You are on page 1of 166

Terms & Conditions for Buying the Online Soft Copy

• The User must Read & Accept the Terms and Conditions (T&C) carefully before clicking on the
accept option for Buying the Online Soft Copy of E-books / Assignment Solution Guides /
Sample Question Papers (Question Bank) / Projects etc. based on IGNOU and other Universities
/ Boards / Institutes. Under this Particular Facility you may buy only the Online Soft Copy of E-
books / Assignment Solution Guides / Sample Question Papers (Question Bank) / Projects
based on IGNOU and other Universities / Boards / Institutes, no Hard Copy or Printed Copy
shall be provided under this facility.
• The products which are for Online Reading i.e. E-Books, Sample Papers, Projects etc. are valid
for 365 days only (From the Date of Purchase) and no kind of Downloading, Printing, Copying
etc. are allowed in this facility as these products are just for Online Reading and References in
your Mobile / Tablet / Computers.
• The Downloading facility may only be available for purchase made regarding Assignment
Solution Guide (Solved Assignment) on a Special Request under special scheme offered by
studybadshah.com time to time and all the other purchases made are just for Online Reading
and no kind of Downloading, Printing, Copying etc. are allowed in this facility as these products
are just for Online Reading and References in your Mobile / Tablet / Computers.
• All the online soft copy products E-books / Assignment Solution Guides / Sample Question
Papers (Question Bank) / Projects etc. given in this website shall contain a diffused watermark
on nearly every page to protect the material from being pirated / copy / misused etc.
• In these E-books / Assignment Solution Guides / Sample Question Papers (Question Bank) /
Projects based on IGNOU and other Universities / Boards, Solutions of Only the Selected
Questions are provided, the answers of all the Questions are not Provided.
• In these E-Books / Sample Assignment Solution Guides / Sample Question Papers (Question
Bank) / Projects based on IGNOU and other Universities / Boards / Institutes, only Minimum
Requirement of the Assignments Questions / Sample Papers have been answered, Like if 5
Questions are given and it has been asked that Answer any 3 out of them, then only 3 selected
questions answers shall be given, each & every question shall not been answered.
• This is a Chargeable Facility / Provision to Buy the Online Soft Copy of E-books / Assignment
Solution Guides / Sample Question Papers (Question Bank) / Projects based on IGNOU and
other Universities / Boards / Institutes available online through our Website Which a Subscriber
/ Buyer may Read Online (whichever facility is offered by the website time to time) on his or her
Mobile / Tablet / Computer. The E-books / Assignment Solution Guides / Sample Question
Papers (Question Bank) / Projects based on IGNOU and other Universities / Boards and their
answer given in these Soft Copy provides you just the approximate pattern of the actual
Answer. However, the actual Content / Study Material / Assignments / Question Papers /
Projects might somewhat vary in its contents, distribution of marks and their level of difficulty.
• These Sample Answers/Solutions are prepared by the author for the help, guidance and
reference of the student to get an idea of how he/she can answer the questions. Sample
answers may be Seen as the Guide/Reference Material only. Neither the publisher nor the
author or seller will be responsible for any damage or loss due to any mistake, error or
discrepancy as we do not claim the Accuracy of these solution / Answers. Any Omission or
Error is highly regretted though every care has been taken while preparing these Sample
Answers/Solutions. Any mistake, error or discrepancy noted may be brought to the publishers
notice which shall be taken care of in the next edition. Please consult your Teacher/Tutor or
refer to the prescribed & recommended study material of the university / board / institute /
Govt of India Publication or notification if you have any doubts or confusions before you
appear in the exam or Prepare your Assignments before submitting to the
University/Board/Institute.
• Study Badshah shall remain the custodian of the Contents right / Copy Right of the Content of
these reference E-books / Assignment Solution Guides / Sample Question Papers (Question
Bank) / Projects based on IGNOU and other Universities / Boards / Institutes given / being
offered at the website www.studybadshah.com.
• The User agrees Not to reproduce, duplicate, copy, sell, resell or exploit for any commercial
purposes, any portion of these Services / Facilities, use of the Service / Facility, or access to the
Service / Facility.
• The Price of these E-books / Assignment Solution Guides / Sample Question Papers (Question
Bank) / Projects based on IGNOU and other Universities / Boards may be Revised / Changed
without any Prior Notice.
• The time duration of providing this online reading facility of 365 days may be alter or change
by studybadshah.com without any Prior Notice.
• The Right to accept the order or reject the order of any E-books / Assignment Solution Guides
/ Sample Question Papers (Question Bank) / Projects made by any customer is reserved with
www.studybadshah.com only.
• All material prewritten or custom written is intended for the sole purpose of research and
exemplary purposes only. We encourage you to use our material as a research and study aid
only. Plagiarism is a crime, and we condone such behaviour. Please use our material
responsibly.
• In any Dispute What so ever Maximum Anyone can Claim is the Cost of a particular E-book /
Assignment Solution Guides / Sample Question Papers (Question Bank) / Projects based on
IGNOU and other Universities / Boards which he had paid to Study Badshah company /
website.
• If In case any Reader/Student has paid for any E-Book/ Sample Papers/ Project / Assignment
etc and is unable to Access the same at our Website for Online Reading Due to any Technical
Error/ Web Admin Issue / Server Blockage at our Website www.studybadshah.com then He will
be send a New Link for that Particular E-Book/ Sample Papers/ Project / Assignment to Access
the same and if Still the Issue is Not Resolved Because of Technical Error/ Web Admin Issue /
Server Blockage at our website then His Amount for that Particular Purchase will be refunded
by our website via PayTM.
• All the Terms, Matters & Disputes are Subjected to "Delhi" Jurisdiction Only.
www.neerajbooks.com

COMPUTER BASICS
AND PC SOFTWARE

1
BASICS OF COMPUTER HARDWARE

Computer–their Origin and Applications


or to perform lengthy calculations in seconds. In
order to count large numbers various systems of
With the advent of Information and
numeration were generated, such as:

Neeraj
Communication Technology (ICT) use of
computer has increased in every phase of our life. Babylonian System of Numeration,
A computer is a programmable machine that Greek System of Numeration,
Roman System of Numeration, and
receives input, stores and manipulates data, and
Indian System of Numeration (decimal
provides output in a useful format. Basically
system of numeration 0-9).

Publications
computers were meant to ‘compute’, to perform
But we should be proud to know that our
large calculations in seconds with accuracy. But
Indian System of Numeration has been accepted
now the machine is doing wonders. Gone are the
universally.
days when computers were used only to calculate
1. Abacus: Since civilizations began, many
www.neerajbooks.com
or compute, now you can hardly find any area
untouched by the use of computer. We can see that
of the advances made by science and technology
have depended upon the ability to process large
computers are replacing the manual style of amounts of data and perform complex
working. Keeping in view the overwhelming use mathematical calculations. For thousands of
of computer in almost every field such as banking, years, mathematicians, scientists and business-
railways, commerce, book keeping, ticketing, men have searched for computing machines that
billing, education, etc. It becomes a necessity to could perform calculations and analyze data
get familiar with computer. quickly and efficiently. One such device was the
This chapter will introduce you to the origin abacus. The literal meaning of Abacus is the
of computer, computer generations, computer calculating board. The Chinese hold the credit of
system, its components, integrated circuits, inventing ‘abacus’.
operating system, current applications of computer The abacus can be thought of a counting frame,
and limitations of computers. with vertical wires, with seven beads on each wire.
A horizontal divider separates the top two beads
from the bottom five, sometimes referred to as the
ORIGIN OF COMPUTERS heaven and the earth beads. The user manipulates
Initially, computers were invented to compute, the beads by using the principle of positional
and the basic role of computers was to calculate, weight of beads on a rack.

www.neerajbooks.com
www.neerajbooks.com

2 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Image of Abacus

2. Napier’s Bones: Napier’s Bone is a device invented in 1617 A. D. by John Napier, a mathematician.
He invented the logarithms to reduce any multiplication problem.

Publications
www.neerajbooks.com

Image of Napier’s bones

3. Slide Rule: Slide rule, is a mechanical analog computer. It was developed by English mathematician
E. Gunter. The slide rule is used primarily for multiplication and division, and also for functions such as
roots, logarithms and trigonometry, but it is not normally used for addition or subtraction.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 3

Neeraj Image of Slide Rule

4. Pascal’s Calculator: The credit of building calculator goes to Blaise Pascal, a French
mathematician and scientist. The machine was also called Pascaline, it could add and subtract directly

Publications
and multiply and divide by repetition.

From Computer Desktop Encyclopedia


Reproduced with permission.

www.neerajbooks.com @ 2001 The Computer Museum History Center

Pascal’s Calculator

5. Leibniz’s Multiplication and Dividing Machine: German mathematician Gottfried Wilhelm Leibniz
invented a digital calculator around 1672 which was called the step reckoner. It was the first calculator that
could perform all four arithmetic operations: addition, subtraction, multiplication and division.

www.neerajbooks.com
www.neerajbooks.com

4 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

StepReckoner

6. Difference Engine: Charles Babbage, an 7. The Analytical Engine: Due to some

Neeraj
English mathematics professor told that all the reasons Babbage left working on Difference
mathematical operations, even the most complexed Engine and he started working on Analytical
ones, can be broken down into simple operations. Engine which was even closer to the concept of
This concept could be used to make it able to be today’s computers. Because it was a proposed
carried out by a machine in loop. This machine

Publications
mechanical general-purpose computer. It had an
used the decimal number system and was powered arithmetical unit, control flow in the form of
by cranking a handle. It could be called the first
conditional branching and loops, and an integrated
step towards the creation of computers. That is
memory.
why he is called as the Father of the Computers.
www.neerajbooks.com

Analytical Engine

8. Mechanical and Electrical Calculator:


Calculators are very popular device for arithmetic
Difference Engine calculation. Calculators were developed in the 19th

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 5

century. The mechanical calculator was developed First Generation Computers: Vacuum
first and later on the rotating part of mechanical Tubes (1940-1956): The technology behind the
calculator was replaced by electric motor. That kind First generation computers was a fragile glass
of calculators were called electrical calculator. device, which was called vacuum tubes. These
9. Modern Electronic Calculator: The computers were very heavy and very large in size.
electronic calculators were succeeded by modern These were not very reliable and programming on
electronic calculator. An electronic calculator is a them was a very tedious task as they used high
small, portable, usually inexpensive electronic level programming language and used no operating
device used to perform the basic operations of system. First generation computers were used for
arithmetic. It has a keypad representing digits and calculation, storage and control purpose. They
mathematical operations. Some calculators can were too bulky and big that they needed a full room
also store some numbers temporarily and and consume lot of electricity. Main first
permanently. generation computers are:
ENIAC: Electronic Numerical Integrator and
Computer, built by J. Presper Eckert and John V.
Mauchly was a general purpose computer. It was
very heavy, large and contained 18,000 vacuum

Neeraj tubes.
EDVAC: Electronic Discrete Variable
Automatic Computer was designed by Von
Neumann. It could store data as well as instruction

Publications
and thus the speed was enhanced.
UNIVAC: Universal Automatic Computer
wer e devel ope d in 195 2 by E cker t an d
Mauchly.
www.neerajbooks.com
COMPUTER GENERATIONS
The modern computer took its shape with the
Second Generation Computers: Transistors
(1956-1963): Second generation computers used
advent of time. It was around 16th century when the technology of transistors instead of bulky
the evolution of computer started. The initial vacuum tubes. Another feature was the magnetic
computer faced many changes, obviously for the core storage. Transistor is a device composed of
betterment. It continuously improved itself in terms semiconductor material that amplifies a signal or
of speed, accuracy, size, and cost to get the shape opens or closes a circuit. Transistors were invented
of the modern day computer. This long period can in Bell Labs. Use of transistors made it possible
be conveniently divided into the following phases to perform powerfully and with due speed. It
called computer generations: reduced the size and cost and thankfully the heat
1. First Generation Computers (1940-1956) too, which was generated by vacuum tubes. Central
2. Second Generation Computers (1956-1963) Processing Unit (CPU), memory, programming
3. Third Generation Computers (1964-1971) language and input and output units were also came
4. Fourth Generation Computers (1971- into the force in the second generation.
Present) Programming language was shifted from high level
5. Fifth Generation Computers (Present and to assembly language and made programming
Beyond) comparatively an easy task for programmers.

www.neerajbooks.com
www.neerajbooks.com

6 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Languages used for programming in this era were multiprocessing, multiprogramming, time-
FORTRAN (1956), ALGOL (1958) and COBOL sharing, operating speed, and virtual storage made
(1959). it more user friendly and common device. The
Examples: PDP-8, IBM1400 series, IBM concept of personal computer and computer
1620, IBM 7090, CDC 3600 networks came into being in the fourth
Third Generation Computers: Integrated generation.
Circuits (1964-1971): During the third Examples: Apple II, Alter 8800
generation, technology envisaged a shift from Fifth Generation Computers (Till now):
huge transistors to integrated circuits, also known The technology behind the fifth generation
as ICs. Here a number of transistors were placed computers is of artificial intelligence. It allows
on silicon chips, called semiconductors. The main the computers to behave like humans. It can be
feature of this era’s computer was the speed and seen in programmes like voice recognition, area
reliability. ICs were made of silicon and also of medicines and entertainment. In the field of
called the silicon chips. A single IC, has many games playing also it has shown remarkable
transistors, registers and capacitors built on a performance where computers are capable of
single thin slice of silicon. The cost size were beating human competitors. The speed is highest,

Neeraj
reduced and memory space and working size is the smallest and area of use has remarkably
efficiency was increased in this generation. increased in the fifth generation computers.
Programming was now done in Higher level Though not hundred per cent artificial
language such as BASIC (Beginners All purpose intelligence has been achieved till date but
Symbolic Instruction Code). Mini computers find keeping in view the current developments, it can

Publications
their shape in this era. be said that this dream will also become a reality
Examples: NCR 395, B6500, IBM 360,370 very soon.
Fourth Generation Computers: Micro- In order to summarize the features of
processors (1971-Present): In 1971 First micro- various generations of computers it can be said
www.neerajbooks.com
processors were used, large scale of integration that a gigantic improvement has been seen as
LSI circuits built on a single silicon chip called far as the speed and accuracy of functioning is
microprocessors. The main advantage of this concerned, but if we talk about the size, it is
technology is that a single microprocessor can being small over the years. The cost is also
contain all the circuits required to perform diminis hing and reli ability is of course
arithmetic, logic and control functions on a single increasing. The first generation computers used
chip. The computers using microchips were called the technology of vacuum tubes, which has
microcomputers. This generation provided even been replaced by transistors in the second
smaller size of computers with larger capacities. generation and integrated circuits in the third.
That is not enough, after that Very Large Scale The fourth generation envisaged the use of
Integrated (VLSI) circuits replaced LSI circuits. microprocessors and now is the era of artificial
The Intel 4004chip, developed in 1971, located intelligence.
all the components of the computer – from the COMPUTER SYSTEM
central processing unit and memory to input/ Before understating the concept of computer
output controls on a single chip and allowed the system, let us understand the meaning of the word
size to reduced drastically. Technologies such as ‘system’. A system is a collection of various units

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 7

or parts functioning collectively to perform a networked computers, etc. The raw data is then
particular task or to achieve a common aim. Each processed by performing the desired operations on
unit has its own share of work which is to be done it and then the processed result is given out in the
in union of other units. In a computer system too, desired way.
there are a series of devices that together operate 2. Storage: Computer as a machine has gain
or function as a computer system. advantage over other similar devices for one of its
How Computers Work? distinct feature called storage. Storage means the
Computer works by performing the process of saving data into its memory for future
following major functions: retrieval. Computer uses temporary as well as
1. Input: As the name suggests it is related to permanent storage processes. Temporary storage
feeding the data into the computer. It takes the raw process stores the entered data before and after
data as input, which can be in form of numbers, being actually processed thus helps to enhance the
alphabets, characters, sounds, etc. For input there CPU speed. On the other hand, permanent data
are a number of devices used such as keyboard, storage processes help to retrieve and edit the data
mouse, joystick, scanner, webcam, disks, as and when required in the future.

Neeraj
Publications
www.neerajbooks.com

3. Processing: Processing in the computer of performing arithmetic and logical operations lies
terminology means performing arithmetic and logical with ALU.
operations on the data being input. The operations 4. Output: The data after being processed by
are performed according to the instructions received. the desired operations yields some result which is
Data and instructions are received by the CPU from called the output. Output devices such as monitor
the storage unit and and it is sent back to the storage or printer are mainly used for this purpose.
unit after being processed. Until then Random Access Computer provides an option to store this output
Memory holds the information temporarily. The task for future reference too.

www.neerajbooks.com
www.neerajbooks.com

8 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Operational Unit: As is already explained


computer is a system, various tasks to be performed
by it are divided among its various operational
units. These are:
1. Arithmetic and Logical Unit
2. Control Unit, and
3. Central Processing Unit.
1. Arithmetic and Logical Unit (ALU): The
data entered for processing is stored in the primary
storage units and processed by the arithmetic and
CPU
logical unit for operations relation to arithmetic like
addition, subtraction, multiplication, division and System Unit: There are a number of parts
other operations of higher level, and the logical unit which make up a computer system. Such as:
performs the logical operations like true/false, loops, (a) Ports and Connectors: Computer has
comparison, etc. This unit actually carries out the many devices and peripherals attached to it. In
order to communicate with each of this, the system

Neeraj
execution of the instructions. Once the data has been
processed it is returned to storage devices for further is required to be attached to each other. This
functions. function is performed by the ports and connectors.
2. Control Unit (CU): Control Unit, as the These attach the components to each other or to
the motherboard.
name suggests, controls the functioning of other

Publications
units. The control unit is the circuit that controls
the flow of information through the processor, and PS/2 Keyboard PS/2 Mouse
Connector Connector
coordinates the activities of the other units within
it. It is also called the “brain within the brain
www.neerajbooks.com
(CPU)” because it controls what happens inside
USB Ports

Serial Communications
the processor, which in turn controls the rest of Port
the PC. The control unit maintains order within Parallel
Port
the computer system and directs the flow of traffic
VGA Port
(operations) and data.
3. Central Processing Unit (CPU): CPU
plays the role of the brain of the computer. Without Gigabit
RJ-45
the CPU, there is no use of computer. AMD, IBM, Audio Out Jack Ethernet
Microphone Jack
Intel, Motorola, SGI and Sun are just a few of the Line in Jack
LAN Port

companies that make most of the CPU’s used for


Ports and Connectors
various kinds of computers including home desktops,
office computers, mainframes and supercomputers. (b) Power Supply: As the name suggests the
Computer CPU’s (processors) are composed of thin power supply is used to supply power to various
layers of thousands of transistors. Actually the ALU components of the computer. It resides inside the
and the CU of a computer system are jointly known CPU. This is a protection device. Its main function
as CPU. is to convert AC input of 230 volts into DC output

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 9

of 5 and 12 volts. Power supply is also called Switched Mode Power Supply (SMPS). Its main function
is to supply the required amount of voltage to all other units. When we switch on or off the system, we
are actually switching on or off the power supply of the system.

Neeraj
(c) Motherboard: The motherboard contains the most important circuit of a microcomputer. That
is why it is also called the main board. As a mother connects all the family members, the motherboard

Publications
connects all the components of a system.

www.neerajbooks.com

Von Neumann Architecture: The computer architecture which is currently used is given by the
great Mathematician John Von Neumann. He designed a model which has Central Processing Unit
(CPU). Memory is being used to store both the data and the instruction. Today almost all the computers
use this architecture which contains the following:
1. Control Unit 2. Arithmetic Logic Unit
3. Memory 4. Input and Output Unit

www.neerajbooks.com
www.neerajbooks.com

10 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Von Neumann Architecture

Classification of Computers: Today one can they can do when compared to the larger models
see various types of computers available in the discussed below because they can only be used by
market. These are available in variety of sizes, one person at a time, they are slower and can store

Publications
weights and capacities. This variety is available less information than the larger computers, but they
to satisfy variety of functions. If you are going to are excellent when used in small businesses, homes
purchase a personal computer you will look for and school classrooms. These computers are easy
different type and if you want it to be used in a to use. They have become an indispensable part of
www.neerajbooks.com
MNC it will have the different configuration.
Computers can be classified on the basis of
modern life.
2. Minicomputers: Minicomputers are
capacity, which means the data processing smaller than mainframe computers and they are
capacity. also much less expensive. They possess most of
The performance of the computer relies on: the features found on mainframe computers, but
Its data storage capacity, speed capacity, number on a more limited scale. They can still have many
of peripherals, software used by it. The computers terminals, and have storage capacity but not as
can be classified in many ways. The following much as the mainframes. Medium and small
classification is based on size: businesses typically use these computers.
1. Microcomputers: Microcomputers, most Minicomputer lies between the mainframe (multi-
commonly known as personal computers, PCs are user system) and micro computers (Single user
an outproduct of the mass production of silicon system). The speed and storage capacity is more
chips, which made it easier to produce small and than microcomputers.
relatively less expensive machines for personal use. 3. Medium-size Computers: Medium size
These computers are usually divided into desktop computers are better on bases of speed and
models and laptop models. They are limited in what storage as compared to small computers.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 11

4. Large Computers: These are better than These terminals look like small computers but they
the medium size computers when compared on are only devices used to send and receive
the basis of speed and variability. The large information from the actual computer using wires.
computers provide a variety from single- Terminals can be located in the same room with the
processing configurations to nationwide mainframe computer, but they can also be in
computer based networks involving general large different rooms, buildings, or cities. Large
computers. These computers are able to perform businesses, government agencies, and universities
actions in incredible nanoseconds. usually use this type of computer.
5. Mainframe Computers: Mainframes (often 6. Supercomputers: Supercomputers are the
colloquially referred to as Big Iron) are powerful supreme of the computers and are biggest of all
computers used mainly by large organizations for the types. These are used for highly calculation
critical applications, typically bulk data processing intensive tasks such as weather forecasting. A
such as census, industry and consumer statistics, supercomputer is typically used for scientific and
enterprise resource planning, and financial engineering applications that must handle very
transaction processing. Mainframe computers are large databases or do a great amount of
very large, often filling an entire room. They can computation (or both). India’s Center for
store enormous of information, can perform many Development of Advanced Computing (C-DAC)

Neeraj
tasks at the same time, can communicate with many
users at the same time, and are very expensive. The
price of a mainframe computer frequently runs into
the millions of dollars. Mainframe computers
developed a supercomputer PARAM and its
processing speed is up to 1 trillions instructions
per second.
Examples: IBM Blue Gene/L, IBM

Publications
usually have many terminals connected to them. Roadrunner, etc.

www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

12 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Classification by Technology: On the basis Hybrid Computers: Hybrid computers are


of technology, computers can be divided in the computers that are intermediate device which
following categories: exhibit features of analog computers and digital
Analog Computers: An analog computer is computers. The digital component normally serves
a mechanical, electrical, or electronic computer as the controller and provides logical operations,
that performs arithmetical operations by using while the analog component normally serves as a
some variable physical quantity, such as solver of differential equations. Because of their
mechanical movement or voltage, to represent ease of use and because of technological
numbers. It can be used to solve various types of breakthroughs in digital computers in the early 70s,
problems. It solves them in an “analogous” way the analog-digital hybrids were replacing the
means in a similar fashion. Most general purpose analog-only systems.
analog computers use an active electrical circuit INTEGRATED CIRCUITS
as the analogous system because it has no moving Integrated Circuit (IC) is an electronic circuit
parts, a high speed of operation, good accuracy containing a large number of transistors and
and a high degree of versatility. resistors on it. The microprocessor is a fine
It is used in solving problems in relationship example of an integrated circuit. ICs are also

Neeraj
of changing variable quantities. The analog known as chips or microchips. Integrated circuits
system is set up according to initial conditions are used in virtually all electronic equipment
and then allowed to change freely. Analog today and have revolutionized the world of
computers are especially well suited to simulating electronics, electrical, etc.

Publications
dynamic systems; such simulations may be
conducted in real time or at greatly accelerated
rates, allowing experimentation by performing
many runs with different variables. They have
www.neerajbooks.com
been widely used in simulating the operation of
aircraft, nuclear power plants, and industrial
chemical processes.
Digital Computers: Digital computer is a Integrated Circuit
computer that performs calculations and logical Electronic Circuits: An electronic circuit is
operations with quantities represented as digits, a composition of various individual electronic
usually in the binary number system. It is a components, such as resistors, transistors,
machine that specializes in counting. It is an capacitors, inductors and diodes, connected by
electronic computer in which the input is discrete conductive wires. The combination of components
rather than continuous, consisting of and wires allows various simple and complex
combinations of numbers, letters, and other operations. Such as computation, data travel,
characters written in an appropriate programming amplification of signals, etc.
language and represented internally in binary Function of its various components:
notation. Digital computers are famous for Transistor: The transistor acts like a switch
accurate data processing, speed, easy data which can turn electricity on or off. For example,
storage, high capacity, etc. it is used to store information in computers.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 13

Resistors: The resistors are used to control boot and function properly. An operating system
the amount of current that is allowed to pass. is a type of system software.
Capacitor: The function of a capacitor is to An operating system is a set of programmes
collect the electricity to release it in one go. which acts as an interface between the user and
Diode: Diode is used to allow an electric the machine. It helps the computer to understand
current to pass in one direction and blocking the commands provided by the user. Thus, it
current in the opposite direction at the same creates a communication bridge between the user
time. and the computer. It provides the platform to run
The Transistor vs. the Vacuum Tube: the software. Some parts of the OS are stored in
History of computers envisaged the shift from the RAM while the rest is stored in secondary
use of vacuum tubes to the use of transistor. memory like hard disk. It is the first programme
Though function of both was to switch electricity which runs when the system is turned on. The
on or off, or amplify a current. Still transistors process is called Booting up. In this the system
became more popular than vacuum tubes. There checks for all necessary hardware and software
are some reasons behind it which are described as components which are necessary for running the
under: system and displays an error message if some

Neeraj
1. The vacuum tubes were very heavy and problem is there.
used to occupy a large space. Some of the most common Operating Systems
are:
2. The vacuum tubes used to generate a lot of
Disk Operating System (DOS) by
heat and was very expensive as compared

Publications
Microsoft
to the transistors.
Windows (various versions) by Microsoft
3. The vacuum tubes are very slow processing Windows NT by Microsoft
in comparison to the transistors. IBM OS 2.
www.neerajbooks.com
4. The vacuum tubes used to consume a lot
of electric power whereas transistors
CURRENT APPLICATIONS OF
COMPUTERS
helped to overcome this disadvantage. As has been mentioned earlier computers are
5. As far as reliability is concerned transistors being used now-a-days in almost every industry,
are far better than the vacuum tubes. Some major applications of computers are
So after the invention of the transistors in 1947 elaborated as under:
engineers preferred it over vacuum tubes. 1. Education: There are a variety of uses of
OPERATING SYSTEM computer in education. Teachers are using
Apart from the computer hardware, multimedia and variety of software to make the
computer needs the software to function. instructions easy and understandable. For
Software is a set of programmes written by example, in order to teach about aquatic animals,
professi onal programmers to perform a the teacher can use computers to present a
particular task or tasks. There are mainly two documentary on this topic in the lab or classroom
types of software: System software and with sound effects, it will yield far better results
Application software. System software is in comparison to traditional lecture method.
software which is necessary for the system to Computer aided software are also helping in

www.neerajbooks.com
www.neerajbooks.com

14 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

teaching skills through simulation and help in such a huge clientage it becomes necessary to use
economic use of resources and reduction of computers in banking. This makes the functioning
danger. Example: driving simulation and easier, fast and reliable.
dissection simulation software. Language 7. Entertainment: Today, in entertainment
teachers cannot deny the use of language labs to industry computers are playing a vital role. In
younger children in learning accurate computerized sound generation, animation and
pronunciation. digitalization, computers are doing wonders.
With the advancement in the technology and 8. Traffic Light Control: In managing the
Internet, Online Education, e-learning, m-learning functioning of traffic lights which help to manage
are getting very popular. These provide the the traffic, computers play an important role.
learning at the pace of student and thus provide 9. Health Care Management and Hospital:
convenience. Students are using computers to Medical world is also benefiting from the use of
access, retrieve, manipulate and transmit infor- computers. Here it is used to keep record of the
mation from far off places. patient, generate reports, bills, and for management
2. Student’s Database: In an educational and administration.
institute it becomes very necessary to keep record 10. Weather Forecasting: Computers are

Neeraj
being used in forecasting the weather.
of each and every student in order to provide
11. Ticketing: Be it railways or airways
individualized attention. Computers are being used
computers are being used extensively in ticket
in this field to make the function a success.
booking, ticket generating, etc.
Admissions, withdrawal, fee slip generation,
12. Games: Computer generated games are

Publications
examination form etc. are some fields where
being popular and are really very interesting.
computers are being used.
Educational games are also available which can
3. Educational Research: Computers play a
help in learning in the playful way.
vital role in the area of educational research.
13. Shopping Malls: Now is the era of big
www.neerajbooks.com
Educational research is a tedious process.
Gathering information from far off places, latest
shopping malls. Computers make it possible to
keep track of the stock, purchases and sales of the
updates in styles of citation, previous researches, shopping malls.
suggestions and bibliographic citations are made 14. Internet: As we know internet is a network
easier by computers. of computers which provides a channel to share
4. Human Resource Management: Use of and provide knowledge related to almost every
computers make it easy and prompt to keep track aspect.
of all the employees and manage the human 15. Agriculture: Agricultural income
resources of the industry. contributes a huge amount in the national income.
5. Sports: Computer is used to maintain player Use of computer and information technology in
records, track scores, create virtual playing field, this area is helping the farmers produce better
support video cameras and simulation learning quality and quantity of crops and it is helping in
software, etc. better distribution of services.
6. Banking: Today with the increasing 16. Communication: Computers provide
population, banking customers have increased faster means of communication and data
tremendously. To cater to the increasing needs of transfer.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 15

17. Engineering: Computers are used to make Computers are also known as data processors
designing in 3D manner which is very useful in because of their data processing capacity. The
designing engine, buildings, etc. computers accept the data in the form of numbers
LIMITATIONS OF A COMPUTER or symbols, processes it in the desired format and
Computers have some limitations too. Like outputs the data in the required way.
any other device computers have some limitations Q. 2. Into how many generations the
which are: evolution of computer is divided?
1. Programmed and Supervised by Human: Ans. It took centuries to the computer to gain
No doubt computers can perform variety of tasks the current shape. This period, during which the
but it is true that it can perform the tasks it has evolution of computer took place, can be divided
been programmed for. It follows the provided into five distinct phases known as Generations of
instructions only. Computers. The main distinction was the
2. No Intelligence: Computers can perform technology used behind the switching circuits. The
very intelligently but that intelligence is of the generations are:
programmers’ and not of the machine. This cannot First Generation Computers (1940-1956)
replace the human brain.

Neeraj
Second Generation Computers (1956-
3. Self Care: Computer needs humanbeing to
1963)
take care of them.
4. Emotionless: Computers are no more than Third Generation Computers (1964-1971)
emotionless machines. Fourth Generation Computers (1971-

Publications
5. Thinking: Computer can not think on its Present)
own. Though the concept of artificial intelligence Fifth Generation Computers (Present and
reflects that the computer can think but actually Beyond).
that is the reaction of following a set of instructions Q. 3. Distinguish between Microcomputer
www.neerajbooks.com
provided by the programmer.
6. Retrieval of Memory: Human mind can
and Mainframe computer.
Ans. A microcomputer is a small personal
think and perceive and retrieve the data flexibly computer. It is design for use in a single location
whereas computers cannot. rather then across an entire corporation. Again, it
uses central processing for all of its work. It is
Q. 1. What is a Computer? Why is it known cost effective but as compared to mainframe it
as data processor? lacks far behind in amount of data handling and
Ans. Computer is an electronic machine which processing. Examples of microcomputer are IBM
can be programmed to perform multiple tasks such PC, PC-AT.
as calculation, interpretation, data processing, A mainframe computer usually fills an entire
forms generation, animation, printing, exchange room, and is designed for use by a large
of data and information, presentation, data corporation. These are really very costly and
collection, billing, education, research, highly accurate. They have a larger storage
entertainment, so on and so forth. It accepts, stores, capacity too. Its examples are DEC, ICL and IBM
processes and retrieves the data. 3000 series.

www.neerajbooks.com
www.neerajbooks.com

16 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Q. 4. What are the five basic operations (c) Hybrid Computers: Hybrid computer is
performed by the computer? a digital computer that accepts analog signals,
Ans. Basic operations performed by computer converts them to digital and processes them in
are as given below: digital form. This integration is obtained by digital
(a) Input: Accepting the raw data through to analog and analog to digital converter. A hybrid
input devices such as keyboard, mouse, network computer may use or produce analog data or digital
connections, etc. data. It accepts a continuously varying input, which
(b) Storage: Storing raw or processed data for is then converted into a set of discrete values for
future reference. digital processing.
(c) Processing: Processing means applying
desired operations on the data received.
(d) Output: Output is the display of data, Q. 1. What is a motherboard ? What
which can be done through various output devices functions does it perform ?
such as monitor, printer, etc. Ans. Motherboad is the main board of the
(e) Process Control: Control unit controls the computer which holds the most important circuit
process being executed by other units. of the computer. It connects all the parts of the

Neeraj
Q. 5. How can you classify computers computer.
according to technology? Q. 2. What do you understand by Operating
Ans. Classification of computer based on System? Which operating system would you use
technology: if you have to work in a multi user set up ?
Ans. Operating system is a set of programmes

Publications
(a) Ana lo g Comput er s: An a nalo g
computer can perform arithmetical operations which is necessary for a computer to interact with
by using some variable physical quantity, such human and other components of the computer. It
as mechanic al movement o r vol tage, to is a set of programmes which acts as an interface
between the user and the machine.
www.neerajbooks.com
represent numbers. It can be used to solve
various types of problems. It is used in solving If one has to work on a multi user system, the
problems in relationship of changing variable use of multi user operating system is necessary.
These are UNIX, Linux, Windows NT, etc.
quantiti es. T he analog syst em i s set up
Q. 3. Briefly enumerate various fields where
according to initial conditions and then allowed
you can see the use of computers.
to change freely. These have been used in
Ans. This age is the age of ICT. Use of
various ways simulating the operation of
computers can be seen in almost everywhere. Some
aircraft and the like.
of the fields are:
(b) Digital Computers: Digital computer is
Education
known as digital because of the quality of
performing calculations and logical operations Research
with quantities represented as digits, usually in the Beauty
binary number system. It can accept data in discrete Banking
manner. The data is represented internally in binary Ticketing
notation in a digital computer thus enhancing its
Communication
speed and storage capacity.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER–THEIR ORIGIN AND APPLICATIONS / 17

Weather forecasting simple calculus problems, accuracy was still not


Health Care. upto the mark. It was then that problems arose as
to who invented their device first.
Q. 4. What are the limitations of
During the year 1935, a German construction
computers?
engineer named Konrad Zuse develops a mechani-
Ans. No doubt computer is a powerful
cal calculator to handle math and calculations. He
machine but it has some limitations too. Some of
then started developing a programmable electronic
these are as under:
device and finished it in 1938. In the year 1936,
It cannot think on its own. John Vincent Atanasoff started working on devel-
It has no emotions. oping a digital computer in a campus in Iowa.
It is not capable of programming on its own. In the year 1937, Alan Turing proposed the
Q. 5. Explain the background of comput- idea of developing a Universal Machine, which
ers in detail. would be capable of computing any algorithm. In
Ans. In 1640s, the first mechanical calculator this year itself, George Steblitz created his ma-
was developed for commercial purposes. Blaise chine named Model K, which was an accumula-
Pascal invented the first commercial calculator tion of otherwise ineffective and leftover mate-

Neeraj
invented. In 1670s, Gottfried Liebnitz made at- rial, in order to solve complex calculations. The
tempts to invent a calculator that multiplied me- design was improved while he was working at Bell
chanically, but the first multiplying calculator ap- Labs and on September 11, 1940, he used the
peared in Germany just before the American Revo- teletype machine to transmit a problem from New
lution. This was a gigantic step taken in the world Hampshire to his Complex Number Calculator in

Publications
of computing that laid the foundation for invent- New York. The problem was met with success and
ing computers. In the 1801, Joseph-Marie Jac- this was the first example of a network.
quard, Frenchman, built a loom that weaved by The Enigma was broken by a machine called
Colossus Mark I in Poland and then in Britain and
www.neerajbooks.com
reading the punched holes on sheets of hardwood.
This loom was created around 140 years before US. After this, computers were built that could
the first computer was invented. break not just German but Japanese codes as well.
In the year 1820, Charles Babbage began his Then came the creation of integrated circuit tech-
quest to develop a machine that was used for pro- nology and microprocessors, which decreased the
gramming. The first programmer, Ada Lovelace size and cost of computers. The personal computer
used the machine invented by Babbage to mechani- or PC was created in the 1980s and with the ad-
cally translate a short written work. A decade later, vent of the internet shortly after, computers slowly
a professor of mathematics named George Boole, became essential part of urban households.
came out with ‘An Investigation of the Laws of Q. 6. What do you know about the devel-
Thought’, and is considered as the Father of Com- opment of the information and technology?
puting Science. Ans. Information Technology is a technology
The first printing calculator was introduced that go through the main base of computer tech-
in the year 1892 by William Burroughs. Unaware nology. The development of computer technology
of the work of Charles Babbage, Vannevar Bush that continues to bring the main implications of
of MIT also built a device, which he named as this technology in data processing that leads to
differential analyzer. Though, it can handle only information. The output of computer technology

www.neerajbooks.com
www.neerajbooks.com

18 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

which is a component that is more useful than just The invention of computer technology since
a pile of data, computer technology and technol- the start is meant to help alleviate human work to
ogy support operations process gets a new nick- make it more effective and efficient. Computer de-
name, namely information technology. velopment was followed by the birth of the Internet
Information technology prepared by the three that is able to disseminate information quickly
main dimensions of technology, namely: without the constraints of space and time. The
1. Telecommunications technology, which development of communication technology also
became the core information distribution made progress from the start the discovery of the
process. telegraph in 1835, the telephone in 1876, long-
2. Loads of information or content informa- distance telephone connections using satellites in
tion, which becomes the main driver of in- 1952 to mobile phones are widely used in 1985.
formation technology implementation. The development of information content begins
3. Computer technology, which is a key driver with the success of Markoni make radio, the dis-
of information technology development. covery of motion pictures and television cameras.

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

19

Functioning of A Computer 2
store data received, being processed and the results
We read about the evolutionary history of and also to store instructions.
computer as a machine in the previous chapter.
The changes in terms of technological advance-
ments in peripherals and internal components like
IC and architectural design have travelled a long

Neeraj
way to provide competency to the computer.
We use electronic components, magnetic and
optical components in computers. In this chapter,
we will read about major components of a digital Block Diagram of a Digital Computer
computer. We will also try to elaborate their

Publications
Components of a Digital Computer
relative functions and interconnection with other
components. Number system including an The key elements of a digital computer are:
introduction to decimal and binary number systems Central Processing Unit,
will be discussed upon. Inter number system Input devices and Output devices, and
www.neerajbooks.com
conversion will also be explained. ASCII and
UNICODE and concept of machine instruction
Memory.
The Central Processing Unit shortly known
will be discussed. as CPU is also known as the brain of the computer.
As in human system, brains controls all the
operation of all body parts, the functioning of all
COMPONENTS OF A DIGITAL
the parts of computer is controlled by CPU.
COMPUTER & THEIR ROLE
As a Central Processing Unit, it controls the
Digital computers can be defined as electronic
execution of instruction for data processing. It may
data processing devices. For processing data, it has
be divided into parts based on the type of functions
to receive it, process it by applying arithmetic and
logical operations and produce the results in the performed by them. These are:
way it is told to do. Now to receive data, it takes Control Unit known as CU,
the help of input devices such as keyboard and Arithmetic & Logic Unit known as ALU,
mouse and to displays the results it takes help of and
output devices such as monitor or printer. The Registers.
function of data processing is perfomed by central The control unit, as the name suggests,
processing unit. Working memory is needed to controls the instruction execution process.

www.neerajbooks.com
www.neerajbooks.com

20 / NEERAJ: COMPUTER BASICS AND PC SOFTWARE

The ALU has to perform all the arithmetic and We are using the word data, what does it mean?
logic operations as the need be. Registers can be Data is a collection of facts and figures which when
considered as a small amount of quickly accessible processed produces some information. Here,
CPU memory. processing may be implied as manipulation of data
All these parts work in unison to get an by applying variety of numerical, logical, statistical
instruction executed. operations on it. It provides meaningful values
Input devices help to read the data which is called information. There are a variety of programs
required to be processed and instruction to specify available for variety of data processing work.
the process. Examples are: Keyboard and Mouse. Programs are set of instructions which have to be
Output devices are used to show the output to followed to get a specific task done. The person
the user in various formats. Examples are: Monitor or groups who write these programs are called
and Printer. programmers. We have a rich pool of application
Memory provides a working storage for the software to be used to do variety of tasks such as
data and intermediate results generated during accounting, gaming, calculations, data collection,
program execution. These are stored temporarily documentation, etc. There are being used in almost
in main memory. We broadly have the following every organization, and even personal computers.
classification of memory:

Neeraj
Primary Memory: It is also called the main
memory. It stores the programs or data temporarily.
It is called volatile memory because when we
switch off the computer all the data stored in it
Data Processing

Language of Digital Computers: The

Publications
gets lost. Example: RAM.
language of digital computers is based on two
Secondary Memory: It is non volatile
valued logic i.e. On and OFF. It is called Boolean
memory i.e., the data will get stored permanently.
logic and was named after the nineteenth-century
Example: Hard disk. It is kept in the cabinet. CD
www.neerajbooks.com
ROM, Magnetic tapes etc.
There are many other important parts which
mathematician George Boole. Boolean logic is a
form of algebra having only two values ON or OFF
are kept in the computer cabinet. These include or say True or False. It fits with the computer
motherboard, RAM, Hard Disk, Floppy Drive, CD- understandable binary language, which also has
ROM Drive, power supply, ribbons etc. The only two digits 0 and 1. In this system, each bit
mother board has printed circuitry which allows has a value of either 1 or 0.
all these components to communicate with each The transistors can act as a switch showing
other. CPU cabinet also has connection slots which either ON and OFF values. These states can be
are used to connect peripherals. well represented by Boolean logic by using
Computer as a Data Processor: As explained symbols 0 and 1. This way all the data and
earlier computers are known as data processors instruction are represented using 0 and 1 and every
because of their capacity to process data. It receives data and instruction is provided a unique binary
the data using input devices, process it with the code. Binary code system is capable of converting
help of processing unit and sends the output to the numbers, alphabets and other characters into
output devices. These all devices have to work in binary digits to make it understandable by the
unison to get the work done. computer.

www.neerajbooks.com
www.neerajbooks.com

FUNCTIONING OF A COMPUTER / 21

Now you know that computers can understand


only binary language. Imagine what would happen
if we have to communicate with computers in its
own language. It will produce the results and show
in binary? I think in that case, it would have been
a cup of tea of connoisseurs in technological field
only. It would definitely not have gained the status,
which it is enjoying today. But we must thank the
developers of operating system software to make
OS work like an interface between the computer
Layered View of a Computing System

and the user. NUMBER SYSTEM


We use decimal number system which has 10
Operating system software is a system
symbols i.e, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, and 0. We
software. Apart from system software, there is
can say that it has a base 10 i.e. (r =10). Different
another type of software, i.e., application software.
numbers can be produced by using same set of
System software are designed to make the system
digits. Example: by using 3 digits 1, 2 and 3 once,
function properly while application software are

Neeraj
we can make various numbers like 123, 132, 231,
designed to perform particular task. 213, 312, 321. These carry different values. It
System Software example: Operating system. depicts that the value of a number depends upon
Application Software examples: Word not only the symbol used but also on its place.
There are many other number systems. Such as:

Publications
processors, accounting packages, gaming software.
Binary number system having base of 2 i.e.,
r = 2.
Octal number system having base of 8 i.e.
r = 8. Symbols used are 0, 1, 2, 3, 4, 5, 6, 7.
www.neerajbooks.com
User
hexadecimal number system having base
of 16 i.e., r = 16. Symbols used are 0, 1,2,
3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
We can convert the values of one number
Application
system into another. For example, a number 2A in
hexadecimal is equivalent to 101010 (2×161 + A ×
160) in decimal number system.
Binary Number System: Binary number
Operating System system has r = 2, which means it has base of two.
There are only two symbols 0 and 1 which are
used to depict any value. You might be thinking
how is it possible to provide a unique value to a
Hardware large data using 0 and 1 only. It is possible by
repeating the numbers in a pattern. It allows writing
any number using binary. A binary number 10 thus

www.neerajbooks.com
www.neerajbooks.com

22 / NEERAJ: COMPUTER BASICS AND PC SOFTWARE

represents the number 1 × 21 + 1 × 20. It can be We can refer to the table given below for
depicted using decimal number system as 2. conversion:
For example, we can convert decimal number Decimal Hexa- Octal Binary
64 to binary equivalent like this: decimal
Operation Quotient Remainder 0 0 000 00000000
64 / 2 32 0 1 1 001 00000001
32 / 2 16 0 2 2 002 00000010
16 / 2 8 0
3 3 003 00000011
8/2 4 0
4 4 004 00000100
4/2 2 0
5 5 005 00000101
2/2 1 0
1/2 0 1 6 6 006 00000110
We divide the number by 2 and find the 7 7 007 00000111
remainder and quotient. We do this till we get a 8 8 010 00001000
quotient 0. We read the set of remainders from 9 9 011 00001001
bottom to top and get the binary equivalent. Thus, 10 A 012 00001010
(64) 10 = (1000000)2. We can also convert the

Neeraj
11 B 013 00001011
fraction part by multiplying it by two to obtain 12 C 014 00001100
resultant integer and fraction parts. The integer part
13 D 015 00001101
in the resultant is extracted and the process is
14 E 016 00001110
repeated with fraction till it becomes 0 or a desired

Publications
precision is achieved. 15 F 017 00001111
We can also convert binary to decimal in Hexadecimal to Binary
following way: Q. Convert (C0B)16 to an equivalent Binary
(10101)2 = 24 + 22 + 20 = (21)10 number.
www.neerajbooks.com
(10100)2 = 24 + 22 = (20)10
CONVERSION
Ans. (C0B)16 = C
1100
0
0000
B
1011
Decimal to Binary: By replacing each digit by its 4 bit binary
Q. Convert (15)10 to an equivalent binary equivalent we get:
number. (C0B)16 = (110000001011)2.
Operation Quotient Remainder Binary to Hexa Decimal
15 / 2 7 1 Q. Convert (101000101011) 2 to its
7/2 3 1 equivalent Hexa Decimal Number.
3/2 1 1 Ans. We group the digits into group of 4
1/2 0 1 starting from the end. Then convert into decimal
Ans. (15)10 = (1111 )2 equivalent.
(101000101011)2 = 1010 0010 1011
Binary To Decimal
A 2 B
Q. Convert (1010)2 to an equivalent decimal
(101000101011)2 = (A2B)16.
number.
Binary Codes
Ans. (1 0 1 0)2 = 23 + 21 = 8 + 2 = 10
Binary digits, shortly known as bits are used
Hence, (1010)2 = (10)10
to represent distinct discrete quantities. But there

www.neerajbooks.com
www.neerajbooks.com

FUNCTIONING OF A COMPUTER / 23

may be instances when there is need of more than computer and keyboard. Unicode for use over
one bit. For example, if we are not repeating the Internet etc.
digits 0 and 1 can form only 01 and 10 codes. These ASCII & Unicode
are not enough for depicting more than two There is a need of minimum six bits to
different entities. If there is need to give unique represent 10 decimal digits, 26 alphabets and other
codes for three distinct items or more, we need at symbols. (26 = 64). This six bit code is capable of
least 2 bits. With two bits we can have codes 00, assigning codes to 64 entities. But there may be
01, 10 and 11. In general, an n-bit binary code can instances when we need even seven or eight bits
be used to represent 2n distinct quantities. when we need to depict characters in upper and
We need to convert a number of alphabets, lower case. ASCII stands for American Standard
numbers or a punctuation symbols into machine Code for Information Interchange. It is a seven bit
understandable language and provide a unique code. It is capable of representing numbers,
code to each of them. All the data and instructions alphabets, punctuation symbols and other control
are represented in sets of 0s and 1s. We use many characters. Though it is a seven bit code, but can
binary codes in digital system such as BCD code act as an eight bit code, where eighth bit is added
is used to represent decimal numbers, ASCII code for parity.
is used to interchange information between

Neeraj
Publications
www.neerajbooks.com

These codes can be used in other devices also Unicode is a standard for the consistent
which use text. It started from telegraphic codes. encoding, representation and handling of text. It
ASCII includes definitions for 128 characters: 33 can cater to almost every language used on
are non-printing control characters and 94 are computer. Its latest version has more than 107,000
printable characters. characters covering 90 scripts. It also has a set of

www.neerajbooks.com
www.neerajbooks.com

24 / NEERAJ: COMPUTER BASICS AND PC SOFTWARE

code charts, an enumeration of character and on which data. A simple instruction is a


properties, some basic rules etc. Unicode supports combination of an opcode and its associated
various character encoding such as UTF-8, UCS- operands. Opcode is denoted by its unique binary
2 and UTF-16. Because of these special features, code. The operands received are decimal digits and
it is now being used in the internationalization and but to be processed need to be converted into
localization of computer software. It is adopted binary. We assume that it will take only single digit
by almost all latest technology including Java number (2 or 3 so on..). According to BCD code
programming language and various operating instructions may be:
systems. Instruction Effect
CONCEPT OF INSTRUCTION 00010010101 9+5
As you can see in the above image, the CPU 01111010101 25 / 05
is a semi-conductor integrated circuit chip. It has Here the first three bits represent the opcode
many transistors fixed on it. Its main function is and the remaining eight bits represent the two
processing that is why it is called processor or operands each a one digit decimal number using
microprocessor. In order to do processing, it BCD code.
follows some instructions. Instructions are In first example, the opcode is for addition and
operations which the processor can directly

Neeraj
1001, 0101 are corresponding to 9 and 5
execute. Modern CPUs have built in logic which respectively.
allows them to perform around 550 machine In second example, the opcode is for division
instructions. These are needed to guide the and 1101 and 0101 are corresponding to 13 and 5
processor to tell the type of task to be done and respectively.

Publications
the way it is to be done. In reality computer has to do complex
Processor’s set of logic of instructions is operations. Processors have around 550 built in
known as instruction set. This resides in the operations and can get input not only from users
hardware of the processor. It helps the identify the but from memory or registers too and thus, perform
www.neerajbooks.com
task and its micro operations.
There are two parts of every instruction:
medium work than we are doing.
All micro processor need to undergo a cycle
Opcode It is the operation code which is
to perform instructions. This cycle has to be
to be performed.
repeated till the work is done. The cycle is: Fetch,
Operands It is the set of data on which the
Decode, Execute and Write back.
task is to be done.
In fetch cycle, it fetches the instruction from
Let us understand it by an example. We have
memory, in decode cycle it is decoded into micro
assumed that a computer can perform these
operations and assigned codes to each operation operations, in execute these are performed and in
as given here: write back the results are written back to memory.
Operation Opcode All these is done under the supervision of the
Addition 000 control unit.
Subtraction 001 ELEMENTS OF CPU AND THEIR ROLE
Multiplication 010 We have already mentioned that a CPU is a
Division 011 complex IC chip and there are large number of
Now when we will provide the operand and transistors mounted over it. It has the following
opcode it will get an instruction what is to be done sub-units:

www.neerajbooks.com
www.neerajbooks.com

FUNCTIONING OF A COMPUTER / 25

Control Unit (CU),


Arithmetic & Logic Unit (ALU), and
A Set of Registers.
The microprocessor is connected to other parts through printed wires called system bus.

Neeraj
Publications
www.neerajbooks.com Interfacing CPU and System Bus

Registers used to hold data or instructions exchange with memory and I/O modules and
temporarily. There can be: registers. It also generates timing signals to start
User-visible registers: This stores data items fetch cycle by generating micro operations. It can
and information for a short while. do this in following ways:
Control & Status Registers: This helps the Through a hardwired logic: It resides in
control unit. the processor permanently,
The Control Unit is a part of processor which By reading a programmable Array (PLA)
works to controls and coordinates the functioning table,
of processor and other devices. For each instruction By reading a Programmable Read Only
to be executed it commands the processor to go Memory (PROM): PROM chip is used to
through a sequence of control steps and in each store the sequence of micro operations.
control step a set of signals are issued by the control The Arithmetic and Logic Unit as the name
unit to get the corresponding micro operations to suggests performs the arithmetic and logical
be executed. It also controls signals to data operations on the data. It receives the data to be

www.neerajbooks.com
www.neerajbooks.com

26 / NEERAJ: COMPUTER BASICS AND PC SOFTWARE

processed with the help of CU, CPU registers and Q. 4. What was the main motivation behind
memory and return it as processed data to the same. the development of Unicode?
While the ALU is a fundamental component Ans. A need was felt to have a standard which
of all processors, the design and function of an provide guides consistent encoding, representation
ALU may vary between different processor and handling of text expressed in most of the
models. For example, some ALUs only perform world’s writing systems. This led to development
integer calculations, while others are designed to of Unicode which provides more than 107,000
handle floating point operations as well. ALU has characters covering 90 scripts.
a number of registers. For example, accumulator, Q. 5. Briefly explain the sub-cycles involved
flags and status register. in execution of a machine instruction.
Cache memory is a semi-conductor temporary Ans. Sub-cycles are: Fetch, Decode, Execute
memory which is used to store recently used and Write Back cub cycles.
information in a place where it can be accessed Q. 6. What are the different ways of
really fast. Use of it can make the system process designing the control unit of a processor?
fast. The objective of fast processing and effective Ans. There are three ways:
high level multi processing can also be achieved Hard-wired control, PLA and Micro-program
by using multi processor core on the same IC chip. control.

Neeraj
The current jet age era demands these newer
technological usage.

Q. 1. What is the significance of a computer


Q. 7. List the two key technological trends
seen in modern processors for improving
performance.
Ans. The two technological trends seen in

Publications
modern processors to improve performance are:
being termed as a data processer?
Using on chip cache memory, and
Ans. A computer is known as data processor
Having multiple processing cores on the
as it receives the data through input devices,
same chip.
www.neerajbooks.com
processes it and provides the output on output
devices.
Q. 2. What kind of language is used to Q. 1. How do we use computers?
specify machine instructions of a digital Ans. Computers and electronic technologies
computer? have been incorporated into almost every field of
Ans. Binary language is used to specify society. They now play an importannt role in how
machine instructions in digital computers. It has we learn, how we take care of our money, and how
only two symbols 0 and 1. we are entertained. Today, there is probably no
Q. 3. Briefly state the reason why ASCII better indication of how advanced a society. In
cannot be less than 7 bit code? Indian society, computers are now a fundamental
Ans. ASCII code provide a unique code for component of our jobs, our schools, our stores,
every key press on the keyboard be it decimal our means of transportation, and our health care.
digits, alphabets and symbols such as punctuation Our complex systems of banking and investment
marks and special characters. A need of atleast six could not operate without the computers.
bit system is there to code all of these. If we need Our schools use computers to teach the
to represent characters in both upper and lower students. Almost all of our businesses now use the
case then we need a seven bit code. computer to maintain information about customers

www.neerajbooks.com
www.neerajbooks.com

FUNCTIONING OF A COMPUTER / 27

and products. Computers are now commonly used of company, task can be completed efficiently with
in medicine for diagnosis and treatment. In fact, effectively. Also, computer are accurate and error
every day it gets harder to find any type of business, free, they can process huge amount of information
educational institution, or government office that at the same time and they inexpensive.
does not use computers in some way. Storage: Imagine you have collections of five
Q. 2. What are the basic functions of thousand pictures. You are going to Agra to meet
computer? your relative and were told to bring that five
Ans. Basically, there are four functions of thousands pictures over. So with the advent of
computer like: input, output, storage and computer, you can just save that five thousand
processing. pictures and bring your laptop over. That's that
Input: Computer can keep track of any simple!. Example of computer storage include,
different types of information. With software like hard disk, CD ROM, DVD ROM and others.
Microsoft word, notepad. It makes inputing any Output: Output is one of the most commonly
data such as words, articles relatively easy. used functions in the computer. It may refers to
Processing: Computer can solve all types of the graph that is being plotted in microsoft excel,
numerical problems. Solving numerical problems the song that you are playing from media player,

Neeraj
can be considered as an example of computer etc.
processing. With the ability of data manipulation

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

28

Memory System 3
through input devices, the programmes to be run
As we know that the computer is a processing and intermediate results are stored in the memory.
machine. To do this function, it basically has three Memory can be ranked according to following
sections; Input Devices, Processing Unit and features:
Output Devices. The Processing unit consists of (a) Access time: This is the time taken by
CU, ALU and memory. Memory is a very the CPU to locate a particular data in the
important component of the system. memory. According to the need the data is

Neeraj
In this chapter we will study about needs of retrieved. Always fast access time is given
preference over slow access time as it enhances
memory system and its types, storage devices and
the speed of processing.
memory hierarchy.
(b) Storage capacity: The storage capacity
refers to the amount of data which can be stored

Publications
MEMORY AND STORAGE DEVICES
Computer accepts data through various input
devices. The control unit controls its entire
in the memory. A storage device which can hold
large amount is preferable.
(c) Cost per bit of storage: Cost here means

www.neerajbooks.com
operation including its input and output devices.
After the data is received it is processed by ALU
the cost of a storage unit for a given storage
capacity. We prefer lower cost per bit of storage.
by applying various numeric and logical operations We can categorize the memory as follows:
on it according to the commands. (a) Processor’s internal CPU memory: We
Memory unit, like CU and ALU, is also an have read about registers present in the processor
important part of a computer. Unlike our memory, in previous chapters. These serve as temporary
memory locations for data processing.
computer’s memory is a physical device. It helps
(b) Primary/Main memory/Semiconductor
to store data and information in form of bits and
memory: These have small storage capacity, cost
bytes, for processing and future retrieval. The data
of storage per bit is higher and have faster access
and programs that are in use are stored temporarily
time. Here access time means the time taken by
or permanently in the memory as per the need and
the CPU to access a particular location in the
type of memory used. CPU uses memory for fast memory. Example RAM, ROM
retrieval of data and information. It is used all the (c) Secondary/Auxiliary memory/Magnetic
time when the computer is functioning. memory/Optical memory: This kind of memory
The main functions of the memory are storage has a larger storage capacity used for long time
and retrieval, called memory write and memory storage of data, and programmes which need
read operations accordingly. All the data received higher capacity of storage such as multimedia files.

www.neerajbooks.com
www.neerajbooks.com

MEMORY SYSTEM / 29

The cost of storage per bit is low and the access (b) Magnetic Memory: Example: Hard
time is medium. It is also called non-volatile disk, magnetic tapes etc. The capacity of data
memory because it can hold the data even after storage is very high but access time is slow as
the computer is switched off. Most commonly compared to the semiconductor. These are non-
used secondary storage is the hard disk. When static in nature.
data from the secondary storage devices is to be
(c) Optical Memory: Example: CD ROM
processed, it has to be shifted first to the main
(Compact Disk Read Only Memory), DVD
memory as CPU cannot access these devices
(Digital Versatile Disk Read-Only Memory), etc.
directly. Secondary storage devices such as CDs
Here again the storage capacity is high, it is
can be used as optical storage. They serve better
economical too but the access time is slow when
at a lower cost.
compared to semiconductor. These are non-static
As we see that we need a larger sized storage
in nature.
device to store a big amount of content. But it
increases the access time. To overcome this Data stored on any memory unit can be
disadvantage, cache memory can be used in accessed by the CPU in the following ways:
between the CPU and the main memory. Cache (a) Sequential or Serial Access: In this
memory increases the speed of processing as it method memory is accessed in sequential form.

Neeraj
makes data available for the CPU to read at a The method of data recording is sequential and
higher speed rate. Though it is small memory the same method is adopted to retrieve it too. For
but enhances the speed of processing. It actually example, if one has to fetch the data which has
acts as a buffer between the CPU and main been stored on 10th address, then it will be

Publications
memory. accessed only after traversing the previous nine
Hierarchy of memory when cache is used can addresses. It takes a lot of time. For writing as well
be shown as below: as for data reading the sequence has to be followed.
Example, magnetic tape.
www.neerajbooks.com
(b) Random or Direct Access: In this, the data
location can be accessed at random. The data is
provided a unique address. This address is assigned
to every set of data and information which can be
All the storage devices can be categorized individually accessed randomly without searching
on the following basis: all the previous addresses. It makes data retrieval
(a) Semiconductor Memory: Examples: much faster. Examples are Magnetic disk and CD
RAM, ROM, etc. These are the primary storage ROM.
devices. CPU needs them for data process. These
are static in nature. These are very fast and
compact. But the storage capacity is low as
compared to other storage devices.

www.neerajbooks.com
www.neerajbooks.com

30 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

How the data is stored in a storage device?: and commands needed by the system to function.
It is explained earlier that computer understands Computer needs both RAM and ROM.
the language or 0s and 1s, i.e., binary Semiconductor memory contains a group of ICs.
representation. This is the reason that for storing Data is stored in binary.
the data it is converted into binary and the storage TYPES OF MAIN MEMORY
is done in two state also called binary Main memory can be classified into RAM and
representations. Smallest of all is a single bit, and ROM.
group of eight is called a byte. (a) RAM can be further classified as
1 Kilobyte = 1000 bytes or 103 bytes DRAM and SRAM: RAM is a semiconductor-
1 Megabyte = 1000000 or 106 bytes based computer memory that stores program
1 Gigabyte = 1000000000 or 109 bytes code and data. As the primary working memory
1 Terabyte = 1000000000000 1012 bytes of a computer, RAM stores program code and
1 Petabyte = 1000000000000000 or 1015 data that can be accessed, read, and written to
bytes by the Central Processing Unit (CPU) and other
1 Exabyte = 1000000000000000000 or hardware devices. RAM is characterized as
1018 bytes read/write memory to distinguish it from ROM

Neeraj
The semiconductor circuits and transistors can (Read Only Memory), which is the primary
be in conducting or in non-conducting state. storage memory. RAM is volatile, meaning that
Magnetic disk or tapes represent these two states any d at a st or ed i n RAM is l os t an d
by having magnetized spots whose magnetic fields unrecoverable if power is lost. Many programs
have one of two different directions. set aside some amount of RAM as a temporary

Publications
In electronic circuits, the positive logic shows workspace for data until it can be printed,
number 1 as the conducting (ON) state, while the transmitted, or stored on a hard drive, floppy
number 0 is represented by non-conducting (OFF) disk, or other permanent or semi-permanent
state. But in the magnetic media, the magnetic field medium.
www.neerajbooks.com
of a magnetized spot in one direction represents a
1 and in other direction 0.
Semiconductor Main Memory: Some
interesting points about the main memory are:
Almost every computer contains semiconductor
and magnetic memory.
Semiconductor plays the role of main memory.
It is also known as RAM. Its main function is to
store data and instructions needed by the CPU at a
particular time. It is temporary in nature, also called
the volatile memory. Its contents get off once the Static RAM: SRAM can store data for a
computer is shut down. longer time than the DRAM. It can hold the data
Another part of main memory is Read Only and information till the power supply is on. These
Memory (ROM). ROM as the name suggests are consume more power and are costly. SRAM has a
memories available to be read only. No writing higher speed as compared to DRAM. It is used in
work can be done on it. This contains information cache memory for being faster.

www.neerajbooks.com
www.neerajbooks.com

MEMORY SYSTEM / 31

Dynamic RAM: DRAM Dynamic RAM loses content from manu-


its stored content in shorter time than the SRAM. facturers of the IC.
It can hold for only a few milliseconds. These are User-programmed : These give the
cheaper as compared to SRAM. user the liberty to
The following are commonly used RAM programme. Examples
chips: are PROM, EPROM,
EDO (Extended Data Output RAM) etc.
SDRAM (Synchronous DRAM) Magnetic Memory
SGRAM (Synchronous Graphics RAM), Because of the limitations of primary storage
and devices like limited data storage capacity, high cost
Dual-Ported DRAM. and volatile nature, some inexpensive data storage
(b) ROM can be classified in PROM and devices are needed to be used as additional
EPROM: Semiconductor-based computer memory memory, that has larger data storage capacity, low
that stores program code that the Central Processing
cost and is, non-volatile in nature. All these features
Unit (CPU) can read, but not write to, i.e., change
are found in magnetic memory. The basic types of
or modify in any way. This is why it is called read
magnetic memory used are:
only memory. Programs are stored in ROM on

Neeraj
(i) Magnetic Disks: Hard Disks and Floppy
semiconductor chips, during the manufacturing
Disks.
process. Such programs are said to be hard-coded
(ii) Magnetic Tapes: Magnetic tapes are
to distinguish them from software. The term read
cheaper and provide a good choice of
only memory distinguishes it from Random Access
secondary storage.

Publications
Memory (RAM), which also is stored on
semiconductors, but it is read/write memory. Unlike Storage Mechanism: Magnetic disk drives
RAM, ROM is not volatile, i.e., the programs are contain both side coated metal disks. These
not lost when the electric power is lost or turned disks are rotated at a high speed to read or write
data . T he tr ac ks a re cir cu lar an d
www.neerajbooks.com
off. Therefore, programs required during system
start-up commonly are stored in ROM. electromagnetic read or write heads are
Note: Many ROM chips can be repro- positioned by access arms between the slightly
grammed after erasing the previous content separated disks. Data is saved on these tracks
either electrically or with an external source of in binary form. The storage capacity is really
Ultraviolet (UV) light. high which can store every type of data be it
text, sound, picture, etc.

and

Classification of ROM on programming


mode
Masked-programmed : This kind of ROM Hard Disk Drive Interior
comes with written

www.neerajbooks.com
www.neerajbooks.com

32 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Magnetic disks can be used as fixed unit or Seek times: The time needed to position these
removable unit. Normally removable are used for heads on proper track is known as seek time. This
keeping backup of the data to be on the safer side. name is taken by the process of seeking the data
Data Organization: The surface of a or information. The seek time Ts depends on its
magnetic disk is divided into concentric tracks. position at the time of receiving the command of
These tracks are used to record data on. Each track read or write. If it is on a track which is to be read
is further divided into sectors. Each sector or written onto then the time will be minimum and
normally holds same capacity. if the far off track is to be reached then it will take
Hard Disk Drives (HDD): Hard disk is a non- more time. This happens in movable head systems
volatile, random access storage device. It is capable where the heads can move but in a fixed head
of storing variety of data or programmes. These system the time is always negligible because there
are available permanently to the computer and thus is a head for each track.
hard disks are also called on line storage devices. Latency time or Search time: Only
Another name for hard disks is Winchester Disk. positioning of the read write heads on the desired
It is also called platter. Multi platter configuration track is not enough, in order to follow command
is used to increase the data storage capacity. of read or write it has to fetch the desired data.
Storage Organization in HDD: There are

Neeraj
The heads even after coming to the desired track,
rotating platters on a motor-driven spindle. The has to wait to come the specified data address under
read and write heads that float on a film or air
its head as the disk is rotating continuously. This
above the platter read and write data on the disk.
rotational waiting time called the latency time or
A disk is rotated by a motor. It is mounted on the
search time. It depends on the initial positioning

Publications
disk drive. The set of tracks which are there on the
of the head and the rotational speed of the disk. If
same diameter is called a cylinder.
the speed is slow then the time will be higher. The
The disk can be divided into many drives,
above discussion tells that the total access time is
specifically called the disk drives. These are
a sum of seek time and latency time.
www.neerajbooks.com
controlled by the disk controller. The function of the
disk controller is to receive commands from the
Pen drive: Pen drive is a removable storage
device which can be easily carried and is very
computer and positions the read/write head of the
reasonable in terms of price. Its data storage
specified disk for reading or writing. The drive
capacity is really high. It comes in various storage
number, cylinder number, surface number, and sector
number must be specified for writing or retrieval. capacities ranging from mb to 256 gb. It resembles
Access time on a magnetic disk: The process a pen, hence it is called a pen drive. It has a USB
of reading data from the magnetic disks but writing ( Universal Serial Bus) interface which connects
on it is done sequentially. The desired disk address to the computer in seconds and allows data transfer.
has to be specified by specifying track number, Magnetic tapes: Magnetic tapes are
surface number and the sector number to fetch the secondary storage devices. These are portable,
data. The process of writing starts from the removable and easy to carry. These can be used to
beginning of a sector and reading is done from the save a large amount of data on a single disk and
back. Random access makes the speed fast. The the cost is also reasonable. These do not have a
role of the disk controller is to accept command very high speed but the benefits are many hence
read or write, then the read or write heads are this disadvantage can be overlooked. Basically
positioned onto the specified address. these are used to keep backups and to share the

www.neerajbooks.com
www.neerajbooks.com

MEMORY SYSTEM / 33

data or software. The storage capacity may vary. Advantages of CD ROM:


This can be calculated as: (a) Storage capacity is high.
Data recording density × length: Here
(b) Data storage cost per bit is reasonable.
density means the amount of data which can be
stored on a given length of the tape. (c) Easy to carry.
Optical Memories: Optical memories are (d) Can store variety of data.
used for large storage of data. These devices Disadvantages of CD ROM:
provide the option of variety of data storage. These (a) CD ROMs are read only.
can save up to 20 GB of information. The data or (b) Access time is more than hard disk.
information is read or written using a laser beam. 2. WORM: WORM or Write Once Read
Due to its low cost and high data storage capacity Many or CD-R or CD-Recordable are a kind of
these memories are being freely used. Apart from optical device which provides the user the liberty
low cost these memories have long life. But the to write once on the CD R. The user can write on
problem is that of low access time. the disk using the CD R disk drive unit. But this
Examples of optical disks are: data or information cannot be overwritten or
1. CD-ROM: CD ROM or Compact-Disk changed. CD R does not allow re-writing though

Neeraj
Read Only Memory are optical storage device reading can be done many times.
which can be easily read by computer but not Advantages of WORM:
written. CD-ROMs are stamped by the vendor, and
(a) Storage capacity is high.
once stamped, they cannot be erased and filled with
(b) Can be recorded once.
new data. To read a CD, CD-ROM player is

Publications
needed. All CD-ROMs conform to a standard size (c) Reliable.
and format, so any type of CD-ROM can be loaded (d) Runs longer.
into any CD-ROM player. In addition, CD-ROM (e) Access time is good.
players are capable of playing audio CDs, which
www.neerajbooks.com
share the same technology.
Disadvantages or limitations of WORM:
(a) Can be written only once.
CD-ROMs are particularly well-suited to
information that requires large storage capacity. This 3. Erasable Optical Disk: Erasable Optical
includes large software applications that support Disks are also called CD RW or CD rewritable. It
colour, graphics, sound and especially video. gives the user the liberty of erasing data already
written by burning the microscopic point on the
disk surface. The disk can be reused.
Advantages of CD RW:
(a) Storage capacity is very high.
(b) Reliability is high.
(c) Runs longer.
(d) Easy to rewrite.
Limitations of CD RW:
Compact Disk
(a) Access time is high.

www.neerajbooks.com
www.neerajbooks.com

34 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

4. DVD-ROM, DVD-R and DVD-RAM: temporary locations where actual processing takes
DVD or Digital Versatile Disk is another form of place.
optical storage. These are higher in capacity than 2. Primary memory: This is a fast memory
the CDs. Pre-recorded DVDs are mass-produced but not as fast as the processor’s internal memory.
using molding machines that physically stamp data The storage capacity is small and high cost per bit
onto the DVD. Such disks are known as DVD- storage is there. This memory is accessed directly
ROM, because data can only be read and not by the processor. It stores programs and data which
written nor erased. DVD Rs are the blank are currently needed by the CPU.
recordable DVDs which can be recorded once 3. Secondary memory: This memory
using optical disk recording technologies by using provides scope of larger data storage. Access
DVD recorders and then function as a DVD-ROM. time is higher than the main memory. This is
DVD-ROM. Rewritable DVDs DVD-RAM can permanent in nature. The following diagram
be recorded and erased multiple times. shows memory hierarchy. The following memories
Memory Hierarchy and Their Needs are here used:
In the above discussion we read about fast and CPU (register)
slow memories. Both have their advantages and Cache memory

Neeraj
limitations too. Fast memories do rarely offer huge
Main memory
storage and are expensive too and the slow are
cheaper and large but yes they are slow. In order Secondary storage, and
to get benefited by both the fast and the slow Mass storage
memories the organization is done in a hierarchical

Publications
way. CPU registers are at the top and a fast cache
memory is there between the CPU and main
memory. The hard disk is used by the technique
of virtual memory to expand the capacity of
www.neerajbooks.com
main memory. In computer language this kind
of hierarchy is known as the memory hierarchy.
This is applied to get larger memory space at
low cost.
Not only that the fast memory has low storage On top of the memory hierarchy memory has
capacity but it needs power supply till the faster access time, less capacity and higher cost
information needs to be stored and are costly. per bit stored. At the bottom there is larger storage
Memories with less cost have high access time. capacity, slower access time and lower cost per
Thus, the cost versus access time paves the way bit stored.
for memory hierarchy. It is used to get high access The cache memory is used in between the CPU
rate at low cost of memory. A computer system and the main memory to enhance the speed of main
uses a memory system which comprises of these memory. After main memory secondary memory
groups of memories: comes, which can be divided in magnetic disk and
1. Internal or CPU memories: These are magnetic tapes. These are used for long term
internal to the processor. These consist of small storage. Magnetic tapes are usually used for
set of high speed registers and are used as backup purpose.

www.neerajbooks.com
www.neerajbooks.com

MEMORY SYSTEM / 35

storage medium data is stored sequentially and


to read the data same order has to be followed in
Q. 1. Differentiate between the following:
this type of access. If the data bytes are stored in
(a) Primary (main) Memory versus
the middle of the storage area then to fetch that
Secondary Memory.
data the processor has to go sequentially after
(b) Different types of memory (in terms of
going on traversing one after the other in
access speed, storage capacity and cost
sequential order. Thus it takes a lot of time to
per bit storage).
search data using sequential access devices such
(c) A graph showing capacity versus access
as magnetic tapes.
time for different types of memory.
In random access device the data or
(d) Random versus Sequential access.
Ans. (a) Primary memory is faster than information can be fetched randomly. Same access
secondary memory but slower than the processor time is needed whether you need the first item or
memory. Its storage capacity is low and cost per the last one. Different storage locations have their
bit storage is high. It is used to store the data and own unique address which can be directly fetched.
information which is needed by the computer at Examples: magnetic disk.
that point of time. It comes in the form of chips Q. 2. Suppose in your library the following

Neeraj
and made up of semiconductors. types of memory are present:
Secondary memory has the larger storage RAM, ROM, PROM, EPROM, and
capacity than the primary memory. Data access EEPROM.
is slower in secondary memory than the primary Differentiate between these memories on

Publications
memory. It is used to store the software and other the basis of their volatility.
useful packages and data for future retrieval. Ans. Volatility is the feature that the memory
These come in the form of hard disk, CD, DVD, is lost with turning the power supply off. If a
etc. memory can hold the data or information present
www.neerajbooks.com
(b) Primary memory has a fast access speed,
storage capacity is smaller than the secondary
in it even after turning the power supply off, it
will be called non-volatile memory. RAM is a
memory and cost per bit of storage is high. volatile memory. Read-Only Memory (ROM) is a
Secondary memory is slower in access time, non-volatile memory. PROM, EPROM and
storage capacity is higher and cost per bit of storage EEPROM are non- volatile memories.
is lower than primary memory. Q. 3. A 2.5 inch diameter disk pack has 6
(c) Capacity versus access time of various plates (12 recording surfaces), 256 sectors per
types of memory. track, 5268 tracks per surface, and 512 bytes
per sector. Find the capacity and recording
density of the disk pack.
Ans. Disk Capacity
=12×5268×256×512 = 7.716 GB.
Recoding Density = (512×256) (3.14×2.5)
= 16688 bytes/inch.
(d) As the name suggests Sequential Access Q. 4. Explain the following terms with
Memory device reads data sequentially. On a respect to magnetic memory:

www.neerajbooks.com
www.neerajbooks.com

36 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

(a) Seek Time and Latency Time memories. Fast memories have short storage
Ans. Seek time is the time taken by the heads capacity, high cost and fast access time, but slow
to reach the desired track and latency time is the memories have low cost, data storage capacity is
time which is required to reach the proper address high but speed is slow. To make a balance between
after the head has reached the desired track. Access the two the system of memory hierarchy is used.
time is the sum of seek time and latency time. This provides the high access speed and high
(b) Track, sectors and cylinder storage capacity at good price.
Ans. In a magnetic disk the data is stored on
its surface which is divided in tracks. These tracks
are further divided into sectors. A set of
corresponding tracks in all surfaces of a disk pack
is known as a cylinder.
Q. 5. Differentiate between the following:
(a) CD-ROM, CD-R and CD-RW
(b) DVD-ROM versus DVD-RW
Ans. (a) CD-ROM are data storage devices
with random access. These are read only, cannot

Neeraj
be used for writing. These have high storing
capacity. The cost is very low.
CD-R or compact-disk recordable is optical
disk technology. These are used to be written and
Q. 1. What do you know about computer
storage?
Ans. Computer is used widely for storage of

Publications
read. It can be written only once but can be read data. Like humans, computers have memories too.
many times. And their memories are called storage which are
Erasable Optical disk or CD-RW (CD- used to store data information. There are two kinds
rewritable) can be used to read, write or re-write. of storage in a computer, primary storage and sec-
www.neerajbooks.com
The data is erased using laser technology.
(b) DVD ROM is a form of optical storage. These
ondary storage.
Primary storage is where the computer holds
are higher in capacity than the CDs. Pre-recorded data that it is currently using. This place also
DVDs are mass-produced using molding machines known as computer memory. For example, you tell
that physically stamp data onto the DVD. Such disks your computer to store two numbers after process-
are known as DVD-ROM, because data can only be ing it for addition. The computer will get these
read and not written nor erased. DVD RW are the two numbers from specified location in its
blank recordable DVDs which can be recorded using memory. After the A/LU adds the two numbers,
optical disk recording technologies by using DVD the result will be stored to another location in the
recorders and erased to be recorded again. memory.
Q. 6. What is the overall purpose of the Secondary is used to store permanent data. For
memory hierarchy? Name the general classes example, you are working on a Word document
of storage media that might make up a memory and are working on it tomorrow. You cannot store
hierarchy. the Word document in the primary storage because
Ans. Memory hierarchy is needed to balance primary storage is also known as temporary stor-
the advantages and limitations of the fast and slow age. The word document will be lost if you turn

www.neerajbooks.com
www.neerajbooks.com

MEMORY SYSTEM / 37

off the computer and so, the Word document had of a flip-flop. This form of RAM is more expen-
to be saving in the secondary storage which sepa- sive to produce, but is generally faster and requires
rates from the CPU. less power than DRAM and, in modern comput-
Q. 2. What do you know about Random Ac- ers, is often used as cache memory for the CPU.
cess Memory? DRAM stores a bit of data using a transistor and
Ans. Random Access Memory (RAM) is a capacitor pair, which together comprise a memory
form of computer data storage. Today, it takes the cell.
form of integrated circuits that allow stored data Both static and dynamic RAM are considered
to be accessed in any order. Strictly speaking, mod- volatile, as their state is lost or reset when power
ern types of DRAM are therefore, not random ac- is removed from the system. By contrast, Read-
cess, as data is read in bursts, although the name Only Memory (ROM) stores data by permanently
DRAM/RAM has stuck. However, many types of enabling or disabling selected transistors, such that
SRAM, ROM, OTP, and NOR flash are still ran- the memory cannot be altered. Writeable variants
dom access even in a strict sense. RAM is often of ROM share properties of both ROM and RAM,
associated with volatile types of memory, where enabling data to persist without power and to be
its stored information is lost if the power is re- updated without requiring special equipment.

Neeraj
moved. These persistent forms of semiconductor ROM
The two main forms of modern RAM are static include USB flash drives, memory cards for cam-
RAM (SRAM) and dynamic RAM (DRAM). In eras and portable devices, etc.
static RAM, a bit of data is stored using the state

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

38

Input and Output Devices 4


is used to type in the alphanumeric data or
Computer is a data processing device. In order commands to the computer. These devices act as a
to communicate with the computer one needs to medium between the user and the machine to carry
feed the data and instructions in the computer and communication.
to receive the output there has to be some device. Examples of Input Devices:
Using input and output devices of the computer Some most commonly used Input Devices are:

Neeraj
also called the peripherals devices. Input devices (a) Mouse
such as keyboard and mouse help to feed the data (b) Keyboard
into the computer and hence, provide input and (c) Digital Camera
output devices like monitor and printer help us to (d) Microphone
the requested information in the desired format,
(e) Graphics tablet

Publications
output.
In this chapter, we will come to know about (f) Joystick
basic concepts, functions and types of input and (g) CD or DVD
output devices and emerging technologies in (h) Bar code reader
www.neerajbooks.com
computer hardware. (i) Pen drive.
Input methods can be manual input using
INPUT OUTPUT (I/O) DEVICES keyboard or mouse, analog input using sensors and
Computer is a machine, which facilitates most input using storage devices such as CDs. Speed of
of our routine work. To perform this function, it manual inputs is slower than storage devices.
has to communicate with us, as to what to do, how Output Devices: Output devices are those
to do and on which data it has to be done and also, peripherals, which allow the computer to
it has to show the results of the process. As human communicate the results to the user. It can be in
beings need some medium to receive and produce the form of display on the monitor or it be a hard
information, same is with the computers. The copy using printer.
machine also needs some medium to receive the Commonly used output Devices are:
data and produce the information. These mediums Visual Display Unit also called monitor
are called input or output devices.
Printer
Input Devices: Input devices are those
peripherals, which help us to feed data or Plotter
commands in the computer. Example: Keyboard Speaker

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 39

WHAT IS PORT? (c) Universal Serial Bus (USB): The USB


The word port is derived from Latin word or Universal Serial Bus is an industry standard,
‘porta’ which means the entrance. In computer which was developed in the mid-1990s. These are
terminology, a port is an outlet through which a the cables, connectors and protocols used for
plug or cable gets connected. A port is a physical connection, communication and power supply
interface between the computer and other input between computers and electronic devices. USB
and output devices, which allows to get connected was designed to standardize the connection of
to it and interact. Variety of cables can be plugged computer peripherals, such as keyboards, pointing
to these ports to get physically connected to the devices, digital cameras, printers, portable media
computer. players, disk drives and network adapters to
There are different types of ports. personal computers, both to communicate and to
(a) Parallel Port: These ports send multiple bits supply electric power. It has become commonplace
at the same time over several sets of wires. A variety on other devices, such as smart phones, PDAs and
of devices can be connected through these ports. A video game consoles. Now, it is replacing parallel
parallel port is usually used to connect devices such and serial ports very effectively.
as printers to transmit data at short distance with fast
(d) Small Computer System Interface
speed. It transmits entire byte at a time. A parallel
(SCSI) Port: SCSI-Small Computer System

Neeraj
port is also called a printer port or centronics port. A
Interface Port is the actual connector that a SCSI
parallel port allows the transmission and reception
cable plugs into to communicate with the SCSI
of the data at the same time.
interface. SCSI port is a fast data transmitting
device. It is used to connect HDD, CD ROM drives

Publications
and scanners with the computer.
INPUT DEVICES
We have mentioned input devices earlier. Now
let us elaborate a few basic input devices as under:
www.neerajbooks.com (a) Keyboard: A keyboard, as the name
suggests, is a board containing a set of keys, which
are pressed to provide input to the computer. A
(b) Serial Port: A serial port is a physical keyboard is generally attached to all the personal
interface through which information transfers in computers and is a common input device. It
or out one bit at a time. Thus, the speed is slow as contains alphanumeric keys special keys and
compared to parellel ports. But serial ports are ideal punctuation keys counting upto 101 to 104 keys.
for long distance data transmission. Examples : A multimedia keyboard has 120 to 140 keys. It
Dial-up modems and serial mice use serial ports. follows the layout of a traditional typewriter. A
keyboard is connected to the computer by wires.
Now wireless keyboards are also available. The
keys in a keyboard can be generally categorized
as follows :
Alphanumeric Keys: These include alphabets
and numbers.
Punctuation Keys: These include comma,
period, semicolon etc.

www.neerajbooks.com
www.neerajbooks.com

40 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Special Keys: These include function keys, why it is named after that. A mouse consists of a
control keys, arrow keys and Caps lock key, num metal or plastic housing or casing, a ball that sticks
lock keys, etc. out of the bottom of the casing and is rolled on a
flat surface, one or more buttons on the top of the
casing, and a cable that connects the mouse to the
computer. As the ball is moved over the surface in
any direction, a sensor sends impulses to the
computer that causes a mouse-responsive program
to reposition a visible indicator (called a cursor)
on the display screen. There are two or three
buttons on the top. These buttons perform defined
functions of selection and other shortcuts like cut,
copy paste depending upon the programme.
Types of Mouse: A brief discussion of types
of mouse is as follows:

Neeraj
(b) Mouse: Mouse is another very common Mechanical Mouse: These are the traditional
input device, which is used to provide commands mouse. Mechanical Mouse uses ball for the
to the computer by selecting, clicking on, rolling movement of cursor on the computer screen. It
over or dragging the objects as seen on the screen. contains a metal or rubber ball on its under side.
As you move the mouse, the pointer on the display When the ball is rolled in any direction, sensors

Publications
screen moves in the same direction. It contains at inside the mouse detect this motion and move the
least one button and sometimes as many as three, on-screen mouse pointer in the same direction. The
which have different functions depending on what following picture, is an example of open

www.neerajbooks.com
program is running. Some newer mouse also
include a scroll wheel for scrolling through long
mechanical mouse.

documents as shown in the picture below:

Optical Mouse: Optical Mouse uses advanced


laser rays for the movement of cursor on the
computer screen. Movement is detected by sensing
changes in the reflected light rather than the motion
You may think why it is called so, actually the of a rolling sphere. The optical mouse is replacing
device has a bit resemblance with mouse that is mechanical mouse.

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 41

thus, it saves space. These are used in mobile


phones and mouse.

Cord-Less Mouse: A cordless mouse frees


you from cord problems. It connects to your
computer with a radio (rather than an infrared)
signal, powered by battery.
(c) Digitalizing (Graphics) Tablet: A digitali-
zing tablet is an input device that enables one to

Neeraj
enter drawings and sketches or signatures into a (e) Joystick: A joystick is an input device used
computer. A digitizing tablet consists of an for playing games. It has a lever that moves in all
electronic tablet and a cursor or pen. A cursor is directions and controls the movement of a pointer
similar to a mouse, except that it has a window or some other display symbol. With a joystick, the
with cross hairs for pinpoint placement, and it can pointer continues moving in the direction the

Publications
have many buttons. A pen (also called a stylus) joystick is pointing. To stop the pointer, you must
looks like a simple ballpoint pen but uses an return the joystick to its upright position. Generally
electronic head instead of ink. The tablet contains joysticks contain two buttons which are also called
electronics that enable it to detect movement of triggers. This device is also used for controlling

www.neerajbooks.com
the cursor or pen and translate the movements into
digital signals that it sends to the computer.
robots, cranes, heavy machines, etc.

For digitizing tablets, each point on the tablet


represents a point on the display screen in a fixed
manner. This differs from mice, in which all
movement is relative to the current cursor position.
The static nature of digitizing tablets makes them
particularly effective for tracing drawings. Most
modern digitizing tablets also support a mouse
emulation mode, in which the pen or cursor acts
like a mouse. These are used for Computer Aided
Designing purpose.
(d) Trackball: A trackball is another pointing
device. Essentially, a trackball is a mouse lying
on its back. To move the pointer, you rotate the
ball with your thumb, your fingers, or the palm of
your hand. There are usually one to three buttons
next to the ball, which you use just like mouse
buttons. There is no need to move the full device

www.neerajbooks.com
www.neerajbooks.com

42 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

PICK DEVICES
Pick devices, as the name suggests, are used
to pick or select an object on the screen. This object
can be text or graphics. Commonly used pick
devices are light pens and touch screens.
Light Pens: A light pen is a computer input
device. It is a small, photosensitive device
connected to a computer and moved by hand over
an output display in order to manipulate
information in the computer. It comes in the form
of a light-sensitive and used in conjunction with a
computer’s monitor. It facilitates to point, draw or
select. It looks like an electronic pen and it is light
sensitive. It is connected by a wire to the computer SOURCE DATA ENTRY DEVICES

Neeraj
terminal to detect the CRT beam when pointed Source data entry devices are devices which
towards the screen and generate a narrow electrical help to take input from the source directly without
pulse that can be fed to the computer as an input any transcription. The data is directly taken from
signal. Mainly it is used for higher level CAD the source so there are least chances of entry level
applications. errors. Examples of source data entry devices are:

Publications
Digital Camera: A digital camera, also known
as digicam is an electronic device. It is used to
take video or still photographs digitally. It uses an
electronic image sensor to take images. Digicams
www.neerajbooks.com allow seeing or editing images immediately after
they are captured. Memory storage capacity is very
high in digital cameras. These cameras provide
variety of choice to the user to choose resolution,
size, background and zoom level as well as photo
styles. Not only this, these can be directly
connected to computer using USB to transfer the
data. They use memory cards to save images or
Touch Screen: The screen has travelled a long
videos.
way from a simple display screen to a touch screen.
Its electronic visual display responses when detects
a touch at a certain place on the screen. This touch
is usually a slight pressure of a human finger or it
could be a stylus or nail. Not only in computers,
touch screen technology is being used in ATM
machines, mobile phones and security devices.

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 43

Scanners: An image scanner or scanner is an though signature or stamps overwrite it, as it


input device which is used to scan images, printed happens in cheques. This technology is very useful
text, pictures, signature and even objects. It then in banks and thus, provides them the capability to
converts it into digital image. do work with a higher speed and accuracy.
Commonly used scanner is desktop scanner, Bar Code Reader: A bar code reader is also
which has a glass lid on which the image or object called a bar code scanner. It is again an electronic
is placed which is to be scanned. device. It is used to scan printed barcodes. Here,
we should explain the meaning of barcodes too.
Barcodes are codes represented in form of vertical
lines known as bars which represent alphanumeric
data. This lines can be thick or thin. A Barcode
reader uses a laser beam to read the bar codes.
Each of the bar code is 13 digits long which
can be divided into four subsections as explained
below:
Optical Mark Recognition (OMR): OMR
First two digits : represent the country,
is the process of scanning of sheets to detect the
next five digits : represents the manufac-

Neeraj
presence or absence of a mark in a predetermined
turer’s code
position. Variety of tests and surveys are now being
next five digits : represents the product
conducted on OMR sheets, which provide
code
predetermined space for the testee to mark his or
the last digit : is a check digit.
her choice from the given set of options. These

Publications
sheets are being scanned using the OMR technique
in order to save time and energy.

www.neerajbooks.com

Magnetic Ink Character Recognition


(MICR): Magnetic Ink Character Recognition, Magnetic Strip Reader: A magnetic reader
shortly known as MICR, is a character recognition can read the information encoded in the magnetic
technology. It is helpful for computers to read stripe. It is generally found in a bank’s card.
information from printed documents. For example Information about the card holder as well as the
reading cheque number from a cheque. Humans bank is found on this magnetic stripe.
can easily read MICR codes. MICR characters are OUTPUT DEVICES
printed in special typefaces with a magnetic ink We have already discussed about the function
this is the reason the process is called magnetic of output devices. We also named a few of them.
ink character recognition system. The magnetic ink Now let us discuss in detail about the commonly
makes the characters legible by the system even used and most important output device used in

www.neerajbooks.com
www.neerajbooks.com

44 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

computer, which is monitor. Without a screen it is sheets of polarizing material with a liquid crystal
impossible to think about computer. It helps to solution between them. An electric current passed
displays all the programmes and applications, the through the liquid causes the crystals to align so
keyboard input, the commands, the mouse pointer that light cannot pass through them. Each crystal,
and other interactions with all devices, which therefore, is like a shutter, either allowing light to
makes the system interactive. pass through or blocking the light.
Graphic display on a screen is made up of a Monochrome LCD images usually appear as
series of dots which are called ‘pixels’. A pixel is blue or dark gray images on top of a grayish-white
the smallest unit of the picture that can be background. Colour LCD displays use two basic
controlled. Here, the number of dots per inch is techniques for producing colour: Passive matrix
called the resolution of the screen. is the less expensive of the two technologies. The
Cathode Ray Tube Monitors (CRT): Cathode other technology, called thin film transistor (TFT)
Ray Tube (CRT) is a specialized vacuum tube in or active-matrix, produces colour images that are
which images are produced when an electron beam as sharp as traditional CRT displays, but the
strikes a phosphorescent surface. Most desktop technology is expensive. Recent passive-matrix
computer displays make use of CRTs. A cathode displays using new CSTN and DSTN technologies
ray tube consists of several basic components. The produce sharp colours rivaling active-matrix

Neeraj
electron gun generates a narrow beam of electrons.
The anodes accelerate the electrons. The image is
projected on the screen by directing the electron
beam onto the computer screen.
displays. LCD produces sharper display and come
in light weight.

Publications
www.neerajbooks.com
The illustration shows only one electron gun.
This is typical of a monochrome, or single-colour,
CRT. However, virtually all CRTs today render Thin Film Transistor Liquid Crystal
colour images. These devices have three electron Display (TFT LCD): Thin film transistor
guns, one for the primary colour red, one for the technology is used in monitors to enhance the
primary colour green, and one for the primary picture quality especially in the LCD monitors.
colour blue. The CRT thus produces three This technology is being used in computers as well
overlapping images: one in red (R), one in green as in TVs etc.
(G), and one in blue (B). This is the so-called RGB Light Emitting Diodes monitors (LED): You
colour model. might have heard about high definition TV screens
Liquid Crystal Displays (LCD): This is a or monitor screens. The technology behind is the
type of display used in digital watches and many Light Emitting Diodes (LED). It is a semi-
portable computers. LCD displays utilize two conductor light source.

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 45

Here diodes are used to light up the screen, Classification of monitors on the basis of
which come in vibrant colours. Screens for size: The smallest size for VGA monitors is 14
laptops and monitors can be made thinner by inches. Other typical monitor sizes are 17 inches,
using LED technology. LED monitors consume 20 inches, 23 inches etc.
less space, less power and produce better picture Classification of monitors on the basis of
quality. Resolution: As explained earlier, the resolution
Projection Displays: You might have of a monitor is the number of pixels per inch
experienced a projection display at least once in appearing on its surface. High resolution results
your journey of education. Projectors are used to in sharper picture quality.
project something on a larger screen than the Generally, modern monitors can display
computer to make it possible to make it visible to 1024 by 768 pixels. But better quality models
a large group of audience. The projectors can be are available which are capable of displaying
connected to computers to get the reflection on a 1280 by 1024, or even 1600 by 1200 pixels. 3280
larger screen say white board. by 2048 resolution monitors are also available.
CRTs are famous for providing variability in
resolution.

Neeraj
Classification of monitors on the basis of
signal: According to this classification, computers
can be categorized as under:
Analog Monitor: A monitor that is

Publications
capable of accepting continuously varying or
analog signals from the video adapter. This
allows the monitor to display an infinite range
Classification of monitors on the basis of of different colours. The majority of all CRT
colour
www.neerajbooks.com
Monochrome: Monochrome monitors are
monitors are analog monitors where all flat-
panel displays are digital. These are the
black and white computers. Basically these can traditional monitors.
display two colours, i.e., black and white or black
Digital Monitor: Computer monitors that
and green or black and amber. Here one colour
uses a digital signal instead of an analog signal
depicts the background and the other is used for
are called digital monitors. Unlike an analog
the foreground.
monitor, a digital monitor has a set colour range
Gray Scale: Gray scale, also a monochrome
and is incapable of displaying an infinite range
type of monitor, displays the output by using
of colours. A digital signal is an electronic
different shades of gray, made by a combination
of black and white. signal that is sent as binary digits of either ON
Colour Monitor: Coloured monitors can or OFF. Digital monitors can be further
display a variety of colours. The display can range categorized as:
from 16 to over 1 million different colours. These Colour Graphics Adapter (CGA)
accept three different signals, i.e., red, green and Enhanced Graphics Adapter (EGA)
blue. Video Graphics Array (VGA), and

www.neerajbooks.com
www.neerajbooks.com

46 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Super Video Graphics Array (SVGA) (b) Dot-Matrix Printer: It is a printer with a
Printers: After the monitor, printers are used print head and prints through impact using a
widely as an output device. These help to produce ribbon. It prints in dots and can print various fonts
hard copies of the output. The output is provided and styles. This acquired a large demand in market
on papers using this device. Printers can be for a longer period for being cheaper. Dot matrix
classified according to the print quality and printers use dots to form characters and illustra-
printing speed. tions. Example is given under:
A. Printing Technology: On the basis of
printing technology printers can be classified as
under:
(a) Impact Printers: It uses the technology
of standard typewriter. The paper is striked by a
hammer through ink ribbon and gets the
impression.
(b) Non-impact Printers: It uses electrical

Neeraj
or chemical signals to get impression on paper.
B. Speed: On the basis of speed printers are
of following types:
1. Character Printer: It prints only one

Publications
character at a time. They remind the traditional
typewriter. Examples are given below:
(a) Daisy-Wheel Printer: This type of printer
has a plastic or metal wheel on which the shape of
www.neerajbooks.com
each character is embossed. Advantages:
Impact printers have some advantages over the
previous printers. Some of these are as under:
Dot matrix printers use continuation paper
so there is no need to drop paper one by
one.
These can even be used to print carbon
copies.
These have lowest printing costs per page.
Though quality of print is not as good as
the new version of printers but these are
A hammer presses the wheel against a ribbon, very reliable and cost effective.
and the character appears on the paper. The wheel Limitations:
contains characters so it cannot print graphics. The Impact printers make lot of noise while
speed and print quality is not very good. working.

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 47

When it comes to printing graphics, they silent during the printing process. These printers
yield no better results. are easy to use and can be used to print colour
Speed is also very slow as these print one pages.
character or even dot at a time. Advantages: Compared to other printers,
2. Line Printer: Line printers can overcome inkjet printers have a number of advantages. These
the speed problem of the character printers to some are:
extend. These printers print one entire line at a These are fast printing machines.
time. So, these are used to print large amount of The quality of printing is very fine.
data. These printers can print from 300 to 2500 These are not noisy devices.
Better quality text and images can be
lines per minute. Examples : Drum Printers and
printed using these printers.
Chain Printers.
Limitations
3. Page Printer: These printers are high in
These printers run on expensive ink.
speed when compared to the line printers as they
The ink get dried if not used for a few days.
print a full page at once. Not only this, they produce
high quality print. These can produce 10 to 25 Often empty cartridge message is shown
before the cartridge is actually empty.
pages in a minute. The technology used in these

Neeraj
printers is the laser printer technology and thus, 2. Laser Printer: Laser printers are given this
these are called the laser printers. name because they run on laser beam technology
to produce an image on a drum. Thus, the quality
of the print is really very fine. Speed of these
printers is also good. They function as photo-

Publications copiers. Laser printers are also called page printers.


These printers can be further classified into
the following:
www.neerajbooks.com Monochrome Laser Printer: These
printers use single colour toner and cannot give
coloured print out. These are cheaper version of
laser printers.
Classification of Printers on the Basis of Quality Colour laser printer: These printers use
C. Quality: The various types of printers four toners to print variety of colours. These are
based on print quality are as follows: comparatively costlier than the monochrome.
1. Inkjet Printer: The Inkjet printer works
on Inkjet technology and produces better quality
printouts than dot matrix printers. These print
by spraying a controlled stream of tiny ink
droplets accurately on the paper forming either
dot matrix or solid characters. The printing
quality of these printers is very good with a Print speed, quality, printer resolution,
speed of 700 or more characters per second. reliability and the costs of toner are the major
These are non-impact and hence are relatively deciding factors for choosing a printer.

www.neerajbooks.com
www.neerajbooks.com

48 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Plotters: Plotter is again an output device. A


plotter is a printer that interprets commands from
a computer to make line drawings on paper with
one or more automated pens. Unlike a regular
printer, the plotter can draw continuous point-to-
point lines directly from vector graphics files or
commands. Plotters are mainly used for CAD
purpose or to draw big graphs, that is why these
are called graph plotters. These are more expensive
than printers. The quality of prints is very good. Microphone: A microphone, usually called as
These play a role in variety of designing mike is an electric device which is used to convert
applications. sound signals into electrical signals. These allow
the user to feed sound in the computer in form of
wave files. It has to be physically connected to the
computer before being used. Some new computers

Neeraj
have integrated microphones too.

Publications
Plotters are of two types:
Drum Plotter: These are lower version of

www.neerajbooks.com
plotters. It is a graphics output device that draws
lines with a continuously moving pen on a sheet
of paper rolled around a rotating drum that moves
the paper in a direction perpendicular to the motion
Q. 1. What do you mean by input devices?
of the pen.
Ans. Computer receives data as signals or
Flat-Bed Plotter: These plotters have
commands as input. This is done by using input
higher resolution than the drum plotters. These are
devices. Input devices which allow the user to
computerized plotters that plot by moving an arm
feed the data or information into the computer.
that moves a pen over paper rather than having
Examples are keyboard, mouse, joystick, etc.
paper move under the arm.
Input ca n be p rovi de d to t he compu ter
Speakers and Microphones
manually, by sensors or by using other storage
Speakers: Computer speakers, or multimedia
devices.
speakers, are output devices which when
Q. 2. What do you mean by output devices?
connected to the computer allow the user to hear
Ans. Output devices are attached to the
audio sound, songs, etc. In laptops generally
computer to provide output to the user. This output
speakers are inbuilt.

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 49

can be in various forms, a display on screen, in device. It can be rotated manually by using the
soft form (CD) or in form of a hard copy. fingers. It is also used in playing video games.
Q. 3. Name some input and output devices. Q. 8. What is the function of Graphic
Ans. Input devices: Keyboard, mouse, Tablet?
joystick, trackball etc. Ans. The function of Graphic tablet is to act
Output devices: Screen, printer, plotter, CDs. as an input device. It is used to draw images and
graphics. It can be helpful to capture signature etc.
Q. 4. What do you mean by keyboard?
Q. 9. What do you mean by multimedia
Ans. Keyboard is an input device which
graphics tablet?
contains alphanumeric, punctuation and special
keys. It allows the user to interact with the Ans. Multimedia means using more than one
computer and provide data and commands to the media. A graphics tablet is a computer input device
system. that allows to draw images and graphics, write text
etc. and thus, helps to create multimedia products.
Q. 5. What do you mean by mouse and what
Q. 10. What do you mean by Computers
are its types?
Microphones?
Ans. Mouse is a popular input device which

Neeraj
Ans. A microphone is an input device for
allows the user to move the cursor to point to an
computers, which is used to convert the sound or
item, select it and provide command to the
voice into digital signal and provides it to the
computer. Generally, a mouse has two to three
system to be processed further.
buttons. Different types of mouse are:
Q. 11. What do you mean by barcode

Publications
Optical Mouse,
reader?
Mechanical Mouse, and
Ans. A barcode reader as the name suggests is
Wireless Mouse. an electronic device, used to read barcodes. It is
www.neerajbooks.com
Q. 6. What do you mean by scanners and
what are their functions?
based on laser beam technology to read the
barcodes.
Ans. Scanners are pick devices. These allow Q. 12. What do you mean by digital
the user to scan an image, picture, handwritten camera? Explain its various characteristics.
document or map etc. and provide its image into Ans. Digital cameras are pick devices which
the computer in digital form. are used to capture video or still images. These
Q. 7. What do you mean by joystick and provide a variety of choice to the user to choose
trackballs in a computer system? the resolution, style and other options. These can
Ans. Joystick is a remote control input device save the images using memory and help to edit or
for a computer. It has a stick that pivots on a base delete the images immediately or later on. These
and is used for controlling the action generally in can be connected to the computer to transfer the
video games. These are also used to control heavy data.
machines and robots. Q. 13. What do you mean by speakers?
A Trackball is another input device, which is Ans. Speakers are used as output devices for
in form of a moveable ball mounted on a stationary computers. These provide the output in form of

www.neerajbooks.com
www.neerajbooks.com

50 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

sound. Generally, these come in pair. These have Ans. These are non-impact high speed printers.
to be physically attached to the computer to get These use the laser beam technology and run very
the audio output. fastly. The output is of very high quality.
Q. 14. What do you mean by printers? What
are the various types of printers?
Q. 1. Write in detail about the input devices
Ans. Printer is most commonly used output
of computer.
device. It is used to take the print out on papers. It
Ans. Input devices are things we use to put
can print text, pictures etc. These provide the hard
information INTO a computer. Below are some
copy of the work done on computer. Printers can
examples of input devices.
be categorized by:
Camera: Most cameras are used during live
Impact Printers: conversations. The camera transmits a picture from
(a) Line Printers one computer to another.
1. Drum Printers, Compact Disc (CD): CDs store information.
2. Chain Printers. The CD can then be put into another computer,
(b) Character Printers and the information can be opened and added or

Neeraj
used on the second computer.
1. Dot Matrix Printers,
Mouse: The mouse is used to open and close
2. Daisy Wheel Printers.
files, navigate websites, and click on a lot of
(c) Non-impact Printer commands when using different applications.
1. Thermal Printers

Publications
Keyboard: The keyboard is a way to input
2. Inkjet Printers letters or numbers into different applications or
3. Laser Printers. programs.
Q. 15. What do you mean by plotters? Microphone: A microphone is used to record
www.neerajbooks.com
Explain their characteristics. sound. The sound is then saved as a sound file on
the computer.
Ans. A plotter is used as an output device to
Drawing Tablet: A drawing tablet is similar
computers. It receives signals and commands from
to a white board, except you use a special pen to
the computer and provide the high quality graphics
write on it and it’s connected to the computer.
print out on paper. It can provide output in variety
Scanner: A scanner is used to copy pictures
of sizes. Basically these are used for designing
or other things and save them as files on the
software.
computer.
Q. 16. What do you mean by a dot-matrix
Joystick: A joystick is used to move the cursor
printer?
from place to place, and to click on various items
Ans. A dot matrix printer is a type of impact in programs.
printer which is used to provide print out on paper. Disk Drive: A disk drive can hold a CD or
Its head runs back and forth on a paper to leave a floppy disk. It reads the information on the
impact. These are cheaper cost wise. disk.
Q. 17. What do you mean by Laser Touch Screen: A touch screen is a computer
Printers? screen or other screen that you can touch with

www.neerajbooks.com
www.neerajbooks.com

INPUT AND OUTPUT DEVICES / 51

your finger to enter information. Examples of Compact Disk: Some compact disks can be
touch screens include a microwave, or an ATM used to put information on. This is called burning
at a bank. information to a CD.
Bar Code Scanner: A bar code scanner scans Speaker: A speaker gives you sound output
a little label that has a bar code on it. The from your computer.
Printer: A printer prints whatever is on the
information is then saved on the computer.
monitor onto paper. Printers can print words,
Q. 2. Write in detail about the output
numbers, or pictures.
devices of computer.
Floppy Disk: A floppy disk is used to record
Ans. Output devices are things we use to get information on. The information is stored on the
information OUT of a computer. floppy disk and can be used later.
Below are some examples of output devices: Disk Drives: A disk drive is used to record
Monitor: A monitor is the screen on which information from the computer onto a floppy disk
words, numbers, and graphics can be seem. or CD.

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

52

My Personal Computer
5
processing capability,
Computer is a versatile machine. We have read storage capability,
in the previous chapter about its all pervasive uses. size,
It is being used in almost every area, be it appearance, and
education, banking, health, engineering, research, problem solving capacity.
A PC used for gaming will be of different
etc.
capacity than a PC used by a computer operator

Neeraj
A personal computer is called personal
for simple data processing like word processing.
because of its size, ease of maintenance and low
The configuration of the PC tells us about the
cost as compared to the conventional computer.
difference.
But even the PC can be classified on the basis of
Configuration of a PC: Configuration tells
size and processing capacity. These can be
about the technical details of the PC. Configuration

Publications
classified as a desktop or a laptop or even a
depends on the requirement of work to be done
palmtop. The area of usage is vast. Even a school
through a PC. It also depends on the amount of
going child is using it, and the professional sitting
money we want to spend on it. This is the first
in a research center is using the PC. But yes the
www.neerajbooks.com
configuration of the PC will depend on the usage
and the cost will depend of the configuration. The
question asked when we go to buy a PC. We select
the brand, the processor, the storage capacity
according to our need. We can get these assemble
capacity of the personal computers increase when to form a PC of your requirement or you can get a
connected to the network as it provides sharing of ready branded PC. The following are to be
information and resources. considered when configuration is talked about:
In the current chapter, we will learn about the Processor: These are the main component
meaning and purpose of the personal computer, of the system. Pentium processors are most
its types, hardware components, software and its commonly used brand by Intel. Core 2 Duo
types, operating system installation process, processors (two processors on a single chip)
network configuration and tools and application are used. Core 2 Quad (multi-chip
of personal computer. Some practical aspects will processors) even offer twice as good
also be discussed. performance as the Duo. Multi core
processors are used for multi processing
and enhance the system speed. One clock
TYPES OF PC cycle is the time it takes to perform one
We can classify a personal computer on the instruction. Processor takes one clock cycle
basis of differences in the following areas: to perform one instruction so its speed of

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 53

executing instruction can be known by the Typical Configuration of a Work Station


clock speed which is measured in MHz Processor: Intel Core Processor (3.20 GHz)
(megahertz) or GHz (gigahertz). Memory: 4GB 1333MHz Hard Disk: 500GB,
RAM, RAM - 2GB
Hard-Disk Drive,
Desktop Computers
Video card, etc.
Speed of the processor can be seen during the
booting. The configuration of the system can be
seen by opening ‘my computer’ icon on the desktop
of the PC.
Workstation: Workstation computers are used
where high performance is needed for example
CAD, engineering applications etc. These are high
computing power systems and use multiuser
operating system like UNIX and Windows NT.
Having a multiuser operating system, these have
a higher processing capacity. Basically these are
meant to be used as single user computer system

Neeraj
and have a capacity to get connected to LAN.
When connected to the network, the system Image of Desktop Computer
administrator can trace the activities of the user.
Desktop computer are called so because of the
High capacity mainframe computers are also
called workstation. A computer connected to ability of being fitted on the top of a desk. These

Publications
network in a client server mode is also called are fixed on the top with wires connected to the
workstation. socket and it is not advisable to move them here
and there every now and then. These are not easily
portable. This type of PC is very common and can

www.neerajbooks.com be seen easily, actually it made the concept of PC


very popular. Microsoft Windows, Mac OS, etc.
are used as operating system as a general practice.
These are provided to the customer in many forms
of designs of the cabinets.
Advantages
This type of PC can be connected to
internet.
These are not very costly and can be used
for variety of uses.
Desktop PC provides more space for heat
to escape.
These have low power consumption.
Branded PCs can also be purchased apart
from buying the assembled PC.
A Configuration of Desktop Computer
Image of a Workstation Processor: Intel Pentium 4

www.neerajbooks.com
www.neerajbooks.com

54 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

RAM: 1 GB DDR II RAM (double data rate A Configuration of Laptop is given below:
type) Processor: Intel Pentium processor P6200
Hard Disk: 500 GB SATA /IDE (2.13 GHz, 3 MB)
Graphics: Intel Graphics Media Accelerator Hard Disk: 320 GB SATA HDD
950 (Intel GMA 950) / Creative graphics card. RAM: 3 GB Memory: 1 GB DDR3 RAM
Laptop: Laptop are smaller in size and can Netbook: Netbooks are also referred to as mini
be taken anywhere very easily. These provide the notebook, mini laptop, or sub notebook. Netbook
freedom to the user to take them anywhere. This is a term coined by Intel that describes a portable
feature gains an advantage over desktop. These computer that is about half the size of a traditional
are machines in which the screen and keyboard laptop. These are light in weight and small in size.
are attached to each other. These can be folded This feature makes them very portable. These can
and kept in a bag after working. All components serve as a general PC and allow the internet
are present in a single unit. Famous brands selling connection. Operating systems used may be:
laptops are Sony, Wipro, Compaq, Dell, HCL. Windows, Linux, Android, etc. Famous brands are
Sony, Apple, Acer, Dell.

Neeraj
Publications
www.neerajbooks.com
Advantages
Image of Laptop

Portability.
It can get backup from the batteries and do Netbook
not depend on electricity each time. These Advantages
batteries can be recharged through The cost is lower as compared to laptops.
electricity. More portable than desktops and laptops.
These can work when the electricity is Limitation
gone. Less powerful hardware.
These provide the freedom of attaching A Configuration of Netbook is given below:
devices like mouse externally through Processor: Intel Atom Memory: 1 GB DDR2
ports. RAM Hard Disk: 80 GB
Efficiency is higher than PCs. Tablet PC: A tablet PC is a computer of the
Limitations size of a tablet. It functions as a personal computer.
The scope of upgrading the laptops is very Portability comes to its peak with a tablet PC. It is
limited. smaller in size and can be easily carried. This

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 55

computer provides the facility of touch screen, Computer Case


which helps in easy input and provides handwriting
recognition. It can be connected to network.
It is basically a slate shaped mobile computer
device. It has office suits, which allow a user to
use Word, Excel, etc. You can play games and get
connected to the internet also.
Operating system: Windows, Linux, etc.
Famous brands are: Acer, Lenovo, Panasonic, etc.

A computer case is a box, also known as


cabinet or computer chassis, which covers the
delicate components of the system. The CPU,

Neeraj
RAM, Motherboard, RAM, Power supply, Hard
disk and other disk drives reside inside it. Besides
this, the wires and data cables can be found in
cabinet. A variety of sizes and colours are available

Publications
in computer cases. There are power buttons which
help to switch on or off the power supply.
Tablet PC
Central Processing Unit

www.neerajbooks.com
Typical Configuration of a Tablet PC
Processor: Intel Core 2 Duo ULV processor
SU9300 (1.20GHz).
Memory: 5GB (1x1GB on board, 1x4GB
DIMM) DDR3 1066MHz.
Hard Drive: 80GB 5400RPM SATA HDD.
HARDWARE COMPONENTS OF A PC
Hardware is the tangible section of the
hardware, which can be seen and touched.
Hardware and software both are important Central Processing Unit is known as the brain of
components of a computer system. the system. The processing unit is responsible for
There are many hardware components processing the data according to the commands
attached to a computer. Each of them has a separate and providing the output. CPU fetches the data
function to perform. These are CPU, Input and and information, decodes it, executes the
output devices like monitor, printer, mouse, command and provides the output. The parts of
keyboard, memory devices, etc. CPU are:

www.neerajbooks.com
www.neerajbooks.com

56 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Arithmetic Logic Unit (ALU): Arithmetic Motherboard: The motherboard, also


and logic unit as the name suggests, performs known as the system board or main board, contains
arithmetic operations like addition, subtraction, the most important circuit of a microcomputer.
multiplication, division and other scientific That is why it is also called the main board. As a
operations and logical operations like AND etc. mother connects all the family members, the
Control Unit (CU): Control unit is motherboard connects all the components of a
responsible for controlling the operation of the system.
other components of the computer.

Neeraj
Publications
It is responsible for communication in all the
parts and allows them to receive power supply.
Main function of the motherboard is to act as an
(vii) PCI Slots: PCI stands for Peripheral
component interconnect.
(viii) CMOS: Complementary Metal oxide
www.neerajbooks.com
interface between all the components, i.e., all the
devices used for input or output, CPU, memory,
semiconductor or, Non-Volatile RAM CMOS is
an on-board semiconductor chip powered by a
etc. It can be called the foundation of the system. CMOS battery inside computers that stores
It has many parts, some of them are: information such as the system time and date and
(i) ATX Power Supply Connector: This the system hardware settings for your computer.
power connector connects the computer power (viii) CMOS Battery: It supplies power to
supply to an ATX style motherboard. CMOS.
(ii) CD-in Header: CD drive is connected
through this.
(iii) AGP Slot: AGP stands for Accelerated
Graphics Ports. This allow the video card to get
attached to the motherboard.
(iv) HDD Headers: HDD stands for Hard
Disk Drive header. This is used to connect hard
disk.
(v) FDD Header: FDD stands for Floppy Disk
Drive. This is used to connect floppy disk.
(vi) USB Headers: It is used for attaching These days high performance video cards are
external or auxiliary devices such as pen drive, available for gaming purposes which requires very
printer etc. high resolution.

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 57

Video Card: A video card is also known as may be written in variety of programming
Graphics adapter. It is an expansion card, which languages. These program help the computer to
generates output images to a display. Most video solve a particular problem by providing step-by-
cards offer various functions such as accelerated step instructions. Software can be classified as
rendering of 3D scenes and 2D graphics, MPEG- follows:
2/MPEG-4 decoding. The feature of TV output is 1. System Software: These are software
an added advantage of graphic cards. Some which are necessary for a system to run. These
advanced software for example, gaming high work as interface between the hardware
performance video cards are required because high component and the user. These are used to control
resolution is required for these. But the only the functioning of the system. The main example
drawback of using these high performance graphic is Operating System. Operating system is a system
cards is that these consume very high power. Many software which allows the user to interact with
high resolution graphic adapters are available in the machine and manages all the peripherals. It
the market. The components of Video card circuit also provides a platform for application software
board are: to run on. It takes care of the input and output,
Graphics Processing Unit (GPU), memory management etc. So it is the most
Video Memory, important software. Without an Operating System,
Video BIOS etc. it is not possible to run a computer. Example:
SOFTWARE COMPONENTS Microsoft Windows, UNIX, LINUX, etc.
You already know that hardware and software 2. Application Software: Application

Neeraj
both are integral parts of the computers, in the software are also set of programmes but these are
absence of one, the other cannot perform. Software designed by programmers to get specific task done.
is a set of programmes which is written by These are meant for one or more specific purposes
programmers for specific tasks. These programmes such as accounting, word processing, etc.

Publications
www.neerajbooks.com

Media Player

www.neerajbooks.com
www.neerajbooks.com

58 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Media Player
Media player is an application software which is used to play multimedia files. These contain media
library. Generally, these are capable of playing audio and video. These are used to play music on computer
and watch movies. Example: Winamp, WinDVD, Real player etc. Windows OS provide inbuilt Windows
media player. Some latest media players provide the features like:
Ripping: This feature allows converting an audio track to a digital audio file.
Burning: This feature allows converting a digital audio file to an audio track.
Audio file formats which are commonly used are: .mp2,.mp3, .mp4, .wav etc.
Video file formats which are commonly used are: .wmv, .mov, . rm, .mpg etc.
Calculator

Neeraj
Publications
www.neerajbooks.com

Windows operating system provides calculator Computer Games.


software which allows the user to perform Utility Software: Utility software or utilities
mathematical operations. are used to perform routine tasks of the system.
Some other commonly used application These system software which are designed to
software are: maintain the computer. A single piece of utility
Word Processor software is usually called a utility or tool. Software
Spreadsheet utilities are specifically designed to help the end-
Presentation Software user manage and tune the computer hardware,
Accounting Software software, operating system or application software
Graphics Software and perform routine tasks. It performs as single

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 59

precise task. Examples: Disk Defragmentation This can fix logical file system errors.
System, Profile/Status Virus Scanners, Text Editor How to do?
Archive, etc. These software can be classified as : In Microsoft windows, DOS and OS/2 we use
System restore CHKDSK command for this. CHKDSK helps to
Disk checker repair bad sectors, lost clusters, directory errors
Disk defragmenters etc.
Disk clearners 1. This command can be given from My
Disk management computer in the following way:
Back up Double-click on my computer icon on the
Anti virus desktop or select My computer from Start
Network utilities. Menu.
Utilities come clubbed with the operating Right-click on the disk drive to be checked.
system or these can be added. Utility software Select properties from the list.
helps to: Now click on tools tab given on the top.
Search a file or folder Click on Check Now button under Error
Scan for virus checking.
Format the system A dialog box will get opened now select
Check for available space in memory or Check disk options:
hard disk Automatically fix file system errors check
Take backup of files. box will repair errors without scanning the volume

Neeraj
Let us understand a few utility software and for bad sectors.
their functions: Scan for and attempt recovery of bad
Disk Checkers: Disk checkers are used to sectors check box will repair errors and locate bad
check the integrity status of file system of a disk, sectors. It will also recover readable information.
be it a hard disk, floppy disk or pen drivem etc. Select one of the above and click Start.

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

60 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

2. This command can be given from the command prompt by following these steps:
Click Start and then click Run.
In Open box type cmd and click on OK button.
DOS window will appear write CHKDSK on the command prompt if you want to run check disk in
read only mode, press Enter.
or
Type CHKDSK volume:/f and press Enter if you want to repair errors without locating for bad
sectors.
or
Type chkdsk volume:/r at command prompt and press Enter if you want to repair errors, locate bad
sectors and recover information.

Neeraj
Publications
www.neerajbooks.com

After finishing the command the control returns a code which means :
Exit Code Description
0 No Errors found
1 Errors found and corrected
2 Disk cleanup was performed/not performed because /f was not specified.
3 Could not check the disk, errors could not be corrected or errors were not corrected
because /f was not specified.

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 61

System Restore: System restore is a facility which helps to roll backs system files, registry keys,
etc in case of system malfunction or failure, for later use. All the modern operating systems from Windows
Windows XP, Windows vista, Windows ME, etc. provide this facility. System restore brings the computer
system’s file to the earlier state. This is necessary to do restore when there occurs some malfunctioning
due to any cause. Reinstalling the software and files may fix the problem, but if not, restore can help
bring the files back to the previous state. System restore does not help to take back up of our personal
files, these cannot be restored using system restore.
Steps to Use System Restore
1. Click on Start menu, select All Programs, click Accessories, now click on System Tools, and
then click System Restore.

Neeraj
Publications
www.neerajbooks.com

2. On the Welcome to System Restore page, click Restore my computer to an earlier time (if it
is not already selected), and then click Next.

www.neerajbooks.com
www.neerajbooks.com

62 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Publications
3. On the Select a Restore Point page, under On this list, click a restore point list, click the most
recent system restore point and click Next.
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 63

4. Click on next on the Confirm Restore Point Selection page.


Now the previous configurations will be restored and the system will get restarted.

Neeraj
Publications
www.neerajbooks.com
5. Log on to the computer as Administrator. The System Restore Restoration Complete page is
displayed.
6. Click on OK.
Disk Defragmenter: Disk defragmenter utility helps to fragment the files and store them in
contiguous locations on the hard disk which were previously spread here and there. This utitlity is
provided by the operating systems. This helps in minimizing the head movements of the hard disk and
thereby reducing the time of moving the files to and fro into the memory. Fragmentation of the memory
slows the performance of the system, this utility helps to defragment the files. Defragmenter should be
run at regular intervals to get faster access to the files.
Running Defragmenter
1. Click Start menu on the task bar, select All Programs, click on Accessories and then click
System Tools, and further click on Disk Defragmenter.

www.neerajbooks.com
www.neerajbooks.com

64 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
2. In the Disk Defragmenter dialog box, click on the drives to be defragmented and then click the

Publications
Analyze button. It will tell you whether there is a need of defragmentation or not.

www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 65

3. If you want to defragment, click the Select WinZip from the menu
Defragment button. Click add to zip file
4. The result will be displayed. It will zip and make a zip file.
5. If you want to view the detailed report, click Unzip utility helps to unzip a file to make its
on View Report. contents visible.
Data Compression: Compression means
Using unzip
squeezing or packing together. Data compression
Right- click the zipped file.
is the process in which data stored on the disk is
Select Extract from the shortcut menu.
encoded with lesser bits as compare to the original
representation. By using this utility, the size of the Disk Management: Disk Management utility
file can be reduced to get more and more data is used to manage the disks and their partitions.
stored on the disk. The size of text file can be This is used to initialize disk, create and format
squeezed much as compared to graphic file. We volumes etc. It is very user friendly utility. Disks
use zip/unzip utility for this. and volumes can be seen in graphical or list views.
Zip utility helps to compress a file and create A command line tool disk part can be used as its
its compressed version with zip extension. alternative. You can also display disks and volumes
Advantages in graphical or list view.
Lesser storage space is required to store How to Open Disk Management

Neeraj
same file. Click My Computer, and then open Control
Smaller file gets fastly transmitted.
Panel. Click Administrative Tools, and then
Some zip utilities allow to encrypt the data
double-click Computer Management.
for security purposes.
In the console tree, click Storage and then
Using Zip

Publications
click Disk Management.
Right-click the file to be zipped.

www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

66 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Another way:
1. Click Start menu, click on Run, type compmgmt.msc, now click OK.
2. In the console tree, click Disk Management.
DESKTOP
Desktop is the screen area which the icons, files, folders, task bar are organized in graphical user
interface. Desktop is the background area of the functional computer. Which provides a chance to a user
to select any of its content using mouse or even keyboard. Any file or folder present here can be opened
by simple double click. Icons provide the freedom of GUI and provides ease of selection, and other
features like copy paste with them. These can be easily dragged from one place to another place and
escapes the need for the user to remember commands for all these functions. The desktop can be
customized by adding or deleting items, changing the background etc.
Commonly found items icons of Desktop:
My Computer
My Documents
Recycle Bin
Task Bar
Recycle bin

Neeraj
Customised icons

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 67

My Computer Components of Taskbar


My Computer allows the user to explore and The Start menu button.
manage the contents of available drives or disks The quick launch toolbar.
on the computer. The opened programs or file’s tabs.
My Documents The notification area: Which includes a
My documents is a folder that stores clock and status of certain programs and
documents, program settings and other files that computer settings.
are there on the system. This is the default folder INTERNET ON A PC
where all the files saved without giving path will Internet is a network of networks. It enables
get saved. the user to share information and resources with a
Recycle Bin wide network. It allows the user to get updated
Recycle bin is a folder, which holds deleted and any type of information can be found on just a
files and folders. When a file, folder or program is few mouse clicks. Use of internet can be seen in
deleted, it goes to the recycle bin, from where it every area, be it education or industry, banking or
can be restored. For permanent deletion, it must communication, shopping or counselling, there is
be deleted from the recycle bin too, by emptying an ever increasing list of its usage. We can get our
the bin. It can be compared to your room dustbin. many works done without moving to the specified

Neeraj
If you throw any paper or file in your room dustbin
you can pick it back till it is there but once it gets
cleaned, it will not be possible to get your things
back. The Recycle Bin only stores files, which are
place like banks, reservation counters, shopping
complex, etc. This makes the life easier and keeps
us connected with the outer world.
Common ways to get connected to internet:

Publications
deleted from hard drives. It does not do it for files Dial-up Internet Connection: The most
deleted from removable drives or network. If you common way to get connected is the PSTN, public
want your files to get deleted directly without going switched telephone network via telephone lines.
to recycle bin, keep the SHIFT key pressed while It helps to get connected to an Internet Service
www.neerajbooks.com
deleting the files.
Restoring files from recycle bin.
Provider (ISP). It is based on the telephone
network. A MODEM (modulator demodulator) is
Open the icon by double clicking it. used for connection. It is a hardware device or
Right click on the file and select restore. software application program which allows the
Or computer to transmit data/information over a
Click on restore all items if you want to network. We know that computers store infor-
restore all. mation in digital form but data transmission over
Taskbar telephone lines needs the data to be converted into
You can see a horizontal bar at the bottom of analog signal. While receiving the data the opposite
the desktop. This is the task bar which contains is to be done. This is done by a modem.
the Start menu, and the tabs of the running Broadband Internet Connection: As
programmes. It can be dragged and be made a compared to dial up connections Broadband
vertical taskbar. It can be placed on any wall of Connection provide a high data rate transfer. This
the desktop. Make sure the lock taskbar option is allows quick uploads and downloads.
not switched on before dragging it, as it will not Webcasting is a video or audio broadcasting
allow it to move. of a presentation over the internet. Activities of

www.neerajbooks.com
www.neerajbooks.com

68 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

this type are facilitated by broadband and the like using its own IP address, cache the page, and
connections having high speed. This is playing a forward it to the user. So its function is to work as
vital role in education, entertainment and so on. an intermediary between the client application and
Proxy Server: A proxy server is a computer the Web server. It can also filter certain websites
server or it may be a software program that is part to be prevented to view. It is also used to increase
of the gateway server or another computer that the safety.
separates a local network from outside networks. Internet Explorer can be used to work as a
The function the a proxy server is mainly to cache proxy over a LAN connection. Follow the steps to
the pages accessed through the network and allow do this:
the users to visit it again. This gets loaded fastly 1. Open Internet Explorer, go to Tools menu
and help to reduce the network traffic. If a user and click on Internet Options, select the
wants to open a new page, it will access the page Connections tab, and then select LAN Settings.

Neeraj
Publications
www.neerajbooks.com

2. In Proxy server, select the check box of Use a proxy server for your LAN. Type the IP address
of the proxy server in Address box.
3. In the Port box, type the port number used by the proxy server. Default being 8080.
4. If you do not want it to work while working on LAN, select Bypass proxy server for local
addresses.
5. Click OK in LAN Settings dialog box.
6. Click OK in Internet Options dialog box to come out.

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 69

ATX Power Connector, AGP Slot, CD-in header,


Q. 1. What is a PC? What are different etc.
types of a PC? Q. 4. What is an operating system?
Ans. PC is a computer, which has the features Ans. Operating system is a system software
of becoming a personal computer, like its size, which works as an interface between the user and
capacity and cost must be according to the the machine. It also provides platform for
requirements of an individual. These are general application software to run on. It is a must for the
purpose computers which can perform variety of hardware and software to work. It manages the
functions and can cater to the need of almost every input, output processing and file management of
individual. The configuration may vary from the system.
person to person according to the need. Q. 5. What is utility software? List some
PC can be of following types: utility software used in a PC.
Desktop Computer Ans. These are the software which help to
Laptop Computer perform day-to-day tasks and maintenance of the
system. Normally, these clubbed as a package in
Netbook
system software. These are meant to perform a

Neeraj
PC Tablet. specific function. Examples:
Q. 2. How a laptop is differ from a desktop? Anti virus
Specify one configuration of a laptop.
Disk Defragmenter
Ans. Laptop and desktop are types of PC. The
Data Compression

Publications
main distinction is portability. A laptop is highly
portable computer which can be taken anywhere Disk Management
in a bag, but a desktop is kept on the top of a desk File compare
and can not be removed every time to take it here Back up,

PC.
www.neerajbooks.com
and there. The size of laptop is smaller than the Q. 6. Why System Restore is used? Explain
how you will use the System Restore.
Configuration of a Laptop Ans. Sometimes due to any problem, system
Processor: Intel Core™ i5-2410M data may get corrupted. These changes can make
Memory: 4GB DDR3 1333MHz memory the system slow or don’t allow to function properly.
Hard Disk: 640GB HDD (5400rpm). These changes can be undone by using System
restore. It can restore system backup files but not
Q. 3. What is the need of a motherboard in
user made files.
a computer? List some major components of a
motherboard. Steps:

Ans. Motherboard, also known as system 1. Click on Start menu, select All Programs,
board, is the most important component of the click Accessories, now click on System
computer as it holds many important and delicate Tools, and then click System Restore.
parts of the computer. It works as a base for the 2. On the Welcome to System Restore page,
processor, main memory and some other click Restore my computer to an earlier
semiconductors. Various devices are connected time (if it is not already selected) and then
to motherboard through ports. Components are click Next.

www.neerajbooks.com
www.neerajbooks.com

70 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

3. On the Select a Restore Point page, under personal computer generally smaller than a
On this list, click a restore point list, click briefcase that can easily be transported and carried.
the most recent system restore point and A laptop typically weighs less than 5 pounds and
click Next. is 3 inches or less in thickness. Among the best-
4. Click on next on the Confirm Restore known makers of laptop computers are IBM,
Point Selection page. Now the previous Apple, Compaq, Dell, and Toshiba.
configurations will be restored and the Laptop computers generally cost more than
system will get restarted. desktop computers with the same capabilities
5. Log on to the computer as Administrator. because they are more difficult to design and
The System Restore Restoration manufacture. A laptop can effectively be turned
Complete page is displayed. into a desktop computer with a docking station, a
6. Click on OK. hardware frame that supplies connections for
Q. 7. What is desktop on a computer? What peripheral input/output devices such as a printer
are different items found on desktop? or larger monitor.
Ans. Desktop is a main screen or background Laptops use several different approaches for
on a computer. It contains icons, files, folders etc. integrating a mouse into the keyboard, including

Neeraj
It can be customized, the user can add or delete the touch pad, the trackball, and the pointing stick.
icons from the desktop. Laptops usually come with displays that use thin-
Some common items of desktop: screen technology. The thin film transistor or
My Computer active matrix screen is brighter and views better
My Documents

Publications
at different angles than the STN or dual-scan
Recycle Bin
screen.
Task Bar.
Q. 2. What are the components of computer
Q. 8. What are the different methods for
software?
www.neerajbooks.com
accessing the internet? Explain methods.
Ans. Following are the methods of accessing
Ans. Software is the compilation of computer
programs and similar data that supply the
the internet:
instructions for what a computer should do.
Accessing the Internet are through a dial up
Software also refers to greater computer programs
connection, here the connection is set through
and information that are held in the storage area
telephone lines. ISPs are service providers. It
requires a modem. of a computer for a particular purpose. Software
Accessing through direct connection or say programs carry out the operation of the program
broadband. It is faster than the previous they implement by either serving as input for
connection. Direct connection is an ISDN additional software or by directly supplying the
(Integrated services digital network) line, a fiber computer hardware with instructions.
optical line, etc. Software is a term that was created in contrast
to the term hardware, which means a physical
device. Unlike hardware, software cannot be
Q. 1. Write in detail about the laptop. touched. There are times that software refers to
Ans. A laptop computer, usually called a items not typically connected with computers such
notebook computer is a battery- or AC-powered as records, tapes, and film. There are even great,

www.neerajbooks.com
www.neerajbooks.com

MY PERSONAL COMPUTER / 71

open source software applications like Freemind interface typically is through a graphical user
and GNU Cash that allow users and developers to interface, like a web browser.
see and change the code that runs the programs. Firmware: This is small-level software that
Some examples of software for a computer is typically stored on programmable memory
include: devices that are electrical.
Middleware: This coordinates and controls Test Ware: This is a type of software that is
what is known as distributed systems. used for testing software packages or hardware.
Application Software: This includes Device Drivers: These control the sections of
applications such as ERP software for groups, computers that include computer monitors, CD
video games or suites like Open Office. drives, printers or disk drives.
Programming Languages: These describe Programming Tools: These achieve tasks on
the semantics and syntax part of computer. computers. With programmers, these tools can be
System Software: This includes the OS which used for reverse engineering or debugging legacy
oversees computing resources. Currently, large systems that are older in order to verify source
applications that run on machines such as websites code compatibility.
are referred to as system software since the user

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

72

6
BASICS OF COMPUTER SOFTWARE

Software Evolution
Software is a set of programmes and
A computer, as you must have realized till now, programme is a set of instructions for the computer
is a versatile machine, which can help us perform to perform a particular task or tasks.
a variety of functions. It is being used to solve These set of instructions tell all the parts of
difficult scientific problems to simple operations. the computer what is to be done and how it is to
It is being used today in almost every sphere of be done, how the result will be flashed or saved
our life. etc. These programmes are written by computer

Neeraj
You might have noticed that computers
perform different tasks at different outlets.
Children at home are using it to play or to learn,
bank officers are using it to keep track of the
programmers.
The computer programmers write these
programmes in English like programming
languages, which is then translated into machine

Publications
transactions and to perform e-banking, clerk at the language (0s and 1s) by another computer program.
ticket counter uses it to book tickets, and so on. This translated program, called the software is
How the same machine is capable of doing eventually executed to perform the preplanned task
different functions at different end? Actually, the and thus, get the job done.
www.neerajbooks.com
difference lies in the use of software in that
particular computer. Software provides a variety
SOFTWARE EVOLUTION
Evolution of the software has been very
of functions and one has to choose proper software interesting over the years. It has been taken
according to the need to perform variety of tasks. versatile shape with variety of tasks to be
This chapter will help us understand about accomplished. Now softwares are available to
meaning and need of software and its types, and perform almost every commercial task. The
different aspects of software evolution. architecture, designing paradigm has changed a
lot. Not only this, there has been a positive change
WHAT IS SOFTWARE? in the difficulty level of the programming
Till now, we have been reading about the languages used to make programmes. These have
hardware part of the computer, means its various been more easier and user friendly now. Costs are
components, various input or output devices. But also becoming favourable. These points are
these are not enough to make it a system. These discussed below:
are just the physical structure of the computer. But Evolution of Software Architecture:
actually computer is a system of hardware and Software architecture has to go hand in hand with
software both. the evolution in the hardware:

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 73

Mainframe Architecture: In the Two-tiered Architecture: With the advent of


mainframe software architectures, all the RDBMS, it became possible to send a query and
intelligence lies with the central host computer. fetch the required detail instead of mounting the
Users interact with the host computer through whole file as in the file server approach. Further,
terminals that caputres keystrokes and sends that the use of graphical user interface made it easier
information to the host. These terminals are not to access the database. This system also helped in
intelligent. The main limitation of this type of reducing the traffic as the only necessary set of
architecture is that it does not support any graphical information is being mounted. Here, the logic may
user interface or access to multiple databases from retain with the server or with the client.
geographically dispersed sites. The problem with this type of system was that
File Sharing Architecture: In this kind with the increase in the number of clients the
of architecture, the server downloads files from network congestion happened. The system was not
the shared location to the desktop environment. very sustainable with the increasing clients.
The requested user job is then run both logic and Though, it was better in handling congestion as
data in the desktop environment. These compared to file system because the full file was
architectures are good if shared usage and content not being mounted every time but still very high
updating are very low as well as the volume of

Neeraj
number of clients made it congested over the
data to be transferred is low. network.
Main limitation of this architecture is that the Three-tiered Architecture: With the
file sharing gets disturbed with the increase of advance-ments, another tier appeared in between
number of online users. The full file has to be client and server and the architecture was called a

Publications
downloaded to the user machine each time he/she 3 tier architecture. Here, the presentation (user
requests for a file, it enhances the traffic. interface), processing (business functionality) and
Client/Server Architecture: This data are separated into separate distinct entities.
approach overcomes the limitation of file server This helps in improved performance. The first tier,
www.neerajbooks.com
where for each query the full file content has to be
uploaded every time. Here, by using a relational
called the presentation layer normally consists of
a graphical user interface. The middle tier consists
database management system, also called of the application logic and the third tier is the
RDBMS, user queries are answered directly. This data layer. The three logical layers can lie in the
reduces the network traffic by supplying relevant same machine also through smart software
query response to the client instead of the total
configuration. This separation brings increase in
file transfer. It highly improves multi-user updating
performance and flexibility.
through a GUI front end to a shared database. In
The problem with this architecture is of
this architecture, remote procedure calls or
reusability of a computer programme in various
standard query language statements are being used
situations, which may be helpful in reducing the
by clients to communicate with servers. A server
cost of the software development because no new
machine acts as host and runs programmes to share
software has to be developed for each and every
resources with the clients. Clients send requests
tiny task. Scalability is also problem with this
to the servers and it fulfills them. The client and
architecture.
server system may be of the following types:
N-tiered Architecture: In the term “N-tier”,
The client/server system may be two-tiered,
“N” implies any number, like 2-tier, or 4-tier,
three-tiered or n-tiered.

www.neerajbooks.com
www.neerajbooks.com

74 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

basically any number of distinct tiers used in the collection of thousands of individual networks
architecture. Any number of levels arranged above intercommunicating with a common protocol. This
another, each serving distinct and separate tasks. architecture is based in the very specification of
It can increase reusability and reliability. the standard TCP/IP protocol, designed to connect
Internet-based Architecture: It is by any two networks which may be different in
definition a meta-network, a constantly changing internal hardware, software and technical design.

Neeraj
Publications
www.neerajbooks.com

Cloud Computing resources as a service through self-service pay-


Cloud computing is a style of computing per use access. Although it leverages recently
whose foundation is the delivery of services, developed technology, cloud computing is a
software and processing capacity using private or business, not a technical trend. It is based on
public networks. Cloud-based software services Internet and remote servers. Web based emails and
typically mean that the consumer does not own chat are best examples of cloud based computing.
the hardware and software, but still gets the desired Key features of cloud computing are:
service. It is an IT delivery model that offers large- Infrastructure sharing
scale, shared infrastructure and computing Scalable solution

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 75

Self service functions. OOD also allows the programmers to


Pay per use create relationship between various objects. For
Rapid respond to customer’s need. example, objects can inherit characteristics from
Benefits of cloud based solutions are: other objects. This allows reusability of modules
and also troubleshooting becomes easier.
Lesser cost of getting started.
Component Based Paradigm: The
Needs lesser time for a customer to go on
component based programming is simple, easy,
cloud solution.
reusable and organized. A component is one or
Rapid respond to customer’s need.
more classed that are compiled in a separate DLL
Scalability. file. These classes are logically related. These can
Evolution of Software Design Paradigm be used in one or more applications. The
The style of the software programming also components can be encapsulated which means it
envisaged new trends with the advancements in will provide the features needed, other features will
other areas. Reusability of the software has always be hidden. These components can be smaller
been seen as a goal to achieve. To realize this goal, having a single object inside the class or a complex
the software design paradigm has to application. It supports the development of

Neeraj
compartmentalize it according to the various software systems by assembling a set of
functions to be performed. These small independently developed Components Off-The-
compartments or subunits may be used in any other Shelf (COTS) in a ‘plug and play’ manner.
programme to perform the same function. Service Oriented Paradigm: In these years,
Non-structured Design Paradigm: This is

Publications
a programming paradigm shift is in progress:
the traditional type of programming where researchers and developers are moving from
statements were followed one after the other. These component-based to service-based development.
were numbered to allow jump to any line. There This shift is deeply affecting the technology,
www.neerajbooks.com
were no procedures means in non-structured
programming no reusable units were there.
changing the way of addressing old problems and
producing new standards and methodologies to
Structured and Modular Design Paradigm: address the new ones. A service has all the
Structured programming allowed the use of characteristics of a component and it has some
procedures, which further allowed the reusability additional also such as it can be developed using
of the modules and repetition of the procedures different technologies and it can be executed in
without hassle. It makes it easier to code, make different run time environments.
and understand. Alike functions and procedures Evolution of Programming Languages
were grouped in form of modules. These modules The need of programming language shifted
may be used in some other set of software. with the time from procedural to object oriented.
Object Oriented Design Paradigm: OOD is Some features are elaborated as under:
a type of programming in which programmers (a) Procedural Language: A computer
define the data type of a data structure and the programming language that follows, in order, a set
types of operations (functions) that can be applied of commands. Each instruction is executed in set
to the data structure. Thus, the data structure order from top to bottom. Examples of computer
becomes an object that includes both data and procedural languages are BASIC, C, FORTRAN,

www.neerajbooks.com
www.neerajbooks.com

76 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

and Pascal. Any programming language in which actions that can be performed by its functions.
the programmer specifies an explicit sequence of These objects are to be used with specific data or
steps to be followed to produce a result is called a to perform particular tasks.
procedural language. 3. Parameter: A parameter or argument is a
(b) Object Oriented Language: Object- variable that is passed into a function to be
oriented Programming (OOP) is a programming processed.
paradigm that uses objects. These objects are data 4. Method: A method is a programmed
structures consisting of data fields and methods procedure that is defined as part of a class.
together with their interactions. These are used to 5. Property: A property is the default set of
design applications and computer programs. An data of a class which can be changed. A class can
object oriented language supports the following: have more than one properties.
Encapsulation: Encapsulation means the Evolution of Software Licensing
mechanism of restricting the access to few objects’ Since past few years, the concept of software
components. Encapsulation makes the interface to licensing is also getting weightage.
become visible but the implementation details of Introductions of Software Licensing:
the object are kept hidden. Earlier the software was provided with access to

Neeraj
Inheritance: The child inherits some the source code and the modification was
characteristics from the parents. In object-oriented allowed. But with time and increasing demand
programming too inheritance is a way to form new of variety of software, it was felt that providing
classes using classes that have already been copyright to use the software is more beneficial
defined. The new classes, known as derived than to allow to change the source code according

Publications
classes, take over (or inherit) attributes and
behaviour of the pre-existing classes, which are
referred to as parent class. It helps to reuse existing
code with little or no modification.
to the need of the user on their own. The license
of the software authorizes the purchaser to use it
without any time limit.

www.neerajbooks.com
Polymorphism: By this feature different data
Propriety software is software that is the
property of the manufacturing company. No source
type values can be handled using a uniform code is provided with them to get modified. Open
interface. It is the ability to process objects software is software that comes with the source
differently according to their data types and to code to get modified by the user as per need or the
redefine methods for derived classes. user can redistribute it by using its license.
Some features of object oriented Types of Software Licensing
programming 1. Individual License: Individual license
1. Class: A class in object-oriented gives permission to the software installation to only
programming to refer to a set of related objects one PC that is stand alone. It cannot be shared. It
that share common characteristics. Classes and the can be of the following types:
ability to create new classes are what make object- (a) Perpetual License: This license allows
oriented programming a powerful and flexible the software to be used unlimately on a stand alone
programming model. machine.
2. Object: An object is a specific instance of (b) Subscription Based: This license allows
a class. It receives all of the characteristics of a the user to use the software for a limited period. If
class, including all of its default data and any he wants to use it further it has to be renewed.

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 77

2. Open Source License: This license allows (a) Operating System: The operating system
the user to use, modify or redistribute it. works as an interface between the user and the
3. Commercial License: Commercial License machine. It also provides the user the facility to
is need by the large enterprises because they need interact with the application programmes. We
it for the commercial purposes. cannot understand the language of the computer
and the computers are unable to understand our
Main licensing models are:
language, it is Operating System (OS) that works
(a) Traditional Model: Traditional models as an interpreter and translates our language or
can be of the following type: commands into binary so that the computer and
single user-single license, understand and execute it provides the result in
multi users-shared license, our language. If we are interacting with any
temporary or fixed-period licenses. application software or hardware of the computer,
we are actually interacting with the system OS
(b) Transaction-based Model: This model
which is working as an interpreter. Some common
gives the user the liberty of accessing the system
functions performed by the OS are:
from anywhere. This can be done by internet. The
Controlling the system
user is not to be worried about the maintenance of
Directing input and output

Neeraj
the database. This is done by the service provider
who charges of per transaction from the user. The Keeping track of the files
pricing is based on the number of transactions. Controls the processing
(c) Rental Model: This model provides Managing the functions of hardware
liberty to the user from making heavy investment Running application software

Publications
on hardware and software and provides them as
service. The service is provided on the special
demand on monthly or annual basis by the service
Serving as an interface
Security.
(b) Server Programs: Server programs are
www.neerajbooks.com
providers on a predetermined rate as rent.
(d) Technology Partnerships: This type of
programs that awaits and fulfils programs in the
same or client computer. These run as services and
partnership happens between the service provider serve the requests of other programs. Examples:
and the user. The user becomes authorized to use Print server is used to manage multiple
the technology for a longer period. print requests for multiple printers.
TYPES OF SOFTWARE File server is used to manage file storage
Computer software can be broadly classified and retrieval.
as: Web server is used for hosting websites.
1. Systems Software: System software as the Mail Server is used to manage and transfer
name suggests is necessary for the system to electronic mail.
function and to work as a system. It enables the Database server provides database
hardware components to operate and works as an services to clients.
interface. It prepares a platform for application (c) Device Drivers: Device drivers work as
software to run. It includes the operating system interface between the device and the system
and all the other utilities that enable the computer operating system or the higher level programmes.
to function. Common system softwares are: Only physical connection of the hardware does not

www.neerajbooks.com
www.neerajbooks.com

78 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

do. Its driver should also be installed to get it generated by a compiler to make single executable
connected to the system operating system. Most program. Structured programming promotes a
of the devices need drivers. Example: modular approach where separate modules are
Printers developed on the basis of nature of function they
perform. Programming for these modules can be
Keyboards
done independently and compiled to get object file.
Sound cards
At last this is the work of a linker programme to
Network cards link all the object files and make them turn into a
Card readers single executable program.
Mouse (d) Text Editors: These are the programs that
Image Scanners enable the user to create and edit text files. There
Graphics cards are many different types of editors.
CD drives. Example: Notepad.
(d) Communications Software: Communi- Application Software
cation Software is needed in a networked It includes programs that do real work for
environment. It helps the computer to interact with users. These are task specific software, which

Neeraj
other systems. Here, interacting means sharing of have been developed to perform some specific
resources and information. Security is also taken tasks. For example, word processors,
care of. spreadsheets, and database management systems
fall under the category of applications software.
2. Programming Software: Programming
These are:

Publications
software allows a programmer to write
(a) Word Processing Software: As the name
programmes for the computer without facing the
suggests these are meant to create textual
hurdles of machine language interaction. He can
documents. These software provide the utility of
use the programming languages for this purpose.
editing, saving, printing these documents.
www.neerajbooks.com
Examples:
(a) Compilers: Compilers are programs that
Example: MS Word by Microsoft Corporation.
(b) Spreadsheet Software: These documents
translate the source code from a higher level
are needed to create numeric based documents,
programming language to lower level machine which allow the numeric data to be entered and
language. The compilers do not execute the processed. Editing, saving, formatting etc. features
program, but they are used to translate the program. are provided here also. Example: MS Excel by
(b) Debuggers: It is used to debug the target Microsoft Corporation.
program. It runs the program step by step to find (c) Database Software: Database is an
errors which can then be debugged. Some more organized collection of data in digital form which
efficient debuggers are available which also help allows the updation, addition, deletion and retrieval
to modify the program. quickly. These are used to maintain large data
(c) Interpreters: It is a programming software collection. Example: Oracle.
that executes the written program or the source (d) Presentation Software: These software
code after translating it. Read, check, execute loop allows the user to create presentation files to be
goes on. shown slide by slide as a show in meetings,
(d) Linkers: These are the programs which seminars, etc. Features like sound and animation
are used to combine one or more object file codes effects can be added to make the slide show more

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 79

effective. Example: MS Power Point by Microsoft detect the type of virus and protect the computer
Corporation. from these.
(e) Graphics Software: There is a need to Earlier it was possible to save your computer
manipulate pictures or movies to make them from virus by not using infected floppies etc. by
presentable and to make the presentation more now the virus can enter into the system online too.
effective or to mix some effects. Graphic software Anti virus is the need of the hour. These software
allows the user to do this. Example : Photoshop use one of the following techniques:
and MS Paint. 1. Signature based detection: This is an
(f) Multimedia Authoring Application: ordinary technique. To recognize the virus as well
Some effects of multimedia turn the presentation as the Malware antivirus software evaluates the
stuffing of a file to a vocabulary or virus signatures.
into magic. These applications are used to make
The entire file is searched for this.
digital movies with sound, video, animation, etc.
2. Heuristic-based detection: It is thought
Mediator 9 is an example of multimedia authoring
that the heuristic based technology can find viruses
tool.
that have previously been unknown.
(g) Entertainment Software
3. File Emulation: It is a heuristic approach
(h) Education Software of virus detection. Here the actions of the infected

Neeraj
(i) Video Games programme are recorded and these are analysed.
(j) Business Software. Example: Airline Then if found any discrepancy the follow up is
reservation done.
(k) Mathematical Software There are some limitations of the anti-viruses:
This can hamper the computer speed and

Publications
(l) Telecommunications
performance.
(m) Scientific Software
False positive can occur with use of anti-
(n) Medical Software viruses. In this if an antivirus software
(o) Image Editing Simulation Software etc. detects a programme or file as infected
www.neerajbooks.com
UTILITY SOFTWARE though it is not so, it can cause problems.
New viruses are out of the reach of almost
Utility software is software that provides an
added capability which was not provided by the all older versions of the anti-viruses.
operating system. These are specialized in nature Despite of the limitations or drawbacks,
and relatively limited in capability. Search and anti-viruses are used to safeguard the
replace utility is a good example. Utility programs computers from undue damage of viruses.
help to manage and control computer resources. Some famous anti-viruses are McAfee and
Some of them are as below: Norton.
(b) Backup Utilities: Backup in computer
(a) Anti Virus Software: Virus in computer
terminology means keeping a duplicate or backup
terminology is a destructive programmes that has
copy of the file or programme. It is helpful in the
been developed with ill intentions of disturbing data crisis when the file is lost or damaged due to
the functioning of the system. It can create unusual some reason. It is always recommended to keep
data, hide or delete the files and has the capability backup utility and create backup files for important
of multiplying itself to occupy the memory and data.
slow down the system with a very low instruction Backup softwares are easily available and the
response. Anti virus programmes are needed to user can choose according to requirements. But

www.neerajbooks.com
www.neerajbooks.com

80 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

some features like ease of use, ease of installation, of free area that has been created here and
data compression ability, safety, data security there in the disk due to deleting some data.
should be taken care of while choosing a backup Norton Diagnostics: It performs test on
software. Some of these softwares are available processor and motherboard etc. to identify
even for free. Backup can be taken on CDs, problems.
Floppies, FTP locations, tapes, online servers etc. QAPlus: It provides a detailed infor-
(c) Diagnostic Programs: Diagnostic mation of the system. Being a diagnostic
program is a program that recognizes and explains software it also helps to trace problems.
the faults in the hardware or software or networked (d) File View Programs: File view utilities
system. It may provide solutions or can provide helps the user to view files and their content
hints to find out the solution.
without having application on the system. As the
Some common software diagnostic tools are: name suggests it helps to view the contents or the
Power-On Self Test (POST): This user can print it, but modification rights are
diagnostic utility is found in the system reserved. If one has to modify the contents, he or
BIOS and runs at startup to diagnose any she has to copy the content in some other file and
problem in the system. If any discrepancy then edit it. Some file viewers are meant to view
is found it flashes error message.

Neeraj
picture files too. Examples: Microsoft word
MEM.EXE: Mem stands for memory, it viewer, Microsoft Power Point viewer, Acrobat
is found in operating system by windows reader and some viewers provided by Google.
and tells about the memory configuration (e) Computer Performance Enhancement
and memory usage. Utilities: Computer performance enhancement

Publications
MSD.EXE: It stands for Microsoft utilities are the utilities which are available to
diagnostics. It is DOS utility used to show enhance the performance of the computer. These
inventory of the contents of the PC like may be purchased separately or some are available
computer brand, memory, network, OS,
www.neerajbooks.com
drives, ports, etc.
in BIOS and OS. Example:
Disk defragmenter
The Windows Device Manager: As the Accelerator
name suggests it tell about the devices Registry clean expert.
attached. PERVERSE SOFTWARE
Norton System Information: This is an Perverse means contrary to what is acceptable
extension of MSD and provides detailed and expectable. A perverse software is a program
view of PC contents. which causes trouble in the execution of other
Microsoft Scan Disk and Norton Disk programmes by spoiling it in part or full. You might
Doctor: These scan the disk for any kind be thinking if it is so dangerous why should one
of problem. use it. But these malicious softwares are not
Scandisk: This utility is used to scan the purchased or downloaded by the users choice.
disk, as the name suggests. It is done to These are destructive software meant for damaging
check whether bad blocks or any problem the data or applications by some anti-social
is there in the disk. elements and enter in the system without the
Microsoft Disk Defragmenter: This consent of the owner. Malware can harm the
software helps to collect the small blocks system badly by damaging the useful data and

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 81

application software, even it does not spare the Trap doors: It is a back way or a hidden
operating system of the computer. Malware can method or other way of by passing traditional
be: security in order to gain access to a secure system.
Computer Virus: A computer program that A malware prepares trap doors in the system for
is designed to replicate itself by copying itself into entering in these easily in future.
the other programs stored in a computer. Viruses Logic Bombs/Time Bombs: A time bomb
are destructive programmes designed to damage or logic bomb hides itself on the hard disk. It
the system functioning. It may be in form of a silently waits for a specific date to come or a
software program, script or macro. These are specific action to occur like opening or saving a
designed with the intention to infect or cause other file, giving specific command, etc. They do not
problems to files and computers. These need the replicate themselves and cannot be called virus.
user action to start themselves like switching on These are calm and harmless till the date or action
the system, opening file, giving some commands, occurs which triggers them to destroy data and files
etc. These can be avoided or removed by using on the system of the user. Examples: April Fool
effective and up to the mark anti virus software. Day or Friday the 13th.
Some viruses do not harm much. They just Spyware: These are designed to show
alluring advertisements and redirect the search

Neeraj
replicate themselves to consume memory or just
flash funny messages now and then. But some engines to paid advertisements to get access to
viruses can cause data damage. user’s data. These work in a hidden style.
Computer Worm: A computer worm is a Keystroke loggers: The keylogger
destructive software program, set of codes which program records each keystroke the user types and

Publications
make it capable of gaining access to computers or uploads the information over the Internet
networks. Once within the computer or network, periodically to whoever installed the program. It
is used in malpractices such as fetching the
the worm causes harm by deleting, modifying,
password or credit card number while shopping
distributing, or otherwise manipulating data. These
www.neerajbooks.com
always provide atleast some harm to the network.
to be misused in future.
Data-stealing: Data-stealing problem is
Trojan Horse: Torjan horse is very
increasing day-by-day. It is done to get commercial
destructive but works very interestingly. It pretends
gains by stealing information and using it for
to be a very irresistible benign program. The
commercial use. Example, steal and sell numbers
viewer gets attracted to it. He installs it on the
of credit cards or membership cards of some
system and the problems start. It can steal or even
reputed organization or club. It may cost its
delete the important files or fill the memory with
useless programmes. These do not replicate but members a lot.
provide damage to the security and privacy. Ways Counter Preserve Software
Rootkits: It is a technique which prevents The operating system and other progra-
the destructive processes to be visible as running mmes are being updated from time to time.
program and making them able to keep on Blocking any kind of virus from entering
destroying the system. These are installed usually into the system. This can be done by using
by trojans and pretend to be operating system files blockers and filters.
which are necessary for functioning of the system Anti-virus software should be used. These
so user will not delete them. must be updated from time-to-time.

www.neerajbooks.com
www.neerajbooks.com

82 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Be aware of the spyware and avoid License must not restrict other
installing unnecessary programmes and software: There should not be any restriction
avoid opening each and every advertise- about distribution of other programs which are
ments. being distributed on the same medium to be open
Anti spyware must also be installed. source software only.
OPEN SOURCE SOFTWARE Some examples of Open Source Software
Open Source Software is software that you can are:
get the source code for. Open Source Software PHP - Scripting language suited for the web
tends to be more reliable and have bugs fixed more MySQL - database,
quickly, because many talented developers can Mozilla Thunderbird
access it. Open Source Software (OSS) also Limitations of Open Source Software:
provides rights to study, change and improve the Lack of product support.
software.
Lack of end user training.
Objectives of Open Source System:
These limitations can be overcome.
1. Encouraging innovation globally.

Neeraj
2. Providing chance to individuals too.
Q. 1. Compare and contrast the following:
3. Gaining benefit form larger knowledge
pool. (a) Mainframe and File Sharing architec-
ture.
4. Getting updated software.
(b) Client server and Distributed archite-

Publications
5. Software quality gets improved.
cture.
6. Software cost is reduced.
(c) Structured and Non-Structured
The OSI are the stewards of the Open Source Programming.
Definition (OSD) and the community-recognized
www.neerajbooks.com
body for reviewing and approving licenses as
OSD-conformant. To get OSD compliance the
Ans. (a) With mainframe software architec-
tures all intelligence is within the central host
computer. Users interact with the host through a
following criterion must be followed:
terminal that captures keystrokes and sends that
Free Redistribution: The software information to the host.
should be available to redistribute it free of cost.
In a file sharing architecture smart download
Source Code: The program is distributed files from a shared server. The requested user job
in both the source code and the executable file. is then run (including logic and data) in the desktop
Derived Works: Changes must be environment.
allowed and distribution must be done with the (b) In Client Server architecture, the Client
same liberty. software requests for the service and Server
No Discrimination Against Specific software provides the service. These two softwares
Applications: The use must not be conditioned. can be on two well distanced machines or it may
License Must not be Specific to a be on the same machine. In the distributed systems,
product: The license must cater to the full program various machines on a network are used to run
not any part of it. variety of jobs.

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 83

(c) Structured programming or modular Q. 4. What is pay-per-use licensing?


programming is a subset of procedural Ans. In the pay-per-use licensing the user is
programming that enforces a logical structure on charged according to the use of the software,
the program being written to make it more efficient service or module. Here the user need not buy
and easier to understand and modify. The entire the product. The services can be availed for per
logic of the programme is divided into modules use as rent. It can be based on time or frequency
which can be used elsewhere also. of usage.
Non-Structured programming is the earliest
Q. 5. Compare and contrast the following:
programming paradigm where the full logic of the
programme is implemented in a single module. (a) System and Application Software
These are more hard to understand, debug and (b) Compiler and Linker
modify. (c) Compiler and Interpreter
Q. 2. Describe the following terms: Ans. (a) A system software is used to work as
(a) Software Reusability an interface between the machine and the
(b) Software Reliability application software. A computer is unable to
(c) Encapsulation function in absence of a system software. It also

Neeraj
Ans. (a) Software Reusability: This is a allows the user to interact with the machine.
feature of a computer program which makes it easy Example: Operating systems.
to be used repeatedly in some other program in Application software is task oriented software
full or in part. The code for addition can be used which is indented to perform a particular task like
in multiplication also as multiplication is repeated accounting or text editors.
addition.

Publications
(b) Software Reliability: This feature
specifies that the software performs the function
(b) Compiler is used to convert the source code
in high level language to the object code in low
level language.
www.neerajbooks.com
which it is intented to perform in specified
environment without failure.
Linker is used to link all the related object files
which are parts of a software and create a single
(c) Encapsulation: This feature allows to exe from it.
camaflauge data and methods while exposing only
(c) Compiler is used to convert the source code
few required data and methods. This feature can
in high level language to the object code in low
be useful to protect data by hiding internal details
level language. Any errors are reported at compile
from the world.
time for the complete code.
Q. 3. What do you understand by Software-
An interpreter also translates the source code
as-a-Service? How is it different from Cloud
into object code and executes it but the
Computing?
difference is that it translates and executes one
Ans. Software-as-a-Service (SaaS) is a way
line at a time.
or model of delivery of the software. It allows the
user to pay just according to the use. It spares the The compiler translated the whole program
user from buying, installing and running the then runs it but the interpreter translates one line
software on his own. Cloud computing helps the at a time while the program is being run. Complied
user to use the files and applications over the programs are faster to run than interpreted
internet. SAAS runs on cloud computing. programs.

www.neerajbooks.com
www.neerajbooks.com

84 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Q. 6. Give an example of each of the following:


(a) Decision Making Software
(b) Education Software
(c) Industrial Automation Software
(d) Mathematical Software
(e) Simulation Software
Ans. (a) Decision Making Software : Decision Manager
(b) Education Software : Educosoft
(c) Industrial Automation Software : Computer Aided Manufacturing
(d) Mathematical Software : Matlab
(e) Simulation Software : Open Modelica.

Q. 7. You bought a new printer. You (b) Device Driver for the scanner

Neeraj
attached it to the computer and plugged to the (c) Operating System (like Windows)
power, but it still does not work. What do you (d) Database Software (like Oracle).
think must have happened and how can you
Q. 9. Differentiate between open source and
resolve the issue? proprietary software?
Ans. Only plugging the new hardware to the

Publications
Ans. Proprietary software is a software
computer and the power does not work. It has to t h a t h as be en o wn e d b y a co mp a n y or
be installed on the system. For this, its drivers individual. The developer does not provide
(software) must be installed. any right of modification or copying or further
www.neerajbooks.com
Q. 8. List which software will be required
to perform the following actions:
distribution. That is why he keeps the source
code a secret.
(a) You have write code in C++. What Advantages of proprietary software
software you will use to write the code in? include:
(b) You have attached a new scanner to Strong support system.
your machine to scan your photo- Modular formats.
graphs. What software you will use to Regularly.
get it working?
Easy updation.
(c) You have bought a new PC. What is the
The disadvantages of Proprietary Software
first piece of software that is needed to
are:
be installed for it to be useful so that
other software could be added? It is very costly.
(d) You have created a student registration Further development is blocked.
system. What will you use to store the Open source programs are provided with
students data. the source code to the user to use it or
Ans.(a) Text Editor (for ex TextPad) modify it.

www.neerajbooks.com
www.neerajbooks.com

SOFTWARE EVOLUTION / 85

Advantages of Open Source Software are:


Cost is low.
Q. 1. Explain the importance of computer
No license fees.
software for the professionals.
Easy integration with other systems. Ans. The development of software during
Easily customizable. the past 30 years has been just as dramatic in
Scope for further improvement is there. many respects. Whereas future developments in
Limitation of Open Source Software are: hardware technology can be expected to provide
smaller, cheaper, and more powerful computers
Professional support is not always
as has been the case during the past 25 years,
available.
future developments in software technology can
Developer communities get emerged. be expected to play an important role of
Q. 10. Identify open source software from expanding the user base for computers, thus,
the following list? making it economically feasible to exploit
(a) Open Office technologies on the hardware side. Although
today’s computer software offerings are very
(b) Filezilla

Neeraj
broad indeed in terms of the number of tasks
(c) MS Word they perform, one can reasonably expect that
(d) Pidgin entirely new uses will be found for computers,
(e) Confluence through the development of new kinds of
software, in the future. By exploiting the huge

Publications
Ans. OpenOffice, Filezilla, Pidgin.
memory capacities of today’s newer computers,
Q. 11. What measure should you take to future software will be easier to use and will be
safeguard your computer from a virus attack? capable of carrying out several tasks

www.neerajbooks.com
Ans. The following measures should be taken:
Anti virus must be installed.
simultaneously.
It will also be much more forgiving, adapting
itself automatically to the work style of the user.
Antispy ware must be installed.
By incorporating at least a part of what
Operating system must be updated. constitutes the stock of knowledge in particular
Scanning should be done from time-to- applications, so-called “expert systems”, one
time. may expect future software, particularly in areas
Anti virus must be updated from time-to- such as financial and statistical analysis, to
time. enable the computer to work more as a partner
or colleague than as an unintelligent tool.
Click on reliable links only.
Perhaps to an even greater extent in the future
Emails should be scanned before opening. than has been true to date, the evolution of the
Q. 12. Name a few computer performance computer as a useful tool will depend on
enhancement utilities? software, rather than hardware, innovation. The
Ans. WinUtilitites, Boost Windows 2009, hardware advances necessary to place hearing,
TweakVista, System Optimize Expert. speaking, seeing, and even thinking computers

www.neerajbooks.com
www.neerajbooks.com

86 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

on everyone’s desktop, each of which would be Some software comes with the license when
able to provide ready access to truly mind- purchased off the shelf or an OEM license when
boggling quantities of information, is at hand. bundled with hardware. Software can also be in
Only the software really remains to be the form of freeware or shareware. Software
developed. licenses can generally be fit into the following
Q. 2. What do know about software license? categories: proprietary licenses and free and open
Ans. A software license is a legal instrument source licenses, which include free software
governing the usage or redistribution of licenses and other open source licenses. The
software. All software is copyright protected, features that distinguish them are significant in
except material in the public domain. A typical terms of the effect they have on the end-user’s
software license grants an end-user permission rights. A free open source license makes software
to use one or more copies of software in ways free for inspection of its code, modification, and
where such a use would otherwise potentially distribution.
constitute copyright infringement of the
software owner ’s exclusive rights under
copyright law.

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

87

Operating System 7

We have read earlier that operating system is


a system software. Operating system is needed by
a computer to function. As computers can
understand only binary and it is not possible for
us to provide each and every command in binary,
we need some interface, which should work as an

Neeraj
interpreter between the machine and user. This
work is performed well by the operating system
software. This software is a set of programs that
make the hardware useable. It also provides
platform for the application system to run on.

Publications
In this chapter, we will discuss about the
history of evolution of OS, concepts of an The above diagram shows the status of the
operating system like command interface, operating system in the computer system. It
bootstrap loader, kernel, nano kernel, thin clients,
www.neerajbooks.com
multitasking and multi-programming OS, services
provided by OS.
interacts with the hardware and allows the
application software to run on it. It facilitates the
user to interact with the machine and get the
desired process done.
THE CONCEPT OF OPERATING SYSTEM Some of the operating system functions are:
Operating system is the set of programs that implementing the user interface,
controls a computer. It is an essential software allows the user to execute the programme,
required by the computer system. The main provides boot strapping to boot the system,
function of the operating system is to work as an manage network services,
interface between the user and the machine. sharing hardware among users,
Operating Systems are resource managers. The facilitating input/output,
main resource is computer hardware in the form allowing users to share data among
of processors, storage, input/output devices, themselves,
communication devices and data. scheduling resources among users,
Some examples of operating systems are recovering from errors,
Microsoft Windows, Android, iOS, Linux, UNIX, accounting for resource usage,
Mach, MS-DOS, Windows/NT, Chicago, OS/2, facilitating parallel operations,
Mac OS etc. file system,

www.neerajbooks.com
www.neerajbooks.com

88 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

organizing data, and Where does the OS Reside?


handling network communications. The operating system may or may not reside
Suppose you provide a command to the OS, inside the computer. If the computer is attached to
now to execute it, OS will have to: a network and does not have any disk of its own,
(i) First of all accept a command. It may be then it may fetch the OS like other applications
provided using input devices such as and files from the server and in that sense it is
keyboard or mouse or touchscreen. It has called a thin client or diskless workstation.
to recognize the medium of input.
Multitasking Operating System
(ii) After accepting, it has to interpret the
command, means what has to be done There is a need of operating systems that allow
must be recognized. a user to keep on doing number of tasks at the
same time, this may be done on a single machine
(iii) Take actions according to the command
for process. or on a network. The Operating System which
allow this are called multiuser and multi-
(iv) For this, it provides a file system to find
programming or multitasking operating system.
the name of the program being requested
and determines the location of the file. These allow many users to share computer
resources at the same time.
(v) Fetch the file into the memory to get the

Neeraj
command executed. Online, Interactive System: Online means
(vi) Allot time to each program if more than the system is directly in contact with the user and
one program is running. the user is providing data and instructions to the
The Operating System can be divided into two computer.
parts: Interactivity of the system implies the feature

Publications
Resident part: These are all the necessary that allows the user to interact directly with the
services which should remain in the program to provide data and commands. Today is
memory all the time to run the system. The the era of interactivity.
other name of these essential parts is kernel Batch Processing: Batch processing refers to
www.neerajbooks.com
of the operating system. It works as a bridge
between the application and the actual data
processing transactions in a group or batch. User
interaction is not allowed while the batch
processing done at hardware level. These processing is on. For example, monthly bills for
are loaded in the memory at the boot time utilities and other services received by consumers
or say start time of the system. Contents or
are typically generated by batch processing. Batch
services of this nature reside in the memory
processing has a number of benefits, such as
as long as the machine is switched on. For
enabling the sharing of computer resources and
easy retrieval, the bootstrap is usually
facilitating better use of these resources.
stored in the ROM. Some machines allow
the resident part of the operating system to Graphical User Interface: The term GUI
also reside in the ROM for promptness. simply implies the interface for user in a graphical
This is the era of delivering big services in manner. Now-a-days the OS combine this feature
small packages. This happens in kernel to provide user much higher level of interactivity
also. That is technology is advancing with the computer. GUI includes windows, icons
towards nano kernals. and menus, which can be easily manipulated by
Non-resident: These are those parts which mouse, though one can use the keyboard as well.
need not be in the memory all the time. These GUI makes computer operations more intuitive and
services can be loaded as the need be. easier to use.

www.neerajbooks.com
www.neerajbooks.com

OPERATING SYSTEM / 89

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

90 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Those are a few examples of graphical user all the input or output devices. The driver
interface where the user can see the icons or menus programmes of devices installed on the system help
and can command the system by simply clicking to do this. The devise driver programs of the
the mouse. operating system help to accept input or output
Command Line Interface: This user request and performs the job accordingly.
interface depends on the written commands. The (d) Process Control Management: Process
commands are provided in written to perform control is an integral part of the operating system.
specific tasks. Example: UNIX. A process is a running program or function or it
OPERATING SYSTEM SERVICES can be called a program in execution. The
We have outlined the basic services provided operating system has to manage the process by
by the operating system. Let us discuss in detail allocating appropriate resources to a particular
process at a time, it also has to allocate resources
the most common few:
to other processes running on the system. It has to
Command Processor and User Interface:
make the processes able to share the information
User Interface Service is the main service provided
if needed. It also has to make sync among the
by the OS to the user. It also provides the facility process to make them happen successfully. There
to execute commands. The user is required to may be need of more than one process to run

Neeraj
memorize the commands to get the work done. simultaneously. The operating system has to be
New users find it cumbersome. multiprocessing or multitasking to cater to this
(b) File Management: A file is a collection need of the user. A multiprogramming or
of related information stored under one name. For multitasking OS is a system executing many

Publications
example, a text file may contain data of letters, or processes concurrently. Here, the OS has to decide
student records etc. A file may contain sounds or which job is to be processed first and which is to
visuals too. These files are logically stored on the be taken next. This is called job scheduling. A
disk. The task for file management are: process can be further divided into smaller
www.neerajbooks.com
It identifies the files by their unique
names.
independent units. These are called threads, which
can run separately from other threads of the same
It maintains a list of file storage about process and thereby allocating the resources more
logically.
where the file is storage exactly.
Memory Management: It is the process of
Provide access to user according to the
managing computer memory. Memory manage-
security setting.
ment is all about assigning segments of the memory
Bring the files in the memory as per the to various tasks or information as needed. In a
need and then save back on appropriate multitasking system many programs have to be
location using the process manager. there in the memory at the same time. Main tasks
Help users interact using simple are:
commands about file handling. To keep track of the available space.
It also keeps track of mapping. To provide space to specific tasks.
Allows mounting and unmounting of file To keep track which track is provided to
structures. which process.
(c) Input/Output services: Input and output To make queues of programs based on
services are provided by the operating system for priority.

www.neerajbooks.com
www.neerajbooks.com

OPERATING SYSTEM / 91

To deallocate the space when the process Multiprogramming can be used to handle
is over. multiple interactive jobs at the same time. This
A BIT OF HISTORY technique is referred to as time sharing. In this,
History of operating system may familiarize the time of the processor is shared among various
us about the trend in evolution of operating users who run various programs at the same time.
systems. Batch processing and time sharing use
Serial Processing: The earliest electronic
multiprogramming but the difference is that the
digital computers had no operating systems. This
objective of the batch processing is to maximize
was the era of 1940 to early 1950s. Machines of
the time were so primitive that programs were the use of the processor and the objective of the
often entered one bit at time on rows of mechanical time sharing is to minimize response time.
switches (plug boards). The operating systems A system called MULTICS was developed
were not born at that time and even programming by, Bell Labs, MIT and GE in a team work
languages were not there. The programmes had to as a time sharing system which provided
be coded in machine language though card readers. many concepts of multitasking to the
This kind of processing was called serial generations to come.
processing. With time variety of software tools Hierarchical approach to OS.

Neeraj
were invented to make serial processing much Modular programming design.
more easier and efficient. Development of UNIX: UNIX is an operating
Simple Batch Systems: During 1950’s, the system that was developed by some of the members
routine had improved to some extend with the of the Multics team at the bell labs starting in the
introduction of punch cards. The General Motors late 1960’s. It was written by Ken Thompson and

Publications
Research Laboratories implemented the first Denis Ritchie.
operating systems in early 1950’s for their IBM UNIX a wonderful operating system was
701. The system of the 50’s generally ran one job written in assembly language but it was rewritten
at a time. This is the reason of calling them single- in C after some time for better performance.
www.neerajbooks.com
stream batch processing systems or simple batch
systems because programs and data were submitted
UNIX was a great milestone in the population
of operating systems which gave many concepts
in groups or batches. Burroughs design of Master which are considered ultimate such as hierarchical
Control Program (MCP), came in 1963 which file system, the shell concept, redirection, piping,
supported multiprocessing and multitasking. Soon and the use of simple commands that can be
the advancements in the operating system started combined to perform powerful operations,
which made the features of multiprogramming and techniques for inter process communication,
multitasking even better. Operating systems were
networked and distributed processing etc.
developed which were able to keep several jobs
Development of the concept of graphical user
are in main memory at once; a processor is
interface was another big achievement in the
switched from job to job as needed.
making of operating system.
Time Sharing System: Multiprogramming
Development of Personnel Computer
made the system more efficient and the use of
Operating System: The development of personal
resources increased. Interactivity is also a much
computers by IBM was the biggest achievement
desired feature as the user is the best person to
tackle the tasks. This feature also provides freedom in the world of personal computing. It was
to user to use the machine directly. designed as single user computer. Not only this it

www.neerajbooks.com
www.neerajbooks.com

92 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

was provided with PC-DOS an amazing operating operation on a single machine and allowing the
system. We know this by the name of Microsoft user or users to use various programmes at a time.
DOS as it was later marketed by Microsoft. Q. 3. What are the important components
Other Developments during 1980-1990s: of an OS?
MS-DOS travelled the journey to Windows 2000. Ans. These are the important components of
Windows 2000 is a graphical user interface based an OS:
amazing operating system which can work as a Command Processing
single machine to a networked OS. File Management System
Linux operating system client-server Process Management
configuration model was developed and basis for Memory Management.
development of new operating systems with better Q. 4. What is job scheduling?
options opened the door for a better technology. Ans. In the multitasking environment the
The development of the Distributed operating systems decides which job to be
Computing Environment, plus object-based executed when and how. This scheduling of job is
extensions that make distributed processing called Job Scheduling.
Q. 5. What is a thread?
practical.
Ans. A process is divided into threads which
JAVA Virtual Machine and other aspects of

Neeraj
can be individually executed. This is done to use
the JAVA language was another big achievement
memory efficiently.
of this century.
Apart from these milestones other
technological advancements also came into the Q. 1. Explain in detail about the operating

Publications
fore in the world of operating system during this system of computer.
duration. Ans. Operating systems perform basic tasks,
such as recognizing input from the keyboard,
Q. 1. Define the following terms: sending output to the display screen, keeping track
www.neerajbooks.com
(i) Online Processing
Ans. Online processing is said to be done when
of files and directories on the disk, and controlling
peripheral devices.
the user is directly connected to the system and The operating system is responsible for
security, ensuring that unauthorized users do not
can directly interacts with the program.
access the system.
(ii) Batch Processing
Operating systems can be classified as follows:
Ans. Batch processing is a technique of
Multi-user: Allows two or more users to run
processing data in large group instead of
programs at the same time. Some operating
individually. The basic aim of using batch
systems permit hundreds or even thousands of
processing is to help utilize the system resources.
concurrent users.
For example, banks batch process all their Multitasking: Allows more than one program
transactions once every hour instead of processing to run concurrently.
each transaction at the time. Multiprocessing: Supports running a program
Q. 2. How does multi-programming on more than one CPU.
improve performance of a system? Real Time: Responds to input instantly.
Ans. Multi-programming improves perfor- General-purpose operating systems, such as DOS
mance of a system by overlapping CPU and I/O and UNIX, are not real-time.

www.neerajbooks.com
www.neerajbooks.com

OPERATING SYSTEM / 93

Multithreading: Allows different parts of a By allowing a large number of users to interact


single program to run concurrently. concurrently with a single computer, time-sharing
Operating systems provide a software platform dramatically lowered the cost of providing
on top of which other programs, called application computing capability, made it possible for
programs, can run. The application programs must individuals and organizations to use a computer
be written to run on top of a particular operating without owning one, and promoted the interactive
system. use of computers and the development of new
Q. 2. Explain the term time sharing in a interactive applications.
computer. Developing a system that supported multiple
Ans. Time-sharing is the sharing of a users at the same time was a completely different
computing resource among many users by means concept; the “state” of each user and their programs
of multiprogramming and multi-tasking.
would have to be kept in the machine, and then
Time-sharing was developed out of the
switched between quickly. This would take up
realization that while any single user was
computer cycles, and on the slow machines of the
inefficient, a large group of users together were
era this was a concern. However, as computers
not. This was due to the pattern of interaction; in
rapidly improved in speed, and especially in size
most cases users entered bursts of information

Neeraj
of core memory in which users’ states were
followed by long pause, but a group of users
working at the same time would mean that the retained, the overhead of time-sharing continually
pauses of one user would be used up by the activity decreased, relatively.
of the others.

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

94

Concept in Programming Language 8


instruct the computer in a correct manner. To do
Computer is mere a box of dumb peripherals this one has to understand the problem, make a
if there is no software in it, which tells it what to flowchart or algorithm to solve it and write
do and how to do it. Software are set of programs programmes based on the same logic. In this
written by programmers to get a set of specific process the knowledge of the following key
jobs done. These software are written in concepts is very important.
programming language. Programming languages Problem: A computer cannot think on its own,

Neeraj
are English like languages, which are used to when it meets with a problem it has to be told what
provide set of instructions to the computer to tell
is the way to solve it. A problem is a task to be
the computer what is to be done. A programmer
done, it needs the instructions to get the work done.
should know any of the programming language
such as COBOL, FORTRAN, C, C++, FoxPro etc. For this we need to give the sequence of

Publications
to write programs. He or she must know about instructions in which these have to be performed.
algorithm to solve the problem. It is always preferred to define the steps and their
An algorithm is a list of steps or procedure order towards problem solving before typing them
used to solve a problem. A program is defined as a into the commuter in any programming language.
www.neerajbooks.com
set of instructions, which are written using a
programming language. As you know the computer
Algorithms and flowcharts are two methods of
depicting the solution to any problem. After solving
can understand only machine language and the problem using algorithm or flowchart,
programmes are written in English like language, programs can be written using any computer
there is a need to convert these programmes in language.
machine understandable language. This work is
Tools of problem solving:
done by compilers and interpreters.
Algorithm: When the problems have been
In this chapter you will come to know about
defined the procedure to solve the problem have
need for programming, flow chart, elements of
programming Languages, looping and decisions, to be designed in simple steps. This procedure is
differentiate between Assembler, Compiler and called algorithm. An algorithm is a set of rules that
Interpreter. define how a particular problem can be solved in
finite sequence of steps. These steps are sequenced
PROBLEM, ALGORITHM, PROGRAM AND and written in a logical order. These provide the
PROGRAMMING LANGUAGE solution of the problem. An algorithm can be said
Computer does not have any intelligence of the step-by-step process to solve any problem
its own. It depends upon the humanbeings to written in a logical manner in simple English.

www.neerajbooks.com
www.neerajbooks.com

CONCEPT IN PROGRAMMING LANGUAGE / 95

Methods of control of developing algorithm: (c) Input and Output


(a) Sequential: Here steps are executed in a
sequential manner.
(b) Decision/Selection: One alternative out of
many is to be selected and actions are performed
according to it.
(c) Repetition: These are called loops, here
the steps are executed again and again. These These boxes are used to show the steps where
methods of control are to be taken care of while the data items are selected or displayed.
designing an algorithm. (d) Decision Box
Algorithm are written in pseudo codes. This
is English like language.
Flowcharting: A flowchart is a
diagrammatic or pictorial representation of a setp
by step process to solve a problem. A flowchart
provides understanding of the problem and

Neeraj
solution in a step by step manner. This serves as a
concise form of documentation. It shows the flow
of logic in a pictorial manner. Symbols are used to These are used to compare values or check a
depict the flow. These symbols are explained as condition. It has two outgoing arrows. The flow
under: goes to one if the condition is true and to the other

Publications
(a) Terminal Box if the condition is false.
These depict the beginning and end of the (e) Flow lines
flowchart.

www.neerajbooks.com

These lines show the flow of the logic.


(f) Connectors
(b) Processing

These are used to show value being assigned These are used to connect two points in
to variables and processing. flowchart.

www.neerajbooks.com
www.neerajbooks.com

96 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Example: grammar and vocabulary and semantic provides


Problem statement: Input two numbers and meaning to it.
find the greater. There is a variety of programming languages
Algorithm available for a programmer to write programs but
Step 1 Start one has to be well conversant in a particular language
Step 2 Input 2 numbers A and B to use it as a base to write programmes. Every
Step 3 If A > B then print “A is greater” programming language has its own features and the
Step 4 Else print “B is greater” programmer has to choose according to his needs.
Step 5 Stop Examples of programming languages:
Flowchart BASIC, FORTRAN, C, C++, Java, COBOL,
HTML, Dbase, Pascal, etc.
There are some grammatical rules of every
language, which have to be followed to make an
error free program. There are some specific
character or alphabets and operators to provide
instructions. These may vary from language to
language. The rules or grammar of the language

Neeraj
has to be followed to design programs.
ELEMENTS OF PROGRAMMING
LANGUAGE
A programming language has various
elements, which a programmer should be well

Publications
versed with.
VARIABLES, CONSTANTS, DATA TYPE,
ARRAY AND EXPRESSION.
These are elaborated below as:
www.neerajbooks.com
Once the logic is developed it can be written
in programming language.
Variables: Variables are those symbolic names
which are given to the memory locations and
CONCEPT OF PROGRAMMING whose value may change. Each variable has its
LANGUAGE own attributes that mean the type of values it can
Programming language is a language in which hold. It has a unique name, which is used for
a programmer provides instructions for the reference. It also has some value, which can be
computer. changed. A variable can be thought of a location
Program: A program is a set of instructions in memory, which is capable of storing temporary
provided to the computer to perform a particular data within a program. This data can then be
work or set of tasks. modified, stored, or displayed whenever needed.
Programming Language: Writing program Example: (declaration of variables in
is called programming. The language used to write language C)
these programs is called programming language. int x;
There are preset syntax and semantics of each char y;
programming language. These are called building Here we defined two variables x and y, where
blocks of a programming language. Syntax is the x is integer variable able to hold integer value on
structure of the command, which includes the specific memory location and y will be able to

www.neerajbooks.com
www.neerajbooks.com

CONCEPT IN PROGRAMMING LANGUAGE / 97

hold a character value on its specific memory Single dimensional array is represented as a single
location. When get changed the new values will column. Array has to be declared. These can also
be assigned to the same memory location which be static or dynamic. Array can be declared using
can be retrieved by the names. any data type using C. A one dimensional array is
Constants: A constant in programming useful in grouping of data which is small in size.
language is an identifier and have values, which It is declared as the following example:
do not change during the execution of a program. <data type> <arrayname> [size_of_array]
Once a constant is defined with a value, it cannot int a[10];
be reassociated with some other value. Constant Here integer a will hold 10 items stored
means static so the values cannot be changed. contiguously in the memory. Each value in this
There are numeric and string constants. array can be referred to using its corresponding
Numeric constants are numbers, which allow index number.
various mathematical operations to be performed
upon. String constants are a group of characters,
numbers, words enclosed within double quotes “
”. These allow some operations to be performed (b) Two-dimensional Arrays: As you were
over them. referred to the example of a spreadsheet in one

Neeraj
const. int b = 5; dimensional array, in two dimensional array too it
Here integer b is defined as having a value 5 will be easy to see it as a spreadsheet showing
which cannot be changed during program row, column manner. It is like a table which has a
execution. definite number of rows and columns.
Data Type: Data, which is to be processed by int a [2][2];

Publications
a computer, can be of any type. It may be
numerical, alphabetical or alpha-numerical. A
programming language must provide a variety of
data types to be used. A data type can be known as
www.neerajbooks.com
a classification, which tells about the type of data.
The data type indicates which type of data it will
Expression: Expression in a programming
language like C is a combination of operands and
hold and which type of operations it will allow to operators. Even a single variable can depict an
be performed on it. Variety of data types is expression. It must follow the rules, the syntax of
available in variety of programming languages. a language. Example: a = b + c; is an expression.
The size occupied by these types may also vary. Assignment: Assignment is assigning a value
Array: Related data valued grouped together or expression to a variable. The assignment
as one value is called an array. It is a collection of comprises the variable, operator and value or
values of the same data type, which is stored in expression to be assigned. An assignment contains
the memory. It allows to store data of a single data an operator, be it arithmetic operator, relational
type. An array of size n is indexed by integers from operator or logical operator.
0 to n-1. Example
int a[10]; int a = 5;
Arrays can be generally of two types: or
(a) One dimensional array or single int a = b + c;
dimensional array: Remember a spreadsheet, Arithmetic: Arithmetic is a group of
which is available in row and column manner. operators, operands or expression. Such as:

www.neerajbooks.com
www.neerajbooks.com

98 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

+ is used for addition the programme than the code will be executed else
- is used for subtraction the rest of the programme will be taken care of.
* is used for multiplication If (a==2)
/ is used for division {
% is used for modulo printf("2");
++ is used to denote increment by 1 and }
-- is used to denote decrement by 1 else
These can be used individually or in {
combination. For example : printf("0");
a = b / c; }
or Now the Boolean expression will be evaluated
a = a + 10; first if it is true then the statements in the second
Logical, relational and equality: We get a part will get executed else the statement in the third
Boolean representation of these types of part will be executed, if the third part is not given
expression. These yield either True or False. Here then the next command will be executed.
the expression is made up of operands and these Looping Statement: A loop is a group of
operators. These may be: instructions, which keeps on repeating itself until

Neeraj
&&is used for and certain conditions remain true. This is used to
|| is used for or repeat the instructions for known or unknown
! is used for not times. In a loop the initial condition of the loop
== is used for equal to has to be defined with the set of commands to be
executed and then the testing of the condition is
!= is used for not equal to

Publications
done and then the loop is repeated again.
< is used for less than
In C programming there are three varieties of
<= is used for less than equal to
loops are there:
> is used for greater than
(i) For Loop: For is a counter controlled
>= is used for greater than equal to
www.neerajbooks.com
Example:
Assuming the values of a = 5; and b = 2;
loop. The number of repetitions must be specified
before the loop starts.
for (control_variable; continuation _condition;
c = a*b;
increment/decrement_control);
c <=2;
int a;
The answer will be False. for ( a=1; a>=20; a++)
Bitwise Operators: As we know a Boolean printf("\n number : %d", a);
or logical data type can have a value true or false. The output will be as given :
These can be represented with 1 bit which can number 1
either be 1 or 0. In many languages when you try number 2
to do a Boolean operation on data types of more number 3
than 1 bit, a bitwise operation is performed. number 4
Conditional and Looping Statement number 5
Conditional Statement: If is a selection number 6
statement used to select a course of action number 7
depending upon the given condition. This is used number 8
to control the flow of the programme logic. If the number 9
logic of the if statement matches with the logic of number 10

www.neerajbooks.com
www.neerajbooks.com

CONCEPT IN PROGRAMMING LANGUAGE / 99

(ii) While loop: While loop is a controlled The execution of the main programme is
repetition which can be repeated indefinite number halted, then
of times. Number of repetitions can be controlled The subprogramme is executed, then
by using a sentinel variable (test expression). Control returns back to the main
while (test expression) programme immediately.
{ These can be of two types:
code to execute (i) Functions: Functions can be said the best
} reusable codes. It receives values, performs some
int a=1; calculations which are specified and return the
while (a <= 5); answer. Like subroutines, these can be called from
{ the main programme or from elsewhere. Even a
printf("\n number : %d",a); function can call itself. From the point of calling a
a++; function, the control goes to the function and after
}
the execution the control comes back to the calling
The output will be given:
point immediately.
number 1
(ii) Subroutines: A subroutine is a
number 2
subprogram. It is coded to perform a particular
number 3

Neeraj
task. Though being a part of the program
number 4
subroutines are independent entities.
number 5
They are called by the main programs in some
(iii) Do while loop: Do while loop is a
repetition, which is different from the other two. specific conditions and this has to be specified.
Subroutine do not have any values associated with

Publications
The code is run first and then the test is checked.
It will have to be executed atleast once. its name. These are also called procedures or
do routines.
{ Example:
Write s subroutine ‘myadd’ to add two
} www.neerajbooks.com
(code to iterate);
numbers.
SUBROUTINE myadd(A,B, SUM)
while (condition);
Subroutine and Functions: The target of a REAL A,B,SUM
programmer is to make a programme without SUM = A + B
repetition of codes as it makes the programme RETURN
lengthy unnecessarily. There may be instances END
where a group of instruction has to be repeated This subroutine can be called by the main
again and again. For example, addition code, if it programme as and when required by calling:
has to be written again and again in a programme, CALL myadd(A,B,SUM)
it will make the programme lengthy. To overcome Library Function: A programmer may code
this problem it would be better to use sub- a number of functions. But there are some
programmes, which allow the codes to be written functions which are predefined in the library of
once and referred to as and when needed in some the programming language. These are the ready
other set of codes. functions which can be used anywhere in the
The main programme includes references to program without defining them. These are just to
many subprogrammes in desired order. When a be called and values to be passed. The coding of
sub-programmes is called: these functions resides in the library which has to

www.neerajbooks.com
www.neerajbooks.com

100 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

be included in the programme before calling these ease in debugging


functions. ease in developing software.
Example: In order to use printf() and scanf() The translators of programming language
functions we will have to include this library: are:
#include<studio.h> Compiled Language: Compiler is a
EDITOR, ASSEMBLER, INTERPRETOR & software which helps to translate the higher level
COMPILER programming language programme file into a
Editor: Editor is required to create text files. machine executable file. Most high-level
A programme is also a text file, so it needs an editor languages include their own compiler or have
to be written on. The files in an editor get the toolkits available that can be used to compile the
extension as per the rules of the programming program. Compiled files runs faster and can run
language. For example in C the extension is .c, if independent of their intended platforms.
you name your file myprg then the full name will Interpreter: Interpreter is a program which
be myprg.c. It may also depend on the operating uses to translate the program written in
system. programming language line by line into machine
Assembler: Assembly language is a low level code. All the programming languages support
programming language which is like machine compilers and interpreters. The difference is that

Neeraj
language, but far easier to write and understand the compiled code runs faster whereas the
because machine language binary instructions and interpreted code is slower and a compiler does not
operands are replaced by mnemonics that are need the compiler at run time, whereas interpreted
comprehensible to humans. We know that a code needs the interpreter for running the program.
program written in programming language needs

Publications
to be translated into machine code. A program Q. 1. Write an algorithm for solving the
written in assembly language uses the utility named following problems:
as assembler for translation purpose. Assembly (a) To calculate the area of a rectangle.
language lacks conveniences which are provided
www.neerajbooks.com
by high level languages.
Assembly level program requires an
Ans. Algorithm
Step 1: Read length of the rectangle.
Step 2: Read breadth of the rectangle.
assembler to get it converted into machine code. Step 3: Calculate Area = length X breadth.
Interpreter and Compiler: It has been Step 4: Print area.
explained earlier too that computers can Step 5: END.
understand only machine language, it needs the (b) To find the sum of the first n natural
commands in the same, but for a programmer it is
numbers.
difficult to design a programme in machine
Ans. Algorithm
language. Today, the most used programming
Step 1: read the number (a)
languages are similar to English language. Thus,
Step 2: initialize b=1,i=1
a higher level program needs to be converted into
Step 3: repeat 4,5 until i<=a
a lower level program to get executed.
Step 4: b=b+i
It is always easy for a programmer to write
Step 5: increment i by 1 i.e i=i+1
programmes in higher level as it provides:
ease in developing software Step 10: Print “Sum of n given numbers
ease in understading the codes is”, a , b
portability Step 11: END.

www.neerajbooks.com
www.neerajbooks.com

CONCEPT IN PROGRAMMING LANGUAGE / 101

Q. 2. Draw a flowchart for (a) and (b) in it needs commands or instructions. These
Question 1 cannot be provided to the computer in English
Ans. (a) or an y ot her la ngua ge whi ch we s peak.
Programmers need programming language to
write program.
Q. 4. What is the purpose of looping
statements in a programming language?
Ans. A loop helps to repeat the set of
commands more than once. If it is needed to repeat
some command or set of command in a
programme, a loop is used.
Q. 5. What are basic operators in any of
the programming language?
Ans. The operators can be basically divided
into these categories:
(i) Arithmetic Operators: These are used to

Neeraj
do arithmetic operations.
(b) (ii) Logical Operators: These are used to
execute logical operations of AND, OR, NOT
etc.
(iii) Relational Operators: The relational

Publications
operators are used to find relation among variables
or constants.
Example >,<,=, not = ,<=, >= etc.
Q. 6. What is the purpose of using an array
www.neerajbooks.com
i
b

in a programming language?
Ans. An array is used to store and process
i a
large amount of data of similar data type. It is
easier to refer, store or retrieve a large collection
b b i of similar data type in an array than individual
variables.
i i

Q. 1. Explain the concept of programming


language.
Ans. A programming language is an artificial
language created to communicate instructions to
Q. 3. What is the need of programming a machine, particularly a computer. Programming
language? languages can be used to create programs that
Ans. A computer is a processing machine. control the behaviour of a machine and/or to
In order to process data or to solve any problem express algorithms precisely.

www.neerajbooks.com
www.neerajbooks.com

102 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

The earliest programming languages predate Q. 2. What do you know about the syntax?
the invention of the computer, and were used to Ans. A programming language’s surface form
direct the behaviour of machines. Thousands of is known as its syntax. Most programming
different programming languages have been languages are purely textual; they use sequences
created, mainly in the computer field, with many of text including numbers, words, and punctuation,
more being created every year. Most programming much like written natural languages. On the other
languages describe computation in an imperative hand, there are some programming languages
style, i.e., as a sequence of commands. which are more graphical in nature.
A programming language is usually split into The syntax of a language describes the
the two components of syntax and semantics. Some possible combinations of symbols that form a
languages are defined by a specification document syntactically correct program. The meaning given
while other languages, such as Perl 5 and earlier, to a combination of symbols is handled by
have a dominant implementation that is used as a semantics. Since most languages are textual, this
reference. article discusses textual syntax.

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

103

Computer Applications 9
Raymond gave a descriptive definition as open
We discussed about open source software in software.
the previous chapter, this is a software which is Free Software Definition: It is based on these
supplied with the source code. In this chapter we freedoms :
will discuss it in detail. We will also discuss the 1. To run the program.
role of the project manager who takes care of the 2. To read its codes, and modify it according
to you.

Neeraj
project management process. Some basics of
computer software like word processing, 3. To redistribute copies to smaller group.
spreadsheets, database, email etc. will also be taken 4. To improve the program, and release it to
care of. larger groups.
Open Source Definition: The Open Source

Publications
Definition OSI includes permissive software
CONCEPTS OF OPEN SOURCE licenses. The elements are:
SOFTWARE Free redistribution
Open Source Software as the name suggests, Source code available
www.neerajbooks.com
is a software which is given to the user with the
source code. It also carries a software license that
Derivative works permitted
Integrity of the author’s source
enables the user not only to read the code but also No discrimination against persons or
the user becomes eligible to modify it. So it gets groups.
the benefit of getting collaborative efforts and No discrimination against fields of
expertise. It follows the free software philosophy endeavour.
formulated by Richard M. Stallman in 1983. The Distribution of license with derivative
advantage of such software is that good ideas can works.
pour in from anywhere, resources are not scarce License must not be specific to a product.
and the flexibility directs innovative ideas. License must not restrict use of other
The Open Source Initiative (OSI), formed in software.
1998 aimed to fill gaps among difference License must be technological-natural.
constituencies in the open-source community. It Open Source Development Model: The
is also responsible for certifying software licenses Open Source Development works under
as open source licenses. collaboration of many anonymous developers and
Introduction: Richard Stallman gave a contributors. But practically, these projects are
normative definition as free software, and Eric small and involve one contributor or a lesser

www.neerajbooks.com
www.neerajbooks.com

104 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

number of contributors. Though, a few open source modifications and so on. These rights and
projects, like Linux, are very large development responsibilities of the licensee may be in implicit
projects, which may have many contributors still or explicit form.
they have small number of gatekeepers, who take If a license is distributed in a public domain,
care of the contributions. Which means they decide the user does not need any license to read, copy,
which modification is worthy of adding in the modify or redistribute the codes.
software. So, it is like a free market with a good Examples of free software license/open source
check. licenses:
The famous example of such kind is Apache License, GNU General Public
Concurrent Versioning System (CVS), licensed License, GNU Lesser General Public License, MIT
under GPL. It has a control system, which only License, Mozilla Public License, etc.
allows designated persons to check code into the PROJECT MANAGEMENT SOFTWARE
source tree and keeps track of published versions, Project management helps the project manager
additions and modifications with the details of the to plan, organize and manage the resources needed
writers. to make software, which attains the specific
The main features of Open Source objectives of that particular software.
Development model are: Project management is a carefully planned and

Neeraj
(a) Here the users can work as co-developers
and hence, they can access the source
code.
(b) The base version should get released early
organized effort to accomplish a successful project.
A project is a one-time effort that produces a
specific result. It has a time limit, the resources
are limited and the goal is specific. Here the

Publications
to find its co-developers early. challenge lies in the management of resources to
(c) The codes contributed by co-developers attain the goals in the stipulated time with the
must have a quick integration into the limited resources.
source code. A project can be divided into these stages:
www.neerajbooks.com
(d) The open source software should have
more than one version. A buggier version
with many features and a stable version
should be there to provide chance to the
co-developers to write codes for its
improvement and for finding the bugs and
fixing these.
(e) A modular approach of the software makes
it easy to study and modify.
(f) A well structured decision-making
structure should be there.
Open Source Licensing: A licence is a
permission to do specific tasks. In open source
license, there is a permission to read, copy, modify
and redistribute the source code. A licence may
also assign some responsibilities while enjoying
the rights such as distributing the source codes of

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 105

Project Manager - Role and Responsibility: scheduled properly to get best out of the resources.
A project manager is one who does the project The following are worth paying cognizance while
management. He is the main person in the process scheduling:
of project management who has the responsibility interdepending events.
of planning, organizing and controlling the project resources needed for tasks
management activities. He does all this for the Scope of uncertain conditions.
successful completion of the project, which attains Calculating Critical Path: There may be
the specified goals. For this, he has to plan instances that the same resources are needed for
accordingly and make ultimate use of the scarce various tasks, these type of scheduling is very
resources and finish the project in stipulated time, critical. There are software like Dependency
within the limits of cost and with due scope. structure matrix solutions, can help in depicting
Software Project Management: Software the tasks which share resources and the time
stipulated for them, it makes the controlling easy.
Project Management is management of the
Providing Information: Information about
software project. It includes the planning,
the project is needed by the stakeholders and also
monitoring and controlling the activities of
helps to justify the levels achieved and work
software development. It helps to find the scope

Neeraj
accordingly. The information needed may be:
of the project, make list of the resources, work to Tasks assigned to members.
be done and plan a schedule of work accordingly. Resource allocation.
A goal is to be defined for the software and other Time management schedule.
activities revolve around that goal. For example, Anticipation of the risks of the project.

Publications
the task schedule is prepared and the tasks are History of development of such projects.
assigned, monitoring is done to keep track of the Use of resources according to the plan.
work done and to find out any discrepancies. If Timesheet Management: A timesheet helps
any problem is found it is the project manager who to keep record of every worker’s hours of work
www.neerajbooks.com
needs to fix it.
Project Management Software: Project
done, amount of work done and kind of work done.
It helps the project manager in managing and
Management Software are used to help the controlling the activities. It also helps to maintain
the record for each employee to be used for payroll.
manager to perform various functions of project
It also helps the manager to find out the efficiency
management. There are a variety of jobs performed
level of the employees. Even employees get the
by these software such as:
opportunity to see their efficiency level and try to
resource allocation,
improve it. Examples of such software : Timesheet
scheduling, Reporter, Ace Project, Time Reporting, Qtime.
communication, Tools for Project Management
cost control and budget management, These are of the following types:
time management, Desktop Applications: Desktop appli-
administration systems cations can be installed on desktop PC or other
quality management, and type of personal computers like MS Project.
Some of these are discussed here : Web-based Services: Web based services
Scheduling: In any project there is a series of software support online project management tasks.
tasks to be performed. These tasks need to be Example : iTeam Work

www.neerajbooks.com
www.neerajbooks.com

106 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Web based Systems: Web based software Define File Properties for the Project:
systems are to be installed in the system and 1. Open the project.
accessed through intranet network. Example : Dot
2. Click on File Tab, and then click Info.
Project.
3. Choose Project Information and then
Microsoft Office Project: Software for
Advanced Properties.
project management offered by Microsoft is very
popular for planning, management and 4. On the Summary tab, give the relevant
organization of the resources of a project. project information.

Its scheduling engine is very good. The project Add Tasks to the Project: The project can
once given the information about the overall be divided into variety of tasks:
project, tasks and resources, it provides the start Click the View tab, in the Task Views
and finish date for each task by reading the details group, now select Gantt chart.
of the tasks. This scheduling can be changed if In the Task Name field, type a task name, it
some details have been changed in the project will create the unique task identity for each
resources or tasks. The features of MS Project 2007 task.

Neeraj
are explained below: It is also possible to create multiple tasks
Create and Schedule Project: A project using the Task Form View.
has to work according to the schedule. In most of Create Milestones: A milestone is an
the projects, a starting date or finish date is known important task or event in the project which shows

Publications
and the other needs to be calculated. Depending the progress of the project. To add a milestone do
upon the tasks, MS project helps to find out the it :
other one. Select the View Tab, in the Tasks View tab,
click Gantt chart.
www.neerajbooks.com
How to do?:
Launch MS Project Professional by
In the task name field write the name of
milestone.
connecting to MS Project Server.
Type 0 in the duration field of the milestone
On File menu select New.
task to create the task as milestone.
MS Project displays a blank project. To create a task with greater than zero
On Project menu select Project duration as Milestone, select the task and
information. then on the Task tab, choose the Task
On Project information dialog box, please Information from the Properties group.
enter Start Date. Select the Mark Task as Milestone check
box. In the task Information dialog box,
Choose the Calendar to be used.
click Advanced tab and then give the
On File menu select Save and provide duration of the Milestone.
project name. Default version of the
OFFICE APPLICATIONS
projects in MS Project Server is published.
Applications which are very useful for official
Click on Save.
work or any other kind of computerized activity

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 107

are being used widely in every corner of the world. Hyperlinking.


Be it writing documents, preparing invoice, Cross-referencing with section or page
budgets, charts, or e-mailing we use application numbers.
software. A few of them are discussed here:
Tools such as spell check and grammar.
Word Processing: A word processor is an
application software which is used used for Version control of a document.
composition of mainly text, though it can contain Apply themes to the documents.
table, charts, graphs etc. These allow to edit the
Comments and annotations.
material, format it and save it for future usage.
The application also allows to print the Saving options such as renaming, backup
information. etc.
Introduction: The modern day word Some of the features are elaborated :
processors allow many features which were not
Adding Header, Footer or Page Number to
there in the traditional applications. These are mail
a Document: MS Word allows any text or image
merge, macros, variety of formatting, auto correct,
etc. to be added as header or footer. This will

Neeraj
thesaurus, etc. Above all these are graphical user
interface. These also allow to integrate images with appear on all pages of the document. This can be a
text, graphs and so on. constant or a variable like page numbers. To add
header and footer:
Most widely used word processor is MS Word
1. Click on View tab from the menu, select

Publications
by Microsoft corporation. It comes in the Office
suite. Earlier WordStar, WordPerfect, etc. were the Header or Footer option.
used. But MS Word provides variety of features 2. A toolbar will appear you can select from
apart being a GUI.
that, whether you want to add page number
www.neerajbooks.com
There are some open source Word processors
like AbiWord, KWord, OpenOffice.org Writer etc.
or date, time, file name, etc.
3. You can toggle between the header and
Google Docs is also getting very popular being
footer from this toolbar.
an online word processor. Word processors, apart
from allowing you to manipulate text, allow the OR
following features : 1. Click on Insert tab from the menu select
Mail merge. page number.
Input page numbers. 2. A dialog box will appear, select position
Input headers and footers of the document. whether header or footer.
Insert tables with variety of formatting 3. Now select alignment of the text to be
options. appeared.
Features like sorting in the tables.
4. Click on format to select advanced
Insert graphs. formatting options.

www.neerajbooks.com
www.neerajbooks.com

108 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Publications Adding Header and Footer in MS Word

www.neerajbooks.com
Creating a Table in Word: MS Word allows to insert a table. It can be done in the following ways:
1. Place the cursor on the point where the cursor has to be placed.
2. Click on insert tab, select table and then choose Quick table.
3. Choose the required template from the gallery displayed.
The chosen table will be inserted into the document.
OR
1. Click in the document where the table has to be inserted.
2. On the Insert tab, in the Tables group click Table, and then under Insert Table.
3. Select number of rows and columns required in the table.
4. The table will be drawn on the document.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 109

Neeraj
Publications Inserting a table in MS Word

www.neerajbooks.com
In the latest versions of MS Word, there is a tab showing ‘table’ in the menu bar which allows
variety of options for tables.

Creating a Table of Contents: Table of Contents can be created by MS Word by applying heading
styles to the text. Specified headings are selected and table of content is created by Word. Follow the
steps to do this:

1. Select the text that is to be appear in the TOC.

2. On the Home tab, in the Styles group, click the Style (Heading1, Heading2….) that you want to
choose.

3. Click the place in the document where the TOC has to be inserted.

4. ON the Reference Tab, click Table of Contents on the Table of Contents group.

5. Choose the TOC Style that is required.

www.neerajbooks.com
www.neerajbooks.com

110 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Publications Creating Table of Contents

Creating a Memo for Multiple Recipients be the same by names and addresses will be
www.neerajbooks.com
in Mail Merge: Mail merge feature allows the
user to write the main document once and then
changed every time.
Steps :
merge it to the structured data source. For example, 1. Type the text or insert image or anything,
if one has to send invitation to ten people, he or which you want to display in each of the
she don’t have to type the invitation or copy paste
letter.
the invitation ten times. Rather he or she can type
2. Connect the document to the data source.
the invitation once and merge it to the name and
3. Refine the list of recipients or items.
address list containing the names of those ten
Microsoft Office Word generates a copy of
persons.
the main document for each item, or record,
This is used to create personalized letters and
in your data file.
address lists to make pre-addressed envelopes or
labels. When the mail merge is run, the word 4. Add placeholders, called mail merge fields,
processing system creates an output document for to the document.
each row in the database. Fixed text is displayed 5. Select merger, the mail merge fields are
in each of the output and the variable is shown filled with information from your data file.
one by one. For example, the invitation letter will 6. Preview and complete the merge.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 111

OR

Neeraj
Publications Mail Merge

1. Click on tools menu and select mail merge. statistical operations can be performed on the data.
www.neerajbooks.com
2. Mail merge helper will appear. Example: MS Excel.
Introduction
3. It will show three steps to be followed. Step
one asks you to select or create the main Each cell on a spreadsheet can have any of
document which has to be constant. the following data:
4. Step two asks you to select or create data Text or Labels: These are the headings of the
source. colums like C3, B6.
5. Step three will merge the documents. Numbers or Constants: Numbers or values
Thus, mail merge is used to create documents or fixed entries like A2.
that are essentially the same but have a few unique Formulae: These are formulae or functions
data elements that vary for each document. which decide what has to be done with the data.
SPREADSHEET These begin with = sign.
A Spreadsheet, or worksheet is a grid made of There is a unique cell address associated with
columns and rows known as cells. It is used to each cell. This is the result of the number of row,
manipulate numerical data and make charts and column of the cell. E.g. B9 means the cell B9 is
graphs based on it. Variety of mathematical and the intersection of column B and row 9.

www.neerajbooks.com
www.neerajbooks.com

112 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Publications
Spreadsheet

Basic Features: There are many spreadsheets Skip Blanks: Blanks will be skipped only
or worksheets in a workbook. These sheets can be data will be pasted.
renamed based on the data they carry. For example, Excel allows the cell, the worksheet or full
if sheet one is carrying data for the month of
www.neerajbooks.com
January and sheet two is carrying data for the
workbook to be protected.
Protecting a Worksheet
month of February, these can be renamed as 1. Click Tools, click Protection, and click
January and February instead of the default names. Protect Sheet.
This can be done by double clicking on the names 2. Enter a password (if needed).
and changing them. Excel allows new sheets to be 3. Confirm password (if needed).
inserted or deleted from a workbook. It also allows 4. Click OK.
the formatting of the cells. Protecting a Workbook
Features like cut, copy and paste are also 1. Click Tools, click Protection, and Click
supported in this application. Protect Workbook.
There is a feature called paste special. It 2. Enter a password (if needed).
displays a variety of radio buttons, which if chosen 3. Choose to protect the Structure, Windows,
will do as follows: or both.
Formulas: Only pastes the formulas from 4. Click OK.
the cells on the clipboard. Formulae and Functions
Values: Only values will be pasted. Excel provides a variety of functions. It can
Column Widths: Will paste only the column be chosen by selecting function from insert menu.
widths of the copied cells. Some of them are as follows:

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 113

Neeraj Calculating Date and Time

Publications
Date and Time 2. L EFT: It returns the leftmost characters
1. MONTH: Converts a serial number to a from a text value.
month.
3. RIGHT: It returns the rightmost characters
2. YEAR: Converts a serial number to a
from a text value.
www.neerajbooks.com
year.
3. NOW: Returns the serial number of the 4. LEN: It returns the number of characters
in a text string.
current date and time.
4. WEEKDAY: Returns a number corres- Logical
ponding the number that represents a date. 1. IF: Returns a value if the condition is true
Math and Statistical
and returns other value if the condition is
1. SUM: Adds its arguments.
2. MEDIAN: Returns the median of the false.
given numbers. 2. NOT: It reverses the logic of its argument.
3. SUMPROUCT: Returns the sum of the 3. AND: It returns TRUE if all of its arguments
products of corresponding array are TRUE.
components. Advanced Functions
4. COUNTIF: Counts the number of cells
1. MATCH: Looks up values in a reference
within a range that meet the given criteria.
5. COUNT: Counts the number of cells that or array.
contain number. 2. INDEX: Uses an index to choose a value
Text from a reference or array.
1. CONCATENATE: It joints given text 3. SEARCH: Finds one text value within
items into one text item. another (not case-sensitive).

www.neerajbooks.com
www.neerajbooks.com

114 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

4. REPLACE: Replaces characters within 2. HLOOKUP: It looks in the top row of an


text. array and returns the value of the indicated
Database Functions cell.
1. DGET: It gets a single record that matches 3. INDIRECT: It returns a reference indicated
the specified criteria. by a text value.
2. DCOUNT: It counts the cells that contain
Charting: Excel allows to insert and create
numbers in a database.
Charts based on data. Charts can be inserted as an
3. DSUM: It adds the numbers in the field
column of records in the database that object in the same sheet or can be inserted as a
match the criteria. new sheet.
4. DPRODUCT: It multiplies the values in Steps to create a chart:
a particular field of records that match the 1. Insert the data in the worksheet.
criteria in a database. 2. Select the data.
Lookup & Reference 3. Go to Insert tab in the main menu.
1. VLOOKUP: It looks the first column of 4. Select the chart type.
an array and moves across the row to return 5. The chart will appear.
the value of a cell. 6. Follow the wizard.

Neeraj
Publications
www.neerajbooks.com

Preparing Chart in MS Excel

Macros: Macros are short programs which etc. It is basically a subset of Microsoft Visual
allow the user to save time. These are written using Basic.
VBA. These record a specific task and when
Steps to record a Macro:
carried out perform the same. VBA is used to write
programs in Word, Access, Power Point, Excel, 1. Go to the Tools menu, select Macro, now
select Record new Macro.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 115

2. Write the name for the Macro, it can describe the function to be performed.
3. Description can be added if needed.
4. Assign a keyboard shortcut to run the Macro.
5. Now click on OK.
6. Simply perform the actions you want to be recorded.
7. Press stop.

Neeraj
Publications
www.neerajbooks.com

Recording a Macro

The Macro can be executed in the following ways :


1. Run a Macro by using the menu command.
2. By pressing a CTRL combination shortcut key.
3. Clicking a toolbar button or an area on an object, graphic or control.
4. Run a Macro automatically when the workbook is opened.
A Small Example in Excel 2007: Given below are the marks of a student in various subjects. We
will add these using the function SUM, and find its percentage.

www.neerajbooks.com
www.neerajbooks.com

116 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Publications
We get the sum by inserting the function SUM
in the cell B9 (=sum(B3:B7)) and we define a
Excel 2007

unique and helps to remove duplicity. A primary


key of another table is called a foreign key.
www.neerajbooks.com
formula for calculating the percentage by =(B9/ Example of database: MS-Access.
500*100) in the cell D9. Create Table in Database
DATABASE 1. Launch the MS Access software
A database can store a large number of data in application.
form of tables. Different tables showing different 2. A dialog box appears. Select the option of
data can be joined by setting relationships. It helps making a blank database or you can use a
in improving the speed, accuracy and memory wizard.
usage. Or
Introduction: A Table is used to store data in Click File menu and select new.
a databse. It is used to store a specific data like 3. In the File Name box, type a file name for
price of a commodity, discount offered on various the new database.
commodities etc. In a table there are various fields 4. To browse to a different location to save
and an individual record is known as a Tuple or the database, click the folder icon.
row. There is a primary key in each table which is 5. Click Create.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 117

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

118 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

It opens a new database for you and a new table named table 1.
Add Fields to the Table
New data can be entered in the Design view.
Select design view from the view tab.
Add fields and set their properties like datatype, size, default value, input mask etc.
Access makes a primary key in this view, it can be changed.
Save the table by selecting save from file menu.

Neeraj
Publications
www.neerajbooks.com
Add Data in the Table: Data has to be entered Set a Table’s Primary Key: Access allots a
after making a table. primary key to the table when it is created in design
1. Open the database to which data has to be view. Its field name is ID and datatype is
added.
AutoNumber. But it allows changes in primary key
2. Select the table where the data has to be
attributes.
added.
3. Add the data to the table record by record 1. Select the table for which the primary key
in the datasheet grid. has to be set or modified.
4. Save table.
2. Open design view mode from view menu.
The datasheet view allows modification too.
Add New Fields in the Table 3. In the Design grid, select the field.
New fields can be added by: 4. On the Design tab, in the Tools group, click
1. Open the design view from view menu. Primary Key.
2. In the table design grid, add the new field.
3. Define its properties like datatype, length, Defining Relationships: Relationship can be
default value, etc. created in two tables having a common field with
4. Save the table. same data type. Relationship can be created by:

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 119

1. Select Relationships from the Tools menu. If we select referential integrity, no entry can
2. Choose the Table option and add the tables be made which violates referential integrity of the
table.
between which relationship has to be
Defining Queries: A query is used to get fast
created. answer to specific question. It also helps to pick
3. Drag a field (typically the primary key) data for modification, viewing or deleting. It helps
from one table to the common field (the to filter data and perform calculations on data.
foreign key) in the other table. To drag 1. On the Create tab, in the query group, click
multiple fields, press the CTRL key, click query design. A show Table dialog box
each field, and then drag them. appears.
4. The Edit Relationships dialog box appears. 2. In the Show Table dialog box, choose the
table on which query has to be based and
5. Select the enforce referential integrity if
close the show Table dialog box.
needed. 3. In the selected Table, double click the fields
6. Click Create. that have to be added to the query.
A relationship line is drawn. The line of 4. On the Design Tab, in the Results group,
referential integrity is thicker. click Run.

Neeraj
Publications
www.neerajbooks.com

OR Steps:
Use wizard to create a query. 1. Select the query or Table from the
The query will be executed and the result is navigation pane.
displayed in the grid.
2. Select create tab and then select Report
Reports: A Report is used to present group, click on report.
information from tables and queries. It stores it in
3. A Report will be created.
variety of designs such as labels, headings and
graphics. 4. It can be modified in report design view.

www.neerajbooks.com
www.neerajbooks.com

120 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

OR Student_parent_name Text
Use wizard to create a report. Student_age Number
A Small Example in Access 2007 Stream Text
Here we will create a small database for Student_master
students in a school. We will add only a few Student_ID Autotype
students of class XI and XII using MS Access
Stream Text
2007.
We have made tables Student_detail and Define Student_ID as Primary key. Then
Student_master database tables with the following define the relationship.
structure:
Add data to the table.
Student_detail
Student_ID Autotype Here we have defined a simple query to see
Student_name Text student ID and name whose age is more than or
Student_class Number equal to 18.

Neeraj
Publications
www.neerajbooks.com

SELECT student_detail.[Student ID], student_detail.Student_age


FROM student_detail
WHERE (((student_detail.Student_age)>=18));
The result can be viewed in datasheet view or can be used as a report.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 121

Neeraj
Data sheet view

Publications
www.neerajbooks.com

Report view

www.neerajbooks.com
www.neerajbooks.com

122 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

E-MAIL Software like Outlook uses these email


E mail is an acronym for Electronic mail. It is accounts. Outlook POP, an application-layer
one of the boons of internet which provide Internet standard protocol to retrieve e-mail from
instantaneous messaging service over the internet. a remote server over a TCP/IP connection. Email
It can be used to send mails containing text, images, account information has to be given to Microsoft
large files of any kind over digital medium. A mail Outlook to receive email through it. It allows many
can be forwarded to more than one person at a email accounts within a single outlook profile.
time. Creating Email Accounts and Profiles:
Introducation: In order to send and receive
Before using Outlook, an Email profile and
mail electronically, the user must have an email
account has to be created.
account, which can be provided by Internet Service
1. In MS Windows, go to control panel and
provider, employer, or webmail services like Gmail
select Mail option.
or rediffmail etc.

Neeraj
Publications
www.neerajbooks.com

2. Click Show Profiles.


3. Click on Add and Type a name for the profile and then click OK.
4. Add email account to use in your profile.
Create a new Email Message
Steps:
1. On the File menu, select, New >Mail Message.
2. In the Subject box, type the subject.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 123

3. Add the recipient’s name in the To, CC,


Bcc box. You can add more than one name Q. 1. Give the names of a few Open Source
by separating them with semicolon. Software applications?
4. If the recepient’s name is there in the Ans. 1. These are:
address book, choose To or CC to select it Operating System Linux
from the list of addressees. Web Browsing Mozilla Firefox
Instant Messaging Pidgin
5. The level of importance for message can Email Mozilla Thunderbird
also be set. Word Processing OpenOffice.org
6. If you want to attatch any file or website Graphics Paint.NET
link you can do it. Q. 2. What are the advantages of using
Manage Contacts: Address book can be Open Source Software?
updated. New Contacts can be added. Ans. Advantages:
Steps: These are available for free, thus, reduce
1. Select file menu, click new and then select the overall functional cost.
contact. The updated versions are available.
2. Fill in the contact details on the contact The help of troubleshooting is available

Neeraj
form. online.
OR The software can be customized according
1. Open or preview the email message that to the need.
contains the contact name to be added. Q. 3. How is the Open Source Code

Publications
2. Right Click the name of the sender and then maintained with the developers distributed
select Add to contacts. across geographical regions?
Calendar Management: Calendar makes it Ans. There is provision of using Revision
possible to schedule activities. You can schedule control systems such as Concurrent Versions
www.neerajbooks.com
activities like appointments, events etc. These can
be added, modified or deleted. This can be viewed
System (CVS). These help to track and centrally
manage the source code files and changes made
by clicking on calendar in the navigation pane and in the software.
choosing the specific date for which the schedule Q. 4. Give name of other industries besides
has to be seen. software, where the concept of Open Source is
You can add schedule to calendar by right being implemented?
clicking on the specific date and time and selecting Ans. Besides software industries, the concept
the type of activity. It may be one of the following: of open source software is being implemented in
Meeting: You have to insert a specific time these industries:
and location for a meeting. Electronics: The Open Source Hardware
Appointment: Appointment with whom and are made available with initial
when has to be specified. specifications to be redistributed without
A task: It is an entry that is seen in the calendar paying royalty or fees. Example : SUN
but doesn’t need to be scheduled for a specific time. Microsystems’s OpenSPARC T1 Multicore
An event: It is an activity that lasts long a Processor.
whole day. It appears as banners on the top of the Beverages: Some recipes are provided
date specified. openly. Example : OpenCola

www.neerajbooks.com
www.neerajbooks.com

124 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Digital Content: Some sites display Ans. As signature appears in a letter on paper,
content which can be reused and offer in an email message, it is the way of showing the
changes to be made are available. Example: name of the sender. This can be done manually in
Wiktionary. each mail or create a default signature.
Robotics: This provides blueprints, Q. 11. Is it possible to get a delivery receipt
schematics and source code are released from the email recipient?
under the open source model to be reused Ans. Yes. It tells the sender that the mail sent
and redistributed. by him or her has been delivered to the receiver.
Q. 5. What is a Milestone in a project? Q. 12. Which of the following entry will be
Ans. A milestone depicts a markable point of best entered as an event in your calendar?
specifying a major event in a project. These are A party that occurs from 4 pm to 6 pm
the indicators of the progress of a project. Any Birthday
task can be defined as a milestone. A visit to the dentist
Q. 6. What is a critical task in a project? Ans. A party has a time of starting and ending,
Ans. Critical tasks are those which have to be it is a short time, visit to a dentist also may take a
completed on time. If not completed these can short while, but a Birthday’s happens all day long.
affect the schedule of completion of the project. A So it is an event.

Neeraj
series of critical tasks makes up a project’s critical
path. Q. 1. What do you know about the funding
Q. 7. What information can help me analyze in the computer software?
my projects progress? Ans. Software can be created as a consulting

Publications
Ans. The following task information help to project for one or more customers. The customers
analyze the project progress: pay to direct the developers’ efforts: to have bugs
Duration Work Start date prioritized and fixed or features added. Companies
Finish date Cost or independent consultants can also charge for
www.neerajbooks.com
Q. 8. What is the difference between Lead
time and Lag time?
installation, training, technical support, or
customization of the software.
Ans. Lead time is the overlapping between the Another way to funding is to provide the
tasks which have a dependency. Whereas, a lag software freely, but sell licenses to proprietary
time is a delay of such tasks. add-ons such as data libraries. For instance, an
Q. 9. Is it possible to import data from Excel open-source CAD program may require parts
into Access? libraries which are sold on a subscription or flat-
Ans. Yes, it is possible to import data from fee basis. Open-source software can also promote
Excel workbook into Access 2010. the sale of specialized hardware that it
We can do it in the following ways: interoperates with.
Copy data from worksheet and past into Many open-source software projects have
Access datasheet. started as research projects within universities, as
Import a worksheet into a new or existing personal projects of students or as tools to aid
table. scientific research. The influence of universities
You can link the worksheet. and research institutions on open source shows in
Q. 10. What is a signature of an email the number of projects named after their host
message? institutions.

www.neerajbooks.com
www.neerajbooks.com

COMPUTER APPLICATIONS / 125

Companies may appoint developers to work programs, increased formatting options, and dot-
on open-source projects that are useful to the matrix printing. As the more versatile combination
company’s infrastructure: in this case, it is of a personal computer and separate printer became
developed not as a product to be sold but as a sort commonplace, most business-machine companies
of shared public utility. A local bug-fix or solution stopped manufacturing the Word processor as a
to a software problem, written by a developer either stand-alone office machine.
at a company’s request or to make his/her own job Word processors are descended from early text
easier, can be released as an open source formatting tools. Word processing was one of the
contribution without costing the company earliest applications for the personal computer in
anything. office productivity.
Q. 2. What do you know about Word Early, Word processors used tag-based markup
Processor? for document formatting, most modern word
Ans. A Word Processor is a computer processors take advantage of a graphical user
application used for the composition, editing, interface providing some form of what-you-see-
formatting, and possibly printing of any sort of is-what-you-get editing. Various powerful systems
printable data or material. consisting of one or more programs that can
Word processors for number of years usually produce any arbitrary combination of images,

Neeraj
featured a monochrome display and the ability to
save documents on memory cards. Later models
introduced innovations such as spell-checking
graphics and text, the latter handled with type-
setting capability.

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

126

INTERNET TECHNOLOGIES

Networking and Internet


10
Advantages of using Computer Networks:
Initially the advent of computer can be Computer network are popular for the following
attributed to the ability of numerical data reasons:
processing. With the rapid growth in technology Resource Sharing: A network allows its
computers were being used in every walk of life. users to share data, information or equipments such
Now we can see computer being used in almost as storage space over the network. Here, the
every sector, whether it is institute, educational or barriers of space are eliminated.

Neeraj
commercial, banking or entertainment. The advent High Reliability: Reliability increases while
of varieties of PC at cheaper price but with high working on networks because there are ready
capabilities made it possible to reach the computer alternatives like storage, replicated data and
to the masses. programs, etc.
Development of ARPANET, a network by

Publications
Cost-benefit Advantage: In a network
Advance Research Projects Agency in 1960 paved various computers may be assigned various tasks
the way of networking. This led to the advent of a
and can enhance the capacity and functioning
huge network of networks called Internet.
power at lower cost. Many computers can be
Currently Internet is being used to share and
www.neerajbooks.com
transfer data and information among millions of
users all over the world.
connected to a server to get their requests
completed. This kind of client server model
In this chapter, we will read about basic provides ultimate performance at lower cost.
concepts of networking, basic models of networks, Scalability: This is the ability to perform
types of networks, differences among various better gained by adding more processors.
networking devices, advantages of networks and Powerful Communication Medium:
addresses used on the Internet. Networks allow the users to communicate in
seconds and transfer large files or data in seconds.
It allows to use email, chats, video, audio chats
WHAT IS A COMPUTER NETWORK?
and online conferencing.
Computer network is a system of
The Internet: Internet is a network of
interconnection of two or more computers, which
are connected in order to share data, information networks. There may be a large number of
or resources. The scope of networking is vast. We networks connected to it, may be thousands of
can find networked machines in business millions users are using internet. With the advent
organizations, showrooms, banks, ticket counters of Internet in 1967 the era of information blast
and even at home. These are used for a variety of started. The most popular application which is used
reasons or uses. by internet is the World Wide Web (WWW). It

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 127

provides pool of information to the user. WWW (c) E-mail,


was started in 1989 by Sir Tim Berners Lee at (d) Chatting,
Physics Laboratory (CERN). It helps the user to (e) E-learning
easily click and find interface. The hyper linked (f) E-business,
document or text or element when clicked on links (g) Funds transfer,
the user to the web page whose address is stored (h) Shopping,
on the link. We should have an Internet connection (i) Advertising, etc.
by a service provider to use internet. We need web Data Communication System: In the era of
browser software to get access to the information
ICT we need to communicate with the outer world.
over the net. Example of browser software: Internet
In order to communicate, we have to share data and
Explorer, Goggle Chrome, etc.
information. Data is transmitted on Internet in digital
The Internet is popular due to its incredible
or analog form. But noise and attenuation can affect
features of:
(a) Searching, this. Noise is the external disturbances whereas
(b) Browsing, attenuation is the degeneration of the signal.

Neeraj
Publications A Simple Communication System
(Source: PhD thesis of Professor Manohar Lal)

As you can see it has five parts, which are These disturbances may be corrected by an
www.neerajbooks.com
explained here: error correcting code.
4. The Decoder: A decoder decodes the data
1. Source: The message to be communicated
is produced by the source. It can send it in any encoded by encoder to travel through the medium.
form be it a binary digit or a waveform, etc. 5. The Destination: It is the receiver of the
2. An Encoder: Encoder represents any message. A person or object can be a receiver.
processing of the source messages/signals prior to Some standard data transmission concepts are:
The data may be transmitted as analog or
transmission.
digital form.
3. The Channel: It is a medium, which is used
It can travel through a single path serially
for data transfer. A radio link, telephone line or a
or use number of parallel paths.
storage medium can be a medium. There may be The data can be sent asynchronously or
different kind of disturbances on a medium. For synchronously.
example, in a telephone line the noise disturbance Modes of Data Transmission are:
may be: (a) Simplex Mode: Only from one point to
Time varying frequency, another point. It is unidirectional. The sender will
Thermal noise, send and receiver will receive, he cannot send back
Crosstalk, the data. Example: television telecast in non-
Impulsive switching noise, etc. interactive mode.

www.neerajbooks.com
www.neerajbooks.com

128 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

What should you know about a Computer


Network?
A computer is said to be a part of a network if
it is connected to the network through physical
(b) Half Duplex Mode: From one point to wires or wireless medium.
another and reverse but only one at a time. Data We must also know that whether the computers
can flow from both the points but one at a time. are connected in no order or is there some
Example : Walkie talkie. architecture. We should also know the way of data
transmission. The issue of data transfer should also
be known.
DATA TRANSMISSION CHANNELS
The data transmission channels are needed for
data transmission. These can be:
1. Guided Channels or 2. Unguided Channels
1. Guided Media: Guided media use a
(c) Full Duplex Mode: Both ways
physical connection between two devices. The
simultaneously. The sender and receiver both can
waves are guided along a physical path over the
send and receive data. Signals going in either

Neeraj
medium. A signal has to travel within the physical
direction share the capacity. Sending and receiving limits of the guided medium. These may be :
data use half bandwidth each. Example: telephone (a) Twisted Pair Cable: Twisted pair cable
communication. is a cable which is made by intertwining two
separate insulated wires together. A twisted pair

Publications
cable consists of two conductors, which are
normally made of copper. This pair has a
bandwidth to distance ratio of about 1 MHz per
Speed of Transmission: Speed of data kilometer. These are of two types: shielded and
www.neerajbooks.com
transmission is also called bandwidth.
Bandwidth is a data transmission rate that tells
unshielded. Shielded Twisted Pair (STP) has a fine
wire mesh surrounding the wires which helps to
the maximum amount of information (bits/ protect the transmission; Unshielded Twisted Pair
second) that can be transmitted along a channel. (UTP) does not have that mesh.
Bandwidth is measured in kilobits, kbps, or Shielded cable is used in older telephone
megabits (Mbps). networks, network, and data communications to
Some Sample Transmission Speed: Dial- reduce outside interference.
up modems are slower than broadbands. These
provide usually maximum bit rate of 56 kb/s
whereas broadband provides minimum 256 kb/s
(0.256 Mb/s).
Packet, and Circuit Switching: Circuit
switching involves creating a switched path for (b) Optical Fiber: Optical fiber cable is a
entire communication, and then breaking the link. cable made of optical fibers that can transmit large
In a packet switching a message is broken in small amounts of information at the speed of light. It is
packet and are sent to destination. a medium and the technology associated with the

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 129

transmission of information as light pulses along (a) Radio Waves: Radio waves are an
a glass or plastic strand. Optical fiber carries much invisible form of electromagnetic radiation, and it
more information than conventional copper wire. is one of the widest ranges in the electromagnetic
In one cable, there are many optical fibers. The spectrum. A radio wave is an electromagnetic wave
glass fiber requires more protection within an outer propagated by an antenna. The frequency ranges
from 3 Kilo-Hertz to 1 Giga-Hertz. These can
cable than copper. Basically, it consists of two
travel in any direction and easy to produce waves.
concentric cylinders: an inner core and a cladding
It eliminates the cost of physical medium and
used to surround the core. These are made of
is very useful for long distanced communication.
transparent plastic or glass material. The density These are of a very long wavelength, such as
of the core and cladding must be such to be helpful thousands of meters, tend to travel along the surface
to reflect the beam of light. of the earth and even penetrate into the water. These
The core guides the beam and cladding are useful for communication with submarines and
prevents it. The signal is usually generated by a for broadcasting time signals, radio broadcast,
laser or Light Emitting Diode (LED). The speed cellular telephones, etc. Each communication
of data transfer is really high. service uses a part of the spectrum that is suitable
Due to high speed and little disturbance these for its needs. These days cellular radios are used to

Neeraj
are being used rapidly in telecommunications. provide mobile phone networks. These operate in
the VHF (Very High Frequency) band.
These help in multicasting, which means it
transmit a signal for specific group which may be
more than one. These are also used in FM radios,

Publications
cordless phones, etc.
A communication between single source and
Advantages of Optical Fiber destination is known as unicast and if there are
Higher Bandwidth helps data at a higher many receivers to catch the signals sent by sender
www.neerajbooks.com
rate.
Less signal attenuation.
at any destination, it is called broadcast.
Bluetooth: Bluetooth is used to send and
Immunity to electromagnetic interface. receive data over short distance in mobile and
Light weight. related technology. A Bluetooth connection is
Limitations of Optical Fiber wireless and automatic, and it has a number of
It needs experts to install it and provide interesting features that can simplify our daily lives.
maintenance.
(b) Microwaves: Microwaves are radio
Being unidirectional needs two fibers for
frequencies, which ranges between about 1 GHz
bi-directional communication.
(one gigahertz) to about 300 GHz.
Cost factor is high.
It may be defined as a short electromagnetic
2. Unguided Media: Unguided media
transfers the signals through wireless medium. It wave (longer than infrared but shorter than radio
transports electromagnetic waves in the air which waves); used for radar and microwave ovens and
can be received by the devices to catch them. These for transmitting telephone, facsimile, video and data.
can be: These are unidirectional waves and hence have less
(a) Radio waves interference by a pair of aligned antenna to another.
(b) Micro waves Uses of Microwave are radio transmission,
(c) Infrared. telecommunication carriers and TV stations.

www.neerajbooks.com
www.neerajbooks.com

130 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Satellite is another form of microwave system. geometry: the physical topology and the logical
Repeaters present in the sky supplement it. Satellites (or signal) topology.
have a high bandwidth and can support variety of (a) Physical Topology of a network is the
channels. It has some limitations such as: actual geometric layout of workstations. There are
High set up cost. several common physical topologies. Such as ring,
The lifetime is limited. bus, mesh.
These waves cannot be received inside the (b) Logical Topology describes the nature of
building. the paths the signals follow from node to node. It
(c) Infrared: Infrared is a energy radiation or may be the same as the physical one or not.
say electromagnetic radiation with a frequency Some Topologies:
below our eyes sensitivity. Even that we can not Bus Topology: Bus topology is a network
“see” sound frequencies, we know that it exist. This setup where each of the computers and network
ranges between 300 Giga-Hertz to 400 Tera-Hertz. devices are connected to a single cable or backbone.
The computers are connected with single
communication cable. It allows only one computer
to send a message at a time. The more the number
of computers attached to it, lesser will be the speed.

Neeraj
A node can transmit the data when it finds the bus
free, means when the bus is busy it has to wait.
Each node connected to the network has a unique
address, which is used by the operating system to
keep track of data transmission.

PublicationsMicrowaves
Optical transreceivers help to generate and
receive these signals. These are relatively cheap
www.neerajbooks.com
and make it a reasonable technology. Uses are
limited because it can cover lesser distance of say
around a kilometre. Currently, these are popularly
used for interfacing hand-held and portable Bus Topology
computing devices to Local Area Networks and a It is the most common and simple topology
wide bandwidth can be used to transmit digital data used in networking. The nodes are connected
with a very high data rate. This technology is being through a single wire called backbone. The nodes
used to send and receive signals between wait for their turn and then send or receive data or
keyboards, mouse and printers. Limitation is the messages. For this, the unique addresses assigned
use of infrared inside building due to tendency to play a help.
get disturbed under sunlight. Advantages of Bus Topology
NETWORK TOPOLOGIES It is simple to use.
In networking, a topology is a usually It is reliable.
schematic description of the arrangement of a Cost effective.
network, including its nodes and connecting lines. Scope of extension is there, and it is easy
Strategy for future expansion is also described in to implement.
a topology. There are two ways of defining network Failure of one node will not disturb others.

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 131

Limitations of Bus Topology Can handle network traffic.


A computer has to wait for its turn to come. Ideal for a larger network.
Number of computers can affect speed of There is no need of a server to manage
LAN. functioning.
If extended, the speed will get affected.
Limitations of Ring Topology
Nodes are connected using terminators at
Expensive than bus network topology.
both the ends of the cable.
Ring Topology: In this topology, the It is slower when compared to an Ethernet
workstations are connected in a closed loop network under normal load.
configuration. This is also known as circular The troubleshooting is difficult.
topology because the nodes are connected in a If one node is not working properly, the
circle. Adjacent pairs of workstations are directly network will get disturbed.
connected. Other pairs of workstations are Star Topology: It is one of the most
indirectly connected. common network setups where each of the devices
In this node, there is no end of the network, means
and computers on a network connect to a central
every node is connected to the other one thus, forming
hub. The hub is connected to all the nodes directly.
a ring. Every node will have two neighbouring nodes
Each computer is interconnected indirectly to each

Neeraj
whith are directly connected to it. A node accepts
data from one of the neighbouring node and transmits other. A hub is used to expand one network
to the other one. As the physical feature, the data has connection into many. In small networks we use
to travel in circular way. We can use this in peer-to- single hub and in larger we use many.
peer networks, where there is a need for every

Publications
machine to work as processor and distributor of data.
Example:
(a) IBM Token Ring.
(b) Fiber Distributed Data Interface.
www.neerajbooks.com
Client

Client Client

Server

Client
Star
StarTopology
Topology

Advantages of Star Topology


Client
It is more reliable.
Ring Topology
Failing of one connection does not disturb
Advantages of Ring Topology the network, it can be isolated by hub.
All computers are given equal access to the It is easy to replace, install or remove hosts
token, no computer can monopolize the or other devices.
network. Easy to troubleshoot.

www.neerajbooks.com
www.neerajbooks.com

132 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Performance is fast. Components of LAN:


Limitations of Star Topology 1. Network Devices: Workstations, printers,
Costly network topology. file servers, etc.
The network will not work if the hub is not 2. Network Communication Devices: hubs,
routers, switches, etc.
functioning.
3. Network Interface Cards (NICs): to work
Usually, a device is needed to switch the
as interface between the machine and network.
network traffic. 4. Cable: for wired network. It is not needed
NETWORK CLASSIFICATION in wireless LAN.
We can classify the networks in the following 5. Network Operating System: It controls
main types: the network functioning.
1. LAN (Local Area Network) Characteristics of LAN:
2. MAN (Metropolitan Area Network) It is a network used in restricted
3. WAN (Wide Area Network) geographical area.
Local Area Network (LAN): Local-Area LANs are private networks.
There is no tariffs or other regulatory
Network is a network that has networking
controls for wired LAN, but it may be there
equipment or computers in close proximity to each

Neeraj
for wireless LAN.
other. It allows them to communicate, share data, These are high speed networks.
information and other resources, such as printer Allows variety of Media Access Control
or storage medium, software etc. Many business methods.
houses use a network of their own at building level, Advantages of LAN

Publications
is known as a LAN. Computers connected to LAN LAN makes it possible to share resources
may reside in same room or building. and data among the network. Thus, it makes
it possible to utilize the resources properly.
Client LAN allows for high-speed data

www.neerajbooks.com transmission.
Helps to function the organization in a
better way.
Publisher
LAN Internet
Limitation of LAN
Security is an issue in LAN, but it can be
controlled using security system.
Agency
Metropolitan Area Network (MAN): A
Client
LAN Metropolitan Area Network (MAN) is one of a
types of computer networks. It is a network that is
As is earlier said the computers should be utilized in large networks. This network is larger
located closely say within 2 kms of distance. This than the standard Local-Area Network (LAN) but
allows to share with a higher speed. It also justifies is smaller than the Wide Area Network (WAN).
the use of resources. The Ethernet system based We can find use of MAN in school campuses and
on the bus topology servers as a good example of large companies having multiple buildings. They
LAN. typically use wireless infrastructure or Optical
A LAN may be connected to another LAN or fiber connections.
to WANs and MANs. We need to use a device It may cover a full city around 50 kms and
called router for this. may be a signally owned network. There are

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 133

instances where many organizations use it. These As you can see in the above figure, WANs
can be said an inter network of LANs. It is done are used to connect LANs and other types of
with the help of modem and cables. networks together. It allows data and
information sharing over a very large network.
These may be owned by single large
organization or may be served by Internet
service providers, etc. These can use leased lines
Metro-Area Network
MAN

and a router. But being costly many WANs use


public network or Internet.
Virtual Private Network (VPN): Virtual
MAN Private Network is a network which used public
Characteristics of MAN: telecommunication infrastructure for example,
MANs provide Internet connectivity for internet to provide access to remote individuals or
LANs. groups to their organization’s LAN. It can
The network size falls generally between authenticate the user.
LAN and WAN. Characteristics of WAN: It can spread to

Neeraj
Allow to share resources at a larger end. larger geographical area.
MAN are high speed network.
It can cover large geographical areas Communication Medium: satellite, public
ranging upto 50 kms. telephone networks, routers.
It started around 1980. Advantages of WAN

Publications
Wide Area Network (WAN): A Wide Area
It covers very large area.
Network (WAN) is a geographically dispersed
telecommunications network. It is a collection of Helps to share resources on a larger
computers and network resources connected via a network.
www.neerajbooks.com
network over a large geographic area. These cover
larger distance than a MAN. It can travel from one
Helps to connect various LANs.

country to another. It helps to connect cities, REFERENCE MODELS


countries and continents. It uses routers and public Reference models work as a model or
communications links. Example: Internet. standards, which can be referred to. OSI is one
such important reference model.
OSI Model: The Open system interconnection
model is an ISO standard for worldwide
communications that defines a networking
framework for implementing protocols in layered
structure. There are seven layers in OSI model. It
has protocols which are set standards to be
followed to communicate in a network.
These layers are Application, Presentation,
Session, Transport, Network, Data-Link, and
Figure of WAN
WAN Physical Layers.

www.neerajbooks.com
www.neerajbooks.com

134 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

requirements for activating a physical link. Data


is transferred from one device to another.
NETWORKING DEVICES
We need some devices for creating a network.
These are explained as follows:
Network Interface Cards: The Network
Interface Card or NIC, is an expansion board which
is inserted into a computer to make it able to get
connected to a network. Generally, these are
designed to serve a particular media or protocol,
but now we can get network interface cards which
serve many networks. The speed of the network
data transfer depends upon the quality of Network
interface cards. Example: Ethernet cards. Every
Each layer contains similar functions. It takes Ethernet network controller has a unique serial
the service from the lower layer and provides it to number called a MAC address.
the upper layer. The physical layer is number 1

Neeraj
and the application layer is number 7. In
transmission side data flows from layer 7 to layer
1, and from the reception side, it flows from layer
1 to layer 7.

Publications
7. Application Layer: User interacts through
this layer with the help of application software.
This layer describes the way the work gets done
actually.
www.neerajbooks.com
6. Presentation Layer: The data formatting
Network Interface Card

tasks are done here. Modem: Modem or Modulator Demodulator


5. Session Layer: This layer manages the is needed for data transfer on the network. It is a
network of different layers. hardware device or software application program
4. Transport Layer: This layer ensures the which allows the computer to transmit data/
reliable arrival of messages and provides error information over a network. We know that
checking mechanisms and data flow controls. It computers store information in binary form but
deals with quantity and nature of data delivery. data transmission over telephone lines needs the
3. Network Layer: It contains routes and fixes data to be converted into analog signal. While
route for data path. receiving the data, the opposite is to be done. This
2. Data-Link Layer: The Data-Link Layer is done by a modem.
assures that an initial connection has been set up, Physical Modems are of two types:
divides output data into data frames and provides 1. Internal Modems: An internal modems is
error free transmission. a plug-in circuit board. It is fixed inside the
1. Physical Layer: This layer describes the computer. These are less expensive than external
physical properties of the various communications modems because they do not require a case, power
media, as well as ensures the functional supply and serial cable.

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 135

2. External Modems: External modems are


kept outside computer. These are connected to the
serial port using a serial cable. We can see the lights
blinking on them to show these working. But these
come costlier than internal modems.

Hub

Switches: A switch is an improvement over a


hub. It can reduce the traffic on the network by
learning which port sends most of its packets to
which port. Then it sends the packets to directly
that port only and not to all ports. It is a hardware
device that is used to filter and forward packets
External Modem

through the network.


Router: A router is used to join multiple wired
or wireless networks together. It translates

Neeraj
information from one network to another. These
are used to select the intelligent path to avoid traffic
on the networks.

Publications
Internal Modem Internet

Repeaters: It is a network device, which is


used to regenerate or replicate a signal. Repeaters DSL/Cable

are used in transmission systems to regenerate


Modem

analog or digital signals distorted by transmission


www.neerajbooks.com
Router

loss. Analog repeaters frequently can only amplify


the signal while digital repeaters can reconstruct
a signal to near its original quality.
Bridge: Bridge is a product which connects a
Notebook C
Computer A Computer B

LAN to another LAN which uses the same Router

protocol. It decides where the data has to go and Gateway: A gateway is an address used as an
thus, handles traffic problems. These are protocol entry point into another network. For example:
independent devices. 168.66.10.2 could be used as a gateway. It is common
Hub: A hub is a basic networking device that for an IP address ending with .1 and .2 to be a
connects multiple computers or other network network’s gateway. The gateway is commonly the
devices together. It sends data packets to all the address of a network device such as a network router.
ports and leave them to decide which port will It may support address mapping from one
receive it. This creates wasted transmission. These network to another. Network gateway can operate
at any level of OSI layers model.
can work well in small networks only as these
These perform a complex task when compared
devices are not very intelligent. The advantage is
to router or switch.
the low cost which makes it popular.

www.neerajbooks.com
www.neerajbooks.com

136 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

While working on a network, if a packet is to We have already read that we need an


be delivered to another network having different interface card to get connected to internet.
set of protocols unlike routers, a gateway is able Internet uses TCP and IP (TCP/IP) as its
to convert the data formatting according to another basic protocol.
network protocol. A network gateway is an The TCP is responsible for the reliable
internetworking system that joins two networks delivery of packets. The IP protocol is
together and it can be configured in software, responsible for exact information of
hardware or both. addresses of source and destination
INTERNET AND ITS SOFTWARE
computer by its unique IP address.
Components: Now we will study some
Internet can be used not only to find
concepts related to internet.
information but it is used for many other
Internet is network of networks. These
features like e-mailing, chatting, education,
networks can be LAN, MAN or WAN. The
Internet can serve the user with billions of web fund transfer, social networking, banking,
pages created by people and companies from shopping, etc.
around the world, to locate information and World Wide Web provides a pool of
entertainment. It is also full of numerous services information by linking to hyper linked

Neeraj
that help make life more convenient. The subunits information.
of internet are called subnet and has a unique Basic Software Components required to access
address and are connected using routers. Internet are:
There are a number of search engines, 1. Operating System: It is required to make
which allow you to search the information you the computer working and also to get

Publications
want. Google and Yahoo are one of them. These connected to internet.
may fetch information from any of the subnet as 2. Internet Browser: It is a software used to
they use a common protocol for reliable data locate, retrieve the contents from the world
transfer over the internet known as Transmission wide web and display it on the user’s
www.neerajbooks.com
Control Protocol/ Internet Protocol (TCP/IP). The
Internet is explored, which is more commonly
screen. Example: Internet Explorer,
Netscape. It adds to the meaning of www
referred to as surfing, using a computer browser.
by converting HTML pages into simple
language.
3. Firewall: While sharing information on
such a big network, one may face security
hazards. These could be virus, information
Workstation

theft, hacking, etc. In order to be safe it is


recommended to use protection tools
Firewall is one of them. If follows your
Workstation
Hub

instructions to make your computer


secure. It restricts harmful information and
programs coming your way.
Workstation

Modem
4. TCP/IP Protocol: This are set of standards
which have to be followed while
Modem RAS SERVER

communicating on internet.
Laptop Computer
Structure of Internet

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 137

TCP/IP Stack: Internet is used basically


for data and information transfer and sharing
on a large network. This transfer must be in a
secure way, and to make it sure some set of
protocols have to be followed. TCP/IP, software
which was originally designed for the UNIX
operating system, provides this to the computer.
T hi s is n ow avail ab le f or almos t every
operating system.
There may be a bulk of data or information to
be transferred over the net. The TCP works to
divide the data into little data packets to be sent
with proper information to make its re assemblage
easy and accurate.
The IP puts destination-addressing information
TCP/IP Model

on each of the packets. The Internet aims to work Internet Layer: This may work to deliver data
and control the flow on same or different networks.

Neeraj
as a single network. It is a challenge to identify a
Transport Layer: It is the third layer of the
computer on Internet though, it is not impossible.
TCP/IP model. It is positioned between Application
Every computer has a unique address over the layer and Internet layer. The purpose of transport
internet defined by IP such as 192.168.1.4. It works layer is to permit devices on the source and
as a logical address and used to share information destination hosts to carry on a conversation.

Publications
or communicate with other computers. When we Transport layer defines the level of service and status
demand for any web or Email address it is of the connection used when transporting data.
converted into the equivalent IP address the server Application Layer: It is the top most layer of
or resource. We can easily use website addresses four layer TCP/IP model. It defines TCP/IP application
www.neerajbooks.com
and use Email addresses of our contacts, just protocols and how host programs interface with
transport layer services to use the network.
imagine if we have to remember the IP address of
all them. Advantages of using TCP/IP
TCP/IP Model: The TCP/IP Model or Internet This makes it possible for computers working
on various plateforms to communicate.
Model or DoD model also has layers like OSI
Superior failure recovery mechanism.
model.
New networks can be added.
Host to Host Network: It has four layers.
Most reliable protocol.
These are not numbered these only have names. INTERNET ADDRESSES
The bottom most layer deals with hardware. There are two types of computers namely
This layer also encodes and transmits data over servers and clients on network. A computer or
to the physical layer of the receiver. A variety computer program that manages access to a
of methods are available for transmitting centralized resource or service in a network. It
packets. This is dependent on the variety of makes possible for clients to share and
connection. For example, dial up modem uses communicate with other computers. This
PPP and broadband uses PpoE to transmit data information may be in form of web pages, text
packets. documents, videos files, sounds files, etc.

www.neerajbooks.com
www.neerajbooks.com

138 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Characteristics of servers: Example:


1. These are computers with high capacity. Suppose your computer has an IP address of
There must be web server software loaded to it. 193.168.1.20 and you want to access a location
Examples of web server software: Microsoft 193.168.1.25, as your subnet mask is
Internet Information Services (IIS), Sun Java 255.255.255.0, it will give you following answers:
System Web Server. Host : 193.168.1.20
2. It has a high speed internet connection. Subnet Mask 255.255.255.0
3. It has its unique URL and IP address. Result: 193.168.1.0.
IP Addresses Accessed Location 193.168.1.25
IP address: 192.168.1.97 in various forms: Subnet Mask 255.255.255.0
An IPv4 address can be broken down to four Result: 193.168.1.0
segments, which are separated by dots. Each Result of both the operation depicts the same
segment contains a number between 0 and 255. Net ID therefore, we can say that the referred
Computer needs 32 bits of memory to store an IP destination IP address is local to our network.
address. There is a unique IP address of every We can identify whether the destination is
computer. Even printers or any peripheral within the same subnet. Now to cater to the
increasing demands of the users 128 bit Internet

Neeraj
connected to network has its IP address. Network
Identifier or Net ID is a unique ID provided to protocol version is being used.
every network under internet. Device Identifier of DNS and Web Addresses: When we type the
Device ID is a unique ID provided to devices web address of a site in the address bar, the web
connected to network under its own Net ID. page appears. When we arrive at a site or web page

Publications
If we know the Net ID, subnet mask and IP through clicking on hyperlink and do not know its
address of the device, the identity of the device address, we can see it in the address bar. It is easier
may be known. to remember website address as compared to
Some IP addresses are reserved for private remembering IP addresses of the websites. Though
www.neerajbooks.com
networks. These are not available to everyone
except specific organization.
we ask for a particular web site by providing its
web address, there are services, which convert
The IP range that is allocated for such non- these to respective IP addresses. Example: Domain
routable addresses are (as provided in course Name System (DNS).
book): There are umpteen numbers of websites and
IP Address Subnet Mask Number of IP their respective web addresses. It is not a simple
addresses (some what equivalent to maximum task for a DNS to do its work. In order to make it
possible number of Computers/ network devices) simpler it follows a hierarchical naming scheme
10.0.0.0 to 10.255.255.255 255.0.0.0 16,777,216 supported by distributed database system.
172.16.0.0 to 172.31.255.255 255.240.0.0 1,048,576 For example, let us find out the hierarchy for
192.168.0.0 to 192.168.255.255 255.255.0.0 65,536 du.ac.in as:
The subnet mask like an IP address is a 32 At the top level the country domain shows in
bits field separated using dots. When converted which depicts India. Now within India look for ac
into binary, it gets converted into 0 and 1s. The i.e. academic sub domain. Now you can find du in
number of ones and zeros decide which kind of academic sub domain as Delhi University. This
mask. We can compare IP address with mask, and entry should point to the IP address for the du.ac.in.
can split addresses into network ID and device ID. This is the way DNS finds the addresses.

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 139

Example of Domain Names on Internet

DNS does the following to convert domain page we should know its protocol, its home server
name in its respective IP address. and its name.

Neeraj
It will supply the IP address, if it is known
to it.
It will find it from some other name server
if it does not have it.
An error message is reflected if it is not found.
A web page may have an address such as:
http://www.ignou.ac.in/ignou/studentzone/
queries/1,
We can see the protocol http is followed.
Web site name is www.ignou.ac.in. DNS

Publications
Web Page: A web page is a portion of a web
site which can be accessed on internet. These may
be in form of files. If we want to identify a web
name of IGNOUs WWW server may be
identified.
The query page is under student zone folder.

www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

140 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

This address is the Uniform Resource Locater. Username is anjali, subdomain is ignou, .ac
There are three parts in it. The first part will tell shows that it is an academic organization, .in shows
us about the server type and is followed by ://. in India.
Second is the domain name. These two parts can
be used to identify the web server which stores all
Q. 1. What is the need of computer
the information about the web page. The third
networks?
component shows the path of the document. Here
Ans. Computer networks helps to share
the path is form 1 in query in student folder.
resources and information. Hardware resources
The communication over the internet is like storage, printer and software resources like
controlled by HTTP. It needs the services of TCP software and files can be shared. The list is very
to work. long. It helps in optimum utilization of resources
Steps followed to show the web page: and saving time and energy.
(a) Launch your internet browser. Q. 2. In the context of communication
(b) Write the URL in the address bar. system, what does a MODEM do?
(c) It starts to resolve the address, first it Ans. MODEM is acronym of encoder and
checks in its cache. decoder. If we want to share resources over internet
(d) If not found then it requests the DNS to

Neeraj
we need MODEM to convert digital signals to
provide IP address. analog to send the data and analog is converted to
(e) DNS server provides the address. digital when the system has to receive it.
(f) Now the browser will request the web Q. 3. How can you improve the perfor-
server to provide the web page. mance of twisted pair cables?

Publications
(g) If the page is found the web server Ans. The performance of the twisted pair can
provides it or it gives error message. be improved if it is shielded by metallic shield. It
(h) The page or the error message will be will become less prone to disturbance.
shown. Q. 4. Describe the principle of optical fiber
www.neerajbooks.com
E-mail Addresses: You have read earlier and its advantages and disadvantages?
Ans. An optical fiber is made up of an inner
about the uses of Internet. Email is one of the
core surrounded by a cladding. These are made of
facilities provided by Internet. Email or electronic
transparent plastic or glass material. These carry
mail is a service, which helps the user to send or
light signals and use reflections to guide light
receive mails online. For this the receiver and the through a channel. The core guides the beam to its
sender must have an email address. This is sent path and cladding prevents it from escaping from
over electronic medium using computers or the path. It’s advantages are its high bandwidth
mobiles etc. We can send text, sounds, images etc. and functioning without disturbance. It’s
The service providers like, Gmail, Rediff, Yahoo, disadvantages are its high cost and need of experts
can be used to make an email account. to connect.
The format of email address is: Q. 5. Identify the characteristics of bus, ring
username@subdomain.domain and star topologies and write the best
jaima@gmail.com characteristic that you think while designing a
E-mail address may be provided by the topology.
organization where you are working. Ans. Bus topology is a network setup where
anjali@ignou.ac.in each of the computers and network devices are

www.neerajbooks.com
www.neerajbooks.com

NETWORKING AND INTERNET / 141

connected to a single cable or backbone. A single devices together and turn them into a network. It
communication cable is used to transfer data. The forwards the received data packets to all the
nodes have to wait for their turn. connections, then the related connection decides
Ring topology is a network in circular shape. to take it. We should use this technology where
Each node is connected with two nodes. the money resources are limited, the network is
Star topology is most common network setup. going to get less traffic and a very intelligent
A hub is used to connect the nodes. system is not required.
These are differentiated on the basis of Q. 10. What is the function of gateway?
network scalability, cost, handling with traffic, etc. Ans. Gateway allows inter network address
According to me the best characteristic worth mapping. They accept data from one network and
thinking is the ability to perform required task in format it according to the other network, which is
a reliable manner. going to get the delivery of packets.
Q. 6. Differentiate amongst LAN, MAN and Q. 11. What are the services on Internet?
WAN in terms of their coverage area. Ans. Internet provides the following services:
Ans. LAN is the smallest form of network, E-mailing
it covers upto 2 Kms. Chatting
Sharing ideas using blogs

Neeraj
MAN is larger network than LAN, it covers
up to 50 Kms. Gaining knowledge using search engines
WAN is larger than LAN and MAN and covers Information sharing
large distances like states or countries. Using discussion forums, which help to get
Q. 7. Identify the examples of networks knowledge from a group.

Publications
around you and classify them in terms of LAN, Making websites.
MAN and WAN. Q. 12. What is firewall? Where can it be
Ans. LAN Network in a small organization. used?
MAN Cable TV network. Ans. Firewall is software, which is used to
www.neerajbooks.com
WAN Internet.
Q. 8. Differentiate between a bridge and a
protect the computer system from variety of
security problems such as virus, hackers, Trojan
house, etc. It can be instructed to work according
router.
to the need of the user. It tries to keep a check on
Ans. A bridge is used to connect many LANs.
data, information and requests that come to your
It can solve traffic problems. It operates through
computer unwontedly.
layer one and two of OSI model.
Q. 13. What its TCP/IP? Why is it used?
A router is very intelligent networking device.
Ans. Transmission Control Protocol/Internet
It works better than bridge. It can find the fastest
Protocol shortly known as TCP/IP are set of
and shortest way possible to deliver information.
protocols which try to implement some rules on a
Not only this it can translate information to be sent
networked atmosphere. There must be some rules
to another network according to its settings. It
when computers communicate over networks.
operates through first three levels of OSI model.
These make them followed by computers. The
Q. 9. Explain the function of hub and where
function of TCP is to divide the message into small
should we use this communication device?
packets, and fix related information and IP works
Ans. A hub is a device used for network
to put addresses on these packets to ensure correct
connection. It is used to connect various Ethernet
delivery.

www.neerajbooks.com
www.neerajbooks.com

142 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Q. 14. What is a URL? in the late 1980s and 1990s. The ARPANET was
Ans. URL stands for Uniform Resource decommissioned in 1990. The Internet was com-
Locator. It is a standardized naming convention mercialized in 1995 when NSFNET was decom-
for addressing documents accessible over the missioned, removing the last restrictions on the
Internet. use of the Internet to carry commercial traffic.
Since the 1990s, the Internet has had a drastic
Q. 15. Define the terms DSN, IPv4 address,
impact on culture and commerce. The research and
Subnet mask.
education community continues to develop and use
Ans. DNS is acronym of Domain name
advanced networks such as NSF’s very high speed
system. It is helps to point domain names to their Backbone Network Service (vBNS), Internet2, and
associated IP address. National Lambda Rail. Increasing amounts of data
IPv4 address is a 32 bit address of a host on are transmitted at higher and higher speeds
Internet. over fiber optic networks operating at 1-Gbit/s,
Subnet mask or subnetwork mask is a method 10-Gbit/s, or more. The Internet continues to grow,
of dividing a network of IP addresses into groups. driven by ever greater amounts of online
information and knowledge, commerce,
entertainment and social networking.
Q. 1. Explain in detail about the history of Q. 2. What do you know about the Bus

Neeraj
the internet. Topology?
Ans. Internet starts in the 1950s and 1960s Ans. Bus networks use a common backbone
with the development of computers. This started to connect all devices. A single cable, the
with point-to-point communication between main- backbone functions as a shared communication
frame computers and terminals, expanded to point- medium that devices attach or tap into with an

Publications
to-point connections between computers and then interface connector. A device wanting to
early research into packet switching. Networks communicate with another device on the network
such as ARPANET, Mark I at NPL in the UK, sends a broadcast message onto the wire that all
CYCLADES, Merit Network, Tymnet, and Telenet other devices see.
www.neerajbooks.com
were developed in the late 1960s and early 1970s.
In 1982, the Internet Protocol Suite (TCP/IP)
Bus topologies are relatively easy to install
and don’t require much cabling compared to the
was standardized and the concept of a world-wide alternatives. However, bus networks work best
network of fully interconnected TCP/IP networks with a limited number of devices. If more than a
called the Internet was introduced. Access to the few dozen computers are added to a network bus,
ARPANET was expanded in 1981. Commercial performance problems will likely result.
Internet Service Providers (ISPs) began to emerge

www.neerajbooks.com
www.neerajbooks.com

143

Web Applications I
11
internet. It may include any kind of information.
Internet has become an important part of our It is also called surfing. For surfing, an internet
life. It not only opens the knowledge gates, but connection is necessary. You are said to be surfing
allows the user to share resources on the net. The when you are working on the internet. It is helped
TCP/IP is the basic protocol used on the net. by a service provider which provides internet
Basically, it is the network of networks that allows
millions of networks to get connected for the ease services like BSNL.
of the user. How Communication Takes Place between

Neeraj
In this chapter, we will read about the Web Server and Web Browser?: Browsing is
Internet’s basic applications and some concepts done using a software application called a Web
related to internet such as browsing, emailing, browser. It allows the user to access the World
searching and chatting. Wide Web (WWW) to see or display the

Publications
information. It helps to see the contents by
BROWSING converting the HTML (Hypertext Markup
Browsing is an activity which includes, Language) tags in formatted information.
searching, opening or viewing any content on the Examples: Internet Explorer, Google Chrome, etc.

www.neerajbooks.com

Your Computer Web Browser The Internet

How does Browser Work? Web server such BSNL.


The services rendered by internet are based Network connection such as LAN, WAN
on client server computing. Basic component of or Internet.
this are: HTTP: HTTP or Hypertext Transfer Protocol
Web client such as internet explorer. helps to exchange information. It allows the user

www.neerajbooks.com
www.neerajbooks.com

144 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

to access a web page containing information. Web pages may be available on web servers. HTTP may
not work properly when it comes to large amount of data transfer such as large sound files.
Voice over IP (Voice Over Internet Protocol): It is a new technology that will improve the way we
communicate. VoIP basically means voice transmitted over a digital network. It helps in real time data
transfer. Example : Real-time Transport protocol (RTP).
How Does it Work ?
In order to get connected to the internet, get an internet connection from the service provider. Now
launch the web browser. Now you can see address bar on top, write the address of desired website in this
bar.

Neeraj
Publications
www.neerajbooks.com

Now the browser will request the nearest Now the web browser requests TCP/IP
DNS server to get the site. protocol to establish a connection and
Nearest server will follow the request and requests for and shows the home page of
if the site is not found it will take help of the web site. Other related files may also
another server. If not found, error message be downloaded.
will be flashed. In a web page there are many contents like
IF it is found, DNS will return the resolved text, pictures, graphs, animations, hypertext and
IP address of the Web server of the website. hyperlinks. Hypertext is a text which store the

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS I / 145

address of some other server to show its contents, 1996 Opera was started and now being used
or the content detail is stored somewhere else other as a mobile phone browser.
than the present page. If this feature is done with Firefox evolved from Netscape was
other elements like graphics, sound, and video then released in 2004.
it is called Hypermedia. These links are called
Apple Safari was developed in 2003.
hyperlinks. The hyperlinked text is shown in some
other, usually blue colour and may be underlined. Google Chrome, a very useful browser was
When you roll over the mouse, the pointer changes released in September, 2008.
into a hand. Hyperlink on clicking takes the user Types of Browsers
to the stored content on some other page or server.
This process of loading one page after another, by (a) Line Mode Browsers: Initially, the
clicking the hyperlinks is known as browsing or browsers used to display text line by line. These
surfing. were fast access because of the feature of
displaying only text. Example : Lynx.
Web Browsers help the user to:
find the desired information over the (b) Graphical User Interface based
Browsers: These can manipulate images, audio,

Neeraj
internet,
view contents of different file formats, video and animation, etc. Example: these run under
use spywares, graphical user interface and provide liberty to point
interact with other websites, and select options using mouse.
streaming multi-media, (c) Java enabled Web Browsers: These

Publications
block unwanted pop-up advertisements, browsers include a Java Runtime Environment that
protect through password, support Java programming language. These are
use tabbed browsing, more secure than the others. Example : LOBO.
www.neerajbooks.com
use features like auto fill, and
use download managers. Browser Security: HTTP Secure is a secure
A Brief History of Web Browser: In the late protocol which was developed for applications
1980s, a variety of technologies laid the foundation which need high security. These may be banking
for World Wide Web by Sir Tim Berners-Lee in or commerce applications. In a secure browsing
1991. A detailed view of this topic can be taken https:// is written in the beginning. So next time
from the website http://www. wikipedia.org. Some log on to your secure information like banking etc.
highlights are: by HTTPS.
In 1993, the first graphical web browser, Browser Cookies: A cookie, web cookie or a
NCSA Mosaic was developed. browser cookie is used to store piece of
information. The browser stores it as a text file. It
The majority of market was covered by
is sent by the web server to a your web client. It is
Netscape Navigator which was released in used to store the information of user end for future
1994. reference. This needs to be supplied to the web
Microsoft Internet Explorer, which was server in future. Example : When a website
launched in 1995, soon gained the requires a form to be filled to get opened for you,
popularity. the information is supplied, now each time when

www.neerajbooks.com
www.neerajbooks.com

146 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

you try to open it, there is no need to supply the (c) Meta Search Engines: These search
same information, the cookie will be sent to the engines provide summarized result of queries sent
website containing your information. to various search engines and web directories.
Are Cookies Bad? Example : Metasearch, Infind, Metafind.
Cookies are not viruses, nor can these be How Does a Search Engine Work?
programmed for bad effects. However, these can It does the following functions :
be used by the spyware to get personal information 1. Spidering or Web Crawling: These are
provided by you. These can be deleted. the software programs used by search engines to
Some Security Tips While Browsing: query websites or pages to collect the specified
Use the latest version of browsers. information and sort it. These make it easier to
Use antivirus and keep it updated. search for users. These search for the information
Use anti spyware. in systematic manner and also make a copy of
Use a secure user account. visited pages.
Do not click on unnecessary links. These 2. Indexing: Spiders provide the information
may be spyware which can use your to the search engines, then seach engines show
information for unwanted use. Example : the result in a way that is helpful for a user to search
your credit card details may be hacked. easily. It may make a list in order or ranking. Web
Do not login to a critical application if it

Neeraj
history stores the website addresses surfed.
does not have https://. 3. Searching: The search engine displays a
Do not download or install anything from list of web pages that have the keyword asked by
any ambiguous party. a user. This list shows the title of the document
Do not visit unsolicited websites. and may contain a few lines. Example :

Publications
SEARCHING Boolean Operators: In order to refine the
Internet is a network of networks. It may search we may use Boolean operators :
include millions of computers having varied AND: This commands the engine to search
information. It is not easy to search content in all the webpages that contain both the keywords.
www.neerajbooks.com
the machines. So in search we use search engines,
which produce the list of specific content sources,
Example “Junk” and “Food”. The pages having
both the keywords will be displayed.
needed by the user. Example : Yahoo, Google, etc. OR: This operator can be used as “Junk” OR
These search engines use programs called “Food” and will display web pages containing
spiders or robots or wanderes etc. which keep on either junk or food or both.
updating their lists of the available information NOT: This operator will be used as “Junk”
on various web pages, engines finds, classifies and AND (NOT “FOOD”) will display web pages
stores information about the contents of various containing only junk not food.
websites on the Internet. They find and classify Some other Boolean expressions are Followed
the content available on the internet. by, Near, Quotation Marks, etc.
Types of Search Engine Search can be limited by using Limiting
(a) Primary Search Engines: These scan Search.
websites for key words, phrases, to generate There may be different syntax for same
database of web pages in a pattern. Example : Boolean operator or may be a different operator
Google etc. for different engine.
(b) Web Directory: These present organized Search Engines
information in form of directories. Example : Google search engine at www.google.co.in
Yahoo.

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS I / 147

Neeraj
Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

148 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Yahoo search engine at www.yahoo.co.in

Neeraj
Publications
Some Searching Tips: When we type any Alerts
www.neerajbooks.com
words in the command line for a search engine to
go for, it follows every word. In order to make the
Language tool
Answers
search accurate do as given: Updates
Choose words carefully. Directory
Provide correct spellings. Stock updates
Do not use ambiguous words, if there is Discussions
more than one meaning to a word use a Weather
second word with it which describes it. Mailing
Example : “web” will yield more than one Maps
meaning and will make the result wast. In Business, etc.
order to limit it, say spider’s web or world E-MAIL
wide web. Internet has blessed the world of
Use phrases instead of words to make it communication with its fast speed and capability.
fast. Now it is not a dream to get connected to a person
Use specific words to describe your search. or group sitting miles away from you. Email allows
Search engines like Google and Yahoo provide you to send mail electronically within seconds.
some products such as: This can contain text, figures, images or videos

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS I / 149

etc. You must have an email address to send or suggests SMTP is very simple. But it is not able to
receive mails. This is better than traditional postal find the authenticity of the sender.
mail in the following ways: POP (Post Office Protocol) servers started
Advantages of Email in 2004. It was a refined protocol.
It is quite faster than postal mail. Many standards have been defined by Internet
Accuracy of mailing address ensures the Engineering Task Force for Emails though there
receipt of mail. It cannot be lost or are not many protocols used in internet follow
destroyed. these fully.
Can carry a lot of data. How to Create Email Account?
You can save a copy of sent mail. Email account can be provided by the
If you want to send mail to far off places it organization where you work or you can create it
costs higher, email is cheaper.
with email provides.
Email can be forwarded to many people.
We can send video and audio using email. 1. If you are provided Email account by your
Limitations of Email organization, just install an Email client
There must be a computer or mobile with software such as Microsoft Outlook
internet connection. Express, Mozilla Thunderbird, etc.
Sender and receiver should have an Email 2. If you create your account on any of the

Neeraj
identity. web based mail providers such as Yahoo
Sender and receiver must be computer mail, Gmail, Rediffmail, etc.
literates. Steps to create Email account in Gmail.
History of E-mail: Internet based E-mail
1. Launch the browser.
system is started from the year 1971. A computer
2. Go to Gmail Homepage by typing

Publications
engineer Ray Tomlinson started it while working
with ARPANET. www.gmail.com.
Initially it followed the protocol of SMTP 3. Select create an account on the right hand
(Simple Message Transfer Protocol). As the name side as shown in the following image.

www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

150 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

4. Now a new screen will be loaded having a form to be filled. Fill the details asked there. The
screen will look like the following image:

Neeraj
Publications
5. Read the terms of service given at the end and if accepted press the button to create an account.

www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS I / 151

This way your account will be created. You these, and if not restored, it deletes these after a
can log in to your account any time. It generally few days.
has the following folders: An email account allows these features:
1. Inbox: This folder contains all the received Compose Mail: It allows you to write and
E-mails. You can see the mails and read send mails.
them.Unread mails are shown in bold letters. Contacts: This feature stores the email
2. Sent Mail: It shows sent emails by you. addresses which you have used send mails to for
3. Drafts: This contains the stored but not sent future. It also allows to store and retrieve additional
by you. information about these contacts.
4. Spam: Unsolicited or junks are called spam. Subject: This depicts the mail heading of the
These are generally unwanted advertisements sent mail. Example : If you are sending a question set
to you. These can produce harm by causing virus. of English to your friend, you can write here
5. Trash: Deleted mails go to trash folder. If “Question set of English”. It helps the receiver to
keeps files for a few days to allow you to restore know about the mail without opening it.

Text Area: This area is to write the text.

Neeraj
Publications
www.neerajbooks.com

A compose mail window looks like the above image.


Contacts: Gmail provides some other facilities such as:

www.neerajbooks.com
www.neerajbooks.com

152 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Chat, Voice Chat and Video Chat allow to add voice and
Photos, face to face chatting with the other person
Calendar, respectively. For a voice chat, we need a speaker
Orkut,
and a microphone, and in addition a web camera
Web, etc.
is needed in a video chat.
CHAT: Chatting on computer means to
Examples of Chat services: Gtalk (Google )
converse with someone using the same medium
and RediffBol. The software can be loaded for
through typing the text or symbols using keyboard.
It is a casual conversation with one or more people. google to chat on gtalk.

Neeraj
Publications
www.neerajbooks.com

There are many communities, forums and The user is provided with a feature of
discussion groups on chat rooms. You can become creating his or her electronic avatars.
a member of any of it and get in touch with the Get added to a community or a discussion
group.
people of your community or can share your views
Chat with an individual or a group.
in a discussion group. Some Chat Rooms:
Chat Software allow the following to the Java Chat rooms
user: Flash Chat rooms
The user can do text, voice or video chat. Internet Relay Chat (IRC)
The user can use graphics as well. MIRC

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS I / 153

Some Basic Mannerisms while Chatting: Q. 2. How does web server communicate
The term chatiquette is used to describes basic with web browser?
rules of chatting. When we are chatting the other Ans. On the user’s demand, the browser takes
person is not able to see our expressions except a the help of DNS to resolve the IP address of the
video chat. He or she may take the wrong meaning website. It tries to get connected to the web server
of our words. For example, if I write in and loads the web page following the HTTP
UPPERCASE, then it is taken as a loud expression protocol.
in chatting. We should show good manners while
Q. 3. What is cookie? Is it really bad?
chatting.
Discuss.
SECURITY THREATS ON INTERNET
Basic security threats on internet are: Ans. The web server sends a small message
Confidentiality: You should not allow any containing information to web client. It is needed
unauthorized person to see your every time you request for the same site. This
information. information gets saved in form of cookies. These
Integrity: Do not allow any unauthorized are not computer programs which may harm the
person to modify your information. computer. These do not spread virus. But these

Neeraj
Availability: Your information should not can be used by spy wares to get your personal
be accessible to general public. information. These can be deleted hence you
Beware of virus and spy wares. should delete them regularly.
How to Get Secure ? Q. 4. What is a Search Engine? How does it

Publications
Use your username and password and keep work?
it a secret. Use HTTPS. Ans. Search engines are special sites which
Protect your computer by using anti virus
allow the user to find information on the web in
and anti malicious software.
www.neerajbooks.com
You can use firewalls to block websites
having unwanted contents.
an organized way. The basic function of search
engines are:
Web Crawling: The process of building list
Delete unnecessary cookies as these may
harm your confidentiality. by spiders is called web crawling. Spiders are used
Download from authorized sites only. for this purpose.
Indexing: The search engines use the list made
by spiders in an organized manner. This process is
Q. 1. What is a browser? Discuss various
called indexing.
types of browsers.
Searching: The user selects an option from
Ans. A browser software is used to access and
the index and it is searched for and displayed.
display web pages from a web server. It is used as
a window to view the downloaded files. Q. 5. What is searching? How efficiently
These are: you can search:
Text based browsers, (a) Tutorials of XML
Graphical user interface based browsers, (b) Universities in India and USA
Java enabled browsers. (c) Universities is not in USA or Britain

www.neerajbooks.com
www.neerajbooks.com

154 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

(d) Cleaning process of gold, it should not information resource is identified by a Uniform
give process related to cleaning of Resource Identifier (URI) and may be a web page,
jewellery. video, image or other piece of content. Hyperlinks
present in resources enable users easily to navigate
Ans. Searching on the web using a search
their browsers to related resources. A web browser
engine by typing the keywords to be searched is
can also be defined as an application software
called searching.
designed to enable users to access, retrieve and
(a) We will be able to search by placing in view documents and other resources on the
quotes, e.g. “Tutorials of XML”. Internet.
(b) Universities and (India or USA). Although, browsers are primarily intended to
(c) Universities and (not USA or Britain). access the World Wide Web, they can also be used
(d) Cleaning process of gold (Not cleaning to access information provided by web servers in
process of jewellery). private networks or files in file systems.
Q. 6. What facility of email makes it Q. 2. How search engine works?
appealing than postal mail? Ans. Web search engines work by storing
Ans. Following are the facilities of email: information about many web pages, which they
are faster than postal mails,

Neeraj
retrieve from the html itself. These pages are
can be saved, retrieved by a Web crawler – an automated Web
gives features like contacts, browser which follows every link on the site.
can be sent to many people simultaneously, Exclusions can be made by the use of robots.txt.
can be forwarded. The contents of each page are then analyzed to

Publications
Q. 7. How chat is different than email? determine how it should be indexed. Data about
Ans. Email can be sent to the receiver’s inbox web pages are stored in an index database for use
even if he or she is not online. But chatting is in later occasions. A query can be a single word.
The purpose of an index is to allow information to
www.neerajbooks.com
possible when both are online.
Q. 8. What are security threats? How can
be found as quickly as possible. Some search
engines, such as Google, store all or part of the
you prevent it?
source page as well as information about the web
Ans. Security threat happens when the
pages, whereas others, such as AltaVista, store
information is seen or modified or deleted by an
every word of every page they find. This cached
unauthorized person. This may be a person or a
page always holds the actual search text since it is
virus.
the one that was actually indexed, so it can be very
It can be prevented by using password, anti
useful when the content of the current page has
virus, anti malware and firewall. We should also
been updated and the search terms are no longer
not click on unwanted links.
in it. This problem might be considered to be a
mild form of link rot, and Google’s handling of it
Q. 1. What do you know about web increases usability by satisfying user expectations
browser? that the search terms will be on the returned
Ans. A web browser is a software application webpage. This satisfies the principle of least
for presenting, retrieving and traversing astonishment since the user normally expects the
information resources on the Internet. An search terms to be on the returned pages. Increased

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS I / 155

search relevance makes these cached pages very statistical analysis on pages containing the words
useful, even beyond the fact that they may contain or phrases you search for.
data that may no longer be available elsewhere. The usefulness of a search engine depends on
When a user enters a query into a search the relevance of the result set it gives back. While
engine, the engine examines its index and provides there may be millions of web pages that include a
a listing of best-matching web pages according to particular word or phrase, some pages may be more
its criteria, usually with a short summary relevant, or authoritative than others. Most search
containing the document’s title and sometimes engines employ methods to rank the results to
parts of the text. The index is built from the provide the “best” results first. How a search
information stored with the data and the method engine decides which pages are the best matches,
by which the information is indexed. Most search and what order the results should be shown in,
engines support the use of the Boolean operators varies widely from one engine to another. The
AND, OR and NOT to further specify the search methods also change over time as Internet usage
query. Boolean operators are for literal searches changes and new techniques evolve. There are two
that allow the user to refine and extend the terms main types of search engine that have evolved: one
of the search. The engine looks for the words or is a system of predefined and hierarchically
ordered keywords that humans have programmed

Neeraj
phrases exactly as entered. Some search engines
provide an advanced feature called proximity extensively. The other is a system that generates
search which allows users to define the distance an “inverted index” by analyzing texts it locates.
between keywords. There is also concept-based This second form relies much more heavily on the
searching where the research involves using computer itself to do the bulk of the work.

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

156

Web Applications II
12
Online content can be created or updated
The usage of internet in our lives has been in lesser time.
discussed in the previous chapter. Many interactive The content provided online may be
internet based applications use Web 2.0 referred to or used at user’s own pace.
technologies, including Java and its frameworks, Students can interact at any time.
XHTML, Cascading Style Sheets (CSS), Fast updation facility makes it standard-
Asynchronous JavaScript on XML (Ajax), Ruby ized.

Neeraj
on Rails, Adobe Flex, ASP.net etc.
In this chapter we will discuss about these
application. The definition and purpose of
e-learning and its process, use of Wiki, social
It provides new learning opportunities.
Students are given choice of programme
or course.
Leaning is no more dependent on moving

Publications
networking, and creating Blog will be discussed to the campus, it can be done from home
as well. or even workplace.
Economical, as the same resources can be
E-LEARNING used by a number of users.
www.neerajbooks.com
E-learning is acronym of electronic learning Requirements of a Good E-learning System:
A successful E-learning system depends
means learning by using electronic means, or
learning is being facilitated electronically. This on good student interaction, self-
term is used in academic perspective. This could motivation of individuals.
include web based lectures, web based symposium, A student has to study in an effective
content, or tutorials facilitated through net. It could manner. This is essential as there is no
also be in form of providing multimedia content, teacher to motivate or drive the student.
online tests or providing feedback etc. This concept E-Learning Processes: While-learning on
finds its base in the fact that learning is supported line every user is provided a username which is
electronically. It may include academic or used to log in the system of E-learning. The
administrative activities, which are facilitated username is followed by a password. The process
electronically. of E-learning starts with user providing a username
Advantages of E-learning are : followed by unique password and the system
It is encouraging to use facilities on line. identifying it. Every user is provided a unique
It provides platform to share experiences. username. All his details are stored under this
Barriers of time and space are eliminated. username.

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS II / 157

After successful login the contents are 1. Analysis Phase: The development of the
presented before the user. These may be in form design is based on the objectives of the content.
of lectures or tutorials. A quiz may follow it to
Analysis phase needs identification of these
check the progress.
The systems like-learning Management objectives, target audience and resources to
System (LMS) or Content Management System develop the design. This forms a base for design
(CMS) support E-learning system and help to phase.
record information like topic selection, tutorial 2. Design Phase: Design phase involves the
attended, quiz taken by the user etc. These are development of design, the flow of logic, structure
provided as progress track or feedback.
of the content etc. This forms base for
The E-learning technology is here to help both
the teacher and the learner. A learner may find it development phase.
easy to see the contents of his courses, get 3. Implementation or Development Phase:
assignments, see scores in various quizzes and The design of the previous stage is implemented
assignments etc. While a teacher may want to see in this. Experts’ help can be used at this phase.
student’s progress, upload information for the
students or correct the specific content, or even 4. Verification Phase: The content so
developed is checked for its usability and

Neeraj
use it to provide some message to the users via
messaging service. reliability.
A good e-learning facility provides users to: An example of e-content and support–
Login to the system of e-learning.
IGNOU. There are two e-platform forms of
Access the content and references.
IGNOU. These are:

Publications
Take tests.
See assignments, submit it and see grades. The first platform is on the website http://
Get the feedback. www.ignouonline.ac.in. This helps to know about
Be in touch with the faculty or students. various programmes, online admission, exam form
www.neerajbooks.com
Take terminal assessment on line.
Get grade card.
submission, etc.
Certification. The second platform (under development) is
E-Learning Content Development Process: based on IGNOU WIKI which is supported by
Content development for e-learning is a responsi- the MOODLE like-learning and content
ble job which can be well performed if the content management system. The blocks are:
is developed under the light of the objectives of
Input Block ‘J’
the course. A process of content development has
also to be followed by the developer, which is as Instruction Delivery
follows: IGNOU Open Course Guide (IOCG)
Online/Self Tests and Feedback to the
Learners
Assessment
Examinations and Evaluation.
Modular Object-Oriented Dynamic
Learning Environment (MOODLE)

www.neerajbooks.com
www.neerajbooks.com

158 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Neeraj
Publications
MOODLE is e-learning software platform. It
is free and offers many features. Its website is http:
It becomes easy to analyse the learners’
work.

www.neerajbooks.com
//www.moodle.org. Or you can download it.
The user needs to create an account on
Needs continuous updation and check by
experts on content design and functioning.
MOODLE to learn. It is like creating an email ELECTRONIC EDUCATIONAL RESOURCES
account. It also allows to create content and has Electronic educational resources mean
number of capabilities to help users. It also allows resources of learning available on the internet.
the users to interact themselves thus, creating a There are many websites, which offer educational
user community. It provides standardized learning resources to the users. These cater to various areas,
contents. MOODLE tutorial are very easy to be be it education, science and technology or beauty.
followed. The resources can be in form of the electronic
Advantages and Disadvantages of E- journals, encyclopedias, dictionaries, digital
learning: libraries, educational resource databases, or
Subjects which demand updation every e-books. These are available for free or sometimes
now and then can be catered to. paid. Examples are:
Learning is provided at users’ own pace. (a) E-Journals and Databases
Time and space limits are not there. EBSCO database
Helps to make the learner computer savvy. IEL Online
Provides interactivity. Springer Link

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS II / 159

JSTOR WIKI
Maths Sci_net Wiki is acronym of “What I Know Is”. It is a
Project Muse tool to create knowledge database. It is a page on
ProQuest which content can be written or edited. The content
ACM Digital Library can be hyper linked to enrich the content. These
(b) E-library are used to create websites also. The documents
elibrary are written using a markup language. Example :
WTO Wikipedia which is encyclopedia providing
(c) Indexing and Abstracting Databases: knowledge base on almost every topic. Its website
LISA is www.wikipedia.com. Wiki Wiki web the first
J-Gate wiki software was developed by Ward
(d) E-Books Cunningham in 1995. It is a database which
Credo References
provides the facility to create, edit, browse
Idea-Reference Resources
information.
NetLibrary

Neeraj
Publications
www.neerajbooks.com

Another example is Vedyadhara of IGNOU HTML. HTML is Hypertext Markup Language.


http://vedyadhara.ignou.ac.in/wiki/. The IGNOU website is easy to use. It will help the
This website of IGNOU is there to help the user in the following activities:
user to create and edit web pages without knowing Curriculum Design documents

www.neerajbooks.com
www.neerajbooks.com

160 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Compilation of documents issues affecting from political, ethical or social


Developing learning material scenario must be taken care of and discussed.
Keeping daily records Key Questions: Questions based on
Keeping personal information investment needed for collaborative projects.
The software, Vedyadhara will make the user Questions based on cumulative wisdom, chance
know about the objectives and concept of the of getting expertise from collaborative effort.
course, course calender, assignments, lectures and Areas where big investments are needed may
content. be based on collaborations e.g. physical sciences,
Collaboration: Collaboration is a process of big industries, health services, environmental
studies, etc. The discovery of new species of plants
working together to achieve a goal. This concept
and animals shows the winning edge of the
of functioning gained its importance with the ever
collaborative efforts.
changing technology, scientific explorations,
Google Docs: Many collaborative tools are
advent of ICT, and other alarming issues like available on the internet, for students a
terrorism. These issues need to be dealt with good tool is Google Docs. It helps a user to
collaboratively. Together we can and we will. create projects online in collaboration. A
Internet provides wikis, chat, conferences as document may be created, edited, discussed
helpers for collaborative efforts by allowing upon by members of a group spread

Neeraj
sharing of ideas. It helps to eliminate the barriers
of time and space. At the initial stage of the project
globally.

Publications
www.neerajbooks.com

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS II / 161

Microsoft Office: Various software such MediaWiki: Media Wiki is the software
as Microsoft Office 2010 and Adobe that allows collaborative efforts to create and edit
Acrobat also helps to collaborate. documents. Each change is reflected in latest
Google Wave: It is a software used to share version.
web space for discussion or collaboration.

Neeraj
Publications
Zoho: This software is a division of ZOHO
Corporation which is a US-based Software
management tasks like tracking, invoice making,
etc. in addition to the routine sharing and editing
www.neerajbooks.com
Company. This enables the users to do in collaboration.

www.neerajbooks.com
www.neerajbooks.com

162 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Volunteer Computing: Volunteer computing somewhat similar concept to collaboration, here


is an arrangement in which volunteers provide you allow your hardware resources to be used for
computing resources to projects. These projects the purpose of some online project. Example of
use if for distributed computing or storage. such project: Search of Extra-Terrestrial
Volunteers are people or organizations having Intelligence called SETI@Home by Space Science
computers with network connection. A research Laboratory at the University of California, Berkley.
project that has limited funding but large public http://setiathome.berkeley.edu/.
appeal can get huge computing power. It is SOCIAL NETWORKING

Neeraj
Publications
www.neerajbooks.com
Social networking is the practice of making Visiting other’s profiles.
contacts with the members of family, friends or Searching friends.
business society through online services. These Sending friend requests.
sites provide the freedom to chat, share messages, Sharing your thoughts with friends or
pictures, videos, thoughts etc. on social sites. Very public.
old friends or even new people can be added to Sharing pictures or videos.
friend lists and contacted with. The members of a Barring anyone to see your personal stuff.
group are interdependent in form of relationship, Making friends.
friendship, etc. This networking is being offered Deleting a friend from your list.
by many social networking websites such as Online chatting.
Facebook, Orkut, Twitter, etc. Just be a member Get response on a thought instantaneously
and explore the groups or create new. may be from larger public.
These sites allow a user to: Beware: These sites are full of members,
Create his/her profile to share information. which may include anti social elements. Therefore,

www.neerajbooks.com
www.neerajbooks.com

WEB APPLICATIONS II / 163

the user must be aware and should not get into topic. These may include food, health, education
trouble by sharing any confidential stuff over the etc. We can create blog and share our thoughts
information, pictures or hyper linked data or
internet. The user must follow the security policies
pictures. We can get comments from public on our
such as: stuff, which may be helpful to get updated or to
Do not tell anybody your username and get feedback. For the students, it is a very good
password. platform to get new ideas. Blogs can be of a single
Use anti virus and spyware. author or can be open to get ideas of various
Sign out properly before leaving the site. people. Example: http://edu.blogs.com/.
Behave sensibly on social networks.
Many of the celebrities have their blogs and
Do not allow strangers to be friends.
BLOG use these to publish their thoughts.
Web log also known as Blog is a website which The following is one of the many websites
is used to display thoughts or information on any through which you can create your own blog.

Neeraj
Publications
www.neerajbooks.com

Examples of blogs: How to Start Your Own Blog:


Corporate and organizational blogs made There are variety of blogging service
by organizations. providers such as Blogger, Webs etc. These
Category based blogs based on various provide templates with variety of
themes such as education. formatting options to be used to create and
Blogs having different media and device publish blog.
types You can make a blog public or private.
1. Containing only video is a vlog, Private blog will need a password.
2. Containing only links may be called
Complete and publish the URL of blog on
linklog,
3. Clog for mobile devices is called moblog, website.
etc. Allow others to visit and leave comments.
4. Blogs showing personal views such as Keep it alive, give something new to views
skshah95.blogspot.com. every now and then.

www.neerajbooks.com
www.neerajbooks.com

164 / NEERAJ : COMPUTER BASICS AND PC SOFTWARE

Some Issues while blogging: While blogging Q. 7. What are the different ways of sharing
you are showing your personal views to public, information on internet?
but make sure these may not be hurting. Be careful Ans. Ways of sharing information on internet
and avoid problems in future. This can bring even are:
legal liabilities. Mind your language and tone. It E-mail
should not hurt any person or organization. Do not Messenger services
publish any confidential information on these sites. Chatting
Publishing thoughts on social networks or
blogs.
Q. 1. What is E-learning? Compare Q. 8. Explain the advantages of blogging.
E-learning courses with traditional, on-campus Ans. Blogs are used to publish your ideas, when
courses? you do this you use refined and articulated language,
Ans. E-learning is learning that is imparted which helps to improve writing abilities. Comments
electronically. It has features like anytime anyplace- on the writing expression provide a boost or a way
learning and provides flexibility to learner. to upgrade it. Blogs help to get information on
Interactivity is another feature of E-learning which various topics from the users.
works as an advantage of using E-learning.
Like traditional on campus courses, the student
need not to go or even move from home. The material Q. What are the approaches to E-learning
is interactive and always available for a learner. The services?
Ans. E-learning services have evolved since

Neeraj
learner can learn with his own pace and interest.
Q. 2. How do E-learning classes work? computers were first used in education. There is a
Ans. An E-learning lecture may be live or pre- trend to move towards blended learning services,
recorded lecture on internet. The students get where computer-based activities are integrated
benefited by attending it from place of their choice with practical or classroom-based situations.
and can get into discussion about this online directly Bates and Poole (2003) and the OECD (2005)

Publications
or after some time via e-mail, chat room etc. These suggest that different types or forms of E-learning
are followed by feedback sessions. can be considered as a continuum, from no
Q. 3. How is E-learning useful for Univer- e-learning, i.e. no use of computers and/or the
sities? Internet for teaching and learning, through
Ans. E-learning can help the universities to classroom aids, such as making classroom lecture
www.neerajbooks.com
deliever the lessons, content material, assignments,
conducting group discussions, feedback sessions,
Powerpoint slides available to students through a
course website or learning management system,
online tests, etc. It can provide the message to the to laptop programs, where students are required
students in seconds which can save time. to bring laptops to class and use them as part of a
Q. 4. What is WIKI? How is it useful?
face-to-face class, to hybrid learning, where
Ans. Media wiki is software used to create
classroom time is reduced but not eliminated, with
websites called wikis. These are used to provide
information to the users. It gets benefited by
more time devoted to online-learning, through to
collaborative efforts. fully online-learning, which is a form of distance
Q. 5. What is MOODLE? education.
Ans. MOODLE is a open source and free It can be seen then that E-learning can describe
software. It is used for content development. It also a wide range of applications, and it is often by no
works as management system. means clear even in peer reviewed research
Q. 6. Why is collaboration used on internet? publications which form of E-learning is being
Ans. The collaboration provides collaborative discussed. However, Bates and Poole argue that
efforts to perform a particular task. It helps in sharing when instructors say they are using E-learning, this
of resources in form of intellect, time, hardware, most often refers to the use of technology as
views, activity, knowledge, etc. These are used to classroom aids, although over time, there has been
do projects which need huge funds or time or a gradual increase in fully online-learning.
knowledge base.

www.neerajbooks.com

You might also like