History of Operating Systems - Ritz Hospitality Management College

advertisement
UNIT 1
Computing Devices,Software and
Operating System
Computer and IT application
Page 1
What are the Advantage and Disadvantage of Networking?
Advantage of Networking
1. File Sharing: Networks offer a quick and easy way to share files directly. Instead
of using a disk or USB key to carry files from one computer or office to another,
we can share files directly using a network.
2. Software Cost and Management: Many popular software products are available
for networks at a substantial savings in comparison to buying individually
licensed copied for all of our computers. We can also load software on only the
file server which saves time compared to installing and tracking files on
independent computers. Upgrades are also easier because changes only have to be
done once on the file server instead of on individual workstations.
3. Security: Specific directories can be password protected to limit access to
authorized users. Also, files and programs on a network can be designated as
"copy inhibit" so we don’t have to worry about the illegal copying of programs.
4. Resource Sharing: All computers in the network can share resources such as
printers, fax machines, modems, and scanners.
5. Communication: Even outside of the internet, those on the network can
communicate with each other via electronic mail over the network system. When
connected to the internet, network users can communicate with people around the
world via the network.
6. Flexible Access: Networks allow their users to access files from computers
throughout the network. This means that a user can begin work on a project on
one computer and finish up on another. Multiple users can also collaborate on the
same project through the network.
Disadvantage of networking
1. Security Issues
One of the major drawbacks of computer networks is the security issues
involved. If a computer is a standalone, physical access becomes necessary for
any kind of data theft. However, if a computer is on a network, a computer
hacker can get unauthorized access by using different tools. In case of big
organizations, various network security software’s are used to prevent the theft
of any confidential and classified data.
2. Rapid Spread of Computer Viruses
If any computer system in a network gets affected by computer virus, there is a
possible threat of other systems getting affected too. Viruses get spread on a
network easily because of the interconnectivity of workstations. Such spread can
be dangerous if the computers have important database which can get corrupted
by the virus.
Computer and IT application
Page 2
3. Expensive Set Up: The initial set up cost of a computer network can be high
depending on the number of computers to be connected. Costly devices like
routers, switches, hubs, etc., can add up to the bills of a person trying to install a
computer network. He will also have to buy NICs (Network Interface Cards) for
each of the workstations, in case they are not inbuilt.
4. Dependency on the Main File Server:
In case the main File Server of a computer network breaks down, the system
becomes useless. In case of big networks, the File Server should be a powerful
computer, which often makes it expensive.
What do we mean by transmission media?
Transmission media is the means or pathway by which data is transmitted and received
from one computer to another computer.
There are two types of transmission media, they are:1) Guided media
2) Unguided media
1) Guided Media: - Guided media is such type of media by which data/information is
sent and received through some end to end connection like wire.
Example:- Twisted pair cable, coaxial cable, optical fiber cable
2) Unguided Media: - Unguided media is such media by which data/information is sent
and received through some frequency or some wave like radio wave, satellite etc
Wireless communication: - Communication with the help of unguided media is called
wireless communication.
a) Twisted pair cable:- It is one of the cheapest and most popularly used communication
media in guided system. In this cable a pair of copper wires is twisted to each other in a
helical path making the same structure as a DNA molecule. The reason for twisting is to
reduce electrical interference. It is mostly used telephone systems. These cables are
available in varieties of grade level called levels. Level 5 cables is most expensive but has
bandwidth (100 mbps), level 4 cable has 20 mbps bandwidth and level 3 has 16 mbps
bandwidth.
There are two types of twisted pair cable, they are:A) Shielded twisted pair (STP)
B) Unshielded twisted pair (UTP)
b) Coaxial Cable: - It is the most popular cable which is being used in TV in our homes.
A coaxial cable consists of a thick copper wire in the core, surrounded by an insulating
plastic with a net of thin copper wires used as earthing and in the outermost part it is
insulated by a thick plastic cover. Generally it comes in two categories.
-thin coaxial cable
-thick coaxial cable
Computer and IT application
Page 3
Thick coaxial cable has 100base5 bandwidth which means 10-100mbps
bandwidth with distance 500 m. thin coaxial cable has 10base2 bandwidth which means
10-100 bandwidths with distance 100-200m. It is better than twisted pair cable and has
high bandwidth but expensive in comparison to twisted pair cable.
c) Fiber optics cable/ Optical fiber: - It is the most advanced media in communication.
It has the highest bandwidth 100baseFX (which means 100 mbps with distance 2000m)
and 1000baseLX (which means 1000mbps with distance 3000m) and has highest speed
and is most expensive media in comparison to any other media. It uses light rather than
electricity to transmit information. It is very thin media which is measured in microns and
is very hard to identify with our necked eye. It has two layers-clad and core. Both the
clad and core are made up of same material (glass and plastic). The light is passed
through an optical fiber by the process of total internal reflection. Light source for it is
‘Laser’ or ‘Led’ and detector id ‘Pin’. At the source, electrical pulses generated by
computer or electronic devices, is converted into light by ‘Laser’ or ‘Led’ which flows
from fiber optics in the form of light. At the destination, the light rays are again converted
into electrical pulses by ‘Pin’. It doesn’t have any danger of leakage and electrical
interference. So it can be used in any environments like under big factories, grounds or
airports .It has the highest bandwidth and the highest speed in comparison to any other
media and is most expensive than other media.
Satellite: - Satellite acts as relay station for communication signals. The satellite accept
data and signals transmitted from an earth station, amplifies them and then retransmit
them to another earth station.
History of Internet
The US department of defense laid the foundation of the internet roughly 30 years ago
with a network called ARPNET (Advance Research Projects Agency Net). During the
1970’s work an ARPANET consisted of connecting the various networks and developing
the necessary internet software. During the early 1980’s the network became known as
the internet and it was during that period that business firms began using it but the
general public started using internet after the development of world wide web in the early
1990’s. In 1993 there were only 130 websites all over the world now there are millions of
websites all over the world.
What is Internet? What are the uses of internet?
Internet is not just like one network, it is a coordinated union of a multitude of networks
all over the world or we can say internet is the world largest computer networking, the
network of networks. Internet is global LAN where millions of computers are connected
to each other. any computer user on internet can contact another user on the internet
anywhere in the world, very much like telephone user communicates with another user
Computer and IT application
Page 4
anywhere in the world. Internet is an information superhighway and has seemingly
compressed the world into a cyber colony. Internet is available to anyone who wants to
use it. A majority of internet users are college students, businessmen, professionals etc
and accessing internet has become a way of life.
Uses of Internet
1. We can exchange e-mail with millions of people with e-mail
address in the internet.
2. We can get information about people, products, organizations
and many other things from the internet.
3. We can get search facilities in the internet (such as- google.com)
by the help of which we can search lots of information regarding
any topic within a second.
4. We can send or receive data files, programs, images, sound, and
animation through the internet from very distant places.
5. We can sell or buy products and services through the interent(
Such as E-commerce, E-business)
6. We can give information about our organization and institution
by launching homepage and keeping in the internet which let the
other people around the world to know.
7. We can conduct surveys; get opinions of people around the
world on particular topics through the internet.
8. We can learn or we can do courses through the internet, we can
give online exam through the internet such as MCSE(Microsoft
Certified System Engineering), OCP (Oracle Certified
Professional) etc
The important thing to realize is that the internet permits almost
anything but our imagination is the only limit.
What are the different types of Networking?
Networking is categorized according to the size of network, speed of data transmission,
distance covered, technology used, architecture used, structure of the network etc. There
are three types of Networking, they are:a) LAN (Local area Network):- A LAN connects network devices over a relatively
short distance. A networked office building, school, or home usually contains a
single LAN, though sometimes one building will contain a few small LANs
(perhaps one per room), and occasionally a LAN will span a group of nearby
buildings.
The media (e.g., wire) used in LAN must be of the same type and the protocol
used in it is generally same. It is simpler and cheaper than any other networking
system. Major advantage of this system is the security provided because no any
outsider’s can’t access the resources of a private network. Major disadvantage of
this system is that it can’t cover more than few kilometers
Computer and IT application
Page 5
b) Metropolitan Area Network - a network spanning a physical area larger than a
LAN but smaller than a WAN, such as a city. When LAN grows and spreads in
area then it becomes MAN. It is called metropolitan network because it is
extended up to a city or a larger geographical area. MAN is typically owned and
operated by a single entity such as a government body or large corporation. In this
system different communication media can be adopted and different types of
protocols can be used. Instead of using guided media (e.g. wire), it can use
unguided media (e.g. wireless media). It has more flexibility than the LAN has
many advantages over LAN but has very high chances of data leakage or security
break.
c) WAN:-It is the network that is extended to a large area (e.g. throughout the world
or even more) and the communication is done through satellite. A WAN is a
geographically-dispersed collection of LANs. A network device called a router
connects LANs to a WAN. In IP networking, the router maintains both a LAN
address and a WAN address. A WAN differs from a LAN in several important
ways. Most WANs (like the Internet) are not owned by any one organization but
rather exist under collective or distributed ownership and management. It is the
combination of many different types of LAN and MAN networks, so it has
massive amount of heterogeneous systems(e.g. operating systems, devices,
hardware, topologies, protocols, transmission media etc). Instead of centralizing
the transmitting devices in a particular location such devices are distributed in
different parts of the world. The largest WAN in existence is internet.
Other types of networking are:



Wireless Local Area Network - a LAN based on WiFi wireless network technology
Campus Area Network - a network spanning multiple LANs but smaller than a
MAN, such as on a university or local business campus.
Storage Area Network - connects servers to data storage devices through a
technology like Fibre Channel.
System Area Network - links high-performance computers with high-speed
connections in a cluster configuration. Also known as Cluster Area Network.
Difference between LAN and WAN
LAN ( Local Area Network
1. LAN are smaller networks, usually
within an office base
2. The distance between the nodes is
limited in LAN, there upper limit of
3 km or less and lower limit of 2m.
3. The data rate speed of LAN
normally operate at 1to 100 mbps
Computer and IT application
1.
2.
3.
4.
WAN(Wide Area Network)
WAN, or wide area networks, are
broader geographic networks
WAN can spread throughout the world
covering 1000s of kms
WAN normally operate at the speed of
1 to 4 mbps
In WAN error rate is higher than LAN
Page 6
4. In LAN error rate are much lower
in comparison to WAN
5. Transmission media used in LAN
are generally wired media (wireless
LAN also exists such WiFi) using
coaxial cable, fiber optic cable.
6. LANs are owned by single
organization.
7. LAN is operated at low cost
5. WAN uses satellite and wireless media
for transmission media.
6. WAN is owned by multiple
organizations.
7. WAN is operated at high cost
Explain different types of Networking Architecture
There are two types of networking architecture, they are
1) Peer-to –Peer architecture (Point-to Point)
2) Client-Server architecture (Broadcasting)
Peer-to –Peer architecture (Point-to Point):In peer-to-peer architecture, computers are connected individually in pair (one-to-one
connection). When the computer A wants to send message to computer C then it must be
passed through B, when packet reaches to computer B it first of all matches the receiver
address attached with the message to its own address. If it matches, then only accepts the
message otherwise it discards it and forwards to the computer C. When the
communication is being done between any two computers, then other channels remain
free. So, there is not so much problem of traffic. As we have seen that each of the
computers get equal priority and each behave like a server on one time and the same
becomes client in other time.
Client- server architecture:It is also called broadcasting architecture, in this architecture computers are connected to
a central device and communication is done through it. When computer A wants to send
message to computer C then message is sent to the central device. The message is first of
all received by the server and the message is broadcasted by the server. All the computers
attached to the network receive such packet; each of them read the receiver’s address and
compares their own address with the address written on the packet. If it matches, then
only the computer accepts it otherwise the packet is discarded or rejected. So in this case,
computer C address matches with the packet address, so computer C accepts, other
computer discard it. In this architecture server is always fixed which control all other
computers and the communication is done through server. All other computers are called
clients. The big disadvantage of this architecture is high traffic problem created by
broadcasting, because at the time of broadcasting, all the computers remain busy. Its big
advantage is its speed.
Computer and IT application
Page 7
Protocol:
Protocols are the rules of transmission. As we know that for a transmission of
data/information to be successful, each of the devices/computers attached to both ends
must speak the same set of languages, must have same set of devices and same types of
software. But practically it is impossible in this distributed world. To overcome this
limitation, certain set of rules which are common and acceptable by both the parties are
developed which play a role of interpreter between the sender and the receiver, which is
known as protocols.
For example: - TCP/IP, SMTP, HTTP etc
Intranet: Intranet is also network of networks. But it is not public it is private network group
and owned by a particular organization, only those persons who are authorized and
authenticated users of that organization can only use this net.
Intranet is based on internet technology to build information system
with an organization or enterprise. It also uses the same protocols as used by the internet
(HTTP, TCP/IP). It inherits all the features of Internet. It is useful for promoting
business, education etc. If permission is given to access intranet from remote location
then it is termed as extranet.
What is network topology? What are the different types of LAN topology? Explain
ANS: - The physical layer of local area network is called network topology. In other
word network topology is the logical way of explaining how computer are connected to
each other and shows physically how they are linked. The major goal of network
topology is to find out the most economical and efficient way to connect all the users to
the network.
There are all together six types of LAN topology, they are as follows:a) Bus Topology
b) Star Topology
c) Ring Topology
d) Tree Topology
e) Mesh Topology
f) Hybrid Topology
a) Bus Topology: - This is the most popular topology. In this topology a single
cable is connected with each computer. The single cable at the middle of all the
computers is called ‘Bus’ from which other nodes are connected by some
connectors and that node is connected on the LAN port of each computer. In this
topology server is located on either side and a terminator is located on other side
of the bus. It is based on broadcasting architecture
Advantage of Bus Topology
 It is relatively easy to install and extend the network
 If any of the computers in network is down, then other computers can
continue their work
Computer and IT application
Page 8
 It is more flexible because we can connect any number of computers by
using a connector in the bus
 It is not expensive to install
Disadvantage of Bus Topology
 Data traffic is high in this topology because it is based on client/ server
architecture
 Data collision is high
 If the backbone cable fails the entire network is unusuable.
 Finding out fault and troubleshooting is hard
b) Star Topology:In this topology a central connecting device known as ‘Hub’ connects
all the computers in the network to each other, which is connected to a powerful central
computer known as server. It is based on client/server architecture.
Advantage of Star Topology:
 It is flexible because in this topology it is easy to add computer and
remove existing one.
 In this topology it is easy to diagnose fault because of the use of ‘Hub’
 In this topology if any of the computers in the network is down, then other
computers can carry out their functions as usual
Disadvantages of Star Topology
 In this topology if the server or hubs fail it makes the whole system
unavailable.
 In this topology cost of cable is more because all the cable from all the
clients must be connected to the server through hub
 It is based on client/server architecture so in this topology data traffic is
high
c) Ring Topology:In this topology each computer is connected in a circular structure.
Each computer is connected to other two computers in either side. It is based on point to
point or peer to peer architecture
Advantage of Ring topology
 There is no dependence on the central server. So, each computer is capable of
acting as server as well as client.
Computer and IT application
Page 9
 Since data travels in one direction, there is less chance of collision and there is
less chance of data- traffic.
 Every computer has equal access facility to the resources.
Disadvantage of Ring topology
 Failure of any one of the computer on the network makes the whole network
down
 Very hard to find out the errors and troubleshooting
 Non- flexible because adding new computer on the network and removing
existing computer is very hard
d) Tree Topology:
The tree topology arranges computers and links into distinct hierarchical structure
in order to allow greater control and easier troubleshooting. A computer acting as a
server in upper level can act as client in lower lever. It minimizes traffic drastically
because broadcasting is done only within one level. Data and traffic can flow from
up to down or vice versa. If any of the computers is down, then it affects only those
computers which are under its control.
Advantage of Tree topology
 The tree topology is flexible to extend and reduce.
 The failure of the leaf node does not affect the whole network.
Disadvantage of Tree topology
 Failure to any of the hierarchical node will cause the failure to the network
on that node.
 The performance of the root node and other hierarchical nodes will affect
the performance of the network.
 It is not easy to install.
 It is not easy to troubleshoot the network problem.
e) Mesh topology:
Mesh topology arranges all the computers where each of the computers is connected
to all computers .If any of the computer is down then other computer can still
continue to work. It is very much complex and troubleshooting much harder.
Advantage of Mesh topology
 Because of the multiple paths to reach the nodes the failure of any node will
not affect the operation of the entire network.
 There is no traffic problem as it has multiple paths.
Disadvantages of Mesh topology
 It is very complex network and is difficult to find the faults and troubleshoot
problems.
 A lot of network cable is needed, so it is costly.
 It is difficult to install and extend the network.
Computer and IT application
Page 10
f) Hybrid topology:
Hybrid topology is the combination of two or more topologies together. It has
advantages of more than one topologies as well as disadvantages, too
What are the different networking devices? Explain each of them in brief.
ANS:The different networking devices are Hub
 Bridge
 Repeater
 Router
 Modem
Hub:
Hub is a device with multiple ports for connecting different computers on the network.
Usually, each file servers has only one NIC. Therefore, it would be impossible to
connect every workstation directly to the file server. To solve this problem, LANs
use hubs, which are very common networking devices. So, it has the following
properties:
 It operates on Physical layer of OSI model
 It accepts data, amplify them and then transmit
 It is used to split network segments and propagate signals through it.
 It does not need path determination and switching
Its big disadvantage is that it can’t filter network traffic and it imposes limitation to the
number of computer that can be connected
Bridge:
It is a device, which connects different network segments and passes data with the same
communication protocols. It is the connecting device between two or more hubs. Some of
the characteristics are:
 It operates at layer 2 ( Data Link) of OSI model
 It reduces unnecessary traffic problem by controlling broadcasting
 Bridges are more intelligent then hubs because they maintain MAC address tables
in them and forward data looking on it.
 Bridges collect and pass packets between 2 network segments
Repeater:
It is another network connecting device. It increases the distance over which a
network can extend. For example, using a category 5 twisted pair cable, we can send
data up to maximum of 100 meters only without amplification. If data travels beyond
that distance without amplification, then it becomes weaker and after some time the
Computer and IT application
Page 11
signal will be destroyed. A repeater provides solution for such problem. Some of the
characteristics of repeaters are:
 It operates at layer-1 (Physical layer) of OSI model
 It receives signals, amplifies them and sends it.
 If the signals are weakened because of long wire, then repeater can amplify,
clean the signal and we can increase length of cable.
Router:
It is also a type networking device which are used to connect separate network and to
access internet. It is similar to Bridge in many ways
Some of the characteristics of routers are:
 It operates at layer -3 (Network layer).
 Router finds the shortest and the best path to forward data between different
paths available
 It use IP address for accessing and forwarding data packets
 It is just like bridge or hub but provides more functionality and is more
intelligent
Modem (modulator and demodulator):
It is a device that interprets digital and analog signals
enabling data to be transmitted over voice-grade telephone lines. At the source, digital
signals are converted to a form suitable for transmission over analog communication
facilities At the destination, these analog signals are returned to their digital form It is
used in multimedia, networking and internet to transmit data(text ,data ,voice, picture
etc) from copper wire because copper wire can transmit only analog signals but the
signals produced by a computer is digital.
In other words modem is a device which has responsibility of
modulating (coding) the data before transmission and demodulating (decoding) the
same data with the same rule at the receiving end.
Analog and digital signals
A signal is called analog signal if the signal is continuously varying with respect to
time. The example of analog signal is the voice signals, music signals, human voice,
temperature etc. A signal is called digital signal if the signal is discrete or
discontinuous. Digital signals are the language of modern day computers. Digital
signal is represented only by digits that are 1 and 0.The examples of digital signal are
the digitized audio and video signals stored in media such as CD/DVD. The digital
signaling has more advantages than analog signaling. The advantage of the digital
signaling is that it is cheaper than analog signaling and is more tolerant to noise
interference.
Modulation:- Modulation is a technique used in transmission of a signal. It is the
process used to describe how the digital signal is changed so it can be transmitted
across the analogue link. Modulation can be amplitude, frequency or phase
modulation depending on the fact that whether the amplitude, frequency or phase has
been changed.
Computer and IT application
Page 12
Types of modulation:Amplitude modulation:-The modulation which is suitable for low speed
transmission is called amplitude modulation.
Frequency modulation:-The modulation which uses two carrier signals. High
frequency signals for high and low frequency signal for low is called modulation.
Phase modulation:-The modulation that uses a single carrier frequency and alters the
phase of the carrier is called phase modulation.
Define Direction of communication flow
Depending on the direction of flow of signals during the communication, mode of
communication can be divided into three types. They are:-simplex, half duplex
and full duplex.
Simplex communication:- when data flows in only one direction from sender to
receiver, then the communication flow is known as simplex communication. For
example:-radio and television broadcast.
Half duplex Communication:-When data flows in both the direction from sender
to receiver and receiver to sender, but the transmission is one way only at a time,
then the communication flow is known as half duplex communication. When the
sender is transmitting the signal, the receiver can’t transmit back to the source at
the same time. For example:-Talking with friends using landline or mobile phone,
sending fax etc.
Full Duplex Communication:When data flows in both the direction from sender to receiver and receiver to
sender simultaneously then the communication flow is known as full duplex
communication. For example:-email and web chatting etc.
Define protocol. What are the different types of protocol?
Protocol
Protocols are the rules of transmission. In other words protocol is a set of rules which is
used by computer to communicate with each other across the network. As we know that
for a transmission of data/information to be successful, each of the devices/computers
attached to both ends must speak the same set of languages, must have same set of
devices and same types of software. But practically it is impossible in this distributed
world. To overcome this limitation, certain set of rules which are common and acceptable
by both the parties are developed which play a role of interpreter between the sender and
the receiver, which is known as protocols.
The different types of protocols are as follows:a) IP ( Internet Protocol)
b) TCP ( Transmission Control Protocol)
c) UDP (User Datagram Protocol)\
d) HTTP( Hypertext Transfer Protocol)
e) FTP( File Transfer Protocol)
f) SMTP ( Simple Mail Transfer Protocol)
g) Telnet( Terminal Network)
h) POP ( Post Office Protocol)
Computer and IT application
Page 13
a) IP (Internet Protocol):- It is a protocol defined in the internet layer of the
TCP/IP protocol suite. The main task of IP is the best effort delivery of the
packets. It is responsible for moving packet of data from node to node. IP
forwards each packet based on a four byte destination address (the IP number).
The Internet authorities assign ranges of numbers to different organizations. The
organizations assign groups of their numbers to departments. IP operates on
gateway machines that move data from department to organization to region and
then around the world.
b) TCP (Transmission Control Protocol):- It is one of the main protocol of the
internet protocol suite. The function of TCP is the reliable, ordered delivery of
stream of bytes from a program on one computer to another computer. It is
responsible for verifying the correct delivery of data from client to server. Data
can be lost in the intermediate network. It adds support to detect errors or lost data
and to trigger retransmission until the data is correctly and completely received.
c) UDP (User Datagram Protocol):-It is one of the core members of the Internet
Protocol Suite, the set of network protocols used for the Internet. It is a simple
OSI transport layer protocol for client/server network applications based on
Internet Protocol (IP). UDP is the main alternative to TCP and one of the oldest
network protocols in existence, introduced in 1980. It is often used in
videoconferencing applications or computer games specially tuned for real-time
performance. It is useful in applications where reliability is not a major concern
but speed is a major concern.
d) HTTP (Hypertext Transfer Protocol):- It is one of the popular application layer
protocols which specify the rules for the interlinked documents called hypertext
documents which contain text images, videos and other multimedia contents.
HTTP is the foundation of data communication for the World Wide Web. The
standards development of HTTP has been coordinated by the Internet
Engineering Task Force (IETF) and the World Wide Web Consortium (W3C).
The HTTP protocol is designed to permit intermediate network elements to
improve or enable communications between clients and servers.
e) FTP (File Transfer Protocol):- It is a reliable and secure file transfer protocol
which requires user to log into the system before file transfer. It helps us to upload
the files to the websites which we are maintaining. Transferring a file require two
participants – FTP client program and FTP server program. FTP client program
run in our computer and FTP server program run on the server computer.
f) Telnet (Terminal Network):-Telnet is the internet tool or protocol that let us
travel from our own workstation out into cyberspace to land on another computer.
Telnet is useful for the remote administration of internet hosts over the internet.
g) SMTP (Simple Mail Transfer Protocol):- It is specified for outgoing mail from
one email server to another. The SMTP is extended to send other type of
information such as text, picture, and video and other multimedia program and
data files.
Computer and IT application
Page 14
h) POP (Post Office Protocol):- It is used to receive email from a remote mail
server. It is designed to support offline mail processing. Using POP mail is
delivered to a central server and the user uses a mail program like Eudora,
outlook, Netscape Messenger etc that connects to the server and downloads all of
the new emails to the users own computer.
Operating System
How do you define operating system? What are the different functions of operating
system?
Ans: - Operating System is an organized set or collection of software programs that
control the overall operation of the computer system.
In other word operating system is a program which controls the
hardware and establishes the coordinated relationship between hardware and other
software
We can also say operating system is a system oriented software
programs which acts as an interface between a user and the hardware (i.e. all computer
resources)
An operating system control the way in which the computer system
functions. The operating system performs the following function:1) It provides the platform to install application software into the computer
2) It co-ordinates or control the input and output devices such as monitors, printers ,
disk drives
3) Protect data, hardware and software from improper use
4) It raises the interrupt and handle the interrupt as and when requires
5) It provides access to compilers or interpreters to translate programs from high
level language into machine languages
6) It manages the memory carefully. The part of the operating system that manages
the memory is called memory manager.
7) It manages the resources efficiently (for example hard disk, printer)
8) It provides long term storage of user information in the form of files and folders
by creating table of each file and folders in the storage device. For example FAT
in DOS, NTFS in Windows and ext3 in Linux.
9) It maintains authority over files by allowing different types of access permission
and priority.
10) It provides a continuous job processing sequence by scheduling and loading of
programs and sub programs.
11) It loads different jobs into the memory in a very efficient manner using a paging
mechanism
12) It provides data security so that one program isn’t allowed to capture the program
or data space of other program. (For that it maintains the boundary of each job in
the memory and each jobs are allowed to run only in that boundary)
13) It interprets commands and instructions given by the user.
Computer and IT application
Page 15
14) It records the entire event that happen in the computer system which is useful for
tracing the past records and troubleshoot (problem detection and correction) if
something goes wrong known as event logging.
What is the difference between GUI and CUI (command user interface or text based
interface or control user interface) Explain the advantage of GUI over text based
interface
Ans:- Graphic user interface is defined as the interface of computer with users which
provides the users with facilities of pull down menus, pointing devices, drag and drop
features, clicking and double clicking of mouse, taskbar buttons , check box buttons ,
multimedia facilities etc . In graphic user interface user can select and run the program by
using mouse pointer, copy files and folders from one location to another location simply
by dragging and dropping and interaction normally take place with the help of dialogue
boxes
For example: Window ( Window 95, Window 98 , Window ME , Window 2000,
Window XP, and the latest one Window Vista )
Command User interface (Control user interface): It is defined as the interface in
which the user must interact with computer by typing command in the keyboard
Example:- MS- DOS
Advantage of GUI over Text Based Interface
Graphic User Interface(GUI)
CUI ( Command User Interface or Text
Based Interface or Character User
Interface)
1) The appearance of GUI is very
attractive
2) It is more efficient than CUI
3) In GUI we can work with pointer
and pointing device which is much
easier
4) It is easier to remember the graphic
symbol
1) The appearance of CUI is not
attractive
2) It is not as efficient as GUI
3) In CUI we must enter or type the
command using Keyboard so we
must remember all the commands
4) It is almost impossible to know or
remember all the command of CUI
5) It is easier for new user to work in
GUI
6) In GUI we can have a facilities of
multimedia and internet
5) It is very difficult for new user to
work in CUI. They have to
remember all the commands which
is much more difficult
6) In CUI we don’t have a facilities of
multimedia and internet
7) In GUI every interaction is done
7) In CUI every interaction is done
Computer and IT application
Page 16
through dialog boxes
8) In GUI we can have DOS program
9) GUI supports multiprogramming
facilities or In GUI more task can
run simultaneously
10) It is user friendly
11) Require more memory
12) Application written for GUI are
device independent
13) More threat of virus in GUI
14) 9) Example: Window 98, Window
XP etc
through typing commands
8) In CUI we don’t have Window
program
9) CUI does not have
multiprogramming facilities or In
CUI one task run at a time
10) It is not user friendly as GUI
11) Require less memory
12) Application written for CUI are
device dependent
13) No threat of Virus in CUI
14) Example:- DOS,UNIX etc
What are the different types of operating system? Explain each of them in brief.
Ans: - The different types of operating system are as follows:1. single user operating system
2. Multi-user operating system
3. Multitasking operating system
4. Real- time operating system
5. Multiprocessing operating system
6. Timesharing operating system
7. Batch operating system
8. Distributed operating system
9. Networked operating system
1. Single user operating system: - single user operating system is the
one in which one user can work at one time. A single user operating
system provides access to the computer system by a single user at a
time. It another user wants to use the computer he or she must have to
wait till the current use finish the job. Example- DOS
2. Multi-user operating system: - A multi-user operating system is such
system where more than one user use the computer system at one time
access to the computer system is normally provided through network.
example: UNIX, Linux etc
3. Multitasking operating system: - A multitasking operating system is
such system through which we can run more than one task (program)
at once .It means multitasking operating system let the user run more
than one task at once. Suppose we can run word, we can print the
document; we can play the song at one time using such system.
Example :- Window XP, Window 2000, Window vista etc
4. Real-time operating system: - Real time operating systems are those
systems which are used by such program which require very fast
response time. The execution time is the most critical issue in the real
time operating system and they must finish the execution of job within
Computer and IT application
Page 17
pre-defined time-boundary. They are used to control machinery,
scientific instruments and industrial systems. Real time operating
system typically has very little user-interface capability, and no enduser utilities. A very important part of an Real time operating system is
managing the resources of the computer so that a particular operation
executes in precisely the same amount of time every time it occurs In
other word we can say that real time operating system are on-line
system that respond to input immediately which is given by the user.
It is a multitasking operating system that aims at executing real-time
applications. Example:- the program which require real time operating
system to get install and run are missile guiding system, medical
monitoring system , flight simulation system etc
5. Multiprocessing operating system: - Multiprocessing operating
system is such system which runs on the computer having more than
one processor. This operating system simultaneously executes two or
more jobs at single time. It contains two processor so the controlling
mechanism of this operating system is more complex. A
multiprocessing operating system is a computer hardware
configuration that included more than one independent processing
unit. Example- UNIX
6. Time sharing operating system:-This is such type of operating
system in which processor time is divided into small units called time
slices and shared in turn between users to provide multi-access. Time
sharing refers to sharing a computing resource among many users by
multitasking. The idea of multiprogramming was further used in time
sharing system .The operating system is responsible for switching
between the jobs in such a way that every terminal feels that it is
occupying the entire computer resources. Another important concept
in time sharing system is priority, interrupt and input and output
management. Important jobs can be given high priority so as to
execute it fast.
7. Batch operating system:-Batch processing operating system allowed
running only one program at a time. Batch processing operating
system works as series of programs which are held in a queue. The
jobs with similar requirements were batched together and run as a
group is called batch processing. This is one of the oldest operating
system .it was designed in mid 50’s and mid 60’s. In this type of
operating system the job (data +program) is not processed until all the
data is fully input. The jobs are stored in a disk in batch in a queue and
run one or more at one time under the control of the operating system.
A job may wait in a batch queue for minutes or even for hour
depending upon the load on the system. Before it could begin to
execute the job it need to read the deck of the card. (data was punched
in the punched card) So, CPU and the peripherals remained idle most
of the time.
Computer and IT application
Page 18
8. Distributed Operating System: An operating system that manages a
group of independent computers and makes them appear to be a single
computer is known as a distributed operating system. The development
of networked computers that could be linked and communicate with
each other, gave rise to distributed computing. Distributed
computations are carried out on more than one machine. When
computers in a group work in cooperation, they make a distributed
system. Some truly distributed systems have dozens of servers around
the globe. If traffic is high in any server the job is transferred to other
server known as load balancing.
9. Network operating system:-A network operating system (NOS) is a
computer operating system that is designed primarily to support
workstation, personal computer, and, in some instances, older terminal
that are connected on a local area network (LAN). Most of the network
operating system works under the principle of Client-server
mechanism. Client server is a mechanism in which co-operation and
intercommunication between various elements of network takes place
and one machine serves others for various functions. In this operating
system user doesn’t have to sit in front of machine in which he or she
wants to work on. A network operating system provides printer
sharing, common file system and database sharing, application
sharing, and the ability to manage a network name directory, security,
and other housekeeping aspects of a network.
10. Embedded Operating System: Computer system that performs a
dedicated function or is designed for use with a specific embedded
software application is called embedded system such as micro wave
ovens, robots, TV sets, router, digital cameras, washing machine,
mobile phones, ATM machine and other automatic digital equipments
etc.The operating systems designed for being used in embedded
computer systems are known as embedded operating systems. They are
capable of operating with a limited number of resources. They have
some characteristics of real time operating system but also have size
memory and power restrictions that make them special. Unlike, a
desktop operating system, the embedded operating system does not
load and execute application. This means that the system is only able
to run a single application. Examples of such operating system are
Windows CE, Palm OS, Free BSD, Minix3, Window ES, and Router
OS etc.
History of Operating Systems
Operating systems have evolved through a number of distinct phases or generations
which corresponds roughly to the decades.
Computer and IT application
Page 19
The 1940's - First Generations
The earliest electronic digital computers had no operating systems. Machines of the time
were so primitive that programs were often entered one bit at time on rows of mechanical
switches (plug boards). Programming languages were unknown (not even assembly
languages). Operating systems were unheard of.
The 1950's - Second Generation
By the early 1950's, the routine had improved somewhat with the introduction of punch
cards. The General Motors Research Laboratories implemented the first operating
systems in early 1950's for their IBM 701. The system of the 50's generally ran one job at
a time. These were called single-stream batch processing systems because programs and
data were submitted in groups or batches.
The 1960's - Third Generation
The systems of the 1960's were also batch processing systems, but they were able to take
better advantage of the computer's resources by running several jobs at once. So
operating systems designers developed the concept of multiprogramming in which
several jobs are in main memory at once; a processor is switched from job to job as
needed to keep several jobs advancing while keeping the peripheral devices in use.
For example, on the system with no multiprogramming, when the current job paused to
wait for other I/O operation to complete, the CPU simply sat idle until the I/O finished.
The solution for this problem that evolved was to partition memory into several pieces,
with a different job in each partition. While one job was waiting for I/O to complete,
another job could be using the CPU.
Another major feature in third-generation operating system was the technique called
spooling (simultaneous peripheral operations on line). In spooling, a high-speed device
like a disk interposed between a running program and a low-speed device involved with
the program in input/output. Instead of writing directly to a printer, for example, outputs
are written to the disk. Programs can run to completion faster, and other programs can be
initiated sooner when the printer becomes available, the outputs may be printed.
Another feature present in this generation was time-sharing technique, a variant of
multiprogramming technique, in which each user has an on-line (i.e., directly connected)
terminal. Because the user is present and interacting with the computer, the computer
system must respond quickly to user requests, otherwise user productivity could suffer.
Fourth Generation
With the development of LSI (Large Scale Integration) circuits, chips, operating system
entered in the system entered in the personal computer and the workstation age.
Microprocessor technology evolved to the point that it becomes possible to build desktop
Computer and IT application
Page 20
computers as powerful as the mainframes of the 1970s. Two operating systems have
dominated the personal computer scene: MS-DOS, written by Microsoft, Inc. for the IBM
PC and other machines using the Intel 8088 CPU and its successors, and UNIX, which is
dominant on the large personal computers using the Motorola 6899 CPU family.
Disk Operating System
1) DOS (Disk operating system):- DOS is a set of control programs which manages the
computer’s resources and creates a well defined software environment for applications. It
is an operating system which was written to control hardware. Word perfect, LOTUS,
dbase, TURBO C/C++ etc are softwares which run under DOS. There are two types of
DOS commands. They are:a) Internal DOS commands
b) External DOS commands
a) Internal DOS commands:- Internal commands are built in the COMMAND.COM file.
It can be executed from any DOS prompt because each of the internal commands are
memory resident. As long as the computer is running, we are ready to give internal
commands. Example of internal commands are:- DIR, CLS, COPY, REN, DATE etc.
b) External DOS commands: - External commands are on the disk as separate program
files. Therefore they must be read from disk before they are executed. They are
comparatively slower in execution than internal commands. Example of external
commands is: - TREE, FORMAT, LABEL etc.
2) Booting:- Loading of system files into the memory of computer and to initialize every
hardware components of the computer system is called booting. There are two type of
booting. They are:- cold booting and warm booting
i)
Warm boot:- restarting of the computer using reset button, restart
option or ctrl+alt+del key is called warm boot.
ii)
Cold boot:- Starting of the computer from power off state to power on
state is called cold boot. Cold boot can be performed by switching on
the computer.
Algorithm of Booting
Step1: Trun on the computer
Step2: ROM is activated and the BIOS is loaded
Step3: POST (Power on self test)
Step4: Boot records load the initial system files (IO.SYS) into RAM from disk
Step5: Then the computer gets start
File:- A file is a collection of related information. It has a name with the extension that specifies
type of file. Executable files are also called program files and often have extension like .EXE and
.COM. Example: practical.doc where practical is a file name and .doc is an extension.
Directory: - A directory is a table of contents of files, directories and sub- directories. Directory
name may or may not have extension. Directory contains information about all files stored on a
disk. A sub directory is a directory within directory. Number of sub directories can be created on
the disk, but the basic directory on the disk is always the main directory called the root directory
and sub directory can be sub divided into a more sub directories, each divided from its parent
directory by a backslash. Command: DIR, it is use to display files, directories and subdirectories.
Computer and IT application
Page 21
Batch file:- A batch file is a file in which series of DOS commands are saved and they are
executed one after another. A batch file is an unformatted text file that contains one or more
commands and has a .bat or .cmd file name.AUTOEXE.BAT is a file which is executed during
the startup of a computer.
What are the advantages and disadvantages of MS-DOS?
Advantages:
1.
2.
3.
4.
5.
6.
7.
It will run on a much smaller system. (entire OS can be placed in a single modern
ROM chip)
Gives you more "direct" control of the processes.
Because of smaller size it will boot much faster than any windows version.
It is cheap and free if you go on the internet.
Very fast even on a relatively slow machine.
It supports different disk like floppy, hard disk,CD etc
It is single user operating system but can work on Local Area Network using
Novel software
Disadvantages:
1. It is single user, single tasking operating system
2. It does not support advanced application software
3. Very few "new" programs available, therefore you need to be able to write
programs in many cases.
4. Not nearly as fancy in the graphics department.
5. Not compatible with current "browsers" and most internet.
6. It is not so user friendly like windows system and cannot support advance
computer peripheral devices even mouse.
Computer and IT application
Page 22
UNIT 2
Programming Language
(Introduction, Generation of Programming
Language, Flowchart and Algorithms)
Computer and IT application
Page 23
Introduction
A Computer cannot perform any job or task without program. A Computer is a dead
machine without program. So to make it live and working it requires a program. Like
operating system is needed to initiate or boot computer and application software is
needed to perform various tasks.
A program is a set of instruction written sequentially and in a
logical way to tell the computer to do a specific task or to solve a given problem. The
process of developing a program is called programming and the language that is used to
develop the program is called programming language also who does a programming is
called programmer.
The language which is used to have communication between machine and human being
is called programming language.
Programming concept:The thorough understanding regarding the entire process of development of programs
is called programming concept. It includes the overall understanding and application
of different computer programming languages, compiler, interpreter, control
structures program design tools, syntax, semantic, programming techniques and
different stages involved in a program development.
Explain Machine language, Assembly language, High level language with their
advantage and limitation (disadvantage)
Machine language: - The language which is called the language of CPU and which is
written in binary code (composed of 0 and 1) is called Machine language. In this
language computer can understand every instruction only in the form of 0 and 1 . All the
valid computer operation are performed in terms of binary operation
Example: - If we want to write and instruction
“Add 2 and 3 “then we have to write “01100001 (ADD) 00000010 (2) 00000011(3)”
Assembly language:- The language in which program is written in short codes like
ADD, MUL or SUB instead of writing instruction in binary number (0 and 1) is called
assembly language. It is also called low level language. Assembler converts the assembly
language to the machine language to make it understandable by computer hardware
because computer can understand the instruction written only in binary form. It is not
user friendly language. This language is also processor dependent language. A Program
written for Intel processor does not work in Motorola processor. Computer viruses are
mostly written in assembly language
High Level Language: - The languages which are quite similar to written English and
are therefore very easier to use in compare to machine language and assembly language is
called high level language. Program written in high level language is translated into
machine language by a program is called compiler or interpreter (first this program
checks the program’s syntax if it is free from errors translator translates into an
equivalent code). High level languages are machine independent language i.e. the
Computer and IT application
Page 24
program written for Intel processor easily run on Motorola processor. It is very easy to
understand. It is user friendly language. It is a problem oriented language.
Advantage of assembly language
1) Assembly language is easier to understand as compared to machine language
2) It is easier to modify as compared to Machine language
3) Chances of error is less than machine language
4) In Assembly language program execution time is faster than program written
in high level languages
5) It is easier to understand as compared to machine language
6) We do not need to take care of storage location of data and instruction while
writing program in assembly language
Limitation/Disadvantage of Assembly language
1) It is a processor(Machine dependent language )
2) Since it is a Machine dependent language it requires the knowledge of
hardware also while writing program is assembly language
3) There is one to one correspondence between the assembly language and
machine language instruction
Advantage of machine language
1) The program written in machine language does not need any translation
2) Though it is very difficult to write program in machine language but the program
written in machine language runs faster than any other program
Disadvantage/ Limitation of machine language
1) Machine language is machine dependent. The program written for one processor
cannot be run in another processor i.e. a machine code of intel processor doesn’t
work for Motorola processor
2) Machine language has to be written in the form of 1 and 0. So it is very difficult
to do program in machine language
3) Chances of error is high while writing program in machine language
4) It is very difficult to debug the program written in machine language
Advantage of high level language
-
High level language is machine independent language. So it is portable ( ie
program written in one processor easily run on another processor
A program written in high level language is easier to learn because it is similar to
English language
It is user friendly language
Chance of error is less and it is very easy to debug
Programming in high level language requires less time and effort as compared to
low level language.
Computer and IT application
Page 25
Limitation/ disadvantage of high level language
1) The program written in high level language in less efficient as compared to the
program written in assembly and machine language because it require more
memory and more time to execute.
2) The task related to the computer hardware can be programmed or handled only
by either machine or assembly language so for these purposes high level
language cannot be used
Differentiate between compiler and Interpreter
Compiler
i)
ii)
iii)
iv)
v)
vi)
vii)
Interpreter
It translates a complete high level
language program into machine
language at once
It finds the syntax errors after
compiling the whole program
i)
The compiling process is faster
than interpreter.
It creates the object code after
compiling the whole program
iii)
Debugging process is complicated
in compiler
Compiler demands more resources
(memory, CPU time etc) than
interpreter.
Example:- C, C++, Visual Basic,
java etc
v)
ii)
iv)
vi)
vii)
It translates high level language
program into machine language
line by line.
It finds the syntax errors after
translating each line of the
program.
The interpreting process is slower
than compiler.
It creates the object code after
translating each line of the
program.
Debugging process is easy in
interpreter.
Interpreter requires low resources.
Example:- BASIC,
GWBASIC etc.
QBASIC,
What do you mean by 4GL? Give example
Ans: - The language which works at a higher level than normal high level languages such
as COBOL, Pascal, C, and C++ is called 4GL language. These are result oriented
language and have heavy data processing and query capability. 4GL permits programs to
be constructed using short English like easily understood and easily remembered
commands. 4GL programs are also needed to be translated either by compiler or
interpreter. There are inbuilt and ready to use GUI-objects like forms, command buttons,
radio buttons reports etc. 4GL are dedicated for some particular application development.
Example of 4Gl is oracle, MS-SQL, Sybase etc
what are the advantage of 4GL?
Ans: - The advantages of 4GL (Fourth generation language) are as follows:1. One line of 4GL code is equivalent to many lines of 3 GL code
2. System development is faster
Computer and IT application
Page 26
3. Program maintenance is easier because the program source code is smaller
4. Program developed in 4th generation language is more portable than those
developed in 3rd generation languages.
5. Better communication with user with very less effort
6. End user can often develop the program. All the user need to do is click the
button, drag and drop the components etc.
Disadvantage of 4GL are:1. Needs longer time to convert into machine language than other languages.
2. Execution speed is slower than other languages
Define Programming statement. Explain the different types of programming
statement.
Ans:- An instruction or expression ( also called code) written in high level language to do
a specific task in a program is called programming statement. Each programming
statement commands the computer to do some specific task such as input, output,
calculation or some logical decision. One program statement in high level language may
results in several instructions in machine language when the program is compiled.
Programming statement may consists of keyword, variables, operators, control structures,
data type , library function, user defined function etc.
There are three types of programming statement used in program. They are:1. Simple statement:- It is a basic part of program and it is a single
line expression which is used to carry out assignment, calculation
or to test logical decision. Example:X=10 - assign integer values 10 to x variable
a>=50 - logical statement to check whether a is greater than or
equals to 50 or not.
2. Compound statement:-Compound statement is defined as a
statement which consists of two or more individual instruction.
Example:- A= l*b; where one instruction is for multiplication of l
and b and other instruction is for assigning multiplication value to
the variable A.
3. Control Statement:- A statement that affects the flow of execution
through a program is called control statement. Control statements
are also called control structures in high level languages. They are
the basic building blocks of high level languages. There are three
types of control statements. They are:-Sequence, Selection and
Iteration (Repetition).
Define control structures. Explain different types of control structures.
Ans:- The structure which regulate the order in which program statements are
executed are called control structures. There are types of control structure. They
are:Sequence :- It is the set of program instruction which follow one another and are
to be executed unconditionally (not dependent on any program conditions)
Computer and IT application
Page 27
Instructions are put in a predefined sequence (just like a queue in a cinema hall)
and the next instruction is executed by CPU only after the execution of previous
instruction ( C never comes before B)
Selection: It is the set of instructions which are to be executed conditionally that
is they are executed based in condition that can be either true or false. Commonly
used logic for selection are if condition, if else condition, if else if condition and
select case condition
Iteration: - These are the computer instructions which are to be performed
repeatedly and conditionally that is loop statement are driven by the loop
condition. Commonly used logic for iteration are while loop, do while loop and
for loop
Algorithm, Flowchart and Pseudo code
Algorithm: - An algorithm is a sequence of instructions or step by step instruction to find
the solution of a problem. Algorithm should be simple and clear. It must be to the point
and should lead to the solution of the problem in finite number of steps.
In other words the set of rules that define how a particular problem can be
solved in finite number of steps is known as algorithm. An algorithm is composed of a
finite set of steps, each of which may require one or more operations. Each operation
must be definite, effective and finite
A program is the expression of an algorithm in a programming language. Thus, the
success of a program depends upon the algorithm. Therefore the logic of the problem
must be clearly expressed in an algorithm.
In other we can say an algorithm is a collection of finite number of
instructions arranged in a sequence to find the solution of a problem.
Example:
Algorithm for adding the two numbers
Step1: Start the program
Step2: Input number x, y
Step3: Read x, y
Step4: Z←x+y
Step5: Print Z
Step6: Stop the program
Example:An algorithm to go to the cinema and see a movie
Step1: Start the program
Step2: Go to the cinema hall
Step3: Is the ticket counter open?
Step4: If it is not open, return home
Step5: If it is open, buy a ticket
Step6: Get into the cinema hall
Step7: Watch the movie
Step8: Return home
Computer and IT application
Page 28
Step9: End the program
Flowchart:
A flowchart is a pictorial representation of an algorithm. We can also define it as a
program planning tool for organizing the sequence of steps necessary to solve a problem
which is shown in terms of symbols. Flowchart use symbols that has geometrical shapes
to indicate the different operation and these symbols connected by flow lines which
indicate the order of execution of the various activities. It is used by the programmers to
develop the program and system designer to represent the overall system while analyzing
and developing the system.
Example:Flowchart of adding the two numbers
Start
Input X, Y
Read X, Y
Z=X+Y
Print Z
End
Advantage of flowchart
 It is an independent language .so, the flowchart we design for programming in
one language is applicable for programming in another language
 Once the flowchart is prepared it is very easy to do the coding by looking at the
flowchart
 It is very easy to understand the logic of program by designing the flowchart.
Even people who don’t know the coding can understand the logic of program with
the help of flowchart
 Systematic debugging and testing is easily possible with the help of flowchart
 It provide good documentation for organization
 It is useful in debugging the program
 It provides valuable information which cannot be expressed by thousands of
words
 It is user friendly. It can be more easily understood
Computer and IT application
Page 29
 It expresses clearly the logic of a given procedure.
 It is unambiguous as there can be only one direction of logic at any one time
 It is used as working models in the design of a new programs and system.
Disadvantage of flowchart
 Preparing flowchart is a time consuming process
 If there is a change in logic again we have to develop the new flowchart
 Flowchart do not provide any convenient means to highlight the more important
operation
 Flowchart are quite costly to produce and difficult to use and manage
 Complex and detailed charts can be laborious to plan and draw
 The translation of flowchart into computer programs is not easy
 Preparation of flowchart is a very slow process
 Most software developers believe that flowcharts are a waste of time and that
these slow down the process of software development and they do not start the
software development with flowchart, flowchart are only use for the purpose of
documentation
Pseudo-Code:
The general meaning of pseudo code is false code or fake code. Before we
write a real program, we write a program that look like a code on the basis of
algorithm and flowchart, which may not be syntactically correct but looks like
program code is called pseudo code. The instruction of pseudo code is written
by using English phrase and mathematical expression. It has no hard and fast
rules for writing instruction in pseudo code but the instruction are closer to
high level language instructions. The pseudo code designers should have basic
knowledge about high level language before writing pseudo code. It is also
independent of any programming language.
Example:
Pseudo code for calculating area of rectangle
Input length, breadth
Calculate area= length*breadth
Output area
Differentiate between syntax and semantics.
Synatx:The rules that we use while writing code is called syntax. Syntax is the grammatical
rules of writing the programming statement. In other word syntax is the rules that tells us
whether a string is a valid program or not. The error which is detected by the computer if
we violate the rule of writing programming statement is called syntax error.
Semantics:The rule that gives the meaning to programs are called semantics. The error which occurs
in program logic is called semantical error or logical error. The semantical error is not
detected by the computer and the compiler compiles it successfully. We can only see the
error after the program is being executed and give wrong output. So it is very difficult to
find the semantical or logical error. Because no satisfactory method has been found yet to
detect the logical error
Computer and IT application
Page 30
For example:- if we have to find out the sum of two number say x and y but
we subtract the number, then it is called the logical error. Actually the computer assumes
that we are going to subtract but actually we want to find the sum of two number so there
exist an error . So, instead of writing Z=X+Y if we write Z= X-Y, the computer will not
so the error, but the result which we want we will not get.
Let us consider another example: “Ram eats Television “grammatically it correct because
it is in the form of subject + verb object (i.e. syntactically it is correct) but doesn’t
provide any sense. So, this is semantically incorrect
Why it is very difficult to find logical error in comparison to syntactical error?
Ans:- It is very difficult to find out the logical error in comparison to syntactical error
because syntax error violates the rule of writing the programming statement and is
detected by compiler at the time of compiling by showing total error occur in computer
screen but the logical error is not detected at the time of compiling , after it get executed
when we get the wrong output , seeing that wrong output we have to find out the error in
logic. On other hand there is no any satisfactory method has been found through which
we can detect the logical error
For example: - if we have to find out the sum of two
number say x and y but we subtract the number, then it is called the logical error.
Actually the computer assumes that we are going to subtract but actually we want to find
the sum of two numbers so there exist an error. So, instead of writing Z=X+Y if we write
Z= X-Y, the computer will not so the error, but the result which we want we will not get.
What are the symbols used in flowchart. Mention their name with symbol, shape
purpose and description
There are various flowchart symbols that carry different messages and are used for
different purposes. These symbols are shown below:
Symbol
Shape
Purpose
Oval
Start /end
Parallelogram
Input/output
Computer and IT application
Description
This symbol
indicates the
beginning or end of
the program. every
flowchart begins
with a start symbol
and ends with a stop
symbol
This symbol
indicates an input or
output operation. It
will appear at any
point where a data is
to be entered into
the computer or at
Page 31
times when data is
to be obtained from
the computer
Rectangle
Process
It indicates any
calculation or
manipulation .i.e
processing of data
Diamond
Decision/condition
Line with direction
Flow-line
It is used to check
logical conditions. It
has one entry and
two exit point
which are for true or
false
It is used to indicate
direction of flow of
information.
Circle
Connector
End of page
A
A
Beginning of page
Large bracket with
line
Computer and IT application
Comment box
Connectors are used
for the long
flowchart that does
not fit in the same
page. In this
condition the
flowchart can be
broken into parts
and an arrow is
drawn into a
connector symbol
containing a unique
number or letter
Comment box can
be used to indicate
any comments for
better
documentation,
clarity and in case of
explanatory notes
Page 32
System Flowchart:A flowchart that gives information about a system is called system flowchart. The system
can be data processing system, production system, reservation system, inventory system,
accounting system, evaluation system. In system flowchart, the information flow from
one section of the organizational unit to another section or form one processing machine
to another. It is drawn by the system designer while developing the new system. It plays a
very important role in analysis and designing of new system. It does not focus on the
process to solve a particular problem. In other words A system flowchart describes the
data flow and operations for a data processing system. The flowchart shows how the data
processing is to be accomplished.
Program Flowchart:The program flowchart describes the sequence of operations and decisions for a particular
program In other words we can say that a diagrammatical or pictorial sequence of
instruction used by a programmer to solve any problem is called Program Flowchart
A flowchart which is used by the programmer to solve a problem is called
program flowchart .It is the detailed program which is shown in the form of picture that
how program processing steps will be performed within the computer to convert input
data into the desired output.
Differentiate between flowchart and algorithm
Flowchart
Algorithm
It is a diagrammatic representation of a It is a finite set of step by step instruction
program
of a program
It takes time because we need to draw the It takes less time to write the steps of
symbol
instruction
To understand the program flow one Simple English language is used to write
should understand the meaning of symbols algorithm, so easy to understand.
Need special knowledge to draw flowchart No need of special knowledge to write
algorithm
Maintaining a flowchart is difficult
Maintaining an algorithm is not as difficult
as compare to flowchart
At a glance, one can understand the It is difficult to understand the program
program flow very easily
flow at a glance
Differentiate between system flowchart and program flowchart
System flowchart
Program flowchart
It gives broad overview of overall system
It gives specific view of control flow of a
program
It shows the data flow of a system
It shows the instruction flow of a program
It is designed by system designer
It is designed by programmer
It consist of different kinds of symbols, one It consist of limited symbols, so it is easy
must have good knowledge to understand
to understand the program flowchart
the flowchart
It does not focus on the process to solve a It focus on the process to solve a particular
particular problem
problem
It diagrammatically shows the elements It diagrammatically shows the elements
Computer and IT application
Page 33
and characteristics of the whole system.
and characteristics of the whole program.
It plays a vital role in analyzing and It plays the vital role in developing, testing
designing the new system
and debugging a new program
Program Debugging
Program debugging is the discovery and correction of programming errors. A program
cannot be 100% correct throughout its life time and a very few programs run correctly for
the first time. So, debugging is an important and time consuming stage of software
development
Debugging is basically done to find
1. Syntax error
2. Semantic error
3. Run-time error
1. Syntax error:- The error which occurs when the instruction of program does not
match the structural rule of the programming language is called syntax error
2. Semantic error: - The error which causes the wrong output due to wrong
calculation or wrong input of data is called semantic error.
3. Run- time error: - The error which appears during the execution or runtime of
program is called runtime error. Such errors appear when the computer is asked to
divide by zero or when the variable is assigned large value which is beyond its
capacity. The run-time error causes the termination of program execution.
Procedures and Program
Procedure is a mechanism of doing or performing job or task in a well suited manner or
in a correct way.
A program is a set of instruction written sequentially and in a logical way to tell the
computer to do a specific task or to solve a given problem.
Structured programming
Structured programming is a subset of procedural programming based on the idea
of modularity, where the entire program is divided into modules. Again, each module is
composed of one or more procedures also called as functions. So, it is also called
modular programming. Example:-C, Pascal etc.It follows top down programming
approach.
Advantages of Structured programming are: It is easier to write even a complex program because of modular
programming technique.
 It is easy to use, test, debug and modify.
 It has only one main function so it is easy to maintain.
 It is easy to learn
 It uses top down approach for program development
 A function written t o perform one task can be used in another program
 It provides various control structures.
Computer and IT application
Page 34
Object Oriented Programming
The programming which gives more emphasis on data that is object (combination of data
and related function) rather than procedures is called object oriented programming
It uses bottom up approach for program development. Nowadays almost all the
programming languages are using object oriented techniques, even scripting languages
are also using this technique such JavaScript. This technique of programming is perfectly
matched with the real world object.
Important features of Object-Oriented Programming are as follows:1) Emphasis is given on data rather than procedures
2) Programs are divided into different groups known as objects
3) Data structures are designed such that they characterize the objects
4) Functions and data are tied together
5) Data is hidden and can’t be accessed by external function
6) Functions are communicated between each other through objects.
7) New data and function can easily be added
8) Follow Bottom up approach
Advantages and disadvantages Object-Oriented Programming:OOP contributes greater programmer productivity Better quality of software and lesser
maintenance cost. The main advantages are:1) Making the use of inheritance, redundant code is eliminated and the existing
class is extended
2) Through data hiding programmer can build secure programs.
3) System can be easily upgraded from small to large systems
4) Software complexity can be easily managed
5) Message passing technique for communication between objects makes the
interfaces description with external system much simpler
6) Code reusability is much easier than conventional programming language
Disadvantage of OOP
1) It demands more computer resources.
2) Requires the mastering in software engineering and programming methodology.
3) Benefits only in long run while managing large software projects
Application areas of OOP
1.
2.
3.
4.
5.
6.
Games
Expert system
Object-oriented databases
Artificial Intelligence
AI and expert systems
Most important areas of application is design of user
interface such as window
Computer and IT application
Page 35
7. Computer based training and educational systems
Scripting language
A high level programming language that is interpreted by another program at runtime
rather than compiled by the computer's processor as other programming languages (such
as C and C++) are. Scripting languages, which can be embedded within HTML,
commonly are used to add functionality to a Web page, such as different menu styles or
graphic displays or to serve dynamic advertisements. These types of languages are clientside scripting languages, affecting the data that the end user sees in a browser window.
Other scripting languages are server-side scripting languages that manipulate the data,
usually in a database, on the server.
Scripting languages become popular because of the development of the Internet as a
communications tool. Example:-PHP, JavaScript, ASP etc
Types of Scripting Language
Client -side scripting language:-The language affecting the data that the end user sees
in a browser window is called client side scripting language. Client-side refers to the side
of end users. So, client-side scripts are programs that is written and attached to HTRML
documents that run on a user’s browser while viewing the documents. Scripts allow
HTML forms to process input as it is entered and the result is displayed by the web
browsers like Mozilla, Opera etc. Example:-JavaScript, VBScript etc.
Server- side scripting language:-The language that manipulates the data, usually in a
database, on the server is called server side scripting language. Server-side scripting is a
web server technology in which a user’s request is fulfilled by running a script directly on
the web server to generate HTML pages. The primary advantage to server-side scripting
is the ability to highly customize the response based on the user’s requirements, access
rights or queries into database. Example:-PHP, ASP etc
Computer and IT application
Page 36
UNIT 3
Word Processor
Computer and IT application
Page 37
Object Linking and Embedding (OLE):-It is a technology developed by Microsoft that
allows embedding and linking to documents and other objects. It allows users to integrate
data from different applications.
Object linking allows users to share a single source of data for a particular object. The
document contains the name of the file containing the data, along with a picture of the
data. When the source is updated, all the documents using the data are updated as well.
With object embedding, one application (referred to as the "source") provides data or an
image that will be contained in the document of another application (referred to as the
"destination"). The destination application contains the data or graphic image, but does
not have the ability to edit it. It simply displays, prints or plays the embedded item. To
edit or update the embedded object, it must be opened in the source application that
created it.
Object Linking and Embedding is a technique used to insert data, it is called
Embedding; if we do want the data to update, it is called Linking.
Example:-If it is linked then when the data in the spreadsheet is changed, that change
will show in the Word document. If it is embedded, then changes in the spreadsheet will
not have any effect on the figures in the Word document.
Differentiate between Object linking and embedding
Embedding
It is the process to
objects(picture,file,vedio etc)
Linking
the It is the process to insert the objects but by
establishing the relation between source
object and working object.
After inserting the objects there is no After inserting the object, we can double
relation between source object and working click over it to go into source place, when
object.
we modify the source object it
automatically modify the working object
It does not have the ability to edit it. It It has the ability to edit it.
simply display, print or plays the embedded
item.
insert
What is macro? What are the uses of macro?
A macro is a series of commands and instructions that we group together as a single
command to accomplish a task automatically.
Uses for macros are:

To speed up routine editing and formatting
Computer and IT application
Page 38



To combine multiple commands — for example, to insert a table with a specific
size and borders, and with a specific number of rows and columns
To make an option in a dialog box more accessible
To automate a complex series of tasks
Write down the steps for creating macro.
1.
2.
3.
4.
5.
6.
Click the Microsoft Office Button, and then click Word Options.
Click Customize.
Next to Keyboard shortcuts, click Customize.
In the Categories list, click Macros.
In the Macros list, click the macro that we want to change.
In the Press new shortcut key box, type the key combination that we want to
choose.
7. Check the Current keys box to make sure that we aren't assigning a key
combination that we already use to perform a different task.
8. In the Save changes in list, click the option that matches where we want to run our
macro.
9. Click Close.
What is hyperlink? What are the uses of hyperlink?
A hyperlink is a word, phrase, or image that we can click on to jump to a new document
or a new section within the current document. Hyperlinks are found in nearly all Web
pages, allowing users to click their way from page to page. When we move the cursor
over a hyperlink, whether it is text or an image, the arrow should change to a small hand
pointing at the link. When we click it, a new page or place in the current page will open.
A hyperlink is a connection from one slide to another slide in the same presentation or to
a slide in another presentation, an e-mail address, a Web page, or a file.
Hyperlinks are a great way to connect our presentation to other slides, presentations,
documents, and the Web. We can use hyperlinks for the following:





To enable us to jump to other slides quickly
To switch to another presentation
To open another file, such as a Word document or Excel spreadsheet
To display a Web page
To open an e-mail to someone
Computer and IT application
Page 39
Download