Computer Notes
Computer Notes
Objectives
At the end of the chapter the learner shall be able to;
i. Explain the evolution of computing technology and the technological advancement in computer
architecture to current technologies
ii. Explain the characteristics of computers and how they are different from humans.
iii. Explain the different types of computers categorized based on size, price and capabilities
iv. Explain the fundamental difference between computer hardware and software
Definition
A computer is an electronic device capable of executing instructions, developed based on algorithms stored
in its memory, to process data fed to it and produce the required results faster than human beings.
It is an electronic device which processes given data to derive the required and useful information. During
the processing the computer has to perform various functions like, Accepting Instructions & data from the
user, performing various arithmetic and Logical operations as per Instructions given and presenting the
Information or Output to the user.
Other Definitions;
The definition from the Merriam-Webster Dictionary: "one that computes; specifically : a programmable
electronic device that can store, retrieve, and process data"
A computer is a device that accepts data in one form and processes it to produce data in another form i.e
information.
An electronic device that takes data and instructions as an input from the users. Processes data and provides
useful information known as output.
The development of computers has followed different steps in the terminology used and these steps of
technological differences are called as GENERATIONS in computer terminology. There are totally five
generations of computers till today.
Characteristics
Use of vacuum tubes in electronic circuits: These tubes controlled internal operations and were huge. As a
consequence the machines were large.
The design of these computers was based on VLSI (very large scale integration) technology, the micro chip
technology that gave rise to the smaller computers known as the micro computers in use today.
Summary
Research shows that the trend in computer technology revolution is that there is;
o Continual decrease in computer size
o Improved speed and power processing
o Decrease in computers and the related facilities cost
o Number of components in computer per circuit (IC) greatly increased over 500,000 physical elements
e.g. transistors, capacities, diodes etc per chip(IC).
Disadvantages
1) Unemployment
2) Computer Crime
3) Data Security
4) Violation of Privacy
5) Waste of Time and Energy
6) Health Risks
7) Impact on Environment
Minicomputers
They are smaller than the main frame but bigger than minicomputers. They support concurrent users. They can
be used as servers in companies. They are slower and less costly compared to mainframe computers but more
powerful, reliable and expensive than micro computers.
Feedback
The relationship between Computer, Data and Information can be depicted as follows;
Data Information
Process
Instructions
Computer hardware refers to the physical components of a computer such as the monitor, Keyboard, Mouse,
system unit etc shown in the diagram below.
Computer software
A set of programs associated with the operation of a computer
The two components (hardware, software) will be discussed later in other chapters.
Secondary/Backing
Storage
Computer Performance
Features that affect the performance of the computer include:
a) microprocessor
b) Operating System
c) RAM
d) disk drives
e) display
f) input/output ports
Impact printers: In case of Impact printer an inked ribbon exists between the print head and paper ,the
head striking the ribbon prints the character. Impact printers are basically divided into 2 types
Serial/Character printers eg. Dot matrix printers
Uses metal pins to strike an inked ribbon to make dots on a piece of paper.
Lowest print quality of all of the printers.
Very low in cost per page to use.
Daisy wheel printers eg. Line Printers
Classification of Printers
Printers are classified by the following characteristics:
1) Quality of type: The output produced by printers is said to be either letter quality (as good as a
typewriter), near letter quality, or draft quality. Only daisy-wheel, ink-jet, and laser printers produce
letter-quality type. Some dot-matrix printers claim letter-quality print, but if you look closely, you can
see the difference.
2) Speed: Measured in characters per second (cps) or pages per minute (ppm), the speed of printers varies
widely. Daisy-wheel printers tend to be the slowest, printing about 30 cps. Line printers are fastest (up
to 3,000 lines per minute). Dot-matrix printers can print up to 500 cps, and laser printers range from
about 4 to 20 text pages per minute.
3) Impact or non-impact: Impact printers include all printers that work by striking an ink ribbon.
Daisywheel, dot-matrix, and line printers are impact printers. Non-impact printers include laser printers
and ink-jet printers. The important difference between impact and non-impact printers is that impact
printers are much noisier.
4) Graphics: Some printers (daisy-wheel and line printers) can print only text. Other printers can print
both text and graphics.
5) Fonts: Some printers, notably dot-matrix printers, are limited to one or a few fonts. In contrast, laser
and ink-jet printers are capable of printing an almost unlimited variety of fonts. Daisy-wheel printers
can also print different fonts, but you need to change the daisy wheel, making it difficult to mix fonts in
the same document.
c) Speakers Used to output sound
d) LCD Projectors Similar to monitors but projects an image on to a screen. They are mainly used for
presentations.
e) Scanners
Scanners create a digital reproduction of an image or document and come in a variety of shapes and sizes
designed to perform different types of tasks. There are three types of office scanners usually seen in the
market and the functions they serve are as follows:
1) Flatbed: The flatbed scanner consists of its own base with a flat piece of glass and cover just as is
found on most copiers. The scanning component of flatbeds runs over the length of the image in order
to gather data. Flatbeds are useful when a user needs to scan more than single page documents.
2) Sheetfed: Sheetfed scanners are only used if one wants to scan for anything other than sheets of paper.
The scanning component of a sheetfed is stationary while the document being scanned passes over it's
'eyes' similar to a fax machine. It is so thin just a couple of inches deep, such that it can easily fit
between keyboards and monitor. Sheetfeds usually work best in conjunction with an automatic
document feeder for large projects. Pictures and other documents which are smaller than a full page can
also be scanned using a sheetfed scanner. They have been known to bend pictures and reproduce less
than quality images.
3) Slide: There is a need for accurate reproduce of very small images. For such application the resolution
required is very sharp and slide types of scanner create a totally different scanner market. Slides are
usually inserted into a tray, much like a CD tray on ones computer, and scanned internally. Most slide
scanners can only scan slides, though some newer models can also handle negative strips.
The microprocessor contains the CPU which is made up of three components-the control unit supervises all that
is going on in the computer, the arithmetic/logic unit which performs the math and comparison operation, and
temporary memory. Because of the progress in developing better microprocessors, computers are continually
evolving into faster and better units.
The processor and main memory of a PC are commonly held on a single board called a mother board. The
processor has the following functions:
a) It controls the transmission of data from input devices to memory;
b) It processes the data held in main memory;
c) It controls the transmission of information from main memory to output devices.
Central Processing Unit is implemented in a single piece of silicon device known as a computer chip.
Processors
The term processor is a sub-system of a data processing system which processes received information after it
has been encoded into data by the input sub-system. These data are then processed by the processing sub-system
Clock
In order to synchronise the various steps carried out during the fetch-execute cycle, all the processors have an
internal clock which generates regularly timed pulses. All the processor activities, such as fetching an instruction,
reading data into the memory register etc. must begin on a clock pulse, although some activities take more than
one clock pulse to complete. Typically the clock pulse rate in 2000 is around 500 megahertz (million cycles per
second). The clock speed, therefore, is one of the factors which will influence the speed at which instructions are
executed; a 600MHZ processor will in general operate faster than a 500MHz processor.
Clock speed is measured in Hertz, which means 'per second' (cycles/second). You have probably heard of clock
speeds such as 1 MHz, this means 1,000,000 cycles per second and potentially a million calculations. A
computer of speed 3.4 GHz means it might be capable of processing 3,400,000,000 instructions per second!
One megahertz (MHz): one million cycles per second
One gigahertz (GHz): one billion cycles per second
Common ratings for motherboard buses: 2600 MHz, 2000 MHz, 1600 MHz, 1333 MHz, 1066 MHz, 800 MHz,
533 MHz, or 400 MHz
Range of CPU speeds: 166 MHz to 4 GHz
Registers
A register is a storage device that holds a word exactly like a memory location. Registers are used as temporary
storage places to hold frequently used data In principle, there’s no difference between a location in memory and
a register because they both do the same thing. The real difference is one of accessibility. Registers are located
within the CPU and can be accessed faster than memory locations
2.4 Memory:
Memory refers to the physical devices used to store programs (sequences of instructions) or data on a temporary
or permanent basis for use in a computer or other digital device.
2.4.1. Types;
1) Primary Memory Primary storage is directly connected to the central processing unit of the computer. It
must be present for the CPU to function correctly.
2) Secondary Memory: (also known as external memory or auxiliary storage), differs from primary storage in
that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access
secondary storage and transfers the desired data using intermediate in primary storage
It includes the
a) Secondary Storage; storage inside the computer – Hard disk
These are devices which are used to store huge information for future use. This is mostly hard drives and
removable media such as floppy disks, optical media (CD ROM) etc.
Types of ROM
a). PROM (Programmable Read Only Memory)
A variation of the ROM chip is programmable read only memory. PROM can be programmed to record
information using a facility known as PROM-programmer. However once the chip has been programmed
the recorded information cannot be changed, i.e. the PROM becomes a ROM and the information can only
be read.
Hard Drive:
Floppy Disk: Floppy disks allow information to be transported easily from one computer to another they have
limited storage capacity, generally 1.44 MB. Saving and retrieving information from a floppy disk is slower than
on a hard drive. They are more susceptible to physical damage and viruses than the hard drive. The size of a
hard drive is usually expressed in terms of megabytes and gigabytes.
Compact Disk Read Only Memory (CD ROM): CD ROMs are read only storage medium. Typically, a CD
ROM holds up to 650 MB of information. While information retrieval is faster than from a floppy disk, it is still
not as fast as from the hard drive.
Compact Disk-Writable (CD-R): A CD-R is highly effective for storing a large amount of data. Can hold up to
700MB of information. A CD-R is a one time recordable compact disc.
The processor and main memory of a PC are commonly held on a single board called a mother board
The motherboard is mounted in the PC box using small plastic brackets and screws. The cabinet and the
motherboard are made to suit each other, so there are holes in the metal for the connectors mounted on the
board. Finally, the motherboard has to be connected to the PC’s power supply installed in the cabinet. This is
done using a standard connector
Sockets
These are holders, which have been soldered to the motherboard. The sockets are built to exactly match a card
or a chip. A number of components are directly connected to the motherboard using the sockets. For example,
there are sockets (slots) to mount:
The CPU and working storage (the RAM modules).
Expansion cards, also called adapters (PCI, AGP and AMR slots, etc.).
They facilitate the installation of components directly on the motherboard without needing special tools. The
component has to be pushed carefully and firmly into the socket, and will then hopefully stay there.
Parallel Port
Parallel ports can be used to connect a host of popular computer peripherals like:
a) Printers
b) Scanners
c) CD burners
d) External hard drives
e) Iomega Zip removable drives
f) Network adapters
g) Tape backup drives
Parallel ports were originally developed by IBM as a way to connect a printer to PC. Parallel ports are also
known as LPT ports. Facilitates Bi-directional communication that allows each device to receive data as well as
transmit it.
Serial Port
Serial ports, also called communication (COM) ports, support sequential data transmission and are bi-
directional. Bi-directional communication allows each device to receive data as well as transmit it. The name
"serial" comes from the fact that a serial port "serializes" data. That is, it takes a byte of data and transmits the 8
bits in the byte one at a time serially one after the other. A serial port is commonly used to connect external
modems, scanners or the older computer mouse to the computer. It comes in two versions, 9-pin and 25-pin. 25-
pin COM connector is the older version while the 9-pin connector is the current standard. Data travels over a
serial port at 115 Kb per second.
Fire-wire Port
This port was originally created by Apple and standardized in 1995 as the specification IEEE 1394 High
Performance Serial Bus and is very similar to Universal Serial Bus (USB). The most important features of
Firewire port are:
Fast transfer of data - the latest version achieves speeds up to 800 Mbps. At some time in the future,
that number is expected to jump to an unbelievable 3.2 Gbps
Ability to put lots of devices on the bus. It is possible to connect up to 63 devices to a FireWire bus.
Windows operating systems (98 and later) and Mac OS (8.6 and later) both support it.
Hot-pluggable ability - they can be connected and disconnected at any time, even with the power on.
Provision of power through the cable - FireWire allows devices to draw their power from their
connection.
Plug-and-play performance - if you connect a new FireWire device to your computer, the operating system
auto-detects it and asks for the driver disc. If you've already installed the device, the computer activates it and
starts talking to it.
PS/2 Port
IBM developed the PS/2 port. It is also called a mouse port. It is used to connect a computer mouse or keyboard.
A PS/2 connector is a round connector with 6 pins. Nowadays few computers have two PS/2 ports, one for
keyboard and one for mouse. A colour code is used to distinguish between the two ports the keyboard port is
green and the mouse has a purple port.
Monitor Socket
This connector is used to attach a computer display monitor to a computer's video card. The connector has 15
holes.
In addition to these sockets, connectors and ports, the motherboard contains a number of other contacts. These
include:
The big connector which supplies the motherboard with power from the power supply.
Other connectors for the secondary storage devices, and CD-ROM drive etc
Jumpers which are used on some motherboards to configure voltage and various operating speeds etc
Mother Board
5. Which of the following is used to store programs and data that are currently being used
(a) Read only Memory (b) Hard Disk
(c) Random Access Memory (d) Magnetic Disk
3.1. Introduction
Software is simply set of instructions that cause a computer to perform one or more tasks. The set of instructions is
often called a program or, if the set is particularly large and complex, a system. Computers cannot do any useful
work without instructions from software; thus a combination of software and hardware (the computer) is necessary
to do any computerized work. A program must tell the computer each of a set of tasks to perform, in a framework of
logic, such that the computer knows exactly what to do and when to do it. Data are raw facts and ideas that have not
been processed while Information is data that has been processed so as to be useful to the user
Software
System Software:- Which controls all processing activities and makes sure that the resources and the power of the
computer are used in most efficient manner . The System software can categorized in to
1. Operating System
2. Language Processors ( Assemblers, Compilers, Interpreters)
3. Utilities Programs
4. Device Drivers
5. Basic Input Output system (BIOS)
Classification;
1. Operating systems and control programs: a complex program and most important program that runs on a
computer and which controls the operation of a computer. It perform basic tasks, such as recognizing input from
the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and
controlling peripheral devices such as disk drives and printers. In general the operating system supervises and
directs all the software components and the hardware components. Sophisticated operating system could handle
multi-processors, many users and tasks simultaneously. Examples of computers operating systems are UNIX,
Microsoft windows 95/98, Windows NT, Windows 2000, Windows XP, Windows Vista and Linux.
2. Language Processors
Translators: used to translate programs developed using standard programming languages into machine
language that is understood by the computer.
There are three basic types of translators they are
i. Compilers: - A compiler is a software that will convert the high level instructions into equivalent
Machine level instructions at a time.
ii. Interpreters:- A Interpreter is a software that will convert the high level instructions into equivalent
Machine level instructions step by step.
iii. Assembler:- Assembler is a software that will convert the high level instructions into equivalent
Machine level instructions but here, the input programs are in assembly language. The output is in
machine language.
3. Utilities Programs: systems programs that provides useful service to the users of the computer by providing
facilities for performing common tasks of a routine nature. Common types includes
Sort: used for sorting data
Editor: also called text editors are used at a terminal and provide facilities for the creation or amendment of
programs
File copying: also called media conversion are used to copy data from one medium to another.
Dump: used to copy the content of the main memory to an external storage device.
File maintenance: program used to carry out the process of insertion/deletion of records in any file. It can
also make amendments to the standing data contained in a record.
Tracing and Debugging: used in conjunction with the debugging and testing of application programs.
Tracing involves producing diagnostic information after obeying specified instructions so that the cycle of
operation can traced and errors located. Debugging is the term given to the process of locating and
eliminating errors (bugs) from a program.
Libraries- commonly used parts or portions of a program which can be called or included in the
programmer’s code without having to recode that portion.
Anti-virus applications protect your computer from the damage that can be caused by viruses and similar
programs
In addition, there is more than one BIOS in your computer. The one commonly referred to is the main system
BIOS. However, there are other BIOS chips that can be found in many of your computer's peripherals. The system
BIOS activates all of the other BIOS chips.
If everything is found to be working properly during the POST, the BIOS will then try to boot the computer from
the hard drive. This is the process of launching the Operating system so that you can use many different computer
programs, like playing games or surfing the Internet!
3.4 Functions of OS
Operating System:- Which is set of programs that controls and support hardware and provide various services which
are used for better performance of computer . Operating system hides the hardware from the user. The major
functions of O.S are
The operating system is responsible for the following activities in connection with file management:
Protection refers to a mechanism for controlling the access of programs, processes, or users to the resources defined
by a computer controls to be imposed, together with some means of enforcement. An unprotected resource cannot
defend against use (or misuse) by an unauthorized or incompetent user.
Others include;
1) Handling job transactions
2) Co-ordinating and managing peripheral devices
3) Input-Output Management
4) Maintains account of processor time for billing purposes.
5) Maintains Internal clock; Provides data and time services etc.
6) Scheduling of various tasks
7) Establishing and enforcing priorities for different jobs
Operating system concepts:- User programs interact with operating system using set of extended instructions.
These instructions are called “system calls”. These system calls are used to create, delete and use various software
objects that are manages by the Operating systems. The following are common in any Operating system.
1. Process
2. Files
3. System Calls
4. The shell
5. Booting Process i. Boot Strap Loader
i. Check Programs
ii. Monitor Program
iii. Basic input/output System (BIOS) Program
iv. Utility Programs
v. File Maintenance Programs
3.6. Classification of OS
Basing on the features of the operating systems and the interface provided they can be classified as
User friendly Operating system :- These Operating systems provide a pleasant and easy to work environment,
they are usually graphical based, where the various options are represented as icons, menus etc.
Windows operating systems are some of the user friendly Operating systems.
Programming friendly Operating systems:- The programmer is anyone who has fair knowledge about
programming concepts and he is expected to know the computer in a detailed manner. The programmer much
concerned about various utilities, functionalities, flexibility and powerful environment. UNIX, XENIX,LINUX etc.
are some of the character based interfaces which are very powerful and programming friendly.
Once the commands are entered on the prompt a command line interpreter(CLI) identifies and executes the
commands. A command based interface is quick to operate and very flexible, but the user needs to learn all the
commands and type them in correctly. Examples operating systems that use command based interface are Ms
DOS and UNIX.
Application packages are of major importance to small computer-system users who do not have the necessary
resources or expertise to produce their own software.
Advantages includes;
a) Saves programming efforts and expense as the development costs are effectively shared between the
purchasers.
b) Use gets a well-tried and tested program.
c) Relatively quick implementation results.
Disadvantages
a) Purchaser have no direct control over the package.
b) Packages usually developed to meet general needs and may not be ideal to a particular customer.
Sometimes a lot of customization of the software is required to meet the unique needs of a customer.
The most important applications software categories included in office suites are described in the table below:
Word Processor Provides the tools for entering and revising text, adding graphical elements,
formatting and printing documents.
Spreadsheets Provides the tools for working with numbers and allows you to create and edit
electronic spreadsheets in managing and analyzing information.
Database Management Provides the tools for management of a collection of interrelated facts. Data can
be stored, updated, manipulated, retrieved, and reported in a variety of ways.
Presentation Graphics Provides the tools for creating graphics that represent data in a visual, easily
understood format.
Communication Provides the tools for connecting one computer with another to enable sending
Software and receiving information and sharing files and resources.
Internet Browser Provides access to the Internet through a service provider by using a graphical
interface.
o General/ready made Software is developed to perform a variety of tasks, usually determined by use. Such
software can be customized by user to achieve specific goals e.g. ms office which is a suit of programs
performing a variety of tasks e.g. word processing for producing documents, database for storing, retrieving and
manipulating data and various calculations on spreadsheets. General purpose programs are discussed below;
Word processing applications. Writing tasks previously done on typewriters with considerable effort can
now be easily completed with word-processing software. Documents can be easily edited and formatted.
Revisions can be made by deleting (cutting), inserting, moving (cutting and pasting), and copying data.
Documents can be stored (saved) and opened again for revisions and/or printing. Many styles and sizes of
fonts are available to make the document attractive. Example: MS Word, Word Pad etc.
Spreadsheet applications. spreadsheet software permits performance of an almost endless variety of
quantitative tasks such as budgeting, keeping track of inventory, preparing financial reports, or
manipulating numbers in any fashion, such as averaging each of ten departmental monthly sales over a six-
month period. A spreadsheet contains cells, the intersection of rows and columns. Each cell contains a
value keyed in by the user. Cells also contain formulas with many capabilities, such as adding, multiplying,
dividing, subtracting, averaging, or even counting. An outstanding feature is a spreadsheet's ability to
recalculate automatically. If one were preparing a budget, for example, and wanted to change a variable
such as an increase in salary or a change in amount of car payments, the formulas would automatically
recalculate the affected items and the totals.. Example: Excel, Lotus1-2-3 etc.
Database software: A database contains a list of information items that are similar in format and/or nature.
An example is a phone book that lists a name, address, and phone number for each entry. Once stored in a
database, information can be retrieved in several ways, using reports and queries. For example, all the
names listed for a given area code could be printed out and used for a commercial mailing to that area.
Examples of database software is Ms Access, Dbase, Oracle etc.
Presentation software: for making slide shows. Allows users to create visual presentation A speaker may
use presentation software to organize a slide show for an audience. Text, graphics, sound, and movies can
easily be included in the presentation. An added feature is that the slide show may be enhanced by
Software Suites
A suite is a collection of related software packages, such as Microsoft Office (which includes Word, Excel,
PowerPoint, etc.) A group of programs that are sold as a package to solve common problems. Although there are
suites for graphics, mathematics and other applications, the most popular are "office suites." Also known as
"productivity suites," they are a set of basic business programs designed with a uniform user interface and common
functions such as spell checking. The primary programs are word processing, spreadsheet, presentation graphics,
database and e-mail, although each suite has its own mix, and a variety of other programs and utilities may also be
included. Some of the programs may be for sale as individual products
Integrated packages
Software that combines several applications in one program, typically providing at least word processing,
spreadsheet and database management. Presentation graphics, page layout, paint, calendar, address book, e-mail and
other applications may also be included. All programs in an integrated package are accessed via a common
launching pad. Microsoft Works and AppleWorks are two primary examples of integrated software packages.
o Tailor made/special purpose software Tailor-made computer system refers to computer application developed
by in-house IT personnel or outside software house according to specific user requirements in a firm. They are
developed for given purpose e.g. Payroll system, stock control system etc.
High level languages are more abstract, easier to use and more portable across platforms as compared to low-level
programming languages. A programmer uses variables, arrays or Boolean expressions to develop the logic to solve a
problem. Source programs are written in statements akin to English. A high level language code is executed by
translating it into the corresponding machine language code with the help of a compiler or interpreter. High level
languages can be classified into the following categories;
Procedure-oriented languages (third generation)
Problem-oriented languages (fourth generation)
Natural languages (fifth generation).
Procedure languages.
High-level languages designed to solve general-purpose problems, example BASIC, COBOL, FORTRAN, C, C++
and JAVA. They are designed to express the logic and procedure of a problem. Though the syntax of the languages
may be different, they use English-like commands that are easy to follow. They are portable.
Problem-oriented languages
Problem-oriented languages also known as Fourth Generation Languages (4GL) are used to solve specific problems
and includes query languages, report generators and Application generators which have simple English like syntax
rules. The 4GLs have reduced programming efforts and overall cost of software development. They use either visual
environment or a text environment for program development similar to that of third-generation languages. A single
statement of the 4GL can perform the same task as multiple line of a third-generation language. It allows a program
to just drag and drop from the toolbar, to create various items like buttons, text boxes, label etc. A program can
quickly create a prototype of the software applications
Natural Languages
4. Which of the software below would assist a secretary in preparing a report for an annual general meeting?
(a) Ms Word (b) Ms Access (c) Outlook (d) Ms QuickBooks
5. Which of the software below would assist a salesman in recording daily sales for different items for which he
needs totals among other analysis?
(a) Ms Word (b) Ms Access (c) Outlook (d) Ms Excel
4.1. Introduction
Data Representation refers to the methods used internally to represent information stored in a computer.
Computers store lots of different types of information:
numbers
text
graphics of many varieties (stills, video, animation)
sound
At least, these all seem different to us. However, ALL types of information stored in a computer are stored
internally in the same simple format: a sequence of 0's and 1's
Computers work with a binary number system that consists of only two digits - zero and one. Inside the computer
binary number is represented by an electrical pulse. One means a pulse of electricity and zero means no pulse. All
the data entered into computers is first converted into the binary number system. One digit in binary number
system is called bit and combination of eight bits is called byte. A byte is the basic unit that is used to represent
the alphabetic, numeric and alphanumeric data.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 1
A data type or simply type is a classification identifying one of various types of data, that determines the possible
values for that type; the operations that can be done on values of that type; the meaning of the data; and the way
values of that type can be stored
In most programming languages, all basic data types are built-in. In addition, many languages also provide a set of
composite data types. Opinions vary as to whether a built-in type that is not basic should be considered
"primitive". The actual range of primitive data types that is available is dependent upon the specific programming
language that is being used.
Information is stored in computers in the form of bits. A bit is used to represent information in the computer.
They are referred to as binary digits i.e. the 0’s and 1’s with 0 representing an OFF state and 1 representing an ON
state. The stored bits are usually retrieved from computers memory for manipulation by the processor
A single bit alone cannot represent a number, letters or special characters, to represent information; bits are
combined into groups of eight. A group of eight bits is called a byte. Each byte can be used to represent a number,
letter or special character.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 2
Binary Numbers
Normally we write numbers using digits 0 to 9. This is called base 10. However, any positive integer (whole
number) can be easily represented by a sequence of 0's and 1's. Numbers in this form are said to be in base 2 and
they are called binary numbers. Base 10 numbers use a positional system based on powers of 10 to indicate their
value. The number 123 is really 1 hundred + 2 tens + 3 ones. The value of each position is determined by ever-
higher powers of 10, read from left to right. Base 2 works the same way, just with different powers. The number
101 in base 2 is really 1 four + 0 twos + 1 one (which equals 5 in base 10).
NB. A computer file must have a file name and an extension that indicates the content of the file.
The way information is grouped into a file is entirely up to how it is designed. This has led to a plethora of more
or less standardized file structures for all imaginable purposes, from the simplest to the most complex. Most
computer files are used by computer programs which create, modify or delete the files for their own use on an as-
needed basis. The programmers who create the programs decide what files are needed, how they are to be used
and (often) their names. In some cases, computer programs manipulate files that are made visible to the computer
user. For example, in a word-processing, the user manipulates document files that the user personally names.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 3
Although the content of the document file is arranged in a format that the word-processing program understands,
the user is able to choose the name and location of the file and provide the bulk of the information (such as words
and text) that will be stored in the file.
Many applications pack all their data files into a single file called archive file, using internal markers to discern
the different types of information contained within. The benefits of the archive file are to lower the number of
files for easier transfer, to reduce storage usage, or just to organize outdated files. The archive file must often be
unpacked before next using.
Most computers have at least one file system. Some computers allow the use of several different file systems.
File systems are used to implement type of data store to store, retrieve and update a set of file. Without a file
system, information placed in a storage area would be one large body of information with no way to tell where
one piece of information stops and the next begins. File systems may use a data storage device such as a hard disk
or CD-ROM and involve maintaining the physical location of the files, or they may be virtual and exist only as an
access method for virtual data or for data over a network (e.g. NFS).
The file system manages access to both the content of files and the metadata about those files. It is responsible for
arranging storage space; reliability, efficiency, and tuning with regard to the physical storage medium are
important design considerations.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 4
is created and there is not an area of contiguous space available for its initial allocation the space must be assigned
in fragments. When a file is modified such that it becomes larger it may exceed the space initially allocated to it,
another allocation must be assigned elsewhere and the file becomes fragmented.
Methods for encrypting file data are sometimes included in the file system. This is very effective since there is no
need for file system utilities to know the encryption seed to effectively manage the data. The risks of relying on
encryption include the fact that an attacker can copy the data and use brute force to decrypt the data. Losing the
seed means losing the data.
In the event of an operating system failure or "soft" power failure, special routines in the file system must be
invoked similar to when an individual program fails. The file system must also be able to correct damaged
structures. These may occur as a result of an operating system failure for which the OS was unable to notify the
file system, power failure or reset. The file system must also record events to allow analysis of systemic issues as
well as problems with specific files or directories.
An identification for each record, also known as a key, makes for a more sophisticated file system. The user
program can read, write and update records without regard with their location. This requires complicated
management of blocks of media usually separating key blocks and data blocks. Very efficient algorithms can be
developed with pyramid structure for locating records.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 5
considerations include the speed of accessing data following that initially requested and the anticipation that the
following data may also be requested. This permits multiple users (or processes) access to various data on the disk
without regard to the sequential location of the data.
Examples; File Allocation Table (FAT) New Technology File System (NTFS)
Transaction processing introduces the isolation guarantee, which states that operations within a transaction are
hidden from other threads on the system until the transaction commits, and that interfering operations on the
system will be properly serialized with the transaction. Transactions also provide the atomicity guarantee, that
operations inside of a transaction are either all committed, or the transaction can be aborted and the system
discards all of its partial results. This means that if there is a crash or power failure, after recovery, the stored state
will be consistent. Either the software will be completely installed or the failed installation will be completely
rolled back, but an unusable partial install will not be left on the system.
Ensuring consistency across multiple file system operations is difficult, if not impossible, without file system
transactions. File locking can be used as a concurrency control mechanism for individual files, but it typically
does not protect the directory structure or file metadata. For instance, file locking cannot prevent race conditions
on symbolic links. File locking also cannot automatically roll back a failed operation, such as a software upgrade;
this requires atomicity.
Journaling file systems are one technique used to introduce transaction-level consistency to file system structures.
Journal transactions are not exposed to programs as part of the OS API; they are only used internally to ensure
consistency at the granularity of a single system call.
Data backup systems typically do not provide support for direct backup of data stored in a transactional manner,
which makes recovery of reliable and consistent data sets difficult. Most backup software simply notes what files
have changed since a certain time, regardless of the transactional state shared across multiple files in the overall
dataset. As a workaround, some database systems simply produce an archived state file containing all data up to
that point, and the backup software only backs that up and does not interact directly with the active transactional
databases at all. Recovery requires separate recreation of the database from the state file, after the file has been
restored by the backup software.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 6
Network file systems
The Network File System, or NFS, is a distributed file system that allows you to access files and directories
located on remote computers and treat those files and directories as if they were local. For example, you can use
operating system commands to create, remove, read, write, and set file attributes for remote files and directories.
A network file system is a file system that acts as a client for a remote file access protocol, providing access to
files on a server.
Features
a) Access transparency is that clients are unaware that files are distributed and can access them in the same way
as local files are accessed.
b) Location transparency A consistent name space exists encompassing local as well as remote files. The name
of a file does not give its location.
c) Concurrency transparency All clients have the same view of the state of the file system. This means that if
one process is modifying a file, any other processes on the same system or remote systems that are accessing
the files will see the modifications in a coherent manner.
d) Failure transparency The client and client programs should operate correctly after a server failure.
e) Heterogeneity File service should be provided across different hardware and operating system platforms.
f) Scalability The file system should work well in small environments (1 machine, a dozen machines) and also
scale gracefully to huge ones (hundreds through tens of thousands of systems).
g) Replication transparency To support scalability, we may wish to replicate files across multiple servers.
Clients should be unaware of this.
h) Migration transparency Files should be able to move around without the client's knowledge.
Intro to Computers: Chapter 4: Data Representation & Computer File System Page 7
UCC 103: PRINCIPLES OF COMPUTING
Digital circuits produce discrete outputs, distinct circuits have individual components e.g. resistors, and
transistors. Hybrids circuits contain both integrated and discrete components. Digital circuits are often called
logic circulatory because the level of each output voltage depends on several input voltages and the inputs
voltage may appear in many different combinations.
The base of a number system is indicated by a subscript (decimal number) and this will be followed by the value
of the number. For example (952)10, (456)8, (314)16
Numbers are difficult to define, they are simply a symbolic representation of ideas; number systems are
positional in nature and therefore a symbolic of numbers has weights.
Each digit in a base ten number represents units ten times the units of the digit to its right. For example-
954210 = 9000 + 500 + 40 +2 = (9 × 103) + (5 × 102) + (4 × 101) + (2× 100)
13010 = 100 + 30 + 0 = (1x102) + (3x101) + (0x100)
b). Conversion of Decimal to Octal- In converting decimal to octal, we follow the same process of converting
decimal to binary. Instead of dividing the number by 2, we divide the number by 8.
Example- Convert (45)10 into octal number system.
Remainder
8 45 5
8 5 5
8 0
Conversions of Decimal Fractions to Octal Fractions –We follow the same steps of conversions of decimal
fractions to binary fractions. Here we multiply the fraction by 8 instead of 2.
Example- Find the octal equivalent of (0.75)10.
Number (to be recorded)
0.75 × 8 = 6.00 6
Conversions of Decimal Fractions to Hexadecimal Fractions – Here we multiply the fraction by 16 instead of
2 or 8. If the non-zero integer is in between 10 to 16, then the number is represented by A to F respectively.
Binary Number 1 0 1 1 0 1
Wt. of Each bit 25 24 23 22 21 20
Binary Number 1 0 1 1 0 1 1 1
Wt. of Each bit 25 24 23 22 21 20 2-1 2-2
Weighted Value 1 x 25 0 x 24 1 x23 1 x 22 0 x 21 1 x 20 1 x 2-1 1 x 2-2
Solved Multiplication 32 0 8 4 0 1 0.5 0.25
Thus (55)8 = 40 + 5.
= 4510
Octal Number 5 5 6
Wt. of Each bit 81 80 8-1
Weighted Value 5 x 81 5 x 80 6 x 8-1
Solved Multiplication
40 5 0.75
Octal Number 5 5
Binary Number 101 101
Octal Number 5 5 6
Binary Number 101 101 110
A. Definition:
A computer network is a group of computer systems and other computing hardware
devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users (Technopedia).
A computer network is a set of computers connected together for the purpose of sharing
resources. The most common resource shared today is connection to the Internet. Other
shared resources can include a printer or a file server. The Internet itself can be
considered a computer network.
Computer network, two or more computers that are connected with one another for the
purpose of communicating data electronically (Brittanica).
NB: Connection is physically established through cables, lasers, microwaves, fiber optics and
communication satellite.
B. Objectives/ Characteristics/properties
Objectives of Computer Network
The following are the objectives of the computer networks.
1. Resource sharing is the main objective of the computer network. The goal is to provide
all the program, date and hardware is available to everyone on the network without
regard to the physical location of the resource and the users.
2. The second objective is to provide the high Reliability. It is achieved by replicating
the files on two or more machines, so in case of unavailability (due to fail of hardware)
the other copies can be used.
3. Computer organization has helped organization in saving money. This is due to the
fact that the small computer has much better price to the performance ratio comparison
than the large computer like mainframe. Mainframe computer are approximately ten
times faster than the microcomputers, but they cost thousands times more. As a result of
this imbalance, organization has preferred to install interconnected microcomputer
connected to the mainframe computer.
4. Computer network have provided means to increase system performance as the work
load increases (load balancing). In the days of mainframe when the system was full it
was to replace with the other large mainframe computer, usually at and expensive rate
not convenience for user.
5. Computer network help people who live or work apart to report together. So, when
one user prepared some documentation, he can make the document online enabling
other to read and convey their opinions. Thus computer network is a powerful
communication medium.
6. Only authorized user can access resource in a computer network. Users are
authenticated by their user name and password. Hence it is not possible to access the
data without proper account. This increases security.
Types of computer networks:
There are many types of computer networks, including the following:
1. Peer–to–Peer Arrangement
Sometimes this is called as a point-to-point link. Each point–to–point link contains one
transmitter and one receiver. Each station receives data exactly from one transmitter
and each transmitter transmits data to exactly one receiver. Receiving and transmission
process can be done over a single wire or can use separate wires for better performance.
2. Bus Topology
3. Star Topology
In a star topology, each node has a dedicated point–to–point connection only with a
central server, normally called a hub. The nodes are not directly connected to each
other. Hence, direct data flow is not allowed in between the nodes. The central server
or hub acts as a data exchanger as one node sends data exactly to hub and hub
transmits this data to another node.
4. Tree Topology
Tree topology is a combination of one or more star topology arrangements. All the sub-
central hubs are connected to a main central hub to form a tree topology. A cable TV
network is a good example of this type of topology.
5. Ring Topology
In a ring topology, each node has a dedicated point–to–point line configuration only
with the two nodes on either side of it. A signal is passed along the ring in one
direction, from node to node, until it reaches its receiver. Each node in the ring is
integrated as a repeater. When a node receives a signal intended from another node, its
repeater regenerates the bits and passes them along.
6. Mesh Topology
In a mesh topology, each node has a dedicated point–to–point connection with rest of
the nodes in the network. Dedicated connection means data can only be flown between
two nodes, it connects.
7. Hybrid Topology
May interfere with other technologies: Power line communication strongly disturbs
certain forms of radio communication, e.g., amateur radio. It may also interfere with
last mile access technologies such as ADSL and VDSL.
May be difficult to set up: A complex computer network may be difficult to set up. It
may also be very costly to set up an effective computer network in a large organization
or company.
1. Marketing and sales: Marketing professional uses them to collect exchange and
analyze data relating to customer needs and product development cycles.
4. Electronic Messaging: E-mails transfer the messages between two and more users in
a network. With this application user can transfer the information in the form of text,
picture and voice.
6. Information Services: It includes Bulletin Boards and data bank. A ‘www’ site
offering the technical specification for a new product in a information services.
10. Cable TV: This is widest usable thing today throughout the world.
A stand-alone NIC for a desktop computer. Every device on the network has to
have a network interface of some design. The network interface is sometimes
referred to as a NIC (network interface card) and may be integrated into the
computer's motherboard or may be a separate card. The NIC is the component that
takes information from the computer and sends it out onto the network wire, or into
the air in the case of a wireless network.
2. Hubs
When you connect multiple computers on a network, they all plug into a central
device called a hub. The hub has the job of moving the network signal from one
wire to another. In the case of a basic hub, the signal from one computer is sent to all
other computers on the hub, and each NIC decides whether to pass the information
to the computer or just drop it if it is not the intended recipient.
3. Switches
Switches are really smart hubs in that they are able to build tables that keep up with
which computer is on which switch port. With this intelligence, a switch does not
transmit all information to all other computers on the switch, just to the destination
computer. Switching technology helps to reduce congestion on a network and
should be used for networks of 10 or more computers.
4. Routers
Routers are really smart switches in that they are aware of other networks, while
hubs and switches are only aware of the network they facilitate. Routers are used to
connect one local area network (LAN) to another, many times across long distances
via commercial data carriers. Another way routers are smart is they can
dynamically update their routing information, detecting when one route to a
network is down, and checking to see if another route is available.
5. Media (Cabling)
Typical network cable connector of course, none of these networking devices work
well unless they are connected to each other, and that is done with various media.
The most ubiquitous media is commonly called Ethernet cabling, which is actually
one of several categories of unshielded twisted pair (UTP) wiring. The higher the
cable rating -- i.e., Cat5, Cat6, Cat7 -- the higher the bandwidth the cable can
support. In addition, there is fiber optic cable, which is more expensive and uses
laser or LED light rather than electrical pulses. Wireless has become popular in
homes due to the ease and low expense of setting up a network. The "media" for a
wireless network is the air, through which the wireless NICs transmit radio signals
that carry information.
6. Software
Software is the intelligence that causes all of the components to function together.
The most popular network software today uses what is known as the TCP/IP
protocol suite, or stack. The suite is constructed from actual layers of software,
where each has its own function. While the seven-layer OSI model -- Physical, Data
Link, Network, Transport, Session, Presentation and Application -- is the starting
point for network stacks, the Internet model has four layers -- Link, Internet,
Transport and Application -- that combine several of the seven OSI layers into the
other layers. These layers play by the same set of rules so heterogeneous computer
systems can communicate with each other, regardless of differences in hardware or
operating systems.
Chapter Seven: Impact of Computers in Society
A. Objectives
The impact of computers at the National /Government level is immense. For examples
one third (1/3) of economic growth in the developed countries is attributed to digital
technologies. Individual in the general population can make well informed decisions
due to instant access to information from anywhere.
Government Web sites provide citizens with up-to-date information. They also allow
citizens to file taxes, apply for permits and licenses, pay parking tickets etc.
• Entertainment
1|Page
• Research and education
• budgeting, personal financial management, and home/office business management
• Web access
• personal and business communications
The following are the main reasons computers have infiltrated homes and offices.
There are various ways computers have impacted in education. Students have more
tools to assist them in learning process. Some of these are outlined below: -
2|Page
Computer-based training (CBT)
Self-paced study
Unique content
Unique instructional experience, such as simulations
Reduced training costs
Distance learning (DL)
Some Web sites allow you to download entire book to your computer. The Cost is about
the same or less than cost of purchasing print version. It allows access of books not
available in local book stores.
Computers in Edutainment
3|Page
Entertainment
Computers have created and availed multiple music and video options for entertainment
as outlined below: -
Managing Finances
Computers are largely being use by individuals to balance their checkbooks, pay bills,
track personal income and expenses, track investments, and evaluate financial plans
They are also being used in online stock trading. This is buying and selling stocks
online without using a broke. Individuals also use computers to organize other
investments and set up alerts.
4|Page
• Assist in research and diagnosis
• File insurance claims
• Conduct medical tests
• Communicate with patients
• Surgically implant computerized devices
• Assist in operations with computer-controlled devices
• Aid in surgery
5|Page
vi) Impact of Computers at the Work Environment & How to ensure a
Healthy Work Environment.
There are various areas of concern for a healthy work environment. Long-time computer
use can lead to health Complication including; Job-related injuries and illnesses,
Computer Addiction, Ergonomics and workplace design, and Green computing.
The following are the precautions to reduce the chance of developing tendonitis or carpal
tunnel syndrome. Take frequent breaks during computer session
• Use wrist rest
• Exercise hands and arms
• Minimize number of times you switch between mouse and keyboard
6|Page
What is computer addiction?
Symptoms
• Craves computer time
• Overjoyed when at computer
• Unable to stop computer activity
• Irritable when not at computer
• Neglects family and friends
• Problems at work or School
7|Page
An example of a scientific use of computer is the cochlear implant (chip) that allows
deaf person to hear. The device does the following: -
8|Page
There are numerous emerging computer technologies with varying impacts on society.
We shall sample just a few.
Provide Directions
Make Reservations
Automatically call for help in emergency
Dispatch roadside Assistance
Track stolen Vehicle
Perform remote Diagnostics
Unlock door
Honk horn
ii) E-Commerce
For example, the following online e-commerce services are available for car buyers.
9|Page
iii) Virtual Reality (VR)
Any software that independently asks questions, pays attention to work patterns, and
carries out tasks on behalf of user
Sophisticated type of intelligent agent that performs tasks on remote computers before
bringing results back to user. It is sometimes called a bot. Example is the google search
engine.
What is a robot?
Computer controlled device that moves and reacts to feedback from outside world.
Computer Ethics refers to Moral guidelines that govern use of computers and
information systems
10 | P a g e
Ethics deals with good, right and just behaviour as well as evil, wrong and unjust
behaviour. It is important because it can affect a stakeholder’s ability to achieve his/her
goals. Areas of computer ethics include the following: -
Intellectual property (IP) refers to work created by inventors, authors, and artists
Intellectual property rights are rights to which creators are entitled for their
inventions, writings, and works of art.
v) Copyright
11 | P a g e
Most acts permit certain actions (“fair dealing”), e.g. use for research, private study,
criticism, review, news reporting, taking back-ups, etc. Software license issued to
permit actions forbidden by copyright. Damages for contravening copyright usually
a notional cost of license fee, e.g. 10% royalty
Most laws:
protect against use of trade name by another enterprise, if likely to mislead the
public
vii) Patents
Patent protection means anyone who wishes to exploit the invention must obtain the
authorization of the patentee, otherwise prosecution (patent given on first to file
basis)
Patented invention may be exploited without patentee’s authority, e.g. in the public
interest by or on behalf of the government or after expiry of term.
12 | P a g e
There is no legal distinction between breach of copyright of mass-marketing of
software product & bespoke software – but concerns are different
There is huge investment cost in producing and therefore software houses will
attempt to protect their investment e.g. by having pressure groups (funded by SW
developers) dedicated to reduce the extent of piracy.
Detection of breach of software is done by carrying out external raids and audits by
lobby groups.
Code of ethics / Conduct is a written guideline that helps determine whether specific
computer action is ethical or unethical. Code of Ethics asks; how does this choice relate
to the ethical standards of my profession? This test is about the decision-maker's
duties in his or her role as a professional. Example of established computer codes of
ethic includes: -
13 | P a g e
systems, software engineers have significant opportunities to do good or cause
harm, to enable others to do good or cause harm, or to influence others to do
good or cause harm. To ensure, as much as possible, that their efforts will be
used for good, software engineers must commit themselves to making software
engineering a beneficial and respected profession. In accordance with that
commitment, software engineers shall adhere to the following Code of Ethics
and Professional Practice.
The Code contains eight Principles related to the behavior of and decisions
made by professional software engineers, including practitioners, educators,
managers, supervisors and policy makers, as well as trainees and students of
the profession. The Principles identify the ethically responsible relationships in
which individuals, groups, and organizations participate and the primary
obligations within these relationships. The Clauses of each Principle are
illustrations of some of the obligations included in these relationships. These
obligations are founded in the software engineer’s humanity, in special care
owed to people affected by the work of software engineers, and the unique
elements of the practice of software engineering. The Code prescribes these as
obligations of anyone claiming to be or aspiring to be a software engineer.
The IEEE Code of Ethics in its preamble states that; we, the members of the
IEEE, in recognition of the importance of our technologies in affecting the
quality of life throughout the world, and in accepting a personal obligation to
our profession, its members and the communities we serve, do hereby commit
ourselves to the highest ethical and professional conduct and agree:
14 | P a g e
to seek, accept, and offer honest criticism of technical work, to acknowledge
and correct errors, and to credit properly the contributions of others;
to treat fairly all persons regardless of such factors as race, religion, gender,
disability, age, or national origin;
to avoid injuring others, their property, reputation, or employment by false
or malicious action;
to assist colleagues and co-workers in their professional development and
to support them in following this code of ethics.
15 | P a g e
Chapter Eight: Windows Operating Environment
A) Windows Desktop
Desktop is your work area on which program and files icons are located. It is basically a workspace
where you can access everything you need to operate your computer, such as system components,
applications, the Internet, etc.
The
des
kto
p
con
tain
s:
Sta
rt
butt
on:
one
of
the
mos
t
imp
orta
nt
tool
s you will use while working with Windows. The
Start button allows you to open menus and start applications. Taskbar: primarily used to switch
between open windows and applications
Icons (or graphical pictures): represent applications, files, folders and other parts of the operating
system. By default Windows provides you with one desktop icon, the Recycle Bin. My Computer.
The My Computer icon provides access to the resources on your computer. You can access your
drives and other peripherals by clicking on the My Computer icon. You can also access the Control
Panel through My Computer.
Internet Explorer. The Internet Explorer icon launches the Internet Explorer browser.
My network places. If you are working on a network, this displays all of the computers on the
network
System Tray. The part of the task bar that holds the clock, volume control, and icons for other
utilities that runs in the background of your system.
Recycle Bin. This is where you dump any files you want to delete.
Parts of a Window
Windows contain buttons and menus to control the program and window. Windows are used in
most programs, and once you learn the window of one program, you will be familiar with the
windows for most programs since the window, menu and button layout appears n just about every
window program.
Close
Button
Closes the
window or
program,
removing
it from the
screen and
the
computer’
s memory.
Minimize
Button
Minimizes
a program
from view.
The
program is
still ready
for use and can be found in the task bar.
Maximize Button Enlarges the window so that it fills the entire screen, allowing you to see your
entire workspace. Notice, when a window is maximized, this button is not shown.
Restore Button When a window is maximized, this button is shown. Clicking it will make the
window smaller.
Menu Bar Controls what a program does. The menu functions listed will change from program to
program, but the bar is always located at the top.
Status Bar Displays information about the program, such as instructions or special information.
Title Bar Displays the name of the program and name of the file in use.
Main Window .This is where you work within a program. If it is Microsoft Word, this is where you
would type, if it is a web browser this is where the web page would be displayed.
Toolbar. Have shortcuts to the menu items
A PC cannot do anything useful unless it is running its operating system software that acts as a
supervisor for all its software applications. It sets the rules for using memory , drives and other
hardware devices on the computer. Before a PC can run the operating system, it needs some way to
load it from disk into RAM. The way to do this is with the bootstrap- a small amount of code that is
executed on startup or system boot.
The boot-up process is a list of detailed procedures that the system undergoes to perform all
system checks and load all necessary files to bring the computer to an operable state.
There are essentially two forms of booting - the soft boot and the hard boot. The warm boot or hard
boot involves powering the computer up from an initial zero power supply. A cold boot on the other
hand takes place when a software application or operating system triggers the computer to perform
a reboot. A successful boot is dependent on three conditions - the hardware, BIOS and operating
system files to function without errors. When an error occurs, you will be notified by error
messages, beeping sounds or in the worst scenario, a blank screen.
The ROM memory chip stores the Basic Input Output System (BIOS). BIOS provides the
processor with the information required to boot the system. It provides the system with the settings
and resources that are available on the system. BIOS is a permanent part of the computer. It does
not load from disk but instead is stored in a ROM memory chip. The program code in the BIOS
differs from ordinary software since it acts as an integral part of the computer.
BIOS is the basic program used as an interface between the operating system and the motherboard.
The BIOS is stored in the ROM and cannot be rewritten.
Renaming a Folder
To rename an existing folder, move your mouse over the name and right click. A menu will appear.
Close to the bottom you will see the word Rename. Click it, and the black rectangle with the word
highlighted in blue will appear. Rename your folder and hit Enter.
Deleting a folder
Right click on the folder and select delete or.
Select the file, go to file menu and select delete
A dialog box appears asking if you want to delete the folder, click yes
Once files are deleted they go to the recycle bin which is a holding or storage location for files not
required. Such files are still in the hard disk. These files can be retrieved from recycle bin as long as
recycle bin have not been emptied.
Short cuts
Short cuts are icons placed on the Desktop that allows you to quickly open a program or file
Procedure of creating shortcuts
Locate the item and right click
Select Send to menu
Select Desktop (create shortcut)
Recycle Bin
Windows provides us with a folder called recycle bin where all deleted files are stored. If you
accidentally delete a file you can be able to retrieve it from the recycle bin and restore it to the
folder it originally was stored in. The Recycle bin icon is always placed on the desktop.
The folder is the equivalent of dust bin in an office.
Retrieving files
Select and double click the recycle bin Icon on the Desktop to open it
Locate the file and right click on it and select restore.
D) Memory Formatting
A format is a pre-established layout for data. A computer program accepts data as input in a certain
format, processes it , and provides it as output in the same or another format. All data is stored in
some format with the expectation that it will be processed by a program that knows how to handle
that format. Generically data formats tend to fall into bitmaps (strings of 0s and 1s) that describe
images or sound patterns (or both) , text formats ( in which usually each byte value is mapped to
character) and numeric data formats ( used by spreadsheet and other database programs)
Disk formatting is the configuring process of a data storage media such as hard disk drive, floppy
disk or flash drive for initial usage . Any existing files on the drive would be erased with disk
formatting. Disk formatting is usually done before initial installation or before installation of a new
operating system. It is also done if there is a requirement for additional storage in the computer.
Disk formatting can be performed on both magnetic platter hard drives and solid-state drives. The
formatting comprises low-level formatting, partitioning and high level formatting. Low- level
formatting aids in preparing the physical structure on the storage media. The partitioning process
involves the division of the hard drive into logical volumes for data storage. High- level formatting
helps in creating the file system format within the logical volume or within the disk partition. Disk
formatting is usually done with the help of a disk formatting utility.
While preparing the hard drive for initial use, disk formatting checks for errors in the drive. It can
scan and repair bad sectors. Another benefit associated with disk formatting is its capability to erase
bad applications and remove sophisticated viruses.
Disk formatting is an action which must be done with caution. As it deletes data and removes
programs installed, backup of the necessary data or applications are required. Disk formatting takes
time. Frequent disk formatting can gradually decrease the life of a hard drive.
A hard disk or other storage device is also said to be formatted when its space has been organized
and divided into pieces that can be controlled for convenient storage and access. For example a
hard disk maybe formatted into areas called sectors, tracks, and clusters. To format a hard disk is to
set up the space divisions on the medium and initiate a space allocation table that will know exactly
how to reach each bit of data that may be stored there later
To format a drive means to prepare the chosen partition on the drive to be used by an operating
system by deleting all of the data and setting up a file system.
The most popular file system to support Windows is NTFS but FAT32 is also sometimes used.
In Windows, formatting a partition is usually done from the Disk Management tool. You can also
format a drive using the format command in a command line interface like Command Prompt or
with a free disk partition software tool.