication followed are OSI reference model and TCP/IP protocol
• Topology refers to the shape of a network, or the network’s layout. How different nodes in a network are
connected to each other and how they communicate with each other is determined by the network's topology.
Topologies are either physical or logical.
• Some of the most common network topologies are: bus topology, star topology, ring topology, tree topology,
and mesh topology.
• Types of networks are LAN, MAN, WAN. Common examples of network are Novell network, ARPANET and
internet.
• Benefits that the computer networks provide are in the form of excellent sharing of computational
resources,computationalload,andincreasedlevelofreliability,economyandeffcientperson-to-person
communication.
References
• Kesidis, G., 2007. An Introduction to Communication Network Analysis, John Wiley & Sons.
• Stallings, W., 2007. Data And Computer Communications, 8/E, 8th ed. Pearson Education India.
• Hoang, D. B. & Pye, K. J.,Computer Communication Networks - Lecture Notes[Pdf] Available at: <ftp://cs.istu.
ru/public/docs/other/_New/Sciense/books.pdox.net/Lecture@2520Notes/Computer%20Communication%20
Networks%20-%20Latrobe.pdf> [Accessed 28 May 2013].
• Computer networks, data communication and Internet [Pdf] Available at: <http://www.vub.ac.be/BIBLIO/
nieuwenhuysen/courses/chapters/network.pdf> [Accessed 28 May 2013].
• Protocols and Computer Networks part 1 [Video online] Available at: <http://www.youtube.com/
watch?v=Q3SsVO0eSOU> [Accessed 28 May 2013]
• Prof. Ghosh, S., L ecture -1 Emergence of Networks & Reference Models [Video online] Available at: <http://
www.youtube.com/watch?v=3DZLItfbqtQ&list=PLD6F332057F76C54C> [Accessed 28 May 2013].
Recommended Reading
• Kasera, S. & Narang, N., 2005. Communication Networks: Principles and Practice, T ata McGraw-Hill
Education.
• Bagad, V.S. & Dhotre, I. A., 2009. Computer Communication Networks, Technical Publications.
• Mir, F. N., 2006. Computer and Communication Networks, Pearson Education.
78/JNU OLE
Self Assessment
1. Which of the following is not a goal of computer networks?
a. Cost reduction by sharing hardware and software resources
b. Provide high reliability by having multiple sources of supply
c. Increase productivity by making data un-sharable
d. Repairs, upgrades, expansions, and changes to the network should be performed with minimal impact on
the majority of network users
2. Noise resistance, higher bandwidth, and less signal attenuation are advantages of using which type of connecting
channel?
a. Shielded twisted pair cable
b. Fiber optic cable
c. Unshielded twisted pair cable
d. Coaxial cable
3. Geosynchronous satellite is placed in geostationary earth orbit where it travels at the ____________as the
earth.
a. same speed
b. double speed
c. half the speed
d. maximum speed
6. OSImodelisasetofprotocolsthatattempttodefneand____________-thedatacommunicationsprocess.
a. authorise
b. standardise
c. speed-up
d. ease
79/JNU OLE
Fundamentals of Information Technology
9. Which are the parameters that are to be considered while selecting a physical topology? (State which is not
TRUE)
a. Ease of installation
b. Ease of drawing the network
c. Easeofreconfguration
d. Ease of troubleshooting
10. Computers connected to a wide-area network are often connected through: (State which is not TRUE)
a. Connectors
b. Public networks,
c. Leased lines
d. Satellites
80/JNU OLE
Chapter VI
Operating Systems
Aim
• explainbatchflesandbatchsystem
Objectives
The objectives of this chapter are to:
• explain spooling
• defneoperatingsystem,functions,historyandevolution
Learning outcome
At the end of this chapter, you will be able to:
• analyse multiprogramming
81/JNU OLE
Fundamentals of Information Technology
6.1 Introduction
An operating system acts as an intermediary between the user of a computer and computer hardware. The purpose
of an operating system is to provide an environment in which a user can execute programs in a convenient and
effcient manner.Anoperatingsystemissoftwarethatmanagesthecomputerhardware.Thehardwaremustprovide
appropriate mechanisms to ensure the correct operation of the computer system and to prevent user programs from
interfering with the proper operation of the system.
82/JNU OLE
user user user user
1 2 3 • • • n
operating system
Computer Hardware
Every computer must have an operating system to run other programs. The operating system coordinates the use of
the hardware among the various system programs and application program for a various users. It simply provides
an environment within which other programs can do useful work.
The operating system is a set of special programs that run on a computer system that allow it to work properly.
Itperformsbasictaskssuchasrecognisinginputfromthekeyboard,keepingtrackoffles anddirectoriesonthe
disk, sending output to the display screen and controlling the peripheral devices. OS is designed to serve two basic
purposes:
• It controls the allocation and use of the computing system‘s resources among the various user and tasks.
• Itprovidesaninterfacebetweenthecomputerhardwareandtheprogrammerthatsimplifes andmakesfeasible
for coding, creation, debugging of application programs.
The operating system must support the following tasks. The tasks are:
• Providesthefacilitiestocreate,modifcationofprogramanddataflesusingandeditor.
• Access to the compiler for translating the user program from high level language to machine language.
• Provide a loader program to move the compiled program code to the computer‘s memory for execution.
• Provide routines that handle the details of I/O programming.
83/JNU OLE
Fundamentals of Information Technology
In the early days of micro computing, memory space was often limited, so the disk operating system was an extension
of the operating system. This component was only loaded if it was needed. Otherwise, disk-access would be limited
to low-level operations such as reading and writing disks at the sector-level. In some cases, the disk operating system
component (or even the operating system) was known as DOS. Sometimes, a disk operating system can refer to the
entire operating system if it is loaded off a disk and supports the abstraction and management of disk devices. An
example is DOS/360. On the PC compatible platform, an entire family of operating systems was called DOS.
Bothharddisksandfoppy diskdrivesrequiresoftwaretomanagerapidaccesstoblockstorageofsequentialand
other data. When microcomputers rarely had expensive disk drives of any kind, the necessity to have software to
manage such devices (i.e., the disks) carried much status. To have one or the other was a mark of distinction and
prestige, and so was having the Disk sort of an Operating System. As prices for both disk hardware and operating
system software decreased, there were many such microcomputer systems.
MS-DOS consists of four essentials programs and a set of additional utilities. Four main programs are:
• Boot Record
• IO.SYS
• MSDOS.SYST
84/JNU OLE
• COMMAND.COM
Booting: Process that starts up a computer is called booting. It checks for proper functioning of all the peripheral
devices attached with the system. It searches for the operating system and, when located, loads it into the main
memory.
• Cold Booting is done by turning on the computer.
• Warm Booting is performed by pressing Ctrl+Alt+Del keys simultaneously.
Primary name is separated from the Secondary name extension with the help of a dot (.) look at the following
example.
Primary name can be from 1 to 8 characters long and Secondary name contains 3 or less than 3 characters and is
optional.TheextensiontellsDOSaboutwhatkindoffle itis.ValidCharactersfornamingafle are:fromAtoZ
and the digit 0 to 9
85/JNU OLE
Fundamentals of Information Technology
A command can be given in Capitals or Small letters also. The internal commands can execute immediately but
ExternalCommandsrequirespecialflesfortheirexecutionwithoutwhichitisnotpossibletoexecutethem.
VER: All O/S has its own edition number or release or version number. The version number indicates which edition
of O/S you are working on.
Syntax: VER <Enter>
Example: C:\> Ver <Enter>
Result will be: - Microsoft Windows XP [Version 5.1.2600]
VOL: It is used to display volume label and serial number of the current drive
Syntax: Vol [drive:]
Example: C:\> VOL
DATE: Used to display the current system date and prompt for entering new date.
Syntax: Date <Enter>
Example: C:\> date <Enter>
TIME: Displays the current system time and prompt for entering new time.
Syntax: Time <Enter>
Example: C:\> Time <Enter>
DIR:Thiscommanddisplaysthelistofdirectoriesandfles withdetailslikedateofcreationwhetheritisdirectory
orfleetc.
Syntax: DIR <Enter>
Switches:
/p : Toviewonescreenofflesatatime.
/w Disp:laysonlyfvecolumnofflenamesanddirectories.
/b Displ:ayonlyfleanddirectory.
/l : Display all the information in lower case letters.
Example:
DIR*.txt Displa:yallthefleswithextension.txt
DIRD???.* : Displayallthefles startingwithDandhavinglessthanorequaltofourcharactersinthefle name
and any extension.
86/JNU OLE
CD OR CHDIR: This command allows changing present directory to another directory.
Syntax: CD [DRIVE:] PATH
Example: C:\> CD SAMS and press <Enter>
PATH:ThiscommanddefnesalistofdirectoriesDOSSearchesforexternalcommands
Syntax: PATH (Display the current Search Path)
PATH; : ( Clear the search path so DOS will search for external commands only in the current directory)
TYPE:Thiscommandallowsyoutoseethecontentsofanexistingfleonthescreen.
SYNTAX:TYPE<flename>
Example:C:\> TYPESAMS
SYNTAX:COPY<SOURCEFILENAME><TARGET FILENAME>
Example:C:\>COPY SAMS.TXTA:\TAJ
Example:C:\>COPY*.TXT +*.BAK TARGETFILENAME AndThenPressEnter
Example:C:\>COPY SAMS.TXTC:\SAMS_1\FO\RECEPTION AndThenPressEnter
Youcanalsohavetheoptiontochangethenameofflesasyoucopyit.
Example:C:\>COPYold.TXT C:\dos\new.txt AndThenPressEnter
DEL/ERASE:Thiscommandremovesoneormoreflesfromthediskorcurrentworkingdirectories.
SYNTAX:DELflespec[/p]orERASEflespec[/p]
Example: C:\> DEL C:*.BAK /P And Then Press Enter
Example: C:\> DEL abc And Then Press Enter
Example: C:\> DEL ????.COM And Then Press Enter
Switches –con/fprmation
/q – In quit mode
REN:Usedtochangethenameofthefleordirectory.
SYNTAX:REN<flename>
Example: REN sams sams1 <Enter>
Example: REN *.dat *.mst And Then Press Enter
87/JNU OLE
Fundamentals of Information Technology
$Q = Equal Sign
$$ $ Dollar Sign
Most people like to set their prompt to $p$g which display the current directory followed by > sign.
Example: PROMPT $P$G <Enter>
TREE:Itisusedtodisplaydirectorystructureofaspecifeddirectorygraphically
Syntax : TREE [drive:] [path] [/f]
[/F] display:sthenamesoftheflesineachdirectory
XCOPY
This command is faster than Copy Command and allows you to copy entire directories/disk including all the sub
directoriesandflestodestination.
Syntax XCOPY
: Source[Target][/Y][-Y][/P][/E]
SWITCHES:
/-Y Prom
: ptsbeforecopyingoverexistingfles.
88/JNU OLE
/y Over:writesexistingfleswithoutprompting.
/p : Askbeforecopyingeachfle.
/e : Copying empty directory also.
/s : Copying subfolders.
EXAMPLE:XCOPYC:\SAMSD:\SAMS/S/E
MOVE
Thiscommandmovesafle orgroupoffles fromonedirectorytoanotherandalsoonedisktoanotherdisk.Itcan
also be used to rename directories.
Syntax:Move[PathFileName][Destinationflenamepath]
Swiches:
/-Y Prom
: ptbeforeitoverwriteswhileitcopiesflethatalreadyexists.
/Y Over:writesexistingfleswithoutprompting.
FC
StandsforFileCompare.Ifyouwishtocomparetwofles ortwosetsoffles thenyoumayusethiscommand.This
commandhasthecapabilitytodifferentiatebetweentheflesanddisplaythedifference.
Syntax:FC<flesspec1><flesspec2>[/a][/b][/c][l][/n]
Switches
/a : Thisswitchdisplaysonlythefrstandlastlineofeachgroup.
/b Comp:aretheflesinlibrarymode(byte-by-byte)
/c Ignor:ethecaseofletters./l:Comparetheflesintextmode.
/n : Displays the line number for lines that are different.
EXAMPLE:FCfrst.txtsecond.txt\nandthenPress<enter>
DOSKEY
Dos can remember only the last command you had entered. But in order to make DOS remember all the commands
youenteryouwillhavetoloadaDOSKEY utility. AlsoUsed ToCreateMacros
Syntax:DOSKEYandPress<Enter>
Display message on the screen.
DOSKEYInstalled.
NOTE :To display all commands from the history list one the screen.
Example:DOSKEY/Historyor/h<Enter>.
NowwhenDOSKEYisinmemory,itcanhelpstoreallthecommandswhichyouentersothatanyofthosecommands
neednotbetypedagaintobeexecuted.AndthisallarecalledHISTORYLIST.Nowwhenyouwantthesame
command to be done you can use right arrow key or ‘F1’ or ‘F3’ Issuing following command.
SecondfeatureofDOSKEYisDoskeyMacro.Usingthismacroyoucancreateowncommandandlatteryoucan
run it on the system prompt.
Forexample“EXAMPLE:-DOSKEY C=CLS”
89/JNU OLE
Fundamentals of Information Technology
Now if you type at the system prompt only C and press enter it will clear the screen.
RecallingCommands:SomekeyisprovidedtorecallrecentcommandsyouhaverunsinceinstallingDOSKEY
6.5 UNIX
UNIX is one of the very oldest operating systems in the computer world, and is still widely used today. However, it
is not a very conspicuous operating system. Somewhat arcane in its operation and interface, it is ideally suited for
the needs of large enterprise computing systems. It is also the most common operating system run by servers and
other computers that form the bulk of the Internet. While you may never use UNIX on your local PC, you are using
it indirectly, in one form or another, every time you log on to the ‘net.
While few people run UNIX on their own systems, there are in fact a number of different versions of UNIX
available for the PC, and millions of PC users have chosen to install “UNIX” operating systems on their own desktop
machines. There are dozens of variants of the basic UNIX interface; the most popular one for the PC platform is
Linux,whichisitselfavailableinmanyfavors.WhileUNIXoperatingsystemscanbediffcult tosetupandrequire
someknowledgetooperate,theyareverystableandrobust,areeffcient withsystemresourcesandaregenerally
free or very inexpensive to obtain.
UNIXoperatingsystemsaredesignedtousethe“UNIXfle system”.Thephraseisinquotes,becausethereisno
singleUNIXfle system,anymorethanthereisasingleUNIXoperatingsystem.However,thefle systemsused
bymostoftheUNIXoperatingsystemtypesouttherearefairlysimilar,andratherdistinctfromthefle systems
used by other operating systems, such as DOS or Windows.
Asanoperatingsystemgearedspecifcally foruseonthePC,LinuxistheUNIXvariantthatgetsthemostattention
in PC circles. To improve its appeal, the programmers who are continually working to update and improve Linux
have put into the operating system compatibility support for most of the other operating systems out there. Linux
will read and write to FAT partitions, and with newer versions this includes FAT32.
6.5.1 MEM
This command displays amount of total available memory (low, Expanded and Extended) and all currently
programs.
Syntax: MEM [/f][/p][/m]
Switches:
/f : Using this switch MEM display all the areas of memory that are fee.
/p : Use this option to display the information one screen at a time.
/m Disp:layinformationabouthowaspecifedprogramisusingmemory.
90/JNU OLE
6.5.2 FILTER
APowerfulfeatureofDOSisitsuseofflters toprocessdatadirectly.ADOSFILTERcanprocessinuniqueway
any data that passes through it and can change what we see on the screen.
Switches:
[drive:][Path][flename] pe:cifeSs thenameandlocationofthefletobesearches.Itmustbepreceded
by the redirection character (<).
[/r] : Sort lines in reverse ASCII Order ( Z-A)
[+n] : Sorts line starting with the contents in column n. The default is 1.
EXAMPLE: C:\> SORT < NAME .TXT and then press <Enter>
EXAMPLE: C:\> SORT /+20 < PHONE .TXT and then press <Enter>
EXAMPLE: C:\> DIR / SORT > PHONE .TXT and then press <Enter>
Note:Sortcommanddoesn’tdistinguishbetweenupperandlowercase.Itcansortfle ofmaximum63ksize.
Combining Input & Output redirection:
EXAMPLE: C:\> SORT < NAME .DAT > SORTNAME.DAT and then press <Enter>
Here the sort command is being directed to take its input from <name.dat and after sorting, send its output to
the>sortname.datfle.
Where:
“String” : Specifes oneormorealphabetornumericcharacterwhosemaximumlengthshouldnot
be more than 250 characters and must be enclosed in double quotes.
[d:] [path][filename]: Specifies the name and location of the file to be searches EXAMPLE: C :\>
FIND “Rajni” my.txt per.txt and then press <Enter>
EXAMPLE: C:\> DIR/ FIND “TXT” and then press <Enter>
91/JNU OLE
Fundamentals of Information Technology
6.5.3 ATTRIB
Every File on the Disk has its own description like size, space occupied, the type, the date it was created, etc.
Likewise,everyflehasfewattributes. Theattributesofafleindicateswhetheritisa
• Read-Only File: r
• Archive File a
• Hidden File: h
• System File s
Withthe ATTRIBcommandyoucanchecktheattributesofafle.
SYNTAX:ATTRIB[+r][+a][+h][/+s][flename]
Switches:
+r, -r : +r Read-Only attribute or, -r turn of Read-Only attribute
+a,-a : +a archive attribute, or -a turn of archive attribute
+h,-h : +h hidden attribute, or –h turn of hidden attribute
+s, -s : +s system attribute and it should not be used generally
Note:WhileCreatinganewfleeveryflegetsreadonlyattributeandarchiveattributebydefault.
6.5.4 DELTREE
Thiscommandusedfordeletinganentiredirectorywhetherinthatdirectorycontainsfles orsubdirectoriesand
alsoitwilldeletehiddenfles.
Syntax: DELTREE [drive:][path] directories [/y]
EXAMPLE: C:\> DELTREE my.txt and then press <Enter>
6.5.5 EDIT
ThisistheDOSEditor,whichyoucanusetoeditthetextfleandalsocreatingnewfle.
Syntax:Edit[drive:][path][flename]
EXAMPLE: C:\> EDIT c:\sams\FO.TXT and then press <Enter>
EXAMPLE: C:\> Edit NEW FILE and then press <Enter>
If you do all this steps daily after your hour, then the commands you give would be:
• C:\> DIR <Enter>
• C:\>COPYC:ABC.TXTD:<Enter>
• C:\> DEL ABC.TXT <Enter>
• C:\> CLS <Enter>
92/JNU OLE
Instead of heating your head daily giving the same set of commands you can do it in a much simpler manner. All
youdoisputallthecommandsinabatchfle.
Howtocreateabatchfle:
C:\>COPYCON A.bat<Enter>
Note:HereConmeansConsolethatisKeyboard, Atheflenameand.batisextension.
NowPresstheF6orCtrl+Zkeycombination.Youshallfnd ^ZsymbolbelowCLS,NowpressEnter.Youwill
receivethefollowingmessage:1flesCopied.
NowtoexecutetheBatchFilesimplytypethenameofthefle.
C:\> A <Enter>
YouwillseeallthecommandsintheA.Batcomerightintoaction.Soinsteadoftypingallthosecommandoneafter
anotherperformedthesamejobbyjusttypingtheflename.
Fig. 6.1 shows the memory layout for a simple batch system. Memory management in batch system is very simple.
Memory is usually divided into two areas: Operating system and user program area.
Operating
System Resident
Portion
User Program
Area Transient
Program
93/JNU OLE
Fundamentals of Information Technology
Batchsystemsareinconvenientforusersbecauseuserscannotinteractwiththeirjobstofx problems.Theremay
also be long turnaround times. Example of this system is id generating monthly bank statement. Advantages of
batch system are as follows:
• Move much of the work of the operator to the computer.
• Increasedperformancesinceitwaspossibleforjobtostartassoonasthepreviousjobfnished.
An interactive, or hands-on, computer system provides on-line communication between the user and the system.
The user gives instructions to the operating system or to a program directly, and receives an immediate response.
Usually, a keyboard is used to provide input, and a display screen (such as a cathode-ray tube (CRT) or monitor)
isusedtoprovideoutput.Ifusersaretobeabletoaccessbothdataandcodeconveniently,anon-linefle system
mustbeavailable.Afle isacollectionofrelatedinformationdefned byitscreator.Batchsystemsareappropriate
for executing large jobs that need little interaction.
Time-sharing systems were developed to provide interactive use of a computer system at a reasonable cost. A time-
shared operating system uses CPU scheduling and multiprogramming to provide each user with a small portion
of a time-shared computer; each user has at least one separate program in memory. A program that is loaded into
memory and is executing is commonly referred to as a process. When a process executes, it typically executes for
onlyashorttimebeforeiteitherfnishes orneedstoperformI/O.I/Omaybeinteractive;thatis,outputistoa
display for the user and input is from a user keyboard. Since interactive I/O typically runs at people speeds, it may
take a long time to complete.
A time-shared operating system allows the many users to share the computer simultaneously. Since each action or
command in a time-shared system tends to be short, only a little CPU time is needed for each user. As the system
switches rapidly from one user to the next, each user is given the impression that she has her own computer, whereas
actually one computer is being shared among many users.
Time-sharing operating systems are even more complex than are multi-programmed operating systems. As in
multiprogramming, several jobs must be kept simultaneously in memory, which requires some form of memory
management and protection.
94/JNU OLE
6.9 Multiprogramming
When two or more programs are in memory at the same time, sharing the processor is referred to the multiprogramming
operating system. Multiprogramming assumes a single processor that is being shared. It increases CPU utilisation by
organising jobs so that the CPU always has one to execute. Fig. 4.3 shows the memory layout for a multiprogramming
system.
Operating System
job 1
job 2
job 3
job 4
512M
The operating system keeps several jobs in memory at a time. This set of jobs is a subset of the jobs kept in the job
pool. The operating system picks and begins to execute one of the jobs in the memory. Multi-programmed system
provides an environment in which the various system resources are utilised effectively, but they do not provide for
user interaction with the computer system.
Jobs entering into the system are kept into the memory. Operating system picks the job and begins to execute one
of the jobs in the memory. Having several programs in memory at the same time requires some form of memory
management. Multiprogramming operating system monitors the state of all active programs and system resources.
This ensures that the CPU is never idle unless there are no jobs.
Advantages
• High CPU utilisation.
• It appears that many programs are allotted CPU almost simultaneously.
Disadvantages
• CPU scheduling is requires.
• To accommodate many jobs in memory, memory management is required.
95/JNU OLE
Fundamentals of Information Technology
6.10 Spooling
Spooling is an acronym for simultaneous peripheral operations on line. Spooling refers to putting jobs in a buffer,
a special area in memory or on a disk where a device can access them when it is ready. Spooling is useful because
device access data that different rates. The buffer provides a waiting station where data can rest while the slower
device catches up. Fig 2.3 shows the spooling.
DISK
CARD
PRINTER
READER
Computer can perform I/O in parallel with computation; it becomes possible to have the computer read a deck of cards
to a tape, drum or disk and to write out to a tape printer while it was computing. This process is called spooling.
The most common spooling application is print spooling. In print spooling, documents are loaded into a buffer and
then the printer pulls them off the buffer at its own rate. Spooling is also used for processing data at remote sites.
The CPU sends the data via communications path to a remote printer. Spooling overlaps the I/O of one job with
thecomputationofotherjobs.Onediffculty withsimplebatchsystemsisthatthecomputerstillneedstoreadthe
decks of cards before it can begin to execute the job. This means that the CPU is idle during these relatively slow
operations.Spoolingbatchsystemswerethefrstandarethesimplestofthemultiprogrammingsystems.
Advantage of Spooling
• The spooling operation uses a disk as a very large buffer.
• Spooling is however capable of overlapping I/O operation for one job with processor operations for another
job.
6.11.2 Interactive
User is on line with computer system and interacts with it via an interface. It is typically composed of many short
transactions where the result of the next transaction may be unpredictable. Response time needs to be short since
the user submits and waits for the result.
96/JNU OLE
6.11.3 Real time system
Real time systems are usually dedicated, embedded systems. They typically read from and react to sensor data. The
systemmustguaranteeresponsetoeventswithinfxedperiodsoftimetoensurecorrectperformance.
6.11.4 Distributed
It distributes computation among several physical processors. The processors do not share memory or a clock.
Instead, each processor has its own local memory. They communicate with each other through various communication
lines.
97/JNU OLE
Fundamentals of Information Technology
Summary
• An operating system acts as an intermediary between the user of a computer and computer hardware.
• An operating system is software that manages the computer hardware.
• An Operating system is concerned with the allocation of resources and services, such as memory, processors,
devices and information.
• Every general purpose computer consists of the hardware, operating system, system programs and application
programs.
• In the early days of micro computing, memory space was often limited, so the disk operating system was an
extension of the operating system.
• In the early days of computers, there were no disk drives; delay lines, punched cards, paper tape, magnetic tape,
magnetic drums, were used instead.
• DOS is an Operating System. It works as an interpreter between user and computer.
• Process that starts up a computer is called booting.
• TheinternalcommandscanexecuteimmediatelybutExternalCommandsrequirespecialflesfortheirexecution
without which it is not possible to execute them.
• Dos can remember only the last command you had entered.
• UNIX is one of the very oldest operating systems in the computer world, and is still widely used today.
• Asanoperatingsystemgearedspecifcally foruseonthePC,LinuxistheUNIXvariantthatgetsthemost
attention in PC circles.
• Batch operating system is one where programs and data are collected together in a batch before processing
starts.
• Ajobispredefned sequenceofcommands,programsanddatathatarecombinedintoasingleunitcalled
job.
• Multi-programmed batched systems provide an environment where the various system resources (for example,
CPU, memory, peripheral devices) are utilised effectively.
• An interactive, or hands-on, computer system provides on-line communication between the user and the
system.
• Time-sharing systems were developed to provide interactive use of a computer system at a reasonable cost.
• When two or more programs are in memory at the same time, sharing the processor is referred to the
multiprogramming operating system.
• Spooling is useful because device access data that different rates.
References
• Bhatt, C. P., 2003. An Introduction to Operating Systems: Concepts and Practice , 3rd ed. PHI Learning Pvt.
Ltd.
• Kifer, M. & Smolka, S., 2007. Introduction to Operating System Design and Implementation: The OSP 2
Approach, Springer.
• DISK OPERATING SYSTEM (DOS) [Pdf] Available at: <http://computerbabu.webs.com/-%20New%20Folder/
DISK%20OPERATING%20SYSTEM%20(DOS).pdf>[Accessed22May2013].
• Bhor, H., Rote, U. & Shinde, U., Operating System [Pdf] Available at: <http://mu.ac.in/myweb_test/MCA%20
study%20material/OS%20-%20PDF.pdf> [Accessed 22 May 2013].
• Murphy, M., 2011. Introduction to Operating Systems [Video online] Available at: <http://www.youtube.com/
watch?v=MzVGL44eq9w> [Accessed 22 May 2013].
• Learn Introduction to O S from the Fundamentals of Operating Systems [Video online] Available at: <http://
www.youtube.com/watch?v=cP-OPjwag4E> [Accessed 22 May 2013].
98/JNU OLE
Recommended Reading
• Bhatt, 2007. Introduction To Operating Systems: Concepts And Practice An 2Nd Ed. , 2nd ed. PHI Learning
Pvt. Ltd.
• Johnson, P., 2004. Introduction To Operating Systems, iUniverse.
• Jaeger, T., 2008. Operating Systems Security, Morgan & Claypool Publishers.
99/JNU OLE
Fundamentals of Information Technology
Self Assessment
1. An ___________ is a program that controls the execution of application programs and acts as an interface
between the user of a computer and the computer hardware.
a. Operating system
b. Hardware
c. Software
d. Function
4. ________ displays the current system time and prompt for entering new time.
a. DATE
b. TIME
c. CLS
d. DIR
6. Whichcommandisusedtomakeduplicateflesofanexistingfle?
a. CUT
b. COPY
c. PASTE
d. DUPLICATE
100/JNU OLE
7. Match the following
1. ERASE A. Displaydirectorystructureofaspecifeddirectorygraphically
2. REN B. Customise the dos prompt
3. PROMPT C. Changethenameofthefleordirectory
4. TREE D. Removesoneormoreflesfromthediskorcurrentworkingdirectories
a. 1-B, 2-A, 3-C, 4-D
b. 1-A, 2-B, 3-D, 4-C
c. 1-D, 2-C, 3-B, 4-A
d. 1-C, 2-D, 3-A, 4-B
10. _________ command displays amount of total available memory (low, Expanded and Extended) and all currently
programs.
a. MEM
b. FILTER
c. ATTRIB
d. DELTREE
101/JNU OLE
Fundamentals of Information Technology
Chapter VII
Data processing
Aim
The aim of this chapter is to:
Objectives
The objectives of this chapter are to:
• explicateorganisationofrelativefle
• defnedataandinformation
Learning outcome
At the end of this chapter, you will be able to:
• analysevariousoperationsperformedonfles
• understandfleorganisation
102/JNU OLE
7.1 Introduction
Data processing is any computer process that converts data into information. The processing is usually assumed
to be automated and running on a mainframe, minicomputer, microcomputer, or personal computer. Because data
are most useful when well-presented and actually informative, data processing systems are often referred to as
information systems to emphasise their practicality. Nevertheless, both terms are roughly synonymous, performing
similar conversions; data-processing systems typically manipulate raw data into information, and likewise information
systems typically take raw data as input to produce information as output.
To better market their profession, a computer programmer or a systems analyst that might once have referred, such
as during the 1970s, to the computer systems that they produce as data-processing systems more often than not
nowadays refers to the computer systems that they produce by some other term that includes the word information,
such as information systems, information technology systems, or management information systems.
Inthecontextofdataprocessing,dataaredefned asnumbersorcharactersthatrepresentmeasurementsfromthereal
world. A single datum is a single measurement from the real world. Measured information is then algorithmically
derivedand/orlogicallydeducedand/orstatisticallycalculatedfrommultipledata.Informationisdefned aseither
a meaningful answer to a query or a meaningful stimulus that can cascade into further queries.
More generally, the term data processing can apply to any process that converts data from one format to another,
although data conversion would be the more logical and correct term. From this perspective, data processing becomes
the process of converting information into data and also the converting of data back into information. The distinction
is that conversion doesn’t require a question (query) to be answered.
For example, information in the form of a string of characters forming a sentence in English is converted or encoded
from a keyboard’s key-presses as represented by hardware oriented integer codes into ASCII integer codes after
which it may be more easily processed by a computer not as merely raw, amorphous integer data, but as a meaningful
characterinanaturallanguage’ssetofgraphemesandfnally convertedordecodedtobedisplayedascharacters,
represented by a font on the computer display. In that example we can see the stage-by-stage conversion of the
presence of and then absence of electrical conductivity in the key-press and subsequent release at the keyboard from
raw substantially meaningless integer hardware-oriented data to evermore-meaningful information as the processing
proceeds toward the human being.
A more conventional example of the established practice of using the term data processing is that a business has
collected numerous data concerning an aspect of its operations and that this multitude of data must be presented in
meaningful, easy-to-access presentations for the managers who must then use that information to increase revenue or
to decrease cost. That conversion and presentation of data as information is typically performed by a data processing
application.
When the domain from which the data are harvested is a science or engineering, data processing and information
systems are considered too broad of terms and the more specialised term data analysis is typically used, focusing
on the highly-specialised and highly-accurate algorithmic derivations and statistical calculations that are less often
observed in the typical general business environment. This divergence of culture is exhibited in the typical numerical
representations used in data processing versus numerical; data processing’s measurements are typically represented
byintegersorbyfxed pointorbinary-codeddecimalrepresentationsofrealnumberswhereasthemajorityofdata
analysis’smeasurementsareoftenrepresentedbyfoatingpointrepresentationofrealnumbers.
Practically all naturally occurring processes can be viewed as examples of data processing systems where “real
world” information in the form of pressure, light, etc. are converted by human observers into electrical signals in the
nervous system as the senses we recognise as touch, sound, and vision. Even the interaction of non-living systems
may be viewed in this way as rudimentary information processing systems. Conventional usage of the terms data
processing and information systems restricts their use to refer to the algorithmic derivations, logical deductions, and
statistical calculations that recur perennially in general business environments, rather than in the more expansive
sense of all conversions of real-world measurements into real world information in, say, an organic biological system
orevenascientifcorengineeringsystem.
103/JNU OLE
Fundamentals of Information Technology
7.1.1 Data
Data are any facts, numbers, or text that can be processed by a computer. Today, organisations are accumulating
vast and growing amounts of data in different formats and different databases. This includes:
• operational or transactional data such as, sales, cost, inventory, payroll, and accounting
• non-operational data, such as industry sales, forecast data, and macro economic data
• metadata-dataaboutthedataitself,suchaslogicaldatabasedesignordatadictionarydefnitions
7.1.2 Information
The patterns, associations, or relationships among all this data can provide information. For example, analysis of
retail point of sale transaction data can yield information on which products are selling and when.
Categorical Ordinal (categories have inherent order) Job grade, age groups
7.2.1 Input
The input stage of computing is concerned with getting the data needed by the program into the computer. Input
devices are used to do this. The most commonly used input devices are the mouse and the keyboard.
104/JNU OLE
7.2.2 Processing
The program contains instructions about what to do with the input. During the processing stage the compute follows
these instructions using the data which has just been input. What the computer produces at the end of this stage, the
output, will only be as good as the instructions given in the program. In other words if garbage has been put in to
the program, garbage is what will come out of the computer. This is known as GIGO, or Garbage in Garbage Out.
7.2.3 Output
The output stage of computing is concerned with giving out processed data as information in a form that is useful
to the user. Output devices are used to do this. The most commonly used output devices are the screen, which is
also called a monitor or VDU and the printer.
The CPU is a microprocessor - a silicon chip - composed of tiny electrical switches called ‘transistors’. The speed
at which the processor carries out its operations is measured in megahertz (MHz) or Gigahertz (GHz). The higher
the number of MHz the faster the computer can process information. A common CPU today runs at around 3 GHz
or more. The Intel Pentium processor and the Athlon are examples of a CPU.
TS OF A CPU PAR
Backing Store
105/JNU OLE
Fundamentals of Information Technology
Informationinacomputerfle canconsistofsmallerpacketsofinformation(oftencalledrecordsorlines)that
areindividuallydifferentbutsharesometraitincommon.Forexample,apayrollfle mightcontaininformation
concerningalltheemployeesinacompanyandtheirpayrolldetails;eachrecordinthepayrollfle concernsjust
one employee, and all the records have the common trait of being related to payroll this is very similar to placing all
payrollinformationintoaspecifc fling cabinetinanoffce thatdoesnothaveacomputer.Atextfle maycontain
lines of text, corresponding to printed lines on a piece of paper.
Insomecases,computerprogramsmanipulatefles thataremadevisibletothecomputeruser.Forexample,ina
word-processingprogram,theusermanipulatesdocumentfles thatshenamesherself.Thecontentofthedocument
fle isarrangedinawaythattheword-processingprogramunderstands,buttheuserchoosesthenameandlocation
ofthefle,andsheprovidesthebulkoftheinformation(suchaswordsandtext)thatwillbestoredinthefle.
Filesonacomputercanbecreated,moved,modifed, grown,shrunkanddeleted.Inmostcases,computerprograms
thatareexecutedonthecomputerhandletheseoperations,buttheuserofacomputercanalsomanipulatefles if
necessary.Forinstance,MicrosoftWordfles arenormallycreatedandmodifed bytheMicrosoftWordprogramin
responsetousercommands,buttheusercanalsomove,rename,ordeletethesefles directlybyusingafle manager
program such as Windows Explorer (on Windows computers).
106/JNU OLE
7.4.2Operationsonthefle
Theoperationswhichareperformedonthefleareasfollows:
• Openingafletouseitscontents
• Reading or updating the contents
• Committing updated contents to durable storage
• Closingthefle,therebylosingaccessuntilitisopenedagain
ProblemsaccessingorderedSequentialfles
Recordsinanorderedsequentialfle arearranged,inorder,onsomekeyfeld orfelds. Whenwewanttoinsert,
deleteoramendarecordwemustpreservetheordering.Theonlywaytodothisistocreateanewfle. Inthecaseof
aninsertionorupdate,thenewfle willcontaintheinsertedorupdatedrecord.Inthecaseofadeletion,thedeleted
recordwillbemissingfromthenewfle.
Themaindrawbacktoinserting,deletingoramendingrecordsinanorderedsequentialfle isthattheentirefle
mustbereadandthentherecordswrittentoanewfle. Sincediskaccessisoneoftheslowestthingswecandoin
computing this is very wasteful of computer time when only a few records are involved. For instance, if 10 records
aretobeinsertedintoa10,000recordfle, then10,000recordswillhavetobereadfromtheoldfle and10,010
writtentothenewfle. Theaveragetimetoinsertanewrecordwillthusbeverygreat.
InsertingrecordsinanorderedSequentialfle
ToinsertarecordinanorderedSequentialfle:
• All the records with a key value less than the record to be inserted must be read and then written to the new
fle.
• Thentherecordtobeinsertedmustbewrittentothenewfle.
• Finally,theremainingrecordsmustbewrittentothenewfle.
DeletingrecordsfromanorderedSequentialfle
TodeletearecordinanorderedSequentialfle:
• Alltherecordswithakeyvaluelessthantherecordtobedeletedmustbewrittentothenewfle.
• Whentherecordtobedeletedisencountereditisnotwrittentothenewfle.
• Finally,alltheremainingrecordsmustbewrittentothenewfle.
AmendingrecordsinanorderedSequentialfle
ToamendarecordinanorderedSequentialfle:
• All the records with a key value less than the record to be amended must be read and then written to the new
fle.
• Then the record to be amended must be read the amendments applied to it and the amended record must then
bewrittentothenewfle.
• Finally,alltheremainingrecordsmustbewrittentothenewfle.
107/JNU OLE
Fundamentals of Information Technology
OrganisationofRelativefles
Recordsinrelativefles areorganisedonascendingrelativerecordnumber.ARelativefle maybevisualisedas
aonedimensiontablestoredondisk,wheretherelativerecordnumberistheindexintothetable.Relativefles
support sequential access by allowing the active records to be read one after another.
1 Rec001
2 free
3 Rec003
4 Rec004
Relative 5 free
Record
Number 6 free
7 Rec007
325 Rec325
326 Rec326
327 free
328 Rec328
Relativefles supportonlyonekey.Thekeymustbenumericandmusttakeavaluebetween1andthecurrent
highestrelativerecordnumber.Enoughroomisallocatedtothefle tocontainrecordswithrelativerecordnumbers
between 1 and the highest record number.
For instance, if the highest relative record number used is 10,000 then room for 10,000 records is allocated to the
fle. Figure1belowcontainsaschematicrepresentationofaRelativefle. Inthisexample,enoughroomhasbeen
allocated on disk for 328 records. But although there is room for 328 records in the current allocation, not all the
record locations contain records. The record areas labeled “free”, have not yet had record values written to them.
AccessingrecordsinaRelativefle
ToaccessarecordinaRelativefle aRelativeRecordNumbermustbeprovided.Supplyingthisnumberallowsthe
recordtobeaccesseddirectlybecausethesystemcanusethestartpositionofthefle ondisk,thesizeoftherecord,
and the relative record number to calculate the position of the record.
108/JNU OLE
7.4.5 Indexed Files
WhiletheusefulnessofaRelativefle isconstrainedbyitsrestrictivekey,Indexedfles sufferfromnosuchlimitation.
Indexedfles mayhaveupto255keys,thekeyscanbealphanumericandonlytheprimarykeymustbeunique.In
addition,itispossibletoreadanIndexedflesequentiallyonanyofitskeys.
OrganisationofIndexedfles
Anindexedfle mayhavemultiplekeys.Thekeyuponwhichthedatarecordsareorderediscalledtheprimary
key.Theotherkeysarecalledalternatekeys.RecordsintheIndexedfle aresequencedonascendingprimarykey.
Overtheactualdatarecords,thefle systembuildsanindex.Whendirectaccessisrequired,thefle systemuses
thisindextofnd,read,insert,updateordeletetherequiredrecord.
Sincethedatarecordsareinheldinascendingprimarykeysequenceitiseasytoseehowthefle maybeaccessed
sequentially on the primary key. It is not quite so obvious how sequential on the alternate keys is achieved. This is
coveredintheunitonIndexedfles.
Organizingflesandfoders
(root)
Logfle
Widgets
Foobar
Payroll
Employees
Timecards
Salaries
Manag ers
Leads
Clerks
Inmoderncomputersystems,fles aretypicallyaccessedusingnames.Insomeoperatingsystems,thenameis
associatedwiththefle itself.Inothers,thefle isanonymous,andispointedtobylinksthathavenames.Inthe
lattercase,ausercanidentifythenameofthelinkwiththefle itself,butthisisafalseanalogue,especiallywhere
thereexistsmorethanonelinktothesamefle.
109/JNU OLE
Fundamentals of Information Technology
Files(orlinkstofles) canbelocatedindirectories.However,moregenerally,adirectorycancontaineitheralist
offles, oralistoflinkstofles. Withinthisdefnition, itisofparamountimportancethattheterm“fle” includes
directories.Thispermitstheexistenceofdirectoryhierarchies.Anamethatreferstoafle withinadirectorymust
be unique. In other words, there must be no identical names in a directory. However, in some operating systems,
anamemayincludeaspecifcation oftypethatmeansadirectorycancontainanidenticalnametomorethanone
typeofobjectsuchasadirectoryandafle.
Mostcomputersorganisefles intohierarchiesusingfolders,directories,orcatalogs.(Theconceptisthesame
irrespectiveoftheterminologyused.)Eachfoldercancontainanarbitrarynumberoffles, anditcanalsocontain
otherfolders.Theseotherfoldersarereferredtoassubfolders.Subfolderscancontainstillmorefles andfolders
and so on, thus building a tree-like structure in which one “master folder” (or “root folder” — the name varies from
oneoperatingsystemtoanother)cancontainanynumberoflevelsofotherfoldersandfles. Folderscanbenamed
justasfles can(exceptfortherootfolder,whichoftendoesnothaveaname).Theuseoffoldersmakesiteasier
toorganiseflesinalogicalway.
Anotherprotectionmechanismimplementedinmanycomputersisaread-onlyfag.Whenthisfag isturnedonfora
fle (whichcanbeaccomplishedbyacomputerprogramorbyahumanuser)thefle canbeexamined,butitcannot
bemodifed. Thisfag isusefulforcriticalinformationthatmustnotbemodifed orerased,suchasspecialfles that
areusedonlybyinternalpartsofthecomputersystem.Somesystemsalsoincludeahiddenfag tomakecertain
fles invisible;thisfag isusedbythecomputersystemtohideessentialsystemfles thatusersmustnevermodify.
7.6Storingfles
Inphysicalterms,mostcomputerfles arestoredonharddisksspinningmagneticdisksinsideacomputerthat
canrecordinformationindefnitely. Harddisksallowalmostinstantaccesstocomputerfles. Onlargecomputers,
somecomputerfles maybestoredonmagnetictape.Filescanalsobestoredonothermediainsomecases,such
as writeable compact discs, Zip drives, etc.
7.6.1Backingupfles
Whencomputerfles containinformationthatisextremelyimportant,abackupprocessisusedtoprotectagainst
disastersthatmightdestroythefles. Backingupfles simplymeansmakingcopiesofthefles inaseparatelocation
so that they can be restored if something happens to the computer, or if they are deleted accidentally.
110/JNU OLE
Therearemanywaystobackupfles. Mostcomputersystemsprovideutilityprogramstoassistintheback-upprocess,
whichcanbecomeverytimeconsumingiftherearemanyfles tosafeguard.Filesareoftencopiedtoremovable
mediasuchaswriteableCDsorcartridgetapes.Copyingfles toanotherharddiskinthesamecomputerprotects
against failure of one disk, but if it is necessary to protect against failure or destruction of the entire computer, then
copiesofthefles mustbemadeonothermediathatcanbetakenawayfromthecomputerandstoredinasafe,
distant location.
7.7.1 Records
As you saw previously, each table stores can hold a great deal of data. Each table contains a lot of records. A record
is all of the data or information about one person or one thing. In the table below, all of the information about each
cartoon character is stored in a ‘row’ or record.
111/JNU OLE
Fundamentals of Information Technology
WhatinformationcouldyoufndintherecordforCat Woman?
What do you think the database at your school stores records about?
How about the library? What records would be stored on that database?
7.7.2 Fields
Each table contains a lot of records. A record is made up of lots of individual pieces of information. Look at Wonder
Woman’srecord;itstoresherfrst name,lastname,address,cityandage.Eachoftheseindividualpiecesofinformation
inarecordarecalleda‘feld’ A‘feld’isonepieceofdataorinformationaboutapersonorthing.
Fields
Table 7.4 Fields
Whatfeldscanyoufndabout TweetyBird?
Whatfeldsdoyouthinkwouldbestoredinyourstudentrecordontheschooldatabase?
Whatfeldswouldbestoredinabookrecordinthelibrarydatabase?
Barcode reader
A bar code reader uses visible red light to scan and ‘read’ the barcode. As the red light shines across the light and dark
bandsofthebarcode,sotherefected redlightisalsolighteranddarker(doyouseethatonthepictureopposite?)
TheHandScannersensestherefected lightandtranslatesitintodigitaldata.Thedigitaldataistheninputintothe
computer.Thecomputermaydisplaytheresultsonascreenandalsoinputitintothecorrectfelds inthedatabase.
Typical uses:
• Shop-tofnddetailsontheproductsoldandprice
• Library - record the ISBN number of the book and the borrower’s card number
• Warehouse - to check the labels on boxes delivered against what is recorded on the delivery sheet.
112/JNU OLE
Magnetic ink character recognition (MICR)
The numbers at the bottom of a cheque are written in a special ink which contains iron particles. This ink is magnetised
and commonly called ‘magnetic ink’. It can be read by a special machine called a Magnetic Ink Character Reader
(MICR).
The completed forms are scanned by an Optical Mark Reader (OMR) which detects the presence of a mark by
measuringtherefected light.Lesslightisrefected whereamarkhasbeenmade.TheOMRtheninterpretsthe
pattern of marks into a data record and sends this to the computer for storage, analysis and reporting. This provides
a very fast and accurate method of inputting large amounts of data, provided the marks have been made accurately
and clearly.
Speech Recognition
The user talks into a microphone. The computer ‘listens’ to the speaker, then translates that information to written
words and phrases. It then displays the text on to the monitor. This process happens immediately, so as you say the
words, they appear on the screen. The software often needs some “training” in order for it to get used to your voice,
but after that it is simple to use.
113/JNU OLE
Fundamentals of Information Technology
They should also have an explanation to tell the customer what the form is for, in this case ‘membership application
form’, or ‘data collection form’, or ‘customer details form’ or something similar. Lastly, they should give the customer
instructions to tell them what they should do with the form once they have completed it. Here it tells the person
fllingtheformin,tosenditbacktotheaddressgiven.
Travel Arrangement If the information is incorrect, please click the appropriate choice
Dietary Needs
Meal Arrangement If the information is incorrect, please click the appropriate choice
JFree school meal JPaid school meal JSandwiches JHome JOther
Fig.7.5Formflledbythecustomer
Where possible, it is a good idea to try to limit the options that people can enter. If you can manage to do this, then
you can set up your computerised system with a drop down box that gives all of the options on the form – making
itfasterforstafftoenterthedata.ForExample:Thefrst formshownabove,limitsthechoiceoftitleto‘Mr’or
‘Miss’.Thisissuffcient inthiscasebecauseitisanapplicationformforachildrens’youthclub,soitisunlikely
that there will be any ‘Mrs’ or ‘Dr’ or ‘Reverend’
The second form gives people the different options for travel; they have to tick one of the options since there isn’t
any room for them to write something different. The same method has been used for types of lunches.
7.9Verifcation
It was mentioned that validation cannot make sure that data you enter is correct, it can only check that it is sensible,
reasonable and allowable. However, it is important that the data in your database is as accurate as possible. Have
you ever heard of the term ‘Garbage in, garbage out’ or ‘GIGO’? This means that if you enter data that is full of
mistakes (garbage in) then when you want to search for a record you will get data with mistakes presented to you
(garbage out).
ThisiswhereVerifcation canhelptomakesurethatthedatainyourdatabasecontainsasfewmistakesaspossible.
Verifcation meanstochecksomethingtwice.Thinkaboutwhenyouchooseanewpassword,youhavetotypeitin
twice. This lets the computer check if you have typed it exactly the same both times and not made a mistake. The
datainyourdatabasecanbeverifedorcheckedtwice.
114/JNU OLE
FRUIT COLOUR SIZE
Apple Yellow Medium
Orange Orange Medium
Strawberry Red Small
Banana Yellow Medium
Cherry Red Small
Grape Green Small
Melon Yellow Large
Blacberry Black Small
Othermethodsofverifcationincludecontrol,batchorhashtotals.Tofnd outmoreaboutthese,visitthemini-
websiteon Validationand Verifcation.
What Validation can do, is to check that the data is sensible, reasonable and allowable. This page will not go into
any great depth about different methods of validation as there is a whole mini-website on Validation alone. Go and
havealookatittofnd outmoredetailsaboutthebestkindofValidationtouseandthereasonswhy.Someofthe
types of Validation that you could set up for your database are:
Validation Example
Type Check
If the datatype number has been chosen, then only
that type of data will be allowed to be entered i.e. 2, 3, 4
numbers. Mr, Mrs, Miss, Ms
Ifafeldistoacceptcertainchoicese.g.titlemight Brown,Green,Blue, Yellow,Red
be restricted to ‘Mr’, ‘Mrs’, ‘Miss’ and ‘Ms’ then
‘Dr’ wouldn’t be allowed.
115/JNU OLE
Fundamentals of Information Technology
Range Check
A shop may only sell items between the price of £
10.00 and £ 50.00 . To stop mistakes being made,
a range check can be set up to stop £500.00being
entered by accident.
>=10 AND <=50
A social club may not want people below the age of
18 to be able to join.
>=18
Notice the use of maths symbols:
>‘greater than’
< ‘less than’
= ‘equals’
Presence Check
There might be an important piece of data that you
want to make sure is always stored. For example,
a school will always want to know an emergency
School Database: Emergency contact number
contact number, a video rental store might always
DVLA Database: Date test passed
want to know a customer’s address, a wedding
Electoral Database: Date of birth
dress shop might always want a record of the brides
Vet’s Database: Type of Pet
wedding date.
Apresencecheckmakessurethatacriticalfeld
cannotbeleftblank,itmustbeflledin.
Picture or format check
Some things are always entered in the same format.
Think about postcode, it always has a letter, letter,
number, number, number, letter and letter e.g. CV43
9PB. There may be the odd occasion where it differs
Postcode: CV43 9PB
slightly e.g. a Birmingham postcode B19 8WR, but
Telephone Number (01926) 615432
the letters and numbers are still in the same order.
116/JNU OLE
Summary
• Data processing is any computer process that converts data into information.
• A single datum is a single measurement from the real world.
• Data are any facts, numbers, or text that can be processed by a computer.
• Whenever a computer is used it must work its way through three basic stages before any task can be
completed.
• A program is a set of step-by-step instructions which tells the computer exactly what to do with the input in
order to produce the required output.
• The input stage of computing is concerned with getting the data needed by the program into the computer.
• The most commonly used output devices are the screen, which is also called a monitor or VDU and the
printer.
• The CPU collects all of the raw data from various input devices (such a keyboard or mouse) and converts it into
useful information by carrying out software instructions.
• The Immediate Access Store (IAS) holds the data and programs needed at that instant by the Control Unit.
• Acomputerfle isapieceofarbitraryinformation,orresourceforstoringinformation,thatisavailabletoa
computer program and is usually based on some kind of durable storage.
• Informationinacomputerfle canconsistofsmallerpacketsofinformation(oftencalledrecordsorlines)that
are individually different but share some trait in common.
• Theprogrammerswhocreatetheprogramsdecidewhatfles areneeded,howtheyaretobeusedand(often)
their names.
• Filesonacomputercanbecreated,moved,modifed,grown,shrunkanddeleted.
• Recordsinanorderedsequentialflearearranged,inorder,onsomekeyfeldorfelds.
• Inthecaseofaninsertionorupdate,thenewflewillcontaintheinsertedorupdatedrecord.
• Directaccessfles allowdirectaccesstoaparticularrecordinthefle usingakeyandthisgreatlyfacilitatesthe
operations of reading, deleting, updating and inserting records.
• ARelativefle maybevisualisedasaonedimensiontablestoredondisk,wheretherelativerecordnumberis
the index into the table.
• Anindexedflemayhavemultiplekeys.
• Mostcomputersorganiseflesintohierarchiesusingfolders,directories,orcatalogs.
• Manymoderncomputersystemsprovidemethodsforprotectingflesagainstaccidentalanddeliberate
damage.
References
• Thierauf, J. B. & Niehaus, F. J., 1980. An introduction to data processing for business, Wiley.
• Micallef, A. B., 1971. An introduction to data processing, Cummings Pub. Co.
• Kumar, V. & Kumar, D., LESSON 1 INTRODUCTION TO DATA PROCESSING [Pdf] Available at: <http://
www.ddegjust.ac.in/studymaterial/pgdca/ms-09.pdf> [Accessed 24 May 2013].
• 2 Data Processing Concept [Pdf] Available at: <http://download.nos.org/srsec330/330L2.pdf> [Accessed 24
May 2013].
• An Introduction to Data Visualization & Processing - Uttam Grandhi[Video online] Available at: <http://www.
youtube.com/watch?v=EC-8VxXJER4> [Accessed 24 May 2013].
• Dr. Garg, N., 2008. Lecture - 1 Introduction to Data Structures and Algorithms [Video online] Available at:
<http://www.youtube.com/watch?v=zWg7U0OEAoE> [Accessed 24 May 2013].
117/JNU OLE
Fundamentals of Information Technology
Recommended Reading
• Robichaud, B., Muscat, J. E. & Hall, A., 1977.Introduction to Data Processing, 2nd ed. Greg Division, McGraw-
Hill.
• Carver, K. D., 1974. Introduction to data processing, John Wiley & Sons Australia, Limited.
• Harris, L. M., 1986. Introduction to data processing: mainframes, minis, and microcomputers, 3rd ed. Wiley.
118/JNU OLE
Self Assessment
1. ___________isdefned aseitherameaningfulanswertoaqueryorameaningfulstimulusthatcancascade
into further queries.
a. Data processing
b. Information
c. Datum
d. Technology
2. _________aredefnedasnumbersorcharactersthatrepresentmeasurementsfromtherealworld.
a. Data
b. Numbers
c. Queries
d. Cells
4. The CPU is a microprocessor - a silicon chip - composed of tiny electrical switches called __________.
a. transistors
b. megahertz
c. microchips
d. processor
119/JNU OLE
Fundamentals of Information Technology
6. A computer ________ is a piece of arbitrary information, or resource for storing information, that is available
to a computer program and is usually based on some kind of durable storage.
a. disk
b. storage
c. digit
d. fle
8. ___________ may have up to 255 keys, the keys can be alphanumeric and only the primary key must be
unique.
a. Relativefle
b. Direct access
c. Sequentialfle
d. Indexedfles
9. Anystringof__________mayormaynotbeawell-formednameforafle oralinkdependinguponthecontext
of application.
a. characters
b. numbers
c. symbols
d. data
10. Whatallowsinstantaccesstocomputerfles?
a. Magnetic tape
b. Records
c. Hard disks
d. Fields
120/JNU OLE
Chapter VIII
Internet and Network Security
Aim
The aim of the chapter is to:
• explaininternet’sworkfow
• elucidate the different threats, consequences and remedies for network security
Objectives
The objectives of the chapter are to:
Learning outcome
After end of this chapter, you will be able to:
121/JNU OLE
Fundamentals of Information Technology
8.1 Internet
Internet is the world's largest network. It is a unique collection of networks of different kinds. It is often described
as “a network of networks” since all the smaller networks are linked together into one giant network called the
Internet.
The use of internet began in 1969 in the U.S. Department of Defence’s Advanced Research Project Agency (ARPA)
to provide immediate communication within the department during war. Computers were then installed at U.S.
universities with defence related projects. As scholars began to go online, the network changed from military use
toscientifcuse.
As Arpanet grew, administration of the system became distributed to a number of organisations, including the
National Science Foundation (NSF). This shift of responsibility began the transformation of the science oriented
Arpanet into the commercially minded and funded internet, which is used by millions today.
8.2.1 Protocol
ArchitectureisbasedintheveryspecifcationofthestandardTCP/IPprotocol,designedtoconnectanytwo
networks which may be very different in internal hardware, software, and technical design. Once two networks are
interconnected, communication with TCP/IP is enabled end-to-end, so that any node on the internet has the ability
to communicate with any node irrespective of their location. TCP/IP protocol has been discussed in detail in the
earlier chapter.
8.2.2 IP Address
Every computer on the internet has a unique numerical address, called an Internet Protocol (IP) address, used to route
packets across the Internet. Just as a postal address enables the postal system to send mail to the desired destination
from anywhere around the world, the computer's IP address gives the internet routing protocols the unique information
they need to route packets of information to the computer from anywhere across the Internet.
Ifamachineneedstocontactanotherbyadomainname,itfrst looksupforthecorrespondingIPaddresswiththe
domain name service. The IP address is the geographical descriptor of the virtual world, and the addresses of both
sourceanddestinationsystemsarestoredintheheaderofeverypacketthatfowsacrosstheInternet.
122/JNU OLE
This data provides the information that an internet router needs to get packets and messages to their destination. For
additional reliability, internet packet headers also contain an error correction code, which is a number representing a
mathematical combination of the rest of the packet data. If even a single bit of the packet is changed in transmission,
then recalculation of the error correction code by a router won't match the code transmitted with the message, and
the packet will be discarded and a request made for retransmission.
8.2.6 Backbones
Backbonesaretypicallyfbre optictrunklines.Thetrunklinehasmultiplefbre opticcablescombinedtogetherto
increase the capacity. Fibre optic cables are designated OC for optical carrier, such as OC-3, OC-12 or OC-48. An
OC-3 line is capable of transmitting 155 Mbps while an OC-48 can transmit 2,488 Mbps (2.488 Gbps). Connecting
all the hardware, protocols and technologies, we have the internet serving millions of users. But the security of the
data transferred, communications using the internet is a big question which needs to be addressed.
e-mail with virus(viruses are External origination, Could infect system reading email and subsequently
explained after the table) internal use spread throughout entire organisation.
Could enter through unprotected ports, compromise
Network with virus External
whole network.
Internal browsing to Could cause compromise on system doing browsing and
Web based virus
external site subsequently affect other internal systems.
External to web If web server is compromised hacker could gain access to
Web server attack
servers other systems internal to network.
Externalservicessuchasweb,emailandfletransfer
Denial of service attack External
protocol could become unusable
If router is attacked, whole
network could go down.
Firewalls do nothing for this attack. Internal segmentation
Network user attack Internal to anywhere
frewallscanhelpcontaindamage.
123/JNU OLE
Fundamentals of Information Technology
Viruses
• A computer virus is a self-replicating computer program that behaves like a biological virus. It spreads by
inserting copies into other executable code or documents.
• Similar to the biological virus, it spreads on its own by multiplying itself throughout the system. There are
different types of viruses, prominent being Trojan horses, worms, and email viruses.
• The Trojan horses are computer programs which pretend to do one thing but actually do damage when they
start it.
• Thewormsvirusesarepiecesofsoftwarethatusecomputernetworksandsecurityfaws tocreatecopiesof
self.Acopyofthewormwillthenscanthenetworkforanyothermachinethathasaspecifc securityfaw, and
then replicate itself to the new machine.
• With regards to email viruses, these use email messages, and usually will copy and automatically mail itself to
hundreds of people.
Firewalls
• Afrewall isamechanismbywhichacontrolledbarrierisusedtocontrolnetworktraffc intoandoutofan
organisational intranet.
• Firewallsarebasicallyapplicationspecifcrouters.Theyrunondedicatedembeddedsystemssuchasaninternet
appliance or they can be software programs running on a general server platform.
• In most cases these systems will have two network interfaces, one for the external network such as the internet
andonefortheinternalintranetside.Thefrewall processcantightlycontrolwhatisallowedtotraversefrom
one side to the other.
• Firewalls can range from being fairly simple to very complex. As with most aspects of security, deciding what
typeoffrewall tousewilldependuponfactorssuchastraffc levels,servicesneedingprotectionandthe
complexityofrulesrequired.Thegreaterthenumberofservicesthatmustbeabletotraversethefrewall the
more complex the requirement becomes.
• Thediffcultyforfrewallsisdistinguishingbetweenlegitimateandillegitimatetraffc.Evenprivatenetworksare
insecure due to the increased attacks and threats to the networks such as worms, viruses and clever hackers.
• Securing all equipment, including physical infrastructure equipment such as UPS systems etc, is essential for
a smooth and consistent access to services.
The following list is a set of options that could be used in network security:
• Firewalls at all public-private network transit points
• Versioncontrolledandcentrallydeployedfrewallrulesets
• Externalresourcesplacedindualfrewall,dmzprotectednetworks
• All network hosts lock down unneeded network ports and turn off unneeded services
• All network hosts include centrally managed anti-virus software and utilise central security updates
• Secure central authentication such as radius, windows/kerberos/active directory
124/JNU OLE
• Centrally managed user management with password policy (must change every three months and must be a
‘secure password’)
• Proactive network scanning for new hosts, out of date systems
• Network monitoring for suspicious behaviour
• Incident response mechanisms (policies, manual, automated and so on).
125/JNU OLE
Fundamentals of Information Technology
Summary
• The use of internet began in 1969 at the U.S. Department of Defence’s Advanced Research Project Agency
(ARPA) to provide immediate communication within the department in case of war.
• The key components of internet architecture are the protocol, IP address, domain name service, packet switching,
internet routers, and backbone.
• SecuringthemodernbusinessnetworkandITinfrastructuredemandsanend-to-endapproachforfrmsingraspof
possible security threats and should be associated with protective measures. Threats can come from both internal
and external sources. They may be human based, automated or even non intentional natural phenomenon.
• A computer virus is a self-replicating computer program that behaves like a biological virus. There are different
types of viruses like Trojan horses, worms, and email viruses.
• Securingallequipment,includingphysicalinfrastructureequipmentisessential.Antivirussoftware,frewalls,
etc. can be used as measures for secure network usage.
• Internet has enhanced and eased access to remote information and communication, with some of its services
like the World Wide Web.
References
• Oppliger, R., 2001. Internet and Intranet security, 2nd ed. Artech House.
• Kizza, M. J., 2005. Computer Network Security, Springer.
• Dr.JamesH.Yu&Mr.TomK.Le, Internet and Network Security [Pdf] Available at: <http://www.nait.org/jit/
Articles/yu101800.pdf> [Accessed 28 May 2013].
• Network Security: History, Importance, and Future [Pdf] Available at: <http://web.mit.edu/~bdaya/www/
Network%20Security.pdf> [Accessed 28 May 2013].
• Prof. Ghosh, S., Lecture - 38 Security [Video online] Available at: <http://www.youtube.com/
watch?v=3JblSrRT8XE> [Accessed 28 May 2013].
• Prof. Sengupta, I., 2008. Lecture - 31 Intranet, Extranet, Firewall [Video online] Available at: <http://www.
youtube.com/watch?v=vS0khTah3zU> [Accessed 28 May 2013].
Recommended Reading
• McNab, C., 2009. Network Security Assessment: Know Your Network, 2nd ed. O'Reilly Media, Inc.
• Joshi, J., 2008. Network Security: Know It All: Know It All, Morgan Kaufmann.
• Maximum Security, 4th ed. Sams Publishing
126/JNU OLE
Self Assessment
1. Since all smaller networks are linked together into one giant network called the internet, it is also known as
____________.
a. internet networks
b. network of networks
c. large network
d. linked network
3. Two networks which may be very different in internal hardware, software, and technical design are connected
with the help of?
a. TCP/IP protocol
b. Cables
c. Connectors
d. Communicators
5. The key idea of packet switching is the division of each communication into individual ____________.
a. large packets
b. small packets
c. equal-sized packets
d. uneven packets
7. Router uses ____________ to send the packet across the internet to the destination computer.
a. route switching
b. routing message
c. packet switching
d. routing algorithm
127/JNU OLE
Fundamentals of Information Technology
8. The____________hasmultiplefbreopticcables.
a. trunk line
b. hardware
c. connectors
d. switches
10. Firewallsarebasicallyapplicationspecifc____________.
a. systems
b. hurdles
c. routers
d. protocols
128/JNU OLE
Application I
Computers in Airline Reservations
A computer reservation system or CRS is a computerised system that is used for reservation purpose in airlines,
railways and buses. This computerised system is used to store and retrieve information; and conduct transactions
related to the transport. This was originally designed and operated by airlines.
Thus, computer technology has made the airline reservation system quite effective and less time consuming. It is
observed that reservation system in airlines is almost error free and provide various facilities.
The computerised reservation system has made the reservation procedure of airlines easier and less time-consuming.
The airlines are able to meet their ticket sales target and maintain their tickets selling ratio. It also reduces confusion
from the point of view of customers. Thus, computer technology has transformed the reservation system in the airline
industry and relieved the customers from a tedious and prolonged reservation procedure.
Questions
1. How is the computer technology useful in the airline reservation?
Answer
The computerised reservation system or CRS is used in the airline reservation. This form of computer technology
is used to store and retrieve information; and conduct transactions related to the transport.
2. What are the advantages of computerised reservation system for the airline industry?
Answer
The advantages of the computerised reservation system for the airline industry are as follows:
• The computerised reservation system has made the airline reservation system quit effective and less time-
consuming.
• It is observed that reservation system in airlines is almost error free and provide various facilities.
• Due to CSR, the airlines are able to meet their ticket sales target and maintain their tickets selling ratio.
• It has also reduced confusion from the point of view of customers and have made travelling a lot more
easier.
129/JNU OLE
Fundamentals of Information Technology
4. Howisthecomputerisedreservationsystembenefcialfromthepointofviewofcustomers?
Answer
The computerised reservation system has made the reservation procedure of airlines easier and less time-
consuming. It has reduced the confusion from the point of view of customers. Thus, it has relieved the customers
from a tedious and prolonged reservation procedure. It has eased the payment procedure and has made travelling
a simple procedure.
130/JNU OLE
Application II
Computers in Education and Training
Computers have transformed the traditional form of teaching and training. The advent of computers has made
a remarkable change in children’s life. It has enhanced their knowledge and has given a wider scope to search
information they need.
Computersserveasatoolineducationandtrainingfeld. Itcanbeusedasdifferenttypeoftoolfordifferent
purposes:
Communications Tool
• e-mail
• cell phones
Publishing Tool
• presentation software
• drawing software
• internet publication
• reports
Research Tool
• internet access
• library card catalogue
• periodical listing
• reference software
Teaching Tool
• drill and practice
• interactive instruction
• modelling
• programming
• tutorials
131/JNU OLE
Fundamentals of Information Technology
Thus,computershavemadearemarkablechangeineducationfeld byimplementinggoodeducationalsoftwares.
This makes teaching easier for the teachers and facilitates quick learning for children.
Questions
1. Explain the role of computers as a teaching tool?
2. How has the training and education transformed after the introduction of computers?
3. What are the advantages of computers in educating school children?
4. How can good educational software reduce the work of teachers?
132/JNU OLE
Application III
Computers in Banking
Today’s computer technology has transformed the traditional banking system with the online banking concept. The
online banking is one of the forms that have helped the banks and the customers in various ways. The online banking
is less time –consuming, and has reduced the work of the people. Thus, it has reduced the work of the banks and
made the transaction of money easier.
The computer technology has helped banking sector to set up different types of banking facilities like:
• PC banking
• home banking
• electronic banking
• internet banking.
Advantages
The advantages of online banking are as follows:
• Convenience: Online banking facilities are available 24 hours, seven days a week, unlike the normal banks. Thus,
online banking is quite convenient. It can be accessed even if a customer is in other country or other state.
• Transaction speed: Online banking sites execute the transactions quicker than the ATM processing.
• Effciency: Onlinebankingissecuredandonecaneasilyaccessandmanagethebankaccounts,whichinclude
IRA’s, CD’s and so on.
• Effectiveness: Most of the online banking sites offer different tools like account aggregation, stock quotes,
ratealertsandportfoliomanagingprograms,transfersandsoonthatarebenefcial inmanagingallassets
effectively.
Disadvantages
There are also some disadvantages of online banking. These are as follows:
• Longer Start-up phase: In order to register with the online banking, the bank should provide ID and this may
taketime. Thebanksitesmaytakelongertimewhiletryingtoregisterforthefrsttime.
• Learning curve: Banking sites may be confusing to some people and they may end up processing incorrect
transactions.
• Bank site changes: Most of the banks may incorporate changes in the bank sites or upgrade the sites and this
may create problems for the customers.
• LackofTrust:Mostofthepeoplefnd itdiffcult totrustthebanksites.Oldpeoplemayfnd itdiffcult totrust
the security of the transactions online and prefer the banking transaction to be carried out personally. Also,
people fear the incidents of online account hacking.
133/JNU OLE
Fundamentals of Information Technology
Questions
1. How has computer technology transformed the traditional banking concept?
2. What are the advantages and disadvantages of online banking?
3. Which are the different ways in which computer technology is used in banking sector?
4. How is online banking convenient than the traditional form of banking?
134/JNU OLE
Bibliography
References
• 2 Data Processing Concept [Pdf] Available at: <http://download.nos.org/srsec330/330L2.pdf> [Accessed 24
May 2013].
• 2011. Binary Numbers: Tutorial,[Video online] Available at: <http://www.youtube.com/watch?v=biqp0HjJmfk>
[Accessed 19 June 2013].
• 2011. Binary, Hexadecimal, Octal conversion , [Video online] Available at: <http://www.youtube.com/
watch?v=2UwxdCLFW70> [Accessed 19 June 2013].
• 2012. An Introduction to Logic Gates , [Video online] Available at: <http://www.youtube.com/
watch?v=95kv5BF2Z9E> [Accessed 29 May 2013].
• 2012. Logical Gates, Part 1, [Video online] Available at: <http://www.youtube.com/watch?v=6s0AR3_-
i0k>[Accessed 29 May 2013].
• An Introduction to Data Visualization & Processing - Uttam Grandhi[Video online] Available at: <http://www.
youtube.com/watch?v=EC-8VxXJER4> [Accessed 24 May 2013].
• Balabanian, N. & Carlson, B., 2007. Digital Logic Design Principles, John Wiley & Sons.
• BASIC CONCEPTS IN COMPUTER HARDWARE AND BASIC CONCEPTS IN COMPUTER HARDWARE
AND SOFTWARE [Pdf] Available at: <http://wikieducator.org/images/1/11/Basic_Concepts_in_Computer_
Hardware_and_Software.pdf> [Accessed 28 May 2013].
• Bhatt, C. P., 2003. An Introduction to Operating Systems: Concepts and Practice , 3rd ed. PHI Learning Pvt.
Ltd.
• Bhor, H., Rote, U. & Shinde, U., Operating System [Pdf] Available at: <http://mu.ac.in/myweb_test/MCA%20
study%20material/OS%20-%20PDF.pdf> [Accessed 22 May 2013].
• Bose, K. S., 1996. Hardware And Software Of Personal Computers, New Age International.
• Computer Fundamentals and Troubleshooting , [Pdf] Available at: <http://infosecawareness.in/downloads/
handbooks/computer-fundamentals-and-troubleshooting.pdf> [Accessed 28 May 2013].
• Computer networks, data communication and Internet [Pdf] Available at: <http://www.vub.ac.be/BIBLIO/
nieuwenhuysen/courses/chapters/network.pdf> [Accessed 28 May 2013].
• Das, S., 2010. A Complete Guide to Computer Fundamentals, Laxmi Publications, Ltd.
• DISK OPERATING SYSTEM (DOS) [Pdf] Available at: <http://computerbabu.webs.com/-%20New%20Folder/
DISK%20OPERATING%20SYSTEM%20(DOS).pdf>[Accessed22May2013].
• Dr. Garg, N., 2008. Lecture - 1 Introduction to Data Structures and Algorithms [Video online] Available at:
<http://www.youtube.com/watch?v=zWg7U0OEAoE> [Accessed 24 May 2013].
• Dr.JamesH.Yu&Mr.TomK.Le, Internet and Network Security [Pdf] Available at: <http://www.nait.org/jit/
Articles/yu101800.pdf> [Accessed 28 May 2013].
• Gookin, G., 2011. PCs For Dummies, John Wiley & Sons.
• Hoang, D. B. & Pye, K. J.,Computer Communication Networks - Lecture Notes[Pdf] Available at: <ftp://cs.istu.
ru/public/docs/other/_New/Sciense/books.pdox.net/Lecture@2520Notes/Computer%20Communication%20
Networks%20-%20Latrobe.pdf> [Accessed 28 May 2013].
• Information Processing 10, 20, 30 Curriculum Guidelines[Pdf] Available at: <http://www.edcentre.ca/resources/
info10/currmain.pdf> [Accessed 28 May 2013].
• Intro to Computer Hardware Chapter 1.wmv [Video online] Available at: <http://www.youtube.com/
watch?v=ZOKsmiLcSlo> [Accessed 28 May 2013].
• Introduction To Computers: Hardware and Software [Pdf] Available at: <http://pages.cpsc.ucalgary.
ca/~tamj/2005/231W/notes/acrobat/computers_economy.pdf> [Accessed 28 May 2013].
• Janossy, J., Computer components [ Video online] Available at: <http://www.youtube.com/watch?v=kZH3H7XIUuc>
[Accessed 28 May 2013].
135/JNU OLE
Fundamentals of Information Technology
• Kesidis, G., 2007. An Introduction to Communication Network Analysis, John Wiley & Sons.
• Kifer, M. & Smolka, S., 2007. Introduction to Operating System Design and Implementation: The OSP 2
Approach, Springer.
• Kizza, M. J., 2005. Computer Network Security, Springer.
• Kumar, V. & Kumar, D., LESSON 1 INTRODUCTION TO DATA PROCESSING [Pdf] Available at: <http://
www.ddegjust.ac.in/studymaterial/pgdca/ms-09.pdf> [Accessed 24 May 2013].
• Learn Introduction to O S from the Fundamentals of Operating Systems [Video online] Available at: <http://
www.youtube.com/watch?v=cP-OPjwag4E> [Accessed 22 May 2013].
• Lecture - 3 Introduction To System : Hardware [Video online] Available at: <http://www.youtube.com/
watch?v=FOyuMclwymw> [Accessed 28 May 2013]
• Logic gates [Pdf] Available at: <http://education.cambridge.org/media/577240/cambridge_igcse_computer_
studies__revision_guide___cambridge_education___cambridge_university_press_samples.pdf> [Accessed
29 May 2013].
• Logic Gates [Pdf] Available at: <http://ptgmedia.pearsoncmg.com/images/chap3_0130619701/elementLinks/
chap3_0130619701.pdf> [Accessed 29 May 2013].
• Meena, K., 2009. Principles of Digital Electronics, PHI Learning Pvt. Ltd.
• Micallef, A. B., 1971. An introduction to data processing, Cummings Pub. Co.
• Murphy, M., 2011. Introduction to Operating Systems [Video online] Available at: <http://www.youtube.com/
watch?v=MzVGL44eq9w> [Accessed 22 May 2013].
• Network Security: History, Importance, and Future [Pdf] Available at: <http://web.mit.edu/~bdaya/www/
Network%20Security.pdf> [Accessed 28 May 2013].
• Number Systems and Codes [Pdf] Available at: <http://www.inf.fu-berlin.de/lehre/WS00/19504-V/Chapter1.
pdf> [Accessed 19 June 2013]
• Number Systems, Base Conversions, and Computer Data Representation[Pdf] Available at: <http://www.eecs.
wsu.edu/~ee314/handouts/numsys.pdf> [Accessed 19 June 2013]
• Oppliger, R., 2001. Internet and Intranet security, 2nd ed. Artech House.
• Prof. Ghosh, S., Lecture - 38 Security [Video online] Available at: <http://www.youtube.com/
watch?v=3JblSrRT8XE> [Accessed 28 May 2013].
• Prof. Ghosh, S., L ecture -1 Emergence of Networks & Reference Models [Video online] Available at: <http://
www.youtube.com/watch?v=3DZLItfbqtQ&list=PLD6F332057F76C54C> [Accessed 28 May 2013].
• Prof. Kumar, A., 208. Lecture -1 Introduction to Computer Architecture [Video online] Available at: <http://
www.youtube.com/watch?v=4TzMyXmzL8M> [Accessed 28 May 2013].
• Prof. Sengupta, I., 2008. Lecture - 31 Intranet, Extranet, Firewall [Video online] Available at: <http://www.
youtube.com/watch?v=vS0khTah3zU> [Accessed 28 May 2013].
• Protocols and Computer Networks part 1 [Video online] Available at: <http://www.youtube.com/
watch?v=Q3SsVO0eSOU> [Accessed 28 May 2013]
• Rafquzzaman, M.,2005. Fundamentals of Digital Logic and Microcomputer Design , 5th ed., John Wiley &
Sons.
• Shelly, B. G. & Vermaat, E. M., 2009. Discovering Computers: Living in a Digital World : Fundamentals, 6th
ed. Cengage Learning.
• Shim, K. J., 2002.Information Systems and Technology for the Noninformation Systems Executive: An Integrated
Resource Management Guide for the 21st Century, CRC Press.
• Stallings, W., 2007. Data And Computer Communications, 8/E, 8th ed. Pearson Education India.
• Thierauf, J. B. & Niehaus, F. J., 1980. An introduction to data processing for business, Wiley.
136/JNU OLE
Recommended Reading
• Bagad, V.S. & Dhotre, I. A., 2009. Computer Communication Networks, Technical Publications.
• Bhatt, 2007. Introduction To Operating Systems: Concepts And Practice An 2Nd Ed. , 2nd ed. PHI Learning
Pvt. Ltd.
• Carver, K. D., 1974. Introduction to data processing, John Wiley & Sons Australia, Limited.
• Godse, A. P. & Godse, D. A., 2009. Digital Electronics and Logic Design, Technical Publications.
• Godse, A.P. & Godse, D.A., 2005. Digital Systems, Technical Publications.
• Godse, A.P. & Godse, D.A., 2008. Digital Logic and Design and Application, Technical Publications.
• Harris, L. M., 1986. Introduction to data processing: mainframes, minis, and microcomputers, 3rd ed. Wiley.
• Jaeger, T., 2008. Operating Systems Security, Morgan & Claypool Publishers.
• Johnson, P., 2004. Introduction To Operating Systems, iUniverse.
• Joshi, J., 2008. Network Security: Know It All: Know It All, Morgan Kaufmann.
• Kasera, S. & Narang, N., 2005. Communication Networks: Principles and Practice, T ata McGraw-Hill
Education.
• Maximum Security, 4th ed. Sams Publishing.
• McNab, C., 2009. Network Security Assessment: Know Your Network, 2nd ed. O’Reilly Media, Inc.
• Mir, F. N., 2006. Computer and Communication Networks, Pearson Education
• P. Norton, 2002. Introduction To Computers (Sie), Tata McGraw-Hill Education.
• Preez, D. A., Dyk, V. V. & Cook, A., 2008. FCS Computer Hardware & Software L3, Pearson South Africa
• Robichaud, B., Muscat, J. E. & Hall, A., 1977.Introduction to Data Processing, 2nd ed. Greg Division, McGraw-
Hill.
• Saha, A. & Manna, N., 2009. Digital Principles and Logic Design Engineering series , Jones & Bartlett
Learning.
• Schneidewind, F. N., 2012. Computer, Network, Software, and Hardware Engineering with Applications, John
Wiley & Sons.
• Shelly, B. G. & Vermaat, E. M., 2008. Discovering Computers 2009, Cengage Learning.
• Shelly, B. G. & Vermaat, E. M., 2011. Discovering Computers, Brief: Your Interactive Guide to the Digital
World, Cengage Learning.
• Sichel, E. D., 1997. The computer revolution: an economic perspective, Brookings Institution Press.
• Tokheim, 2004. Digital Electronics Principles and Applications, Tata McGraw-Hill Education.
137/JNU OLE
Fundamentals of Information Technology
Chapter II
1. d
2. b
3. c
4. a
5. d
6. b
7. c
8. a
9. d
10. c
Chapter III
1. b
2. a
3. c
4. d
5. b
6. c
7. d
8. a
9. c
10. b
Chapter IV
1. b
2. a
3. c
4. d
5. b
6. a
7. d
8. a
9. b
10. c
138/JNU OLE
Chapter V
1. c
2. b
3. a
4. d
5. a
6. b
7. c
8. d
9. b
10. a
Chapter VI
1. a
2. b
3. d
4. b
5. c
6. b
7. c
8. d
9. c
10. a
Chapter VII
1. c
2. b
3. a
4. d
5. a
6. b
7. c
8. d
9. b
10. a
Chapter VIII
1. b
2. c
3. a
4. d
5. c
6. b
7. d
8. a
9. b
10. c
139/JNU OLE