Upload
hitakshijain
View
221
Download
0
Embed Size (px)
Citation preview
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
1/57
81501219097
VIVA VOICE FILE
1
CHAPTER 1
INFORMATION TECHNOLOGY
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
2/57
81501219097
VIVA VOICE FILE
2
Information Technology
Define Computer
An electronic device that stores, retrieves, and processes data, and can be programmed
with instructions. A computer is composed of hardware and software, and can exist in a
variety of sizes and configurations.
Define Primary Memory
Primary storage is a category of computer storage, often called main memory.
Confusingly, the term primary storage has recently been used in a few contexts to refer to
online storage (hard disk), which is usually classified as secondary storage.
Define Secondary Memory
Secondary Storage is the non-volatile or semi-permanent storage in your computer forholding files and information until it is needed. Secondary Storage includes devices like
hard drives, floppies, CD-ROMS and tape drives. As opposed to Primary Storage which
is the volatile or temporary storage (RAM) that the CPU uses for processing data and
instructions
Operating System
The software that the rest of the software depends on to make the computer functional.
An operating system (sometimes abbreviated as "OS") is the program that, after being
initially loaded into the computer by a boot program, manages all the other programs in a
computer. The other programs are called applications or application programs. The
application programs make use of the operating system by making requests for services
through a defined application program interface (API).
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
3/57
81501219097
VIVA VOICE FILE
3
Memory Management
Memory management is the act of managing computer memory. In its simpler forms this
involves providing ways to allocate portions of memory to programs at their request andfree it back to the system for reuse when no longer needed.
Batch Processing
A type of data processing operation and data communications transmission where related
transactions are grouped together and transmitted for processing, usually by the same
computer and under the same application; generally regarded as non-real-time data traffic
consisting of large files.
Multi Processing
It refers to a computer system's ability to support more than one process (program) at the
same time. Multiprocessing operating systems enable several programs to run
concurrently. UNIX is one of the most widely used multiprocessing systems, but there
are many others, including OS/2 for high-end PCs. Multiprocessing systems are much
more complicated than single-process systems because the operating system mustallocate resources to competing processes in a reasonable manner.
Time Sharing
It refers to the concurrent use of a computer by more than one user - users share the
computer's time. Time sharing is synonymous with multi-user. Almost all mainframes
and minicomputers are time-sharing systems, but most personal computers and
workstations are not.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
4/57
81501219097
VIVA VOICE FILE
4
Define WAN
Wide Area Network. A computer network which spans great distances. Usually connects
many LANs together. A WAN is typically used in a company or organization to connect
their sites together. Often this can be run using "Virtual Private Networks" over theInternet.
Define LAN
A LAN supplier networking capability to a group of computer in close proximity to each
other in such school and office.
Multi User
It refers to comport system that support two or more simultaneous users. All mainframes
and minicomputer are multi-user systems, but most personal computer and workstations
are not. Another term for multi-user is time sharing
Components of Information Technology
(a) Hardware
(b) Software
(c) Data
(d) User
(e) Storage
(f) Communication
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
5/57
81501219097
VIVA VOICE FILE
5
Hardware
Hardware are those tangible components of computer which one can see and feel. It
includes input and output devices, central processing unit etc.
Software
Software are set of instructions or program which are given to computer so that it works
and dose the tasks.
Data
It is collection of facts and figures, which has to be worked on by the computer.
Users
These are those people who directly or indirectly are benefited by the use of computers.
Storage
This is the component which enables the data and software components to make its place
in computer system by residing in various types of storage devices.
Communications
This is the components which enables a user to communicate with the computer as well
the computer to communicate with other computer to get various tasks done.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
6/57
81501219097
VIVA VOICE FILE
6
Language Processors
(a)Translators
To make the computer understand it, the input has to converse into machine language.
The software which makes this conversion possible and increases the productivity of
programmer are called Translator.
There are three basic types of translators. They are:
i. Compiler
ii. Interpreters
iii. Assembler
Compiler
A complier is software that will accept total program code as input and then converts into
machine code.
Interpreter
The interpreter also does the same task of compiler. but there are some difference
between compiler and interpreter. The compiler take the complete program as input ,but
interpreter take the program code line by line and convert it in to machine code.
Assembler
It is also same as compiler and interpreter but the input was in assembly language and the
output was in machine language.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
7/57
81501219097
VIVA VOICE FILE
7
Input / Output Devices
Input Devices
These are those devices which facilitates a user to give input, i.e. data to C.P.U to work
on. The input devices have become more and more user friendly, so that user can work
very easily without much hassle and with greater speed and accuracy.
There are many input devices these are as follow:
1. Keyboard
2. Mouse
3. Joystick
4. Trackball
5. Touch Screen6. Light Pen etc
Keyboard
The keyboard is still the commonest way of entering information into a computer. There
are a number of different types, including those specially designed for use with Microsoft
Windows. The quality of the keyboard is often overlooked when buying a PC; it should
be robust and easy to use.
Mouse
The mouse came into common use on a PC with the introduction of the MicrosoftWindows operating system. Before this, the operating system (DOS) would normally be
controlled via the keyboard.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
8/57
81501219097
VIVA VOICE FILE
8
Joystick
Joysticks are often used to control games, and usually have one or more push-buttons
whose state can also be read by the computer. Most I/O interface cards for PCs have a
joystick (game control) port. Modern joysticks (as of 2003) mostly use a USB interfacefor connection to the PC
Trackball
A tracker ball is an alternative to the traditional mouse and favored by graphic designers.
Tracker balls often give much finer control over the movement of the items on the screen.
Touch Screen
A touch pad is a desktop device and responds to pressure. Used in conjunction with a
special pen they can be used by graphic artists wishing to create original, digital artwork.
Output Devices
Output devices can adopt different shapes and styles , which are used to give the output
of the processing data. The output can be in any form i.e. typed, printed, visible, non-
visible, audio, video etc.
1. Printer
2. Monitor
3. Visual Display Terminal
4. Plotter
Types of Printer
There are mainly two categories of printers:
A. Impact Printer
B. Non-Impact Printer
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
9/57
81501219097
VIVA VOICE FILE
9
Impact Printer
These are those types of printer which have direct mechanical contact between the headof the printer and paper.
Non-Impact Printer
These are those types of printer which have no contact between the head of the printer
and paper.
Types of Non- Impact Printer
1. Thermal Printer
2. Ink-Jet Printer3. Laser Printer
4. Electrographic Printer5. Electro Static Printer
Secondary Storage Devices
This is non volatile memory, which is external to computer. It is a secondary media used
for storing volumes of data for permanently or ling term. Virtually the size of secondary
memory is unlimited it is even much cheaper than main memory.
There are some features of the Secondary Memory:
1. Permanent or Non volatile Storage
2. Voluminous Storage
3. Relatively Cheaper4. Computing Capability
5. Portable
There are some of the commonly available categories of auxiliary storage devices:
I. Magnetic Tapes
II. Magnetic Disk
III. Optical Disks
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
10/57
81501219097
VIVA VOICE FILE
10
Magnetic Tapes
Magnetic tape has been used for data storage for over 50 years. Modern magnetic tape is
most commonly packaged in cassettes. The device that performs actual writing or reading
of data is a tape drive. When storing large amounts of data, tape can be less expensive
than disk or other data storage options. Tape storage has always been used with large
computer systems.
Advantages of Magnetic tapes
1. Large amount of data can be stored onto small lengths of magnetic tape.
2. This tape very easy to and convenient to handle.
3. This tape is very economical.4. This tape is reusable.
5. It is fast and saves time.
6. The life of magnetic tape is very high.
Disadvantages of Magnetic tapes
1. Human cannot read the data directly.
2. Searching becomes difficult.
3. It is sensitive to dust, temperature.
4. Difficult to remove from parity errors.
Magnetic Tapes
Magnetic disk is very popular means of secondary storage. Magnetic disk is usually made
up of plastic like material called mylar. All magnetic disks are round and coated with
magnetic materials.
There are two types of magnetic disks:
1. Floppy Disk
2. Hard Disk
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
11/57
81501219097
VIVA VOICE FILE
11
Advantages of Magnetic Disk
1. The magnetic disk provides easy accessibility.
2. The disk has longer life than tapes
3. We can access data both sequentially and randomly4. It is reusable.
5. We can update several online disk records by single input transactions.
Disadvantages of Magnetic Disk
1. It is bit costlier than magnetic tape.
2. Data may be lost in case when new record is written on disk.
3. Less secure.
Optical Disk
Optical disk is a compact disk or CD. The formatting of the optical disk will dictate
whether it is a DVD, CD, read-only or rewritable. Optical disks have replaced cassette
tapes, videotapes and floppy disks. The optical disk became the preferred medium for
music, movies and software programs because of its many advantages. Compact,
lightweight, durable and digital, the optical disk also provides a minimum of 650
megabytes (MB) of data storage.
Data Transmission
Data can be transmitted across the network in following two basic terms:
Analog Data Transmission
Digital Data Transmission
Analog Data Transmission
Here the data is transmitted, as a continuous wave from one terminal to another.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
12/57
81501219097
VIVA VOICE FILE
12
Digital Data Transmission
This method of data transmission uses distinct, on and off electricity states. The
digital data transmission is fast.
Data Transmission Techniques
Data in computer system exist as digital, where as telephone lines are made to transmit
analog pulses.
1. Modulation
Before data transmission from one computer two another, the data has to beConverted from digital to analog, if telephones lines are used. This process of converting
digital data, before transmission into analog data is known as modulation.
2. Demodulation
The receiving computer has to reconvert the analog data received into digital
form, which again is done by the modem. This process of reconverting an analog signal
into digital pulses is called demodulation.
Classification of digital computer according to size and capabilities:
i. Super computer
ii. Mainframe computer
iii. Medium sized computer
iv. Mini computers
v. Micro computer
Classification of Computers
1. According to the logic used by the computer.
2. According to size of computer.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
13/57
81501219097
VIVA VOICE FILE
13
Classification as per the logic used by Computer
i. Analog Computers
ii. Digital Computers
iii. Hybrid Computers
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
14/57
81501219097
VIVA VOICE FILE
14
CHAPTER 2
DATABASE MANAGEMNET SYSTEM
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
15/57
81501219097
VIVA VOICE FILE
15
Introduction
Database: The related information when placed in an organized form makes a Database.
OR
Database is a computer based record keeping system whose overall purpose is to record
and maintains information.
E.g. in Dictionary, words are arranged in alphabetic order along with their meanings.
A database is a collection of related information stored in a manner that it isavailable to many users for different purposes. The content of a database is obtained by
combining data from all the different sources in an organization. So that data are
available to all users and redundant data can be eliminated or at least minimized. The
DBMS helps create an environment in which end user have better access to more and
better managed data than they did before the DBMS become the data management
standard.
A database can handle business inventory, accounting information in its files to
prepare summaries, estimates, and other reports.
Advantages and Disadvantages of DBMS:
Database system is that the organization can exert, via the DBA, centralized management
and control over the data. The database administrator is the focus of the centralized
control. Any application requiring a change in the structure of a data record requires an
arrangement with the DBA, who makes the necessary modifications. Such modifications
do not affect other applications or users of The record in question. Therefore, these
changes meet another requirement of the DBMS: data Independence. The following are
the important advantages of DBMS:
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
16/57
81501219097
VIVA VOICE FILE
16
Advantages:
Reduction of Redundancies: Centralized control of data by the DBA avoids unnecessary
duplication of data and effectively reduces the total amount of data storage required. It
also eliminates the extra processing necessary to trace the required data in a large mass of
data.
Another advantage of avoiding duplication is the elimination of the inconsistencies that
tend to be present in redundant data files. Any redundancies that exist in the DBMS are
controlled and the system ensures that these multiple copies are consistent.
Sharing Data: A database allows the sharing of data under its control by any number of
Application programs or users.
Data Integrity: Centralized control can also ensure that adequate checks are incorporated
in the DBMS to provide data integrity. Data integrity means that the data contained in the
database is both accurate and consistent. Therefore, data values being entered for storage
could be checked to ensure that they fall within a specified range and are of the correct
format. For example, the value for the age of an employee may be in the range of 16 and
75. Another integrity check that should be incorporated in the database is to ensure that if
there is a reference to certain object, that object must exist. In the case of an automatic
teller machine, for example, a user is not allowed to transfer funds from a nonexistent
saving account to a checking account.
Data Security: Data is of vital importance to an organization and may be confidential.
Unauthorized persons must not access such confidential data. The DBA who has the
ultimate responsibility for the data in the DBMS can ensure that proper access procedures
are followed, including proper authentication schemas for access to the DBMS and
additional checks before permitting access to sensitive data. Different levels of security
could be implemented for various types of data and operations.
Conflict Resolution: DBA chooses the best file structure and access method to get
optimal Performance for the response-critical applications, while permitting less critical
applications to continue to use die database, albeit with a relatively slower response.
Data Independence: Data independence is usually considered from two points of view:
physical data independence and logical data independence. Physical data independence
allows changes in the physical storage devices or organization of the files to be made
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
17/57
81501219097
VIVA VOICE FILE
17
without requiring changes in the conceptual view or any of the external views and hence
in the application programs using the database.
Disadvantages:
A significant disadvantage of the DBMS system is cost. In addition to the cost of
purchasing or developing the software, the hardware has to be upgraded to allow for the
extensive programs and the workspaces required for their execution and storage. The
processing overhead introduced by the DBMS to implement security, integrity, and
sharing of the data causes a degradation of the response and through-put times. An
additional cost is that of migration from a traditionally separate application environment
to an integrated one.
While centralization reduces duplication, the lack of duplication requires that the
database be adequately backed up so that in the case of failure the data can be recovered.Backup and recovery operations are fairly complex in a DBMS environment, and this is
exacerbated in a concurrent multi user database system. In further a database system
requires a certain amount of controlled redundancies and duplication to enable access to
related data items.
Centralization also means that the data is accessible from a single source namely the
database.
This increases the potential severity of security breaches and disruption of the operation
of the organization because of downtimes and failures. The replacement of a monolithic
centralized database by a federation of independent and cooperating distributed databasesresolves some of the problems resulting from failures and downtimes.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
18/57
81501219097
VIVA VOICE FILE
18
THE THREE LEVEL ARCHITECTURE OF DBMS
A database management system that provides these three levels of data is said to follow
three level architecture as shown in fig. These three levels are the external level, theconceptual level, and the internal level.
The three level architecture for a DBMS
A schema describes the view at each of these levels. A schema as mentioned earlier is an
outline or plan that describes the records and relationships existing in the view. The
schema also describes the way in which entities at one level of abstraction can be mapped
to the next level. The overall design of the database is called the database schema. A
database schema includes such information as: Characteristics of data items such asentities and attributes Format for storage representation Integrity parameters such as
physically authorization and backup politics. Logical structure and relationship among
those data items.
In general, database system supports one physical schema, one conceptual schema, and
several sub-schemas.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
19/57
81501219097
VIVA VOICE FILE
19
External Level or Subschema
The external level is at the highest level of database abstraction where only those portions
of the database of concern to a user or application program are included. Any number ofuser views may exist for a given global or conceptual view.
Each external view is described by means of a schema called an external schema or
subschema. The external schema consists of the, definition of the logical records and the
relationships in the external view. The external schema also contains the method of
deriving the objects in the external view from the objects in the conceptual view. The
objects include entities, attributes, and relationships.
Conceptual Level or Conceptual Schema
One conceptual view represents the entire database. The conceptual schema defines this
conceptual view. It describes all the records and relationships included in the conceptual
view and, therefore, in the database. There is only one conceptual schema per database.
This schema also contains the method of deriving the objects in the conceptual view from
the objects in the internal view. The description of data at this level is in a format
independent of its physical representation. It also includes features that specify the checks
to retain data consistency and integrity.
Internal Level or Physical Schema
It indicates how the data will be stored and describes the data structures and accessmethods to be used by the database. The internal schema, which contains the definition of
the stored record, the method of representing the data fields, expresses the internal view
and the access aids used.
Mapping between different Levels
Two mappings are required in a database system with three different views. A mapping
between the external and conceptual level gives the correspondence among the records
and the relationships of the external and conceptual levels.
a) EXTERNAL to CONCEPTUAL: Determine how the conceptual record is viewed bythe user
b) INTERNAL to CONCEPTUAL: Enable correspondence between conceptual and
internal levels. It represents how the conceptual record is represented in storage.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
20/57
81501219097
VIVA VOICE FILE
20
External/Conceptual Mapping:
It gives the correspondence among the records and the relationships of the external and
conceptual views.
External view is an abstraction of the conceptual view, which in turn is an abstraction of
the internal view.
It describes the contents of the database as perceived by the user or application program
of that view.
For e.g. Names of the fields and records, for instance may be different. A no. of
conceptual fields can be combined into a single external field, like Last_Name and
First_Name at the conceptual level but Name at the external level.
Conceptual/Internal Mapping
It enables the DBMS to find the actual records or combination of records in physicalstorage that constitute an logical record in conceptual schema.
Mapping between the conceptual and the internal levels specifies the method of deriving
the conceptual record from the physical database.
Data Independence: it means that upper levels are unaffected by changes in the lower
level.
Types of Data Independence
o Logical Data Independence
o Physical Data Independence
Logical Data Independence: It indicates that the conceptual schema can be changed
without affecting the existing external schema.
For e.g. Names of the fields and records, for instance may be different. A no. of
conceptual fields can be combined into a single external field, like Last_Name and
First_Name at the conceptual level but Name at the external level. Now if the First and
Last name is joined in Conceptual level it will not result in any change in External level.
Physical Data Independence: It indicates that the physical storage structures or devices
could be changed without affecting conceptual schema.
For e.g. If there is a need to change the file organization or the type of physical
device used as a result of growth in the database or new technology, a change is
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
21/57
81501219097
VIVA VOICE FILE
21
required in the conceptual/internal mapping between the conceptual and internal
levels.
ENTITY-RELATIONSHIP (E-R) DIAGRAM
The entity-relationship model is a tool for analyzing the semantic features of an
application that are independent of events. Entity-relationship modeling helps reduce data
redundancy. This approach includes a graphical notation which depicts entity classes as
rectangles, relationships as diamonds, and attributes as circles or ovals. For complex
situations a partial entity-relationship diagram may be used to present a summary of the
entities and relationships but not include the details of the attributes.
Following are short definitions of some of the basic terms that are used for describing
important entity-relationship concepts:
Entity - An entity is a thing that exists and is distinguishable -- an object, something in
the environment.
o Entity Instance - An instance is a particular occurrence of an entity. For example, each
person is an instance of an entity, each car is an instance of an entity, etc.
o Entity Set - A group of similar entities is called an entity class or entity class or entity
type. An Entity Class has common properties.
Attributes - Attributes describe properties of entities and relationships.
Simple:o Attribute composed of a single component with an independent existence.
o Simple attribute cannot be further subdivided.
o For e.g. Gender, Age, Salary etc.
Composite:o Attribute composed of multiple components each with an independent existence.
o Some attributes can be further divided to smaller components with anindependent existence.
For e.g. Address attribute can be composed of composed like Street No., Area,City, Pincode etc.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
22/57
81501219097
VIVA VOICE FILE
22
Single-values:o Attribute that holds a single value for a single entity.
For e.g. Classroom entity has a single value for the room no. attribute i.e. roomno. is referred as single valued.
Multi-valued attribute:o Attribute that holds multiple values for a single entity.
For e.g. Student attribute can have multiple values for the Hobby attribute-Reading, Music, Movies etc.
o Multi valued attribute may have set of numbers with Upper and Lower limits.
For e.g. Hobby attribute of a student may have between 1 and 5 values. 1 = Minimum
5 = Maximum
Derived:
o Attribute that represents a value that is derivable from the value of a
related attribute or set of attributes.
For e.g. Age attribute can be derived from DOB attribute.
Domain - It is a set of all possible values an attribute can have.
o E.g. Marital Status
o Domain will be Married, Unmarried
Relationships - A relationship is a connection between entity classes. For example, a relationship between PERSONS and AUTOMOBILES could be
an "OWNS"
relationship. That is to say, automobiles are owned by people.
The degree of a relationship indicates the number of entities involved.
The cardinality of a relationship indicates the number of instances in entity class
E1 that can or
must be associated with instances in entity class E2.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
23/57
81501219097
VIVA VOICE FILE
23
Types of Relationships
One to One (1:1)o For e.g. Employees in the Co. are assigned to their office. i.e. Each Employee =
Unique Office and for Each Office = Unique Employee
One to Many (1:M)o For e.g. A Dept. has many employees and Each employee is assigned to 1 Dept.
Many to One (M:1)
For e.g. Many Employees 1 Dept.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
24/57
81501219097
VIVA VOICE FILE
24
Many to Many (M:M)
o For e.g. Employees can be assigned to no more than 2 projects at the same time.
Projects must have assigned at least 3 employees.
ER Notation
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
25/57
81501219097
VIVA VOICE FILE
25
Keys - The Key uniquely differentiates one entity from all others in the entity class. A
key is an identifier.
Primary Key - Identifier used to uniquely identify one particular instance of an
entity.
Can be one or more attributes. (consider substituting a single concatenated key
attribute for multiple attribute key)
Must be unique within the domain (not just the current data set)
Value should not change over time
Must always have a value
Created when no obvious attribute exists. Each instance is assigned a value.
Candidate Key - when multiple possible identifiers exist, each is a candidate key
Concatenated Key - Key made up of parts which when combined become a uniqueIdentifier. Multiple attribute keys are concatenated keys.
Borrowed Key Attributes - If an is a relationship exists, the key to the more general
class is also a key to the subclass of items. For example, if serial number is a key for
automobiles it would also be a key for trucks.
Foreign Keys - Foreign keys reference a related table through the primary key of that
related table.
Referential Integrity Constraint - For every value of a foreign key there is a primarykey with that value in the referenced table e.g. if account number is to be used in table for
journal entries then that account number must exist in the chart of accounts table.
ACID Test
A- Atomicity
C-Consistency
I-Isolation
D-Durability
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
26/57
81501219097
VIVA VOICE FILE
26
Atomicity refers to the ability of the DBMS to guarantee that either all of the tasks of a
transaction are performed or none of them are. The transfer of funds can be completed or
it can fail for a multitude of reasons, but atomicity guarantees that one account won't be
debited if the other is not credited as well.
Consistency refers to the database being in a legal state when the transaction begins and
when it ends. This means that a transaction can't break the rules, orintegrity constraints,
of the database. If an integrity constraint states that all accounts must have a positive
balance, then any transaction violating this rule will be aborted.
Isolation refers to the ability of the application to make operations in a transaction appear
isolated from all other operations. This means that no operation outside the transaction
can ever see the data in an intermediate state.
Durability refers to the guarantee that once the user has been notified of success, the
transaction will persist, and not be undone.
Types of DBMS
There are mainly following types of three database
Hierarchical Database
Network Database
Relational Database
Explanation
Hierarchical Database: Develop in 1950s.
One of the Oldest Database model.
Developed jointly by North American Rockwell Company and IBM.
Hierarchical Model is a tree structure with record forming the nodes and fields forming
the branches of the tree.
Organization of Data
Hierarchical Model Organizes the Data Elements as Tabular rows, one for each instanceof entity.
For e.g. At the Top we have a GM, under him we have several DGM. Each DGM looks
after a couple of Departments and each Dept. will have a Manager and many Employees.
o Represent in Hierarchy.
o Dependent records are there.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
27/57
81501219097
VIVA VOICE FILE
27
Example:
Structure of a Family:
Parents can have many children:
1 to Many relationship The Great Grandparent is known as ROOT of the Tree.
The Grandparents and children are the NODES or Dependents of the Root.
Root may have number of dependents.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
28/57
81501219097
VIVA VOICE FILE
28
Operations on Hierarchical Model:
Insert Operation:
It is not possible to insert information which does not play any part i.e.
Node cannot exist without a Root but Root can exist without Node i.e. Parent can
exist without Child.
Update Operation: Update anomalies exist for Children not for Parent.
Delete Operation:
Deletion of Parent causes the deletion of Child records.
Retrieve Operation:
Retrieval methods are Complex and Asymmetric.
Hierarchical Model suffers from the Insertion Anomalies, Update
Anomalies and Delete Anomalies; also the retrieval operation is Complex and
Asymmetric.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
29/57
81501219097
VIVA VOICE FILE
29
Advantages:
Simplicity:
Database is based on Hierarchical structure.
Data Security:
It was the 1st model that offered data security.
Data Integrity:
Hierarchical model is based on Parent/Child relationship i.e. link between Parent Child
segments. Child is automatically referred by its Parent.
Efficiency:
Efficient in displaying large number of 1 to Many relationships.
Disadvantages:
Cannot handle Many-Many relations
Can not reflect all real life situations
Anomalies in insert delete and update operations.
Network Model:
This model replaces the Hierarchical Tree with a Graph.
Allows more general connections among the Nodes. It handles Many to Many relationship.
For e.g. Employee work for 2 Department.
Handles non-hierarchical relationships.
Allows 1:1, 1:M and M:M relationship.
In network database terminology, a relationship is a SET.
Each set is made up of 2 types of Records.
An Owner Record (Parent) and a Member Record (Child).
In addition to the part and supplier record types, a 3rd record type is introduced i.e.
Connector.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
30/57
81501219097
VIVA VOICE FILE
30
Operations on Network Model:
Insert Operation:
o New record can be inserted in the database by joining with a
Connector/Pointer.
Update Operation:
o No search criteria is needed to update a record, rather simply updating is
performed for record.
Delete Operation:
o In order to delete any record the corresponding pointers and connectors
are also deleted.
Retrieve Operation:
o Retrieval method for network model are Symmetric but complex.
Advantages:
Conceptual Simplicity:
o Conceptually simple and easy to design.
Capability to handle more relationship types:
o Network model can handle 1:M and M:M relationships.
Ease of data access:
o Data access is easier and flexible than hierarchical model.
Data Integrity:
o Member cannot exist without a Owner.
Data Independence
Database Standards:
o It is based on standards by ANSI/SPARC. (DDL & DML)(American National Standards Institute/Standards Planning and Requirements
Committee).
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
31/57
81501219097
VIVA VOICE FILE
31
Disadvantages:
System Complexity:
o All records are maintained using Pointers i.e. whole database structure becomes
complex.
Operational Anomalies:
o Due to usage of large number of pointers, implementation becomes complex and
complicated.
Absence of Structural Independence:
o If changes made in database structure then all application programs need to be modified
in order to access data.
Relational Model
Stores data in the form of tables.
Concept purposed by Dr. E.F. Codd, a researcher of IBM in the year 1960s.
Consist of 3 major components:
Set of Relations and set of Domains, that defines the way data can be
represented (Data Structure).
Integrity rules that define the procedure to protect the data (Data Integrity).
Operations that can be performed on data (Data Manipulation).
Definition: A relational model database is defined as a database that allows the user to
group its data items into one or more independent tables that can be related to one another
by using fields common to each related table.
Characteristics Whole data is conceptually represented into Rows and Columns, called a
Relation or Table.
All values are Scalar i.e. at any given row/column position in a relation there is
one and only one value.
All operations are performed on relation.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
32/57
81501219097
VIVA VOICE FILE
32
Basic Terminology used
Tuples of a Relation:
o Each row of data is a tuple.
Cardinality of a Relation:
o No. of tuples in a relation is cardinality.
Degree of a Relation:
o Each column in the tuple is called an attribute. The no. of attributes in a
relation determines its degree.
Domains:
o Set of all possible values that an attribute contain. E.g. Age, Gender,
Degree type etc.
Body of a Relation:
o A table to qualify as a relation each record must be uniquely identifiable
and table must contain no duplicate records.
Keys of a Relation:
o It is a set of one or more columns whose combined values are unique among all
occurrences in a given table. A key is the relational means ofspecifying
Uniqueness.
Type of keys are:
Primary Key
Foreign Key
Types of Keys:
o Primary Key:
It is an attribute or a set of attributes of a relation which posses the
properties ofUniqueness.
For e.g. Roll_No attribute in Student table is a Primary Key.
o Foreign Key:
It is an attribute of a table, which refers to the primary key of some
another table. Foreign key permit only those values, which appears in theprimary key of the table to which it refers.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
33/57
81501219097
VIVA VOICE FILE
33
Operations in Relational Model
Insert Operation:
o For e.g. information of Supplier who does not supply any part can be
inserted without any anomaly.
Update Operation:
o For e.g. In Student table if a student changes address than it can simply be
changed from Ludhiana to Moga.
Delete Operation:
o Information can be deleted from relation easily without affecting other
records.
Retrieval Operation:
o Retrieval operation is simple and symmetric.
Advantages:
Structural Independence:
o Changes in the database structure do not affect the data access.
Conceptual Simplicity:
o Simpler at conceptual level.
Design, Implementation, Maintenance and Usage ease:
o Due to both data independence and structure independence makes database
design, implementation, maintenance and usage easier than other models.
Ad hoc query Capability:
o With SQL it becomes very easy to use.
Disadvantages:
Hardware Overheads:
It requires powerful hardware computers and data storage devices.
Ease of design can lead to bad design:
Its easy to use but as database grows, poorly designed databases will slow the
system and will result in performance degradation and data corruption.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
34/57
81501219097
VIVA VOICE FILE
34
Information island Phenomenon:
Due to easy to implement and use, many people or departments will create their
own databases and applications which will prevent information integration which will
cause data inconsistency, data duplication and data redundancy.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
35/57
81501219097
VIVA VOICE FILE
35
CHAPTER 3
HTML
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
36/57
81501219097
VIVA VOICE FILE
36
Introduction to web designing
Web design is the skill of creating presentations of content (usually
hypertext or hypermedia) that is delivered to an end-user through the
World Wide Web. It is to create a web sitea collection of electronicfiles that reside on a web. Web design is the skill of creating
presentations of content (usually hypertext or hypermedia) that is
delivered to an end-user through the World Wide Web, by way of a Webbrowser or otherWeb-enabled software like Internet television clients,
micro blogging clients and RSS readers. The intent of web design is to
create a web sitea collection of electronic documents and applicationsthat reside on a web server/servers and present content and interactive
features/interfaces to the end user in form ofWeb pages once requested.
Such elements as text, bit-mapped images (GIFs, JPEGs) and forms can
be placed on the page using HTML/XHTML/XML tags. Displaying
more complex media (vector graphics, animations, videos, and sounds)
requires plug-ins such as Adobe Flash, QuickTime, Java run-time
environment, etc. Plug-ins is also embedded into web page by using
HTML/XHTML tags.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
37/57
81501219097
VIVA VOICE FILE
37
What is HTML?
HTML (hypertext markup language) -Using this language we can create web page
in the internet. This language is different from c , c++ etc . It provides a means to
create structured documents by denoting structural semantics for text such as
headings, paragraphs, lists etc. as well as for links, quotes, and other items. It
allows images and objects to be embedded and can be used to create interactive
forms. It is written in the form of HTML elements consisting of "tags" surrounded
by angle brackets within the web page content. It can include or can load scripts in
languages such as JavaScript which affect the behavior of HTML processors like
Web browsers; and Cascading Style Sheets (CSS) to define the appearance and
layout of text and other material. The W3C, maintainer of both HTML and CSSstandards, encourages the use of CSS over explicit presentational markup. Using
any web browser like IE, Netscape, Firefox, etc. The result of the execution will
appear as web page.
HTML stands forHyperText Markup Language
An HTML file is a text file containing small markup tags
The markup tags tell the Web browserhow to display the page
An HTML file must have an htm orhtml file extension
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
38/57
81501219097
VIVA VOICE FILE
38
HTML TAGS
Basic Tags
Creates an HTML document
Sets off the title and other information that isn't displayed on the Web page itself
Sets off the visible portion of the document
Header Tags
Puts the name of the document in the title bar
Body Attributes
Sets the background color, using name or hex value
Sets the text color, using name or hex value
Sets the color of links, using name or hex value
Sets the color of followed links, using name or hex value
Sets the color of links on click
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
39/57
81501219097
VIVA VOICE FILE
39
Text Tags
Creates preformatted text
Creates the largest headline
Creates the smallest headline
Creates bold text
Creates italic text
Creates teletype, or typewriter-style text
Sets size of font, from 1 to 7
Sets font color, using name or hex value
Links
Creates a hyperlink
Creates a mail to link
Creates a target location within a document
Links to that target location from elsewhere in the document
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
40/57
81501219097
VIVA VOICE FILE
40
Formatting
Creates a new paragraph
Aligns a paragraph to the left, right, or center
Inserts a line break
Creates a definition list
Precedes each definition term
Precedes each definition
Creates a numbered list
Precedes each list item and adds a number
Creates a bulleted list
Precedes each list item and adds the bullet
A generic tag used to format large blocks of HTML; also used for stylesheets
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
41/57
81501219097
VIVA VOICE FILE
41
Graphical Elements
Adds an image
Aligns an image: left, right, center, bottom, top, middle
Sets size of border around an image
Inserts a horizontal rule
Sets size (height) of rule
Sets width of rule in percentage or absolute value
Creates a rule without a shadow
Tables
Creates a table
Sets off each row in a table
Sets off each cell in a row
Sets off the table header (a normal cell with bold, centered text)
Table Attributes
Sets width of border around table cells
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
42/57
81501219097
VIVA VOICE FILE
42
Sets amount of space between table cells
Sets amount of space between a cell's border and its contents
Sets number of columns a cell should span (default=1)
Sets number of rows a cell should span (default=1)
Frames
Precedes the tag in a frames document; can also be nested in other framesets
Defines the rows within a frameset, using number in pixels or percentage of width
Defines the columns within a frameset, using number in pixels or percentage of
Defines a single frame within a frameset
Defines what will appear on browsers that don't support frames
Frames Attributes
Specifies which HTML document should be displayed
Names the frame so it may be targeted by other frames
Defines the left and right margins for the frame; must be equal to or greater than1
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
43/57
81501219097
VIVA VOICE FILE
43
Defines the top and bottom margins for the frame; must be equal to or greater than 1
Sets whether the frame has a scroll bar; value may equal "yes," "no," or "auto."
Forms
Creates all forms
Creates a scrolling menu. Size sets the number of menu items visible before you need to
scroll.
Sets off each menu item
Creates a pulldown menu
Sets off each menu item
Creates a text box area - columns set the width; rows set the height.
Creates a checkbox - text follows tag.
Creates a radio button - text follows tag.
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
44/57
81501219097
VIVA VOICE FILE
44
CSS (Cascading Style Sheets)
Style sheets are powerful mechanism for adding styles (e.g. fonts, colors, spacing) to web
documents.They enforce standards and uniformity throughout a website and provide numerous
attributes to create dynamic effects.
With style-sheets, text and image formatting properties can be predefined in a single list.
The advantages of the style sheet include the ability to make global changes to all
documents from a single location.
Style sheets are said to Cascade when they combine to specify the appearance of a page.
What is CSS?
CSS stands forCascading Style Sheets
Styles define how to display HTML elements
Styles are normally stored in Style Sheets
Styles were added to HTML 4.0 to solve a problem
External Style Sheets can save you a lot of work
External Style Sheets are stored in CSS files
Multiple style definitions will cascade into one
Syntax:
Tag
{
attribute: value;
attribute:value;
}
The selector is normally the HTML element/tag you wish to define, the property is theattribute you wish to change, and each property can take a value. The property and value
are separated by a colon, and surrounded by curly braces:
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
45/57
81501219097
VIVA VOICE FILE
45
The class Selector
With the class selector you can define different styles for the same type of HTML element.
Say that you would like to have two types of paragraphs in your document: one right-
aligned paragraph, and one center-aligned paragraph. You have to use the classattribute in your HTML document:
.right
{
}
This paragraph will be right-aligned.
This paragraph will be center-aligned.
The id Selector
You can also define styles for HTML elements with the id selector. The id selector isdefined as a #.The style rule below will match the element that has an id attribute with a
value of "green":
#green {color: green}
How to Insert a Style Sheet
When a browser reads a style sheet, it will format the document according to it. There are
three ways of inserting a style sheet:
External Style Sheet
An external style sheet is ideal when the style is applied to many pages. With an external
style sheet, you can change the look of an entire Web site by changing one file. Each
page must link to the style sheet using the tag.
The tag goes inside the head section:
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
46/57
81501219097
VIVA VOICE FILE
46
The browser will read the style definitions from the file mystyle.css, and format the
document according to it. An external style sheet can be written in any text editor. The
file should not contain any html tags. Your style sheet should be saved with a .css
extension. An example of a style sheet file is shown below:
hr {color: red}
p {margin-left: 20px}
body {background-image: url("images/back40.gif")}
Internal Style Sheet
An internal style sheet should be used when a single document has a unique style. You
define internal styles in the head section by using the tag, like this:
hr {color: red}
p {margin-left: 20px}body {background-image: url("images/back40.gif")}
The browser will now read the style definitions, and format the document according to it.
Inline Styles
An inline style loses many of the advantages of style sheets by mixing content withpresentation. Use this method sparingly, such as when a style is to be applied to a single
occurrence of an element.
To use inline styles you use the style attribute in the relevant tag. The style attribute can
contain any CSS property. The example shows how to change the color and the left
margin of a paragraph:
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
47/57
81501219097
VIVA VOICE FILE
47
This is a paragraph
Introduction to JavaScript
JavaScript is a scripting language
A scripting language is a lightweight programming language
JavaScript was designed to add interactivity to HTML pages
JavaScript is usually embedded directly into HTML pages
JavaScript is an interpreted language (means that scripts execute without preliminary
compilation)
Everyone can use JavaScript without purchasing a license JavaScript is adds functionality, validate forms, detect browsers, and much more.
JavaScript is the most popular scripting language on the internet, and works in all major
browsers, such as Internet Explorer, Firefox, Chrome, Opera, and Safari.
JavaScript gives HTML designers a programming tool - HTML authors are normally
not programmers, but JavaScript is a scripting language with a
very simple syntax!
OPERATORS IN JAVASCRIPT
JavaScript Arithmetic Operators
Arithmetic operators are used to perform arithmetic between variables and/or values.
Given that y=5, the table below explains the arithmetic operators:
Operators -
j Addition x=y+2
x=7
j Subtraction x=y-2
x=3
j Multiplication x=y*2
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
48/57
81501219097
VIVA VOICE FILE
48
x=10
j Division x=y/2
x=2.5
j Modulus (division remainder) x=y%2
x=1
j Increment x=++y
x=6
j Decrement x=--y
x=4
JavaScript Assignment Operators
Assignment operators are used to assign values to JavaScript variables. Given that x=10
and y=5, the table below explains the assignment operators:
Operators-
=
x=y
x=5
+ =
x+=y x=x+y
x=15
-=
x-=y x=x-y
x=5
VARIABLES IN JAVASCRIPT
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
49/57
81501219097
VIVA VOICE FILE
49
As with algebra, JavaScript variables are used to hold values or expressions. A variable
can have a short name, like x, or a more descriptive name, like carname.
Rules for JavaScript variable names:
Variable names are case sensitive (y and Y are two different variables)
Variable names must begin with a letter or the underscore character
Note: Because JavaScript is case-sensitive, variable names are case-sensitive.
Declaring (Creating) JavaScript VariablesCreating variables in JavaScript is most often referred to as "declaring" variables. You
can declare JavaScript variables with the var statement:
var x;
var carname;
After the declaration shown above, the variables are empty (they have no values yet).
However, you can also assign values to the variables when you declare them:
var x=5;
var carname="Volvo";
After the execution of the statements above, the variable x will hold the value 5, and
carname will hold the value Volvo.
Note: When you assign a text value to a variable, use quotes around the value.
JAVASCRIPT EVENTSHTML 4 added the ability to let events trigger actions in a browser, like starting a
JavaScript when a user clicks on an element.
Below is the standard event attributes that can be inserted into HTML / XHTML
elements to define event actions.
and Events
The two attributes below can only be used in or :
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
50/57
81501219097
VIVA VOICE FILE
50
Attribute Value Description
Onload Script Script to be run when a
document load
Onunload Script Script to be run when adocument unload
Form Events
Attribute Value Description
Onbhur Script Script to be run whenan element losses
focus
Onchnge Script Script to be run whenan element change
Onfocus Script Script to be run when
an element gets focus
Onreset Script Script to be run whena form is reset
Onselect Script Script to be run when
an element is selectedOnsubmit Script Script to be run when
a form is submitted
Mouse Events
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
51/57
81501219097
VIVA VOICE FILE
51
Attribute Value Description
Onclick Script Script to be run on a
mouse click
On doubleclick Script Script to be run on amouse double-click
Onmouse down Script Script to be run when
mouse button is
pressed
On mouse move Script Script to be run when
mouse pointer moves
Onmouseout Script Script to be run when
mouse pointer moves
out of an element
Onmouseover Script Script to be run when
mouse pointer moves
over an element
onmouseup script Script to be run when
mouse button is rele
Keyboard Events
Attribute Value Description
On key down Script Script to be run when
a key is pressed
Onkeypress Script Script to be run when
a key is pressed and
released
Onkeyup Script Script to be run whena key is released
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
52/57
81501219097
VIVA VOICE FILE
52
CHAPTER 4
OPERATING SYSTEM
Operating System
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
53/57
81501219097
VIVA VOICE FILE
53
Operating SystemOperating systems perform basic tasks, such as recognizing input from the keyboard,
sending output to the display screen, keeping track of files and directories on the disk,
and controlling peripheral devices such as disk drives and printers. Process management,
Memory management, Resource management and Security management.
Classify an operating system
Operating systems can be classified as follows:
Multi-User: Allows two or more users to run programs at the same time. Some
operating systems permit hundreds or even thousands of concurrent users.
Multiprocessing: Supports running a program on more than one CPU.
Multitasking: Allows more than one program to run concurrently.
Real Time: Responds to input instantly. General-purpose operating systems,
such as DOS and UNIX, are not real-time.
Batch processing is a system in which a group of similar tasks is collected and
they are collectively send for processing and output is generated on punched cards
and given to the users who generated the tasks.
Time-sharing operating systems a computer provides computing services to
several or many users concurrently on-line. The user, in this environment, has
nearly full interaction with the program during its execution, and the computers
response time may be expected to be no more than a few second
Real time operating systems is designed to service those applications where
response time is of the essence in order to prevent error, misrepresentation or even
disaster. Examples of real time operating systems are those, which handle airlines
reservations, machine tool control, and monitoring of a nuclear power station. The
systems, in this case, are designed to be interrupted by external signal that require
the immediate attention of the computer system.
Deadlock Definition
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
54/57
81501219097
VIVA VOICE FILE
54
A set of processes is deadlocked if each process in the set is waiting for an event that onlyanother process in the set can cause (including itself).
Conditions for Deadlock
o Mutual exclusion: resources cannot be shared.o Hold and wait: processes request resources incrementally, and hold on to what they'vegot.
oNo preemption: resources cannot be forcibly taken from processes.o Circular wait: circular chain of waiting, in which each process is waiting for a resource
held by the next process in the chain.
Process Management
The CPU executes a large number of programs. While its main concern is the execution of user
programs, the CPU is also needed for other system activities. These activities are calledprocesses. A process is a program in execution. Typically, a batch job is a process. A time-shared
user program is a process. A system task, such as spooling, is also a process. For now, a processmay be considered as a job or a time-shared program, but the concept is actually more general
Memory Management
Memory is central to the operation of a modern computer system. Memory is a large
array of words or bytes, each with its own address. Interaction is achieved through a
sequence of reads or writes of specific memory address. The CPU fetches from and stores
in memory.
The operating system is responsible for the following activities in connection with
memory management.
o Keep track of which parts of memory are currently being used and by whom.
o Decide which processes are to be loaded into memory when memory space
becomes available.
o Allocate and de allocate memory space as needed.
Secondary Storage Management
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
55/57
81501219097
VIVA VOICE FILE
55
The main purpose of a computer system is to execute programs. These programs,
together with the data they access, must be in main memory during execution. Since the
main memory is too small to permanently accommodate all data and program, the
computer system must provide secondary storage to backup main memory. Most modem
computer systems use disks as the primary on-line storage of information, of both
programs and data. Most programs, like compilers, assemblers, sort routines, editors,
formatters, and so on, are stored on the disk until loaded into memory, and then use the
disk as both the source and destination of their processing. Hence the proper management
of disk storage is of central importance to a computer system.
The operating system is responsible for the following activities in connection with disk
management
o Free space management
o Storage allocation
o Disk scheduling.
I/O System
One of the purposes of an operating system is to hide the peculiarities of specific hardware
devices from the user. For example, in Unix, the peculiarities of I/O devices are hidden from thebulk of the operating system itself by the I/O system. The I/O system consists of:
o A buffer caching systemo A general device driver code
o Drivers for specific hardware devices.
Only the device driver knows the peculiarities of a specific device
File ManagementFile management is one of the most visible services of an operating system. Computers can store
information in several different physical forms; magnetic tape, disk, and drum are the mostcommon forms. Each of these devices has it own characteristics and physical organization. The
operating system is responsible for the following activities in connection with file management:
o The creation and deletion of files
oThe creation and deletion of directoryo The support of primitives for manipulating files and directories
o The mapping of files onto disk storage.
Protection System
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
56/57
81501219097
VIVA VOICE FILE
56
The various processes in an operating system must be protected from each others activities. Forthat purpose, various mechanisms which can be used to ensure that the files, memory segment,
cpu and other resources can be operated on only by those processes that have gained properauthorization from the operating system. For example, memory-addressing hardware ensures that
a process can only execute within its own address space. The timer ensures that no process can
gain control of the CPU without relinquishing it.
Distributed System
A distributed system is a collection of processors that do not share memory or a clock.
Instead, each processor has its own local memory, and the processors communicate with
each other through various communication lines, such as high-speed buses or telephone
lines. Distributed systems vary in size and function. They may involve microprocessors,
workstations, minicomputers, and large general-purpose computer systems.
Virtual Memory
In a virtual memory system, the program code deals with virtual addresses. Upon use, the
virtual address is translated by the mmuto obtain a physical address that is used to access
physical address.
Physical Memory
Physical Memory (also known as real memory). Physical memory is memory that is
wired to directly to the processor, addressable by physical address.This term is basically
synonymous to main memory, but is used in contrast to virtual memory(1) and backing
store. While moderncomputers usually have lots of virtual memory performance is still
closely related to the quantity of physical memory available. If a system has insufficient
physical memory, it may thrash.
Page Table
In a virtual memory system, it is common to map between virtual addresses and
physical addresses by means of a data structure called a page table. The page number of
an address is usually found from the most significant bits of the address; the remaining
bits yield the offset of the location within the page. The page table is normally indexed by
page number and contains information on whether the page is currently in main memory,
and where it is in main memory or on disk.
MMU
8/6/2019 Viva Voice File( Made by Hitakshi Jain Frm Ludhiana)
57/57
8150121909757
MMU (also known as Memory Management Unit).The MMU (Memory Management
Unit) is a hardware device responsible for handling memory accesses requested by the
main processor.
PageA virtual memory system usually deals with memory blocks of fixed size as units for
paging. These are known as pages. Pages are often 4 kB or 8 kB in size. This size is
determined by the addressing hardware of the machine.
Page Fault
A page fault is an exception occurring during the translation of virtual addresses to
physical addresses. "Page fault" usually means an access to a page that has been paged
out and hence requires fetching from disk, but it is sometimes also used to mean invalid
page fault or protection fault
PagingIn a virtual memory system, paging is the act of transferring pages between physical
memory and backing store (usually disk).When pages need to be paged out, a heuristic is
used to select ones that will not be needed soon; "least recently used" is a popular one.
Swapping
Historically, swapping was the technique of moving entire program images to disk (or
drum) and back into physical memory early form of virtual memory nowadays; it is used
as a synonym for Apaging.