[go: up one dir, main page]

0% found this document useful (0 votes)
19 views27 pages

Foc 3rd Chapter Notes

This document provides an overview of computer fundamentals, including definitions, evolution, generations, classifications, and components of computers. It details the development of computers from the first generation using vacuum tubes to the current fifth generation incorporating artificial intelligence. Additionally, it covers computer networks, their types, and protocols essential for data communication.

Uploaded by

divya13112021
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views27 pages

Foc 3rd Chapter Notes

This document provides an overview of computer fundamentals, including definitions, evolution, generations, classifications, and components of computers. It details the development of computers from the first generation using vacuum tubes to the current fifth generation incorporating artificial intelligence. Additionally, it covers computer networks, their types, and protocols essential for data communication.

Uploaded by

divya13112021
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

FUNDAMENTALS OF COMPUTER

Chapter 03: INTRODUCTION TO COMPUTER CONCEPTS

3.1 Introduction to computers


According to the definition, "A computer is a programmable electronic
device that takes data, perform instructed arithmetic and logical
operations, and gives the output.

"Main Highlights of Computer are as follows:


•A computer is described as an electronic device because; it is made up of
electronic components and uses electric energy (such as electricity) to
operate.
•A computer has an internal memory, which stores data & instructions
temporarily awaiting processing ,and even holds the intermediate
result (information) before it is communicated to the recipients through the
Output devices.
•It works on the data using the instructions issued, means that, the computer
cannot do any useful job on its own. It can only work as per the set of
instructions issued.
•A computer will accept data in one form and produce it in another form. The
data is normally held within the computer as it is being processed. The
general meaning of a computer is a machine that can calculate. However,
modern computers are not just a calculating device anymore. They can
perform a variety of tasks. In simple terms, a computer is a programmable
electronic machine used to store, retrieve, and process data.

3.1.1 Evolution of computer


The modern computer took its shape with the advent of time. It was around
16th century when the evolution of computer started. The initial computer
faced many changes, obviously for the betterment. It continuously improved
itself in terms of speed, accuracy, size, and cost to get the shape of the
modern-day computer.
3.1.2Generation of computers

This long period of evolution can be conveniently divided into the following
phases called computer generations:
Generations of Computer

Time-Period

Evolving Hardware
First Generation 1940s
– 1950s Vacuum Tube Based Second Generation 1950s
– 1960s Transistor Based Third Generation 1960s
– 1970s Integrated Circuit Based Fourth Generation 1970s
– Present Microprocessor Based Fifth Generation Present
– Future Artificial Intelligence Based
Let us now discuss the development in Computer Technology over the
different generations.

First Generation

•The period 1940 to 1956, roughly considered as the First Generation


of Computer.
•The first-generation computers were developed by using vacuum tube or
thermionic valve machine.
•The input of this system was based on punched cards and paper tape;
however, the output was displayed on printouts.
•The first-generation computers worked on binary-coded concept (i.e.,
language of 0-1).

•Examples:ENIAC, EDVAC, etc.

Second Generation

•The period 1956 to 1963 is roughly considered as the period of Second


Generation of Computers.
•The second-generation computers were developed by using transistor
technology.
•In comparison to the first generation, the size of second generation was
smaller.
•In comparison to computers of the first generation, the computing time taken
by the computers of the second generation was lesser.

Third Generation

•The period 1963 to 1971 is roughly considered as the period of Third


Generation of computers.
•The third-generation computers were developed by using the Integrated
Circuit (IC) technology.
•The size of the computers of the third generation was smaller.
•In comparison to the computers of the second generation, the computing
time taken by the computers of the third generation was lesser.
•The third-generation computer consumed less power and also generated
less heat.
•The maintenance cost of the computers in the third generation was also low.
•The computer system of the computers of the third generation was easier for
commercial use

Fourth Generation

•The period 1972 to 2010 is roughly considered as the fourth generation of


computers.
•The fourth-generation computers were developed by using microprocessor
technology.
•By coming to fourth generation, computer became very small in size,
it became portable.
•The machine of fourth generation started generating very low amount of
heat.
•It is much faster and accuracy became more reliable.
•The production cost reduced to very low in comparison to the previous
generation.
•It became available for the common people as well.
Fifth Generation
•The period 2010 to till date and beyond, roughly considered as the period of
fifth generation of computers.
•By the time, the computer generation was being categorized on the basis of
hardware only, but the fifth-generation technology also included software.
•The computers of the fifth generation had high capability and large memory
capacity.
•Working with computers of this generation was fast and multiple tasks could
be performed simultaneously.
•Some of the popular advanced technologies of the fifth generation include
Artificial intelligence, Quantum computation, Nanotechnology, Parallel
processing, etc.

3.1.3Classification of computer
Computers are classified based on 3 types as shown below.
3.1.4Applications of Computers
a)Home
b)Medical
c)Entertainment
d)Industries
e)Education
f)Government
g)Banking
h)Business
i)Training & Art
f) Science & Research

3.2 Components of computers

a)Hardware (different types of hardware components)


Computer hardware includes the physical components of a computer.
Personal computers (PCs) are electronic devices that use microchips to
process information and may include desktop computers, laptops or tablets.

Computer Hardware’s are classified into 3 main groups


a)Internal Hardware’s
b)Input Hardware’s
c)Output Hardware’s

Internal Hardware include the following:

•Motherboard. This is a printed circuit board that holds the central processing
unit (CPU) and other essential internal hardware and functions as the central
hub that all other hardware components run through.

•CPU. The CPU is the brain of the computer that processes and executes
digital instructions from various programs; its clock speed determines the
computer's performance and efficiency in processing data.

•RAM. RAM:
It is temporary memory storage that makes information immediately
accessible to programs; RAM is volatile memory, so stored data is cleared
when the computer powers off.
•Hard drive or Solid-state drive (SSD): Hard disk drives are physical storage
devices that store both permanent and temporary data in different formats,
including programs, device files, photos, etc.

•Optical drive. Optical drives typically reside in an on-device drive bay; they
enable the computer to read and interact with nonmagnetic external media,
such as compact disc read-only memory or DVD.

•Heat-sink. This is a passive piece of hardware that draws heat away


from components to regulate/reduce their temperature to help ensure they
continue to function properly.

•Graphics processing unit. This chip-based device processes graphical data


and often functions as an extension to the main CPU.

•Network interface card (NIC). A NIC is a circuit board or chip that enables
the computer to connect to a network; also known as a network adapter
or
local area network adapter , it typically supports connection to an Ethernet
network

Input Hardware components include the following:

•Mouse. A mouse is a hand-held pointing device that moves a cursor around


a computer screen and enables interaction with objects on the screen. It may
be wired or wireless.

•Keyboard. A keyboard is an input device featuring a standard QWERTY


keyset that enables users to input text, numbers or special characters.

•Microphone. A microphone is a device that translates sound waves into


electrical signals and supports computer-based audio communications
•Camera. A camera captures visual images and streams them to the computer
or through a computer to a network device.

•USB flash drive. A USB flash drive is an external, removable storage device
that uses flash memory and interfaces with a computer through a USB port.

•Memory card. A memory card is a type of portable external storage media,


such as a Compact Flashcard, used to store media or data files.

Output hardware components include the following:

•Monitor. A monitor is an output device similar to a TV screen that displays


information, documents or images generated by the computing device.

• Printer. Printers render electronic data from a computer into printed


material.

•Speaker. A speaker is an external audio output device that connects to a


computer to generate a sound output.

•Headphones, earphones, earbuds. Similar to speakers, these devices provide


audio output that's audible only to a single listener.

b)Software (System Software, Application Software, E-accessibility


Software, Open source, freeware and proprietary software)

•The software which is an interface between the application software and the
system is the system software.

Examples of system software are: Operating System,


Programming Language, Communication Software, etc

•The application software runs on the platform provided by the system


software as per the user’s request. The software is created targeting a specific
user task, which does the work for the user. It is also called an application
package, as it acts as a bridge between the system software and the end-user.
High-level languages like C, Java, VB. Net, are used to build application
software.

Examples of application software are: Word Doc, Spreadsheet,


Database, etc

c) Peripherals (working of keyboard and laser printer)KEYBOARD:

A keyboard is one of the main input devices for a computer. It looks


similar to a typewriter. It has various keys that when pressed display
numbers, letters, and other symbols on the display unit. A keyboard can
perform other functions as well when certain combinations of keys are used.

•In the middle of each key is a tiny cylindrical bar. On the keyboard are
circular holes that the keys fit into. When you push a key, it goes down like a
spring and touches the contact layers on the board. The holes are built with
small pieces of rubber that push the keys back up.

• The above figure shows the contact layers that the keyboards have. These
layers are responsible for detecting which key is pressed. The cables inside
carry electrical signals from the keyboard to the USB port on the computer.

•The contact layers consist of a set of 3 layers of plastic. These are the most
crucial elements of the working of the keyboard. The top and bottom layers
have metal tracks that can conduct electricity. The layer in between has holes
in it and acts as an insulator. These are the holes upon which the keys are
fixed. When a key is pressed, the two layers come in contact and produce an
electrical signal that is carried to the port on the system.
LASER PRINTER:
here are many moving parts and components inside a laser printer that work
togetherto produce your final document or image, each have an important par
t to play.
The key parts of the printer include, toner cartridges, image drum (also
known as drum unit
or photoconductor), transfer roller or belt, fuser unit, laser, andmirrors.

1.The moment you press print on your computer, tablet or mobile device, the

information is sent to the printer memory, where the data is stored


temporarily.

2.The printer begins to warm up. This is the point where


you usually need to wait, and it’s because the corona wire
is heating up and getting ready to pass its positive static charge to the drum.

3.As the drum (coated metal cylinder) begins to roll, it received a positive
charge across its whole surface. Some printers contain four drums, one for
each colour – Cyan, Magenta, Yellow & Black.

4.The laser activates, and beams against a series of mirrors to reflect across
the surface of the drum(s)imprinting the shape of your print using an opposite
negative electrical charge.

5.The toner cartridge and hopper sat next to the drum(s) slowly releases
positively charged carbon toner particles on to the drum as it turns. The toner
is attracted to any areas of negative charge leaving positively charged areas
of the drum untouched.

6.The transfer belt rolls the paper through the printer giving it a positive
charge. As it passes the drum,the negatively charged toner is attracted to the
page in the shape of your print.

7.The toner is then melted to the paper by hot rollers called the fuser unit, and
voila, your page is printed.
.
3.2Computer Network (Concept Only)
Computer Networking is the practice of connecting computers together to
enable communication and data exchange between them. In general,
Computer Network is a collection of two or more computers. It helps users to
communicate more easily. In this article, we are going to discuss the basics
which everyone must know before going deep into Computer Networking.
The working of Computer Networks can be simply defined as rules or
protocols which help in sending and receiving data via the links which allow
Computer networks to communicate. Each device has an IP Address,that
helps in identifying a device.

Basic Terminologies of Computer Networks;

•Network:A network is a collection of computers and devices that are


connected together to enable communication and data exchange.

•Nodes:Nodes are devices that are connected to a network. These can include
computers, Servers,Printers, Routers, Switches, and other devices.

•Protocol:A protocol is a set of rules and standards that govern how data is
transmitted over a network. Examples of protocols include TCP/IP, HTTP,
and FTP.

•Topology:
Network topology refers to the physical and logical arrangement of nodes on
a network. The common network topologies include bus, star, ring, mesh, and
tree.

•Service Provider Networks:


These types of Networks give permission to take Network Capacity and
Functionality on lease from the Provider. Service Provider Networks include
Wireless Communications,Data Carriers, etc.

•IP Address: An IP address is a unique numerical identifier that is assigned


to every device on a network. IP addresses are used to identify devices and
enable communication between them.
•DNS:The Domain Name System (DNS) is a protocol that is used to translate
human-readable domain names(such as www.google.com) into IP addresses
that computers can understand.

•Firewall:
A firewall is a security device that is used to monitor and control incoming
and outgoing network traffic. Firewalls are used to protect networks from
unauthorized access and other security threats.

3.2.1 Categories / Types of Computers Networks:

There are mainly five Categories / types of Computer Networks1.

Personal Area Network (PAN)2.

Local Area Network (LAN)3.

Campus Area Network (CAN)4.

Metropolitan Area Network (MAN)5.

Wide Area Network (WAN)

1. Personal Area Network (PAN)


PAN is the most basic type of computer network. This network is restrained
to a single person, that is,communication between the computer
devices is cantered only on an individual’s workspace. PAN offers a
network range of 1 to 100 meters from person to device providing
communication. Its transmission speed is very high with very easy
maintenance and very low cost.

This uses Bluetooth,IrDA, and Zigbee as technology.

Examples of PAN are USB, computer, phone, tablet, printer, PDA,


etc
2. Local Area Network (LAN)
LAN is the most frequently used network. A LAN is a computer
network that connects computers through a common
communication path, contained within a limited area, that is, locally. A LANe
ncompasses two or more computers connected over a server. The two
important technologies involved in this network are Ethernet
and Wi-fi. It ranges up to 2km & transmission speed is very high with easy
maintenance and low cost. Examples of LAN are networking in a
home,school, library, laboratory, college, office, etc.

3. Campus Area Network (CAN)


CAN is bigger than a LAN but smaller than a MAN. This is a type
of computer network that is usually used in places like a school or
colleges. This network covers a limited geographical area that is, it
spreads across several buildings within the campus. CAN mainly use
Ethernet technology with a range from 1km to 5km.Its transmission speed
is very high with a moderate maintenance cost and moderate cost.
Examples of CAN are networks that cover schools, colleges,
buildings, etc.

4. Metropolitan Area Network (MAN)


A MAN is larger than a LAN but smaller than a WAN. This is the type of
computer network that connectscomputers over a geographical distance
through a shared communication path over a city, town,
ormetropolitan area. This network mainly uses FDDI, CDDI, and
ATM as the technology with a range from5km to 50km. Its
transmission speed is average. It is difficult to maintain and it comes
with a high cost.Examples of MAN are networking in towns, cities, a
single large city, a large area within buildings, etc.
5. Wide Area Network (WAN):
WAN is a type of computer network that connects computers over a
large geographical distance through a shared communication path. It
is not restrained to a single location but extends over many locations.
WAN can also be defined as a group of local area networks that
communicate with each other with a range above 50km.Here we use
Leased-Line & Dial-up technology. Its transmission speed is very
low and it comes with very high maintenance and very high cost. The
most common example of WAN is the Internet.
3.3 Protocols of Computers Networks
(Application layer)
A Protocol;is simply defined as a set of rules and regulations for
data communication. Rules are basically defined for each and every
step and process at time of communication among two or more
computers. Networks are needed to follow these protocols to transmit the da
ta successfully. All protocols might beimplemented using hardware,

software, or combination of both of them. There are three aspects


of protocols given below:

•Syntax – It is used to explain data format that is needed to be sent or


received.
•Semantics – It is used to explain exact meaning of each of sections
of bits that are usually transferred.
•Timings – It is used to explain exact time at which data is generally
transferred along with speed at which it is transferred.

Protocol Hierarchies:
Generally, Computer networks are comprised of or contain a large
number of pieces of hardware and software. To just simplify network
design, various networks are organized and arranged as a stack of
layers of hardware and software, one on top of another. The number,
name, content, and function of each layer might vary and can be
different from one network to another. The main purpose of each of layers is
just to offer and provide services to higher layers that are present.
Each and every layer has some particular task or function. In
programming, this concept is very common. The networks are
organized and arranged as different layers or levels simply to reduce
and minimize complexity of design of network software.

Example:
Below is diagram representing a five-layer network. The diagram
shows communication between Host 1 and Host 2. The data stream is
passed through a number of layers from one host to other. Virtual
communication is represented using dotted lines between peer layers.
Physical communication is represented using solid arrows between
adjacent layers.
Through physical medium, actual communication occurs. The layers
at same level are commonly known as peers. The peer basically has a
set of communication protocols. An interface is present between each
of layers that are used to explain services provided by lower layer to
higher layer.

Advantages of Protocols:

•The layers generally reduce complexity of communication between


networks
•It increases network lifetime.
•It also uses energy efficiently.
•It does not require overall knowledge and understanding of network.

3.4 Methods of data processing (concepts only)


Collection, manipulation, and processing collected data for the required use is
known as data processing. It is a technique normally performed by a
computer; the process includes retrieving, transforming, or classificationof
information. However, the processing of data largely depends on the
following:
•The volume of data that need to be processed
•The complexity of data processing operations
•Capacity and inbuilt technology of respective computer system
•Technical skills
• Time constraints

Methods of Data Processing


Let us now discuss the different methods of data processing.
a)Single user programming
b)Multiple programming
c)Real-time processing
d)On-line processing
e)Time sharing processing
f)Distributed processing

a) Single User Programming


It is usually done by a single person for his personal use. This technique is
suitable even for small offices.

b) Multiple Programming
This technique provides facility to store and execute more than one program
in the Central Processing Unit(CPU) simultaneously. Further, the multiple
programming technique increases the overall working efficiency of the
respective computer.

c) Real-time Processing
This technique facilitates the user to have direct contact with the computer
system. This technique eases data processing. This technique is also
known as the direct mode or the interactive mode technique and is developed
exclusively to perform one task. It is a sort of online processing, which
always remains under execution.

d) On-line Processing
This technique facilitates the entry and execution of data directly; so, it does
not store or accumulate first and then process. The technique is developed in
such a way that reduces the data entry errors, as it validates data at various
points and also ensures that only corrected data is entered. This technique is
widely used for online applications.

e) Time-sharing Processing
This is another form of online data processing that facilitates several users to
share the resources of an online computer system. This technique is adopted
when results are needed swiftly. Moreover, as the name suggests,this system
is time based.

Following are some of the major advantages of time-sharing processing −


•Several users can be served simultaneously
•All the users have almost equal amount of processing time
•There is possibility of interaction with the running programs
f) Distributed Processing
This is a specialized data processing technique in which various computers
(which are located remotely) remain interconnected with a single host
computer making a network of computer. All these computer systems remain
interconnected with a high-speed communication network. This facilitates in
thecommunication between computers. However, the central computer syste
m maintains the master data base and monitorsaccordingly.

3.5 Computer Security: Types of threats and source of threats


Computer security threats are potential threats to your computer’s
efficient operation and performance.
These could be harmless adware or dangerous trojan infection. As
the world becomes more digital, computer security concerns are

always developing. A threat in a computer system is a potential


danger that could jeopardize your data security. At times, the damage is
irreversible.

Types of Threats:
A security threat is a threat that has the potential to harm computer
systems and organizations. The causecould be physical, such as a
computer containing sensitive information being stolen. It’s also possible that
the cause isn’t physical, such as a viral attack.

1. Physical Threats:
A physical danger to computer systems is a potential cause of an
occurrence/event that could result in data loss or physical damage. It
can be classified as:
•Internal:
Short circuit, fire, non-stable supply of power, hardware failure due
to excess humidity, etc. cause it.
•External:
Disasters such as floods, earthquakes, landscapes, etc. cause it.

•Human:
Destroying of infrastructure and/or hardware, thefts, disruption, and
unintentional/intentional errors are among the threats.

2. Non-physical threats:
A non-physical threat is a potential source of an incident that could
result in:
•Hampering of the business operations that depend on computer
systems.
•Sensitive – data or information loss
•Keeping track of other’s computer system activities illegally.

•Hacking id & passwords of the users, etc.

The non-physical threads can be commonly caused by:


(i) Malware:
Malware (“malicious software”) is a type of computer program that
infiltrates and damages systems without the users’ knowledge. Malware
tries to go unnoticed by either hiding or not letting the user know about its
presence on the system.
You may notice that your system is processing at a slower rate than
usual.

(ii) Virus:
It is a program that replicates itself and infects your computer’s files
and programs, rendering
them inoperable. It is a type of malware that spreads by inserting a copy of
itself into and becoming part of another program. It spreads with the
help of software or documents. They are embedded with software
and documents and then transferred from one computer to another
using the network, a disk, file sharing, or infected e-mail. They
usually appear as an executable file.

(iii) Spyware:
Spyware is a type of computer program that tracks, records, and
reports a user’s activity
(offline and online) without their permission for the purpose of profit
or data theft. Spyware can be acquired from a variety of sources,
including websites, instant chats, and emails. A user may also unwittingly
obtain spyware by adopting a software program’s End User License
Agreement. Adware is a sort of spyware that is primarily utilized by
advertising. When you go online, it keeps track of your web
browsing patterns in order to compile data on the types of websites
you visit.

(iv) Worms:Computer worms are similar to viruses in that they


replicate themselves and can inflict similar damage. Unlike viruses,
which spread by infecting a host file, worms are freestanding
programs that do not require a host program or human assistance to
proliferate. Worms don’t change programs; instead, they
replicate themselves over and over. They just eat resources to make
the system down.

(v) Trojan:A Trojan horse is malicious software that is disguised as


a useful host program. When the host program is run,
the Trojan performs a harmful/unwanted action. A Trojan horse, often known
as a Trojan,is malicious malware or software that appears to be
legal yet has the ability to take control of your computer .A Trojan is
a computer program that is designed to disrupt, steal, or otherwise
harm your data or network

(vi) Denial Of Service Attacks:


A Denial-of-Service attack is one in which an attacker tries to
prohibit legitimate users from obtaining information or services. An
attacker tries to make a system or network resource unavailable to its
intended users in this attack. The web servers of large organizations
such as banking, commerce, trading organizations, etc. are the victims.

(vii) Phishing:
Phishing is a type of attack that is frequently used to obtain
sensitive information from users, such as login credentials and
credit card details. They deceive users into giving critical
information, such
as bank and credit card information, or access to personal accounts, by sendin
g spam, malicious Web sites,email messages, and instant chats.

(viii) Key-Loggers: Keyloggers can monitor a user’s computer


activity in real-time. Keylogger is a programthat runs in the
background and records every keystroke made by a user, then sends
the data to a hacker with the intent of stealing passwords and
financial information.

How to make your system secure:


In order to keep your system data secure and safe, you should take
the following measures:1. Always keep a backup of your data.2. Install
firewall software and keep it updated every time.3. Make use of
strong and difficult to crack passwords (having capital & small
alphabets, numbers, and special characters).4. Install antivirus/ anti-
spyware and keep it updated every time.5. Timely scan your complete
system.6. Before installing any program, check whether it is safe to
install it (using Antivirus Software).7. Take extra caution when
reading emails that contain attachments.8. Always keep your system
updated.

You might also like