You are on page 1of 19

PRACTICAL FILE

OF
COMPUTER APPLICATION

SUBMITTED TO :- SUBMITTED BY:-


ASST. PROF. K.K YADAV ABHISHEK GARG
B.B.A.LLB(Hons.)

5th SEMESTER

1
ACKNOWLEDGEMENT

“Gratitude is the hardest of all emotions to express. There is no word capable of conveying all
that one feels until we reach the world where thoughts can be adequately expressed in words
”Thank you” will have to do.”

We would like to thank all the faculty members of Prestige Institute of Management and
Research Gwalior, for providing us the required knowledge, information and support.

We would also like to thank Dr. Nishant Joshi for his guidance and moral support in our
academic persuasion and providing insight to this topic. We would also like to thank my college
for supporting us with resources, which beyond any doubt have helped me.

It is a great pleasure for us to put on records my appreciation and gratitude towards Asst. Prof.
K.K Yadav for her valuable support and suggestions for the improvement and editing of this
project report.

Let us also use this opportunity to thank our team members who have contributed to this
internship with their invaluable opinions and suggestions, which has gone a long way in soothing
our rough edges as a teammate.

2
DECLARATION

I ABHISHEK GARG, declare that the PRACTICAL FILE OF COMPUTER


APPLICATION submitted by me in line of partial fulfillment of requirement for the award of
the Degree of B.B.A.LL.B(Hons.) from Prestige Institute of Management and Research affiliated
to Jiwaji University, Gwalior have accomplished topic name ‘PRACTICAL FILE OF
COMPUTER APPLICATION’. I assure that this file is the result of my own efforts and that
any other institute for the award of any degree or diploma has never submitted this report
anywhere.

Date: 11/12/2023 Name of the student

Place: Gwalior ABHISHEK GARG

B.B.A.LL.B(Hons.)

5th SEMESTER.

3
CERTIFICATE

This is to certify that, ABHISHEK GARG student of B.B.A.LL.B (HONS.) 5th


Semester of Prestige Institute of Management and Research Gwalior have successfully
completed their PRACTICAL FILE OF COMPUTER APPLICATION under my
guidance and supervision.

Faculty Guide

Date:11/12/2023 Asst. Prof. K..K Yadav

PLACE: GWALIOR

4
TABLE OF CONTENT

S.NO TOPIC PAGE NO.


1. Classification of computer system with 6-10
examples.
2. Explain the memory hierarchy with suitable 11-13
examples.
3. Explain any five input and output 13-15
devices.
4. Discuss the MS-DOS file system and 16-17
differentiate external and internal commands.
5. Commands 18-19

5
1) CLASSIFICATION OF COMPUTER SYSTEM WITH EXAMPLES

A computer is an electronic device that manipulates information, or data. It has the ability to store,
retrieve, and process data. You may already know that you can use a computer to type documents,
send email, play games, and browse the Web.

A computer is a machine that can perform calculations and operations based on instructions from a
software or hardware program. Computers can accept data (input), process it, and then produce
outputs.

Computer Classification
A computer is a device that transforms unusable data into information. According to the set of
instructions the user gives it, it processes the input and generates the desired outcome. Modern
digital computers are classified on the basis of their size and capacity. The size and data handling
capabilities of the various types of computers may be used to categorize them into three groups.

1. Computers according to Size:


6
 Supercomputer.
 Mainframe computer.
 Mini computer.
 Micro computer.

 Supercomputer :

The most efficient computers in terms of processing data and performance are
supercomputers. These computers are used for research and exploratory purposes.
Supercomputers are exceedingly large and highly expensive. It can only fit in large, air-
conditioned spaces.
Supercomputers are used for a range of tasks, such as space exploration, seismic research,
and the testing of nuclear weapons.
It is an extremely fast computer, which can execute hundreds of millions of instructions per
second.
Supercomputer Features:

 They make use of AI (Artificial intelligence)


 They are the fastest and strongest;
 They are very costly.
 They are enormous in size.
 They are employed by companies that manufacture goods.
 They process information at a rapid rate.

 Examples of Supercomputers: IBM Roadrunner, IBM Blue Gene, and Intel ASCI red.
PARAM is a series of supercomputers assembled in India by C-DAC (Center for
Development of Advanced Computing), in Pune. PARAM Padma is the latest machine in
this series. The peak computing power of PARAM Padma is 1 Tera FLOP (TFLOP).

 Mainframe computer :
It is a multi-user computer system, capable of supporting hundreds of users simultaneously.
Software technology is different from minicomputer.
Despite being less efficient than supercomputers, mainframe computers are nevertheless
extremely expensive. Large corporations and governmental organizations frequently employ
mainframe computers to run everyday operations. They have the ability to store and analyze a lot
of data. To maintain information on their customers, students, and insurance policyholders,
banks, colleges, and insurance companies utilize them. They may also act as a server in a
network environment. Hundreds of users may be managed simultaneously by them.

7
Mainframes are less powerful and cheaper than Supercomputers. However, they are big general-
purpose computers capable of handling all kinds of scientific and business applications.
Mainframes can process several million instructions per second. More than 1000 remote
terminals can be supported by a Mainframe.

Mainframes have a large online secondary storage capacity. Many different types of peripheral
devices like magnetic tape drivers, hard disk drives, visual display units, plotters, printers, and
telecommunication terminals can be attached to Mainframe computers.

Mainframes, such as the ES/9000 family of computers of the International Business Machines
Corp. (IBM) are used for such applications as payroll computations, accounting, business
transactions, information retrieval, and airline seat reservations.

Mainframe Computer Features:


 They have enormous amounts of memory.
 They are capable of running several different operating systems.
 They have a significant number of CPUs with powerful processing speeds.
 Tightly Coupled Clustering Technology is employed.
 Example of Mainframe Computer: CDC 6600 and IBM ES000 series.

 Mini computer :
.This type of computer performs data processing activities in the same way as the Mainframe
but on a smaller scale.
The cost of minis is lower. As the name implies, a minicomputer is small compared to a
Mainframe and may be called a scaled-down Mainframe as the processor and the number of
peripherals is physically smaller. A mini computer can typically support 10 to 12 terminals. The
most popular Minicomputers or minis are Nova, Dec, PDP_II, and IBM series.

Features of Miniframe or Minicomputer

 It is lightweight which makes it easy to carry and fit anywhere.


 It is less expensive than mainframe computers.
 It is very fast compared to its size.
 It remains charged for a long time.
 It does not require a controlled operational environment.

Micro Computers
This is the smallest category of computers, consisting of a microprocessor and associated storage
and input/output devices. These are also called Personal Computer systems. Microcomputers
were first available for widespread use in the 1970s when it became possible to put the entire
circuitry of computers (CPU) into a small silicon chip.

8
An example of a microcomputer is Personnel Computers (PC). A Personnel Computer is so
named because it is designed for personal use. IBM, the foremost computer-manufacturing firm
in the world, introduced the first PC named IBM-PC.

Personal computers are classified based on size and portability. Personal computers that can be
placed on top of a desk but are not very portable are called desktop computers. Portable
computers are those personal computers that are light enough to be easily transported. Portable
personal computers that are small enough to be set up on the lap of a user are called laptop
computers; notebook computers are approximately the size of a book. Portable personal
computers that can be put in a pocket are called pocket or palm-sized computers.

Features of Microcomputer:

 It is the smallest in size among all types of computers.


 It is designed for personal work and applications. Only one user can work at a time.
 It is less expensive and easy to use.
 It does not require the user to have special skills or training to use it.
 Generally, comes with a single semiconductor chip.
 It is capable of multitasking such as printing, scanning, browsing, watching videos, etc.
 They are extensively employed for personal usage.
 They are smaller and comparably less expensive.
 Multi-user functionality is not supported.
 It has a limited computational capacity.
 They are quite simple to use.

Classification of computers on basis of purpose

Based on purpose, computers can be classified into two types. They are as follows:

 General-purpose computer
 Special-purpose computer

 General purpose computers:

The computers, which can be theoretically used for any type of application, are called general-
purpose computers.

 Special-purpose computers:
The computers are made and used for specific jobs like air traffic control systems. Controlling
fuel in automobiles is called special-purpose computers

9
2) EXPLAIN THE MEMORY HIERARCHY WITH SUITABLE
EXAMPLES.
The memory hierarchy is a system of organizing computer storage into different levels based on
access time and capacity. The goal of the memory hierarchy is to improve the performance of the
computer by storing the most frequently accessed data in the fastest memory.

In the design of the computer system, a processor, as well as a large amount of memory devices,
has been used. However, the main problem is, these parts are expensive. So the memory
organization of the system can be done by memory hierarchy. It has several levels of memory
with different performance rates. But all these can supply an exact purpose, such that the access

10
time can be reduced. The memory hierarchy was developed depending upon the behavior of the
program.

The memory hierarchy in computers mainly includes the following :

 Registers :

Usually, the register is a static RAM or SRAM in the processor of the computer which is used for
holding the data word which is typically 64 or 128 bits. The program counter register is the most
important as well as found in all the processors. Most of the processors use a status word register
as well as an accumulator. A status word register is used for decision making, and the
accumulator is used to store the data like mathematical operation. Usually, computers like
complex instruction set computers have so many registers for accepting main memory, and
RISC- reduced instruction set computers have more registers.

 Cache Memory :

Cache memory can also be found in the processor, however rarely it may be another IC
(integrated circuit) which is separated into levels. The cache holds the chunk of data which are
frequently used from main memory. When the processor has a single core then it will have two
(or) more cache levels rarely. Present multi-core processors will be having three, 2-levels for
each one core, and one level is shared.

11
 Main Memory :

The main memory in the computer is nothing but, the memory unit in the CPU that
communicates directly. It is the main storage unit of the computer. This memory is fast as well as
large memory used for storing the data throughout the operations of the computer. This memory
is made up of RAM as well as ROM.

 Magnetic Disks :

The magnetic disks in the computer are circular plates fabricated of plastic otherwise metal by
magnetized material. Frequently, two faces of the disk are utilized as well as many disks may be
stacked on one spindle by read or write heads obtainable on every plane. All the disks in
computer turn jointly at high speed. The tracks in the computer are nothing but bits which are
stored within the magnetized plane in spots next to concentric circles. These are usually
separated into sections which are named as sectors.

 Magnetic Tape

This tape is a normal magnetic recording which is designed with a slender magnetizable covering
on an extended, plastic film of the thin strip. This is mainly used to back up huge data. Whenever
the computer requires to access a strip, first it will mount to access the data. Once the data is
allowed, then it will be unmounted. The access time of memory will be slower within magnetic
strip as well as it will take a few minutes for accessing a strip.

Advantages of Memory Hierarchy :

The need for a memory hierarchy includes the following :

 Memory distributing is simple and economical


 Removes external destruction
 Data can be spread all over
 Permits demand paging & pre-paging
 Swapping will be more proficient

Examples :

 Level 0 (L0) Micro operations cache – 6,144 bytes (6 KiB) in size.


 Level 1 (L1) Instruction cache – 128 KiB in size.
 Level 1 (L1) Data cache – 128 KiB in size.
 Level 2 (L2) Instruction and data (shared) – 1 MiB in size.
 Level 3 (L3) Shared cache – 6 MiB in size.
 Level 4 (L4) Shared cache – 128 MiB in size.

12
3) EXPLAIN ANY FIVE INPUT AND OUTPUT DEVICES.

The functioning of a computer system is based on the combined usage of both input and
output devices. Using an input device we can give instructions to the computer to
perform an action and the device reverts to our action through an output device.

Input Device Definition: A piece of equipment/hardware which helps us enter data into a
computer is called an input device. For example keyboard, mouse, etc.

Output Device Definition: A piece of equipment/hardware which gives out the result of the
entered input, once it is processed (i.e. converts data from machine language to a human-
understandable language), is called an output device. For example printer, monitor, etc.

Five Input Devices :

 Keyboard :

 A simple device comprising keys and each key denotes either an alphabet, number or
number commands which can be given to a computer for various actions to be performed.
 It has a modified version of typewriter keys.
 The keyboard is an essential input device and computer and laptops both use keyboards to
give commands to the computer.

 Mouse :

 It is also known as a pointing device.


 Using mouse we can directly click on the various icons present on the system and open up
various files and programs.
 A mouse comprises 3 buttons on the top and one trackball at the bottom which helps in
selecting and moving the mouse around, respectively.
 In case of laptops, the touchpad is given as a replacement of the mouse which helps in the
movement of the mouse pointer.

 Joy Stick :

13
 It is a device which comprises a stick which is attached at an angle to the base so that it can
be moved and controlled.
 Mostly used to control the movement in video games.
 Apart from a computer system, a joystick is also used in the cockpit of an aeroplane,
wheelchairs, cranes, trucks, etc. to operate them well.

 Light Pen :

 It is a wand-like looking device which can directly be moved over the device’s screen.
 It is light-sensitive.
 Used in conjunction with computer’s cathode ray tube.

 Microphone :

 Using a microphone, sound can be stored in a device in its digital form.


 It converts sound into an electrical signal.
 To record or reproduce a sound created using a microphone, it needs to be connected with an
amplifier.

Five Output devices :

 Monitor :

 The device which displays all the icons, text, images, etc. over a screen is called the Monitor.
 When we ask the computer to perform an action, the result of that action is displayed on the
monitor.
 Various types of monitors have also been developed over the years.

 Printer :

 A device which makes a copy of the pictorial or textual content, usually over a paper is
called a printer.
 For example, an author types the entire book on his/her computer and later gets a print out
of it, which is in the form of paper and is later published.
 Multiple types of printers are also available in the market, which can serve different
purposes.

 Speakers :

 A device through which we can listen to a sound as an outcome of what we command a


computer to do is called a speaker.

14
 Speakers are attached with a computer system and also are a hardware device which can
be attached separately.
 With the advancement in technology, speakers are now available which are wireless and
can be connected using Bluetooth or other applications.

 Projector :

 An optical device which presents an image or moving images onto a projection screen is
called a projector.
 Most commonly these projectors are used in auditoriums and movie theatres for the
display of the videos or lighting.
 If a projector is connected to a computer, then the image/video displayed on the screen is
the same as the one displayed on the computer screen.

 Headphones :

 They perform the same function as a speaker, the only difference is the frequency of
sound.
 Using speakers, the sound can be heard over a larger area and using headphones, the
sound is only audible to the person using them.
 Also known as earphones or headset.

4) DISCUSS THE MS-DOS FILE SYSTEM AND DIFFERENTIATE


EXTERNAL AND INTERNAL COMMANDS.

MS-DOS stands for Microsoft Disk Operating System and is also known as Microsoft DOS. MS-
DOS was the Microsoft-marketed version of the first operating system (OS) to be widely

15
installed on personal computers (PCs). It was essentially the same OS that Bill Gates's young
company developed for IBM as Personal Computer - Disk Operating System (PC-DOS).

What are internal and external commands?

Internal commands are more commonly used and important to the operation and use of the
Windows operating system. By embedding them in the command.com file, they can be quickly
accessed and always available in MS-DOS and to Windows when needed.

Internal Commands are built into the operating system as the part of a file called
COMMAND.COM

When you type an Internal Command MS-DOS will perform it immediately. All of the internal
commands are part of the shell which could be command.com or cmd.exe (depending on your
version of MS-DOS or Windows) and are not separate files on the hard drive. As long as you can
open a command line you can run any of the internal commands included with your version of
MS-DOS.

External commands are powerful. They help fix problems, improve performance, and perform
other actions as well. External commands usually have higher resource requirements than
internal commands. Keeping them in separate files, separated from internal commands, helps to
reduce the load on Windows. They can also be added to Windows whenever needed by copying
the external command’s file to the computer.

These external commands are for performing advanced tasks and they do need some external file
support as they are not stored in COMMAND.COM.There are also Batch commands or Batch
files which are text files that contain a list of internal and/or external commands which are
executed in sequence when the batch file is executed. AUTOEXEC.BAT gets executed
automatically on booting.

Difference between internal commands and external commands :-

16
5) COMMANDS :

17
1) DIR :- It shows all the directories and files.
Syntax : c:\>DIR

2) MD:- Make directory, this command is used to create a new directory.


Syntax : c:\>MD name of the directory.

3) CD : Change Directory, this command is used to change a directory.


Syntax : c:\>CD( Change directory)

4) Exit from the directory : This command is used to exit from the existing directory.
Syntax : c:\>existing directory>CD

5) COPY CON : This command is used to create individual file.


Syntax : c:\>COPY CON name of the file.

6) TYPE : This command is used to see the details or information in the existing file.
Syntax : c:\>TYPE name of the file.

7) Ren(Rename) :This command is used to change the name of the existing file.
Syntax : c:\>REN old_file_name new_file_name

8) DEL (delete) : This command is used to delete the unnecessary files from the computer.
Syntax: c:\>DEL name_of_file

9) RD (Remove directory) : This command is used to remove the directory which is


empty.In order to remove the directory after removing all files from it, we use RD
command.
Syntax : c:\>RD directory name.

10) Date : This command is used to check the current date.


Syntax : c:\> date

11) Time : This command is used to check the current time.


Syntax : c:\>time

12) Cls : This command is used to clear the screen.


Syntax: c:\>cls

13) Color : This command is used to modify the color of the window screen.
Syntax : c:\>color

14) Echo: This command is used to show messages and enables and disables echo.
Syntax : c:\>dir_echo

15) Prompt: This command is used to view or change the DOS.

18
Syntax : c:\>prompt

19

You might also like