Professional Documents
Culture Documents
Leeshma K.
Assistant Professor
Module 1
SYLLABUS
• Computer
• Evolution of computers
• Basic idea about parts of a computer , input devices , output devices
• Memory storage devices and operating systems
• Evolution of internet
• Scientific data base
• useful educational websites
Computer
1. Input Unit − Devices like keyboard and mouse that are used to input data and instructions to the
computer are called input unit.
2. Output Unit − Devices like printer and visual display unit that are used to provide information to the
user in desired format are called output unit.
3. Control Unit − As the name suggests, this unit controls all the functions of the computer. All devices
or parts of computer interact through the control unit.
4. Arithmetic Logic Unit − This is the brain of the computer where all arithmetic operations and logical
operations take place.
5. Memory − All input data, instructions and data interim to the processes are stored in the memory.
Memory is of two types – primary memory and secondary memory. Primary memory resides within
the CPU whereas secondary memory is external to it.
Computer History
ABACUS
4th Century B.C.
ABACUS
Napier’s Bones
• In 1617, the last year of his life, Napier invented
a tool called “Napier's Bones” which reduces the
effort it takes to multiply numbers.
• Napier’s bones were called that because they
were often made of bone, ivory, silver, or wood.
The were universally popular and common until
the late 1800s. Sometimes the Napier tables were
engraved on rods in a case so that numbers could
be “dialed in”.
BLAISE PASCAL
(1623 - 1662)
• 1833
• Used to perform a variety of calculations by following a
set of instructions or programs stored on punch cards
• Machine only designed but never built
Joseph Jacquard
First Generation Computers
(1940-1956)
• The first computers used vacuum tubes(a sealed glass tube containing a near-vacuum
which allows the free passage of electric current.) for
• They were very expensive to operate and in addition to using a great deal of electricity,
generated a lot of heat, which was often the cause of malfunctions(defect or
breakdown).
• The UNIVAC and ENIAC computers are examples of first-generation computing devices.
18
First Generation Computers
Advantages :
• It was only electronic device
• First device to hold memory
Disadvantages :
• Too bulky i.e. large in size
• Vacuum tubes burn frequently
• They were producing heat
• Maintenance problems
22
Second Generation Computers
Advantages :
• Size reduced considerably
• The very fast
• Very much reliable
Disadvantages :
• They over heated quickly
• Maintenance problems
23
Third Generation Computers
(1964-1971)
• The development of the integrated circuit was the hallmark of the third generation of
computers.
• Transistors were miniaturized and placed on silicon chips, called semiconductors.
• Instead of punched cards and printouts, users interacted with third generation
computers through keyboards and monitors and interfaced with an operating system.
• Allowed the device to run many different applications at one time.
24
Third generation computers
Advantages :
• ICs are very small in size
• Improved performance
• Production cost cheap
Disadvantages :
• ICs are sophisticated
• From the central processing unit and memory to input/output controls—on a single chip.
• Fourth generation computers also saw the development of GUIs, the mouse and handheld devices.
27
Fifth Generation Computers
(present and beyond)
• Fifth generation computing devices, based on artificial intelligence.
• Are still in development, though there are some applications, such as voice
recognition.
• The use of parallel processing and superconductors is helping to make artificial
intelligence a reality.
• The goal of fifth-generation computing is to develop devices that respond to natural
language input and are capable of learning and self-organization.
28
Fifth Generation Computers
29
Memory hierarchy
In computer architecture, the memory hierarchy separates computer storage into a
hierarchy based on response time. Since response time, complexity, and capacity are
related, the levels may also be distinguished by their performance and controlling
technologies.
Registers are a type of computer memory used to quickly accept, store, and
transfer data and instructions that are being used immediately by the CPU. The
registers used by the CPU are often termed as Processor registers.
Cache Memory
• The data or contents of the main memory that are used frequently by CPU are
stored in the cache memory so that the processor can easily access that data in a
shorter time.
• Whenever the CPU requires accessing memory, it first checks the required data
into the cache memory. If the data is found in the cache memory, it is read from
the fast memory.
• Otherwise, the CPU moves onto the main memory for the required data.
Main memory
• Main memory is where programs and data are kept when the processor is actively
using them. When programs and data become active, they are copied from
secondary memory into main memory where the processor can interact with them.
A copy remains in secondary memory.
• Main memory is intimately connected to the processor, so moving instructions and
data into and out of the processor is very fast.
Characteristics of Main Memory :
• These are semiconductor memories.
• It is known as the main memory.
• Usually volatile memory.
• Data is lost in case power is switched off.
• It is the working memory of the computer.
• Faster than secondary memories.
• A computer cannot run without the primary memory.
Secondary Memory
• This type of memory is also known as external memory or non-volatile.
• It is slower than the main memory. These are used for storing data/information permanently. CPU
directly does not access these memories, instead they are accessed via input-output routines.
• The contents of secondary memories are first transferred to the main memory, and then the CPU can
access it.
Characteristics of Secondary Memory
• These are magnetic and optical memories.
• It is known as the backup memory.
• It is a non-volatile memory.
• Data is permanently stored even if power is switched off.
• It is used for storage of data in a computer.
• Computer may run without the secondary memory.
• Slower than primary memories.
Tertiary storage
slowly. Due to its slow process, it is used to archive data that we do not access.
• The tapes are now being relatively cheap and are available readily.
• Magnetic tape and optical disks are more inexpensive than magnetic disks, so the
It is a volatile memory. It means it does not store data or instructions permanently. When you switch on the
computer the data and instructions from the hard disk are stored in RAM.
CPU utilizes this data to perform the required tasks. As soon as you shut down the computer the RAM loses
It is a non-volatile memory. It means it does not lose its data or programs that are written on it at the time of
manufacture. So it is a permanent memory that contains all important data and instructions needed to perform
RAM ROM
Definition of RAM is Random Access Memory Definition of ROM is Read-only Memory
Random Access Memory (RAM) is expensive when compared ROM is cheaper when compared to RAM.
to ROM
The speed of Random Access Memory (RAM) is higher when The speed of Read-only Memory (ROM) is slower when compared
compared to ROM to RAM.
Random Access Memory (RAM) has a higher capacity when ROM has a lower capacity compared to RAM
compared to ROM
Data in RAM can be modified, erased, or read. Data in ROM can only be read, it cannot be modified or erased.
The data stored in RAM is used by the Central Processing The data stored in ROM is used to bootstrap the computer.
Unit (CPU) to process current instructions
Data stored on RAM can be accessed by the Central If the Central Processing Unit (CPU) needs to access the data on
Processing Unit. ROM, first the data must be transferred to RAM, and then the
Central Processing Unit (CPU) will be able to access the data.
Data of RAM is very volatile, it will exist as long as there is Data present in Read-Only Memory (ROM) is not volatile, it is
no interruption in power. permanent. Data will remain unchanged even when there is a
disruption in the power supply.
Different types of RAM and ROM
Random Access Memory (RAM) is classified into two types. They are
• DRAM (Dynamic Random Access Memory) – DRAM Is commonly used as the main memory for the
computer. Inside an integrated circuit, each DRAM memory cell consists of a transistor and a capacitor and a
data bit is stored in the capacitor. Because transistors often leak a small amount, the condensers gradually
discharge, allowing the information stored in it to drain thus, DRAM has to be refreshed every few
• SRAM (Static Random Access Memory) – SRAM is composed of 4 to 6 transistors. It holds data in the
memory as long as power is supplied to the device, unlike DRAM, which needs to be regularly refreshed. As
such, SRAM is more costly but quicker, making DRAM the more widespread memory in computer systems.
what is ECC memory?"
• Error correction code (ECC) memory is a type of RAM memory found in workstations and servers. It’s
valued by professionals and businesses with critical data for its ability to automatically detect and correct
• ECC RAM, or error-correcting code RAM, is a specialized type of memory that identifies and fixes the
most common errors which could otherwise lead to data corruption or system crashes.These are known as
single-bit errors.
Read-Only Memory has three types in it. They are:-
• PROM–PROM or programmable ROM is a computer memory chip that can be programmed once it is
created. When the PROM is programmed, the written information is permanent and cannot be removed
or erased.
• EPROM–Erasable Programmable Read-Only Memory, EPROM is a non-volatile memory chip. When
exposed to ultraviolet light, an EPROM can be reprogrammed if necessary, but otherwise no new data
would be accepted or saved. Computer manufacturers use EPROM when it might be necessary to
modify the data stored on the EPROM. EPROM chips are not commonly used in computers and have
been replaced by EEPROM chips.
• EEPROM–The EEPROM is an electrically erasable programmable read-only memory which can be
erased and reprogrammed using an electrical charge.
• unlike most of the memory inside a computer, this memory remembers data when the power is
switched off.
• EEPROM was a substitute for the PROM and EPROM chips and is used for the BIOS of later
computers designed after 1994.
• Using an EEPROM machine helps a computer user to update the BIOS on their device without the
need to open the computer or remove chips.
OPERATING SYSTEM
Statements, etc.
Advantages of Batch Operating System:
• Processors of the batch systems know how long the job would be when it is in queue
• Multiple users can share the batch systems
• The idle time for the batch system is very less
• It is easy to manage large work repeatedly in batch systems
• It is sometimes costly
• The other jobs will have to wait for an unknown time if any job fails
2. Time-Sharing Operating Systems –
• Each task is given some time to execute so that all the tasks work smoothly. Each user gets the
time of CPU as they use a single system.
• These systems are also known as Multitasking Systems. The task can be from a single user or
different users also.
• The time that each task gets to execute is called quantum. After this time interval is over OS
switches over to the next task.
• Advantages of Time-Sharing OS:
• Each task gets an equal opportunity
• Fewer chances of duplication of software
• CPU idle time can be reduced
• Disadvantages of Time-Sharing OS:
• Reliability problem
• One must have to take care of the security and integrity of user programs and data
• Data communication problem
• Examples of Time-Sharing OSs are: Multics, Unix, etc.
3. Distributed Operating System –
• Various autonomous interconnected computers communicate with each other using a shared
communication network.
• Independent systems possess their own memory unit and CPU. These are referred to as loosely coupled
• The major benefit of working with these types of the operating system is that it is always possible that one
user can access the files or software which are not actually present on his system but some other system
connected within this network i.e., remote access is enabled within the devices connected in that network.
Advantages of Distributed Operating System:
• Failure of one will not affect the other network communication, as all systems are independent from
each other
• Since resources are being shared, computation is highly fast and durable
• Load on host computer reduces
• These systems are easily scalable as many systems can be easily added to the network
• Delay in data processing reduces
Disadvantages of Distributed Operating System:
• Failure of the main network will stop the entire communication
• To establish distributed systems the language which is used are not well defined yet
• These types of systems are not readily available as they are very expensive. Not only that the underlying
software is highly complex and not understood well yet
Examples of Distributed Operating System are- LOCUS, etc.
4. Network Operating System –
• These systems run on a server and provide the capability to manage data, users, groups,
security, applications, and other networking functions.
• These types of operating systems allow shared access of files, printers, security,
applications, and other networking functions over a small private network.
• One more important aspect of Network Operating Systems is that all the users are well
aware of the underlying configuration, of all other users within the network, their
individual connections, etc. and that’s why these computers are popularly known
as tightly coupled systems.
Advantages of Network Operating System:
• Highly stable centralized servers
• Security concerns are handled through servers
• New technologies and hardware up-gradation are easily integrated
into the system
• Server access is possible remotely from different locations and
types of systems
Disadvantages of Network Operating System:
• Servers are costly
• User has to depend on a central location for most operations
• Maintenance and updates are required regularly
Examples of Network Operating System are: Microsoft Windows
Server 2003, Microsoft Windows Server 2008, UNIX, Linux etc.
5. Real-Time Operating System –
• These types of OSs serve real-time systems. The time interval required to process and respond to inputs is very small.
• Real-time systems are used when there are time requirements that are very strict like missile systems, air traffic
1. Hard Real-Time Systems: These OSs are meant for applications where time constraints are very strict and even the
shortest possible delay is not acceptable. These systems are built for saving life like automatic parachutes or airbags
which are required to be readily available in case of any accident. Virtual memory is rarely found in these systems.
2. Soft Real-Time Systems: These OSs are for applications where for time-constraint is less strict.
Advantages Examples
• Priority-Based Scheduling. • Airline traffic control systems.
• Abstracting Timing Information. • Command Control Systems.
• Maintainability/Extensibility. • Airlines reservation system.
• Modularity. • Heart Peacemaker.
• Promotes Team Development. • Network Multimedia Systems.
• Easier Testing. • Robotics.
• Code Reuse.
• Improved Efficiency.
Disadvantages
• Idle Processing.
• Limited Tasks.
• Use Heavy System resources.
• Complex Algorithms.
• Device driver and interrupt signals.
• Thread Priority.
Embedded Operating Systems
• Linux-based OS.
Multiprogramming Operating System
• Multitasking OS: Enables execution of multiple programs at the same time. The
operating system accomplishes this by swapping each program in and out of
memory one at a time. When a program is switched out of memory, it is temporarily
saved on disk until it is required again.
• Multiuser Operating System: This allows many users to share processing time on a
powerful central computer from different terminals. The operating system
accomplishes this by rapidly switching between terminals, each of which receives a
limited amount of processor time on the central computer.
Multiprocessor Operating System
• Multiprocessor operating system utilizes multiple processors, which are connected with physical memory,
computer buses, clocks, and peripheral devices (touchpad, joystick, etc).
• The main objective of using a multiprocessor OS is to consume high computing power and increase the
execution speed of the system.
Mobile Operating System
• A mobile operating system is an operating system that helps run application software on mobile devices.
• It is the same kind of software as the famous computer operating systems Linux and Windows, but they
• The operating systems found on smartphones include Symbian OS, IOS, BlackBerryOS, Windows Mobile,
• The iPhone OS originated from BSD and NeXTSTEP, which are related to Unix.
• It combines the power of a computer and the experience of a hand-held device. It typically contains a
cellular built-in modem and SIM tray for telephony and internet connections.
Evolution of internet
• The internet started as an experiment in the late 1960s by the Advanced Research Projects
Agency (ARPA , now called DARPA).
• DARPA (Defense Advanced Research Project Agency) in Department of defense had funded
some researcher , and the researchers needed to share their findings with each other . ARPA
decided to have such an infrastructure that could provide facility to exchange information
thereby reducing costs.
• World’s first operational network – ARPANET(Advanced Research Project Agency Network) – 1967
• It was developed under U.S Department Of Defense (DOD) , it was developed to survive nuclear
attack.
• It was the first network to implement the protocol suit TCP/IP.
• Each host computer would attached to a specialized computer called interface
message processor (IMP)
• Each IMP had to be able to communicate with each other IMPs as well as with its
own attached host.
• ARPANET consists of 4 main computers located at :
– University of California , Los Angeles .
– University of Utah.
Scientific data base
1. Scopus
• Scopus is one of the two big commercial, bibliographic databases that cover scholarly literature from
almost any discipline. Beside searching for research articles, Scopus also provides academic journal
– Discipline: Multidisciplinary
– Access options: Limited free preview, full access by institutional subscription only
– Provider: Elsevier
2. Web of Science
Web of Science also known as Web of Knowledge is the second big bibliographic database. Usually, academic
institutions provide either access to Web of Science or Scopus on their campus network for free.
• Coverage: approx. 100 million items
• References: 1.4 billion
• Discipline: Multidisciplinary
• Access options: institutional subscription only
• Provider: Clarivate (formerly Thomson Reuters)
3. PubMed
PubMed is the number one resource for anyone looking for literature in medicine or biological sciences.
PubMed stores abstracts and bibliographic details of more than 30 million papers and provides full text links
to the publisher sites or links to the free PDF on PubMed Central (PMC).
• Coverage: approx. 30 million items
• References: NA
• Discipline: Medicine, Biological Sciences
• Access options: free
• Provider: NIH
4. ERIC
• For education sciences, ERIC is the number one destination. ERIC stands for
Education Resources Information Center, and is a database that specifically hosts
education-related literature.
• Coverage: approx. 1.3 million items
• References: NA
• Discipline: Education science
• Access options: free
• Provider: U.S. Department of Education
5. IEEE Xplore
IEEE Xplore is the leading academic database in the field of engineering and computer science. It's not only journal
articles, but also conference papers, standards and books that can be search for.
•Coverage: approx. 5 million items
•References: NA
•Discipline: Engineering
•Access options: free
•Provider: IEEE (Institute of Electrical and Electronics Engineers)
6. ScienceDirect
ScienceDirect is the gateway to the millions of academic articles published by Elsevier. 2,500 journals and
more than 40,000 e-books can be searched via a single interface.
•Coverage: approx. 16 million items
•References: NA
•Discipline: Multidisciplinary
•Access options: free
•Provider: Elsevier
7. Directory of Open Access Journals (DOAJ)
The DOAJ is very special academic database since all the articles indexed are open access and can be
accessed freely of charge.
•Coverage: approx. 4.3 million items
•References: NA
•Discipline: Multidisciplinary
•Access options: free
•Provider: DOAJ
8. JSTOR
JSTOR is another great resource to find research papers. Any article published before 1924 in the United States is
available for free and JSTOR also offers scholarships for independent researchers.
•Coverage: approx. 12 million items
•References: NA
•Discipline: Multidisciplinary
•Access options: free
•Provider: ITHAKA
ACADEMIC SERVICE
1. INFLIBNET
2. NICENET
3. BRNET
INFLIBNET
Institutions.
1. To promote and establish communication facilities to improve capability in information transfer and
access to knowledge, that provide support to scholarship, learning, research and academic pursuit
through cooperation and involvement of agencies concerned.
2. To establish INFLIBNET: Information and Library Network a computer communication network for
linking libraries and information centers in universities, deemed to be universities, colleges, UGC
information centers, institutions of national importance and R & D institutions, etc. avoiding
duplication of efforts.
3. Promote and implement computerization of operations and services in the libraries and information
centers of the country
4. Evolve standards and uniform guidelines in techniques, methods, procedures, computer hardware and software,
services and promote their adoption in actual practice by all libraries, in order to facilitate pooling, sharing and
exchange of information towards optimal use of resources and facilities.
5. Evolved a national network, interconnecting various libraries and information centers in the country, to improve
capability in information handling and service.
6. Provide reliable access to document collection of libraries by creating on-line union catalogue of serials,
theses/dissertations, books, monographs and non-book materials (manuscripts, audio-visuals, computer data,
multimedia, etc.) in various libraries in India.
7. Provide access to bibliographic information sources with citations, abstracts etc. through indigenously created
databases of the Sectoral Information Centers of NISSAT, UGC Information Centers, City Networks and such
others and by establishing gateways for on-line accessing of national and international databases held by national
and international information networks and centres respectively.
8. Develop new methods and techniques for archival of valuable information available as manuscripts
and information documents in different Indian Languages, in the form of digital images using high
density storage media.
9. Enable the users dispersed all over the country, irrespective of location and distance, to have access to
information regarding serials, theses/dissertations, books, monographs and non-book materials by
locating the sources wherefrom available and to obtain it through the facilities of INFLIBNET and
union catalogue of documents.
10. Create databases of projects, institutions, specialists, etc. for providing on-line information service.
11. Create databases of projects, institutions, specialists, etc. for providing on-line information service.
12. Encourage co-operation among libraries, documentation centers and information centres in the
country, so that the resources can be pooled for the benefit of helping the weaker resource
centers by stronger ones.
13. Train and develop human resources in the field of computerized library operations and
networking to establish, manage and sustain INFLIBNET.
14. Facilitate academic communication amongst scientists, engineers, social scientists, academics,
faculties, researchers and students through electronic mail, file transfer, computer/audio/video
conferencing, etc.
15. Collaborate with institutions, libraries, information centers and other organizations in India and
abroad in the field relevant to the objectives of the Centre
• NICENET is an organization of internet professionals, founded in 1995 with the
objective to make electronic communication tools and resources accessible for
education community.
• NICENET provides one of the most popular “Learning Management System”.
Advantages and features of NICENET are;
1. Internet Classroom Assistant (ICA2), a sophisticated communication tool that brings powerful
World-Wide-Web based conferencing, personal messaging, document sharing, scheduling and
link/resource sharing to a variety of learning environments.
2. The ICA2 incorporates many new features and responds to requests received from users. NICENET
provides the ICA2 free of charge with no advertising.
3. Anyone can set up a class in minutes and allow others to join. After login, users are presented with a
"heads-up" display of class resources.
4. Conferencing: Create your own private, threaded conferencing on topics you make for the class or
opt to allow students to create their own topics.
5. Scheduling: Put the class schedule on-line. With a seven day advance view on your class homepage,
students will have a heads-up display of upcoming assignments and class events.
6. Document sharing: Students and professors have the ability to publish their documents on
the site using simple web-based
7. No knowledge of HTML is needed. Automatically integrated with scheduling, students are
one click away from turning in their assignments on-line, giving their peers feedback on
published papers and receiving professors comments.
8. Personal Messaging: Similar to traditional email but fully integrated with document sharing
and conferencing, personal messaging is a great way communicate with and between
individuals in your class, comment privately on conferencing postings or give private
feedback on published papers.
9. Link Sharing: Share links to pertinent Internet resources sorted by topics that you create.
BRNET
• Bio-Resource Network (BRNet) is a prototype portal site for biological information.
• An initiative of Japan Science and Technology (JST) Corporation, BRNET is basically meant to
bring together biological information resources scattered over different networks for optimum
utilization.
• BRNET categorizes the information resources in such a manner that the end user can easily
search the desired information. Furthermore, it also allows the users to create their own bio
resources database
ACADEMIC SEARCH TECHNIQUES
• Using the internet for academic purpose is different from using it foe general purpose.
• When conducting internet searches there are several very useful search techniques for finding
• Google will search for all the keywords and phrases that you specify, however, there are certain words that
Google will ignore because they are considered too common to be of any use in the search (e.g. “a”, “the”,
“of”, etc.)
• You can force Google to take a stop word into account by prep ending a + (plus) character, as in +the “search
techniques”
5. Synonyms
• The Google synonym operator, the ~ (tilde) character, prep ended to any number of keywords in your
query, asks Google to include not only exact matches, but also what it thinks are synonyms for each
of the keywords. Searching for: ~ape turns up results for monkey, gorilla, chimpanzee, and others
(both singular and plural forms) of the ape or related family, as if you'd searched for: monkey gorilla
chimpanzee (Synonyms are bolded along with exact keyword matches on the results page, so they're
easy to spot)
6. Number Range
• The number range operator, .. (two periods), looks for results that fall inside your specified numeric range
(e.g. digital camera 3..5 megapixel $800..$1000)
• You can also use the number range syntax with just one number, making it the minimum or maximum of
your query (e.g. digital camera ..5 megapixel $800..)
7. Simple Searching and Feeling Lucky
• Yahoo ! was one of the original subject directories , it still has a sub directory and a search engine feature.
• You select the main subject from the directory , and you narrow your search by successively clicking on
subfolders that match your search until you have reached the necessary information.