Professional Documents
Culture Documents
Information Technology
Information Technology
Random Access Memory (RAM) is used to store the programs and data being used
by the CPU in real-time. The data on the random access memory can be read, written,
and erased any number of times. RAM is a hardware element where the data being
currently used is stored. It is a volatile memory. Types of RAM:
1. Static RAM, or (SRAM) which stores a bit of data using the state of a six
transistor memory cell.
Long life
No need to refresh
Faster
Used as cache memory
Large size
Expensive
High power consumption
2. Dynamic RAM, or (DRAM) which stores a bit data using a pair of transistor
and capacitor which constitute a DRAM memory cell.
Read Only Memory (ROM) is a type of memory where the data has been pre-
recorded. Data stored in ROM is retained even after the computer is turned off ie, non-
volatile. Types of ROM:
1. Programmable ROM, where the data is written after the memory chip has been
created. It is non-volatile.
2. Erasable Programmable ROM, where the data on this non-volatile memory
chip can be erased by exposing it to high-intensity UV light.
3. Electrically Erasable Programmable ROM, where the data on this non-
volatile memory chip can be electrically erased using field electron emission.
4. Mask ROM, in which the data is written during the manufacturing of the
memory chip.
Differences :
which could store the data as which could retain the data
Data retention long as the power is supplied. even when power is turned off.
2 Working type Data stored in RAM can be Data stored in ROM can only
5 Size,
Capacity and Large size with higher Small size with less capacity
CPU The CPU can access the data data stored on it unless the data
This unit can store instructions, data, and intermediate results. This unit supplies
information to other units of the computer when needed. It is also known as internal
storage unit or the main memory or the primary storage or Random Access Memory
(RAM).
Its size affects speed, power, and capability. Primary memory and secondary memory
are two types of memories in the computer. Functions of the memory unit are −
It stores all the data and the instructions required for processing.
It stores intermediate results of processing.
It stores the final results of processing before these results are released to an
output device.
All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry out
any actual data processing operations.
Functions of this unit are −
It is responsible for controlling the transfer of data and instructions among
other units of a computer.
It manages and coordinates all the units of the computer.
It obtains the instructions from the memory, interprets them, and directs the
operation of the computer.
It communicates with Input/Output devices for transfer of data or results from
storage.
It does not process or store data.
Arithmetic Section
Logic Section
Arithmetic Section
Logic Section
Impact Printers: The printers that print the characters by striking against the ribbon
and onto the paper are called impact printers. Exp. Dot Matrix Printer (DMP)
Daisy Wheel
Non-Impact Printers: The printers that print the characters by striking against the
ribbon and onto the paper are called impact printers. Exp. Laser Printers, Inkjet
Printers
Programming Languages,
An operating system is software which performs all the basic tasks like file
management, memory management, process management, handling input and output,
and controlling peripheral devices such as disk drives and printers. It is an interface
between computer user and computer hardware.
Functions of Operating System are
1. Security: The operating system uses password protection to protect user data and
similar other techniques. It also prevents unauthorized access to programs and
user data.
3. Job accounting: It keeps track of time and resources used by various tasks and
users, this information can be used to track resource usage for a particular user or
group of user.
An Operating System performs all the basic tasks like managing file, process, and
memory. Thus operating system acts as manager of all the resources, i.e. resource
manager. Thus operating system becomes an interface between user and machine.
A real-time system is defined as a data processing system in which the time interval
required to process and respond to inputs is so small that it controls the environment.
The time taken by the system to respond to an input and display of required updated
information is termed as the response time. So in this method, the response time is
very less as compared to online processing.
Real-time systems are used when there are rigid time requirements on the operation
of a processor or the flow of data and real-time systems can be used as a control
device in a dedicated application. A real-time operating system must have well-
defined, fixed time constraints, otherwise the system will fail. For example, Scientific
experiments, medical imaging systems, industrial control systems, weapon systems,
robots, air traffic control systems, etc.
There are two types of real-time operating systems.
A Single-User Operating System is a system in which only one user can access the
computer system at a time.
A Multi-User Operating System is a system that allows more than one user to
access a computer system at one time.
The difference between single user operating system and multi user operating system
are given below:
CHARACTERISTIC SINGLE-USER MULTI-USER
S OPERATING SYSTEM OPERATING SYSTEM
A Multi-User Operating
A Single-User Operating
System is a system that
System is a system in which
Definition allows more than one user to
only one user can access the
access a computer system at
computer system at a time.
one time.
A super user gets all the Super user does not exist
powers of maintaining the when it comes to a multi-
Super User system and making changes user operating system as
to ensure the system runs each entity has control over
smoothly. their working.
System Software is the type of software which is the interface between application
software and system. In general they are developed in low level language which is
more compatible with the system hardware in order to interact with. It is used for
operating computer hardware. They are installed on the computer when operating
system is installed. System software are specific to system hardware so less or no user
interaction available in case of system software. System software can run
independently. It provides platform for running application software. Some examples
of system software’s are compiler, assembler, debugger, driver, etc
Application Software:
Application Software is the type of software which runs as per user request. It runs on
the platform which is providing by system software. For Application software, high
level language is used for their development as they are developed as some specific
purpose software. It is used by user to perform specific task. They are installed
according to user’s requirements. The user can interacts with it as user interface is
available in this case. They can’t run independently without the presence of system
software. Examples are word processor, web browser, media player, etc.
The rate at which data are moved across a communications channel is called data
transmission speed. Bandwidth, data transfer rate, data rate, or
connection speed, it refers to the amount of digital data exchanged between two
devices via a specific channel in a given period. Network speed is generally
measured in bits per second (bit/s).
A client is a computer hardware device or software that accesses a service made
available by a server. The server is often (but not always) located on a separate
physical computer.
In data communications, a terminal is any device that terminates one end (sender
or receiver) of a communicated
Simplex
In simplex transmission mode, the communication between sender and receiver occurs
in only one direction. Example: Keyboard and monitor.
Half Duplex
The communication between sender and receiver occurs in both directions in half
duplex transmission, but only one at a time. The sender and receiver can both send
and receive the information, but only one is allowed to send at any given time. For
example, a walkie-talkie, both speakers can communicate, but they have to take turns.
Full Duplex
In full duplex transmission mode, the communication between sender and receiver can
occur simultaneously. The sender and receiver can both transmit and receive at the
same time. For example, using a telephone, both speakers can communicate at the
same time.
The full duplex transmission mode offers the best performance among the three, on
account of the fact that it maximises the amount of bandwidth available.
KEY DIFFERENCES:
1. Bus topology
2. Star topology
3. Ring topology
4. Mesh topology
5. Hybrid topology
6. Tree topology
Linear Bus Topology: In the linear bus topology, all the nodes are connected to the
single backbone or bus with some medium such as twisted pair, coaxial cable etc.
It is cost effective.
The Cable length required is the least in comparison to other topologies.
The working of this topology is easy to understand.
Expansion can be done easily by linking the cables together.
Star Topology: All hosts in Star topology are connected to a central device, known as
hub device, using a point-to-point connection. That is, there exists a point to point
connection between hosts and hub.
Ring Topology: In ring topology, each host machine connects to exactly two other
machines, creating a circular network structure. When one host tries to communicate
or send message to a host which is not adjacent to it, the data travels through all
intermediate hosts.
The network is not affected by numerous nodes or heavy traffic, as only the
nodes possessing tokens can transfer data.
Ring topology has cheap installation and expansion.
Every connection has the ability to carry its particular data load.
Mesh Topology is very robust.
It is easy to diagnose faults.
Mesh Topology provides with privacy and security.
TREE TOPOLOGY:
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently. This topology imitates as extended Star topology and
inherits properties of bus topology.
It is profoundly cabled.
It is expensive when compared to other topologies.
If the root node collapses, the network will also collapse.4
Advantage:
More secure
Provides high speed
Used for shorter distances
Disadvantage :
Coaxial Cable
(ii) Coaxial Cable –
It has an outer plastic covering containing 2 parallel conductors each having a separate
insulated protection cover. Coaxial cable transmits information in two modes:
Baseband mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is
split into separate ranges). Cable TVs and analog television networks widely use
Coaxial cables.
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Advantages:
1. Carries signals of higher data rate and bandwidth.
2. Easy to install and expand, inexpensive
3. Better noise immunity
Disadvantages:
1. The network depends on a single cable.
2. Expensive and difficult to install when compared with twisted pair.
Application:
Used in analog telephone networks, could carry 10,000 voice signals.
Used in analog telephone networks and Cable TV networks.
TYPES OF NETWORK
Definition LAN stands for MAN stands for WAN stands for
1 Local Area Metropolitan Area Wide Area Network.
Network. Network.
Congestion LAN has low MAN has higher WAN has higher
5 congestion as congestion than congestion than both
compared to WAN. LAN. MAN and LAN.
OSI model is a generic model that is based upon functionalities of each layer.
TCP/IP model is a protocol-oriented standard.
OSI model distinguishes the three concepts, namely, services, interfaces, and
protocols. TCP/IP does not have a clear distinction between these three.
OSI model gives guidelines on how communication needs to be done, while
TCP/IP protocols layout standards on which the Internet was developed. So,
TCP/IP is a more practical model.
In OSI, the model was developed first and then the protocols in each layer were
developed. In the TCP/IP suite, the protocols were developed first and then the
model was developed.
The OSI has seven layers while the TCP/IP has four layers.
Unit – 5 (10 L)
Some Internet Applications: Introduction, E-mail, Information Browsing
Service, The World Wide Web, Information Retrieval from the World Wide
Web, Other Facilities Provided by Browsers, Audio on the Internet, Pictures,
Animation and Video via Internet
Societal Impacts of Information Technology: Introduction, Privacy, Security and
Integrity of Information, Disaster Recovery, Intellectual Property Rights,
Careers in Information Technology