You are on page 1of 18

Introduction of computer

Classification of Computers

I. Speed 1024 bytes=1KB


II. Accuracy
III. Storage 0 1
IV. Multitasking 210=1024
V. Communication

2.Application Areas of Computer

 Business area
 Financial area
 Education area
 Medical area

210=1024bytes =1KB
210*210=1024KB= 1MB
230=1024MB=1GB

Serial advance technology attachment parallel

SMPS- switch mode power supply


UPS- unintoupt power supply
1. PATA

Moilex connector
4 pins Data Connector (12.5)

2. SATA

15 pins and L shapes (3.3,5,12)

Secondary CPU Power connector


(4pins) (12v power)

In mother board Power Supply (12v,5v)

Motherboard is a PCB (printed circuit board, it is heart of the


computer)

AGS= Acclerate graphics slot


PCI= Perfil component inter connect
MCM= memory Controler hub

.
SMPS
{Switch Mode Power Supply}
 SATA connector Pin 15 Volltage 5,3.5,12v uses SATA
device
 Plo Connector 20-24 5,3.3,12v Motherboard
 SATA molex connector 4,5& 12v Data Device
 Secondary CPU 4,12v Processor

PORTS------------------------------------------sound port
Headphone
speaker

 PS/2 Port Mouse Keybord


 Parallel Port Female part Printer dot matrix
 Serial Port Mata Port inject laser
 VGA/Display
 USB
 LAN network

USB (Universal serial bus)

 1.0 12MBPS
 2.0 480MBPS
 3.0 5GBPS

Computer Language
Lang
Low high
Assemble lang
Machinery lang 0 and 1 C,C++,JAVA ETC.
*Analog
Analog is Continuos and having infinite value
Digital is discontinue and having finite value

 First Generation
(1940-1956) – UNIVAC, ENIAC

 Second Generation
 (1956-1963)- COBOL, FORTAN

 Third generation
(1964-1971)- keyboard, mouse, monitor

 Fourth Generation
1971

 Fifth Generation
Super (weather forcasting)
Mainframe (share market, rocket launching)
Mini (bank, railway)
Micro (office)

Operating System
1. It is the Interface between the hardware and the user
2. Set of programming Command

Types of Operating System

 White hacking
 Red hacking

Windows Operating

Windows O/S

XP started edition Vista started edition- 32bit- op


home premium professional- domain to network

APP
Encuption, bit locker drive- Enterprise- security ultimate- all in
one

Operating system

 32 bit 32bit per/sec read and write only 32bit software and
application can run
 64bit 64bit per/sec read and write both 32 and 64
Encriptions
When we do Encription in these add these add the system in which
are have increapted the files and folder can be open normally beet
when someone copies the increpted documents and open it another
system then it will not open

Bit Locker Drive


Bit Locker Drive it is used to lock the full drive which want to lock by
just doing the steps.

Step 1:-Right click on Drive’T’.


Step 2:- Turn on Bit Locker Drive
Step3:- tick on the Checkbox
Step4:- Type password :xyz”
Step5:- 1 password “xyz”
Step6:- Next-Next-OK

Bineary to Decimal (conversion)


I. 1 0 1 0
3 2 1 0
2 2 2 2
8 4 2 1
8 + 0 + 2 + 0 =10
II. 1 1 0 1
3 2 1 0
2 2 2 2
8 4 2 1
8 + 4 + 0 + 1 = 13

III. 0 1 1 1 0 1
5 4 3 2 1 0
2 2 2 2 2 2
32 16 8 4 2 1
0 + 16 + 8 + 4 + 0 + 1 =29

IV. 0 1 1 0 1 1 0 1
7 6 5 4 3 2 1 0
128 64 32 16 8 4 2 1
0 + 64 +32 + 0+8+4+0+1=109

0 0 0 0 ------------------------------ 0
0 0 0 1 --------------------------------1
0 0 1 0 --------------------------------2
0 0 1 1 --------------------------------3
0 1 0 0 --------------------------------4
0 1 0 1 --------------------------------5
0 1 1 0 --------------------------------6
0 1 1 1 --------------------------------7
1 0 0 0 --------------------------------8
1 0 0 1 --------------------------------9
1 0 1 0 ------------------------------- A
1 0 1 1 --------------------------------B
1 1 0 0 --------------------------------C
1 1 0 1 --------------------------------D
1 1 1 0 --------------------------------E
1 1 1 1 --------------------------------F

SMPS

Its frequency range is 50 KHz to 1 MHz the most common type of


power supply used today internally in PC is called SMPS

The advantages:-
1. Smaller in Size
2. Greater power Conversion
3. Generate low heat
4. Reduce overall power loss

Type of SMPS
At Style SMPS: it is a pair of 6 pins connector
ATX Style SMPS: it is a single 20 pins connector
Types of computer
1. Analog Computer
2. Hybrid Computer
3. Digital computer

ATX Wires Signal

Pin Number Wire color Signal


1. ORANGE +3.3 VOLT
2. ORANGE +3.3 VOLT
3. BLACK GROUND
4. RED +5 VOLT
5. BLACK GROUND
6. RED +5 VOLT
7. BLACK GROUND
8. GREY POWER GOOD
9. PURPLE +5 VOLD STAND
BY
10. YELLOW +12 VOLT
11. ORANGE +3.3 VOLT
12. BLUE -12 VOLT
13. BLACK GROUND
14. GREEN POWER ON
15. BLACK GROUND
16. BLACK GROUND
17. BLACK GROUND
18 WHITE -5 VOLT
19. RED +5 VOLT
20. RED +5 VOLT
Molex Connector
It is a D shaped Connector or large size and connecting for internal
drive like hard drive CD,DVD and earlier 5.25 inch floppy disk drive

Pin Number Wire Color Signals


1 YELLOW +12 VOLT
2 BLACK +12 VOLT+
GROUND
3 BLACK +5 VOLT+
GROUND
4 RED +5 VOLT

Mini Molex Connector


It is a small size connector and use for 3.5 inch floppy disk drive
PIN NUMBER WIRE COLOR SIGNALS
1 RED +5 VOLT
2 BLACK +5 VOLT +
GROUND
3 BLACK +12 VOLT +
GROUND
4 YELLOW +12 VOLT

REMOTE DEXTOP SYSTEM

Remote dextop connection is one of the feature given by the


windows operating system by which we can access in our system to
an other system.
BENEFITS OF REMOTE DEXTOP CONNECTION
Remote dextop connection required when the user don’t no how to
install the software or troubleshoot the system we can take the help of
any friend but the problem arrive when there are not near by us then
we can use remote dextop connection

DISADVANTAGE OF REMOTE DEXTOP CONNECTION

There is a drawback of remote dextop connection the drawback is that


we cannot see what the other user doing in our system and if the
person don’t want to share the system fully.

Q. Why we are creating logical patriation?


Ans☹ We are creating partition to keep the different software &
document, sepretly so there will be no confusion furture.
(ii)- by chance if my operating system get corrupt then I have to
format or install at that time if have not kept the software & document
in different partition then if may happen the whole software &
document will lost.
CHAPTER-1. BASIC OF NETWORKING

Peer to Peer Client server


(workgroup) (Domain)
(point to point)
1. We have to give permission 1. We can give permission as
to everyone or no one. our choice
2. SAM maintain username 3. AD maintain username &
password. password
4. We use more than one 5. Only one username and
username password for password.
other connection

Q. What is a Network?
Ans:- in general, the term network can refer to any interconnected
group or system more specifically a network is any method of sharing
information between two system (human, electrical, or mechanical).

CLASSFICATON OF NETWORK

1. According to the size of the network


 PAN
 LAN
 CAN
 MAN
 WAN
2. According to type of connection used
 Wired network
 Wireless network
According to the size of the network

LAN (Local Area Network)

A local area network is a group of computers and network


communication devices within a limited geographic area, such as an
office building for ex, a library will have a wired or wireless LAN for
user to interconnect local device (e.g. printers & server)

Local area networking uses switches bridges and repeaters and hubs
to interconnect LAN and increase overall size routers are used to
connect a LAN to a Wan or MAN

They are characterized by the following:-


 High data transfer speed
 Generally less expensive technologies
 Limited geographical area
 Security
 Stability
 Reliability

MAN (Metropolitan Area Network)

A metropolitans area network is a network that connects two or more


local area network or campus area network together but does not
extend beyond the boundaries of the immediate town city or
metropolitan area. A MAN can range any where from 5 to 50 km in
diameter.
WAN(WIDE AREA NETWORK)
WAN is a data communication network that covers a relatively broad
geographical area (i.e, one country to another country) and that often
user transmission facilities provided by common carriers such as
telephone companies they are generally as telephone companies. They
are generally connected with each other using router

They are characterized by the following


 Multiple interconnected LANs
 Generally more expensive technology
 More sophisticated to implement to LANs
 Exists in a unlimited geographical area

PERSONAL AREA NETWORK (PAN)

A Personal area network (PAN) is a computer network used for


communication among computer devices close to one person
Some example of device that may be used in a PAN area printers fax
machine telephone, scanner. The reach of a PAN is typically within
about 20-30 feet (approximately) 6-9 meters)

Storage area Network(SAN)

We have a lot of data in the form of audio and video we need to store
data for quick access and transfer or special storage device.
SAN may be referred to as a sub network or special purpose network
its special purpose is to allow user or a large network to connect
various data storage device with cluster of data server.
VIRTUAL PRIVATE NETWORK (VPN)

VPN is a private Network that lets you access public network


remotely

VPN uses exception and security protocols to retain privacy while it


access outside resources by creating a virtual network

NETWORK TOPOLOGIES
Topology refers to the way in which the network of computer is
connected the choice of topology is dependent upon
 Type and number of equipment be used
 Planned applications and rate of data transfer
 Required response time
 Cost

TYPES OF NETWORK TOPOLOGY


Physical topology:- Physical topology define how devices are
connected to the network through the actual cable that transmit data
(physical structure of the network)
Logical Topology:- Logical Topology (also referred to as signal
topology) is a network commuting terms used to describe the
arragment of device an a network and how they communicate with
one another

1. BUS TOPOLOGY
In a bus topology
A single cable connects each work station in a linear daisy- chained
fasion
Signals are broadcasted to all stations but stations only act on the
frames addressed to them

2. Ring topology

In a ring topology
Unidirectional links connect the transmit side of one device to the
received side of another device.
Devices transmit frames to the next device (down stream member) in
the ring

3. Star topology

In a star topology
Each station is connected to a central hub or switch (concentrator) that
functions as a multipoint repeater
The hub broadcast data all of the devices connected to it
The switch transmit the data to the dedicated device for which the
data is meant for

4. Tree topology

Advantage of a tree topology


Point-to-point wiring for individual segments
Supported by several hardware and software venders
Disadvantages of a tree topology

Overall length of each segment is limited by the type of cabling


used.
If the backbone line break, the entire segment goes down
More difficult to configure and wire than other topology

Mesh topology

A network setup where each computer and network device is


interconnected with one other. This topology is not commonly
used for most computer network as it is difficult and expensive
to have redundant connection to every computer. However this
topology is commonly used for wireless network.

n ( n−1 )
no of connection=
2

N= number of devices

Basic networking devices

1. Network interface cards

A network card, network adapter or NIC (network interface card)


Is a pieace of computer hardware designed to allow computer to
communicate over a computer network. It provide physical access to a
networking medium and often provide a low level addressing system
through the use of MAC addresser. It allows to connect to each either
by using cable or wirelessly.

You might also like