Computer For Arihant
Computer For Arihant
Data representation
BINARY NUMBERS : it contains two unique digits 0 and 1 known as base 2
system, binary number 0 and 1 called bit, computer always calculate input in
binary form
Cottfried wihelm Leibniz discovered binary system
Decimal number system contain ten digits 0 to 9, known as base 10 system
Octal number system contain 8 digits 0 to 7 digits, known as base 8 system
Hexadecimal contain 16 digits 0 to 9 , A to F, A denotes 10, B TO 11, F to 15
Conversion of decimal to binary system
(43)10 to (?)2
43^2 = 21 quotient remainder =1
21^2 R=1 = 10^2 R= 0 = 5^2 R =1 = 2^2 R= 0 = 1 ^0 = 0
Then (43)10 = ( start with 21 remainder ) = (101011)2
SOFTWARES
Two types system and application software
System software divided in two system management program and
developing software
Examples of system management programs are operating system device
driver and system utilities
OPERATING SYSTEM : function is to provide link between hardware and user,
provide an environment to run the programs: MS DOS, WINDOW XP/2000/98,
UNIX LINUX
SYSTEM BIOS : basic input and output system, BIOS helps the operating
system to configure the hardware components process called booting up
Device driver a software which is written with the objective of making a
device functional when it is connected to the computer is called device driver
, it is a system software act like interference between device and user, every
device whether is printer , mouse have a driver program in it for its
functioning
System utilities consist of following functions
Disk compression , disk fragments, disk cleaners, basic utilities , anti virus
Disk compression: it increase the amount of information that can be stored
for hard disk by compressing all the information stored on hard disk , this
utility works automatically
Disk fragments : it detect computer files are broken across several locations
on hard disk and moves the fragments to one location to increase efficiency
Back up utilities : it can make copy of all information stored on a disk and
restore either the entire disk
Disk cleaners: used to find files that have not used for a long time , also used
to increase the speed of slow computer.
Anti virus: used to scan computer virus and prevent the system to being
corrupt
Programming language : It is an artificial language, each language has its
own syntax, divided into two categories, low level language and high level
language
Low level language divided into two
Machine language collection of binary digits
Assembly language : used to interface with computer hardware, allows
human to read the code more easily than binary
Medium level language used to improve the translated code before it
executed by processor
High level language : machine independent language and uses translator,
also called source code. Commonly used high level language is C, BASIC,
FORTRAN , PASCAL
Language translator help converting programming language to machine
language , translated program is called object code , three different kinds of
language translator
used input devices are keyboard, mouse, trackball, joystick, light pen, touch screen,
barcode reader, OMR, OCR, MICR, smart card reader, biometric sensor, scanner,
Mic, web cam, PC card. There are different types of keyboard such as QWERTY,
DVORAK and AZERTY. Shift, Ctrl and Alt keys are also known as modifier keys. Caps
lock and nums lock are the toggle keys . Mouse was invented by Douglas Engelbart
Microphone mic convert received sound into digitized sound , to convert voice into
digital form sound card is used.
Monitor is also called as visual display unit, two kinds of monitor;mochrome and
colour display unit, cathode rod tube is rectangular shaped monitor, thin film
transistor and active matrix LCD is LCD
Dot matrix, daisy wheel , drum printer and line printer are impact
printers(printer strikes paper and ribbon together to form character like
typewriter) inkjet ,thermal, laser, electromagnetic, electrostatic printers are
the non impact printers
FAX is facsimile, modem , network card, headphone, touch screen, audio card
are both input and output devices
I/O devices or peripheral devices :Parallel ports in computer connect printer
to the computer,data flows through eight wires, they can transmit eight bits
of data, serial port convert only one bit of data through
Scanner is used to read handwritten or printed text to make a digital image
that is stored in memory, used to get printed diagram into computer
Line printer speed is specified in terms of character per minutes
Serial port provide slow speed data transmission
USB is platform independent
Printer and monitor peripheral devices are hardware devices
Chapter 4 RAM is temporary storge form of data,known as read/ write
memory, two types dynamic RAM consist of memory cell each cell made up
of one capacitor and one transistor, static RAM does not consist of capacitor
but multiple transistor, it is more expensive and faster, it need not to be
refreshed periodically but DRAM needs to be refreshed
ROM is permanent memory also known as non volatile memory. Three types
programmable ROM; These types of memories are found in video game
consoles, mobile phones, implantable medical devices and high definition
multimedia interfaces. Erasable PROM; similar to PROM but it is erasable by
strong exposure to ultraviolet light, electrically erasable PROM; erased and
rewritten electrically commonly used for BIOS, most flexible type of ROM
Other types flash memory semiconductor based non volatile rewritten
memory used in mobile phones, printer digital camera, printer
Secondary memories are of three types;Optical storage; written and read by
laser include CD, DVD and blu ray disc
Solid state storage; storage devices built by silicon microchip used in
pen/flash drive , memory card
Magnetic storage; magnetic fields in order to hard disk, floppy disk and
magnetic tape
Hard disk drive consist of spindle that hold magnetic flat circular disk called
platters which hold recorded data, information is recorded in bands called
track. Tracks are divided into pie shaped sections called sectors
Floppy disk coated with iron oxides, available in three sizes 8 inches, 5 ¼, 3
½
CD are of three types; CD ROM, CD R compact disk recordable, CD RW
compact disk rewritable
DVD is also known as duper density disk or digital versatile disk, three types
same as CD
Blu ray disc contain more data than DVD , contain 25 gb per layer
Pen drive also known as flash drive
4 bits; 1 nibble) 8 Bits 1 byte
Temporary memory is volatile memory
Byte can represent a number between 0 to 255
System software divided in further, operating system It provides an
environment to run the programs. e.g. MS-DOS,Windows XP/2000/98, Unix,
Linux, etc.
Device drivers; Every device, whether it is a printer, monitor,mouse or
keyboard has a driver program associated with it for its proper functioning.
Language translator; The translated program is called object code.There are
three different kinds of languagetranslator : Assembler, Compiler and
Interpreter.
Application softwares are also called end users programs
Word processing software; Microsoft word, word perfect ,apple works, open
office.org writers
Electronics spreadsheets; the relationship between cells are called formulas,
names of the cells are called labels. Microsoft excel, lotus 123
Presentation software; Microsoft powerpoint, coral presentation
Database management system
Desktop publishing software
Graphic software and multimedia software
System utilities
Microsoft office chapter 10
Was developed by Microsoft inc in 1988, five packages of MS office, five
packages of ms office are ms excel, ms powerpoint ,ms acess , ms
outlook,ms word
Ctrl+N crete a new document, ctrl o or f12 open an exissting doc, ctrl s or
shift s saves the active doc, ctrl A select all contents of the page, ctrl p prints
the doc.,ctrl x cuts the specific text, ctrl Z reverse certain commands, ctrl y
reverse the action of undo button ctrl 5 increase line spacing, ctrl A select the
entire doc
The file responsible for opening of MS excel is excel. Exe, extension of save
file is .xlsx
Menu bar is located after title bar
In excel intersection of row and coloumn is called as cell , an electronic
spread sheet consist of row , coloumn, cell, collection of worksheets is called
as workbook, transpose display row data in column and column data in row,
Len command is used to calculate total character in a cell, active cell can be
represented by A4, pie charts are created by spreadsheet software, to select
current column press ctrl spacebar, to go to the first first cell in current row
shift + home, to hide entire row press ctrl 9, to select entire row shift + space
In powerpoint two kinds of sound effect can be added .wav files,. Mid files , F5
is used to show slide show
MS access is DBMS software, in order to include picture data type must be
OLE, default size of data type is 50, short cut key to invoke the spell checker
F7, a template is a pattern of worksheet
From adda 247
Symbol $ is used for absolute reference in excel, devrok is use to reference
with keyboard it is layout of keyboard, include new page in ms word is ctrl
+enter, in word for going in specific location we use hyperlink (ctrl k), light
pen is optical input device, disk access time is seek time + latency
time ,printer is connected by parallel port and USB port, data is stored in
Dir, , the network connecting in several computers all over the world is
internet, code of IBM is EBCDIC extended binary coded decimal interchange
code, ASCII American standard code for information interchange, father of c
language is dennis Ritchie, first computer network of world Arpa net
advanced research project agency network, in topology network component
are connected by one cable is bus topology, Pakistani virus brain virus also
boot sector, pager is example of simplex, bing is search engine introduced by
Microsoft, Ray Tomlinson introduced internet email, compuserve provider to
offer email facility, freeware means their source code is not available, first
graphical user interface is designed by Xerox corporation, a HUB do
broadcasting, BIOS is stored in ROM, , in MS excel to enter current date ctrl; ,
current time crtl shift; , now function current date and time, today function
returns current date
48 bits in Ethernet or physical address, uses bus topology. telnet is a protocol
A cluster is a group of servers and other resources that act like a single
system and enable high availability and load balancing, to connect the LAN in
single protocol bridge connects, spoofing is trust worthy entity in order to
steal sensitive information, FDDI fiber distributed data interface is a ring
network that uses LAN also used for VoIP communication , directory organizes
web in categories, HTML introduces by tim burners lee also called father of
web, NEFT national electronics funds transfer, unauthorized access of
information from a wireless device through a Bluetooth connection is
bluesnarfing, UNIVAC is universal automatic computer, Alan Kay invented
object oriented programming OOP,
MOUSE manually operated user selection equipment, transport protocol is
used for carrying VoIP packet TCP transmission control protocol, mouse was
built by Douglas engelbart
Kilobyte= 1KB = 1024 bytes
Mega byte=1MB=1024KB
Giga byte 1GB=1024MB
Tera byte = 1TB =1024GB
Peta byte= 1PB= 1024TB
Hexa byte= 1EB= 1024 PB
Zetta byte=1ZB= 1024EB
Yotta byte, brono byte, geop byte
Full form of RSA encryption technique is riverst, Shamir, adleman
Father of personal computer Edward Robert. There is no start button in
window 8, laser printer are high end printers, APK android package book,
Software as a service is type of cloud computing service, first neural network
computer SNARC, 601 error code identifies floppy drive problems, 3D printing
is called as additive manufacturing, drum printer and dot matrix printer are
line printer, an internet leased line is also known as Ethernet leased line,
dedicated line, data circuit or private line, major signaling protocol in VIOP is
SIP session initiation protocol, OLED organic light emitting diode, first
graphical web browser is Mosaic, in MS excel ctrl 4 is used for text underline,
file extension of word pad doc is .rtf, VIRUS stands for vital information
resources under siege, .IP address belongs to different class { class A 1.0.0.1
to 255.255.254, class B 128.1.0.1 to 191.0.1.1 to 223.255.254.254, class D
224.0.0.0 to 239.255.255.255, class E 240.0.0.0 to 254.255.255.254]
[ F1 displays the help screen over almost all programs, F2 this key allows you
to change the name of specific file or folder, F3 launches a search function for
a currently active application, F5 refreshes or reloads the page or doc
window, F7 used to check spelling or grammer check, F12 this key opens the
save as dialog box]
You can rename the file and directories using REN command
Shortcut key to indent the paragraph Microsoft word ctrl M if want to remove
ctrl shift M, to insert page number in word key is shift alt p , alt shift T to
insert time , shift alt D , to break page ctrl enter, to insert a column break in
word ctrl shift enter, to open mailing tab alt M , to select word from left ctrl
left arrow
Hybrid comp are used in ECG and dialysis , hard disk is coated on both sides
is magnetic metallic oxide, INX mnemonic increment extended register, John
von Neumann developed the theory behind the architecture of modern
computer , in excel a range is identified by the cell in the upper left corner
and cell in the lower right corner separated by colon,
Shortcut key to show font dialog box ctrl d, ctrl shift f, ctrl shift p, key you can
press to create a copyright symbol alt ctrl c , docx is document extended,
RTC is real time clock, act in india focuses on data protection and data
privacy is IT act 2000, LTE stands for long term evolution, program which is
permanent as hardware and stored in ROM is firmware, full form of CSS
cascading style sheet, repititon of data in DBMS is called redundancy,while
working in mail BCC stands for blind carbon copy, open source is software
which has its source code freely available for use, viewing, modification,
redistribution, in each and every system in the network are connected
together then such a topology are known as mesh topology, a program
which helps create written doc and lets you go back and make necessary
corrections is word processor, firewall is used in communication network
system is unauthorized attack, port connects special types of music
instruments to sound card is MIDI, in UDP user datagram protocol, in
powerpoint header and footer button are found in insert tab in text group,
transputer is the chip which has more than one processor chip, A bit refers to
smallest unit of data , JAR stands for java archive, OLAP applications are
widely used by data mining tech, star or multidimentional, tunneling is a
solution to the problem where the source and destination hosts are on the
same type of network, but there is a different network in between also known
as port forwarding , the deice on a laptop that take mouse place is touch or
track pad, modulation is the process of sending a file from one computer to
another computer , Bitmap images are made up of pixels, to open a new file
in Corel DRAW ctrl N, basic unit of execution in operating system is thread,
data privacy and data protection act is IT act 2000, LTE stands for long term
evolution, the programs which are as permanent as hardware and stores in
ROM is firmware, WPAN is wireless personal area network, RSA rivest Shamir
adleman is used for secure email communication, A Winchester another term
for hard drive disk, internet like networks within a enterprise known as
intranet. Ray Tomlinson introduced internet email, A filter is a program that
designed to examine each input or output request for certain qualifying
criteria and then process or forward it , A Trojan horse is a type of malicious
code, page cache is disk cache, a supercomputer is a number crunchier,
brain is a first widespread computer virus for MS DOS, line printer are drum
printer, band and chain, social engineering is the tact of manipulating,
influencing a victim in order to gain control over a computer system or to
steal personal information, to open task manager key is ctrl+shift+ ESC, A
spider that is used by search the internet for doc using their web addresses,
ENIAC was first fully electronic general purpose computer, a dedicated server
is a type of web hosting in which a client has the exclusive use of entire
server, name of application similar to MS office is libre, open ,neo office ,
screen tips are small windows that display descriptive text when you rest the
pointer on a command. Enhanced screen tips are larger windows that display
more descripted text than a screen tip, BMP is graphical file extension,
location.reload is used to refresh a web page in java script, ALTER is used to
modify a table in SQL used to add, delete or modify columns in table, when
you link one table to another table foreign key used, syntax refers to the
rules that defines the structure of a language , RAID stands for redundant
array of independent disks, extension name of notepad and wordpad are .txt
and rtf, cache and main memory will lose their contents when power is off
they are volatile is a computer storage that only maintains its data while the
device is powered, Hotmail is web based email service, malicious hacker is
black hat hacker, a keylogger is software program that records key strokes, a
liveware is a human being who writes program, operate and maintain
computer, Pandora is a operating system, guessing a weak password is
example of brute force attack, storage capacity are frequently measured in
MIPS,fu full form of DDL is data definition language, guided media which are
those twisted pair cable, coaxial cable and fibre optic cable, lotus 123
spreadsheet designed Mitchell kapor, idea of storage in program concept of
howard aiken, japnese and chinese font supports by ASCII, relational
database is type of database management system, VDA is virtual desktop
access, in windows ME stand for millennium edition, the electronic path that
connects one part of computer to another is BUS, the advanced research
projects agency network ARPANET was the first wide area packet switched
network with distributed control and one of the first computer network to
implement TCP/IP, webmail interface allows you to access your email from
anywhere, c# language is used to develop a game, CMOS batteries are small
and are attached directly to motherboard, when a computer is switched on,
the booting process performs power on self test worm virus uses computer
hosts to reproduce itself, the mini toolbar appear automatically when you
select text in an office suite program such as word excel or ppt, % and / uses
in excel are percentage and division, cookies are small pieces of text sent to
your browser by website you visit, fetch decode execute sequence instruction
of program in memory the CPU goes through, protocol is a set of rules
computers use to talk to each other, HDMI port is used to connect audio and
video multimedia devices like video camera , each platter has the same
number of tracks and track location that cuts across all platters is called
cylinder, EBCDIC extended binary collected intercharge code maximum
possible characters set size is 256, DTP desktop publishing is the use of
personal computers to design books and booklets that are intended to be
printed by inkjet or printers, compression is the type of software created a
smaller file that is faster to transfer over the internet, text editor is a tool
allows a user to create and revise doc in computer they are application
software, whole disk encryption encrypts the entire disk including swap files
system files, freeware means that their source code is not available, Xerox
corporation designed first graphical user interface, the first version of Unix
was developed by ken Thompson, window 95 was first operating system
developed by Microsoft, ALT + F ley is used to open file menu of current
program, ctrl +k are used insert a hyperlink, mother of computer is Ada
Lovelace, first gen based on vacuum tubes, second basedon transistor , third
based on integrated circuit , fourth based on VLSI microprocessor, fifth based
on ULSI technology, an IPv6 address is 128 bits in length and consist of eight,
16 bit fields with ech field bounded by colon, secondary storage is not a
component of CPU ALU, registers and control units are, OCR is tech that
recognizes text within a digital image, cyber terrorism is a violent act using
internet which either threatens any tech user to loss of life or harms anyone
in order to accomplish political gain, C++, java are object oriented type of
programming language, 601 error code identifies a floppy drive problem, 512
bytes for hard disk drives and 2048 bytes for CD ROMs and DVD ROMs,
leased line is also known as dedicated line and data circuit line, the SIP
session initiation protocol is a signaling protocol that enables the voice over
internet protocol by defining the messages sent between endpoints and
managing the actual element of a call, Motorola company first handed phone,
shift + F10 is the short cut key for display the context menu in Microsoft
powerpoint, chart found in MS EXCEL 2019 in insert option, , the IMEI stands
for international mobile equipment identity 15 digit number unique to each
other , shortcut key in excel to underline text is ctrl + 4, word processing,
spreadsheet and photo editing are application software, smishing similar to
phishing involves criminals sending text messages , subschema refers to an
application programmer’s view of data item types and record types, batch
processing is the method computers use to complete high volume, data jobs
certain data processing tasks are backup, filtering and sorting, the first
practical form of random access memory was william’s tube, in excel when
we type text that is too long to fit the cell, the text overlap the next cell and
we do not want it to overlap the next cell we use wrap text, page down
spacebar down arrow are shortcut key used to perform animation for
advance to the next slide in Microsoft power point , a workstation refers to an
individual computer or group of computer used by single user to perform
work, the printer used in conjunction with computers and uses dry ink powder
is laser printer, first android operating system was Alpha, data BUS Carries
the data between processor and other component the data bus is
bidirectional, control bus carries control signals from the processor to other
components also carries the clock’s pulses unidirectional, address bus carries
memory addresses from the processor to other such as primary storage and
i/o devices, ALT + F4 is used for close the currently active program, Ctrl + W
shortcut key to close currently opened doc in MS word, maximum number
each of four parts of an IP address can have is 255, MINI ports connects
special type of music instruments to sound cards, while studying DBMS we
may came across term SQL s stands for structured A LAN typically connects
personal comp within a very limited geographical area usually a single
building, working of Bluetooth device depend on master/slave single master
device connected to up to 7 different slave devices , Bluetooth networks
referred as piconets, thermal printers are also known as inkless printers , RSS
feed type of web tech provides news that can automatically download right to
your desktop, ctrl + D to open font dialog box in word, correcting errors in a
program is debugging, pharming is when you are rerouted from your
requested internet site to another undesired site, when the comp is , already
ON then the process to restart is called warm booting, cold booting is when
the comp is started after having been switched off, a central comp
surrounded by one or more satellite comp is called star network, keyloggers
are software program that track activities or key pressed on keyboard, ctrl +
F will open find and replace dialog box used to find specific data in your
worksheet, ctrl +H also open the find and replace dialog box, the printer
used in ATM is thermal printer , John Mc Carthy defined term AI in year 1956,
a comp stores data in binary form, Bluetooth is an example of personal area
network