Introduction to Computer 2
Introduction to Computer 2
Dahiru Aliyu
Now as we know only human languages and computer knows only machine language,
we need some media through which we can communicate with the computer.
Languages are tools human can use to communicate with the hardware of a computer
system.
Similarly, the symbols of particular one computer language must also be used as per set
of rules which are known as the “Syntax” of that language, the language which you are
using.
LANGUAGES
MACHINE
LANGUAGES ASSEMBLY HIGH – LEVEL
LANGUAGES LANGUAGES
1
Prepared by: Pst. Dahiru Aliyu
Computer programs are written using many different computer Languages but the
machine language.
OPCODE OPARAND
OPERATION CODE OPERATION ADDRESS
The 1st part is the operation code which tells the computer what function to be
performed.
The 2nd part is the operand which tells the computer where to find & store data to be
manipulated.
So each instruction tells the computer what operation to perform & the length & location
ADVANTAGES
Programs can be executed immediately upon completion because it doesn’t require any
translation.
DISADVANTAGE
Tedious to program
Difficult to program
Difficult to modify
2
Prepared by: Pst. Dahiru Aliyu
Error prone
symbolic program.
Machine language was tedious to code and errors were expected to arise in bulk.
To solve these problems mnemonic codes and symbolic addresses were developed.
It allows using alphanumeric mnemonic codes instead of numeric code for the
instructions in instruction set. For example, using ADD instead of 1110 or 14 to add.
The storage locations are to be represented in the form of alphanumeric addresses instead
of numeric address.
3
Prepared by: Pst. Dahiru Aliyu
The symbolic language made program writing so much easier for the Programmers but it
must be translated into machine code before being used for operation.
Assembler
into machine codes, and symbolic address is addressed into an actual machine address.
ADVANTAGE
Easier to modify.
Easily relocatable.
DISADVANTAGE
Machine depended.
Additional storage area needed for the source programs and object code.
4
Prepared by: Pst. Dahiru Aliyu
The machine language & assembly language requires a good knowledge of internal
structure of computer.
The both languages are machine dependent & it is difficult to solve error.
The high level languages machine independent so it can be easily ported & executed on
any computer.
The high level language programs do not require any knowledge of internal structure of
computer so the programmer concentrate on the logic of problem rather than internal
words & familiar mathematical symbols & expression so the program makes easier to
It requires a translator program to convert high level program into machine language.
Compiler
Compiler is a special program (translator) which translates high level programs into
machine codes.
ADVANTAGES:
Machine independent.
Easier to maintain.
Easily relocatable.
5
Prepared by: Pst. Dahiru Aliyu
Few errors.
DISADVANTAGES:
Less flexible.
Lower efficiency.
A computer can directly execute only machine language programs so the assembly
language program must be converted into its equivalent machine language program
This translation is done with the help of a translator program which is known as
assembler.
into machine codes, and symbolic address is addressed into an actual machine address.
program) and the output is the machine language program (object program).
language instruction.
There is one to one correspondence between the assembly language instructions of source
program & the machine language instruction of its equivalent object program.
6
Prepared by: Pst. Dahiru Aliyu
In case of assembly language program the computer not only has to run the program but
also must first run assembler program to translate the original assembly language
So the high level language program must be converted into its equivalent machine
This translation is done with the help of a translator program which is known as compiler.
A compiler is a translator program which translates a high level language program into
As shown in figure that the input to compiler is the high level language program (source
program) and the output is the machine language program (object program).
The compiler translates each high level language instruction into set of machine language
There is one to many correspondence between high level language instructions of source
During the translation the source program is only translates not executed.
7
Prepared by: Pst. Dahiru Aliyu
A compiler can translates only those source programs which have written in the language
A compiler can also detect & indicates the syntax errors during the compilation process
It takes one statement of high level language, translates into machine language &
The main difference between compiler & interpreter is that compiler can translate the
As shown in figure that the input to an interpreter is a source program & the output is
Interpreter translates & executes a high level language program statement-by statement.
execution.
The main advantage of interpreter is that interpreter makes it easier & faster to correct
programs.
The main disadvantage is that interpreter is slower than compilers when running
a finished program.
8
Prepared by: Pst. Dahiru Aliyu
An operating system is a software program that provides an interface between user & the
It’s a collection of system software that co-ordinates between the hardware, provides a
An operating system is an integrated set of programs that the resources (the CPU,
memory, I/O devices etc) of computer system & provides an interface to the user to run
the machine.
1) PROCESS MANAGEMENT
The process management of OS taking care about the creation & deletion of user &
communication.
2) MEMORY MANAGEMENT
The memory management of OS taking care about the allocation & deallocation of
3) FILE MANAGEMENT
The file management of OS is taking care about the file related activities such as
4) SECURITY
9
Prepared by: Pst. Dahiru Aliyu
The security model of OS protects the resources & information of a computer system
5) COMMAND INTERPRETATION
This model taking care of interpreting user commands & directing the system resources
o In Batch operating system, data is collected over a period of time and the processing of
o This approach was used very commonly in the past when punch cards served as data
storage media and is used as input into the computer system for processing.
o In batch processing, the data have first to be captured, normally as a form of source
documents, like time cards, or alternatively, by RJE (Remote Job Entry) where data is
o The data will then be transmitted to the computer or the source document will be
o The data is processed by the computer and the resulting output is given to the users.
o Batch processing is suitable in application where there are large amounts of data and
o As data are transcribed into machine readable form before submitting for processing, the
speed of processing is therefore determined by the computer and not by the operator.
10
Prepared by: Pst. Dahiru Aliyu
ADVANTAGES:
o Less complicated.
o After input process is over, while processing is going on, user can attend other
o jobs.
DISADVANTAGES:
o Real-Time systems are always on-line but on-line systems need not be real-time systems.
o However, further constraints are placed in terms of response time and availability of the
system.
o By definition, a real time system receives data and process it quickly enough to produce
output which can be used to control or affect the outcome of an ongoing activity of
process.
o In general, real-time systems handle small volumes of data at any one time and the
o Feedback is essential in real-time systems so that processing can keep pace with external
factors.
o Most real-time systems are used in mission critical application like process control and
11
Prepared by: Pst. Dahiru Aliyu
o Control signals are sent to the fins of the missile to correct any deviations.
ADVANTAGES
DISADVANTAGES
o Elaborate controls and backup procedures to guard against unwarranted access to the
system.
o Control checks are difficult since updating occurs at the time of processing.
Time-sharing is a mechanism that allows the many users to use a computer system in
such a way that each user is given the impression that they use their own system.
Using these terminals multiple users can simultaneously work on the system.
memory.
In this very short period of CPU time allocates to each user process.
When the CPU is allocated to user process, the process will use CPU until the allocate
time slice is expires or the execution process is over during this time period.
Features:
12
Prepared by: Pst. Dahiru Aliyu
Each program is given control of CPU only for time slice turn by turn.
Advantages:
In this operating system the CPU can allocate time to several programs instead of
remaining idle when one program is busy with I/O operations the another program
ADVANTAGES:
DISADVANTAGES:
13
Prepared by: Pst. Dahiru Aliyu
The term multiprocessing describe interconnected two or more CPUs that have an ability
ADVANTAGES:
In case of failure of one CPU other can take over without any loss.
DISADVANTAGES:
Expensive
It enables you to make use of computer system for creating, editing, and viewing, formatting,
Spreadsheet software is a numeric data analysis tool, which allows us to create kinds of
computerised ledger.
DATABASE SOFTWARE
14
Prepared by: Pst. Dahiru Aliyu
A database is a collection of related data stored & treated as a unit for information
retrieval purpose.
Database software is a set of one or more programs which enables us to create a database,
GRAPHICS SOFTWARE:
Graphic software enables you to use a computer system for creating, editing, viewing, storing,
It allows you to use personal computers for storing & retrieving your personal information &
PRESENTATION SOFTWARE:
It allows you to provide the tools which help you to develop a presentation on specific subject.
ANIMATION/VIDEO/SOUND PACKAGE:
Provides the different kinds of application that allows you to generate animation, watching or
In an On-Line system, the terminal used by the operator is connected to the main
computer so that the operator can interact with the computer in aconversational mode.
There are some benefits by allowing users to communicate with the computer on-line.
Error checking can be performed by the computer when data entry is carried out.
The operator can be informed of the error so that immediate correction can be made.
15
Prepared by: Pst. Dahiru Aliyu
The nature of on-line systems allows centralization of information, fast data retrieval
However, the cost of implementation such a system is much more than the batch system.
Furthermore, as the terminals may be located remotely from the main computer site,
o Audit trial – maintaining a record of all actions that have been carried out
to any data.
technology.
Convergence can refer to previously separate technologies such as voice (and telephony
features), data (and productivity applications) and video that now share resources and interact
16
Prepared by: Pst. Dahiru Aliyu
a. A GIS (Geographic Information System) is a tool that uses for the answer of the
geographic question
b. A GIS integrates hardware, software, and data for capturing, managing, analyzing, and
c. GIS allows us to view, understand, question, interpret, and visualize data in many ways
that reveal relationships, patterns, and trends in the form of maps, globes, reports, and
charts.
d. A GIS helps you answer questions and solve problems by looking at your data in a way
e. GIS technology can be integrated into any enterprise information system framework.
f. By using GIS tool, user can arrange and display the data about places on the earth in
g. We can store, analyze and manage the data about places on the earth with the help of GIS
tool.
h. User can zoom in and out of maps, charts and tables freely and study in details.
i. By using GIS tool, we can create maps, charts and tables and also we can solve the
j. GIS allows automatic determination of the relationships between maps & can create a
k. GIS allows the relating of multiple data bases using common geographic locations and
COMPONENTS OF GIS
17
Prepared by: Pst. Dahiru Aliyu
o Hardware
o Software
o Data
o People
o Method
o Facilities management.
o In Agriculture
o In Business
o In Electric-Gas
o In Environment
o In Forestry
o In Military
o In Land Planning
o In Site Planning
o In Water Industry
18
Prepared by: Pst. Dahiru Aliyu
system.
GIS is a system that can provide a position at any point on the Earth’s surface to a
GPS is a system that measures the distances from the satellites that are in path
By knowing the distance from the satellites, it is possible to calculate the position
The satellite sends all the timing and position information to the receiver so the
receiver knows when the message was sent and also the receiver is able
The satellite contains an atomic clock so that the satellite sends the timing
The satellite uses their own power through their solar panels and these extend to
Each satellite is in circular orbit around the earth and it sends the data on two
There are 24 satellites in GPS that orbits the earth at a height of about 12000
miles.
19
Prepared by: Pst. Dahiru Aliyu
Each of this satellite are constantly moving and making two complete orbits in
GPS APPLICATIONS:
o Navigation
o Agriculture
o Space Shuttle
o Tourism
o Remote sensing
o Military
♥ A computer virus is a program that can copy itself & infect a computer without
♥ A virus can only spread from one computer to another when it host is taken to the
♥ In computers virus is a program that replicates to another program, computer boot sector
or document.
20
Prepared by: Pst. Dahiru Aliyu
CD.
TYPES OF VIRUS
The virus is classified in main five types.
1. FILE INFECTORS
o Some virus can infect any program when the program is requested for
o This virus infects executable code found in certain system areas on a disk.
o They attached to the DOS boot sector or the master boot record on hard disks.
o Boot sector virus attaches themselves to the boot record information and
3. MULTI-PARTITE VIRUSES:
o Known as polypartite.
o If the boot area is cleaned, but the files are not than boot area infected again.
4. MACRO VIRUSES:
o These are the most common virus and they tend to do the least damage.
21
Prepared by: Pst. Dahiru Aliyu
o These types of virus infect data files such as it can infect your word document
You can protect system against virus with a few simple steps.
Write protected your floppy when suing them on the other computer.
Prepare a reuse disk with critical system files. Probably it should bootable.
22