You are on page 1of 18

Name : Ali Ejaz

Roll no : 30

Department : BS(CS)

Assingment No :03

Submitted to : Mam Maryam

Department : Depatment of IT and Computer sciences

course code:1101

Assignment no 03
Q1:Draw a block diagram showing the major
components of a computer and their
relationships.Briefly describe the function of each
component.
Ans:-

Components of computer system and its


function

The main components of the computer system and its function are Processor
Main memory Additional memory Input devices Output devices, the processor,
auxiliary memory, power supply, and auxiliary equipment. Many components are
connected to the main computer board, called the motherboard.
The power supply provides power for most components. Various input devices
(such as the keyboard) and output devices (such as a monitor) are connected
through the connectors at the back of the case.
main components of the computer system and its function
The motherboard
components of the computer system and its function
The Motherboard is the heart of the computer. It is a circuit type board. The
Peripheral devices connected to the input/output hub on the motherboard;
critical hardware such as graphics card, central unit, and random access memory,
installed on connectors on the surface of the board, located inside the casing.
Modern motherboards incorporate integrated components such as video and
audio controllers that allow the computer to render graphics, play audio and
other functions. The board has electrical circuits that provide power to any
equipment connected to the motherboard.
CPU Processors

A processor also called a microprocessor, executes programming instructions. It


consists of two critical components, a control unit and an arithmetic logic unit
(ALU).
The control unit retrieves information from a mass storage device, such as RAM,
and executes the code contained in the data. The processor uses the ALU to
perform mathematical calculations and analyze logical operations.
RAM

RAM (random access memory), also known as system memory, contains data
used by the computer. For example, when you open an application in Windows,
the program is loaded into RAM, so that the processor has quick access to the
coding instructions.
However, the data in the memory is temporary; RAM is referred to as an
“unstable” storage device because all information on the system is lost when the
computer is turned off.
Hard disk
components of the computer system and its function
The hard disk, unlike RAM, is referred to as “non-volatile” because the data
stored on the disk remains even when the computer loses power. Solid-state
drives are high-end mass storage devices that serve the same purpose as hard
drives, but instead use flash memory.
SSDs are faster and more efficient, but on the day of publication are also much
more expensive. RAM obtains data from the hard disk; The CPU retrieves data
from RAM.
Power Supply Unit
components of the computer system and its function
The power supply provides power to the computer and its devices. It connects to
the motherboard, and the electric charge is distributed to the onboard devices via
circuits or traces.
The power supply also connects directly to other hardware components, such as a
hard drive and higher-end graphics cards, because often the electric charge
provided by the motherboard is not sufficient to power these components.
Peripherals
You need a monitor and keyboard to be able to enter commands and view their
results – as well as a mouse, a small device used to point and select items on the
screen. Most computers have additional system parts, such as an optical drive
that allows you to play and record music and video.

· Q2:- What is ASCII? Why is the international computer


industry shifting from ASCII to unicode for representing
text?
Ans:-

ASCII(American stantard code for information interchange)is the most common


format for text files in computers and on the internet. In an ASCII files, each
alphabetic,numeric,or special character is represented with a 7-bit binary.number
(a string of seven 0s or 1s).128 possible characters are defined.

ASCII was developed by the American National Standards Institute(ANSI).

The international computer industry is shifting from ASCII to unicode for


representing text because the 256 unique characters aren't enought to
accommodate foeign languages like japanese, Greek and Hebrew.
Q3:-Why is information stored in some kind of binary format
in computers?

Ans:-Storing information in binary format


All information stored in a computer must somehow be encoded as a sequence of
0’s and 1’s, because all storage devices consist of a set of locations that can have
one of two possible states. One state represents 0, the other state represents 1.
For example, on a CD or DVD there are billions of locations where either small pit
has been created by a laser beam (representing a 1) or no pit exists (representing
a 0). An old magnetic tape (such as a audio cassette tape or VHS video tape)
consisted of a sequence of locations that could be magnetized with an upward or
downward polarization, representing 0 or 1.
A single storage location stores a single bit (binary digit) of information. A set of 8
bits is a byte and this is generally the smallest unit of information a computer
deals with. A byte can store \(2^8 = 256\) different patterns of 0’s and 1’s and
these different patterns might represent different things, depending on the
context.
Q4:-What are Application of networks?
Ans:-Applications of Computer Networks
A network is a collection or set of computing devices connected to one another to
establish communication and also share available resources. A network will
comprise software and hardware devices. You can have a network even if you are
not connected to the internet. Computer networks make it possible for people to
transfer files from one place to another and to communicate taking the shortest
time possible.
Computer network applications are network software applications that utilize the
Internet or other network hardware infrastructure to perform useful functions for
example file transfers within a network. They help us to transfer data from one
point to another within the network.
There are 2 types of network applications:-
Pure network applications
Standalone network application

(A) Pure Network Applications


These are applications created to be used in networks; using pure network
applications on a single computer doesn't make sense. They help us to transfer
data and communicate within a network. Such applications have a separate and
distinct user interface that users must learn for instance:
1. Email Programs
They allow users to type messages at their local nodes and then send to someone
on the network. It is a fast and easy way of transferring mail from one computer
to another. Examples of electronic mail programs (Clients) are:-
· Pegasus Mail

· Outlook express

· Eudora Windows mail

· Fox mail

· Opera

· Poco mail

· Mozilla Thunderbird

· Windows mail

2. File Transfer Protocol (FTP)


This application facilities transfer of files from one computer to another e.g. from
a client to a server. There are 2 common processes involved in FTP
Downloading: - This is the process of obtaining files from a server to a
workstation or a client (for example when you download programs and music
from a server).
Uploading:- This is obtaining of files from a workstation to a server (for instance
when you attach documents and upload them to a server, a good example being
when you upload photos to Facebook).
Examples of FTP programs are:-

· FTP in Unix

· FTP in Linux or

· FTP in Windows
3. Terminal Emulation (TELNET)
It allows a workstation to access the server for an application program. This
enables you to control the server and communicate with other servers on the
network. The workstation appears as a down terminal that is directly attached to
the server. The user feels like he/she is using the server directly. TELNET enables
PCs and workstations to function as dumb terminals in sessions with hosts on
inter-networks.

4. Groupware
These applications are used to automate the administrative functions of a modern
office for instance video conferencing and chatting. They facilitate the work of
groups and improve on their productivity; they can be used to communicate, co-
operate, coordinate, solve problems, compete, negotiate among others.

(i) Video Conferencing


This is the process of conducting a conference between two or more participants
at different sites by using computer networks to transmit audio and video data.
For example, a point-to-point (two-person) video conferencing system works
much like a video telephone.
Each participant has a video camera, microphone, and speakers mounted on his
or her computer. As the two participants speak to one another, their voices are
carried over the network and delivered to the others speakers, and whatever
images appear in front of the video camera appear in a window on the other
participant’s monitor.

(ii) Chatting
It is real-time communication between two users via computer. Once a chat has
been initiated, either user can enter text by typing on the keyboard and the
entered text will appear on the other user’s monitor. The two must be online for
a chat to be initiated. Most networks, cybers and online services offer a chat
feature which enables computer users to chat as they go on with their work.

(B) Stand Alone Applications


These are applications that run on stand-alone computers (computers not
connected to any other). In order to extend their activity, they are rebuilt to run
on network environments e.g. word processors, spreadsheets, database
management systems, presentations graphics, project management etc. They
function even when the computer is offline.

Q5:-How to enter the BIOS or CMOS setup?


Ans:-How to enter the BIOS or CMOS setup

Updated: 03/06/2020 by Computer Hope

Because of the wide variety of computer and BIOS manufacturers over the
evolution of computers, there are many ways to enter the BIOS or CMOS setup.
Below is a listing of most of these methods, as well as other recommendations for
entering the BIOS setup.
Note
Apple (Mac) utilize an EFI, which doesn't need to modify based on the hardware
in the computer, like a BIOS. The EFI provides better integration between
hardware and software for Apple computers, virtually eliminating the need for a
BIOS.
Note
This document doesn't help if you cannot enter the CMOS setup because it is
password-protected. See: How to clear an unknown BIOS or CMOS password.
New computers
Computers manufactured in the last few years allow you to enter the BIOS setup
using one of the five keys shown below during the boot process.
· F1

· F2 *

· F10 **

· Del

· Esc

Note
F1, F2, and F10 are all function keys on the top of the keyboard.
* If pressing F2 opens a diagnostics tool, your setup key is likely F10
** F10 is also used for the boot menu. If F10 opens a boot menu, your setup key
is likely F2.
Setup keys are to be pressed as the computer is booting up. Most users see a
message similar to the example below upon startup. Some older computers may
also display a flashing block to indicate when to press the F1 or F2 keys.
Press <F2> to enter BIOS setup
Tip
If you're unsure of what key to press, as the computer boots try pressing and
holding one or more keys on the keyboard to cause a stuck key error. Once you
get this error, the option to continue or enter setup should appear.
Note
If you are still unable to enter the BIOS using the methods listed above, check the
motherboard's manual for the appropriate key to enter BIOS. Documentation for
the motherboard may also be found on the manufacturer's website.
Once you have successfully entered the CMOS setup, a screen similar to the
example below appears. Your CMOS setup may look different, depending on the
manufacturer, but should still share a lot of the same options and information.
How do I change and save changes in CMOS setup?
Once in CMOS setup, the method for changing the settings often depends on the
BIOS manufacturer. You may use the arrow keys along with the Enter key to select
categories and change their values. Some manufacturers may have you press the
Page up and Page down keys to change the values.
Tip
All manufacturers show which keys navigate on the bottom or right side of the
screen.
I cannot change the values to a setting I want to use
If you're trying to change the clock, speed, or other settings and don't have the
option available, it's because the motherboard doesn't support it. If you believe it
should be supported, you may need a BIOS update.
· Help with computer BIOS updates.

Tip
If changes you made appear to revert to default settings or the date and time
setting in the BIOS keeps falling behind, you may need to replace the CMOS
battery. See: How to replace the CMOS battery.
How do I save the changes?
If any changes are made, you need to save those changes, which is usually done
by pressing the F10 key on the keyboard. If F10 doesn't work, look at the bottom
or top of the screen for the key that is used to save the settings.

Older computers
Unlike the computers of today, older computers (before 1995) had numerous
methods of entering the BIOS setup. Below is a listing of key sequences to press
as the computer is booting to enter the BIOS setup.
· Ctrl+Alt+Esc

· Ctrl+Alt+Ins

· Ctrl+Alt+Enter

· Ctrl+Alt+S

· Page Up key

· Page Down key

Acer BIOS
If your Acer computer cannot boot or you want to restore the BIOS to its original
settings, press and hold the F10 key as you turn on the computer. While
continuing to hold the F10 key, two beeps should be heard indicating that the
settings are restored.
AMI BIOS
Older AMI BIOS could be restored to bootable settings by pressing and holding
the Insert key as the computer is booting.
BIOS or CMOS diskettes
Early 486, 386, and 286 computers required a floppy disk to enter the BIOS setup.
These diskettes may be referred to as ICU, BBU, or SCU disks. Because these
diskettes are unique to your computer manufacturer, you must obtain the
diskettes from them. See the computer manufacturers list for contact
information.

Early IBM computers


Some early IBM computers require you to press and hold both mouse buttons as the computer
boots to enter the BIOS setup.

Q6:-What is andriod? Describe andriod architecture and


operating system in detail.
Android - Architecture

Advertisements

Previous Page

Next Page

Android operating system is a stack of software components which is roughly divided into five
sections and four main layers as shown below in the architecture diagram.
Linux kernel
At the bottom of the layers is Linux - Linux 3.6 with approximately 115 patches.
This provides a level of abstraction between the device hardware and it contains
all the essential hardware drivers like camera, keypad, display etc. Also, the kernel
handles all the things that Linux is really good at such as networking and a vast
array of device drivers, which take the pain out of interfacing to peripheral
hardware.

Libraries
On top of Linux kernel there is a set of libraries including open-source Web
browser engine WebKit, well known library libc, SQLite database which is a useful
repository for storage and sharing of application data, libraries to play and record
audio and video, SSL libraries responsible for Internet security etc.

Android Libraries
This category encompasses those Java-based libraries that are specific to Android
development. Examples of libraries in this category include the application
framework libraries in addition to those that facilitate user interface building,
graphics drawing and database access. A summary of some key core Android
libraries available to the Android developer is as follows −
· android.app − Provides access to the application model and is the
cornerstone of all Android applications.
· android.content − Facilitates content access, publishing and messaging
between applications and application components.
· android.database − Used to access data published by content providers
and includes SQLite database management classes.
· android.opengl − A Java interface to the OpenGL ES 3D graphics rendering
API.
· android.os − Provides applications with access to standard operating
system services including messages, system services and inter-process
communication.
· android.text − Used to render and manipulate text on a device display.

· android.view − The fundamental building blocks of application user


interfaces.
· android.widget − A rich collection of pre-built user interface components
such as buttons, labels, list views, layout managers, radio buttons etc.
· android.webkit − A set of classes intended to allow web-browsing
capabilities to be built into applications.
Having covered the Java-based core libraries in the Android runtime, it is now
time to turn our attention to the C/C++ based libraries contained in this layer of
the Android software stack.

Android Runtime
This is the third section of the architecture and available on the second layer from
the bottom. This section provides a key component called Dalvik Virtual Machine
which is a kind of Java Virtual Machine specially designed and optimized for
Android.
The Dalvik VM makes use of Linux core features like memory management and
multi-threading, which is intrinsic in the Java language. The Dalvik VM enables
every Android application to run in its own process, with its own instance of the
Dalvik virtual machine.
The Android runtime also provides a set of core libraries which enable Android
application developers to write Android applications using standard Java
programming language.

Application Framework
The Application Framework layer provides many higher-level services to
applications in the form of Java classes. Application developers are allowed to
make use of these services in their applications.
The Android framework includes the following key services −
· Activity Manager − Controls all aspects of the application lifecycle and
activity stack.
· Content Providers − Allows applications to publish and share data with
other applications.
· Resource Manager − Provides access to non-code embedded resources
such as strings, color settings and user interface layouts.
· Notifications Manager − Allows applications to display alerts and
notifications to the user.
· View System − An extensible set of views used to create application user
interfaces.
Applications
You will find all the Android application at the top layer. You will write your
application to be installed on this layer only. Examples of such applications are
Contacts Books, Browser, Games etc.

BLANKS
1. In many windows applications, you can open a shortcut menu by Right click
the mouse.
2. IBM- compatible PCs have 10 or 12 Function keys.
3.Memory is a temporary storage area that holds data until the CPU is ready for
it.

4.Which type of computer uses the 8 bit code called EBCDIC?


Ans:- Character Encoding Systems and EBCDIC
BCD, ASCII, EBCDIC are character encoding system that makes possible to
represent text in Computers that solely work with numbers (binary) only.
By character encoding system, I mean a set of mappings between the bytes
representing numbers in the computer and characters in a language.
EBCDIC, the abbreviation of Extended Binary Coded Decimal Interchange Code is
one such encoding system that uses 8 binary digits to represent characters. You
can see the characters and codes mapping on EBCDIC by clicking here.
EBCDIC was devised in 1963 and 1964 by IBM and was announced with the
release of the IBM System/360 line of mainframe computers. It was created to
extend BCD (Binary Coded Decimal) or BCDIC (Binary Coded Decimal Interchange
Code).

Computers That Use EBCDIC


It is interesting to see that IBM was one of the major supporter of ASCII standard
committee but it continued using EBCDIC in IBM System/360 mainframe
computers. It must because they did not find sufficient time to develop
peripherals that use ASCII.

Q5:-What are the stages in the compilation process?


Ans:-A .
Feasibility study, system design and testing
B.
Implementation and documentation
C.
Lexical Analysis,syntax analysis, and code generation
D.
None of the above
Answer
Lexical Analysis,syntax analysis, and code generation are the stages in the
compilation process.
The internal representation of the code generated by the compiler is called an
intermediate language (IL). The lexical analysis stage transforms a sequence of
characters to a sequence of lexical elements. ... The message Syntax error
indicates that the phrase analyzed does not follow the grammar of the language.
The Four Stages of Compiling a C Program. Knowing how compilation works can
be very helpful both when writing code and when debugging. Compiling a C
program is a multi-stage process. At an overview level, the process can be split
into four separate stages: Preprocessing, compilation, assembly, and linking.

You might also like