History of Data Processing Processing data faster and faster has always been a part of any industrialized growth, and being able to do it quickly and with little error is even better. What so many do not realize is that it doesn’t take a computer to do any of this processing. Rather modern data processing can be done and was done for a long time by the use of plain old everyday mechanical devices, certainly not fast or flashy, but done all the same and done quite well. Modern Data processing and information systems came about through Unit Record. Unit Record operations lasted a long time, well over 70 years and there were, believe it or not, no computers anywhere. UNIT RECORD Data Processing started out in a very physical way by first coming up with a system to store digital data and then manipulating it. The introduction of punched card files solved the problem of storing digital data. The second problem of data manipulation came in the way of a number of ingenious machines. Such a storage system came unto use in 1890, many years before computers were reliable enough or cheap enough. Unlike the theoretical and whiz-bang exploits of Babbage and Pascal, the type of data storage first began by Herman Hollerith was not esoteric machinations involving wheels and cogs but instead a very practical way to capture data and produce usable results. His inventions were quickly adapted for businesses and government in a time when innovation was badly needed and certainly utilized. A Punch Card Hollerith worked for the Census Department during the 1880 census and decided that he could develop a better way to collect, store, summarize, and report census data rather than just doing it all by hand. He designed a card that contained little punched holes. These holes represented digital information and could be electronically tabulated by a machine that he also designed. The census of 1890 was completed in just three years, much faster than the 1880 census. By 1896 Hollerith had left the Census Department and struck out on his own, setting up a company that by 1924 became IBM. As time went on data processing had to grow to keep up with demand. In the subsequent evolution of data processing there were at least four distinct technological advances or shall we refer to them as generations. Generations of Data Processing Unit Record - The Zero generation Unit Record is referred to as the zero generation of computer evolution, even though there were no vacuum tubes or transistors involved, just switches, relays, capacitors, resistors, solenoids, and other common electric circuits. The zero generation's building block was a card, the Unit Record, made of thin yet stiff cardboard to allow it to be rapidly machine fed into card readers and then interpreted by electronic brushes. First generation The advent of vacuum tube technology was the first visible modern step on computing. These first generation computers did not work well and were not reliable and are today usually consigned to museums or long ago gone into scrap heaps. The period remains pretty much a reminder of our hasty, fervent but nonetheless failed efforts to improve information processing. But because of the war II, it was more an attempt to do scientific applications and thus had little appeal to the more business oriented needs of the day. The first generation was a primitive attempt at best and it offered little to business. You could practically stand and watch a computer go through its cycles. The computer language in use was machine based and was inscrutable to most people and had very little significance on practical every day data processing. Second generation The advent of the solid state ushered in a better and most important, a cooler running computer. The famous IBM 1401 and the much faster IBM 7090 series revolutionized computing to a great extent although few mainline card oriented applications were immediately affected, and continued to use Unit Record for their day to day work. With second generation technology however, there was greater reliability and even an interest by the business community to look into new opportunities. But there was still much to be desired with this next wave of computer technology. Programmers still needed to use low level programming languages, in IBM's case called Autocoder. It was low level because it generated machine code. Machine coding corresponds one for one with actual machine code, sometimes referred to as “metal scratching”. The programmer had to have a good knowledge of just how a computer machine decoded and executed it's instruction set. The Third Generation Improvements I noticed some very striking advances with third generation computing technology. The whole idea of a real and dramatic technological breakthrough seems to have been more than exemplified during those critical years. Some advances came almost immediately in the wake of the IBM 360 series of computers. Other advances arrived ten years later or so, but they were advances that truly set the third generation up as great. Here is a partial list of what I feel were some of these fundamental improvements. 1. Device Independence. Computer programs no longer had to be too concerned about what form the data was coming in or going out. It no longer mattered if it was on cards or tape or disk, since the form of media was no longer at issue. This advantage was quite significant, because before device independence, programs had to be programmed to handle the type of media on which data was read or written. These different I/O operations could be significant, tedious, and error prone. 2. Program Relocatibility. Internal addressing in 360 architecture was indirect. Locations in core memory used a sophisticated base plus displacement technique. When programs were loaded into memory, they could be put anywhere since all the machine had to do was change the contents of the base register. 3. Clear Command Structure Hierarchy. There was a definite hierarchy in the way the computer functioned. It was like a general who gave orders to his majors who gave orders to their sergeants who gave orders to their privates. If lower level failure occurred it did not damage the overall computer functioning. 4. Operating Systems. With the third generation came a number of exceptionally good operating systems that maintained overall control of the computer. 5. High level languages . Several very useful higher level languages had been developed by 1960, in particular COBOL, a business language and FORTRAN, a scientific language. These languages allowed much more freedom in software design and construction. 6. Program Modularity. An entire new concept began to emerge around this time about how to write programs. The idea of bigger as better was being replaced by modularity. By making program functions smaller and isolating functions they became more manageable. 7. Improved programming development techniques. New radical ideas such as "go-to-less" logic and top-down design became the watchword, as managers realized that large programs were just too hard to maintain. 8. Professional Recognition. By as early as 1970 the educational establishment began to recognize the emergence and importance of computer science and systems programming. These disciplines were beginning to assume professional significance, whereas before they were merely considered trades. 9. Emergence of modern data base concepts. A number of new ways to organized, access and update data were developed during this time, including file structures like IDAM, HDAM, HIDAM. Entire data base systems were developed to handle the movement toward online applications. The most famous data base system was IMS (Information Management System), a basically hierarchical system and the later relational DB2 system, which was quite similar to Oracle, both using the SQL protocol. Types of Computers 1. Mainframe Computers Mainframe computers are the big, powerful, expensive computers used in the background by most large organizations. 2. Minicomputers Like mainframes, these are very powerful and also very expensive. In many ways, the old differences between a mainframe and a minicomputer have blurred and in many cases, the two words are almost interchangeable. 3. Supercomputers A super computer, as the name implies is an incredibly powerful beast with a phenomenal capacity for processing data. They are used extensively by the military. In civilian use, they tend to be used for research and also in areas such as weather forecasting where a tremendous amount of data has to be processed rapidly and used to make predictions. Examples: K computer Tianhe Jaguar IBM Roadrunner Blue Gene/L The Earth Simulator ASCI White ASCI Red Fujitsu Numerical Wind Tunnel CM-5/1024 At Los Alamos 4. Personal Computers IBM invented the PC (Personal Computer) way back in 1981. All PCs released since then are in many ways compatible with the original design, though many improvements to the original design have been made. The term ‘PC compatible’ relates to PCs manufactured by companies other than IBM that are compatible with the traditional PC specifications. 5. Laptop & Palmtop Computers Laptop computers as the name implies are small, portable computers that can run on batteries as well as mains power. They use special screens, rather than the traditional bulky VDUs (Visual Display Units). Palmtop computers are even smaller than laptop computers. Components of a Computer Computers come in all different shapes and forms (examples: desktops, laptops), but the main components that make up a computer pretty much stay the same. Components can also be referred to as; hardware or parts. Throughout this website I will explain the various components in a PC computer, and try my best to give you the information you need to better understand how your computer works. Some of this information is considered basic computer knowledge, but there is no better place to start with than with the basics. Knowing this valuable information can help you if you are going to buy, repair, maintain or even build your own computer. Every computer Consists of the following basic components: 1. Computer Case - Where all of the components are stored. 2. CPU - It is basically the brain of your computer. The CPU is a used to process everything from basic to complex functions in a computer. 3. RAM - RAM is memory that attaches to the motherboard. RAM is hardware used to temporarily store and access data. 4. Motherboard - A Motherboard is the most important component in a computer system. All of the other hardware in a computer system connect to the motherboard. 5. Power Supply - A Power Supply is the sends power to all of the other hardware so they can operate. 6. Hard Drive - A Hard Drive is used for permanently storing files and programs. 7. Disk Drives - Disk Drives can be a floppy drive, CD drive, DVD drive or other possible file storage devices that are used in a computer. 8. Video Card - A Video Card is the part of a computer system that converts binary code from the CPU so you can view it on a monitor. 9. Monitor - The part of a computer that allows you to see what the computer is processing. 10. Keyboard - A keyboard allows a computer user to enter text commands into a computer system. 11. Mouse - A mouse allows a computer user to use a point and click interface to enter commands. The CPU The CPU is the brain within your computer. It performs most of the calculations and is responsible for the smooth running of your operating system (Microsoft Windows) as well as your application programs, such as word-processors, spreadsheets and databases. There is a small amount of memory associated with the CPU, which it uses to perform these operations. It also accesses and uses the main memory (RAM - Random Access Memory) within your computer. In many ways, the CPU is the most important item within your computer that governs the overall speed of your computer. The speed of the CPU is measured in MHz. This relates to the frequency that the CPU runs at and the higher the MHz rating of your CPU the faster your computer will run. To give you some indication of how PCs have advanced over the years, the original IBM PC released in 1981 ran at 4.77 MHz while modern PCs run at speeds in excess of 800 MHz! Memory RAM The Random Access Memory (RAM) is the main 'working' memory used by the computer. When you first switch on the computer, the operating system (OS) loads from the Hard disk to the RAM. The original IBM PC could only use up to 640 KB of memory (just over half a megabyte), whereas a modern computer can effectively house, as much RAM as you can afford to buy! Commonly modern computers are supplied with over 64 MB of RAM. As a rough rule, a Microsoft Windows based computer will operate faster if you install more RAM. Data and programs stored in the RAM are volatile (i.e. the information is lost when you switch off the computer). ROM Read Only Memory (ROM) as the name suggests is a special type of memory chip from which existing software can be read but not written to. A good example is the ROM-BIOS chip, which contains readonly software. Often network cards and video cards also contain ROM chips. Video (graphics) memory The picture that you see on your screen is a form of data and this data has to be stored somewhere. The on-screen pictures are held in special memory chips called video memory chips. These chips are usually located on the video card. A modern computer will be supplied with several Megabytes of video memory. Input/ Output and Storage Devices Input devices are used to enter commands and data into the computer. Output devices are used to let the user know the results of the entered commands. The memory of a computer is volatile. Therefore, a user needs to store the data in the memory to a non-volatile device so that they can be accessed again. Storage devices are used for this purpose. Input/output and storage devices do not work just because the relevant hardware is connected to the computer. The corresponding software (generally called device drivers) need to be installed so that these devices can function properly. Input Devices Keyboards The keyboard is still the most common way of entering information into a computer. There are a number of different types of keyboards, including those specially designed to use with Microsoft Windows. Mice The mouse came into common use on a PC with the introduction of the Microsoft Windows operating system. There are many different types of mice, a commonly used model now has a small wheel on it which, when combined with the correct software allows additional functions and fine control over the use of your applications. Touch Pads A touch pad is a device that lies on the desktop and responds to pressure. Used in conjunction with a special pen they can be used by graphic artists, who wish to create original digital artwork. Light Pens A light pen is used to allow users to point to areas on a screen and is often used to select menu choices. Joysticks Many games require a joystick for the proper playing of the game. There are many different types, the more sophisticated respond to movement in 3 axis directions, as well as have a number of configurable buttons. Voice-Input Devices Voice-input devices convert a person's spoken words to digital code. Combined with appropriate software, these devices are part of the voice recognition system that allows users to operate microcomputers using voice commands. Scanners A scanner allows you to scan printed material and convert it into a file format that may be used within the PC. You can scan pictures and then manipulate these inside the PC using a graphics application of your choice. In addition, you can scan printed text and convert this not just to a picture of the text but also to actual text that can be manipulated and edited as text within your word-processor. There are a number of specialist programs, generically called OCR (Optical Character Recognition) programs, which are specifically designed for converting printed text into editable text within your applications. Output Devices VDUs (computer monitor or screen) The VDU (Visual Display Unit) is the computer screen used to output information in an understandable format for humans. There are two types CRT and LCD. LCD is less power and space consuming monitor type that popular now. Terminals A terminal is an input/output device that connects to a host computer or server. Terminals are of four types: Dumb--sends and receives only; does no processing. Intelligent--has a processing unit, memory, and secondary storage. Network--network computers (thin clients) are low cost alternatives to intelligent terminals Internet--(Web terminals) accesses Internet and displays on the television set. Printers Output from a display screens is called a soft copy. Output from a printer is called a hard copy. The four types of printers are: Ink-jet--sprays droplets of ink on paper. It is good for color printing and provides very good quality. Laser--uses a technology like in photocopiers. Lasers print high-quality text and graphics. Dot matrix--forms text and graphic images with a matrix of pins. Thermal--heat elements produce images on special heat-sensitive paper. Expensive. Produces very high quality art and design output. Storage Devices Devices that are used to store or back up data. To measure the capacity of the storage device or the consumption of the space by data a unit is used. The smallest unit is Byte. 1000 Bytes = 1 Kilo Bytes (KB) 1000 Kilo Bytes = 1 Mega Bytes (MB) 1000 Mega Bytes = 1 Giga Bytes (GB) 1000 Giga Bytes = 1 Terabytes (TB) Floppy Disks Floppy disks (disks, diskettes) are circular plastic disks. 3 1/2-inch 2HD disks have a 1.44 megabyte capacity. Hard Disks A hard disk is an enclosed disk drive that contains one or more metallic disks. Enclosing the disk in a sealed container prevents entering of material that could cause a head crash. Hard disks have far more capacity than floppy disks do. Hard disks come in three forms: An internal hard disk has one or more metallic platters sealed inside a container. Hard-disk cartridges can be removed when they are filled or transported. Mini and mainframe computers use hard-disk packs, which are hard disks consisting of several platters in a stack. Optical Disks An optical disk is a metallic disk that uses a laser beam for reading and writing. Four kinds are: CD-ROM (compact disc read-only memory) : cannot be written on or erased by user (read-only). Used to distribute large databases, reference materials, and software. CD-R (CD-recordable) or WORM (write once, read many): can be written to one time, after which it cannot be erased by users but can be read many times without deterioration. Erasable optical disks: can be written on and erased and reused. Two basic types: CD-RW (compact disk re-writeable) and MO (magnetic optical). DVD (digital versatile disk): similar to CDs. Have a greater capacity of 4.7 gigabytes. Blue Ray Disk- An optical disc storage medium designed to supersede the DVD format DESCRIPTION CAPACITY CD-ROM 650 MB CD-R 600 - 650 MB Erasable 600 - 1000 MB DVD 4.7 GB Blue Ray Disk 25 GB- 125 GB… Magnetic Tapes Magnetic tape storage is mainly used to back up (duplicate) programs and data on disks. Two forms are: Magnetic Tape Streamers (backup tape cartridge units) consist of tape cartridges used to back up microcomputer hard disks. Magnetic Tape Reels, used to back up mini and mainframe computer storage. Run on magnetic drives (magnetic tape units). Pen Drives Pen drives are fast becoming a common storage device. These are very high capacity portable devices that can be plugged directly into the USB port which is available in most modern day computers. These are also called flash drives. Comparison of Storage Devices TYPE ADVANTAGE DISADVANTAGE TYPICAL USE Floppy disk Low capacity, slow Inexpensive, direct access access Store files for word processors and spreadsheets Hard disk Fast, direct access Limited capacity Store programs and data CD-ROM High capacity, direct access Slow access Reference material Magnetic tape High capacity Slow sequential data access Backup programs and data Computer system A complete, working computer. Computer systems will include the computer along with any software and peripheral devices that are necessary to make the computer function. Every computer system, for example, requires an operating system. Business Computer System A Computer system that is loaded with components and dedicated tool s (software) to perform business operations and Storage devices and tools to back up critical data. The tools and components depend on the business type. For some systems beside tools communication methods like network or internet connectivity may needed. File and computer safety To protect a computer system, the hardware components can be protected from physical thefts by applying security methods like keeping the system in a safe place protected by walls, people etc. To protect data a software based method must be used. If the system is protected from physical thefts the data can be damaged by people or thefts like virus attack. To protect from people a protection method like password protection, user restriction can be used. Protect from virus attack software called antivirus programs can be used. Computer Virus A computer virus is a computer program that can replicate itself and spread from one computer to another. Virus can be spread by Internet, E-mail (Network) Storage Devices (Hard Disks, Pen Drives, Optical Drives ) Attack types of Virus programs System Sectors/Boot Records - Viruses can infect the parts of the system that are used to run programs and perform functions such as startup and shut down. Files - Viruses can infect program files or delete files. These viruses stick to program files such as .com, .exe, .sys, etc. Some viruses hide in the memory of the computer at first, while others simply attack a specific software program, such as Microsoft Word. Companion Files - Viruses can create companion files that are a special type of file that adds files that run on the hard disk. Macros - Viruses can infect macro or data files. Disk Clusters - Viruses can infect files through the disk directory. Batch Files - Viruses can use batch files to infect a computer. Source Code - Viruses can be in additional code that is added to actual program source code. Visual Basic Worms - These worms use the Visual Basic programming language to control a computer and perform tasks. Virus Types Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus Worms Trojans or Trojan Horses Logic Bombs Symptoms of a Virus Infection In a Computer Slower than usual. Stops responding or it locks up frequently. Crashes, restarts. Applications on the computer do not work correctly. Disk drives are inaccessible. Cannot print items correctly. Unusual error messages. Distorted menus and dialog boxes. Double extensions such as a .jpg, .vbs, .gif, or .exe. extension. An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted. An antivirus program cannot be installed on the computer, or the antivirus program will not run. New icons appear on the desktop. Strange sounds or music plays from the speakers unexpectedly. A program disappears. In a Storage Device On double click an auto run starts. Unknown filed or folders. Show lower capacity without contents Safe Computing Practices Anti-Virus Software - If you don't have an anti-virus software program, invest in one. Scan Your Computer on a Regular Basis - Scan you system with anti-virus software regularly. Update Your Anti-Virus Software on a Regular Basis - Keep your anti-virus software up to date. Do this at least weekly and more often if there are news reports of a new virus threat. Backup - Backup your files on a regular basis. Always maintain copies of files you can't do without, just in case your computer gets infected and crashes. Turn off E-Mail Preview - Turn off the preview function if your e-mail software has one. Scan Removable Disks (Floppy, CD, Pen) - Scan Removable disks from other computers with anti-virus software before you use the disk. Simply place the disk in your f drive and run the anti-virus software program. If a virus is found, most programs will give you several choices about what to do, such as removing the virus, doing nothing, or deleting the file that contains the virus. Protect Your Disks - Write-protect any disk you place into another computer. If the other computer has a boot sector virus, the write-protect on the disk will prevent it from becoming infected with the virus. Scan Downloaded Files - Scan downloaded Internet files with anti-virus software before you use or run them. Scan All E-Mail Attachments - If you receive an attachment you need to view, scan it with anti-virus software before you open it. Beware of E-Mail Attachments from Unknown Sources - If you receive an unexpected attachment from an unknown source, delete it. Never open attachments for files that end in .vbs (Visual Basic Script) or .js (Java Script). Viruses often travel in these types of files. Be Alert - Pay attention to news about virus alerts. You might want to subscribe to a virus alert e-mail notice from one of the anti-virus software makers.