Computer Fundamentals Tutorial
Computer Fundamentals Tutorial
Audience
This tutorial has been prepared for beginners as well as advanced learners who
want to deal with computers. The tutorial is also very useful for undergraduate
students of computer science, engineering, business administration,
management, science, commerce and arts, where an introductory course on
computers is a part of curriculum.
After completing this tutorial, you will find yourself at a moderate level of
expertise in the knowledge of computer basics from where you can take yourself
to the next level.
Prerequisites
Knowledge of computers is not a prerequisite to follow the contents of this
tutorial. This tutorial assumes no background in Computers or Computer
programming.
Prepared by FBLaud
Computer - Overview
Today’s world is an information-rich world and it has become a necessity for
everyone to know about computers. A computer is an electronic data processing
device, which accepts and stores data input, processes the data input, and
generates the output in a required format.
Functionalities of a Computer
If we look at it in a very broad sense, any digital computer carries out the
following five functions −
Step 2 − Stores the data/instructions in its memory and uses them as required.
Advantages of Computers
Following are certain advantages of computers.
High Speed
• Computer is a very fast device.
Prepared by FBLaud
Accuracy
• In addition to being very fast, computers are very accurate.
• The calculations are 100% error free.
• Computers perform all jobs with 100% accuracy provided that the input is
correct.
Storage Capability
• Memory is a very important characteristic of computers.
• A computer has much more storage capacity than human beings.
• It can store large amount of data.
• It can store any type of data such as images, videos, text, audio, etc.
Diligence
• Unlike human beings, a computer is free from monotony, tiredness, and
lack of concentration.
• It can work continuously without any error and boredom.
• It can perform repeated tasks with the same speed and accuracy.
Versatility
• A computer is a very versatile machine.
• A computer is very flexible in performing the jobs to be done.
• This machine can be used to solve the problems related to various fields.
• At one instance, it may be solving a complex scientific problem and the
very next moment it may be playing a card game.
Reliability
• A computer is a reliable machine.
• Modern electronic components have long lives.
Prepared by FBLaud
Automation
• Computer is an automatic machine.
• Automation is the ability to perform a given task automatically. Once the
computer receives a program i.e., the program is stored in the computer
memory, then the program and instruction can control the program
execution without human interaction.
Disadvantages of Computers
Following are certain disadvantages of computers.
No I.Q.
• A computer is a machine that has no intelligence to perform any task.
• Each instruction has to be given to the computer.
• A computer cannot take any decision on its own.
Dependency
• It functions as per the user’s instruction; thus, it is fully dependent on
humans.
Environment
• The operating environment of the computer should be dust free and
suitable.
Prepared by FBLaud
No Feeling
• Computers have no feelings or emotions.
• It cannot make judgment based on feeling, taste, experience, and
knowledge unlike humans.
Due to the popularity and usage of computers, there is no shelter in saying that
today everyone has become dependent on them. There are some advantages and
disadvantages to computers.
Advantages of Computers
• Speed − Computers can execute programmes quickly. Thousands of
instructions can execute in milliseconds or seconds.
• Accuracy − Computers can perform very complex computations accurately
in a very short period of time. If a user inputs the correct input to the
computer, it gives accurate results that can be used in decision-making.
• Storage − Computers can store large amounts of data permanently. The
data is saved in files, which can be accessed at any time; these files are
saved for a long time period until a user deletes them.
• Power of Remembering − A computer stores data permanently. It forgets or
loses certain information only when asked to do so.
Prepared by FBLaud
Disadvantages of Computers
• Health Issues − Working long hours on computers leads to health issues.
Student's playing games and accessing related applications for long periods
of time cause serious health problems.
• Spread of Pornography − The growing trend of the internet has spread
pornography. In today's time, pornography is a big threat to society and
the youth.
• Virus and hacking attacks − Viruses are unwanted programmes that enter
computers through networks or the internet. These programmes may steal
information or damage computers. Sometimes these lock the application
programmes of the computer to affect its working.
• No IQ − Computers cannot make their own decisions. Its functioning
depends on human interventions.
• Negative effect on the environment − The increasing use of computers and
automated devices has posed a major threat to the environment.
• Crashed Networks − Hackers may destroy the network, which affects the
overall working of the existing system. In today’s time, most of the data is
Prepared by FBLaud
Classification of Computers
A computer can be classified based on its size, capacity, and purpose. The
following diagram illustrates different types of computers as per their size,
capacity, and purpose.
Prepared by FBLaud
• Micro Computer
• Mini Computer
• Mainframe Computer
• Super Computer
Micro Computer
and science, healthcare and medicine, home automation, remote work, and
e-commerce and online shopping.
Minicomputer
Mainframe computer
• Size − Mainframe computers can vary in size; their size generally depends
on their specifications and the specific model being considered.
• Example − Some of the popular mainframe computers are IBM zSeries
mainframes (BM z14 and IBM z15), Unisys ClearPath, Fujitsu GS21 Series,
and Hitachi VOS3.
• Why a mainframe computer?
The processing capacity of mainframes is frequently measured in MIPS
(million instructions per second) or other units. This enables them to
process a large volume of transactions and perform extensive data
processing.
• Uses of the Mainframe − Mainframe computers are most widely used in
finance, government, healthcare, and more.
Prepared by FBLaud
Supercomputer
• Analog Computer
• Digital computer
• Hybrid computer
Analog Computer
Digital Computer
Hybrid Computer
A hybrid computer is a type of computer system that integrates the features and
capabilities of both analogue and digital computers. This integration allows the
hybrid computer to perform various tasks efficiently by leveraging the strengths
of both digital and analogue technologies.
Prepared by FBLaud
The main components of a hybrid computer are the analogue and digital
components −
• Special Purpose
• General Purpose
Prepared by FBLaud
A computer that is designed and optimized for a specific task or set of tasks is
called a special purpose computer (SPC). SPCs are designed to excel at a single
or limited set of functions, frequently with a high degree of efficiency, speed, and
accuracy.
Computer - Applications
In this chapter, we will discuss the application of computers in various fields.
Business
Prepared by FBLaud
• Payroll calculations
• Budgeting
• Sales analysis
• Financial forecasting
Banking
Insurance
Insurance companies are keeping all records up-to-date with the help of
computers. Insurance companies, finance houses, and stock broking firms are
widely using computers for their concerns.
• Maturity date
• Interests due
• Survival benefits
• Bonus
Prepared by FBLaud
Education
Marketing
In marketing, uses of the computer are following −
Prepared by FBLaud
Healthcare
Following are some major fields of health care in which computers are used.
• Diagnostic System − Computers are used to collect data and identify the
cause of illness.
• Lab-diagnostic System − All tests can be done and the reports are prepared
by computer.
• Patient Monitoring System − These are used to check the patient's signs for
abnormality such as in Cardiac Arrest, ECG, etc.
• Pharma Information System − Computer is used to check drug labels, expiry
dates, harmful side effects, etc.
• Surgery − Nowadays, computers are also used in performing surgery.
Prepared by FBLaud
Engineering Design
One of the major areas is CAD (Computer Aided Design) that provides creation
and modification of images. Some of the fields are −
Military
Computers are largely used in defense. Modern tanks, missiles, weapons, etc.
Military also employs computerized control systems. Some military areas where
a computer has been used are −
• Missile Control
• Military Communication
• Smart Weapons
Communication
• E-mail
• Chatting
• Usenet
• FTP
• Telnet
• Video-conferencing
Government
Computers play an important role in government services. Some major fields in
this category are −
• Budgets
• Weather forecasting
Microprocessors and Personal reduced and the devices with large storage
Internet and World Wide Web as the features of the computers which makes
Generations of Computers
Speed
A computer can process millions (1,000,000) of instructions per second. The time
taken by computers for their operations is microseconds and nanoseconds.
Hence, a computer works with high speed during the execution of Mathematical
& logical computations.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due to
data inconsistency or inaccuracy. High accuracy indicates that a computer is
Prepared by FBLaud
performing its tasks correctly and producing reliable results. 100% accuracy
depends on algorithm, data quality, hardware connectivity, and inherent
uncertainties in the tasks being performed.
Diligence
A computer can perform millions of tasks or calculations with the same
consistency and accuracy. It doesn’t feel any fatigue or lack of concentration.
Hence, it can perform repetitive task without getting tired.
Versatility
Versatility refers to the capability of a computer to perform different kinds of
works with same accuracy and efficiency. Hence, a versatile computer can be
used for different purposes. A versatile computer can support Software
Compatibility, Operating System Support, Programming and Development, Multi-
Tasking, Internet Connectivity, Media Handling, Hardware Compatibility,
Customization, and can manage different types of applications and workloads.
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we
give same set of input any number of times, we will get the same result. Reliability
is important to ensure safety, data integrity, and continuous operation. Reliability
of a computer can be measured using Mean Time between Failures (MTBF), Mean
Time to Failure (MTTF), Mean Time to Repair (MTTR), Availability (proportion of
time a system is operational and accessible), and Failure Rate, Fault Tolerance
(continuity of functioning even in the presence of hardware or software faults).
Automation
Computer performs all the tasks automatically i.e. it performs tasks without
manual intervention. The main aim of automation is to improve efficiency,
Prepared by FBLaud
In digital world, data can be in various forms, such as text, numbers, images,
audio, and video. A computer may process and manipulate this data efficiently
and provides insightful results from text, numbers, images, audio, and video data.
The analytical results are used in decision making and useful to frame the
strategies for the organisations.
Connectivity
Multitasking
Modern computers are kept the data security, privacy of data to protect against
unauthorized access, data breaches, and cyberattacks. For example -Biometric
authentication, encryption, and secure boot protect the computer and user data.
Origin of Computing
Origins of computing refer to the historical origins and evolution of computing and
include the development of various technologies, theories, and concepts that
have laid the foundation for modern computing systems. The journey to the
origins of computing is a complex and fascinating story that spans centuries and
includes contributions from various fields such as mathematics, engineering, and
philosophy. Below are just a few highlights from the extensive timeline of the
origins of computing −
• Charles Babbage and Ada Lovelace − In the 19th century, Charles Babbage
(also known as father of computer) developed the idea of mechanical
computing devices known as the "Analytical Engine" Ada Lovelace; a
Mathematician has written the first computer program for Babbage's
machine.
• Alan Turing and the Turing Machine − Alan Turing, a British mathematician,
introduced the concept of the Turing machine, a theoretical model of
computation that forms the basis for modern computers.
• Electronic Computers − The development of electronic computers began in
the mid of 20th century. The ENIAC (Electronic Numerical Integrator and
Computer) was built during 1940s, considered as first general-purpose
electronic computers.
• Transistors and integrated circuits − The invention of the transistor in the late
1940s revolutionized computing by enabling the development of smaller,
faster, and more powerful devices.
• Personal computers and graphical user interfaces − The rise of the personal
computers has shown during 1970’s and 1980’s. During this phase; Steve
Jobs and Steve Wozniak founded Apple and introduced graphical user
interfaces with the Macintosh computer.
• Internet and networks − The ARPANET project in the late 1960s laid the
foundation for the modern Internet. The development of network protocols
and the World Wide Web (WWW) in the 1990’s changed the way
information accessing and shared it around the world.
• Open-source software development − The open-source software gained the
popularity and it’s usage during 1980- 1990s. A popular example of open
source software is Linux operating system which was developed by Linus
Torvalds.
• Artificial Intelligence and Machine Learning − The domain artificial intelligence
(AI), machine learning (ML) and deep learning (DL) have their roots during
20th century. Over time, advances in algorithms and computing power have
led to significant breakthroughs in AI applications.
Prepared by FBLaud
Here, below mentioned table summarizes the origins of computing as per the time
line when humans first started using tools to aid in calculation and data
processing.
1970s - Microprocessors and Microprocessor, like the Intel 4004, led to the
1980s Personal Computers development of affordable and compact computers.
1980s - Graphical User GUI based computing applications were Apple
1990s Interfaces and Macintosh and Microsoft Windows. These were made
Networking computers more user-friendly.
2000s - Mobile and Cloud The 21st century brought mobile computing as well as
Present Computing cloud computing services, which allow users to access
and store data remotely.
Computer - Generations
The development of computers has gone through different generations, each
generation marked by significant advancements in terms of technology and
architecture. These generations are classified as follows:
• First generation
• Second generation
• Third generation
• Fourth generation
• Fifth generation
First Generation
• The timeline for the first-generation computers was 1940 to 1956.
• The first-generation computers were developed using vacuum tube or
thermionic valve machine.
• Punched cards and paper tape were used as input/output.
• Magnetic drums and magnetic tapes were used as a memory device to save
the data.
Prepared by FBLaud
Second Generation
• The timeline for the second-generation computers was 1956 to 1963.
• Transistors were used to develop.
Prepared by FBLaud
Third Generation
• The timeline for the third generation computers was 1963 to 1971.
• Integrated Circuit (IC) was used to develop.
• In comparison to the second generation, third generation computers were
small in size.
• Magnetic tape, keyboard, monitor, printer devices were used as input and
output.
• The third generation computer consumed less power and also generated
less heat.
• The maintenance cost of the computers in the third generation was also
low as these were consuming less power and generated less heat.
• These were most widely used in commercial purposes.
• Examples − UNIVAC, IBM 360, IBM 370.
Fourth Generation
• The timeline for the fourth-generation computers was 1972 to 2010.
• Microprocessor technology was used to develop.
• These were surprising in terms of size and computing power.
• Portable computers.
• Very less power consuming and affordable.
• Semiconductor memory such as RAM, ROM were used which makes
computation faster.
• Keyboard, pointing devices, optical scanning, monitor, printer devices were
used for input and output.
• It became available for the common people as well.
• Examples − IBM PC, STAR 1000, Apple.
Prepared by FBLaud
Fifth Generation
• The timeline for the fifth-generation computers is form 2010 to till date.
• These computers are based on artificial intelligence, Ultra Large-Scale
Integration (ULSI), Quantum computation, Nanotechnology, Parallel
processing technology.
Types of Computers
The types of computers are as follows −
• Analogue computer
• Digital computer
Digital computers are further categorized as follows −
o Micro computer
o Mini computer
o Mainframe computer
o Super computer
• Hybrid computer
Analogue computer
Digital Computer
The digital computers are the type of computers that uses discrete data to
perform computations. The most common type of computers used today is digital
computers.
Prepared by FBLaud
Hybrid Computer
continuous and discrete data, hybrid computers play an important role. One
example of this is the processing of MRI and CT scan data.
• Weather Prediction − For the purpose of modelling the weather, hybrid
computers are used in the field of meteorology. This is due to the fact that
weather patterns require both on-going physical processes and intricate
numerical models.
• Complex Calculations − Hybrid computers can be useful in different kinds of
work, including simulations of nuclear reactors and studies of fluid
dynamics, which both combine real-time analysis and numerical
computations.
• Optimization Problems − Hybrid computers are used for solving optimization
problems that require both continuous adjustments and discrete decisions.
• Energy Efficiency − Hybrid computers may be more energy-efficient than
digital computers because they can outsource some computations to
analogue components, which may be more power-efficient for specific
duties.
Computer - Components
Computer systems consist of three components: Central Processing Unit, Input
devices and Output devices. Input devices provide data to the processor
(processing unit), which processes it and generates useful information that’s
displayed to the user through output devices. Output devices are used to show
the processed data to the user on computer screen or in print form. Below figure
depicts the major components of computer systems −
Prepared by FBLaud
The Central Processing Unit (CPU) is also known as "the brain of computer". It
controls operation of all components of a computer.
Control Unit
As its name implies, a control unit acts as the "brain" of the CPU. It executes
instructions and manages the flow of data inside the CPU to perform the tasks
specified by a computer program. It plays a pivotal role in the fetch-decode-
execute cycle, which is a fundamental process by which a CPU runs program
instructions.
• Pipeline Control (in pipelined CPUs) − The modern CPU’s are available with
pipeline designs; a CU controls the steps of the pipeline and makes sure
that instructions are processed quickly and safely.
• Synchronization − In the context of multi-core processors, a CU plays a
crucial role in facilitating the coordination of instruction execution across
several cores, hence guaranteeing the appropriate synchronisation and
maintenance of data consistency.
Functions of an ALU
• Arithmetic Operations − The ALU can perform basic arithmetic operations
such as addition, subtraction, multiplication, and division.
• Logic Operations − The ALU can also perform logical operations like AND,
OR, NOT, XOR, and bit-shifting operations.
• Comparison − The ALU can compare two binary values and determine
whether they are equal, greater than, or less than each other. This function
is most widely used in programming and sorting algorithms.
Memory Unit
A memory or storage unit is a hardware component which is used to store the
data and instructions and retrieve it whenever is required. Majorly computer
memory has categorized as temporary (RAM) and permanent memory (secondary
memory). RAM is used for short-term, fast data access and essential for active
Prepared by FBLaud
Functions of memory
• They are non-volatile in nature; the data remains intact even when the
power is get off or system restarts.
• The most popular and commonly used storage devices are Hard Disk (HDs),
Solid-State Drives (SSDs), USB flash drives, and optical disks (e.g., DVDs),
pen drives.
• The data storage capacity varies of these devices are in gigabytes (GB) to
terabytes (TB) and more, depending on the type and size of the storage
device.
Input devices
The devices which are used to give input to the computer system is known as
input devices.
Keyboard
Keyboard is a most common and very popular input device which helps to input
data to the computer. The layout of the keyboard is like a traditional typewriter,
although there are some additional keys provided for performing additional
Prepared by FBLaud
functions. There are different types of keyboards; each one has designed for
specific purposes.
Typists and gamers who demand accurate and enjoyable typing love these
switches because they give tactile and aural feedback.
• Ergonomic Keyboards − Typing for long periods of time can cause muscle
strain and discomfort; ergonomic keyboards are specifically designed to
alleviate these issues.
These include split keyboards and contoured keyboards, which are curved to fit
the natural hand posture.
• Gaming Keyboards − Gaming keyboards are optimized for gaming
performance.
Prepared by FBLaud
Laptops, tablets, and smart TVs utilize them for convenience and mobility.
• Virtual Keyboards − Software-based virtual keyboards are utilized on
smartphones and tablets. Tap or swipe virtual keys to enter text or
directions.
Prepared by FBLaud
Travelers and people who require a small keyboard may fold or wrap them up for
storage and transport.
Below table describes different keys on the keyboard and there are as follows −
4 Control keys − These keys provide cursor and screen control. It includes four
directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up,
Page Down, Control (Ctrl), Alternate (Alt), Escape (Esc).
5 Special Purpose Keys − Keyboard also contains some special purpose keys such as
Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
Mouse
• Trackball Mouse − Trackball mice have a stationary ball on top that users
may roll with their fingers or thumbs.
Movement controls the screen cursor. Trackball mice are utilized when space or
accuracy are restricted.
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its both lower and upper
ends. The lower spherical ball moves in a socket. The joystick can be moved in
all four directions.
Prepared by FBLaud
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed
menu item or draw pictures on the monitor screen. It consists of a photocell and
an optical system placed in a small tube.
When the tip of a light pen is moved over the monitor screen and the pen button
is pressed, its photocell sensing element detects the screen location and sends
the corresponding signal to the CPU.
Prepared by FBLaud
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers on
the ball, the pointer can be moved.
Since the whole device is not moved, a track ball requires less space than a
mouse. A track ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is
used when some information is available on paper and it is to be transferred to
the hard disk of the computer for further manipulation.
Prepared by FBLaud
Scanner captures images from the source which are then converted into a digital
form that can be stored on the disk. These images can be edited before they are
printed.
Digitizer
Digitizer is an input device which converts analog information into digital form.
Digitizer can convert a signal from the television or camera into a series of
numbers that could be stored in a computer. They can be used by the computer
to create a picture of whatever the camera had been pointed at.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.
Prepared by FBLaud
This reading process is called Magnetic Ink Character Recognition (MICR). The
main advantages of MICR are that it is fast and less error prone.
OCR is an input device used to read a printed text. OCR scans the text optically,
character by character, converts them into a machine-readable code, and stores
the text on the system memory.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value,
which is then fed to the computer that the bar code reader is connected to.
Output Devices
Following are some of the important output devices used in a computer.
• Monitors
• Graphic Plotter
• Printer
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output
device of a computer. It forms images from tiny dots, called pixels that are
arranged in a rectangular form. The sharpness of the image depends upon the
number of pixels.
Graphic Plotter
Computer graphics and engineering applications employ graphic plotters to create
high-quality, accurate, and detailed drawings or plots on paper or other media. It
draws continuous lines accurately and is suited for vector drawings, unlike a
standard printer. Key features of graphic plotters are as −
• Vector Graphics − Vector graphics allow graphic plotters to create lines and
shapes precisely using continuous points instead of dots like raster printers.
• Pen or Pen-Like Tool − A pen or similar instrument draws on paper for
graphic plotters. The pen may move X and Y on a moveable arm to draw
complicated shapes.
Prepared by FBLaud
A vector graphics plotter outputs accurate and detailed drawing. They are still
used in sectors and applications that need accuracy and high-quality output, even
if digital printing has made them less widespread.
Printers
Printer is an output device, which is used to print information on paper.
There are two types of printers −
• Impact Printers
• Non-Impact Printers
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is
then pressed on the paper.
• Line printers
Character Printers
Character printers are the printers which print one character at a time.
• Daisy Wheel
Advantages
• Inexpensive
• Widely Used
• Other language characters can be printed
Prepared by FBLaud
Disadvantages
• Slow Speed
• Poor Quality
Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of
Daisy (flower) which is why it is called Daisy Wheel Printer. These printers are
generally used for word-processing in offices that require a few letters to be
sent here and there with very nice quality.
Advantages
Disadvantages
Line Printers
Line printers are the printers which print one line at a time.
• Drum Printer
• Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of
the drum is divided into a number of tracks. Total tracks are equal to the size of
the paper, i.e. for a paper width of 132 characters, drum will have 132 tracks. A
character set is embossed on the track. Different character sets available in the
market are 48 character set, 64 and 96 characters set. One rotation of drum
prints one line. Drum printers are fast in speed and can print 300 to 2000 lines
per minute.
Advantages
Disadvantages
• Very expensive
• Characters fonts cannot be changed
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer.
A standard character set may have 48, 64, or 96 characters.
Advantages
Disadvantages
• Noisy
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers
print a complete page at a time; thus, they are also called as Page Printers.
• Laser Printers
• Inkjet Printers
Laser Printers
These are non-impact page printers. They use laser lights to produce the dots
needed to form the characters to be printed on a page.
Advantages
Disadvantages
• Expensive
• Cannot be used to produce multiple copies of a document in a single
printing
Prepared by FBLaud
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new
technology. They print characters by spraying small drops of ink onto paper.
Inkjet printers produce high quality output with presentable features.
They make less noise because no hammering is done and these have many styles
of printing modes available. Color printing is also possible. Some models of Inkjet
printers can produce multiple copies of printing also.
Advantages
Disadvantages
CPU stands for Central Processing Unit; it is also known as "the brain of the
computer". A CPU is a primary component of a computer that performs most of
the processing and controls the operation of all components running inside a
computer.
The key components of a CPU are the Control Unit, ALU and Memory. The
alignment and integration of key components are included in the above figure.
Components of CPU
• Control Unit (CU)
• ALU (Arithmetic Logic Unit)
• Memory or Storage Unit
• Registers
Prepared by FBLaud
Control Unit
As its name implies, a control unit acts as the "brain" of the CPU. A major role of
a control unit is to manage and execute instructions to perform the tasks specified
by a computer program. v. A CPU executes instructions by fetching them from
memory, decodes them, and then executes them. So, it plays a vital role in fetch-
decode-execute instructions.
Functions of an ALU
• Arithmetic Operations − The ALU can perform basic arithmetic operations.
• Logic Operations − The ALU can also perform logical operations like AND,
OR, NOT, XOR, and bit-shifting operations.
Memory Unit
A memory is a hardware component which is used to store and access the data
whenever required. Majorly; computer memory is categorized into two parts
Primary Memory (RAM) and Secondary Memory (Hard Disk). RAM is used for
short-term, fast data access and is essential for active program execution. On the
other hand, storage or secondary memory provides permanent data storage.
Hence, memory and storage units both are critical components of a computer
system.
Functions of memory
Primary Memory
• Storage devices are used to store the data permanently, even when the
computer is powered off.
• They are non-volatile; the data remains intact even when the power is
turned off or the system restarts.
• The most popular and commonly used storage devices are Hard disks
(HDs), Solid-State Drives (SSDs), USB flash drives, and optical disks (e.g.,
DVDs), pen drives.
• The data storage capacity of these devices in gigabytes (GB) to terabytes
(TB) and more, depending on the type and size of the storage device.
• It directs Input and output units that how to respond to the instructions
that have been communicated to the processor.
• A CPU contains registers which are considered small storage locations
within the CPU to hold data temporarily during execution of a program.
• A CPU executes instructions by fetching them from memory, decodes them,
and then executes them.
Following are some of the important input devices which are used in a computer
−
• Keyboard
• Mouse
• Joy Stick
• Light pen
• Track Ball
• Scanner
• Graphic Tablet
• Microphone
• Magnetic Ink Card Reader (MICR)
• Optical Character Reader (OCR)
• Bar Code Reader
• Optical Mark Reader (OMR)
Prepared by FBLaud
Keyboard
Keyboard is the most common and very popular input device which helps to input
data to the computer. The layout of the keyboard is like that of traditional
typewriter, although there are some additional keys provided for performing
additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with
104 keys or 108 keys are also available for Windows and Internet.
QWERTY Keyboards
QWERTY is the most usable keyboard. It's named after the first six letters in the
top row of the keyboard. The QWERTY keyboard's is significant due to its typing
familiarity, standardization, and widespread support. These features make it
comfortable for most of the users, assuring simplicity of use and accessibility
across different devices and platforms.
Prepared by FBLaud
Mechanical Keyboards
Mechanical keyboards employ unique mechanical switches for each key. Each key
on mechanical keyboards has a mechanical switch. Different types of switches
offer varying levels of tactile feedback and actuation force. They are renowned
for their durability, tactile feedback, and adaptability.
Prepared by FBLaud
Typists and gamers who demand accurate and enjoyable typing love these
switches because they give tactile and aural feedback.
Membrane Keyboards
Laptops and cheap desktop keyboards have membrane keyboards. When pushed,
a key contacts a rubber or silicone membrane below the keys to register a
keystroke.
Prepared by FBLaud
Membrane keyboards, which feature pressure pad technology and a flat, flexible
surface, are popular due to their distinct set of benefits.
Ergonomic Keyboards
Typing for long periods can cause muscle strain and discomfort; ergonomic
keyboards are specifically designed to alleviate these issues. Ergonomic
keyboards are intended to reduce strain and improve user comfort, especially
during long durations of typing.
Prepared by FBLaud
These include split keyboards and contoured keyboards, which are curved to fit
the natural hand posture.
Gaming Keyboards
Gaming keyboards are optimized for gaming performance. Gaming keyboards
are built exclusively for gamers, with features that improve performance,
comfort, and overall gaming experience.
Prepared by FBLaud
Laptops, tablets, and smart TVs utilise them for convenience and mobility.
Wireless keyboards provide different benefits over wired keyboards, making
them a popular choice among many users.
• Secure environments
• Multifunctionality
• Predictive text and auto-correction
• Touchscreen interaction
Foldable Keyboards
Foldable keyboards are portable and convenient. Foldable keyboards, which can
be compacted or folded for convenient transport and storage, have various
advantages over standard keyboards.
Travellers and people who require a small keyboard may fold or wrap them up
for storage and transport.
• Compact Size
• Lightweight
• Portability and Convenience
• Easy Storage
• Multiple Device Support
• Ideal for On-the-Go Use
• Comfortable Typing
• Rugged Designs
• Water and Dust Resistance
• Cost-Effective
Typing Keys
1 These keys include the letter keys (A-Z) and digit keys (09) which generally give the
same layout as that of typewriters.
Numeric Keypad
2 It is used to enter the numeric data or cursor movement. Generally, it consists of a set of
17 keys that are laid out in the same configuration used by most adding machines and
calculators.
Function Keys
3 The twelve function keys are present on the keyboard which are arranged in a row at the
top of the keyboard. Each function key has a unique meaning and is used for some
specific purpose.
Control keys
4 These keys provide cursor and screen control. It includes four directional arrow keys.
Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
Control(Ctrl), Alternate(Alt), Escape(Esc).
Mouse
Generally, it has two buttons called the left and the right button and a wheel is
present between the buttons. A mouse can be used to control the position of
the cursor on the screen, but it cannot be used to enter text into the computer.
Advantages
• Easy to use
• Not very expensive
• Moves the cursor faster than the arrow keys of the keyboard.
Optical Mouse
An optical mouse is a type of mouse that makes use of a light-emitting diode
(LED) or laser to detect movement. It replaces the mechanical ball fixed in the
traditional mouse. The optical sensor detects reflected light on the surface and
converts it into cursor movement on your computer screen.
• LED − LED gives proper illumination for the optical sensor to capture
surface images.
• Optical Sensor − It’s a small camera that captures surface images quickly.
• Digital Signal Processor (DSP) − It determines the movement and analyses
images captured from optical sensors.
• Communication Channel − It sends data to the system using USB, PS/2,
wireless RF, or Bluetooth.
How Does Optical Mouse Work?
When an optical mouse is moved, it illuminates the surface below it with a light-
emitting diode (LED) or laser. A sensor in the mouse captures the light reflected
off the surface. The images are analysed by the sensor, and the movement of
the mouse is calculated based on the changes in the pattern. This information is
then transmitted to your computer, which adjusts the cursor accordingly.
• Ball − The primary interface for the user, which can vary in size and
material. It's typically designed to provide a smooth rolling experience.
• Sensors − Detect the motion of the ball. Modern trackballs often use optical
sensors for higher precision.
• Microcontroller − Processes the signals from the sensors and converts them
into data the computer can understand.
• Communication Interface − Connects the trackball mouse to the computer
(USB, Bluetooth, etc.).
• Buttons − Like a traditional mouse, trackball mice have buttons for clicking,
and some models include additional buttons for added functionality.
How does a Trackball Mouse work?
• Optical or Laser Sensor − Laser sensors often provide greater precision and
can operate on different surfaces.
• RF Transmitter − A wireless mice includes a matching receiver that plugs
into the computer.
• Power Supply − Provides power for the mouse's activities, usually by AA or
AAA batteries or a built-in rechargeable battery.
• Buttons and Scroll Wheel − The user interface allows users to perform
clicking and scrolling actions.
How a wireless mouse does Works?
A wireless mouse uses radio frequency (RF) technology for transmitting data to
your computer. RF devices consist of two main parts: a transmitter and a
receiver.
movements and button clicks. The receiver connects to the user's computer, the
receiver accepts the signal, decodes it, and then forwards it to the mouse driver
software and the computer's operating system. The receiver is a separate
device that plugs into your computer, a specialized card for an expansion slot,
or an integrated component.
• Buttons and Scroll Wheel − This element is designed for clicking and scrolling
actions.
• Cable − Sends power to the mouse and transfers data from the mouse to
the computer.
Prepared by FBLaud
A wired mouse is directly linked to a user's desktop or laptop using a USB port.
As it connects to the system using physical cables it sends data using a cable. A
dedicated cable connection ensures quick response.
• Buttons − A gaming mouse has left and right-click buttons, a scroll wheel,
and additional programmable buttons. It might have 8 to 20 or more
buttons.
• Scroll Wheel − The scroll wheel provides servicing to scrolling or
customizable resistance.
• Sensor − Sensors used for tracking movement with high precision.
• RGB Lighting − Makes clear and attractive visibility.
• DPI Switch − Allows on-the-fly DPI adjustments to change sensitivity
settings during gameplay.
How Does Gaming Mouse Work?
Gaming mice can modify their sensitivity, which can be customized in terms of
dots per inch (DPI). As the DPI increases, the cursor on the screen moves a
longer distance for the same amount of mouse movement. Typically, a higher
DPI level (1000 DPI and above) is employed for gaming and monitors with
exceptionally high resolution. However, in a video game, the higher DPI can
either be advantageous or disadvantageous depending on the level of zoom in
the scene. A higher DPI setting enables the player to execute rapid movements,
while a lower DPI setting facilitates more accurate and delicate movements.
Explore our latest online courses and learn new skills at your own pace. Enroll
and become a certified expert to boost your career.
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its both lower and upper
ends. The lower spherical ball moves in a socket. The joystick can be moved in
all four directions.
Prepared by FBLaud
Light Pen
When the tip of a light pen is moved over the monitor screen and the pen
button is pressed, its photocell sensing element detects the screen location and
sends the corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers
on the ball, the pointer can be moved.
Prepared by FBLaud
Since the whole device is not moved, a track ball requires less space than a
mouse. A track ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner captures images from the source which are then converted into a
digital form that can be stored on the disk. These images can be edited before
they are printed.
Prepared by FBLaud
Digitizer
Digitizer is an input device which converts analog information into digital form.
Digitizer can convert a signal from the television or camera into a series of
numbers that could be stored in a computer. They can be used by the computer
to create a picture of whatever the camera had been pointed at.
Microphone
MICR input device is generally used in banks as there are large number of
cheques to be processed every day. The bank's code number and cheque
number are printed on the cheques with a special type of ink that contains
particles of magnetic material that are machine readable.
This reading process is called Magnetic Ink Character Recognition (MICR). The
main advantages of MICR is that it is fast and less error prone.
OCR scans the text optically, character by character, converts them into a
machine readable code, and stores the text on the system memory.
Bar Code Reader is a device used for reading bar coded data (data in the form
of light and dark lines). Bar coded data is generally used in labelling goods,
numbering the books, etc. It may be a handheld scanner or may be embedded
in a stationary scanner.
Bar Code Reader scans a bar code image, converts it into an alphanumeric
value, which is then fed to the computer that the bar code reader is connected
to.
OMR is a special type of optical scanner used to recognize the type of mark
made by pen or pencil. It is used where one out of a few alternatives is to be
selected and marked.
• Monitors
• Graphic Plotter
• Printer
• Speakers
• Headphones
• Projector
• GPS
Monitors
illuminated pixel to form a whole character, such as the letter ‘e’ in the word
help.
• Produces heat
Flat-Panel Display Monitor
The flat-panel display refers to a class of video devices that have reduced
volume, weight and power requirements in comparison to the CRT. You can
hang them on walls or wear them on your wrists. Current uses of flat-panel
displays include calculators, video games, monitors, laptop computers, and
graphics displays.
Advantages
• Vector Graphics − Vector graphics allow graphic plotters to create lines and
shapes precisely using continuous points instead of dots like raster printers.
• Pen or Pen-Like Tool − A pen or similar instrument is drawn on paper for
graphic plotters. The pen may move X and Y on a moveable arm to draw
complicated shapes.
• Applications − Graphic plotters are employed in engineering, architecture,
cartography, and textile design. They were popular for technical drawings
and diagrams before digital.
Prepared by FBLaud
A vector graphics plotter outputs accurate and detailed drawings. They are still
used in sectors and applications that need accuracy and high-quality output,
even if digital printing has made them less widespread.
• High Resolution − It has good resolution which opens it for CAD drawings.
• Colour Representation − It automatically sets colour matching in designs.
• Large Screen Size − It provides appropriate space to view large drawings.
• Software Compatibility − It is compatible with CAD software, graphic design,
and related tools.
• Preview Functionality − A user can preview plots on the monitor to reduce
errors and enhance accuracy.
• Editing Tools − Multiple editing tools are available for graphics before
plotting.
Prepared by FBLaud
Printers
Types of Printer
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is
then pressed on the paper.
• Character printers
• Line printers
Prepared by FBLaud
Character Printers
Character printers are the printers which print one character at a time. A printer
that holds individual characters until it is ready to print them. Instead of
printing one line at a time, a character printer prints one character at a time.
Nowadays, these printers are not commonly used due to speed limitations and
their ability to only print text.
In the market, one of the most popular printers is Dot Matrix Printer. These
printers are popular because of their ease of printing and economical price.
Each character printed is in the form of a pattern of dots and the head consists
of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out to form a
character which is why it is called Dot Matrix Printer.
Advantages
• Inexpensive
• Durable
• Widely Used
• Able to print on multi-part forms
• Low Operating Costs
• Reliable
• Other language characters can be printed
Disadvantages
• Slow Speed
Prepared by FBLaud
• Poor Quality
Daisy Wheel
A daisy wheel printer is an impact printer that utilizes a spinning disk, known as
the "daisy wheel," which contains pre-formed characters embossed on its
"petals." During printing, the printer picks the appropriate petal, impacts it
against an ink ribbon, and then onto the paper to generate high-quality text.
The head is lying on a wheel and pins corresponding to characters are like
petals of Daisy (flower) which is why it is called Daisy Wheel Printer. These
printers are generally used for word processing in offices that require a few
letters to be sent here and there with very nice quality. In the 1970s and
1980s, daisy wheel printers were commonly utilized for word processing before
the introduction of laser and inkjet printers.
Advantages
• It produces High-Quality Text so more suitable for professional documents
• More reliable than DMP
• Better quality
• Fonts of character can be easily changed
• Durable so it has a long lifespan
• Each character is pre-formed which shows its consistent print quality
Disadvantages
• Slower than DMP
• Limited to Text
• Noisy
• More expensive than DMP
• Changes in fonts or styles need physical changes on the daisy wheel
Line Printers
Line printers are the printers which print one line at a time. Line printers are
specialised impact printers which are specifically designed to get high-speed,
high-volume printing, primarily for text. These are still useful in certain
Prepared by FBLaud
applications where speed and durability are critical. Their capacity to print a
complete line of text at once distinguishes them from other impact printers,
making them excellent for applications requiring quick and consistent document
creation.
This printer is like a drum in shape hence it is called a drum printer. The surface
of the drum is divided into several tracks. Total tracks are equal to the size of
the paper, i.e. for a paper width of 132 characters, the drum will have 132
tracks. A character set is embossed on the track. Different character sets
available in the market are 48 character sets, 64 and 96 characters set. One
rotation of drum prints one line. Drum printers are fast and can print 300 to
2000 lines per minute.
Advantages
• Very high speed
• Low cost
• Durable so they can run a long life
• Able to handle large print volumes
• Provides good printing quality
Disadvantages
• Very expensive
• Characters fonts cannot be changed
Chain Printer
centres and business settings where high-volume printing was required. They
are well-known for their ability to handle huge print jobs quickly and efficiently.
In this printer, a chain of character sets is used; hence it is called a Chain
Printer. A standard character set may have 48, 64, or 96 characters.
Advantages
• Character fonts can easily be changed
• Able to print hundreds to thousands of lines per minute
• Durable
• Different languages can be used with the same printer
• Cost-effective for printing large quantities of text.
Disadvantages
• Noisy
• Limited Graphics
• Limited with fixed fonts and styles
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These
printers print a complete page at a time, thus they are also called Page Printers.
• Laser Printers
• Inkjet Printers
Characteristics of Non-impact Printers
• Faster than impact printers
• They are not noisy
• High quality
• Supports many fonts and different character sizes
Laser Printers
These are non-impact page printers. They use laser lights to produce the dots
needed to form the characters to be printed on a page.
Prepared by FBLaud
Advantages
• Very high speed
• Very high-quality output
• Good graphics quality
• Supports many fonts and different character sizes
Disadvantages
• Expensive
• Cannot be used to produce multiple copies of a document in a single
printing
Inkjet Printers
They make less noise because no hammering is done and these have many
styles of printing modes available. Color printing is also possible. Some models
of Inkjet printers can produce multiple copies of printing also.
Advantages
• High-quality printing
• More reliable
Disadvantages
• Expensive as the cost per page is high
• Slow as compared to laser printer
Speakers
Speakers are standard output devices that are used to hear sound clearly from
a measurable distance. These are connected to the computer through sound
connectors directly while others can be linked to any sound system. The primary
purpose of speakers is to deliver audio output and enable users to listen to the
resulting sound.
Prepared by FBLaud
Components of a Speakers
Some of the key components of speakers are as follows −
Types of speakers
Some common types of speakers are as follows −
(bass). Usually, they are used in Home theatre systems and car audio
systems.
• Dynamic speaker − Dynamic speakers are often equipped with one or more
woofer drivers. These have one or more tweeter drivers and are known for
producing low-frequency sound.
• Bluetooth speakers − It’s a wireless speaker which is portable. A Bluetooth
speaker produces high-quality audio.
Headphones are small-sized speakers which are specifically designed to fit into
the earcups of headphones or earbuds. These speakers operate on the same
principles as larger speakers but are tailored for listening at close range and for
personal audio enjoyment.
Advantages
Some of the key advantages of headphone speakers are as follows −
Types of projector
Some common types of projectors are as follows −
Advantages of GPS
Some key advantages of GPS are as follows −
Nibble
2
A group of 4 bits is called nibble.
Byte
3 A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data
item or a character.
Word
A computer word, like a byte, is a group of fixed number of bits processed as a unit,
which varies from computer to computer but is fixed for each computer.
4
The length of a computer word is called word-size or word length. It may be as small
as 8 bits or may be as long as 96 bits. A computer stores the information in the form of
computer words.
Kilobyte (KB)
1
1 KB = 1024 Bytes
Megabyte (MB)
2
1 MB = 1024 KB
GigaByte (GB)
3
1 GB = 1024 MB
TeraByte (TB)
4
1 TB = 1024 GB
PetaByte (PB)
5
1 PB = 1024 TB
To store binary digits, computers use transistor switches that are either open or
closed. Data is also stored in a register designated to store output. ALUs tend to
be fast and accurate. These conduct logical operations such as bitwise
operations, which are operations on a string of binary numbers. The CPU
processor directly supports bitwise logical operations, which are fast, simple,
Prepared by FBLaud
and range from basic to higher-level. ALUs conduct bit shifting, which is the
movement of bits in response to particular instructions from bit operators.
ALUs carry out arithmetic and logical operations. Also found in the CPU are
Control Units, or CUs. The CU directs the ALU in performing specific operations,
with the ALU being responsible for carrying out these operations.
The NOT Gate consists of a single transistor and one input logic gate. Its
function is to produce outputs that are the inverse of the input. For instance, an
input of 1 would result in an output of 0.
Multiple transistors and two inputs are used in the OR Gate. The output is only 1
if the first or second input is 1. Conversely, the OR gate produces an output of 0
when both inputs are 0.
The AND Gate utilizes multiple transistors and two inputs. The output is 1 only if
both the first and second inputs are 1.
Functions of ALU
and output connections that enable the transmission of digital signals between
the ALU and external electronic devices. Data is provided to the ALU inputs by
external circuits, and the ALU sends processed computational results. Some of
the key functionalities of the ALU are as −
• Logical Operations − It includes AND, OR, NOT, XOR (exclusive OR), and bit-
shifting logical operations.
• Data flow into the ALU − ALU has direct access to the CPU controllers,
primary memory, and input/output devices. ALU takes input data from
memory using the bus-like electrical route.
The ALU takes input from the processor's registers and gets back the results to
the registers. It is a critical component of the CPU, allowing it to do the
computations required for various tasks and operations in a computer system.
Computer - Hardware
What is Computer Hardware?
Hardware is the computer's peripheral devices which are used to assemble the
system. Hardware devices majorly include computer input-output devices,
memory, and CPU. Generally, Hardware is the internal and external components
of a computer that allow you to accomplish major functions such as input,
output, storage, communication, and processing.
• Internal hardware
• External hardware
Internal Hardware
Internal hardware is the computer peripherals which are connected inside the
computer. These include motherboards, hard drives, and DDR (RAM). The
following images are the core examples of computer hardware.
Prepared by FBLaud
External Hardware
External hardware is the computer peripherals which are connected to the
computer system externally. External hardware includes monitors, keyboards,
printers, and scanners.
Prepared by FBLaud
• Input hardware facilitates users to input the data into the system A keyboard
is used to type text, a Mouse to select an option by clicking on it, a scanner
to scan images or pages etc.
• Output hardware produces the output into human understandable forms like
a Monitor is used to display the output on the screen, a Printer to print
Prepared by FBLaud
output in the form of hard copy, speakers used to produce audio sound and
projectors are used to project visual output on larger surfaces.
• Processing hardware like processors executes programs or instructions and
performs calculations or does computations.
• Storage hardware like memory devices stores data to retain for future use.
RAM for temporary storage and HDD to store data permanently.
• Communication hardware devices enable users to data exchange between
multiple devices over the computer network. These include Network
Interface Card (NIC), Modem, and Bluetooth and Wi-Fi Adapters.
• Control hardware manages and directs the operations of different
components attached to the system. It includes a Motherboard, Power
Supply Unit (PSU) and BIOS/UEFI.
Computer - Motherboard
What is a Computer Motherboard?
The motherboard is mounted inside the case and is securely attached via small
screws through pre-drilled holes. The motherboard contains ports to connect all
of the internal components. It provides a single socket for the CPU, whereas for
memory, normally one or more slots are available. Motherboards provide ports
to attach the floppy drive, hard drive, and optical drives via ribbon cables. The
motherboard carries fans and a special port designed for power supply.
There is a peripheral card slot in front of the motherboard using which video
cards, sound cards, and other expansion cards can be connected to the
motherboard.
On the left side, motherboards carry several ports to connect the monitor,
printer, mouse, keyboard, speaker, and network cables. Motherboards also
provide USB ports, which allow compatible devices to be connected in a plug-
in/plug-out fashion—for example, pen drives, digital cameras, etc.
Components of a Motherboard
• Memory Slots − These slots allow connecting memory devices into it.
• Storage Connectors − These slots include Serial ATA ports to connect hard
drives like hard drives and SSDs.
• Audio Connectors − These allow audio input and output devices to work with
analogue and digital audio signals.
• Network Connectors − These ports are used for wired network connections,
or Wi-Fi to access the internet.
• BIOS/UEFI − The Basic Input / Output System (BIOS), also known as the
Unified Extensible Firmware Interface (UEFI), is a type of firmware that
initializes and tests hardware during the boot process; it also provides
runtime services to operating systems and programs.
The Advanced Technology (AT) motherboard was a key form factor in the
history of personal computing, establishing standards that impacted subsequent
designs. However, due to its large size, convoluted layout, and restricted
integration, it was eventually replaced by the more efficient and user-friendly
ATX specification.
Micro ATX (mATX) motherboards are smaller versions of the conventional ATX
motherboard form factor. It has been specifically designed concerning size and
features which make it ideal for compact desktop builds while not compromising
too much expandability or speed.
Micro ATX motherboards provide the right blend of size, capabilities, and
expandability, making them a popular choice for a variety of desktop PC
configurations. They provide ample PCIe slots and connectivity choices for most
users while fitting in smaller cases than typical ATX boards. This makes them
suited for a wide range of applications, including gaming, entertainment, and
home office sets.
E-ATX motherboards have a larger form factor than regular ATX, allowing for
more components, expansion slots, and functionality. They are ideal for high-
performance desktop builds and enthusiast systems that require flexibility,
performance, and a wide range of networking options.
E-ATX motherboards typically have several PCIe slots, including several PCIe
x16 slots for high-performance graphics cards and several PCIe x1 slots for
further expansion cards.
Despite their compact size, FlexATX motherboards can provide a wide range of
functionality such as multiple USB ports, integrated audio, and network
connectivity. However, they may contain limited ports and connectors than
larger form factors.
BTX motherboard
BTX stands for balanced technology extended. It was designed by Intel in 2003
to overcome the limitations and thermal issues associated with the ATX
standard. BTX motherboards are available in different sizes, including
conventional, mini, and pico. Standard BTX boards typically measure 325 mm x
267 mm (12.8 in x 10.5 in). These have a different layout than ATX
motherboards. They were created to optimize airflow and thermal management
by arranging the key heat-generating components, such as the CPU and GPU, in
Prepared by FBLaud
a manner that allows for more efficient cooling. BTX motherboards include
similar functionality and connectivity options to ATX boards, such as multiple
USB ports, SATA connectors, integrated audio, and network interfaces.
Pico BTX boards, like all other BTX form factors, are designed to optimize
airflow and thermal management. The CPU and other important heat-generating
components are positioned to align with the system's airflow path, which
typically runs from the front intake to the back exhaust.
• Intel
• ASUS
• AOpen
• ABIT
• Biostar
• Gigabyte
• MSI
RAM is a computer's volatile memory which stores data temporarily; once power
turned off, the data which is inside the RAM gets erased. It is also known as
primary or temporary memory. RAM stores the data that is actively being used
during the execution of a program or instructions. During the booting process of
a system, the operating system actively uses RAM and applications that are
necessary to execute a file or a program. It speeds up CPU processing by
providing fast data and instruction access.
RAM is actively used for program or instruction execution. Once we start the
computer; system necessary files, programs and operating system files are
loaded into the RAM for the smooth running of the computer. The more RAM a
computer has, the better it can handle multitasking and the faster it can run
applications since data can be accessed more quickly.
RAM consists of a grid of cells, each with a unique address, allowing data to be
read or written in any order, the CPU requests data from RAM, which is
Prepared by FBLaud
RAM is the computer's internal memory which stores different types of data and
information as per the requirement. It is also considered as read/write memory.
The data access in RAM is random. This means that we can access any random
location in the memory without even knowing the address of the previous
location. Since RAM is a volatile memory hence, a backup is present in most of
the systems in the form of an uninterrupted power supply (UPS). Moreover, the
speed and performance of a system are directly proportional to the size of the
RAM.
Characteristics of RAM
Characteristics of SRAM
• It is expensive.
• It has a complex cell structure; so the design and layout of SRAM are more
complex.
• Due to its volatile nature, overall data is lost when power goes off.
• It has a low storage capacity as compared to DRAM.
• The design is complex and not easy to build or understand.
• It is not Suitable for Large Memory Applications
However, DRAM is less expensive than SRAM, making it suitable for use as the
CPU's main memory. It is slower than SRAM and can link directly to the CPU
bus. A DRAM typically ranges from 4GB to 16GB for laptops and 1GB to 2GB for
smaller devices.
Characteristics of DRAM
Let us now discuss the various types of ROMs and their characteristics.
The very first ROMs were hard-wired devices that contained a pre-programmed
set of data or instructions. These kind of ROMs are known as masked ROMs,
which are inexpensive.
PROM is read-only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM program.
Inside the PROM chip, there are small fuses which are burnt open during
programming. It can be programmed only once and is not erasable.
Advantages of ROM
• Non-volatile in nature
• Easy to test
• More reliable than RAMs
Significances of GPUs
A GPU is ideally suited for tasks or programs that require large volumes of data
and repetitive computation. GPUs have a similar fetch-decode-execute cycle, it
has designed in such a way that they can handle thousands of threads at once,
making them well-suited for parallel processing tasks −
• Fetching − The GPU fetches instructions for the execution from its internal
memory. (VRAM).
• CUDA cores (NVIDIA) or stream processors (AMD) − These are the basic
processing units of a GPU, which can execute the processes on their own.
Modern GPUs exist with thousands of these cores.
• Shader − Shaders are specialised processing units within a GPU. They are
specifically designed to perform vertex shading, geometry shading, pixel
shading, and computation. These units support rendering graphics and
computations.
• Data and task parallelism − GPUs are capable enough to perform data
parallelism and task parallelism on different sets of data simultaneously.
• Thread execution − Threads are smaller units of work that allow concurrent
processing; this process shows how GPUs function. A GPU can support
thousands of threads at a time.
Characteristics of GPU
• Memory − GPUs have their memory. GPUs Video RAM enables rapid access
to data and faster data transfer.
• Scalability − GPUs can scale up that system from a few cores to thousands.
Applications of GPU
Some of the common application areas where GPUs are most widely used are as
follows −
Advantages of GPUs
• Quicker execution − GPU computing does fast execution and gives quicker
results.
• High processing power − GPUs are made with thousands of small processing
cores which perform tasks in parallel mode. This parallel processing enables
a GPU to do multiple complex processing at a time.
Disadvantages of GPUs
• Memory constraints − GPU memory is limited which can hamper tasks that
require extensive memory access.
• Energy Efficiency − Efficient power supplies can cut electricity costs and the
environmental effects of running a computer.
• Cooling − PSUs are equipped with cooling fans which keep systems cool
from system heat generated during operations.
• ATX Standard − These are the most common PSUs usually used in desktop
systems. These power supplies are tailored to be compatible with the ATX
motherboard and deliver three distinct positive voltage rails: +3.3 V, +5 V,
and +12 V, in addition to a standby voltage rail of +5 V SB, which ensures
that computers receive power when in standby mode.
• Small Form Factor (SFX) − These PSUs are used in smaller form-factor
computers using MicroATX motherboards. These are the power supply units
used in smaller set-top boxes like DVD players and cable boxes.
• Thin Form Factor (TFX) − TFX power supplies are longer and thinner than
traditional ATX power supplies which are used in ultra-slim and low-profile
desktops.
• Non-Modular Power Supply − All cables are permanent and not removable.
These are frequently less expensive, however, they result in more cable
clutter.
• Standby Power − The PSU can provide standby power (often +5VSB) to
support features such as Wake-on-LAN and allow the system to execute
specific tasks during low power mode or when the system is turned off.
When choosing the right Power Supply Unit (PSU) for your computer; the
following considerations are required −
• Determine required power watt − You should estimate the total wattage
needed for the system like CPU, GPU, motherboard, RAM, storage drives,
and any peripherals. A user should also keep in mind about future upgrades
for the system.
• Connectors and Cables − It determines that the PSU has the required
connectors and pins.
Computer - Software
Software is a set of programs, which is designed to perform a well-defined
function. A program is a sequence of instructions written to solve a particular
problem.
• System Software
• Application Software
System Software
• Difficult to design
• Difficult to understand
• Less interactive
• Smaller in size
• Difficult to manipulate
Application Software
• Payroll Software
• Microsoft Word
• Microsoft Excel
• Microsoft PowerPoint
• Easy to design
• More interactive
• Slow in speed
• Easy to understand
Software Types
• System Software
• Application Software
• Utility Software
• Open Source Software
System Software
Software that enables a computer to run and activates required hardware or
other parts of a computer to run is called system software. System software acts
as interface between hardware and user applications. An interface is needed
because hardware devices or machines and humans speak in different
languages.
Machines understand only binary language i.e. 0 (absence of electric signal) and
1 (presence of electric signal) while humans speak in English, French, German,
Prepared by FBLaud
Tamil, Hindi and many other languages. English is the pre-dominant language of
interacting with computers.
• Operating System
• Language Processor
• Device Drivers
Operating System
Language Processor
complete instruction will also tell the memory address. Assembly level
language is machine dependent.
• High level language − This language uses English like statements and is
completely independent of machines. Programs written using high level
languages are easy to create, read and understand.
Program written in high level programming languages like Java, C++, etc. is
called source code. Set of instructions in machine readable form is called object
code or machine code. System software that converts source code to object
code is called language processor. There are three types of language
interpreters −
Application Software
Application software, sometimes known as "apps" or "applications," is a type of
software that is created for certain tasks or functions such as productivity,
entertainment, communication, or other reasons. Hence, software that performs
a single task and nothing else is called application software. Application software
is very specialized in their function and approach to solving a problem. So
spread sheet software can only do operations with numbers and nothing else.
Application software, as opposed to system software (such as operating
systems and device drivers), is designed to fulfil the needs and preferences of
end users. The following are some examples of common types of application
software −
Productivity Software
• Word Processing − This application software allows users to create, edit, and
format documents. Some popular word processing applications are
Microsoft Word, Google Docs, and Apple Pages.
Prepared by FBLaud
• Calendar and Scheduling Apps − This application software is used for time
management and scheduling appointments, like Google Calendar, Microsoft
Outlook, and Apple Calendar.
These application programs are used to access and navigate websites on the
internet. Popular web browsers are Google Chrome, Mozilla Firefox, Microsoft
Edge, and Safari.
Gaming Software
These applications are designed for entertainment and gaming. Examples are
Steam, PlayStation, Xbox, and mobile app stores.
Prepared by FBLaud
Utility Software
• File Compression and Extraction − Examples are WinZip, 7-Zip, and WinRAR.
• Backup and Recovery − Examples are Acronis True Image and Time Machine.
• Disk Cleanup and Optimization − Examples are CCleaner and Disk Cleanup
(Windows).
Education and E-Learning Software
These applications are designed to keep track of health metrics, Yogas and
Asans, dietary guidance etc.
Financial Software
These applications are designed to assist travellers with trip planning, maps,
and GPS navigation etc. Examples are Google Maps, TripAdvisor, and Waze.
Utility Software
Application software also known as utility programs or system utilities that
assists system software in doing their work is called utility software. Utility
software is intended to help users to manage and maintain their computer
systems, as well as optimise performance and execute different system-related
activities. These programmes are often used to assure the efficient operation of
hardware and software components, and improve a computer system's overall
functionality and stability. Thus utility software is actually a cross between
system software and application software.
Prepared by FBLaud
• Antivirus and Antimalware Software − These utilities keep safe the computer
against malicious software, spyware, and viruses, as well as other types of
security threats. Examples are Norton Antivirus, McAfee, and
Malwarebytes.
• Disk Cleanup and Optimization − These utilities help to remove temporary or
unwanted files. For example - CCleaner (Crap Cleaner) removes temporary
files, cache data, and unused files to free up disk space. Defragmentation
applications reorganise fragmented files on a hard drive in order to increase
read/write access.
• Disk Partitioning and Management − Disc Management (Windows) and
GParted (Linux) are utilities that enable users to create, resize, and manage
partitions on their hard drives.
• Backup and Recovery − Backup utilities automatically create copies of vital
data to prevent loss. Example: Windows Backup and Time Machine (Mac).
Data recovery software recovers erased files and folders. Popular options
include Recuva and TestDisk.
• System Monitoring and Diagnostic Tools − Task Manager (Windows) and
Activity Monitor (Mac) offer real-time system resource monitoring to find
and fix performance issues. Windows Memory Diagnostic and Apple
Diagnostics (Mac) diagnose hardware issues.
• Driver Updaters − For hardware compatibility and performance, these
programmes update out-dated or incompatible device drivers. Examples
are Driver Booster and Driver Easy.
• Password Managers − Users generate, store, and manage complex, secure
passwords with password management software. Examples are LastPass,
Dashlane, and 1Password.
• Firewall Utilities − A firewall protects a computer or network by managing
incoming and outgoing network traffic. Examples are Windows Firewall and
third-party firewall solutions like ZoneAlarm.
• Data Encryption Software − These utilities encrypt sensitive data to protect
it from unauthorized access. Examples are BitLocker (Windows) and
FileVault (Mac).
• Uninstaller Programs − These utilities assist users in thoroughly removing
undesirable apps as well as the files and registry entries linked with those
applications. Examples are Revo Uninstaller and IObit Uninstaller.
Open Source Software
Software whose source code is freely distributed with a license to study, change
and further distributed to anyone for any purpose is called open source software.
Open source software is generally a team effort where dedicated programmers
improve upon the source code and share the changes within the community.
Open source software provides these advantages to the users due to its thriving
communities −
Prepared by FBLaud
• Security
• Affordability
• Transparent
• Interoperable on multiple platforms
• Flexible due to customizations
• Localization is possible
Freeware
A software that is available free of cost for use and distribution but cannot be
modified as its source code is not available is called freeware. Examples of
freeware are Google Chrome, Adobe Acrobat PDF Reader, Skype, etc.
Shareware
Software that is initially free and can be distributed to others as well, but needs
to be paid for after a stipulated period of time is called shareware. Its source
code is also not available and hence cannot be modified.
Proprietary Software
Software that can be used only by obtaining license from its developer after
paying for it is called proprietary software. An individual or a company can own
such proprietary software.
Its source code is often closely guarded secret and it can have major
restrictions like −
• No further distribution
• Number of users that can use it
• Type of computer it can be installed on, example multitasking or single
user, etc.
from and to the memory very fast and maximise its storage capacity to store
data large-size data and reduce cost.
NAND flash memory stores data into memory blocks, when the power supply
gets off the metal-oxide semiconductor activates charges to keep memory cells
functional. NAND memory cells are made up of two types of gates: control and
floating gates. Both gates are used to regulate the flow of data. To program one
cell, a voltage charge is applied to the control gate. Generally, NAND flash
memory has digital cameras, MP3 players, USB flash drives, smartphones,
tablets and laptops.
NAND is commonly found in memory cards, USB flash drives, and solid-state
drives. NAND Flash is most widely used in cell phones, laptops and tablets in
our homes and offices. It is also used in traffic lights, digital advertising panels,
passenger announcement systems, display devices or any other artificial
intelligence (AI) application where data transfer and retain data is likely to
include NAND Flash.
NAND flash memory is evolving to meet the demands of modern data storage.
Its robustness, speed, and cost-effectiveness make it a key player in the ever-
changing world of memory storage technology.
• Power Efficiency − NAND Flash Memory requires less power than mechanical
hard drives, which is critical for battery-powered devices like laptops,
smartphones, and tablets. This efficiency increases battery life and
improves the user experience.
• Reliability and Durability − NAND Flash Memory, unlike traditional hard
drives, is more resistant to physical shock and damage since it contains no
moving parts. This makes it perfect for transportable and hard applications
that require high reliability.
• Scalability and Cost-Effectiveness − The technology continues to advance,
providing larger storage capacities at lower costs per gigabyte. This allows
for the cost-effective storage of large amounts of data, which provides
benefits for both consumers and enterprise applications.
Features of NAND Flash Memory
NAND Flash Memory operates through a series of processes that involve the
storage and retrieval of data using floating-gate transistors. Its overall working
depends on its structure, data storage functionalities, and reading and erasing
data. A brief description of the different phases is as follows −
Structure
NAND Flash is made up of memory cells that store bits of data. Each cell is
made up of a floating-gate transistor with an additional gate (the floating gate)
between the control gate and substrate. These cells in memory are divided into
pages, the smallest writing units. Pages are divided into blocks, the smallest
erasable components.
Storing Data
The floating gate can store an electrical charge that represents data; the
presence or absence of this charge marks whether the cell stores the binary '0'
or '1'. To write data, apply a high voltage to the control gate, which causes
electrons to tunnel through the thin oxide layer and become trapped on the
floating gate. The threshold voltage of the transistor varies according to the
charge stored on the floating gate, allowing the cell to represent different
states.
Reading Data
To read data, a voltage is delivered to the control gate. The amount of current
flowing through the transistor is determined by the charge stored in the floating
gate. The sensor circuit detects current flow and identifies the stored data ('0'
or '1') based on the transistor's threshold voltage.
Erasing Data
NAND Flash memory cannot delete individual bits or pages; instead, it erases
entire blocks. To erase a block, a high voltage is supplied in the opposite
direction, removing electrons from the floating gate and restoring the cells to
their default state (typically '1').
Common types of NAND flash storage include SLC, MLC, TLC, QLC and 3D
NAND. A brief description of these is as follows −
Prepared by FBLaud
SLCs
SLC is an abbreviation for single-level cells. It is one of the older NAND Flash,
with each cell representing only one binary digit (bit). SLCs, or single-level cells,
hold one bit per cell. SLC offers the best endurance, but it is also the most
expensive type of NAND flash storage.
Multi-Level Cell
MLC, or multi-level cells, store two bits per cell; hence each Multi-Level Cell
may hold two bits. These cells have less endurance than SLCs since Write
Cycles and ensure occur twice as frequently as SLCs.
Triple-Level Cell
TLC stands for Triple-Level Cell. As the name implies, each cell contains three
bits of memory, allowing for greater data storage in the same footprint. TLC
drives are primarily used by enterprise and consumer companies.
Quad-Level cell
Each Quad-Level cell can represent up to four bits because the name "Quad"
signifies "four". QLC memory is the technology that offers the lowest per-
terabyte cost when compared to hard drives.
NVMe (Non-Volatile Memory Express) is a protocol that uses the PCI Express
(PCIe) interface to link solid-state drive (SSD) storage to servers or CPUs. It is
the fastest and most popular protocol for connecting to a computer's
motherboard's non-volatile memory express (NVMe). NVMe was developed in
2011 by a group of IT professionals; this device is an alternative to SATA and
Prepared by FBLaud
Serial Attached SCSI (SAS) protocols which provides higher throughput for
faster and more reliable performance. In addition to storage and technology
advancements, NVMe helped to accelerate the development of critical
technologies like as the Internet of Things (IoT), artificial intelligence (AI), and
machine learning (ML).
The NVMe protocol is dedicated to data transfer with low system overheads per
input/output operation per second. It is used in SSDs with flash memory. NVMe
addresses the bottlenecks in the SATA interface and communication protocols.
NVMe technology uses the PCIe bus instead of the SATA bus to unleash massive
bandwidth potential for storage devices. NVMe technology unlocks different
possibilities for storage devices by increasing economy, performance, and
compatibility across different platforms.
NVMe has a Peripheral Component Interconnect Express (PCIe) bus which can
achieve transfer speeds of up to 20 gigabytes per second (Gbps). Power is not
required for the NVMe device to retain its memory. Unlike other technologies,
NVMe storage can connect directly to a computer’s CPU using a PCIe socket and
enable the drive’s flash memory to function through PCIe.
NVMe technology has fast data transfer speeds and allows for parallelism and
polling; NVMe SSDs can optimize response times, and write speeds, and reduce
latency to avoid CPU bottlenecks. Additionally, NVMe technology uses less
power than the popular Small Computer System Interface (SCSI).
Characteristics of NVMe
• High Throughput and Low Latency − NVMe leverages the high-speed PCIe bus
for latency which makes faster data transfer rates.
NVMe is a storage transfer technology that allows you to quickly access data
from flash memory storage devices like SSDs. It allows flash memory to
communicate directly with a computer using a high-speed peripheral component
interconnect express (PCIe) bus, resulting in quick, high-throughput, and
parallel data transfer. NVMe communicates between a storage interface and a
system CPU via a high-speed Peripheral Component Interconnect Express
(PCIe) bus. The NVMe protocol was developed to work with fast media.
NVMe’s work starts with the host; they write I/O commands. The NVMe
controller retrieves and executes I/O command queues, then returns I/O
completion queues, followed by an interrupt to the host. The host logs I/O
completion queues and clears the door register. It reduces overhead as
compared to standard transfer protocols such as serial attached SCSI (SAS) and
serial ATA (SATA), NVMe is optimized for non-uniform memory access (NUMA),
which means it can handle queues across multiple CPU cores.
Advantages of NVMe
• NVMe drives work with all major operating systems regardless of form
factor.
• NVMe is specifically intended for SSDs and will eventually become the next
industry standard.
Prepared by FBLaud
A CompactFlash card is one of the most widely used portable storage devices
which is smaller in size and a more reliable storage device. It is most widely
used in computing devices to provide faster and reliable data storage. It is a
type of flash memory used as a removable storage for digital images and video
cameras, but it can also be found on personal devices such as PDAs and
portable music players.
A CompactFlash card was initially offered with storage capacities ranging from
megabytes to several gigabytes. Modern CF cards can offer storage capacities of
up to 512GB or more. The earliest CompactFlash cards were designed using
NOR flash memory that can read and write data in random order. This feature
made it ideal and popular to store images or text-type data.
NOR flash memory was slower and more expensive; later on, flash memory
used NAND flash memory and became more popular and less expensive. NAND
flash memory is speedier and can be written in serial order, making it ideal for
storing large files like video or music.
CompactFlash cards are available with different storage capacities which enable
it for substantial storing of high-resolution photos, films, and other significant
files. This is especially useful for photographers and videographers who need to
save a lot of data. These cards are available with different storage capacities
ranging from 8GB to 512 GB. A CompactFlash card's capacity is defined by the
number of NAND flash chips used for data storage. CompactFlash cards are
more reliable in harsh environments. Nowadays, CompactFlash cards are used
in industrial applications and professional use in the field.
CompactFlash cards are widely used and still compatible with many high-end
cameras, camcorders, and other professional equipment. Their extensive history
in the industry provides continuing maintenance and compatibility with legacy
Prepared by FBLaud
Despite the development of newer memory cards like SD cards and microSD
cards, CompactFlash cards remain useful in situations where their longevity,
high capacity, and consistent performance, are necessary.
CompactFlash cards work by plugging them into pinholes for the card to
function correctly. CF cards are easy to use. They use FAT32 or exFAT
formatting and are compatible.
CompactFlash cards employ NAND flash memory. Data is stored in memory cells
that are grouped into blocks. Each cell contains a set number of bits, usually
one bit for single-level cells (SLC) and more for multi-level cells (MLC).
Traditional CF cards use the Parallel ATA (PATA) interface for transferring data
between the card and the host device while advanced CompactFlash cards may
employ the CFexpress standard, which uses the PCIe interface for higher data
transfer rates.
Each CF card comprises a controller for data storage and retrieval. The
controller is in charge of functions such as wear levelling and error correction.
When data is written to the card, the controller assigns it to the proper memory
cells. During a read operation, the controller receives data from the cells and
transfers it to the host device. CF cards require a power supply to function.
When plugged into a device, the device supplies the electricity required for the
card to work.
CompactFlash (CF) cards are come in different types; these are as follows −
It’s a standard CompactFlash card measuring 3.3mm in thickness. It is most widely used
CF Type I
cameras, camcorders, and other related devices.
Prepared by FBLaud
CF Type II These are thicker at 5mm; their storage capacity is comparatively more.
These cards use a Serial ATA (SATA) interface to work on faster data transfer principles.
Cfast
3.3mm thickness. It is used in cameras, camcorders, and other professional equipment.
These cards use the PCIe and NVMe interfaces which have higher data transfer rates. It
Cfexpress thickness may vary in size. These cards are more likely used in video recording and burs
photography.
These CompactFlash cards use UDMA protocol and have higher data transfer rates. It h
UDMA (Ultra Direct Memory
3.3mm thickness. These are most widely used in professional photography and video
Access) CF Cards
applications.
These CF cards are designed to survive high temperatures, vibrations, and shocks. Its th
Industrial CF Cards
may vary in size. These are most widely used in industrial PCs and automation systems.
• Compatibility − CompactFlash cards are very reliable and have a low failure
rate. They have no moving parts that could break or wear out.
CompactFlash cards are most widely used in different domains of the industry.
Some of the most commonly used application areas are as −
• CompactFlash cards are used in portable music players and personal digital
assistants (PDAs).
Computers keep active data in primary storage. Data is lost when the machine
is turned off since it is volatile memory.
Data and programmes in use are stored quickly and temporarily. RAM is
volatile, losing data when the computer is turned off. A computer with greater
RAM can multitask and run apps smoothly.
Secondary storage holds long-term data. It stores data even when the machine
is off, unlike primary storage. HDDs, SSDs, CDs, DVDs, and USB drives are
examples.
A hard drive has few fundamental elements. One or more shiny silver platters
store magnetically stored information, an arm mechanism moves a tiny magnet
called a read-write head over the platters to record or store information, and an
electronic circuit controls everything and connects the hard drive to your
computer.
Prepared by FBLaud
• Data Connector − The computer's power supply device powers internal HDDs
through a power connector. SATA power connectors are common for newer
drives.
• Small Spindle − This allows read-write arm to swing across platter.
Platters are the most critical hard drive elements. Their name implies that they
are hard discs made of glass, ceramic, or aluminium coated with a thin metal
coating that may be magnetised or demagnetized. Although compact hard
drives have one platter, each side is magnetically coated. Larger drives feature
platters stacked on a spindle with a tiny gap. The read-write heads can reach
any region of the platters, which rotate at up to 10,000 rpm.
A five-platter hard drive would need ten read-write heads because each platter
contains two, one for the top and one for the bottom. An electrically operated
arm moves the read-write heads from the drive centre to the edge and back.
Features of HDDs
• Data Storage − HDDs consist of one or more rigid, rapidly rotating disks
(platters) coated with a magnetic material. Data is stored on these platters
in the form of magnetic patterns. To read or write data, a read/write head
moves over the spinning platters.
• Capacity − HDDs are available in various storage capacities, ranging from a
few gigabytes (GB) to multiple terabytes (TB). The capacity of an HDD is
determined by the number of platters it contains and their data density.
• Speed − HDDs are generally slower than SSDs in terms of data access times
and read/write speeds. This is because the read/write heads need to
physically move to the correct location on the disk, causing latency.
• Durability − HDDs are mechanical devices with moving parts, which makes
them susceptible to mechanical failure if subjected to physical shocks,
drops, or excessive vibration. SSDs, being solid-state, are more durable in
this regard.
• Price − HDDs are typically less expensive per gigabyte compared to SSDs.
This makes them a cost-effective choice for large storage needs.
• Noise and Heat − HDDs can generate noise due to the spinning platters and
moving heads. They also generate heat, so proper ventilation is necessary
to prevent overheating.
• Power Consumption − HDDs generally consume more power than SSDs
because of the mechanical components. This can lead to slightly higher
electricity usage in laptops and desktops.
• Longevity − The lifespan of an HDD can vary but is often shorter than that
of an SSD. Over time, the mechanical parts can wear out, leading to data
loss.
• Applications − HDDs are commonly used for various purposes, such as
storing large files (photos, videos, and documents), running operating
Prepared by FBLaud
The working of an HDD depends on its components which are described above.
The main elements; a spinning platter and an actuator arm which are as:
HDDs are cheaper and have a higher capacity than SSDs, but they are slower
and less durable. The use case and cost-performance-storage capacity balance
determine whether to utilise HDDs or SSDs. Computers and electronics store
and retrieve data on HDDs. Based on their speed and dependability, Solid State
Drives (SSDs) have become popular after decades of use.
Drives (HDDs), which employ rotating discs for data retrieval and storage, Solid
State Drives (SSDs) utilise NAND-based flash memory technology. Solid-state
drives (SSDs) have experienced a surge in popularity owing to their different
advantages which encompass enhanced speed, reduced energy usage, and
heightened resilience.
data, SSDs use a process called wear-leveling, which ensures that data is
evenly distributed across the NAND cells to prevent excessive wear on any
one cell.
• Controller − The SSD controller is a critical component that manages the
reading and writing of data to and from the NAND flash memory. It handles
tasks such as error correction, wear leveling, and garbage collection to
optimize performance and longevity.
• TRIM − The TRIM command is an important feature of SSDs. It allows the
operating system to inform the SSD which data blocks are no longer in use,
allowing the SSD to perform efficient garbage collection and wear leveling,
which helps maintain performance over time.
• Wear Leveling − NAND flash memory cells have a limited number of write-
erase cycles before they degrade. Wear leveling ensures that data is written
evenly across the memory cells, extending the lifespan of the SSD.
• Read and Write Operations − SSDs can read data very quickly since there are
no moving parts involved. Write operations, however, can be more complex
because data must be written to empty pages and previously used pages
must be erased before they can be rewritten. This process is managed by
the SSD controller to optimize speed and minimize write amplification.
SSDs work by storing data in NAND flash memory cells, using a controller to
manage read and write operations, and implementing various techniques like
wear leveling and garbage collection to ensure longevity and maintain
performance. Their speed, reliability, and efficiency have made them a
preferred choice for storage in modern computers and electronic devices.
Magnetic tape, optical discs, and specialised hard drives are tertiary storage
media.
Magnetic tape has a small layer that records magnetic signals and a thicker film
backing. The top coat, or magnetic coating, is a polymer-bound magnetic
pigment.
Magnetic particles and tape backing are held together by the binder. Magnetic
impulses are stored in the top coat, or magnetic layer.
Optical Discs
Optical discs read and write data using optical technology. They are flat, circular
polycarbonate discs with a reflective data layer and a protective outer layer.
• CD (Compact Disc) − CDs were one of the earliest types of optical discs and
were released in the early 1980s. They can store up to 700 MB of data and
are widely used for music, software, and data storage.
Prepared by FBLaud
• DVD (Digital Versatile Disc) − After CDs, DVDs have substantially higher
storage capacity, 4.7 GB single-layer and 8.5 GB dual-layers. In movies,
software distribution, and data backup.
• Blu-ray Disc − Newer optical discs like Blu-rays can store more data than
DVDs. They can hold 25 GB (single-layer) and 50 GB (dual-layer) for
standard discs and more for specialised versions. Blu-ray discs are utilised
for HD video and data storage.
• Archival Disc − Archival optical discs preserve data for long periods.
Archival-grade data volume and durability make them ideal.
• Recordable and Rewritable Discs − Rewritable and write-once optical discs
are available. Rewritable discs can be erased and rewritten, however
recordable discs can only be written once.
How Optical discs work?
• Recording Mechanism − Lasers create tiny pits and lands on CDs, DVDs, and
Blu-rays. Pits and lands are binary data.
• Reading Mechanism − The disc drive's laser detects pits and lands'
reflections to read data. Drive converts reflections into digital data.
A less powerful laser is used to read the digital information from the designs on
the reflective layer. To write data, a more powerful laser heats up a small part of
the reflective layer, making pits and bumps that indicate binary data.
A popular way to store data and distribute video, optical discs now have to
compete with other storage technologies like USB drives, external hard drives,
and cloud storage. But they are still used in some situations where their durability,
ability to store data even when the computer is not on, and resistance to data
corruption are important.
Prepared by FBLaud
Data can be stored on USB drives, which are portable storage devices. Because
of their portability and the ease with which they can transfer and store data, they
are very compact and have a low weight. As a result of these characteristics, they
have become an extremely common storage device.
• Secure Digital (SD) Card − SD cards are popular memory cards. MicroSD,
miniSD, and normal SD are available. Digital cameras, smartphones, and
other portable devices require SD cards.
Prepared by FBLaud
• XQD and CFexpress − These high-speed memory card formats are utilised in
professional cameras and video recorders. They can capture high-
resolution photos and videos due to their quick read and write rates.
• MultiMediaCard (MMC) − MMC cards are smaller than SD cards and used in
older devices. Today they're uncommon.
Prepared by FBLaud
Data transfer speeds and storage capacity vary by memory card. Memory cards
should be compatible, have enough storage, and be fast enough for their intended
usage. Choose a memory card that fits your needs, such as high-speed video
recording or data transfer.
• Network Attached Storage (NAS) − NAS hard drives are designed for
household and small business file sharing and storage. Multiple storage
bays, RAID functionality, and built-in network connectivity make file access
and sharing easy.
• Storage Area Network (SAN) − Multiple servers receive block-level storage
from high-performance. SAN’s using specialised hard drive systems. Data
centres and enterprises utilise them to centralise and manage storage
resources.
• Video Surveillance Storage − Video surveillance systems need hard drives for
continuous HD video recording and playback. These drives are optimised
for write-intensive workloads and surveillance.
• Gaming Storage − Some consoles and high-end PCs include specialised hard
drives for fast loading and smooth gaming. SSDs minimise load times on
these discs.
• Ruggedized Hard Drives − Durable hard drives can survive extreme
temperatures, stress, and vibration. Industries like military, aerospace, and
industrial automation employ them.
• Data Recovery Systems − To recover data from damaged or corrupted drives,
data recovery businesses utilise specialised hard drive systems with
modern tools and software.
• Medical Imaging Storage − Medical imaging technologies like MRI and CT
scans create massive amounts of data that hospitals need to store.
Specialised storage solutions protect data and comply with privacy laws.
• Digital Content Creation (DCC) Storage − DCC professionals like video editors
and 3D animators need high-capacity, high-speed storage for huge
multimedia files. These needs are met by specialised storage systems.
• Scientific Research Storage − Scientific research, notably genomics and
particle physics, requires huge data storage and analysis. Effective big data
jobs require specialised storage solutions.
• Reliability − Tertiary storage media can preserve data for long periods
without degradation due to its durability and longevity.
• Offline Storage − Offline or near-line tertiary storage keeps media from
rotating or being instantly accessible. They are loaded or mounted as
needed.
• Cost-Effective − Tertiary storage is cost-effective for massive, infrequently
accessed data. Media are cheaper than high-speed, high-capacity disc
drives.
Tertiary storage is beneficial in healthcare (for patient records), banking (for past
transaction data), and government (for archive papers) since data retention
regulations are strict. It provides an efficient and cost-effective way to store and
protect large amounts of data. However, its slower access times make it
unsuitable for real-time transaction processing and database searching. These
applications are unsuitable.
Cloud Storage
Cloud storage is a method of storing data on remote servers that are administered
and operated by a service provider that is not directly involved with the user.
Typically, the retrieval and administration of this data occur via internet
connectivity, as opposed to being stored on local storage devices such as hard
drives or on-site servers. Cloud storage services have numerous benefits, such
as scalability, accessibility, cost-effectiveness, and data redundancy.
• Backup and Disaster Recovery − Cloud storage services have backup and
restore tools built in. Users can set up regular backups and recover data in
case they lose data or the system breaks down.
Data storage holds data for long-term storage, while RAM holds data and
instructions for immediate CPU execution. Computers need storage for capacity
and memory for speed and response.
Computer - Memory
What is computer memory?
Memory Classification
• Primary Memory (RAM - Random Access Memory) − Volatile memory loses its
contents when the machine is turned off. RAM stores the data that is
Prepared by FBLaud
actively being used. During the booting process of a system, the operating
system actively uses RAM and applications that are necessary to execute a
file or a program. It speeds up CPU processing by providing fast data and
instruction access.
• Secondary Memory (Storage) − Secondary Memory is also known as
permanent memory or non-volatile memory of a computer. Secondary
memory retains data when the machine shuts down. Files, programmes,
and the OS are stored there permanently. HDDs, SSDs, USB flash drives,
and optical discs are non-volatile memory devices.
• Cache Memory − Memory that is smaller and faster than RAM is called cache
memory. It is placed closer to the CPU than the RAM.
It saves data and instructions that are used a lot so that processing goes faster.
Different types of cache memory, like L1, L2, and L3 cache, have different
speeds and amounts of space.
CPU Cache memory is divided into three "levels": L1, L2, and L3. The memory
hierarchy is again according to the speed and, thus, the cache size.
L1 Cache
Level 1 cache is a computer's fastest memory. The CPU's most frequently
accessed data resides in the L1 cache. CPU determines L1 cache size. Some high-
end consumer CPUs, such as the Intel i9-9980XE, have a 1MB L1 cache, but they
are expensive and rare. Server chipsets like Intel's Xeon have 1-2MB L1 memory
cache. Before buying, examine the CPU specs to ascertain the L1 cache size.
There is no "standard" amount.
Prepared by FBLaud
Source: [1]
The L1 cache normally has two sections: the instruction cache, which stores
CPU operation information, and the data cache, which stores operation data.
L2 Cache
Level 2 cache is larger but slower than L1. Modern L2 memory caches are
gigabytes, not kilobytes. AMD's top-rated Ryzen 5 5600X has 384KB L1 and 3MB
L2 caches and 32MB L3 cache. The L2 cache size depends on the CPU but is
usually 256KB to 32MB. Nowadays, most CPUs have more than 256KB L2 cache,
which is small. Some of the most powerful current CPUs have L2 memory caches
exceeding 8MB. In terms of speed, the L2 cache is slower than the L1 cache but
still faster than the system RAM. L2 caches are 25 times faster than RAM, while
L1 caches are 100 times faster.
L3 Cache
Level 3 cache. The L3 memory cache was originally on the motherboard. This was
long ago when most CPUs were single-core. The L3 cache on top-end consumer
CPUs can reach 32MB, while AMD's groundbreaking Ryzen 7 5800X3D CPUs have
96MB. CPU L3 caches in some servers can reach 128MB.
The largest and slowest cache memory unit is L3. Modern CPUs have an on-chip
L3 cache. The chip's L1 and L2 caches serve each core, while the L3 cache is more
like a memory pool for the whole chip. The following images illustrate the CPU
memory cache levels for a 2012 Intel Core i5-3570K CPU and a 2020 AMD Ryzen
5800X CPU. The second image's bottom right corner contains CPU cache data.
Prepared by FBLaud
Source: [1]
Note how both CPUs have a split L1 cache and larger L2 and L3 caches. On the
AMD Ryzen 5800X, the L3 cache is over five times greater than the Intel i5-
3570K.
memory accesses and loads data into the cache, improves cache
performance.
Cache memory buffers frequently access data between the CPU and main
memory to speed up processing and increase system performance. Modern
computer systems require effective management and structure for optimal
performance.
Register Memory
Register memory, which is also called processor registers or "registers," is the
smallest and fastest type of computer memory that is directly integrated into the
CPU. Registers are small, fast storage units inside the CPU that are used to quickly
store data that is being processed or instructions that are being run.
Internet
A special computer DNS (Domain Name Server) is used to provide a name to the
IP Address so that the user can locate a computer by a name. For example, a
DNS server will resolve a name https://www.tutorialspoint.com to a particular IP
address to uniquely identify the computer on which this website is hosted.
Intranet
Intranet is the system in which multiple PCs are connected to each other. PCs in
intranet are not available to the world outside the intranet. Usually each
organization has its own Intranet network and members/employees of that
organization can access the computers in their intranet.
Prepared by FBLaud
worldwide. The main goal of the Internet is to make it easier for people to share
information. This can be done with a lot of different tools on the Internet. You can
use email, list servers, newsgroups, telnet, gopher, FTP, and the World Wide Web,
among other tools.
• End Devices − End devices include PCs, cellphones, tablets, servers, IoT
devices, etc. at the network edge. These devices produce and use data.
• Network Infrastructure − Routers, switches, cables, fibre-optic lines,
satellites, and wireless access points are all part of the network. Data
travels between end devices via network infrastructure.
• Protocols − Protocols regulate network data and how it is received. The
modern Internet is based on the Internet Protocol Suite (TCP/IP), which
includes −
o Internet Protocol (IP) − This protocol is responsible for addressing and
routing packets of data so they can travel across the network.
o Transmission Control Protocol (TCP) − TCP establishes connections,
acknowledges data, and retransmits missing packets to make sure
that data packets are transferred securely and in sequence.
o User Datagram Protocol (UDP) − UDP, unlike TCP, is a connectionless
protocol that does not ensure reliable delivery. It is frequently
employed in real-time applications where a tiny delay is preferable
to data loss.
• Internet Service Providers (ISPs) − ISPs are firms that provide internet
connection to customers, companies, and other organisations. They
maintain the physical infrastructure and connections that allow people to
access the internet.
• Packets
When data is transmitted over the Internet, it is first divided into smaller
packets, which are then converted into bits. Different networking
equipment, such as routers and switches, route packets to their intended
destinations; when the packets arrive at their destination, the receiving
device reassembles them in the proper order before using or displaying the
data.
Packet switching is the transfer of small pieces of data across networks.
Packets of data allow faster, more efficient data transfer. User-sent files
are often sent in smaller data packets over networks. A 3MB file will be
broken into packets with packet headers that specify the origin IP address,
destination IP address, number of packets, and sequence number.
• Protocols
Prepared by FBLaud
In today's time internet is used everywhere; the followings are some of the
most common uses of the internet.
episodes, music, and other multimedia content whenever they want it (e.g.,
Spotify, Netflix, and YouTube).
• Social Networking − Society has changed a lot because of the internet. It
has changed how people work, learn, and connect with the world. It has
made it easier for people all over the world to meet and work together, but
it has also raised concerns about privacy, security, fake news, and the
digital divide.
• Education / Learning − Users can access well-researched subject-related
content, video lectures, and online education on the Internet. Online
videos, lectures, and notes make learning unique.
• Online Banking − The Internet allows its users to do online banking; it also
offers mobile apps, allowing customers to perform banking-related tasks or
operations conveniently from their smartphones or tablets, further
enhancing accessibility and flexibility.
• Health Care − Remote clinical services over the Internet improve patient
access to quality, cost-effective health care. Innovative home health
devices let doctors monitor patients without expensive house calls and
provide real-time feedback.
• Economic Development / Source of Earning − The Internet is a good source of
income in today's time. It offers your skills and services on freelancing
platforms like Upwork, Freelancer, or Fiverr. People can do online jobs or
work from home like online writing, graphic design, programming, digital
marketing, and many more to earn money.
• Bill Payments − It allows users to pay electricity bills, Tax Pay, Municipal
council bills like water bills etc., online and generate receipts for future
reference. This process saves a lot of time and makes a user convenient.
• Tour and Travels − The Internet has made life easy; it has transformed the
tourism and travel industry, benefiting travelers and businesses. Travelers
may find destinations, attractions, lodgings, and transportation online.
Travel websites, blogs, forums, and review platforms allow customers to
research, read reviews, and plan vacations based on their interests and
budget.
Overall, the internet continues to evolve rapidly, driving innovation and reshaping
different aspects of human life in cutting-edge technology.
• Authentication and Access Control − External users access the extranet using
usernames, passwords, or two-factor authentication. Access controls
restrict users to information and features related to their role or relationship
with the company. This is usually done through user roles, permissions,
and access.
• Secure Communication − Internal and external users can securely
communicate and collaborate on the extranet. Messaging, chat, forums,
and email integration are some common examples of this. Communication
channels are encrypted to prevent eavesdropping.
• Document Management and File Sharing − Users can upload, share, and
collaborate on documents and files within the extranet environment.
Document management features typically include version control, file
organization, access permissions, and audit trails to track changes and
maintain data integrity.
• Project Management − Project management technologies on extranets help
internal and external teams collaborate. Users can assign duties, set
deadlines, measure progress, and share project documents and
information.
• Data Sharing and Exchange − Users can securely share sensitive files and
information with others. Integration with cloud storage services may enable
cross-platform data interchange and collaboration.
• Collaboration and Workflow Automation − Extranets consolidate information,
tools, and resources, simplifying collaboration and workflows. Alerts,
reminders, and task automation help users stay organized and productive.
• Reporting and Analytics − Reports and statistics reveal extranet usage,
collaboration, and project performance. To increase efficiency and
effectiveness, organizations can track KPIs, spot trends, and make data-
driven choices.
• Security and Compliance − To keep sensitive information safe and in line with
regulations, stringent security measures are put in place, including
firewalls, encryption, and access controls. Extranets may adhere to industry
standards and best practices for data security and privacy, such as GDPR,
HIPAA, or ISO certifications.
Features of Extranet
• Secure Access − To prevent unauthorized individuals from accessing the
platform, the extranet uses strong security measures. This includes multi-
factor authentication and encryption protocols to safeguard sensitive
information.
• Document Management − Easy document upload, sharing, and collaboration
with authorized users. With our intuitive folder structure and version control
system, everyone can access the latest data while retaining organization
and security.
Prepared by FBLaud
Extranets come in various types, each tailored to meet specific business needs
and requirements. Here are some common types of extranets −
Intranet, Extranet, and Internet are all types of networks, but they serve different
purposes and have distinct characteristics. Some key differences between them
are described graphically in below images −
Prepared by FBLaud
Internet
• Global network of interconnected computers
• Allows users worldwide to access
• Publicly accessible
Extranet
• Extension of an intranet
• Allows limited access to external users like clients, suppliers, or business
partners
• Secure way for authorized external users
• Ensures that only authorized external users can access the designated
resources
Intranet
• A private network
• Restricted to an organization or group of users
• Used for internal communication, collaboration, and information sharing
Prepared by FBLaud
Components of a Website
The components of a website can vary depending on its purpose, complexity, and
design.
Types of Websites
Websites are typically classified into two categories based on their content and
functionality: static websites and dynamic websites.
Static Websites
Static websites consist of set content that is the same for every visitor.
Prepared by FBLaud
The content is coded directly into HTML files and doesn't change unless
manually updated by the website owner.
• Basic Static Website − It consists of simple web pages with static content
and no interaction. These are commonly used for small enterprises,
personal portfolios, and informational websites.
• Brochure Websites − Like static webpages but designed to resemble digital
brochures or flyers. They provide corporate, product, and service
information.
• Portfolio Websites − Introduce the work, projects, or accomplishments of a
company or an individual (for example, an artist or a photographer), and
highlight their achievements as well.
Dynamic Websites
Dynamic websites are websites that dynamically generate content based on the
activities of users, the data inputs they provide, or other circumstances.
Content can be pulled from databases, files, or other sources and assembled in
real time.
These categories are not mutually exclusive, and many websites incorporate
elements of both static and dynamic content to meet their specific requirements.
Additionally, advances in web technologies have blurred the lines between static
and dynamic websites, with modern static site generators allowing for more
dynamic features while retaining the simplicity of static sites.
Prepared by FBLaud
Static Websites
• Content − The content of a static website is fixed and pre-defined. It is
typically created by hand-coding HTML, CSS, and possibly JavaScript.
• Generation − Each web page is a separate HTML file stored on the web
server. Content remains unchanged until manually updated by the website
owner.
• Interactivity − Limited interactivity. Static websites are generally
informational and do not respond to user inputs or interactions.
• Examples − Brochure websites, basic business websites, and personal
portfolios.
Dynamic Websites
• Content − Content on dynamic websites is generated dynamically, often
using server-side scripting languages like PHP, Python, or Ruby. Content
can be pulled from databases, files, or other sources.
• Generation − Web pages are generated on the fly in response to user
requests. Content can be personalized based on user preferences, session
data, or other variables.
• Interactivity − Dynamic websites can include interactive features such as
user logins, forms, shopping carts, and content management systems.
They can respond to user input in real time.
• Examples − E-commerce websites, social networking platforms, content
management systems, web applications.
Key Differences
• Content Flexibility − Static websites have fixed content, while dynamic
websites can generate content based on various factors, including user
input and database queries.
• Interactivity − Dynamic websites can provide a more interactive experience,
allowing users to submit forms, login, make purchases, and access
personalized content.
• Maintenance − Static websites require manual updates to change content,
while dynamic websites can be updated more easily through content
management systems or database modifications.
• Scalability − Dynamic websites are often more scalable and adaptable to
changing requirements due to their ability to generate content dynamically.
• Development Complexity − Dynamic websites typically involve more complex
development processes, including server-side scripting, database
integration, and potentially more advanced programming languages.
Prepared by FBLaud
Static and dynamic websites have advantages and are tailored to certain
objectives based on the requirements of the website owner. Static websites are
often simpler and more cost-effective for basic informational sites, while dynamic
websites offer greater flexibility and interactivity for more complex projects.
You can find a wide variety of websites that cater to specific needs and interests;
these are just a few examples. To better meet the needs of its visitors, many
websites may also incorporate features of different kinds.
Prepared by FBLaud
Web browsers on desktops, cellphones, and tablets make website access easy.
The following images show the steps to how to access a website.
Following these procedures, you can simply view any website on your device's
web browser.
Webpage Website
It is written using HTML, CSS, and JavaScript All the web pages of a website are written using HTML, CSS, and JavaScript
Web pages are accessible via a web browser A Website is accessible via a web browser
It may include text, images, videos, links, forms, A website also includes text, images, videos, links, forms, and other
and other multimedia elements. multimedia elements.
Webpages are the building blocks of a website It encompasses a broader scope than a single webpage
Webpages are typically interconnected through Websites often include multiple webpages, along with other components
hyperlinks. such as a homepage, navigation menus, headers, footers
Word processors are software tools that allow you to create, edit, format, and
print documents. They provide features to users to manipulating text and
inserting pictures, tables, and other objects into their documents. Word
processors frequently have certain capabilities like spell checking, grammar
checking, and thesaurus services to help users to enhance the quality of their
work.
Generally, Word processors are software applications used to create, edit, format,
and print text-based documents. They are commonly used for composing essays,
reports, letters, and resumes. Microsoft Word, Google Docs, Apple Pages, and
Prepared by FBLaud
LibreOffice Writer are some of the most popular word processing applications.
These programmes are commonly used in a different way, including offices,
schools, and individuals’ task to write reports, letters, essays, and other
documents.
The majority of basic operations remain same and don't require advanced
computer or typing abilities to operate. But a full-featured word processor is one
that enables us to work with text in addition to additional components, including
images, tables, and creative writings, to create interesting and informative pages.
• Status bar − It is an interactive strip at the bottom of the screen that shows
the running tasks.
We may create our own bulletin board posters, type letters and attach them to
emails as documents, and so on. We have chosen Microsoft Word as an
example word processing tool since it is an essential application of Microsoft
Office. It is most widely used application amongst users because of its
simplicity, easiness and document features. Word processors have progressed
significantly over the years, offering increasingly advanced features and
integration with other software and services.
There are different word processors available; some of the most popular include
−
Prepared by FBLaud
The WPS Office suite, developed by Kingsoft Office, includes WPS Office
5. WPS
Writer as one of its components. In addition to being compatible with the
Office
formats developed by Microsoft Word, it provides different tools for the
Writer
creation, editing, and formatting of documents.
Applications that can be used to create, edit, format, and print documents are
known as word processors. To make working with documents easier, they provide
different key functions. Common features of word processors are as −
Prepared by FBLaud
• Text Editing − Word processors enable users to input, modify, and remove
text within documents. Typically, they provide features such as cut, copy,
paste, undo, and redo.
• Formatting Tools − Users have the ability to modify the appearance of text
by using different fonts, font sizes, styles (such as bold, italic, and
underline), colors, alignment options (such as left, right, center, and
justified), indentation, and spacing.
• Spell Check and Grammar Check − Word processing software often has
integrated spell checkers and grammar checkers that can promptly detect
and rectify spelling and grammar mistakes.
• Find and Replace − Users have the ability to search for particular words or
phrases within a document and substitute them with different text. This
functionality is advantageous for making global changes or corrections.
• Headers and Footers − Users have the ability to include headers and footers
in documents. These sections usually include details like page numbers,
document titles, dates, and author names.
• Document Encryption and Security − Word processors can encrypt critical files
with passwords or restrict access.
• Export and Sharing Options − Users may save documents to different file
formats (docx, .pdf, .txt) and share them via email, cloud storage services,
or direct printing.
• Version History − Many word processors keep a record of the revisions that
have been made to a document. This enables users to revert to previous
versions of the document or monitor the changes that have been made
over time.
• Mail Merge − Most modern word processors have mail merge features that
allow users to send personalized letters or emails to different people by
merging a document with a list of recipients' information.
Word processors are extremely powerful tools that may be used for different
purposes, including personal, academic, and professional writings, as well as for
creating, editing, and formatting texts.
Prepared by FBLaud
• Spell Check and Grammar Check − Most word processors have built-in spell
and grammar checkers to help users correct their texts. This assures error-
free, high-quality documents.
Step 3 − Select and click on Microsoft Excel (in the below picture Microsoft Excel
2010 version is installed; version may vary users to users system)
Step 4 − Finally, you will get Microsoft Excel or Spread sheet like
Prepared by FBLaud
• Workbook − This is the entire file containing one or more worksheets. When
you first open Excel, you're typically working within a workbook.
• Worksheet − Also known as a spreadsheet or a sheet, it's a single tab within
a workbook where you can enter and manipulate data. By default, a new
workbook comes with one worksheet, but you can add more as needed.
• Rows − Horizontal lines numbered from 1, 2, 3, and so on, which run across
the worksheet from left to right. Each row is identified by a number.
• Columns − Vertical lines labeled with letters from A to Z, then AA, AB, and
so forth. Columns run from top to bottom, and each column is identified by
a letter.
• Cells − The intersection of a row and a column. Each cell has a unique
address, which is a combination of the column letter and row number (e.g.,
A1, B2, C3, etc.).
• Cell Content − This is the actual data or information contained within a cell.
It can be text, numbers, formulas, dates, or other types of data.
Prepared by FBLaud
• Formula Bar − Located above the worksheet grid, it displays the contents
of the active cell. You can also use it to enter or edit data or formulas in
the active cell.
• Name Box − It displays the address or name of the active cell. You can also
use it to navigate to specific cells or ranges.
• Ribbon − The Ribbon is the strip across the top of the Excel window that
contains tabs of various commands and functions organized into groups.
• Column Headers and Row Headers − The numbered row headers on the left
side of the worksheet and the lettered column headers at the top indicate
row and column positions, respectively.
• Worksheet Tabs − Located at the bottom of the Excel window, these tabs
allow you to switch between different worksheets within the same
workbook.
These are the fundamental parts of a Microsoft Excel spreadsheet, providing the
structure and functionality for organizing and analyzing data.
One of the most popular spreadsheet software is Microsoft Excel. Excel is widely
used for various purposes such as data analysis, financial modeling, budgeting,
forecasting, and more. It offers a wide range of features including formulas,
functions, charts, pivot tables, and macros, making it a versatile tool for both
personal and professional use.
Prepared by FBLaud
Spreadsheets are powerful tools used for organizing, analyzing, and presenting
data in tabular form. Followings are the key features −
Prepared by FBLaud
Prepared by FBLaud
Step 3 − Select and click on Microsoft PowerPoint (in the below picture Microsoft
PowerPoint 2010 version is installed; version may vary from user to users
system)
Step 4 − Finally, you will get the Microsoft PowerPoint application mentioned in
the below image
Prepared by FBLaud
• Title Slide − This is the first slide of a presentation which includes the title
of the presentation, the presenter's name, and the date.
• Slides − These are the pages in a presentation where content such as text,
images, charts and multimedia elements have been inserted.
• Text Box − You can add and format text to a slide by clicking on the Text
box. In the text box, you can change the font, size, colour, alignment and
other formatting options for your text.
• Images − You can improve the look of the presentation by adding images
from your computer or the web to the slides.
• Shapes − You can add different shapes to your slides from PowerPoint.
These shapes can be modified using their size, colour and style.
• Charts − To represent data visually, PowerPoint allows its users to build
different types of charts such as bar graphs, pie graphs and lines.
• Tables − To display data in rows and columns, tables can be inserted into
the slide. To match your requirements, you can adjust the table's
appearance and formatting.
Prepared by FBLaud
All the above-mentioned points are the most common parts of a Microsoft
PowerPoint; generally, a user commonly uses all these to create a presentation.
Microsoft PowerPoint is one of the most popular presentation software tools used
globally to make attractive and interactive presentations. It is part of the
Microsoft Office suite and is widely utilized for creating and delivering
presentations in various settings, including business meetings, academic lectures,
conferences, and more. Following pointer highlights the reasons which make
PowerPoint important.
Prepared by FBLaud
A sender (a person who sends an email) user composes a new email when they
plan to send it to one or more recipients (a person who receives an email) by
adding them, adding a subject line, and attaching files or documents if required.
Once the message is sent, it reaches different servers over the Internet until it
Prepared by FBLaud
reaches a recipient's email address from where they can access this information
via their mail ID.
In the digital age, email is one of the most commonly used forms of
communication and serves a range of purposes from personal correspondence
to business communications and marketing.
Components of an Email
• Mail Server − The mail server is a central system or controller of the entire
email system; it holds the entire log history of sending, receiving, and
deleting emails and manages mail programs for their respective users.
• SMTP − SMTP stands for Simple mail transfer protocol. SMTP is a protocol
specially designed for email system; this protocol can be considered as a
controller program to manage the entire email system; for example, how
email will be sent to the receiver, the computer network to send mail, the
internet network connection, and receivers email inbox to receive email
messages over the Internet.
Email is a method of communication between more than one user over the
internet. The following points simplifies the overview of how it works −
• Creating an Email − You compose a new email using an email client, such as
Gmail, Outlook, or Yahoo Mail. Below mentioned image describes it.
• Sending the Email − Mention the recipient's name write the message in the
body section and then click on the send button. When you hit the "send"
button, your email client communicates with an outgoing mail server (SMTP
server).
Prepared by FBLaud
• Retrieving or accessing the Email − The recipient login using their valid email
ID (such as Gmail or Outlook) and checks their inbox. When they do this,
the email is retrieved by their email client connecting to their incoming mail
server (POP3 or IMAP server).
• Viewing the Email − The recipient can then view the email in their inbox read
it and take necessary actions such as replying or forwarding.
• Replying and Forwarding − The process is repeated if the receiver decides to
reply or forward the email. They use their email ID to log in, enter the
recipient's email address, and draft their message in reply and send the
mail. After that, this email follows the previously outlined process.
• Storage and Deletion − Emails can be kept on the email servers of the sender
and the recipient. Emails can be deleted by users from their inbox, perhaps
moving them to a "deleted items" or "trash" folder. These deleted emails
might eventually be deleted forever from the email server's database.
Anatomy of an Email / Structure of an Email
Emails are complicated and powerful tools. People use emails for different
reasons, from sending personal messages, marketing messages, and official
correspondence to sharing large files and documents. Email has changed a lot in
how it works over the years, but the basic format of an email remains the same.
There are usually four main parts to an email −
• Headers − When you open an email, it's the first thing that we see. A header
includes the sender's name and address, the recipient's email address, the
subject line as well as the date and time when the message was sent.
• Subject Line − One of the most important parts of an email is the subject
line, which tells the recipient what the email is all about. The subject line
Prepared by FBLaud
should be clear and to the point, giving the recipient an idea of what they're
going to find in that email.
• Salutation − Salutation shows how senders address their recipients formally
or casually. The best email salutation may include Hi (first name), Hello
(name), Dear (name), Greetings, and Good morning/afternoon/evening.
• Body − The primary content of the mail is included in the body section of
an email. This is the section where the senders include the actual text of
the message, as well as any attachments or links.
• Signature − The signature is the last section of the email. It usually contains
the sender's name, designation, organisation name, and contact
information. It's a great way to ensure that your recipients can easily get
in touch with you if they have to.
Importance of Email Communication
Email Etiquette
The computer ports are physical docking points of a computer that facilitate
users to connect required external devices to the computer or computer
network. A connection point that acts as an interface between the computer and
external devices like a mouse, printer, modem, etc. is called a port. Ports are of
two types −
The below image gives an idea about what ports are look like −
Generally, ports are docking points through which information flows from a
program to the computer or over the Internet.
Prepared by FBLaud
Thunderbolt
devices to plug computer and the speeds and capabilities, uses automatically install tablets, and USB
cables or device. protocols such as USB 3.0, drivers or configure accessories can be
connectors from ii. Allows USB 3.0C, and USB 2.0C, settings to support it powered using
external devices transferring files to each of which offers different For example, when USB ports without
iii. Cables have and from external data transfer speeds and we connect a USB an adapter.
connectors at both storage devices capabilities. mouse, the system
ends, one to fit into iii. Sending and detects it
the port on the receiving data over automaticall and
computer and the a network enables pointer
other to fit into the connection control.
external device. iv. Streaming
audio and video to
external devices.
Overall, Computer ports allow the computer to communicate and transfer data
with external devices and peripherals.
Characteristics of Ports
Serial Port
In the past, it was used to connect different devices which includes modems,
mice, and printers; however, due to the prominence of USB, it has become
completely obsolete in modern computers. Serial ports transmit data
sequentially means one bit at a time. To do the same, these ports require one
cable to transmit 8 bits. However, this makes slower communication. Serial
ports are usually having 9-pin or 25-pin male connectors. They are also known
as COM (communication) ports or RS323C ports.
Prepared by FBLaud
This port is now mostly obsolete, though some systems compatible with IBM
may have this port.
Prepared by FBLaud
• It can connect all kinds of external USB devices such as external hard disks,
printers, scanners, mice, keyboards, etc.
Prepared by FBLaud
For the sole purpose of supplying power to a device, power connectors are
devices that allow an electrical current to pass through them.
Prepared by FBLaud
It is possible for a computer or other electronic device to charge its battery and
get power from a wall outlet through its power port. Since desktop computers
don't have batteries, they can't be turned on without a power cord plugged into
the power port. The battery in a device like a laptop can work even if nothing is
plugged into the power port as long as the battery is charged.
• Three-pronged plug.
• Connects to the computer's power cable that plugs into a power bar or wall
socket.
Firewire Port
An interface with a high data transfer rate is generally utilized for connecting
digital camcorders, external hard drives, and other multimedia equipment. USB
and Thunderbolt have mostly superseded it. Hence, a FireWire is a high-speed
computer data transfer interface that is used to connect personal computers,
audio and video devices, as well as other professional and consumer electronic
products.
Prepared by FBLaud
These slots enable users to insert SD memory cards, which are typically utilized
in digital cameras and other portable devices.
• The digit
• The position of the digit in the number
• The base of the number system (where the base is defined as the total
number of digits available in the number system)
Decimal Number System
The number system that we use in our day-to-day life is the decimal number
system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In
decimal number system, the successive positions to the left of the decimal point
represent units, tens, hundreds, thousands, and so on.
Each position represents a specific power of the base (10). For example, the
decimal number 1234 consists of the digit 4 in the units position, 3 in the tens
position, 2 in the hundreds position, and 1 in the thousands position. Its value
can be written as
Binary
Step Decimal Number
Number
Prepared by FBLaud
Step 2 19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 1 − Divide the decimal number to be converted by the value of the new
base.
Step 2 − Get the remainder from Step 1 as the rightmost digit (least significant
digit) of the new base number.
Step 3 − Divide the quotient of the previous divide by the new base.
Step 4 − Record the remainder from Step 3 as the next digit (to the left) of the
new base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient
becomes zero in Step 3.
The last remainder thus obtained will be the Most Significant Digit (MSD) of the
new base number.
Prepared by FBLaud
Example
Decimal Number: 2910
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
Step 1 − Determine the column (positional) value of each digit (this depends on
the position of the digit and the base of the number system).
Step 2 − Multiply the obtained column values (in Step 1) by the digits in the
corresponding columns.
Step 3 − Sum the products calculated in Step 2. The total is the equivalent value
in decimal.
Example
Binary Number: 111012
Step 2 − Convert the decimal number so obtained to the new base number.
Example
Octal Number : 258
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5/2 2 1
Step 4 2/2 1 0
Step 5 1/2 0 1
Step 1 − Divide the binary digits into groups of three (starting from the right).
Step 2 − Convert each group of three binary digits to one octal digit.
Example
Binary Number : 101012
Step 2 101012 28 58
Step 1 − Convert each octal digit to a 3-digit binary number (the octal digits
may be treated as decimal for this conversion).
Step 2 − Combine all the resulting binary groups (of 3 digits each) into a single
binary number.
Example
Octal Number : 258
Step 1 − Divide the binary digits into groups of four (starting from the right).
Step 2 − Convert each group of four binary digits to one hexadecimal symbol.
Example
Binary Number : 101012
Step 2 − Combine all the resulting binary groups (of 4 digits each) into a single
binary number.
Example
Hexadecimal Number : 1516
What is Data?
Data is a raw material; it’s a collection of facts and figures. Data does not have
a significant meaning because of its raw nature. Data may include text, figures,
facts, images, numbers, graphs, and symbols and it can be generated from
different sources like sensors, surveys, transactions, social media etc.
G15, KPL, and Gud are some examples of data. Data needs to be processed to
convert into a useful manner which is known as information. For example – Gud
is data; after text processing, it converts into Good which is information.
• Raw material
• Unstructured information
• It has no context
• Processed Data
• Structured information
• It has context
A proper analysis of data plays an important role in fields like research, science,
business, healthcare, agriculture, and technology, driving decision-making and
innovation.
Characteristics of Data
Some characteristics of different types of data are as follows −
• It is descriptive.
Qualitative / • It can be explored using colours, textures, opinions or any other related feature.
Descriptive Data • It's often subjective which requires interpretation.
• It can be categorical or ordinal.
• It is organized in a predefined structure and usually includes a tabular form like databases, or
Structured Data spreadsheets.
• Easy to search
Prepared by FBLaud
• It is continuously generated and transmitted in a real-time environment like sensor data, social
Streaming Data media updates, financial market data, etc.
• It requires real-time data processing.
• It often uses applications like IoT, real-time analytics, etc.
Types of Data
Types of Data
Quantitative
It's available in numerical form, like 50 Kg, 165 cm, 15887 etc.
data
Discrete Data Data that take certain values like whole numbers. For example, the number of employees in a departm
Data that can take any value within a range. For example, wind speed, and temperature. For example -
Continuous
time, certain continuous data, such as the weight of the baby over the year changes or the temperatur
Data
room during the day changes.
Qualitative
It's available in a descriptive form for example name, gender, address, and features of a person.
data
Nominal Data Data that represents categories with no inherent order. For example, colours, and gender.
Data that represents categories with a specific order or ranking. For example, ranking satisfaction level
Ordinal Data
"poor," "average," or "excellent."
Prepared by FBLaud
Categorical The data which represents categories or labels and is often qualitative is called categorical data. It can
Data nominal and ordinal data.
Numerical
This type of data includes numbers. It can be either quantitative or qualitative.
Data
Time Series
Data collected over time intervals like stock prices, weather data, and sales figures.
Data
Spatial Data Data associated with geographic locations like Google maps, GPS data, and satellite images.
What is Information?
Characteristics of Information
General Characteristics of Information are as follows −
2 It is meaningless It is meaningful
Data is represented in the form of graphs, numbers, Information is presented in the form of words, language,
7
figures, or statistics thoughts, and ideas.
9 It can be considered as a single unit that is unprocessed It is a product and a collection of data
• Network Cables
• Distributors
• Routers
• Internal Network Cards
• External Network Cards
Network Cables
Network cables are used to connect computers. The most commonly used cable is Category 5
cable RJ-45.
Distributors
A computer can be connected to another one via a serial port but if we need to connect many
computers to produce a network, this serial connection will not work.
Prepared by FBLaud
The solution is to use a central body to which other computers, printers, scanners, etc. can be
connected and then this body will manage or distribute network traffic.
Router
A router is a type of device which acts as the central point among computers and other devices
that are a part of the network. It is equipped with holes called ports. Computers and other devices
are connected to a router using network cables. Now-a-days router comes in wireless modes
using which computers can be connected without any physical cable.
Prepared by FBLaud
Network Card
USB card is easy to use and connects via USB port. Computers automatically detect USB card
and can install the drivers required to support the USB network card automatically.
Prepared by FBLaud
Print Page
• Memory Management − Keeps track of the primary memory, i.e. what part
of it is in use by whom, what part is not in use, etc. and allocates the
memory when a process or program requests it.
• Processor Management − Allocates the processor (CPU) to a process and
deallocates the processor when it is no longer required.
Prepared by FBLaud
• Device Management − Keeps track of all the devices. This is also called I/O
controller that decides which process gets the device, when, and for how
much time.
• File Management − Allocates and de-allocates the resources and decides
who gets the resources.
• Security − Prevents unauthorized access to programs and data by means
of passwords and other similar techniques.
• Job Accounting − Keeps track of time and resources used by various jobs
and/or users.
• Control Over System Performance − Records delays between the request for
a service and from the system.
• Interaction with the Operators − Interaction may take place via the console
of the computer in the form of instructions. The Operating System
acknowledges the same, does the corresponding action, and informs the
operation by a display screen.
• Error-detecting Aids − Production of dumps, traces, error messages, and
other debugging and error-detecting methods.
• Coordination Between Other Software and Users − Coordination and
assignment of compilers, interpreters, assemblers, and other software to
the various users of the computer systems.
Keyboards are standard input devices used to enter data or inputs into a
computer to process. There are several types of keyboards, each designed for
different purposes and preferences.
Standard Keyboards − This is the type of keyboard that you find on your desktop
computer. They're equipped with a QWERTY layout of keys, which are named
after the 6 letters at the upper end of the keyboard.
Prepared by FBLaud
Additional keys such as function keys, numeric keypads and navigation keys
may be included in the standard keyboard.
Laptop Keyboards − The laptop keyboard is small and integrates with the
machine.
They're usually similar to the standard keyboard layout but may have smaller
keys or missing some key combinations such as numeric keypads to save space.
They might have split or curved layouts to accommodate the natural curvature
of the hands and wrists.
They provide increased flexibility and convenience by making comfort for their
users to type at a distance.
Instead of physical keys, users tap on the screen to interact with them.
All of the above mentioned are some most common types of keyboards, each
serving different needs and preferences for users.
Ctrl + D (or Delete) To delete the selected item and move it to the Recycle Bin.
Alt + Esc To cycle the items that have been opened in order of their opening.
Alt + Spacebar To open the shortcut menu for the active window
Ctrl + Right arrow To move the cursor to the beginning of the next word.
Ctrl + Left arrow Move the cursor to the beginning of the previous word.
Ctrl + Down arrow Move the cursor to the beginning of the next paragraph.
Ctrl + Up arrow To move the cursor to the beginning of the previous paragraph.
Ctrl + Alt + Tab To use the arrow keys to switch between all open applications
Ctrl + Shift + arrow keys When a tile is in focus on the Start menu, move it into another tile to create a folder.
Ctrl + arrow keys To resize the Start menu when it's open.
Shift + F10 Display the shortcut menu for the selected content
You can choose more than one item in a window or on your desktop, or you can type
Shift with any arrow key
text from the file.
Prepared by FBLaud
Shift + Delete Delete the selected item without moving it to the Recycle Bin.
PrtScn Take a picture of your entire screen and copy it to the clipboard.
• Norton AntiVirus
• McAfee
• Avira's
• Trend Micro
• Avast
• Malwarebytes
• ESET
• Norton 360 Deluxe
Advantages of Antivirus Software
Benifits Significations of Antivirus Software
• Suspicious virus detection and deletion, malware.
• Preventing fraud and phishing, as well as identity theft.
• Alert yourself before clicking on any links or websites that seem risky.
• Scanning the Dark Web for hacked email addresses.
• Secure password encryption for online accounts.
• To keep safer during online access.
• To maintain optimal performance.