23BCE1S1 Fundamentals of Information Technology Notes
23BCE1S1 Fundamentals of Information Technology Notes
Notes
UNIT
CONTENTS
NO
Introduction to Computers: Introduction, Definition, Characteristic of
I Computers, Evolution of Computer, Block diagram of a computer,
Generations of Computer, Classification of Computers, Application of
Computer, Capabilities and limitation of computer
Basic Computer Organization: Role of I/O Devices in a Computer
System, Input Units: Keyboard, Terminals and Its Types. Pointing
II Devices, Scanner and its Types, Voice Recognition System, Vision Input
System, Touch Screen. Output Units: Monitors and its Types. Printers:
Impact Printers and its Types, Non-Impact Printers and its Types,
Plotters, Types of Plotters, Sound Card and Speakers.
Storage Fundamentals: Primary Vs Secondary Storage, Data storage &
retrieval methods. Primary Storage: RAM ROM, PROM, EPROM,
III
EEPROM. Secondary Storage: Magnetic Tapes, Magnetic Disks. Cartridge
tape, hard disks, Floppy disks Optical Disks, Compact Disks, Zip Drive,
Flash Drives
Software: Software and its needs, Types of S/W. System Software:
Operating System, Utility Programs Programming Language: Machine
IV
Language, Assembly Language, High Level Language their advantages &
disadvantages. Application S/W and its types: Word Processing, Spread
Sheets, Presentation, Graphics, DBMS s/w
Operating System: Functions, Measuring System Performance,
Assemblers, Compilers and Interpreters. Batch Processing,
V
Multiprogramming, Multi Tasking, Multiprocessing, Time Sharing, DOS,
Windows, Unix/Linux
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 1
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
UNIT-I
Introduction to Computers: Introduction, Definition, Characteristic of
Computers, Evolution of Computer, Block diagram of a computer,
Generations of Computer, Classification of Computers, Application of
Computer, Capabilities and limitation of computer
Computer
A computer is a machine used to manipulate data or information and perform
mathematical and logical operations. Modern computers perform a wide range of
tasks, store retrieve, and process information. Using a computer, we can
create/modify documents, send/receive emails, browse information on the internet,
and play video games.
Speed
A computer works with much higher speed and accuracy compared to humans
while performing mathematical calculations. Computers can process millions
(1,000,000) of instructions per second. The time taken by computers for their
operations is microseconds and nanoseconds.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.
Diligence
A computer can perform millions of tasks or calculations with the same consistency
and accuracy. It doesn‘t feel any fatigue or lack of concentration. Its memory also
makes it superior to that of human beings.
Versatility
Versatility refers to the capability of a computer to perform different kinds of works
with same accuracy and efficiency.
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we
give same set of input any number of times, we will get the same result.
Storage
A computer has built-in memory called primary memory where it stores data.
Secondary storage are removable devices such as CDs, pen drives, etc., which are
also used to store data.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 2
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Input Unit
The computer requires the input unit to receive data and information and then use it
to solve problems. The user provides the computer with data and information. With
the use of input devices, we give data and information input. The input unit is made
up of a variety of input devices. Some input devices are a keyboard, mouse,
microphone, scanner, etc.
Primary Function of Input Units
With the use of input devices, collect data from the user.
Convert the data from electrical signals to computer-readable machine
language.
Instruct the CPU to receive data from the input devices.
Provide the transformed data to the CPU through the memory unit for further
processing.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 3
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Output Unit
The computer‘s output unit communicates the results of processing and information
to the outside world. In general, the output unit reverses the process of the input
unit, converting machine language into electronic signals readable by the output
devices. The output devices are Monitor, projector, headphones, speakers, etc.
Central Processing Unit
The CPU is the backbone of the computer system. Without it, a computer is nothing.
All the instructions that the computer receives from the user, or a set of instructions,
are processed by this ‗brain‘. This brain then prints out the desired result based on
the instructions received and the input that the user made.
Three Major Components of the CPU Are
Arithmetic Logic Unit (ALU)
The Arithmetic Logic Unit (ALU) is the portion of the Central Processing Unit (CPU)
that handles all of the Central Processing Unit (CPU‘s) calculations. The ALUs work
for all math and operations that are related to arithmetical and logical operations.
Responsible for performing the decision-making so that they can do most of the
operations. When any calculations must be performed, the Control Unit (CU) passes
the data from the memory unit to the Arithmetic Logic Unit (ALU). When the
computation is completed and the results are created by the ALU, the CU returns the
computation data to the memory unit. The arithmetic unit performs logical,
arithmetic, and bit-shifting operations.
Control Unit(CU)
The control unit, which coordinates and controls other functional units of the
computer, is sometimes known as the ―central nervous system‖ of the machine. All
CPU functions, including ALU operations and data flow inside the CPU, are under
the direction of CU.
Memory Unit (MU)
The memory unit is responsible for storing data and information for the computer‘s
other functional components. The computer‘s memory unit stores the data and
information received from the input unit before it is processed by the central
processing unit (CPU).
The Memory Unit is divided into two categories: -
Primary Memory
The primary memory is the most quickly accessible memory unit. These memories
require relatively little time to receive and deliver data for processing. The Control
Unit and Arithmetic Logic Unit are also close to the primary memory.
The primary memory is temporary and volatile. It means that if the computer is
turned off, the data is permanently erased.
Secondary Memory
Secondary memory capacity ranges from gigabytes to terabytes, and it serves as an
archive for the computer system. Secondary memory can be used to store application
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 4
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
programs, documents, films, audio, databases, and so on. Data and information
transmission and reception are slower than in primary memory.
Computer Generations
Computers have evolved significantly over the years, and the history of computers is
often divided into generations based on the technology used. Here are the five
generations of computers:
First Generation
Second Generation
Third Generation
Fourth Generation
Fifth Generation
First Generation
The period 1940 to 1956, roughly considered as the First Generation of
Computer.
The first generation computers were developed by using vacuum tube or
thermionic valve machine.
The input of this system was based on punched cards and paper tape;
however, the output was displayed on printouts.
The first generation computers worked on binary-coded concept (i.e.,
language of 0-1). Examples: ENIAC, EDVAC, etc.
Second Generation
The period 1956 to 1963 is roughly considered as the period of Second
Generation of Computers.
The second generation computers were developed by using transistor
technology.
In comparison to the first generation, the size of second generation was
smaller.
In comparison to computers of the first generation, the computing time taken
by the computers of the second generation was lesser.
Third Generation
The period 1963 to 1971 is roughly considered as the period of Third
Generation of computers.
The third generation computers were developed by using the Integrated
Circuit (IC) technology.
In comparison to the computers of the second generation, the size of the
computers of the third generation was smaller.
In comparison to the computers of the second generation, the computing time
taken by the computers of the third generation was lesser.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 5
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
The third generation computer consumed less power and also generated less
heat.
The maintenance cost of the computers in the third generation was also low.
The computer system of the computers of the third generation was easier for
commercial use.
Fourth Generation
The period 1972 to 2010 is roughly considered as the fourth generation of
computers.
The fourth generation computers were developed by using microprocessor
technology.
By coming to fourth generation, computer became very small in size, it
became portable.
The machine of fourth generation started generating very low amount of heat.
It is much faster and accuracy became more reliable.
The production cost reduced to very low in comparison to the previous
generation.
It became available for the common people as well.
Fifth Generation
The period 2010 to till date and beyond, roughly considered as the period of
fifth generation of computers.
By the time, the computer generation was being categorized on the basis of
hardware only, but the fifth generation technology also included software.
The computers of the fifth generation had high capability and large memory
capacity.
Working with computers of this generation was fast and multiple tasks could
be performed simultaneously.
Some of the popular advanced technologies of the fifth generation include
Artificial intelligence, Quantum computation, Nanotechnology, Parallel
processing, etc.
Classification of Computer
The computer systems can be classified on the following basis: size, functionality
and Data Processing
Super computers
Mainframe Computer
Mini Computer
Micro Computer
Super Computer
supercomputers are the biggest, fastest, strongest, and priciest. The first
supercomputer was created in the 1960s. Supercomputers use several processors to
increase their speed, and many people can use them simultaneously. Supercomputers
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 6
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
are generally utilized for scientific purposes and large-scale, complex calculations.
They are widely used in the aerospace, automotive, chemical, electronics, and
petroleum industries, as well as for weather forecasting and seismic analysis.
Example: Jaguar, Roadrunner
Mainframe Computer
Mainframe computers, also known as mainframes, are the most commonly used type
of digital computer in large industries for controlling processes as well as in offices
for maintaining networks and providing access to shared resources.mainframe
computer systems are powerful enough to support a hundred users at remote
terminals at the same time. Multi-programming refers to the ability to run multiple
programs at the same time for multiple users.
Example : IBM-3000 series, IBM 4300, IBM 3090.
Mini Computer
Most minicomputers, like mainframes, are multiuser and general-purpose
computers. The primary distinction between mainframes and minicomputers is that
minicomputers are slower even when performing the same tasks as mainframes.
Example : PDP series
Micro Computer
The most common type of computer, widely used in homes, schools, banks, and
offices, among other places. It is a low-cost digital computer with a single
microprocessor, storage unit, and input/output device. Microcomputers are typically
designed for individual use only.
Desktop Computer
A desktop computer, also known as a PC (Personal computer), is the most common
type of microcomputer. It has CPU (Central Processing Unit), a keyboard and a
mouse for input, and a monitor or display unit for output.
Portable Computer
Portable computers, such as laptops and PDAs, have surpassed desktop computers in
popularity. The best feature of this portable computer is that it is lightweight and
portable. Laptops have all of the same components as desktop computers, but they
are more compact and smaller in size.
A palm-sized portable digital assistant (PDA) is another type of portable
computer. PDAs are used to keep track of appointments, take important notes, set
reminders, perform mathematical calculations, play games, and even surf the internet
and send emails.
Application of Computer
Computers are used in every field of life, such as homes, businesses, educational
institutions, research organizations, the medical field, government offices,
entertainment, etc. Today we cannot imagine growing our technology without
computers. The various field where the computer is very essential are:
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 7
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Science
Today computer is the primary work tool in the field of science. It is the best-suited
machine for collecting, analyzing, classifying, and storing data. It becomes the most
essential medium to spread knowledge internally and internationally. It allows
scientists from different locations to work together and share ideas on the same
project.
Defence System
A computer performs a vital to control defense system. Computers are used to track
airplanes, missiles, tanks, and different kinds of weapons. Once the radar system
tracks a missile and artificial intelligence is programmed to target a missile and
destroy it before it comes on the surface. It also used for GPS tracking, controlling
defense vehicles, records of all members of the military.
Medical
The computer plays a very important role in medical science such as record patients‘
information monitoring heart rate, oxygen level, and blood pressure. To conduct
various surgeries junior doctors get the help of another professional doctor by web
conferencing. Research is also spread with the help of computers in the health
sector.
Education
Today learning becomes easy because of computers. Anyone employed or student
can learn any stage of life with the help of a computer. Computers are very crucial
for online classes, download study material on the internet. Computers are also used
to track student attendance and learning strategies. Coaching and institutes
increased their areas by audio-visual aids using computers.
Banking
A computer performs a crucial role in banking sectors, by storing several account
holder details on a bank server. All transactions such as deposits and withdrawals
perform by a computer. A banking company can easily monitor all ATMs and
passbook printing machines.
Government Sectors
Government can easily monitor government sectors such as road services, railway,
development, and other rising funds. The information of every citizen is stored on
the server through the computer.
Entertainment
Today most people are so busy and they do not easily get time to fresh their mind.
We can play various interesting video games using a computer. We can watch
movies, TV shows, and reality shows on the computer. A computer is also used to
create sarcastic memes and make us happy.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 8
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
UNIT-II
Basic Computer Organization: Role of I/O Devices in a Computer
System, Input Units: Keyboard, Terminals and Its Types. Pointing
Devices, Scanner and its Types, Voice Recognition System, Vision
Input System, Touch Screen. Output Units: Monitors and its Types.
Printers: Impact Printers and its Types, Non-Impact Printers and its
Types, Plotters, Types of Plotters, Sound Card and Speakers.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 9
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Communication Devices
Devices such as network cards, modems, and wireless adapters fall under this
category. They allow the computer to exchange data with other computers and
devices over a network.
Role:
Facilitate data transmission and communication over networks, enabling
remote computing, internet access, and device-to-device communication.
Hybrid I/O Devices
Some devices perform both input and output functions, such as:Touchscreen: Acts
as both an input device (registering touch) and an output device (displaying
information).
External Hard Drives: Can both receive (write) and send (read) data to the
computer.
Importance of I/O Devices
User Interaction: I/O devices allow users to communicate with the computer
system, making them crucial for user-friendly interaction.
System Control: Through input devices, users control the computer, execute
programs, and provide data.
Feedback Mechanism: Output devices provide users with feedback and
results of their operations, enhancing the user experience.
Data Management: Devices that enable data storage and retrieval ensure that
information can be permanently stored, transferred, or processed as needed.
Finally, the I/O devices are fundamental to the operation of a computer system,
enabling data input, processing feedback through output, and ensuring interaction
between the system and its users.
Keyboard
A keyboard is a primary input device for entering text into a computer or electronic
device. It consists of buttons for numbers, symbols, letters, and special keys like
Windows and Alt. The design is based on typewriters, allowing users to type
quickly with the layout of numbers and letters.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 10
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
The above keyboard design is called QWERTY design because of its first six letters
across in the upper-left-hand corner of the keyboard. Although the keyboard design
is derived from the typewrites, nowadays, it also includes many other keys as well
as Alt/Option, Control, and Windows key can be used as shortcuts to perform the
particular operation by combination with other keys.
Key Components of Computer Keyboard
Alphanumeric Keys: The fundamental keys used to enter text, representing
letters and numbers.
Function Keys (F1–F12): Keys in the top row that perform a variety of tasks,
frequently acting as shortcuts for commands or particular tasks.
Modifier keys (Shift, Ctrl, Alt): These keys increase command choices by
changing how other keys behave when tapped in combination.
Numeric Keypad: An additional set of keys for entering numbers that
resembles a calculator and is usually located on the right.
Special keys: Keys have particular purposes for navigation, text editing, and
system control (Enter, Backspace, Tab).
Arrow keys (Up, Down, Left, Right): Make navigating documents,
menus, and interfaces easier.
Escape key (Esc): It is used to reverse a command and go back in time.
Types of Computer Keyboards
Flexible keyboard
Soft silicone keyboard is highly portable, water/dust-resistant, doesn't need constant
cleaning. Functions like a standard keyboard, connects to computer via USB or serial
port.
Ergonomic Keyboard
Its design promotes straight hand positioning with a larger space bar for faster
typing.
Wireless Keyboard
A wireless keyboard connects to devices like computers, laptops, or tablets through
radio frequency (RF), infrared (IR), or Bluetooth. It offers portability and flexibility
with no cables, utilizing stainless steel for durability. Setup is easy with a USB
receiver. Options include infrared for light waves or RF for signals ranging from 27
MHz to 2. 4 GHz.
Mechanical Keyboard
This keyboard features high-quality materials for home and office use, designed for
durability and responsiveness. It offers a crisp click sound, medium resistance, and
improved feedback for gaming and typing. It has advanced features compared to
rubber dome keyboards.
Virtual Keyboard
Virtual keyboards are software-based, allowing users to type without physical
keys. They serve as an alternative to physical or digital QWERTY keyboards,
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 11
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
offering various characters, emojis, stickers, and animated GIFs. Commonly found
on tablets, smartphones, and portable devices.
Projection Keyboard
Projection keyboards use Bluetooth to connect to devices like mini PCs, tablet
computers, and smartphones. The virtual keyboard image is displayed on a surface
and keystrokes are recorded when keys are touched.
Gaming Keyboard
A gaming keyboard has specific keys for gamers like W, S, D, A, and arrows,
offering faster action.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 12
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
The local terminal is directly connected to the central computer through cables. This
type of networking is known as a local area network (LAN). Local terminal is used
in signal building or office
Remote Terminal
The terminal that is a long distance away from the central computer is known as
remote terminals. They are connected to the central computer through
telecommunication lines. The remote terminal is mostly intelligent terminals.
Pointing Devices
A pointing device is used to point or click a specific portion or parts on the screen.
When we scroll using the mouse, it points the cursor at a specific portion.A device
that points and controls the cursor on the screen. It is an input device. A pointer
device drags, clicks, and selects a specific portion of the screen.
Functions of Pointing Device
Click: In click, we can press our pointing device and easily click any portion
of the screen. Click is performed either left click or right click. The left click is
the left side of the mouse that performs selecting objects, double-clicking,
closing windows, etc. Right-click is the right side of the mouse that shows
commands of selected items.
Drag: Drag means to move specific files or items into another location where
we want them to be placed. We simply hold the items that we want to place
and then move the mouse button to place them in a different location.
Select: In select, we hold the mouse and then move the cursor to the items
that we want to select. When we select the item or contents, the selected
portion should be highlighted.
Scroll: Scroll means to move the content in either a horizontal or vertical
manner. Horizontal scrolling allows the user to slide the content left or right
on a computer screen. Vertical scrolling allows the user to slide the content up
or down on a computer screen.
Types of Pointing Device
Here is the list of some types of pointing devices:
Mouse: A mouse is a pointing device used in laptops and computers that is
connected to the keyboard. In the mouse, there are left- or right-click buttons,
and a wheel button is also present that is responsible for up and down. The
mouse can easily control the screen and perform many tasks.
Joystick: The joystick is responsible for handling the object on the screen.
Using a joystick is used to control many applications, such as games, virtual
reality, etc. It is an input device that transforms mechanical movement into
electrical output and then controls machines or games. We easily move the
joystick from one direction to another.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 13
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 14
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
arrangement of the lens and CCD array. Most scanners use a three-pass method,
employing different color filters (red, green, or blue) between the lens and CCD
array to generate the final full-color image after assembling all three filtered images.
Types of Scanner
Drum Scanner
The drum scanner utilizes a rotating drum to scan pages quickly, using
photomultiplier tubes instead of CCDs found in flatbed scanners. These tubes are
highly light-sensitive, providing high resolution scanning capabilities.
Flatbed Scanner
The flatbed scanner is the most common optical scanner, easily found in the
market. Documents are placed on a flat surface, covered, and scanned. It is user-
friendly, able to scan various documents, and may have additional features like
Bluetooth or automatic feeders.
Sheetfed Scanner
Sheetfed scanners are designed for loose sheets of paper, ideal for scanning large
volumes quickly. They are compact, with lower resolution than flatbed scanners, and
commonly used in offices with limited space.
Handheld Scanner
Handheld scanners are compact, easy to use devices that scan documents by
dragging the scanner over them, preferred for their flexibility and commonly used in
retail and warehousing for scanning barcodes.
Microphone
A microphone is an input device that was developed by Emile Berliner in 1877. It is
used to convert sound waves into electric waves or input the audio into computers.
It captures audio by converting sound waves into an electrical signal, which may be
a digital or analog signal. This process can be implemented by a computer or other
digital audio devices.
Use of Microphone
It is used for voice recording.
It offers users the option of voice recognition.
It allows users to record sound of musical instruments.
It enables users to online chatting.
It allows us for VoIP (Voice over internet protocol).
It is also used for Computer gaming.
It is also used for record voice for singing, podcasts, and dictation.
Voice Recognition
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 15
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
A vision input system is a technology that allows a computer to take input from an
image of an object. The input data is usually the object's shape and features.
Digital Camera
A digital camera input device is a type of hardware that allows users to capture and
transfer digital images from a camera to a computer or other device. This input
device typically connects to a computer via a USB cable or memory card reader, and
allows users to transfer images from the camera's memory card to the computer's
hard drive or other storage device. Some digital camera input devices may also
include software that allows users to edit and manipulate their images, as well as
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 16
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
share them online or print them out. Overall, digital camera input devices are
essential tools for photographers and other users who need to transfer and manage
digital images on their computers or other devices.
Types of Camera
DSLR cameras
Mirrorless cameras
Bridge cameras
Compact digital camera
Film cameras
Action cameras
360 cameras
Smartphone cameras
Instant cameras
Medium format cameras
Touch Screen
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 17
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 18
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 19
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 20
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Non-impact printers print graphics and characters onto paper using a laser, a spray
of special ink, or heat and pressure. The print quality of a non-impact printer is
better than that of an impact printer. Toner (dry ink) or liquid ink cartridges are used
in these printers to print on paper. These printers utilize the latest printing
technologies, and they are more costly than other printers.
Types of Non-Impact Printers
Laser Printer
Plotter
Inkjet Printer
Thermal Printer
Laser Printer
In laser printers, an image is produced, is a kind of non-impact printer that operates
laser LEDs. The mechanism by which laser printers work involves producing an
electrostatic picture on a drum a cylindrical roller. Laser LEDs are used to selectively
charge the necessary regions of the drum‘s surface to generate this picture.
Inkjet Printer
Using tiny nozzles, inkjet printers spray droplets onto paper directly. If you want to
construct high-resolution graphics, pictures, or images for your papers, this
approach works well for producing vibrantly colored visuals.
Thermal Printer
Using heat-sensitive paper or ribbon that is heated and transferred to create a print,
thermal printers create pictures. The three fundamental parts that make up a thermal
printer are a print head, a platen, and a spring.
Dye-sublimation Printers
Dye-sublimation printer is a digital printing procedure that is used in Non-Impact
printers. It applies an image to the target substrate using heat transfer. The
technique, sometimes known as digital sublimation, is frequently employed to
decorate clothing, banners, signs, and other objects with surfaces that may be
sublimated.
Features of Non-Impact Printer
High Quality Prints
In non-impact printers, High quality prints with crisp details and brilliant colors are
produced. With a resolution of up to 1200 dpi both inkjet and laser printers are
adequate of producing prints with incredibly fine detail and clarity.
Faster Printing Speeds
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 21
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Non-impact printers often print them significantly faster than impact printers when
printing a lot of papers, they generally have document feeders and automated two-
sided printing installed, which can further speed up output.
Silent Process
It is considerably quieter to use non-impact printers than other kinds of printers.
This is so that they may obtain the required printing result without having to
actually pound a hole in the paper or any other substance.
Lower Maintenance
Non-impact printers require a lot less maintenance than impact printers. They have
fewer mechanical faults and last longer since they don‘t have any moving
components that come into contact with the paper.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 22
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Inkjet Plotters
These plotters use inkjet technology and colored ink pens to create high-quality
color images and are ideal for detailed output in graphic design, architecture, and
fine art. They are commonly used for large-scale printing like billboards and
banners.
Cutting Plotters
A cutting plotter is a machine that uses knives to cut designs from materials like
plastic or vinyl. Controlled by a computer, it is precise and often used for crafts.
Drum Plotters
Drum plotters use a rotating drum to move paper while pens write vertically.
Multiple pens are utilized by them to produce large images, which are frequently
used for maps and technical drawings, in various colors.
Flatbed Plotters
A flatbed plotter utilizes paper placed on a stationary flat surface. The writing pen
moves in x and y axes, with various pen types in different sizes and colors
available. Larger plotters can print up to 60 inches on paper, and can also print on
materials like plastic, cardboard, or metal.
Sound Card
A sound card is a computer component used to send and receive audio data on a
computer-based system. Sound cards translate digital data and binary code the
computer uses into analog sound, which the user can hear through headphones or
speakers. A sound card operates the same function in reverse, as well.
Uses of a Sound Card
Games.
Voice recognition.
Watch movies.
Creating and playing MIDI.
Educational software.
Audio and video conferencing.
Business presentations.
Record dictations.
Types of Sound Card
External Sound Adapters
External sound adapters have the same features as regular sound cards but connect
via USB or FireWire instead of internal slots.
Motherboard Sound Chips
Initially, sound cards were costly add-ons, priced at high. Advances in
miniaturization led to integrated sound chips.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 23
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
USB Speaker
These kinds of speakers are now available as wireless speakers. You must connect a
USB to your computer to utilise them. They only function within a specific range and
maybe kept anyplace within that range.
Dynamic speaker
Dynamic speakers, which are primarily passive, are pretty prevalent. They are
generally found with one or more woofer drivers. Professional speakers have rear
drivers to help with sound amplification in certain circumstances.
Electrostatic speaker
Electrostatic speakers provide clear, detailed sound and need an external power
source. They are suitable for high frequencies, not low frequencies. Outdoor
speakers usually have around 80 watts output. PC speakers range from 10 to 25
watts.
Computer speaker
Speakers had limited sound quality, with only 8- or 16-bit functionality. Electrostatic
speakers offer clear, detailed sound and are easily replaceable if damaged.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 24
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
UNIT-III
Storage Fundamentals: Primary Vs Secondary Storage, Data storage &
retrieval methods. Primary Storage: RAM ROM, PROM, EPROM,
EEPROM. Secondary Storage: Magnetic Tapes, Magnetic Disks.
Cartridge tape, hard disks, Floppy disks Optical Disks, Compact
Disks, Zip Drive, Flash Drives
The memory devices used for primary The secondary memory devices are
memory are semiconductor memories. magnetic and optical memories.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 25
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Primary Storage
Primary Storage
Primary storage or memory is also known as the main memory, which is the part of
the computer that stores current data, programs, and instructions. Primary storage is
stored in the motherboard which results in the data from and to primary storage can
be read and written at a very good pace.
Need of Primary Memory
All programs, files, and data are stored in secondary storage that is larger and
hence has greater access time.
Secondary memory cannot be accessed directly by a CPU or processor.
In order, to execute any process operating system loads the process in
primary memory which is smaller and can be accessed directly by the CPU.
Since only those processes are loaded in primary memory which is ready to
be executed, the CPU can access those processes efficiently and this optimizes
the performance of the system.
Classification of Primary Memory
Primary memory can be broadly classified into two parts:
Read-Only Memory (ROM)
Random Access Memory (RAM)
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 26
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 27
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
PROM stands for Programmable Read-Only Memory, a chip where data can be
written once. Unlike RAM, PROM retains its content when the computer is off and is
typically used for low-level device drivers.
A programmable read-only memory (PROM) is an advanced memory frame where
each bit setting is locked by a fuse or anti-fuse. It is a type of ROM with
unchangeable data, used in various electronic devices for simple programming.
Applications of PROM
Mobile Phones for giving Client Particular Selections.
Implantable Restorative devices.
Radio-Frequency Identification (RFID) tags.
High definition Multimedia Interfaces(HDMI)
Characteristics of PROM
It has programmable random access memory
In prom And gates are fixed and or gates are programmable
Prom Works as a memory
It is not reusable.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 28
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
EEPROM
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 29
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
The parallel EEPROM chip is compatible with both EPROM and flash memory
devices. Its data transfer mechanism is faster and more reliable than the mechanism
in serial EEPROM. However, it has a larger pin count, which increases its size,
density and cost. For these reasons, parallel EEPROM is not as widely used as serial
EEPROM or flash memory.
Advantages and disadvantages of EEPROM
One of the biggest advantages of EEPROM is that it can be reprogrammed multiple
times. The stored data is non-volatile and can be erased on a byte-by-byte basis.
And, since the erasure happens electrically, it is almost instantaneous. Unlike
EPROM, EEPROM chips do not have to be removed from the computer to be
modified.
Despite these advantages, EEPROM also has some disadvantages. It is more
expensive than PROM and EPROM, and it has limited data retention time. Further,
cost may be a drawback for systems using serial EEPROM chips
Magnetic Tapes
In magnetic tape only one side of the ribbon is used for storing data. It is sequential
memory which contains thin plastic ribbon to store data and coated by magnetic
oxide. Data read/write speed is slower because of sequential access. It is highly
reliable which requires magnetic tape drive
writing and reading data. The width of the
ribbon varies from 4mm to 1 Inch and it has
storage capacity 100 MB to 200 GB.
Application Areas of Magnetic Tapes
Serial or sequential processing.
Backing up data on tape is very cheap.
It is applicable for the transfer of data
between multiple machines.
It is suitable for the storage of a large
volume of data.
Let‘s see various advantages and disadvantages of Magnetic Tape memory.
Advantages
These are inexpensive, i.e., low cost memories.
It provides backup or archival storage.
It can be used for large files.
It can be used for copying from disk files.
It is a reusable memory.
It is compact and easy to store on racks.
Disadvantages
Sequential access is the disadvantage, means it does not allow access
randomly or directly.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 30
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
It requires caring to store, i.e., vulnerable humidity, dust free, and suitable
environment.
It stored data cannot be easily updated or modified, i.e., difficult to make
updates on data.
Magnetic Disk
A magnetic Disk is a type of secondary memory that is a flat disc covered with a
magnetic coating to hold information. It is used to store various programs and files.
The polarized information in one direction is represented by 1, and vice versa. The
direction is indicated by 0. Magnetic disks are less expensive than RAM and can
store large amounts of data, but the data access rate is slower than main memory
because of secondary memory. Data can be modified or can be deleted easily in the
magnetic disk memory. It also allows random access to data.
Cartridge Tapes
Tape Cartridges are an essential type of storage device that are used to store
different kinds of data. They consist of a spool of magnetic tape that is packaged in
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 31
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
cassettes and cartridges. These cartridges are designed to fit into compatible
audio/video recorders or computer systems. When used in computing, a tape
cartridge is the magnetic tape storage cartridge used in tape library units to store
digital data on magnetic tape.
Tape cartridges store data on magnetic tape.
Inserted into tape drives for sequential reading and writing.
Locating specific files can be time-consuming due to sequential access.
Capable of storing large amounts of data, suitable for corporate and
multimedia files.
Commonly used for backups and archival purposes.
Reliable and cost-effective for long-term data storage.
Require compatible audio/video recorder systems or computer systems for
proper use.
Backup systems with tape libraries are essential for long-term data
management.
Tape cartridges are efficient for ensuring data is backed up and easily
retrievable.
Hard Disk
The hard disc drive is the main hardware in a computer that stores data. Most files,
including the operating system and programme
titles, are kept on the hard disc drive.
Components of Hard Disk Drives
Actuator
Supports and moves read/write heads to
the correct track on the platter.
Modern HDDs use voice coil actuators for
precise positioning.
Read-write Heads
Each platter has a corresponding
read/write head that hovers above its
surface.
Retrieves and stores data on the platters.
Actuator arm moves the heads across the platter for access.
Central Spindle
Rotates the platters at consistent speeds (typically 5,400 to 15,000 RPM).
Magnetic Platter
Stores data in binary form.
Made of aluminium or glass with a magnetic coating.
Holds data through magnetic patterns.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 32
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Power Connectors
Connect HDDs to the computer‘s power source.
Modern drives use SATA power connectors.
Circuit Board (PCB)
The HDD's control system.
Contains software for data access and error correction.
Connects to the computer interface (SATA/IDE).
Data Connector
Connects the HDD to the power supply and interface.
SATA connectors are common in modern HDDs.
Small Spindle
Moves the read-write arm across the platter surface.
Larger drives have multiple platters, each with two read-write heads.
Features of Hard Disk Drives
Data Storage
HDDs use magnetic platters to store data as magnetic patterns.
Data is accessed by read/write heads moving over the spinning platters.
Capacity
Available in a range from a few GB to several TB.
Capacity depends on the number of platters and their data density.
Speed
Slower than SSDs due to mechanical movement of read/write heads, causing
latency.
Durability
Prone to mechanical failure from physical shock, drops, or vibrations due to
moving parts.
Less durable than SSDs.
Price
More cost-effective per gigabyte than SSDs, making them ideal for large
storage needs.
Noise and Heat
Generates noise from spinning platters and moving heads.
Produces heat, requiring proper ventilation.
Power Consumption
Consumes more power than SSDs because of its mechanical components.
Applications
Used for storing large files, running operating systems, and in NAS devices
for backups and data sharing.
Regular backups are important to prevent data loss from potential mechanical
failure.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 33
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Floppy Disks
Floppy disks also known as floppy diskettes, floppy disks or floppy disks, are a type
of storage medium that can read data storage information and are used to store
electronic data.
Usage of Floppy Disk
Floppy disks were the sole means to install new software and create data
backups on early computers as they lacked USB and CD-ROM (compact disk
read-only memory) drives.
Installing the program from a single 3.5″ floppy disk was possible if it was
small—less than 1.44 MB. Nonetheless, diskettes were often needed because
the majority of programs were bigger than 1.44 MB.
Users also frequently stored and backed up their files on floppy disks.
A word processing file, for instance, may be saved as a backup or transferred
to a floppy disk and used on a different machine.
How Does a Floppy Disk Work?
Data is magnetically stored on the circular platter surface of a floppy disk.
A read/write head within the drive reads data that has been encoded onto the
platter by moving over it.
After that, the drive converts these bits into text, images, or music that the
computer‘s CPU can understand.
The magnetic polarity used by the read/write head is either 0 or 1.
The computer can interpret this as binary data and determine what is on the
platter.
The read/write head aligns the magnetic polarities so that the computer may
write data to the platter—0s and 1s that can be decoded by another device
later on.
Types of Floppy Disk
8-inch Drive: The First ever floppy design to be adopted as a read-only format
before being able to read and write which was introduced in the early 1970s
was 8-inch Drive. The physical characteristic that permitted the floppy drive
series its name was floppy.
Zip Drive: The Zip drive was introduced by Iomega Corporation. Since zip
drives were peripheral, they were primarily able to enhance an already-
existing system. Due to its high cost, this drive was not widely utilized and
never really took off as a storage device.
3.5″ Drive: 3.5″ Drive is another kind of floppy disk. Conversely, a 3.5′′ drive is
typically found in desktop computers and servers and has a bigger diameter
of 3.5 inches.
5.25″ Drive: A 5.25″ is a floppy disk drive that was a common computer
accessory. During the early nineties, computers with capacities ranging from
360 kilobytes to 1.2 gigabytes were also armed with floppy disk drives.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 34
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Optical Disks
Optical Disk is a storage medium that relies on laser technology to read and write
data, in shape, it is a flat circular disk which is made up of polycarbonate or a similar
material with a very shiny reflective layer on the surface. They are mainly used for
sharing, storing and backup Data as they have a great life span and capacity
compared to older technologies like floppy disks.
Applications of Optical Disk
Data Security: Securely store backups and archives for businesses and individuals,
offering long-term preservation and resistance to magnetic fields.
Software Distribution: A reliable and cost-effective way to distribute large
programs, especially in areas with limited internet access.
Data Transfer: Share big files offline, ideal for transferring between devices without
relying on online platforms.
Medical Imaging: Optical disks find its use in High-resolution scans like X-rays and
CT scans as they look at it as a secure storage option.
Educational Resources: in the world of Interactive learning materials optical disks
find its use and make the offline access for education possible.
Offline Navigation: GPS data and maps for car navigation systems often use optical
disks as result they offer reliable guidance even when cellular networks are not
available.
Type of Optical Disk
Compact Disc (CD)
Compact disk are Optical Disk which are used mainly for storing music , software
and compact data on average they offer storage capacity of 400 to 800 MB.
Digital Versatile Disc (DVD)
Digital Versatile Disc are Optical Disk which are used mainly for storing movies,
games, and larger data files , they hold storage capacity of 4.7 GB - 18 Giga-byte
(GB).
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 35
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Zip Drive
The zip drive looks similar to floppy disk drives. The external zip drivers are about 2
inches thick and 4.5 inches wide. There‘s also 5-6 inches long. Internal zip drives, on
the other hand, are larger and thicker. Most zip disks hold about 100 MB of storage.
How Does Zip Drive Work?
A zip drive system contains a zip disk and slot for the zip disk. Apart from a large
storage capacity, a zip drive offers a high data transfer rate. Data moves fast between
the computer‘s internal storage and the disk. Hence, seek time refers to the time it
takes to find a location on the disk to write or read data. It would help if you
connected to the computer to read or write data on the zip drive. Then, you install
the internal drive directly inside the computer case like you would with an optical
drive.
You cannot easily remove it by connecting it to the computer motherboard. On the
other hand, the external zip drive comes in a separate casing and connects to the
computer using a connector cable. While some use a parallel port connection, others
utilize a USB connection. The zip drives that use a parallel port connection require a
separate power supply to be used.
The Zip drive disk system came with a drive which had a slot, or port, for Zip disks
to be inserted into in order for the computer system to read them. The Zip disk
included with the system allowed the user to download and store 100 MB of data
that could then be removed from the Zip drive and transported, inserted, and read
on any other computer that also had a Zip drive. As the technology became more
advanced, Zip disks with 250 MB and 750 MB storage were eventually sold. The Zip
drive used multiple interfaces, including the following:
IDE
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 36
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
ATAPI
USB 1.1 and 2.0
IEEE 1284 and 1394
Plus
SCSI
These different interfaces, or software and hardware mechanisms, allowed
communication between the computers, drive or disk reader, and Zip disk.
Additionally, the systems had driver support for DOS, Microsoft Windows,
Macintosh, Linux, and other operating systems.
Flash Drives
A flash drive, or USB drive, is a portable storage device using NAND flash memory
technology. It offers compact and durable data storage with plug-and-play
functionality, diverse storage capacities, and USB 3. 0/3. 1 standard.
Key Features and Functionality
Flash Drive is praised for its simplicity, portability, and durability, becoming
integral in storing and transporting data efficiently, making it special in everyone's
life.
Compact Design and Portability
The flash drive The Little Wonder is compact and portable, with a small circuit
board and protective shell. Its USB connector allows for easy storage in pockets, on
keychains, or in bags.
Plug-and-Play Functionality
Flash Drives are known for their plug-and-play functionality, which eliminates the
need for installation or drivers. This feature makes them universally compatible with
various devices.
Don't contain any Moving Parts
Flash drives, unlike traditional hard drives, work on NAND flash memory chips
without moving parts. This enhances durability and improves access speed to data.
NAND Flash Memory Technology
Flash Drives utilize NAND flash memory, a nonvolatile technology ensuring data
retention without power. Renowned for speed and reliability, making them popular
for personal and professional use.
Robust and Durable
Flash drives are durable due to lack of delicate parts and protective casing, ensuring
data retention even through daily use.
Applications of Flash Drive
Portable Storage for Students and Professionals: flash drive work as a portable
storage due to its compact size it allows Students and Professionals to carry essential
documents, presentations, and project files in their pockets .
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 37
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Data Backup and Transfer: flash drives are regularly used for backing up important
data or transferring files between computers.
Bootable Drives for Operating System Installation and Repair: due to the factors
like portability and reusability, flash drives have become a preferred choice for
technicians and users dealing with computer system management and hence are
used in Installation and Repair of Operating System.
Running Antivirus Scans and System Recovery: by load antivirus software onto a
flash drive user can create a portable toolkit for scanning and cleaning infected
systems and additionally, flash drives are utilized for system recovery purposes.
Secure Storage of Sensitive Data: For users concerned about data security, flash
drives arrive with many built-in encryption features which provide a secure means
of storing sensitive information.
Working of Flash Drive
A flash drive also known as a USB drive or thumb drive, is based on NAND flash
memory technology working of flash drive involves various components and
process which work together to store, retrieve, retain and manage data. The data is
written, read, and managed on the flash drive lets discuss Read, Write, and Erase
Operations:-
Write Operation: when data is written in a flash drives programming of memory
cells is managed by adjusting the electron charge levels within them and this process
happen at page level, and new data over write the existing content.
Read Operation: data is read from the flash drive by measuring the electrical charge
within memory cells using which we can determine the stored information, the
control circuitry retrieves the data and send the data to the connected device from
where user get access to their files.
Erase Operation: the process of erasing of data require to clear entire block of
memory cell , this process is mandatory when new data is needed to be written but
the existing blocks are already filled , different from reading and writing erasing is
the most time-consuming operation.
Controller and Interface: each flash drive contains a controller which is responsible
for managing the flow data between USB interface and NAND flash memory. the
USB(Universal Serial Bus) interface allow flash drives to connect the drive to other
devices which are computers, laptops or any other compatible USB-enabled devices.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 38
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
UNIT-IV
Software: Software and its needs, Types of S/W. System Software:
Operating System, Utility Programs Programming Language:
Machine Language, Assembly Language, High Level Language their
advantages & disadvantages. Application S/W and its types: Word
Processing, Spread Sheets, Presentation, Graphics, DBMS s/w
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 39
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Utility Software
Definition: Programs that help manage, maintain, and control computer resources,
including antivirus, backup software, and disk management tools.
Need: Utility software is essential for optimizing performance, securing data, and
ensuring system health by managing resources effectively.
Network Software
Software that facilitates network connectivity and data exchange, such as routers'
firmware and virtual private network (VPN) software.
Need: It enables communication across networks, supports data sharing, and
provides secure connections, which is critical for both personal and organizational
communication.
System Software
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 40
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
often has no direct connection to the hardware it runs on. System software also must
support other programs that depend on it as they evolve and change.
Examples of System Software
System software is a type of computer program that is designed to run a computer‘s
hardware and application programs and examples of system software include
operating systems (OS) (like macOS, Linux, Android, and Microsoft Windows),
game engines, search engines(like google,Bing,Yahoo!), industrial automation,
computational science software, and (SaS)software as a service applications.
Operating System
Operating System a type of system software. It basically manages all the resources of
the computer. An operating system acts as an interface between the software and
different parts of the computer or the computer hardware. The operating system is
designed in such a way that it can manage the overall resources and operations of
the computer. Examples of Operating Systems are Windows, Linux, Mac OS, etc.
The Operating System provides a user with an interface that makes any application
attractive and user-friendly. The operating System comes with a large number of
device drivers that make OS services reachable to the hardware environment. Each
and every application present in the system requires the Operating System. The
operating system works as a communication channel between system hardware and
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 41
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
system software. The operating system helps an application with the hardware part
without knowing about the actual hardware configuration. It is one of the most
important parts of the system and hence it is present in every device, whether large
or small device.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 42
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
The operating system provides mechanisms for backing up data and recovering it in
case of system failures, errors, or disasters.
Time-Sharing:
The operating system enables multiple users to share a computer system and its
resources simultaneously by providing time-sharing mechanisms that allocate
resources fairly and efficiently.
Error-detecting Aids:
These contain methods that include the error messages, and other debugging and
error-detecting methods.
Examples of Operating Systems
Windows (GUI-based, PC)
GNU/Linux (Personal, Workstations, ISP, File, and print server, Three-tier
client/Server)
macOS (Macintosh), used for Apple‘s personal computers and workstations
(MacBook, iMac).
Android (Google‘s Operating System for smartphones/tablets/smartwatches)
iOS (Apple‘s OS for iPhone, iPad, and iPod Touch)
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 43
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Storage device management utility programs provide solutions for enhancing disk
capacity, such as disk clean-up, partition management, formatting, disk space
allocation, defragmentation, etc. With the help of them, users can compartmentalize
systems and external drives for efficient management of programs and files that are
stored within.
Miscellaneous Utilities
Apart from these three utility program categories, various other programs help in
managing business operations. Some of these programs include data generators,
HTML checkers, and hex editors, to name a few.
Need Utility Program
There are different functions served by the Utility program. Some of them are
system maintenance, efficiency, security, data recovery, and user experience
System Maintenance
It encompasses a diverse set of tools and applications that help users manage and
uphold their computer systems, enabling them to enhance system performance. This
helps eliminate unnecessary files and programs and ensures the smooth operation of
their system.
Security Integrates tools like antivirus and encryption software to enable users to
shield their computer systems from security risks or threats like viruses, malware,
and unauthorized access.
Efficiency
Utility software helps optimize system performance, streamlining routine tasks such
as disk cleanup, file compression, and data backup. This in turn reduces the time
and effort required to perform routine tasks.
Data Recovery
Backup and recovery tools of utility programs assist users in retrieving lost or
deleted data in the event of system failure or data loss.
User Experience
Utility software enables users to customize their system settings and preferences,
enhancing their overall user experience.
Machine Language
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 44
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Assembly Language
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 45
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Registers: Registers are the fast memory locations situated inside the processor.
Which helps ALU to perform arithmetic operations and temporary storing of data.
Example: Ax (Accumulator), Bx, Cx.
Command: An instruction in assembly code known as a command informs the
assembler what to do. Assembly language instructions typically employ self-
descriptive abbreviations to make the vocabulary simple, as ―ADD‖ for addition and
―MOV‖ for data movement.
Instructions: Instructions are the mnemonic codes that we give to the processor to
perform specific tasks like LOAD, ADDITION, MOVE. Example: ADD
Labels: It is a symbolic name/identifier given to indicate a particular location or
address in the assembly code. Example: FIRST to indicate starting of execution part
of code.
Mnemonic: A mnemonic is an acronym for an assembly language instruction or a
name given to a machine function. Each mnemonic in assembly corresponds to a
specific machine instruction. Add is an illustration of one of these machine
commands. CMP, Mul, and Lea are among further instances.
Macro: Macros are the program codes that can be used anywhere in the program
through calling it once we define it. And it is often embedded with assemblers and
compilers. We should define it using a directive %macro.
Operands: These are the data or values that we are given through instruction to
perform some operation on it. Example: In ADD R1,R2 ; R1 and R2 are operands.
Opcode: These are the mnemonic codes that specify to the processor which operation
has to be done. Example: ADD means Addition.
Advantages of Assembly Language
It provides precise control over hardware and hence increased code
optimization.
It allows direct access to hardware components like registers, so it enables
tailored solutions for hardware issues.
Efficient resource utilization because of low level control, optimized code,
resource awareness, customization etc.
It is ideal for programming microcontrollers, sensors and other hardware
components.
It is used in security researches for finding security vulnerabilities, reverse
engineering software for system security.
It is very essential for the making the operating systems, kernel and device
controllers that requires hardware interaction for its functionality.
High-level languages are programming languages that are used for writing
programs or software that can be understood by humans and computers. High-level
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 46
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
languages are easier to understand for humans because they use a lot of symbols
letters phrases to represent logic and instructions in a program. It contains a high
level of abstraction compared to low-level languages.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 47
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Ruby: Ruby is used for web development, and web applications it is known for its
elegant syntax and awesome frameworks such as Rails.
JavaScript: JavaScript is used with HTML or other languages for making the web
design interactive and dynamic. Its library helps create multipurpose web
applications.
Advantages of High-Level Languages
The biggest advantage of using high-level languages is that they are easy to
understand, remember, learn, write codes, to debug.
There are different libraries available that can be used for development, many
defined operators, data types, and frameworks also reduce the amount we
need to write.
They are portable to use, which means we can use their code for different
platforms without much modification.
It provides a higher level of abstraction, which means it hides the
complexities of hardware from the programmer. You don‘t need to know
about hardware before writing a program.
Disadvantages of High-level Languages
High-level languages are slower as compared to low-level languages because
there is more level of abstraction with hardware so they require more
processing and more memory for execution
High-level languages have less control over hardware, because of the
complexities of hardware for the programmer in high-level languages.
For the maximum utilization of hardware or CPU in terms of
performance low-level languages are best.
Application Software
Application software (App) is a kind of software that performs specific functions for
the end user by interacting directly with it. The sole purpose of application software
is to aid the user in doing specified tasks.
Functions of Application Software
Application software programs are generally designed and developed to help
with a wide range of tasks. Here are a few examples:
Software for healthcare applications for seamless connectivity and quick
response
Managing information and data in an organization
Managing and checking documents across
Software for educational purposes such as Learning Management Systems
and e-learning systems
Development of visuals and video for presentation purposes
Emails, text messaging, audio and video conferencing involved in
presentation
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 48
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Word Processing
The word ―word processor‖ means it processes words with pages and paragraphs.
Word processors are of 3 types which are electronic, mechanical, and software. The
word processing software is used to apply the basic editing and design and also
helps in manipulating the text to your pages whereas the word processor is a device
that provides editing, input, formatting, and output of the given text with some
additional features. It is a type of computer software application or an electronic
device.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 49
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 50
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
It is time-saving.
It is dynamic in nature for exchanging the data.
It produces error-free documents.
Provide security to our documents.
Spreadsheet
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 51
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Lists: Spreadsheets are also used to create lists like grocery lists, to-do lists,
contact detail, etc.
Hotels: Spreadsheets are also used in hotels to manage the data of their
customers like their personal information, room numbers, check-in date,
check-out date, etc.
Components of Spreadsheets
Title Bar: The title bar displays the name of the spreadsheet and application.
Toolbar: It displays all the options or commands available in Excel for use.
Name Box: It displays the address of the current or active cell.
Formula Bar: It is used to display the data entered by us in the active cell.
Also, this bar is used to apply formulas to the data of the spreadsheet.
Column Headings: Every Excel spreadsheet contains 256 columns and each
column present in the spreadsheet is named by letters or a combination of
letters.
Row Headings: Every Excel spreadsheet contains 65,536 rows and each row
present in the spreadsheet is named by a number.
Cell: In a spreadsheet, everything like a numeric value, functions, expressions,
etc., is recorded in the cell. Or we can say that an intersection of rows and
columns is known as a cell. Every cell has its own name or address according
to its column and rows and when the cursor is present on the first cell then
that cell is known as an active cell.
Navigation buttons: A spreadsheet contains first, previous, next, and last
navigation buttons. These buttons are used to move from one worksheet to
another workbook.
How to Create a New Spreadsheet or Workbook
To create a new spreadsheet follows the following steps:
Step 1: Click on the top-left, Microsoft Office button and a drop-down menu
appear.
Step 2: Now select New from the menu.
Step 3: After selecting the New option a New Workbook dialogue box will
appear and then in Create tab, click on the blank Document.
How to Save the Workbook
In Excel we can save a workbook using the following steps:
Step 1: Click on the top-left, Microsoft office button and we get a drop-down
menu:
Step 2: Now save or Save As are the options to save the workbook, so choose
one.
Save As: To name the spreadsheet and then save it to a specific location. Select
Save As if you wish to save the file for the first time, or if you want to save it
with a new name.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 52
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Save: To save your work, select Save/ click ctrl + S if the file has already been
named.
Presentation
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 53
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
By default, when we open PowerPoint for the first time, it opens to a new
presentation but for future purposes,
if we want to open a new presentation, we can do so by following the below-
given steps.
Click on New Presentation link on Getting Started pane on the left which
results in the appearance of a new window.
Select on Blank Presentation, when the new presentation appears along with
it a Layout pane on the right will also appear.
Select any desired layout from the list.
Uses of PowerPoint
Education
Since PowerPoint offers the feature of adding images and animations,
learning by visualisation makes the learning experience more fun and
simplified, and researchers state that visual information is retained for a
longer amount of time thus it makes the whole process more beneficial.
Business:
Business is mainly about creating a well-laid out roadmap and planning for
the project at hand and then executing it. With PowerPoint we can assure a
more organised output with a solid structure.
Government and Citizen Services
PowerPoint is also a good option, from other software bundled within MS
Office, for storing records and since it's also printable, it provides easy access
to the records for government and citizen services to the seekers.
Graphics
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 54
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 55
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
DBMS Software
DBMS is database management system. Databases are the collection of data in order
to store and retrieve data. The database consists of data which can be a numeric,
alphabetic and also alphanumeric form. Analyzing data is a key feature of database
management system that is DBMS. DBMS allows the definition, creation, querying,
update, and administration of databases. Language supported and widely used for
querying and accessing the database is SQL.
The core of any database management system is the data itself. Another important
aspect regarding DBMS is the difference between data and information.
Data: It is the unorganised facts which need to be compiled to form
meaningful information
Information: Once the data is processed and made into a structured context,
it is called information.
Components of DBMS:
Tuple: The rows in the database are often known as tuples.
Table: Table is a collection of tuples and related information along with a key
to distinguish the data. Although a table can have duplication of data tuples.
Schema: Schema is the structure of the relation or a table.
Data redundancy: Data redundancy ensures there are no multiple occurrences
of same data hence avoids data duplication.
Keys: Keys in a table are used to identify the unique attribute of the table.
Need for Databases
Efficient Data Management:
Need: Organizes large amounts of data systematically, making it easier to
retrieve, update, and manage information.
Benefit: Reduces time and effort required to handle and process data.
Data Integrity:
Need: Ensures that data is accurate, consistent, and reliable.
Benefit: Minimizes errors and maintains the quality of data over time.
Data Security:
Need: Protects sensitive data from unauthorized access and breaches.
Benefit: Safeguards confidential information and complies with legal and
regulatory requirements.
Concurrent Access:
Need: Allows multiple users to access and work with the database
simultaneously without conflicts.
Benefit: Facilitates teamwork and collaboration in real-time.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 56
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Scalability:
Need: Supports the growth of data and the increasing complexity of data
management needs.
Benefit: Ensures that the database can handle expanding amounts of
information and user demands.
SQLCommands
SQL commands are instructions used to communicate with the database to perform
specific task that work with data. SQL commands can be used not only for searching
data from the database but also to perform various other functions, e.g. you can
create tables, add data to tables or modify data, drop the table, set permissions for
users. SQL commands are grouped into four major categories depending on their
functionality.
Data Definition Language (DDL) These SQL commands are used for creating,
modifying and dropping the structure of database objects. The commands are
CREATE, ALTER, DROP, RENAME, TRUNCATE and COMMENT.
Data Manipulation Language (DML) These SQL commands are used for
storing, retrieving, modifying and deleting data. These commands are
SELECT, INSERT, UPDATE and DELETE.
Transaction Control Language (TCL) These SQL commands are used for
managing changes affecting the data. These commands are COMMIT,
ROLLBACK and SAVEPOINT.
Data Control Language (DCL) These SQL commands are used for providing
security to database objects. These commands are GRANT and REVOKE
Type of DBMS
There are majorly four types of database:
Network Database: When the details of multiple members can be linked to
the files of multiple owners and vice versa, it is called a network database.
Hierarchical Database: When the data stored in the form of records and is
connected to each other through links is called hierarchical database. Each
record comprises fields and each field comprises only one value.
Relational Database: When the data is organised as a set of tables comprising
rows and columns with a pre-defined relationship with one another, it is
called a relational database.
Object-oriented Database – the information is represented as objects, with
different types of relationships possible between two or more objects. Such
databases use an object-oriented programming language for development.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 57
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
UNIT-V
Operating System: Functions, Measuring System Performance,
Assemblers, Compilers and Interpreters. Batch Processing,
Multiprogramming, Multi Tasking, Multiprocessing, Time Sharing,
DOS, Windows, Unix/Linux
Memory Management
It is the management of the main or primary memory. Whatever program is
executed, it has to be present in the main memory. Main memory is a quick storage
area that may be accessed directly by the CPU. When the program is completed, the
memory region is released and can be used by other programs. Therefore, there can
be more than one program present at a time. Hence, it is required to manage the
memory.
Processor Management/Scheduling
Every software that runs on a computer, whether in the background or in the
frontend, is a process. Processor management is an execution unit in which a
program operates. The operating system determines the status of the processor and
processes, selects a job and its processor, allocates the processor to the process, and
de-allocates the processor after the process is completed. When more than one
process runs on the system the OS decides how and when a process will use the
CPU. Hence, the name is also CPU Scheduling.
Device Management
An operating system regulates device connection using drivers. The processes may
require devices for their use. This management is done by the OS. The OS:
Allocates and deallocates devices to different processes.
Keeps records of the devices.
Decides which process can use which device for how much time.
File Management
The operating system manages resource allocation and de-allocation. It specifies which
process receives the file and for how long. It also keeps track of information, location,
uses, status, and so on. These groupings of resources are referred to as file systems.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 58
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Storage Management
Storage management is a procedure that allows users to maximize the utilization of
storage devices while also protecting data integrity on whatever media on which it
lives. Network virtualization, replication, mirroring, security, compression,
deduplication, traffic analysis, process automation, storage provisioning, and memory
management are some of the features that may be included. The operating system is in
charge of storing and accessing files. The creation of files, the creation of directories, the
reading and writing of data from files and directories, as well as the copying of the
contents of files and directories from one location to another are all included in storage
management.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 59
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Assemblers
We can create an assembly language code using a compiler or, a programmer can
write it directly. Mostly, programmers use high-level languages but, when more
specific code is required, assembly language is used. It uses opcode for the
instructions. An opcode basically gives information about the particular instruction.
The symbolic representation of the opcode (machine level instruction) is called
mnemonics. Programmers use them to remember the operations in assembly
language.
Example
ADD A,B
Types of Assembler
Assemblers generate instruction. On the basis of a number of phases used to convert
to machine code, assemblers have two types:
One-Pass Assembler
These assemblers perform the whole conversion of assembly code to machine
code in one go.
Multi-Pass/Two-Pass Assembler
These assemblers first process the assembly code and store values in the
opcode table and symbol table. And then in the second step, they generate the
machine code using these tables.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 60
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
What is a Compiler?
A compiler is a software program that transforms high‐level source code that is
written by a developer in a high‐level programming language into a low level object
code (binary code) in machine language, which can be understood by the processor.
The process of converting high‐ level programming into machine language is known
as compilation.
What is an Interpreter?
An interpreter transforms or interprets a high‐level programming code into code
that can be understood by the machine (machine code) or into an intermediate
language that can be easily executed as well. The interpreter reads each statement of
code and then converts or executes it directly.
Difference between Compiler and Interpreter
Compiler Interpreter
Compiler works on the complete Interpreter program works
program at once. It takes the entire line‐by‐line. It takes one statement at
program as input. a time as input.
Compiler generates intermediate Interpreter does not generate
code, called the object code or intermediate object code or machine
machine code. code.
Compiler executes conditional Interpreter execute conditional
control statements (like if‐else and control
switch‐case) and logical constructs Statements at a much slower speed.
faster than interpreter.
Compiled programs take more Interpreter does not generate
memory because the entire object intermediate object code. As a result,
code has to reside in memory. interpreted programs are more
memory efficient.
Compile once and run anytime. Interpreted programs are interpreted
Compiled program does not need line‐by‐ line every time they are run.
to be compiled every time.
Errors are reported after the entire Error is reported as soon as the first
program is checked for syntactical error is encountered. Rest of the
and other errors. program will not be checked until the
existing error is removed.
A compiled language is more Debugging is easy because
difficult to debug. interpreter stops and reports errors as
it encounters them.
Compiler does not allow a program Interpreter runs the program from
to run until it is completely first line and stops execution only if
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 61
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Batch Processing
In batch operating system the jobs were performed in batches. This means Jobs
having similar requirements are grouped and executed as a group to speed up
processing. Users using batch operating systems do not interact with the computer
directly. Each user prepares their job using an offline device for example a punch
card and submits it to the computer operator. Once the programmers have left their
programs with the operator, they sort the programs with similar needs into batches.
A batch processing operating system (BPOS) is designed to handle and process large
volumes of data in batches, making it ideal for organizations that require efficient
and rapid data processing.
Features of Batch Processing Operating System
Batch OS is an operating system intended specifically for batch processing. It
contains a command line interface, a library for scheduling tasks, and a user
interface for managing tasks. Batch OS is designed to simplify the process of
handling and scheduling tasks across a network of computers.
Batch OS contains a library for scheduling tasks. This library permits tasks to be
scheduled in a ranked manner, which makes it easy to manage and schedule tasks
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 62
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
across a network of computers. The user interface permits users to view and manage
tasks in a graphical manner.
Advantages of Batch Operating System
The benefits of batch-processing operating systems include:
Resource Efficiency: These systems improve the use of computation
resources by processing jobs in groups and scheduling them during stages of
resource accessibility.
High Throughput: Batch processing systems can handle and complete a large
number of tasks quickly, confirming quick turnaround times and high
throughput.
Error Reduction: Since these systems work without requiring user
interference, they minimize the risk of faults that can occur with manual
processing.
Simplified Management: They restructure job management by automating
the submission, scheduling, and implementation of tasks.
Cost Efficiency: By producing well-organized use of resources and reducing
processing time and errors, batch processing systems can be a cost-effective
option.
Scalability: These classifications can manage a huge number of tasks, making
them scalable and appropriate for large organizations with significant data
processing needs.
Multiprogramming
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 63
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 64
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Multitasking
Multi tasking operating systems allow multiple users to perform multiple tasks at
the same time. The allocation of system resources such as input/output devices,
CPU and memory among processes can be easily managed by multi-tasking
operating system. There are various states through which a processor passes to
complete particular or multiple executions. Multitasking is the ability of an OS to
execute more than one task simultaneously on a CPU machine as shown in the
below diagram.
Types of Multitasking OS
Preemptive
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 65
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Cooperative
Preemptive - multitasking is a task that a computer operating system is given. It
determines how much time one job spends on the operating system before assigning
another process to use it. The operating system is also referred to as ‗preemptive‘
because it controls the entire operation.
Cooperative - multitasking is referred to as ‗Non-Preemptive Multitasking.‘ The
basic goal of cooperative multitasking is to complete the current work while
allowing another process to execute. taskYIELD is used to complete this task ().
Context-switch is called whenever the taskYIELD() function is called. Cooperative
multitasking was utilised by Windows and MacOS.
Multiprocessing
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 66
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Timesharing
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 67
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
I/O. This short period of time during which the user gets the attention of the CPU is
known as time slice, time slot, or quantum.
In the above figure the user 5 is active state but user 1, user 2, user 3, and user 4 are
in a waiting state whereas user 6 is in a ready state.
Active State – The user‘s program is under the control of the CPU. Only one
program is available in this state.
Ready State – The user program is ready to execute but it is waiting for its
turn to get the CPU. More than one user can be in a ready state at a time.
Waiting State – The user‘s program is waiting for some input/output
operation. More than one user can be in a waiting state at a time.
Features of Time-Sharing OS
Users can benefit from the following advantages provided by the time-sharing OS:
For all operations, each user sets aside time.
At the same time, multiple online users can utilise the same computer.
End users believe they have complete control over the computer system.
Interaction among users and computers is improved.
User inquiries can result in quick responses.
It is no longer necessary to wait for the previous task to complete before using
the processor.
It can do a large number of tasks quickly.
DOS
A DOS, or disk operating system, is an operating system that runs from a disk drive.
The term can also refer to a particular family of disk operating systems, most
commonly MS-DOS, an acronym for Microsoft DOS. MS-DOS Operating System also
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 68
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
called the Disk Operating system was developed by Microsoft for x86 personal
computers. It is a 16-bit operating system.
Working of MS-DOS
MS-DOS input and output occur at the command line in the form of issued
commands and system results of those commands. When booted, MS-DOS systems
display a command prompt. MS-DOS commands are then entered using a keyboard.
Commands are either one of the standard DOS commands, implemented as part of
the OS, or they are the file name of an executable program.
Although it does not natively support a GUI, MS-DOS can run graphical programs if
they are installed on a system disk or diskette. Users enter the command for a
graphical program, and the program takes control of the input and output devices.
When the program terminates, the control reverts to MS-DOS and the command
prompt reappears.
Features of MS-DOS Operating System
It is a minimalist OS which means it can boot a computer and run programs.
Still usable for simple tasks like word processing and playing games.
The mouse cannot be used to give inputs instead it uses basic system
commands to perform the task.
It is a 16-bit, free operating system.
It is a single-user operating system.
It is very lightweight due to fewer features available and no multitasking.
Types of MS-DOS Commands
There are mainly two types of MS-DOS commands:
Internal Commands
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 69
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Internal commands are those commands that are loaded automatically in the
memory when DOS is loaded into memory during the booting process. These
commands are easier to learn and use. They require no external files for their
storage as in the case of external commands. These are for performing a basic
operation on files and in directories. They do not need any external file support.
These commands are used for common jobs such as copying and erasing files.
External Commands
These external commands are for performing advanced tasks and they do not
need some external file support as they are not stored in COMMAND. The
external commands are used less frequently and are stored in some external files
which are stored in some secondary storage devices. Whenever an external
command is to be executed then the external file in which that particular
command is stored is transferred from the secondary storage disk to the main
memory(RAM).
Windows
Windows Operating System (OS) is a graphical user interface (GUI) based operating
system developed by Microsoft Corporation. It is designed to provide users with a
user-friendly interface to interact with their computers. The first version of the
Windows Operating System was introduced in 1985, and since then, it has
undergone many updates and upgrades. Windows Operating System is compatible
with a wide range of hardware and software applications, making it a popular
choice for both personal and business computing. It has a built-in security system to
protect the computer from malware and viruses and provides a comprehensive file
management system that makes it easy for users to organize and access their files.
Windows Operating System also allows users to run multiple applications
simultaneously, making it easy to work on multiple tasks at the same time.
Features of Windows Operating System
Control Panel: The control Panel is a centralized location within Windows
where users can manage various system settings, including security and
privacy, display, hardware and sound, and programs. It provides users with
access to a range of tools and settings, making it easy to customize the
Windows experience.
Internet Browser: An Internet Browser is a software application that allows
users to access and browse the Internet. Windows provides a built-in internet
browser called Microsoft Edge, which includes features such as tabbed
browsing, search suggestions, and web notes.
File Explorer: File Explorer is a file management tool that allows users to
browse, open, and manage files and folders on their computers. It provides a
user-friendly interface for users to view and manage files and includes
features such as search, copy, move, and delete.
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 70
Subject Code & Name: 23BCE1S1 - Fundamentals of Information Technology
Course, Year & Sem: B.Sc [CS], I & I
Dr.K.Rajiv Gandhi, Asst.Prof, Dept. Of CS, Govt. Arts & Science College For Women, Paramakudi Page 71
Primary memory is volatile, meaning it loses data when the power is off. It is directly accessible by the CPU and is more expensive than secondary memory. It consists of semiconductor memories like RAM and ROM. Secondary memory is non-volatile, retaining data without power, not directly accessible by the CPU, and less expensive. It uses magnetic and optical storage like hard disks and optical disks .
Optical disks offer excellent data security due to their resistance to magnetic fields and long lifespan, making them ideal for backups and archival storage. Compared to magnetic storage media, optical disks are less vulnerable to environmental factors. Their physical format is durable and enables secure transfer of large files, software distribution, and use in medical imaging for high-resolution data storage .
System efficiency is crucial in system software design as it impacts the performance and functionality of all applications running above it. Efficient system software optimizes hardware resource usage and ensures smooth operation of applications. Challenges include maintaining high speed, minimizing resource consumption, and ensuring compatibility with diverse hardware. Developers must also address security concerns and update software without degrading performance .
An operating system manages hardware resources through functions like memory management, processor management, device management, and file management. It allocates and manages memory, schedules and controls processor tasks, manages input/output devices with necessary drivers, and organizes the file system. It also ensures system security, handles networking capabilities, and provides backup and recovery solutions .
Floppy disks might be advantageous in scenarios requiring low-cost, small-capacity, and easily transportable data storage. Their non-volatility ensures data retention when powered off. They provide write protection features and can serve as boot disks. Despite modern alternatives, floppy disks are still useful for systems that need backward compatibility with legacy equipment or require simple and straightforward data archiving .
System software acts as a platform for running application software and is integral to managing computer hardware. It creates an interface between hardware and the end user, focusing on resource management and providing an environment for application software to function. This type of software is generally close to hardware and more challenging to manipulate due to its low-level nature. In contrast, application software provides user-centric functionalities and runs on top of the system software .
The zip drive, introduced by Iomega, was designed to enhance storage capacity beyond standard floppy disks. Despite its improved capacity and the ability to serve as an external storage option, the high cost and prevalence of competing technologies like CD-ROMs limited its adoption. The cost-to-benefit ratio did not favor the widespread use of zip drives compared to cheaper and more versatile alternatives .
SSDs offer several advantages over traditional hard drives (HDDs). They provide faster data access speeds and lower latency due to their lack of moving parts, making them more efficient for applications requiring high-speed data retrieval. SSDs also consume less power and generate less heat. In contrast, HDDs are more cost-effective per gigabyte and are suitable for large storage needs but are noisier, produce more heat, and consume more power due to mechanical components .
An operating system ensures secure data management by implementing security policies and mechanisms such as access controls, data encryption, and secure user authentication processes. It provides isolation between user and system processes to prevent malicious activities and manages file permissions and resource access. Additionally, OS updates include security patches that counter vulnerabilities, and regular system monitoring detects and responds to threats promptly .
Memory management is critical within an operating system as it determines how efficiently memory resources are allocated to processes. Effective memory management ensures fast access and retrieval, minimizing bottlenecks. It impacts system performance by allowing multiple processes to run simultaneously, optimizing usage through techniques like paging and segmentation, and preventing memory leaks and fragmentation .