You are on page 1of 38

PREETI ARORA

DOEACC ‘A’ level, M.Sc–IT, M.Tech–IT


Sr. Computer Science Teacher
SULTAN CHAND & SONS (P) LTD
Educational Publishers
4859/24, Darya Ganj, New Delhi-110 002
Phones : 4354 6000 (100 Lines), 2324 3939
Fax : (011) 4354 6004, 2325 4295
E-mail : scs@sultanchandebooks.com
Buy books online at : www.sultan-chand.com

ISBN: 978-93-89174-84-7

First Edition 2019


Second Thoroughly Revised and Enriched Edition 2020

 All rights reserved.

No part of this book may be reproduced or copied in any form or by any means (graphic, electronic or mechanical, including
photocopying, recording, taping, or information retrieval system) or reproduced on any disc, tape, perforated media or any other
information storage device, etc., without the prior written permission of the publishers. Breach of this condition is liable for legal
action. Anyone who brings information regarding any such reproduction will be handsomely rewarded.

Publication of Key to this book is strictly prohibited.

Every effort has been made to avoid errors or omissions in this publication. In spite of this, some errors might have crept in. Any
mistake, error or discrepancy noted may be brought to our notice which shall be taken care of in the next edition. It is notified that
neither the publishers nor the author or seller will be responsible for any damage or loss of action to anyone, of any kind, in any
manner, therefrom.

For faulty binding, misprints or for missing pages, etc., the publishers’ liability is limited to replacement within one month of the
purchase by a similar edition. All expenses in this connection are to be borne by the purchaser.

All disputes are subject to Delhi jurisdiction only.

Printed at: Goyal Offset Works (P) Limited


PREFACE

Information and Communication Technology has permeated every walk of life


impacting technology fields such as launching satellites, managing businesses across
the globe and enabling social networking. The convergence of computer, communication
and content technologies, known as ICT, has drawn the attention of the academia,
business, government and communities to use it for innovative profitable propositions.
The syllabus of Informatics Practices has been revisited accordingly with focus on
generic concepts with domain-specific practical experiments and projects to ensure
conceptual knowledge with practical skills.
The book, Informatics Practices with Python, aims at providing an in-depth
understanding of the CBSE curriculum. It focuses on teaching Python language to help
students learn programming concepts and develop problem-solving skills and RDBMS
operations. With easy-to-understand examples, flow charts, and other such tools, the
student learns to design the logic for a program and then implement that program
using Python. In addition, the book contains ample concise and practical example
programs along with diagrams and instances from real-life situations. Each chapter
consists of tested, debugged and error-free codes with screenshots. CTM (Commit to
Memory), Learning Tip and Point to Remember for easy recall of important terms and
concepts are other notable features of the book.
Strictly adhering to the CBSE curriculum for Informatics Practices (065) for Class XI,
the book has been divided into five units:

Unit I: Introduction to Computer System (Chapter 1)


Basic computer organization: Computer system — I/O Devices, CPU, memory, hard
disk, battery, power, transition from a calculator to a computer and further to smart
devices; Troubleshooting with parts of computer and basic operations of operating
system; Basic concept of Data representation: Binary, ASCII, Unicode.

Unit II: Introduction to Python Programming (Chapters 2 to 8)


Familiarization with the basics of Python programming: a simple “hello world”
program, process of writing a program, running it, and print statements; simple data-
types; Tokens — Keywords, Operators, Conditional Statements, Looping Constructs,
Flow Charts, Strings Handling, Lists, Dictionaries and Modules.

Unit III: Data Handling (Chapter 9)


Numpy 1D array, 2D array; Arrays: slices, joins and subsets; Arithmetic operations
on 2D arrays.

Unit IV: Data Management (Chapters 10 & 11)


Relational databases: Concept of a database, relations, attributes and tuples, keys—
candidate key, primary key, alternate key, foreign key; Degree and Cardinality of a
table; Use of SQL—DDL/DML commands to CREATE TABLE, INSERT INTO, UPDATE
TABLE, DELETE FROM, ALTER TABLE, MODIFY TABLE, DROP TABLE, keys, and
Foreign keys; to view content of a table: SELECT-FROM-WHERE-ORDER BY along
with BETWEEN, IN, LIKE (Queries only on single table) and Aggregate Functions.
Unit V: Society, Law and Ethics (Chapter 12)
Cyber safety, appropriate usage of social networks and specific usage rules. Safely
accessing websites and safely communicating data.

The book also includes ample Viva Voce questions. Besides, Presentation on Python,
Chapter-wise Program Codes, Practical File, Sample Question Papers, Model Test
Papers for practice and Python Software Dump are available online and can be
accessed at sultan-chand.com/ws/ipp11.

We are sure the book will prove to be of immense benefit to the teachers and
students alike. Constructive feedback for the improvement of the book will be highly
appreciated and gratefully acknowledged.

My special thanks are due to Mrs. Rinku Kumari for her value additions to the book.

Last but not the least, I take this opportunity to thank my esteemed publishers,
Sultan Chand & Sons (P) Ltd, for their encouragement, assistance and patience
in bringing out this book.

AUTHOR

This book has been prepared strictly in accordance with the latest available syllabus for
CBSE Class XI. Any subsequent change in the syllabus will be duly taken care of and a
printed supplement incorporating all the changes will be provided to students. Also, a soft
copy of the supplement will be available at sultan-chand.com/ws/ipp11 for FREE download.
Syllabus
INFORMATICS PRACTICES
CLASS XI Code No. 065
Distribution of Marks

Unit No. Unit Name Marks Periods


Theory Theory Practicals
1. INTRODUCTION TO COMPUTER SYSTEM 5 3 2
2. INTRODUCTION TO PYTHON PROGRAMMING 30 45 35
3. DATA HANDLING 10 20 15
4. DATA MANAGEMENT 15 30 20
5. SOCIETY, LAW AND ETHICS 10 10 0
Total 70 108 72

Unit 1: INTRODUCTION TO COMPUTER SYSTEM


Basic computer organization: Computer system—I/O Devices, CPU, memory, hard disk, battery, power,

transition from a calculator to a computer and further to smart devices.

Troubleshooting with parts of computer and basic operations of operating system.
Basic concept of Data representation: Binary, ASCII, Unicode.

Unit 2: INTRODUCTION TO PYTHON PROGRAMMING


Familiarization with the basics of Python programming: a simple “hello world” program, process of

writing a program, running it, and print statements; simple data types: integer, float, string. Introduce
the notion of variable, and methods to manipulate it (concept of L-value and R-value even if not taught
explicitly). Tokens—keywords, Identifiers, Literals, Delimiters. Knowledge of data type and operators:
accepting input from the console, assignment statement, expressions, operators (assignment,
arithmetic, relational and logical) and their precedence.

Conditional statements: if, if-else, if-elif-else; simple programs: e.g., absolute value, sort 3 numbers,
divisibility.
Notion of iterative computation and control flow: for (range() , len()), while, flow charts.
Suggested programs: finding average and grade for given marks, amount calculation for given
cost-qty-discount, perimeter-wise/area-wise cost calculation, interest calculation, profit-loss, EMI, tax
calculation (example from GST/Income Tax).
List and dictionary: finding the maximum, minimum, mean; linear search on a list of numbers, and
counting the frequency of elements in a list using a dictionary.
Text handling: compare, concat, and substring operations (without using string module).
Introduction to Python modules: importing math (sqrt, ceil, floor, pow, fabs), random (random, randint,
randrange), statistics (mean, median) modules.

Unit 3: DATA HANDLING



NumPy 1D array, 2D array. Arrays: slices, joins, and subsets. Arithmetic operations on 2D arrays.

Unit 4: DATA MANAGEMENT



Relational databases: Concept of a database, relations, attributes and tuples; Keys—candidate key,
primary key, alternate key, foreign key; Degree and Cardinality of a table.

Use SQL-DDL/DML commands to CREATE TABLE, INSERT INTO, UPDATE TABLE, DELETE FROM, ALTER
TABLE, MODIFY TABLE, DROP TABLE, keys, and foreign keys; to view content of a table: SELECT-FROM-
WHERE-ORDER BY along with BETWEEN, IN, LIKE. (Queries only on single table)

Aggregate Functions: MIN, MAX, AVG, COUNT, SUM
Unit 5: SOCIETY, LAW AND ETHICS

Cyber safety: safely browsing the web, identity protection, confidentiality, social networks, netiquettes,
digital footprint, cyber trolls and bullying. Appropriate usage of social networks: spread of rumours,
and common social networking sites (Twitter, LinkedIn, and Facebook) and specific usage rules.

Safely accessing websites: adware, malware, viruses, Trojans. Safely communicating data: secure
connections, eavesdropping, and phishing and identity verification.

PRACTICAL
S. No. Description Marks
1. Problem-solving using arithmetic operations, conditional statements and 6
iterations with the help of a Python program. 60% logic + 20% documentation
+ 20% code quality (To be tested on the day of the final exam)
2. Problem-solving using NumPy 4
(To be tested on the day of the final exam)
3. SQL—5 Queries based on single table 5
(To be tested on the day of the final exam)
4. Report File 6
•  Minimum 20 Python Programs
•  Minimum 20 SQL Queries
5. Viva 4
6. Project using the concepts learnt in the course 5
Total 30

Programming in Python: (Sample problems to be solved using expressions, conditions, loops, list,
dictionary, and strings.)
• To find average and grade for given marks.
• To find amount for given cost-qty-discount.
• To calculate cost perimeter-wise/area-wise.
• To calculate interest (Simple and Compound).
• To calculate profit-loss for given Cost and Selling Price.
• To calculate EMI for Amount, Period and Interest.
• To calculate tax (examples from GST/Income Tax).
• To find the largest and smallest numbers in a list.
• To find the third largest number in a list.
• To find the sum of squares of the first 100 natural numbers.
• To find whether a string is a palindrome or not.
• To compute xn, for given two integers x and n.
• To compute the greatest common divisor and the least common multiple of two integers.
• To test if a number is equal to the sum of the cubes of its digits. Find the smallest and largest such
numbers in the range of 100 to 1000.
Data Handling: The following are some representative lab assignments:
• Import NumPy as `np` and print the version number.
• To create an array of 1D containing numeric values 0 to 9.
• To create a NumPy array with all values as True.
• To extract all odd numbers from NumPy array.
• To extract all even numbers from NumPy array.
• To copy the content of an array A to another array B, replacing all odd numbers of array A with -1
without altering the original array A.
• To replace all odd numbers in numPyarr with -1.
• To copy content of a 1D array into a 2D array with 2 rows.
• To perform basic arithmetic operations on 1D and 2D array.
Data Management: SQL Commands—At least the following SQL commands should be covered during the
labs: create, insert, delete, select.
The following are some representative assignments:
• To create a database.
• To create student table with the student id, class, section, gender, name, dob, and marks as attributes
where the student id is the primary key.
• To insert the details of at least 10 students in the above table.
• To delete the details of a particular student in the above table.
• To increase marks by 5% for those students who have Rno more than 20.
• To display the entire content of table on screen.
• To display Rno, Name and Marks of those students who are scoring marks more than 50.
• To find the average of marks from the student table.
• To find the number of students who are from section ‘A’.
• To add a new column email of appropriate data type.
• To find the minimum and maximum marks obtained by students.
• To modify email for each student.
• To display the information all the students, whose name starts with ‘AN’.
(Examples: ANAND, ANGAD,..)
• To display Rno, Name, DOB of those students who are born between ‘2005-01-01’ and ‘2005-12-31’.
• To display Rno, Name, DOB, Marks, Email of male students in ascending order of their names.
• To display Rno, Gender, Name, DOB, Marks, Email in descending order of their marks.
Project
A complete solution to a problem stating the problem, objective, source code, output. Students in groups of 2-3
are required to work collaboratively to develop a project using Programming Skills learnt during the course.
(Sample Examples can be a combination of few problems illustrated above.)
CONTENTS
1. Computer System 1.1–1.26
1.1 Introduction . . . 1.1
1.2 Basic Components of a Computer System . . . 1.2
1.2.1 Input Unit . . . 1.3
1.2.2 Central Processing Unit (CPU) . . . 1.4
1.2.3 Memory Unit (MU) . . . 1.5
1.2.4 Output Unit . . . 1.7
1.3 Secondary Memory . . . 1.8
1.4 Communication Bus . . . 1.10
1.5 Concept of Operating System . . . 1.10
1.6 Transition from Calculator to Computer to Smart Devices . . . 1.13
1.6.1 Transition from computers to smart devices . . . 1.14
1.7 Troubleshooting with Parts of a Computer . . . 1.15
1.8 Data Representation . . . 1.17
2. Getting Started with Python 2.1–2.16
2.1 Introduction . . . 2.1
2.2 Python Programming Language . . . 2.2
2.2.1 Features of Python . . . 2.2
2.3 Advantages of Python . . . 2.3
2.4 Limitations of Python . . . 2.3
2.5 Installing Python . . . 2.4
2.6 Interacting with Python (Python IDLE) . . . 2.4
2.6.1 Python Shell . . . 2.5
2.6.2 Command Line Interaction . . . 2.6
2.6.3 Python Editor Window (Working in Script Mode) . . . 2.10
2.7 Exiting Python . . . 2.12
3. Python Programming Fundamentals 3.1–3.36
3.1 Introduction . . . 3.1
3.2 Python Character Set . . . 3.1
3.3 Tokens . . . 3.2
3.4 Variables and Types . . . 3.3
3.4.1 type() . . . 3.9
3.4.2 Multiple Assignments . . . 3.12
3.4.3 Variable Names . . . 3.13
3.5 Keywords in Python . . . 3.15
3.6 Expressions . . . 3.16
3.7 Operators . . . 3.16
3.7.1 Mathematical/Arithmetic Operators . . . 3.17
3.7.2 Relational Operators . . . 3.18
3.7.3 Shorthand Augmented Assignment Operators . . . 3.20
3.8 User Input . . . 3.21
3.9 User-defined Functions . . . 3.23
3.10 Indentation in Python . . . 3.25
3.11 Rules and Conventions for Writing Python Programs . . . 3.26
3.12 Comments . . . 3.27
4. Conditional and Looping Constructs 4.1–4.40
4.1 Introduction . . . 4.1
4.2 Introduction to Planning . . . 4.2
4.2.1 Flow Charts . . . 4.2
4.3 Types of Statements in Python . . . 4.4
4.4 Program Control Flow . . . 4.5
4.5 Decision-making . . . 4.6
4.5.1 if Statement . . . 4.6
4.5.2 if-else Statement . . . 4.8
4.5.3 if-elif-else Statement . . . 4.10
4.5.4 Nested if-else Statement . . . 4.12
4.6 Iteration . . . 4.13
4.6.1 for Loop . . . 4.15
4.6.2 while Loop . . . 4.19
4.7 Nested Loops . . . 4.22
4.8 Jump Statements . . . 4.24
4.8.1 break Statement . . . 4.24
4.8.2 continue Statement . . . 4.27
4.8.3 pass Statement . . . 4.29
5. Strings in Python 5.1–5.30
5.1 Introduction . . . 5.1
5.2 What are Strings . . . 5.2
5.3 Creating Strings . . . 5.2
5.4 Traversing a String . . . 5.5
5.5 Special String Operators . . . 5.8
5.5.1 Concatenating Strings . . . 5.8
5.5.2 Replicating Strings . . . 5.9
5.5.3 Membership Operators . . . 5.10
5.5.4 Comparison Operators . . . 5.10
5.5.5 String Slicing . . . 5.11
5.6 Strings are Immutable . . . 5.14
5.7 String Methods and Built-in Functions . . . 5.14
5.8 Other Functions . . . 5.22
6. List in Python 6.1–6.54
6.1 Introduction . . . 6.1
6.2 Lists . . . 6.2
6.2.1 Declaring/Creating List . . . 6.2
6.2.2 Accessing List Elements . . . 6.5
6.2.3 Traversing a List . . . 6.7
6.2.4 Aliasing . . . 6.8
6.2.5 Comparing Lists . . . 6.9
6.3 Operations on Lists . . . 6.10
6.3.1 Concatenation . . . 6.10
6.3.2 Repetition/Replication . . . 6.12
6.3.3 Membership Testing . . . 6.13
6.3.4 Indexing . . . 6.14
6.3.5 Slicing . . . 6.15
6.4 Nested Lists . . . 6.18
6.5 Copying Lists . . . 6.18
6.6 Built-in Functions . . . 6.19
6.6.1 append() . . . 6.20
6.6.2 extend() . . . 6.22
6.6.3 insert() . . . 6.22
6.6.4 reverse() . . . 6.23
6.6.5 index() . . . 6.23
6.6.6 Updating list . . . 6.24
6.6.7 len() . . . 6.25
6.6.8 sort() . . . 6.25
6.6.9 clear() . . . 6.26
6.6.10 count() . . . 6.26
6.7 Deletion Operation . . . 6.27
6.8 Sorting . . . 6.35
6.8.1 Bubble Sort . . . 6.35
6.8.2 Insertion Sort . . . 6.39
7. Dictionary 7.1–7.18
7.1 Introduction . . . 7.1
7.2 Dictionary in Python . . . 7.2
7.3 Methods to Create a Dictionary . . . 7.3
7.4 Accessing Elements in a Dictionary . . . 7.4
7.5 Traversing a Dictionary . . . 7.4
7.6 Appending Values in a Dictionary . . . 7.5
7.7 Updating Elements in a Dictionary . . . 7.6
7.8 Removing an Item from Dictionary . . . 7.6
7.9 ‘in’ and ‘not in’ Membership Operator . . . 7.7
7.10 Common Dictionary Functions and Methods . . . 7.7
7.11 Count Frequency of Elements in a List using Dictionary . . . 7.10
8. Introduction to Python Modules 8.1–8.26
8.1 Introduction . . . 8.1
8.2 Module in Python . . . 8.2
8.3 Importing Python Modules . . . 8.3
8.3.1 Retrieving Objects from a Module . . . 8.5
8.4 Module Aliasing . . . 8.7
8.5 Member Aliasing . . . 8.8
8.6 Locating Modules . . . 8.11
8.7 Standard Built-in-Python Modules . . . 8.11
8.7.1 Built-in-Functions . . . 8.12
9. NumPy 9.1–9.30
9.1 Introduction . . . 9.1
9.2 What is NumPy . . . 9.1
9.3 Installing NumPy . . . 9.3
9.4 Working with NumPy . . . 9.4
9.5 NumPy Arrays Vs Python Lists . . . 9.8
9.6 NumPy Data Types . . . 9.8
9.7 Methods to Create NumPy Arrays . . . 9.9
9.8 Operations on NumPy Array . . . 9.14
9.8.1 Array Slicing . . . 9.14
9.8.2 Joins in Arrays . . . 9.16
9.8.3 Array Subsets . . . 9.18
9.9 Arithmetic Operations on Arrays . . . 9.19
10. Database Concepts 10.1–10.16
10.1 Introduction . . . 10.1
10.2 Database Management System (DBMS) . . . 10.2
10.2.1 Need for DBMS . . . 10.3
10.2.2 Components of a Database System . . . 10.4
10.2.3 Advantages of a DBMS . . . 10.4
10.2.4 Data Independence . . . 10.5
10.3 DBMS Models . . . 10.5
10.3.1 Types of Data Models . . . 10.6
10.4 Relational Database . . . 10.9
10.5 Database Keys . . . 10.10
11. Structured Query Language (SQL) 11.1–11.54
11.1 Introduction . . . 11.1
11.2 Overview of SQL and MySQL . . . 11.1
11.3 Features of SQL . . . 11.2
11.4 Advantages of SQL . . . 11.2
11.5 Classification of SQL Statements . . . 11.3
11.5.1 Data Definition Language (DDL) Commands . . . 11.3
11.5.2 Data Manipulation Language (DML) Commands . . . 11.4
11.6 MySQL . . . 11.4
11.6.1 Starting MySQL Database . . . 11.5
11.7 SQL Data Types . . . 11.6
11.8 SQL Commands . . . 11.8
11.9 SQL Query Processing . . . 11.18
11.9.1 SQL SELECT Statement . . . 11.18
11.9.2 SQL Operators . . . 11.22
11.9.3 Comments in SQL . . . 11.27
11.10 SQL Aliases . . . 11.27
11.11 Putting Text in the Query Output . . . 11.29
11.12 SQL Special Operators . . . 11.29
11.12.1 Conditions Based on a Range—BETWEEN...AND . . . 11.29
11.12.2 Conditions Based on a List—IN . . . 11.30
11.12.3 Conditions Based on Pattern—LIKE . . . 11.31
11.13 Sorting in SQL—Order By . . . 11.32
11.13.1 Aggregate Functions . . . 11.33
12. Cyber Safety 12.1–12.22
12.1 Introduction . . . 12.1
12.2 Cyber Safety . . . 12.1
12.3 Safely Browsing the Web . . . 12.2
12.4 Identity Protection while Using Internet . . . 12.3
12.4.1 Ways of Tracking your Identity . . . 12.4
12.5 Confidentiality of Information . . . 12.6
12.6 Cybercrime . . . 12.6
12.6.1 Cyber Trolls . . . 12.7
12.6.2 Cyber Bullying . . . 12.7
12.6.3 Cyber Stalking . . . 12.7
12.6.4 Spreading Rumours Online . . . 12.8
12.6.5 Reporting Cybercrime . . . 12.8
12.6.6 Combating and Preventing Cybercrime . . . 12.8
12.7 Cyber Forensics . . . 12.9
12.8 IT ACT, 2000 . . . 12.9
12.9 Appropriate Usage of Social Media . . . 12.9
12.10 Network Security Threats . . . 12.11
12.10.1 Denial of Service (DoS) Attacks . . . 12.11
12.10.2 Malware . . . 12.11
12.10.3 Viruses . . . 12.12
12.10.4 Worms . . . 12.12
12.10.5 Trojans . . . 12.12
12.10.6 Zombie Computers and Botnets . . . 12.12
12.10.7 Spyware . . . 12.13
12.10.8 Phishing and Pharming . . . 12.13
12.10.9 Adware . . . 12.13
12.10.10 Eavesdropping . . . 12.14
12.10.11 Child Pornography . . . 12.14
12.11 Communicating Data Safely—Secure Connection . . . 12.15
12.12 Identity Verification . . . 12.17
12.13 Cyber Safety in a Nutshell . . . 12.17
VIVA VOCE V.1–V.4
To My Parents

Shri Gulshan Kumar Arora


and

Smt. Kamlesh Arora


1 Computer System

1.1 INTRODUCTION
Today’s world is an information-rich world and it has become a necessity for everyone to
know about computers and the latest technology. Nowadays, everything around us involves
technology, primarily computers, whether it is withdrawal of money from the ATMs, online
shopping, e-learning, ticket reservation for railways and airlines, payment of telephone or
electricity bills, diagnosis of diseases or searching for information on the internet. Even a
student’s life revolves around smartphones, whether it is email, web surfing, downloading or
uploading information, connecting to social networking sites, clicking photos, and so on. In
short, computer has made a great impact on us and has become an integral part of our lives.
The computer’s capability to process, store and retrieve data and information has made it
an integral part of all kinds of environment—home, office or business. Widespread use of
the computer has made it imperative for us to have knowledge about it, its advantages and
disadvantages, and its internal structure.
So, technically, a computer is defined as an electronic device that takes inputs from the user
in the form of data and instructions, processes this data and produces result (output) as
information.

Commit To Memory (CTM): A computer is an electronic device that accepts a set of instructions in the
form of a program, executes it and displays the output to the user.

Thus, working of a computer can be expressed as an equation as under:

Data Processing Information

S S Roll_no Marks
106 85 106 85
125 70 125 70
169 97 169 97
Fig. 1.1: Data, Processing and Information

Here, data is defined as raw facts or figures such as 106, “Shaurya”, “Class 11”. This data does not
have any meaning when presented as such. However, this data can be organized or processed
to transform it into useful information.
Information is defined as a collection of data which is organized in a particular manner to
generate meaningful or processed data. For example, “Shaurya is a Class 11 student with
Enrolment number 106”. This is a processed data which gives some meaningful information.
Therefore, a computer takes input in the form of data and generates output in the form of
information. This process of converting data into some meaningful information is called
Information Processing Cycle, which we will discuss now.

1.2 BASIC COMPONENTS OF A COMPUTER SYSTEM


Computer is made up of hardware and software. Computer System

Hardware is the physical components of a


computer like motherboard, memory devices, monitor,
keyboard, etc., while software is a set of programs or Hardware Software

instructions. Fig. 1.2: Components of a Computer System

Both hardware and software together make the computer system function. Let us first take a
look at the functional components of a computer.
Every task given to a computer follows an
Input Output
Data Process Information Input-> Process-> Output Cycle (IPO cycle).
It accepts certain input, processes that input
and produces the desired output. The input
Storage unit takes the input, the central processing unit
processes the data and the output unit produces
Fig. 1.3: IPO Cycle
the output. The memory unit holds the data and
instructions during the processing.
Fig. 1.4 shows the basic structure of a computer. It is also known as Von Neumann Architecture.
A computer receives data and instructions through “Input Devices” which get processed by
the Central Processing Unit (CPU) and the result is shown through “Output Devices”. The
“Main/Primary Memory” and “Secondary/Auxiliary Memory” are used to store data inside the
Informatics Practices with Python–XI

computer.
The main memory holds the input and intermediate output during the processing. Let us
discuss each unit/component in detail.
CPU (Central Processing Unit)

Control Unit (CU)

Input Arithmetic Logic Output


Unit Unit (ALU) Unit

Registers

Main/Primary Secondary
Memory Memory

Fig. 1.4: Functional Components of a Computer System


1.2
1.2.1 Input Unit
An input unit takes/accepts input and converts it into binary form so that it can be understood
by the computer. The computer input constitutes data and instructions.
The input unit comprises input devices attached to the computer. These devices accept input
from the user and convert it into a form that can be understood by the computer (i.e., binary
code/form). The term “Binary” means two states—ON/OFF or HIGH/LOW voltage—and, in
turn, two bits or symbols, 1 for ON and 0 for OFF.

CTM: An input unit fetches the input and converts it into binary form which is directly understood by
the computer.

Let us now discuss the most extensively used input devices.


1. Keyboard: The most commonly used input device
is a keyboard which directly enters data into the
computer in the form of letters, digits and commands.
A computer keyboard possesses additional keys in
contrast to a traditional typewriter, such as function
keys, alphanumeric keys, direction keys, and other keys (special and lock keys).
2. Mouse: A mouse is a pointing device with a roller at its base, used for
moving a pointer on a computer monitor. It converts the movements of
the user’s hand into a unique set of binary digits representing the position
of the mouse at a particular instant. When a user moves a mouse across a
flat surface, the pointer moves in the direction of the mouse’s movement.
3. Light Pen: A light pen is a pointing device that can be used to
select anything on the computer screen by simply pointing at
it or for drawing figures directly on the screen. It consists of
a photocell mounted on a pen-shaped tube and is capable of
sensing a position on the screen when its tip touches the screen.
Clicking is performed by pressing the pen on the screen. A light pen is mostly used by
engineers, architects or designers.
4. Optical Mark Reader (OMR): An OMR is capable of recognizing a
pre-specified type of mark made with a dark pencil or ink. Special
pre-printed forms are designed with boxes that can be marked with
a dark pencil or ink. Such a document is read by an OMR, which
transcribes the marks into electrical pulses that are transmitted to the
Computer System

computer. This technology is called Optical Mark Recognition (OMR).


It is commonly used for grading specially-designed MCQ answer sheets and in areas where
responses are one out of a small number of alternatives and the volume of data to be
processed is large.
5. Smart Card Reader: A smart card is embedded with a microprocessor
that can hold a certain amount of personal data in its memory. The
special reader machine that is used to read this microprocessor is
known as smart card reader. The card is made of plastic, generally PVC.
Smart cards are used as ATM cards, ID cards, credit and debit cards.
They are used in banking and medical sector, and in large companies
for strong security authentication. 1.3
6. Bar Code Reader: A bar code is a collection or a sequence of lines
of different heights and widths that are printed on various types
of products. The machine that reads these bar codes is called a
bar code reader. It consists of a light source, a lens and a light sensor
which translates optical impulses into electrical signals. Also, it
contains decoder circuitry which analyzes the bar code’s image data
and sends the bar code’s content to the scanner’s output port.
7. QR Code Reader: QR Code is an abbreviation for Quick Response Code. It
is a special kind of bar code that anybody can scan with a Smartphone
App that usually directs the user to a website. QR Codes have gained
popularity in commercial marketing because they are very easy to
handle. Rather than typing in an entire web address, the user merely
scans the code and is directed for processing to a website, SMS message,
email address, email message, calendar event, locations and more.
8. Biometric Sensor: It is an input device that is used to uniquely identify
a person on the basis of physical or behavioural traits. A biometric
sensor can scan human characteristics, such as eyes, fingerprints and
DNA. It is commonly used to mark attendance of employees/students
in an organization/institution. It is also popular as a security device
to provide restricted entry in secured areas.
9. Touch Screen: It is a type of display screen which allows interaction with
computer through a touch-sensitive transparent panel covering the entire
screen without any intermediate device. The touch screen uses a technology
that enables the users to touch the screen with fingers to select objects.
Touch screens are mostly found in systems where users need to choose
options from a list. This facility is usually found in public places, such
as Automated Teller Machine (ATM), shopping malls, amusement parks,
airports and in mobile devices.
Informatics Practices with Python–XI

10. Microphone: A microphone is an input device used to provide audio


data to a computer. It works with a sound card and is mainly used
for sound recording.

11. Web Camera: A webcam is a camera that is connected to a computer. It


captures still pictures as well as videos and, with the help of software, can
transmit them in real time. Unlike a digital camera and digital camcorder,
a webcam does not have any built-in storage. Instead, it always uses the
computer hard drive as its storage.

1.2.2 Central Processing Unit (CPU)


The CPU is the control centre/brain of a computer. It guides, directs, controls and governs all
the processing that takes place inside the computer. The CPU consists of two components—ALU
and CU—that perform specific operations.
A. Arithmetic Logic Unit (ALU): All calculations and comparisons are made in this unit. The
ALU performs the arithmetic (+, –, *, /) and logical (>, <, >=, <=, <>) operations, sent from
1.4 the memory, performs specific operations (addition, subtraction, etc.) and the result is
returned to the memory. The result of the logical operations is either true or false and
helps the computer in decision-making.
B. Control Unit (CU): The CU controls the flow of data from
input devices to memory and from memory to output Learning Tip: Control Unit (CU)
devices. It controls and guides the interpretation, controls all the functions like
input, output, storage and process.
flow and manipulation of all data and information. It
It instructs ALU which operation
does not actually process the data; instead, it sends is to be carried out.
control signals to ALU and memory for carrying out the
required operations.
C. Registers: These are high-speed temporary storage areas found in the CPU. Registers
work as per the instructions given by the control unit (CU), storing instructions and
data immediately required for performing an operation. The CPU places the highest
priority jobs/data inside registers for faster execution/processing. Registers can be of
different sizes (16 bits, 32 bits, 64 bits, and so on) and each register inside the CPU has
a specific function like storing data, storing an instruction, storing address of a location
in memory, etc.

1.2.3 Memory Unit (MU)


Memory unit (Primary/Main Memory) is used as a storage unit for program as well as data. It
is the computer memory that is accessed directly by the CPU.
The memory can be both primary and secondary, depending upon its location in the computer
system. The primary memory, also termed as main memory, is directly accessible to the CPU since
all the work is done in the RAM (primary memory) and later on gets stored on the secondary
storage (hard disk). Hence, there is an indirect contact between the CPU and hard disk. On
the contrary, the secondary memory, also known as auxiliary memory, or auxiliary storage,
includes magnetic storage devices such as hard disk drives, magnetic drums, etc. The secondary
storage can be accessed by the CPU through input-output controllers or units. The memory of
the computer is like a predefined working space where it temporarily keeps information and
data to facilitate its working. When the task is executed or finished, it clears the memory and
this memory space is available for the next task to be executed or performed. Main memory,
i.e., RAM (Random Access Memory), which is the primary memory of a computer system, is
composed of cells. A memory cell is a device that stores a single symbol selected from a set
of symbols.
As shown in Fig. 1.5, each of these cells 0 1 1 0 1 1 0 0
is further broken down into smaller
Computer System

cell 0
cell 1
components known as bits. A bit stands Bit
cell 2
for binary digit, i.e., either 0 or 1, which is 1 Byte :
an elementary unit of computer memory. :
cell n
Combinations of these bits together are
used to store data and instructions. Fig. 1.5: Memory Cells
Eight bits together form 1 byte.
The memory can be both primary and secondary depending upon its location in the computer
system. The main or primary memory stores information (data and instructions).

1.5
The memory unit or main memory is divided into:
(a) Random Access Memory (RAM)
(b) Read-Only Memory (ROM)

 RAM (Random Access Memory)


It is a read/write memory as it is possible to
Learning Tip: Memory Access Time is
both read from and write to location within the amount of time taken to retrieve
the RAM. It is used for primary storage in data required from memory, from the
computers to hold active information of start of access until the data becomes
data and instructions. The RAM is a volatile available.
memory as it loses its contents when the
power is switched off or interrupted.
The RAM chips in a computer can be categorized
into two types:
• DRAM (Dynamic RAM)
Fig. 1.6: RAM (Random Access Memory)
• SRAM (Static RAM)
 ROM (Read-Only Memory)
It is a read-only memory, i.e., the data and instructions
are placed in the ROM at the time of its manufacturing
and can’t be changed thereafter.
ROM is slower than RAM and is used to hold certain
essential instructions to check basic hardware
components such as booting, procedures to load Fig. 1.7: ROM (Read-Only Memory)
operating system and frequently-needed functions.
 Cache Memory
Cache memory is a small memory that operates
much faster than the primary memory or RAM
Informatics Practices with Python–XI

RAM. When the CPU requires certain data


present in RAM, it first sends the request CACHE
CPU
to the cache [Fig. 1.8 (a)], which stores
Fig. 1.8(a): Cache Memory
recently-used values. Since cache memory is
placed between CPU and main memory, it quickly makes this data available to the CPU
instead of sending it to main memory, thus reducing access time significantly, thereby
improving the overall performance of the computer.
Cache memory is also called CPU memory and a computer microprocessor can access
it more quickly than it can access regular RAM [Fig. 1.8(b)]. This memory is typically
integrated directly with the CPU chip or placed on a separate chip that has a separate
bus interconnect with the CPU.

Cache
Memory RAM Hard disk

CPU

Fig. 1.8(b): Placement of Cache Memory inside CPU


1.6
CTM: Cache Memory, also called CPU memory, is a high-speed memory available inside the CPU in order
to speed up access to data and instructions stored in RAM.

• Units of Memory
The elementary unit of memory is a bit. A bit stands for binary digit, i.e., either 0 or
1, which is an elementary unit of computer memory. Combinations of these bits
together are used to store data and instructions. Eight bits together form 1 byte and
a group of four bits is called a Nibble.
Table 1.1 shows the computer memory units used till date.

Table 1.1: Computer Memory Units


S. No. Unit Description
1. Binary Digit 1 Bit
2. Byte 1 Byte = 8 Bits
3. Kilo Byte (KB) 1 KB = 1024 Bytes
4. Mega Byte (MB) 1 MB = 1024 KB
5. Giga Byte (GB) 1 GB = 1024 MB
6. Tera Byte (TB) 1 TB = 1024 GB
7. Peta Byte (PB) 1 PB = 1024 TB
8. Exa Byte (EB) 1 EB = 1024 PB
9. Zetta Byte (ZB) 1 ZB = 1024 EB
10. Yotta Byte (YB) 1 YB = 1024 ZB
11. Bronto Byte (Brontobyte) 1 Bronto Byte = 1024 YB
12. Geop Byte (Geopbyte) 1 Geop Byte = 1024 Brontobytes

1.2.4 Output Unit


Output unit is formed by the output devices attached to a computer. Output devices produce
the output generated by the CPU in human readable form. These devices can also be used to
store the results for future use.
The commonly used output devices are explained as under:
 Visual Display Unit (VDU)/Monitor: The monitor, popularly
known as screen, is the most common device for displaying
the output of the computer-processed information. It displays
information in the same way as it is seen on a television
Computer System

screen. The monitor is also called Visual Display Terminal


(VDT) or Visual Display Unit (VDU). Its display may be CRT
(Cathode Ray Tube), LCD (Liquid Crystal Display), Plasma or
touch-sensitive.

CTM: A monitor is termed as an Input as well as an Output device.

 LCD Screen (Television): A Liquid Crystal Display (LCD) is


smaller and lighter in weight as compared to a CRT monitor
and, hence, ideal for use in laptops, palmtops and other
portable devices.
1.7
 Printer: A printer is an output device which is used to generate hard copies (printout) of
the output generated by the computer system. The printer can generate both text and
images on paper.
Printers are classified as Impact (there is a mechanical contact between printer head and
paper) and Non-impact Printers (no mechanical contact between printer head and
paper). The various types of printers are as follows:
(i)
Dot Matrix Printer: A dot matrix printer (also known as Serial
printer) prints one character at a time. It uses dots to create
an image. This printer prints characters by striking an ink-
soaked ribbon against the paper and, hence, is termed as
Impact Printer. These printers have low operating costs and
can be used to generate carbon copies also.
(ii)
Inkjet/DeskJet/Bubble Jet Printers: An inkjet printer is the
most common type of low-cost printer. It uses the technique
of spreading quick dry ink on paper. The ink is stored in the
form of cartridges of different colours (red, green, black and
yellow). These printers generate high-quality prints and are
ideal for small offices and homes.
(iii)
Laser Printers: These printers use laser technology to produce
printed documents. They are very fast and are used for high-quality
prints.
 Speakers: A speaker is a type of output device that generates sound as an output. For a
speaker to produce sound, a special device called sound card is required to be installed
in the computer system.
 Plotters: Plotters are output devices that are used for producing
good quality images and drawings. Unlike printers, they
support printing of large-sized papers. They are mainly used
Informatics Practices with Python–XI

in computer-aided design (CAD).

1.3 SECONDARY MEMORY


Secondary storage devices are used to store a large amount of data permanently, which is not
possible by using the primary or main memory. The amount of data a disk can hold is defined
as Disk Capacity, which is measured in terms of bytes, kilobytes (KB), megabytes (MB), and so
on. Some of the common secondary storage devices are as follows:
(a) Hard Disk: A hard disk is a non-volatile, high capacity storage device ranging from 1GB to
several terabytes. It consists of solid rounded disks, packed on one another, made up of a
magnetic material and sealed inside a case. It does not get lost or damaged by mishandling
as it is generally fixed inside the computer.
Data is stored on the platters in tracks, sectors and cylinders to keep it organized and to
make it easier to find.

1.8
Platter Spindle
(Disk driving motor)
Actuator Track
Head
Axis Spindle Platter
Boom
Actuator Sector

Moving
direction of
arm
Cylinder

HDD Case

Read/Write
Actuator Arm Head

Fig. 1.9: Hard Disk and its Major Components


Track: Each platter is divided into concentric rings called “tracks”. There are
thousands of tracks on each platter. .

Sector: Each track is divided into sectors which are the basic units of storage. A
sector, as a rule, holds 512 bytes of data.

Cylinder: A cylinder consists of a set of tracks described by all the heads (on separate
platters) at a single seek position. Each cylinder is equidistant from the centre of
the disk.
(b) Blu-ray Disc: A Blu-ray Disc (BD) is a high-capacity optical disk medium
developed for recording, rewriting and playing back high definition video.
It can store large amounts of data and was designed to supersede the
DVD. Blu-ray discs support higher resolutions and more advanced video
and audio formats as compared to DVDs.
(c)
Compact Disk (CD): It is a thin optical disk which is commonly
used to store audio and video data. The capacity of a standard
120mm CD is 700MB. Transfer speed is mentioned as a multiple
of 150 KB/s, for example, 4X means 600 KB/s.
(d) Magnetic Tapes: In this, magnetic coatings are stored as data on a thin tape.
Earlier, this medium was used for archival purposes.
Computer System

(e)
DVD: Digital Versatile Disc or Digital Video Disc is an optical disc
storage device. It can be recorded on single side or on both sides.
Its capacity may range from 4.7 GB to 8.5 GB.
(f) USB Pen Drive: It is a small, portable memory which can be plugged into a
computer with USB Port. Its capacity is less than that of a hard disk but
much more than a floppy or a CD. Also called a pen drive, it is more reliable.
(g)
Memory Cards: These are data storage devices mainly used with
digital cameras, computers, mobile phones, music players, video
game console, etc. Memory cards offer high recording ability with
power-free storage.
1.9
1.4 COMMUNICATION BUS
A communication bus is a collection of wires that transfers data between computer components,
i.e., carry binary information to and from input/output devices and memory. It usually transmits
binary numbers, one bit per wire. The bus system in computer is made up of three types of buses:
1. Address Bus 2. Data Bus 3. Control Bus

Input and
CPU Memory
Output

Control bus

System bus
Address bus

Data bus

Fig. 1.10: Communication Bus System

 Address Bus: Address bus system is used to specify address of a data/memory


location. CPU is connected to the main memory by a set of parallel wires, which is the
address bus that carries address to Memory Address Register (MAR). The width of a
bus determines the number of memory locations that can be addressed. Address bus
consists of 16 wires, thus it consumes 16 bits, i.e., its width is 16 bits. For example,
a 64-bit address bus can transfer 264 memory locations/addresses.
 Data Bus: Data bus carries data in binary form. It is an 8-bit bus to transfer data from
one place/component to another in a computer system.
The size of data bus from memory to CPU equals the number of bits in an instruction
called CPU word length. Also, the number of parallel wires is called bus width as it
depends on the number of bits.
 Control Bus: Control bus carries instructions to carry out operations such as Read
Informatics Practices with Python–XI

from/Write to memory and also its associated input-output (I/O) operations.


Apart from the above-described important bus system, a separate type of bus called I/O (Input-
Output) bus connects the input, output and other external devices to the system.

1.5 CONCEPT OF OPERATING SYSTEM User 1 User 2 User n


An operating system is a program that acts as an interface
between the user and hardware of the computer as
shown in Fig. 1.11. The OS helps manage resources of
System Application
the computer and optimize its performance. An OS is Software Software
the first program to be executed on a computer after Software

the BIOS. OS performs all basic tasks such as identifying Operating System
basic input/output devices, accepting input from the
input devices, sending results to the output devices,
keeping track of files and directories on the disk, and
Hardware CPU RAM I/O
controlling other peripheral devices such as disk drives
and printers. Fig. 1.11: Operating System

1.10
CTM: An operating system is an integrated set of specialized programs that is used to manage the overall
operations of a computer. It acts as an interface between the user, computer hardware and software.

Every computer must have an operating system to run other programs. DOS (Disk Operating
System), UNIX, LINUX and Windows are some of the commonly used operating systems.
Need for an Operating System
Operating system is an essential component of the system software inside a computer system.
The need for an operating system is described below:
1. User Interface: Operating system provides instructions to prepare user interface, i.e., the
way to interact with the user either through GUI (Graphical User Interface) or command
prompts.
2. Program Execution: Operating system loads necessary programs into the computer memory
which are required for its proper functioning.
3. Resource Allocation: Operating system controls and allocates the system resources like
CPU time, memory (RAM), etc.
4. Manipulation of File System: Operating system manages the method/format in which
information is stored on and retrieved from the hard disk.
5. I/O Operations: Operating system handles all the input-output (I/O) operations.
6. Error Detection: Operating system performs the crucial function of error detection and
handling.
7. Operating system controls the various system hardware and software resources and allocates
them to the users or programs as per their requirement.
Operating system, therefore, performs several functions such as Process Management, Memory
Management, File Management and Device Management.

OS as a Resource Manager
Operating system is responsible for allocating resources to specific programs to complete
their task.
When a computer has multiple users, the need for managing and controlling the resources
(like memory, file, devices, etc.) is even greater. Operating system keeps track of who is using
which resource, grants resource request, and handles the same request from different users
and programs.
Computer System

Thus, operating system as a resource manager manages and protects multiple computer
resources: CPU, Processor, Internal/External memory, Tasks, Applications, Users, Communication
channels, etc.
It handles and allocates resources to multiple users or multiple programs running at the same
time and space (e.g., processor time, memory, I/O devices).
It also decides between conflicting requests for efficient and fair resource use ( for example,
maximize throughput, minimize response time). Resource management constitutes multiplexing
(sharing) resources. It is carried out in two different manners:

1.11
• Time multiplexing
• Space multiplexing

Computer System
System I/O Devices
Memory
Operating I/O Controller Printers,
System Keyboards,
Software Digital camera,
I/O Controller etc.

Programs
and Data

I/O Controller

Processor Processor
Storage
OS
Programs

Data

Fig. 1.12: OS as a Resource Manager

In time multiplexing, CPU time gets shared among different programs, or users take turns
to use it. Consider a situation where different programs give commands to print at the same
time. Time resource manager manages the task and determines who will go next and for
how long. Thus, the multiple print commands lined up on a single printer shall be carried out
one by one.
Informatics Practices with Python–XI

In space multiplexing, instead of being completed one by one, each one gets some part of the
resource. Main memory is divided amongst several running programs. OS assumes enough
memory to hold multiple programs as it is more efficient at holding several programs at once
rather than allocating all the memory to a single user.

The Program Loader


A loader is a part of an operating system, i.e., a system software program, that is responsible
for loading programs and libraries from secondary storage devices into main memory. It is one
of the essential stages in the process of starting a program as it places programs into memory
and prepares them for execution.
Loading a program involves reading the contents of the executable file containing the program
instructions into memory, and then carrying out other required preparatory tasks to prepare
the executable file for running. Once loading is complete, the operating system starts the
program by passing control to the loaded program code.

1.12
Memory
Source Object
Assembler Linker
Program Program

Object
Executable program
Code ready for
execution

Loader

Fig. 1.13: Role of Loader and Linker

1.6 TRANSITION FROM CALCULATOR TO COMPUTER TO SMART DEVICES


Electronic devices have become an integral part of our lives and people depend on them for
the purpose of collecting information and solving problems. The two most important tools in
this category that have made our lives easier are a computer and a calculator. A computer is
a desktop device which can be used for several purposes. A calculator is a small device that
can perform all the basic arithmetic tasks and operations that help people in solving complex
numbers and numericals.
Computers and calculators are similar in the sense that both are calculating devices. However,
there is a difference between a computer and a calculator. Before the advent of computers,
calculators were the tools that were used by the students to do computation while solving math
problems. Not that they are not used these days; in fact, by the time we switch on a computer,
we would complete the operation on a calculator.
However, calculators can carry out only one function at a time. Even when we have to solve a
small problem, we need to press a number of buttons to arrive at the solution. On the contrary,
a computer is capable of carrying out many operations at the same instant. Computer programs
are a series of instructions that are given to a computer to perform complex calculations without
any further assistance. So, if the right program is installed on a computer, we do not need to tell
the computer what to do next as it can perform all the steps required in getting to the answer.
It will come up with the answer at lightning speed without having to press any buttons.

Computer System

Fig. 1.14: Transition from Calculator to Computer 1.13


Thus, the subtle differences in the working of a calculator and that of a computer can be
described as follows:
1. A computer is an electronic device which is capable of receiving information and performing
a sequence of operations based on the instructions given to it to produce a result in the
form of output. A calculator is a device used for mathematical calculations and has a small
keyboard and display screen that shows the results.
2. The first computers were developed in the 1960s, whereas the first calculators were
introduced in the 17th century.
3. A computer has the capacity to perform calculations and other logical functions, whereas a
calculator only performs arithmetic and geometrical operations.
4. A computer is bigger in size and is not that easy to carry, whereas a calculator is small and
fits in the pocket.
5. A computer is costly and is priced ` 15,000 onwards whereas a calculator is much
cheaper and costs ` 200 onwards.
6. A calculator only carries out one action at a time, whereas a computer can perform several
functions at a time.
7. A computer has a large memory and stores data in several megabytes, whereas a calculator
stores only one calculation.
Thus, it can be concluded that the transition from a calculator to a computer system requires:
 Extended hardware support such as devices required for input, processing and for generation
and display of the output obtained with better screen sizes and enhanced display support.
 A high-performance CPU that can do multitasking and can handle several types of operations.
 Integrated software support which signifies the execution of different tasks through user-
friendly graphical environment and a strong operating system (OS).
 Programmability which ensures programming the computer system as a versatile machine
for handling multiple operations.
 High memory capacity and storage.
 Provision of sufficient power to run all the programs with a complete set of software, utilities
Informatics Practices with Python–XI

and hardware support.

1.6.1 Transition from Computers to Smart Devices


In recent years, we have observed major transition from computers to smart devices with
the vision to make machines smart enough to reduce human labour to almost nil; the idea of
interconnected devices where the devices are smart enough to share information with us, with
cloud-based applications and with each other (device to device).
Smart devices or “Connected devices” as they are commonly called, are designed in such a way
that they capture and utilize every bit of data which you share or use in everyday life. And these
devices will use this data to interact with you on a daily basis and complete the tasks. This new
wave of connectivity is going beyond laptops and smartphones, it is going towards connected
cars, smart homes, connected wearables, smart cities and connected health care.
These devices will bridge the gap between physical and digital world to improve the quality
and productivity of life, society and industries.
With IoT (Internet of Things) catching up smart homes is the most awaited feature, with brands
already getting into the competition with smart appliances. Wearables are another feature

1.14
trending on the internet. With the launch of Apple Watch and more devices flowing in, these
connected devices are going to keep us hooked to the interconnected world.

1.7 TROUBLESHOOTING WITH PARTS OF A COMPUTER


While working on a computer system, at times you observe some issues with its smooth functioning.
Do you know what to do if your screen goes blank? What if you cannot seem to close an application,
or cannot hear any sound from your speakers? Whenever you have a problem with your computer,
there are many basic troubleshooting techniques you can use to fix issues like this.
Most of the time, problems can be fixed using simple troubleshooting techniques, like closing
and reopening the program. It is important to try these simple solutions before resorting to
more extreme measures. If the problem still doesn’t get fixed, you can try other troubleshooting
techniques.
(I) Problem: Power button will not start computer

Solution 1: If your computer does not start, begin by ensuring that the power cord
is plugged securely into the back of the computer case and the power outlet.

Solution 2: If it is plugged into an outlet, make sure it is a working outlet. To check
your outlet, you can plug in another electrical device, such as a lamp.

Solution 3: If you are using a laptop, the battery may
not be charged. Plug the AC adapter into the wall, then
try to turn on the laptop. If it still doesn’t start up, you
may need to wait a few minutes and try again.
(II) Problem: An application is running slowly

Solution 1: Close and reopen the application.

Solution 2: Update the application. To do this, click the Help menu and look for an
option to check for Updates. If you cannot find this option, another option is to
run an online search for application updates.
(III) Problem: An application is frozen

Sometimes an application may become stuck or
frozen. When this happens, you won’t be able
to close the window or click any buttons within
the application.

Solution 1: Force quit the application. On a PC,
Computer System

you can press (and hold) Ctrl+Alt+Delete (the


Control, Alt and Delete keys) on your keyboard
to open the Task Manager.
On a Mac, press and hold Command+Option+Esc.
You can then select the unresponsive application
and click End task (or Force Quit on a Mac) to
close it.

Solution 2: Restart the computer. If you are
unable to force quit an application, restarting
your computer will close all open apps.
1.15
(IV) Problem: The computer is frozen

Sometimes your computer may become completely unresponsive or frozen. When
this happens, you won’t be able to click anywhere on the screen, open or close
applications, or access shut down options.

Solution 1 (Windows only): Restart Windows Explorer. To do this, press and hold
Ctrl+Alt+Delete on your keyboard to open the Task Manager. Next, locate and
select Windows Explorer from the Processes tab and click Restart. You may
need to click More Details at the bottom of the window to see the Processes tab.


Informatics Practices with Python–XI


Solution 2: Press and hold the Power button. The Power button is usually located on
the front or side of the computer, typically indicated by the power symbol. Press
and hold the Power button for 5 to 10 seconds to force the computer to shut down.

Solution 3: If the computer still wouldn’t shut down, you can unplug the power
cable from the electrical outlet. If you are using a laptop, you may be able to
remove the battery to force the computer to turn off.

Note: This solution should be your last resort after trying the other suggestions above.
(V) Problem: The mouse or keyboard has stopped working

Solution 1: If you are using a wired mouse or keyboard, make sure it is correctly
plugged into the computer.

Solution 2: If you are using a wireless mouse or keyboard, make sure it is turned
on and that its batteries are charged.
(VI) Problem: The sound isn’t working

Solution 1: Check the volume level. Click the audio button in the top-right or
bottom-right corner of the screen to make sure the sound is turned on and that
1.16 the volume is up.

Solution 2: Check the audio player controls. Many audio and video players will have
their own separate audio controls. Make sure the sound is turned on and that the
volume is turned up in the player.



Solution 3: Check the cables. Make sure external speakers are plugged in, turned
on and connected to the correct audio port or a USB port. If your computer has
colour-coded ports, the audio output port will usually be green.

Solution 4: Connect headphones to the computer to find out if you can hear sound
through the headphones.
(VII) Problem: The screen is blank

Solution 1: The computer may be in Sleep mode. Click the mouse or press any key
on the keyboard to wake it.

Solution 2: Make sure the monitor is plugged in and turned on.

Solution 3: Make sure the computer is plugged in and turned on.

Solution 4: If you are using a desktop, make sure the monitor cable is properly
connected to the computer tower and the monitor.
However, if the problem still persists in spite of the solutions that we have
discussed, then it may require a more advanced solution like reformatting your
hard drive or reinstalling your operating system, where it is recommended to
consult a professional.

1.8 DATA REPRESENTATION


We all know that computers work on ones and zeroes, i.e., ones and zeroes play a big role
in how computers work. In other words, data inside the computer gets stored in digital form
(0s and 1s).
Inside computers, it is the wires and circuits which carry all the information. Now, the question
arises—how do you store or represent information using electricity?
If it is a single wire, there exist two states—ON/OFF; Yes/No; True/False; 1/0.

1 0
Computer System

TRUE FALSE
YES NO
ON OFF

BIT
1.17
This ON and OFF together constitute a BIT, which is the smallest piece of information a
computer can store as shown in Fig. 1.15.
Thus, if we use more wires, we get more bits with more 0s and 1s; with more bits, we can
represent more complex information as shown in the figure below.

Fig. 1.15: Data Representation inside a Computer

The data stored in the computer may be of the following kinds:


• Numeric data (0, 1, 2, ........, 9).
• Alphabetic data (A, B, C, ........, Z).
• Alphanumeric data—combination of any of the symbols—(A, B, C, ....... Z), (0, 1, ......., 9), or
• Special characters (+, –, Blank), etc.
All these kinds of data, whether alphabets, numbers, symbols, sound data or video data, are
represented in terms of 0s and 1s in the computer. Each symbol is represented as a unique
combination of 0s and 1s digit. These digits can be represented in different types of number
systems used in digital technology. The most common formats of data representation, which
we are going to discuss in detail, are as follows:
1. Binary Data Representation
2. ASCII
3. Unicode

Binary Data Representation


Informatics Practices with Python–XI

Computers store all data as patterns of 0s and 1s. BINARY DIGIT ELECTRONIC ELECTRONIC
Information systems using 0s and 1s are collectively (BIT) CHARGE STATE
known as binary information systems.
Each 0 or 1 in a binary value is called a bit, which 1 ON
is short for binary digit. A binary digit, or bit,
is the smallest unit of data in computing. It is
represented by a 0 or a 1. Binary numbers are
made up of binary digits (bits), e.g., the binary
number 1001. 0 OFF
A collection of 8 bits is called a byte. A byte is a
very common unit of storage for electronic
memory. It is usually the smallest chunk of data that programs process, although many
languages support processing individual bits as well. Processing data smaller than a byte is
generally not as easy as processing whole bytes.

1.18
A collection of 4 bits is called a nibble.
A word is the maximum amount of data a CPU can process at once and is usually 1, 2, 4 or 8
bytes (8 to 64 bits).
Numeric data is stored using several different binary number formats, all of which use a finite
number of binary digits (bits) and, therefore, are subject to overflow and round-off. The
circuits in a computer's processor are made up of billions of transistors. A transistor is a tiny
switch that is activated by the electronic signals it receives. Digits 1 and 0 used in binary
reflect the on and off states of a transistor.
Computer programs are sets of instructions. Each instruction is translated into machine code
—simple binary codes that activate the CPU. Programmers write computer code and this is
converted by a translator into binary instructions that the processor can execute.
All software, music, documents and any other information that is processed by a computer is
also stored using binary.

Printer
Microprocessor

Inputs Outputs

Camera

Mouse Keyboard Monitor


Fig. 1.16: Binary Data Format

ASCII (American Standard Code for Information Interchange)


ASCII code is the most widely used alphanumeric code which is used in computers to
Computer System

translate text (letters, numbers and symbols) into a form that can be sent to and
understood by other computers and devices such as modems and printers. It is developed
by American National Standards Institute (ANSI). The standard ASCII character set uses
just 7 bits for each character and so it has 27 = 128 possible code groups. It represents all
of the standard keyboard characters as well as control functions such as Return & Linefeed
functions. The characters encoded are numbers 0 to 9, lowercase letters a to z, uppercase
letters A to Z, basic punctuation symbols, control codes that originated with Teletype machines,
and a space.

1.19
Table 1.2: Standard or Lower ASCII characters and codes
Char Dec Binary Char Dec Binary Char Char
! 033 00100001 A 065 01000001 a 097
" 034 00100010 B 066 01000010 b 098
# 035 00100011 C 067 01000011 c 099
$ 036 00100100 D 068 01000100 d 100
% 037 00100101 E 069 01000101 e 101
& 038 00100110 F 070 01000110 f 102
' 039 00100111 G 071 01000111 g 103
( 040 00101000 H 072 01001000 h 104
) 041 00101001 I 073 01001001 i 105
* 042 00101010 J 074 01001010 j 106
+ 043 00101011 K 075 01001011 k 107
, 044 00101100 L 076 01001100 l 108
– 045 00101101 M 077 01001101 m 109
. 046 00101110 N 078 01001110 n 110
/ 047 00101111 O 079 01001111 o 111
0 048 00110000 P 080 01010000 p 112
1 049 00110001 Q 081 01010001 q 113
2 050 00110010 R 082 01010010 r 114
3 051 00110011 S 083 01010011 s 115
4 052 00110100 T 084 01010100 t 116
5 053 00110101 U 085 01010101 u 117
6 054 00110110 V 086 01010110 v 118
7 055 00110111 W 087 01010111 w 119
8 056 00111000 X 088 01011000 x 120
9 057 00111001 Y 089 01011001 y 121
: 058 00111010 Z 090 01011010 z 122
; 059 00111011 [ 091 01011011 { 123
Informatics Practices with Python–XI

< 060 00111100 \ 092 01011100 | 124


= 061 00111101 ] 093 01011101 } 125
> 062 00111110 ^ 094 01011110 ~ 126
? 063 00111111 _ 095 01011111 _ 127
@ 064 01000000 ’ 096 01100000
UNICODE (for Multilingual Computing)
Unicode is a new universal coding standard adopted by all new platforms. It is promoted by
Unicode Consortium which is a non-profit organization. Unicode provides a unique number
for every character irrespective of the platform, program and the language. It is a character
coding system designed to support the worldwide interchange, processing and display of the
written texts of the diverse languages. A unique number for every character, no matter what
the platform, no matter what the program, no matter what the language.
Unicode is the preferred encoding scheme used by XML-based tools and applications.
Significance of UNICODE
• Unicode enables a single software product or a single website to be designed for multiple
platforms, languages and countries (no need for re-engineering) which can lead to a
1.20 significant reduction in cost over the use of legacy character sets.
• Unicode data can be used through many different systems without data corruption.
• Unicode represents a single encoding scheme for all languages and characters.
• Unicode is a common point in the conversion between other character encoding schemes.
Since it is a superset of all of the other common character encoding systems, you can convert
from one encoding scheme to Unicode, and then from Unicode to the other encoding scheme.
• Unicode is the preferred encoding scheme used by XML-based tools and applications.

MEMORY BYTES
 Data: Data is defined as raw facts, such as figures, symbols and numbers that can be used for analysis.
 Information: Information is defined as a collection of data.
 Operating System (OS): An OS acts as an intermediary (providing communication) between the user of a computer
and computer hardware.
 Hardware devices: Input device, system unit, output devices and memory devices are collectively known as
hardware devices.
 Buses: A bus can be defined as a set of wires/cables to carry binary information to or from input/output devices
and memory.
 The CPU interacts closely with primary storage or main memory, referring to it for both instructions and data.
 There are three basic components in the CPU register section—arithmetic and logic unit, memory and control unit.
 Central processing unit is the brain of any computer system.
 Control unit controls all the hardware operations, i.e., input and output units, storage and processor, etc.
 The arithmetic logic units in computers are capable of performing addition, subtraction, division and multiplication
as well as some logical operations.
 The memory of a computer can hold program instructions, data values and intermediate results of calculations.
 Memory Unit is an essential component for storing the programs and data executed by the CPU.
 The main memory of computer is also known as RAM, standing for Random Access Memory.
 External memory, which is sometimes called backing store or secondary memory, allows the permanent storage
of large quantities of data.
 Registers are small data-holding areas within CPU that hold data, instructions and memory address during processing.
 Main memory can either be ROM or RAM.
 ROM is read-only memory that stores some pre-written instructions.
 RAM is random access memory that can be read and written and is used for manipulating data during processing.
 The primary memory, RAM, is volatile in nature as all contents are erased as soon as power goes off.
 The storage unit stores the contents permanently.
Computer System

 Major storage devices are hard disks, CD, DVD, flash drive and Blu-ray Disks.
 The numbers ‘0’ and ‘1’ are called binary digits.
 Binary data representation has only two symbols—0 and 1.
 ASCII, ISCII and UNICODE are the three internal storage characters representation.
 A buffer is a data area shared by hardware devices or program processes that operate at different speeds or
with different sets of priorities.
 A memory card can store various types of data, such as text, pictures, graphics, audio and video.
 A calculator is a handheld device used to perform basic math operations, while a computer is a multipurpose
device which can also perform complex calculations. While a calculator can carry out only one operation at
a time, computers can perform multiple tasks and, with the help of a series of instructions called computer
programs, carry out the entire task without any assistance.
1.21
OBJECTIVE TYPE QUESTIONS
1. Fill in the blanks.
(a) A program which acts as an interface between the user and hardware is called ........................... .
(b) A collection of 4 bits is called a .............................. .
(c) Binary number system has digits as .............................. and .............................. .
(d) A collection of 8 bits is called a .............................. .
(e) .............................. is a pointing device.
(f) .............................. is read-only memory that stores some pre-written instructions.
(g) .............................. is a new universal coding standard adopted by all new platforms.
(h) The .............................. in computers are capable of performing arithmetic and logical operations.
(i) .............................. controls all the hardware operations of a computer system.
(j) Expanded form of ISCII .............................. .
(k) A ................... is a non-volatile high-capacity storage device ranging from 1 GB to several terabytes.
(l) .............................. memory speeds up access to data and instructions stored in RAM.
(m) QR code is the abbreviation for .............................. .
(n) A .............................. is a system software program that is responsible for loading programs and
libraries from secondary storage into main memory.
Answers: (a) Operating system (b) Nibble (c) 0, 1
(d) Byte (e) Mouse (f) ROM
(g) Unicode (h) ALU (i) Control unit
(j) Indian Standard Code for Information Interchange (k) Hard disk
(l) Cache (m) Quick Response code (n) Loader
2. State whether the following statements are True or False.
(a) Control unit sends control signals to ALU and memory for carrying out the required operations.
(b) A light pen is a pointing device that can be used to select anything on the computer screen by simply
pointing at it or for drawing figures directly on the screen.
(c) RAM operates much faster than cache memory.
(d) 1 GB = 1024 KB
(e) An operating system acts as an interface between the user, computer hardware and software.
(f) A computer has the capacity to perform calculations and other logical functions, whereas a calculator
only performs arithmetic and geometrical operations.
Informatics Practices with Python–XI

(g) A word is the maximum amount of data a CPU can process at once.
(h) An address bus carries data from one place to another in a computer system.
(i) Dot matrix printer uses laser technology to produce printed documents.
(j) The primary memory unit stores data and instructions permanently.
(k) ROM is volatile in nature.
(l) External memory allows the permanent storage of large quantities of data.
Answers: (a) True (b) True (c) False (d) False (e) True (f) True
(g) True (h) False (i) False (j) False (k) False (l) True
3. Multiple Choice Questions (MCQs):
(a) What is the full form of IPO?
(i) Input Process Output (ii) Input Print Output
(iii) Internet Print Output (iv) Internet Process Output
(b) Which is the fastest memory device?
(i) RAM (ii) Register (iii) Blu ray disc (iv) Hard Disk
(c) What is the full form of RAM?
(i) Read access memory (ii) Random access memory
(iii) Raw access memory (iv) Right access memory
(d) ROM is a
(i) volatile memory (ii) non-volatile memory
1.22 (iii) Both (a) and (b) (iv) None of these
(e) What is an information?
(i) Collection of data (ii) Collection of programs
(iii) Collection of instructions (iv) None of these
(f) Utilities is/are:
(i) Text editor (ii) Backup (iii) Disk defragmenter (iv) All of these
(g) Which of the following are sub-units that make the CPU?
(i) Control unit (ii) ALU (iii) Both (a) and (b) (iv) All of these
(h) Which of the following is/are a type of OS?
(i) Single-user OS (ii) Multi-user OS (iii) Time-sharing OS (iv) All of these
(i) What is the full form of ISCII?
(i) International Standard Code for Information Interchange
(ii) Indian Script Code for Information Interchange
(iii) International Script Code for Information Interchange
(iv) None of these
(j) 1 TB is equivalent to:
(i) 210 bytes (ii) 210 MB (iii) 210 GB (iv) 210 KB
(k) Storage of 1 KB means the following number of bytes:
(i) 1000 (ii) 964 (iii) 1024 (iv) 1064
(l) One Megabyte is equivalent to:
(i) 210 bytes (ii) 220 bytes (iii) 230 bytes (iv) None of these
Answers: (a) (i) (b) (ii) (c) (ii) (d) (ii) (e) (i) (f) (iv)
(g) (iii) (h) (iv) (i) (ii) (j) (iii) (k) (iii) (l) (iv)

SOLVED QUESTIONS
1. List the names of two components of CPU.
Ans. The names of two components of CPU are as follows:
(a) Control Unit (b) Arithmetic Logic Unit
2. What is an I-P-O cycle?
Ans. A computer takes input in the form of data and generates output in the form of information. This
process of converting data into some meaningful information is called information processing or
Input-Process-Output (I-P-O) cycle.
3. List all the functional components of a computer.
Ans. The functional components of a computer are as follows:
(a) Input Unit (b) Central Processing Unit (CPU)
(c) Output Unit (d) Memory Unit
4. Who invented the mouse?
Ans. Mouse is a pointing (input) device that was developed by Douglas Engelart in 1963.
Computer System

5. What are the two parts of main memory?


Ans. Two parts of main memory are as follows:
(a) Random Access Memory (RAM) (b) Read-Only Memory (ROM)
6. Why are the secondary storage devices required?
Ans. The secondary storage devices are required because of the following two reasons:
(a) The primary memory is finite and limited in size.
(b) In secondary storage, data and programs do not disappear when power is turned off.
7. Two devices used by the supermarket point-of-sale (POS) terminal are a bar code reader and a keyboard.
Name two other input/output devices used at the POS and give a use for each device.
Ans. (a) Monitor used to display the information about the items purchased or sold.
(b) Printer used for taking printout of the bill or invoice generated.
1.23
8. Given below are some features of two types of computer memories—RAM and ROM. List each feature
under RAM or ROM.
(a) Non-volatile memory (b) Contents can’t be changed
(c) Stores data or files the user is currently working on (d) Volatile memory
(e) Can be written to and read from
Ans. RAM: (a), (c), (e);    ROM: (b), (d).
9. What does a bus mean?
Ans. A bus is a group of conducting lines that transport data, address and control signals between CPU and
memory.
10. Why is data bus bi-directional?
Ans. Data bus is bi-directional because the same bus is used for data transmission from microprocessor to
memory location or input/output device and vice versa.
11. Six storage devices are described below. Name the storage device being described and also list the
appropriate category of storage.
(a) Optical media which uses one spiral track; red lasers are used to read and write data on the media
surface; makes use of dual-layering technology to increase storage capacity.
(b) Non-volatile memory chip: contents of the chip cannot be altered; it is often used to store the start-up
routines in a computer (e.g., the BIOS).
(c) Optical media which uses concentric tracks to store data; this allows read and write operations to be
carried out at the same time.
(d) Non-volatile memory device which uses flash memories (which consist of millions of transistors wired
in a series on a single circuit board).
(e) Optical media which uses blue laser technology to read and write data on the media surface.
(f) Magnetic disc with very large storage capacity; can be used to store vast amounts of data; mostly fixed
in computer cases and serves as the main storage device.
Ans. (a) DVD Offline Storage
(b) ROM Primary Memory
(c) DVD-ROM Offline Storage
(d) Solid State Memory/Memory Card Offline Storage
(e) Blu-ray Disc Offline Storage
(f) Hard Disk Secondary Memory
12. A company is planning to have a videoconference. In its videoconferencing area, there are some
microphones, speakers and webcams. Describe the purpose of each of the devices.
Informatics Practices with Python–XI

Ans. Microphone: This device is used to input sound or the vocal input of the people speaking.
Speakers: These are needed so as to hear the sound/audio output from the computer.
Webcam: Webcam or web camera is needed to capture the video image of an ongoing activity.
13. What is the function of memory? What are its measuring units?
Ans. Memory temporarily holds the data and information during processing. The smallest unit of memory is
a byte (8 bits). A byte can store one character in binary form. Other measuring units are kilobyte (KB)
equal to 1024 (210) bytes, 1 Megabyte (MB) equal to 1024 KB, 1 Gigabyte (GB) equal to 1024 MB and
Terabyte (TB) equal to 1024 GB.
14. A school newsletter contains text and images in it. The head teacher needs one thousand copies of this
newsletter. Give four reasons why a laser printer should be used rather than an inkjet or a dot matrix
printer.
Ans. (i) High quality printouts—better than inkjet or dot matrix
(ii) Fast printouts—faster than inkjet or dot matrix
(iii) Prints very quietly—quicker than inkjet or dot matrix
(iv) Cost per page is low—cheaper than inkjet or dot matrix
15. What is the difference between RAM and ROM?
Ans. RAM refers to random access memory where both read and write operations can take place. But RAM
is a volatile memory; its contents are lost when power is turned off. ROM refers to read-only memory
where only read or write operation can take place. ROM is a non-volatile memory. B oth RAM and ROM
1.24 are parts of the primary memory.
16. Why is computer beneficial to us?
Ans. Computers are beneficial to us in many ways like storing and retrieving large volumes of data/information
easily, efficiently and in a secured manner. Computers can perform calculations on large and complex data
sets within a fraction of a second with complete accuracy. They can be used anywhere and everywhere,
whether at home or at workplace or for scientific purposes.
17. What is the difference between an address bus and a data bus?
Ans. The difference between an address bus and a data bus is as follows:
Address bus: An address bus contains the address of the piece of memory or I/O devices to be read from
or written to. One wire is required for each bit which means 16 bits will require 16 wires. A 16-bit binary
number allows 216 or 32,000 different numbers.
Data Bus: A data bus actually carries the data to be processed in binary form. It carries the information
between the processor and various other external units, such as memory. Its typical size is 8 or 16 bits.
18. Explain the usage of the smart card reader.
Ans. We are all aware of ATM cards that are used in ATM machines. ATM cards store data through magnetic strips,
which are pasted on the back of these cards. Magnetic strips hold much more data than printed characters
or bar codes per unit of space. These strips are not human-readable and are, therefore, used to store
confidential data. Moreover, it is almost impossible to create a duplicate copy of the cards containing such
strips. Special reader machines are required to decode the encoded data stored on these magnetic strips.
The enhanced version of a card containing magnetic strips is called a smart card. A smart card is embedded
with a microprocessor that can hold a certain amount of personal data in its memory. The special reader
machine that is used to decode the data on smart cards is known as smart card reader.
19. What is the difference between data and information?
Ans. The difference between data and information is as follows:
Data is defined as raw facts and figures such as “Tejas”, “MBA”, “2013”, “ABC”. This data does not have
any meaning when presented as such. However, this data can be organized or processed to transform
it into useful information.
Information is defined as a collection of data which is organized in a particular manner to generate some
meaning. For example, “Tejas passed MBA in 2013 from ABC” is the information that we have obtained
after processing the data given above.
20. Why is primary memory termed as ‘destructive write’ memory but ‘non-destructive read’ memory? [HOTS]
Ans. When a memory location is read from the primary memory, the contents of the memory word remain the
same; they are not altered. Therefore, a primary memory is termed as ‘non-destructive read’ memory
since the read operation does not destroy the contents of a memory word.
When a write operation takes place, the previous contents of the memory word are overwritten. Thus,
the primary memory is termed as ‘destructive write’ memory as the write operation destroys the
contents of a memory word.
21. What is Unicode? How is it useful?
Ans. Unicode is a new universal coding standard adopted by all new platforms. It is promoted by Unicode
Consortium which is a non-profit organization. Unicode provides a unique number for every character
irrespective of the platform, program and language.
It is a character coding system designed to support the worldwide interchange, processing and display
Computer System

of the written texts of diverse languages. A unique number for every character, no matter what the
platform, no matter what the program, no matter what the language.

UNSOLVED QUESTIONS
1. Define a computer.
2. How does an ALU work?
3. Briefly explain the working of a control unit.
4. Define hardware and software.
5. What is an operating system?
6. What is software?
7. List some of the hardware in computer equipment.
8. Explain the types of operating systems with examples. 1.25
9. “Hardware is of no use without software and software cannot be used without hardware.” Explain.
10. How can software be classified? Name at least one software in each of the categories.
11. What is an operating system? Write names of any two popular operating systems.
12. Specify the measuring units of memory.
13. What are output devices? Give some examples.
14. List different types of impact printers.
15. Briefly explain the working of a laser printer.
16. What is the use of a light pen?
17. What do you understand by RAM and ROM?
18. Explain in brief the working of a touch screen.
19. What are plotters? List different types of plotters.
20. What are secondary storage devices? Give examples.
21. What is the major difference between optical and magnetic discs?
22. What do you mean by a communication bus? List its types.
23. List the differences between a CD and a DVD.
24. Explain the statement, “Functioning of a computer is similar to the way the human brain functions.”
25. Explain in brief the basic architecture of a computer.
26. What is an input unit? Give its significance.
27. List and briefly explain all the components of a CPU.
28. Why is a control unit referred to as the central controller of a computer?
29. Does an ALU work independently or in coordination with some other unit? Give reasons.
30. Compare data and information.
31. How does an output unit work? Give examples of some output devices.
32. What is the role of memory in the functioning of a computer?
33. List all the hardware components of a computer. Give their significance.
34. Explain various components of a computer system and show the relationship between them with the help
of a diagram.
35. Compare volatile memory and non-volatile memory.
36. Define primary storage devices. List their types.
Informatics Practices with Python–XI

37. What do you mean by a mouse? List its types.


38. What is a bar code? Why is a bar code reader used?
39. Explain in brief the inkjet and bubble jet printers.
40. What is a plotter? Give the benefits and limitations of using plotters.
41. Explain any three types of input devices.
42. Explain any three types of output devices with their purpose.
43. Define VDU. Name its types.
44. Give the difference between an impact and a non-impact printer.
45. Discuss the following devices:
(a) Light Pen (b) Graphic tablet (c) CD-ROM (d) DVD
46. What is the significance of address and data buses?
47. Describe the basic architecture and functioning of a computer.
48. Describe the terms hardware and software along with their components.
49. Explain plotters and their types.
50. Discuss the various categories of a printer.
51. What do you mean by memory devices? Explain RAM and ROM.
52. Discuss secondary storage device in detail.
53. What are memory cards? Discuss their types.
1.26

You might also like