Professional Documents
Culture Documents
F u n d a m e n ta ls
This book is sold subject to the condition that it shall not, by way of trade or otherwise, be lent, resold,
hired out, or otherwise circulated without the publishers prior written consent in any form o f binding or
cover other than that in which it is published and without a similar condition including this condition being
imposed on the subsequent purchaser and without limiting the rights under copyright reserved above, no
part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted in
any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior
written permission of both the copyright owner and the above-mentioned publisher o f this book.
ISBN 978-81-317-3309-7
10 9 8 7 6 5 4 3 2 1
Published by Dorling Kindersley (India) Pvt. Ltd., licensees of Pearson Education in South Asia
Head Office: 7th Floor, Knowledge Boulevard, A-8 (A), Sector 62, NOIDA, 201 309, UP, India.
Registered Office: 11 Community Centre, Panchsheel Park, New Delhi 110017, India
Typeset by AcePro India Pvt. Ltd
Printed in India at Saurabh Printers Pvt. Ltd.
Copyrighted material
B r ie f C o n t e n t s
Preface
xxi
Acknowledgem ents
XXV
UNIT 1 BASiCS_OF_COMPUIER
1. Introduction to Computer
2. The Computer System Hardware
3. Computer Memory
4. Input and Output Devices
5. Data Representation
1
19
39
61
87
115
131
150
163
196
219
236
256
284
307
342
379
422
458
486
503
Appendix A
Appendix B
Appendix C
Appendix D
Index
515
517
519
523
541
Copyrighted material
Contents
rretace
Acknowledgements
1JN 1 T 1
XXI
XXV
R A S IC S O F T O M P I J T F R
1. Introduction to Computer
1.1 Introduction
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
Microcomputers
Minicomputers
Mainframe Computers
Supercomputers
4
5
5
6
6
7
7
9
9
9
10
11
12
13
Summary
15
Keywords
16
Questions
17
19
2.1 Introduction
19
20
20
21
22
Copyrighted material
_______ v iii I.
1 Contents
22
22
n
24
24
25
25
12. Microprocessor
22
21
28
29
29
Motherboard
Ports ancf Interfaces
Expansion Slots
Ribbon Cables
Memory Chips
Storage Devices
Processor
29
31
31
32
12
31
34
34
34
Summary
35
Keywords
36
Questions
36
Computer Memory
39
3.1 Introduction
39
40
40
42
42
43
43
44
46
46
46
47
47
Copyrighted material
Contents
IX
48
55
Input-Output Unit
62
62
62
4.3
Input Devices
63
4.4
64
4.2
4.4.1 Keyboard
64
4.4.2 Pointing Devices______________________________________________________ 65
4.4 J L l_MQii.se__________________________________________________________(15
4.4.2.2 TrackBali
66
4.4.2.3 joystick
66
4.4.2.4 Digitizing Tablet
67
68
68
68
69
4 .5 .1 A u d io In p u t D e v ic e _________________________________________________________ 6 9
Scanner
Optical Character Recognition (OCR)
Magnetic Ink Character Recognition (MICR)
Optical Mark Recognition (OMR)
Barcode Reader
Output Devices
4.6.1 Hard Copy Devices
4.6.1.1 Printer
4.6.1.2 Plotter
4.6.1.3 Computer Output on Microfilm
70
71
72
72
72
74
74
74
76
77
Copyrighted material
M g
Contents
77
Monitor
Visual Display Terminal
Video Output
Audio Response
77
77
78
78
80
81
82
83
84
5. Data Representation
87
5.1 Introduction
87
88
90
90
92
Hexadecimal
94
95
97
97
98
98
100
102
102
103
103
105
106
5.10.1 EBCDIC
106
5.10.2 A SC II_________________________________________________________ 106
5^1D,3.JJniL0ik ____________________________________________________________ W Z
108
110
110
111
113
Copyrighted material
Contents
UNIT II
USER-COMPUTER INTERFACE
I Ix i
115
115
6.1 Introduction
115
116
116
6.3.1
6.3.2
6.3.3
6.3.4
Operating System
Device Driver
System Utilities
Programming Languages
117
117
118
120
121
121
122
122
6.3.6 Linker
6.3.7 Loader
122
124
124
125
125
125
126
127
128
129
129
7. Operating System
131
7.1 Introduction
131
132
7.3 Types of OS
132
7.4 Functions of OS
134
135
136
136
137
138
138
139
140
141
142
Copyrighted material
Contents
143
144
7.11.1 MS-DOS
7.11.2 Windows Family of OS
7.11.2.1 Brief History of Windows OS
144
145
146
7.11.3 Linux OS
146
Summary
147
Keywords
147
Questions
148
150
8.1 Introduction
150
151
8.3 Algorithm
152
153
8.5 Flowchart
153
8 .5 .2 P re p a rin g a F lo w c h a rt
8.6 Pseudo Code
8.6.1 Preparing a Pseudo Code
153
153
156
156
158
158
159
160
Summary
161
Keywords
161
Questions
162
163
9.1 Introduction
163
164
165
9.3.1
9.3.2
9.3.3
9.3.4
9.3.5
9.3.6
Twistedpair
Coaxial Cable
O ptical Fiber
Radio Transmission
Microwave Transmission
Satellite Transmission
765
766
766
767
168
168
Copyrighted material
Contents
1____ x iil
168
168
170
170
171
172
174
174
175
176
177
177
177
178
178
179
179
180
180
180
181
181
181
184
184
185
186
186
187
188
188
189
189
190
191
Summary
192
Keywords
193
Questions
193
196
10.1 Introduction
196
197
198
198
B x iv H il
Contents
199
199
200
10.7.1
10.7.2
10.7.3
10.7.4
10.7.5
Dial-up Access
Leased Line
Integrated Services Digital Network (ISD N )
Digital Subscriber Line (D SL)
Cable Modem
201
201
202
202
203
203
204
204
206
207
207
209
210
10.9.2.1
10.9.2.2
10.9.2.3
10.9.2.4
210
210
211
211
E-mail Address
E-mail Message Format
E-mail Services
How E-mail Works
212
213
213
214
214
214
Summary
215
Keywords
216
Questions
216
UNIT III
11.
219
Information Systems219
11.1 Introduction
219
220
221
221
223
224
225
Copyrighted material
Contents
i 1 -'IBfeSSlliS
226
226
227
228
228
229
230
230
230
231
231
232
Summary
233
Keywords
234
Questions
234
Fundamentals of Database
236
12.1 Introduction
236
12.2 Database
237
Entity
Attribute
Relationship
Entity-Reiationship (E-R) Model
237
239
240
240
240
240
241
241
242
242
244
244
245
245
245
246
Copyrighted material
_________ XVI
1 Contents
250
250
250
251
251
Summary
252
Keywords
253
Questions
253
13. Multimedia
256
13.1 Introduction
256
257
257
259
13.4.1 Text
13.4.2 Graphics
13.4.3 Audio
13.4.3.1 Audio from a CD to W eb
13.4.4 Video
13.4.4.1 Video on Internet
13.4.5 Animation
In Education
In Entertainment
In Training
In Business
Virtual Reality
259
260
262
264
265
266
268
269
271
272
272
273
273
276
277
277
278
Summary
280
Keywords
280
Questions
281
284
14.1 Introduction
284
285
286
14.3.1 Virus
14.3.2 Worms
287
287
Copyrighted material
Contents
14.4 Hacking
14.4.1 Packet Sniffing
14.4.2 Password Cracking
14.4.3 E-mail Hacking
X V Ii
287
288
288
289
289
289
289
290
14.7 Cryptography
290
291
291
292
292
14.9 Firewall
294
UNIT IV
2 96
296
296
297
297
298
299
299
300
301
302
302
Summary
303
Keywords
304
Questions
304
COMPUTER PRACTICALS
15.
307
Windows XP
15.1 Introduction
307
308
308
307
L5 A J.-Ih eJzsk.Bar.________________________________________________________ m
IJAJJ^.kilcQiis.d.Dd.Sh.QrLcu.ts____________________________________________111
313
Copyrighted material
-Triii
I Contents
The Start
The Window
The View
Selecting Files
Working with Folders
Files and Folders Properties
314
314
315
316
317
317
318
323
323
324
326
328
328
330
332
334
334
15.16
334
W in d o w s V ista
15.17 Windows 7
Questions
Word 2007
337
340
342
16.1 Introduction
342
343
344
347
350
16.5.1
16.5.2
16.5.3
16.5.4
16.5.5
16.5.6
16.5.7
16.5.8
353
355
358
360
360
363
365
3 66
366
375
Copyrighted material
Contents
379
MS-Excel 2007
17.1 Introduction
379
380
381
17.4
382
386
390
392
17.6.2
17.6.3
17.6.4
17.6.5
17.6.6
17.6.7
17.6.8
394
399
400
403
405
406
408
The
The
The
The
The
The
The
Insert Tab
Page Layout Tab
Formulas Tab
Data Tab
Review Tab
View Tab
Help
409
417
MS-PowerPoint 2007
422
18.1 Introduction
422
424
425
426
429
434
18.6.1
18.6.2
18.6.3
18.6.4
18.6.5
18.6 .6 T he R e v ie w Tab
18.7 An Example
Exercises
MS-Access 2007
435
438
440
442
443
446
447
452
453
456
458
19.1 Introduction
458
459
460
py righted
Contents
461
463
467
19.6.1
19.6.2
19.6.3
19.6.4
19.6.5
468
472
475
476
477
478
Exercises
483
486
20.1 Introduction
486
487
488
491
493
493
2 0 .7
495
S h a rin g o f File s
496
497
498
498
501
502
503
21.1 Introduction
503
504
504
504
508
Exercises
Appendix
Appendix
Appendix
Appendix
514
A
B
C
D
515
517
519
523
Index________________________________________________________ 5A1
Copyrighted mate
r e f a c e
C om puters play a key role in o u r everyday lives. In addirion co com m unication m edia like television,
radio and newspaper, we now have another com m unication m edium , i.e. com puters. We use com puters
to e-m ail, to chat, for the Internet browsing, for teleconferencing, for video conferencing, etc. W e also use
them for e-learning, e-com merce, e-banking, e-governance, e-ticketing and for m any m ore things. And
the interesting part is, while we interact w ith the other m edia like television, radio, newspaper, etc. to
merely get inform ation, the interaction in com puters is tw o ways we can be a creator as well as a user.
We m ay use a com puter as a m edium to get m ore inform ation, as a tool to perform certain activities, o r
as an integral part o f another com ponent.
T h e fundam entals o f com puters arc the stepping stones to com puter science. Nowadays, all courses,
related and unrelated to com puter science, require using a com puter. Knowledge o f the basics o f co m p u t
ers has becom e a fundam ental requirem ent, in whatever area we choose to study o r follow professionally.
C o m p u ter fundam entals are also an introductory course to a m ore advanced study o f com puter science.
Style o f W riting
T h e language used in the book is lucid, is easy to understand, and facilitates easy grasping o f
concepts.
T h e chapters have been logically arranged in sequence.
T h e book is w ritten in a reader-friendly m anner both for the students and the teachers.
M ost o f the content presented in the book is in the form o f bullets, organized sequentially. This
form o f presentation, rather than in a paragraph form , facilitates the reader to view, understand
and rem em ber the points better.
T h e explanation is supported by diagrams, pictures and images wherever required.
Sufficient exercises have been included for practice in addition to the solved examples.
T h e questions at the end o f the chapter are given section-wise. It is easier for the reader to find
answers for the section-wise questions in a particular section rather than the whole book.
Wireless networking
N otebook, N etbook, PDA, sm artphones
Aspect O riented Program m ing (AOP)
Im parting education via m ultim edia
Cryptography, Digital signature, Firewall, Biometrics
System clock, BIO S, C M O S , SIM M & D IM M m em ory m odule
In the theory chapters (Chapters 1-14), the theory is supported with the practical information like,
the nam e o f supercom puter o f India, how to create m p3 file from C D , w hat is a stream ing video
and understanding m achine configuration.
Copyrighted material
XXli
1 Preface
T his book does not discuss in detail the old technologies that have becom e too com m on o r are no
longer used, like, about keys in a keyboard, m agnetic tape, using mouse, drum printers and message switching.
Several colored inserts in the book provide a colored view o f the photographs.
TARGET AUDIENCE
This book has been w ritten keeping in m ind the readers familiar and not-so familiar w ith com puters.
Several chapters have been included that cover the syllabi of different universities in India. T h e book is
well suited for the following target audience:
0
Computer science students undergoing a course in com puter science D C A , M CA, BSc(Gcn),
BSc(Hons), M Sc(IT), BSc(IT), BCA, D O E A C C level courses.
Science students pursuing BSc in physics, chemistry, botany, zoology and mathematics.
Non-science students pursuing B C om (P), B C om (H ons), BA(P), BDP, BBA, MBA, BBE
Preface
Figure 1
X X iii
U nit II comprises five chapters. T his unit focusses on the interaction o f user and computer, and the Internet.
C hapter 6 provides a description o f the system software and the application software. C h ap ter 7 describes
the operating system in detail. T he writing o f the program m ing logic and the different program m ing para
digms are discussed in C hapter 8. Chapters 9 and 10 relate to networking and the Internet. C hapter 9
discusses com puter networks and the com m unication o f data across the network. T h e Internet and its
services are detailed in C hapter 10.
U nit III contains four chapters. This unit is about applications and security. C hapter 11 describes the
inform ation systems. This chapter is included bearing in m ind the non-science courses. For teaching this
paper in a science course, you may skip this chapter. T he fundam entals o f databases are discussed in C hapter
12. C hapter 13 describes the different elements o f the m ultim edia system text, audio, graphics, video and
anim ation. C hapter 14 on com puter security discusses the security attacks, and the way to handle them.
Unit IV consists o f seven chapters. This unit is designedfor the computer practicals. A detailed discussion
on W indow s XP is provided in C hapter 15, including a brief description about W indow s Vista and
W indow s 7. C hapters 16 through 19 are about the four m ain com ponents o f M S-Office 2007, i.e. M S-W ord,
M S-Excel, M S-Pow erpoint and MS-Access. C hapter 20 is about N etw ork and the Internet connections.
T h is chapter facilitates the reader in the creation and m anaging o f com puter netw ork and the Internet
connection. C hapter 21 is about using LaTeX which is used for the production o f publication-quality
typeset docum ents.
PEDAGOGICAL FEATURES
Pedagogy is the art and science o f how som ething is taught and how students learn it. H ow the teaching
occurs, the approach to teaching and learning, the way the co n ten t is delivered and w hat the students
learn as a result o f the process are all included in pedagogy. T he following are the pedagogical features in
this book:
S ta rt-o f Chapter Aids
C ontents An overall view o f the topics discussed in the chapter is provided, at the beginning
o f each chapter.
W hy this chapter It describes the need o f including this chapter in com puter fundam entals
and w hy one should read it.
In-Between Chapter A ids
Visualization A picture is w orth a thousand words is a famous quote. T his book supports the
concepts w ith figures, diagrams and images to facilitate visualization.
Bulleted text T he book follows a bulleted approach o f w riting the text in contrast to the long
paragraphs. T h e bulleted text approach is easier to read, understand and grasp.
Copyright
X X IV
1 P re fa c e
End-of-Chapter Aids
Sum m ary Ir reviews the m ajor concepts discussed in the chapter.
Keywords A list o f keywords at the end o f each chapter facilitates in locating a topic in the
chapter.
Q uestions T h e questions at the end o f each chapter are given section-wise. T h e reader has to
search for the answers in this section, rather than the com plete chapter.
Extra questions A t the end o f each chapter, the extra questions from the com plete chapter are
given in th e form o f short notes, abbreviations and differences.
Colored inserts A first initiative in a book on this topic, the colored inserts provide the reader
w ith actual images in colour.
FEEDBACK
For interacting with the author, or for suggestions and com m ents on this book, please send your e-mails
at goel.anita.book^gm ail.com .
Copyrighted material
c k n o w l e d g e m e n t s
It took me alm ost 2 years to write this book. D uring m y journey o f book w riting, I have been helped and
supported by m y family, friends and collegues. 1 express my gratitude to one and all for their extensive
support in this endeavour.
I
am grateful to Dr. S. C . G upta, Prof. S. K. Wasan and Dr. M ukul Sinha for encouraging me to write
a book. I thank them for their valuable advice and for their encouragem ent to dissem inate inform ation.
I also th an k them for continually inspiring m e to w rite a good book.
I
th an k M r Neeraj Saxena, Ms Renu Saxena and M r Rajendra for their extensive help in clicking the
photographs in this book.
M y special thanks go to all my students, A m it Jain in particular, who have always been eager to inform
m e the the expectations o f the students o f a book. T h eir suggestions and feedback have helped m e write
the book in a student-friendly manner.
T hanks to M r Sachin Saxena and the team o f Pearson Education for their extensive support. T h e book
in its present form is a result o f the long discussions and the brainstorm ing sessions w ith Sachin. I am
grateful to Sachin for his ideas, suggestions and excellent support provided to m e during the w riting o f
this book.
I
express m y regards and love to m y m other Urm ila, and m y father Am ar C hand. Being their child
makes me feel special, and I thank them both for guiding m e through life. T h ro u g h this book. I carry
forward the legacy o f book w riting from m y m aternal grandfather late M r C . S. Jain. I express m y respect
and thanks to m y father-in-law Gopal Krishan for his m otivation and cooperation, and for taking care o f
m atters while I was busy w riting the book. M y thanks are due, in m em ory of m y m other-in-law Pushpa
w ho has always loved and supported me.
T hanks to m y loving husband, Ajay, for standing by m e in the difficult times d u rin g the course o f w rit
ing this book. H e is a bagful o f innovative ideas and has contributed creatively to the w riting o f this book.
M y special thanks to my lovely and beautiul children, A nirudh and Ashima, who brilliantly contributed
towards the creation and editing o f this book. T hey are m y greatest source o f inspiration and m otivation.
Since this is n o t the first book on this topic, I thank the authors o f other books on sim ilar topic, whose
books have been a source o f ideas for me.
I
th an k the A lm ighty w ithout whose grace it w ould have been impossible for m e to accomplish
this task.
Copyrighted material
Unit I
BASICS OF COMPUTER
INTRODUCTION
TO COMPUTER
Classification
of
computer Micro
computers (desktop computer or Personal
Computer (PC), notebook computers or
laptop, netbook, tablet computer, handheld
computer or Personal Digital Assistant (PDA),
smart phones), minicomputers, mainframe
computers, supercomputers
The
computer
system Hardware,
software, data, users
The Input-process-output concept
Components of computer hardware
Input/output unit, central processing unit,
storage unit
Application of computers Education, en
tertainment, sports, advertising, medicine,
science and engineering, government,
home
W h y this chapter
Com puters are an integral part of our lives. W h e re ve r w e are sitting in our homes, w ork
ing in the office, driving on roads, sitting in a m ovie hall, staying in a hotel, etc. our
lives are directly or indirectly affected by the com puters. In this era of inform ation, w e
are dependent on the storage, flow and processing of data and inform ation, w hich can
o n ly be possible w ith the help of com puters. The purpose of this chapter is to introduce
you to the "com puter".
1.1 INTRODUCTION
Nowadays, com puters are an integral part o f our lives. T hey are used for the reservation o f tickets for
airplanes and railways, paym ent o f telephone and electricity bills, deposit and w ithdraw al o f m oney
from banks, processing o f business data, forecasting o f weather conditions, diagnosis o f diseases, searching
pyrighted material
2____
Basics of Computer
for inform ation on the Internet, etc. C om puters are also used extensively in schools, universities, organiza
tions, m usic industry, movie industry, scientific research, law firms, fashion industry, etc.
T h e term com puter is derived from the w ord compute. T h e w ord compute means to calculate. A com
puter is an electronic m achine that accepts data from the user, processes the data by perform ing calcula
tions and operations on it, and generates the desired o u tp u t results. C o m p u ter perform s both simple and
complex operations, with speed and accuracy.
This chapter discusses the history and evolution o f com puter, the concept o f input-process-output and
the characteristics o f com puter. T his chapter also discusses the classification of digital com puters based on
their size and type, and the application o f com puter in different dom ain areas.
Speed T h e com puter can process data very fast, at the rate o f m illions o f instructions per second.
Some calculations that w ould have taken hours and days to com plete otherwise, can be com pleted
in a few seconds using the com puter. For example, calculation and generation o f salary slips o f
thousands o f employees o f an organization, weather forecasting th at requires analysis o f a large
am o u n t o f data related to tem perature, pressure and hum idity o f various places, etc.
Accuracy C o m p u ter provides a high degree o f accuracy. For example, the com puter can accu
rately give the result o f division o f any two num bers u p to 10 decimal places.
Diligence
Storage Capability
Versatility
W hen used for a longer period o f tim e, the com puter does n o t get tired o r fatigued.
It can perform long and complex calculations with the same speed and accuracy from the start till
the end.
Large volum es o f data and inform ation can be stored in the com puter and
also retrieved whenever required. A lim ited am ount o f data can be stored, temporarily, in the
prim ary memory. Secondary' storage devices like floppy disk and com pact disk can store a large
am ount of data permanently.
C o m p u ter is versatile in nature. It can perform different types o f tasks w ith the same
ease. At one m om ent you can use the com puter to prepare a letter d o cu m en t and in the next
m om ent you may play m usic or print a docum ent.
C om puters have several lim itations too. C o m p u ter can only perform tasks that it has been program m ed
to do. C o m p u ter cannot do any work w ithout instructions from the user. It execures instructions as speci
fied by the user and does noi take its own decisions.
Copyrighted material
Introduction to Computer
____
Figure 1.2
Figure 1.1
Abacus
Slide rule
Pascal's A dding a n d Subtraction M achine was developed by Blaise Pascal. It could add and sub
tract. T he m achine consisted o f wheels, gears and cylinders.
Leibniz's M ultiplication and D ividing M achine was a mechanical device that could both m ul
tiply and divide. T he G erm an philosopher
and m athem atician G ottfried Leibniz built it
around 1673.
Punch Card System was developed by Jac
quard to control the power loom in 1801. He
invented the punched card reader that could
recognize the presence o f hole in the punched
card as binary one and the absence o f the hole
as binary zero. T he Os and Is are the basis of
the m odem digital computer. A punched card
is shown in Figure 1.3.
*l9tftftll*C9l9ft9|ft*H99*'ft*'ftftftl||||
M ' M I I I I I I I I I I I M I I M I I I I M l l l l i l l l l l l l
t iiti
I 1 1 I I 1 1 1 1 1 1 I I f I 1111
l l l l M l l l l i l i
M I M M I t
ft I I I I
fill
9999111
Kg1" * 19
I I I I I H H U i l l l l l M M l l M M l M I I M I
11 9 < ' 11 11 I I I 9 1 9 * 9 9 9 M
1 9 9 I I I 11 M t 9 t i l I I 111
Punched card
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Introduction to Computer
are able to store m illions o f c o m p o n e n ts on a single chip. T hese co m p u ters have large m em ory
req u irem en ts.
T his generation o f com puters uses parallel processing that allows several instructions to be executed in
parallel, instead o f serial execution. Parallel processing results in faster processing speed. T h e Intel dualcore microprocessor uses parallel processing.
T h e fifth generation com puters are based on Artificial Intelligence (AI). T hey try to sim ulate the hum an
way o f thinking and reasoning. Artificial Intelligence includes areas like Expert System (ES), N atural Lan
guage Processing (N LP), speech recognition, voice recognition, robotics, etc.
1.6.1 Microcomputers
M icrocom puters are small, low-cost and single-user digital com puter. T hey consist o f C P U , in p u t unit,
o u tp u t unit, storage unit and the software. A lthough m icrocom puters are stand-alone machines, they can
be connected together to create a netw ork o f com puters that can serve m ore than one user. IBM P C based
on Pentium microprocessor and Apple M acintosh are some examples o f m icrocom puters. M icrocom put
ers include desktop com puters, notebook com puters or laptop, tablet com puter, handheld com puter,
sm art phones and netbook, as shown in Figure 1.9.
Copyright
Tablet
Figure 1.9
Laptop
Netbook
PD A
Sm art Phone
Microcomputers
Desktop Computer or Personal Computer (PC) is the m ost com m on type o f m icrocom puter. It is
a stand-alone m achine that can be placed o n the desk. Externally, it consists o f three units key
board, m onitor, and a system unit containing the C P U , memory, hard disk drive, etc. It is not very
expensive and is suited to the needs o f a single user at hom e, small business units, and organizations.
Apple, M icrosoft, HP, Dell and Lenovo are some o f the P C m anufacturers.
Notebook Computers or Laptop resemble a notebook. T hey are portable and have all the features
o f a desktop com puter. T he advantage o f the laptop is that it is small in size (can be p u t inside a
briefcase), can be carried anywhere, has a battery backup and has all the functionality o f the desk
top. Laptops can be placed on the lap while w orking (hence the name). Laptops are costlier than
the desktop machines.
Netbook These are smaller notebooks optim ized for low weight and low cost, and are designed for
accessing web-based applications. Starting w ith the earliest netbook in late 2007, they have gained
significant popularity now. N etbooks deliver the perform ance needed to enjoy popular activities
like stream ing videos or music, emailing, Web surfing or instant messaging. T h e w ord netbook was
created as a blend of Inter<?/ and n o t ebook.
Tablet Computer has features o f the notebook com puter but it can accept input from a stylus or
a pen instead o f the keyboard or mouse. It is a portable com puter. Tablet com puter are the new
kind o f PCs.
Copyrighted material
Introduction to Computer
0
____
H andheld Computer or Personal D igital Assistant (PDA) is a small com puter that can be held on
the top o f the palm. It is small in size. Instead o f the keyboard. PD A uses a pen or a stylus for input.
PDAs do not have a disk drive. T hey have a lim ited m em ory and are less powerful. PDAs can be
connected to the Internet via a wireless connection. Casio and Apple are some o f the m anufacturers
o f PDA. O ver the last few years, PDAs have merged into mobile phones to create sm art phones.
Sm art Phones are cellular phones that function both as a phone and as a small PC. T hey may use
a stylus or a pen, or m ay have a small keyboard. T hey can be connected to the Internet wirelessly.
T hey are used to access the electronic-m ail, dow nload music, play games, etc. Blackberry, Apple,
H T C , Nokia and LG are some o f the m anufacturers o f sm art phones.
1.6.2 Minicomputers
M inicom puters (Figure 1.10) are digital com puters, generally used in
m ulti-user systems. T h ey have high processing speed a n d high stor
age capacity than the m icrocom puters. M inicom puters can support
4200 users simultaneously. T h e users can access the m inicom puter
through their PC s or term inal. T hey are used for real-tim e applica
tions in industries, research centers, etc. PD P 11. IBM (8000 series)
are some o f the widely used m inicom puters.
Figure 1.10
Minicomputer
1.6.4 Supercomputers
S u p erco m p u ters (Figure 1.12) are the fastest a n d the m ost
expensive m achines. T h e y have high processing speed co m
pared to o th er co m puters. T h e speed o f a su p erco m p u ter is
generally m easured in FLO PS (F L oating p o in t O p e ratio n s
Per Second). Som e o f the faster su p erco m p u ters can perform
trillio n s o f calculations per second. S upercom puters are b u ilt
by in te rc o n n e c tin g thousands o f processors th a t can w ork in
parallel.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Introduction to Computer
11
Hardware consists o f the mechanical parts that make up the com puter as a m achine. T h e hardware con
sists o f physical devices o f the com puter. T h e devices are required for input, o u tp u t, storage and processing
o f the data. Keyboard, m onitor, hard disk drive, floppy disk drive, printer, processor and m otherboard are
some o f the hardware devices.
Ucraof? OfficePokuM
2007
f j4
(5 2 'fccwftOfhaWord2007
Software
Hardware
Figure 1.13
Software is a set o f instructions that tells the com puter about the tasks to be perform ed and how these
tasks are to be perform ed. Program is a set of instructions, w ritten in a language understood by the
com puter, to perform a specific task. A set o f program s and docum ents are collectively called software.
The hardware o f the com puter system cannot perform any task on its own. T h e hardware needs to be
instructed about the task to be perform ed. Software instructs the com puter about the task to be per
form ed. T h e hardware carries o u t these tasks. Different software can be loaded on the same hardware to
perform different kinds o f tasks.
D ata are isolated values or raw facts, which by themselves have no m uch significance. For example, the
data like 29, January, and 1994 just represent values. T h e data is provided as in p u t to the com puter, which
is processed to generate some m eaningful inform ation. For example, 29, January and 1994 are processed
by the com puter to give the date o f birth o f a person.
Users are people who w rite com puter program s or interact w ith the com puter. T hey are also known as
skinware, liveware, humanware orpeopleware. Programmers, data entry operators, system analyst and com
puter hardware engineers fall into this category.
Copy righted
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Introduction to Computer
15
relatives via Internet, for paying bills, for education and learning, etc. M icroprocessors are em bed
ded in house hold utilities like, washing machines, TV s, food processors, hom e theatres, security
devices, etc.
T h e list o f applications o f com puters is so long that it is not possible to discuss all o f them here. In
addition to the applications o f the com puters discussed above, com puters have also proliferated into areas
like banks, investm ents, stock trading, accounting, ticket reservation, m ilitary operations, meteorological
predictions, social netw orking, business organizations, police departm ent, video conferencing, telepres
ence. book publishing, web newspapers, and inform ation sharing.
SUMMARY____________________________________
0
o f computer.
0
Copyrighted material
6____ |
Basics of Computer
KEYWORDS
ABACUS 3
Analog computer 2
Arithmetic Logic Unit (ALU) 13
Assembly language 5
Babbages Analytical Engine 4
Central Processing Unit
(CPU) 6
Computer 2
Control Unit (CU) 13
Data 11
Desktop computer 8
Digital computer 2
Dumb terminal 9
Fifth Generation Computer 6
First Generation Computer 4
Floating point Operations
Per Second (FLOPS) 9
Fourth Generation Computer 6
Hardware 4
Holleriths tabulator 4
Input 11
Input/Output Unit 12
Integrated Circuit (IC) 5
Intelligent terminal 9
Jacquard s punch card 3
Large Scale Integration (LSI)
Leibnizs Machine 3
Machine language 4
Mainframe computers 9
Memory 13
Microcomputers 7
Microprocessor 6
Minicomputers 9
Napiers bones 3
Netbook 8
Notebook computer 8
Output 12
Parallel processing 7
Pascals Machine 3
Personal Computer (PC) 8
Personal Digital Assistant
(PDA) 9
Process 12
Program 11
Punched cards 4
Second Generation
Computer 5
Slide Rule 3
Smart phones 9
Software 11
Storage unit 6
Supercomputer 9
Super Large Scale Integrated
(SLSI) chips 6
Tablet computer 8
Third Generation
Computer 5
Transistors 5
Users 11
Vacuum Tubes 4
Very Large Scale Integration
(VLSI) 6
Copyrighted material
Introduction to Computer
17
QUESTIONS__________________________________
Section 1.2
1. D e fin e
a n a n a lo g c o m p u te r a n d a d ig ita l c o m p u te r .
Section 1.3
Section 1.5.4
23. The
fourth
generation
for circuitry.
computers
used
Section 1.5.5
Section 1.4
second
generation
for circuitry.
computers
used
16 . O c M jrib c t h e .s e c o n d g e n e r a t i o n c o m p u t e r b a s e d
Section 1.6.1
Section 1.5.2
15. The
1.6.2
Section 1.6.3
36. Define mainframe computer.
37. Give two examples of mainframe computer.
Section 1.5.3
19. The
third
generation
____________ for circuitry.
computers
used
Copyrighted material
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
x:
w
i\y
./
K
Y
decoding,
fir
The com puter as a m achine consists of different com ponents that interact with each other
to provide the desired functionality of the computer. As a user of the computer, w e need
to be aw are of the m ain com ponents of the computer, their functions and the intercon
&
nection betw een the different com ponents of the computer. This chapter describes the
different hardware com ponents of the computer.
2.1 INTRODUCTION
W h en we talk o f com puter hardware, the three related term s th at require introduction are com puter
architecture, com puter organization and com puter design. Computer architecture refers to the structure
and behavior o f the com puter. It includes the specifications o f the com ponents, for example, instruction
form at, instruction set and techniques for addressing memory, and how they connect to the other com po
nents. Given the com ponents, computer organization focuses o n the organizational structure. It deals with
how the hardware com ponents operate and the way they are connected to form the com puter. Given the
system specifications, computer design focuses on the hardw are to be used and the interconnection o f parts.
D ifferent kinds o f com puter, such as a P C or a m ainfram e com puter m ay have different organization;
however, basic organization o f the com puter rem ains the same.
A com puter consists o f three main com ponents (1) In p u t/O u tp u t (I/O ) Unit, (2) Central Processing
U nit (C PU ), and (3) M em ory Unit. T h e com puter user interacts w ith the com puter via the I/O unit. T h e
purpose o f I/O unit is to provide data and instructions as in p u t to the com puter and to present relevant
Copyrighted material
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
P ro c e s s o r
L lc a c h e
Figure 2.3
L 2 cach e
M
N y
23
RAM
0 Cache m em ory is built into the processor, and may also be located next to it on a separate chip
between the C P U and RAM . Cache built into the C P U is faster than separate cache, run n in g at
the speed o f the microprocessor itself. However, separate cache is roughly twice as fast as RAM.
0 T h e C P U has a built-in Level 1 (L l) cache and Level2 (L2) cache, as shown in Figure 2.3. In addition
to the built-in Ll and L2 cachc, some CPU s have a separate cache chip on the m otherboard. This
cache on the m otherboard is called Level 3 (L3) cache. Nowadays, high-end processor comes with
built-in L3 cache, like in Intel core i7. T h e L l, L2 and L3 cache store the m ost recently run instruc
tions, the next ones and the possible ones, respectively. Typically, CPU s have cache size varying from
256KB (L l), 6 M B (L2), to 12MB (L3) cache.
01C ache m em ory is very expensive, so it is smaller in size. Generally, com puters have cache m em ory
o f sizes 256 KB to 2 MB.
0 Primary m em ory is o f two kinds Random Access M emory (RAM) and Read O nly M em ory (ROM ).
0 RAM is volatile. It stores data w hen the c o m p u te r is o n . T h e in fo rm atio n sto red in RAM
gets erased w hen the c o m p u ter is tu rn e d off. RAM provides temporary storage for d ata and
in stru ctio n s.
0 RAM stores data and instructions during the execution o f instructions. T h e data and instructions that
require processing are brought into the RAM from the storage devices like hard disk. C P U accesses
the data and the instructions from RAM , as it can access it at a fast speed than the storage devices
connected to the in p u t and o u tp u t unit (Figure 2.4).
0 T h e in p u t data that is entered using the in p u t unit is stored in RAM , to be m ade available d u r
ing the processing o f data. Similarly, the o u tp u t data generated after processing is stored in RAM
before being sent to the o u tp u t device. Any interm ediate results generated during the processing
o f program are stored in RAM.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
26
Basics of Computer
i k
( )
Execute
Figure 2.8
Instruction cycle
Fetch instruction
from m em ory
I
P lace instruction
in IR
I
Increm ent PC
D ecode instruction
B reak into parts
using instruction set
architecture
E xecute instruction
T h e operation
im plied by instruction
is perform ed
Store
instruction
in co m p u ter
m em ory
Figure 2.9
27
A C P U perform ance is measured by the num ber o f instructions it executes in a second, i.e., M IP S
(m illion instructions per second), or B IP S (billion instructions per second).
2.7 MICROPROCESSOR
A processors instruction set is a determ ining factor in its architecture. O n the basis o f the instruction set,
m icroprocessors are classified as Reduced Instruction Set C o m p u ter (RISC), and Com plex Instruction
Set C o m p u ter (CISC). T h e x86 instruction set o f the original Intel 8086 processor is o f the C ISC type.
T h e PCs are based on the x86 instruction set.
CISC architecture hardwires the processor with complex instructions, which are difficult to create
otherwise using basic instructions. CISC combines the different instructions into one single CPU .
C IS C has a large instruction set that includes simple and fast instructions for perform ing basic
tasks, as well as complex instructions that correspond to statem ents in the high level language.
An increased num ber o f instructions (200 to 300) results in a m uch more com plex processor,
requiring millions o f transistors.
Instructions are o f variable lengths, using 8, 16 or 32 bits for storage. T his results in the proces
sors tim e being spent in calculating where each instruction begins and ends.
W ith large num ber o f application software program s being w ritten for the processor, a new pro
cessor has to be backwards com patible to the older version o f processors.
A M D and Cyrix are based on C ISC .
RISC has simple, single-cycle instructions, which perform s only basic instructions. RISC archi
tecture does n o t have hardw ired advanced functions. All high-level language support is done in the
software.
RISC has fewer instructions and requires fewer transistors, which results in the reduced m anu
facturing cost o f processor.
T h e instruction size is fixed (32 bits). T h e processor need not spend tim e in finding o u t where
each instruction begins and ends.
RISC architecture has a reduced production cost com pared to C ISC processors.
T h e instructions, simple in nature, are executed in just one clock cycle, which speeds up the
program execution when com pared to C IS C processors.
RISC processors can handle m ultiple instructions sim ultaneously by processing them in parallel.
Apple M ac G 3 and PowerPC are based on RISC.
Processors like A thlon XP and Pentium IV use a hybrid o f both technologies.
P ip e lin in g improves instruction execution speed by putting the execution steps into parallel. A
C P U can receive a single instruction, begin executing it, and reccivc another instruction before it has
com pleted the first. T his allows for more instructions to be perform ed, about, one instruction per
clock cycle.
Parallel P rocessing is the sim ultaneous execution o f instructions from the same program on differ
ent processors. A program is divided into m ultiple processes that are handled in parallel in order to
reduce execution time.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
33
USB Ports to connect newer peripherals like cameras, scanners and printers to the com puter. It
uses a thin wire to connect to the devices, and m any devices can share that wire simultaneously.
Firewire is another bus, used today m ostly for video cameras and external hard drives.
RJ45 connector (called LAN or Ethernet port) is used to connect the com puter to a netw ork. It
corresponds to a netw ork card integrated into the m otherboard.
VGA connector for connecting a m onitor. T his connector interfaces with the built-in graphics card.
Audio plugs (line-in, line-out and m icrophone), for connecting sound speakers and the m icro
phone. T his connector interfaces w ith the built-in sound card.
SCSI port for connecting the hard disk drives and netw ork connectors.
PC I (Peripheral C om ponent In te rc o n n e c t) slot To connect audio, video and graphics. T hey are
m uch faster than ISA cards.
PCI (Peripheral Component Interconnect) Express slot Faster bus architecture than AGP and PCI buses.
PC Card It is used in laptop computers. It includes Wi-Fi card, network card and external modem.
Figure 2.17
Expansion slots
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Computer M em ory
H igh
H igh
41
Low
Figure 3.2
Memory hierarchy
T h e internal m em ory and external m em ory are the two broad categories o f m em ory used in the
com puter. T h e internal m em ory consists o f the C P U registers, cache m em ory and prim ary m emory.
T h e internal m em ory is used by the C P U to perform the com puting tasks. T h e external m em ory is also
called the secondary m emory. T h e secondary m em ory is used to store the large am o u n t of data and the
software.
In general, referring to the com puter m em ory usually means the internal memory.
V _____ __ -.......................................................................................................................................................... . - V
0
Internal Memory T h e key features o f internal m em ory are (1) lim ited storage capacity,
(2) tem porary storage, (3) fast access, and (4) high cost. Registers, cache memory, and primary'
m em ory constitute the internal memory. T h e prim ary m em ory is further o f two kinds RAM
and R O M . Registers are the fastest and the m ost expensive am ong all the m em ory types. T h e
registers are located inside the C P U , and are directly accessible by the C P U . T h e speed o f registers
is between 12 ns (nanosecond). T h e sum o f the size o f registers is about 200B. Cachc m em ory is
next in the hierarchy and is placed between the C P U and the main memory. T h e speed ol cache
is between 2 -1 0 ns. The cache size varies between 32 KB to 4M B. Any program or data that has
to be executed m ust be brought into RAM from the secondary memory. Prim ary m em ory is
relatively slower than the cache memory. T he speed o f RAM is around 60ns. T h e RAM size varies
from 512KB to 3GB.
Secondary M emory T he key features o f secondary m em ory storage devices are (1) very high
storage capacity, (2) perm anent storage (non-volatile), unless erased by user, (3) relatively slower
access, (4) stores data and instructions that are not currently being used by C P U b u t may be
required later for processing, and (5) cheapest am ong all memory. T h e storage devices consist
o f two parts drive and device. For example, m agnetic rape drive and m agnetic tape, m agnetic
disk drive and disk, and, optical disk drive and disk. T h e speed o f m agnetic disk is around 60m s.
C o p y rig h te d m aterial
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Computer M em ory
45
T h e R O M m em ory chip (Figure 3.5) stores the Basic Input Output System (BIOS). BIOS provides
the processor with the inform ation required to boot the system. It provides the system with the
settings and resources that are available on the system. BIOS is a perm anent p art o f the com puter.
It does n o t load from disk but instead is stored in a RO M m em ory chip. T h e program code in the
BIOS differs from ordinary software since it acts as an integral part o f the com puter. W hen the
com puter is turned on, the BIOS does the following things
CM OS
battery
ROM
BIO S
Figure 3.5
Power On Self Test (POST) is a program that runs autom atically when the system is booted. BIOS
perform s the power-on self-test. It checks that the m ajor hardware com ponents are w orking
properly.
BIOS setup program , which is a built-in utility in BIOS, lets the user set the m any functions
that control how the com puter works. BIOS displays the system settings and finds the bootable
devices. It loads the interrupt handlers and device drivers. It also initializes the registers.
Bootstrap Loader is a program whose purpose is to start the com puter software for operation when
the power is turned on. It loads the operating system into RAM and launches it. It generally seeks
the operating system on the hard disk. T he bootstrap loader resides in the R O M . T h e BIOS initi
ates the bootstrap sequence.
R O M s are o f different kinds. T hey have evolved from the fixed read only m em ory to the ones that
can be program m ed and re-program m ed. T hey vary in the num ber o f re-writes and the m ethod
used for the re-writing. Program m able R O M (PR O M ), Erasable Program m able R O M (EPR O M )
and Electrically Erasable Program m able R O M (EEPR O M ) are some o f the RO M s. All the differ
en t kinds o f R O M retain their content w hen the power is turned off.
PROM can be program m ed w ith a special tool, b u t after it has been program m ed the contents
cannot be changed. PR O M m em ories have thousands o f fuses (or diodes). H igh voltage (12 V)
is applied to the fuses to be burnt. T h e b u rn t fuses correspond to 0 and the others to 1.
EPRO M can be program m ed in a sim ilar way as PR O M , b u t it can be erased by exposing it to
ultra violet light and re-program m ed. E PR O M chips have to be removed from the com puter
for re-writing.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Computer M em ory
An.
49
Track
sector
sector
Figure 3.10
M agnetic disk is inserted into a m agnetic disk drive for access. T h e drive consists o f a read/write
head that is attached to a disk arm, which moves the head. T h e disk arm can move inward and
outw ard on the disk.
D uring reading or w riting to disk, the m otor o f disk drive moves the disk at high speed (6 0 -1 5 0
times/sec.)
transfer rate.
T h e sum o f seek tim e, latency tim e and tim e for data transfer is the access tim e o f the disk.
0
Large disk storage is created by stacking together m ultiple disks. A set o f same tracks o n all disks
form s a cylinder. Each disk has its ow n read/w rite head which w ork in coordination.
A disk can also have tracks and sectors on both sides. Such a disk is called double-sided disk.
T h e features o f m agnetic disk are
C heap storage device
C an store a large am ount o f data
Easy to carry or transport
Suitable for frequently read/w rite data
Fast access device
M ore reliable storage device
To be prevented from dust, as the read/w rite head flies over the disk. Any dust particle in between
can corrupt the disk.
______ 50
Basics of Computer
Boot Sector
It contains the program that runs when the com puter is started. T h e program
checks if the disk has files required to run the operating system. It then transfers control to an
operating system program which continues the startup process. Boot sector also contains infor
m ation about the disk, like num ber o f bytes per sector and n u m ber o f sectors per track. This
inform ation is required by the operating system to access the data on the disk.
File Allocation Table It records the location o f each file and status o f each sector. W hile read
ing or w riting to disk, operating system checks the FAT to find free area o r locate where data is
stored on disk, respectively.
Root Directory T his is the m ain folder o f disk. It contains other folders in it, creating a hier
archical system o f folders. T h e root directory contains inform ation about all folders on the disk.
D ata Area T h e rem aining area o f the disk (after boot sector, FAT, root directory) is the data
area. It stores the program files and data files that are stored on the disk.
T he W indow s XP and the W indow s 2000 operating system use the N ew Technology File System
(N TFS) 5 file system. T h e N T F S 5 file system offers better security and increased perform ance.
It allows using o f filenames that are more than eight characters long.
Floppy disk, hard disk and zip disk are the different types o f m agnetic disks.
Floppy disk
Computer M em ory
51
T h e 5 -V\ inch disk came around 1987. It can store 360 KB to 1.2 M B o f data.
T h e 3-Vz inch disk has capacity o f 400 KB to 1.44 M B. It usually contains 40 tracks a n d 18 sectors
per track and can store 512 bytes per sector.
Spindle
arms
head
Figure 3.12
H a rd disk is a fixed disk. T he disk is n o t removable from the drive, unlike floppy disk.
T h e hard disk and H ard D isk Drive (H D D ) is a single unit.
H ard disk can store m uch m ore data than floppy disk. T h e data in hard disk are packed m ore
closely (because fast spinning uses smaller m agnetic charges) and they have m ultiple platters, w ith
data being stored on b oth sides o f each platter. Large capacity hard disks m ay have 12 o r m ore
platters.
U nlike floppy disk, the read/w rite head o f hard disk does n o t touch the disk d u rin g accessing.
H ard disk can spin at the speed o f up to 10,000 revolutions per m inute a n d have an access tim e o f
9 -1 4 ms. It stores 512 bytes per sector b u t the num ber o f sectors are m ore per track (54 o r more)
than floppy disk.
S
Nowadays, hard disks are available that can store up to 500 G B o f data. Generally, PCs come with
160 GB hard disk.
H ard disk is the key secondary storage device o f com puter. T h e operating system is stored o n the
hard disk. T he perform ance o f com puter like speed o f com puter boot up, loading o f program s to
C o p y rig h te d m aterial
________ 52
| Basics o f Computer
prim ary m emory, loading o f large files like images, video, audio etc., is also dependent on the hard
disk.
0
Nowadays, portable external hard disk drive is available which can be attached to the USB drive o f
the com puter. T hey com e in the storage capacities o f 80 GB to 500 GB.
floppy disk.
0 Z ip disk are o f the same size as floppy disk, i.e., 3 -Vi inch b u t
have a m uch higher capacity than the floppy disk (Figure 3.13).
0 Z ip disk and drive were m ade by Iomega C orp. It comes as a
com plete unit disk, drive, connection cable, power cord and
operating system. It can be connected to the com puter system
externally using a parallel chord o r SCSI cable.
3.13
Zip disk
C o p y rig h te d m aterial
Computer Memory
Track
(concentric
circles)
Sector wider
at edge than
center
Magnetic disk
Spiral
track
1____ 5 3
Sectors
of same
width
Optical disk
figure 3>15 Sectors and track in magnetic disk and optical disk
O ptical disks can store large am o u n t o f data, up to 6 G B , in a small space. C om m only used optical
disks store 6 0 0 -7 0 0 M B o f data.
T h e access tim e for an optical disk ranges from 100 to 200 ms.
T here are tw o m ost com m on categories o f optical disks read-only optical disks and recordable
optical disks.
3.11.1 CD-ROM
Originally, C om pact D isk (C D ) was a popular m edium for storing music. Now, it is used in com
puters to store data and is called C om pact Disk-Read O n ly M em ory (C D -R O M ).
As the nam e suggests, C D -R O M (Figure 3.16) is an optical disk th at can only be read and n o t
w ritten on. C D -R O M is w ritten on by the m anufacturer o f the C D -R O M using the laser light.
A C D -R O M drive reads data from the com pact disk. D ata is stored as pits (depressions) and lands
(flat area) on C D -R O M disk. W hen the laser light is focused on the disk, the pits scatter the light
(interpreted as 0) and the lands reflect the light to a sensor (interpreted as 1).
As C D -R O M is read only, n o changes can be m ade into the data contained in it.
Since there is n o head touching the disk, b u t a laser light, C D -R O M does n o t get w orn o u t easily.
T h e storage density o f C D -R O M is very high and cost is low as compared to floppy disk and hard disk.
Access tim e o f C D -R O M is less. C D -R O M drives can read data at 150Kbps. T h ey com e in m ul
tiples o f this speed like 2x, 4x, 52x, 75x, etc.
It is a com m only used m edium for distributing software a n d large data.
3.11.2 DVD-ROM
D igital Video Disk-Read O n ly M em ory (D V D -R O M ) is an optical storage device used to store
digital video or com puter data (Figure 3.17).
C o p y rig h te d m aterial
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Com
p u te r M e m o ry
user, have slow access, store the data and instruc
tions that are not currently being used by C PU , and
are cheapest among all memory. M agnetic disk and
optical disk are storage devices.
57
KEYWORDS
Access time 40
Basic Input Output System
(BIOS) 45
Bit 40
Boot sector 50
Bootstrap loader 45
Byte 40
Cache Hit 42
Cache memory 42
(DVD-R) 55
Direct Access 46
Dual Inline Memory Module
(DIMM) 44
Dynamic RAM (DRAM) 43
Electrically Erasable Programmable
ROM (EEPROM) 45
Erasable Programmable ROM
Cache Miss 42
Compact Disk (CD)
(EPROM) 45
File Allocation Table (FAT)
53
50
C o p y rig h te d m aterial
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
INPUT A N D DUTPUT
DEVICES
0
0
0
& * * . '
5.
*::?>'?!
ihvrf '4
A:<V
^ : i j
0
0
rS .sjL -
W h a t is the use of the com puter for us? W e m ay w ant to process data, w rite project reI ports, listen to sound recordings, watch a m ovie and do m any m ore things. But to do any
:: of these things, w e should be able to p ro vid e the data to the com puter and also get the
outp ut from it. The in p ut devices and output devices are used this purpose. The aim of this
t chapter is to introduce the different kinds of in p ut and output devices.
l .-?j:
i i - '<:
.vs%'. c V -
4.1 INTRODUCTION
A com puter interacts w ith the external environm ent via the in p u t-o u tp u t (I/O ) devices attached to it.
In p u t device is used for providing data and instructions to the com puter. After processing the in p u t data,
com puter provides o u tp u t to the user via the o u tp u t device. T h e I/O devices that arc attached, externally,
to the com puter m achine are also called peripheral devices. D ifferent kinds o f in p u t and o u tp u t devices are
used for different kinds o f in p u t and o u tp u t requirem ents. In this chapter, we shall discuss different kinds
o f in p u t devices and o u tp u t devices.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
65
4.4.2.7 Mouse
Features
It is the m ost com m on p o in tin g in p u t device. T h e data is entered by p o in tin g the m ouse
to a location on the com puter screen. T h e m ouse m ay also be used to position the cursor on screen,
m ove an object by dragging, or select an object by clicking. T h e key benefit o f using a m ouse is th at the
cursor moves w ith the m ouse. So, the cursor can be positioned at any location on the screen by sim ply
m oving the m ouse. M oreover, it provides an easy way to select and choose com m ands from m enus,
dialog boxes, icons, etc. M ouse is used extensively, w hile w orking w ith graphics elem ents such as line,
curve, shapes, etc.
Description M ouse is a small hand-held device having two or three buttons on its u pper side. In addi
tion to the buttons, m ouse also has a small wheel between the buttons. Figure 4.3 (i) shows a mouse.
T h e wheel o f the m ouse is used for the up and dow n m ovem ent, for example, scrolling a long docum ent.
A m ouse is classified as physical mouse or optical mouse.
Figure 4.3
Physical M ouse
has a rubber ball on the bottom side th at protrudes w hen the m ouse is moved. It
requires a sm ooth, dust free surface, such as a m ouse pad, on which it is rolled.
O ptical Mouse uses a Light E m itting D iode (LED) and a sensor to detect the m ovem ent o f mouse.
O ptical mouse requires an opaque flat surface underneath it. O ptical mouse was introduced by M icrosoft
in 1999. O ptical m ouse is better than physical m ouse as there is no moving part that can cause wear and
tear, and d irt cannot get inside it. A user is w orking w ith an optical m ouse in Figure 4.3 (ii).
W orking In a plrysical mouse, rollers and sensors are used to sense the direction and rate o f m ovem ent
o f m ouse. W h en the ball o f m ouse moves, the rollers sense th e horizontal and vertical m ovem ent and
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
69
generally used in applications like A utom ated Teller M achine (ATM ), public inform ation com puters like
hospitals, airline reservation, railway reservation, superm arkets, etc. (Figure 4.8).
Description Touch scrccn consists o f a clear glass panel that is placed over the view area o f com puter
screen. In addition to the glass panel with sensors, it has a device driver, and a controller that translates the
inform ation captured by the glass panel sensors to a form that the com puter can understand.
W orking Touch screens have an infrared beam that criss-cross the surface o f screen. W hen a fingertip is
touched on the screen, the beam is broken, and the location is recorded. Some touch screens have ultra
sonic acoustic waves that cross the surface o f screen. W hen a fingertip is touched on the screen, the wave is
interrupted, and the location is recorded. T h e recorded location is sent to the com puter via the controller
o f touch screen, in a form that the com puter can understand.
Speech recognition system s are costly and difficult to develop. T hey are generally used by people w ho
have difficulty in typing, people w ith disabilities or by corporate w orld for d ictatio n . A udio in p u t can
be recorded on an m p3 recorder and provided as an in p u t to com puter. O p en source softw are like
A udacity is used for recording and ed itin g of audio files (Figure 4 .9 (ii)).
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
75
(sharpness and clarity o f print) o f the printer is determ ined by the resolution o f the printer. Resolution is
m easured in dots per inch (dpi). Printers with a high resolution (more dpi) provide better quality output.
D ifferent kinds o f printers are available for different types o f applications. Printers are classified into two
categories im pact printer and non-im pact printer.
Impact printers use the typew riter approach o f physically striking a typeface against the paper and inked
ribbon. Im pact printers can prin t a character or an entire line at a time. Im pact printers are low-cost p rin t
ers useful for bulk printing. D o t m atrix printers, daisy wheel printers and d ru m printers are examples o f
im pact printers.
Figure 4.18
Non-Impact Printers do n o t hit o r im pact a ribbon to print. T hey use electro-static chemicals and ink-jet
technologies. N on-im pact printers are faster and quieter than im pact printers. T hey produce high quality
o u tp u t and can be used for printin g text and graphics both in black and w hite, and color. Ink-jet printers
and laser printers are non-im pact printers.
Ink-jet Printers spray ink drops directly on the paper like a jet (Figure 4.19 (i)). T h eir resolution
is m ore than 500 dpi. T hey produce high quality graphics and text. Ink-jet printers are com m only
found in hom es and offices.
Laser Printers (Figure 4.19 (ii)) provide highest quality o f text and graphics printing. I-aser
printers process and store the entire page before printing and are also know n as page printers.
T h e laser printer can prin t 5-24 pages o f text per m inute and their resolution ranges from 400 to
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Figure 4.23
Figure 4.24
79
LC D m o n ito r
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
hand-held
85
scanners
and
flat-bed
Section 4.7-4.8
Section 4.6-4.6.1.1
45. Dot Matrix printers come in two sizes _
column printer a n d ______ column printer.
Extra Questions
Section 4.6.1.24.6.2.4
52. What is the use of a plotter?
53. Plotters are of two kinds____
(i) I/O
(ii) LED
(iii) CAD
(iv) ATxM
(v) M IC R
(vi) O M R
(vii) O C R
(viii) dpi
(ix) cps
(x) CAM
(xi) C O M
(xii) C R T
(xiii) LCD
(xiv) V D T
(xv) USB
(xvi) M ID I
.plotter and
___________p lo tte r .
(c) O u tp u t unit
(d) Keyboard
(e) Mouse
(f) Trackball
(g) Joystick
(o) Scanner
(p) M IC R
(q) OxMR
(r) O C R
(s) Printer
C o p y rig h te d m aterial
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Data Representation
0
89____
T h e position value and quantity o f a digit at different positions in a n u m ber are as follow*
Position:
Position Value:
Q uantity:
3
103
1000
2
102
100
1
10'
10
0
10
1
-2
10-2
1/100
-1
10-*
1/10
-3
10-3
1/1000
All binary num bers are form ed using com bination o f 0 and 1. For example, 1001, 11000011 and
10110101 .
3
23
8
2
22
4
V
2
0
2
1
-1
2 '1
1/2
-2
2"2
1/4
-3
23
1/8
All octal num bers are represented using these eight digits. For example, 273, 103, 2375, etc.
T h e position value and quantity o f a digit at different positions in a n u m ber are as follows
Position:
Position Value:
Q uantity:
3
83
512
2
82
64
1
8'
8
0
8
1
-2
8~2
1/64
-1
8-'
1/8
-3
8-3
1/512
All hexadecim al num bers are represented using these 16 digits. For example, 3FA, 87B, 113, etc.
3
163
4096
2
162
256
1
16 1
16
0
16
1
- 1
16~
1/16
2 - 3
16"2
16"3
1/256
1/4096
Table 5.1 summ arizes the base, digits and largest digit for the above discussed n u m ber systems. Table
5.2 shows the binary, octal a n d hexadecimal equivalents o f the decim al num bers 0 -1 6 .
Base
Digits
Decim al
10
0 -9
Binary
0,1
O ctal
0 -7
Hexadecim al
16
0 -9 , A, B, C, D, E, F
F (15)
Table 5.1
Largest D igit
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
Data Representation
(3)
(4)
(5) W rite the digits in the non-fractional part starting from upwards to downwards.
1.8760
.8760
1.7520
.7520
___ x_2
1.5040
.5040
___ x .2
1.0080
T h e binary equivalent o f (0.2345),0 is (0.001 111),
Example 5a:
0.865
0.865
__*2
__JLS
1.730
6.920
_JL 8
7.360
_& 2
1.460
x2
0.920
___ X..8
2.880
____ x l
1.840
. x.2
1.680
___x_2
1.360
The binary equivalent of
(.865)l0 is (.110111)2
7.040
The octal equivalent of
(0.865)10 is (.6727)8
0.865
_x_j_6
5190
865 x
13.840
x 16
5040
_40x_
13.440
x 16
2640
-44.0 .x
7.040
The num ber 13 in hexadeci
mal is D.
The hexadecim al equivalent
of (O.865)10 is (.DD7),'16
C o p y rig h te d m aterial
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a page that is unavailable for viewing or reached your viewing limit for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
You have either reached a p a ge that is unavailable for view ing or reached your view ing lim it for this
book.
Computer
Fundamentals
A n ita G oel
Any undergraduate course, irrespective of the streams commerce, humanities, management, science or
engineering cannot be completed without a basic understanding of computers. This book has been written
keeping in mind the requirements of this vast audience. The language used in the book is lucid, simple and
reader-friendly so that a novice can easily comprehend underlying concepts in computing. Logical organization
of the chapters, step-by-step presentation of the concepts, illustrations, flow charts, photographs (both color
and black-and-white) and chapter-end exercises makes the book a perfect choice for an introductory course.
CONTEMPORARY IN COVERAGE
Information Systems
Fundamentals of Databases
I Wireless Networking
Computer Security
I Assembling a PC
I
I
Lecture Slides
Solution Manual
mQuest
Anita Goel is Associate Professor, Department of Computer Science, Dyal Singh College, University of Delhi. She
has teaching experience of over two decades. She is guiding several students for their doctoral studies, and has
several national and international research publications to her credit. She has been appointed as Fellow for
Computer Science, Institute of Life Long Learning (ILLL), at the University of Delhi.
T.illmQues
PEARSON
U n lin e resources a va i
www.pearsoned.co.in/anitagoel
Copyrighted material