Professional Documents
Culture Documents
v
e
r
the past few years, computers have become a vastly popular
household item. The luxury of emailing messages as opposed to
charging up the phone bill is more appealing. Checking news,
weather, and sports via the Internet is a convenience that many
are taking advantage of.
We lives already getting influenced by technology and this is just
the beginning. Computers and Internet Today, We find computers
in use everywhere, whether we go to reserve a train ticket or to a
Bank. This is because it is faster and helps us complete our work
without mistakes/errors.
We are learning to read and write with computer games instead of
homemade flash cards. Childrens are reading their bed time
stories online instead of in bed with their parents. Slowly traditions
are being broken and the computer is becoming a childs learning
tool. Many parents are buying computer learning games instead of
board games and pop-up books. Children are an easy target for
adults who pose to be other children with similar interests. Sexual
offenders often chat online with children and then make plans to
meet them or slowly filter information about them.
Children are innocents and honesty on the computer can pose
some huge problems. They do not know any better and usually it
will only harm them in the end
Parents are leaving the learning up to the computers and spending
less quality time with their children. The most important learning
step for children is interaction with others. If they are sitting in front
of the screen all day, they do not learn to share, wait their turn, or
even something as simples as manners. Children need to be in
contact with other children, adults, and animals. They need to
experience things first hand not off a computer screen.
Page 2 of 77
Merits of Computers
Computer is a unique invention. It has many merits and demerits. These are
following
High Speed:
The real power of a computer is its speed. It can complete the processing of bulks of
data in billionth part of a second. We can think of the most efficient and most
intelligent person working throughout his life and completing a piece of work, on the
other hand computer can complete the same work in a second.
Versatile:
During different moments computer is busy doing different works. In one moment it
will be doing mathematical work, the second moment it will be preparing list of
college admission, the third moment it can print some document; while all of these
works are being done you enjoy music on it.
Accuracy:
Computer can do multiple pieces of work at the same time. It is satisfying enough
that all of the works will be completed with complete accuracy.
Reliable
Computer is the best source for supply reliable and accurate information. Chances of
errors are negligibly small. Personal liking or disliking of the operator does not affect
the results of computer. It makes objective conclusions.
Automation:
In short, everything. The computer is a tool and the software tells the computer what
to do. On most of the times computer completes the work automatically without
human intervention. Once the data and necessary instructions have been fed, the
computer is able to accomplish the results automatically.
Storage Memory:
Computer stores lager amounts of data in its memory. Information stored in memory
is never corrupted; it remains in original form. When requested the stored information
is available at great speed.
Demerits of Computers:
No Intelligence:
Page 3 of 77
Computer is a machine and it cannot think and decide like human being. It is the
operator that is important. It completes the work with accuracy and speed in such a
way that some people think it to be intelligent.
No Feelings or Emotions:
Computer is a machine therefore it has no feelings and emotions. It can never
become equal to the human beings because it has no heart and soul. It does not feel
boredom and fatigue, liking and disliking etc.
Congenial Atmosphere:
Computer can work properly in special atmosphere. Soundproofing, dust proofing,
air-conditioning, and cleanliness are necessary to improve its efficiency.
Special Language:
We can interact with computer only in its special language that consists of binary
digits (0, 1). Computer can understand data and information only in this language. It
is impossible for human beings to understand it.
Computer Virus:
Virus is real threat to computers. During the recent years some dangerous and
malicious viruses have challenged the life of computers. When virus attacks a
computer, it can destroy some or all of the software installed.
Rapid Changes
Field of computer is very challenging. Very rapid changes are taking place in its
hardware and software. Man has to accept this challenge. This scheme of things
requires high expertise and sound economy.
Very expensive:
Hardware and Software of computer are very expensive. Although computers are
getting cheaper but are still out of the reach of the common man.
Increased Idles:
Computer has mad map idle. Man has been confined too little computer cabins. His
has made man less adventurous. Piece of work that normally took months to
compete is being completed in seconds. Rest of time is beings uselessly.
Extensive use of Internet
Internet is the result of computer technology. Extensive use of internet creating
serious problems. Students spend much time on the internet at the cast of their
education. It has created emotional problem in the youth.
Page 4 of 77
Computer is an imperfect machine. Its hardware and software are always changing.
New things are continuously being added to it. Something that was custom yesterday
obsoletes today.
Overall, we can benefit from computers if they are used wisely. Computers are the
wave of the future, but old fashioned learning techniques should not be forgotten. We
need to interact physically with other people and not learn everything from
computers.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
History of Computers
Abacus.
The history of computers starts about 5000 years ago with the birth of the
abacus.
It is a wooden rack holding horizontal wires with beads strung
on them.
These beads moved around, according to programming rules
memorized by user,
All regular arithmetic problems can be done.
Pascals Pascaline Calculator.1642
Page 5 of 77
Page 6 of 77
Classification of Computer
Computers come in many different sizes and range of power.
Supercomputer
Most powerful computer
Some of the largest
Built to process huge amount of data.
Fastest super computer can perform more than 16
million calculations per second.
These computer help analyze and forecast global
weather.
Nuclear scientists use these computers to perform complex and sophisticated
calculations etc
Super computer can cast tens of millions of dollars.
It consumes enough electricity to power dozens of homes.
Because of their size and cast only large corporations, universities, and
government agencies that can afford them use it.
Mainframe Computer
The largest type of computer in common use is the mainframe.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 7 of 77
MiniComputers
Minicomputer is also known as midrange computer.
Mini computers got their name because of small size.
Serve up to 4000 connected user.
Its have less processing power than mainframe computer.
A device with monitor and keyboard is called terminal.it is also
known as dump terminal.
It has no processing power and can not work as stand alone computer.
It has be connected to the server.
Micro Computer
Microcomputer Models
Pocket (Palmtop) Computer
Laptop (Portable computer)
Desktop Computer.
Pocket Computer
Laptop Computer
The cast of laptop computer is from $1000 to $2500.
All program and data on Portable computer.
Laptop and Desktop have same Operating System.
Have floppy drives, CD-ROM drives and re-writers, and
even DVD drives.
Full-size keyboard and a mouse or a touch-sensitive mouse pad.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 8 of 77
Desktop Computer
Most common type of PC.
Its called desktop computer because its fit on a desk or table.
System unit OS placed horizontally on the desktop or table and monitor
OS placed on the system unit.
Other called tower model, both system and monitor are placed on the
table.
Two main types of desktop computer
Page 9 of 77
DISTAVANTAGES
DISADVANTAGES
Page 10 of 77
DISADVANTAGES
Smaller in size
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 11 of 77
Very reliable
Heat generation is low
No air condition is required in most cases
Much faster in computation than previous generation
Hardware failure is minor
Easily portable because of their small size
Totally general purpose
Big memory
Cheapest among all generations
DISADVANTAGES
Highly difficult technology is required for the manufacturing of micro
processor chip
Page 12 of 77
Page 13 of 77
Page 14 of 77
Bus
RAM
CU
Registers
Processor
ALU
Registers
Page 15 of 77
Page 16 of 77
but it also loads a copy of the data into cache memory. The next time the CPU needs
that same data, it finds it in the cache memory and saves the time needed to load the
data from RAM. Since the late 1980s, most PC CPUs have cache memory built into
them. This CPU resident cache is often called Level-1
A cache is useful when RAM accesses are slow compared with the microprocessor
speed, because cache memory is always faster than main RAM memory.
Computers operate at very high speeds. Current CPU's operate at speeds of 400
million cycles per second or more. What this means is, every 2.5 nanoseconds, the
computer can execute a complete processing loop.
In modern computers, this means usually executing one or two instructions. This is
the speed you will see advertised on a computer--a Pentium III 400.
The problem is, while the computer can operate at this speed, it has to get the
program and data to execute from somewhere.
What happens is the program and data is loaded from the hard drive into RAM. From
RAM it is loaded into cache RAM, and from there it is executed by the CPU.
Hard drives are very slow compared to the CPU. RAM is much faster than a hard
drive, but still 4-5 times slower than your CPU. Also RAM is erased if the power goes
off. Cache RAM is extremely fast--it is capable of delivering data at or near the
speed of the CPU.
Cache RAM and normal RAM are very similar in the way they work. Cache is just
extremely fast, and expensive.
That is why there is so very little of cache RAM available--it is expensive. In order to
reduce the cost of computers, hard drives are used to store huge amounts of data
because they are so cheap--some drives cost less than a penny for a megabyte of
storage.
RAM is much more expensive--about a dollar for a megabyte of storage. This is over
100 times more expensive than a hard drives.
Cache RAM is a lot more expensive than regular RAM--about $15-20 per megabyte
of storage.
In order to reduce the cost of computers, engineers have designed controllers that
load data and instructions from the hard drive when they may be needed into RAM.
When they are not needed in RAM, something else is loaded. Then, as the
computer runs, whatever is needed for that time is loaded into cache. When the
controller does a pretty good job at predicting what is needed, the computer will
operate at close to its full speed. When the controllers don't do a good job, things will
slow down while the CPU waits for data to be loaded from the hard drive to RAM,
and then into the cache before it can continue.
Now, to anser your question, cache memory is where the computer gets the program
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 17 of 77
and data it needs to execute. If the cache is slower than your CPU, your computer
will be slow. But if it is faster, your computer won't speed
up. So you want to make sure the cache is fast enough for your computer, but
getting faster cache memory is a waste of money.
Second, the amount of cache memory also affects the speed of your computer. In
general, the more cache, the faster your computer will go. Most computers have a
fairly small limit on the amount of cache RAM possible. Generally, make sure your
computer has as much cache RAM as it can handle.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 18 of 77
Computer
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 19 of 77
Page 20 of 77
INPUT DEVICES
Input unit consists of many input devices. These devices enable the operator to
provide input to the computer system. These devices play an important part in our
working with computer.
Type of Input Devices
There are many input devices.
Keyboard
Common or Regular Keyboards
Special Function Keyboards
Keyboards for special Persons
Pointing devices
Mouse
Trackball
Track pad
Touch Sensitive Screen
Optical Input Devices
Bar Code Readers
Scanner
Image Scanner
Optical Character Recognition (OCR)
Game Controller
Joystick
Game Pad
MICROPHONE & Speech Recognition System
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 21 of 77
KEYBOARD
Keyboard is the most common input device.
It is the primary input device.
Computer system is incomplete without a keyboard.
Following are the famous types of keyboard.
Common or regular keyboards
These are the most common type of keyboards. These manufacturer QWERTY
slandered. These give sound while working. These are most commonly used in many
of the government and private offices.
Special function keyboards
These keyboards are designed for special functions. For example the keyboards
used at fast food restaurants, PIA booking offices, and railways booking offices etc.
Operators press only one key to record the sale.
Keyboards for special persons
These keyboards are designed for special persons.
Special persons are handicapped, disabled, or blind.
Each key of these keyboards makes a sound when it is pressed.
In this way the disabled person knows which key was pressed.
POINTING DEVICES
The effectiveness of Graphical user Interface (GUI) depends on the users ability to
make a rapid selection from a screen full of graphics, icons or menus. In these
instances the pointing devices are used to change the position of the pointer over
icons quickly and efficiently. These devices are also use for drawing purpose. Mouse
is most commonly used pointing device.
Following are the some of the pointing
devices.
MOUSE
Dr. Douglas Engelbart invented mouse in
1963.
Mouse is the most common and the most
popular input device.
It is attached to the computer by its wire or linked via wireless remote connection.
When mouse is rolled across the desktop, it moves a pointer accordingly on the
computer screen.
Mouse is a point and draw device.
It has two buttons right and left.
A small rubber ball is in the bottom of the mouse.
The ball roll when move the mouse around on a flat surface.
Inside the mouse, rollers and sensor send signals to the computer, telling it the
distance, direction and speed of the ball.
The computer uses this data to position the mouse pointer on the screen.
Another type of mouse is the optical mouse.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 22 of 77
This mouse emits a beam of light from its underside it uses the lights reflection to
judge the distance, direction and speed of its travel.
TRACKBALL
This is a movable ball inserted in an external box or fixed in the keyboard. The
ball is rolled with the fingers to move the graphics curser.
If the mouse is upside down then it also takes the form of a trackball.
It is mostly supplied with portable PCs and workstations.
Most trackballs feature two buttons, although three buttons models are also
available.
TRACK PAD
The track pad is also called touchpad.
Many people feel difficulty to track pad then mouse or trackball.
They have no moving parts.
The movement of the finger across a small touch surface is translated into the
pointer movement on the computer screen.
The touch sensitive surface is 1.5 to 2 inch square so the finger never has to
move far. The
track pads size also makes it suitable for a notebook computer. Some notebook
computer models feature a built-in-track pad, rather than a mouse or trackball.
Track pads include two or three buttons that perform the same function as mouse
buttons. Some track pads are also strike sensitive, meaning you can tap the
pad with your fingertip instead of using its buttons.
Optical Input Devices
For a long time, futurists and computer scientists have had the goal of enabling
computers to see. Computers may never see in the same way that human do, but
new technologies allow computers to use light as a source of input. These tools fall
into the category of optical input devices.
BAR CODE READERS
The most common type of bar code reader is the flatbed model,
Which is commonly found in supermarkets and department stores. Workers for
delivery services, such as Federal Express,
Also use handheld bar code readers in the field to identify packages.
These devices read bar codes, which are patterns of printed bars that appear on
product packaging.
The bar codes identify the product and provide other information about it, such as
its price. The bar code reader emits a beam of light frequently a laser beam that
is reflected by the bar code image.
SCANNERS
This is a commonly used input device.
Scanner can read and understand the information on
printed matter and convert it into computer readable form.
All of the alphanumeric information is encoded and the
images are digitized into a form that is acceptable for the computer.
Scanners are equipped with the (OCR) Optical Character Recognition ability,
which is the ability to read printed information into a computer system. So
scanner is use for the following two purposes.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 23 of 77
IMAGE SCANNER
Image scanner (also called scanners) converts any printed image into electronic form
by shining light onto the image and sensing the intensity of the lights reflection at
every point. Color scanners use filters to separate the components of color into the
primary additive colors (Red, Green, Blue) RGB at each point. Red, green, and blue
are known as primary additive colors because they can be combined to create any
other color. Processes that describe color in this manner are said to use RGB color.
OPTICAL CHARACTER RECOGNITION (OCR)
If you have scanned a text document, you might want to use Optical Character
Recognition (OCR) software to translate the image into text that you can edit. When
a scanner first creates an image from a page, the image is stored in the computers
memory as a bitmap. A bitmap is a grid of dots, each dot represented by one or
more bits. The job of OCR software is to translate that array of dots into text that the
computer can interpret as letters and numbers.
GAME CONTROLER
A game controller can be considered as an input device
because a computer game is a program, much like other
program.
It accepts input from the user, process data and produce
output in the form of graphics and sound.
Game controllers generally are of two types:
Game pad
Joysticks.
JOYSTICK
This consists of a vertical handle fixed on a base.
Its appearance is like the gear of a car.
It can move the graphics curser in the direction the handle is pushed.
It can be pushed back and forth, right and left.
There is a button on the top of the handle that is used to enter or to escape the
function.
Joystick can also work like other pointing devices.
Joystick is mostly used in computer games. But some joystick users actually
prefer using joystick rather than a mouse.
GAME PAD
A Game Pad is a small, flat device that usually provides two sets of controls, one
for each hand.
These devices, which are extremely flexible, are use to control many games. If
you do not have a joystick,
You can use a game pad to control most racing and flying games.
MICROPHONE & Speech Recognition System
With the use of these systems the human being has succeeded in establishing
speaking terms with the computers.
These devices are used to input devices are used to input voice of audio data in
the computers.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 24 of 77
These devices encode the voice data into computer acceptable format. Sales
personnel in the field, surgeons in the operation theatres, and workers on airports
etc. use such devices.
Microphone is a good example of Speech Recognition Systems.
Kind of the memory on which data and the programs are washed out when
electric power is switched off.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 25 of 77
RAM is an example of Volatile memory where data is stored for temporary period.
NON-VOLATILE MEMORY
Type of the memory on which data and the programs are not washed out when
electric power is switched off.
ROM, CD-ROM and DVD-ROM are the example of nonvolatile memory.
This is a kind of primary memory and stores data temporarily during processing.
Computer can access data and instruction randomly
from RAM.
RAM is a kind of volatile memory.
RAM is read and writes memory
RAM is a memory chip and has no moving parts. It is
installed on the motherboard and links directly to the processor.
charge.
that
be read
Page 26 of 77
The recharging process thus decreases the processing speed of the computer.
This type of memory was used in old microcomputers.
DRAM used a small amount of electrical current..
The
Page 27 of 77
EEPROM (Flash):
This stands for Electrically Erasable Programmable
Read Only Memory.
Data and programs can be stored and changed on it
many time as we wish.
as
Collection of
1 KB
(KiloByte) consists of
1/2
1 MB(MagaByte)
500
consists of
8 bits.
1024 Byte
1024 (210)
1 GB (GigaByte) consists of
(230)
500,000
1024 MB
1 TB (TeraByte) consists of
500,000,000
1024 GB1,099,511,617,776
1 PB (PeteByte) consists of
1024 TB
1 EB (ExaByte) consists of
1024 PB
1 ZB (ZettaByte)
consists of
1024 EB
1 YB (YottaByte)
consists of
1024 ZB
1,076,641,824
Magnetic Tape
Magnetic Disk
Floppy Disk
Hard Disk
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 28 of 77
V.
VI.
VII.
Optical Storage
CD-ROM
DVD-ROM
Magnetic Tape
Magnetic Disk
Page 29 of 77
Hard disk is permanently fixed with the system unit. Therefore hard disk
also referred to as fixed disk.
It has large storage capacity.
It is from 1GB to 400GB or more. Hard disk is
usually 10 to 1000 times faster to access data as
compare to floppy disk
Hard disk contains several disks arranged on a
single rotating spindle. On both side of the disk
there is a coating of magnetic element.
Before using the hard disk is formatted.
On hard disk data is stored in the form of binary digits (0,1).
Hard disk spins continuously at a speed of more than 3600 rounds per
minutes.
A read and write head is there on each recording surface that can read
and write data on it.
Page 30 of 77
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
The most common output device is the monitor, the window which you to see
whats being processed by the computer
It shows information on the screen when you
type.
This is called outputting information. Monitors
come in many types and sizes from the simple
monochrome (one color) screen to full color
screens.
It displays text as well as pictures in black and white or color.
To get the full benefit of today's software with full color graphics and animation,
computers need a color monitor with a display or graphics card.
Resolution and number of colors can be set by user.
Types of Monitor
Monochrome Monitor:
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
is
Page 31 of 77
COLOR MONITOR:
A video display device designed to work with a video card or adapter to produce
text or graphics images in color.
Unlike a monochrome display, have a screen coated internally with patterns of
three phosphors that glow Red, Green, and Blue (RG) when struck by an electron
beam.
It is capable of generating an enormous potential range of colors on a color
monitor
The monitor screen consists of an array of tiny dots called pixels (picture
elements).
Typical sizes of this array of pixels are 640 by 480 or 800 by 600 or 1024 by 768.
This is also referred as the resolution.
Each pixel can be independently illuminated by a color.
The number of colors displayable on a monitor can be 16 or 256 or 216 (high
color) or 224 (true color).
It basis of the television screen and the standard microcomputer display screen.
CRT display is built around a vacuum tube containing one or more electron guns
whose electron beams rapidly sweep horizontally across the inside of the front
surface of the tube, which is coated with a material that glows when irradiated.
Each electron beam moves from left to right, top to bottom, one horizontal scan
line at a time.
To keep the screen image from flickering, the electron beam refreshes the screen
30 times or more per second. The clarity of the image is determined by the
number of pixels on the screen
CRT monitors are big in size so difficult to move. By contrast LCD are small in
size and light weight.
CRT monitors require a lot of power to run; therefore, they are not practical for
use with Laptop battery power.
Flat-Panel Monitors:
Page 32 of 77
SOUND SYSTEM:
Microphone is important
input device, similarly
speakers and similar
sound systems are output
devices.
This type of device output
data in the form of voice.
Data consisting of spoken
words and music can be
output from them. Like
monitor sound system
provide a temporary soft
copy.
Sound systems are especially useful to people who use their PC to catch videos or
listen music, or participate in online activities such as videoconferences or voice
chatting etc
The most complicated part of the sound output system is the sound card. The sound
card translates digital sound into electric current that is sent to the speakers.
Page 33 of 77
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
OPERATING SYSTEM
Functions of OS
OS performs the following functions:
Booting
Booting is a process of starting the computer.
OS starts the computer to work.
It checks the computer and makes it ready to work.
Memory management
It is also important function of OS.
Memory cant be managed without an OS.
Different programs and data execute in memory at one time.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 34 of 77
If there is no OS, the programs may mix with each other & the system
will not work properly.
Page 35 of 77
Flash memory
Flash memory is a special type of nonvolatile memory. It is often used in
portable digital devices for storage. Digital cameras, portable mp3 players,
USB keychain storage devices, and game consoles all use flash memory the
flash memory works by having actual switches store the binary values that
make up the data. Thus, on camera with a flash card, the picture is stored on
the card by turning millions of tiny switches on and off. Burring catastrophic
damage to the card, the picture is stored indefinitely.
Memory
The CPU needs to have millions or even trillions, in some computers of bytes
of space when it earn quickly read or write programs and data while they are
being used. This is called memory, and it consists of chips either on the
Motherboard on a small circuit board attached on the motherboard. This
electronic memory allows the CPU to store and retrieved data quickly.
COMPUTER NETWORKS
LAN and WAN were the original flavors of network design. The concept of "area"
made good sense at this time, because a key distinction between a LAN and a WAN
involves the physical distance that the network spans. A third category, the MAN, also
fit into this scheme as it is between LAN and WAN.
There are four types of computer networks.
TAN OR Tiny Area Network
This is used to represent very small networks.
Two, three, or maximum four nodes in a TAN.
TANs are popular in home and small offices.
They enable very limited concerns to share resources such as printer,
modem, and databases among various computers.
Example:
o The childs node and parents node in the home, and the managers
node and cashiers node in an office.
LAN OR Local Area Network
This is also called a Local Net.
It connects computers, which are situated in a local area such as a building,
an office, or a factory etc.
The distance separating nodes in the local net may vary from a few feet to a
few miles.
The local net, including all data communication channels, is owned by the
organization using it.
Because of the nearness of nodes in local nets, a company can install its own
communication channels.
Business organizations are connects more computers into local area network.
Example: Networks at the
o Offices of UBL Circle office,
o GPO,
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 36 of 77
o
o
Packages Limited,
Bata Shoes factory etc
Characteristics
Typically connects computer in a single building or campus.
Developed in 1970s.
Medium:
o Optical Fibers,
o Ccoaxial cables,
o Twisted pair,
o Wireless.
High-speed networks (0.2 to 100 Mb/sec).
Topology typically buses or rings.
Man Or Metropolitan Area Network
This is used to serve the nodes scattered in a big city.
It can provide data communication services for an area of higher population.
Different offices of an organization situated in big cities can benefit from a MAN.
Example:
o Bata, Servis shoes companies can benefit from MAN to connect their
shops In big cities like Lahore, and Karachi etc.
Characteristics
Example:
o Network of City Bank,
o Toyota Corporation,
o American Express,
o P.I.A. etc.
Due to the benefits of WAN, the offices of the above companies, which are
scattered throughout the world, are as if situated in the same building.
Characteristics
Developed in 1960s.
Generally covers large distances (states, countries, continents).
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 37 of 77
Medium:
o Communication circuits connected by routers.
Routers forwards packets from one to another following a route from the sender to
the receiver. Store-and-Forward
Hosts are typically connected to the routers.
Problems with delays if using satellites.
Typical speed: 20 - 2000 KB/S.
Note:- Like the Internet, most WANs are not owned by any one organization but
rather exist under collective or distributed ownership and management
NETWORK TOPOLOGIES
Topology of a network is the physical layout or shape of a network. There are five
basic types of network topologies.
1. Bus Topology
In this type of topology a single piece of
cable moves from node to node,
connecting all the nodes along the way all
of
the peripheral devices are attached along
the common cable. In a bus topology a
signal is transmitted to all nodes, but only
the destination node responds to this. Bus
topology is most appropriate when the connected devices are physically close to one
another.
Advantages
Bus topology is very simple
It can be easily configure.
It is very economical.
New nodes can be easily accommodated in bus topology
Unwanted nodes can be easily removed from the network.
Bus topology is a reliable transmission medium.
Disadvantages
If one of the nodes becomes inactive, all of the nodes beyond it lose their
network connection
There are chances of data loss in bus topology.
If a terminal becomes inactive, it is not so easy to locate it.
Transmission priorities cannot be implemented.
The balancing problem arises when users on a multiport line wish to
communicate.
2. Star Topology
Page 38 of 77
Page 39 of 77
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 40 of 77
Page 41 of 77
Page 42 of 77
1.
2.
3.
4.
MICROSOFT EXCEL
USING MICROSOFT EXCEL 2000
MAIN FEATURES OF MICROSOFT EXCEL 2000
WHAT IS MICROSOFT EXCEL? WRITE DOWN ITS FEATURES.
Page 43 of 77
Page 44 of 77
Page 45 of 77
Its built- in functions provides us facility to solve complex mathematical and scientific
operations easily.
Presentation of data in graphs and charts:
It can also present data in shape of graphs and charts.
Cell address.
There are total 256 columns and 65536 rows in an Excel worksheet. Column labels
are from A and end at IV while rows start from I and end at 65,536.
ATATUS BAR:
Status bar shows the status of worksheet. It can also show the different operations.
Sheet tabs:
Sheet tabs are found at the left bottom corner of the worksheet. Sheet tabs show the
title of the sheet. When we create a new workbook in excel it will have three
worksheets, however we can add new sheets in workbook. We can enter new
worksheets in a workbook according to the RAM capacity. To navigate in worksheets,
click on the icon or label of the desired worksheet.
SCROLL BARS:
Scroll bars are used to move through worksheet horizontally and vertically. There are
two scroll bars in an Excel worksheet.
Vertical scroll bar
Horizontal scroll bar
To move through horizontally, use the horizontal scroll bar.
To move through vertically, use the vertical scroll bar.
Page 46 of 77
QUICK CALCULATIONS:
The data store in excel can be processed easily. Different types of calculation can be
performed on this data in less time.
AUTOMATIC RECALCULATIOIN:
MS Excel provides the facility of automatic recalculation. If the user applies some
calculation on data, it is automatically recalculated if the data is changed.
GRAPHICAL REPRESENTAION:
MS Excel provides the facility of resenting data graphically. It provides different types
of charts. These charts display the data in an attractive and easy to understand way.
PREDEFINED FUNCAION:
MS Excel provides many predefined function to perform many tasks of commerce.
The has to put less effort in performing difficult tasks.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 47 of 77
Security:
Networks are built to share data and information but it also requires security.
Windows 2000 provides a very good and secure environment for networking. If we
compare windows 2000 with the Microsofts previous operating system then we come
to know that windows 2000 is really a good, efficient and most secure operating
system of Microsoft.
Hardware and software compatibility:
Windows 2000 provides a large list of software and hardware, which are compatible
with it.
Internet Access:
Internet access is much faster then ever in windows 2000.
Password Facility and Administrative Facility:
Windows 2000also provides us facility to manage users of network. Using
administrative facility of windows 2000 you can do this. In single user environment
windows 2000 provides you facility to protect your data by applying password on your
account.
Page 48 of 77
WHAT IS A FOLDER?
WHAT ARE THE DIFFERENT TYPES OF FOLDERS?
FOLDER:
A folder is just like cabinet that is used to store or manage files. Windows operating
system provides us facility to create a folder about a particular thing and then we can
store files or other folders related to the topic in that folder. By storing our files in a
folder we can easily locate and search our file.
Example:
Suppose a teacher is creating papers of students on the computer, he/she can
create a folder with the name Papers and in this folder he/she can create subfolder
with subject names like English, Chemistry etc. Now by managing his/ her files into
folders he/she can search and work with files easily.
TYPES OF FOLDERS IN WINDOWS 2000:
System folders:
These folders are created by the system automatically during installation of operating
System and during formatting of a floppy diskette or hard disk. These are also called
Root folders. These folders cannot be deleted by user and are represented by single
backslash.
User folders or subfolders:
The folders that are created by user of a compute are called user folders. The user of
a computer to store files and information creates these folders. And user can delete ,
rename and remove to these folders.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 49 of 77
WHAT IS INTERNET?
INTERNET
An internet is global wide Area Network, which is consist of more than one hundred
million Computer. It connects countries and continents with each other globally.
Internet is a global network of computers. We can also call Internet a network of
networks. It handles billions of bytes of data in every second around the world.
Internet computers:
Each computer connected to Internet can act s a HOST computer. A host computer
provides information in the form of text, audio and video films for other people to use.
Another type of the computer in the Internet is called SERVER. It is that allows the
user to connect with Internet.
Methods of communication:
In Internet there are three methods of communication, which are:
Satellite Communication
Fiber Optic Cable
Telephone Lines
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 50 of 77
BITNET:
The ARPANET was created only for defense researchers and American military but
different universities students and professors also wanted to share information and
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 51 of 77
resources with each other. DARPA did not allow them to use their network so these
universities start working on their own remote Computers network and they created
BITNET (Because Its Time Network) and CSNET (Computer Science Network).
These networks were used for academic and research purposes and linked IBM
computers and University Computer science departments.
WORLD WIDE NETWORK:
After the creation of BITNET and CSNET, the concept of Internet developed and
deferent universities and research institutions start working on a world global
network.
As a result soon in 1986 NSF Net was created and it linked academic researchers
across the countries with five super computer centers.
INTERNET:
Now Internet is collection of worlds small networks, which are connected with each
other. Anybody from any country of the world has an access to get and share
information on the Internet.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 52 of 77
Modem is a device,
which is used to
connect our
computer with
telephone line. For
using Internet
install modem into
your computer. The
questions arises
that why is
necessary to install a modem into the computer? The answer is that a computer
through telephone line can access Internet and modem is a device, which enables us
to connect our computer with telephone line.
Telephone line:
After installing modem into your computer, connect a telephone line with the modem.
Connection of an ISP:
ISP stands for Internet service provider. ISPs have devices and the resources to
connect Internet directly and they provide services to uses of Internet by selling the
Internet connections. So you need to get an Internet connection from any internet
service provider. When we get connection of Internet from an ISP, it provides us an
ID, password and ID we can use the Internet.
Web Browsing Software:
There are millions web sites on an Internet. To locate any particular web site from
Internet software is required which is called Web Browsing software. Different web
browsing software are available in the market but the common are:
Internet Explorer
Netscape communicator
Opra
Firefox etc
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
Page 53 of 77
Newsgroup Facility
Chatting
Electronic Commerce (E- commerce facility)
WORLD WIDE WEB:
A www or world wide web is a computer that is connected permanently to the
Internet. World wide web supports specially formatted document. These web pages
are also called Web pages. Each web page has a unique address, which is called
web site address or URL (uniform resource locator) or (Universal Resource Locator)
SERVICES OR BENEFITS OF WORLD WIDE WEB:
An Internet was developed with the purpose to share information but now-a-days
web sites are developed for many purposes. Some of them are as follow.
To provide or share information
To provide entertainment
Advertisement
Seeking and giving knowledge
Education
Selling and purchasing of goods
News
Encyclopedia
Air plan ticket booking
A web page can be used for getting information, selling of goods, and advertisement
of goods. We can get education on Internet and read news with the help of World
Wide Web
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 54 of 77
Online Banking: With the help of Internet, account holder of a bank can check his
account and can also transfer money from his account to other accounts by sitting at
his home.
Chatting: Those who have no friends or who have friends in far areas can chat n
internet anytime and can discuss their personal issues.
DISADVANTAGES:
These are the disadvantages of Internet:
Different people on Internet try to hack data of information of others
Some PEOPLE ON Internet try to hack data of information of others
Purchase goods on Internet and generate fake Visa a card numbers that results into
big loss for companies.
Young age boys and girls waste their precious time on Internet in chatting.
Internet has increased the living expenses, as you have to pay for using it.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 55 of 77
E.COMMERCE
WHAT IS E-COMMERCE? EXPLAIN YOUR ANSWER WITH THE
HELP OF EXAMPLES:
E-COMMERCE:
E.commerce stands for electronic commerce. It is a term, which means to carry out
financial transactions using Internet. With the help of Internet and e-commerce,
business can be carried out on international basis; goods can be sold and purchased
from anywhere in the world. The business using e-commerce is growing at a rapid
rate.
Examples of E- commerce:
Following are some examples of E- commerce activity:
Following are some examples of E- commerce activity:
Online education:
With the help of Internet, different publishers provide a list of their books on Internet
on their web sites. A person who browses web sites of publishers or universities can
place an order for books and can get online education from the web sites of
educational institutes or universities.
Online banking:
In online banking e- commerce, a customer of bank can check his account balances
and can also transfer his money from one account to another account.
Online shopping: we can sale and purchase goods on Internet with the help of Ecommerce. Manufacturers place a list of their products on their web page on the
Internet. They also place pictures, and prices of the items. Any one can surf the site,
and place order to purchase any item. The manufacturer then sends the purchased
goods through normal mail. This process is called online shopping.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
TERMINOLOGIES OF WWW
DEFINE THE DIFFERENT TERMINOLOGIES OF WORLD WIDE WEB.
TERMINOLOGIES OF A WEB PAGE:
A web page has different components and terminologies. Some common
terminologies of a web page or World Wide Web are as follow:
Web site:
A web site is a document, which can contain information in the form of text, graphics,
sounds, video or audio. This document is stored on a computer and this computer
permanently connects with the Internet. People from any where of the world can
access to this computer through Internet people from any where of the world can
access to this computer through Internet.
Home page:
A web page or a web site consists of a different pages but the starting page or the
page, which is loaded very, first when we open web site, is called home page.
This page contains links of other pages of the web site. We can open the other pages
of a web site by simply clicking on the link of the web pages.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 56 of 77
Links on hyperlink:
A link is also called a hyperlink and it is a connection from one page to another
destination such as another page or a different location on the same page. The
destination is frequently another web page, but it can also be a picture, an e- mail
address, a file ( such as a multimedia file or Microsoft office document), A hyperlink
can also be text or a picture.
Anchor:
It is a link that is used to open different parts of a web page.
Image Map:
It is an image or graphic, which contains one or more hyperlink. It is used to switch
between different documents of a web page.
Frame:
A frames page is a special kind of HTML page that divides the browser window into
different areas called frames, each of which can display a different page.
Table:
A table is made up of rows and columns of cells in which you can insert text and
graphics. You can use tables in web pages to present information or data of a web
page in the form of rows and columns.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
HTML
ISP
HTTP:
HTTP stands for hypertext transfer protocol. Basically World Wide Web uses this
protocol.
The work of this protocol is to tell how a message is transmitted and what action
should be taken upon the message by web browser. For example, if we write URL on
web browser like:
www.geocities.com/ gmg pk
Then the web browser using the HTTP protocol should fetch a web page domain
name geocities.com/gmg-pk.
HTML:
HTML stands for hypertext markup language. This language is used to create
documents for WWW or web sites. HTML defines the structure and layout of a web
document using a variety of tags.
Tags:
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 57 of 77
It is a directive to the web browser (a software that is used to display web pages) to
show text in specified format. Note once a document to Internet can easily have
access to the document.
URL:
URL stands for uniform resource Locator. It is also called universal Resource
Locator. Every file on the Internet has an address, which is called URL. Actually URL
represents an address of documents on the World Wide Web.
COMPONENTS OF A URL:
URL consists of two or more components. For example the URL bellow point the
two different files. Generally URL = protocol + Domain name+ Separator
Example: http://www. Yahoo.com
In the above URL
http
= protocol
//
= Separator
yahoo. = Domain name
com
= type of organization
First part of a URL indicates
which protocol is used and the
second part specifies the
domain name where the resource is located and the third part tells us the type of
organization of whichs web site we are using.
TYPES OF ORGANIZATIONS:
THE most common types of organizations are:
Edu
Org
Gov
Mil
Pk
Com
Net
Education
Organization non commercial
government
military
Pakistan
commercial organization
network provider
Use of URL:
A URL is basically a complete address of a web site.
We use URL on Internet for locating a specific domain.
Some Example of URL:
Following are some common URL:
www.yahoo.com
www.hotmail.com
www.google.com
ISP (internet service provider)
ISP stands for Internet service provider. It is a company that sells the access to
Internet to it users. There are different ISPs in the world. People get connection from
ISPs by getting its membership. Some common ISPs of Pakistan are:
Brain Net
Wol Net
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 58 of 77
Fiber Net
Go Net
User of the Internet gets an identifying username and password and a phone number
from an ISP after getting connection. The username, password and phone number is
used to access Internet.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 59 of 77
Page 60 of 77
Using E-mail we can send or receive message from everywhere in the world.
E-mail gives us facility to send picture, sound, and video along with email
without any additional cost.
There are also many other features of an email.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Computer Viruses
A virus is a program designed by a computer programmer (malicious hacker) to do a
certain unwanted function. The virus program can be simply annoying like displaying
a happy face on the user's screen at a certain time and date. It can also be very
destructive and damage your computer's programs and files causing the computer to
stop working.
The reason why hackers create viruses are open for speculation. The most quoted
reason is simply to see if it can be done. Other reasons are Ludite based "smash the
machine" motivations, antiestablishment/anti-corporate actions, criminal intent, and
various others that range into the "conspiracy theory" realm.
Viruses take two basic forms
Boot sector virus which infect the section of a disk that is first read by the
computer. This type of virus infects the boot or master section of any disks that it
comes in contact with.
The second is a program virus that infects other programs when the infected
program is run or executed. Some viruses infect both and others change themselves
(polymorphic) depending on the programs they encounter.
Though viruses do not damage computer hardware there have been attempts to
create programs that will do things like run the hard drive until it fails or lodge itself in
the computer's clock (which has a rechargeable battery) allowing it to remain active
even months after the computer has been unplugged. Other viruses affect certain
microchips (BIOS chip for instance). These microchips need to be modified under
normal computer use but the virus program can produce changes which cause them
to fail. Other viruses will affect the characters or images displayed on the screen
which may give the impression of monitor failure.
Viruses can cause a great deal of damage to the computers it infects and can cost a
lot of time and money to correct it.
Computer viruses have been around for a long time, even before computers became
widely used and they will likely remain with us forever. For that reason computer
users will always need ways to protect themselves from virus programs. The main,
common feature of a virus is that it is contagious! Their sole purpose is to spread and
infect other computers.
A computer gets a virus from an infected file.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 61 of 77
The virus might attach themselves to a game, a program (both shareware and
commercial) or a file downloaded from a bulletin board or the Internet.
You cannot get a virus from a plain email message or from a simple text file! That is
because the virus needs to be 'run' or executed before it can take effect. This usually
happens when the user tries to open an infected program, accesses an infected disk
or opens a file with an infected macro or script attached to it. A plain email message
is made up of text which does not execute or run when opened.
Modern email programs provide the ability to allow users to format email messages
with HTML and attach scripts to them for various purposes and it is possible for a
malicious hacker to attempt to spread a virus by building a virus script into an HTML
Protect Yourself
You can take safeguards against virus infection. The first thing is to get an anti-virus
program. Most reputable companies that create virus protection programs release an
evaluation copy that a Internet user can download for free and use for a certain
amount of time. This anti-virus program will be able to check your computer for
viruses and repair damage or delete files that are infected with viruses. You may
have to replace infected files that cannot be repaired.
The second thing you can do is purchase a copy of the program. The reason for this
is that viruses are constantly being created. When you purchase an anti-virus
program you are also purchasing periodical updates which keep your anti-virus
program up-to-date and able to deal with new viruses as they are encountered.
Commercial virus programs also allow the user to customize when and how the
program will check the computer for viruses. You will need to renew this updating
service periodically.
If you find that your computer has been infected with a virus use an anti-virus
program to clean your computer and make sure to check all the disks that you use.
This includes all the hard drives on your computer(s) and all your floppy disks and
CDs as well as any media that you save information on. Remember that the virus can
easily re-infect your computer from one infected file!
If you have to reload your computer programs, use the original program disks. You
may want to check your original disks before reinstalling the software. If your original
disks are infected contact the distributor to get replacements.
Always take the time to ensure that your computer is properly protected. Spending
money on a good virus checking program could save you hundreds of dollars and
lots of time later.
A discussion of viruses would not be complete without mentioning hoaxes. Malicious
people without programming skills will send out fake virus warnings causing people
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 62 of 77
to take unnecessary measures which often cause your computer harm. One example
tries to get the unsuspecting computer user to delete an important system file by
warning them that it is a virus. A legitimate virus warning will provide a link to a
website operated by an anti-virus company with more information about that virus.
Don't forward a virus warning until you have check out whether it is legitimate.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
PRINTERS
Printers are the most commonly used output devices that can be found in almost all
computer centers. Printers are used to print important documents on paper. The
output, which is generated by a printer, is called Hard Copy, output device.
CATEGORIES OF PRINTERS:
Broadly there are two categories of printers:
Impact printers
This printer uses the familiar typewriter approach of hitting a character against paper
and inked ribbon.
Non- impact printers
These printers do not hit or impact a ribbon to print. They use thermal electrostatic,
chemical, and inkjet technologies. Theses printers move a print head across the
page.
Classification of printers
Printers are classified as
Character printer
Line printers
Page printers
Following are commonly used printers:
Dot Matrix printers:
Is an Impact Printer
Produces printed images when tiny pins on a
print head strike an inked ribbon.
When the ribbon presses against the paper, it
creates dots that form characters and graphics.
It contains nine to twenty-four pins.
A higher number of pins print more dots that
produces higher quality.
Cheaper dot matrix printer use 100 to 150 dpi.
Speed is 200 to 300 characters per minute.
Generate a lot of noise.
Do not produce a very high quality of print, especially when printing graphics.
Speed of this printer is also very slow.
The quality and price of dot-matrix printer depends on two factors.
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 63 of 77
Laser printers:
Non Impact Printer.
LASER stands for Light
Amplification by Stimulated
Emission of Radiation.
Laser Printer are also
called Page Printers.
Create image on paper by
Laser beam.
Laser throws magnetic
material powder on paper in the form of microscopic dots.
Density of these dots ranges from 300 to 2000 dots per inch.
Printing speed is from 5 to 300 pages per minute.
Faster than inkjet and dot matrix printers.
Color printing is costly.
Laser printer are mostly used in business field.
These are very high speed non- impact printers
That produce documents at the speeds of over 20,000 lines per minute.
The quality and cost of LASER printer deponents on two factors:
o Number of dots per inch (DPI)
o Number of Pages Per Minute(PPM)
There are three qualities of a LASER printer:
o Cheapest Quality LSSER printer:
o Middle quality LSSER printer:
o High quality LASER printer:
Inkjet printers:
These are non- impact character printers and
similar to LASER printer. In this type of printer,
ink is used in the shape of very tiny drops on
the paper to form a character.
Characteristics of these printers are given
below:
These printers work slowly as compared to
LASER printers.
Printing speed of these printers is 1to6 pages
per minute.
These printers are cheaper in initial cost and
quality of paper printing is same as laser printer but cost of per page is four times
greater than a laser printer.
Page 64 of 77
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Software
Page 65 of 77
Major Categories
System Software (Operating System)
Which controls the workings of the computer, and applications,
Responsible for controlling and managing the actual operations of the
computer hardware.
Some operating system
MS DOS (Disk Operating System)
MS Windows 3.1
MS Windows 3.11
MS Windows 95
MS Windows 98
MS Windows NT (Server/Workstation)
MS Windows Me
MS Windows XP
MS Windows Vista
Unix
Page 66 of 77
Linux (Penguin)
Sun Solaris
Computer Languages
There are many different computer languages available for writing programs. Each has its
strengths and weaknesses and must be assessed based upon need. A language that is
particularly well suited for one application may not work for another.
Types of computer languages:
Assembly Language
Very close to machine language
The Command are used in Assembly language represent by mnemonics
Different processor used different Assembly Language
Programming is Complex but its provide a much higher degree of control than
High Level Language
Programs written in Assemble Language codes are translated into machine code
by an assembler
Machine code cam also be converted back into assembly code using a
deassembler
Increased execution speed and direct programmer interaction with system
hardware
Machine dependent language
Second Generation Language
High Level Languages (HLL)
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 67 of 77
FORTRAN
o Created in 1957 at IBM
o First HLL
o Stand for FORmula TRANslation
o Mainly used for scientific purpose
BASIC
o Stand for (Bingers All-purpose Symbolic Instruction Code)
o Design for students
o Easy for bingers to use
o General-purpose programming
o Allow advance features to be added for experts
o Provide clear and friendly error messages
o Easy to debug
o Not require an understanding of computer hardware
COBOL
o Stand for (Common Business Oriented Language)
o Design for business computing
o Very popular among business community due to its simplicity
C and C++
o Developed in 1972 by Dennis Ritchie at Bell Labs
o Very commonly used to program OS such as UNIX, Windows and MAC
etc.
o It is also very useful for compiler writing
o C++ was an extension of C using OOP (Object Oriented Programming)
concept
o C++ is most often used in simulations, such as games
Page 68 of 77
o
o
o
o
Java
o
o
o
LISP
o
o
o
o
Language Translators
Types Of Translators
Assembler
An assembler is a program that translates an Assembly language
program into machine code
\Compiler
o A compiler is a program that translates a source (written in some
HLL) into machine code
o Compiler first reads the whole program before executing it
Interpreter
o A compiler is a program that translates a source (written in some
HLL) into machine code
o It translates and then executes each statement (line) in a program.
o Checks for possible errors and then execute that line
o If one of the line is executed repeatedly, it must be scanned and
analysed each time
o Greatly slowing down the solution of the problem at hand
Page 69 of 77
Types of Data
Data may be of the following types
Numaric Data.
Alphabatic. Data
Alphanumaric Data
Image
Audio
Vedio
Numaric:
Example
Alphabatic Data
Example
Alphanumaric Data
Example
Image:
Page 70 of 77
Audio:
Vedio:
Information:
Examples:
1. In colleges and universities, the raw facts about students are stored on admission
forms.. if we want to find out a list of all students who live in Gujrat, we will apply
some processing on this data.This processing will give us the desird list. This list
is a form of processed data and will be called information.
2. An organization can use the opinion of the people as data and processe it to
genarat informatiin of its interest. For example: it can know that how many people
of the country are satisfied with the quality of its product and how many are
unsatisfied. Organization can use this information for the improvement of its
product.
===========================================================
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 71 of 77
Example:
1. If we want to get the list of all students who got A gade in exams, we will apply
some processing on marks of he students. This process will give us bew
information.(Output).
2. In census the data of the citizens of Pakistan Is collected and stored permanently.
this data can be used for different purpose like.
o To find out the literacy rate of the country.
o To find out total number of PhDs in the country. etc
Page 72 of 77
Example;
In the above example it is very difficult for bookseller to process the data all by hand.
If he uses a calculator instead of just paper and pen, the process will become very
easy and will be complete very less time.
Example:
There are 1500 students in a college. The college has to maintain huge volume of
data. If we want to know the students who have not been submitted their fee. We will
have to search the forms of all students in manual data processing. It will take so
much time. But if we use electronic data processing, the same task will be done infew
seconds.
Advantages:
===========================================================
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 73 of 77
====== New Kashmir Book House Fawara Chock Gujrat Call:-3536394 ====
===========================================================
Page 74 of 77
The collected data is classified into different categories in the step. For
example, ina college, data of students and teachers will be classified in
two different categories.
3. Input:
In this step, the collected data is given to the computer as input for
processing.
4. Verification:
The data must be verified to make sure that it is correct and valid for
processing. For example: we should verify that marks of the students are
numeric digital not a character.
5. Coding:
The data stored in a computer in binary form. This step converts the input
data into binary form to store it in the computer.
6. Storing:
In this step, the data is stored in the computer. Different storage medies
are used to store the data like hard disk and tapes etc
7. Sorting:
Sometimes, it is easier to process data if it is sorted. In this step, the data
arranged in a particular sequence. For example: sort by marks, by date
etc
8. Processing:
In this step, all processing is applied on stored data. Different calculation
and function are used to convert the data into required information. For
example: we may need the following information from student data.
A list of all students who got A grade
A list of all students who did not submit their fee.
9. Summarizing:
In this step, only summary of the data can be used instead of whole data.
For example: people deposit money daily in bank. This amount can be
show total profit of bank in a month.
10. Output:
Processed data is called information (Output).in this step, processed data
is displayed to the user. it can be display on Monitor or Printer. New
information can also be store on disk for future use.
11. Retrieval:
If we store information on disk we can retrieve it later many time as we
want.
12. Conversion:
The information can be converted in different forms like charts, graphs.
Etc..
13. Communication:
Prof Sajjad Najum Shakir, Government College of Commerce Gujrat
Voice: 033-38400919
Email: Sajjad.Shakir@gmail.com
Page 75 of 77
Page 76 of 77
Page 77 of 77