Documente Academic
Documente Profesional
Documente Cultură
A Bank PO/Clerical
Tutorial School
SSC, Railway
MBA, NIFT, LIC & BOOK TITLE
CSAT Exams
Chapter – 1. Computer
Section 1: Hardware System
Subsection 1. System Unit
1.1 Motherboard
1.1. a Integrated Component
1.1. b CPU with Heat Sink
1.1. c Expansion Cards
1.3 Memory
1.3. a RAM
1.3. b Secondary(mass) Storage
1.3. c Removable Media Storage
STRATAGEM
Strategise, Succeed
Chapter -1.
COMPUTER
A computer is a programmable machine with a set of electronic circuits that allow for data to be manipulated in binary
form, i.e. in bits. The actual machinery -- wires, transistors, circuits and all the material elements are called hardware;
the instructions and data (program parts) are called software.
Integrated Circuit- A transistor (the contraction of transfer resistor) is an electronic semi-conductor component that
is capable of modifying current passing through it. A MOS (metal oxide silicone) transistor is the most common type of
transistor used to design integrated circuits.
MOS transistors are made of slices of silicone (called wafers), which once combined, can make logic circuits,
that, when combined, form processors. These slices of silicone are cut into rectangular elements to form a "circuit".
Circuits are then placed in cases with input-output connectors and the sum of these parts makes an "integrated
circuit"(chip or microchip).
Moore's Law, penned in 1965 by Gordon E. Moore, cofounder of Intel, predicted that processor performance (by
extension of the number of transistors integrated in the silicone) would double every twelve months. This law was
revised in 1975, bringing the number of months to 18.
History
Father of computing – Charles Babbage is considered to be the father of computing after his invention and concept
of the Analytical Engine in 1837. The Analytical Engine contained an Arithmetic Logic Unit(ALU), basic flow control, and
integrated memory and is the first general-purpose computer concept.
Alan Mathison Turing- Developed the Turing Machine in 1936 & Credited as the founder of computer science.
Since 1966, the Turing Award has been given annually by the Association for Computing Machinery to a person for
technical contributions to the computing community. It is widely considered to be the computing world's highest
honour, equivalent to the Nobel Prize.
John Vincent Atanasoff- Inventor of the first digital computer, the Atanasoff–Berry Computer(ABC) in 1937.
Father of the computer- Konrad Zuse considered as the father of the computer for his development of the Z1, Z2,
Z3, and Z4, the first programmable (modern) computers. He also wrote the first algorithmic programming language
called 'Plankalkül' in 1946.
The first PC (IBM compatible) computer- On April 7, 1953 IBM publicly introduced the 701, its first electric
computer and first mass produced computer. Later IBM introduced its first personal computer called the IBM PC
(code named as the Acorn) in 1981.
The first mass-market PC- In 1968, Hewlett Packard began marketing the first mass-marketed PC, the HP 9100A.
The first microprocessor- Intel introduces the first microprocessor, the Intel 4004 on November 15, 1971.
Father of the personal computer-Henry Edward Roberts coined the term "personal computer" and is considered to
be the father of personal computers after he release Altair 8800, the PC, on December 19, 1974.
A chipset is the component which routes data between the computer's buses
& Devices, so that all the components which make up the computer can
communicate with each other. The chipset originally was made up of a large
number of electronic chips, hence the name. The chipset is part of the
motherboard's logic system and is usually made of two parts:
The NorthBridge (also called the memory controller) is in charge of controlling
transfers between the processor and the RAM, which is way it is located
physically near the processor. It is sometimes called the GMCH, for Graphic and
Memory Controller Hub.
The SouthBridge (also called the input/output controller or expansion
controller) handles communications between peripheral devices. It is also
called the ICH (I/O Controller Hub). The southbridge is slower than the
northbridge, and information from the CPU has to go through the
northbridge before reaching the southbridge.
These two "bridges" connect the CPU to other parts of the computer.
The BIOS (Basic Input/Output System, ROM BIOS, or System BIOS) is the built-in software on a chip (Firmware) located
on al mother boards that contain instructions and setup for how your system should boot and how it operates. It is the
basic program used as an interface between the operating system and the motherboard.
It is partly loaded in ROM (read-only memory, which cannot be modified & will not be damaged by disk failures), so it
uses data contained within the CMOS to find out what the system's hardware configuration is and partly in EPROM
(electrically erasable programmable read-only memory, hence the term Flashing to indicate the action to change the
EEPROM). BIOS flashing therefore means updating the BIOS via software, i.e., replacing the old BIOS version using a
program.
What is the difference between BIOS and CMOS? They are two different components of a computer, but they do
work together to make the computer function properly.
1. The BIOS, a ROM chip, on the motherboard contains a special program that helps the computer processor
interact and control the other components in the computer. These other components include disc drives, video
cards, sound cards, network cards, floppy drives, USB ports, hard drives, and others. Without the BIOS, the CPU
would not know how to interact or interface with the computer components, and the computer would not be able
to function.
The CMOS, a RAM chip, which stores information about the computer components, as well as various settings for
those components and other variables. However, unlike normal volatile RAM chips, CMOS chip is powered by a
battery which keeps the CMOS chip running all the time.
2. The BIOS program on the BIOS chip reads information from the CMOS chip when the computer is starting up,
during the boot up process. You may notice on the initial start up screen, called the POST screen, an option is
available to enter the BIOS Or CMOS. When you enter this setup area, you are actually entering the CMOS setup,
not the BIOS setup. The BIOS chip and program cannot be updated directly by a user. The only way to update the
BIOS is using a BIOS flash program called a BIOS update, which updates the BIOS to a different version. These
updates usually are provided by either the motherboard manufacturer or the computer manufacturer.
The CMOS setup lets you change the time and date and settings for how devices are loaded at
start up, like hard drives, CD and DVD drives and floppy drives. The CMOS setup lets you enable and disable various
hardware devices, including USB ports, the onboard video card and sound card (if present), parallel and serial ports,
and other devices.
Firmware— Manufactured with permanently written data, instructions, or information. ROM or BIOS chips, used
to store the instructions a computer needs during start-up, are called firmware.
BUS
A bus or "data highway" in computing, is a set of physical & data connections (cables, printed circuits, etc.) which
can be shared by multiple hardware components in order to communicate with one another. It can either parallel
or serial.
STRATAGEMStrategise, Succeed
Often, a serial bus can actually be operated at higher overall data rates than a parallel bus, despite having
fewer electrical connections, because a serial bus inherently has no timing skew or crosstalk.
Properties
1) Bus Size or Bus Width - A bus is characterised by the amount of information that can be transmitted at once.
This amount is expressed in bits. The term "width" is used to refer to the number of bits that a bus can transmit at
once. The bus size or width actually indicates the number of wires in the bus. For example, a 32-bit bus has 32 wires
or connectors in parallel that transmit 32 bits at a time It would be considered "32-bits wide."
2) The bus speed is also defined by its frequency (expressed in Hertz), the number of data packets sent or received per
second. Each time that data is sent or received is called a cycle.
3)The transfer speed of a bus is the amount of data which it can transport per unit of time. Transfer speed a bus =
Width * frequency.
6
A bus with a width of 16 bits and a frequency of 133 MHz, therefore, has a transfer speed equal to: 2128*10 bit/s
(bits per second) or 266 MB/s (megabytes per second). (Word size is the number of bits processor can interpret
and execute at a given time.)
Subassemblies- In reality, each bus is generally constituted of 50 to 100 distinct physical lines, divided into three
subassemblies:
? The address bus (sometimes called the memory bus) transports memory addresses which the processor
wants to access in order to read or write data. It is a unidirectional bus.
? The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.
? The control bus (or command bus) transports orders and synchonisation signals coming from the control
unit and travelling to all other hardware components. It is a bidirectional bus, as it also transmits response
signals from the hardware.
Primary Buses- There are generally two buses within a computer: the internal bus & the expansion bus).
Front Side Bus, FSB is also known as the Processor Bus, Memory Bus, or System Bus and connects the CPU with the
main memory, Video Card and Chipset. The FSB is now another important consideration when looking at purchasing a
computer Mother board or a new computer. The FSB speed can be set either using the system BIOS or with jumpers
located on the computer motherboard.
BSB, the back-side bus is a computer bus that connects the CPU to the External Cache(L2 or L3 Cache) . The
back-side bus is a part of the CPU and has a speed that is dependent on the speed of the processor.
(Jumpers allow the computer to close an electrical circuit, allowing the electricity to flow throughout
certain sections of the circuit board. Jumpers consist of a set of small pins that can be covered with a small plastic
box (jumper block). Jumpers are used to configure the settings for computer peripherals such as the motherboard,
hard drives, modems, sound cards, and various other components. For example, if your motherboard supported
instruction detection, a jumper can be set to enable or disable this feature.)
Expansion buses (or input/output buses or peripheral buses) It is mainly used to add expansion cards & new external
devices using expansion slots. It also allows various motherboard components (USB, serial, and parallel ports, cards
inserted in PCI connectors, hard drives, CD-ROM and CD-RW drives, etc.) to communicate with one another.
STRATAGEMStrategise, Succeed
Compaq, Epson, Hewlett-Packard, NEC, Olivetti, Tandy, Wyse and Zenith) in order to compete with the MCA.
4. local buses - interact directly with system bus, or front side bus (FSB)
In 1992, the VESA local bus (VLB) was developed by the VESA (Video Electronics Standard Association under the aegis of
the company NEC) in order to offer a local bus dedicated to graphics systems. It was quickly replaced by the PCI bus.
The PCI bus (Peripheral Component Interconnect) was developed by Intel on 22 June 1992. Contrary to the VLB bus, it is
not so much a traditional local bus but rather an intermediate bus located between the processor bus (Northbridge)
and the I/O bus (Southbridge). At least 3 or 4 PCI connectors are generally present on motherboards and can generally
be recognized by their standardized white colour. The PCI interface exists in 32 bits with a 124-pin connector, or in 64
bits with a 188-pin connector. Revision 2.0 of the PCI-X bus supports 66, 100, 133, 266 and 533 MHz frequencies and
allows throughputs of 4.27 Gb/s on 64 bits.
The AGP bus ( Accelerated Graphics Port) was released in May 1997 & is directly linked to the processor's FSB (Front Side
Bus) and uses the same frequency, for increased bandwidth. The AGP interface was developed specifically to connect
with the video card, by opening a direct memory access (DMA) channel to the graphics board, bypassing the input-
output controller. Cards which employ this graphics bus theoretically require less on-board memory; because they can
directly access graphical data (such as textures) stored in central memory. AGP Pro 8x offers speeds of 2 GB/s. Recent
motherboards are built with a general AGP connector which can be identified by its brown colour.
The PCI Express bus (Peripheral Component Interconnect Express, written PCI-E or 3GIO for "Third Generation I/O"), is
an interconnect bus that allows you to add expansion boards to a computer. The PCI Express bus was developed in July
2002. Contrary to the PCI bus, which runs in parallel interface, the PCI Express bus runs in Serial interface, which allows
it to reach a bandwidth that is much higher than that PCI bus.
The PCI Express bus comes in several versions (1X, 2X, 4X, 8X, 12X, 16X and 32X), which provide throughputs of
between 250 Mb/s and 8 Gb/s, or close to 4 times the peak throughput of AGP 8X ports. One of the interesting
characteristics of the PCI Express bus is that it is
hot pluggable, i.e. it can be plugged in or unplugged without turning off or restarting the machine. PCI Express
connectors can be recognized thanks to their small size and dark grey colour.
The PCI Express standard is also intended to replace PC Card technology with "PCI Express Mini Card" connectors. What
is more, contrary to PCI connectors which can only be used for to make internal connections, the PCI Express standard
can be used to connect external peripherals by using cables. Despite that fact, it is not in competition with USB or Fire
Wire ports.
Slots On Motherboard-
Expansion Slots- Expansion slots are compartments into which expansion (adapter) cards can be inserted. These are
cards which give the computer new features or increased performance. There are several types of slots:
1. ISA slots (Industry Standard Architecture): All recent computers today no longer included the ISA slots and
instead are using more PCI and AGP slots.
2. Extended Industry Standard Architecture, EISA- The EISA bus provided 32-bit slots and is no longer found in
computers today.
3. VLB slots (Vesa Local Bus): Bus formerly used for installing graphics cards.
4. PCI slot (Peripheral Component InterConnect): used for connecting PCI cards (Network card, SCSI, Sound card,
Video card), which are much faster than ISA cards and run on 32 bits
5. AGP slot (Accelerated Graphic Port): A fast port for a graphics card.
6. PCI express slot (Peripheral Component InterConnect Express): Faster bus architecture than AGP and PCI
Other Interfaces
The IEEE 1394 bus - The company Apple gave it the commercial name "FireWire", which is how it is most commonly
known. Sony also gave it commercial name, i.Link. Texas Instruments preferred to call it Lynx. It is a port that allows you
to connect peripherals (particularly digital cameras) at a very high bandwidth (upto 3.2 Gb/s). There are expansion
boards (generally in PCI or PC Card/ PCMCIA format) that allow you to equip a computer with FireWire connectors.
The ATA (Advanced Technology Attachment) standard is a standard interface that allows you to connect storage
peripherals to PC computers. This standard is better known by the commercial term IDE (Integrated Drive Electronics)
or Enhanced IDE (EIDE or E-IDE).
The ATA standard was originally intended for connecting hard drives, however an extension called ATAPI (ATA
Packet Interface) was developed in order to be able to interface other storage peripherals (CD-ROM drives, DVD-
ROM drives, etc.) on an ATA interface.
The ATA standard allows you to connect storage peripherals directly with the motherboard thanks to a ribbon cable,
which is generally made up of 40 parallel wires and three connectors (usually a blue connector for the motherboard and
a black connector and a grey connector for the two storage peripherals).
It facilitates DMA (Direct Memory Access) which allows computers to free up the processor by allowing each of the
peripherals to directly access the memory.
The Serial ATA standard (S-ATA or SATA) is a standard bus allowing high-speed storage peripherals to be connected to PC
computers. The cable used by the Serial ATA is a round cable containing 7 wires and with an 8mm connector on the end.
Processor socket - It is a Zero Insertion Force (ZIF) socket, designed by Intel and allows the processor to be inserted
without applying any pressure, and when lowered, it holds the processor in place.
The processor or Microprocessor or Core (CPU, for Central Processing Unit) is the computer's brain that receives
instructions and messages and sends out instructions to other hardware. It allows the processing of numeric data,
meaning information entered in binary form, and the execution of instructions stored in memory.
The Functional Units of CPU:
1. A control unit links the incoming data, decodes it, and sends it to the execution unit.
2. An execution unit (or processing unit) that accomplishes tasks assigned to it by the control unit. The
execution unit contains:
- The arithmetical and logic unit (written ALU). The ALU performs basic arithmetical calculations and
logic functions;
- The Floating Point Unit, FPU is a function included in all computer processors today that allow
processors to perform math floating point notations, increasing the speed and capability of a processor.
3. A bus management unit (or input-output unit) that manages the flow of incoming and outgoing information and
that interfaces with system RAM;
The Structural Units of CPU - The control unit, ALU & registers are collectively known as a CPU. Common CPU
manufacturers include Intel and Advanced Micro Devices (AMD).
A control unit is circuitry that directs and coordinates all operations within the computer's processor by directing
the input and output of a computer system. It reads and interprets (decodes) the program instructions,
transforming them into a series of control signals which activate other parts of the computer. The control unit is
basically circuitry inside the CPU, controlling the operations inside the CPU and "directing traffic" in a sense.
Arithmetic logic unit (ALU) is a digital circuit that performs arithmetic and logical operations. The ALU is a
fundamental building block of the central processing unit (CPU) of a computer. Mathematician John Von Neumann
proposed the ALU concept in 1945. An ALU receives data from input registers, an external Control unit then tells the
ALU what operation to perform on that data, and then the ALU stores its result into an output register. The Control
unit is responsible for moving the processed data between these registers, ALU and memory.
Registers- When the processor executes instructions, data is temporarily stored in small, local memory locations
of 8, 16, 32 or 64 bits called registers. It stores address from where instruction was fetched, Stores instruction
while it is being decoded, Stores data while ALU computes it, & Stores results of calculation while it is being
stored. They are not part of any of the system memory, but are instead additional temporary high-speed storage
area on the CPU. This makes registers very fast for the CPU to use. The registers are controlled by the control unit
and are used to hold and transfer instructions. Registers are like Post-It notes.
Depending on the type of processor, the overall number of registers can vary from about ten to many hundreds.
Cache memory (also called buffer memory) is local memory that reduces waiting or latency time for information stored
in the RAM (Random Access Memory). Levels of cache memory:
1. Level one cache memory (L1 Cache or primary cache, or internal cache) is directly integrated into the
processor and is the fastest and most expensive cache in the computer. The L1 cache stores the most critical files that
need to be executed and is the first thing the processor looks when performing an instruction.
2. Level two cache memory (L2 Cache) is located on the processor chip or on motherboard where L3 cache
is not present. It can be accessed more rapidly than the RAM, but less rapidly than the level one cache.
3. Level three cache memory (L3 Cache) is located on the motherboard. It has slower access than L1 & L2
Cache.
Secondary cache or external cache - Cache stored outside the CPU on the motherboard, it is commonly L2 cache or
L3 cache.
Hard drive can be used as a cache for an even slower medium like Internet. When it comes to data retrieval, your
internet connection is the slowest link in your computer system.
RAM (computer's amin or core or memory) has slower access than processor registers, L1, L2, & L3 Cache. That is
why the Cache memory is important to temporarily store the primary data to be processed. L1 supplies the L2
memory, which in turn supplies the L3 memory. The L3 memory talks with the RAM, which talks to interfaces hard
drive and other storage devices to transfer information.
CPU Operation- The processor (called CPU, for Central Processing Unit) is an electronic circuit that operates at the
speed of an internal clock (System Clock) thanks to a quartz crystal that, when subjected to an electrical current, send
pulses or ticks, called "peaks", which control timing of all computer operations by setting operating pace of
components of system unit.
STRATAGEMStrategise, Succeed
Clock rate or speed (or FSB clock rate) is the speed at which the microprocessor executes instruction. It corresponds to
the number of pulses or cycle per second (frequency), written in Hertz (Hz). The faster the clocks rate, the faster the
CPU, or the faster it can execute instructions. Clock Speeds are usually determined in MHZ, 1 MHz representing 1
million cycles per second, or in GHZ, 1 GHz representing 1 thousand million cycles per second. Most clock speeds are in
the gigahertz (GHz) range. The clock period is the time between successive cycles.
Clock cycle -It is the distance between two pulses of an oscillator. A single clock cycle toggles between a logical zero
and a logical one state. The shorter clock cycle results in higher number of pulses per second which is responsible
for the higher processor speed.
A measure called CPI (Cycles Per Instruction) gives a representation of the average number of clock cycles required
for a microprocessor to execute an instruction. Computer processors can execute one or more instructions per
clock cycle, depending on the type of processor. A microprocessor's power can thus be characterized by the
number of instructions executed per second.
MIPS (millions of instructions per second) is the unit used and corresponds to the processor frequency divided by
the CPI.
Multiplier (CPU multiplier or clock ratio or clock multiplier or CPU Core Ratio) is the speed ratio between the CPU
and the FSB. For example, a CPU with a multiplier of 20 and an external clock of 133 MHz will have a CPU speed of
2.66GHz.
The CPU Instruction Cycle (Machine cycle)- Four operations of the CPU comprise a machine cycle. Step 1 Fetch
instruction – To obtain program instruction or data item from memory. Step 2 Decode or Interpret instruction –
Control unit Translate instruction into commands. Step 3 Execute (ALU)- Carry out command. Step 4 Increment
Instruction pointer (Store)- Write result to memory. The speed of the instruction cycle is controlled by the CPU's
clock. Speed of the Processor depends on Architecture of CPU(number of Core), clock speed, cache, Front Side
Bus.
Word size: the number of bytes the CPU can process at once. It depends on the number of registers in the CPU, &
on the size of the data bus.
Access time- Amount of time it takes processor to read data from memory. Measured in nanoseconds (ns), one
billionth of a second.
Frequency scaling or processor throttling is a feature that allows a computer's CPU to lower its frequency for a
time, in order to prevent overheating or to save power. Lowering the frequency during idle times (when the
computer is not being used) helps to conserve power, which is quite useful when dealing with laptops or other
portable computers. Overclocking is a method of setting a computer to perform faster than its advertised speed by
setting or changing jumpers, dip switches, CMOS or BIOS settings, CPU multiplier and the motherboard's front-side
bus (FSB) clock rate, firmware updates, or using software utilities. Overclocking allows users to get a performance
boost and is commonly performed on CPUs or Video cards.
Underclocking, also known as downclocking, is the practice of modifying a synchronous circuit's timing settings to
run at a lower clock rate than it was specified to operate at. Usually, underclocking is used to reduce a computer's
power consumption and heat emission, sometimes also to increase the system's stability and compatibility.
Processing is an act the computer processor performs when it receives information. Processing is also used to
describe a process of a software program manipulating or extracting data from data being received or data within a
stored file. The processing capacity is the number of operations a processor can perform in a set amount of time.
Batch processing - Technique of processing data that occur in one large group instead of individually. It is usually
done to help conserve system resources and allow for any modifications before being processed.
Pipelining is technology that improves instruction execution speed by putting the steps into parallel, i.e. all the five
steps of execution going on simultaneously working on instructions coming one after the another. The goal of the
pipeline is to perform each step in parallel with the preceding and following steps.
Execution phases of an instruction for a processor with a 5-step "classic" pipeline are as follows:
1) FETCH: (retrieves the instruction from the cache; 2) DECODE: decodes the instruction and looks for operands (register
or immediate values); 3) EXECUTE: performs the instruction 4) MEMORY: accesses the memory, and writes data or
retrieves data from it; 5) WRITE BACK (retire): records the calculated value in a register.
Because the order of the steps is invariable, it is possible to create specialized circuits in the processor for each one.
Hyper Threading (HT) - It allows the processor to work more efficiently by processing two sets of instructions (thread),
referred to as SMT (Simultaneous Multi Threading), at the same time, making it look like two logical processors with
one physical processor.
A thread is a portion of a program that is executed in conjunction with the main program that performs another task. A
program is capable of having multiple threads open at once and will either terminate or suspend the thread when the
thread's task is complete or the program is closed.
Superscaling consists of placing multiple processing units in parallel in order to process multiple instructions per cycle.
A superscalar CPU can execute more than one instruction per clock cycle. A superscalar processor will be faster
than a scalar processor rated at the same megahertz.
Core- A standard processor has one core. Single core processors only process one instruction at a time (they do use
pipelines internally).
A virtual core is a CPU where there is a virtual separation between two areas of the processor, so that they can
each take on some of the processing of the computer, but will not interfere with the other area. As opposed to
physical cores, which has something that physically separates the cores, virtual cores do not have physical
separation.
Dual processors- Computer that has two physically separate processors that work together. It is important to note
that not all operating systems and software programs support dual processors. Microsoft Windows XP & onward
OSes do support dual processors.
A multi-core processor is composed of two or more independent cores, each capable of processing individual
instructions. Multiple cores can be used to run two programs side by side and, when an intensive program is
running, (AV Scan, Video conversion, CD ripping etc.) you can utilize another core to run your browser to check your
email etc. Programs such as graphic software, games etc. can run multiple instructions at the same time and deliver
faster, smoother results.
A dual-core processor is the generic name given to a CPU with two processors or "execution cores" in the same
integrated circuit. Each processor has its own cache and controller. They can perform operations up to twice as fast
as a single processor can. The Intel Core Duo, the AMD X2, and the dual-core PowerPC G5 are all examples of CPUs
that use dual-core technologies.
Core 2 - series of processors manufactured by Intel. Core 2 Duo & the X2 series is the second line of dual core processors
from Intel & AMD respectively. The Centrino Duo or the Core Duo is Intel's first dual-core processor developed for
mobile computers and first released on January 5, 2006. It is better in performance against Athlon X2 or Intel Pentium
CISC (Complex Instruction Set Computer) architecture means hardwiring the processor with complex instructions that
are difficult to create using basic instructions. Because CISC-based processors can only process one instruction at a
time, the processing time is a function of the size of the instruction.
RISC- Processors with RISC (Reduced Instruction Set Computer) technology do not have hardwired, advanced functions.
Programs must therefore be translated into simple instructions which complicates development and/or requires a
more powerful processor. Such architecture has a reduced production cost compared to CISC processors. In addition,
instructions, simple in nature, are executed in just one clock cycle, which speeds up program execution when compared
to CISC processors. Finally, these processors can handle multiple instructions simultaneously by processing them in
parallel.
It is arguably the fastest and most efficient microprocessor technology available today. The RISC architecture is an
improvement upon the CISC (Complex Instruction Set Computing) architecture used in the original Intel Pentium
chips. Motorola's PowerPC chips (such as the G4 in Power Macs) are the most widely used RISC-based chips. Intel has
slowly been integrating RISC technology into its chips, but they still are mostly CISC-based.
Scalar Processor Architecture, SPARC is a microprocessor architecture originally developed by Sun Microsystems in
1987 that includes a scalar processor. The SPARC processor is a RISC processor commonly found in Sun computers;
however, it is available for a wide variety of computers.
Coprocessor- A special purpose processor that helps the CPU perform special operations such as math operations,
encryption, and computer graphics. eg. numeric coprocessor or a floating-point coprocessor, the math coprocessor
1.1.b CPU Cooling: Since the processor releases heat, it is necessary to dissipate it, to keep the circuits from melting.
This is why it is generally mounted atop a heat sink (sometimes called a cooler or radiator), which is made of a metal
which conducts heat well (copper or aluminium) in order to increase the microprocessor's heat transfer surface. The
heat sink includes a base in contact with the processor and fins in order to increase the heat transfer surface. The unit
also includes a fan which vents hot air from the case and let fresh air come in from outside.
There are two heat sinks types: active and passive. Active heat sinks (HSF, which is short for heatsink and fan)
utilize power and are usually a fan type or some other peltier cooling device. Passive heat sinks are 100% reliable, as
they have no mechanical components. Passive heat sinks are made of an aluminium-finned radiator that dissipates
heat through convection.
Heat pipe—smaller device for notebook computers, Liquid cooling—uses a continuous flow of fluids to transfer heat
away.
A graphics card (graphics adapter, video card or graphics accelerator) is a computer component which converts digital
data into a graphical form which can be displayed on a monitor.
AGP In-line Memory Module, AIMM is also known as the Graphics Performance Accelerator and is an expansion card,
designed to be inserted into the AGP slot on a motherboard to allow for additional dedicated memory for graphics
processing.
A video card's main components are:
1. A Graphical Processing Unit (GPU) is a single chip processor located on the video card that handles the processing for
2D or 3D graphics. By having a separate processor on the video card, the computer CPU can handle all other important
tasks.
2. video memory is to store images processed by the GPU before they are displayed by the monitor. The term frame
buffer is generally used to refer to the part of the video memory which stores images before they are shown onscreen.
3. The RAMDAC (random access memory digital-analog converter) is used for converting digital images stored in the
frame buffer as analog signals to send to the monitor. The RAMDAC's frequency determines the refresh rate (number of
images per second, expressed in Hertz - Hz) that the graphics card can support.
4. The video BIOS contains the graphics card's settings, in particular the graphics modes that the adapter supports.
5. The interface: This is a kind of bus used to connect the graphics card to the motherboard. The AGP or PCI Express bus.
6. The connections:
The sound card (Sound board or audio card) is an expansion card or integrated circuit that provides a computer
with the ability to produce sounds that can be heard by the user either over speakers or headphones.
The main components of a sound card are:
1. The specialised processor, called the DSP (digital signal processor), which does all the digital audio processing (echo,
reverb, vibrato chorus, tremelo, 3D effects, etc.);
2. The digital to analog converter, or DAC for short, which converts the computer's audio data into an analog signal for
being sent to a sound system (such as speakers or an amplifier);
3. The analog to digital converter, or ADC for short, which converts an analog input signal into digital data which a
computer can process;
4. External input/output connectors:
a) On or two standard 3.5 mm line-out jacks, normally light green in colour;
b) A line-in jack;
c) A microphone input (sometimes called Mic), usually a pink-coloured 3.5 mm jack;
A network card (Ethernet card or Network Adapter or Network Interface Card, or NIC) is an expansion card that enables
a computer to connect to a network such as a home network or the Internet using an Ethernet cable with a RJ-45
connector.
To prepare data to be sent the network card uses a transceiver, which transforms parallel data into serial data. A
network card is the physical interface between the computer and cable. It converts the data sent by the computer into a
form which can be used by the network cable, transfers that data to another computer and controls the dataflow
between the computer and cable. It also translates the data coming from the cable into bytes so that the computer's
CPU can read it.
Modem- Short for MODulator/DEModulator, the first Modem was first released by
AT&T in 1960 when it introduced its dataphone. The Modem is a hardware device
that enables a computer to send and receive information over telephone lines.
Computers operate digitally using binary languages (a series of zeros and ones), but
Telephone lines are analogue. The digital signals pass from one value to another.
There is no middle or half-way point. It is "All or Nothing" (one or zero). On the other
hand, analogue signals do not move "in steps", but rather continuously. The Modem
is responsible for converting the digital data used by your computer into an analog
signal used on phone lines and then converting it back once received on the other
end. Modems are referred to as an asynchronous device, meaning that the device
transmits data in an intermittent stream of small packets.
Below are the three available versions of a computer Modem that can be used in computers.
Internal modem that connects to a PCI slot inside a newer desktop computer or ISA slot on an older computer.
External modem is located within a box and is hooked up externally to the computer, usually the Serial Ports or
USB port.
Removable modem that is used with older laptops PCMCIA slot and is removed when you need the PCMCIA slot
for another device, but are not planning on using the modem.
Broadband Modem is also used to refer to the hardware device that connects a computer or router to a broadband
network. For example, a Cable Modem and DSL Modem are two examples of these types of Modems.
A modem's transmission speed is generally expressed in bauds, in tribute to Emile Baudot (11 September 1845 - 28
March 1903), a famous French engineer who worked in the area of telecommunications. This unit of transmission
speed characterizes the frequency of (de)modulation, i.e. the number of times the modem makes the signal change
status per second.
Uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical
apparatus whose primary role of any UPS is to provide short-term power when the input power source fails. Other
functions:-.Voltage Surge control, voltage Sag control, Spikes, defined as a brief high voltage excursion control, Noise
control, defined as a high frequency transient or oscillation, usually injected into the line by nearby equipment,
Frequency stabilization, Harmonic distortion control.
1.3 MEMORY
Memory – The term "memory" applies to any electronic component capable of temporarily storing data. It consists of
one or more chips on motherboard or other circuit board. Each byte stored in unique location called an address,
similar to seats in a concert hall. There are two main categories of memories:
1. Internal memory (also called main or core or primary memory) that temporarily memorises data while programs
are running. Internal memory corresponds to what we call random access memory (RAM).
2. Auxiliary memory (also called physical or secondary or external memory) that stores information over the long term,
including after the computer is turned off. Auxiliary memory corresponds to magnetic storage devices such as the hard-
drives, optical storage devices such as CD-ROMs and DVD-ROMs, as well as read-only memories.
Types of Memories-
1. Random access memory (RAM) - It is the system's main memory, i.e. it is a space that allows you to temporarily store
data when a program is running. RAM is volatile, meaning that it only stores data as long as it supplied with electricity.
2. Read-only memory, called ROM, is a type of memory that allows you to keep the information contained on it even
when the memory is no longer receiving electricity (non-volatile). Basically, this type of memory only has read-only
access.
3. Flash memory is a compromise between RAM-type memories and ROM memories. Flash memory possesses the
non-volatility of ROM memories while providing both read and write access. However, the access times of flash
memories are longer than the access times of RAM.
Classification Based on Volatility & Access
Non-volatile memory - Will retain the stored information even if it is not constantly supplied with electric power. It
includes magnetic disks like hard disks and floppy disks ; optical disks such as CDs (Compact Disc), CDROMs, DVDs
(Digital Visual Display); and Magnetic tapes.
Volatile Memory - Requires constant power to maintain the stored information. It includes RAM.
Random access - Any location in storage can be accessed at any moment in approximately the same amount of time.
Such characteristic is well suited for primary and secondary storage. It includes magnetic disks like hard disks and floppy
disks; optical disks such as CDs (Compact Disc), CDROMs, DVDs(Digital Visual Display); and RAM Sequential access - The
accessing of pieces of information will be in a serial order, one after the other. Such characteristic is typical of off-line
storage. Eg Magnetic tape
Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information.
Magnetic storage is non-volatile. Eg. Magnetic disk:- Floppy disk, used for off-line storage; Hard disk drive, used for
secondary storage; Magnetic tape data storage, used for tertiary and off-line storage
Other Types-
Virtual memory is a method of using the computer hard drive to provide extra memory (RAM) for the computer.
Segments of memory are stored on the hard drive known as pages. When a segment of memory is requested that is not
Primary storage is a storage location that holds memory for short periods
of times while the computer running. For example, computer RAM and
Cache are both examples of a primary storage device. This storage is the
fastest memory in your computer and is used to store data while it's being
used. For example, when you open a program data is moved from the
secondary storage into the primary storage. It is also known as Dynamic
storage.
1.3.a Random access memory (RAM) - It is the system's main memory, i.e. it is a space that allows you to temporarily
store data when a program is running. RAM is volatile, meaning that it only stores data as long as it supplied with
electricity.
Types of RAM
1. DRAM memories (Dynamic Random Access Module) are most common, inexpensive but must be re-energized or
refreshed constantly. They are used essentially for the computer's main memory.
2. SRAM memories (Static Random Access Module), Faster and more reliable but costlier than DRAM chips. SRAM
memories are used in particular for the processor's cache memory. Do not have to be re-energized as often as DRAM.
The DRAM (Dynamic RAM) is the most common type of memory at the start of this millennium. This is a memory whose
transistors are arranged in a matrix in rows and columns. A transistor, coupled with a capacitor, gives information on a
bit. Since 1 octet contains 8 bits, a DRAM memory module of 256 Mo will thus contain 256 * 2^10 * 2^10 = 256 * 1024 *
A The DR-SDRAM (Direct Rambus DRAM) is a type of memory that lets you transfer data to a 16-bit bus at frequency of
800Mhz, giving it a bandwidth of 1.6 Go/s. As with the SDRAM, this type of memory is synchronised with the bus clock
to enhance data exchange.
The DDR-SDRAM (Double Data Rate SDRAM) is a memory, based on the SDRAM technology, which doubles the
transfer rate of the SDRAM using the same frequency. Today, the DDR technology is found on high end video cards and
computer memory such as DDR-SDRAM.
DDR2 (or DDR-II) is the second generation of DDR memory. DDR2 is capable of operating at greater speeds of 400 MHz
and higher (twice as high as those of the DDR with the same external frequency), offers a greater bandwidth potential,
operates at a lower power consumption, and generates less heat.
QDR (Quadruple Data Rate or quad-pumped) It is basically DDR2 memory having two separate channels for reading and
writing, so that it is able to send or receive twice as much data as the DDR.
chips are nearly 30% more efficient in power usage than its predecessor DDR2. DDR3 SDRAM is the most current type of
memory used in the majority of computers systems around the world.
The speed of the chipset and busses controls how quickly RAM can communicate with other parts of the computer. A
fast processor with slow RAM is going nowhere. The general rule of thumb is the more RAM the computer has, the
better.
How much RAM does an application require?- Depends on the types of software you plan to use. For optimal
performance, you need more than minimum specifications.
Read-only memory (ROM) or non-volatile memory There is a type of memory that stores data without electrical
current & not erased when the system is switched off.
This type of memory also lets you stored the data needed to start up (booting) the computer. Different ROM-type
memories contain these essential start-up data, i.e.:
?The BIOS is a programme for controlling the system's main input-output interfaces.
?The bootstrap loader: a programme for loading (random access) memory into the operating system and launching it.
? The CMOS Setup is the screen displayed when the computer starts up and which is used to amend the system
parameters.
?The Power-On Self Test (POST), a programme that runs automatically when the system is booted, thus allowing the
system to be tested (this is why the system "counts" the RAM at start-up).
STRATAGEMStrategise, Succeed
Given that ROM are much slower than RAM memories (access time for a ROM is around 150 ns whereas for SDRAM it is
around 10 ns), the instructions given in the ROM are sometimes copied to the RAM at start-up; this is known as
shadowing, though is usually referred to as shadow memory).
Types of ROM
PROM (Programmable Read Only Memory)- These memories are chips comprising thousands of fuses (or diodes) that
can be "burnt" using a device called a " ROM programmer". The fuses thus burnt correspond to 0 and the others to 1.
EPROM (Erasable Programmable Read Only Memory) memories are PROMs that can be deleted using ultra-violet
rays.
EEPROM (Electrically Erasable Read Only Memory memories are also erasable PROMs, but unlike EPROMs, they can
be erased by a simple electric current.
Flash memory is a kind of semiconductor-based, non-volatile, rewritable computer memory.
It is primarily used in memory cards, USB flash drives, MP3 players portable media player with USB port and soli-state
drives for general storage and transfer of data between computers and other digital products. What's more, this kind of
memory has no moving parts, which makes it very shock-resistant. Flash drives have many names — jump drives,
thumb drives, pen drives, and USB keychain drives.
"Card reader" is the generic term for an input device that reads flash memory cards. It can be a standalone device that
connects to a computer via USB or it may be integrated into a computer, printer, or multifunction device. In fact, most
multifunction printer/scanner/copiers now have built-in card readers.
Types of Memory or flash Cards- There are many competing, incompatible memory card formats, almost one for every
manufacturer.
? Compact Flash (CF)- is a kind of memory card created in 1994 by the company SanDisk. Compact Flash is made up of a
memory controller and a flash memory chip.
? Secure Digital (SD) Card is a non-volatile memory card format developed by the SD Card Association for use in portable
devices.
? Memory Stick
? Smart Media - now outdated, it is a flash memory card standard owned by Toshiba, with capacities ranging from 2 MB
to 128 MB.
? MMC (MultimediaCard)- is a flash memory card standard, Unveiled in 1997 by SanDisk and Siemens AG. It has been
superseded by the Secure Digital (SD) card, but can still be used in most devices that support SD cards.
? xD picture card- is a flash memory card format, used mainly in older digital cameras. xD stands for Extreme Digital.
1.3. b Secondary memory (or secondary storage) or Modern mass storage devices is the slowest and cheapest form of
memory. It cannot be processed directly by the CPU. It must first be copied into primary storage (also known as RAM).
Secondary memory devices include magnetic disks like hard disks.
Disk drive - A machine that reads data from and writes data onto a disk. A disk drive rotates the disk very fast and has
one or more heads that read and write data. Disk drives can be either internal (housed within the computer) or external
(housed in a separate box that connects to the computer).
Magnetic Drive -
The hard drive is the component which is used to permanently store data, which is connected to the motherboard
using a hard drive controller which acts as an interface between the processor and the hard drive. External hard drives
are connected to the computer using USB connector, as opposed to internal hard drives which are plugged directly
into the motherboard on Serial ATA slots.
A hard disk drive (HDD) design consists of a motor-driven spindle that holds flat circular rotating disks called platters,
which rotates in a counter-clockwise direction & onto which the data are recorded. The platters are made from a non-
magnetic material, usually aluminium alloy or glass, and are coated with a shallow layer of magnetic material with an
outer layer of carbon for protection. The platters are spun at speeds varying from 3,000 RPM in energy-efficient
A solid-state drive (SSD) (also referred to as a "solid-state disk" or "electronic disk") is a data storage device that uses
integrated circuit assemblies as memory to store data persistently. SSDs do not employ any moving mechanical
components, which distinguishes them from traditional magnetic disks such as hard disk drives (HDDs) or floppy disks
& that is why SSDs are typically less susceptible to physical shock. They are silent and have lower access time and
latency, but more expensive per unit of storage.
SSD components include either DRAM or EEPROM memory boards, a memory bus board, a CPU, and a battery card.
Because they contain their own CPUs to manage data storage, they are a lot faster than conventional rotating hard disks
; therefore, they produce highest possible I/O rates. SSDs are most effective for server applications and server systems,
where I/O response time is crucial.
DVD (Digital Versatile Disc or Digital Video Disc) - A single-layer, single-sided DVD can store 4.7 GB of data. There is a
two-layer standard that doubles the single-sided capacity to 8.5 GB. These disks can also be double-sided, ramping up
the maximum storage on a single disc to 17 GB.
DVD+R or DVD-R - Stands for "Digital Versatile Disc Recordable." Differences between the 'dash' and the 'plus' format -
One example is that the DVD+R style Address In Pregroove (ADIP) system of tracking and speed control is less
susceptible to interference and error, which makes the ADIP system more accurate at higher speeds than the Land Pre
Pit (LPP) system used by DVD-R. DVD+R discs must be formatted before being recorded by a compatible DVD video
recorder. DVD-R do not have to be formatted before being recorded by a compatible DVD video recorder. The DVD+R
format is not quite as common as the DVD-R format.
Drives that can read both DVD+R and DVD-R discs are often referred to as DVD/R drives.
DVD+RW or DVD-RW: Stands for "Digital Versatile Disk Rewritable."
DVD-RAM stands for "Digital Versatile Disc - Random Access Memory." It is one of three rewriteable DVD formats, along
with DVD+RW and DVD-RW.
Mini DVD is a DVD disc having 8 cm in diameter instead of normal 12 cm.
Blu-ray Disc ( BD) is a High density optical disc storage medium designed to supersede the DVD format. The disc
diameter is 12 cm and disc thickness 1.2 mm plastic optical disc, the same size as DVDs and CDs. Blu-ray Discs contain 25
GB (23.31GiB) per layer, with dual layer discs (50 GB) being the norm for feature-length video discs. Triple layer discs
(100 GB) and quadruple layers (128 GB) are available for BD-XL Blu-ray re-writer drives. The name Blu-ray Disc refers to
the blue laser used to read the disc, which allows information to be stored at a greater density than is possible with the
longer-wavelength red laser used for DVDs. Blu-ray Disc was developed by the Blu-ray Disc Association..
The Zip drive is a medium-capacity removable disk storage system that was introduced by lomega in late 1994.
Originally, Zip disks launched with capacities of 100 MB, but later versions increased this to first 250 MB and then 750
MB. However it was never popular enough to replace the 3.5-inch floppy disk nor could ever match the storage size
MEMORY MEASUREMENT
The memory is measured by number of bytes available for storage.
Binary System is a two-digit (Base-2) numerical system, which computers use to store data and compute functions. The
reason computers use the binary system is because digital switches inside the computer can only be set to either on or
off, which are represented by a 1 or 0. Though the binary system consists of only ones and zeros, the two digits can be
used to represent anything.
A byte is Eight bits grouped together as a unit. It provides enough different combinations of 0s and 1s to represent 256
individual characters like Numbers, Uppercase and lowercase letters, Punctuation marks, & Other. One bit is either 0 or
1 & the Smallest unit of measurement of memory. Each RAM location has an address and holds one byte of data (eight
bits).
Binary Digit Electronic Charge Electronic How do computers represent data? Most computers are digital. Recognize
(BIT) State only two discrete states: on or off, Use a binary system (Number system) to
1 + On recognize two states with two unique digits: 1 and 0, called bits (short for
0 - Off binary digits)
Since, 1Byte = 8bits; so the number of combinations with 8bits of 1Byte = 28 =256. (because of binary system the base
will always be 2 & index will vary). The unit prefixes like kilo- denote powers of 1024 in the measure of memory
n
capacities, the 1024 progression (for n = 1, 2, …) is as follows:
Normal (IEC)Unit Binary or Digital Unit (This is to avoid the ambiguity associated with
the size of normal units)
10 1
Kilobyte =10^3 or 1,000 bytes Kibibyte (KB) = 2 = 1024 = 1024 byte
20 2
Megabyte = 10^6 (106) or 1,000,000 bytes Mebibyte (MB) = 2 = 1024 = 1,048,576 byte
9 30 3
Gigabyte = 10^9 (10 )or 1,000,000,000 bytes Gibibyte (GB) = 2 = 1024 = 1,073,741,824 byte
12 40 4
Terabyte= 10^12 (10 )or 1,000,000,000,000 bytes Tebibyte(TB) = 2 = 1024 = 1,099,511,627,776 byte
Pentabyte = 10^15 (1015) or 1,000,000,000,000,000 bytes Pebibyte (PB) = 2 = 10245 = 1,125,899,906,842,624 bytes
50
Exabyte= 10^18 (1018)or 1,000,000,000,000,000,000 bytes Exbibyte (EB) = 260 = 10246 = 1,152,921,504,606,846,976 bytes
Zetabyte= 10^21 (1021)or 1,000,000,000,000,000,000,000 Zebibyte (ZB) = 270 = 10247 = 1,000,000,000,000,000,000,000 bytes
bytes
24 80 8
Yottabyte= 10^24 ((10 ))or Yobibyte (YB) = 2 = 1024 = 1,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000 bytes bytes
Kilobits is written as Kb; whereas Kilobyte is written as KB. The International Electrotechnical Commission (IEC) is a
non-profit, non-governmental international standards organization that prepares and publishes International
Standards for all electrical, electronic and related technologies – collectively known as "electrotechnology".
2. 64-bit therefore refers to a processor with registers that store 64-bit numbers. A generalization would be to suggest
that 64-bit architecture would double the amount of data a CPU can process per clock cycle. Users would note a
performance increase because a 64-bit CPU can handle more memory and larger files. One of the most attractive
features of 64-bit processors is the amount of memory the system can support. 64-bit architecture will allow systems to
address up to 1 terabyte (1TB = 1000 GB) of memory. In today's 32-bit desktop systems, you can have up to 4GB of RAM
(provided your motherboard that can handle that much RAM) which is split between the applications and the
operating system (OS).
Bit map
A representation, consisting of rows and columns of dots, of a graphics image in computer memory. The value of each
dot is stored in one or more bits of data. Graphics are also often described by the number of bits used to represent
each dot. A 1-bit image is monochrome; an 8-bit image supports 256 (28) colors or grayscales; and a 24- or 32-bit
graphic supports true colour. In a 32 bit computer graphics 24 bits are used for color and the remaining 8 bits are used
for control information.
Resolution (The density of the dots) - determines how sharply the image both on screen and in print is represented.
This is often expressed in dots per inch (dpi). The DPI measures how many dots fit into a linear inch. Therefore, the
higher the DPI, the more detail can be shown in an image. Since a 600 dpi printer can print 600 dots both horizontally
and vertically per inch, it actually prints 360,000 (600 x 600) dots per square inch. To display a bit-mapped image on a
monitor or to print it on a printer, the computer translates the bit map into pixels (for display screens) or ink dots (for
printers). Optical scanners and fax machines work by transforming text or pictures on paper into bit maps.
A dot matrix is a 2D matrix of dots that can represent images, symbols, or characters. They are used for electronic
displays, such as computer monitors and LED screens, as well as printed output.
The more dots that are used, the more clear and accurate the image representation will be. For example, a 16x16 dot
matrix can represent the letter "S" more accurately than a 8x8 matrix. Bitmap images on a computer screen are also dot
matrixes, since they are made up of a rectangular grid of pixels.
Dot Pitch
This is the distance between two dots in millimeters used to determine how sharp the display of a monitor is. The
smaller the number, the finer the picture. Most CRT monitors will have a dot pitch between .25 and .28. The difference
between a "dot" (as in dot pitch) and a pixel is that a pixel is mapped onto the dots on the screen. So pixels are typically
larger than the "dots" on the actual screen.
PIXEL (Picture Element) - The screen is divided up into a matrix of thousands or even millions of pixels.
Each pixel can only be one color at a time. However, since they are so small, pixels often blend together to form various
shades and blends of colors. The number of colors each pixel can be is determined by the number of bits used to
represent it. For example, 8-bit color allows for 2 to the power 8th, or 256 colors to be displayed.
A megapixel is one million pixels. It is commonly used to describe the resolution of digital cameras. The higher the
megapixel number, the more detail the camera can capture. A camera's megapixel number is calculated by multiplying
the number of vertical pixels by the number of horizontal pixels captured by the camera's sensor. For example, the
PPI- Stands for "Pixels Per Inch." The higher the DPI, the greater the detail of the printed image. However, even if a
photo is printed with a high DPI, the detail represented in the photo can only be as high as the PPI.
PPI measures the number of pixels per line per inch in a digital photo. This number is directly related to the number of
megapixels a digital camera can capture. For example, 6.3 megapixel camera captures 2048 vertical by 3072 horizontal
pixels. Therefore, when printing a 4x6 image, the PPI would be 3072 px. / 6 in. = 512 PPI. However, if you were to print a
large 20x30 poster image from a 6.3 megapixel image, the PPI would be 3072 px. / 30 in. = 102.4 PPI. A good rule of
thumb is to keep your PPI above 300 so your prints will look nice and clear.
Three popular coding systems to represent data- 1. ASCII—American Standard Code for Information Interchange is a
character-encoding scheme originally based on the English alphabet. ASCII codes represent text in computers,
communications equipment, and other devices that use text. Most modern character-encoding schemes are based on
ASCII, though they support many additional characters. Each letter or symbol is assigned to a number from 0 to 127. For
example, in the 8-bit ASCII code, a lowercase "a" is represented by the bit string 01100001. ASCII was the most
commonly used character encoding on the World Wide Web until December 2007, when it was surpassed by UTF-8.
2. EBCDIC—Extended Binary Coded Decimal Interchange Code – In computing and electronic systems, it is a digital
encoding method for numbers using decimal notation, with each decimal digit represented by its own binary sequence.
Although BCD is not as widely used as in the past, decimal fixed-point and floating point formats are still important and
continue to be used in financial, commercial, and industrial computing, where subtle conversion and rounding errors
that are inherent to floating point binary representations cannot be tolerated.
3. Unicode- It is a computing industry standard for the consistent encoding, representation and handling of text
expressed in most of the world's writing systems. Developed in conjunction with the Universal Character set standard
and published in book form as The Unicode Standard, the latest version of Unicode consists of a repertoire of more
than 110,000 characters covering 100 scripts, a set of code charts for visual reference, an encoding methodology and
set of standard character encodings, an enumeration of character properties such as upper and lower case, a set of
reference data computer files, and a number of related items, such as character properties, rules for normalisation,
decomposition, collation, rendering, and bidirectional display order (for the correct display of text containing both
right-to-left scripts, such as Arabic and Hebrew, and left-to-right scripts). As of 2012, the most recent version is Unicode
6.1.
Unicode's success at unifying character sets has led to its widespread and predominant use in the internationalisation
and localisation of computer software. The standard has been implemented in many recent technologies, including
XML, the JAVA programming language, the Microsoft . NET Framework, and modern operating systems.
Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8, UTF-16
and the now-obsolete UCS(Universal Character Set)-2. UTF-8 uses one byte for any ASCII characters, which have the
same code values in both UTF-8 and ASCII encoding, and up to four bytes for other characters. UTF-8(UCS
Transformation Format—8-bit) is a variable –width encoding that can represent every character in the Unicode
character set. It was designed for bakward compatability with ASCII and to avoid the complications of endianness and
byte order marks in UTF-16 and UTF-32.How is a letter converted to binary form and back? - Step 1. The user presses
the capital letter T (SHIFT+T key) on the keyboard. Step 2. An electronic signal for the capital letter T is sent to the
system unit. Step 3. The system unit converts the scan code for the capital letter T to its ASCII binary code (01010100)
and stores it in memory for processing. Step 4. After processing, the binary code for the capital letter T is converted to
an image, and displayed on the output device.
2.1. a KEYBOARD
The keyboard is the primary portion of the keyboard that contains all alphanumeric and symbol keys. It is an essential
input device for a computer, as it is what lets us enter commands.
Qwerty keyboard - The term "QWERTY" (after the first six letter keys on the keyboard) refers to the type of keyboard
which is used with nearly all computers in the English-speaking world. The Qwerty keyboard was designed in 1868 in
Milwaukee by Christopher Latham Sholes, who placed the keys corresponding to the most commonly used letter pairs
at opposite ends of the keyboard, in order to prevent the typewriter hammers of the time from becoming jammed with
one another.
Dvorak keyboard - In 1936, August Dvorak (a professor at the University of Washington) created a keyboard whose
keys were arranged solely with efficiency in mind. The Dvorak keyboard placed all the vowels of the alphabet and the
five most common consonants on the central row so they could be easily accessed, while also evenly dividing the work
between the left and right hands. What's more, the most frequent letters of the alphabet were placed at the centre of
the keyboard.
Extended Keyboards- The new IBM-compatible computers launched in 1986 came with 102-key keyboards. The 104 or
105-key Microsoft Windows-Compatible Keyboards has defined three new keys, which are used for shortcuts to certain
Windows features.
Alphanumeric Keys -- letters and numbers, Punctuation keys -- comma, period, semicolon, and so on. Special keys –
function keys, control keys, arrow keys, Caps Lock key etc.
The Function keys or F1 through F12 keys are used in programs as shortcut keys to performed frequently performed
tasks. For example, the F1 key is the key to open the online help for most programs. These are special keys on the
keyboard that have different meanings depending on which program is running.
Control keys are a section of keys on your keyboard that enable additional control over a document and the computer.
Print Screen, Scroll Lock, Pause, Break, Insert, Home, Page Up, Delete, End and Page down are all examples of control
keys.
Control key- A key on PC keyboards labelled Ctrl. You use the Control key in the same way that you use the Shift key --
keeping it pressed down while pressing another character. The result is a control key combination, which can have
different meanings depending on which program is running. On Macintoshes, the Control key is called an Apple key or
Command key.
Arrow keys are four directional arrow keys that allow the user to move their cursor and position on a page. Most
computer keyboards contain four arrow keys for moving the cursor or insertion point right, left, up, or down. When
STRATAGEMStrategise, Succeed
combined with the Shift, Function, Control or Alt keys (on PCs), the arrow keys can have different meanings. For
example, pressing Shift +Up-arrow might move the cursor or pointer up an entire page. The exact manner in which the
arrow keys function depends on which program is running. The arrow keys are also called cursor control keys.
A toggle key is used to alternate the input mode of a group of keys on a keyboard. Some examples include Caps Lock,
Insert, Num Lock, and Scroll Lock. Caps Lock is the most commonly used toggle key, and capitalizes (uppercase) all letter
input when turned on, but has no effect on other keys. The Insert key toggles the text entry mode between insert
(which inserts characters) and overtype (which overwrites characters). Num Lock makes sure numbers are input from
the numeric keypad and Scroll Lock allows the arrow keys to scroll through the contents of a window.
Sticky keys- Microsoft Windows accessibility feature that will cause keys to stick making it easier to do keyboard
shortcuts by not having to hold multiple keys at once. For example, instead of having to press CTRL + ALT + DEL all at
once a user could press CTRL, then ALT, and then DEL to perform the same function. This feature can be enabled or
disabled through the Accessibility Options or Ease of Access Center in the Windows Control Panel.
Filter keys - Microsoft Windows accessibility feature that allows the computer to ignore brief and repeated keystrokes
that may be caused by slow or inaccurate finger movements.
The Filter keys feature can be enabled and disabled through the Accessibility Options or Ease of Access Center in the
Windows Contol Panel.
Modifier keys are often used in conjunction with other keys to perform computer keyboard shortcuts. For example, in
many text editor programs pressing the Ctrl + A will select all text. On an IBM compatible computer, the Alt, Ctrl, and
shift keys are modifier keys. On the Apple Macintosh computer, the Control, option, and Shift keys are modifier keys.
Function (Fn) keyboard key is found on laptop computers and used to perform special functions on the laptop such as
turning up the brightness or contrast, switching video modes, or printing the screen. the laptop has a color coded Fn key
and matching colors on the keys with symbols representing what the keys do. In this example, pressing and holding
down the Fn key and pressing the up or down arrows would increase or decrease the brightness.
Home row keys - Term used to describe the row of keys on the computer keyboard your fingers rest on when not typing.
For example, on the standard QWERTY United States keyboard, the home row keys for your left hand are A, S, D, and F
and your right hand are J, K, l, and ; with the thumbs resting on the space bar.
Home key - Key on the keyboard usually above the end key on the IBM compatible keyboard. This key is often used to
return the user to the beginning of the line or the beginning of a document. Using a key combination such as pressing
the Shift key and the Home key together would highlight the text from the cursor position to the beginning of the line.
End key - A key found on keyboards usually below the home key that moves the cursor to the end of the line, paragraph,
page, screen, cell, or document depending on the program and where your cursor is currently positioned. Using a key
combination such as pressing the Shift key and the End key together would highlight the text from the cursor to the end
of the line.
Shift key- A key on computer keyboards that gives the other keys an alternate meaning. When combined with
alphabetic keys, the Shift key causes the system to output a capital letter. The Shift key can also be combined with other
keys to produce program -dependent results. The shift key allows you to highlight text. For example, holding down the
shift key while using the right or left arrow keys will highlight the text to the left or right. If you hold down shift while
pressing the down arrow keys, you will highlight one line at a time in that direction.
Finally, you can use the Shift key in combination with the other above recommendations. For example, pressing and
holding Shift and CTRL and using the arrows will highlight a word at a time, or holding down Shift and pressing the End
key will highlight from the current cursor position to the end of the document.
Enter key- A key that moves the cursor (or insertion point) to the beginning of the next line, or returns control to
whatever program is currently running. After a program requests information from you(by displaying a prompt), it will
usually not respond to your input until you have pressed the Enter or Return key. This allows you to correct typing
mistakes or to reconsider your entry before it is too late. In many applications, pressing the Enter key moves the cursor
to the next field. In graphical user interface, pressing Enter activates the currently selected button or option.
STRATAGEMStrategise, Succeed
Number pad, the numeric keypad is a 17-key keypad usually found on the far right side of a typical IBM 101 / 2-key
keyboard.
Carpal Tunnel Syndrome, which is also known as RSI or Repetitive Strain Injury, is the swelling of small blood vessels,
pressure increases on the nerve and disrupts its functioning causing numbness, pain, and a loss of manual dexterity.
With computers, Carpal Tunnel Syndrome may occur as a user does repetitive motions on their keyboard or mouse.
Common methods of preventing this injury include purchasing a Natural Style ergonomic keyboard, taking breaks, and
doing wrist exercises.
Keyboards are generally plugged into the rear of the CPU, on the motherboard, using a purple
PS/2 connector:
How it works- Whenever a key is pressed, a specific signal is transmitted to the
computer. The keyboard uses a crossbar network to identify every key based on its
row and column. When a key is pressed, an electrical contact is formed between
the row and column. The electric signals are transmitted to a microcontroller,
which sends a code (binary-coded decimal (BCD), American Standard Code for
Information Interchange (ASCII) or Unicode) to the computer describing the
character which corresponds to that key.
2.1. b MOUSE
The mouse is a pointing device used to move a cursor on the screen and allowing objects to be selected, moved and
manipulated using the buttons. The consistent action of pressing (clicking) on a button in order to carry out an action is
called a "click". The first mouse was invented and developed by Douglas Carle Engelbart of the Stanford Research
Institute (SRI).
It functions by detecting two-dimensional (X-Y Position Indicator) motion relative to its supporting surface. It allows an
individual to control a pointer in a graphical user interface(GUI). A computer mouse most commonly has two buttons
and a scroll wheel, which can also act as a third button.
Mouse Connector- The mouse is generally plugged in to the back of the central processing unit, into the motherboard,
with a green PS/2 connector. Some mice, with advanced functionalities sometimes have a USB connector.
Types of mice- classified according to the positioning technology on the one hand and the data transmission to the
central processing unit on the other.
1. Mechanical mice, comprises of a ball upon which two rollers turn. These rollers each comprise of a notched disc
which turns between a photodiode and LED (Light Emitting Diode) allowing the light to pass through in sequence.
When the light passes through, the photodiode sends a bit (1), when it meets an obstacle, the photodiode sends a zero
bit (0). Using this information, the computer knows the position of the cursor and even its speed.;
2. Optical-mechanical mice, where the operation is similar to that of mechanical mice, except the movement of the
ball is detected by optic sensors.
3. Optical mice operate through visual analysis of the surface on which it moves. So, an optical mouse is comprised of
an LED or Laser source, an image acquisition system (IAS) and a digital signal processor (DSP).
The LED is responsible for shining on the surface so as to enable the IAS to get an image of the surface. The DSP, through
analysing the microscopic characteristics of the surface determines the horizontal and vertical movement. A Laser
mouse is an optical mouse that uses coherent (Laser) light.
Cordless or wireless mice - Cordless is the ability to operate a device without any wires. Although cordless devices
requires no wires, they do require some device to broadcast a signal; for example, a Bluetooth mouse may require a
USB Bluetooth transceiver to send and receive signals from the mouse. In addition to this, all wireless hardware devices
require batteries.
A mouse pad is a flat cloth or plastic object that is commonly rectangular and gives an optical-mechanical mouse more
traction and an optical mouse an easier to read surface. When referring to a laptop computer mouse, it is referred to as
a touchpad, not a mouse pad.
Wrist cushion or wrist pad, a wrist rest is an ergonomic padding or device designed to help provide comfort and to
avoid wrist injuries when working on a computer keyboard or mouse.
Mouse sensitivity is the speed of a mouse pointer and how fast it moves on the screen.
Tracking speed - The rate a mouse (or other input device) pointer travels across a computer screen. The tracking speed
often can be adjusted relative of how fast you move the mouse.
Glidepoint, pressure sensitive tablet, or trackpad, a touchpad is an input device found on the majority of portable
computers, that allow you to move the mouse cursor without the need of an external mouse.
Wheel mouse or a scroll mouse, the IntelliMouse is a mouse developed by Microsoft in 1996 that has a Mouse Wheel
between the left and right mouse buttons that enables the user to scroll up and down using the wheel instead of having
to use the vertical scroll bar. In addition to being able to scroll, these mice also have the ability to use the wheel as a
button by pressing down on the wheel. An example of how this button could be used is users who are using Mozilla
Firefox can use the middle-button (wheel) to open a link in a a tab.
This mouse has become a standard mouse used with all new computers. "IntelliMouse" is a Microsoft Trademark.
Another popular manufacturer of these mice is Logitech.
JMouse or J Mouse, a J-Mouse is a mouse solution used with older portable computers that utilized the "J" key on the
keyboard and commonly had two separate buttons for the left and right-click below the space bar.
Style pointer or nub, TrackPoint is a mouse solution used with portable computers that was first introduced by IBM in
1992 and is a small isometric joystick that resembles a pencil's eraser head and is located between the "G", "H" and "B"
keys on the keyboard. This technology enables a user to keep their hands on the keyboard and still be able to control the
mouse. The left and right buttons for this mouse are commonly located below the space bar.
The mouse cursor, or mouse arrow, or mouse pointer is often shaped like an arrow or a small hand with the index
finger pointing towards the top of the display device. When referring to the mouse, cursor is used to describe the object
used to point, click, drag, and drop items on a GUI operating system.
Text Cursor or caret is a visual representation on the screen that allows the user to specify where they want the text to
be placed. Commonly, this cursor is a vertical flashing line (shaped similar to the capital letter "I") more commonly
known as an i-cursor or I-beam pointer.
Click- A term used to describe the action of pressing a mouse button (usually the left mouse button if the mouse has
two buttons). Depending on the computer you're using or the software program you are in will change the action
performed when clicking the mouse button.
Below are the general ways to click a computer mouse and the actions they perform.
1. Single-click (pressing and releasing the mouse button) performs an action, if you clicked on a button, icon, or
other object. In MS Windows, it opens a drop-down-menu, select an icon or other object, or perform an action
such as clicking the ok button.
2. Click and drag (pressing and holding the mouse button and moving the mouse while you continue to hold the
2.1. c SCANNER
A scanner is an acquisition peripheral for scanning documents, i.e. converting a paper document to a digital image.
There are generally three types of scanner:
1. Flat scanners let you scan a document by placing it flat against a glass panel. This is the most common type of scanner.
2. Hand scanners must be moved manually in successive sections over the document in order to scan the whole
document. Card scanner is a small scanner capable of scanning business cards.
3. Sheet-fed scanners feed the document through a lighted slot in order to scan them, similar to fax machines.
A scanner is generally characterised by the following elements:
1. Resolution: expressed in dots per inch (referred to as dpi), the resolution defines the fineness of the scan. The order
of magnitude of the resolution is around 1200 per 2400 dpi. It is important to distinguish the optical resolution, which is
the actual resolution of the scanner, from the interpolated resolution. Interpolation is a technique involving defining
intermediate pixels from among actual pixels, by calculating the mean of the colours of neighbouring pixels.
2. The format of the document: depending on their size, scanners are able to accommodate documents of different
sizes, generally A4 (21 x 29.7 cm), or more rarely A3 (29.7 x 42 cm).
3. Acquisition speed: expressed in pages per minute (ppm), the acquisition speed represents the scanner's ability to
pick up a large number of pages per minute.
4. Interface: commonly used interfaces or connectors are FireWire & USB 2.0.
A flat scanner has a motor-driven lighted slot which scans the document line by line under a transparent glass panel on
which the document is placed, with the scanning side face down.
The high-intensity light emitted is reflected by the document and converges towards a series of captors via a system of
lenses and mirrors. The captors convert the light intensities received into electrical signals, which are in turn converted
into digital data by an analogue-digital converter.
There are two categories of captors:
1. CMOS captors (Complementary Metal Oxide Semi-conductor), or Complementary MOS). This type of device uses
an LED ramp (Light Emitting Diode) for lighting the document.
2. CCD captors (Charge-coupled devices). Scanners using CCD technology are often thicker as they use a cold neon
lamp.
Optical Character Recognition or Optical Character Reader, OCR is the process where images of letters can be entered
into the computer as data using a scanner or other hardware device. OCR is currently the best method of digitizing
typed pages of text. Some computer fax applications also use OCR to transform incoming faxes from graphics files into
word processing documents. It allows a scanned image of text to be converted into editable text with reasonable
accuracy.
Applications Programming Interfaces ("API")- SANE (Scanner Access Now Easy) is a free/open source API for accessing
scanners. TWAIN (Technology Without An Interesting Name) is used by most scanners. TWAIN is a standard software
protocol and applications programming interface (API) that regulates communication between software applications
and imaging devices such as scanners and digital cameras.
2.1. d Trackball- An input device that looks like an upside-down mouse. The onscreen pointer is moved by the
trackball with a thumb or finger. A trackball requires less arm and wrist motion that a regular mouse takes and
therefore is often less stressful for the user to use, helping to prevent RSI (Repetitive Strain Injury or Carpal Tunnel
Syndrome).
2.1. e A joystick is an input device consisting of a stick that pivots on a base and reports its angle or direction to the
device it is controlling. Joysticks are often used to control video games, principal flight control in the cockpit of
many aircraft, particularly military fast jets, either as a center stick or side-stick.
2.1. f A graphics tablet (or digitizer, digitizing tablet, graphics pad, drawing tablet) is a computer input device that
allows one to hand-draw images and graphics, similar to the way one draws images with a pencil and paper. These
tablets may also be used to capture data or handwritten signatures. The first electronic handwriting tablet was the
Telautograph, patented by Elisha Gray in 1888.
2) QUXGA mode (Ultra eXtended Graphics Array) uses a resolution of 32000 x 2400 with 16 million colours.
The Colour Monitor- For colour monitors, three electron beams (coming from three different cathodes) each strike a
point with a specific colour: red, green, and blue (RGB). Three points of colour are called a triad (or dot trio). Blue
phosphors use zinc sulfide, while green ones use zinc sulfide and cadmium sulfide. The red ones are hard to create, and
are made from a mixture of yttrium and europium, or gadolinium oxide.
Most monitors (computer screens) use cathode ray tubes (or CRT for short), which are glass
vacuum tubes into which an electron gun emits a flow of electrons guided by an electrical
field towards a screen covered in small phosphorescent elements.
The electron gun is made up of a cathode, a negatively charged metallic electrode, and one
or more anodes (positively charged electrodes). The cathode emits the electrons attracted
by the anode. The anode acts as an accelerator and concentrator for the electrons, forming a
flow of electrons aimed at the screen. A magnetic field guides the electrons from left to right
and from top to bottom. The screen is covered with a fine layer of phosphorescent elements,
called phosphors, which emit light by excitation when electrons strike them, creating a lit-up
dot called a pixel.
LCD (Liquid Crystal Display) is based on a screen made up of two grooved transparent parallel plates, oriented at 90° to
one another; the space between them holds a thin layer of liquid containing certain molecules (liquid crystals) which
change direction when they are exposed to electrical current. By locally controlling the orientation of the crystals, it is
2.2. b PRINTER
An external hardware device responsible for taking computer data and generating a hard copy of that data.
Characteristics
1. Print speed: expressed in pages per minute (ppm), print speed represents the printer's ability to print a large
number of pages per minute.
2. Resolution: expressed in dots per inch (abbreviated as dpi), resolution means the sharpness of printed text.
3. Warm-up time: A printer cannot print when it is "cold". A certain temperature must be reached for the
printer to run optimally.
4. Onboard memory: the quantity of memory that allows the printer to store print jobs. The higher the amount
of memory, the longer the printer queue can be.
5. Paper format: generally in A4 format or less frequently A3.
6. Paper feed: the method of loading paper into the printer, characterising the way in which blank paper is
stored. The main paper feed modes are:
The feed tray, which uses an internal paper feed source.
The sheet feeder is a manual feed method that allows you to insert sheets of paper in small quantities (of
about 100).
7. Cartridges: Separate ink cartridges are on the whole cheaper because often one colour is used more than
multicoloured cartridges. The smaller the drop of ink, the lower the printing cost will be and the better the
image quality will be.
8. Interface: how the printer is connected to the computer. The main interfaces are: USB, Parallel, Network
(networking allows several computers to share one printer) & WiFi.
Types
1. Daisy wheel printers are based on typewriters. These printers are obsolete because they are extremely noisy and
very slow.
2. The dot-matrix printer (sometimes called a matrix printer or an impact printer) allows you to print documents on
paper thanks to the "back and forth" motion of a carriage housing a print head. The head is made up of tiny metal pins,
driven by electromagnets, which strike a carbon ribbon called an "inked ribbon", located between the head and the
paper.
Dot matrix printers were first introduced by Centronics in 1970. Today dot matrix printers are used very rarely like for
printing bus or railway tickets because of the low quality print outs when compared to ink jet printers or other later
printer technologies.
3. The inkjet printer technology was originally invented by Canon. It is based on the principle that a heated fluid
produces bubbles or droplets. Today's printer heads are made up of several nozzles (up to 256). Each nozzle produces a
tiny bubble that ejects an extremely fine droplet.
This is the most popular printer for home computer users. The ink is stored in disposable ink cartridges, often a
separate cartridge is used for each of the major colors. These colors are usually Black, Red/Magenta, Green/Cyan,
Low Level PL (provides little or no abstraction from computer microprocessor) High Level PL (more abstract, easier to use, & more
portable across
Platform)
An API (Application Programming Interface) is a set of functions allowing the programmer to access an application's
services through the use of a programming language. Thanks to APIs, a developer does not need to worry about how a
remote application works, nor how the application was put together to be able to use it in a program.
Similarly, if we take the analogy of a car, the driver does not need to know the mechanics of how the engine works to be
able to drive the car. All the driver has access to is the interface which is composed of the steering wheel, pedals
Fourth-generation languages (usually abbreviated 4GL). 4GLs are far removed from machine languages and represent the
class of computer languages closest to human languages eg. Fox Pro, SQL (Structured Query Language), MAPPER, SQR, Sculptor
4GL, Cold Fusion etc.
Conversion of Languages - Translation of Source code into machine code (in binary) by a compiler.
? Generally speaking, the program is a simple text file (written using a word processor or a text editor), this is called the
source file). The source file contains lines of program called source code. Once the source file has been completed it must
be compiled. Compilation takes place in two stages:
A scripting language or script language is a programming language that supports the writing of scripts, which are
programs written for a a software environment taht automate the execution of of tasks which could alternatively be
executed one-by-one by a human operator. Environments that can be automated through scripting include software
applications, web pages within a web browser, the shells of operating systems, and several general purpose and
domain-specific languages such as those for embedded.
Scripts can be written and executed "on-the-fly", without explicit compile and link steps & usually interpreted from
source code or bytecode. Scripting languages came about largely because of the development of the Internet as a
communications tool. Javascript, ASP, JSP, PHP, Per, Tcl, the Adobe products Adobe Flash(ActionScrit) and Adobe
Acrobat (for scripting PDF files) and Python are examples of scripting languages.
JavaScript- a scripting language developed by Netscape to enable Web authors to design interactive sites. Although it
shares many of the features and structures of the full Java language, it was developed independently. Javascript can
interact with HTML source, enabling Web authors to spice up their sites with dynamic content.
Mark-up language
- It is a modern system for annotating a text in a way that is syntactically distinguishable from that text. The idea
and terminology evolved from the "marking up" of manuscripts, i.e. the revision instructions by editors,
SOFTWARE SYSTEM
Software is a collection of instructions that enables a user to interact with the computer or have the computer perform
specific tasks for them. Without any software the computer would be useless.
Software
Microsoft Windows is the most commonly found and used operating system, with about 90% of the market share.
Microsoft entered the marketplace in August 1981 by releasing version 1.0 of the operating system Microsoft DOS (MS-
DOS), a 16-bit command-line operating system.DOS stands for Disk Operating System. This is the first Microsoft OS &
now part of Windows. The newest version is Microsoft Windows 7 & 8 (PC and IBM compatible operating system) and
Windows Server 2008 R2 for servers.
Apple MacOS - The only Apple computer operating system. Mac OS is the latest version of the Mac OS operating system
for Macintosh computer. It is an operating system based on UNIX with GUI developed by Apple Computers. iOS -
Operating system used with the Apple iPhone.
OS/2 is a computer operating system, developed by IBM. The name stands for Operating System/2. OS/2 is no longer
marketed by IBM. Currently, Serenity Systems sells OS/2 under the brand name eComStatio.
3) Device driver or software driver is a computer program allowing higher-level computer programs to interact with a
hardware device. Drivers may interface with: printers, video adapters, network cards, sound cards, sound cards,
local buses of various sorts — in particular, for bus mastering on modern systems, low-bandwidth I/O buses of
various sorts (for pointing devices such as mice, keyboards, USB, etc.), computer storage devices such as hard disk,
CD-ROM and floppy disk buses (ATA, SATA, SCSI) etc.
Application software helps the user carry out his tasks e.g. word processing, games, business. It is a set of tools for
completing a specific type of job.
Productivity software-
- Increases effectiveness/efficiency of routine clerical work. e.g. typing, calculation, charting, record handling,
presentation and scheduling etc.
- Including software for Word processing, Spreadsheet, Accounting, Database, Presentation, Desktop
publishing etc.
Graphic and multimedia software
- Creating/editing multimedia elements e.g. graphics, animation, sound and video
- Including software for computer-aided design, desktop publishing, vector/bitmap graphic editing,
audio/video editing, multimedia authoring, Web page authoring etc.
Home, Personal and Educational Software
- Software for home users includes eg. home design, tax preparation, entertainment etc.
- Software for personal use includes personal finance, legal, personal information manager etc.
- Software for educational use includes CAI (computer-aided instruction), CAL (computer-aided learning), clip
art/image gallery and encyclopedia etc.
Communication software - Enable people to communicate and share information with others Including, e-mail, Web
browsers, chat rooms, newsgroups, instant messaging , FTP programs etc.
File type is a label designated to a file used to distinguish what program opens that file. For example, a text file or .txt file
would be opened with a program such as Microsoft Word. A file's type can be determined by viewing the file's icon or
by reading the file extension. An extension to a name of a file that helps identify the file in operating systems such as
Microsoft Windows. In Microsoft Windows, the file extension is often three characters long, for example, the file
myfile.txt has an extension of .txt, which is a text file. However, a file extension can also be one, two, four, or more
characters long.
File Name- The complete title of a file and extension. For example, readme.txt is a complete or full file name. A file
name may also only describe the first portion of the file, for example, using our same example, readme is the name of
the file and .txt is the extension of the file. The filename is metadata about a file; a string used to uniquely identify a file
stored on the file system.
Components of a filename: base name of the file; type (format or extension) – indicates the content type of the file
(e.g., .txt, .exe, .COM, etc.); directory (or path) – directory tree (e.g. /usr/bin, \TEMP, [USR.LIB.SRC], etc.); version –
revision or generation number of the file. Pictures include JPEGs, GIFs ("Graphics Interchange Format"), BMPs
("bitmap"), .png (Portable Network Graphics), a bitmap image file format) and layered image files, such as Photoshop
documents (PSDs). Audio files include MP3s ("MPEG-1 Audio Layer-3."), AACs, WAVs, AIFs ("Audio Interchange File
Format."), and several others. Video files can be encoded in MPEG (Moving Picture Experts Group), MOV, WMV, or DV
formats, just to name a few.
The file format is the structure of a file that is best viewed with the program it was designed for. For example, a
Microsoft Word .DOC file format is best viewed in Microsoft Word. It describes the way data is stored in a file. It defines
the data structure (how the data is organized in the file) as well the type of data that the file contains.
File system is a method of organizing and retrieving files from a storage medium such as a hard drive. File systems
usually consist of files separated into groups called directories. Directories can contain files or additional directories.
Most file systems make use of an underlying data storage device that offers access to an array of fixed-size physical
sectors, generally a power of 2 in size (512 bytes or 1, 2, or 4 KiB are most common). The file system is responsible for
organizing these sectors into files and directories. Most file systems address data in fixed-sized units called “clusters” or
“blocks” which contain a certain number of disk sectors (usually 1-64). This is the smallest amount of disk space that can
be allocated to hold a file.
File attributes are settings associated with computer files that grant or deny certain rights to how a user or the
operating system can access that file. For example, IBM compatible computers running MS-DOS or Microsoft Windows
A database contains data stored in a structured format. It includes one or more tables, which each contain multiple
fields. Each field is assigned a specific data type, such as a string or integer. These fields include data for each record that
is entered into the database. A record is a row in a table that contains information about a given person, product, or
event; A field is a column in a table that contains a specific piece of information within a record. Records and fields in a
table are described by the table structure; Query is a question used to retrieve data. Hierarchy of data- File (Table) –
Fields – Records– Character (one byte)
DBMS- Stands for "Database Management System." It is a database program that uses a standard method of
cataloging, retrieving, and running queries on data. The DBMS manages incoming data, organizes it, and provides ways
for the data to be modified or extracted by users or other programs.
Some DBMS examples include MySQL, PostgreSQL, Microsoft Access, SQL Server, FileMaker, Oracle, RDBMS, dBASE,
Clipper, and FoxPro.
STRATAGEMStrategise, Succeed
The Menu bar on an Apple computer is a thin bar found at the top of the Apple Mac OS that allows access to each
section of the Mac OS as well as any program that is active.
Title bar- Bar located along the top of a window or a dialog box that displays the name of the window or software program being
used. Features- 1. Click and hold down the mouse button on the title bar to move the window around when not maximized. 2.
Double-clicking the title bar will maximize the window or set the window into window mode allowing it to be moved around your
screen. 3. Windows 7 introduced several new advancements that also allows you to click and drag the title bar to any edge of any of
the screens to make a window in that portion of the screen.
Tool bar- Row of boxes, often at the top of an application window that control various functions of the software. The boxes often
contain images that correspond with the function they control. A floating toolbar is a toolbar that can be moved anywhere on the
screen, unlike the traditional toolbar that is fixed at the top of the screen.
Minimize is an action available in all GUI operating systems that allow a user to hide a window, but keep the application running and
accessible. In Microsoft Windows, the minimize button is represented by an underscore in the top-right corner of the window. To
minimize only the current window press Alt + Space bar. Once the window properties is displayed press N to minimize the window.
Microsoft Windows users with a Windows keyboard can press the Windows key + M shortcut key to minimize all open windows. To
undo the minimize all open windows, press Shift + Windows Key + M. Windows 7 users can also use the Windows key + arrow
down to resize and then minimize a window.
Maximize (resize or zoom) allows a user to enlarge a window to its maximum size, commonly the full display area of the monitor or
screen. To maximize the current window press Alt + Space bar. Once the window properties is displayed press X to maximize the
window. Windows 7 users can also use the Windows key + up down to resize and then maximize a window.
Close is the action performed to terminate a portion of a program or the complete program. In Microsoft Windows operating
systems and many other operating systems and software programs, the close button with a "X" is located in the top right corner of
the window.
Taskbar (Dock in Apple computers) located at the bottom of the screen that allows the user to locate and launch programs through
the Start button, see any program that is currently open, display the time or date, items running in the background through the
Systray, and with subsequent versions of the Windows operating system, the Quick Launch.
The Live Taskbar Preview is a feature first introduced in Windows Vista that allows the user to hover their mouse over the open
programs in the Taskbar and see a thumbnail view of the program. Windows 7 made this feature better and allows the user to view
the thumbnail full screen.
Thumbnails - A smaller version of a much larger image that is used to help conserve screen space and help enable a user to view
multiple images at once. Thumbnails are also commonly used on the Internet as they help the web page viewer see an image
without having to download the full image unless they wish to. This helps save bandwidth for the owner of a web page and helps
speed up viewing time for the visitor.
The notification area (Systray, shell notification area, and the taskbar status area) is located on the right portion of the Taskbar
next to the time that display programs running in the background.
Quick Launch is a section of the Microsoft Taskbar that enables a user the ability to launch their programs. It is commonly located to
the right of the Start button and the left of any windows that are currently open. With the introduction of Windows 7 Microsoft has
migrated open programs and the Quick Launch into the same bar and re-named the feature to Pin.
PIN- A term first introduced in Windows 7 that describes permanently placing an icon shortcut of a program on your Taskbar or
Start Menu. This is done by either right-clicking the icon for the program and clicking Pin to Taskbar or Start Menu, or clicking and
dragging the icon to the taskbar until is looks like the picture to the right. With this new ability the need for the Quick Launch first
introduced with Windows 98 is no longer needed.
COMMUNICATION PROTOCOL
Communication protocol is a standard method or a collection of rules and procedures to be observed for issuing and
receiving data over a network between computing systems and in telecommunications. The protocols in
communications are homologous to programming languages in computations. Multiprotocol network are network
using more than one protocol.
On the Internet, the protocols used belong to a suite of protocols, or a collection of linked protocols. This suite
of protocols is called TCP/IP. Among others, it contains the following protocols: HTTP, FTP, ARP, ICMP, IP, TCP, UDP, SMTP,
Telnet, NNTP.
Generally protocols are classed in two categories depending on the level of data monitoring required:
?Connection oriented protocols: These protocols operate data transmission monitoring during a communication
established between two machines. In such a schema, the recipient machine sends delivery acknowledgements
during communication, so the originator machine is responsible for the validity of data that it sends. Data is
therefore sent in the form of data flow. TCP is a connection oriented protocol
?Connectionless protocols: This is a communication method in which the originator machine sends data without
warning the recipient machine, and the recipient machine receives the data without sending a delivery notification
to the originator. Data is therefore sent in the form of blocks (datagrams). UDPis a connectionless protocol
The network access layer is the first layer of the TCP/IP stack, contains all specifications relating to the transmission
of data & offers the ability to access any physical network.
It deals with the following concepts: Routing data over the connection, Coordination of the data transmission
(synchronisation), Data format, Signal conversion (analogue/digital), Error detection on arrival
The Internet layer is the "most important" layer (they are all important in their way) because it is this which defines the
datagrams and manages the IP addressing notions. It enables the routing of datagrams (data packets) to remote
machines along with the management of their division and assembly upon receipt. The Internet layer contains 5
protocols:
HTTP (HyperText Transfer Protocol) allows transfer of files (web pages written in
HTML, HyperText Mark-Up Language) format) between a browser (the client) and a
Web server located using a character string called a URL (Uniform Resource Locator).
Version 1.0 of the protocol (the most used) now allows the transfer of messages with
headers describing the content of the message by using MIME type (Multipurpose
Internet Mail Extensions) coding. The MIME type is a standard that was proposed by
the Bell Communications laboratories in 1991 to broaden the possibilities of email,
involving insertion of documents (images, sounds and text) into a message.
URI- Stands for "Uniform Resource Identifier." URI may refer to all or part a URL. For example, Apple's iMac Design URL
is http://www.apple.com/imac/design.html. The URI of this resource may be defined as just "design.html" or
"/imac/design.html." The complete URL would be referred to as an absolute URI.
INTERNET
The Internet is a global system of interconnected computer networks to share information globally. Protocols were
developed to allow all these networks to communicate and form the network of networks, little by little forming a giant
spiders “web” then making the largest network containing all the networks which they called the Internet. There are
different protocols on the internet (languages between computers) which enable different things to be done: IRC: live
chat; HTTP: look at web pages; FTP: transfer files; and many other things
Each of them is assigned a number (the port) which is sent during communication (transmission is carried out by small
packets of information). It is therefore possible to know which program each small packet relates to: HTTP packets
arrive on port 80 and are transmitted to the internet browser from which the page was requested; IRC packets arrive on
port 6667 (or another generally located around 7000) and are transmitted to an IRC client.
There are 5 things that are necessary to "get on the net" with a full graphic interface (picture, sounds, animation, etc...).
? A Telephone line
? A computer - preferably with a fast processor and lots of memory (64 Mb or more)
STRATAGEM
Strategise, Succeed
The network
? interface card is the part of the computer which makes it possible to connect to a network via
specially provided lines for sending digital information & a modem (for high speed data transmission).
? An ISP & IP address - An Internet Service Provider is a service or company that provides access to the Internet.
Hosting ISPs lease server space for smaller businesses and host other people servers by providing IP address or
Domain Name.
? Browser Software - often installed with your operating system or can be downloaded off the Internet
Types of Internet Connections
1. Analog (up to 56k) - Also called dial-up, it is both economical and slow. Using a modem connected to your PC, users
connect to the Internet when the computer dials a phone number (which is provided by your ISP) and connects to the
network. Dial-up is an analog connection because data is sent over an analog, public telephone network. The modem
converts received analog data to digital and vice versa. Because dial-up access uses normal telephone lines the quality
of the connection is not always good and data rates are limited. Typical Dial-up connection speeds range from 2400 bps
to 56 Kbps.
Analog data is actually more accurate than digital data. However, digital data can can be manipulated easier and
preserved better than analog data.
2. Broadband- This refers to high-speed data transmission in which a single cable can carry a large amount of data at
once. The most common types of Internet broadband connections are cable modems (which use the same connection
as cable TV) and DSL modems (which use your existing phone line) which can support data transfer speeds over 100
times faster than dial-up modems.
DSL (Digital Subscriber line) is also called an always on connection because it uses existing 2-wire copper telephone line
connected to the premise and will not tie up your phone as a dial-up connection does. There is no need to dial-in to your
ISP as DSL is always on. The two main categories of DSL for home subscribers are called ADSL (Asymmetric Digital
Subscriber Line) and SDSL (Symmetric Digital Subscriber Line).
The public switched telephone network (PSTN) is the worldwide telephone system.
CDMA- Stands for "Code Division Multiple Access." TDMA is "Time Division Multiple Access." GSM is Global system of
Mobile.
ISDN- Integrated services digital network (ISDN) is an international communications standard for sending voice, video,
and data over digital telephone lines or normal telephone wires. Typical ISDN speeds range from 64 Kbps to 128 Kbps.
Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks which unlike with
Ethernet, token ring, and FDDI, allows simultaneous transfer of data and voice over the same line. It uses asynchronous
time-division multiplexing and it encodes data into small, fixed-sized cells with a length of 53 bytes (5 bytes for the
header and 48 bytes of data) and including identifiers allowing the Quality of Service(QOS) to be known among other
things. This differs from networks such as the Internet or Ethernet LANs that use variable sized packets or frames. ATM
uses a connection-oriented model in which a virtual circuit must be established between two endpoints before the
actual data exchange begins. ATM is a core protocol used over the Integrated Services Digital Network (ISDN).
ATM was developed with CNET. Unlike synchronous networks (like telephone networks) where data is transmitted in a
synchronous manner, i.e. the bandwidth is shared (multiplexed) between users according to temporal unbundling, an
ATM network transfers data in an asynchronous manner, which means it transmits it when it can. Whereas synchronous
networks do not transmit anything when a user has nothing to transmit, the ATM network will use these blanks to
transmit other data, guaranteeing better bandwidth!
ATM thus makes it possible to transfer data at a speed going from 25 Mbps to more than 622 Mbps (reach more than 2
Gbps over fibre optic).
Hypertext is the underlying concept defining the structure of the World Wide Web and a flexible format to share
information over the Internet. Hypertext is text displayed on a computer or other electronic device with references
(hyperlinks) to other text that the reader can immediately access, usually by a mouse click or key press sequence.
Hypertext is text with hyperlinks.
Electronic mail (also known as email or e-mail) is one of the most commonly used services on the Internet, allowing
people to send messages to one or more recipients. Email was invented by Ray Tomlinson in 1972. Email addresses
(both for senders and recipients) are two strings separated by the character "@" (the "at sign"): user@domain. The
right-hand part describes the domain name involved, and the left-hand part refers to the user who belongs to that
domain.
An email address can be up to 255 characters long and can include the following characters:
? Lowercase letters from a to z;
? Digits
? The characters ".","_" and "-" (full stop, underscore, and hyphen)
e-mail program or webmail - There are two primary ways of checking your e-mail – using an e-mail program like
Microsoft Outlook or with a Web-based interface called webmail. When you check or send e-mail via the Web, you are
using webmail. Most free e-mail services, such as Gmail, Hotmail, and Yahoo! Mail offer webmail interfaces that allow
you to send, receive, and organize your e-mail on the Web.
Newsgroups are discussion groups that are going on all the time. You can write a message and post it to a newsgroup &
get a reply to the message. FAQ is a collection of frequently asked questions that have been posted many times to a
newsgroup.
An email client, email reader, or more formally mail user agent (MUA), is a computer program used to manage a user's
email.
E-mail spam, also known as junk e-mail or Unrequested or unsolicited bulk e-mail (UBE). The opposite of "spam,"
email which one wants, is called "ham,". Spam is also a medium for fraudsters to scam users into entering personal
information on fake Web sites using e-mails forged to look like they are from banks or other organizations, such as
PayPal. (E-mail Spoofing). Most ISPs provide software (spam filters) that will filter out the worst of this email.
E-mail spoofing or Phishing is e-mail activity in which the sender address and other parts of the e-mail header are
altered to appear as though the e-mail originated from a different source. Because core SMTP doesn't provide any
authentication, it is easy to impersonate and forge emails. It is a way of attempting to acquire sensitive information
such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic
communication. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine
food for fish. Phishing is typically carried out by e-mail spoofing or instant messaging.
Bounced or Returned E-mail- When you send an e-mail message to another person, the mail server processes the
message and delivers it to the appropriate user's mailbox. For example, if you send a message to "mrman@mail.com,"
the mail.com server looks for a user named "mrman" to deliver the message to. If the user does not exist, the mail
Bcc- Stands for "Blind Carbon Copy." When you send an e-mail to only one person, you type the recipient's address in
the "To:" field. When you send a message to more than one person, you have the option to enter addresses in the "Cc:"
and "Bcc:" fields. "Cc" stands for "Carbon Copy," while "Bcc" stands for "Blind Carbon Copy."
A carbon copy, or "Cc'd" message is an e-mail that is copied to one or more recipients. Both the main recipient (whose
address is in the "To:" field) and the Cc'd recipients can see all the addresses the message was sent to. When a message
is blind carbon copied, neither the main recipient nor the Bcc'd recipients can see the addresses in the "Bcc:" field. Blind
carbon copying is a useful way to let others see an e-mail you sent without the main recipient knowing.
ICS- Stands for "Internet Connection Sharing." ICS allows multiple computers to connect to the Internet using the same
Internet connection and IP address. For example, several computers in a household can connect to same cable or DSL
modem using a router.
ICS can also be done using software. Windows 98 and later, as well as Mac OS X, support Internet connection sharing.
This allows one system's network settings to be modified, turning the computer into a gateway. Other computers on
the same network can then use that computer's Internet connection.
ICF (Internet Connection Firewall) - It is a feature that protects computers connected to the Internet from unauthorized
access. When ICF is enabled, Windows keeps a log of incoming requests from other systems on the Internet. If the
request is something the user has requested, & if the request is unsolicited and is not recognized by the system, the
transmission will be dropped. This helps prevent intrusion by hackers or malicious software such as spyware.
Internet Relay Chat (irc) allows users to participate in real-time discussions with other users through the Internet. A
user logs on to an irc site and then types messages and replies to others messages as they are written.
Instant messaging (IM) is a form of real-time direct text-based communication between two or more people
usingpersonal computers or other devices, along with shared clients. IM falls under the umbrella term online chat.
ICT is short for "Information and Communication Technologies." It is similar to IT (Information Technology), but focuses
more on telecommunications mediums, such as the Internet, cell phone networks, and satellite technology.
ICQ is an instant messaging computer program, which was first developed and popularized by the Israeli company
Mirabilis, then bought by America Online, and since April 2010 owned by Mail.ru Group. The name ICQ is a homophone
for the phrase "I seek you". This is an adaptation of the Morse code callout “CQ”, which means "calling any station". It is
similar to other instant messaging programs, but is based on chat rooms rather than direct person-to-person
messaging.
Web applications - a broad range of new applications make it possible for users to run programs directly in a Web
browser.
The Web host stores all the pages of your website and makes them available to computers connected to the Internet.
Most websites you see on the Web are accessed from a "shared host," which is a single computer that can host several
hundred Web sites.
Pop-up ads or pop-ups are a form of online advertising on the World Wide Web intended to attract web traffic or
capture email addresses. Pop-ups are generally new web browser windows to display advertisements. The pop-up
Cookies are messages that a Web server transmits to a Web browser so that the Web server can keep track of the user's
activity on a specific Web site. The browser in turn stores the cookie information on the hard drive so when the browser
is closed and reopened at a later date the cookie information is still available.
- Cookies do not act maliciously on computer systems. They are merely text files that can be deleted at any time -
they are not plugins nor are they programs. Cookies cannot be used to spread viruses and they cannot access
your hard drive. This does not mean that cookies are not relevant to a user's privacy and anonymity on the
Internet.
- Cookies cannot read your hard drive to find out information about you; however, any personal information
that you give to a Web site, including credit card information, will most likely be stored in a cookie unless you
have turned off the cookie feature in your browser.
- In computer terminology, a cookie is data sent to your computer by a Web server that records your actions on
a certain Web site. It's a lot like a preference file for a typical computer program. When you visit the site after
being sent the cookie, the site will load certain pages according to the information stored in the cookie. For
example, some sites can remember information like your user name and password, so you don't have to re-
enter it each time you visit the site. Cookies are what allow you to have personalized web sites like "My Excite"
or "My Yahoo," where you can customize what is displayed on the page. While cookies have many benefits,
some people don't like to have their information recorded by Web sites that they visit. For this reason, most
Web browsers have an option to accept or deny cookies. Personally, I like cookies -- I think they taste great too.
Adware is free software displays an online advertisement in a banner or pop-up window. An adware remover is a
program that detects and deletes adware.
IVR (Interactive Voice Response) is a telephony technology that can read a combination of touch tone and voice input. It
gives users the ability to access a database of information via phone. A typical IVR system has several menus of
prerecorded options that the caller can choose from. For example, a bank may have an IVR system that allows members
to call in and check their balance or recent transactions.
Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of internet technologies, communication protocols,
and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol
(IP) networks, such as the Internet. Internet telephony refers to communications services—Voice, fax, SMS, and/or
voice-messaging applications—that are transported via the Internet, rather than the public switched telephone
network (PSTN). Of all the software VoIP tools that exist, Skype is probably the most easily identifiable.
An Internet café or cybercafé is a place which provides internet access to the public, usually for a fee. These businesses
usually provide snacks and drinks, hence the café in the name.
Kiosk - An information kiosk (or information booth) dispenses free information in the form of maps, pamphlets, and
other literature, and/or advice offered by an attendant. An electronic kiosk (or computer kiosk or interactive kiosk) is a
computer terminal featuring specialized hardware and software designed within a public exhibit that provides access
to information and applications for communication, commerce, entertainment, and education.
Ecommerce
Electronic Transactions on the Internet are becoming common place. Books, software and even groceries can be
bought and sold with the click of a button (and a credit card). The biggest problem with doing business over the Internet
is the lack of common standards around security.
In order to send confidential information on an open system like Internet you must be sure that your private
information can not be intercepted along the way. The most common method is Secure Sockets Layer (SSL). If
Anchor
An anchor, hyperlink or link contains at least one attribute, the most common being a Hypertext Reference (HREF). The
HREF contains the address and/or path to another document.
Risk in terms of security is generally characterised by the The threat represents the type of action that is likely to be of harm,
following equation: whereas vulnerability (sometimes called flaws or breaches) represents
the level of exposure to threats in a particular context. Finally, the
countermeasure is all of the actions implemented to prevent the threat.
Malware - Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions
on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware". Common examples of malware
include viruses, worms, Trojan horses, and spyware.
A computer virus is a small computer program found within the body of another program which, when run, loads itself into the
memory and carries out the instructions programmed by its author. The definition of a virus may be: Any computer program which
A computer worm is a self-reproducing program which can travel over networks using networking mechanisms, without requiring
any software or hardware support (such as a hard drive, a host program, a file, etc.) to spread; a worm is therefore a network virus.
It is a type of virus that replicates itself, but does not alter any files on your machine. However, worms can still cause havoc by
multiplying so many times that they take up all your computer's available memory or hard disk space. If a worm consumes your
memory, your computer will run very slowly and possibly even crash.
Unlike viruses and Trojan horses, worms can replicate themselves and travel between systems without any human action.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm
consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to
stop responding.
It is simple to protect yourself from infection by a worm. The best method is to avoid blindly opening files which are sent to you as
attachments.
A Trojan horse is a computer program which carries out malicious operations without the user's knowledge. The name "Trojan
horse" comes from a legend told in the Iliad (by the writer Homer) about the siege of the city of Troy by the Greeks..
Trojan horse (in the world of computing) is a hidden program which secretly runs commands, and usually opens up access to the
computer running it by opening a backdoor possibly allowing confidential or personal information to be compromised. A Trojan
horse may, for example: steal passwords; copy sensitive date; carry out any other harmful operations.
As a Trojan horse is usually (and increasingly) intended to open a port on your machine so that a hacker can gain control of it (such as
by stealing personal data stored on the hard drive), the hacker's goal is to first infect your machine by making you open an infected
file containing the Trojan and then to access your machine through the opened port. However, to be able to infiltrate your machine,
the hacker normally has to know its IP address.
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Installing a firewall (a
program which filters data entering and leaving your machine) is enough to protect you from this kind of intrusion. For Windows
systems, there are two free high-performance firewalls: Zone larm, Tiny Personal Firewall. Program that detects and deletes them
is known as an anti-Trojan. One example is The Cleaner.
Spyware refers to program which gather information on the user of the computer & sent gathered informations to the software's
publisher so Internet users can be profiled. Data gathered this way may be: URLs of websites visited, search terms entered into
search engines, an analysis of online purchases, payment information (credit/debit cards), or personal information. This enables
the creators of such software to make their programs profitable by selling the statistical data, allowing them to distribute their
software for free.
What's more, besides divulging personal information, spyware may also cause various other nuisances: consuming RAM, using disk
space, taking up processor cycles, crashing other applications, hurting usability (for example, displaying targeted pop-up ads based
on the data collected). Spyware is similar to a Trojan horse .
"Logic bombs" are pieces of program code which trigger at a predetermined moment, which may be when a particular date is
reached, when a certain command is run, or any other system event.
A hoax is an email which disseminates misinformation and encourages the recipient to send this false report to his or her friends,
relatives, or colleagues. Any information received by email which does not include a hyperlink to a website attesting to its
accuracy should be considered invalid!
Browser hijacker- Using a browser hijacker the person responsible for the spyware can deliver pop-up ads, reset the browser
homepage, or direct the browser to Web sites the victim would not normally visit.
Slimeware - A slang term used to describe software that interferes with the user experience by changing key settings in order to
gain profit. A type of adware.
Crimeware - A type of malicious software that is designed to commit crimes on the Internet. Crimeware may be a virus, spyware or
other deceptive piece of software that can be used to commit identity theft and fraud.
ERROR or BUG
Term used to describe any issue that arises unexpectedly causing the program not to function properly or to close.
Access denied error is commonly caused by improper access rights, this error can also be caused by a hardware error. A
critical error is a serious error that makes it impossible for the current program or operating system that's running to
continue. This error will cause the computer to freeze to reboot. A drop in is a read/write error that is encountered
when incorrectly detecting a non-existent data signal. A drop out is a term used to describe a read/write error that
occurs when losing contact of the host. Fatal OE or fatal exception is a software error that is caused when a software
program attempts to access an illegal instruction, invalid data, or other code or doesn't have the proper privilege level.
File not found is an error message encountered when the file being accessed is no longer present or is corrupt and
cannot be read. Guru Meditation - A black screen with red text error message on early Amiga computers that occurs
when a critical flaw is encountered on the computer. For users familiar with Microsoft Windows, you can think of this
error message like the Blue Screen of Death or BSOD. A hard error is an error or issue that occurs because of a physical
hardware issue with the computer. Hardware conflict - An error that occurs when a hardware device in the computer
conflicts with other hardware devices IRQs, I/O ports or DMA. Today, hardware conflicts are avoided by using Plug n
Play(PnP) which manages each of the hardware devices installed in the computer for the user. An overflow error is an
Hang or freeze occurs when either a single computer program, or the whole system ceases to respond to inputs. The
mouse cursor may also be stuck in a form indicating that it is waiting for some operation to complete, such as an
hourglass or a spinning wait cursor. Almost always, the only way to recover from a system freeze is to reboot the
machine, usually by power cycling with an on/off or reset button. In the Windows 7 and Windows Vista operating
systems, hangs almost always precedes a Blue Screen of Death or are a sign to the user that one is on its way. A hang
differs from a crash, in which a program exits abnormally or the operating system shuts down.
A crash (or system crash) is a condition where a computer or a program, either an application or part of the operating
system, ceases to function properly, often exiting after encountering errors. This is different from a hang or freeze
where the application or OS continues to run without obvious response to input.
Software aging or software ageing refers to progressive performance degradation or a sudden hang/crash of a
software system due to exhaustion of operating system resources, fragmentation and accumulation of errors. A
proactive fault management method to deal with the software aging phenomenon is software rejuvenation. However,
the simplest way to emulate software rejuvenation is to reboot the system or restart the aging application. Memory
leaks are a potential cause or contributing factor in software aging, as they can exhaust available system memory.
Crossplatform- Software that can run on multiple types of computer systems. For example, the graphics program
Adobe Photoshop and the word processor Microsoft Word are both available for the Windows and Macintosh
operating systems. Therefore, Photoshop and Word are considered to be crossplatform applications.
Multiplatform- If a software program is developed for mulitple operating systems, it is considered to be
"multiplatform." Since Microsoft Word runs on both the Windows and Macintosh platform, it is a mutliplatform
application. In the consumer gaming market, mutliplatform games run on more than one gaming machine.
An integrated development environment (IDE) (also known as integrated design environment or integrated
debugging environment) is a software application that provides comprehensive facilities to computer programmers for
software development. An IDE normally consists of: a source code editor; a compiler and/or an interpreter; build
automation tools; a debugger.
Program profiling, software profiling or simply profiling, a form of dynamic program analysis (as opposed to static code
analysis), is the investigation of a program's behaviour using information gathered as the program executes. The usual
purpose of this analysis is to determine which sections of a program to optimize - to increase its overall speed, decrease
its memory requirement or sometimes both.
Default- This term is used to describe a preset value for some option in a computer program. It is the value used when a
setting has not been specified by the user. For example, the default font setting in Netscape Communicator is "Times."
Desktop publishing involves the combination of typesetting (choosing fonts and the text layout), graphic design, page
layout (how it all fits on the page), and printing the document (books, magazines, newspapers, flyers, pamphlets etc). In
order to desktop publish, all you need is a computer, monitor, printer, and software that can create a printable
document. Desktop publishers use programs like Adobe InDesign, Adobe Photoshop, Microsoft Word and QuarkXpress
to create page layouts for documents they want to print.
Clip art- A collection of drawings, diagrams, and photographs that you can insert into documents
Clipboard - A temporary storage location used for cut, copy, and paste
Font- A name assigned to a specific design of text characters.
Booting- The process of starting or restarting a computer is called booting or bootstrapping. Cold boot - Turning on a
computer that has been powered off completely . Warm boot - Using the operating system to restart a computer. A
boot drive is the drive from which your computer starts.
Spooling refers to the process of placing data in a temporary working area for another program to process. The most
common use is in writing files on a magnetic tape or disk and entering them in the work queue for another process. A
spool is a temporary storage area within the computer's RAM that contains input or output data.
The most common type of spool is a print spool, which stores print jobs that are sent to a printer.
Kerning refers to adjusting the space between characters, especially by placing two characters closer together than
normal. Kerning makes certain combinations of letters, such as WA, MW, TA, and VA, look better.
A computer terminal is an electronic or electromechanical hardware device that is used for entering data into, and
displaying data from, a computer or a computing system. Generally, a terminal is a combination of keyboard and display
screen. Terminals are sometimes divided into three classes based on how much processing power they contain:
? intelligent terminal: a stand-alone device that contains main memory and a CPU.
? smart terminal: contains some processing power, but not as much as an intelligent terminal.
? dumb terminal: has no processing capabilities. It relies entirely on the computer's processor.
Dialog box- A special window a program displays to provide information, present available options, or request a
response
Web 2.0- Web sites that offer Web-based software; Provide users with a means to share and/or store personal
information through Web-based software
Application service provider (ASP)- Third party organization that manages and distributes software and services on the
Web; Allows companies to outsource information technology (IT) needs
Wizard- An automated assistant that helps you complete a task; Asks you questions and then automatically performs
actions based on your answer
Jukebox - A device that stores numerous CD-ROMs and uses a mechanical arm, carousel or other device to bring the
disk to an optical station for reading and writing. Some of the larger jukeboxes hold as many as 500 disks and have
multiple readers and drives to allow a network of users to simultaneously access data.
iTunes is an audio playback program developed by Apple Computer. You can use iTunes to import songs from CDs as
well as other audio files from your hard drive. The program can also download songs (for a small fee) from the iTunes
Music Store.
The iPod is a portable music player developed by Apple Computer. Though it is an Apple product, the iPod can be used
with both Macs and PCs. The iTunes software, also created by Apple, is used to organize and transfer songs and playlists
to the iPod.
Apple's iPhone is a smartphone that functions as a mobile phone, an iPod, and can run third-party apps. It runs the iOS,
which is an operating system developed by Apple specifically for portable devices.
The iPad is a lightweight tablet PC developed b Apple. It looks similar to an iPhone, but has a much larger touchscreen
display.
A wiki is a Web site that allows users to add and update content on the site using their own Web browser. This is made
possible by Wiki software that runs on the Web server. Wikis end up being created mainly by a collaborative effort of
the site visitors. A great example of a large wiki is the Wikipedia, a free encyclopedia in many languages that anyone can
edit. The term "wiki" comes from the Hawaiian phrase, "wiki wiki," which means "super fast."
WORM can also mean "Write Once, Read Many." It is an optical storage technology that allows a disc to be written only
once but read an unlimited number of times.
WPA- Stands for "Wi-Fi Protected Access." WPA is a security protocol designed to create secure wireless(Wi-Fi)
networks. It is similar to the WEP protocol, but offers improvements in the way it handles security keys and the way
users are authorized. Stands for "Wired Equivalent Privacy." WEP is a security protocol for Wi-Fi networks. Since
wireless networks transmit data over radio waves, it is easy to intercept data or "eavesdrop" on wireless data
transmissions. The goal of WEP is to make wireless networks as secure as wired networks, such as those connected by
Ethernet cables.
WYSIWYG - Stands for "What You See Is What You Get," and is pronounced "wihzeewig." WYSIWYG refers to software
that accurately represents the final output during the development phase. For example, a desktop publishing program
such as Photoshop is a WYSIWYG graphics program because it can display images on the screen the same way they will
look when printed on paper. Word processing programs like Microsoft Word and Apple Pages are both WYSIWYG
editors.
Upload- While downloading is receiving a file from another computer, uploading is the exact opposite. It is sending a
file from your computer to another system.
Telnet- This is a program that allows you log in to a Unix computer via a text-based interface. If you have an account on a
Telnet server, you can access certain resources on the system such your home directory, your e-mail account, FTP files,
etc.
SEO- Stands for "Search Engine Optimization." SEO involves a number of adjustments to the HTML of individual Web
pages to achieve a high search engine ranking.
Shell- In the computer science world, however, a shell is a software program that interprets commands from the user so
that the operating system can understand them and perform the appropriate functions. The shell is a command-line
interface, which means it is soley text-based. Shells are most commonly associated with Unix.
Skin- This strange term refers to the appearance of a program's interface. By changing the skin of a program, you can
make the interface look completely different, but usually still have all the same functions. It is similar to a "Theme" you
may use to customize the appearance of your computer's desktop. Skins have become particularly popular for MP3
players.
SMART- Stands for "Self-Monitoring Analysis And Reporting Technology." It is used to protect and prevent errors in
hard drives. The SMART technology basically monitors and analyzes hard drives (hence the name), then checks the
health of your hard drive and lets you know if there are any problems. The main purpose of SMART is to keep your hard
drive running smoothly and prevent it from crashing.
SMS- Stands for "Short Message Service." SMS is used to send text messages to mobile phones. The messages can
typically be up to 160 characters in length, though some services use 5-bit mode, which supports 224 characters.
A spider is a software program that travels the Web (hence the name "spider"), locating and indexing websites for
search engines. All the major search engines, such as Google and Yahoo!, use spiders to build and update their indexes.
These programs constantly browse the Web, traveling from one hyperlink to another.
A plug-in (also "plugin") is software add-on that adds extra features and capabilities to an application. Typically, plug-
ins are stored within a subdirectory of the application folder. When the application is opened, the plug-ins are loaded
into the program.
Plug-ins are available for a wide variety of programs, including Web browsers, graphic editors, and audio and video
applications. Web browser plug-ins often enable specific types of media to be viewed directly in the browser.
Metadata describes other data. It provides information about a certain item's content. For example, an image may
include metadata that describes how large the picture is, the color depth, the image resolution, when the image was
created, and other data. Web pages often include metadata in the form of meta tags. Description and keywords meta
tags are commonly used to describe the Web page's content. Most search engines use this data when adding pages to
their search index.
SMM is short for "Social Media Marketing." It refers to marketing through social networking websites and is a popular
way for businesses and organizations to market themselves on the Web.
A bulletin board or discussion forum is a dynamic web area which lets different people communicate. The bulletin
board is generally composed of different discussion threads (sometimes called subjects or topics) each relating to a
different area of discussion. The first message in a thread sets the topic of discussion, and the following messages
(generally placed below the first) continue it.
A "Chat" area, or "chatroom," is a space where multiple Internet users can engage in written discussion in real time. The
term "chatting" is generally reserved for communication systems included on a web site, as opposed to the term
"instant messaging," which refers to dedicated conversation systems which operate on the Internet, independent of
the Web. In addition to being an everyday word, "CHAT" is also meant to be an acronym for "Conversational Hypertext
Access Technology".
Unlike a bulletin board, chatting takes place in real time, and its messages are not saved permanently, which means that
only those present can read the conversations (though some chatrooms are able to record conversations).
"Podcasting" (a contraction of the words "iPod" and "broadcasting") is a technology for distributing multimedia (audio
or video) using an RSS or Atom feed. With podcasting, artists or news providers, whether they are professionals or
amateurs, have an easy way of distributing their creations by allowing their site to be placed on a podcast feed.
Hit- Technically, a hit is a request made to a Web server. It is a popular misconception that the term refers to the number
of visits a Web page gets, but that is not the case. If a Web page has five images on it, when the page is loaded, six "hits"
Flaming is the act of posting or sending offensive messages over the Internet. Flame wars are known as "pie fights."
Flaming is unfortunately one of the most common breaches of online netiquette.
Troll is a person who posts offensive or off-topic comments online. These comments are often made to incite
arguments or emotional responses from other users. Trolling, as it is called, may take place in Web forums, in blog
comment sections, and in social networking websites.
Flash is a multimedia technology used for creating animations and interactive websites. Web developers often use
Flash to add dynamic content that is not possible with HTML or other scripting languages. Some examples include
splash screen animations, YouTube videos, and interactive song playlists. In order to view Flash content in your Web
browser, the Flash plug-in must be installed. The standalone Flash Player is also available as a free download from
Adobe.
Packet- This is a small amount of computer data sent over a network. Each packet contains the address of its origin and
destination, and information that connects it to the related packets being sent. The process of sending and receiving
packets is known as "packet-switching."
A nybble or nibble is a set of four bits. Since there are eight bits in a byte, a nybble is half of one byte.
EDI- Stands for "Electronic Data Interchange." EDI is a standardized method for transferring data between different
computer systems or computer networks. It is commonly used for e-commerce purposes.
An avatar is an online character that represents a person. For example, games like World of Warcraft and the Sims
Online allow players to create custom characters, known as avatars. An autoresponder is a program or script on a mail
server that automatically replies to e-mails.
An archive contains multiple files and/or folders within a single file. Archives can be saved in several different formats,
most of which incorporate file compression to reduce the file size. They are used for consolidating a group of files into a
single package. This can be helpful when transferring multiple files to another user or when backing up data.
Android is Google's mobileoperating system (OS) that is used by several smartphones, such as the G1, Droid, and Nexus
One. Android is open source, meaning it is not linked to a specific cell phone manufacturer or service provider. The
Android OS also supports third-party applications, which can be downloaded from Android Market, Google's online
software store.
Website affiliates are what drive Internet marketing. Companies run affiliate programs to generate leads and sales
from other Websites. They pay the sites who host their ads a commission for products sold through the links on their
sites. For example, if a site owner signs up for Amazon.com's affiliate program, he will receive ad banners or links from
Amazon.com that he can place anywhere on his site. Then, if a visitor clicks on the Amazon.com banner or a link on his
site and buys something, he will receive a commission
CAD- "Computer-Aided Design" Today, CAD software is used for nearly all three-dimensional designing.
"Clone" refers to software that serves the same purpose as another more mainstream software program.
STRATAGEMStrategise, Succeed