CSC101 Lecture Note
CSC101 Lecture Note
The computer as we know it today is most likely one of the great technological "triggers" for future
change. In the short period since the "invention" of the computer, its impact on our lives has been
felt in a variety of ways. From the workplace to the home, the computer is rapidly becoming an
indispensable tool. What is this device that has become so important, and how does it work? The
answers lie in the history of its development, as we shall study in this course.
1. EARLY HISTORY OF COMPUTER
The computer is relatively new but its development to its present stage is long. Computers were
developed as a result of man’s search for fast and accurate devices to do things easier. Historically,
Computer started as a mechanical counting and calculating devices, later as electromechanical
devices, and presently as digital electronic devices. The development takes place in three (3)
directions:
1. Miniaturization – reduction of computer in size to become smaller.
2. Speed – making computer to be faster
3. Affordability – cost reduction
The modern computer had its beginning with 19th century prominent devices which include Abacus,
slide rule, Napier’s bones, Difference Engine, Hollerith Tabulating Machine, and others.
The Abacus -2500 BC:
Abacus was the first known calculating machine used for counting. It was made of beads strung on
cords. The cords correspond to positions of decimal digits. The beads represent digits. Numbers are
represented by beads close to the crossbar. Abacus was mainly used for addition and subtraction and
later for division and multiplication.
Fig. 1.3: Napier’s Bones Fig. 1.4: The Rotating Wheel Calculator
The Difference Engine - 1822 AD:
The Difference Engine was built by Charles Babbage, the British mathematician, and engineer which
mechanically calculated mathematical tables. The machine contains all the necessary elements of a
modern computer and was very large. His Analytical Engine was the first machine able to receive
instructions in the form of holes in paper punch cards and hence is considered as the first
programmable machine. Also, the Analytical Engine was the first machine to support conditional
program execution. Although he spent all his fortune and worked for nearly 40 years on the project,
it was never completed. Babbage is called the father of today’s modern computer because his
machine formed the basis on which modern computers were made.
Sequel to this development, when Augusta Ada Byron, Lady Lovelace heard of Babbage’s idea for
a new engine. She suggested to Babbage a plan for how the engine might work. This plan is regarded
as the first computer program. So, Ada Lovelace was regarded as the first computer programmer.
Fig. 1.5: The Difference Engine Fig. 1.6: Hollerith Tabulating Machine
Hollerith Tabulating Machine - 1890 AD:
A tabulating machine using punched cards that worked on electricity was designed by Herman
Hollerith and was called the Hollerith Tabulating Machine. This electronic machine was able to read
the information on the punched cards and process it electronically. The tabulator was used in
processing census data of 1890 in the US by reading of holes on punched cards. Hollerith founded a
tabulating machine company that changed to International Business Machine (IBM) cooperation in
1924.
2
2. THE 20TH CENTURY DEVICES:
In the 1920s and ’30s, several new types of calculators were constructed. Some of the prominent
20th-century devices are:
1. Differential Analyzer: Vannerver Bush, an American engineer, developed an analog computer
that he called a differential analyzer; the first calculator to solve differential equations, but its
lack of precision prevented wider adoption.
2. Harvard Mark 1: In 1944, Howard Aiken, in an attempt to develop the machine that could help
him in solving difficult differential equations, invented the Automatic sequence controller
calculator called Mark 1, the world's first computer. It was an electromechanical machine,
similar to Babbage’s engine in design and so was described as Babbage’s dream come true. Mark
1 was very huge based on relays and was not fast.
3. ENIAC: In 1946, the machine based on very high-speed vacuum tubes called Electronic
Numerical Integrator And Calculator [ENIAC] was invented by John W. Mauchly. It was faster
than Mark 1. ENIAC was described as the first general-purpose electronic computer and is often
chosen as the main representative of vacuum tube computers now refer to as first-generation
computers. ENIAC contained 18,000 vacuum tubes, weighed over 30 tons, occupied 1600 square
feet of floor space, and required 100 kilowatts of power. Heat dissipation was a problem and the
vacuum tubes were not very reliable; when one burned out, it had to be replaced. The ENIAC
was much faster than the MARK I, capable of arithmetic operations in fractions of a second. One
difficulty that the ENIAC and MARK I had was that their design used a decimal representation
of numbers. John von Neumann, based on an idea by Claude Shannon, proposed that binary
numbers would simplify the design of computers.
4. EDSAC: Subsequently, to improve on ENIAC, Mauchly and J. Presper Eckert developed a
binary rather than a decimal electronic computer and was a stored program machine called
Electronic Delay Storage Automatic Calculator [EDSAC] in 1949. EDSAC was based on
Veneman’s idea to improve speed and flexibility.
5. UNIVAC: In 1951, Eckert -Mauchly put into service, the world’s first commercial computer
called UNIVAC. It is a stored-program computer and handled numbers and alphabet characters.
Moreover, in 1958, the breakthrough in computer miniaturization occurred, when Jack Kilby
designed the first true integrated circuit, the major component of electronic circuitry. This enables
makers of computers to cram more hardware components into small space into their machines and
more data storage capacity.
Another evolution in microchips technology occurred in 1971 when Marcian E. combined the basic
elements of a computer on one tiny silicon chip, called a microprocessor. The personal computers;
desktops and laptops that we use today were invented in the 1970s.
3. GENERATION OF COMPUTERS
This occurs due to a change in technology used for building computers based on devices being used,
hardware organization, and programming languages used. At present we have six prominent
generations of computers. Every new generation has dramatic improvements that fundamentally
changed the way computers operate compared to the previous one. These helped to develop smaller,
cheaper, powerful, efficient, and reliable machines.
First Generation Electronic Computers (1937-1953)
3
The first generation of computers used vacuum tubes as the basic components for memory and
circuitry for Central Processing Unit [CPU]. These tubes consumed a large amount of electricity and
generate enormous heat that can cause the computer to malfunction.
The features of the first-generation computers are:
1. the vacuum tube is the basic components for memory and Central Processing Unit circuitry
2. very large normally taking up entire rooms and so non-portable
3. consume a large amount of energy
4. generate a lot of heat
5. low in reliability due to slow input and output devices
6. very expensive because the vacuum tubes used and so, only large organizations can afford it
7. had limited memory size
8. It used machine language or 0s and 1s only, subroutines, and assemblers.
Computers of this generation could only perform a single task at a time, and mainly batch processing
operating system was used. The input was based on punched cards, magnetic tape, and paper tape,
and output was displayed on printouts. The first multi-purpose, programmable, computing device
was probably Charles Babbage's Difference Engine, which was never completed. A more ambitious
machine was the Analytical Engine, designed in 1842, but unfortunately, it was only partially
completed by Babbage. Some computers of this generation were: abacus (3000 BC), Pascaline (17th
century), Punch cards (1890) for data input, output, and storage. UNIVAC, ENIAC, EDVAC, IBM-
701, IBM-650, are classic examples of first-generation computing devices.
4
Fig. 3.2a: Transistor b: Second Generation computer (1954-1962 )
The features of second-generation computers are:
1. The invention of transistors which replaces vacuum tubes
2. The transistor made computers smaller, less expensive, and increased calculating speeds.
3. Consumed less electricity as compared to first-generation computers
4. Generated less heat as compared to first-generation computers
5. Reliable in comparison to first-generation computers
6. Supported machine and assembly languages
Memory technology was based on magnetic cores which could be accessed in random order
Some computers of this generation were: IBM 1620, TADIC, IBM 704, IBM 7030, IBM 7094, CDC
1604, CDC 3600, UNIVAC 1108.
Third Generation of computers (1963-1972):
The computers of the third generation used Integrated Circuits (ICs) invented by Jack Kilby in place
of transistors. Transistors were made smaller in size and placed on silicon chips, which dramatically
increased the speed, efficiency, reliability of computers and made computers smaller in size. A single
IC has many transistors, resistors, and capacitors along with the associated circuitry. In this
generation, keyboards and monitors were used instead of punched cards and printouts. The
computers were interfaced with an operating system that allowed remote processing, time-sharing,
and multi-programming. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1,
BASIC, ALGOL-68, etc.) were used during this generation
The features of third-generation computers are:
1. hundreds of transistors were replaced by integrated circuits(IC) on a silicon chip (LSI
and VLSI)
2. This made computers even smaller and faster
3. Consumed lesser electricity
4. Generated less heat
5. More reliable in comparison to the previous two generations
6. Costly with lesser maintenance
7. Supported high-level languages such as BASIC, Pascal, C, COBOL, and Fortran
Some computers of this generation were: IBM-360 series, Honeywell-6000 series, PDP (Personal
Data Processor), IBM-370/168, TDC-316, Intel 4004, Intel 8008, etc.
6
Some computer types of this generation are Desktop, Laptop, NoteBook, UltraBook, ChromeBook,
IBM PC-AT, Intel 80486, video toaster, etc.
9
Each key on a standard keyboard has one or two characters. Press the key to get the lower character
and hold Shift to get the upper characters.
Some keyboard keys and their functions
i. Enter key- to begin the next line, paragraph, or tell the computer to obey a command
ii. Space bar- to insert spaces between words
iii. Backspace – to delete characters to the left of the cursor
iv. Caps lock- to notify the computer when to type upper case and when to type lower case letter
v. Shift key – to type symbols located on the keyboard with two symbols on then
The mouse: is an input device that is used to send messages (instructions) from the user to the
computer system (applications packages). Most modern computers today have two buttons the left
one is used to select objects and text and the right one is used to access menus.
Laptop computers use touchpads, buttons, and other devices to control the pointer. Hand-held use a
combination of devices to control the pointer, including touch screens.
A mouse performs the following functions
A mouse can be used to select icons on the Desktop
A mouse can be used to select commands in software applications.
It can be used to open a program, a folder, or a file.
A mouse can be used to move icons representing programs, folders, or files on the screen.
10
Fig. 5.7: Digital Camera
Light Pen: A light pen is a pointing device shaped like a pen and is connected to a monitor. The tip
of the light pen contains a light-sensitive element that, when placed against the screen, detects the
light from the screen enabling the computer to identify the location of the pen on the screen.
11
Fig. 5.12: OCR Sheet
Optical Mark Reading and Recognition (OMR): In this method, special pre-printed forms are
designed with boxes that can be marked with a dark pencil or ink. Such documents are read by a
reader, which transcribes the marks into electrical pulses that are transmitted to the computer. They
are widely used in applications like objective type answer papers evaluation in which a large number
of candidates appear, timesheets of factory employees, etc.
12
Fig. 5.16: Microphone
Output Devices: Output is anything that comes out of a computer. An output device is capable of
presenting information from a computer. There are many output devices attached to computers. But
the monitors and printers are commonly used output devices. Disk drives and CD recorders can also
be considered output devices because the system sends data to them to be saved
Monitors: The monitor is a commonly used output device, sometimes called a Visual Display
Unit(VDU). It provides a visual display of data. Monitors are connected with the computer and are
similar in appearance to a television set.
Fig. 5.19a) Line Printer b) Dot Matrix c) Thermal Printer d) Laser Printer e) Inkjet Printer
Dot Matrix Printer: The most popular serial printer is the dot matrix printer. It prints one line of 8
or 14 points at a time, with the print head moving across a line. Dot-matrix printers work like a
typewriter transferring ink from a ribbon to paper with a sequence or 'matrix' of tiny pins. They are
normally slow. The printing speed is around 300 characters per second. It uses multipart stationaries
to prepare copies of a document.
Thermal Printer: Thermal printers are printers that produce images by pushing electrically heated
pins against special heat-sensitive paper. They are inexpensive and used widely in fax machines and
calculators. Thermal printer paper tends to darken over time due to exposure to sunlight and heat.
So, the printed matters on the paper fade after a week or two. It also produces a poor-quality print.
Laser Printers: Laser printers use a laser beam and dry powdered ink to produce a fine dot matrix
pattern. It can produce a very good quality of graphic images. One of the chief characteristics of laser
printers is their resolution – how many dots per inch (dpi) they lay down. The available resolutions
range from 300 dpi at the low end to around 1200 dpi at the high end.
Inkjet Printers: Inkjet printers use colour cartridges that combine magenta, yellow and cyan inks
to create colour tones. A black cartridge is also used for crisp monochrome output. Inkjet printers
work by spraying ionizing ink at a sheet of paper. Magnetized plates in the ink’s path direct the ink
onto the paper in the described shape.
Speakers: The computer is an electromechanical device that produces voice output(audio data).
Speaker serves as a voice output device. Using speakers along with speech synthesizer software, the
computer can provide voice output. Voice output has become very common in many places like
airlines, banks, automatic telephone inquiry system, etc. Users can also hear music/songs using the
voice output system.
15
The smallest unit that can be written to or read from the disk is a sector. Once a read or write request
has been received by the disk unit, there is a delay involved until the required sector reaches the
read/write head. This is known as rotational latency, and on average is one half of the period of
revolution.
The storage capacity of the disk is determined as (number of tracks * number of sectors * bytes
per sector * number of reading/write heads) Thus, the data is stored as magnetized spots arranged
in concentric circles (tracks) on the disk. Each track is divided into sectors. The arrangement of tracks
and sectors on a disk is known as its ‘format’.
High data rates demand that the disk rotates at a high speed (about 3,600 rpm). As the disk rotates
read/write heads move to the correct track and fetch the desired data.
17
Fig. 6.2: System Software
Utility Software: Utility software, designed to manage the operating system, support the computer
hardware, and directly performing services that benefit ordinary users. Utility software helps to
manage, maintain, and control computer resources. Some have been integrated into Operating
systems such as file manager, disk cleaner, backup, disk petitioner, launcher applications, network
managers, etc.
Antivirus software, as the name suggests, helps to protect a computer system from viruses and other
harmful programs.
Backup software helps in the creation of a backup of the files on your hard disk drive of a computer.
Backup software helps you copy the most important files on a disk and use it to restore the entire
disk in the event of data failure of the selected file in the event of accidental deletion.
Translators: Computers can understand instructions only when they are written in their language,
the machine language. Translator a program designed to translate instructions written in any other
language into machine language so that computers can execute them. Their translators are;
compilers, assemblers, and Interpreters.
7. OPERATING SYSTEM (OS):
The most important type of system software is the operating system. An operating system is an
integrated set of specialized programs that are used to manage the overall operations of a computer.
It serves as the interface between the computer hardware, the software, and the end-user, and allows
a user to run other applications on a computing device. The primary goals of the O. S. are mainly to
optimize resources and providing a user-friendly environment. It acts as manager of resources such
as CPU time, memory space, file storage, I/O devices and allocates resources among the various
programs optimally competing for them. Every computer must have an operating system to run other
programs and ensure that available resources are equally shared. Examples of Operating Systems are
Mac-OS, MS-DOS, UNIX, Windows O.S. LINUX, Apple Macintosh, and Android O.S.
Windows O.S. is an operating system with a graphical user interface (icons, pictures, and menus)
instead of text; uses a mouse as well as a keyboard as an input device)
The Versions are Windows 98, Windows Me, Windows NT, Windows 2000, Windows
XP, Windows Server 2003, Windows Vista, Windows 7, etc.
O. S. programs: O. S. consists of several programs. They are categorized into control programs for
managing resources and service programs for providing services.
Scheduling strategies
While executing a job, the OS reads the next job from memory into a storage area on the disk and
outputs a printout of a previous job from disk to the printer. Spooling allowed the CPU to choose a
particular job for execution leading to the concept called Job Scheduling. Scheduling is the method
by which processes are given access to system resources. The strategies used are:
1. Multiprogramming system: In multiprogramming, memory is divided into many partitions.
The O. S. keeps two or more processes that are runnable in memory simultaneously by sharing
a single processor. It selects a job from the ready state and starts executing it. When that job
18
needs to wait for some external event the CPU is switched to another job to maximize CPU
usage(eliminate idle time). Multiprogramming allows many programmers to load their programs
in different partitions.
2. Time-sharing: Multiprogramming was followed by the time-sharing concept. In Time-sharing,
the running task is required to relinquish the CPU, either voluntarily or by an external event to
another task. This is to allow several programs to execute simultaneously. This is known as a
multitasking system. It is a method by which multiple processes share common processing
resources by switching between them with a fixed time for each program. In the next cycle, the
program that had been considered earlier was taken once again. This process continued until all
the programs were executed. A computer with a single CPU uses multitasking to solve problems
by scheduling which task may run at any given time and when another waiting task gets a turn.
The act of reassigning a CPU from one process to another is called a context switch. Context
switch involves two processes one leaves the running state and another enters the running state.
A computer with more than one CPU is called a multiprocessing system it is where multiple
processors run multiple processes at the same time, which creates physical parallelism.
3. Major Features of the Operating System: based on the number of users, and O. S. can
be Single user: only one user can operate the system at a time e.g. MS-DOS. Multi-user
O.S.: More than one user can operate the same system simultaneously and is based on the
concept of time-sharing e.g. Unix O.S.
Functions of Operating System:
Today, most operating systems perform the following important characteristics:
1. Process management: It controls the jobs submitted to the CPU. Several algorithms are used to
allocate the job to the processor e.g. First In First Out; based on queuing, Shortest Job First: select
the process that has the shortest expected processing time. Round Robin: Jobs are assigned
processor time in a circular method; Based On Priority: In this method, each job is assigned a
Priority
2. Memory management: It Keeps track of the primary memory, to check what part is in use, by
whom, what part is not in use, etc. It manages the allocation of main memory and other storage
areas to the system programs as well as user programs and data when a process or program
requests it.
3. Device (I/O) management: It manages the coordination and assignment of different Input and
Output devices while one or more programs are executed. Only the O. S. is empowered to instruct
the hardware to make an allocation or de-allocation, which process gets the device, when, and
for how much time.
4. File management: It allows all files to be easily changed and modified through the use of text
editors or some other file manipulation routines.
5. Job scheduling: It determines and maintains the order in which jobs are to be executed in the
computer system.
6. Interpretation of commands and instructions.
7. Facilitates easy communication between the computer system and the computer operator
8. Monitor performance: it supervises records delays between the request for a service and from the
system.
9. Security Management: The O. S. provides some levels of securities to the user like the File
access, System-level, and Network level to safeguard against unauthorized access. To access the
files created by other people, you should have the permission, password in a multi-user
environment.
19
8. APPLICATION SOFTWARE:
An Application Software consists of programs designed to solve a user problem in a particular area.
Users interact with the application software while doing their different activities. It is used to
accomplish specific tasks rather than just managing a computer system. Such as a program to list
stock items for a particular shop, or a program designed to give a forecast of the weather; the list is
endless. These programs are written in different languages such as BASIC or C or by using database
packages like dBase, Oracle. Example: Payroll, Billing, Railway Reservation, etc. Application
software is in turn, controlled by system software that manages hardware devices. Application
software is classified into customized applications and general-purpose application programs.
The General-Purpose Application Programs: These packages are developed to suit the needs of
research workers /scientists in different fields. These packages are categorized as Word
processor (typing letters), Spreadsheet (financial info), Database (inventory control and address
book), Data Analysis, Graphics program, Internet Browser, Email, and many others, etc. The
commonly used Application Software packages are a word processor, spreadsheet, database
management system, and graphics.
Word processing software. This software enables you to create, edit, format, store and print text
and graphics. Word processors are used in offices (to prepare letters, memos, project reports,
minutes), in publishing (books), by journalism (media houses to produce newspapers and
magazines), and in education (to prepare test and study materials). Some of the commonly used word
processors are Microsoft Word, WordStar, WordPerfect, word pad, etc.
Some Basic Features of word processors
Word processors provide the following basic features:
Insert text: Allows you to insert text anywhere in the document.
Delete text: Allows you to erase characters, words, lines, or pages unlike crossing out on paper.
Cut and paste: Allows you to remove a part of the text from one place in a document and insert it
somewhere else.
Copy: Allows you to duplicate a section of text.
Page size and margins: Allows you to define various page sizes and margins, and the processor will
automatically readjust the text so that it fits.
Search and replace: Allows you to search for a particular word or phrase and replace it with another.
Word wrap: The word processor automatically moves to the next line once the current line is full
Print: Allows you to send a document to a printer to get a hardcopy.
Spreadsheet software is the computer equivalent of a paper worksheet to organize numeric data in
a tabular form. It provides many Mathematical, Financial & Statistical functions, used in many
businesses, scientific and engineering environments for analyzing data, calculations, organizes data
in tabular form, and creation of graphics and charts. A spreadsheet consists of a grid made from
columns and rows. Examples of spreadsheet programs are: Lotus 1-2-3, Corel's QuattroPro, MS
Excel
Database Applications: A Database is a collection of related information about a particular subject
(person, place, or thing) stored in a way that can easily be accessed, managed, and updated. Such as
Computerized banking system, Automated Teller Machine, Airlines, and Railway reservation
system, etc., are some of the database applications. The common Characteristics of Database
include: Self-describing, Data exists permanently, multiple users can access the same data, and Data
20
security protects the data from unauthorized access with the help of the passwords. Many software
is used as Database Management Systems. Example: MS-Access, ORACLE, MySQL, etc.
Relationship between Hardware and software
1. Hardware and software are mutually dependent on each other.
2. Both of them must work together to make a computer produce a useful output.
3. The software cannot be utilized without supporting hardware.
4. Hardware without a set of programs to operate upon cannot be utilized and is useless.
9. TYPES OF COMPUTER.
Classification of the electronic computers may be based on either their principles of operation or
their configuration. By configuration, we mean the size, speed of doing computation, and storage
capacity of a computer. Computers can be broadly classified by their size, speed, and computing
power (performance) into; i) microcomputers ii) Minicomputers iii) mainframe computers and iv)
supercomputers.
1. Micro Computers
These are the smallest range of computers having less storing space and processing speed. They are
also called “computer of a chip” because its entire circuitry is contained in one tiny chip also called
a microprocessor or CPU. These computers are also known as “Personal Computers”. Businesses
use personal computers for word processing, accounting, desktop publishing, and running
spreadsheet and database management applications. At home, the most popular use of personal
computers is playing games and surfing the Internet. A microcomputer is further categorized into the
following types: -
a) Workstations b) Desktop c) Tablet PC d) Laptops e) PDAs
21
Fig.9.2: Personal Computer
c) Tablet PC is a kind of microcomputer that offers the newest development in portable computers.
It is designed to function more like a portable writing tablet including handwriting recognition,
voice, and fingerprint authentication.
22
3. Mainframe: The mainframe is are expensive, very large, and capable of supporting even
thousands of users simultaneously. They are used to process a large amount of data quickly at very
high speeds (million instructions per second). Mainframe executes many programs concurrently and
supports many simultaneous executions of programs at banks, airlines, and railway reservation
systems, aerospace companies doing complex aircraft design, etc.
24
(registers). The control unit of the CPU coordinates the action of the entire system. The Control Unit
controls all the hardware operations. The arithmetic and logic units performing addition, subtraction,
division, and multiplication as well as some logical operations. The instructions and data are stored
in the main memory (RAM) so that the processor can directly fetch and execute them. While between
any two components of the computer system, there is a pathway called a bus which allows for the
data transfer between them.
Memory devices: The computer stores the program and data that are currently being used in the
main memory (RAM). The main memory holds data and programs only temporarily. Secondary
storage devices can hold more storage than the main memory and are much less expensive.
11. ROLES OF COMPUTERS IN A SOCIETY:
In this digital age of information technology, it has become a necessity for everyone to know about
computers. This is based on the fact that the problems that we must solve are no longer solvable
without the aid of computers. The application of computers in the society has led to many changes
in education, government, health, homes, industry, law, medicine, scientific research, social service,
and even arts like music, movies, and paintings
Computers at home: Many homes have multiple computers used for Internet communication,
shopping, business, entertainment, schoolwork, and finances.
Business: A computer has a high speed of calculation, diligence, accuracy, reliability, or versatility
which has made it an integrated part in all business organizations for; payroll calculations, budgeting,
sales analysis, financial forecasting, managing employee database, maintenance of stocks, etc.
Banking: Today, banking is almost totally dependent on computers. Online accounting facilities,
including checking current balance, making deposits and overdrafts, checking interest charges,
shares, and trustee records are computer-based. ATMs that are completely automated are making it
even easier for customers to deal with banks.
Insurance: Insurance companies, finance houses, and stockbroking firms are widely using
computers for maintaining a database of all clients with information showing: procedure to continue
with policies, starting date of the policies, next due instalment of a policy, maturity date, interests
due, survival benefits and bonus
Education: Computer literacy is required at all levels in providing a lot of facilities in the education
system. The computer provides a tool in the education system known as CBE (Computer Based
Education) which involves control, delivery, and evaluation of learning. It is used to prepare a
database about the performance of a student and analysis is carried out on this basis.
Marketing: Computers are used in marketing for advertising and selling more products.
Healthcare: Computers have become an important part of hospitals, labs, and dispensaries, to keep
the record of patients and medicines and to diagnose different diseases. Such as:
• Diagnostic System to collect data and identify the cause of illness.
• Patient Monitoring System to check the patient's signs for abnormality such as in Cardiac
Arrest,
• Pharma Information System to check drug labels, expiry dates, harmful side effects, etc.
• Surgery is used in performing surgery.
Engineering Design: Computers are widely used for engineering purposes. Such as:
• Structural Engineering for the design of ships, buildings, budgets, airplanes, etc.
25
• Industrial Engineering for design, implementation, and improvement of integrated systems
of people, materials, and equipment.
• Architectural Engineering for planning towns, designing buildings, determining a range of
buildings on a site using both 2D and 3D drawings.
Military: The military employs computerized control systems in defines. Modern tanks, Missile
Control, Military Communication, Military Operation and Planning, and Smart Weapons are
computer-based.
Communication: Communication is a way to convey a message, an idea, a picture, or speech by the
sender to the person for whom it is meant. A computer helps in transmitting the message via E-mail,
Chatting, Usenet, FTP, Telnet teleconferencing (conference call) and Video-conferencing
Government: Governments are the first computer users as they play an important role in
government services. Such as Budget planning, Sales tax calculation, Income tax department, track
data for population, Computerization of voters lists, and Weather forecasting, Police officers,
dissemination of policies, etc.
12. COMPUTER COMMUNICATIONS
When two or more PCs are connected using communication devices, messages can be sent and
received. A stand-alone computer communicates very efficiently by connecting it with other
computers. Data in a computer is transmitted to another computer located across continents almost
instantaneously using a telephone, microwave, or radio links. The long-distance communication link
between a computer and a remote terminal was set up around 1965. Now networking has become a
very important part of computing activity.
Computer Network: A system consisting of connected nodes made to share data, hardware, and
software is called a computer network. Networks are interconnected by copper wire, fibre optic cable,
microwave, and infrared or through satellite. Some important reasons for networking are: to share
resources, share information, and communicate.
Intranet and Extranet
Many organizations have a Local Area Network that allows their computers to share files, data,
printers, and other resources. An intranet is a computer network within an organization that is
accessed by the employees and others with authorization. All the Internet services such as web pages,
email, chat; UseNet and FTP are provided on the intranet to serve the organization. The sensitive
company data available on the intranet is protected from the outside world. The intranet connecting
selected customers, suppliers, and offices in addition to the internal personnel, is called an extranet.
By using extranet business organizations can save telephone charges. For example, a manufacturing
company can extend its intranet to its dealers and customers for support and service.
Applications of Network: The areas where computer networks are employed are; Electronic data
interchange, Tele-conferencing, Cellular telephone, Cable Television, Financial services, marketing
and sales, Reservation of Airlines, trains, Theatres and buses, Telemedicine, ATM, and Internet
banking.
Types of Networks: Depending on the geographical location, networks can be classified as
1. Local Area Network (LAN): a network confined to a single location like office, home, café, etc.
2. Metropolitan Area Network (MAN). a network that links more than one LAN. e.g. within a city.
3. Wide Area Network (WAN): a network that covers wide areas such as cities, states, countries,
or continents e.g. Computers in different branches of a Globalised company, Internet, etc.
26
Common Network Services: The following common network services are available, file services,
print services, massage services, and application services
Co-ordinating Data Communication: The device that coordinates the data transfer is called a
Network interface card (NIC). NIC is fixed on the computer and the communication channel is
connected to it. Ethernet, Arcnet, and token ring are the examples for the NIC. The protocol specifies
the procedures for establishing maintaining and terminating data transfer. In 1978, the International
Standards organization (OSI) provided a network architecture with seven layers, that helps to
communicate between Network of dissimilar nodes and channels.
Forms of Data Transmission: Data is transmitted in two forms: Analog data transmission which
transmits data in a continuous waveform. While Digital data transmission is the widely used
communication system in the world which is faster and more efficient than analog.
13. INTERNET, ONLINE RESOURCES, BROWSERS, AND SEARCH ENGINES
1) INTERNET
A network is a group of two or more computer systems linked together. The Internet is the largest
computer network in the world, connecting millions of computers. The Internet is a global system of
interconnected computer networks that carries a vast range of resources and services. It is a network
of networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by networking technologies. Anyone connected to
the Internet can reach, communicate, and access information from any other computer (host sites)
connected to it.
Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each
Internet computer, called a host, is independent. A Host a computer that allows websites to be located
on the Internet. The description of a host's location on the Internet is called a domain name. Internet
operators can choose which Internet services to use and which local services to make available to the
global Internet community. Remarkably, this anarchy by design works exceedingly well. There are
a variety of ways to access the Internet. Most online services offer access to some Internet services.
It is also possible to gain access through a commercial Internet Service Provider (ISP) that provides
new ways of accessing, interacting, and connecting with people and content. As a result, new terms
are constantly appearing as new technologies are introduced.
Who Governs The Internet?
No one owns the Internet, and no single person or organization controls the Internet in its entirety.
The Internet is more of a concept than an actual tangible entity, and it relies on a physical
infrastructure that connects networks to other networks. However, there are voluntary organizations
like Internet Corporation for Assigned Names and Numbers (ICANN) that promote global
information exchange and administers the domain name registration to avoid a name that is already
registered.
Connecting a computer to the Internet: Before loading a web site, you first need to connect to the
internet.
Requirements for connecting to the Internet:
a) Hardware: i) Modem: A modem is a communications device that allows a computer to connect
and communicate with other computers through telephone lines. Modem stands for Modulator
Demodulator. Once you have your computer, the primary hardware you need to connect to the
internet is a modem. The type of internet access you choose will determine what type of modem
you need. Dial-up access uses a telephone modem, DSL service uses a DSL modem, cable access
27
uses a cable modem, and satellite service uses a satellite adapter. Your ISP may give you a
modem (often for a fee) when you sign a contract with them, which helps to ensure that you have
the right kind of modem.
28
Choosing an Internet Service Provider: You can determine which ISPs are available in your area
that offer the type of internet access you want to purchase. Such as Talk to friends, family members,
and neighbours to see what ISP they use.
You have to consider the Speed, Price, Ease of Installation, Service Record, Technical Support,
Contract Terms. When you register with an ISP the following are given: Username (a unique name
that identifies you), Password-secret code that prevents other people from using your account, and
E-mail address- A unique address that you can send or receive E-mails.
Access telephone number - Internet users can use this number to connect to the service provider.
Fig.13.3b shows dialog boxes on the computer screen wherein the user name (Govt. Higher
Secondary School, Chennai -600 003 abbreviated as a ghssch3), a password (alphanumeric of word
length 8 characters appearing as ‘x’) and access telephone number are entered. By clicking on the
dial button, the modem establishes a connection with the ISP
11. Web server: This is a program that responds to requests from web browsers to retrieve
resources.
Comparison of browsers and search engines
Web Browser Search Engine
Can exist without a search engine It needs a web browser
Browse web pages and web sites Searches and filters websites
Application locally installed Software system running on the Internet Source
Google Chrome, Mozilla Firefox, Opera, Safari, etc. Google, Yahoo, Bing, NATE, DuckDuckGo, etc.
31
15. BROWSING THE WEB/INTERNET
Reading information contained in the Web Pages on the Internet using browsers is called
web browsing. To browse, enter the address of the website or address of any search engine in the
address bar of the browser. If the address entered is a website then the corresponding webpage will
get displayed. If the address is of a search engine then the webpage of the corresponding search
engine will get displayed in Fig. 15.1.
or
In the above example, joshuajoy is the username of the person who will be sending/receiving the
email. Yahoo is the mail server where the username joshuajoy has been registered and com is the
type of organization on the internet which is hosting the mail server.
Using Email: Once you have an account set up, select the option that says something like "new e-
mail message" or "create a new message".
35
BCC stands for blind carbon copy. BCC works just like a carbon copy; except the e-mail addresses
you type in BCC do not show up to the other recipients. (Example: You send a message To Mary
and BCC: Joe. Joe will see Mary's e-mail address, but Mary won't see Joe's e-mail address because
you "blinded" it by putting it in the BCC field.)
36
4) Powerful search engines: You can almost find any type of data on almost any kind of subject
that you are looking for by using search engines like google, yahoo, MSN, etc.
5) Video conference: Platform for products like SKYPE, which allows for holding a video
conference with anyone in the world who also has access.
6) Emails: The internet provides free mail service to anyone with an email account on the Internet.
7) Virtual library: Ability to do research from your home versus research libraries (online).
8) Message boards: where people can find others that have a similar interest in whatever they are
interested in and discuss their interest to get a wide range of opinions. Friendships and love
connections have been made over the internet by people with similar interests.
Disadvantages/ Limitations of the Internet:
1. Theft of Personal information: Hackers can use the internet for identity steal. Electronic
messages sent over the Internet can be easily tracked, revealing who is talking to whom and what
they are talking about. Personal information such as name, address, credit card, bank details, and
other information can be accessed by unauthorized persons.
2. Virus threat: Today, not only humans getting viruses, but computers get viruses from the
Internet. Hackers can create viruses that can get into your personal computer and ruin valuable
data. A virus is a program that disrupts the normal functioning of your computer systems.
Computers attached to the internet are more prone to virus attacks and they can end up crashing
your whole hard disk.
3. Spamming: This is an act of sending unsolicited emails. Most spam is commercial advertising,
often for dubious products or get-rich-quick schemes.
4. Fake information: There is a lot of wrong information on the internet. Anyone can post
anything, and much of it is garbage.
5. Internet addiction: Some people are getting addicted to the internet and thus causing problems
with their interactions with friends and loved ones.
6. Pornography: Pornography is also a very serious issue concerning the Internet, especially when
it comes to young children.
7. Easy to waste a lot of time on the internet. You can start surfing, and then realize far more time
has passed than you realized.
8. The Internet has a lot of "cheater" sites.
9. There are a lot of dishonest businesses that have sprung up on the internet to take advantage of
people.
37