1 Introduction to Computer System-ppt
1 Introduction to Computer System-ppt
Secondary Memory:
The primary storage is not able to store data permanently for
future use. So some other types of storage technology is
required to store the data permanently for long time, it is
called secondary or auxiliary memory.
Input & Output Device
Input Device:
Input devices are those devices which help to enter data into
computer system. E.g. Keyboad, Mouse, Touchscreen, Barcode
Reader, Scanner, MICR, OMR etc.
LASERJET PRINTER:
They uses laser technology to print documents. It produce high quality
printing at very high speed.
MONITOR
It is the primary output device where we
LED, LCD.
1. CRT(CATHODE RAY TUBE)
2. LCD(LIQUID CRYSTAL DISPLAY)
3. LED(LIGHT EMITTING DIODE)
MEMORY UNITS: Memory is used to store the data for later
reference. The smallest unit is bit, which mean either 0 or 1.
1 bit = 0 or 1
1 Byte = 8 bits
1 Nibble = 4 bits
1 Kilo Byte = 1024 Byte= 210 Byte
1 Mega Byte = 1024 KB= 210 KB
1 Giga Byte = 1024 MB= 210 MB
1 Tera Byte = 1024 GB= 210 GB
1 Peta Byte =1024 TB= 210 TB
1 Exa Byte =1024 PB= 210 PB
1 Zetta Byte = 1024 EB= 210 EB
1 Yotta Byte = 1024 ZB= 210 ZB
PRIMARY MEMORY
SECONDARY MEMORY
The primary storage is not able to store data permanently for
future use. So some other types of storage technology is
required to store the data permanently for long time, it is
called secondary or auxiliary storage.
EXAMPLES OF SECONDARY STORAGE
DATA DELETION AND ITS RECOVERY ,
SECURITY CONCERN
You can conveniently delete personal data stored in computer
system, survey responses, tickets, and contacts, no matter
where the data originated.
Examples of reasons for deleting the data are:
Freeing the disk space
Removing duplicate or unnecessary data to avoid confusion
Making sensitive information unavailable to others
Removing an operating system or blanking a hard drive
DATA RECOVERY
in computing, data recovery is a process of salvaging
(retrieving) inaccessible, lost, corrupted, damaged
or formatted data from secondary storage and
removable media or files, when the data stored in
them cannot be accessed in a normal way.
The most common data recovery scenario involves an
operating system failure, malfunction of a storage
device, logical failure of storage devices, accidental
damage or deletion, etc. (typically, on a single-drive,
single-partition, single-OS system), in which case the
ultimate goal is simply to copy all important files from
the damaged media to another new drive.
COMPUTER
It is also SECURITY
known as IT security, is the protection of
information systems from theft or damage to the
hardware, the software, and to the information on
them, as well as from disruption or misdirection of
the services they provide.
It includes controlling physical access to the hardware, as
well as protecting against harm that may come via
network access, data and code injection, and due
to malpractice by operators, whether intentional,
accidental, or due to them being tricked into
CONCERNS OF COMPUTER SECURITY
Computer Security is concerned with four main areas:
1.Confidentiality:- Only authorized users can access the data
resources and information.
2. Integrity:- Only authorized users should be able to modify the data
when needed.
3. Availability:- Data should be available to users when needed.
4. Authentication:- are you really communicating with whom you think
you are communicating with
SOFTWARE AND ITS TYPE
SOFTWARE: Software, simply are the computer programs. The
instructions given to the computer in the form of a program is
called Software. Software is the set of programs, which are
used for different purposes. All the programs used in computer
to perform specific task is called Software.
TYPES OF
SOFTWARE
1. SYSTEM SOFTWARE
The system software is a collection of programs designed to
operate, control, and extend the processing capabilities of the
computer itself.
These software products comprise of programs
written in low-level languages, which interact with the
hardware at a very basic level. System software serves as the
interface between the hardware and the end users.
Some examples of system software are Operating
System, Compilers, Interpreter, Assemblers, etc.
OPERATING SYSTEM
OPERATING SYSTEM ARCHITECTURE
FUNCTIONS OF OPERATING
SYSTEM
TYPES OF OPERATING
SYSTEM
SINGLE USER OS: As the name implies, this operating
system is designed to manage the computer so that one user
can effectively do one thing at a time.
MULTI USER OS: A multi-user operating system (OS) is a
computer system that allows multiple users that are on different
computers to access a single system's OS resources
simultaneously.
MULTI TASKING OS: Multitasking, is an operating system,
that allows a user to perform more than one
computer task (such as the multiple operation of an application
program) at a time. The operating system is able to keep track
of where you are in these tasks and go from one to the other
without losing information.
MULTI PROCESSING OS: Multiprocessing is
sometimes used to refer to the execution
of multiple concurrent processes in a system. A program in
execution is called process.