Professional Documents
Culture Documents
UNIVERSITY
FUNDAMENTALS OF INFORMATION
SYSTEM
Abel Birhane
2021
Collection of raw facts and figures about people, objects, situation and incidents obtained from
experiments or surveys, used as a basis for making calculations or drawing conclusions
Information
is a collection of meaningful facts and figures that can be used as a base for guidance and decision-
making. Any fact or figure is not necessarily information. To call it information, it has to be useful and
meaningful for you (individual, group, organization, or society).
Wisdom
1. the knowledge and experience needed to make sensible decisions and judgments, or the good sense
shown by the decisions and judgments made
2. accumulated knowledge of life or in a particular sphere of activity that has been gained through
experience
3. an opinion that almost everyone seems to share or express
4. ancient teachings or sayings
WHAT IS COMPUTER ?
A computer is defined as an electronic device that operates under the control of internally stored
instructions that can accept input, process data (both mathematical processes and logical processes),
produce output, and store the results. Basically, a computer transforms data into information.
1) Input
Data is input into the computer. input is the numbers, words, images, etc. that are given to the computer
during the input process. Data is input using Input Devices: keyboard, mouse, and joystick, touch
screens, etc.
2) Process
This is the manipulation of the data to create useful information. Data is processed very quickly within
the computer, within billionths of a second. Once the raw facts are processed into a meaningful form it is
called information. Computer processing is accomplished through the CPU (Central Processing Unit).
The CPU interprets the instructions for the computer. It performs all logical and arithmetical operations as
well as causes all input and output to occur. The CPU is contained on a Microprocessor chip.
Data Processing
Definition1: Data Processing can be defined as one or more operations performed on data to achieve a
desired objective
Is the activity of converting raw facts [data] into information Therefore, Information is data that have
been processed using the data processing functions.
Functions of Data Processing
Data Collecting
Data Recording
Sorting
Classifying
Calculating
Storing and Retrieving
Summarizing
Communicating
Processing Methods
Information system uses two Processing Techniques
A. Batch processing:
Where data to be processed is accumulated over a period of time. The accumulated batch of
transaction is processed periodically.
Otherwise, Gathers transactions and saves them for processing all at once.
Very efficient but always delay in Processing.
B. Real-Time Processing [ Online Processing ]
Each transaction is processed as soon as it is received. There is no waiting to accumulate. Such as, a
computerized Reservation system where an immediate responsible is useful.
Otherwise, by contrast, Process transaction as they occur, Ex: Air Line reservation system
3) Output
Output devices convert digital signals from the computer into a recognizable output. This is accomplished
via the monitor or the printer.
Computer operations are performed according to programmed logical and arithmetical rules. The arithmetical
element might be as simple as x + y = z. The logic will be something along the lines of if x + y does not equal z
then add 3 to x and try again.
CHARACTERISTICS OF COMPUTERS
Computers can be described by the following characteristics (advantages).
1, Storage : Computes can handle large amount of data. Once recorded, information can never be forgotten and
can be retrieved with a fraction of a second.
Its storage capacity is measured as follows:
Bit = smallest information stored in a computer (0 or 1).
Nibble = 4 bit
Byte = character = 8 bits.
Kilobyte (KB) = 1024 bytes.
Megabyte (MB) = 1024 Kilobytes.
Gigabyte (GB) = 1024 Megabytes.
Terabyte (TB) = 1024 Gigabytes.
Petabyte (PB) = 1,024 TB
Exabyte (EB) = 1,024 PB
3, Accuracy: Computers are very accurate. They process vast amount of data in a very high speed without
committing errors. However, the computer is capable of doing what is instructed to do. If the input data is correct
and program instructions are reliable, then the output of a computer is accurate.
Errors can occur mainly due to humans incorrect input data, and program instructions with a problem. Computer
errors caused due to incorrect input data or unreliable program is often called garbage-in-garbage out (GIGO).
4, Diligence : Computers are not bored or become tired of performing many thousands of calculations
repeatedly. Human beings suffer from weakness like tiredness, lack of concentration, become sad, depressed,
bored and negligent; and it will reflect on the work they do. Moreover, humans cannot perform similar tasks over
and over, again and again with the same precision and accuracy.
5, Versatility : One of the most wonderful things about the computer is its versatility. A computer is capable of
performing almost any task provided that the task can be reduced to a series of logical steps.
Human Computer
Can Think Cannot think by itself
Gets Mental Tiredness Never gets Tiredness
May do mistake Cant do mistake by itself
Has limited speed Very High Speed
Has limited Memory More Amount of memory
Accuracy may be missing Never missing
Ability of a Human to do anything a computer can do but a computer cannot do everything a human can do is
a true statement based on the following table.
Computer users
Computer users can be divided into five categories: home user, small office/home office users, mobile users, large
business users, and power users.
A home user spends time on the computer for personal and business communications, budgeting and
personal financial management, entertainment, and Web access.
Generations of Computer
Generation in computer language is a step in technology. It provides a framework for the growth of the computer
industry. The computer is often described as having gone through five distinct generations. Each of these
generations is based on the type of technology used during the period. The major characteristics that distinguish
the various generations are:
Dominant type of electronic circuit element used,
Major secondary storage media used,
Computer language used,
Type or characteristic of operating system used,
Memory access time (time to store or retrieve a word of data from memory).
Computer generations are usually categorized by dramatic improvement in the hardware, typically tenfold or
better increases in speed and reliability.
Classification of computers
Types of computers
There are different types of Computers. Their difference is depends on different categories of characteristics.
Classification by method of operation /the type of data they receive and process/
They are classified into three:
1. Analog
Analog computers operate by measuring. They deal with continuous variables; they dont compute directly with
numbers, rather, they operate by measuring physical magnitude such as pressure, temperature, voltage, current
etc. Examples
Thermometer
Voltmeter
Speedometer
Gasoline pomp Contains an analog Computer that converts the flow of pumped fuel into two
measurements, the price of the delivered gas and the quantity of pumped fuel.
They are special purpose computers.
Analog computers have limited accuracy
2. Digital Computers
Digital computers deal with discrete variables; they operate by counting rather than measuring. They operate
directly up on numbers (or digits) that represent numbers, letters, or other special symbols.
Examples:
Desk and pocket computers
The general purpose computers
Prepared by :Abel.birhane 2021 9|Page
Digital computers have higher accuracy and speed than the analog ones.
3. Hybrid computers
The best features of analog and digital computers can be combined into a single device to form a hybrid
computer. A hybrid computer process the information by collecting input data with analog method, convert it
into digital quantities, processes the digital values and convert the output from digital to analog form.
Example:
In hospital, insensitive-care unit analog devices may measure a patients heart function, temperature and
other vital signs. These measurements may then be converted into numbers and supplied to a digital
component in the system. This component is used to monitor the patients vital signs and to send an
immediate signal to the nurses station if any abnormal readings are detected.
They are designed to solve a single type of problem, that is their components and function are uniquely adapted
to a specific situation involving specific application.
Example:
The public telephone box
Traffic control system
Ticket machines (used in grocery, super market etc.)
Pocket calculators etc.
Counters
Most analog computers are special purpose computers.
2. General-purpose computers
They are designed to solve variety of problems through the use of store program concept. A program or set of
instructions designed to solve a problem is read and stored into the memory and then it is executed by the
computer one by one. The same computer can be applied to solve another set of problem using different
program. General-purpose computers are more flexible and versatile.
Micro computers: - are the most widely used type of computers. They are single users, can fit on desktops, are
of varying capacity and easy to handle. Microcomputers are sometimes referred as personal computers. They
have video display unit for output purpose. Data is entered through the keyboard and by the help of floppy disk.
Microcomputers come in a variety of sizes and shapes for a variety of purposes. Basically they can be grouped
into three: Laptop, Palmtop and Desktop computers.
Laptop computers are smaller versions of microcomputers about the size of a briefcase designed for
portability. People can easily carry these personal computers with them in their car, on airplane, or when
walking from one location to another.
o Unlike desktop PCs that have mostly detachable components, laptops include all their
components (except their printer) in a single unit
Palmtop computer is the smallest microcomputer that is about the same size as a pocket calculator. It is
the most portable computer and is growing in popularity among the latest entries in the microcomputer
market.
o Palmtops are typically used for a limited number of functions, such as maintaining personal
calendar, name and address files, or electronic worksheets.
Prepared by :Abel.birhane 2021 10 | P a g e
Desktop computer is the most widely used type of personal computer (microcomputers).
o Unlike laptop and personal computers, desktop computers have detachable parts. However, since
its size is larger than the other types of personal computers, it is not easily portable.
Mini computers: Minicomputers are midrange computers that are larger and more powerful than most
microcomputers but are smaller and less powerful than mainframe computer systems.
The minicomputers' size prevents it from being easily portable although it can be moved more easily
than a mainframe computer.
Minicomputers cost less to buy and maintain than mainframe computers. Most minicomputers can
function in ordinary operating environments, as they do not need special air conditioning or electrical
wiring.
Minicomputers are being used for a large number of business and scientific applications.
They are popularly used in scientific laboratories, research centers, universities and colleges,
engineering firms, industrial process monitoring and control, etc.
Mainframe computers: Mainframe computers are large, powerful computers that are physically larger than
micros and minis and usually have processors with faster instruction processing speeds.
For example, they may be able to process from 10 to 200 million instructions per second (MIPS).
A mainframe computer is generally found in a special computer room where environmental factors such
as temperature, humidity, dust and air conditions are closely monitored.
Because of the computer's cost and the value of the information stored there, the rooms in which
mainframes are located have security systems allowing only authorized personnel to enter.
Mainframe computers are designed to handle the information processing needs of organizations with
many employees and customers or with complex computational problems.
To give some examples, mainframes can handle the processing of thousands of customer inquiries,
employee paychecks, student registrations, sales transactions, and inventory changes.
They are also used as the center of computer networking. These computers are used by organizations that
have enormous and complex data processing assignments.
Supercomputer: The term supercomputer has been coined to describe a category of extremely powerful
computer designed for high-speed processing. A supercomputer is generally characterized as being the fastest,
most powerful, and most expensive computer.
As many as sixty miles of wiring are closely packed inside supercomputers, and tremendous amounts of
heat are generated. Because of this, supercomputers demand special cooling requirements and the room
itself should be air-conditioned.
Some supercomputers require extra floor support to hold the extreme weight of the complete system that
includes storage units.
In addition, highly trained data processing professionals are required to operate supercomputers. These
computers can take inputs from over 10,000 individual computers and users at the same time.
Super computers are largely used by research organizations, military defense systems, national weather
forecasting agencies, large corporations, aircraft manufacturers, etc.
CHAPTER 2
2. COMPUTER SYSTEM
Computer systems can also be categorized as having either an open architecture or a closed architecture.
An open architecture allows third-party vendors to develop and sell hardware and software that is compatible
with the system. These vendors produce products that enhance the computer system. The IBM-compatible
microcomputers are based on the open architecture design. In a closed architecture system, only one vendor
makes all or nearly all of the support systems and does not allow other vendors into the market.
Keyboard. The keyboard is one of the most common input devices. is an input device consisting of a set of
typewriter-like keys that enable one to enter data into a computer. The keys on the keyboard are often classified
as follows
Alphanumeric keys - Letters and numbers
Punctuation keys - comma, period, semicolon, etc.
Special keys- function keys, control keys, arrow keys, caps lock, etc.
The arrangement of the keyboard's key may differ. The most common in English- speaking countries is the
QWERTY keyboard. It is called QWERTY keyboard because the first five keys on the top row of letters spell Q,
W, E, R, T, and Y. The arrangement of keys in this case is based on typewriter (alphabets and punctuation) and
calculator (numeric pad). This is to make data entry easy.
The other type of keyboard layout is the Dvorak Keyboard. In this layout, the most commonly used letters are
placed in the most accessible places. The home keys are the five English vowel letters A, O, E, U, I (for the left
hand) & the five most often used consonants (D, H, T, N, S) are the home keys for the right hand. The next most
frequently used letters are on the keys one row up, the next easier position to reach.
Mouse: is a hand-operated device that controls the movement of the cursor or pointer on a display
screen. It is a small object that can be rolled along a rough flat surface.
Its name is derived from its shape, which looks a bit a mouse; its connecting wire that one can imagine to be the
mouses tail. Mouse was invented by Douglas Engelbart of Stanford Research center in 1963.
Mouse can have as many as three buttons whose function depends on what program is running
Left-button: for left click. E.g selecting text
Right-button: for right click. E.g see property of file
Middle button: for scrolling purpose. This button is sometimes missing.
Most mouse are connected to the system unit by a cable or cord. There are also mouse that are not connected to
system unit by a cable/cord. They are called cordless mouse (wireless mouse). They communicate with system
unit using infrared light, similar technology used in remote controls, or radio waves. Mouse has roller ball at the
bottom. The roller ball converts mouse movements into electronic signals.
SCANNERS: Scanners are peripheral devices used to digitize (convert to electronic format) artwork,
photographs, text, or other items from hard copy. In a sense, a scanner works as a pair ofeyes for your PC. Your
eyes see an image and translate the image into electrical impulses that travel to and are interpreted by your brain.
Similarly, a scanner captures images and converts them to digital data that travel to and are interpreted by the
computer.
A scanner works by dividing an image into microscopic rows and columns and measuring, like the film in a
camera, how much light (or lack thereof) reflects from each individual intersection of the rows and columns.
Each reflection is recorded as a dot, or picture element (pixel). After the scanner collects information from each
dot, it compiles the result into a digital file on the computer.
There are a wide variety of scanners that work in a number of different ways, but the technology behind them is
essentially the same. The following sections discuss the more
I) OCR: are scanners that read typewritten, computer printed, and in some cases hand printed characters from
ordinary documents. They scan the shape of character and compare it with predefined font shapes found in memory.
Based on the comparison, they can convert the characters into computer code.
Use:
Enter documents found on paper into computer without the need to type it using keyboard. This Makes the job easy.
II) OMR: senses the presence or absence of a mark, such as pencil marks. It doesnt utilize letters of the
alphabet. Instead, with the use of electronic scanners, marks and symbols are converted into appropriate electronic
signals.
It is used to process questionnaires or exams using computer. The read mark is interpreted and matched against
previously entered answer key. Example, the ESLCE is corrected using this device.
III) Bar Code Reader: is a peripheral that reads bar codes printed on products. Bar code uses a pattern
or symbols to represent data. It consists of vertical lines and spaces of different width. There are different kinds
of bar codes; the most commonly used is called UPC (Universal Product Code). It is used to identify product
manufacturer, product number, etc.
Use: Used in super market, grocery, etc to identify products and their price.
Light Pen: Light pen is a light sensitive pen like device that is used in conjunction with computer
monitor. It is used by touching the screen with this device to create or modify graphics. A light cell in the tip of
the pen senses light from the screen to determine the pens location on the screen.
Touchpad. This input device is a small rectangular surface that operates by means of pressure and
motion, and allows the user to perform all of the functions of a mouse by touch. Moving the fingertip across the
touch pad moves the cursor across the screen. Tapping the touch pad acts as clicks and double-clicks. Touchpads
are most commonly found on laptop computers.
Pointing Stick. Like the touchpad, this pressure-sensitive input device fills the role of the mouse in some
Prepared by :Abel.birhane 2021 15 | P a g e
laptops. It is shaped like a pencil eraser and fits between keys in the keyboard. Moving the pointing stick moves
the cursor. This device is mostly found on laptop computers.
Trackball. The trackball is basically an upside-down mouse. Instead of rolling the ball on a surface as
with the mouse, the user rotates the trackball with the hand directly to position the cursor on the screen.
Touch Screen. This input device is often used in public places, such as shopping centers, hotels, and
airports, where users may not have much experience working with computers. The user simply touches the
screen for the desired menu item.
Light Pen. This light-sensitive device is used for entering data by writing on a computer screen.
Engineers, designers, and architects use light pens to draw and modify shapes on the screen.
Graphics Tablet. A graphics tablet is a flat rectangular board used to input drawings or other graphical
data. The user draws on the graphics tablet with an electronic pen or a mouse-like device (called a puck). The
drawing movements are converted into digital signals that are sent to the computer as input. Architects and
mapmakers commonly use this input device.
Video Input Devices and Digital Cameras. Video input devices and digital cameras allow optical and
graphical images to be entered into the computer for storage and processing. Digital cameras allow the user to
store still-pictures as digital files (for example, .jpg s and .gif s) that can be used by the computer like other
graphic images. They may be edited, e-mailed, printed, faxed, inserted into documents, and displayed on the
monitor. Video input devices enable the user to store and process full-motion images generated from camcorders
and VCRs.
Automatic Teller Machines (ATMs). ATMs have revolutionized banking by extending bankers hours
to 24 hours a day. ATM users can borrow cash, transfer funds, and make deposits at their convenience. Most
ATM devices employ some sort of card input that contains information about the user. The user inserts the card
and is prompted to enter a personal identification number (PIN) to authorize access. If the user fails to enter the
correct PIN after three attempts, the ATM will assume an unauthorized person is attempting an illegal access. It
will then implement a predetermined action. This may be to lock the user out of the system or have the ATM
destroy or confiscate the access card. In any case, the user will need to appear in person at the bank and
reestablish access authority.
Point-of-Sale (POS) Devices. POS terminals are found in many kinds of retail businesses; for example,
grocery stores. Most POS terminals use some type of optical scanning device, usually involving laser beams, for
reading the product code on an item. The product code, sometimes called a bar code, is the primary key for
retrieving the price and description data from the database.
Magnetic Ink Character Recognition (MICR) Devices. MICR devices read characters printed in
magnetized ink on documents. The banking industry, in particular, has made extensive use of MICR for reading
and processing checks and deposit slips.
Optical Scanning Devices. Optical scanning is the process of digitizing textual or graphic images. The
scanner is a light-sensing device that converts an image into an analog signal that in turn is converted into a
digital signal for computer storage and processing. The resulting file is called a bitmap (.bmp files). Optical
scanning is a popular technique for capturing photographs for computer usage but it may also be effectively used
with printed and handwritten text.
OUTPUT SYSTEM
Like the input system, the output system provides an interface through which computers and humans can
Prepared by :Abel.birhane 2021 16 | P a g e
interact with one another. However, now the human is on the receiving end of the process. Output devices are
used to display input data that has been processed by the computer into useful output information. Through its
output system, the computer presents the data it contains in a form that the user can understand. The
presentation is typically in one of four forms: graphics (e.g., charts and photographs), text (e.g., words and
numbers), video (e.g., photographic images in motion), or audio (e.g., music and speech). Probably the most
common output devices are monitors for producing temporary displays (soft copies) and printers for producing
paper copies of documents (hard copies).
MONITORS: A monitor, or screen, can display graphics, text, and video output. To display video in the
monitor, the computer needs a video card (or graphics card) for converting the digital signal (i.e., data in the
form of 0s and 1s) from the processor to an analog signal (i.e., data in the form of a continuous electrical wave)
that the monitor can interpret. Monitors are described in two ways. The first is by the number of colors that the
screen can display. This can range from 4 to 65,536. The second is by the quality, or resolution, of the screen,
which is measured in picture elements (pixels). Pixels are tiny dots of light that combine to form images on the
screen. Typical screens have 320 × 220 pixels, 640 × 480 pixels, or 1,024 × 768 pixels. The more pixels a screen
has, the greater its resolution. Both color and resolution are important for determining the performance and
quality of a computer monitor.
Resolution - the number of pixels displayed
Dot pitch - the distance between pixels
Refresh rate - the speed with which images are redrawn on the screen
Storage devices are different from memory. Memory, sometimes called primary storage, is fast, short-term,
volatile, and relatively expensive. Storage devices, on the other hand, are slower, long-term, non-volatile, and less
expensive.
Types of monitor: Monitors come in three main varieties:
Cathode-ray tubes (CRT): CRT is similar in size and technology to televisions. It uses electron guns that emit
electrons. These electrons are directed towards phosphorous coated screen. The phosphorous coat glows (emits
light) when hit by electron from electron guns, thus creating visible things that we see.
Disadvantage: -large size (bulky)
- consumes much power
Liquid crystal display (LCD): Crystal display is most commonly used in digital watches, clocks, calculators,
etc. In computer, they are commonly used for portable computers. E.g. laptop.
Liquid crystal uses liquid crystal for display purpose, not electron guns. The liquid crystal is deposited
between sheets of polarizing material.
Advantage over CRT: -small size which makes it easy to transport
-consumes less power which makes it suitable for laptop.
PRINTER
Printer is a device that enables us to produce a hard copy of data/information. They have varying speeds,
capabilities, and printing methods.
Based on the way they print, printers are divided into two:
Impact printers
Non-impact printer
Impact printers
Impact printer transfer printable material onto paper by striking paper, ribbon, and character together. Most of
such printers take continuous form of paper. Some of impact printers are:
Dot-matrix Printer
They print by striking wire pins against an inked ribbon. The print head of such printers contains pins. When this
pin is pressed against a ribbon and paper, it prints small dots. The combination of small dots printed closely
forms a character.
Daisy-wheel Printer
It has a plastic or metal wheel on which the shape of each character stands out in relief. A hammer presses the
wheel against a ribbon producing characters on paper.
Disadvantage:
They cant print graphics
Non-Impact Printers
They print without having a mechanism that strikes a paper. They print by spraying ink or by using heat and
pressure to fuse black powder onto paper. The various types of non-impact printer include:
Laser Printer
They work similarly to photocopying machine. They convert data from computer into a laser beam (kind of
light), why they are called laser printer. They use mirrors to direct light onto a drum which in turn produce
characters on paper. The drum is light sensitive material that becomes charged when it is hit by light. The
Thermal printers
Thermal printers use heat to transfer inks from ink sheets onto printing surface. They produce high-quality print.
Because of this, they are used to produce high quality color artwork and text.
They can use plain paper but produce best result on chemically treated papers.
PLOTTERS
Are used in some settings to produce architectural drawings, bar charts, and high-quality graphic images.
They often use paper that is larger than most printers can handle. There are three types of plotters. Pen plotters
use colored pens positioned so that a mechanical arm can access them. The mechanical arm draws the graphic
image with one colored pen, then selects another, repeating the process until the image is complete. Pen plotters
are widely used and produce very high quality images. Electrostatic plotters use electrostatic charges to create
images on specially treated paper. This paper must then be developed like a photograph to produce high-
resolution images. Direct-image plotters, also called thermal plotters, create images on heat sensitive paper. This
process is limited to two-color output.
MEMORY UNIT
As discussed above, instructions and data needed for immediate processing are usually placed in memory. A
computer has two types of memory: volatile and nonvolatile. They are used for the long- and short-term
retention of information, respectively. RAM and cache are examples of volatile memory the primary memory.
ROM and CMOS are examples of nonvolatile memory.
Random-access memory (RAM) temporarily holds data, the operating system (instructions that control
the computers operation), and application software (instructions that manipulate data). The operating system
resides in RAM only while the computer is turned on. The application software remains in RAM only while it is
being used. Unless there is enough RAM to hold the application software for more than one program at a time,
when new application software is retrieved from secondary storage, it is loaded into RAM, replacing the
application software that was previously residing there. Most current computers have enough RAM to run
several applications simultaneously, a process called multitasking. Data and instructions about to be processed
are in RAM, as are the output of the processes. Recall that the data and instructions in working memory (i.e.,
RAM) are electronically stored, as opposed to being magnetically or optically stored. Thus, when the computer
is shut down, all instructions and data in RAM are lost because the flow of electricity ceases. In RAM, any
address can be randomly accessed at any time; hence the name random-access memory.
Main Memory has several uses:
Input area where the data is stored when it is read into CPU, awaiting processing.
Operating system controls the operation of the computer.
Working storage where calculations are performed and data is stored temporarily.
Output area where the information is stored prior to output. Both the input and output areas are buffer.
Application program area where the user program is held.
Read-only memory (ROM) contains instructions that the computer uses to operate various aspects of the
Prepared by :Abel.birhane 2021 20 | P a g e
hardware. Unlike RAM, the information stored in the ROM chip is not lost when the computer is turned off.
However, this information is written in the factory and cannot be altered by the user. ROM, for example,
contains the instructions the computer follows to load the operating system when first turned on.
There are different types of ROM, including PROM , EPROM and EEPROM.
PROM /Programmable ROM/ data or program can be stored once in PROM but never changed.
EPROM /Erasable Programmable ROM/ data or program can be erased by removing the device and exposed it
to ultraviolet light.
EEPROM /Electrically Erasable Programmable ROM/ data or program can be completely erased using a special
device and new programs or new data can be stored in it.
Complementary metal-oxide semiconductor (CMOS), like ROM, is also nonvolatile memory. Unlike ROM,
the user can change CMOS. For example, CMOS contains date and time information that the user can update.
CACHE MEMORY: is very fast RAM. It is used to store frequently used instructions. Computers that have
cache memory process data faster than computers without it because data travels faster from cache to the CPU
than from RAM to the CPU. Some cache is built directly in the processor chip, while other cache is in a chip
external to the processor chip. This storage of key instructions enables a performance improvement in the
processor. Intel processors incorporate level 1 (L1) and level 2 (L2) caches.
There are two groups of extremely fast memory chips that allow
the computer to operate faster:
Inputs are sent to either memory or storage, waiting subsequent processing by the computer. With regards
to computers, there is a commonly accepted distinction between the terms memory (or primary memory) and
storage (or secondary storage). Memory refers to the instructions, information, and data waiting for immediate
processing. For this reason, memory is also referred to as working memory. Memory is saved electronically on
memory chips. Storage, information and instructions are saved on magnetic or optical media. It is faster to access
data and instructions from primary memory than from secondary storage media, but the information in memory
Prepared by :Abel.birhane 2021 21 | P a g e
is usually volatile; i.e., it disappears when the computer s power is turned off. (Actually, the situation is a bit
more complicated because there are also some types of memory that are nonvolatile. These will be discussed in
the "Central Processing System" section below.) The information saved in storage media is nonvolatile and
remains in the computer even when power is off. In general, data and instructions are kept in secondary storage
when not needed for processing. When required for processing by the CPU, they are retrieved from storage, sent
to memory, where kept until processed.
Optical Disks: CD-R Drive, CD-RW disks, DVD, Blue ray Discs
Optical Mass Storage Devices Store bit values as variations in light reflection. They have higher area density &
longer data life than magnetic storage. They are also Standardized and relatively inexpensive. Their Uses: read-
only storage with low performance requirements, applications with high capacity requirements & where
portability in a standardized format is needed.
Example of the Optical Drives
CD's (Compact Disk)
Their storage:
~ 700 MB storage
Their Types:
CD-ROM (read only)
CD-R: (record) to a CD
CD-RW: can write and erase CD to reuse it (re-writable)
DVD(Digital Video Disk)
CD: Compact Disk (CD) is portable disk having data storage capacity between 650-700 MB. It can hold large
amount of information such as music, full-motion videos, and text etc. It contains digital information that can be
read, but cannot be rewritten. Separate drives exist for reading and writing CDs. Since it is a very reliable storage
media, it is very often used as a medium for distributing large amount of information to large number of users. In
fact today most of the software is distributed through CDs.
DVD: Digital Versatile Disk (DVD) is similar to a CD but has larger storage capacity and enormous clarity.
Depending upon the disk type it can store several Gigabytes of data (as opposed to around 650MB of a CD).
DVDs are primarily used to store music or movies and can be played back on your television or the computer
too. They are not rewritable media. Its also termed DVD (Digital Video Disk)
DVD-ROM
Over 4 GB storage (varies with format)
DVD- ROM (read only)
Many recordable formats (e.g., DVD-R, DVD-RW; ..)
Are more highly compact than a CD.
Prepared by :Abel.birhane 2021 23 | P a g e
Special laser is needed to read them
Blu-ray Technology: The name is derived from the blue-violet laser used to read and write data. It was
developed by the Blu-ray Disc Association with more than 180 members. Some companies with the technology
are Dell, Sony and LG. The Data capacity is very large because Blu-ray uses a blue laser(405 nanometers)
instead of a red laser(650 nanometers) this allows the data tracks on the disc to be very compact. This allows for
more than twice as small pits as on a DVD. Because of the greatly compact data Bluray can hold almost 5 times
more data than a single layer DVD. Close to 25 GB!.Just like a DVD Blu-ray can also be recorded in Dual-Layer
format. This allows the disk to hold up to 50 GB!!
The Variations in the formats are as follows:
BD-ROM (read-only) - for pre-recorded content
BD-R (recordable) - for PC data storage
BD-RW (rewritable) - for PC data storage
BD-RE (rewritable) - for HDTV recording
Summary:
The chapter has introduced the concept of memory units and its categories as the main and the second memory
and their characteristic features. It discusses the features of RAM, ROM, PROM, and EPROM. Auxiliary
Storage Devices like -Magnetic Tape, Hard Disk, Floppy Disk are also discussed .The chapter concludes with an
introduction to the Optical Disks such as CD-R Drive,CD-RW disks,DVD,Blue ray Discs
Cache
Main Memory
Disk Storage
1. Fetch Instruction: fetching instruction is getting instruction from memory. Instructions are stored in
memory and wait execution. The Control Unit gets the instructions from memory and brings it for
execution. It keeps track of which instruction is to be executed next.
2. Decode Instruction: translating instruction into commands that the computer can process. Decoding
understands what the instruction is about and what it tells the computer to do.
3. Execute Instruction: the actual processing of the commands i.e. carrying out what the instruction order
the computer to do.
4. Store Result: writing the result of executed instruction into memory.
Over the history of computer processors, the speed (clock speed) and capabilities of the processor have
dramatically improved. For example, the first microprocessor was the Intel 4004 that was released November
15, 1971 and had 2,300 transistors and performed 60,000 operations per second. The Intel Pentium Processor
pictured above has 3,300,000 transistors and performs around 188,000,000 instructions per second.
Logical operation
Logic gates
Digital systems are said to be constructed by using logic gates. These gates are the AND, OR, NOT, NAND,
NOR, EXOR and EXNOR gates. The basic operations are described below with the aid of truth tables.
AND gate
The AND gate is an electronic circuit that gives a high output (1) only if all its inputs are high. A dot (.) is used
to show the AND operation i.e. A.B. Bear in mind that this dot is sometimes omitted i.e. AB
OR gate
The OR gate is an electronic circuit that gives a high output (1) if one or more of its inputs are high. A plus (+)
is used to show the OR operation.
NOT gate
The NOT gate is an electronic circuit that produces an inverted version of the input at its output. It is also known
as an inverter. If the input variable is A, the inverted output is known as NOT A. This is also shown as A', or A
with a bar over the top, as shown at the outputs. The diagrams below show two ways that the NAND logic gate
can be configured to produce a NOT gate. It can also be done using NOR logic gates in the same way.
Prepared by :Abel.birhane 2021 26 | P a g e
NAND gate
This is a NOT-AND gate which is equal to an AND gate followed by a NOT gate. The outputs of all
NAND gates are high if any of the inputs are low. The symbol is an AND gate with a small circle on the
output. The small circle represents inversion.
NOR gate
This is a NOT-OR gate which is equal to an OR gate followed by a NOT gate. The outputs of all NOR
gates are low if any of the inputs are high.
The symbol is an OR gate with a small circle on the output. The small circle represents inversion.
Storage Unit byte 210 kilobyte 220 megabyte (Mb) 230 gigabyte 240 terabyte
(Kb) (Gb) (Tb)
Transmission bits per sec kilo Kbps mega: Mbps giga: Gbps tera: Tbps
Speed
Time Unit 10-3 10-6 10-9 10-12
second millisec (ms) microsec (µs) nanosec (ns) picosec (ps)
3. REGISTERS
Registers are small amounts of high-speed memory contained within the CPU which store intermediate results of
ALU. They are used by the processor to store small amounts of data that are needed during processing, such as:
SOFTWARE
Software is a collection of programs and routines that support the operations of performing a task using a
computer. Software also includes documentations, rules and operational procedures. Software makes the
interface between the user and the electronic components of the computer.
A Program is a set of coded instructions, which tells the computer what to do. For as long as the Instructions are
being carried out they are usually held in the computers internal storage
Software is a set of instruction or programs that order the hardware what to do or to do something. It is an
essential component of the computer system. Without the software, the computer hardware cannot solve your
problems. Therefore, software is a key for productive use of computers. A computer can become a valuable tool
if and only if it possesses the correct software.
System software
The system software is general-purpose software that is used to facilitate the utilization of the hardware. It
consists of instructions or programs that are used to manage the hardware resources of a computer and perform
required information processing tasks. It provides the interface between hardware and the user. Important
categories of system software are: operating system and programming languages.
System software
Constitutes those programs which facilitate the work of the computer hardware.
It organizes and manages the machines resources, handles the input/output devices.
It controls the hardware by performing functions that users shouldnt have to or are unable to handle.
System programs make complex hardware more users friendly.
It acts as intermediate between the user and the hardware.
It enables the computer understand programming languages i.e. it serves as means of communication
between user and a computer.
The important categories of system software are:
1. Operating system
2. Language software
3. Utility programs
4. Network and communications software
System software directly controls the computers hardware, whereas application software is one level
removed from hardware. System software manages the computers resources, enables the various components of
Prepared by :Abel.birhane 2021 29 | P a g e
the computer to communicate, runs application software, and makes the hardware respond to the user s needs.
When the system software operates efficiently, the difficult operations of controlling the hardware are
transparent to the user. System software includes four main types:
The operating system
provides an interface between the computer hardware and the user or the application software. Because of
its central importance, the operating system will be discussed in more detail below. Operating system
coordinates the activity between the user and the computer.
The operating system contains two types of instructions.
System-resident commands are active in primary memory at all times to coordinate input/output requests
and execute programs. This core of the operating system, critical to the functioning of the computer, is
called the kernel and is the first set of instructions to be loaded (booted) from secondary storage in the
hard disk on to primary memory in RAM when the computer is first turned-on.
Disk-resident commands reside in secondary storage until a request is made to execute special-purpose
programs, at which type they are loaded into working memory.
The operating systems ability to divide the computer program into variable-length portions and to store only a
small portion at a time in primary memory (RAM) is called virtual storage.
In addition to managing memory and application programs, operating systems also perform functions
relating to the peripheral devices connected to the computer. For example, the operating system handles the
requests for print jobs sent to the printer. When more print requests are sent to the printer than can be handled at
once, the operating system assigns them an order and places them in a buffer, an area of memory, awaiting
printing. This process is called spooling.
To make microcomputer systems easy to use, the interface (link) between the user and the hardware has
become simpler and more intuitive. Particularly important for the development of user-friendly computers is
the graphical user interface (GUI).
The GUI allows the user to interact with the computer through icons (graphic symbols) on the screen.
These icons can represent a variety of things, including computer disks, folders, documents, and software
programs. The user instructs the computer to perform particular tasks by pointing to and manipulating the
appropriate icons with a mouse.
Operating systems not GUI-capable, e.g., UNIX, require the user to input commands by typing in words
or pressing specially defined keys. This set-up is called a command-line interface.
Operating system coordinates the activity between the user and the computer. An operating system has
four major functions; System Administration, Input/output Management, Memory Management, Process
management
Process management: In operating system terms, a process is a program or part of a program that can be
executed separately. The operating system does the task of managing these processes that are being
executed and waiting to be executed.
Input/output Management: The I/O manager coordinates the computers communication with outside
world, flow of data to the display screen and other output devices (printers/ plotters) and from the key
board or other input devices. Handles the flow of data to and from the disk drives (file management).
Handles the process of preparing a disk for use, the copying, renaming, erasing task of a file.
Memory Management: During processing, some area of memory is used to store the operating system
instructions, application program instructions, and data to be processed. It is the task of operating system
to allocate or assign each of these items to a memory area.
System Administration: Operating system as a system administrator manages the performance of the
system (e.g response time), system security (username and password), and storage device management
(deleting files, renaming files, formatting disks, creating directories, etc).
1. Based on the number of programs they can run a time, operating systems are divided into two:
Single tasking Operating System: on such system, only one program can be run on the computer at a
time. To run another program, you have to close the first program and load another program. For
example, if you are working on Microsoft Word and in addition if you want to open Microsoft Excel,
first you have to close Word first because you can t open two programs at the same time. Then you can
open Excel. Single tasking Operating System cant handle more than one program at a time. Examples of
such operating systems are MS-DOS, and PC-DOS which were used in 1980s.
Multi-tasking Operating System: on such systems you can run as many programs as you like. You can
work on Word and Excel at the same time. Such systems can handle more than one program at a time.
Examples Windows 2000, Windows XP, Macintosh, etc.
2. Based on the number of users they can serve at a time, we divide Operating System into two:
Single User: they can serve only one user at a time. They can t serve more than one user at a time. E.g.
Windows 95, Windows 98/2000/xp, etc
Multi User: lets more than one computer to access the computer at one time. E.g. Unix This is done via
network that connects terminals to the multi user computer.
LANGUAGE TRANSLATORS convert application programs and any other software programs into the
machine language (discussed below) that actually controls the computer's operations.
An assembler is a program that translates assembly language into machine code.
A compiler is a program that translates a high-level language into machine code. Every high-level language
requires its own compiler.
Prepared by :Abel.birhane 2021 31 | P a g e
An interpreter is a program that translates each instructions of the high-level language and executes the
instruction before translating the next instruction. The advantage of interpreter is that it can execute the
program immediately. Compilers require some time to completely convert the program and execute it.
Computer programmers use artificial languages, known as programming languages, to write the
instructions that tell computers what to do. Programming languages have evolved over time to become more like
the natural languages that human beings speak. This section traces the evolution from machine language to fifth-
generation language.
MACHINE LANGUAGE. Programs for the first computers were written in strings of binary digits
("bits," consisting of 0s and 1s). Thus, this first programming language is often referred to as the first-generation
language (or 1GL). It is also called the machine language because computerspast and presentrequire this
type of instruction in order to perform their operations as machines. Instructions (and data) are represented
ultimately as bits because these strings of 0s and 1s correspond to the actual binary on-off flow of electrical
current through the computer's circuitry.
ASSEMBLY LANGUAGE. Assembly language (also referred to as the second-generation language or
2GL) was the next step in the evolution of programming languages. In assembly language, commands are written
with mnemonic codes rather than numerical codes. These commands are translated from the source language (the
programmers code) into an object module (machine language).
UTILITY PROGRAMS
Utilities are programs that make computing easier. They perform specific tasks related to managing computer
resources or files. There are different utility programs:
i) Troubleshooting programs: enable us to recognize and correct computer problems before they become
serious.
ii) Anti-virus programs: they protect your computer against viruses or other malicious programs that
damage computer. E.g MacAfee, Sophos, Norton, etc.
iii) File compression programs: are used to reduce the size of files or data so that it takes less storage space
or network band. E.g WinZip, WinRAR, etc.
iv) Uninstall programs: this software enable us to safely and completely remove unneeded
programs/software from your computer.
v) Back up softwares: with the help of this software, we can make copies of files to be used in case of the
original data is lost/damaged. This copy is called back up.
Network and communications software operates the communications hardware in a computer so that it can
transmit and receive information from other computers. Network and communications software requires two
types of software: software for the PC operating system and software for the network operating system. In some
cases, the latter comes built-in the former.
APPLICTION SOFTWAR
Application Software: - Application software performs useful work for the user. This useful work could be:
Word processing-document creation
Spreadsheet-electronic calculation
Email/communicating-email sending and reading
Users use these software to perform different activities like calculation, video editing, word processing,
presentation, etc.
Some of the uses of application software:
i) Word Processing
This is the most widely used computer application. Word processing is the use of computer to produce
documents that consist primarily of text. Such documents can also contain pictures, drawing, photograph, etc.
Used for:
Writing letter
Writing memos
Producing reports
v) Accounting software
Accounting software enables companies to record and report their financial transactions. Tasks done by these
software include:
Invoicing
Accounts Receivable
Accounts Payable
Payroll
Inventory
General Ledger
Purchase orders, etc
Computer Virus
Definition: Computer Virus is a small piece of software which designed deliberately to infect computers. Their
infection can vary from annoying (e.g deleting files, destroying the hard disk etc). Computer viruses are called
viruses because they share some of the traits of biological viruses. A computer virus passes from computer to
computer like a biological virus pass from person to person.
There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a fragment of
DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself-it is not
alive. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell s existing
machinery to reproduce itself.
A computer virus shares some of these traits. A computer virus must pick-a-back on top of another program or
document in order to get executed. Once the program is running, the virus then able to inject other programs or
documents.
Computer viruses are pieces of codes attached to a program like a popular game or popular application software
or even an E-mail message. A person might download an infected program or document from the Internet and
Prepared by :Abel.birhane 2021 34 | P a g e
run it. At this time the virus loads itself into the computer s memory, and then it adds the virus s code to the
running programs. The user really has no way to know that the virus ever runs.
Unfortunately, the virus has now reproduced itself by infecting the running programs. The next time
either of those programs gets executed, they infect other programs, and the cycle continues. Another highway for
the diffusion of viruses is through floppy disks. If one of the infected programs is given to another person on a
floppy disk, then other programs of the destination computer get infected.
As virus creators got more sophisticated, they learned new tricks. One important trick was the ability to
load viruses into memory so the viruses keep running in the back ground as long as the computer is on. This
gave viruses a much more effective way to replicate themselves. Another trick was ability to infect the boot
sector on floppy disks and hard disks. The boot sector is the first sector, which holds a small program that is the
first part of the operating system that the computer loads. By putting its code in a boot sector, a virus can
guarantee it gets executed. It can load itself into memory immediately, and it is able to run whenever the
computer is on. Boot sector viruses can infect the boot sector of any floppy disk inserted in the infected computer
and they spread as a wildfire.
How Computer System infected by a Virus?
When an infected program is loaded into memory, an infected disk is inserted, infected macro is run etc.
Typical sources of viruses are the following:
- Using pirate software.
- Download infected program files (like software or game) from the Internet or newsgroups.
- E-mail attachments (videos, pictures, music, text files).
- Using infected diskettes.
Types of Computer Viruses:
There are numerous types of computer viruses. To make the topic easy to understand, let us see them by
classifying by the ways they infect the computer system.
Virus Symptoms:
Although there are different types of computer system problems that are caused by computer viruses, the
following are few of the symptoms that are most commonly facing an infected computer:
- A program will take longer time to load.
- The disks or files size keeps changing.
- Send email in the name of the computers owner.
- The disk keeps running out of free space.
- Render the disk and programs unusable.
- The drive light keeps flashing when you are doing anything.
- You may not access the hard drive when you boot from floppy.
- Destroy motherboard BIOS.
- Viewing unknown files that you dont know from where they come.
- Your files may get a strange name you dont recognize.
- Clicking noises keep coming from the keyboard.
- You may not open a file.