comp notes

Upload: saleempakistani

Post on 06-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Comp Notes

    1/24

    Hardware

    (1)It is the Physical Components of a Computer System.

    (2) Hardware is Manufactured.

    (3) It is Physical in Nature.

    (4) Duplication from the Original is Not Possible.

    Software

    (1) It is the very large Computer

    Program or It is a set of many

    Programs.

    (2) It is Developed.

    (3) It is Non Physical in Nature.

    (4) Duplication from the Original is

    Possible.

    Software

    System Software

    Operating System

    Compiler

    Interpreter

    Linker

    Assembler

  • 8/3/2019 Comp Notes

    2/24

    Applications Software

    MS WORD

    Software used to manage Hardware and software Resources.

    Compiler & Interpreter:-

    It is the software that Translate high-level language into low-

    level language.

    Linker:-

    It is software that is used to attach Pre-Defined Translated Code

    in a Program to Produced Executables file.

    Source Program:-

    The Code we Type in a Computer Language Program is called

    Source Program.

    OR

    High Level Language Code we Type in an IDE (Integrated

    Development Environment)

    Object Program:-

    It is the Program with Comes in Machine Language from after

    Translation of Source Program.

  • 8/3/2019 Comp Notes

    3/24

    OR

    Translated (Complied) Version of Source Program.

    Executable:-The Complied and Library Code Intended Version of program

    is Called Executable program.

    Input Device

    Device that are used to take data Input into the Computer

    Memory. Example Key Board, Mouse, Toy Stick, Scanner Light Pen Exc.

    Mouse:-

    It is a small Assembly which keep Two, Three button and a

    Digital Circuitry to Navigate. Pointer over the Screen Area.

    Some Mouse Keep is Roiling Mechanism to Navigate Cursor while

    same keep Optical Mechanism.

    Working

    When the Mouse button is pressed a signal is sent to the Computer for

    the Corresponding Screen Position. The Mouse is accepted by the Computer

    and the Application to do Corresponding Action.

    Mouse Clicking Types

    (I) Left Click

    (II) Right Click

    (III) Double Click

    (I) Left Click

  • 8/3/2019 Comp Notes

    4/24

    Pressing of Left Mouse button is called Left Click.

    (II) Right Click

    Pressing of Right Mouse button is called Right Click.

    (III) Double Click

    The Pressing of Left Mouse Button Twice is a Rapid Succession.

    Keyboard:-

    It is an assembly that continues Number Button (Key)

    corresponding to Different types of data and action input into the memory of

    a Computer.

    Key are Grouped together in a special manner and their Grouping are

    as follow.

    1. Character Key Pad (A to Z, a to z, Symbol)

    2. Numeric Key Pad (0 to 9)

    3. Functions Key Pad (F1 to F12)

    4. Screen Navigate Key Pad (

    5. Special Function Key Pad (Tab, Ctrl, Alt)

    Working

    When a key is pressed it is Corresponding ASCII Code is send in a

    Memory Buffer than the contents of Buffer is sent to R.A.M.

  • 8/3/2019 Comp Notes

    5/24

    Software Development Process/ Life Cycle

    System Development:-

    System is the computerized solution for a set of Problem of an

    organization or a group of persons.

    Its development is divided mainly into four phases;

    A. Analysis

    B. Design

    C. Coding

    D. Testing & Maintenance

    (A) Analysis:-

    This is the first Phase in which following major tasks are done.

    1. Meeting with Client.

    2. Finding all existing problems.

    3. Selecting subset of problem that can be solved through computer.

    (B) Design Phase:-

    In this phase we deal with following Task are performed here;

    1. Designing of Algorithms and flow Charts.

    2. Determination of inputs, procedures, filing method and outputs.

    (C) Coding:-

    It is simply the typing of source program in a Selected IDE.

    (D) Testing & Maintenance:-

    In testing we check for verification and validation of program.

  • 8/3/2019 Comp Notes

    6/24

    Verification is the functionality check whether the program is running or not

    validation is the achievement of desired level of accuracy and precision. In

    Maintenance we perform following tasks;

    1. Delivery of system to client.

    2. Software/Hardware Changes are made.

    3. Training of end users.

    4. Away of doing tasks.

    Networking

    The Interconnection of Hardware resources to Share resources.

    Topology:--

    The art of Physical Connection of Computers to form a Network.

    Node:--

    A Physical Device or Computer on a Network.

    Server:--

    A Computer that services its resources and Application.

    Client:--

    A Computer or Node that request for the Services.

    Types of Topology:--

    1. Bus Topology

    2. Star Topology

  • 8/3/2019 Comp Notes

    7/24

    3. Ring Topology

    4. Ring Topology

    Bus Topology:--

    In Bus on all the Node are connected to the main Bus (Group of Wire)

    At ends High Value residences are connected to signal lows.

    Working:-

    The Communication in the Bus Topology is slow due to a single port.

    At a time only two Node can either Transfer or received data. No either

    Transmition can take Place during a Communication Return two Nodes.

    Advantages:-

    1. Easy to build.

    2. Suitable for work group.

    3. Low building cost.

    Disadvantages:-

    1. It is very slow Topology for Network Communication.

    2. If a main Bus is Broken or a Node Expire, the whole Network Collapse.

    3. To add new node, the network has to be stop.

    Star Topology:--

    In Star Topology All the Nodes are connected to a Central Node

    (HUB/Switch). It is sample to construct but it is costly. Hub can be Active or

    Passive. The Active Hub Required a Power supply so that it can regenerate

    in coming signal. Passive Hub do not required a Power supply.

  • 8/3/2019 Comp Notes

    8/24

    Working:-

    The Data from a Node is first sent to Central Node then it is routed.

    Advantages:-

    1. It is easy to build.

    2. New user can be entering without stopping whole Network.

    3. If any single Node Expire the networks remain operating.

    Disadvantages:-

    1. It is costly Topology.

    2. If a Central Node expired the whole Network Collapse.

    Ring Topology:--

    In Ring Topology, Every Node is connected physically to its two

    neighboring Node to from a circular Pattern called Ring. In Electronic

    privilege called Token.

    Working:-

    The Token Circulator in either Clock-wise, Anti Clock-wise Direction.

    Node attaches massage to the token with Destination I.D and other

    information. The Token is then passed to the Neighboring Node the

    Neighbor checks the massage in the token and it accept or reject the take it.

    It can also attach a new massage the token and the distributions of data take

    place due to circulating token or tokens.

    Advantages:-

    1. It is easy to build.

    2. It is low in cost.

  • 8/3/2019 Comp Notes

    9/24

    3. It is easy to maintain.

    Disadvantages:-

    1. It a single Node Expire the whole Network Collapse.

    2. The Network has to be stop for enter a new user/Node.

    3. It the Number of Node increase the Network be come slow.

    Mesh Topology:--

    In this Topology every Node is individually connected to every other

    on the Network. It is a costly Network but Reliable. Data Communication

    can be Perform through more than one Route.

    Advantages:-

    1. There is no chance of data collision.

    2. Most Reliable Network Topology.

    Disadvantages:-

    1. It is very costly.

    2. It is time Consuming to build and Difficult maintains.

    Types of Network

    The Network is categorized basically into 4 types.

    1. Local Area Network (LAN)

    2. Wild Area Network (WAN)

    3. Metropolitan Area Network (MAN)

    4. Global Area Network (GAP)

  • 8/3/2019 Comp Notes

    10/24

    (1) Local Area Network (LAN):-

    It is a Network that is confine within geographical area of one squire

    Kilometer.Example:-

    A Computer Network in a building or group of building extra

    It is the faster Communication Network that is owned by a person or a

    group of person.

    It is easy to minuteness and incorporate few Networking devices.

    (2) Wide Area Network (WAN):-

    This Network is extended geographically ever more than 1KM

    distance. It can cover many buildings and mach area of the city It user both

    Networking and internetworking devices. It cant be Owen by a person it is

    10 time Slower than Local Area Network. Many Protocols are used and so

    the gateway is used to form Wild Area Network.

    (3) Metropolitan Area Network (MAN):-

    This Network is extended across entire city. It is much bigger than

    WAN and it used Telephone line as well and Telephone exchange service

    for building communication link.

    (4) Global Area Network (GAP):-

    This Network is extended across the entire global and it covered all

    sold devices, topology, Links and services to from global Area Network.

    There much is single topology so that information can uniformally be

    exchange ever the world.

  • 8/3/2019 Comp Notes

    11/24

    Example:-

    Internet uses

    Transportation control protocol /Internet Protocol (TCO/IP).

    Networking:--

    Networking Devices are used for two purposes

    1. To build a Network.

    2. To extend the Network.

    These exude LAN Card, Switches, Hub, repeater, cables and Bridge.

    Inter networking:--

    Inter Networking Devices are used to link to deformfan

    Types of Inter Networking Devices these are Router, Booster, Gateway,

    CSU, DSC extra

    Network Operating System:--

    An Operating System that manages the resources of every Node on the

    Network is called Network Operating System.

    Example:-

    UNIX, Linux, Windows NT (New Technology)

    The server Computer is the Real Place for NOS.

    Protocol:--

  • 8/3/2019 Comp Notes

    12/24

    Protocols are the rule and resolution to convey information from one

    Computer to another. Some protocols are routable and same are not.

    Protocols are installing as standard for information exchange on every Node

    on the Network. There are install on client side and on sever side.

    Example:--

    NA, NET, BUE, IE, TCP/IP Groper FTP extra

    Media:--

    There are two types of media

    (1) wires media

    (2) Wireless

    Wires Media:--

    In wires media we used toasted cable, to estate cable, coaxial cable and

    optical fibber.

    Wireless Media:--

    In wireless media we used redo value microbes and seta light System.

    OSI Model:-- (open system interconnection)

    It is a model proposed by a comate to define the standard to establish

    and manage a Computer Network.

    It defines protocols for every single tastes and group, than protocol in the

    form of layers every layer is categorized difficultly due to its nature of work.

    Following are the OSI layers

    1. Physical Layer

    2. Data link Layer

    3. Network Layer

    4. Transport Layer

  • 8/3/2019 Comp Notes

    13/24

    5. Session Layer

    6. Presentation Layer

    7. Application Layer

    1. Physical Layer:--

    This Layer due all the physical issues of the Network Topology Cable,

    Represent of Data encoding, decoding, Number of pens in a connector and

    Network Devices are the men issues solve.

    2. Data link Layer:--

    This Layer is Responsible for establishing a single link between to

    Node it manages and Inlay terminates that link. The Data is broken in to

    small Data picket and CRCO is imposed.

    3. Network Layer:--

    This Layer is responsible for managing all links between source and

    destination Computer. It is responsible for making correct routing decision.

    4. Transport Layer:--This Layer is responsible for transporting Data packets across different

    types of Network in a reliable and error-free manner.

    5. Session Layer:--

    This Layer is responsible for building a session (A Communication

    Channels) between two Applications running on different Nodes on a

    Network. It establishes the session and transported after the communication

    ends.

    6. Presentation Layer:--

    This Layer is responsible for transforming the transportable form of

  • 8/3/2019 Comp Notes

    14/24

    Data in to use able form and wise ware.

    7. Application Layer:--

    This Layer is used to serve services to Network like email services,

    file transport services, chatting services, video confessing services.

    Networking Devices:--

    Devices that are used to create and extend a single Network are called

    Networking Devices.

    Example:--

    HUB, switch, repeater, bridge and ether Net card /LAN Card

    1. LAN Card :--( Network Adapter/ether Net Card)

    This is Hardware card install client side and it Casper UNIX IP

    address. This makes the Node dusting disable on a Network for

    communication.

    2. HUB/Switch:--

    It is a central Node of a Network that provides connective among all

    Node It may be Active (Requiring a Power Supply) or It may be passive

    (Does not Requiring compare supply) which is similar to HUB but is farmer

    indigent as it can take write design for the Network.

    Data Communication Modal:--

  • 8/3/2019 Comp Notes

    15/24

    Source:--

    A Point where the Data is first originated

    Modulator:--

    A device that mixes the low frequency data with the carrier high

    frequency during sending of data

    Transmitter:--

    A device that increases the gain of modulated signal so that it can betransmitted to long distances

    Transmission Media:--

    It is an entity that carries the data signal from source to destination.

    Point:--

    It is divided into two types

    (A) Wires Media (Twisted pair, curial cable, Optical fiber )

    (B) Wireless Media (Radio waves, microwaves, FM Satellite)

    Receiver:--

    A cirevit that catches the weak incoming signal and amplitude of

    signal is amplified.

    Demodulator:--

    A device that separate the low frequency signal from the high

  • 8/3/2019 Comp Notes

    16/24

    frequency carrier wave

    Destination:--

    A point where the data is to be reached finally

    Types of Data

    (A) Analog Data (Continuous(point) wave from signal element)

    (B) Digital Data (Discrete(whole (number) wave from signal element)

    Encoding:--

    Transformation of one form of signal into another form of signal

    Types of Encoding:--

    (A) Digital to Digital Encoding

    (B) Digital to Analog Encoding

    (C) Analog to Analog Encoding

    (D) Analog to Digital Encoding

    Digital to Digital Encoding:--

    In this type of encoding the input Digital signal is transformed into

    another form of Digital signal.

  • 8/3/2019 Comp Notes

    17/24

    Digital to Analog Encoding:--

    In this type of encoding the input Digital signal is transformed into

    another form of Analog signal.

    Analog to Analog Encoding:--

    Here input signals an analog wave form while the output signal is also

    an Analog Signal.

    Example are ASK, FSK, and PSK modulation.

    Analog to digital Encoding:--Here input signals an analog wave form while the output signal is also

    a Digital Signal.

    Examples are Pulse Code, Delta Modulation.

    Wires MediaMedia:--

    Entities that convey energy from one place to another wires media

    include mainly three types of wires;

    1. Twisted Pair

    2. Coaxial Cable

    3. Optical Fiber

    1. Twisted Pair wire:--

    It is a group of two insulated wires that are twisted together to cancel

  • 8/3/2019 Comp Notes

    18/24

    the effect of inductions in the wires conveying data signal. They are covered

    by an outer covering for strength and protection.

    2. Coaxial Cable:--

    Here two wires runs side by side in such a way that the main inner

    conductor is in the center (axial) and the second outer Conductor is around

    the axial and absorbing any leak radiation from both in and outside of

    conductor. It is used for high frequency transmission.

    3. Optical Fiber:--

    It is a fiber of light conducting material its inner central region is of

    high density and the outer region is of low density. Light travels in denser

    median and remain travels in it due to total internal reflection signal of very

    high frequency is transmitted through optical fiber.

    Multiplexing Playing:--

    It is the division of time allocated for sending more than one types of

    signal throws a signal channel of frequency. The devices that perform

    Multiplexing are called Multiplayer.

    Modulation:--

    It is a process of mixing low Data frequency with the high carrier

    frequency to from modulated signal.

  • 8/3/2019 Comp Notes

    19/24

    Demodulation:--

    It is a process in which the signal is separated from the carrier

    frequency.

    Time sharing:--

    It is the distribution of time allocated for different tasks.

    Register:--

    It is a digital sharked that storages a single instruction at a time. It size

    me be 8 bit, 16 bit, 32 bit, 64 bit extra. They are located in site micro

    processor and are the fasted memory aliasing.

    Some of the common registers are

    1. Program Counter

    2. Memory Address Register

    3. Intrusion Register

    4. Accumulator Register

    5. Buffer Register

    6. Stack Register

    7. Flag Register

    1. Program Counter:--

    This register generates the count this count is actually the address of

    memory where over program is storage the address is send to the memory

    address Register.

    2. Memory Address Register

  • 8/3/2019 Comp Notes

    20/24

    This register gets the count is address a loads the contents on that

    memory address. It then protect for super wise what is being brought in to

    the memory and what is being taking out from the memory.

    3. Intrusion Register:--

    This register holds a complete single instruction. It sends command

    part to controller unit and address to MAR.

    4. Accumulator Register:--

    This register is used to holds the accumulator is filled with data.

    B-Register

    This register holds the second next value after the accumulator is

    filled with data.

    Out register

    This register supplies the data to the outside world or accepts the data

    form.

    6. Stack Register:--

    This register holds the data item in last in first out principle. It I used

    to store paused state of programs that can lather recondite.

    7. Flag register:--

    This register is used to indicate and storage the current status of all

    register and operations during program execution every operation is

    educated by a single bit .etc

  • 8/3/2019 Comp Notes

    21/24

    Fetch OperationStep 1

    Program counter generates the count (Address of 1st instruction of a

    program) and send the count to memory address register.

    Step 2

    MAR enable the contents of given address to be taken from the

    memory.

    Step 3

    The loaded content of memory is brought into instruction register.

    Fetch Decode Operation

    Decode Operation:--

    In this operation, the command is interpreted into series of sub

    infraction trough controller unit.

    Execute Operation:--

    Application of sub-instructions to all units from the controller unit is

    called execution.

  • 8/3/2019 Comp Notes

    22/24

    VirusVirus:--

    A Computer program that is designed specifically to perform illegal

    tasks.

    Types of Virus:--

    Following are some main categories into which virus are divided.

    1. Worms

    2. Trojans

    3. Time Booms

    4. File Infectors

    5. Boot Sector virus

    WORM:--

    This virus is designed to duplicate is self to accomay maximum

    memory space. They can special form network ant another input/output

    resources and can slow down processing of computer.

    Trojans:--

    They are the programs that do not horn computer operations during

  • 8/3/2019 Comp Notes

    23/24

    there accept ion Next time went the Computer is run they gates into

    operation and perform illegal tasks.

    Time booms:--These viruses are design to perform illegal operations on a carting

    date and time for example; Michelangelo virus activate on March 6.

    File Infectors:--

    These virus spreads automatically injure them self in a file that latter

    on Ram in affectedly.

    Boot Sector virus:--

    This virus reside it salve in hard drive on the boot sector and prevent

    the booting operations of the system.

    Data Protections

    Method of data protection:--

    We have two resources that need to protect. Following are the ways

    mentioned.

    1. Use of Anti-virus

    2. Use of password and domain

    3. Use of proxy server and firewall

    4. Use of Data back-up

  • 8/3/2019 Comp Notes

    24/24

    5. Use of Audile Software

    6. Use of Alternate Power supply

    7. Use of SCSI port and devices

    8. Use of Physical protection methods

    9. Use of copyright Law

    10.Use of Anti-Hacking and Anti-spying Software

    1. Use of anti-virus:--

    The Antivirus software is used to scan hard drive and its contents,

    detect the virus organize a strategy to remove or isolate the virus the

    scanning is centralled by the user or it can automatically be set. The Anti-

    virus software has to be updated download latest virus definitions.

    Example; AVG, Norton, Avast and ESET NOD32

    2. Use of password and domain:--

    On the Network we use a policy to share resources. We define andgrant privileges to the user in a group of a domain hence only authorized

    user can effectively and safely use resources. Password is a digital lock for a

    users account if the password is correctly typed, then the user can use

    domain privileges. Bio metrically set password can also be applied.