85
Computer Fundamentals & Programming Computer Fundamentals 1. Introduction To Computer System 1.1. Introduction Computer is most important device for this era. The computer technology has almost changed the world in short times. It becomes very essential tool in every walk of human life. The word computer is developed from the Latin word ‘coputare’ which means “To calculate or to compute”. Roughly we can say the machine which calculates is called a computer; but it is incomplete, In fact a computer is a programmable electronic calculating machine. It received data through it input devices, process it and produce output as our requirement with in a second. With help of computer technology a person can communicate to other people from one place to another place of the world through telephone, telex, fax, e-mail etc within a minute. A computer accepts data from an input device and processes it into useful information which it displays on its output device. It operates under the control of a set of instructions that is stored in its memory unit. Definition of computer A computer is an electronic device that accepts data; process it according to a set command and then gives results. In other words a computer is an electronic machine that is used for data processing to produce information. With viewpoints of this definition computer is said to be Electronic calculating machine, Programmable machine, Data processing device, Networking device, Automatic system etc... 1

gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Computer Fundamentals & Programming

Computer Fundamentals1. Introduction To Computer System 1.1. Introduction Computer is most important device for this era. The computer technology has almost changed the world in short times. It becomes very essential tool in every walk of human life. The word computer is developed from the Latin word ‘coputare’ which means “To calculate or to compute”. Roughly we can say the machine which calculates is called a computer; but it is incomplete, In fact a computer is a programmable electronic calculating machine. It received data through it input devices, process it and produce output as our requirement with in a second. With help of computer technology a person can communicate to other people from one place to another place of the world through telephone, telex, fax, e-mail etc within a minute. A computer accepts data from an input device and processes it into useful information which it displays on its output device. It operates under the control of a set of instructions that is stored in its memory unit. Definition of computer A computer is an electronic device that accepts data; process it according to a set command and then gives results. In other words a computer is an electronic machine that is used for data processing to produce information. With viewpoints of this definition computer is said to be Electronic calculating machine, Programmable machine, Data processing device, Networking device, Automatic system etc...

The computer has following basic system and components devices to process data and gets the output. It has optional components too.

A) System device i) Input device - keyboard, mouse

ii) Processing device – Central Processing Unit (CPU)

iii) Output device – Monitor and Printer CPU Consists motherboard, hard disk, floppy disk drive, sound card, power supply, modem, etc.

B) Basic and optional component device

(i) Basic Components Capacity & functions1 Processor - 600 MHz, 1200 MHz, 1700 MHz2. Hard Disk - 40 GB, 100 GB, 160 GB, 200 GB, 2000 GB3 RAM - 128 MB, 256 MB, 512 MB, 1GB, 2GB

1

Page 2: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

4 Display /Video Card - 64 MB, 128MB, 512 MB, 1 GB5 Keyboard - 84 keys , 104 Keys, 124 Keys6. Hard disk drive - reads, writes on HD7 Floppy disk drive - reads, writes on floppy8 CD-ROM/DVD drive - reads, writes on CD-ROM, DVD-ROM9 Mouse - pointing & clicking device10 Monitor - Displaying device

A complete basic components set of these devices is called a computer. Computer may have optional devices too.

ii) Optional Components Capacity & functions1 Printer 450ch/sec, 1-18 Pg/min, 4-24 Pg/min2 Scanner Flat bed type & Handheld type3 DVD drive Reads/writes on DVD4. Zip drive Reads/writes on Zip disk5 Pen drive Reads/writes on Pen drive6 Modem Internal & External type7. Speakers Throws sounds

1.2. Features (Characteristics of computer) Computer is very important and useful device for everywhere of a human being of this century. This is due to its major capacity or features. There are some important features.

i) Automatic Computer is an automatic calculating machine; any given a job it performs independently without assistance of human being.

ii) High processing speed A computer is a very fast processing device .It can perform in a few seconds, the amount of work that a human being can do in an entire year. It can perform data processing job very fast usually measure in micro second (10-6), nano second (10-9) and Pico second (10-12).

iii) Accuracy (100%) Computer is working its job very accurate. A computer performs every calculation with the same accuracy. However the mistake may occur; if any mistake found in it is not due to the mistake of computer but the mistake of programmer. It works consistently and accurately throughout the time.

iv) Reliability Individual components of computer have a very high life and degree of reliability. Computer is only a machine and it does not make errors on its own. So computer is reliable device.

v) Diligence (Stay constant)

2

Page 3: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Computer is a machine .It is free from monotony, tiredness and lack of concentration. It can continuously work for hours without creating any error and without grumbling

vi) Versatility (Simple to complicated jobs) Versatile is one of the most wonderful things for a computer. It is capable to performing almost any task if the task is reduced to the finite series of logical steps .Once moment it is preparing result of an examination next it is busy to prepare electricity bills and in between it help to type a business letter.

vii) Huge storing device Computer has huge storing capacity. It can store a large number of data in it. The secondary storage device is used for it. Thousands of books can be store in a small chip.For instant 1 Kilobyte = 1024 characters/symbol = 103 bytes around 1 Megabyte = 1024x1024 ʺ = 106 ʺ1 Gigabyte = 1024x1024x1024 ʺ = 109 ʺ1 Terabyte = 1024x1024x1024x1024 ʺ = 1012 ʺIn accordance the computer has huge storage capacity.

viii) World Wide Networking Computers are connected to word wide. Through internet a person from any place to the other person in any place of the world can talk, share picture etc .in a moment, a person get any kind of information through computer .This is all with the help of computer and its word wide network.

ix) No I.Q. and Feeling Computer is a machine. It is free from any kind of emotion and feeling. It is not a magical device also. Though it perform the task as human being does but it has no brain as like a human brain.

1.3. Impact of the Computer Technology in the Society

1.3.1. Background:In the world today, computer awareness, use and its impact is increasing in a very high speed day by day. Compared to other technologies, it is developing and changing very frequently. It is a multi-dimensional technology, which can create a multidimensional effect in the all round development of the person, the society and the country. It can help the society providing quality service cost effectively. That is why people are adapting this technology very fast. At present, we have seen that people from different sectors like doctors, engineers, managers, teachers, researchers, businessmen, industrialists and students etc. are using the computers. Using this technology, they are increasing their living standards, economic status, and personal working capacity and so on.It can bring rapid progress and prosperity in the country. Singapore, Japan, South Korea, Taiwan and others are good examples. To develop the country and society, the revolution of agriculture had taken more than thousand years and the industrial revolution had taken about a century. But the revolution of technology has taken only about 25 years to change the society and country. It is a very fast changing technology, which can accelerate the developing speed of the nation. It can bring fast economical revolution to the country. It can quickly change the life style to bring prosperity. Therefore, it can impact the society in multiple ways. Advantage and disadvantage of the technology are as follows.

3

Page 4: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

1.3.2. Positive Impact : i. Employment benefit

ii. Greater efficiencyiii. Higher Quality Productiv. Better Servicev. Recreational and educational benefit

vi. Aid to handicappedvii. Improved Safety

viii. Better Information retrievalix. Educational benefitsx. Personal finance benefits

xi. Benefit of greater personal efficiency.

1.3.3. Negative Impact: i. Employment problem

ii. System Security problemiii. The privacy issueiv. Freedom restrictionsv. Privacy control

vi. The threat to access by the hackersvii. The threat to the system security, etc.

1.4. Application of Computer in the society Realizing the above social impact, the people of the world are endeavoring to provide computer education to their children from an early age. Most of the developed countries have made Computer Education compulsory from grade one to Ph.D. level. They had prepared the curriculums to use it according to the level and requirements. Most of the countries are investing lots of money on the computer education for better quality of life and speedy development. Due to the development of computer technology, India, South Korea, Taiwan, Singapore and Malaysia have upgraded the living standards of their people within the last two decades. But Nepal could not develop much compared to what they had done. In fact, Nepal had also started using this technology since 1970 AD but, because we did not care about the quality Computer Education in the right time. We have not yet been able to frame proper national policy of IT (Information Technology) development and human resource development on IT. Anyway, in Nepal also people had started computer Education from class 3 to the Ph. D. level at present. They are using computers in different sectors. There are good impacts of this technology. At present, people in Nepal are using this technology in the following fields for the personal and social benefits.

1.4.1. Education Sector: i. Result Processing in Schools, 10+2, Colleges and Universities.

ii. School Information System Processing in Ministry of Education.iii. Students & Teacher's Record Keeping.iv. As a teaching tool for Science, Health, Geography, etc.v. As a learning tool in the practical class of Schools, Colleges and Universities.

vi. Account keeping, Payroll System and others.vii. Statistical record keeping, etc.

4

Page 5: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

1.4.2. Health and Sector: i. CT scanning

ii. Ultra Soundiii. Patient Record Keepingiv. Account Keepingv. Statistical Report

vi. Medical Store Inventory Controlvii. Research and Development.

1.4.3. Banking Sector: (i) Bank Account Keeping(ii) Electronic Money Transfer(iii) General ledger(iv) Note conciliation(v) Monthly/Yearly Income & Expenditure Record Keeping(vi) Monthly/Yearly Money Transaction(vii) Research and Development(viii)

Reconciliation.

1.4.4. Hotel Management: (i)

Front Desk Management System(ii) Manpower Management(iii) Account keeping(iv) Store and kitchen Inventory Control System(v) Hotel Management System(vi) Hotel Booking(vii)Record Keeping.

1.4.5. Airlines Management: (i)

Ticket Booking(ii) Ticket Reconciliation(iii) Billing & Ticketing(iv) Spare parts Inventory Control System(v) Account Keeping(vi) Commission Agents’ record keeping(vii)

Personnel Management System.

1.4.6. Agriculture Sector: (i) National Agriculture Census(ii) Research and Development(iii) Personnel Management(iv) Production Control Management System

5

Page 6: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

(v) Manpower Training (vi) Store and Inventory Control System.

1.4.7. Industrial Sector :(i) National Industrial census(ii) Research and Development(iii) Production Control(iv) Quality Control(v) Inventory Control System(vi) Demand and Supply System(vii) Manpower Management System(viii) Property Management System(ix) Spare parts Inventory Control System.

1.4.8. Communication Sector: (i) International News Collection, Dissemination & Control(ii) National News Collection, Dissemination & control(iii) Dissemination of news, in terms of text, voice and views(iv) Research and Development(v) Store Inventory Control System(vi) Record Keeping System, etc.

There are other sector also where the application of computer is very important these are E-Governance, Office, Intelligence Machine, Weather Forecasting, Decision Making, Distance Education, Film recording, Traffic Control, Playing games, Publication etc.

1.5. History And Development Of Computers A computer is an invention of human beings to enhance their capabilities to accomplish tasks. Modern computers are developed after a gradual change over a long period of time. In another word, it was not developed in one day. Hence it has its own history.Tribal life in ancient time required man to remember a lot of information, so an early man felt the need to count the things. Then he started counting using his own fingers. However, the limited number of fingers had made it difficult for him to remember more facts. Thus, he started different methods to count using stones, sticks, scratches on a rock or wall or knots in a string. As a result, during fifth century Hindu philosophers were able to develop a new method of counting using the numbers (digits) 0 to 9. Since there are ten digits, the Arabic Number System method was called Decimal Number System of counting. Hence, the history of computer implies the gradual change in the concept over a long period of time. In the following section, we will explain the history of computing machines from their early forms to the most modern high-speed electronic computers.(a) BC 5000 to 2000 Abacus In early days, people used pebbles or beads on a counting board to carry out simple calculations. This tool is called the Abacus. Its exact origin is unknown. It may have originated in China, Egypt and Greece during 5000 B.C. to 2000 B.C. An abacus can be used to add, subtract, multiply and divide. Even today the abacus is used in many parts of the world (e.g. China).

(b) A.D. 1614: Napier’s Bone

6

Page 7: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

In 1614 John Napier, a Scottish Mathematician, first published the first table of logarithms. It was very helpful in simplifying multiplication of large numbers. In 1614, Napier also developed a numbered rod in order to multiply, divide and extract roots, known as Napier’s bone. It was called so because it was made up of strips of bones on which numbers were painted. By the combination of these bones, direct multiplication could be done.

(c) A.D. 1620: Slide RuleIn 1620, Slide Rule was developed by William Oughtred, UK which is an analog device. It used the principle of logarithms. It has two graduated scales. One scale slides or slips upon the other. With the proper alignment of the two scales, it is easy to find the product, quotient or any other function simply by viewing on the scales.

(d) A.D. 1642: Pascal’s adding machineThe first real calculating machine that could add and subtract was a mechanical calculator called Pascal’s Adding Machine or Pascaline, invented by a French scientist Blaise Pascal in 1642. Pascal’s Adding machine consisted of ten toothed wheels. The addition or subtraction was performed by turning these wheels.

(e) A.D. 1694: Leibnitz’s CalculatorThe first calculator that could perform automatic addition, subtraction as well as multiplication and division was developed by a German philosopher Gottfried Wilhelm Von Leibniz. In 1671, Leibnitz modified his calculator. It was also known as. Stepped Recknor. (f) A.D. 1801: Jacquard’s Loom and Punched CardAt the beginning of the nineteenth century (i.e. A. D. 1801), Joseph Marie Jacquard of France invented a punched card as an accessory to the loom. The punched card could automate the loom for the weaving of intricate patterns. Thus, he could control the weaving loom through the set of holes in a card, which could store the instruction for the loom. (g) A.D. 1822 and 1833: Babbage’s Differential Engine In 1822, another interesting development took place in the history of computers. Charles Babbage, an English Mathematician, invented a calculating device called Differential Engine . Babbage wanted to calculate Polynomial functions using the method of differences. Babbage, also wanted to design a bigger machine, called an Analytical Engine. The idea of an Analytical Engine developed in 1833 AD was considered as a most significant step in the history of computers, because of his idea only, the dream of modern computer has come true. That is why he is famous as “Father of Computer”.Babbage intended to have his machine to have a mechanism to input data and output the results. He wanted to input data with the help of punched cards and the output to be printed on copper plates. Babbage’s analytical engine and modern day computers are similar in their structure. This engine had four major units.1. Store: A memory or store which could store data and intermediate results.2. Mill: An arithmetic unit which was called a ‘Mill’. It could perform calculations.3. His machine had mechanism having gears and shafts by which data and results were transferred between the store and the mill which is similar to the control unit of today’s computer.4. Input and Output devices

(h) A.D. 1848 Lady Ada AgustaIn 1848 AD, a British mathematician Lady Agusta wrote a first program to run an analytical engine made by Prof. Charles Babbage. Hence she is called a first programmer.

7

Page 8: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

(i) A.D. 1850 George Boole George Boole, a British mathematician, introduced mathematics of logic known as Boolean algebra. It laid the foundation of digital computers. Boolean considered two-valued binary notation (i.e. 0 and 1) to represent any form of data.

(j) A.D. 1890: Dr. Herman Hollerith The first card machine which was electrically activated was used by Dr. Herman Hollerith to compute the statistics of the 1890 AD United States population census. Hollerith was an American mechanical engineer and statistician, working for the Census Bureau. He used the punched cards to store data, with the holes representing data values. He developed an electromechanical tabulating machine for punched cards. Because of his sincere efforts, the population census of 1890 could be processed in one-third of the time allotted.

(k) A.D 1937: Electromechanical Computers (Mark I)In the early part of the twentieth century, tabulating machines were growing rapidly. In 1937, next important event occurred in history. The first electromechanical computer with the development of MARK I was invented by Howard Aiken and other was constructed MARK I at Harvard University under the sponsorship of IBM (International Business Machine).The MARK I also known as the Automatic Sequence Controlled Calculator. It was 50ft. long and 8 ft. high. It used electronic tubes and electrical relays. MARK I took 4½ seconds to multiply two 23-digit numbers. It was able to produce ballistics tables that were used in connection with Second World War. The input device used was the punched paper tape.

(l) A.D. 1939: Electronic Computers (ABC computer).The age of electronic computer began when vacuum tubes were introduced. Such tubes were thousands of times faster than the earlier electromechanical devices. The first electronic digital computer was developed in 1939 AD by John V. Atanasoft and his student Clifford Berry It was called Atanasoft-Berry Computer (ABC computer).

(m) A.D 1940: ENIAC (Electronic Numerical Integrator And Computer)In the true sense, the first electronic computer was developed by John W. Mauchly and John Presper Eckert. It was developed at the university of Pennsylvania and called ENIAC (Electronic Numerical Integrator And Computer), based Decimal Number System.ENIAC used high-speed vacuum tubes (switching devices). The high speed operation of the computer in the world was first experienced with ENIAC. It could add two numbers in 200 microseconds and multiply two numbers in 2800 microseconds. Number of vacuum tubes used was 19,000. It occupied an area of 150 square meters and was 1,000 times faster than Mark-1.

(n) A.D. 1949: EDSAC (Electronic Delay Storage Automated Computer)In 1945, a noticeable improvement in the development of the computer took place when John Von Neumann, the Hungarian mathematician genius developed the idea of Stored Program Concept, which was a very important technique to design today's Computer. According Neumann, it would use Binary Number system instead of Decimal Number System used in ENIAC. Then Prof. Maurie Wilkes used the I.V Neumann’s stored program concept to design the computer called EDSAC (Electronic Delay Storage Automatic Computer). EDSAC was called the first stored program electronic computer developed completely in 1949.

(o) A.D. 1951: UNIVAC (Universal Automatic Computer)After developing ENIAC, Mauchly and Eckert formed their own company in 1946. This company built a new computer called UNIVAC-I (Universal Automatic Computer-I) in 1951. UNIVAC was delivered to the

8

Page 9: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Census Bureau. Business organizations too started using UNIVAC. Hence, it was called the first commercially used electronic computer in the world.

(p) A.D. 1970: MicroprocessorThe first Microprocessor was built at Intel Co-operation, USA in 1970. It was used to build minicomputer and micro computer at the beginning.

(q) A.D 1972: MinicomputerThe first minicomputer was developed by Digital Equipment Corporation (DEC) in 1972 A.D. Within 1977 AD different computers started developing varieties of Minicomputers.

(r) A.D. 1974: MicrocomputerThe first microcomputer called ALT AIR 8800 was manufactured in 1974. It used an 8-bit Intel microprocessor. The Apple personal computer and IBM pc was first introduced in 1976 and 1981 AD respectively.

(s) A.D. 1994: Pentium SeriesIBM Company launched PCXT (Extended Technology) and PCAT (Advanced Technology) microcomputers were developed first time in 1983 and 1984 AD respectively. Then in 1994 AD Pentium series of Microprocessor Chips were launched. In the same year, US vice President Mr. Algor announced about “Internet for all”. Then most of the developed and developing countries tried to use Information Technology (IT), where people could use Internet, Intranet, extranet and email. With the help of this technology they also started using Website, Digital Library, E-commerce, E-shopping, E-Banking and Telemedicine, etc.

(t) AD 1995: Multimedia Technology (MMX)Pentium I with Multimedia Technology (MMX) computer was built and released. In the same year, Windows 95 and Graphical User Interface (GUI) were launched by Microsoft.

(u) A.D.1996: Linux Operating systemThis year different individual software developers developed Linux Operating System.

(v) A.D. 1997: MS-Office 97Microsoft Company Launched MS-Office 97 (Office Application) for Windows 95. Similarly in the same year private individuals also designed and sold a special type of Operating System named LINUX in the world market.

(w) A.D. 1998: Windows 98Microsoft Company released advanced Windows 98 Operating System, which was the corrected and advanced version of Windows 95 and windows 97.

(x) AD: 2000: Windows 2000Microsoft Company again developed and released advanced version of windows 2000 Operating System, which are being used worldwide even today.

1.6. History and Development of Computer in Nepal:

9

Page 10: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Although the first electronic digital computer was built in mid 1940’s, computer was introduced in Nepal in the year 1972 only. It was introduced by Government for the population census of 1972 (2028 B.S). This was the second generation computer of IBM Company called IBM 1401. The Government had paid Rs One lakh twenty five thousand per month as rent for this computer.The Census Department at Thapathali Kathmandu had used IBM 1401 computer for the first time to process 1 corer 12.5 lakhs population census taking 1 year, 7 months and 15 days. Later, it became essential to operate the computer for day and night, for this reason a separate branch office called Yantric Sarinikaran Kendra (Electronic Data Processing Centre), was established in 1974 (15th Paush 2031 B.S.), which, after six years, was converted to National Computer Centre (NCC).For the population census of 1981 (B.S. 2038), a British computer ICL 2950/10 (International Computer Limited 2900 Series) which had 64 terminals was added from the aid of UNDP and UNFPA at two million American dollar from the British ICL Company. By the help of this fourth generation computer, the 1981 population census was completed within one year and 3 months.Microcomputer such as Apple, Vector and Sirus were introduced in Kathmandu for the first time in 1982 (B.S. 2039). New companies such as Computer consultancy (CC), Management Information Processing System (MIPS) and Data System International (DSI) were established. Since 1983 (BS. 2040) National Computer Center, on the other hand, also started giving training on programming, data entry, data processing, and development of software packages. As a result, many people from various sectors started showing their interest in the field of computers.Since 1977 (B.S. 2034) His Majesty’s Government employed IBM 1401 computer in tourist statistical data processing, industrial data processing, statistical and loan account keeping of Agricultural Development Bank, Provident fund, SLC result processing and TU result processing, etc. After a few years, new computer ICL 2950/10 was brought in use, which was more efficient for data processing in some other corporations such as Telecommunication, Electricity Authority, Janakpur Cigarette factory, Hetauda Cement Factory, Tribhuwan University, etc. Many others like travel agencies, hotels, factories, printing presses also started using computer for better & faster work. At present, not only Kathmandu is using microcomputers but also Lalitpur, Bhaktapur, Pokhara, Nepalgunj, Bhairhawa, Butwal, Hetauda, Birgunj, Biratnagar, Janakpur, Jhapa etc. are using computer for different purposes. Nowadays, computers have been used in different areas like, travel agencies, hotels, Airlines, Government offices, Banks, Colleges, Schools, Hospitals, etc. in Nepal. People are using computer even at home for day-to-day use for their personal convenience. Now there are more than 1000 private computer-training centers all over Nepal. About 50 software development centers are working in the Nepali market. At present, in Nepal more than 1250 schools, 107 higher secondary schools, 50 general colleges, 42 IT related colleges and 4 Universities are teaching and using computer technology. More than one hundred thousand computers are busy in Nepal. More than 28 private Internet Service Provider (ISP) are providing services in the Nepali market. Nepal had started using e-mail, Internet, e-Banking and Websites since 1996 AD. The purpose of using the computers is for word processing, keeping accounts, keeping the records and details of employees, inventory control, etc. A few software houses are involved in software development and in exporting the software to the international market (i.e. in Japan, Germany, USA, UK etc) also. Some of the private institutes and companies are involved in computer assembling, selling and distributing like in other developed countries. The scope of computer in our country is increasing rapidly day by day. In May 2000 AD, Ministry of Science and Technology, HMG had announced the national policy on IT. Similarly, HMG had announced the Cyber Law and copyright Law in Sept 2004 etc.

1.7. Generations The "Generations of computer" refers to the development step of technology of computer. It provides a framework for growth of computer industry. Initially it was classified according to the use various hardware

10

Page 11: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

technologies but it has now been extended to include both hardware and software. Up to now there are five computer generations. They are classified with their hardware and software technologies, characteristics and working speed which are shown by the following table.

Generation (period)& working speed

Key hardware technologies Key softwaretechnologies

Key characteristics Some representativeSystem

1st Generation

1942 to 1954 Second

Vacuum tubes; electromagnetic

relay memory; punched cards secondary storage

Machine and assembly languages;

Stored program concept;

mostly scientific applications

Bulky in size Highly unreliable Limited commercial

use and costly Difficult

commercial production

Difficult to use

ENIAC EDVAC EDSAC UNIVAC I IBM 701

2ndGeneration 1955 to 1964 Mile Second

Transistors; magnetic core

memory; magnetic tapes Disks for

secondary storage

Batch operating system;

High-level programming languages;

Scientific and commercial applications

Faster, smaller, more reliable and easier to program than previous generation system

commercial production was still difficult and costly

Honeywell 400

IBM 7030 CDC 1604 UNIVACLA

RC

3rd Generation 1965 to 1974 Micro Second

ICs with SSI and MSI technologies;

larger magnetic core memory;

larger capacity magnetic disks and tapes secondary storage;

Minicomputers upward compatible family of computer

Timesharing operating system;

standardization of high-level programming languages;

Unbundling of software from hardware

Faster, smaller, more reliable, easier and cheaper to produce

Commercially, easier to use, and easier to upgrade than previous generation systems

Scientific, commercial and interactive on-line applications

IBM 360/370

PDP-8 PDP-11 CDC 6600

4th Generation 1975 to 1789 Nano Second

ICs with VLSI technology;

microprocessors; semiconductor memory;

larger capacity hard disks as in-built secondary storage;

magnetic tapes and floppy disks as portable storage media;

Supercomputer

Operating systems for PCs; GUI; multiple windows on a single terminal screen;

UNIX operating system; C programming language;

Object oriented design and programming

PC, network-

Small, affordable, reliable, and easy to use PCs;

More powerful and reliable mainframe systems and super computers

Totally general purpose machines;

Easier to produce commercially

Easier to upgrade Rapid software

development

IBM notebook

Pentium PC SUN

Workstation IBMSP/2 SGI Origin

2000 Apple II,

TRS-80, VAX 9000, CRAY-I, CRAY-2, CRAY-X/M

11

Page 12: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

based on parallel vector processing and symmetric multiprocessing

personal computers;

spread of high-speed computer networks

based, and supercomputing applications;

possible P

5th Generation 1990 to now Pico Second

ICs with ULSI technology;

larger capacity main memory hard disk with RAID support larger

Ooptical disks as portable read-only storage media;

Notebook computers; powerful desktop PCs and workstations;

Powerful servers, supercomputers

The Internet Cluster computing

Micro-kernel based, multithreading, distributed OS

Parallel programming libraries like MPI and PVM

JAVA World Wide

Web multimedia,

Internet applications

Portable computers Powerful, cheaper,

reliable, and easier to use desktop machines;

Powerful supercomputers mainframes

High uptime due to hot-pluggable components

Totally general purpose machines

Easier to produce commercially easier to upgrade

Rapid software development possible

IB notebooks, Pentium PCs, SUN Workstations, IBM SP/2, SGI Origin 2000, PARAM 10000

1.8. Types of computer There are various Types of computer they are classified as follows

i) Volume wise -Super, Mainframe, Mini, Micro computer, Laptop, Palmtopii) Job wise -Digital, Analog, Hydrideiii) Brand wise -IBM,IBM Compatible, Apple/Macintoshiv) Assemble wise -Branded and Assembled

1.9. Computer Architecture (CPU, ALU,CU, Memory) The computer architecture means the physical and functional design of computer. This means the design of any part of the computer system or of an entire system including hardware and software. There are five basic operation of computer system .These are

i. Inputting:-The process of entering data and instruction to the computer system is inputting.

12

Page 13: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

CPUUUUUUUUU

Arithmetic Logic Unit (ALU)

Control Unit

Memory

OutputInput

ii. Storing: - Saving data and instruction to the computer to make them readily available for initial or additional processing whenever required is storing

iii. Processing: - performing arithmetic operation (add, subtract, multiply, divide, etc.) or logical operation (comparison like equal to, less than, greater then, etc.)on data to convert them into useful information is processing.

iv. Out putting:- The process of producing useful information or result user such a printed report or visual display is outputting

v. Controlling:-Directing the manner and sequence in which all of the above operation are perform is controlling.

To perform above function there are corresponding functional unit.i) Input Unit: The computer hardware that accept or receive data and instruction from the user. It performs following function.

1. Accepts (or reads) instruction and data from the user outside world. 2. Converts these instruction data in computer acceptable form.3. Supplies the converted instruction and data to the computer system for further processing.

Keyboard and mouse are the examples of input device ii) Output Unit: The hardware of the computer system which display or give result which is generated by processing of data. It performs following function.

1. Accept the results produce by the internal devices and software, which are in coded form and hence, cannot be easily understood.

2. Convert these coded results to human acceptable (readable) form.3. Supplies the converted results to the user.

Monitor and printer are the examples of output device.iii) Storage Unit: The hardware of the computer system which holds(or stores) the following:

1. Data and instructions required for processing time which are received from input device.

13

Page 14: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

2. Intermediate results of processing.3. Final result processing, before they are released to an output device.

There are primary and secondary storage(memory) units. Primary memory is also known as main

memory.Primary storage

i. Use to hold running program instructions.ii. Used to hold data ,intermediate results ,and result of ongoing processing of job(s)

iii. Fast in operationiv. Small capacityv. Expensive

vi. Volatile (looses data on power dissipation)Secondary storage

i. Use to hold stored program instructions.ii. Used to hold data and information of stored jobs

iii. Slower than primary storage iv. Large capacityv. Lot cheaper than primary storage

vi. Non Volatile (retains data even without)Registers- They are additional storage locations to store data during processing time. They appear in between ALU and CU of CPUAddress- Character storage locations numbers in the main memory like a mail box numbers. Location numbers remains the same but the contents changes continuously.

iv) ALU: The device inside CPU Box which performs Arithmetical & logical calculations. It is the place where the actual execution of instruction takes place during processing/operation. v) Control Unit (CU): The control unit of a computer system manages and coordinates the operation of all other component of the computer system. It is like a nerves system of the body; the whole system sending signal of data program and tells to process data and to store in the right place.vi) Central Processing Unit (CPU): The CU and ALU together constitute a processing unit; It is like brain of a computer system. It is responsible for controlling the operation of all other units of a computer system. It is also called micro processor.

Note: I. ALU+CU=CPU It is a brain of the computer system It is responsible for controlling the operation of all other units of a computer system

II. A system has following three characteristics It has more than one element All element of a system are logically related All elements of a system are controlled in a manner to achieve the system goal

A computer is a system as it comprises of integrated components (input unit, output unit, storage unit, and CPU) that work together to perform the steps called for in the executing program.

14

Page 15: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

1.10. RISC, CISC, EPIC The architecture of CPUs with the small instruction set, fixed length instruction and reduce references to memory to retrieve operands is known as RISC. It is called reduce instruction set computer. The architecture of CPUs with the large instruction set, variable length instruction and a variety of addressing mode is known as CISC. It is called complex instruction set computer. The architecture of CPUs with the emerging technology which includes three key features, explicit parallelism, prediction and speculation is known as EPIC. It is called Explicitly Parallel Instruction Computing.

1.11. Working Speed Units Of The Computer: The working speed of a computer means the speed of its processors. The CU and ALU perform operation at incredible speed. These operations are usually synchronized by the built-in electronic clock (known as system clock) that emits millions of regularly spaced electric pulse per second (known as clock cycles). It is measured in hertz .Hertz means one cycle per second. Normally, several clock cycles required to obtain, decode and execute single program instruction. Hence, the speed at which an instruction is executed is related directly to a computers built-in clock speed which is the number of pulse produce per second. This cock speed is measured in mega hertz, gigahertz. Some examples are

Class CPU Speed Approx year (1970 starting)

INTEL 4004 108 KHz 1970INTEL 8080 2 MHz 1974INTEL 8086/87 5 MHz, 8 MHz and 10 MHz 1976INTEL 8088 4.77 MHz and 8MHz 1979INTEL 20286/87 8 MHz, 10 MHz and 12 MHz 1982INTEL 20386 DX 16 MHz, 20MHz and 25 MHz, 33

MHz1985

INTEL 20386 SX/SL 16 MHz, 20MHz and 25 MHz, 33MHz

1989

INTEL 20486 DX/SX

25 MHz, 33 MHz and 50 MHz 1991

INTEL 20486 DX2 33 MHz and 66 MHz 1992INTEL PENTIUM 60 MHz to 200 MHz 1993INTEL PENTIUM MMX

166 200,233 MHz and 266 MHz 1997

INTEL PENTIUM PRO

166 and higher 1997

INTEL PENTIUM II 233 MHz to 450 MHz 1997INTEL PENTIUM III 500 MHz, 750 MHz 1999

15

Page 16: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

INTEL PENTIUM IV

More than 1.1 GHz up to 2.0 GHz

2000-2007

INTEL Dual Core 2.0 GHz 2008INTEL Core 2 Duo 3.4 GHz 2008

2. Memory Units A device or a media that can accept data holds them and deliver as per demand at a later time is called memory. Every computer has a temporary storage built into the computer hardware. It stores instruction and data of a program mainly when the program is being executed by the CPU.The temporary storage memory is known as main memory or primary memory or simply memory. Physically, it consists of some chips either on the motherboard or on the small circuit board attached to the mother board of a computer. It is volatile and random access property.

Types of main memory:i) Random Access Memory (RAM):The memory in which time to retrieve stored information is independent of the address where it is stored. It is volatile and random access memory.Types of RAMa. Dynamic RAM: Very commonly used RAM. They are refreshed thousand times per sec. They are used

everywhere like in printer.b. Static RAM- Special RAM. They are less often refreshed. They are costly than dynamic RAM.

(Computer writes on COMPASS offer reading ROM)ii) Read Only Memory (ROM): It is non volatile memories chips in which data are stored permanently, and cannot be alerted by programmers .It holds small amount data and displays it during to start computer.iii) PROM: A program strong empty memory chip. Once stored a program, it is permanent. Therefore PROM is non-volatile memory.iv) EPROM (Erasable PROM) - A chip, where the program can be erased by exposing it to ultraviolet light.v) EEPROM (Electrically Erasable PROM): It is special type of EPROM that is Electrically Erasable PROM. It is a chip in which stored information erased by using high voltage of electrical pulse .it is also known as flash memory.

3. Storage Devices:(Auxiliary or Secondary Storage Device)The devices that store data supplements main memory of a computer are called auxiliary or secondary memory. It is generally non volatile memory and used in computer to overcome the limitations of primary storage memory. The operating speed in it is very slow and cost of per bit of storage very low than that of the primary memory. There are two types of secondary storage device.

Types of Auxiliary Storage Device:

16

Page 17: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

i) Sequential Access Device (Tape):It is a device where the data con only be retrieved in the same sequence in which it is stored. The access time varies accorting to the storage location of the information being accessed. The example of this type of device is Tape

Tape (Sequential Type) 60 MB-24 GB

ii) Random Access Device: The storage device in which access to any stored information is direct, and approximately equal access time is required for accessing any information irrespective of its location. Magnetic, Optical and Magneto Optical disks are the the typical examples of such a storage device.

A. Magnetic Diska.Floppy DiskFloppy (Random Access Type) 720 KB-1.44 MB

b. Hard Disk( Zip Disk, Super Disk )i. Zip Disk 100 MB- 250 MB

ii. Jaz Disk (A cartridge) 2GBiii. Super Disk (A cartridge) 120 MB

B. Optical Disk (CD-ROM, CD-R , CD-RW, DVD Drive)i. CD-ROM (A cartridge) (630 MB-1GB) (About 700

floppy;3,000,000 page texts)ii. CD-R(Recordable)(A cartridge) It creates CD-ROM or Audio CDs to

publish. It needs a CD-R software package. It can read CD-R and play Audio CDs.

iii. CD-RW (A cartridge) It is a Re-Writable CD. (Many times rewrite)

It is like a floppy disk of high storage capacity

iv. Digital Video/Versatile It looks same as CD-ROM but has capacity of 4.7 or 8.5 GB

It is also two types DVD-R and DVD-RW

C. Magneto-Optical DriveMagneto-Optical Drive (A cartridge)

It is a special type of disk drive.It can read and write MO-Disk.It stores 200 MB faster than CD-ROM.

D. Pen drive It is a compact device of the size of a pen. It plugs into a USB(Universal

8 MB to 8 GB

17

Page 18: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

StorageMemory

Secondary Storage Backup Storage

Serial Bus) Port of the computer

18

Memory

PrimeMemory

RAM ROMSemi-random

AccessSerial Access

ErasableMemory

PermanentMemory

SRAM

Zero Power Non-volatile

RAM

DRAM

Zero Power Non-volatile

RAM

Disks

Floppy Hard CD-ROM Zip Disk Pen Drive

Magnetic TapesCCD

EPROM EE-PROM Flash Memory

Masked ROMPROM

Page 19: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

4. Input Devices: 5.1. Key Board, Mousea.Keyboard - 101 keys, Alphanumeric key, Punctuation keys, Special keys, Arrow keys, etc.b. Mouse - Curser or Pointer controller, developed in 1963 USA.

5.2. Track Balls, Joysticka. Track Ball - Pointer mover by your palm, or thumb press.b. Joystick - Pointer mover leaver with two buttons (Triggers).

5.3. Scanner - It can read text and pictures to convert it into digitals form and store to print them. It can print 600 dots per inch quality text or Images. There is single color or multiple colored scanners. There are half or full page scanner.

5.4. Digital Camera - It can manipulate, save, delete, and rotate the images. It sends as digitals input files to the computer.

5.5. OMR, MICR, OCR, Bar Code Reader a.Optical Mark Reader (OMR): OMR is also called mark sensing, which is a technology. It can sense the presence or absence of the pencil mark. OMR is used in the aptitude texts.

b. Optical character Reader (OCR): It reads the page of text and converts images into ASC II codes to store into the computer. In the future it can print ditto for the user. All OCR system includes an optical scanner. It enables to take a book and save into a computer file.c.Bar code Reader: Bar code reader is a photoelectric scanner that reads the bar code (Vertical Zebra Striped marks,) printed on the product. In the supermarket, you can find bar codes in ever items.

d. Magnetic ink character Reader (MICR): MICR is direct entry method used in the banks. It is a special type of input device used in ATM.

5.6. Speech Input Devices: It is a type of device that allow a person to input data to a computer system by speaking to it.

5.7.Touch Screen, Touch Pad a. Touch Screen: - It is a type of display screen that has the touch sensitive transparent panel covering the

screen. As a mouse pointer, you can use your finger on screen. b. Touch Pad: - On a portable PC you can find a small touch pad where you can use your finger along the

pad.

5.8. Light Pen, Digitizing tablet

19

Page 20: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

a. Light Pen: - It is special pen, which uses light sensitive defector too select object on the screen display. This pen is also similar to mouse.

b. Digitizing tablet - It is an electronic tablet. A stylus pen is used here to draw pictures and to operate computer. They are called touch tablet

5. Output Devices : There are two types of output device Soft- copy Output and Hard-copy Output device. Monitor and printer are the major soft-copy and hard-copy output device. A) Monitor and Its Types The classification of monitor is as follows:(a) Color wise (i) colored monitor (ii) Monochrome monitor(b) Signal wise (i) Digital monitor (ii) Analog monitor(c) Design wise (i) Box type monitor (CRT): Cathode -ray-tube

(ii) Flat type monitors (LCD): Liquid Crystal Display

a. Characteristics, Size, Bandwidth of a Monitor:-i) Size = 14", 15", 17", 24"ii) Resolution= how densely pixels are packed?For example:-VGA monitor = 640x480 pixels = 300,000 pixelsSVA monitor = 1024x 768 pixels = 800,000 pixelsColored monitor = 24 bits per pixels = 16 million colorHigh and monitor = 1600x1200 pixels = 2,000,000 pixels

B) Printer and its Types: The most common output device for producing hard-copy output is a printer. They can also classified asa. Impact printer: uses letter headed hammer, ink ribbon, paper : Dot matrix & Line printer, Drum,

Chain /Band printer b. Non- impact printer- Ink-jet, Laser, LCD printer, Thermal printeri) Ink jet printer- Ionized ink spray, qualify print, diff. fonts.ii) Laser printer - Utilizes a laser beam to produce image on the drum. 1200-2400 dpi quality.iii) LCD & Led printer - Uses liquid crystal to produce image. Uses light emitting diodes produce image.iv) Line printers - It is a high speed printer 3000 lines/min. It can print only font. No pictures.v) Thermal printer - Produces images by trashing electrically heated pins against special paper.vi) Plotters - It draws only pictures using pen with continuous lines. Multi color plotters use different colored pens. They are used in the engineering applications.vii)Sound cards & speakers - Sound card is compulsory in the modem computers where speakers are used. Sound card enables the computer to output sound, to record input from a microphone connected to the computer and manipulate sound stored on a disk. Sound card translate digital data into analog sounds.

20

Page 21: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

6. Computer Software:6.1 Introduction, Software is the computer program. A program is the set of logical instructions given to a computer to perform a certain task. All the logical components and the programs are called the software. So software is an instruction that given to the computer. Computer software means instructions or data, which are electronically stored on the storage device. Software is mainly classified into two types.

A) System software : The software required executing users program is known as system software. It helps to improve the interface between the user and the computer. It includes operating system and utilities software that enables computer to functions. Computer cannot be operated without system software. The system software includes;

- Operating system- Language processors (assemblers, compilers, debugged) and - Utility programs

B)Application software : The software, which is used to perform specific job, is called application software. This software is available for applications, which are common to many users and organizations. It includes programs, which do real job for the user. An application program is a computer program which installed on computers to give users ability to do specific task. For examples word processing, spreadsheet, DBMS and other end user made programs. There various types of application software/program.

i) Operating System (OS):- It is a must to run a computer. OS performs basic tasks like recognizing impact from keyboard, sending output to display screen, keeping tracks o files and directories on the disk. Most commonly used OS are MS-Windows, DOS, XENIX, Mac OS, OS/2, UNIX, MVS etc. There are single user and multi-user operating systems.

21

Page 22: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

ii) Language processors: the program translated by the language processor is understood by the hardware of the computer. It translates the program written in a programming language into an executable program. These are

Compilers: Compiler is a program which converts source code into object code after looking whole part of the source code all at a time.

Interpreters: Interpreter is a program which converts source code into object code line by line. The advantage of the interpreters is that they can execute a program immediately. Some time compiler and interpreters are called language translator programs.

Debugged: Debugged is a program which helps to find the error/mistake to the program when the source code or program is compiling or execute by the compiler.

iii) Utilities: - the software that provides additional facilities to the user is called utility program. It performs very specific tasks, usually related to managing disk drives, printers and other devices, sorting or margin is done. A call up programs by OS. Transferring data from one I/O devices to another. Disk repair, data copy, data move, virus scan etc are utility program

Some examples of application software/ package : i) Word processing: - Creating, editing, formatting, previewing coloring line text, designing, tabulating

saving, deleting and coping line text. Users do disk top publishing using it.ii) Spreadsheet: - Creating, editing, formatting line mathematical tables in rows and columns. Using

arithmetical, algebraically, statistical, logical and graphical text documents. Users are the facilities here.iii) Database Management System (DBMS):- It is a collection of record programs. Inserting, deleting,

copying, updating and saving the records are the facilities here.iv) Image processing: - It is a set of programs, which performs graphical pictures and animations. It has

different facilities like enlarging rotating, coloring, zooming and many more.v) Engineering Designing Software: - CAL, CAI, CAD, etc. Computer Aided Designing (CAD) is a set o

programs, which performs engineering calculations, picture designs, simulations and others.vi) Accounting software: - It helps to solve the problems of the accountant. It is use to account keeping

properly having many facilities. Accounting package, Repackage and Tally are the examples of the accounting software.

vii)Statistical software: - It is a collection of programs which performs the statistical activities. It is a kind of powerful statistical tool. SPSS and microstate are the good examples.

viii) Any other tailor made software: - Locally made any type of software for any type of local institutes.

C)Human ware:- To run above computer hardware and software and the whole computer system in the big organization, the different types of the technical personals are needed. Their types and post names are as given below. It is called human ware.

i. Data Entry Operator - Non officer

22

Page 23: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

ii. Data Coder - Non officeriii. Data Supervisor - Non officeriv. Data Administrator - Officerv. Programmer - Officer

vi. System Analyst - Officervii. System Designer - Officer

viii. Computer System Engineer - Officerix. Hardware Engineer - Officerx. Maintenance Engineer - Officer

xi. Networking Engineer - Officerxii. Computer Operator - Non officer

xiii. Computer Instructor - Officerxiv. Computer Consultants - Officer

6. Operating System(OS): 7.1. Introduction OS

Operating System is the base program on a computer.  It tells the computer how to work or operate.  The operating system also allows us to load other programs that do specialized tasks on to our computer. It is an organized set of programs that control the overall operation of the computer system. It can interact between the computer hardware and software, and the user. The operating system is the core software component of our computer. It performs many functions and is, in very basic term, and interface between computer and the outside world. In the section about hardware, a computer is described as consisting of several component parts including monitor, keyboard, mouse, and other parts. The operating system provides an interface to these parts using what is referred to as “drivers”. This is why sometimes when you install a new printer or other piece of hardware, your system will ask you to install more software called a driver.

7.2. What does a driver do? A driver is a specially written program which understands the operation of the device it interfaces to, such as printer, video card sound card or CD ROM drive. It translates commands from the operating system or user into commands understood by the component computer part it interfaces with. It also translates responses from the component computer part back to responses that can be understood by the operating system, application program, or user. The below diagram gives a graphical depiction of the interfaces between the operating system and the computer component;

23

Page 24: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

7.3. Functions Of The OS

i) Job Management– To keep processing jobs in sequence, determining main memory, secondary storage capability and their timing.ii) Batch Processing -Any big jobs are classified and grouped in some order, Batch wise they can be processed. For example number wise or alphabetical wise or VDC wise or district wise, etc.iii) Data Management – Data can be edited, updated and saved in any storage device. It can be retrieved and stored at any time any data.iv) Virtual Storage – Some OS have a feature called virtual storage. Such OS can increase the capacity of the main memory without increasing its size, during processing time, when it is necessary.v) I/O Management – For the smooth input data flow to the CPU and output data flow from the CPU, it can manage. In the big computer system also OS can handle very carefully and accurately. It can stop to handle the data to the unauthorized persons, so it can save data from the less.

7.4. Classification of the OS: Classifications of the OS are as follows

i) Multi user: - Any OS, at the same time if more than user can use the OS that is called multi user OS. Some OS permits hundreds or thousands o your to use concurrently. The OS called MVS for the main frame and UNIX for the minicomputer are the multi user OS.ii) Multi processing: - Multi processing OS permits many users to use different programs at the same time. MVS and UNIX are two examples used as multi processing OS. Multi processing OS is more complicated than single process systems. Multi processing also refers to the utilizing of multiple CPU in a single computer system called parallel processing.iii) Multi tasking:- Multi tasking permits more than one program to run currently. In multi tasking, only one CPU is involved, but it switches from one program to another so that it gives the appearance. Executing all the programs concurrently. There are two types of multi taskingi) Preemptive - CPU time slices to each program.ii) Co-operative - Each program controls CPU as needed. If the program is not using CPU, however, it can allow another program to us it temporally. OS/2, Windows 95, Windows NT, Amiga and UNIX use preemptive multi tasking. But MS-Windows 3.x and the Multi Finder use co-operative multitasking.

24

Page 25: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

iv) Multi threading:- Multi threading allows different parts of a single program to run currently. If is a ability of an operating system to execute different parts of a program called threads simultaneously, without interfering with each other.v) Real time:- Real time system is an interactive processing system with severe time limitation. Several stations (PC's) can operate a database at the same time. The central input file are updated each time and inquires are answered correctly. Hotel reservation, Air lines ticket reservation and Car rental are the examples of real time system. But DOS and UNIX is not the examples real time system.

7. Programming Languages: 7.1. Introduction

The language which is used to expressed algorithm in computer understandable form or to make a program in computer is called programming language. In brief Programming language means a computer language. The broad classifications of programming languages are Machine Language, Assembly Language, and High-Level Language.

7.2. Machine Language: The language which is written as strings of binary 1s and 0s.It understood by the computer without using a translator. This is basically based at binary system like (On/OF), (Yes/No), (True/False), (Right/ wrong) and (1,0) etc. About 50/60 years back, the computers like ENIAC had used the language only by many switches ON/OFF. There were about 6000 switches for a single program. For the next program the switches had to reset. A process that might take weeks. Thus the programming were like 11110101, 11010011 00011010 etc. This was very tedious such language is called machine language.Note: Machine language is also kwon as 1st generation language.

7.3. Assembly Language: The language that using alphanumeric mnemonic codes instead of numeric codes for the instructions in the instruction set e.g using ADD instead of 1110(binary) or 14(decimal) for instruction to add. To reduce programming complexity and provide some standardization, assembly languages were developed in 1950. It is known as assembly or symbolic language use abbreviation or mnemonic code like. PACK 210(8, 13), O2B (4, 7) When we provide such assembly language command to the compute, it converts into machine language then it performs the job.

Note: 1. Assembly language is also kwon as 2nd generation language. 2. The Machine language and assembly language are known as low-level language.

7.4. High-Level Language:The language which is similar to broken English language and independent to the machine language is called High-Level language. In this language the programmer need not know anything about the internal structure of computer on which high-level language program will be execute. It is written in high-level coding or writing instructions by using English words and familiar mathematical symbol and expression. COBOL, C, C++, C#, Pascal, FORTRAN are some examples of high level language.

25

Page 26: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Note: High level language are classified as third, fourth and fifth generation language.

7.4.1. Types of High-Level Language:

a) Procedural – oriented - 3rd generation computer languageb) Problem- oriented - 4th generation computer languagec) Nature - 5th generation computer language

a) Procedural-oriented language: - General-purpose programming language like BASIC, PASCAL, COBOL and FOTRAN are called procedural-oriented language. They are designed to express the logic and procedure of the problem. All of them are called high level programming language or third generation language.

Advantages of the procedural oriented language i) Program statements are very similarly to English languageii) Very easy to write program.iii) Less time consuming to write program.iv) Easier to understand and edit.v) The programming languages are machine independents.

Disadvantages i) Program takes long time to execute.ii) The programming language does not look active.

a) Problem oriented language:- The fourth generation languages are called problem oriented language. They are high level language, which are used designed to solve specific problems like word processing, spreadsheet, database management system package program, etc. The fourth generation languages also are used to develop application tools as follows.

i. Personal computer application softwareii. Query language and report generator

iii. Design support systems and financial planning languageiv. Application generators.

i) Personal computer application software:It means word processor, spreadsheet, DBMS, graphics, integrated packages, PowerPoint and other tailor-made

ii) Query language and report generator:It means query language allows people who are non programmer to search database using certain selection

commands. For example, Airlines ticket reservation, Room booking in hostel, MIS, School information system etc. Report generators are designed for people needing to prepare their reports easily, e.g.-QBE, SQL, HAL, Answer/Database, Data retrieve etc.iii) Design support systems and financial planning language:

Decision support system (DSS) is made for managers or chief Execution officers to take decisions. Financial planning languages are also a kind of decision support system, that are employed or mathematical statistical and forecasting procedures.

26

Page 27: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Example: - Macro Stat, SPSS, Accounting packages, Metaphor, STRATAGEM, etc.iii) Application generators:

Application generators are a collection of set of program modules, preprogrammed for different jobs. A non programmer uses this required report. Example the user inters his pass word and unique account code numbers, presenters as in ATM machine to get money.

There are other examples of application generators as: FOCUS, FUSION, SAS, SYSTEM, LINE II, RADID/3000 etc.

Different between 3GLs and 4GLs.

S.No

Third-generation language Fourth generation language

1. Use by programmer. Use by non-programmer.2. Requires specification of how to perform

task.Requires specification of what task is to be performs.

3. All alternatives must be specified Default alternatives are built in.4. Requires large number of procedural

instructions.Requires few instructions.

5. Code is difficult to read, understand and maintain.

Code is easy to understand because of English-like commands.

6. Language for batch operation. Language developed for on-line use.7. Difficult to learn. Easy to learn.8. Difficult to debug. Easy to debug.9. Typically file oriented. Typically database oriented.

v) Natural Languages: There are still in developing stage. They will be using in AI and expert systems. They have two characteristics.

i) More human like speakingii) More smarter with remembering capacity.There popular natural languages are LISP and PROLOG.

7.4.2. Assembler, Translators, Complier, Interpreters, Linker : A. Assembler

A computer program that translates an assembly language program to its machine language equivalent is called assembler.

B. TranslatorHigh level programming language to work on the computer it must be translated into machine language. There are two types of translators like.

i. Compiler: A translator program (software package) that translates a high-level language program into its equivalent machine language program is called compiler. In brief it reads whole program and converts it into machine language.Complier translates the whole program into machine language all at a time.

27

Page 28: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

The translation processor is called compilation. The programmer’s program is called source code but its machine language code is called object code.

ii. Interpreters: A language processor that translates a statement of high-level language, and immediately executes it before translating the next source language statement is called interpreter. In brief it reads a line and converts into machine language; one statement at a time. Interpreters translate each program statement into machine code just before the program statement is to be executed. This process continues till whole process completes. But compiler language is better than interpreted language as they can be executed later. Complier is used in COBOL, C, C++ and FORTRAN. On the other hand interpreter language in BASIC programming. Interpreter do not need object code and so usually easier to develop. (i.e. to code &test). Thus, there are code complier, C compiler and BASIC Interpreter.

C. Linker: A program that is used to properly combine all objects program files (modules) of a software, and to convert them into software’s final executable form is called linker.

The Compilation Process:Source files are complied into object files, then through linkers object files using routine libraries it produces executable programs. Thus object codes pass through linkers. The linker combines modules and gives real values to all symbolic address.Hence, the linker translates object files into executables program files.

8. General Software Features &Trends: 9.1 IntroductionWe know the series of instructions that performs a particular task in the computer is called a program. There are two categories of programs like system software and application software.

A system software means combination of operating system, control program, database management and communication software. An application, software means any program that processes the data for the user. In short, the software tells hardware how to process the data.

At present, in the world software projects are becoming more and more complex in size, sophistication, and technologies used. Now most software products manage to millions of users in different

28

Page 29: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

shape and size. For example word processors, ERP packages and SCM tools, which run mainframes and client server systems; different versions of web browsers for the PC and MAC; we have DBMS that run on MVS, UNIX, Windows NT, Linux and so on. The competition and the advancements in technology are driving software.

Now computer and communication are becoming integral part of our lives. The driving force behind all these advancement is the computer software. They are becoming more and more complex. For example, the software is being used in controlling satellites, operating. Intercontinental, Ballistic Missiles, running banks, hospitals, airlines, hostels, etc, including door locking system and robotics.

Software may communicate via internet, using e-mail or videoconferencing technologies. Thus its development is in advance and changing very fast. Now the general software features are given below.

i) Easy to Use:Presently, most of the software companies are producing more and more user’s friendly, software's.

The software developers are developing the software’s including facilities like user's interface, displaying error message, self leaning type etc. Thus software are becoming easier to use,

ii) Graphical User Interface (GUI):Now-a-days interface, most of the software applications are graphical user interface (GUI) brand. That is software's are self learning type, which are very easier to use. In the software, there will be self guided dialog box. Most of the tasks could be performed by mouse click. This almost software guided uses using icons, dialog boxes and other graphical elements.

iii) More Features:In order to service the software companies they have to be constantly innovative and be always ahead of the competition. So they are producing better producers for the end-users. That means new software will be coded by more features at affordable price. Micro-soft companies products could be the good examples for the more features in the new products every year.

iv) Requirement Of The Powerful Hardware:As you know, as the facilities are increasing in the software, it wants more and more advanced computers. About 10 years back there were 386 types of machines which can run only Windows95. Now-a-days users are running Windows XP on Pentium IV computers. Hence the new software wants more and more powerful computers. Otherwise the new software will not be able to run.

v) Multi-Platform Capability:Now-a-days, most of the application software supports multiplatform both hardware and software platforms. There are software applications that support hardware platforms from PCs to mainframe and different software platforms like windows to UNIX, AIX, Solaris and MVS. Similarly other important feature of today's application software is that they support in many languages like Japanese, Arabic, Chinese and English. Likewise they support different national currencies too.

29

Page 30: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

vi) Network Capabilities:As the popularity of computers network increase, the demand of software that can run on the computers connected on the network are increasing. The idea behind network computers is that many users who are connected to a network do not need all the computer power they get from a typical personal computer. Instead they can rely on the power of network server.

vii) Compatibility With Other Software:There are many software companies in the world market. Software vendors are battling for the market share. It means that the users will get better products. To make salable software, vendors are making their software compatible with other competitors. For example, you can import WordPerfect documents, text documents, and HTML documents and so on into a MS-word document. Almost all vendors practice this technique to stay and service in the business. Similarly, most of the vendors maintain compatibility with easier version, as they release the new version. For example Ms-word 2000 supports all previous versions words, word97, and word95.

viii) Object Linking And Embedding:While you are working in MS-word, you can open and link MS-Excel. If you want you can import a table and a graphical picture from MS-Excel to your word document. To call a table and a picture from external software to the running software is called linked and embedded object. Thus Micro soft company has developed a method to integrate external tool into an application using the Object Linking and Embedding (OLE) architecture. Now OLE is a compound document. If enables you to create objects with one application and then link or embed them in a second application changes made to the embedded object effort only the document that contents it. Support for OLE is built into the Windows and Macintosh Operating System. This embedding and linking of components enables applications to share components.

ix) Group Work Capabilities:To work in a group using computer terminals sharing files, software tools and facilities of the common file server are called group-ware and work flow automation. In another word groupware is an umbrella term describing the electronic technologies that support person-to-person collaboration. Groupware includes E-mail, Electronic Meeting System (EMS), Desktop Video Conferencing (DVC) as well as systems for work flow and Business Process Reengineering (BPR).To-day software vendors are integrating collaboration technologies into their products. Groupware maximizes human interaction while minimizing technologies interference. The term 'Groupware' and ‘Collaborative Computing' are often used interchangeably when in fact they are different. Groupware is basically a subset of collaborative computing. Collaborative computing refers to the technology that is hardware, software and structures that support group working.

x) Mail Enabling:As you know windows program has a "Send" command and windows 2000 has a "Send to" command in its "File Menu". If you choose and click on "Send to" command of File Menu you will find mail recipient menu,

30

Page 31: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Fax recipient, etc. When you click on mail recipient, then the document will be sent as an attachment using your default e-mail client to the address you specify. This is the new facilities added to the application software. This is an example of the advanced and more sophisticated mail enabled applications software. Mail enabled applications are designed to capitalize on e-mail.

xi) Web Enabling:As you know to-day most of the information are available in the internet. Therefore software vendors are adding the facilities into their product to link the internet and down load the required information. Most software applications are now web-enabled. During installation, most of the applications will automatically connect to the internet and to the vender's web site and will register their products.For example, Word 2000 can now connect to the Microsoft's website and get clipart new images if the user wants to put in his computer, thus the options available to the user are more now. In the future also they will have more and more web enabling facilities in the new software.

.9. Data Processing:

9.1. Introduction,The Data is a collection of facts or observations in unorganized form but able to be organized into useful information. It may be any words, numerical numbers, codes or any mixture of numerical numbers and alphabets. It could be voice, text, images or any numeric data too. Data means a file of records of raw facts. Record means a set of fields. Data processing means the processing of data to make it more usable and meaningful information. It means to collect, manipulate and organize the data in a logical order. It analyzed, evaluated and placed it into a proper order for the end user. Thus the raw data is manipulated by calculating, sorting, comparing, classifying and summarizing to convert into the required information. Data processing is a series of actions or operations that convert data into useful information .It include resource such as people, procedures, and devices used to process input data for producing desirable output.

9.2. Data Versus Information,Data is a collection of facts or instruction received from input device of the in raw form and the information means the refinement of data after proper processing and organization .In fact anything which is received/accept from input device of the computer is called data and after suitable processing and organization it becomes information. These are relative terms also any information will become data for another purpose or another task. Information in one purpose becomes data for another purpose. For example the result of +2 level is a information for those student who appear in the board examination but this will become data for those person/researcher who want to analyze this result for the improvement of examination system in this level 9.3. Standard Method of Organizing DataThere are two standard methods of organizing data:a) File –Oriented Method /File Management Method b) Database–Oriented Method /Database Management Method

31

Page 32: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

a. File –Oriented Method /File Management Method: - After collection data, it is kept in separate files. Collected data is organized into one or more files and application program processes them to generate the desired output. This process is called file management or file oriented method. A file management system supports following file types

i. Transaction file: Store input data until it can be processed.ii. Master file: Contains all current data relevant to an application.

iii. Output file:Stores output produced by one program that is used as input to another program.iv. Report file:Holds a copy of a report generated by an application.v. Backup file:Copy of a file, created as a safety precaution against lost of data.

The method of keeping file also divided into two categories like sequential and direct access.

i) Sequential Method: The collected data are stored one after another in ascending or descending order determined by the value of the key field of the records. The tape is in a sequence order. If such data is managed in this method that is called sequential data management or sequential file method. Some time there will be group wise data collection (batch wise e.g. district wise or date wise or others) in the different files. Those data files will be merged into a file. Then the master file will be sorted in some sequence and lastly processed it. This type of processing is called sequential file processing.

ii) Direct- Access Method: - The data can have direct access in a file stored in a tape. But except tape it has direct access into the data stored floppy disk, hard disk or compact disk (CD).For the direct access file management, the data file must be organized for the direct access that means the data file must be created in the floppy or hard disk or CD with some unique codes or index numbers.

b. Database–Oriented Method /Database Management Method: A database means a self describing collection of integrated records. Most of the databases contain a directory of its contents. It can contain multiple related files. A file means a collection of records. A record consists of different fields. User defines data fields and makes entry of fields into records. Then they combine records to a file. Now users can manipulate and retrieve stored data in database in various ways to prepare reports and collect certain desired information arranged in some order.The database-oriented method facilitates data from multiple related files are integrated together to form a database: It provides greater query flexibilityIt reduce data redundancyIt solve data integrity (inconsistency) problemIt makes data independent of the application programsIt includes data security features at database level, record level, and field level.

The data of one file is related to the data of another file through the use of common field. The database management packages have also data manipulating and data analyzing capability. It can also produce graphs from data in the database. All these activities are called database management.

A number of database management packages are available such as dBASE, ORACLE, UNIFY, FOXBASE, SAYBASE and INFORMIX, etc. In database processing the database management system (DBMS) acts as an intermediary between user and the database.

10. Database Management System: 14.15.16.

32

Page 33: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

17.18.19.20.

10.1. Introduction Information is the most important resource of the organization or knowledge. It helps managers to make right decision for the future planning of the organization. Data, images, texts, documents and voice can be an input data to convert into information. The user receives the information and then makes a decision and takes an action. Information is power. 10.2. Quality Of Information : In any aspect the quality of information must be maintained. That means, the information must be accurate, timely and relevant.I. Accuracy:Accuracy of information means error free information.

II. Time Lines:Timelines means that the user can get the information when they need it. In fact it is prompt.

III. Relevancy:Relevancy means the use of a piece of information for a particular person. It is very subjective and personal matter. Information relevant for a one person may not be relevant or useful for another.10.3. Database

An organization of data in usable form to the user is called database. In other word a database is an organized collection of related information about particular subject or purpose. For example, to create a database of a library it is designed in such a fashion that the user can find out the price wise, edition wise, author wise or publication wise etc. at any time. In computer a database is also like a box containing index cards. The only difference is that instead of index cards, a computer database is filled with records. While each index cards in a box contains information’s written in many lines, a record in a database contains all the information related to an item in just one line. Information in a database is stored in rows (records) and columns (fields) in a sequence of unique number.

10.4. Database Management SystemIn database–oriented approach of organizing data, a set of programs is provided to facilitate users in organizing,

creating, deleting updating, and manipulating data in a database all these programs together form a Database Management System (DBMS).In another words DBMS is a set of programs or software which provides services for accessing a database, while maintaining all the required features of the data. Hence DBMS is software that creates, manages, protects, and provides access to a database. Some of the major services of a DBMS are as given below. (i) Transaction Management

A transaction of data means creating, updating, deleting one record or modifying a set of records in sequence. Similarly transaction processing means daily processing of records in sequence. For example any accountant officer users computer for entering new records steps by steps and processor it accordingly

(ii) Security Management DBMS can make sure that only authorized users are given access to the data in the database. This is called

the security management or a protection of a database from the unauthorized persons.(iii)Recovery Management

33

Page 34: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Recovery management is a facility used in the DBMS. Recovery mechanisms in a DBMS make sure that the database is returned to a consistent state after a transaction fails or aborts. For example a DBMS, if a record is incomplete or damaged the program skips it and does process again during processing time.

(iv) Programming InterfaceThe DBMS provides support programming languages used for the definition and manipulation of the data in the

database. The data structures are created using the data definition language commands. The data manipulation is done using the data manipulation command. This is the example of language interface management of the DBMS.

(v) Concurrency Control/managementConcurrency management means co-coordinating the actions of database manipulations concurrently in the shared

data during data processing. For example if one user manipulates a record, the effect is distributed in the other shared records too.

(vi) Storage ManagerThe DBMS provides a facility of permanently storing of the data. The storage manager interfaces with the operating system to access the physical storage. The internal schema defines how the data should be stored by the storage management mechanism.

(vii) Data CatalogsIn any type of DBMS there is a data catalog system. Data catalog or Data Dictionary is a system database that contains the descriptions of data in the database. It contains information about data, relationship, constrains and the entire schema that organize these features into a unified database.

(viii) Application

Services provided by a DBMS

10.5. Why DBMS? A DBMS provides a secure and survivable medium for the permanent storage and retrieval of data. It can provide many facilities like transaction processing, programming interface, security management, recovery management, concurrency management and storage management, etc. DBMS is very easy to use, access and manipulate the data in the database.

As we know, database is an organized collection of related data. It is an integrated collection of records which contains different fields like name, address and telephone number. The telephone directory could be a simple

34

Page 35: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

example to answer this question. The user Mr. A can use this database for finding telephone number of a particular person or Mr. B can use it for finding a person’s name of a particular telephone number and third user Mr. C can use the same diary to find a list of similar names and their telephone numbers within the same city code. Thus a telephone diary (a database) could be used in three ways or more. Therefore the database is created to fulfill user’s need for different purpose.

Similarly from a database of a library file, the user can find the list of books like edition wise, publisher wise, subject wise, or writer wise etc. But to find these four lists, the user must needs to process the database four times. Therefore, to run a database there must be software and a system to arrange the records within the database. Such system software is called database management system (DBMS). Without this software, if somebody creates the database, there will be many problems during the database preparation. The problems may be as follows until a final database is prepared.

Types of problems in creating a database:(i) Data repetition(ii) Data inconsistency(iii) Data security to maintain(iv) Wrong coding within the range(v) Wrongly entered data(vi) Data sharing may not be possible(vi) Data lost etc.

At last, the user prepares a final error free and clean database after facing all the above mentioned problems. Then the characters of the data in a database should be as follows.

I. Shared - Among different users, the data in a database can be shared.II. Security - The data of the database is totally secured from the unauthorized persons.

III. Consistency - The data of the database is maintained the consistency.IV. Validity/ Correctness - The data of the database is error free. Using all the methods all the

errors is already deleted.10.6. Type Of Database Management System:

There are five types of the database management system like (i) Hierarchical (ii) Network (iii) Relational (iv) Object oriented and (v) Deductive. These are the five DBMS models, which are running in the world markets at present.

i) Hierarchical Hierarchical Model is running since 1950 AD. It is an oldest DBMS Model. It assumes that a tree structure is

the most frequently occurring relationship. This assumption is recognized today a misleading.For example, hierarchical model is similar to company’s organizational structure. At the top we have GM.

Under him there are 2, 3 deputy general managers (DGM). Just below DGM there are 6,7 department heads and so-on. Here the row position implies the relationship to each other from top to bottom. It looks like a tree structure.

ii) Network To-day, the hierarchical model is replaced by Network model. The Network model can be used in a book

distributor as an example. A book can have many attributes like Title, Author, Publisher, Year of publication, distributor, cost etc. Similarly on the other hand, a distributor can have attributes like Name, Contact address, Discount and others. We can use these both examples in the network model.

iii) Relational ModelA relational database organizes data in a table format consisting or related rows and columns. Each location

in a table contains a single piece of data, known as data item. Each column of a table represents a field, which consists of data items. A full set of data in any given row is called a record. The whole related records makeup a

35

Page 36: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

file. In a relational database a file is also called a relation. The relational model uses the rows and columns of tables to organize the data elements. The relational model is currently the most popular database mode.

iv) Object orientedv) Deductive

11. Introduction To Telecommunication 11.1. Introduction

The transmission of data to the long range through different media (web, cable, satellite, etc) is known as telecommunication. It refers to all types of data transmission. It may be sound, video, text; etc whatever may be that is acceptable to sender (transmitter) and receiver.11.2. Analog & Digital Signals

The data are transmitted either in analog or digital form .An analog form means the electrical signals that propagate (transmit ) in the form of continuous wave or graph is called analog signal. The data which transmit by means of discrete representation or numerical representation is called digital signals. Most of the analog signal can be simulated digitally and digital signal are in analog signal.

11.3. ModulationTo carry the audio signals, a high frequency carrier wave is used .The process of changing some characteristics (amplitude, frequency or phase) of carrier wave in accordance with the intensity of the signal is known as modulation. In brief modulation means to change; In modulation some characteristics of the carrier wave are changed in accordance with the intensity (amplitude) of the signals. The resultant wave is called the modulation wave or radio wave and contains the audio signals. Therefore, modulation permits the transmission to occur at high frequencies where it simultaneously allows the carrier of the audio signals.

11.4. Types of Modulation The modulation is process of changing of amplifier or frequency. There are three types of modulation.

A. Amplitude modulation (AM)When the amplitude of the high frequency carries wave is changed in accordance with intensifies of the signal, it is called amplitude modulation (AM). In the case of amplitude modulationA. The amplitude of the carrier wave changes according to the intensify of the signalB. The amplitude variation of the carrier wave is at the single frequency.C. The frequency of the amplitude modulated wave remains the same carrier frequency.

B. Frequency Modulation(FM)When the frequency of the carrier wave is changed in accordance with the intensity of the signal, it is called Frequency Modulation .In frequency modulation, only the frequency of the carrier wave is changed. However the amplitude of the modulation wave remains the same.The frequency modulation has following properties:

36

Page 37: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

A. It produces noiseless reception. Noise is a form of amplitude vibrations and FM receivers reject such signals.B. Opening range is quite large.C. It gives high fidelity reception.D. The efficiency of transmission is very high.

C. Phase Modulation (PM)Phase modulation is changed in the carrier phase angle .The Phase cannot change without effecting the change in frequency. Therefore phase modulation is in reality a second form of frequency modulation.

12. Computer Network 12.1. Introduction

A chain of interconnecting two or more the two computer for transmission of data and is known as computer network. A network is a way to connect computers for communication, data exchange and resource sharing. We can see in the computer networking in business organization like bank, shopping center, corporate office, academic institution,etc. The main purpose of computer networking is to share data to each other. If there is main or master computer which share the data to other computers then this computer known as server and client or node to the rest computer.

12.2. Overview Of Network In general a communication network means any arrangement, where a sender transmits a message to a reviver over a channel consisting of some types of medium. It maybe in office room, one building, local area or wide range. For communication network we need five basic components as follows.

i. Computerii. Communication channel or media

iii. Communication processoriv. Communication software v. Terminals

12.3. Communication Media The media over which, data are transmitted and received are called communication channels. In other words the media or channels that are used to transmit data is said to be communication media. For telecommunication there are different types of channels or media such as copper wire, co-axial cables, fiber optical cable, micro wave system and communication satellite system to inter connect to other devices of a network.

12.4. Communication Processor The device which helps to transmit and received data between terminals is called communication processor. In other words it is a processing unit that coordinates network and data communication. Within a computer network, it ensures that data flows to and from different computer systems correctly and efficiently.

37

Page 38: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

It is also a kind of simple CPU processor. It includes modem, message switchers, multiplexers, front-end processor.

12.5. Communication Software,The software that enables transfer of data and programs from one computer system to another in a network of computers. It is main part communication network .Communication software’s are store in the host computer in the front end computer s and other communication processor. In a large computer networks communication software package is called teleprocessing (TP).

12.6. Terminals Terminals means a set of computer including video display terminals and other end user work stations .Any Input/ Output device that uses a network to transmit or receive data is a terminals this includes micro computers, telephone fax machine ,etc.No matter how large and complex the real world networks may appear to be, the above five basic categories of component must be at work to support a network.

12.7. Types of Network There are mainly two types of networks.

I. Local –Area Network (LAN)A computer network interconnecting computers and other peripheral devices within a limited geographical area is called local area network (LAN).They are in same room or floor or a same building etc.

II. Wide –Area Network (WAN)A computer network interconnecting computers spread over a large geographical area is called wide area network (WAN).They are connected by telephone lines or radio waves; they are geographically apart, like in the different buildings, cities or countries.

12.8. Network ProtocolA set of rules and procedure established to interconnect and communicate between computers is called network protocol. It provides the method for orderly and efficient exchange of data by establishing rules for proper interpretation of controls and data transmitted as raw bits and bytes. In other words a network protocols is a set of rules for the exchange of data between two or more than two computers. Protocols are handled by software related to the network.

The international standards organization (ISO) based in Geneva Switzerland, has define a set of protocols called Open System Interconnection (OSI)model.OSI model has been endorsed by the United Nations. The protocols determine the following points. The type of error checking to be used. Data compression method ,if any How the sending device will indicate that it has finished sending a message. How the receiving device will indicate that it has received message.

38

Page 39: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

The protocol can be implemented either in hardware or software. Some of the popular protocols are TCP/IP, HTTP, FTP, SMTP, POP, Token Ring, Ethernet, Modem, Kermit, MNP etc. These are the examples of the standard protocols.

12.9. Network Architecture . A method or system of communicating data to the computers in a networking system is called Network Architecture; that is how the data are sent and received in networking system .It is either peer to peer or client/ server architecture .

I. Peer to peer Architecture The architecture in which all computers are in peer-to peer arrangement, they are in equal status, no one is in control is known as Peer to Peer Architecture. In this architecture each computer will distributes all files and peripheral devices facilities across several computers working in LAN. They share each other’s data and devices as and when needed. The main disadvantage is lack of speed in the most peer to peer networks system. This system slow down under heavy use of terminals.

II. Client/server Architecture The architecture in which one computer serve as a master computer called server; it controls the networks and rest of the computer received and sent data to this computer called client or node is known as client/server architecture .in particular, a server has the hard disk holding shared files and often has the highest quality printers, which can be used by all the nodes. Under this architecture processing is usually done by the server and only the results are sent to the client or node .sometimes the server is called file server and the client is called workstation. Server is stronger the node/client.

12.10. Network Topology The structure of interconnecting of nodes of a computer networking is called network topology. It is the inter-connection pattern of the network or geographical arrangements of a computer system .There are various types of networks. Some of them area. Star TopologyThe networking topology in which one or more computers or peripheral devices are connected to the host computer or CPU is called star topology. In fact the each client /node is connected to the server in center it looks as a star so it is called star topology. This system is frequently used everywhere, in this system several users are able to share a control processor and time sharing system.b. Ring Topology The networking topology in which two or more than two computers are connected one to one in a simple and closed ring is called ring topology. In other words all the computers or nodes are connected in a closed loop. Message travel around a ring, with each node reading those messages addressed in it. Access and control of ring networks are typically maintained by a “token passing” system. c. Bus TopologyThe networking topology in which all client/nodes are connected in a single communication cable. In other words the data are passing through server to client is highway and each nodes are station of this topology. Access and control of bus networks are typically maintained by a method called CONTIENTION

13. Communication System:

39

Page 40: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

13.1. INTRODUCTION Communication is the transmission of data from one computer to another, one place to another or from one device to another. A communication device, is any machine that assists data transmission. For example, Radio, TV, Satellites, etc are all communication device.13.2. Radio and TV

RadioA radio is a receiver, which contains an input circuit for tuning into the frequencies of different transmitters

to be received, a demodulation circuits for separating audio frequencies from the high-frequency carrier waves, a low frequency amplifier stage, and a loud speaker. A radio contains a device to receive long waves 9150-285KHz), Medium waves (up to 1605 KHz), short waves (6-21.4MHz), and ultra-short waves (up to 100 MHz). Long, medium and short wave reception function with a channel spacing of 9 KHz and with amplitude modulation (AM). The channel spacing in the ultra-short wave range is 300 KHz, and in this range frequency modulation (FM) is employed. All the four waves are elector magnetite waves.The propagation conditions of the four radio wave ranges determine their possibilities of application and the purposes for which they are used.

TelevisionTelevision is a system of sending and receiving pictures and sound by means of electronic signals

transmitted through wires and optical fibers or by electromagnetic radiation. These signals are usually broadcast from a central television station to reception devices in television sets in homes. The most common use of television is as a source of information and entertainment. Security personal use television to monitor buildings and facilities as also a cc TV. Doctors can check the interior of the human body with a microscopic television camera. Thus television is the world's most power form of communication.(i) How TV Works?

The TV receives electrical signals, either through air, from broadcast stations or over cable or from CR. These signals are pulses of electrical energy that arrive in the wave. These waves can have many different shapes, and each shape can tell the TV something about what it is suppose to do A TV uses two kinds of waves AM (for Amplitude modulation i.e. for AM picture information) and FM (for frequency modulation i.e. for FM radio signals). FM signals can carry multiple audio channels- in this case two for stereo sound. AM waves, which are the same kind as the one use to carry radio signals, carry two picture information. AM can carry 30 pictures per second.

The TV draws pictures by synchronizing the electron guns (which shoot the beams that light the screen) with the yoke, a circle of magnets that deflects the electron beam left and right, and up and down, across the screen. Together guns and yoke can draw pictures, by knowing what to draw and where to draw it. Another AM signal carries the color information. It tells the TV where to put the color. This signal actually consists of two signals on the same wave, separated by time.(ii) Transmission of Television Signals

Cable television was first developed in the late 1940s to serve people. Viewers in most areas can now subscribe to cable television services. Network television stations use microwave relay stations to broad case to affiant's communication satellites also receive television signals from a ground station and relay them back to specific area. Satellite transmissions are used to efficiently distribute television and radio programs from one geographic location to another. In addition, direct-broadcast satellites deliver television programming directly to individual receivers through small home dishes.13.3. Microwave System

Microwave transmission uses what is called line of sight transmission of data signals through the atmosphere rather than through wire. Microwave transmission consists of high frequency waves (1000-

40

Page 41: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

3000MHz) that travel in a straight line. Since these signals cannot bend around the curvature of the earth, relay stations-often antennas in high places such as tops of the mountains and buildings are position at points approximately 30 km apart to continue the transmission. Microwave transmission offers speed, cost

effectiveness, and ease of implementation when one tower receives the signals, it amplifies the signal and sends it to the next tower. Unfortunately, in major metropolitan area tall buildings may interfere with microwave transmission.

Fig Microwave Transmission

Communication satellites in space, orbiting in the Clarke orbit are also used as microwave relay stations because they rotate at the preside point and speed above the equator, that makes them appear stationary to the microwave transmitters on the ground. Microwave systems have the capacity to carry large quantities of data, both digital and analog at high rates of speed. They are used for the transmission of television and telephones signals. 13.4. Communication Satellites

Satellites have now become an integral part of the world communications systems. (For example, Radio, TV, Fax, Telephone, e-Mail, Internet, Intranet, Extranet, etc.). The basic components of satellite communication are earth stations, which sends and receive signals and a satellite components called a transponder. The transponder receives the transmission from an earth station, amplifies the signal, changes the frequency, and re-transmits the data to receiving earth stations. The satellite is nothing more than a radio-relay station.

One of the most important events in the history of satellite communication took place when COMSAT or communications satellite corporation, lunched four satellites within 6 years that is between 1965 to 1970. The first of these series was the "Early Bird", which was launched in 1965. This was the first communications station to handle worldwide commercial telephone traffic from a fixed position in space. The next series, INTELSAT was a group of satellites that served 150 stations on 80 countries.(i)The satellite Orbit:

The communication satellites are placed in orbits called EQVATORIAL GEOSYNCHRONOUS orbit. The satellite place in this orbit will appear stationary over a selected location on the earth's surface. So communication satellites are placed in an orbit that is directly over the equator, moving in a west-to-east direction at an altitude of 22,282 mile above sea level and with a forward velocity of 6874 mph to couplet one orbit in 24 hours. This orbit is called the CLARKE ORBIT.(ii) Up-link and down-link:

41

Page 42: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Up-link system includes all the ground equipments along with the transmission path and receiving antenna are the satellite. The down-link is described in terms of satellite transmitter output power, down-link antenna gain and beam width and ground area that the transmitted signal will cover the FOOT PRINT.(iii) Cross-link:At the altitude if the CLARKE ORBIT, one satellite could command a footprint area of 42.2% of the earth's surface. The beam width from the satellite for such coverage is 17.2 degree. Since such a satellite is not sufficient for global coverage, we need more than one (to be specific, 3) satellite.These 3 satellites are placed 120 degrees apart in CLARKE ORBIT and would cover the earth's entire surface except for the polar caps. Due to such arrangement of the 3 satellites, one can communicate form one part of the glob to the opposite side of it. As described below in the figure, the distance between two satellites is 45,458 miles. From this picture, it is clear that to travel one information from one part of the earth to its opposite part, it travels 90,014 miles (i.e earth-satellites A- satellite B- opposite of the earth).

Fig: Cross-link connections for global coverage.

INTELSAT was the first to set up such a communication link. With satellites spaced over the Indian, Atlantic and Pacific oceans above the equator.

(iv) Component of a satellite:There are five major components in the satellite. They are as follows:a. The transponder.b. The antenna system.c. The power package.d. The control and information system.e. The rocket thruster system.The transponder is a high-frequency radio receiver, a frequency down-converter and a power amplifier, which is used to transmit the down-link signal. The antenna system contains and the mechanisms to position them correctly. Once properly in place, they will generally function trouble-free for the life of the satellite. The power package is the power supply to the satellite. The power is supplied to the satellites by the combination of battery power and solar energy.The control and information system and the rocket thruster system are called the station keeping system. The function of the station keeping system is to keep the satellite in the correct orbit with the antennas pointed in the exact direction desired.

42

Page 43: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

ProtectiveOuter sheath

Glass covering Optical fiber

13.5. Radar and Fiber Optical

RADARThe “RADAR” means the Radio Detecting and Ranging device. It devotes the method of scanning the surrounding space by means of high frequency radio waves, which are sent out from a powerful transmitter and are reflected by any object, which they encounter. The reflected beam is picked up by a receiver and its strength and direction gives information on the size, distance, altitude, etc of the object.For example, an observer in an aircraft wishes to survey by radar the terrain over, which he is flying. The observer is strikes out the radar beam from the aircraft on the ground. The radar beam scans a circular area in the form of a sector, which sweeps round and round. Depending on the nature of the reflecting objects the intensity of the reflected beam will very as shown in the following picture.The transmission and reception of the high frequency of radio waves are effected in the radar apparatus. The radar waves are generated in the transmitter, which is equipped with radio tube of special design. The transmitting antenna usually also functions as the receiving antenna. This process is called “periodic changeover”. The receiver picks up the beam in a cathode Ray Tube (CRT). The beam is so deflected that it scans the luminescent screen from the center to the edge. Fiber Optic CableFiber optic cable and laser technology allows huge amounts of data to be routinely transmitted at the speed of light through tiny threads of glass or plastic. Fiber optic cable, the size of a human hair can transmit 2 billion bits per sec. This is about ten times greater than co-axial cables and 200 times better than twisted-pair wired. It is a tiny glass pipe.The 'core' of a fiber optic cable is a very thin strand of highly refined cylindrical glass. The glass core of the cable may have a diameter as small as 4.5µm (2/10,000in) or as large as 400 µm. A second layer of glass called the 'clad' surrounds the core.

15. Fig: Fiber optical cableThe clad has a different optical density form the core material. Fiber optics founded on the theory of reflection that results at the interface between two materials of different densities. They can conduct light pulses generated by laser at transmission of information with high speed as 2 billion bits per sec. Fiber optical cable can be used to transmit voice, data and video.

(a) Advantages of a fiber optic system are:(i)The main ingredient in glass is sand, which is very cheap and available everywhere compare to copper and aluminum.(ii) Photon of light, rather than an electrical current move through the optic fiber. Therefore, there is no chance of spark flash. Hence the system is safer.(iii) Since the fiber optical system carries no electrical current; the energy transmitted through the fiber cannot radiate radio frequency interference, nor can it be contaminated by any external noise or radio frequency fields.(iv)Because of absence of current flow through fiber, intrusion, into the system is also prevented. Confidential information cannot be routed to unwanted receivers, nor can false information be fed into the data stream.

43

Page 44: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

(v) The transmission losses of fiber optic cables are much lower than that of the twisted-pair wires and co-axial cables.(vi)Fiber optic cables provide substantial size and weight reduction as well as increased speed and grater carrying capacity. A half inch diameter fiber optic cable can carry up to 50,000 channels, compared to about 5,500 channels for a standard co-axial cable.(vii)Glass is immune to corrosive and oxide degradation and will stand up well in hostile environment.(viii) The size of the core and clad of a single fiber conductor is much smaller than the diameter of the common copper wire. Since fiber optic cables are not affected by and do not generate electromagnetic radiation. Therefore, multiple fibers can be placed in the same cable.

(b) Disadvantages of the fiber optic systems are:(i) Use of fiber optical cable is limited. That is, they can be used only on point-to-point on the ground level.(ii) It cannot be used to the very low powered devices.(iii) The ways in which the light source can be modulated are limited.

15.8 Integrated Services Digital Network (ISDN):ISDN is a high speed, fully digital telephone service. ISDN upgrades to day’s analog telephone network to a digital system. ISDN can operate at speed up to 128 kilo bits/sec, which is 5 or more times faster than today’s analog modem. ISDN can dramatically speed up transfer of information over the Internet or over a remote LAN connection, especially rich media like graphics, audio or video or applications that normally run at LAN speeds.There are several types of ISDN service, but the most appropriate type for individual computer users, and the type that this site focuses on is the ISDN Basic Rate Interface (BRI).Most of the world’s existing telephone networks are already digital. The only part that typically is not digital is the section that runs from the local exchange to your house or office. ISDN makes that final by of the network digital.The original version of ISDN employs base band transmission. Another version, called B-ISDN, uses broad band transmission and is able to support transmission rates of 1.5 Mbps. B-ISDN requires fiber optic cables and is not widely available.(a) Why is ISDN so Important?More than just a means for fast, accurate, data transmission, ISDN truly represents the next generation of the world’s telephone service for all forms of telecommunication including voice.ISDN brings the digital network to the individual users. Thus, the same twisted-pair wire telephone line that could traditionally carry only voice or one computer or one fax “conversation” can now carry as many as three separate “conversation” at the same time through the same line. ISDN the “magic” that makes this happen. Thus at the same line and through same cable three separate “Conversions” like (i) a voice call (ii) a computer transmission, (iii) an e-mail massage or a credit card authorization for example, could also takes place through the same connection.

14. Internet and World Wide Web (Www). 14.1. Introduction

Now you have the general idea about Tele-Communication and Networks. Based on these ideas, you can explain about the data transmission through LAN, MAN and WAN. Using telecommunication media now anybody can send and receive any type of data around the world within a minute. That is why many people are talking and using about e-mail, e-banking, e-business, tele-teaching, telemedicine and chatting, etc. All these activities fall under Internet. At the beginning, Internet was called information super Highway in the

44

Page 45: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

mid 1990s. In fact, the network of networks globally connected to send and receive any type of information is called "Internet". In the world, US department of defense is the first user of the Internet. As the cold war ended at the beginning of the decade 1990s when the Soviet Union fell then the US vice president Mr. Algor announced Internet facilities can be used by any country as they wish. Any single individual, company or country does not own this global network.

14.2. History of Internet In 1969 AD, the US department of defense created a network called ARPA net, which stands for advanced research Project Agency networks. In those days, there were no microcomputers. The model of centralized mainframe computers and terminals ruled the computer world. Under the model, the big mainframe computer sat at the center of a starfish like system with a dumb terminal at the tip of each tentacle.Later, a concept of network had been developed in which many devices were connected so they had shared resources. But here nothing was centralized, that is why it was quite a new concept. To fulfill this concept, a project called ARPA net was started in the USA. Later ARPA net changed into Defense Advanced Research Project Agency net (DARPA net) during 1970 to 1980 AD. Later other networks like BITNET, NSFNET, USENET and UUCP were connected with DARPANET. Then US government had facilitated its development by providing funding and some guidance. Then the name of this group of this Network was given as Information Super Highway. Then after 1996 the name of information super Highway also changed into Internet. Again at the beginning of 2000 AD, Intranet and Extranet also came into the world market as a special part of the Internet.What is Special about Internet?There are three obvious reasons. Internet is the cheapest and fastest means to:i) Get information:

At present people are using Internet (i.e. world wide web- www) to get information about people, products text, organization, research data, electronic version of the printed media, etc.ii) Provide information

People can use Internet to provide information about their Institutes, organizations, companies, products, facilities, rule and regulations, graphical pictures, photo’s, etc. They can advertise globally for a long time in a cheap price and providing more spaces, using website (Internet). People are using Internet for the distance learning and assistance for students.iii) Compile information

You can conduct a survey collecting opinion of the people within or outside your country for example using SMS in TV or radio etc. The web provides you ideal platform and opportunity.

14.3. Internet AccessYou can connect internet is two ways, that is:i) Dialing into an internet service Provider (ISP) and ii) With a direct connection to internet service provider. The difference is mainly in the speed and cost, in most cases you connect to your ISP using a telephone line and modem. This type of connection is called dial up connection. Some times you go in for a direct connection.

45

Page 46: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Fig: Computer of a dial up connection

In the dial up connection you use modem, but in the direct connection to ISP you do not use modem. In the direct connection you will use Integrated Services Digital Network (ISDN). ISDN can handle more than 56,600 bps. ISDN provides you voice mail, e-mail, chatting and computer processing facilities,

14.4. Internet Basic,To run the Internet, you need windows 95 or 98 or 2000 or Windows NT Operating system as software. Similarly, in the side of the hardware you need a set of microcomputer, a set of telephone and a printer. On the top of that a modem including a service of Internet Service Provider (ISP), which helps you to connect WWW, US Net, News group or e-mail, chat etc is also necessary. At present there are 21 ISP services in Nepal.The requirements in short are: i) A set of computerii) A modemiii) Access to the Internet hostiv) A communication software (Internet Explorer & Netscape Navigator, etc.)v) A dedicate telephone line.vi) Registration to one of the local Internet Service Providers5.4.1. Internet ProtocolInternet Protocols means the set of data transmission rules, that govern the way data travels from one machine to another across networks. There are various Internet Protocols that we use. The most commonly used protocols are:i) Transmission control protocol/ Internet protocol (TCP/IP)ii) File transfer protocol (FTP)iii) Hyper text transfer protocol (HTTP)iv) Telnet.v) Gopher vi) Wide area information service (WAIS)

14.5. Internet AddressingInternet addressing is a systematic way to identify related people computers and internet resources. If you want to connect to other computers, transfer files to or from another computer, or send e-mail message, you first need to know where the other computer is you need the computer’s “address”.

An IP (Internet Protocol) address is an Identifier for a particular machine on a particular network. It is a part of a scheme to identify computers on the Internet. IP addresses are also referred to as IP numbers and Internet addresses. An IP address consists of four sections separated by periods. Each section contains a number ranging 0 to 255. Example 202.54.1.6. These four sections represent both the machine itself or host and network that the host is on. The network portion of the IP address allocated to internet services providers

46

Page 47: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

(ISPs) by the Inter NIC, under authority of the Internet Assigned Numbers Authority (IANA). ISPs then assign the host portion of the IP address to the machines on the networks that they operate. The IP addresses have the following characteristics in common:i) IP addresses are unique.ii) No two machines can have the same IP number.iii) IP addresses are also global and standardized.iv) All machines connected to the internet agree to use the same scheme for establishing an address.

14.6. DOMAIN NAME: A domain name is a way to identify and locate computers connected to the Internet. No two organizations

can have the same domain name. A domain name always contains two parts, or more separated by dots.Examples:. Microsoft.com, Tel.net, Nide.org, Min.edu etc. www. Microsoft.com. etc.14.7. Activities Available In the Internet

Form the web site you can down load files, play games, send and receive mails and even chat with others. In other word, the modern day web browsers are very versatile and they allow you to almost all the activities that are possible on the internet. Using web browser, you can do many activities as follows.

The list of activities1) Visit web sites.2) Send and receive electronic mail.3) Read and post articles in news groups.4) Down load files on your PC.5) Chat with other user on line.6) Play games with others on line.7) Access on- line multimedia including radio and video broadcasts.8) Search the internet for information.9) Subscribe to electronic newspaper, newsletters, e-mail, etc.10)Join contests.11)Contribute articles and other materials.12)Do on line shopping.13)Post your resumes on the internet.14)Create your own web sites.15)Create an e-mail ID and account for you.16)Use the e-mail remainder service.17)Find a person’s details.18)Send flowers or gifts to other.

The above list is by no means a computer and comprehensive one. There are a lot of other things that you can do on the Internet.

14.8. WebPages, Html, Web Browsers, Searching the Web, Internet Chat. Between two computer users, they communicate the message using computer and telephone lines it is called "chatting". Chat is a word, which means to talk. Now a days, sitting in the cyber café many people use chatting. They search friends, make friends, send pictures and messages. Using these facilities, some of them turn into couple and some user entertainment. Now it has become a common business in the market.

47

Page 48: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

15. WORLD WIDE WEB (WWW):In 1992, Mr. Tim Berners Lee of Zeneva, Switzerland had designed a concept of World Wide Web (www) in his laboratory. Using about 200 computer systems, they were linked and tested this technology experimentally in Oct 1993 AD. It was a successful test. It was the first experiment, where Mr. Lee had used the sound, video images and graphical pictures as data. He had used a scripting language called Hyper Text Markup Language (HTML) to create a Webpage. To communicate these data, Mr. Lee had used Hyper Text Transfer Protocol (HTTP), which is called "web" or www.At present, any user can use Internet explorer, or Netscape Navigator to view the websites or web page. In general, these programs are called web browser. It is a kind of interactive application program. Using this, you can search, find, copy, print the information found in the websites. Similarly, you also can send the information and create the websites for the global users at any time.

16. Electronic Mail:

16.1. INTRODUCTION:An electronic mail is called e-mail. Now a day this word is very common. Between two users, using this service they can pass on their messages within a minute through telephone line using computers. It is an electronically mailing service around the world. This service was started first time by the USA in 1976. This is the first stage of using Internet globally. Using e-mail anybody can send and receive the text and pictures as information from one corner to another of the world. Due to e-mail service, the surface mail has gone down around the world. Because e-mail service is very useful, quick, cheap and easy. Now this service is available at your personal computer, too.16.2. E-MAIL ADDRESS:

To send e-mail, the receiver's e-mail address must be correct. Similarly, the user must have the general idea about the e-mail address. From the following examples, you also will have the clear idea of e-mail address, which contains five parts as follows. Here we can take following two examples as:i) [email protected]) [email protected] and ncollege = Individual or user's name.A sign @ = a separator symbolwlink and ccsl = a Internet service provider (ISP), which is called a

domain name..com and .edu = a commercial or educational group which is called a top domain name..np = country code (np= Nepal)

16.3. MAILING BASIC:

To compose an E-mail message, click on "compose new message" button on the tool bar. You will see an empty mail form, which will have the following parts as shown below:

To-Enter the E-mail address to where you are sending message.

CC- Enter the E-mail address to where the copy of messages is sent.

Subject-Enter the brief description as to what the message is about.

Body-Enter the actual message here.48

Page 49: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Almost all E-mail programs have the following features: address look, signature feature and attachment facility.

16.4. EAIL ETHICS:- Like any form of communication, there are certain manner and general decplain that you should follow

where using the E-mail. There are some guide lines, which will help you in getting the most out of your electronic mailing

i. Let your message have a personal touch and politeness.ii. Be friendly on writing.

iii. Be short and sweet. iv. Know your recipient.v. Be brief.

vi. Make the subject line precise. vii. Use your technology like spell checker & thesaurus.

viii. Read the message carefully and answer properly.ix. Don't send copies of E-mail to people unless they need it.x. You should check your mail regularly.

16.5. NTERNET CODE OF CONDUCT:- i. Don't encode the personal privacy of other users.

ii. Do not forward E-mail without permissions.iii. Do not deliberately break into computer system.iv. Getting passwords or other access information fraudulently is unacceptable.v. Copy or making available copies of protected works without the author's precession is illegal.

16.6. ADVANTAGES & DISADVANTAGES OF E-MAIL a) Advantages: - (Bright side)

i. E-mail is accessible 24 hours a day and 365 days a year.ii. Endless amount data you can send any part of the world.

iii. Global communication is easier.iv. At your home also you can access E-mail.v. Work can be now done anywhere a computer can be plugged in.

b) Disadvantages: - (Dark side)i. Import of virus into your computer.

ii. Over load information is created.iii. Swamped by link mails.

17. Intranets:

18. INRODUCTION TO INTRANET Internet is a communication network, which bridges the entire small computer networks worldwide as a

whole. Intranet is based upon internet technology, in particular World Wide Web (www), technology to build

49

Page 50: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

information system within organization or enterprise to accomplish standardization and automation. Ultimately it allows a certain organization to build a group ware within web environment at low cost on top of existing network in fracture. If a corporate web connects two or more trading partners, it is often referred to as a business to business web or an extranet. Extranet is a sub-group of internet. For example of web server and a professional organization with the thousand web server can each the considered an Intranet.

18.2) CHARCTERIETICS OF INTRANET:i. Openness

ii. Easy to use iii. Low costiv. flexibilityv. Scalability

vi. Innovative.

18.3 ADVANTAGES OF INTRANET:-i. It costs much less to build initial system, which results in maximum efficiency and flexibility.

ii. It is based an internet protected, which expands accessibility worldwide.iii. It helps on decision making system and it automates lauding a MIS.iv. It handles multimedia data effortlessly.v. Ready to access the information worldwide.

vi. Low administration and maintenance costs.vii. Platform –independent system configuration features.

18.4) WHY DOES AN ORGANIZATION NEED INTRANET? :- A good business houses wants to reach more customer more effectively and efficiently, and to provide

them with letter service. Daily, more consumer look to the Web for new sources, and more business look to their internet Web or Internet, to process their client's needs in more cost effective and efficient manner. To remain competitive, all organization needs to keep pace with technological advances.

Large organizations, which use internets to electronically transmit documents internally, pay back their investment in the technology within six to twelve weeks according to a study commissioned by Netscape.

BENEFITS OF INTRANET OF EMPLOYEES AND ORGANIZATION:-i. Employees can access information they need, when they need it.

ii. One determines as to who can have access to what data and to what extent?iii. Transactions can be followed electronically.iv. Database can be updated automatically as the transaction occurs.v. Communication can take place instantaneously anywhere in the world.

vi. Employee can work remotely, and remote employee can be shared for their expert ices.vii. You can access other business for ordering, sourcing, contracting and so on.

19. EXTRANET:- An extranet is a business to business intranet that allows limited, controlled, secure access between a

company's internets and designed authenticated users from remote location. It is an intranet that allows controlled access by authenticated parties. A brief list of examples could include:

i. Allowing suppliers access to relevant inventory levels.ii. Allowing clients to review their account recorders.

50

Page 51: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

iii. Allowing students to update address information in real time.As with intranet access is granted only where you establish that it is required. User access is controlled lay the latest in security technologies, protecting sensitive material from intrusion.

20. THE MULTIMEDIA 20.1 INTRODUCTION TO MULTIMEDIA:Multimedia is a technology that is made by combining hypertext, still pictures and video images, sound, animation and video using the computing power of pc. All these have been made possible recently by the latest developments in computer software and hardware. Many of us think that multimedia and CD-ROM are synonymous. But it is not true, CD-ROM is a storage device. Multimedia is a technology. For example if you want to use multimedia capabilities, your pc alone is not enough. You need additional set of hardware and software to support multimedia elements.

20.1 MULTIMEDIA SYSTEM: As you know, people can run some special classes using the multimedia system. To run such advanced class, they need a set of multimedia elements like a) Computer set b) Compatible software c) CD-ROM Reading drive d) Sound card e) Sound blast f) Microphone g) CD-ROM h) Head phone i) Digital camera, etc. With the help of these sets of multimedia system, any body can store, digitize, compress retrieve and decompress the information. To do this type of the job, the collection of the above sets of hardware set is called multimedia system. Using this system, anybody can do nice and advanced presentation.

20.1 19.3 MULTIMEDIA TECHNOLOGY: Multimedia Technology is a special computerized technique, which helps the user by providing techniques to combine texts, pictures, sound and video films including interactive facilities. It also provides facilities to the user to create, store, edit, delete and copy those data in the computer media. To store those types of data, CD-ROM can be a very useful storing media. Such multimedia data stored CD is called multimedia CD. Now a day, instead of heavy book a light multimedia CD is sufficient. Such CD is very cheap, light, simple, portable and easy to carry. It also helps to provide colorful presentations. Therefore multimedia technology has created more and move marketing in the world. Hence now in most of the books, video paper, film reels floppy disks, super disks and zip disks are replaced by CD-ROM. Every where you can see multimedia CD.

19.4 USING THE MULTIMEDIA ANYWHERE:Due to invention of multimedia hardware and software, computer users are taking more advantages at present. By combining the multimedia technology and multimedia system, users are gaining entertainment, knowledge, education and profits. Due to invention of multimedia technology, they are using it in the video game, film making, software training, education, seminars, website, office work and even in the video conferencing, etc.

19.5 SOFTWARE USED IN THE MULTIMEDIA:To design and write multimedia software, the programmer has to use different utilities and programming languages, which are as follows.(i) Java (Programming Language).(ii) Windows media player (Utilities).

51

Page 52: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

(iii) Real Judie or Shock wave (Utilities).(iv) Active-x of open Dock.

19.6 ADVANTAGES AND DISADVANTAGES OF THE MULTIMEDIA:Advantages:(i) It helps to use in the nice video presentation for all subjects.(ii) At anytime, anywhere and anybody can use it.(iii) Very easy to use, handle, carry, copy and store.(iv) Usable in interactive web page, Internet, video conferencing Open University and distance education and seminars(v) Powerful presenting tool with colored pictures, motion pictures and graphical pictures with multiple facilities.

Disadvantages:(i) Very costly at the beginning during multimedia production(ii) Requires very skilled manpower to use it.(iii) Requires very costly hardware set to use it.(iv) Poor people cannot use it due to high cost.

Exercise1. What is multimedia? Explain it with examples.2. What is the difference between multimedia and CD-ROM?3. What is a multimedia system?4. What is a multimedia technology?5. What is the difference between multimedia system and multimedia technology?6. Why and where are users using the multimedia?

18. COMPUTER SECURITIES

The computer security is concerned with the protection of the software and hardware, etc. There are different problems you face while working in a computer system environment. Power or supply to a computer may fail especially in bad weather; program or packages may contain bugs. Computer Media such as disk or hard disk or tapes may become corrupted, data may be lost. Even the working staff may be careless or do some criminal type of activities.

The computer can be given security under the following headings:1. Hardware Security

(i) Natural disaster (ii) Electric Power supply(iii) Air conditioning (iv) Access Control(v) Building Construction and Design(vi) Fire Protection (vii) Insurance

2. Hardware Security3. Software Security4. Security of Data.5. Safety from Virus

52

Page 53: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

20.1 Hardware Security:The environment and natural disaster has enormous influence on the security of the hardware. To protect the hardware from the natural disaster, necessary actions must be taken in proper time.

(i) Natural disaster: The likely risks due to the computer location need to be assessed. The other factors or conditions affecting the hardware are Earthquake, Wind, Rain, Snow, Ice, Floods, Lightening, Land slip, Fire, etc.

(ii) Uninterruptible power supply (UPS):No computer can operate without power supply. Computer needs 220 Volts (AC) 240 Volts (A.C) supply as the input voltage to its Power Supply Unit. The frequency of AC (Alternating Current) supply should be 49.5 Hz to 50 Hz.An uninterrupted power supply (UPS) is one, which provides uninterrupted supply of power in case of failure of regular supply to the computer system. Whenever there is power cut or supply problem, automatic switching takes place between regular supply line and the UPS and without interruption, a continuous or constant supply to the computer is maintained. Hence, data or program loss or any electric damages to any unit or circuit will not take place. A standby generator with battery supported UPS can maintain supply. Such a generator need very high capital cost. You can use volt guard or spike guard to protect your computer from the high or low voltage. As a cheap device, it can be used. A stand by emergency lighting is always necessary to escape in case of supply line failure. Large electric torches or lanterns should be kept near the reception desk.

(iii) Air Conditioning:Large computers dissipate too much heat, so ventilation is needed to maintain the temperature. For the computer, certain environment is needed. Humidity and temperature must be controlled, and a dust-free atmosphere is to be maintained which is possible with air conditioning plants. A typical air conducting plant re-circulates some of the air and introduces a continuous supply of clean filtered air at the correct temperature and humidity. Some air is exhausted to the outside. The temperature of 21° C ± 2° C (70 °F± 3 ° F) and the relative humidity of 50% ± 5% are necessary. Rise in temperature inside the computer room leads to overheating of components (i.e. IC chip, transistor etc.), moisture precipitation.

(iv) Access Control:Unnecessary persons should not be allowed inside the computer room. The entry and exit point of the computer room should be controlled and monitored properly using ID card system.

The commonly used access control methods are:- By using people (e.g. Security guard)- By using mechanical locks (e.g. Door Lock)- By using electronic system (e.g. Card Locks)

(v) Insurance Protection:Incase of the computer system is in danger due to natural disaster or malfunctioning or theft or rubbery, the insurance protection is a must.

20.2 SOFTWARE SECURITY:

53

Page 54: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

The security of software includes security of both application programs and system software. From the security viewpoint, Operating System (OS) is the most important which controls and monitors the entire system. To provide security to the software the use can apply the following methods.

i) Password:To prevent using the computer, the user can put the password system in the computer. If somebody wants to run the computer, he or she must entry the password, when the computer wants the password, if not it won't allow it to run lock key.

ii) Backup:Sometimes, the software or database stored in the hard disk could be damaged due to crash of the hard disk or due to virus. If the user finds this type of problem, he can solve the problem using his backup program or the database file, provided he has the backup files. Hence to prevent such problems of the software, the user must create the backup files from time to time.

iii) Hard lock key:Hard lock key is a kind of checking point available within the software during its running time. The user needs to type a kind of password when the software asks the hard lock key to be typed. If it matches the software runs, otherwise it does not work. Thus the hard lock key protects from the software piracy.

iv) Virus scanning:Computer virus is a man made small program, which creates software problems to the users. For example, it damages the program or database files or the outputs. Hence the user must protect his application program, operating system or database files from the virus by any means. The details about the virus you can find in the following chapter.

Exercise1. What is the hardware security? Explain any two methods.2. Give any two points to protect software. Explain how do you do.3. Write short notes on:

a. Power Protection b. Passwordc. De - fragmentation d. Backupe. Computer security

4. What do you mean by computer security?5. What is a UPS? What is the range of voltage and its frequency that can be applied to the computer system?6. Why do you need Air-Conditioner?7. Explain how building construction affect the computer security8. Do the people in an organization affect the security of computer? Explain why?9. How are hardware and software security maintained?10. What should be the abilities of software having proper security system?11. Write two examples of security package.12. Why do we need security of data?

19. IT Policies And Cyber Laws: 21.1 BACKGROUND:Actually Nepal had started using computer technology in 1971 for the national population census 2028BS. Since then till now, Nepal has crossed many obstacles and gained different types of experiences in using IT.

54

Page 55: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

As everybody knows that the country like Nepal had tapped many opportunities using IT to speed up the all-round development of the country. With the help of using IT, the developing areas are education sector, health sector, agriculture sector tourism sector, banking sector and publishing sector, etc.With the help of using IT, there will be increment in opportunities, developing activities, democratic process, financial status and all round awareness, etc. There will be big change in the people's thinking capability. In a short period of time, people will be able to achieve all round development and improve their quality of life. From the development of IT in the country, it will be able to avoid poverty and bring quick change in life. It will create job opportunities and will establish the intellectual basic infrastructures.

21.2 OBJECTIVE:The development of IT will be done for the following three basic objectives in the country.i) To create knowledge based societyii) To create job opportunities for the people.iii) To establish knowledge based industries.

21.3 INFORMATION TECHNOLOGY (IT) POLICY: To fulfill the above mentioned three basic objectives, Nepal government will establish IT centers in most of the VDC's. Each and every department and ministry of the government will create their websites, develop e-commerce, e-education, e-health and e-banking. With the help of using the above tools, they try to create job opportunities and provide quick services to the people of different communities. The Nepal government will try to establish basic informative infrastructure and basic working culture with the help of internet, intranet and extranet.21.4 WORKING POLICY:To implement the national IT policy of Nepal and to fulfill the following objectives, the government of Nepal will follow the following points.i) With the help of people's participation to develop the IT based infrastructures.ii) With the help of people's participation to develop the skilled manpower.iii) To disseminate the information technology within the country.iv) To provide different facilities to develop the information technology.21.5 INSTITUTIONAL MANAGEMENT:i) Under the chairmanship of the honorable pri-minister and deputy chairmanship of the science and technology minister with other 16 members an organization called National Information Technology Development committee (NITDC) has been established in 2003 AD. It is the head of National Information Technology center, under which National Technology Committee will work. NITDC is the main body, under which Nepal works to develop information technology within whole Nepal.ii) Similarly, to develop and expand the area of the information technology, to revise and update, to supervise and monitor the yearly progress and to solve the problems regarding IT, an organization called National Information Technology Centre (NITC) has been established in 2003 AD. This organization is running under the chairmanship of the honorable science and technology minister including deputy chairmanship of the deputy chairman of National Planning Commission and 10 other members. NITC is working under NITDC. iii) Regarding information technology, to develop the curriculum to develop manpower, to fix the standard and levels, to organize the research works and to co-ordinate between private institutes and governmental organizations and the organization called National Information Technology Co-ordination Committee (NITCC) has been formed in 2003 AD.iv) Similarly, as per necessary district level and regional level information technology centers will be opened, where the local people will be involved and will take advantages sharing information, using internet, intranet, extranet and e-mail. According to their knowledge, capacity and requirements, the local people will gain knowledge and experiences.

55

Page 56: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

21.6 LEGISLATION:Nepal government will design, update and implement the cyber laws from time to time as per national and international situation. The law will be related to e-banking, digital signature, software piracy, data protection by encryption, copyright protection and privacy protection act, etc.

21.7 UPDATING THE IT POLICY:Nepal government will supervise the running of cyber law from time to time and rewrite them to update. In

every two alternate years continuously, it will be updated.International Cyber Laws : Fair Credit Reporting Act-1970 = Privacy act. Freedom of Information Act-1970 = To access data file & to collect information from the government agencies. Federal Privacy Act-1974 = To allow individuals to know what is stored in the file about them. Video Privacy Protected Act.-1988 = To stop disclosing a person's video, in the bank, hospital without authority. Computer Matching and Privacy Protection Act-1988 = To prevent the government from comparing records to find match. Copy Right Act-1992 = To protect copy right , PenaltyUS $260,000 & 5 Years of jail.

20.Data Representations 5.8.1. Integer,5.8.2. Real Numbers, Strings .Bits ,Bytes ,Nibble ,Positional And Non Positional Number

5.8.3. Binary, Decimal, Octal, Hexadecimal System and Their Conversions.

24. E-TECHNOLOGIES:- E-Technologies means the use of Information Communication Technologies (ICT) in the banking sector ,

management sector, education sector, mailing sector, business sector, tourism sector and others. Detail discussion on the above subjects matter is called discussion on E-technologies.

1.12. History and Development of Computer in Nepal: Although the first electronic digital computer was built in mid 1940’s, computer was introduced in Nepal in the year 1972 only. It was introduced by Government for the population census of 1972 (2028 B.S). This was the second generation computer of IBM Company called IBM 1401. The Government had paid Rs One lakh twenty five thousand per month as rent for this computer.The Census Department at Thapathali Kathmandu had used IBM 1401 computer for the first time to process 1 corer 12.5 lakhs population census taking 1 year, 7 months and 15 days. Later, it became essential to operate the computer for day and night, for this reason a separate branch office called Yantric Sarinikaran Kendra (Electronic Data Processing Centre), was established in 1974 (15th Paush 2031 B.S.), which, after six years, was converted to National Computer Centre (NCC).For the population census of 1981 (B.S. 2038), a British computer ICL 2950/10 (International Computer Limited 2900 Series) which had 64 terminals was added from the aid of UNDP and UNFPA at two million American dollar from the British ICL Company. By the help of this fourth generation computer, the 1981 population census was completed within one year and 3 months.

56

Page 57: gcdeeplove.files.wordpress.com€¦  · Web viewComputer Fundamentals & Programming. Computer Fundamentals. Introduction To Computer System. Introduction. Computer is most important

Microcomputer such as Apple, Vector and Sirus were introduced in Kathmandu for the first time in 1982 (B.S. 2039). New companies such as Computer consultancy (CC), Management Information Processing System (MIPS) and Data System International (DSI) were established. Since 1983 (BS. 2040) National Computer Center, on the other hand, also started giving training on programming, data entry, data processing, and development of software packages. As a result, many people from various sectors started showing their interest in the field of computers.Since 1977 (B.S. 2034) His Majesty’s Government employed IBM 1401 computer in tourist statistical data processing, industrial data processing, statistical and loan account keeping of Agricultural Development Bank, Provident fund, SLC result processing and TU result processing, etc. After a few years, new computer ICL 2950/10 was brought in use, which was more efficient for data processing in some other corporations such as Telecommunication, Electricity Authority, Janakpur Cigarette factory, Hetauda Cement Factory, Tribhuwan University, etc. Many others like travel agencies, hotels, factories, printing presses also started using computer for better & faster work. At present, not only Kathmandu is using microcomputers but also Lalitpur, Bhaktapur, Pokhara, Nepalgunj, Bhairhawa, Butwal, Hetauda, Birgunj, Biratnagar, Janakpur, Jhapa etc. are using computer for different purposes. Nowadays, computers have been used in different areas like, travel agencies, hotels, Airlines, Government offices, Banks, Colleges, Schools, Hospitals, etc. in Nepal. People are using computer even at home for day-to-day use for their personal convenience. Now there are more than 1000 private computer-training centers all over Nepal. About 50 software development centers are working in the Nepali market. At present, in Nepal more than 1250 schools, 107 higher secondary schools, 50 general colleges, 42 IT related colleges and 4 Universities are teaching and using computer technology. More than one hundred thousand computers are busy in Nepal. More than 28 private Internet Service Provider (ISP) are providing services in the Nepali market. Nepal had started using e-mail, Internet, e-Banking and Websites since 1996 AD. The purpose of using the computers is for word processing, keeping accounts, keeping the records and details of employees, inventory control, etc. A few software houses are involved in software development and in exporting the software to the international market (i.e. in Japan, Germany, USA, UK etc) also. Some of the private institutes and companies are involved in computer assembling, selling and distributing like in other developed countries. The scope of computer in our country is increasing rapidly day by day. In May 2000 AD, Ministry of Science and Technology, HMG had announced the national policy on IT. Similarly, HMG had announced the Cyber Law and copyright Law in Sept 2004 etc.

57