Professional Documents
Culture Documents
Generally, the term Information Technology is used in performing enterprise operations as relevant to both
personal or entertainment technologies. The commercial as well as personal use of IT constitutes both computer
technology and telephony. Information Technology is used in various fields like,
v Science
v Engineering
v Business
v Commerce
v Education
v Governance
v Medicine
v Entertainment.
Since Information Technology has a tremendous impact on all aspects of life, it is essential to study the various
aspects of Information Technology. This study includes understanding the concept of Information Technology as
well as its scope, operating a computer, various input/output devices and types of memories, computer software,
operating system and various services of it.
This book provides theoretical and practical knowledge to the student about “Information Technologies-1” for B.Sc
III-Year V-Sem. It covers the complete syllabus of the subject prescribed by O.U. The content written in this book is
presented in a consistently readable and student friendly format so that student can prepare well for their both mid
and final exams. This book is beneficial because it gives complete up-to-date information about each topic and the
questions to be asked in the exams. This helps the student in getting a clear idea about the important questions in
each topic. This book has been prepared keeping student’s views, ideas and suggestions in mind. The main motivation
behind the publication of this book is to help the student to gain good marks and knowledge in the subject.
According to the examination pattern of B.Sc students, this book provides the following features:
v List of Definitions are provided before the units for easy reference.
v Every unit is structured into two main sections viz. Short Questions and Essay Questions with solutions
along with Learning Objectives and Introduction.
v Objective Type along with Very Short Answers are also given at the end of each unit.
v Three Model Papers are provided in order to help students to understand the paper pattern in the end examination.
v Important Questions are included to help the students to prepare for Internal and External Assessment.
The table below illustrates the complete idea about the subject, which will be helpful to plan and score good marks
in the end examinations.
Input and Output Devices, Applications of Computers. Input and Output Devices: Input Devices,
1.
Computer Memory and Output Devices, Soft Copy Devices, Hard Copy Devices, Computer
Processors Memory and Processors: Introduction, Memory Hierarchy, Processor
Registers, Cache Memory, Primary Memory, Secondary Storage
Devices, Harddisks, Optical Drives, USB Flash Drives, Memory Cards.
This unit includes topics like Computer Software: Introduction,
Classification of Computer Software, System Software, Applications
Software, Firmware, Middleware, Acquiring Computer Software.
Computer Software and
2. Operating Systems: Introduction, Evolution of OS, Process
Operating Systems
Management, Memory Management, File Management, Device
Management, Security Management, Command Interpreter, Windows,
Linux.
It is sincerely hoped that this book will be of great help to the students to excel in their examinations.
Suggestions for improvement of the text from our esteemed readers will be highly appreciated and incorporated in
our forthcoming editions.
Information Technologies-1
BSC III-Year V-Semester (OU)
[Generic Elect.-1]
Contents
Syllabus (As per (2016-17) Curriculum)
List of Important Deinitions L.1 – L.2
Unitwise Important Questions IQ.1 – IQ.4
IntErnaL aSSESSMEnt 25 - 28
Unit - ii Computer Software and Operating Systems Q1 - Q33 29 - 64
IntErnaL aSSESSMEnt 61 - 64
Syllabus
UNIT-I
Input and Output Devices: Input Devices, Output Devices, Soft Copy Devices, Hard Copy Devices.
Computer Memory and Processors: Introduction, Memory Hierarchy, Processor Registers, Cache Memory,
Primary Memory, Secondary Storage Devices, Hard Disks, Optical Drives, USB Flash Drives, Memory
Cards.
UNIT-II
Operating Systems: Introduction, Evolution of OS, Process Management, Memory Management, File
Management, Device Management, Security Management, Command Interpreter, Windows, Linux.
List of important Definitions Computer SCienCe paper-V
UNIT - I
1. Computer
A computer is an electronic device that can store, retrieve and execute the instructions provided by the user.
2. Input Devices
The devices that are used to insert the data into the computer are called the input devices.
3. Output Devices
Output devices are those devices using which, a computer can communicate with the users.
4. Memory
Memory is the internal storage of the computer that can store data or programs permanently or temporarily.
5. Cache Memory
Cache memory is a small memory present between CPU and main memory.
6. Primary Memory
7. RAM
RAM stands for Random Access Memory. It stores programs and application data needed by the computer.
Secondary memory (or) auxiliary memory is the slowest and cheapest form of memory. The data present inside these memo-
ries cannot be processed directly by the CPU.
9. PROM
Programmable Read only Memory (PROM) is a non volatile memory used as a storage for programs. They have less storage
capacity than ROM.
Ofline storage devices refers to the devices where the data remain stored even if they are removed from the computer.
USB lash drives are the storage devices that are removable, rewritable and small in size (less than 30g).
Memory cards are very small storage devices that can store digital iles.
UNIT - II
1. Computer Software
Computer software is a collection of programs that directs the computer to perform some tasks.
2. System Software
A set of programs that is capable of controlling and supporting the computer system and its information processing activities
is called system software.
3. Application Software
4. Operating System
An operating system is a software or computer program that controls the computer hardware. It acts as an interface or an
intermediate between the user and hardware.
5. Process
Process is the fundamental concept of operating systems structure which is deined as a program under execution
Alternatively, it can also be deined as an active entity that can be assigned to a processor for execution.
6. Scheduling
Scheduling is deined as the activity of deciding, when processes will receive the resources they request.
8. Deadlock
A situation in which a process waits indeinitely for requested resources and that resources are held by other process in a
waiting state. This situation results in disallowing the process to change its state which is called as deadlock situation.
9. File
A ile is grouping of similar records or related information together which is stored in secondary memory.
Command interpreter serves as a bridge between user and operating system. It operates upon the commands given by the
user and OS executes them by converting into system calls.
FACULTY OF SCIENCE
MODEL
PA P E R 1
B.Sc. (CBCS) V-Semester Examinations
(ii) Explain the paging concepts. (Unit-II, Page No. 51, Q24)
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. MP.1
Computer SCienCe paper-V inforMation technologies-1
FACULTY OF SCIENCE
MODEL
PA P E R 2
B.Sc. (CBCS) V-Semester Examinations
Part - a ( 2 × 5 = 10 Marks )
OR
2. (a) Deine irmware and middle ware. (Unit-II, Page No. 30, Q3)
OR
(b) Write in brief about Relative ile organization. (Unit-II, Page No. 31, Q7)
Part - B ( 2 × 15 = 30 Marks )
3. (a) (i) Discuss in brief about the various generations of computers. (Unit-I, Page No. 6, Q14)
(ii) Explain about input devices. (Unit-I, Page No. 12, Q18)
OR
4. (a) (i) Explain in detail about system software. (Unit-II, Page No. 32, Q10)
(ii) What is an operating system? Explain the functions of operating system. (Unit-II, Page No. 39, Q15)
OR
(b) (i) Explain FCFS, SJF, Priority, Round Robin scheduling algorithms. (Unit-II, Page No. 45, Q19)
(ii) Deine ile. Write about data hierarchy and ile attributes. (Unit-II, Page No. 53, Q26)
FACULTY OF SCIENCE
MODEL
PA P E R 3
B.Sc. (CBCS) V-Semester Examinations
Part - a ( 2 × 5 = 10 Marks )
1. (a) Write short notes on primary and secondary memory. (Unit-I, Page No. 3, Q6)
OR
OR
Part - B ( 2 × 15 = 30 Marks )
3. (a) (i) Explain the block diagram of a computer. (Unit-I, Page No. 9, Q16)
(ii) Explain about output devices. (Unit-I, Page No. 14, Q19)
OR
(b) Discuss in brief about,
(i) Secondary storage devices
(ii) Hard disk. (Unit-I, Page No. 22, Q24)
4. (a) (i) Explain in detail about application software. (Unit-II, Page No. 35, Q11)
(ii) Discuss in detail the different types of operating systems. (Unit-II, Page No. 41, Q16)
OR
(b) (i) Discuss about device management. (Unit-II, Page No. 56, Q29)
(ii) Explain about windows operating system. (Unit-II, Page No. 59, Q32)
IntroductIon to
UnIT computers, Input and
output devIces, computer
Learning Objectives
After studying this unit, a student will have thorough knowledge about the following key concepts,
intrOductiOn
The term “Computer” is derived from the word compute which means to calculate. It is an electronic device that
can store, retrieve and execute instructions provided by users.
A computer typically perform its processing by accepting input from users. This input is provided by using various
input devices like keyboard and mouse. The given input is then processed into some useful information by applying
some pre-deined rules and inally producing the output. This output is then displayed on screen using various
output devices like monitor and printer.
The components of computer system include input, output, CPU and memory. Memory can be either primary
memory (like RAM and ROM) and secondary memory (like magnetic tapes, magnetic disks and optical disks).
part-a
short QuestIons wIth solutIons
Q1. Deine computer.
Answer :
A computer is an electronic device that can store, retrieve and execute the instructions provided by the user. The term
computer has been originated from the word ‘compute’ which means to calculate. It is a device used for collecting, storing and
processing the user information with higher speed and accuracy. A computer typically performs its work by accepting the input
from the user, processing the input into some useful information by applying some predeined rules (programs) and eventually
producing the output.
Q2. List any four characteristics of a computer.
Answer : Model Paper-I, Q1(a)
Primary Memory
Primary memory consists of data which is required to be manipulated immediately. In addition to this, it also stores
the information about what is being processed by the processer. Primary memory is also known as main memory.
Types of primary memory are,
(i) RAM
(ii) ROM.
Secondary Memory
Secondary memory is the slowest and cheapest form of memory. It is not possible to process such memory directly
by the CPU.
Q7. Write brief note on RAM and ROM.
Answer : Model Paper-I, Q1(b)
RAM
RAM stands for Random Access Memory. It stores programs and application data needed by the computer. As soon
as the system starts, the operating system software and other data applications are loaded into the RAM. It is called random
access memory because the data and applications can be accessed in any sequence irrespective of the memory locations.
RAM is a volatile memory so it loses all its stored information when it gets disconnected from power.
ROM
Read only memories are those memories which do not loose their data, even though the power is turned off. Due
to this nature, these memories are also referred to as non-volatile memories. Hence by using ROMs, permanent storage of
data can be made.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 3
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
Q8. Write short notes on PROM. Q11. What are the advantages of lash drive?
Answer : Answer : Oct./Nov.-15, Q6
Programmable Read Only Memory (PROM) is a non The advantages of lash drives are as follows,
volatile memory used as a storage for programs. They have less
storage capacity than ROM. The data programmed on PROM is 1. Flash drives work well even after they are affected by
permanent and it cannot be altered or erased. These memories scratches and dust from the surroundings unlike CD’s
are empty when purchased. Data are programmed or written by and loppy disks.
special PROM programmers.
2. They are helpful in transferring the data from one place
PROM memory is a digital memory used in digital to another place.
electronic devices for storing data permanently. The various low
3. They are found to be compatible with any kind of
level programs like irmware uses PROM. PROMs are mostly
used in, personal computer.
1. Microcontroller 4. They are capable of storing the data that is more when
compared to a DVD.
2. Video games
5. They consume very less amount of power and are also
3. Radio Frequency Identiication (RFIO) tags
portable.
4. High-Deinition Multimedia Interfaces (HDMI)
Q12. Write short notes on ofline storage devices.
5. Implantable medical devices etc.
Answer :
Q9. What is USB lash drive?
Ofline storage devices refers to the devices where the
Answer : Model Paper-II, Q1(b)
data remain stored even if they are removed from the computer.
USB flash drives are the storage devices that are They are used for transferring data from one computer to another
removable, rewritable and small in size (less than 30g). It when there is no connectivity among the computers. They are
contains a small printed circuit board that contains circuit also used to take backups of critical data to avoid loss of data
elements and USB connector. They are involuted and protected
in case of system failure, natural disasters or security attacks.
within a plastic, metal or rubberized case. They extract power
They offer security as they are kept disconnected from the
from computers through external USB connection.
computers. Examples of ofline storage devices are optical disks
Uses of USB lash drive are as follows, (CD-ROM, DVD-R), loppy disks, lash drives, external hard
(a) Booting Operating System disks etc.
(b) Personal Data Transport
(c) System Administration
(d) Backup
(e) Music Storage and Marketing.
Q10. Deine memory cards.
Answer : Model Paper-III, Q1(b)
Computers are electronic devices which are developed to assist the users in performing dificult calculations as well as
other activities. Development of powerful computing devices, led to the invention of several other devices. However, it took
many years to develop the advanced computer.
Generations of Computers
The generation of computers refers to the stages of innovation or development done in the ield of computers. This in-
novation resulted in much smaller, less expensive, more powerful and reliable devices. There are ive generations of computers
depending on the type of processors installed in the machine.
1. First Generation (1940-1956)
v First generation computers were based on vacuum tubes technology.
v These machines were larger in size and used more space for installation.
v They used to generate a lot of heat as thousands of vacuum tubes were used. Because of this, air conditioning was
essential for these machines.
v The computational speed was fast i.e., in milliseconds.
v These machines were non-portable.
v They were not reliable and were highly susceptible to hardware failures.
v These machines were very expensive and consumed large amount of electricity.
v These machines lacked in versatility and speed.
v Every component of this machine needed to be assembled manually. Therefore commercial production of the irst
generation machines was very poor.
v They were machine-language dependent and hence it was very dificult to program and use them.
Examples
ENIAC, EDVAC and UNIVAC.
2. Second Generation (1956-1963)
v Second generation computers were based on transistors technology.
v These machines were comparatively smaller in size than the irst generation machines.
v They generated less amount of heat, but still air conditioning was required.
v The computational speed was very high (i.e., from milliseconds to microseconds).
v These machines were portable.
v They were reliable and were not susceptible to the hardware failures.
v Every individual component needed to be assembled manually to form a functional unit.
v They were assembly language dependent.
Examples
PDP-8, IBM-1401 and IBM-7090.
3. Third Generation (1964- Early 1970’s)
v Third Generation computers were based on Integrated Circuit (IC) technology.
v The speed of computation was very fast (i.e., from microseconds to nanoseconds)
v These machines were smaller in size when compared to other machines.
v These machines were portable as well as reliable.
v They used to generate very less amount of heat. Air conditioning was not mandatory but required in some cases.
6 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
v The cost of maintenance was very less, since these machines were not prone to hardware failure.
v They were high-level language dependent.
v They did not require manual assembling of individual components.
v The commercial production became easy and less expensive.
Examples
NCR 395 and B6500.
4. Fourth Generation (Early 1970’s - 1989)
v Fourth generation computers were based on microprocessor’s technology.
v These machines were very small in size when compared to other machines.
v These machines were very much cheaper.
v They were portable and reliable.
v They did not generate much heat, therefore air conditioning was not required.
v Maintenance cost was very less, since were not prone to any sort of hardware failure.
v The cost of production was very low.
v These machines were easier to use because of GUI and pointing devices.
v Interconnection among different computers resulted in better communication and resource sharing.
Examples
Apple II, Altair 8800 and CRAV-1.
5. Fifth Generation (Present and Beyond)
The following are the characteristics found in the ifth generation computers.
(i) Mega Chips
These computers use Super Large Scale Integrated (SLSI) chips. The usage of these chips results in the generation of
microprocessors. These microprocessors consist of hundreds and thousands of electronic components mounted on a single
chip. Fifth generation computers require large amount of storage space for storing information as well as instructions. The
usage of Mega Chip allows the memory capacity of computer to be approximately equal to the capacity of human mind.
(ii) Parallel Processing
In contrast to serial processing, parallel processing is used to execute several instructions simultaneously on a single
machine.
(iii) Artiicial Intelligence
Artiicial Intelligence (AI) refers to sequence of interrelated technologies that generally simulate and reproduce human
behavior which include thinking, speaking and reasoning. The different technologies present in artiicial intelligence are,
Expert System, Natural language processing, Speech and Voice recognition and Robotics.
Q15. Classify the computers on the basis of size and performance.
Answer :
A computer is a fast electronic device, which takes the input in the form of instructions, processes it and inally produces
the output. A computer can be classiied into various types depending on various parameters like speed, capacity, data transfer rate,
process etc. Based on the size parameter, a computer is classiied into the following four types,
1. Super computers
2. Mainframe computers
3. Micro computers
4. Mini computers.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 7
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
Types of computer
(based on size)
1. Super Computers
Super computers are those computers which are designed with high speed processing capabilities and huge storage ca-
pacities. They are the irst largest general purpose computers that are capable of performing several billions of calculations per
second. The processing speed of these computers is very fast as they comprise of multiple CPU’s that are operated concurrently.
These computers generally occupy large rooms and are operated by many professional engineers.
Super computers are mainly used in,
(i) Weather forecasting
(ii) Nuclear energy research
(iii) Designing of machines, weapons, supersonic aircrafts etc.
Example
Some examples of super computers are CRAY, PARAM and PACE.
2. Mainframe Computers
Mainframe computers are second largest, ultra high performance computers. These computers are designed to fulill large
scale needs of business organization. These systems are capable of storing and processing huge amount of data. A mainframe
computer consists of following components.
(a) High speed computer processor
(b) Peripheral devices to support massive volume of data processing
(c) High performance online transaction processing systems
(d) Extensive data storage and retrieval system equipments.
Mainframes computers are used in large business organizations as well as in scientiic areas.
Example
Some examples of mainframe computers include IBMs ES000, VAX 8000 and CDC 6600.
3. Micro Computers
Micro computers are smaller in size, inexpensive general purpose digital computers. These computers consist of compo-
nents like microprocessors, storage unit, input channel and output channel mounted on a single chip. These computers can be
used by individual users in homes, educational institutions, small business organizations etc.
Example
Some examples of micro computers include IBM-PC pentium 100, Apple Macintosh, desktop, Laptops, hand-held com-
puters etc.
(a) Desktop Computers/Personal Computers
Desktop computers are used by individual users from a single location. These types of computers are affordable. These
computers are used in small business organizations, educational institutions, homes, railway department hospitals etc.
Personal computers consist of following components.
(i) Monitors
(ii) Keyboard
(iii) Mouse
(iv) Internal hard disk
(v) Other peripheral devices.
(b) Laptop
Laptops are smaller in size and portable computers. These computers are basically preferred while travelling. These
computers consists of rechargeable battery and donot require any external power supply.
8 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
(c) Hand-held Computers or PDA
Hand-held computers are very small in size and can be stored in a pocket. These computers use pen or electronic system
as an input device rather than keyboard. Handheld computers use small cards for storing data as well as program iles.
They styles bigger in size than a conventional calculator.
4. Mini Computers
Mini computers are a type of digital computers that are capable of storing more data than micro computers. These computers
are mainly designed with dual processor. The main purpose of these computers is to carry out auxiliary operations by connecting
to mainframes with speed and eficiency. They are considered as centralized store house or network server. Mini computers are
used in,
(i) Industries
(ii) Educational institutions
(iii) Research organizations
(iv) Small or medium business organizations.
Example
Some examples of mini computers are PDP11, IBM (8000 services) and VAX 7500.
Control
unit
Arithemetic
Input Output
logic unit
unit unit
Applications of Computers
Computers are basically used in following application areas.
1. Educational Institutions
Computers are incorporated in various educational institutions like schools and colleges for easy learning. The computer
based learning allows students to gain immense knowledge about speciic topic. The development of computers helped the
students in preparing projects and essays, in performing mathematical calculations etc. Besides this, web based learning
also facilities in obtaining information about various topics (via internet browsing), illing application forms, writing online
exams etc.
2. Science
Computers are used by scientist in the ields of research and development. It facilitates in analyzing new theories, predicting
natural calamities like tsunami and earthquake.
3. Communication
Computers enable multiple users to transfer data from one system to another system. Internet is considered as a common
communication media that provides interactions among various users.
4. Business
Computers are used in various business organizations inorder to maintain records of their accounts, their inventory and about
proit and loss. In addition to this, computers can also be used for conducting meetings among users residing on different
remote locations via web conferencing. Apart from this, computer and internet also helps in carrying out online business.
5. Banking
Computers are used in banks to facilitate online banking. This helps in easy transfer of money from one account to another,
bill payments etc. Beside this, computers are also used for maintaining records of inancial transactions being performed
in bank.
6. Entertainment
Computers can be incorporated in entertainment industries for creating interactive graphics, animations and video games.
7. Government
Computers can also be used in various government departments like revenue, defense, industry, census, police etc., for
betterment of people. The term e-governance is extensively growing popularly in the world.
8. Health
Computers are used in hospitals so as to,
(i) Keep track of patients records and generating bills
(ii) Diagnose different diseases and ailments
(iii) Monitor the patients condition using various analog and digital devices
(iv) Examine the internal parts of the body.
9. Military
Computers are useful in designing weapons, targeting ballistic muscles and controlling access to atomic bomb etc.
10. Weather Forecast
Computers are used to analyze and forecast the weather.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 11
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
1.2 Input and output devIces: Input devIces, output devIces, soft copy
devIces, hard copy devIces
Q18. Explain about input devices.
Answer : Model Paper-II, Q3(a)(ii)
Input Devices
The devices that are used to insert the data into the computer are called the input devices. These devices are used for
inputting data on graphical workstation. The most commonly used input device is the keyboard. Other special input devices
include mouse, trackball, space ball, joystick, dials, digitizers, data gloves, button boxes, image-scanners, voice systems and
touch panels.
Input Devices
Mouse Trackball Touchpad Stylu Touch Joystick Barcode Scanners OCR OMR MICR
Screen readers
Figure: Keyboard
2. Pointing Devices
A pointing device allows user to control the pointer movement in selecting the items/commands and draw the graphics
on screen.
(i) Mouse
Mouse is a small hand-held device that was developed at the Stanford Research Institute. It is used to position the screen
cursor. It has roller (wheel) at the bottom which is used to determine the amount and direction of the mouse movement.
The wheel is connected to a shaft encoder which generates an electrical signal on each rotation of the wheel. The mouse
movement is encoded in x and y directions, when it is moved on a lat surface and this movement is stored in separate
registers.
An optical sensor is also used to determine its motion. For this, a special mouse pad consisting of a grid is used. As the
mouse moves on the grid, its movements are determined.
A variation of the standard mouse called as a Z-mouse is developed which contains three buttons, a trackball on the top,
a thumb wheel on its side and a standard mouse ball at the bottom, hence providing six degrees of freedom. With the help
of a Z-mouse, an object can be picked, rotated and moved in any direction.
12 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
(ii) Trackball
A trackball is a 2D positioning device. It is ixed as a base on keyboard and mouse. It can be rotated with ingers to gener-
ate screen-cursor movement.
The potentiometers attached to the base determines the amount and direction of rotation.
(iii) Touchpad
Touchpad is a type of pointing device containing a sensitive surface of 1.5 – 2 inches. It is provided on the keyboard or
laptops and the user need to operate it with the ingers by sliding on its surface. It will convert the motion and position of
the ingers into the relative position on the screen. It also has buttons that work as mouse buttons.
3. Handhled Devices
A handheld device is a pocket sized computing device with display screen along with touch input and miniature keyboard.
(i) Joystick
A joystick is similar to a trackball, but has limited movement. It consists of a stick (i.e., a small and vertical lever) that is
attached to the base and is used to direct the cursor. The screen positions can be selected either by the stick movement or
by applying pressure on the stick. They can be ixed on a keyboard. The movement of stick in some particular direction
from its center indicates the movement of the screen-cursor in that direction. The potentiometers that are attached to the
base determines the amount of movement where as the spring causes it to return to the centre position upon its release.
Another version of a movable joystick causes the cursor to move in a speciied direction at a constant speed by activating
one of the eight switches arranged in a circular manner.
An isometric joystick is a pressure-sensitive joystick that contains a non-movable stick. The applied pressure is converted
to the cursor movement by the strain gauges.
(ii) Stylu
Stylu is a pen shaped input device where user will enter the information by writing on the touch screen of a device. It is
used to draw the lines on surface, select an option from the menu, move the cursor, record the notes and even create short
messages. It must be placed in the slot.
(ii) Touch Screen
Touch screen is the display screen which identiies the occurrence and position of the touch on it. Users can touch it by
ingers or stylus and can directly communicate with the things displayed on the screen. Touch screens are embedded in
laptops, PDA's, computers and mobile phones. Applications of it are car navigation screens, DOS (point-of-sale) cash
registers, automated teller machines (ATMs), gaming consoles etc.
4. Optical Device
Optical devices are also called data scanning devices that make use of light as a source of input to detect or recognize
various objects like characters, marks, codes and images. Some of the optical devices are as follows,
(i) Barcode Reader
Barcode reader is an input device that captures and reads the information that is on bar code. It contains a scanner, decoder
and cable. It reads and converts the barcode into integers or alphabets. It is connected to the computer through serial port,
keyboard port or interface device. It emits a light on the bar code and measures the amount of light that got relected. The
white spaces relect more light than the dark bars. This light energy is converted into electrical energy. These signals are
again converted into the data and sent to the computer for processing.
(ii) Image Scanner
Image scanners are the input devices used to store graphs, drawings, both color and black and white photos by using an
optical scanning mechanism. These storage objects are then used for computer processing. The variations in color or gray
scale are stored in an array.
After capturing the internal description of a picture, transformations like rotation, scaling etc., can be applied. An array
representation can be varied by using image-processing methods. Editing operations can be performed on the stored
scanned text.
(iii) Optical Character Recognition (OCR)
It is one of the most sophisticated type of optical recognition. An optical card reader works in the similar way as the hu-
man eye. It uses a device that reads preprinted characters in a particular font and converts them to digital code.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 13
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
A set of optical characters used on merchandise tags that can be read using an OCR want reader to process the sales
transaction.
The information on the tag, such as item price and the inventory number can be automatically entered at a point of sale
terminal. Pertinent data can be saved and transferred to the company’s main computer system to be used in activities such
as managing inventories and analyzing sales.
The primary advantages of OCR is that it eliminates some of the duplications of human efforts required to get data into the
computer. This reduction effort can improve data accuracy and can increase the timeliness of the information processed.
However, dificulties in using OCR equipment may be encountered when documents to be read are poorly typed or have
strikeovers or erasures. Also, form design and ink speciications may become more critical when people uses the data
from the forms.
(iv) Optical Mark Recognition (OMR)
The process of extracting the data from marked ields like ill-in ields of checkboxes is called OMR. It contains mark
sensing to scan and translate a series of pen or pencil marks in OMR sheet into computer readable form based on its lo-
cation. An example of it is the objective type multiple choice question paper of bank recruitment exam. A computerized
optical mark reader generates scores by identifying the position of the mark.
(v) Magnetic Ink Character Reader (MICR)
Magnetic Ink Character Reader (MICR) checks the legitimacy of the paper documents, such as bank checks. It has magnetic
ink printed characters that are captured by the high speed magnetic recognition devices. They provide some important
information to the receivers for processing. They promote security and speed up in the document sorting process. They
decrease the chances of check fraud.
5. Audio Visual Input Devices
Computers now a days allow the users to record songs, view the animated movies in addition to reading and writing the text.
They make use of audio and video input devices to pass audio and video as input to the computers.
(i) Audio Input Devices
Audio input devices are used for capturing or for creating the sound such as music, speech, sound effects for recording
etc. Examples are microphones and CD players. It is later converted into digital data using the sound card. The computer
that has microphone and speakers can be used to make telephone calls and for video conferences over internet.
(ii) Video Input Devices
Video input devices record video from the outside world and store in the computer. Video refers to a moving picture along
with sound. Video cards are used to convert the recorded video from analog form to digital form. Examples of it are digital
camera and web camera. They are used for video conferences, for recording memorable moments of someone and for security
purposes also.
Q19. Explain about output devices.
Answer : Model Paper-III, Q3(a)(ii)
Output Devices
Output devices are those devices using which, a computer can communicate with the users. These devices take the result
which is in machine-language from the processor and translate these results in the form easily understood by the users.
Output Devices
Memory
Memory is the internal storage of the computer that can store data or programs permanently or temporarily. It is classiied
into primary memory and secondary memory. The main memory or primary memory contains instructions and data while the
program is in execution. The auxiliary or secondary memory contains the data or programs which are not used currently.
For a program execution, all its related data will be loaded into the main memory. It is volatile and can retain the data only
until the power is on. Where as the secondary memory is non-volatile and stores the data permanently.
Memory Hierarchy
There are various storage devices that allow data to be stored and accessed by the CPU. Secondary storage devices are hard
disk drives, optical disk drives and other devices. Examples of primary memory are ROM, EROM etc. The memory hierarchy of
a computer is determined as follows, The storage devices at higher level are less capable, more expensive but have quick access
compared to the storage devices at the lower levels.
CPU Registers
Level 1 Cache
Level 2 Cache
Level 3 Cache
Primary Memory
Hard Disk
Optical Disk
Magnetic Tape
Cache memory
Transfer of word
Processing unit
The cache memory is placed in between the CPU and main memory. Whenever CPU needs a word, it accesses the cache
memory to check whether the requested word is available or not. If the requested word is present, then it is fetched from a cache.
This is referred to as a “cache hit”. On the otherhand, the unavailability of the requested word in the cache leads to a cache miss.
Since CPU references cache when it needs a word, it is necessary that the speed of cache must match with the speed of the CPU.
On a cache miss, the requested item is moved from main memory to cache and the CPU gets the requested item. Cache misses
are handled by the hardware.
Primary Memory
Primary memory consists of data which is required to be manipulated immediately. In addition to this, it also stores the
information about what is being processed by the processor. Primary memory is also known as main memory. There are two
types of primary memories. i.e., RAM and ROM.
Primary memories are extremely fast memories. These memories are nothing but semiconductor elements capable of
storing single bit of information. These elements together store certain length of data called as words. A small scale memory
stores about few thousands of words where as a medium scale memory can store about few millions of words. An extremely fast
memory which is provided to support the speed of processor is referred as cache memory. Computer consists of a new set of
memory referred as main memory. These type of memories are rather slow, but can store large volumes of data i.e., data extending
in Giga bytes. Secondary memories cost less and at the same time provides large storage capacity. Few examples of secondary
memories are magnetic tapes, CDROMs etc.
1. RAM
Random Access Memory (RAM) is one of the basic memory of computers today. They cannot hold data permanently.
Hence, they are utilized to store several intermediate results and other temporary data. Data remains in these memories as long
as there is constant supply of power. Once the power is turned off, data inside it gets lost. They are read once and write many
times type of memories.
Data inside these memories can be accessed randomly from any location.
Address bus
Read RAM Data output
Write
Data input
(c) RDRAM
S
RDRAM (Rambus Dynamic Random Access Memory) Bit
makes use of a high speed data bus which is called “Rambus” Line
Li
1.3.3 secondary storage devices, harddisks, optical drives, usb flash drives, memory
cards
Q24. Discuss in brief about,
(i) Secondary storage devices
(ii) Hard disk.
Answer : Model Paper-III, Q3(b)
Internal assessment
objectIve type
I. Multiple Choice
1. Monitor is a __________device. [ ]
(a) Software (b) Input
(c) Output (d) Control
1. A __________ is an electronic device that can store, retrieve and execute instructions provided by the users.
Key
I. Multiple Choice
1. (c) 2. (a) 3. (b) 4. (d) 5. (c)
5. Program, instruction
6. Hardware
8. Input
9. Input
10. Output
Answer :
A computer is an electronic device that can store, retrieve and execute the instructions provided by the user. The term
computer has been originated from the word ‘compute’ which means to calculate.
Answer :
Cache memory is a small memory present between CPU and main memory. It has higher speeds compared to other.
Because of the high speeds that it offers, it is used mostly in the computers where the RAM is slower than the processor.
Answer :
Primary memory is a type of memory which consists of data required to be manipulated immediately. In addition to this,
it also stores the information about what is being processed by the processer. Primary memory is also known as main memory.
Answer :
Programmable Read only Memory (PROM) is a non volatile memory used as a storage for programs. They have less storage
capacity than ROM.
Answer :
USB lash drives are the storage devices that are removable, rewritable and small in size (less than 30g). It contains a
small printed circuit board that contains circuit elements and USB connector.
After studying this unit, a student will have a thorough knowledge about the following key concepts,
Process Management, Memory Management, File Management, Device Management and Security Manage-
ment.
intrOductiOn
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by
the programmers and is converted by the compiler into the language understandable by the computer. Examples
of computer softwares are driver software, operating systems, media players, computer games etc.
Operating system is a program or set of programs that controls the computer hardware. It act as an interface between
user and hardware. The basic objectives of operating system includes efficiency, convenience and ability to evolve.
Windows 7 is the latest version of operating system being used on desktop PC’s, business organizations etc. It
focuses on incremental upgrades to Windows. Its purpose is to provide compatibility with application and hardware
with which Windows Vista is compatible. MS-DOS is a single user operating system which is used for searching
and configuring system files.
part-a
short Questions with solutions
Q1. Define computer software.
Answer :
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by the
programmers and is converted by the compiler into the language understandable by the computer. Finally, it is executed and
result is generated. Examples of softwares are driver software, operating systems, media players, computer games software etc.
Q2. What is system software and application software?
Answer : Model Paper-I, Q2(a)
System Software
A set of programs that is capable of controlling and supporting the computer system and its information processing
activities is called system software. It is used in programming, testing and debugging of computer programs. System software
program helps the application software by providing the basic functionalities of the computer.
Application Software
The software that helps the user in accomplishing some specific task is referred to as application software. A single program
or a set of programs forms the application software.
An application software can be built for any kind of application like graphics, word processors, media players, database
applications, telecommunications etc.
Q3. Define firmware and middleware.
Answer : Model Paper-II, Q2(a)
Firmware
Firmware is a software which is contained in the hardware. If the cost is found as more important factor than the performance
then some of the functions of electronic circuits are implemented by set of instructions and electronic circuits are decreased.
Certain hardware devices contain the software programmed and stored in memory of that particular hardware. This memory will
store program code as well as related data. The devices such as ROM, EPROM or flash memory which are non volatile will store
the firmware.
Middleware
Middleware is a software that combines two individual applications that are already existing. It acts as an interface between
two applications and also provides the services that are not provided by the operating system. For example middleware can pro-
vide communication between two separate applications through messaging services. The below diagram depicts the middleware
in computer system.
Q4. Define OS.
Answer : Model Paper-III, Q2(a)
Operating System
An operating system is a software or computer program that controls the computer hardware. It acts as an interface or an
intermediate between the user and hardware. It provides platform for running application programs.
User
Operating Computer
system hardware
Relative file organization will provide an efficient method to access separate records. The file records are sorted based on
the relative key. The position of the record can be known by the records number. Number of record are represented by n where 0
is the first records and n – 1 is the last record. The relative files and records are sorted in ascending order. A relative file is same
as a single dimension table stored on the disk. it contains a relative record number as index of table.
Q8. What is command interpreter?
Answer : Model Paper-III, Q2(b)
Command interpreter serves as a bridge between user and operating system. It operates upon the commands given by the
user and OS executes them by converting into system calls. It mainly emphasizes upon fetching and executing the next commands
given by the user. In actuality, the command interpreter is not considered to be a part of kernel because many command interpreters
such as shell and UNIX though substantiated by OS but does not require kernel mode to run.
When separated from kernel it produces two main benefits to the user. They are,
(i) It allows aesthetic modification to the interpreter and if the kernel code is unchangeable the interpreter also cannot
be changed.
(ii) It allows malicious activity to acquire the control upon a specific part of the kernel provided if the command interpreter
is made a part of the kernel.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 31
Computer SCienCe paper-V information teChnologieS-1
part-b
essay Questions with solutions
2.1 Computer software
Computer Software
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by the
programmers and is converted by the compiler into the language understandable by the computer. Finally, it is executed and
result is generated. Examples of softwares are driver software, operating systems, media players, computer games software etc.
Computer System
System Application
Software Software
System Software
A set of programs that is capable of controlling and supporting the computer system and its information processing
activities is called system software. It is used in programming, testing and debugging of computer programs. System software
program helps the application software by providing the basic functionalities of the computer.
Some of the basic functionalities includes,
v Monitoring the overall performance
v Providing and maintaining the user interfaces
v Reading the programs into memory and managing the allocated memory
v Managing the directories
v Detecting viruses and correcting errors etc.
32 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
The diagrammatic representation of the categorization of system software is given below,
BIOS stands for computer basic input/output system. The 1. Programming Languages
BIOS and device drivers provide certain basic functionalities Programming languages are used to develop the
to operate as well as control the hardware that is connected or software. There are three types of programming languages,
built into the computer. BIOS defines the firmware interface (a) Highlevel language
and run by the computer initially when it is switched on. The (b) Assembly level language and
BIOS will initialize and identifies the devices like mouse, CD/
(c) Machine level language.
DVD, hard disk, keyboard etc. It even identifies the software
in hard disk or CD, loads it and then executes it. Such process (a) High-level Language
is called booting. BIOS is contained in ROM and it maintains High-level languages (HLL) are preferred over other low
a user interface that is accessed by pressing a key on keyboard. level language (LLL) because of the following reasons,
User can configure the hardware, activate or deactive the system v Easier to read, write and maintain.
components, set the system clock, choose the devices and even v They are more abstract
set password prompts through the BIOS menu.
v They are more portable
Device driver acts as an interface between a device and
v They are more structured
the software. Thus, every device need its respective driver for
proper functioning. For example, hard disk needs a hard disk v These languages provide a direct communication
driver which enables it to understand any related command between a human and a computer.
given by the user or a program. (b) Assembly Level Language
3. System Utility Software The language which lie between the machine language
and HLL is Assembly language, it is very much
This software is required for proper maintenance of
similar to machine language. But these languages
computer system. It also helps in supporting and enhancing
are comparatively easier to program as they allow a
the program and data in the computer. Some of the examples
programmer to write programs using instruction code
include anti-virus utility, data compression utility, cryptographic
(i.e., mnemonics) instead of binary numbers.
utility, disk compression utility, disk partitioning utility and disk
cleaner utility, backup etc. (c) Machine Level Language
The utility programs can be requested by application Machine language is also known as machine code or
programs while executing them. Some of them are discussed object code. In this language, programs are written in
below, the form of binary digits or bits with different patterns
relating to different commands that are easily readable
v Disk cleaners are used to identify the files that are not
and interpreted by a computer.
useful and allow users to delete them.
2. Translator Software
v Disk partitions will divide the individual drive into
various logical drives. A translator software translates the program written in
high-level language and assembly language into the machine
v Disk checkers are used to identify the corrupted hard
understandable formats. The different translators that are in use are,
disk contents and delete them.
(a) Assembler
v Disk compression is used to improve the disk capacity
by compressing or decompressing the disk contents. An assembler is a system utility program responsible for
converting assembly language instructions into machine
v Command line interface and graphical user interface is
language instruction. There exist one machine language
used to modify the operating system.
instruction for individual assembly language instruction
v Antivirus utilities are used to scan the system for virus because of the presence of one-to-one mapping between
effected areas. assembly language and machine language. Assemblers
v File managers are used to provide methods to perform are not only capable of converting the instruction but are
routine management tasks like moving, deleting, also capable of generating error messages. Examples of
copying, modifying the data sets. assemblers include 8085 assembler, 8086 assembler etc.
34 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(b) Compiler 1. Microsoft Office Package
A compiler is a system utility program responsible Microsoft office can be defined as an application
for converting high-level instructions into machine software which consists of products or components designed
language instructions. All the instructions are converted by Microsoft corporation.
at a time. Compilers are capable of generating error
Components of MS-office
messages encountered during translation. After successful
compilation of a program, compiler software is not The components of MS-office are as follows,
required as the machine instruction is reused several (a) MS-Word
times. Examples of compilers are Pascal compiler, C
compiler, COBOL compiler etc. MS-Word is an application of word processing software
developed by Microsoft. MS-Word application can be used to
(c) Interpreter
create, manipulate and save a document, a note, a report, an
Interpreter is similar to that of a compiler but the official letter, a file and a menu.
difference arises in their conversion format. Interpreter
interprets every individual instruction and executes it Features of MS-Word 2007
immediately rather than executing entire program at 1. It allows users to manually enter data into a digital
once. In case of any error, the program execution is document.
halted until the error is rectified. The interpreter needs
to be stored in the memory till the program execution is 2. It allows users to add, delete and modify existing text
completed. Interpreter is useful while debugging because document.
it displays the error message soon after interpreting 3. It allows users to copy a document or part of it into
individual instruction. another document.
3. Linker 4. It allows users to customize paragraph setting, adjust
Linker is a program used to link several independent margins (top, bottom, left and right), line spacing etc.
broken modules and libraries of a very large program into an 5. It allows users to represent the information in tabular
executable program which is easy to debug and maintain.
format using built-in table styles.
4. Loader
(b) MS-Excel
Loader software handles the task of loading and
relocating of executable program in the main memory. Microsoft excel (MS-Excel) refers to a spreadsheet
application program. It can store, organized, analyze and
Q11. Explain in detail about application software.
manipulate the data. It is developed and configured by the
Answer : Model Paper-III, Q4(a)(i) Microsoft corporation to support Microsoft Windows and
Application Software MAC operating system. It is regarded as the most powerful
The software that helps the user in accomplishing some spreadsheet package.
specific task is referred to as application software. A single Features of MS-Excel
program or a set of programs forms the application software.
1. It provides menus and commands to user for creating
An application software can be built for any kind of worksheets easily.
application like graphics, word processors, media players,
database applications, telecommunications etc. 2. It allows users to store huge amount of data in excel
worksheet using its numerous rows and columns.
Examples of application software are word processors,
spreadsheets, media players, education software, CAD, CAM 3. It generates reliable and accurate output.
etc. Various applications packed together are called sometimes 4. It automatically checks and rectifies mistakes in spelling
as application suite. There are multiple application software and grammar through ‘spell check’ and ‘grammar check’
packages available in the market for various applications. One
option.
of the popular application software is productivity software.
5. It provides the facility of chart wizard for the user to
Productivity Software
create various types of charts.
This software enhances the productivity of the computer
user. 6. It provides the features of inserting graphs and pictures
into a document.
Examples of such softwares are spreadsheet applications
and graphic design software. Users use these tools to create the 7. It provides a variety of in-built functions that helps the user
documents, databases, graphs, charts, presentations etc. for calculating means, standard deviation, regression and
Mostly used software package in the market is microsoft correlation etc.
office package. It provides all the required functionalities to the 8. It also has the ability of changing the selected text into
users. Some of the productivity softwares are as follows, a variety of styles as bold, italic or underline.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 35
Computer SCienCe paper-V information teChnologieS-1
(c) MS-Access 5. Powerpoint projects are used as a project prototypes
Microsoft Access is a DBMS fully featured package. for all web based projects, consulting, engineering
It is a relational database management system which is architectural and environmental fields.
developed by Microsoft. It merges the features of Microsoft 6. They are used in literature for writing new letters,
Jet Database Engine together with GUI features as well as journals etc.
software development tools. The data stored in Microsoft SQL
server, Oracle or any ODBC-compliant data container can be The powerpoint presentations are used by trainers,
utilized by Access. Many of the software developers and data professionals, students and business people to,
architects prefers Access while developing application software (i) Create the presentation related to their fields.
and unskilled programmer can use it while developing simple
applications. However, Access support many of the object- (ii) Create video slide shows.
oriented techniques, it cannot be considered as a fully object- (iii) Print the presentation in the form of handouts and
oriented development tool.
speaker’s notes.
MS Access assist the user in collecting, organizing,
(iv) Add transparencies.
searching, displaying the information belonging not only to
the personal life but also the information associated with the Features of Powerpoint
business. The information that is dealt with MS Access is The features of powerpoint are as follows,
staggering. This package comprises of different wizards as
well as predefined database element. These elements assists 1. It provides slides to develop presentations.
the users in monitoring the following information, 2. It supports templates, wizards and built-in slide layouts.
v Assest tracking 3. It allows the users to add picture from clip art or the
v Event management pictures from browsed files.
v Inventory control 4. It allows the users to represent the data in the form of
tables and charts.
v Ledgers
5. It allows the users to add various types of sound effects
v Order taking and tracking system
and animation techniques into different presentations.
v Resource scheduling etc. 2. Graphics Software
(d) Power Point Graphics software is a type of image editing software
Ms-powerpoint is a part of Microsoft Office Suite through which user can create as well as edit the digital images.
provided by Microsoft Corporation. It provides various Examples of graphic software are Adobe Photoshop, Paint Shop
templates and tools for creating slide. Each slide contain Pro and Microsoft paint. Various applications of graphics are
valuable information related to specific fields. These slides as follows,
are prepared by people of different organizations like school,
colleges, business etc. (a) Paint Program
It allow users to create freehand drawings. The images
Applications of Powerpoint Presentation
are saved in bitmap format so that they can be edited.
The applications of powerpoint presentation are as
follows, (b) Presentation Software
It allows users to create pie charts, graphics, reports, bar
1. Powerpoint presentations are used by the business
organizations to conduct business meetings, to produce charts etc. It depend upon the numerical data that is imported
annual report of the company, to explain about particular from the spread sheet applications.
project etc. The decision makers and analysts mostly use this
2. Powerpoint presentations are used by sales managers software.
to generate report of their sales, to do marketing about (c) CAD Software
specific product etc.
It is used mostly by the architects and engineers for
3. Powerpoint presentations are used in education architectural drawings, landscape plan, product designs etc. It
institutions to create lecture notes, to conduct seminars makes drawing fast and simple.
to students etc.
(d) Animation Software
4. Powerpoint presentations are used in corporate offices
to describe their organizational policies on quality, HR, It is used to simulate the movement by displaying set of
finance etc. images in short span of time.
36 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(e) Illustration, Design or Draw Programs Hardware Requirements to Support Multimedia
These type of programs provide advanced features than Applications
paint to the users. They are used for drawing the curved A computer requires below hardware devices to support
lines and store the images in vector based format. multimedia applications.
(f) Desktop Publishing (a) Multimedia keyboard enables the users to control the
This application provides word processing features. music's volume and side effects.
Users are allowed to create books, advertisements, news (b) An electronic writing pad enables users to provide direct
letters etc. input by writing on it. They are mostly used to extract
3. Multimedia Software signatures from user.
Multimedia software is a combination of text, audio, (c) Mouse is used to draw images.
images, video, animation etc. It can be divided into linear and (d) Printers provide printed copy of the electronic text or
non linear. The linear active content is stable and does not allow image.
user to interact via navigation. Non linear content allows user (e) Microphone is used to record sound into the computer.
to interact through navigation. Multimedia is mostly used in
(f) Speaker is used to extract audio output from the
areas like entertainment, education, advertisement, medicine,
computer.
business etc.
(g) Scanners provide electronic copy of printed text.
Software Requirements for Supporting Multimedia Data
Media Centre PC
Multimedia data can contain audio, video, pictures and
text. The features that are to be supported by the multimedia Computers are used at homes to perform various
enabled computer are as follows, activities and televisions are used for entertainment for watching
movies and shows. Some of the operations of media center PC
(a) Text Styling
are as follows,
Users can apply various fonts, font sizes and other effects
(a) Sending emails
to make the text presentable.
(b) Browsing internet
(b) Text Importing
(c) Playing games
Users can add the existing text to the new document to
save time and money. (d) Capturing, editing and emailing digital photos
(c) Draw and Paint (e) Chatting with friends
Users can create or edit the images through lines, (f) Creating music by mixing the audio files
polygons and circles. (g) Playing, recording and pausing the FM radio shows etc.
(d) Hypertext 4. Database Management Software
Users can navigate the information using this feature, A database is the set of interrelated files in a computer
(e) Clip Art system. Database software is a program that can control the
database structure and even access to the data.
Users can add images to the documents from this library
of pictures. (a) Organization of Database
(f) Software Support A database contains items ranging from smallest to
largest fields, records and files. A field is a unit of data
This feature supports high resolution graphics. containing characters. A record is a set of related fields.
(g) Animation Clips A file is a set of related records.
Users can add existing clips in the multimedia (b) Retrieve and Display
applications from this library of clips. The advantage of database software is that the records
(h) Transition Effects in the file can be found quickly. Any records can be
These effects are rotation, zoon-in, layering, fade-in extracted and displayed on the screen.
using which realistic animations are created. (c) Sort
(i) Voice Recognition Software Using database software, user can change the order of
It is used to match the voice at speaker with the voice records in a file. Records are inputted into a database
in records of database. in the order they occur, such as by the date a person
registered to attend college.
(j) Video Editors
(d) Calculate and Format
Users can edit the video and add special effects to it.
Most of the database programs consists of built-in
(k) Sound Editor mathematical formulas. For example, to find the grade
Users can edit the sound and add special effects to it. point/averages of students secured in different classes.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 37
Computer SCienCe paper-V information teChnologieS-1
Q12. Differentiate between application software and system software.
Answer :
(a) Firmware
Firmware is a software which is contained in a hardware. If the cost is found as more important factor than the performance,
then some of the functions of electronic circuits are implemented by set of instructions and usage of circuits are decreased. Certain
hardware devices contain the software programmed and stored in memory of that particular hardware. This memory will store
program code as well as related data. The devices such as ROM, EPROM or flash memory which are non volatile will store the
firmware.
The firmware is the internal part of the electronic optical drives, routers, scanners, digital cameras, digital watches,
computers and their peripherals, consumer appliances, mobile phones, traffic lights etc. Earlier, the vendors were implementing
only the system software as firmware but now the application programs are also used as firmware. Hence, Usage of firmware in
computer system design is increasing and it is even used as an alternative to the electronic circuits.
(b) Middleware
Middleware is a software that combines two individual applications that are already existing. It acts as an interface be-
tween two applications and also provides the services that are not provided by the operating system. For example, middleware
can provide communication between two separate applications through messaging services. The below diagram depicts the
middleware in computer system.
Storage
OS
Program
Data
In the above figure (2), the main memory were occupied jointly by operating system as well as the other programs i.e.,
the main memory (a resource) is being controlled by both of them. Operating system controls the processor and I/O controllers
to execute the programs and to fetch data from I/O devices.
The facilities (both hardware and software) provided to the user can be viewed in the following hierarchical manner,
Utilities
Programmers
Operating system
As shown in the figure (3), the users of the applications are not concerned with the hardware details instead, a computer
system can be viewed as a collection of applications to the end users. An application-programmer is responsible for developing
applications in some programming language. Some of the system programs called as utilities or utility programs are provided
to the users which assists them in creating programs, managing files and controlling I/O devices. Among the available system
programs, OS is the most important program which hides the hardware details from the programmers by providing a suitable
interface to them.
1. Resource management
2. Process management
3. File management
4. Memory management
6. Security management.
40 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
1. Resource Management 4. Batch Processing System (1960s)
Operating system is also called as resource allocator. A batch processing operating system reads a set of
This is because, it responsible for controlling and separate jobs, each with its own control card. This control card
allocating various hardware resources (CPU, printer, contains information about the task to be performed. Once
etc), and communication resources, CPU time, memory
the job is completed its output is printed. The processing in a
space, file-storage space etc., to users. It also executes
batch system does not involve interaction of user and the job
a user program efficiently.
during its execution. However, in these systems the CPU was
2. Process Management not utilized efficiently due to mismatch in processing speed of
Operating system is also responsible for managing mechanical card reader and electronic computer.
process execution. A multiprogramming operating
system runs multiple processes concurrently. Example
The different types of operating systems are as follows, (i) Singleuser Multitasking Operating System
1. Single-user Operating System The single user multitasking operating system enables
This operating system allows a single user to perform only one user to perform various tasks. It is mostly used in
operation on the computer at a given instance of time. In this desktops and laptops to improve user's productivity in order
type of operating system, a single application rather than multiple to perform multiple tasks at a time. For example, user can do
application can be executed at one time. some work in notepad, listen to music and print a document
2. Multi-user Operating System simultaneously. Examples of it are Microsofts Windows and
Apple's Mac OS platforms.
In contrast to single user operating system, this operating
system enable multiple users to operate the computer simultane- (ii) Multiuser Multitasking Operating System
ously. This operating systems perform efficient utilization of CPU A multiuser operating system allows several users to
by assigning equal amount of time slice to every individual user
access one system on various computers. Several users can
(connected through different terminals).
connect to the main computer and access the same data at a
3. Multi-process Operating System particular time instant. The terminals are used by the users to
In this type of operating system, a single program is pro- access the main system through the network. It is mostly used
cessed by multiple CPUs. This operating system is used basically on main frames.
when batch processing has to be supported. The multi-processing
operating system is oftenly used because it acts as a backup for Example
the existing CPU. Windows
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 41
Computer SCienCe paper-V information teChnologieS-1
6. Time Sharing System (1970s)
Time sharing is considered as multiprogramming systems logical extension. In time sharing system, the user has a separate
program in memory. Each program in time sharing system is given a certain time slot i.e., operating system allocates CPU to any
process for a given time period. This time period is known as “time quantum” or time slice. In Unix OS, the time slice is 1 sec
i.e., CPU is allocated to every program for one sec. Once the time quantum is completed, the CPU is taken away from the program
and it is given to the next waiting program in job pool. Suppose, a program executes I/O operation before 1 sec time quantum,
then the program on its own releases CPU and performs I/O operation. Thus, when the program starts executing, it executes only
for the time quantum period before it finishes or needs to perform I/O operation. Thus, in time sharing any user can share the CPU
simultaneously with other user. The CPU switches rapidly from one user to another giving an impression to each user that the user
has its own CPU whereas, actually only one CPU is shared among many users. Hence, CPU is distributed among all programs.
In a situation where there are more number of jobs that are ready to be inserted into the memory and when there is not
enough memory, a decision made to select the jobs among them. This decision making process is known as “job scheduling”.
Example
Unix
7. Real Time System (1980s)
Real time operating systems are time bounded systems, wherein the system must respond to perform a specific task
within predefined boundary. There are two types of real time system.
(i) Hard Real Time System
In this real time system, actions must be performed on specified time which could otherwise lead to huge losses. It is
widely used in factories and production lines.
Example
In automobile, assembly line welding must be performed on time. This is because, a weld before or after the specific
instance can damage the product.
(ii) Soft Real Time System
In this real-time system, a specified deadline can be missed. This is because, the level of loss is low compared to hard real
time system.
Example
A video game can has voice not synchronized to the movie. This is still undesirable but does not cause huge loss.
8. Distributed System
It is a collection of independent, heterogeneous computer systems which are physically separated but are connected
together via a network to share resources like files, data, devices, etc. The primary focus of distributed system is to provide
transparency while accessing the shared resource i.e., a user should not worry about the location of the data. There are various
advantages of distributed systems like they help in increasing computation speed, functionality, data availability and reliability.
Example
Novell network
9. Virtual Machine
Virtual machine operating system allows various users to use it as their personal computers. In such type of operating
system various OS environment's can be contained in one computer. For example Windows, Linux and Solaris can be contained
in one computer.
(a) Process
Process is the fundamental concept of operating systems structure which is defined as a program under execution
Alternatively, it can also be defined as an active entity that can be assigned to a processor for execution. A process is a
dynamic object that resides in main memory and it includes the current values of the program counter and processor’s
registers. Generally every process contains the following components,
42 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(i) Program code
(ii) Set of data
(iii) Resources and
(iv) Program Status.
Set of Data
Status of Program
figure: process
(b) Process Control Block
The operating system is responsible for process management i.e., it is responsible for allocating the resources, allowing
processes to share and exchange the information, protecting the resources of one process from other processes and even allowing
synchronization between the processes. For this, the operating system will maintain a data structure for every process to depict
the state and resource ownership of that process. PCB is also known as task control block. It contains all the information related
to a process such as given below,
v Process number to identify the process
v Pointers to point to the PCB of processes
v Processe's current state.
v Program counter to store the address of the next executable instruction.
v CPU register's data.
v Flags and switches states.
v Memory range or limit for the processes
v Files opened by the process.
v Process priority
v I/O devices status for the process.
Pointer Process state
Process number
Program counter
CPU registers
Memory allocations
Event information
List of files opened
Blocked
4. New Answer :
A newly created process is one which has not even been There are two basic operations that can be performed
on a process. They are,
loaded in the main memory, though its associated PCB
has been created. 1. Process creation and
5. Exit 2. Process deletion/termination.
P4 P1 P3 P2
0 3 9 16 24
P2 P5 P1 P3 P4
0 1 6 16 18 19
4. Circular Wait The operating system maintains list of free memory parts
multiple partition allocation that are ready to be allocated. The
There exists a list of waiting processes (P0, P1,..., Pn)
memory is scanned for the appropriate hole and allocated to
such that process P0 is waiting for a resource currently
the processes when required. When the process completes its
under the usage by process P1, P1 is waiting for a
execution, the memory is released and added to the list of holes.
resource that is held by P2, P2 is waiting for a resource
Allocation of memory depends on the below three options.
that is held by P3 and so on. Finally, a process Pn is
The hole that matches one of the following is allocated to the
waiting for the resource held by P0.
process,
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 49
Computer SCienCe paper-V information teChnologieS-1
(i) First Fit
The first hole whose size is as big as required by the process will be allocated.
(ii) Best Fit
The hole whose size is small enough as required by the process will be allocated.
(iii) Worst Fit
The hole that is largest of all in the memory will be allocated to the process.
A major drawback of this scheme is memory fragmentation. It occurs when the free memory is broken into small pieces
while allocation and deallocation. These small pieces cannot be used by any process and remain unused.
Example
Consider a situation in which only one process is stored in main memory of the computer.
900
800
600
450
300
P1
100
0
(a) Allocate the memory for the process P2 of size 150K using the first fit technique.
(b) Allocate the memory for process P3 of size 50K using the best fit technique.
(c) Allocate memory for process P4 of size 200Kk using the worst fit technique.
(d) Allocate memory for process P5 of size 300K using any technique.
Solution for these four problems is as follows,
(a)
900
800
600
450
P2
300
P1
100
0
figure: process p2 of Size 150K
(b)
900
800
600
450
P2
300
P1
100
50
P3
0
figure: process p3 of Size 50K
50 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(c)
900
800
P4
600
450
P2
300
P1
100
50
P3
0
figure: process p4 of Size 200K
(d) Even if 300K of memory for P5 is available in the memory, it cannot be allocated because the available memory is
fragmented. It can only be handled by techniques like paging and segmentation.
Q24. Explain the paging concepts.
Answer : Model Paper-I, Q4(b)(ii)
Paging
It is a non-contiguous memory allocation scheme. It divides the physical memory into fixed-sized blocks called as
frames and logical memory into pages. The page and block are of the same size. Hence, one logical page fits exactly in one
physical block.
Each process ‘Pi’ residing on disk is composed of several pages. Whenever ‘Pi’ has to be executed, its pages are brought
into main memory’s frames. There is no restriction of pages being contiguous, they can be fragmented, in main memory. Each
process maintains a table which maps its page numbers to the block numbers they are residing in.
Frame
Process Pi number
Some other
0 pages xyz
1 Pi's page 4
Process Pi Page Frame
No. No. 2 xyz
Page Page
1 2 1 5 3 Pi's page 2
2 3
Page Page
3 6
4 xyz
3 4
4 1 5 Pi's page 1
Disk 6 Pi's page 3
7 xyz
8 xyz
Main memory
figure (1): mapping pages to frames
Paging Implementation
In basic implementation of paging, the physical memory is divided into fixed -sized blocks called frames and logical
memory into pages.
There is a page table available which stores the base address of each page available in main memory and the offset
act as descriptor within the page. The base address is combined with offset to get address of a physical memory location.
The system makes use of a paging table to implement paging. When a process is to be executed, its pages are
loaded into free frames in the physical memory. The information about frame number, where a page is stored is entered
in the page table. During the process execution, CPU generates a logical address that comprises of page number (P) and
offset within the page (d). The page number 'p' is used to index into a page table and fetch corresponding frame number.
The physical address is obtained by combining the frame number with the offset. Logical address consists of page
number and page offset.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 51
Computer SCienCe paper-V information teChnologieS-1
22 bits 10 bits
The lower order bits of a logical address represent page offset and higher order bits represent page number. Max size of
logical address space is 232 bytes i.e., 4 G bytes.
So, the maximum length of a page table of a process = 4 m entries, each entry being 4 bytes. So a page table would
occupy 16 M bytes in RAM.
There is a page table available which stores the base address of each page available in main memory and the offset act
as descriptor within the page. The base address is combined with offset to get address of a physical memory location. The figure (2)
shows the hardware requirement of paging scheme.
Logical address
Page
CPU Offset
Number
Frame
Frame number +
number Physical
address
Main
memory
Page table
R e gi s t e r
Register
Seg table ptr
d S e gm e nt
Segment
Segment table
S e g#
Seg
Length Base
Program M a i n memory
Main m e m or y
S e gm e nt a t i on mechanism
Segmentation m e c ha ni s m
Q27. What are the file operations? Explain them. The basic operations discussed above can be combined
in various ways to create other operations such as appending
Answer : data at the end of file, renaming existing file etc. Before
File Operations performing any of the file operations, it needs to be opened
using open( ) system call. It accepts various mode informations
Users perform many operations on files by using the
in which file has to be opened like read-only, read-write,
system calls provided by operating system. For example,
append mode etc.
create( ), open( ), read( ), write( ), close( ), truncate( ), delete( )
etc. The following are the six basic file operations, Q28. Write short notes on,
(i) File Creation (a) Sequential file organization
When a new file is created by user by calling (b) Relative file organization
respective system call, operating system performs two (c) Indexed sequential file organization.
operations. Firstly, it allocates space for that file and
secondly, it inserts a new entry in the directory table Answer :
for this file. (a) Sequential File Organization
(ii) Writing to a File Sequential file is the most common form of file. In this
To write into a particular file, user must specify the type of file, a fixed format is used for records. All records are
filename and data that has to be written. The operating of same length, consisting of the same number of fixed-length
system searches the directory to find that file, open it fields in a particular order. Because the length and position of
and use a write-pointer to point the location of file. As each field is known, only the values of fields need to be stored,
data is written into the file, the write-pointer is updated the field name and length for each field are attributes of the file
to specify the next write location. structure.
54 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
The first field in each record, is referred to as the key The relative files are used for both random as well as
field. The key field uniquely identifies the record, thus key sequential access.
values for different records are always different. Further, the
records are stored in key sequence, alphabetical order for a text Record Number Records in Memory
key, and numerical order for a numerical key. The sequential
0 Record 0
file organisation is the only one that is easily stored on tape as
well as on a disk. 1 Record 1
The sequential file provides poor performance due to 2 Record 2
the interactive applications that involves queries and updates 3 FREE
of individual records. Access requires the sequential search of
the file for a key match. More efficient search techniques can
be employed, if large amount of the file can be brought into
main memory at once. Nevertheless, considerable processing 30 Record 30
and delays are encountered to access a record in a sequential 31 FREE
file.
figure (b): relative file organization
= 1000 + (2 – 1) * 10
= 1000 +10
= 1010
figure (a): Sequential file organization
An alternative way is to organise the sequential file (c) Indexed Sequential File Organization
physically as a linked list. One or more records are stored in Indexed sequential file organization overcomes the
each physical block. Each block on disk contains a pointer to disadvantages of the sequential file organization. Records being
the next block. The insertion of new records involves pointer the key characteristic of the sequential file are maintained by
manipulation, but does not require the new records which the indexed sequential file and are used to organize in sequence
occupy a particular physical block position. Thus, some added
based on a key field. The two features added are an index to a
convenience is obtained at the cost of additional processing and
file to support random access and an overflow file. The index
overhead.
provides a lookup capability to reach quickly to the limit of a
In this type of sequencing, the physical organisation of desired record. The overflow file is similar to the log file used
the file on tape or disk directly matches the logical organisation with a sequential file.
of the file. In this case, the usual procedure is to place new records
in a separate file, called a log file or transaction file. Periodically, A single level of indexing is the simplest indexed
a batch update is performed that merges the log file with the sequential structure used. A key field which is same in main
master file to produce a new file in correct key sequence. file and the pointer into the main file are the two fields present
into each record of the index file.
(b) Relative File Organization
Relative file organization will provide an efficient Consider an example of a sequential file with one million
method to access separate records. The file records are sorted records, to search for a particular key value with an average of
based on the relative key. The position of the record can be 500,000 record accesses. Now, suppose that an index containing
known by the record number. Number of records are represented 1000 entries is constructed with keys in the index more or
by n where 0 is the first record and n – 1 is the last record. The less evenly distributed over the main file. Now, it will take an
relative files and records are sorted in ascending order. A relative average 500 accesses to the index file, followed by 500 accesses
file is same as a single dimension table stored on the disk. It to the main file, to find the record. The average search length
contains a relative record number as index of table. is reduced from 5000,000 to 1000.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 55
Computer SCienCe paper-V information teChnologieS-1
The indexed sequential file greatly reduces the time required to access a single record without affecting the sequential nature
of the file. To process the entire file sequentially, the records of the main file are processed in sequence until a pointer to the overflow
file is found. Then accessing continues in the overflow file until a null pointer is encountered, at which time-accessing of the main
file is resumed where it was left off.
To provide even greater efficiency in access, multiple levels of indexing can be used. Thus, the lowest level of index file
is treated as a sequential file and a higher level of index file is created for that file.
A computer is connected to several peripheral devices like mouse, printer, keyboard etc. They tend to transmit or receive
the data in terms of characters, blocks either sequentially or randomly. It is the responsibility of the operating system to control and
manage the devices. Every device is accompained by a device driver software using which the operating system communicates
with them.
Operating System
internal assessment
objeCtive type
I. Multiple Choice
1. __________operating systems runs more than one applications. [ ]
4. __________ icon allow users to browse things present within the computer. [ ]
10. In which type of file does a record consists of same number of fixed-length fields? [ ]
2. __________ operating system allow a single user to perform operation on the computer at a given instance of time.
3. A __________ is a software program that replicate itself and infects another files without the knowledge of users.
6. The process of loading the operating system into the systems internal memory is referred as __________.
10. Programmer can view the memory as segments in the concept of __________.
I. Multiple Choice
2. Single user
3. Virus
4. Start icon
5. Window accessories
6. Booting process
7. Real time
8. MS window GUI
9. Starvation
10. Segmentation.
Answer :
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by the
programmers and is converted by the compiler into the language understandable by the computer.
Answer :
The software that helps the user in accomplishing some specific task is referred to as application software. A single
program or a set of programs forms the application software.
Q3. What is system software?
Answer :
A set of programs that is capable of controlling and supporting the computer system and its information processing
activities is called system software.
Q4. Define operating system.
Answer :
An operating system is a software or computer program that controls the computer hardware. It acts as an interface or an
intermediate between the user and hardware.
Answer :
Command interpreter serves as a bridge between user and operating system. It operates upon the commands given by the
user and OS executes them by converting into system calls.
Unit- 1
Short QueStionS
Q14. Give a brief introduction on computer memory. Illustrate the hierarchy of memory.
Unit- 2
Short QueStionS
Q1. What is system software and application software?
Answer : Important Question
(a) Process