COMPUTER ORGANIZATION AND APPLICATION COMPUTER GENERATIONS Classification of computers into generations is based on fundamental technology. It provides a framework for growth in the computer industry. First generation computers i) ii) iii) iv) v) vi) vii) They were bulky in size and required a large space for installation Thousands of vacuum tubes were for processing which emitted large amounts of heat They consumed a lot of power Had frequent hardware failures Operating speed was slow Commercial production was difficult and costly used machine language for programming making id difficult to program Examples include: ENIAC- electronic numerical integrator UNIVAC- universal automatic computer EDVAC- electronic discrete variable automatic computer Second generation computers A new electronic switching device called transistor was invented. i) They were more reliable than first generation hence less prone to hardware failures ii) It easier to program since assembly language was used for programming iii) The memory of this computer was composed of magnetic cores. iv) They were faster, smaller, consumed less power, and emitted less power than first generation computers. Examples include: IBM 3070, Honeywell 400 Third generation computers The use of integrated circuit chip(IC) was introduced. IC’s means circuits consisting of several electronic components such as transistors, capacitors, and resisters grown on a simple chip of silicon eliminating wired integration between components. i) They were more powerful, reliable, less expensive, smaller, and cooler to operate than the first generation of computers, ii) They were easier to upgrade iii) They had faster and larger capacity secondary storage iv) Mini computers became affordable even to small companies v) Time sharing operating system allowed interactive usage, simultaneous use many users and online systems. vi) They have standardization of high level programming languages for programming vii) They employed the use of small scale integration technology Examples include: IBM 360, IBM 370, PDP-8 Fourth generation computers The average number of electronic components packed on a silicon chip doubled each year. They employed the use of large scale integration where it is possible to integrate more than 30,000 electronic components on a single chip. i) They were more powerful,smaller,consumed less power, emitted less heat than the 1st, 2nd and 3rd generation computers ii) They were more reliable and less prone to hardware failures iii) They had faster and larger primary and secondary storage compared to 3rd generation. iv) Use of standard high-level programming languages allowed portability of programs gladysmange@gmail.com 0725422033 v) vi) Graphical user interface made the systems easier for users to learn how to use Personal computers even more affordable to individuals Fifth generation computers This was followed by ultra large scale integration where it was possible to integrate about one million electronic components in a single chip. This progress led to creation of a micro-processor. A micro-processor contains all the circuits needed to perform arithmetic logic and control functions/core activities of the computer on a single chip. i) They employ the use of a large memory with a very fast access time. Hard disks used for secondary storage are cheaper, smaller, and larger in capacity. ii) Floppy disks, compact disks are used as portable medium for porting programs and data from one computer to another. iii) There is a spread of high speed computer networking which has enabled multiple computers to be connected to enable them to communicate and share data. iv) Companies have developed graphical user interfaces to enable individuals who are not computer professionals to use them by making computers more user friendly. v) Portable computers are more smaller allowing users to use computing facility while traveling vi) They are more powerful, consume less power, more reliable than the earlier generations. vii) Many types of computers , in all price ranges have come up CLASSIFICATION OF COMPUTER SYSTEMS a) Super computers Computers are classified according to size, processing speed, cost e.t.c they are classified as They are very powerful (have high processing power). They are used for processing large amounts of data related to a single complex problem. They are optimized for those applications that are beyond the reach of the contemporary computers. They are used for scientific purposes, weather forecasting, space missions, nuclear research and parallel computing. It has limited use because of the price tag. Mostly research centre’s and government agencies with scientific/ engineering functions have them. Only a few are operational. b) Main frame computers It is a large general purpose computer to which other computers can be connected to so that they can share the facilities of the information processing facility e.g ATM’S they are designed to be used by hundred’s of users simultaneously and handle vast amounts of data. It has a sophisticated operating system that can run both batch and online processing programs. It allows multi user online use, multi tasking and multi processing. The primary function of mainframes today is to support large databases. They are owned by large businesses and government organisations that need a central depository of data that can be managed and controlled centrally. c) Mini computers Hardware components of these are often similar to those of mainframes in terms of functionality although their features and capabilities are less powerful. Depending on the system design, a mini computer can support a large number of terminals either attached locally or using communication lines. It is an intermediate size computer that can run the same kinds of applications as mainframes but lack the speed and storage capacity. d) Micro computers This is a computer whose C.P.U is a micro-processor. A micro processor is one whose components are on a single integrated circuit chip. Hardware components are also similar to those of mainframes and mini computers. However they are generally of a smaller scale e.g portable computer, embedded computers e.g calculators, watches 2 Advantages of a Computer Computer systems have many advantages, some of which are listed as follows: 1. Computers operate at high speed, hence there may be cost savings e.g. staff costs, equipment costs etc. 2. Computers produce accurate results (information). 3. Computers can work continuously without getting bored or tired. 4. Computers can work on voluminous data items. 5. Computers can work on any problem (solve any problem), provided a relevant instruction set (program) are availed to them. 6. Computers are flexible, (i.e. they can adapt to any workload without much strain). 7. Computers produce reliable information. 8. Large volumes of data can be conveniently stored, assessed and altered. 9. Computers can provide useful information to management for control and decision making. 10. Computers help to reduce paper work significantly. 3 11. Computer systems can reduce the number of persons required for performing various organizational activities. 12. The use of computers for office activities reduces the requirements of office space. Notes: The above advantages may bring several benefits into the organization. Such benefits may be classified as cost savings, improved data processing quality and better management information. 1.3.4 Disadvantages of Using a Computer As much as we say that computers are useful to humans, they come with some disadvantages are given as follows: a) Computers are costly, if it is more efficient and effective to carry out the processing tasks without employing the use of computers, then computerization is needless. Computer prices have gone down tremendously, however, but they are still out of reach for many poor people b) Due to rapid change in the computer technology, the computer and related facilities can become outdated very fast, hence posing a risk of capital loss. c) Changing from the old system, the manual system, to a computerized system is a gradual process during which there is interruption in the normal working environment. d) There is usually the fear that installing the computer into an organization might result in replacing some human employees. e) In case the computer system fails, it might be extremely difficult to revert back to the old manual system. For this reason, stand by procedures are necessary, but expensive. f) Controlling a computer file's contents is a difficult exercise due to the fact that the contents of files of computer based systems are none-human sensible. There is further fear that such contents may suffer from fraudulent acts by the people who know them. g) Manual systems, though slow, are more flexible as compared to the computerized systems. h) Employees may resist the adoption of computers by organizations in which they work 4 1.3.4 Resistance from Employees It is human nature to fear the unknown; we are always comfortable doing work the way we are used to sometimes, there is resistance from employees/users to adopt new technology. The main reasons for this resistance are: Fear of change: People are creatures of habit and hence are afraid of change Fear of losing their jobs: People usually associate the computer with loss of jobs and hence they will be afraid that they might end up losing their jobs. Fear of failure: Since the computer is very new in a given working environment, the people will be afraid that they might never adapt to it Loss of control: The management will be afraid that once a computer is implemented, they might lose control of the organization. Lack of Understanding: The user may not understand the benefits of the computer system in their jobs. Thus this will create resistance since the computer will be looked upon as an intruder. COMPUTER SOFTWARE Software is a set of computer programs, procedures and associated documents which describe the programs and how they are to be used. A computer program is a sequence of logical instructions, written in a language, which can be understood by the computer which controls the activity of processing by the computer. Most software can be divided into two major categories System software Application software Application software A set of one or more programs, designed to solve a specific problem or do a specific task. E.g. Word processing – enables us to make use of a computer system for editing, viewing, formatting, storing, retrieving, and printing documents e.g. Microsoft word, word perfect, word pro, WordStar. Spreadsheet software – a numeric data analysis tool, which allows us to create a kind of computerized ledger e.g. Microsoft excel, lotus 1-2-3 Database software – a set of one or more programs, which enable us to create a database, maintain it, organize its data in desired fashion and to selectively retrieve useful information from it. Microsoft access, Quattro pro, VISIC ALC Graphics software – enables us to use a computer system for creating, editing, viewing, storing, retrieving and printing designs, drawings, pictures, graphs and anything else that can be draw in the traditional manner. Education software – allows a computer system to be used as a teaching and learning tool. Entertainment software – allows a computer system to be used as an entertainment System software System software is a set of one or more programs, designed to control the operation and extend the processing capability of a computer system. In general it performs the following functions: Supports the development of other application software Supports the execution of other application software Monitors the effective use of various hardware resources e.g. CPU, memory, peripheral Communicates with and controls the operation of peripheral devices e.g. printers, hard disk 5 Some of the most commonly known types of system software are: Operating systems – it takes care of the effective and efficient utilization of all the hardware and software components of the computer system e.g. Microsoft DOS, Windows, UNIX, LINUX Programming language translators – they transform the instructions prepared by programmers in a programming language into a form which can be interpreted and executed by a computer system e.g. Assemblers, Compilers, Interpreters Communication software – they enable transfer of data and programs from one computer system to another in a network environment Utility programs – a set of programs which help user in system maintenance tasks and in performing tasks of routine nature. E.g. formatting hard disks Operating System It’s an integrated set of programs that controls the resources (CPU, Memory, Input/output devices) of a computer system and provides its users with an interface or virtual machine that is more convenient to use than the bear machine. The two primary objectives of Operating System use. (i) Making a computer system convenient to use i.e. hides details of Hardware resources from the programmer and provides him with a convenient interface of using computer system. It acts as an intermediary between hardware and software providing a high level interface to low level hardware and making it easier for the software to access the use of those resources. (ii) Managing computer resources. This involves performing such tasks as keeping track of who is using which resource, granting resource requests, accounting for resource usage, and mediating conflicting requests from different programs and users. Main functions of Operating System. (i) (ii) (iii) (iv) (v) Process Management Memory Management File Management Security Command Interpretation. Operating System arose historically as people needed to solve problems associated with using computers. Much of operating system history is driven by relative cost factors of hardware and people. Hardware started out fantastically expensive, relative to people and the relative costs has been decreasing ever since. (i) Process Management A process (job) is a program in execution. The main objective of the process management module of operating system is to manage the process submission to the system in a manner to minimize the idle time of various processors (CPU, I/O processors e.t.c) of the computer system. It takes care of creation and deletion of processes, scheduling of various system resources to different processes requesting them and providing mechanisms for synchronization and communication among processes Multiprogramming: This is the interleaved execution of two or more different and independent programs by same computer. Two or more user programs are placed in the main memory and executed consecutively. Note: The CPU is capable of conducting / executing only one instruction at a time. Requirements of Multi-programming System (a) Large Memory – Required to accommodate a good number of user programs along with the operating system. (b) Memory Protection- To prevent a job in one memory partition from changing information or instructions of a job in another memory partition. 6 (c) Job status preservation- preserves the job’s complete status information when the CPU is taken away from it and restores this information back, before the CPU is given back to it again. (d) Proper job mix- to effectively overlap the operations of the CPU and Input/output devices. (e) CPU scheduling – To decide which of the ready jobs should be allocated the CPU for execution. Multitasking: Technically speaking it is the same as multiprogramming. It is system’s capability to concurrently work on more than one task/process. Some authors prefer using multiprogramming for multi-user systems and multitasking for single-user systems. The progress of different tasks can be viewed on different windows in a multitasking system. Multiprocessing: Used to describe interconnected computer configurations or computers with two or more CPUs which have the ability to simultaneously execute several programs. Multiprocessing systems have better performance and reliability. Note: These systems however require a very sophisticated operating system to schedule, balance and coordinate input, output and processing activities of multiple processors. The design of such operating system is a complex and time taking job. They are expensive to procure and maintain. (ii) Memory Management Its job is to keep tracks of which parts of memory are in use and which are not in use, to allocate memory to processes when they need it and de allocate when they are done. Virtual Memory – Extension of memory which allows execution of processes that might not be completely loaded in memory. It is often described as hierarchy of two storage systems-one is a low cost, large capacity, low speed system (hard disk) the other is a high cost, small capacity high speed system (RAM). The operating system manages the two storage systems in such as a way that the users of the system feel that they have access to a single, large, directly addressable and fast main memory. (iii) File Management A file is a collection of related information. Every file has a name, data and attributes. The name of a file uniquely identifies it in the system and is used by its users to access it. The file management module of an operating system takes care of file related activities such as accessing, naming, sharing and protection files. File Access Methods To use information stored in a file, it must be accessed and read into computer memory. The two commonly supported file access methods at operating system level are: 1. Sequential Access. 2. Random Access. 1. Sequential Access. A process can read the bytes or records in the file in the order in which they are stored, starting at the beginning. A sequential file can however be rewound and read as often as needed. 2. Random Access. Information stored in a random access file can be accessed randomly, irrespective of the order in which the bytes or records are stored. File Operation An operating system provides a set of operations to deal with files and their contents. A typical set of file operations provided by an operating system may be as follows; 1. Create-Is used to create a new file. 2. Delete- Is used to delete an existing file, which is no longer needed. 3. Open-Is used to open an existing file, when a user wants to start using it. 4. Close-Is used a close a file, when a user has finished using it. 5. Read-Is used to read data stored in a file. 6. Write-Is used to write new data in a file. 7. Seek-. Is used with random access file to first position the read/ write pointer to a specific place in the file, so that data can be read from, or written to, that position. 8. Get attributes- Is used to access the attributes of a file. (iv) Security Management 7 Security in a computer system deals with protecting the various resources and information of a computer system against destruction and unauthorized access. A total approach to computer security involves both external and internal security; External security deals with securing the computer system against external factors such as fires, floods, earthquakes, stolen disks, leaking out of stored information by a person who has access to the information. For external security, the commonly used methods include; maintaining adequate backup copies of stored information at places far away from the original, information using security guards to allow entry of only authorized persons into the computer centre. Allowing access to sensitive information to only trusted users etc. Internal security deals with: (a) User Authorization – Once a user is allowed physical access to the computing facility, the users identification must be checked by the system before he/she can actually use the facility. E.g. Voice recognition systems, Finger prints, Eye scanning, ATMs. (b) Access Control – Even when a user passes the authorization stage and is allowed to use the computing facility, a way is needed to prohibit the user from accessing the system’s resources/information that he or she is not authorized to access e.g. pin number, password. (c) Cryptography – Even if a user manages to gain access to the information which he/she is not authorized to access, a way is need to ensure that the user cannot make use of that information. Cryptography works on the idea that if it is not possible to ensure access control, it is better to prevent comprehension of information. (v) Command Interpretation The command interpretation module of an operating system provides a set of commands using which the user can give instructions to the computer for getting some job done by it. When a user gives instructions to the computer, the interpreter takes care of interpreting the command and directing the system resources to handle the request hence the command interpreter provides a user interface to hide the hardware details of the system from the user. The two broad categories of user interface supported by various operating systems are; (i) Command Line Interface (ii) Graphical user interface(GUI) (a) Command Line interface: This is a textual user interface in which the user gives instructions to a computer by typing commands. To enter a command, the user uses the keyboard to key in words and symbols e.g UNIX and DOS. (b) Graphical user interface (GUI); It is much easier to learn and use than command line interface. A GUI provides the screen full of graphical icons and menus and allows the user to make a rapid selection from the displayed icons or menus to use instructions to the computer. A point and-draw device is normally used to rapidly point to and select a particular graphical icon or menu item from the multiple options displayed on the screen. E.g. Window, LINUX Popular Operating Systems. 1. UNIX. It is a multi- user, timesharing operating system. It was developed in the early 1970s at the Bell labs by Ken Thompson and Dennis Ritchie for a small PDP- 11 computer. It was the first operating system to be written in a high level language (C – Language) since UNIX was written in C- language moving it to a new machine was much easier. This was an important reason for its large popularity and availability on a wide variety of systems. It has multi- processing capability but is also used in single – processor computers. Additionally, it has a command driven interface. It has been the most widely used multi-user network Operating System. There are many versions that can run on many different designs of computer i.e. mainframe computers, micro and mini- computers. 2. DOS Stands for “Disk Operating System”. It is a single user operating and IBM compatible Pcs. It was introduced in 1981 by Microsoft and IBM and was the most popular Operating System for personal computers in the 8 1980s. Its popularity stared reducing in the 1990s with the launch of Ms Window Operating System. It is a single user operating single tasking and command operating system. 3. Microsoft Windows: Developed by Microsoft to overcome the limitation of its own Dos operating system was initially developed as a graphical user interface for Dos not as an operating system. The first success version of this operating System was Windows 3.00 released in1990. Other versions were Windows 95, 98, 2000, XP, Millennium, NT, and Vista. Windows is a single- user- multi- tasking operating system. Progress is represented by icons which provide the user with ease of manipulating of file and programs i.e. clicking, double – clicking, drag, drop, etc. 4. LINUX An open –source operating system enhanced and backed by thousands of programmers worldwide. Its multitasking operating systems which was originally designed for Pcs. The Linux is derived from its inventor called Linus Torvalds. He was a student at the University of Helsinki, Finland in the early 1990s when he wrote the first version of Linux as a toy project. He later posted the code on the internet and asked programmers to help him build it into a working system. The result was Linux. Torvalds holds the copyright but permits free distribution of the source code. He oversees the development of the Kernel and its own trademark. When someone submits a change or a feature, torvalds and his core team of kernel developers review the merit of adding it to the source code Ways of acquiring computer software An organization can develop proprietary software that is unique, customized programs for a specific application area and on the other hand a company can purchase and use an existing software package (off-the – shelf software). Customized/proprietary software Programmers determine the type of software to be developed according to users specific problems/ needs. The software can be developed by an in-house development team or by a contracted software company but based on the specific user needs. Advantages i) You can get exactly what you need in terms of reports, features e.t.c ii) Being involved in development offers a further level in control over results iii) There’s more flexibility in making modifications that may be required due to changes in technology or environment. iv) You don’t pay for features which you won’t use v) The user get in-house’s a competitive advantage Disadvantages i) The cost of developing the software is high/expensive ii) It takes more time to develop iii) It is vulnerable or prone to errors because it has not been thoroughly tested Off –the –shelf software They are readily available across the shops or from software vendors. Advantages i) They are cheap because development and maintenance costs are shared among many customers ii) They take less time to develop iii) A user can start using the software almost immediately he purchases it iv) Possibility of errors is low because it has been properly tested i) ii) Disadvantages The user pays for features he/ she may never use It does not solve all user problems 9 iii) iv) It is difficult to make alterations and modifications A user may be locked/forced to using the products of a particular supplier/manufacturer especially upgrades COMPUTER HARDWARE These are the physical or tangible components of a computer system. They perform five functions including; input, output, storage, processing and communication. INPUT DEVICES Input is any data or instructions you enter into the memory of a computer. Once input is in memory, the CPU can access it and process the input into output. Four types of input are data, programs, commands, and user responses: An input device is any hardware component that allows you to enter data, programs, commands, and user responses into a computer. Input devices include the keyboard, pointing devices, scanners and reading devices, digital cameras, audio and video input devices, and input devices for physically challenged users THE KEYBOARD You enter data into a computer by pressing the keys on the keyboard. Desktop computer keyboards usually have from 101 to 105 keys, while keyboards for smaller computers such as laptops contain fewer keys. A computer keyboard includes keys that allow you to type letters of the alphabet, numbers, spaces, punctuation marks, and other symbols such as the dollar sign ($) and asterisk (*). A keyboard also contains special keys that allow you to enter data and instructions into the computer. Function keys are special keys programmed to issue commands and accomplish certain tasks. Keyboards also contain keys that can be used to position the insertion point on the screen. The insertion point is a symbol that indicates where on the screen the next character you type will display .Many of the newer keyboards include buttons that allow you to access your CD/DVD drive and adjust speaker volume. POINTING DEVICES A pointing device is an input device that allows you to control a pointer on the screen. In a graphical user interface, a pointer is a small symbol on the display screen. A pointer often takes the shape of a block arrow, an I-beam (T) or a pointing hand. Using a pointing device, you can position the pointer to move or select items on the screen. For example, you can use a pointing device to move the insertion point; select text, graphics, and other objects; and click buttons, icons, links, and menu commands. Common pointing devices include the mouse, trackball, touchpad, pointing stick, joystick, touch screen, light pen, and graphics tablet. Trackball Some users opt for alternative pointing devices other than a mouse, such as a trackball. Whereas a mechanical mouse has a ball mechanism on the bottom, a trackball is a stationary pointing device with a ball mechanism on its top. Touchpad A touchpad or trackpad is a small, flat, rectangular pointing device that is sensitive to pressure and motion. To move the pointer using a touchpad, you slide your fingertip across the surface of the pad. Some touchpads have one or more buttons around the edge of the pad that work like mouse buttons; on others, you tap the pad’s surface to simulate mouse operations such as clicking. Stick A pointing stick is a pressure-sensitive pointing device shaped like a pencil eraser that was first developed by IBM for its laptop computers. Because of its small size, the pointing stick is positioned between keys on the keyboard. To move the pointer using a pointing stick, you push the pointing stick with your finger. The pointer on the screen moves in the direction that you push the pointing stick. Joystick Users running game software such as a driving or flight simulator may prefer to use a joystick as their pointing device. A joystick is a vertical lever mounted on a base. You move the lever in different directions to control the actions of a vehicle or player. The lever usually includes buttons called triggers that you can press to activate certain events. Some joysticks also have additional buttons that you can set to perform other actions. Touch Screen 10 A monitor that has a touch-sensitive panel on the screen is called a touch screen. You interact with the computer by touching areas of the screen with your finger, which acts as an input device. Because they require a lot of arm movements, touch screens are not used to enter large amounts of data. Instead you touch words, pictures, numbers, or locations identified on the screen. Pen Input Many input devices use an electronic pen instead of a keyboard or mouse for input. Some of these devices require you to point to onscreen objects with the pen; others allow you to input data using drawings, handwriting, and other symbols that are written with the pen on a surface. LIGHT PEN A light pen is a handheld input device that contains a light source or can detect light. Some light pens require a specially designed monitor, while others work with a standard monitor. Instead of touching the screen with your finger to interact with the computer, you press the light pen against the surface of the screen or point the light pen at the screen and then press a button on the pen. Light pens are used in applications where desktop space is limited such as in the health-care field or when a wide variety of people use the application, such as electronic voting. GRAPHICS TABLET A graphics tablet, also called a digitizer or digitizing tablet, consists of a flat, rectangular, electronic plastic board used to input drawings, sketches, or other graphical data. Each location on the graphics tablet corresponds to a specific location on the screen. When you draw on the tablet with either an electronic pen or a puck, the tablet detects and converts the movements into digital signals that are sent into the computer. SCANNERS AND READING DEVICES These devices capture data from a source document, which is the original form of the data. When using a keyboard or pointing device to enter data, the source document might be a timecard, order blank, invoice, or any other document that contains data to be processed. Devices that capture data directly from source documents include optical scanners, optical character recognition devices, optical mark recognition devices, bar code scanners, and magnetic-ink character recognition readers. Examples of source documents used with these devices include advertisements, brochures, photographs, inventory tags Optical Scanner An optical scanner, usually simply called a scanner, is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can use. The density of the dots, known as the resolution, determines sharpness and clearness of the resulting image. Resolution typically is measured in dots per inch (dpi), and is stated as the number of columns and rows of dots OPTICAL CHARACTER RECOGNITION Optical character recognition (OCR) is a technology that involves reading typewritten, computer-printed, or handwritten characters from-ordinary documents and translating the images into a form that the computer can understand. Most OCR devices include a small optical scanner for reading characters and sophisticated software for analyzing what is read. Optical Mark Recognition (OMR) Optical mark recognition (OMR) devices read hand-drawn marks such as small circles or rectangles. A person places these marks on a form, such as test, survey, or questionnaire answer sheet Bar Code Scanners A bar code scanner uses leaser beams to read bar codes (Figure 3-4). A bar code scanner is an identification code that consists of a set of vertical lines and spaces of different widths. The bar code, which represents some data that identifies the item, is printed on a product’s package or on a label that is affixed to a product so it can be read by a bar code scanner. The bar code scanner uses light patterns form the bar code lines to identify the item. Magnetic Ink Character Recognition Reader A Magnetic-ink character recognition (MICR) reader is used to read text printed with magnetized ink. MICR is used almost exclusively by the banking industry for check processing. Each check in your checkbook has precoded MICR characters on the lower-left edge; these characters represent the bank number, your account number, and the check number. DIGITAL CAMERAS 11 A digital camera allows you to take pictures and store the photographed images digitally instead of on traditional film. With some digital cameras, you download, or transfer a copy of, the stored pictures to your computer by connecting a cable between the digital camera and your computer and using special software included with the camera. With other digital cameras, the pictures are stored directly on storage media such as a floppy disk, PC Card, or flash card Audio Input Audio input is the process of entering (recording) music, speech, or sound effects. To record high quality sound, your personal computer must have a sound card. (Most new computers today come equipped with a sound card.) Sound is entered via a device such as a microphone, tape player, or audio CD player, each of which plugs into a port on the sound card. External MIDI devices such as an electric piano keyboard also can connect to the sound card for audio input. Speech Recognition Another use for a microphone is speech recognition. Speech recognition, also called voice recognition, is the computer’s capability of distinguishing spoken words. Speech recognition programs do not understand speech; they only recognize a vocabulary of certain words. The vocabulary of speech recognition programs can range from two words (such as Yes and No) to more than sixty thousand words. Video Input Video input or video capture is the process of entering a full-motion recording into a computer and storing the video on a hard disk or some other medium. To capture video, you plug a video camera, VCR, or other video device into a video capture card, which is an expansion card that converts the analog video signal into a digital signal that a computer can understand. (Most new computers are not equipped with a video capture card.) Once the video device is connected to the video capture card, you can begin recording. After you save the video on a hard disk, you can play it or edit it using video-editing software. Videoconferencing A videoconference is a meeting between two or more geographically separated individuals who use a network or the Internet to transmit audio and video data. To participate in a videoconference, you must have a microphone, speakers, and a video camera mounted on your computer. As you speak, members of the meeting hear your voice on their speakers. Any image in front of the video camera, such as a person’s face, displays in a window on each participant’s screen. OUTPUT DEVICES WHAT IS OUTPUT? Output is data that has been processed into a useful form called information. That is, a computer processes input into output. Computers generate several types of output, depending on the hardware and software being used and the requirements of the user. You may choose to display or view this output on a monitor, print it on a printer, or listen to it through speakers or a headset. Four common types of output are text, graphics, audio, and video. An output device is any computer component capable of conveying information to a user. Commonly used output devices include display devices, printers, speakers, headsets, data projectors, facsimile machines, and multifunction devices 1. PRINTERS A printer is an output device that produces text and graphics on a physical medium such as paper or transparency film. Printed information is called hard copy because the information exists physically and is a more permanent form of output than that presented on a display device (soft copy).Hard copy, also called a printout, can be printed in portrait or landscape orientation. Generally, printers can be grouped into two categories: impact and no impact. Printers in each of these categories are discussed in the following sections. i) Impact Printers An impact printer forms characters and graphics on a piece of paper by striking a mechanism against an ink ribbon that physically contacts the paper. Because of the striking activity, impact printers generally are noisy. Many impact printers do not provide letter quality print. Impact printers also are ideal for printing multipart forms because they easily can print through many layers of 12 paper. Finally, impact printers are used in many factories and at retail counters because they can withstand dusty environments, vibrations, and extreme temperatures. Two commonly used types of impact printers are dot-matrix printers and line printers. Each of these printers is discussed in the following sections. Dot-matrix printers A dot-matrix printer is an impact printer that produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon. When the ribbon presses against the paper, it creates dots that form characters and graphics. Most dot-matrix printers use continuous-form paper, in which each sheet of paper is connected together. The pages generally have holes punched along two opposite sides so the paper can be fed through the printer Line Printer A line printer is a high-speed impact printer that prints an entire line at a time. The speed of a line printer is measured by the number of lines per minute (1pm) it can print. Capable of printing up to 3,000 lines per minute (1pm), these printers often are used with mainframes, minicomputers, or with a network in applications such as manufacturing, distribution, or shipping. ii) Non impact Printers A non impact printer forms characters and graphics on a piece of paper without actually striking the paper. Some spray ink, while others use heat and pressure to create images. Because these printers do not strike the paper, they are much quieter than the previously discussed impact printers. Three commonly used types of non impact printers are ink-jet printers, laser printers, and thermal printers. Each of these printers is discussed in the following sections. Inkjet printers An ink-jet printer is a type of non impact printer that forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper. Ink-jet printers usually use individual sheets of paper stored in a removable or stationary tray. These printers can produce letter-quality text and graphics in both black-and-white and color on various materials such as envelopes, labels. Laser printers A laser printer is a high-speed, high-quality no impact printer. Laser printers for personal computers usually use individual sheets of paper stored in a removable tray that slides into the printer case. Some laser printers have trays that can accommodate different sizes of paper, while others require separate trays for letter- and legal-sized paper. Most laser printers have a manual feed slot where you can insert individual sheets and envelopes. You also can print transparencies on a laser printer. Laser printers can print text and graphics in very high quality resolutions, ranging from 600 dpi to 1,200 dpi. While laser printers typically cost more than ink-jet printers, they also are much faster, printing text at speeds of four to thirty pages per minute. Thermal printers A thermal printer generates images by pushing electrically heated pins against heat-sensitive paper. Standard thermal printers are inexpensive, but the print quality is low and the images tend to fade over time. Thermal printers are, however, ideal for use in small devices such as adding machines. iii) Portable Printers A portable printer is a small, lightweight printer that allows a mobile user to print from a laptop or handheld computer while travelling. Barely wider than the paper on which they print, portable printers easily can fit in a briefcase alongside a laptop computer. iv)Plotters and Large-Format Printers Plotters and large-format printers are sophisticated printers used to produce high-quality drawings such as blueprints, maps, circuit diagrams, and signs. Because blueprints, maps, and other such drawings can be quite large, these printers typically can handle paper with widths up to 60 inches. Some plotters and largeformat printers use individual sheets of paper, while others take large rolls. These printers are used in specialized fields such as engineering, drafting, and graphic art and usually are very costly. Two basic types of plotters are pen plotters and electrostatic plotters. A pen plotter uses one or more color pen light beams, or a scribing device to draw on paper or transparencies. Pen plotters differ from other printers in that they produce continuous lines, whereas most printers generate lines by printing a closely spaced series of dots. 13 An electrostatic plotter uses a row of charged wires (called styli) to draw an electrostatic pattern on specially coated paper and then fuses toner to the pattern. The printed image is composed of a series of very small dots, which provide high-quality output. 2. DISPLAY DEVICES A display device is an output device that visually conveys text, graphics, and video information. Information shown on a display device often is called soft copy, because the information exists electronically and is displayed for a temporary period of time. CRT Monitors A CRT monitor, or monitor, is a display device that consists of a screen housed in a plastic or metal case. A color monitor displays text, graphics, and video information in color. Monitors that display only one color are considered monochrome. A monochrome monitor displays text, graphics, and video information in one color (usually white, amber, or green) on a black background Monochrome monitors are less expensive than color monitors. Most monitors are referred to by their viewable size, which is the diagonal measurement of the cathode ray tube inside the monitor and is larger than the actual viewing area provided by the monitor. LCD displays LCD displays commonly are used in laptop computers, handheld computers, digital watches,’ and calculators because they are thinner and more lightweight than CRT monitors. Gas Plasma Monitors For even larger displays, some large business or power users prefer gas plasma monitors, which can measure more than 42 inches and hang directly on a wall MONITOR QUALITY The quality of a monitor’s display depends largely on its resolution, dot pitch, and refresh rate. The resolution, or sharpness and clarity, of a monitor is related directly to the number of pixels it can display. Resolution is expressed as two separate numbers: the number of columns of pixels and the number of rows of pixels a monitor can display. A monitor with a higher resolution displays a greater number of pixels, which provides a smoother image. Another factor that determines monitor quality is dot pitch, which is a measure of image clarity. The dot pitch is the vertical distance between each pixel on a monitor. The smaller the distance between the pixels, the sharper the displayed image. Text created with a smaller dot pitch is easier to read. To minimize eye fatigue, you should use a monitor with a dot pitch of .28 millimeters or smaller. 3. AUDIO OUTPUT (speakers, headsets) Audio is music, speech, or any other sound. Audio output devices are the components of a computer that produce music, speech, or other sounds, such as beeps. Two commonly used audio output devices are speakers and headsets To boost the low bass sounds, you can add a woofer (also called a subwoofer). The stereo speakers and woofer are connected to ports on the sound card. Most speakers have tone and volume controls so you can adjust these settings. 4. DATA PROJECTORS A data projector takes the image that displays on a computer screen and projects it onto a screen so that an audience of people can see the image clearly. Data projectors can be large devices attached to a ceiling or wall in an auditorium, or they can be small portable devices Two types of smaller, lower-cost units are LCD projectors and DLP projectors. LCD projector An LCD projector, which uses liquid crystal display technology, attaches directly to a computer and uses its own light source to display the information shown on the computer screen. Because LCD projectors tend to produce lower-quality images, some users prefer to use a DLP projector for sharper, brighter images. A digital light processing (DLP) projector uses tiny mirrors to reflect light, producing crisp, bright, colorful images that remain in focus and can be seen clearly even in a well-lit room. 5. FACSIMILE (FAX) MACHINE A facsimile (fax) machine is a device that transmits and receives documents over telephone lines. The documents can contain text, drawings, or photographs, or can be handwritten. When sent or received via a fax 14 machine, these documents are known as faxes. A stand-alone fax machine scans the original document, converts the image into digitized data, and transmits the digitized image. A fax machine at the receiving end reads the incoming data, converts the digitized data into an image, and prints or stores a copy of the original image. Fax capability also can be added to your computer using a fax modem. A fax modem is a communications device that allows you to send (and sometimes receive) electronic documents as faxes. A fax modem transmits computer-prepared documents, such as a word processing letter, or documents that have been digitized with a scanner or digital camera. A fax modem is like a regular modem except that it is designed to transmit documents to a fax machine or to another fax modem. 6. VIDEO CARDS To display color, a color monitor works in combination with a video card, which is included with today’s personal computers. A video card, also called a graphics card or video adapter, converts digital output into an analog video signal that is sent through a cable to the monitor. The monitor separates the video signal into red, green, and blue signals. Electron guns then fire the three color signals to the front of the monitor. These three dots - one red, one green, and one blue are combined to make up each single pixel. The number of colors that a video card can display is determined by the number of bits it uses to store information about each pixel THE COMPONENTS IN THE SYSTEM UNIT 1. System Unit (CPU) Arithmetic Logic Unit (ALU) Performs basic arithmetic calculations And logical comparisons CONTROL UNIT (CU) selects and interprets program ins tructions and then sees that they are executed REGISTERS Used to hold information on a temporary basis MAIN MEMORY RAM and ROM SECONDARY STORAGE DEVICES Floppy disk Compact disk Hard disk The system unit is a box-like case housing the electronic components of a computer that are used to process data. System unit components include the processor, memory module, expansion cards, and ports and connectors. Many components reside on a circuit board called the motherboard or system board. The motherboard contains different types of chips, or small pieces of semi conducting material on which one or more integrated circuits (IC) are etched. One of the more important chips is the central processing unit. 2. The Central Processing Unit The system unit, sometimes referred to as the processor, interprets and carries out the basic instructions that operate a computer. That is, most of the devices connected to the computer communicate with the CPU in 15 order to carry out a task. The CPU contains the control unit and the arithmetic/logic unit. The Control Unit The control unit, one component of the CPU, directs and coordinates most of the operations in the computer. For every instruction, the control unit repeats a set of four basic operations called the machine cycle (1) fetching the instruction or data item from memory, (2) decoding the instruction into commands the computer understands, (3) executing the commands, and, if necessary, (4) storing, or writing, the result to memory. Arithmetic/Logic unit The arithmetic/logic unit, another component of the CPU, performs the arithmetic, comparison, and logical operations. Arithmetic operations include addition, subtraction, multiplication, and division. Comparison operations involve comparing one data item to another to determine if the first item is greater than, equal to, or less than the other item. Logical operations work with conditions and logical operators such as AND, OR, and NOT Registers The CPU uses temporary storage locations called registers, to hold data and instructions. The function include storing location of where instruction was fetched storing an instruction while it is being decoded, storing data while the ALU processes it, and storing the results of a calculation. 4. Memory In the system unit, a computer’s memory stores data, instructions, and information. Memory stores three basic items: The operating system and other system software that control the usage of the computer equipment; Application programs designed to carry out a specific task such as word processing; and The data being processed by application programs. RAM RAM (random access memory) is a memory chip that the processor can read from and write to. RAM is volatile memory, meaning that its contents are lost when the computer’s power is turned off. Multiple programs can be loaded into RAM simultaneously, provided you have enough RAM to accommodate all the programs. The program with which you are working currently displays on the screen. Basic types of RAM include dynamic RAM and static RAM, RDRAM (Rambus DRAM), Synchronous DRAM (SDRAM) ROM ROM (read-only memory) is a memory chip that only can be read and used; that is, it cannot be modified. ROM is non-volatile memory, meaning that its contents are not lost when the computer’s power is turned off. Commonly used for storing of program instructions that are not subjected to change. Generally provided by manufacturer. ROM chips that contain permanently written data, instruction, or information are called firmware. Another type of ROM chip, called programmable read only memory (PROM) clip, is a blank ROM chip on which you can permanently place items. The instructions used to program a PROM chip are called micro-code. Once the micro-code is programmed into the PROM chip, it functions like a regular ROM chip and cannot be erased or changed. Flash memory Another type of non-volatile memory is called flash memory or flash ROM. Unlike a PROM clip that can be programmed only once, flash memory can be erased electronically and reprogrammed. Flash memory is used to store programs on personal computers, as well as cellular telephones, printers, digital cameras, pagers, and personal digital assistant. Flash memory is available in sizes ranging from 1 to 40 MB. CMOS Another of memory clip in the memory unit is complementary metal-oxide semiconductor (CMOS). CMOS memory is non-volatile memory used to store configuration information about the computer, such as the type of disk drives, keyboard, and monitor; the current date and time; and other start-up information needed when the computer is turned off. CMOS use battery power to retain information even when the power to the computer is turn off. Battery-backed CMOS memory thus keeps the calendar, date, and time current even when the computer power is off. Unlike ROM, information stored in CMOS memory can be changed, 16 such as when you change from standard time to daylight saving time Expansion Slots and Expansion Boards An expansion slot is an opening, or socket, where a circuit board can be inserted into the motherboard. These circuit boards, sometimes referred to as expansion boards or expansion cards, add new devices or capabilities to the computer, such as a modem or more memory. Plug and Play refers to a computer’s capability to automatically configure expansion boards and other devices as they are installed. Port A cable often attaches external devices to the system unit. The interface or point of attachment, to the system unit is called a port. Ports have different types of connectors used to join a cable to a device. i)Serial Port A serial port is one types of interface used to connect a devices to the system unit. Because a serial port transmits only one bit of data at a time, it usually is used to connect devices that do not require fast data transmission rates, such as a mouse, keyboard, or modem ii) Parallel Port Unlike serial port, a parallel port is an interface used to connect devices that are capable of transferring more than one bit at a time. Parallel ports originally were developed as an alternative to the slower speed serial ports. Many printers connect to the system unit using a parallel port with a 25-pin female connector. This parallel port can transfer eight bits of data simultaneously through eight separate lines in a single cable Types of Processors CISC Processors (Complex instruction set computing) One of the earlier goals of CPU designers was to provide more and more instructions in the instruction set of the CPU, to ensure it directly supports more features making it easier to translate high level language programs to machine language and to ensure machine language programs run more effectively. However every additional instruction in the instructions set of the CPU requires the necessary hardware circuitry to handle such instructions, adding more complexity to CPU’s hardware circuitry. Another goal of CPU designers was to optimize the usage of expensive memory, to achieve this they tried to pack more instructions in the memory by introducing the concept of variable length instructions. CISC processors possess many processing features whereby making the job of machine programmers easier. They are complex and expensive to produce. RISC Processors (Reduced instruction set computing) In early 1980 some CPU designers discovered that several of the instructions supported by CISC CPU’s are rarely used hence came out with an idea that the complexity of the CPU design can be greatly reduced by implementing only a bare minimum basic set of instructions plus some of the more frequently used instructions in the hardware circuitry of the CPU. Other complex instruction did not need to be supported in the instruction set in the CPU because they can always be implemented in software by using the basic set of instructions. The designers came up with the idea of making all instructions of uniform length so that the decoding and execution of all instructions becomes simple and fast. This design resulted in producing a faster and less expensive processor. They have a small instruction set thereby placing extra demand on programmers who must consider how to implement complex computations by combining simple instructions. Due to a simple design RISC processors are faster for most applications, less complex and less expensive to produce than CISC processors. MEMORY (STORAGE DEVICES) While performing a processing operation, the CPU needs a place to temporarily hold instructions to be executed and data to be used with those instructions. Memory, which is composed of one or more chips on the motherboard, holds data and instructions while they are being processed by the CPU. The two basic types of memory are volatile and non-volatile. The contents of volatile memory, such as RAM, are lost (erased) when the power to the computer is turned off. The contents of non-volatile memory, however, are not lost when power is removed from the computer. For example, once instructions have been 17 recorded onto a non-volatile ROM chip, they usually cannot be erased or changed, and the contents of the chip are not erased when power is turned off. SECONDARY STORAGE Storage, also called secondary storage, auxiliary storage, or mass storage, holds items such as data, instructions, and information for future use. Think of storage a filing cabinet used to hold file folders, and memory as the top of your desk. When you need to work with a file, you remove it from the filing cabinet (storage) and place it on your desk (memory). When you are finished with the file, you return it to the filing cabinet (storage). Storage is non-volatile, which means that items in storage are retained even when power is removed from the computer. A storage medium (media is the plural) is the physical material on which items are kept. One commonly used storage medium is a disk, which is a round, flat piece of plastic or metal with a magnetic coating on which items can be written. A storage device is the mechanism used to record and retrieve items to and from a storage medium. The speed of a storage device is defined by its access time, which is the minimum time it takes the device to locate a single item on a disk. Compared to memory, storage devices are slow. The size, or capacity, of a storage device, is measured by the number of bytes (characters) 1. FLOPPY DISKS A floppy disk, or diskette, is a portable, inexpensive storage medium that consists of a thin, circular, flexible plastic disk with a magnetic coating enclosed in a square-shaped plastic shell. When discussing a storage medium, the term portable means you can remove the medium from one computer and carry it to another computer. A floppy disk drive is a device that can read from and write to a floppy disk. 2. HARD DISKS When personal computers were introduced, software programs and their related files required small amounts of storage and fit easily on floppy disks. As software became more complex and included graphical user interfaces and multimedia, file sizes and storage requirements increased. Today, hard disks - which provide far larger storage capacities and much faster access times than floppy disks - are one of the primary media for storing software programs and files. Current personal computer hard disks can store from 4 GB and above of data, instructions, and information. A hard disk usually consists of several inflexible, circular disks, called platters, on which items are stored electronically. 3. COMPACT DISCS A compact disc (CD) is a flat, round, portable, metal storage medium that usually is 4.75 inches in diameter and less than one-twentieth of an inch thick (Figure 5-8). Compact disks store items such as data, instructions, and information by using microscopic pits (indentations) and land (flat areas) that are in the middle layer of the disc. CD-ROMs CD-ROM (pronounced SEE-DEE-Rom, is an abbreviation for compact disc read-only memory) The contents of standard CD-ROMs are written, or recorded, by the manufacturer and only can be read and used. That is, they cannot be erased or modified- hence, the name read-only. A CD-ROM can hold up to 700 MB of data, instructions, and information, or about 450 times that which can be stored on a high-density 3.5-inch floppy disk. CD-R (compact disc-recordable) Is a technology that allows you to write on a compact disc only once using your own computers? Once you have recorded the CD-R, you can read from it as many times as you wish. CD-RW (compact disc-rewriteable) Is an erasable disc that you can write on multiple times CD-RW overcomes one of the disadvantages of CDR disks - that you can write on them only once. DVD-ROMs A DVD-ROM (digital video disc-ROM) is an extremely high capacity compact disc capable of storing from 4.7 GB to 17 GB - more than enough to hold a telephone book containing every resident in the United States. Not only is the storage capacity of a DVD-ROM greater than a CD-ROM, a DVD-ROM’s quality also far surpasses that of a CD-ROM. 18 4. MAGNETIC TAPES One of the first storage media used with mainframe computers was magnetic tape, a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. Tape storage requires sequential access, which refers to reading or writing data consecutively. Like a music tape, you must forward or rewind the tape to a specific point to access a specific piece of data. 5. PC CARDS A PC Card is a thin, credit card-sized device that fits into a PC Card expansion slot on a laptop or other personal computer. Different types and sizes of PC Cards are used to add storage, additional memory, communications, and sound capabilities to a computer. 6. Picture card or compact flash card Some digital cameras also use a matchbook-size card, sometimes called a picture card or compact flash card, to store pictures, which are then transferred to a computer by inserting the card into a card reader or slot. These compact flash cards have storage capacities ranging from 2 MB to 256 MB. 7. Smart Cards A smart card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card. An intelligent smart card contains a CPU and has input, process, output, and storage capabilities. In contrast, a memory card has only storage capabilities. When the smart card is inserted into a specialized card reader, the information on the smart card is read and, if necessary, updated. 8. Microfilm and Microfiche Microfilm and microfiche are used to store microscopic images of documents on roll or sheet film. Microfiche uses a small sheet of film, usually about four inches by six inches. The images are recorded onto the film using a device called a computer output microfilm (COM) recorder. The stored images are so small they can be read only with a microfilm or microfiche reader. Applications of microfilm and microfiche are widespread. Libraries use these media to store back issues of newspapers, magazines, and genealogy records. Large organizations use microfilm and microfiche to archive inactive files. Banks, for example, use it to store transactions and cancelled checks, and the U.S. Army uses it to store personnel records. Using microfilm and microfiche provides a number of advantages: it greatly reduces the amount of paper firms must handle; it is inexpensive; and it has the longest life of any storage medium. Relationship among the hardware, system software, application software and users of a computer system HARDWARE (Physical devices/ components of the computer system) SYSTEM SOFTWARE (Software that constitute the operating and programming Environment of the computer system) APPLICATION SOFTWARE (Software that do a specific task or solve a specific problem) USERS (Normally interact with the system via the user Interface provided by the application software 19 COMMUNICATIONS When referring to computers, communications describes a process in which one computer transfers data, instructions, and information to another computer(s). Communications requires: a device that initiates the transfer (a sending device); a communications device (such as a modem) that converts the sent material into signals capable of being carried by a communications channel; a communications channel over which the signals are sent; a communications device that receives the signals and converts them into a form understood by the receiving device; and a device that accepts the sent material (a receiving device). COMMUNICATIONS CHANNELS An important aspect of communications is the channel, which is the communications path between two devices. A communications channel is composed of one or more transmission media. Transmission media consists of materials or techniques capable of carrying one or more signals. TRANSMISSION MEDIA Transmission media are one of two types: physical or wireless. Physical transmission media use wire, cable, and other tangible (touchable) materials to send communications signals; wireless transmission media send communications signals through the air or space using radio, Microwave, and infrared signals. 1. Physical transmission media used in communications include twisted-pair cable, coaxial cable, and fibreoptic cable. These cables typically are used within buildings or underground. 2. wireless transmission media Wireless transmission media used in communications include broadcast radio, cellular radio, microwaves, communications satellites, and infrared. Wireless transmission media are used when it is impractical or impossible to install cables. Many wireless devices that access the Internet now use the WAP (Wireless Application protocol), which is a standard set of communications specifications that help to ensure successful communications. TRANSMISSION CHARACTERISTICS Any transmissions sent during communications can be categorized by a number of characteristics including the signal type, transmission mode, transmission direction, and transmission rate. Signal Type: Analog or Digital Depending on the devices and media involved, that signal is either analog or digital. Telephone equipment originally was designed to carry only voice transmission in the form of an analog signal, which consists of a continuous electrical wave. Computers, however, process data as digital signals, which are individual electrical pulses that represent the bits grouped together into bytes. For telephone lines to carry digital signals, a special piece of equipment called a modem converts between. Digital signals (0s and Is) and analog signals. Categories of channels Broadband vs. Baseband You have learned that several different types if communications media exist, including both physical (twistedpair cable, coaxial cable, fibre-optic cable) and wireless (broadcast radio, cellular radio, microwave, satellite, infrared). Some types of these media can transmit only one signal at a time, called base-band transmission, while others can transmit multiple signals simultaneously, called broad-band transmission. Media that use broadband transmission transmit signals it a much faster speed than those that use baseband transmission. Satellite is an example of a media that uses broadband transmission. Two other widespread applications of broadband transmission are digital subscriber lines (DSL) and cable television networks. Transmission Direction: Simplex, Half-Duplex, and Full-Duplex The direction in which data flows along transmission media is classified in one of three types: simplex, halfduplex, or full-duplex (Figure 6-7). Simplex transmission, 20 Data flows only in one direction - from the sending device to the receiving device. Simplex transmission is used only when the sending device does not require a response from the receiving device. Security systems and fire alarms that contain a sensor, for example, use simplex transmission. Half-duplex transmission In half-duplex transmission, data can flow in either direction - from sender to receiver and back - but only in one direction at a time. Citizens band (CB) radio, for example, uses half-duplex transmission; you can talk or listen, but you cannot do both at the same time. Many fax machines, credit card verification systems, and automatic teller machines also use half-duplex transmission. Full-duplex transmission In full-duplex transmission, data can flow in both directions at the same time. A regular telephone line, for example, supports full-duplex transmission, meaning both parties can talk at the same time. Full-duplex transmission is used for applications with intensive computing requirements or those with heavy traffic. Transfer Rates The speed with which a transmission medium carries data is its transfer rate. Transfer rate usually is expressed as bits per second (bps) - that is, the number of bits that can be transmitted in one second. Today's transmission media transmit data at rates ranging from millions of bits per second (Mbps) to billions of bits per second (Gbps). Communications software For two computers to communicate, they must have compatible communications software. Some communications devices are pre- programmed to accomplish communications tasks. Other communications devices require a separate communications software program to ensure proper transmission of data. Communications software helps you establish a connection to another computer and manage the transmission of data between computers; it resides in the main memory of the sending and receiving computers while the connection is established. To help you establish a connection to another computer, communications software uses wizards, dialog boxes, and other onscreen messages to prompt you for information and automate tasks where possible. Communications software usually includes one or more of the following features: dialing, file transfer, terminal emulation, and Internet access. The Internet access feature allows you to use the computer to connect to the Internet to send entail, participate in chat rooms, visit World Wide Web sites, and so on. When you purchase a modem, it usually includes a basic communications software package so you can connect to other computers, such as ones used for a bulletin board system. When you subscribe to an online service or Internet service provider, the provider typically sends you a separate communications software package, which you must use to connect to their computers so you can access the Internet, send e-mail, and use their other services. Communications devices A communications device is any type of hardware capable of transmitting data, instructions, and information between a sending device (sender) and a receiving device (receiver). At the sending end, a communications device converts the data, instructions, or information from the sender into signals understood by the 21 transmission media on the communications channel. At the receiving end, the communications device receives the signals from the communications channel and converts the signals into a form understood by the receiver. Recall that sending and receiving devices include a variety of types of hardware such as handheld computers, laptop computers, desktop computers, minicomputers, mainframes, digital cameras, and fax machines. The type of communications device used in a communications system depends on the type of sending and/or receiving devices, as well as the type of transmission media. Some of the more common types of communications devices are modems, cable modems, multiplexers, and network interface cards. Today, thousands of computer networks exist, ranging from small networks operated by home users to global networks operated by numerous telecommunications firms. To interconnect the many types of networks that exist, various types of communications devices are used, including hubs, repeaters, bridges, gateways, and routers. NETWORKS A network is a collection of computers and devices connected by communications channels that allows users to share data, information, hardware, and software with other users. Individuals and organizations connect computers in a network for a variety of reasons, including the ability to share hardware, data and information, and software; and to facilitate communications. Networks reduce costs and increase efficiency and allowing sharing of programs, data and peripheral devices. Local Area Network (LAN) A local area network (LAN) is a network that connects computers in a limited geographical area, such as a school computer laboratory, office, or group of buildings. Two popular types of LANs are peer-to-peer networks and client/server networks.A LAN is made of two or more computers connected to each other within the same geographical area but not necessarily within the same building. Metropolitan Area Network (MAN) A MAN is a network of computers spread over a metropolitan area such as a city and its suburbs. This city bridges its LANs with a series of backbones, making one large network for the entire city. The MAN may be operated by one organisation or be shared resources used by several organisations in the same city. Wide Area Network (WAN) A wide area network (WAN) is a network that covers a large geographical area (such as a city or country) using a communications channel that combines telephone lines, microwave, satellites, or other transmission media. Network Topologies The configuration, or physical arrangement, of the device in a communications network is called network topology or network architecture. Three commonly used network topologies are bus, ring, and star. Network also combinations of these topologies. Bus Network A node must be intelligent enough to listen to the bus and recognise own addresses in order to receive incoming data Ring Network Intelligent central controller. Each node has an equal amount of intelligence Star Network All nodes are joined at a single central point using one link for each node. Has central node, employs switching techniques to interconnect the outlying stations. Affects the functionality of network if central host is not operating Disadvantages of networks Networks are expensive to set up Security problems 22 PROTOCOLS A protocol is a set of rules and procedures for exchanging information among computers. Using the same protocols, different types and makes of computers can communicate with each other. Ethernet Ethernet is a LAN protocol that allows personal computers to contend for access to a network. Token Ring A token ring protocol controls access to a network by requiring that a special signal called a token is shared or passed among network devices. TCP/IP TCP/IP (Transmission control protocol/Internet protocol) is a set of protocols used to manage data transmission by breaking it up into packets. File transfer protocol (FTP) A set of rules used to govern the sending and receiving of files on the internet. Telnet One of the ways that a person can access a remote computer over a network such as the internet. It’s often used by network administrators to remotely control and/or troubleshoot the operation of a web server. Telnet programs act as if your computer is a terminal that is connected to the remote computer. Intranets Intranets are internal networks that use Internet and Web technologies. Intranets make company information accessible to employees and facilitate working in groups. Extranet An extranet is an intranet that extends to authorized users outside the company. Extranets facilitate communications among a company’s customers or suppliers. Videoconferencing involves using video and computer technology to conduct a meeting between participants at two or more geographically separate locations. INTERNET The word internet is derived from two words: interconnection and networks. The Internet, a worldwide collection of networks, offers the World Wide Web and such popular Web-based activities as ecommerce and Internet telephony. The internet, the world’s biggest network, is actually a collection of smaller networks located all over the world. It can be used foe a variety of purposes, such as checking e-mail, chatting, downloading files searching for information, listening to music e.t.c in order to gain access to the vast resources found on the internet you must first become part of one of the networks which it comprises. The networks of large companies and universities are directly connected to the internet, so if you are part of one of these networks and you have appropriate network privileges, you can access the internet. The average person however, gains access through a local internet service provider (ISP). An ISP is a company with a direct connection to the internet that grants subscribers access to the various internet services. World Wide Web It is basically a collection of text and multimedia documents called web pages, some of which are linked. A web page is an electronic document written in a computer language called HTML. Web pages are usually encoded in a special language called hypertext Mark-up language (HTML) that allows one web page to provide links to several others. A group of related web pages on the same web server is known as a website. Each web page and website has an address called a uniform resource locator (URL). Web pages are viewed using special software called web browsers e.g. internet explorer, Netscape or opera. The transmission of web pages is governed by a protocol known as Hypertext transfer protocol (HTTP). E-mail E-mail (electronic mail) is the exchange of text messages and computer files via a communications network. Each person using e-mail must have an e-mail address. The e-mail service provider has a special server to handle the e-mail for its customers. E-mails are mainly text messages that may (Not always) have a little formatting similar to a word processing document. It may be used to send files attached to the e-mail message called attachments. Before mail is read, it is downloaded from the mail server to the user’s computer. 23 Advantages 1) It is faster than normal mail. 2) It is cheaper and more convenient .e-mails are free. 3) It’s very easy to send files. 4) The same message can be easily and quickly sent to several people. Disadvantages 1) It cannot be used to send parcels 2) You cannot send e-mail to people who do not have an e-mail account. 3) E-mail makes it easy for computer viruses to be spread. COMPUTER PROGRAMMING LANGUAGES 1St Generation Programming Languages (Machine Language) the machine language of a computer is written as strings of binary (ones and zeros).the circuitry of a computer is wired in a manner that it immediately recognizes the machine language instructions and converts them in the electrical signals needed to execute them. Advantages 1. Programs written in machine language can be executed very fast 2. The program can directly address and control the internal circuitry of the computer making it more effective in hardware usage and control Disadvantages 1. it is machine dependent 2. difficult to program 3. it is error prone 4. it is difficult to modify 5. the programmer has to have expert knowledge of the computer 6. it is extremely difficult to learn and use 2nd Generation programming languages (Assembly Language) They use symbols and codes to represent program instructions instead of binary digits. The resulting program still directly instructs the computer hardware therefore not easily portable. Advantages 1. It is easier to correct errors and modify program instruction 2. They have the same execution efficiency as machine language 3. Easy to understand and save a lot of time and effort of programmer 4. There is no worry about address Disadvantages 1. They are still machine dependent 2. Knowledge of hardware is required 3. They are still time consuming 4. Program execution takes longer than machine language 3rd generation programming languages (Procedural language) They are easier to learn and use than were the earlier generations. While not directly manipulating specific hardware components, they must still give the computer detailed instructions of how to reach the desired results. They incorporate great use of english like instructions which are easier to learn and use. Examples include COBOL, FORTRAN, C, and PASCAL. Procedural programming languages offer very little control and flexibility. They are portable. 4th generation programming languages (non-procedural language) They are much easier to use and more English like than procedural languages. Its programs tell the computer what it needs to accomplish but do not provide detailed instructions as to how to accomplish it. They 24 concentrate on the output and not procedural details. They can be used by people who are not computer specialists. e.g. C++, VISUAL BASIC, POWER BUILDER. Object oriented programming languages OOP was first introduced in 1967 by developers of a programming language named SIMULA 67. The basic idea behind OOP is that programming languages are used for simulating real world problems on computers. OOP’s consist of objects that include descriptions of data relevant to the object as well as the operations that can be done on that data.e.g query languages, report generators, application generators Features of OOP’s 1. There is extensive use of graphical objects 2. There are features that allow easy program coding, error detection and correction 3. In order to write code, one double clicks on an object and selects the event for which they are writing code. Advantages 1. Program coding is made easier 2. Error correction is made easy 3. Writing a program or application takes less time compared to procedural. 4. It is easier to learn than procedural 5. They are portable 6. The programmer does not need to be an expert on the internal workings of a computer 7. Programs made using OOP’s are user friendly Disadvantages 1. Interface design takes more time 2. One has to master all usable objects and event procedures in order to create an effective application 3. Programs made using OOP’s occupy much more storage space than procedural languages 4. In some cases they are difficult to learn and use DATA PROCESSING Definitions Data – Basic facts about the activities of the business. E.g. number of hours worked by an employee on a particular machine. Information – Data which is summarized in the way you want it, so that it is useful to you in your work. It’s the end product of data processing. Must be accurate, timely, complete, concise and relevant. Data Processing – Collection and manipulation of items of data to produce meaningful information. It’s the process of transforming raw data into meaningful output i.e. information. Data processing can be done manually using pen and paper, mechanically using simple devices like typewriters or electronically using modern data processing tools such as computers. Electronic data processing has become so popular that the manual and mechanical methods are being faced out. Factors determining the methods of data processing a. Size and type of business. Methods of producing the information largely depend on the size and type of business. In a very small company, one person can be able to produce all the necessary information. 25 However as the company increases in size, more people and aids e.g. calculators and small computers will be needed. Large volumes of data and information will require the use of large computers. b. Timing aspects. Some information requirements are less time critical than others. The timing requirement for information will have a considerable bearing on the methods and equipment needed to provide it. c. Link between applications. Where data is needed for more than one information requirement, a different method of processing it may be suggested. Stages of data processing From the source documents. a. Preparation of data for input Data is checked for correctness and validity i.e. transcription and they are also sorted. b. Input of data The collected data is converted from human readable to machine readable form. The conversion takes place in the input device. c. Processing The transformation of input data by the C.P.U to a more meaningful output (information). d. Output The production of the end product. The information can then be distributed to the target group or stored for future reference. Data Collection Data collection is getting the data from the point of its origin (source documents) to the computer in a form suitable for processing. Also referred to as data gathering or fact finding. Tools that help in data collection include source documents such as forms, data capture devices e.g. digital camera e.t.c. Stages of data collection a. Data creation It’s the process of putting together facts in an organized manner. There two basic alternatives; Source documents – A great deal of data still originate in the form of manually prepared documents. Data capture – Data is produced in machine-sensible form at source and is read directly by a suitable device e.g. a bar code reader. b. Data transmission This depends on the method and medium of data collection adopted: 26 If computer is located at a central place, the documents will be physically transmitted i.e. by the postman or courier services. It’s also possible for data to be transmitted by means of telephone lines to central computer. In this case no source documents would be involved in the transmission process. c. Data preparation This is the transcription (conversion) of data from the source documents to a machinereadable form. Data collected using devices that directly capture data in digital form don’t require transcription. d. Data conversion Data may need to be converted from one media to another e.g. from floppy disk to hard disk for input to the computer. e. Input validation Data entered into the computer is subjected to validity checks by a computer program before being used for processing. f. Sorting This stage is required to re-arrange the data into a sequence required for processing. It’s a practical necessity for efficient processing of sequentially organized data in many commercial and financial applications. g. Control It’s not really a stage because control is applied throughout the whole collection. Data collection media and methods a. On-line transmission of data from source e.g. Data Direct Entry (DDE) b. Source document keyed directly keyed directly into diskette (key-to-diskette). c. The source document itself prepared in machine-sensible form using character recognition techniques. d. Data capture devices. e. Portable encoding devices. f. Source data captured from tags, plastic badges or strips. g. Creation of data for input as a by-product of another operation. Controls Objectives of controls i. To ensure that all data is processed. ii. To preserve the integrity of maintained data. iii. To detect, correct and re-process all errors. iv. To prevent and detect data. Importance of controls 27 They must be instituted early as possible in the system. The quality of input data is of vital importance to the accuracy of output. Everything possible must be done to ensure that the data are complete and accurate just before input to the computer. Types of controls a. Manual controls b. Data preparation c. Validation checks d. Batch controls e. Other controls a. Validation checks These are attempts to build into the computer program powers of judgement so that incorrect items of data are detected and reported. These check s can be made in two stages: Input– When data is first input into the computer, different checks can be applied to prevent errors going forward for processing. For this reason, the first computer run is often referred to as validation or data vet. Updated – Further checking is possible when the data input are being processed. The following are the main types of validation checks that may be used: Presence - Data are checked to ensure that all fields are present. Size - Fields are checked to ensure that they contain the right number of characters. Range - Number of codes are checked to ensure that they are within the permissible range. Character check - Fields are checked to ensure that they contain only characters of the correct type e.g. no letters in numeric field. Format - Fields are checked to ensure that they are of the correct format. Reasonableness - Quantities are checked to ensure that they are not abnormally high or low. Check digits – Use of a check digit enables a number to be self-checking. It’s a means of ensuring that a number (e.g. a customer account number) maintains its validity. b. Manual controls Even in advance systems, considerable checking of the source documents is often necessary. Such checks may be: Scrutiny to detect: i. Missing entries. ii. Illegal entries. iii. Illogical or unlikely entries. Reference of the document to stored data to verify entries. Re-calculating to check calculations made on the document. Types of errors during data collection. a. Missing source documents. b. Source documents on which entries are omitted, illegible or dubious. c. Transcription errors e.g. errors in copying data from one form to another. 28 d. Data preparation errors e.g. errors made when keying onto diskette. e. Program faults. f. Machine hardware faults. Types of data or computer files Computer files – a collection of information initially created in memory and then stored with a file name on a secondary storage. Are of two types: - Command files - Contains program executable code that computer reads and uses as instructions to prepare a task. - Text/data files - Contain standard alphanumeric information that has been entered into the file via an application program such as word processor, spreadsheet, database e.t.c. Types of files Master file Main file that contains permanent data against which transactions are processed. Contain: o Reference data- tends to be relatively permanent and which is processed by amending i.e. making occasional changes in the form of insertion of new records, deletion or alteration of existing records e.g. personnel details. o Dynamic data – Changes frequently and is processed by updating i.e. changing values of various fields e.g. earnings and deductions. Transaction/movement files Includes input and output files for holding temporary incoming and outgoing data. Used to update dynamic data on master files. Reference file It’s a file with a reasonable amount of permanency. Used for look up or reference purposes e.g. PAYE deductions. Report file Set of records extracted from data in master file used to prepare report which can be printed at a later date. Stores relatively permanent records extracted from the master files or generated after processing. Back up/History file Holds copies of data or information from computer storage. Retained for historical use or back up. Dump/work file Used to hold data for security and recovery purposes or for temporary storage whilst other work is being carried out e.g. total earnings and deductions calculations (payroll processing). Sort file 29 Mainly used where data is to be processed sequentially in a sequential process. Data Storage Hierarchy It normally consists of the following six levels; 1. Bit. The smallest item of data is a single binary digit (a bit), either 0 or 1. 2. Character. Multiple related bits are combined to form a character. A bit is the basic unit of primary and secondary storage, and a character is the basic unit for human conception. 3. Field. It’s a meaningful collection of related characters. 4. Record. Multiple related fields are combined to form a record. 5. File. Multiple related records are combined to form a file. A file is a number of related records which are treated as a unit. Every record in a file has the same set of fields. Each record in a file is identified, for storage and retrieval purpose, by a key field whose contents are unique for each record in a file. In case of an employee file, employee-code field may serve as the key. In case of an employee file, employee-code field may serve as the key field. 6. Database. Multiple related files are integrated to form a database. A database is a collection of logically related data elements from multiple files. Standard methods of organizing data Two standard methods for organizing data are: - File-oriented approach - Database-oriented approach File-oriented approach was the traditional method and has largely been replaced today by the database-oriented approach. File-oriented approach In this method, an application’s data is organized into one or more files and the application program processes the data stored in these files to generate the desired output. This method of organizing data is simple, inexpensive and usually easy to use. It however suffers the following limitations: 1. Limited query flexibility. In file-oriented approach, the records are organized according to a key field. As long as we search records based on key field value, the query can be processed quickly.However, when the key field is not relevant to the information needed, the entire field has to be searched. 2. Data redundancy. This is the repetition of the same data items in more than one file. In file-oriented approach, the same data items are often included in many different 30 files. This leads to increase in cost of data entry and data storage. It also leads to data integrity problem. 3. Data integrity problem. Data integrity is the consistency of the data in all files, i.e. when some changes occur in a data item, every file which contains that field, should be updated to reflect the change for consistency. For example, when a data item changes, if all files are not updated correctly, there may be frequent discrepancies among reports produced from different files, causing confusion. 4. Lack of program/data independence. In file-oriented approach, the application programs usually contain data format statements that precisely define each data field to be processed. This often results in different files having the same data item stored using different data formats. Data dependence occurs when the data is dependent on the application. Due to data dependence problem, whenever there is need to add, delete, or change data formats, the application program must also be changed. Data dependence problem also causes incompatibility among data files from different applications due to which these data files cannot be linked, if such a need arises. 5. Limited data security flexibility. A file-oriented approach normally offers file-level data security feature i.e. data access restrictions can be enforced only for an entire file, not for a record or a record or a field of data item. Database-oriented approach In this approach, data from multiple related files are integrated together in the form of a database, with the following properties: 1. It provides greater query flexibility. 2. It reduces data redundancy. 3. It solves data integrity (inconsistency) problem. 4. It makes data independent of the application programs i.e. fields can be added, changed and deleted from the database without affecting existing programs. 5. It also includes data security features at database level, record level, and even at field level to provide greater flexibility of restricted data access. File organization1 This is the arrangement of records within a particular file. File organization is very important because it determines the methods of access efficiency and flexibility. File organization methods a. Sequential file organization Records are stored and accessed in a particular order using a key field. Retrieval requires searching sequentially through the entire file word for word from the beginning to the end. e.g. if the record required is the twentieth record on the file, in order to get it into storage to process it the computer will first have to read in all nineteen preceding records. The principle storage medium for sequential files is magnetic tapes. 1 Very important 31 Sequential file organization is the most efficient and economical file organization in case of application in which there is a large number of file records to be updated at regular scheduled intervals. Applications such as payroll processing and monthly bill processing are processed in this manner. Advantages of sequential files 1. They are conceptually simple to understand and use. 2. They are also easy to organize and maintain. 3. They need relatively inexpensive input- output media and devices for their storage and processing. 4. They are most efficient and economical to use in applications in which the activity ratio is high(most records are changed during update runs) Disadvantages of sequential files 1. They are very inefficient and uneconomical for applications in which the activity ratio is very low. 2. Since an entire sequential file may need to be read just to retrieve and update few records, accumulation of transactions into batches is recommended before processing them. Hence, the use of sequential files is limited to a batch-processing environment. 3. Because of the need to accumulate transactions into batches before processing them, sequential processing precludes the possibility of up-to-the-minute data. 4. Sequential processing require the files to be sorted before processing i.e. both the transaction and master files must be sorted and placed in the same sequence before processing. 5. Sequential processing often leads to data redundancy problem, since the same data may be stored in several files sequenced on different keys. b. Serial file organization Records in a file are accessed one after another. c. Random/direct file organization Records are stored in the disk at random but are accessed directly. Many applications require up-to-the-minute timeliness of data. The users of such applications cannot afford to wait for the transactions to be accumulated to batches and then processed together. Such applications require a transaction to be processed immediately as and when it occurs. Examples of such applications are airlines or railway reservation systems, teller facility in banking applications, systems for enquiring whether a certain item is in stock in a store e.t.c. For such applications, the use of random/direct file organization is recommended, in which the desired record pertaining to the current transaction at hand can be directly located by its key field value, without having to search through a sequence of other records. The principal storage medium is magnetic/optical disc. Direct file organization uses an address generating function to convert a record key value into a storage address on the disk on which the file is stored. 32 Advantages of direct files 1. Given the key, any record can be quickly located and retrieved directly, without the need for a sequential search of the file. 2. Transactions need not be sorted and placed in sequence before processing. 3. Accumulation of transactions into batches is not required before processing them. They may be processed as and when generated. 4. It can support interactive online applications, which need to provide up-to-theminute information in response to inquiries from users. 5. If required, it’s also possible to process direct file records sequentially in a record key sequence. Disadvantages of direct files 1. They require relatively expensive hardware and software resources because they must be stored on a direct-access storage device, such as a disk. 2. Due to address generation overhead involved, they are less efficient and economical than sequential files for use in sequential applications with high activity ratio (The ratio of the total number of records in a transaction file and the total number of records in the master file). 3. Special security measures are often necessary for online direct files, which are simultaneously accessible from multiple online stations. d. Indexed sequential files There two types of files involved: - The data file which contains records stored in the file and - The smaller index file which contains the key and disk address of each record stored in the data file. The records of the file can be stored in a random sequence, but the index table is in sorted sequence on the key value. This provides the user with a very powerful tool. Not only can the file be processed randomly, but it can also be processed sequentially. Advantages of indexed sequential files 1. They can be quite efficiently used for sequential processing of high activity ratio applications. 2. They can also be used quite efficiently for direct access processing of low activity ratio appliances. Disadvantages of indexed sequential files 1. They require relatively expensive hardware and software resources because they must be stored on a direct-access basis, such as a disk. 2. They require more storage space than other types of files because of the need for index file. 3. When used for direct access online applications, access to records may be slower than direct files. 33