Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Chapter one
1. An overview of information and communication technology
Society refers to a group of people who share a defined territory and a culture. Society is often
understood as the basic structure and interactions of a group of people. Historically there has
been a move through the ages from one type of society to another. Each of these types are
categorized by the dominant economic force of the period. There is Moving from the land, on to
manufacturing and then to service.
I Agrarian Society
Agrarian society is a social system where there is concentration of most active
population, production, and capital in agriculture and extraction from nature.
Agrarian societies are also called Pre-modern, or Pre-industrial society.
Agrarian societies are societies in which the primary means of subsistence is the
cultivation of crops using a mixture of human and non-human means (i.e., animals and/or
machinery). Agriculture is the process of producing food, feed, fiber, and other desired
products by the cultivation of plants and the raising of domesticated animals.
Historical Developments of agricultural society: the agricultural society by itself can be
divided in to three stages of development:
II INDUSTRIAL SOCIETY
Industrial society is a social system whose mode of production focuses primarily on
finished goods with the aid of machinery.
Industrial society is a social system where there is concentration of most active
population, production, and capital in Industry and manufacturing.
An industrial society is a society in which the primary means of subsistence is industry.
Industry is a system of production focused on mechanized manufacturing of goods.
Freedom of information became one of the corner stone of democracy in industrial
society. Citizens being able to exchange information freely
1
Introduction to Information Technology
Because of the spread of literacy and scientific knowledge, modern information became a
new collective property.
In 1800s came the industrial age , first to England .
o This time, machines began assisting people with their work extending workers
capabilities and the partnership became one between people and machine
o Machines became the primary tools for majority of workers
o Process were gradually simplified through mechanization and automation resulting in the
number of workers in the industry area
2
Introduction to Information Technology
The objective of this chapter is to make students understand the difference between data and
information, processing data and information as well as describe the knowledge spectrum. Most
people use data and information interchangeably, however these terms are different. In order to
clearly understand what information, data, and knowledge are? The knowledge spectrum is good
way of expression. This hierarchical growth shows what, where and when information can be
defined.
Data is a Collection of merely symbols which do not have meaning by them selves. They are
facts or figures to be processed.
Information is a processed form of data so that it is meaning full to the person receiving it.
Information is data that have been shaped into a form that is meaningful and useful to human
beings.
is organized information or piece of information that can be used for decision making.
When a pattern relation exists beyond the data and information, the pattern has the potential to
represent knowledge. It only becomes knowledge, however, when one is able to realize and
understand the patterns and their implications
• All the information, facts, truths, and principles learned throughout time, experience or
study.
• Once you spend some time interpreting and understanding a body of information, then you
have knowledge.
• Creating knowledge still takes brains, thought and time - especially today when there is so
much more information available to paddle through
• Accumulation of data and information acquired through time and requires deep thought
that provides prediction of the future
Wisdom is the most abstract and exists in the smallest quantity. It is the maturity of mind that
directs its intelligence to desirable goals. Intelligence can be constructed as the ability to draw
inferences from the available knowledge. Wisdom is the ability to understand the fundamental
principles that govern the patterns representing knowledge.
Wisdom arises when one understands the foundational principles responsible for the patterns
representing knowledge being what they are. And wisdom, even more so than knowledge, tends
to create its own context
• The knowledge and experience needed to make sensible decisions and judgments, or the
good sense shown by the decisions and judgments made.
• Accumulated knowledge of life or in a particular sphere of activity that has been gained
through experience.
• An opinion that almost everyone seems to share or express.
• "Wisdom is not a product of schooling but of the lifelong attempt to acquire it.” Albert
Einstein
• Our grandparents may perhaps have been short on book smarts (“knowledge”) but long
on wisdom. In an “information age,” technology cannot confer wisdom: wisdom takes
more time to develop and cultivate than even knowledge does (how many people do you
know with advanced degrees who lack wisdom or wise judgment? And vice versa?).
4
Introduction to Information Technology
• Wisdom comes from: the ability to synthesize various streams of knowledge, the ability
to spot patterns and trends.
• The accumulated body of knowledge over a long period of time that generally leads to a
sound decision making and enables to make reasonable judgments, acceptable and
sharable among the constituents
• embodies principle, insight, moral, or archetype (why).
•
NOTE:
Data is not information.
A collection of information is not knowledge.
1.1What is ICT?
Information and communications technology (ICT) refers to the use of electronic computers
and the telecommunications network to create, store, process, send, and receive information from
anywhere, anytime.
Hence, it refers to both computer and communication technologies
Information Technology is the use of modern technology to aid the capture, processing, storage
and retrieval, and communication of information, whether in the form of numerical data, text,
sound, or image.
It refers to a wide variety of items and abilities used in the creation, storage, and dispersal of
information.
It is the study of information handling and its use in society by means of modern technology.
This includes the acquisition, processing, storage and communication of information in any form
by appropriate means
1.2 Components of IT.
Information technology is divided into three primary components. These are
computers,
communications networks, and
know-how.
1. Computers
• Computer, in simple terms, is an electronic machine that can be instructed to accept, process,
store, and present data and information
• Computer is a device that enables you to process information automatically and in accordance
with instructions that you give it.
• Computers have become part of the day-to-day activities of people around the globe. It is
difficult to think any field that does not involve or is not affected by computers.
2. Communications Network
An integral part of IT is the ability to communicate: to send and receive data and information
over a communication network.
A communications network is the connection of stations at different locations through a medium
that enables people to send and receive data and information.
5
Introduction to Information Technology
o Telephone wires and cables are common communication media.
Data communication is the transmission of data and information over a communications
medium.
3. Know-how
Although computers and data communication are very important parts of IT, an equally critical
part of IT is the ability to draw on the power of IT to solve problems and to take advantages of
the opportunities it creates.
Therefore IT requires or implies know-how, knowing how to do something well.
Know- how includes
familiarity with the tools of IT
the skills needed to use these tools
Understanding when to use IT to solve a problem
1.3 Functions and application of IT
1.3.1Functions of IT
Information Technology using computers has the following functions:
A. Capture
It is often useful to compile detailed records of activities.
Data capture is performed when IT users expect the data to be useful later.
When a book is checked out of the library, the name & ID. No. of the borrower, the title, author
& call number of the book is captured.
A doctor records the pulse, heart rate, and WBC count of hospital patients.
The voice and data recorders in aircraft cockpits capture the pilot's conversations and record
flight data about the aircraft’s location and performance.
B. Processing
• is most often associated with computers.
• is the main reason to buy computers
• entails converting, analyzing, computing and synthesizing all forms of data or information.
• Information/data may come in different forms
• text ports, correspondence
• sound voice, music
• images visual information (Charts, graphs, drawings etc.)
Multimedia systems
• are systems that process multiple types of information simultaneously. other types of
processing are
Word processing Word processing is the creation of text-based documents, including reports
newsletter etc.
Image processing
can be managed within a computer system.
• A process called scanning converts a print or film image into a form that a computer can use.
Voice processing is the processing of spoken information
C. Generation
• Generating information means organizing data & information into a useful form whether as
text, sound or image.
D. Storage and Retrieval
• Through information storage, computers keep data and information for later use.
• Stored data & information all placed in a storage medium that the computer can read.
• Retrieval entails locating and copying stored data or information for further processing or for
transmission to another user.
6
Introduction to Information Technology
E. Transmission
• the sending of data or information from one location to another
• Modern communications networks enable us to send information down the hall or around the
world in an instant.
1.3.2 Application of IT
The main areas of applications can be listed as follows:
In education
As learning Aids
Example: learning toys, programs range from simple arithmetic to calculus, from English
grammar to creative writing and foreign language, and from basic graphics to engineering design
models,)
In educational activities On the other hand, computers can be used in educational activities to
assist both the learner and the teacher. Computer-assisted instruction (CAI) helps the learning-
teaching process in schools and colleges. Computers can be used to deliver lectures using
presentation software. Computers can also be used in educational administration such as:
- keeping records of students,
- keeping inventories of books in the library, text books, chemicals in the laboratory and safety
information, and other instructional materials,
- setting timetables for subjects, and
- delivering lectures.
An important application of computers in the education sector is distance education, also called
distance learning (e-learning)
Distance learning is a method of teaching in which students are not required to be physically
present in a school or a university.
Written material, videos, audiotapes, and CD-ROMs are sent to the student. The student sends
back answers to exercises and assignments. Nowadays the Internet can be used for distance
learning. Websites can be set up with information for the learner and e-mail can be used to
communicate with a tutor.
Entertainment:
Examples: Games
Commercial or business applications
Computers are needed to perform business operations that require handling large amounts of
data. Several computer applications are available to assist business in working with large
volumes of data.
Examples are:
Text processing
Accounting and Finance management
Inventory control
Database management
Statistical analysis
Scientific – engineering and research applications
Using computers for scientific research, complex mathematical calculations, design
work, and analysis and control of physical systems.
Examples are:
Space technology
Meteorological observatory systems
Astronomical investigations
7
Introduction to Information Technology
Data processing can be done manually, where brain, paper, and pencil are used. It can be done
with the aid of electro-mechanical devices such as a calculator. It can also be done electronically
using a computer as a tool. In the rest of this note, data processing is assumed to be done using
computers.
8
Introduction to Information Technology
The objective of data processing is “getting the right information to the right person at the right
time”. Hence, if the information is to be valuable, a data processing system must meet some
criteria:
Accuracy: The individual steps in the processing of data must be accurate.
The input data to the processing system must also be accurate.
There is a saying “Garbage In, Garbage Out or GIGO” to express that wrong input data generate
wrong and useless results.
Timeliness: The right information delivered too late can be as useless as no information at all,
i.e., the data processing system has to be fast.
Meaningfulness: The information produced by the data processing system must be meaningful to
the people using the information. i.e.
the information must be appropriate and relevant to the user’s needs.
the report presented must be compressible. Both the format and the content of the report must
be easy to read and understand.
Information features(characteresticcsa)
• Is a value added resource: the more you utilize information the more its value will be
added.
• Is a shared resource. Land labour and capital are not sharable resources. Nowadays the
other vital resource is information, what make information special is that it is sharable.
You can share information having you share in you hands. Where as the other resources
mentioned can not be shared, or will be minimized at the time you share them.
• Its value depends upon its use: you can easily use information for any thing you have.
Its value depends if and only if you use it.
9
Introduction to Information Technology
• Has a high rate of obsolescence: the very unique feature on information is it is up-to-
date-ness. It becomes meaningless if it time passes. i. e shortest duration of relevancy
• Vulnerable to security risks: information is easily vulnerable like cash is a liquid asset
for business information needs even a strong security. i. e sensitive with regard to its
security
• Involves cost: information is not a free resources it needs initial cost. i. e cost of
production, dissemination, etc
Data processing: is the process of converting data into information. The following are basic
data processing activities.
1. Data collection: data processing activity that involves getting data from the origin to the
system.
2. Data recording: the process of expressing data in a form that is recognizable by either a
person or a machine.
3. Data classification: a process of categorizing all items of data according to common
characteristics and features.
4. Data sorting: the arrangement of data items in a desired sequence.
5. Data store: retaining the data for future reference.
6. Retrieving data: refers to finding a specific stored data.
7. Summarizing data: is the process of condensing data.
8. Data communication: distributions of information to the specific end users.
As defined earlier, data processing is the process of converting data into information. It involves
three steps: input, processing, and output as shown in the following figure.
In general, a computer gets input through an input device such as a mouse or a keyboard,
processes it according to the set of instructions given to it, and generates an output.
Input: refers to anything that is given to a computer for processing. It may take various forms
such as numbers for calculation, text to be printed, etc.
Processing: The computer has to be told what to do with the input. That means a computer must
be programmed with the set of instructions it is required to perform.
Output: refers to the result of data processing such as a printed text. Once the computer
processes the input using the instructions given to it, it produces an output using an output device
such as a screen or a printer. The output may take different forms. It may be a printout of the
results of students, playing music using speakers attached to the computer, etc.
As discussed earlier, one of the criteria for a data processing system is accuracy of the result.
This in turn requires input data accuracy. When data is given as input to the computer, we have
to make sure that it is correct and meaningful so that the result or the output of the data
10
Introduction to Information Technology
processing is also meaningful. Ensuring data accuracy means the input data is not in any way
wrong. This can be done using two techniques: Data Verification and Data Validation.
Information system:
An information system is a collection of hardware, software, data, people and procedures that
are designed to generate information that supports the day-to-day, short-range, and long-range
activities of users in an organization.
An Information system is a set of inter-related components that collects (or retrieves), process,
store and distribute information to support decision-making and control, coordination, and
visualization in an organization. An information system is a set of the following components
• Hardware – computer components and network devices
• Software – programs applications, operating systems or specific software
• Data – an input to be processed for decision making
• People – professionals who process and interpret the result on a given condition and users
who accept the result of the system
• Procedural – list of instructions that people must follow while processing data on this
environment.
These components intended to provide the right data and information to the right person at the
right time.
Problems of information systems
Lack of Infrastructure
Lack of management confidence on the use of it
Inaccurate information leads to wrong decision
Low status and recognition of IT Professional
Lack of conceptualization i.e. no/less knowledge of its importance
11
Introduction to Information Technology
Chapter two
2. Evolution and types of computers
2.1. History of Computers
The invention of Computers is dated back to 3000 B.C. when the first computing device Abacus
was created.
The French mathematician, physicist and religious philosopher Blaise Pascal developed the first
mechanical adding machine in 1642 to help his father, a civil servant in tax calculations.
Blaise’s adding machine used gears with teeth to represent numbers.
The 1880 census had taken over seven years to complete by manual method and by then the
young country’s population had increased nearly 24 percent. It was at this time, Herman
Hollerith, a government statician provided the solution with a punched card system of collecting
and tabulating the data. His strong and tabulating equipment or machine was extremely
successful and allowed the 1890 census to be completed in less than two years. Hollerith
continued to develop his card methods for railroad accounting and founded the tabulating
machine company which later changed to International Business Machine Corporation (IBM).
In 1945, two University of Pennsylvania scientists, John Mauchly & Presper Eckert, designed the
Electronic Numerical Integrator And Calculator (ENIAC), the first general purpose electronic
digital computer. It had over 18,000 vacuum tubes and 500,000 soldered joints and it weighed
more than 30 tones and it occupied over 15,000 Ft 2. It consumes enormous amounts of power
(140 Kilowatts of power).
ENIAC did not use internally stored programs. Programs were wired on boards
similar to a telephone switch board.
One of the major drawbacks of ENIAC was that it had to be programmed manually
by setting switches and plugging and unplugging cables.
Eckert and Mauchly subsequently developed the UNIVAC-I (Universal Automatic computer),
the first electronic computer offered as a commercial product.
John Von Neuman, a mathematician genius at Princeton, is sometimes called the intellectual
father of computer. He has been credited with developing highly significant stored program
theory, and his 1946 paper entitled “A preliminary discussion of the logical design of an
Electronic computing instruments” is the authoritative statement on storing data and instruction
12
Introduction to Information Technology
in computers. He also defined and promoted flowcharts as logic aids.
TABLE: Starting of modern Computer Age(1909-1951)
Year Computing Device And Usefulness
Inventor
1909 First Accounting Machine -was capable of sorting, recording the
(Charles Kattering, National data
Case register company-
USA)
1938 ZI(K, Zuse, Germany) -Design first program controlled
computer and was purely a mechanical
device
1941 Z3(K, Zuse, Germany) -support to be the first computer of the
world and was destroyed in second world
war bombing.
1944 Harvard Mark-1 (Haward -First successful general purpose digital
Aikan, Harvard university, computer.
U.S.A.)
1946 ENIAC -was full fleged electronic computer and
(Electronic Numeric used cathod ray tube for storage purpose.
Integrator and Calculator)
-John w.Mauchly an J.
Presfer Eckert at
pennysloania Univ.
1949 EDSAC Was the first computer to utilities stored
(Electronic Delay Storage program concept and mercury delay lines
Automatic Computer – were used for storage and paper tape for
M.V. Wilkes Cambridge input and output.
University)
1950 EDVAC
(Electronic Discrete
Variable Automated
Computer –M.V. Wilkes
Cambridge University)
1950 ACE First computer to use two address
(Automatic Computer code(one to signify the location of the
Engine – National Physical data to be operated on and the other for
Laboratory) the address of the next instruction).
1951 LEO -world’s first commercial computer
Lyon’s Electronic office – which made the concept of office
M.V. Wilkes, J. Lyons & automation a reality.
U.K.)
1951 UNIVAC I -Developed for Commercial data
(Universal Accounting processing.
Company Set up by Eckert
& Mauchly)
13
Introduction to Information Technology
This generation computers used vacuum tubes as components for the electronic circuit. Punched
cards were the main source of inputs, and magnetic grams were used for internal storage. They
operate in a speed of milliseconds (thousands of a second) and could handle more than 10,000
additions each second. Most applications were scientific calculations.
Transistors were the main circuit components. Invented by Bell Labs, the transistor was smaller,
faster and more reliable than the vacuum tube. Magnetic cores, used for main storage, could be
concerned in microseconds (millionths of a second) with more than 200,000 additions possible
each second. Business applications become more common place, with large data files stored on
magnetic tape and disk.
It was characterized by solid-state logic and integrated circuit (IC). Computer storage switched
from magnetic cores to integrated circuit boards that provide modularity (expandable storage)
and compatibility (interchangeable equipment). Software become more important with
sophisticated operating systems, improved programming languages, and new input/output
methods such as optical scanning and plotters.
14
Introduction to Information Technology
Example
IBM system /360 was the dominant
IBM 1130
It has greatly expanded storage capabilities and improved circuitry. It has large scale integrated
circuits (LSI) which has several hundred thousands transistors placed on one tiny silicon chip.
Computer memory operates at speeds of nano-seconds (billionths of a second) with large
computers capable of adding 15 million numbers per second.
But a computer can store such amount of information in a few numbers of disks. And the
time it took to retrieve or process a single information is not more than a micro or a nano
seconds. In general a computer has a capacity to store a very large amount of information
in organized manner so that accessing information is very fast.
Accuracy
Now a days computers are being used for surgical purposes which needs almost hundred
percent accuracy. From this we can understand that computer is accurate and consistent.
Unless there is an error in the input data or unreliable program the computer processes
with a very accurate.
15
Introduction to Information Technology
Automatic
Once necessary information and program is feed to the computer, it performs processing
without human intervention.
Versatility
Computer has the potential to perform or solve varieties of tasks and problems, as long as
the problem or the task can be put or reduced in the form of logical steps.
2.3. Types of Computers
There are different types of computers. Their differences depends on different categories of
characteristics.
Classification by the method of operation (processing)
Computers are classified by the type of data they are designed to process. They are classified into
three:
Analog, Digital and hybrid Computers
Analog computers operate by measuring. They deal with continues variables, they don’t compute
directly with numbers, rather, they operate by measuring physical magnitude such as pressure,
temperature, voltage, current etc.
Examples
Thermometer
Voltmeter
Speedometer
Gasoline pomp – Contains an analog Computer that converts the flow of pumped fuel
into two measurements the price of the delivered gas and the quantity of pumped fuel.
They are special purpose computers.
However, analog computers have limited accuracy
Digital Computers
Digital computers deal with discrete variables, they operate by counting rather than measuring.
They operate directly up on numbers (or digits) that represent numbers, letters, or other special
symbols.
Examples:
Abacus
Desk & pocket computers
The general purpose computers
Digital computers have very high accuracy and speed than the analog ones.
Hybrid computers
The best features of analog and digital computers can be combined into a single device to form a
hybrid computer. Hybrid computers processes the information by collecting input data with
analog method, converts it into digital quantities, processes the digital values and convert the
output from digital to analog form.
Example:
In hospital insensitive-care unit analog devices may measure a patient’s heart function,
temperature and other vital signs. These measurements may then be converted into
numbers and supplied to a digital component in the system. This component is used to
monitor the patient’s vital signs and to send an immediate signal to the nurse’s station if
any abnormal readings are detected.
16
Introduction to Information Technology
Classification by purpose of application
Computers can be applied or used for different purposes. Based upon their application, they are
classified as special purpose or general purpose computers.
Special purpose computers
They are designed to solve a single type of problem, that is their components and their functions
are uniquely adapted to a specific situation involving specific application.
Example:
The public telephone box
Traffic control system
Ticket machines (used in grocery, super market etc.)
Pocket-calculators etc.
Counters
Most analog computers are special purpose computers.
General purpose computers
They are designed to solve variety of problems through the use of “store program concept”. A
program or set of instructions designed to solve a problem is read and stored into the memory
and then executed by the computer one by one. The same computer can be applied to solve
another set of problem using different program. General computers are more flexible and
versatile.
Examples
Micro computers
Mini computers
Super computers etc.
Classification by physical size, price, capacity and performance
At this stage, by a computer, we mean a general-purpose digital computer. General-purpose
digital computers are then classified as follows by their capacity and size.
Super computer
Are the fastest, largest and most potential type of computer. They have speed of hundreds of
millions of operation per second, a primary memory capacity of about 80 million characters, a
secondary memory of capacity of about 20 times its primary memory. They are multi-user
systems in intercontinental range. They can carry out enormously complex scientific
calculations. They are used to process huge amount of data and are commonly used in space
technology centers, meteorology stations, and astronomical observatories, intercontinental
communications, airline organizations.
Mainframe computers
Smaller than in size and capacity, lower in speed & memory capacity than the super computers.
However they are multi-user systems and handle hundreds of users, usually used in large
organizations. The older ones used punched card for data input.
Mini computers
have relatively lower speed, can handle multi-users, are smaller in size than the mainframe
computers. They use terminals for inputs and output. Mini computers are used in small
organizations.
Micro computers
are the most widely used type of computers. They are single users, can fit on desktops, are of varying capacity and
easy to handle. Microcomputers are sometimes referred as personal computers. They have video display unit for
output purpose. Data is entered through the keyboard and by the help of floppy disk.
17
Introduction to Information Technology
Chapter Three
The Computer System
The computer system refers to the computer itself and all the components interconnected to it.
Basically the computer system is categorized into two components
The hardware-the physical device
The software-the programs or instructions that control the hardware
Hardware is the general term for the physical devices that carry out the activities of capturing,
processing, storing, and communicating data and information.
An input device is any machine or device that feeds data into a computer.
Input devices are the part of computer hardware that is used to convert data or information into
electronic machine-readable form.
A cursor, a blinking line on the computer screen, indicates the point at which data or
information will be input. The following are some of the devices that are commonly used to
input data to the computer:
• Keyboard
• Mouse
• Voice recognition devices
• scanning devices
• Digital computer cameras
• Optical data readers
• Automatic teller machines, etc.
Keyboard
is an input device consisting of a set of typewriter-like keys that enable one to enter data into a
computer.
Input devices other than the keyboard are sometimes called alternate input devices.
The keys on the keyboard are often classified as follows:
Alphanumeric keys - Letters and numbers
Punctuation keys - comma, period, semicolon, etc.
Special keys- function keys, control keys, arrow keys, caps lock, etc.
In detail the following are descriptions of the keyboard.
Escape key - Generally used to abort some actions.
Function keys - functions vary from program to program.
Enter key - used to enter commands and to create blank lines in a document.
Backspace key - used to move the cursor backwards, deleting backward.
18
Introduction to Information Technology
19
Introduction to Information Technology
b. Opto-mechanical - same as mechanical mouse, but uses optical sensors to detect motion of
the ball.
c. Optical-uses a laser to detect the mouse’s movement.
• One must move the mouse on a special mat with a grid so that the optical mechanism will have
a frame of reference
Mouse is connected to computer in one of three ways.
• Serial Mice - connect directly to serial port or a PS/2 port. This is the simplest type of
connection
o Port is that part of a computer through which a peripheral device may communicate; plug-
in/socket on the back of the computer for connecting cables for peripherals.
o Serial port is input/output port in a computer through which data are transmitted and
received one bit at a time. That is, handling of data is in a sequential fashion, bit by bit.
o Parallel transmits information 8 or more bits at one time:
Bus mice connect to the bus through an interface card.
o This is somewhat more complicated since one needs to configure and install an expansion
board.
Cordless mice aren’t physically connected at all.
• Instead they rely on infrared (sing rays) or radio waves to communicate with the computer.
Mouse pad - is a pad on which you can move a mouse. It provides more traction than smooth
surfaces such as glass & wood, so they make it easier to move a mouse accurately.
Scanners
• are input devices that can read text or illustrations printed on paper & translate the information
into a form that a computer can use.
Bar code scanners
• A bar code is a computer readable code consisting of bars or lines of varying widths or lengths
• Bar code system called Universal Product Code is used in supermarkets.
Speech recognition devices
• often used in multimedia systems
• capture the voice or sounds for use in computer processing
• converts a person’s input into digital form
The Central Processing Unit (CPU) & Memory
At the center of computer hardware is the CPU, sometimes called the processor, which executes
program instructions and performs the computer’s processing actions.
• It is the part of a computer hardware that executes program instructions.
• The CPU is the collection of electronic circuits made up of millions of transistors placed onto
integrated circuits.
• Integrated circuits are also called chips or microchips.
• Each transistor is an electrical switch that can be in one of two states: “on” or “off”
• Small transistors allow more transistors to be packed on to one chip. This process, called
integrating, brought about “PC revolution” in the 1980’s.
• Integrating means more of the CPU components can be placed onto a single chip, thus,
eliminating the need for separate chips.
• Computer processing is electronic. Hence we don’t see what is happening inside even if the
cover is removed. No moving parts are observed.
20
Introduction to Information Technology
The CPU has two major components.
• The Control Unit
• The Arithmetic/Logic Unit (ALU)
21
Introduction to Information Technology
Execution of Instruction
At the machine level execution of instruction has two phases: instruction phase (I-phase) and
execution phase (E-phase). These two phases are further decomposed to four steps.
In fact, all the functions of processing data are directed by the control unit which works with
ALU & memory to perform the following four steps.
1. Fetch Instruction
• The instruction to be executed is accessed from the memory by the control unit.
2. Decode Instruction
• The instruction is translated into individual commands so the central processor can understand
what is to be done.
• Relevant data is moved from memory to the register storage area.
• The location of the next instruction is identified.
These two steps, in which instructions are obtained and translated, are called instruction cycle
(I-cycle) and the time it takes to execute the first two steps is referred to as I - time.
3. Execute Instruction
The ALU does what it is instructed to do by the control unit. This could involve arithmetic
operations or logical comparisons.
4. Store Results.
The results of the execution are stored in registers or in the memory.
The last two steps that produce processing results are the execution cycle (E-cycle) and the
time it takes to perform the last two steps is known as Execution time (E-time).
The four steps or the two cycles together are known as machine cycle
After a machine cycle is completed for one instruction; it will be repeated for the second,
instruction, etc.
Some CPU’s can speed up processing by using pipelining.
Pipelining is a process where the CPU gets one instruction, decodes another, and executes the
third at the same time.
Registers
Are high-speed storage areas used to temporally hold small units of program instructions and
data immediately before, during and after execution by the CPU.
As instructions are integrated and executed by the CPU; there is a moment of integration
between the various units of the computer systems.
To handle these processes properly and to facilitate the speed of information transfer CPU uses
special memory units called registers.
Registers are used to hold information on a temporary basis and are part of the CPU (not main
memory).
The length of a register equals the number of bits it can store.
Memory
CPU contains the necessary circuitry for data processing and controlling the other components
of the computer system but it does not have sufficient space to store programs and data that are
needed during data processing.
Although CPU has registers for storing data and instructions; they are very small areas that can
hold few data and information at a time.
If instruction and data are to reside in the secondary storage area, it requires loading one by one
into the registers of the
22
Introduction to Information Technology
CPU as the program execution proceeds. This leads to making the CPU idle as the processing
speed of the CPU is much faster than the speed at which data can be transferred from disk to
CPU registers.
Memory also known as primary storage, main memory or internal memory is physically
located close to the CPU (to decrease access time).
The CPU interacts closely with memory - referring to it both for instructions and data and
information. However memory is separate from the CPU.
Memory provides the CPU with a working storage area for program instructions and data. The
chief feature of memory is that it rapidly provides the data and instructions to the CPU.
Memory space is used in five different ways.
• to hold the computers operating system program (DOS, Windows, etc.) that oversees
processing and acts as an interface between the hardware and the application programs.
• to hold applications programs - word processing, spreadsheet, etc.
• to hold data and information temporarily, receiving from input devices and sending them to
output devices during processing.
• to store other data or information needed in processing in the working storage area.
• to provide additional space for programs or data, as needed.
Memory size (storage capacity)
• Like the CPU, memory devices contain thousands of circuits imprinted on a silicon chip. By
representing data as a combination of on or off circuit states, the data is stored in memory.
• Computers vary widely in the amount of internal (primary) memory they have. The size of
memory is measured by the number of storage locations it contains. Each storage location or byte
has a predetermined capacity
• A byte is the amount of memory required to store one digit, letter or character. A byte is equal
to eight bits. Bytes are generally measured by
o kilobyte (kb, k-byte)
Although accepted as approximately one thousand, actually means 210 or 1,024. A storage
device with 640 KB capacity can hold 640 X 1,024 (or 655,360) bytes.
o megabyte (mb, M-byte) millions of bytes.
Accepted as approximately one million, actually equals 1,048,576 (1,024 X1,024 or 220)
o gigabytes (gb,G-bytes) billions of bytes
Accepted as approximately one billion, actually equals 1,073,741,824 (1,024 X 1,024 X 1,024,
or 230)
o terabyte (tb, T-byte) trillions of bytes
Accepted as approximately one trillion, actually equals 1,099,511,627,776 (1,024 X 1,024 X
1,024 X 1,024 or
240).
RAM (Random Access Memory)
Random access means that data and information can be written to or read from the any memory
address at any time and randomly.
In main memory, bytes are identified by a memory address that allows the computer to
determine where an element of data or information is stored.
Stores data and instructions temporarily
It is volatile in that its contents exist as long as electric current is maintained.
RAM chips lose their contents if electric current is turned off or disrupted.
23
Introduction to Information Technology
RAM chips are directly mounted on the computer’s main circuit board on chips mounted on
peripheral cards that plugs into the computer’s main circuit board.
RAM chips consist of millions of switches that are sensitive to changes in electric current.
.ROM (Read Only Memory)
Provides random access to a memory location
Holds data and information even after the electrical current is turned off—it is non volatile.
Unlike the contents of RAM chips, the contents of ROM chips can not be changed—it provides
permanent storage.
Secondary Storage Devices
The term storage or secondary storage refers to the parts of a computer that retain data
permanently, even after turning off the computer. Examples of storage devices would be floppy
disk, hard disk, Compact Disk (CD), Digital Versatile Disk (DVD), and magnetic tape.
Commonly used secondary storage devices can be grouped as magnetic or optical. Magnetic
devices use magnetic technology to write and read data from the storage surface. This category
includes hard disk, floppy disk, and magnetic tape. On the other hand, optical storage devices use
laser technology. CD and DVD fall under this second category.
a) Magnetic Storage Devices
Floppy Disk
A storage medium that is made from a disk of flexible plastic (the "floppy" part) covered with a
magnetic material. The floppy disk is many decades old. The standard floppy disk can hold
1.44MB of data and has 3.5 inch diameter. Floppy disks are slow, unreliable and can hold much
less data than the other storage devices.
Hard Disk
A hard disk contains both the disk and the drive (the slot) that is used to read and write data on
the disk. A hard disk uses rigid turning disks to store data and programs. They have read/write
heads which can read data from the hard disk and write data to the hard disk. The hard disk drive
is sealed. This protects the hard disk drive internals from dust, condensation, and other sources of
contamination. Hard disks can store much more data than floppy disks, and access and transmit it
faster. Currently an average hard disk can store 60 to 80 GB of data. For both hard disks and
floppy disks, data is stored on the surface in sectors and tracks.
Magnetic Tape
A tape drive, also known as a streamer, is a device that reads data from and writes data to a
magnetic tape. It is typically used for archiving or backing up of data stored on hard disks.
Magnetic tapes are long lasting and inexpensive storage media.
b) Optical Storage Devices
Optical storage is a newer storage technology using a high-power laser beam to burn small holes
in a disk's surface coating. Data is represented by the presence and absence of holes in the disk’s
surface.
Optical media are more durable than tape and less vulnerable to environmental conditions. On
the other hand, they tend to be slower than typical hard disks, and hold less data.
Compact Disk (CD)
A compact disc (CD) is an optical disk used to store digital data.
It was originally developed for storing digital audio.
24
Introduction to Information Technology
Types of CDs
The different types of CDs include: CD-ROM, CD-R, and CD-RW:
CD-ROM (Compact Disc – Read Only Memory): is a version of the CD that allows the
information to be stored so that the user can only read from the disks. Once data is recorded on a
CD-ROM, new data cannot be stored and the disc cannot be erased.
Although CD-ROMs look like music discs, they can only be used with a computer equipped with
a CD-ROM drive.
CD-R (Compact Disc - Recordable): refers to compact disks that can be recorded only once, but
read many times. If the recorded content is no longer wanted, additional material can be recorded
only on the remaining space on the disk. The disks themselves are constructed differently from
ordinary CDs.
CD-RW (Compact Disc - Rewritable): is an extension of CD-R whereby you can rewrite data or
audio to the same CD many times. Not all CD drives can read CDRWs.
Digital Versatile Disc (DVD)
DVD is an optical disc storage media that can be used for storing data, including movies with
high video and sound quality. DVDs resemble CD: their physical dimensions are the same – 12
cm or the mini 8cm - but they are encoded in a different format. This enables DVDs to store
more data than that of CDs. A typical DVD can often hold more data than 6 CDs. DVDs can
store an entire movie, or several hours of audio.
Common Types of DVDs
DVD-ROM: These DVDs are read-only disks. They are accessed using a special DVD drive
attached to a personal computer. They are often used for movies (which are more specifically
referred to as DVD-Video) and computer games.
DVD-R: It offers a write-once, read-many time’s storage format similar to CDR, but can hold
more information than a CD-R.
DVD-RW: A recordable DVD format similar to CD-RW.
Output Devices
Output Devices are parts of the computer that are designed to receive output from the computer
and provide it to the user. Examples of output devices are monitors, speakers, and printers.
Monitor
A monitor is an output device similar to a television screen that receives video signals from the
computer and displays the information for the user. It is the most commonly used output device
for displaying text and graphics from a computer.
Today's monitors have much better quality displays than any TV. There are two main types of
monitors:
CRTs (Cathode Ray Tubes): have a large part at the back and are most common on desktop
computers.
LCDs (Liquid Crystal Displays): are flat screens and are commonly used on laptops and some
desktop systems.
Monitors differ in several ways. However, the major differences are the resolution and the
number of colors it can produce at those resolutions.
Resolution refers to how clear the image on the monitor is. It is a width times height
measurement of computer monitor display capabilities in pixels. Pixels are individual dots that
are used to display an image on a computer monitor. The more pixels a screen can show, the
higher the quality.
25
Introduction to Information Technology
Resolution refers to how clear the image on the monitor is. It is measured in pixels, which are
individual dots that are used to display an image on a computer monitor.
The more pixels a screen can show, the higher the quality.
Printer
A printer is a device that produces a paper copy, sometimes called a hard copy, of data stored in
a computer. Broadly speaking, there are two types of printers: impact printers and non-impact
printers.
Impact Printer
With this type of printer, a pin or a hammer strikes the paper and the ribbon together to form a
character, like a typewriter. Impact printers are less expensive but they are noisy and have low
print quality.
Non-Impact Printers
This type of printer does not involve actually striking the paper. Instead, it uses ink spray or
toner powder. It has low noise and can print graphics and often a wider variety of fonts than
impact printers. However they are more expensive. There are three types of non-impact printers,
Ink Jet, thermal and laser printers:
Ink Jet Printer: Sprays ink onto paper to form characters and graphics. Most color printers are
ink jet.
Thermal Printer: Uses heat on chemically treated paper to form characters. Fax machines that
use rolls of paper are of this type.
Laser Printer: Works like a copy machine, using toner and a heat bar. It is faster and more
expensive than the other printers.
Speaker
A speaker is an output device that allows you to hear voice, music, and other sounds from your
computer. There are usually two of them and they come in various sizes.
Computer software
Software is a term for computer programs. A program is a set of instructions that enables a
computer to operate or instructions that tell the computer how to perform a specific task.
Computer software has two major categories:
System software
Application software
Systems software
Systems software includes the computer's basic operating system and language software. The
term also usually covers any software used to manage the computer and the network. Thus we
can say that systems software includes operating systems, device drivers, programming tools,
utilities and more.
Operating Systems
An operating system is the most important program that runs on a computer. Every general-
purpose computer must have an operating system to run other programs. Operating systems
perform basic tasks, such as recognizing input from the keyboard, sending output to the display
screen, keeping track of files and directories on the disk, and controlling peripheral devices such
as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a
traffic policeman - it makes sure those different programs and users running at the same time do
26
Introduction to Information Technology
not interfere with each other. The operating system is also responsible for security, ensuring that
unauthorized users do not access the system.
As of 2005, the major operating systems in widespread use have consolidated into two main
families: the Unix-like family and the Microsoft Windows family.
The Unix-like family is commonly used to refer to many operating systems, which resemble an
operating system called UNIX. The Microsoft Windows family contains operating systems such
as Windows 9x, Windows 2000, and Windows XP.
Operating systems provide a software platform on top of which other application programs can
run. The application programs must be written to run on top of a particular operating system.
Your choice of an operating system, therefore, determines the applications you can use.
Applications Software
Applications software allows a user to accomplish one or more specific tasks. Typical
applications software includes office suites, business software, educational software, databases
and computer games. The uses of computers discussed in section 4 of Unit 1 use applications
software. The following are examples of application software:
Word processing: WordPerfect, Open Office, AmiPro, and MS-Word.
Desktop Publishing: MS-Publisher, Quark Press, and Adobe InDesign.
Spreadsheet: Lotus 1-2-3, MS-Excel, and Corel Quattro Pro.
Database management: MS-Access, MySQL, and Oracle.
Presentation: MS-PowerPoint, Freelance Graphics, and Adobe Persuasion.
27
Introduction to Information Technology
Actually a computer system composed of many layers of software and hardware. But for
simplicity we see the computer in Abstract way. This avoids details and make the user to
concern about the outer layer which is easy for the user to communicate with the computer.
Generally modern computers consists of multi-layers or levels. The following figure
shows the different levels.
1
Logic gate level Boolean algebra & truth tables
Device level
0 Transistors, capacitors & resistors
Programs written in there languages instruct the computer to perform certain operations. A
program to perform a specific task can be written at any one of the levels.
28
Introduction to Information Technology
When computers were invented, only levels 1 and 3 were present. A human communicated with
these machines by programming them in machine language at the machine level. Machine
language is great for machines but is ledious and in convenient for a human programmer level 4
is developed to manage the resource of the computer.
A truth table is a table that shows the output of a logical function for all possible combinations
of input values.
A gate is a mathematical abstraction of a physical device that we can boiled to perform the
function of a truth table.
In the early days, every time a company introduced a new computer model, the programmers had
to learn the assembly language for that model. All their programs written for the old machine
would n ’t work on the new machine. High order languages at level 6 were invented so
programs could be transferred from one computer to another with little modification and because
programming at a lower level. Level 7, the application level allows to use the computer as a too
( without) knowing the operational details at the lower levels.
In the hierarchical structuring of a computer the logic gate level is above the device level. A gate
is a circuit with one or more input signals but only one output signal. Gates are digital ( two
state) circuits because the input or output signals are either low or high voltages. Gates are often
called logic circuits because they can be analyzed with Boolean algebra.
An inverter is a gate with only one input signal and one output signal; the output state is always
the opposite of the input state. An inverter is also called a Not Gate because the output is not the
same as the input. The output is sometimes called the complement (opposite) of the input.
X X
OR GATES
The OR gate has two or more input signals but only one output signal. If any input signal is high
(1), the output signal is high. Logic symblos of OR gate:
29
Introduction to Information Technology
X X
Y X+Y Y X +Y+Z
Z
(a) a2-input OR gate (b) a 3-input OR gate
A
B A+B+C+D
C
D
(c) a 4-input OR gate
Truth table of
X Y X+Y
0 0 0
0 1 1
1 0 1
1 1 1
Truth table of
X Y Z X+Y+Z
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
AND GATES
The AND gate has tow or more input signals but only one output signal. All inputs must be high
to get a high output.
X X
Y X+Y Y X +Y+Z
Z
30
Introduction to Information Technology
A
B A.B.C.D
C
D
c)4-Input AND gate=
Truth table of
2-input AND gate
X Y X.Y
0 0 0
0 1 0
1 0 0
1 1 1
Truth table of
2-input AND gate
X Y Z X.Y.Z
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
NAND Gates
The logic symbol for NAND gate is:
X X.Y OR X X.Y
Y Y
X Y X.Y
0 0 1
0 1 1
1 0 1
1 1 0
NOR Gates
The logic symbol for NOR gate is
X X+Y X +Y or X X+Y
Y Y
31
Introduction to Information Technology
X Y X.Y
0 0 1
0 1 0
1 0 0
1 1 0
X X+Y
Y
X Y X+Y
0 0 0
0 1 1
1 0 1
1 1 0
Boolean Algebra
For centuries mathematicians felt there was a connection b/n mathematics and logic, but no one
before George Boole fould find this missing line.
In 1854 he invented symbolic logic, known to day as Boolean algebra. Each variable in Boolean
algebra has either of two values: true or false. The original purpose of this two- state algebra
was to solve logic problems. Today Boolean algebra is the backbone of Computer circuit
analysis and design . In Boolean algebra a variable can be either a 0 or a1. For digital circuits,
this means that a signal voltage can be either low or high.
Gate is a logic circuit with one or more input signals but only one output signal.
Logic circuit a circuit whose input and output signals are two-state, either low or high voltages.
The basic logic circuits are OR, AND and NOT gates.
Truth table a table that shows all input and output possibilities for a logic circuit. The input who
words are listed in binary progression.
32
Introduction to Information Technology
A complex logic circuits can be constructed using the basic logic circuits. Any logic circuit can
be represented by a Boolean function and viceversal.
X x X X
X x x
X+y x +y
33
Introduction to Information Technology
Y y y x+y
To construct the logic circuit of a Boolean equation first we have to simplify the Boolean
function using the rules of the operators ( theorems)
x +y + x y + ( x+ y) x y = x+ y + x y ( 1+x+y) = x+ y + x y
X
X +Y +x y
Y
Simplification: A preliminary guide for comparing the simplicity of one logic circuit with
another is to covet the number of input gate leads; the circuit with fewer input gate leads is
usually easier to build.
Factoring to simplify
34
Introduction to Information Technology
Y
Y
B
A B C D
Y = AB C D + AB CD + AB C D + ABCD
= BCD ( A + A) + ABCD + ABCD
= BCD + ABCD + ABCD
= CDC (B + AB) + ABCD
A AB B+AB
B
B CD ( B + AB)
C CD
D
ABCD
A A B B C C D D
35
Introduction to Information Technology
A B C Y
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
Half adders
The simplest form of electronic binary arithmetic is performed in a half adder circuit. A half
adder adds 2 bits and generals sum and carry- out bits. Although Boolean gates are used to
perform binary operation the half –adder is designed to perform true binary rather than logical
addition.
A B S Co
0 0 0 0
0 1 1 0
1 0 1 0
1 1 0 1
S= A + B – sum output
Co = AB – carry output
36
Introduction to Information Technology
A B A
Carry B S=A + B
Co = A.B
Sum
Full-Adders
The half-adder can’t perform the binary ( addition) operation if there is a carry-in transferred to
the next higher significant bit column.
Ex 1011
0011
1110
For the above example there is a carry from column 1 to column 2 and from column 2 to column
3 so in such cases the half-adder fails so we need another adder that is called a full adder. A full
adder is a circuit that performs a complete binary addition. It accepts three separate inputs bits,
the two bits to be added and a carry in.
Sum = A + B + C
Carry = AB + AC + BC
Truth table
A B Ci Carry Sum
0 0 0 0 0
0 0 1 0 1
0 1 0 0 1
0 1 1 1 0
1 0 0 0 1
1 0 1 1 0
1 1 0 1 0
1 1 1 1 1
10100 C4S3S2S1S0
37
Introduction to Information Technology
A3 A2 A1 A0
B3 B2 B1 B0
C4 FA C3 FA C2 FA C1 HA
S3 S2 S1 S0
Flip Flops
Computer circuits store data for various periods of time, and gate circuits can be adapted for
storage. Gates must perform short and long term memory functions. Feedback converts gates to
data storage devices.
Pencil and paper calculation yields an answer. Besides displaying an answer, the sheet of paper
serves other functions in solving problem. A piece of paper contains original data, calculations,
intermediate results and finally an answer.
Computer requires separate circuits for each step in the problem solving process. An input
circuit, arithmetic circuit, storage circuit, and output circuit are needed to accomplish what can
be done on piece of paper to solve problems.
A memory circuit must:
Accept input data signals
Store data until needed
Present the data whenever necessary
Combinational circuits are circuits whose output is determined by the current input (signal)
sequential circuits are circuits whose output is determined by the current input (signal) and the
previous state of the circuits so sequential circuits have memory to store their previous state.
The basic computer storage element is the latch, a circuit capable of storing a single bit. If the
last signal presented to the latch is 1, the latch stores 1, and if its is 0, then the latch stores 0.
Both states are stable, and therefore latch is bistable device.
OR gate latch
Data
Output
38
Introduction to Information Technology
A flip fop is a devices with to two stable states (bistable): it remains in one of these states center
triggered into the into the other. Flip flops are the building blocks of sequential circuits. They
are used to construct memories and registers. There are different types of flip flops. The
simplest flip flop is the SR-latch ( S-set and R-Reset) type of the SR-latch can store 1-bit of
information.
Set-sets to one
Rest-sets to zero
RS latch using NOR
R
Q
R Q
S Q’ S Q’
SR-latch
Truth table
R S Q Q’ Comment
0 0 Previous output are stored
0 1 Set
1 0 Reset
1 1 Must be prevented
R S Q
0 0 NC
0 1 1
1 0 0
1 1 *
From the truth table we can see that when r = S= 0 Q = NC that means there will not be any
change that can occur in the output that is the circuit remains latched in the last state.
When R= 0 and S = 1, the circuit sets the Q output to 1. On the other hand, if R= 1 and S= 0 the
Q output resets to 0, if R= S=1 is never used because it leads to in predictable operation.
39
Introduction to Information Technology
S= 1 Q=0, Q =o
R=1 Q=0 Q =0
But Q can’t be equal to Q
Application of Gates
Complement generator
Used to produce complement of a binary number.
Comparator
A digital comparator is a circuit which compares the value of two words of equal length. EORs can be used to
construct a comparator and a 3-bit compartor is shown below
40
Introduction to Information Technology
Chapter four
4.Data representation and computer arithmetic
4.1 Units of Data Measurement and Representation
This section discusses how data is represented in the computer system. It also deals with
measuring units of the size of memory and storage devices.
Digital computers store data using two state components. With two such states, we can
represent exactly two different values. These two values correspond to the two digits used
by the binary number system. As such, the computer employs the binary number system.
The binary number system works just like the decimal number system, with two
exceptions: the binary number system allows only the values 0 and 1 (rather than 0- 9),
and the binary number system uses powers of two rather than powers of ten.
UNITS ON DATA MESURMENT
Bits, Bytes, KB, MB
A bit (short for binary digit) is the smallest unit of data; it represents one binary digit (0
or 1). However, computers usually do not operate on single bits, rather they store and
manipulate a fixed number of bits. Most often, the smallest unit or number of bits a
computer works with is eight bits. These eight bits make up a byte. A byte is a group of
eight bits that usually make up a single character - letter, number, or special character.
Most coding standards use eight bits, and the eight bits represent a single character, such
as the letter “A” or the number “7”. Thus, the computer can store and manipulate an
individual byte (a single character) or a group of bytes (several characters, a word) at a
time. These individual bytes, or groups of bytes, form the basic unit of memory. The
memory size can be measured in Kilobytes (KB), Megabytes (MB), Gigabytes (GB), etc.
The common units are shown in the following table:
Unit
Equivalent Quantity
41
Introduction to Information Technology
CODING METHODS
There are different coding systems, that convert one or more character sets into computer
codes. Some are: EBCDIC pronounced as “Eb-see-dick” and stands for Extended Binary
Coded Decimal Interchange Code.
Coding Examples
EBCDIC
Character Zone Digit
a 1000 0001
b 1000 0010
A 1100 0001
B 1100 0010
0 1111 0000
9 1111 1001
BCD (6-bits)
Coding Examples
BCD
Character Zone digits
A 11 0001
Q 10 1000
8 00 1000
9 00 1001
ASCII-7
ASCII stands for American Standard Code for Information Interchange
Used widely before the introduction of ASCII-8 (the Extended ASCII)
Uses 7 bits to represent a character;
With the seven bits, 27( or 128) different characters can be coded (0000000-1111111)
It has a zone and digit bits positions
42
Introduction to Information Technology
Coding examples:
ASCII-7
Character Zone digit
$ 010 0100
% 010 0101
A 100 0001
a 110 0001
b 110 0010
Coding Examples
43
Introduction to Information Technology
BIT
Bits are the smallest units and can convey only two possible states 0 or 1;
bit stands for binary digits;
A bit is a single element in the computer, on a disk that stands for either “ON”
indicating 1 or “OFF” indicating 0;
In the computer “ON” is represented by the existence of current and “OFF” is
represented by the non existence of current
On a magnetic disk, the same information is stored by changing the polarity or
magnetized particles on the disk’s surface;
BYTE
Bits can be organized into large units to make them represent more and meaningful
information;
This large unit is called a byte and is the basic “unit of data representation” in a
computer system;
The commonly used byte contains 8 bits;
Since each bit has two states and there are 8 bits in a byte, the total amount of data
that can be represented is 28 or 256 possible combinations;
Each byte can represent a character(a character is either a letter, a number or a special
symbol such as +,-,?,*, $, etc
A byte is then used as a unit of measurement in the computer memory, processing
unit, external storage and during communication;
If the computer memory is 524288 byte, this is expressed in short by saying 512KB,
where KB stands for kilobyte.
1 Kilobyte(1KB) is 210 or 1024 bytes
1 Megabyte(MB) is 220 bytes or 210 kilobytes
1 Gigabyte(GB) is 230 bytes or 220 kilobytes or 210 megabytes
WORD
Word refers the number of bits that a computer process at a time or a transmission
media transmits at a time
Although bytes can store or transmit information, the process can even be faster if
more than one byte is processed at a once;
A combination of bytes, then form a “word”
A word can contain one, two, three or four bytes based on the capacity of the
computer;
Word length is usually given in bits
We say that a computer is an 8-bits, a 16 bit, a 32 bit or a 64 bit computer to indicate
that the amount of data it can process at a time;
The large the word length a computer has the more powerful and faster it is.
44
Introduction to Information Technology
Computer Arithmetic
Number systems
There are different number systems. Some of are:
Decimal number systems
Binary number systems
Octal number systems
Hexadecimal number systems
Ex. 0 10 20 30 40 50 60 70 100
1 11 21 31 " " " "
2 12 22 32 " " " "
3 13 23 33 " " " "
4 14 24 34 " " " "
5 15 25 35 " " " "
6 16 26 36 " " " "
7 17 27 37 47 57 67 77
45
Introduction to Information Technology
When we compare the octal with the decimal 0-7 in octal is the same as 0-7 in decimal
but 10 in octal is not the same as 10 in decimal because 10 in octal holds the position of
8 in decimal, off course 10 in octal is the same as 8 in decimal.
Hexadecimal number system (16) (hex)
Suppose we had 16 fingers instead of 10 in case of 10 fingers they invented new
symbols until they exhausted all their fingers. Now they would have to invent new
symbols because there would have be some more fingers left un represented .
These extra symbols are usually represented by the letters at the beginning of the
English alphabet.
It uses 16 symbols to represent numbers. But for the numbers greater than 15
they represented in terms of the 16 symbols example 16 as 10 and so on.
0 A 15 1F 30
1 B 16 20 31
2 C 17
3
4
5
6
7
8
9
The values that members have within given number systems are largely determined by
their positional notation. Positional notation means that the position of one symbol
relative to other symbols in a given number system determines the value of that symbol.
For example, these symbols 1 & 7 can represent either 1 or 7 or 71 depending upon their
relative position to one another.
(135) 10 = 1*102+3*101+5*100
The number 10 in binary is not the same as 10 in decimal because the value of 1 in
the binary is not the same as the value of the 1 in the decimal.
46
Introduction to Information Technology
11012 = 1*23+1*22+0*21+1*20
= (1*8)+(1*4)+(0*2)+(1*1)
= 8+4+0+1
= 1310
(Base 10……….Base M)
5610 =1110002
7810=1168
3010=1E16
=Y10
=73
2. convert (234)8 to decimal
=156
3. convert (101)8 to decimal
47
Introduction to Information Technology
=65
4. convert (A1B) 16 to decimal
= 2587
5. covert (101)16 to decimal
=257
Conversion from binary (base2) to Octal (base 8) or hexadecimal (base16) and vice
versa
To convert a number in binary to octal group three binary digits together starting from
the last digit (right and if there are no enough digits add zeros in fron , (left) and find
the corresponding Octal of each group.
To convert binary to hexadecimal group four binary digits together starting from right
and if there are no enough digits add zeros at the left.
111100100=0001,1110,0100
= 1 14 4
= 1E416
To convert from Octal to binary , convert each octal digit to its equivalent 3 bit binary
starting from right.
To convert from Hexadecimal to binary convert each hex. Digit to its equivalent 4-bit
binary starting from right.
Ex. Convert 23416 to binary
23416 =0010 0011 0100
= 10001101002
Convert 2AC to binary
2AC16 =0010 1010 1100
=10101011002
48
Introduction to Information Technology
To convert from Octal to hexadecimal, first we have to convert to binary and the binary
to hexadecimal. To convert from hexadecimal to Octal, first we have to convert to binary
and then the binary to Octal.
49
Introduction to Information Technology
Converting decimal number which contains fractions to Binary and Binary with
fraction to decimal.
50
Introduction to Information Technology
conversion from Octal with fraction to hexa and hexa with fraction to octal and
octal/hexa with fraction to decimal.
To convert from Octal to hexa, first convert the Octal to binary and then the binary to
hexa
To convert from hexa to Octal, first convert the hexa to binary and then the binary to
Octal.
To convert from Octal/hexa to decimal, first convert to binary and –then the binary to
decimal.
Remark:-
BCD numbers are useful whenever decimal information is transferred into or out of a
digital system. Examples of BCD systems are electronic ousters, digital voltmeter, and
digital clocks; their circuits can work with BCD numbers.
BCD’s are easy for conversion but slower for processing than binary. And they have
limited numbers because with BCD we can represent only numbers 0000 for 0 and 100
for 9 and ,1010,1011,1100,1101,1110, 1111 can’t be used because 1010 represent 10 in
decimal at 10 in decimal is 1010 0000 in BCD.
Binary Arithmetic
Computer understands only the language of binary numbers. Therefore, the machine
performs what is called binary arithmetic (binary computation).
Binary addition
Binary addition operates by the same rule as decimal addition, except that it is simpler. A
carry to the next higher order ( or more significant) position occurs when the sum is
decimal 2, that is, binary 10. Therefore, the binary addition rules may be written as
follows:
0+0=0
0+1=1
1+0=1
1+1=0 plus a carry of 1 into the next position
1+1+1=1 plus a carry of 1 into the next position.
The last case occurs when the two binary digits in a certain position are 1s and there is a
carry from the previous position.
Example;
Decimal = Binary Ex3 10011
6 + 110 11111
7 111 1010
13 1101 1001
1000101
51
Introduction to Information Technology
Binary Subtraction
It operates by the same rule as decimal subtraction. The rule is as follows;
0-0=0
1-0=1
1-1=0
10-1=1
Example:
11100 101101 11001.011
- 11010 - 111 - 111.110
00010 101100 10001.101
Binary Multiplication:
0x1=0
1x1=1
Binary division
That is, the process for dividing one binary number (the dividend) by another
(the divisor) is based on the rules for binary subtraction and multiplication and
52
Introduction to Information Technology
In signed binary representation, the left-most bit is used to indicate the sign of the
number. Traditionally, 0 is used to denote in positive number and 1 is used to denote a
negative number. But the magnitude part will be the same for the negative and positive
values. For example 11111111 represents-127 while, 01111111 represents + 127. We
can now represent positive and negative numbers, but we have reduced the maximum
magnitude of these numbers to 127.
In a 5- bit representation we use the first bit for sing and the remaining 4- bits for the
magnitude. So using this 5r bit representation the range of number that can be
represented is from -15 (11111) to 15(11111)
i. One’s complement.
In one’s complement representation, all positive integers are represented in their correct
binary format. For example +3 is represented as usual by 00000011. However, its
complement, -3, is obtained by complementing every bit in the original representation.
Each 0 is transformed into a1 and each 1 into a0. In our example, the one’s complement
representation of -3 is 11111111.
53
Introduction to Information Technology
Ex: +2 is 00000010
-2 is 11111101
Note that in this representation positive numbers start with a 0 on the reft, and negative
numbers start with a 1 on the left.
Ex1. Add -4 and +6
- 4 is 11111011
+ 6 is 00000110
the sum is (1) 00000001
54
Introduction to Information Technology
If we ignore the carry the result is 00000001 ( i. e 1 In decimal). This is the correct
result. In two’s complement, it is possible to add or subtract signed numbers, regardless
of the sign. Using the usual rules of binary addition, the result comes out correct,
including the sign. The carry is ignored. One’s complement may be used, but if one’s
complement is used, special circuitry is required to “ correct the result”.
If we assume that the carry is the ninth bit of 100000001= 257. However, the carry must
be recognized and handle with care. Inside the microprocessor, the registers used to hold
information are generally only eight bits wide. When storing the result, only bits 0 to 7
will be preserved.
Overflow
Bit 7 bit 6
carry.
It is carry but the result is incorrect b/se as bit 7 has been changed.
55
Introduction to Information Technology
Overflow indicates that the result of an addition or subtraction requires more bits than are
available in the standard 8-bit register used to contain the result.
Fixed format representation: We now know how to represent signed integers: however,
we have not yet resolved the problem of magnitude. If we want to represent large
integers, we will need several bytes. In order to perform arithmetic operations efficiently,
it is necessary to use a fixed number of bytes, rather than a variable number. Therefore,
once the number of bytes is chosen, the maximum magnitude of the number that can be
represented is fixed.
Complements are mainly used for representing negative numbers and subtraction.
In performing binary subtraction or addition of negative number by use of binary
complements only one procedure, addition, is needed as one can subtract by adding its
complements.
To subtract any number, positive or negative, substitute the required complement for
the numbers to be subtracted and then add.
If the result is
a) An ( n+1)-bit number, and the arithmetic is in
i) Ones complement the (n+1) th bit, a carry, is added to the right most bit of the
result. This process is called an end-around carry.
ii) Tow’s complement discard the (n+1) th bit.
56
Introduction to Information Technology
Floating-Point Representation
In this representation decimal numbers are represented with a fixed length format. In
order not to waste bits, the representation will normalize all the numbers. For example,
0.000123 wastes three zeroes on the left before non -zero digits. There zeroes have no
meaning except to indicate the position of the Decimal point. Normalizing this number
result in .123x10-3 .123 is the normalized mantissa; -3 is the exponent. We have
normalized this by eliminating all the meaningless zeroes to the left of the first non-zero
digit and by adjusting the exponent.
The general form of floating point representation is Mx10 E where M is the mantissa, and
E is the exponent . It can be seen that a normalized number is characterized by a
mantissa less then 1 and greater than or equal to.1 all cases when the number is not zero.
In representing a number in floating point we use 1 bit for sing, some bits for exponent
and the remaining bit for mantissa.
Biased exponent = true exponent + excess 2 n-1, where n is the number of bits representing
the exponent.
Ex1.
Represent –234.375 in floating point using 7 bit for exponent and 16 bit for mantissa.
First we have to change to normalized binary
i. e 234 = 11100010
0.375= 0.011
234.375 = 11100010.011 = 0.11100010011x2 8
57
Introduction to Information Technology
true exponent = 8
excess 2 n-1 = 2 7-1= 26= 64
Biased exponent = 8+26 8+64 = 72
= 100 1000 2
Therefore –234.375 is represented as
1 1001000 1110001001100000
Ex2. Represent 34.25 in floating point using 7 bit for exponent and 24 bits
for mantissa.
34.25 = 1000 10.0 12
The normalized form of 34.25 = .10001001x 2 6
True exponent = 62 n-1 = 2 7-1= 6+26
=6+64=70
70 = 10001102
Floating-point Arithmetic
To perform floating-point arithmetic.
First correct the numbers to normalized binary of the same exponent
Apply the operator
If necessary normalize the result
Ex1. Find 23.375+ 41.25 using 7-bit for exponent and 10 bit for mantissa.
23.37+41.25 = 0.01011101x26+0.1110010x26
= (0.010111011+0.11100101)26
= 0.1010000101x26
58
Introduction to Information Technology
Chapter Five
Problem Solving Using Computers
Steps Program development
Computer solves varieties of problems that can be expressed in a finite number of steps
leading to a precisely defined goal by writing different programs. A program is not
needed only to solve a problem but also it should be reliable, (main trainable) portable
and efficient. This is met by program design using techniques of software engineering.
Computer programming is the art of conceiving a problem in terms of the steps to its
solution and expressing those steps as instructions for a computer system to follow.
There are five stages of program development: -
There are different ways of describing the algorithm but the most common ones are
structured English (using any of existing human languages), structure chart and flow
chart.
59
Introduction to Information Technology
Structure chart
Structure chart for payroll program
Main Drive
Gross Pay
Federal State Tax Local Tax Union Voluntary
Tax Dues Deduction
s
60
Introduction to Information Technology
Flow chart
A flow chart consists of an ordered set of standard symbols (mostly, geometrical shapes)
which represent operations, data flow or equipment. There are two types of flow charts.
System flow-charts the overall logic of data processing system. A program flow chart
shows the operations and logical decisions of a computer program.
Example 1:- Draw flow chart of an algorithm to add two numbers and display their
result.
Algorithm description:-
Read the rules of the two numbers ( a and b)
Assign the sum of a and b to c
Display the result ( c)
Start
Read a, b
C= a + b
Print C
Stop
Ex 2:- Write an algorithm description and draw a flow chart to find the
following sum.
Sum = 1+2+3+..+….
Ex2:- Write an algorithm description and draw a flow chart to check a number
is negative or not algorithm description.
1/ Read a number x
2/ If x is less than zero write a message negative
Introduction to Information Technology
Start
Read x
Yes
X<0 Print message
write negative
No
Write not
negative
Stop
Some times there are conditions in which it is necessary to execute a group of statements
repeatedly. Until some condition is satisfied. This condition is called a loop. Loop is a
sequence of instructions which is repeated until some specific condition occurs.
Computation:- Processing
Test:- Every loop must have some way of exiting from it or else the
program would endlessly remain in a loop.
Initialization
Finished
TEST Exit
Computation
Incrementation
Input Employee
Employee <> 0
Calculate Gross Pay
Print Check
Last check printed
Ex:- Write the algorithmic description and draw a flow chart to find the
following sum.
Sum = 1+2+3+….. + 50
Write sum
Counter 50 No
yes
Stop
Sum = Sum + counter
Counter Counter + 1
Ex 3:- find n!
Pension – 10%
I.T- 0 - 120
10% 600
20 % 1200
30 % > 1200
c) Coding
The flow chart is independent of programming language. Now at this stage we translate
each steps described in the flow chart (algorithm description) to an equivalent instruction
of target programming language, that means, for example if we want to write in Pascal
program language, each step will be described by an equivalent Pascal instruction
(Statement).
d) Implementation
This is the final stage where the program is debugged for error, tested and documented.
e) Maintenance
Some time it may be needed to modify the program so that it accommodates new things
and it becomes efficient, and this can be done through maintaining the program.
Introduction to Information Technology
Types of instruction
A program is a set of instructions (steps) that a computer should follow to perform a
given task. The instructions should be written in a language (or can be translated to a
language) that can be understood by the computer. The language that is used to write
instructions is called a programming language. Depending on the function the instruction
performed, instructions are categorized as follows:
Every programming language has its own sets of instruction and it has its own way of
writing the instructions.
Name three high-level languages and describe their strengths and weaknesses
FORTRAN (formula translator). Scientific, engineering applications
not good at input/output efficiency or at printing and working with lists
COBOL (common business oriented language). Predominant for transaction
processing
weak in mathematical functions but strong in processing large data files with
mixed alphabetic and numeric data, making it appropriate for business
applications
BASIC (beginners all-purpose symbolic instruction code). General purpose PC
language
Used primarily for microcomputer programming, and requires only a small
interpreter
lack sophisticated control or data structures required by good programming
Pascal. Used to teach structured programming practices. Weak in file handling, input
/ output
Ada. Designed for weapon systems. Can be used on many platforms. Structured. Can
be used for business
C. Powerful pc language for developing applications. Efficient execution; cross
platform
Machine language:- There is the only language that the computer understands directly
zero. A machine language is a set of machine instructions which consists of zeros and
one’s. a machine instruction contains two parts an operation code ( op code) and an
address. The OP code tells the microprocessor system what operation it should perform,
add, transfer, compare, or move data to output device, etc. the address identifies the
location ( memory, register) holding the required operands that is, the data to be operated
upon. The address part may contain one, two or more addresses that is , there may be one
( or single address, two( double) address, and three ( or triple) address instructions.
Low-level Languages:- In machine language we have seen that the OP code and the
address are represented as a binary sequence but it is difficult for the programmer to write
a big program using binary sequence and it is difficult to debug an error from such
program so instead of representing the OP code and the adders as a binary sequence we
can represent them in mnemonics ( terms). A low-level language is a programming
Introduction to Information Technology
language which uses mnemonics to write in program Low-level languages are machine
dependent.
Ex:- Fortran, COBL, ALGOG 80, Basic, Scientific & engineering applications.
There are also other languages which are still simplest and easier then high-level
languages which we called then fourth generation languages. These languages are
application oriented languages.
Ex:- Visual basic,
Translation Process
What Is the Difference Between an Assemble, a Compiler, and an Interpreter?
Introduction to Information Technology
Language Translation
For every modern language, there is a program that takes the source code and
produces object code in machine language
The interpreter
The compiler
Compiler
A set of programs that translate the source code of higher-level software
languages into machine language, or object code
Language Translation
The compiler
Translates source code once and produces a complete machine language program
Advantages - fast
Disadvantages - harder to write and debug
Examples - pascal, C, FORTRAN, and openscript
Assembler
An assembler is a software tool for translating assembly language into machine
language
Interpreter
An interpreter translates source code instructions, one instruction at a time, from a
higher level language such as BASIC into machine language
Language Translation
The interpreter
Translates a line of source code into one or more lines of object code and then
instructs the computer to perform those instructions until another line has to be
translated
Advantages - fairly easy to write, and easy to debug
Disadvantage - SLOW
Examples - basic, lisp
There are three types of translators; assembler, interpreter, and compiler.
Interpreter:- A translator that accepts one line of a source program at a time, produces
the corresponding machine code instructions and execute them.
Chapter six
Data Communication and Computer Networking
Data communication
The need of information has increased from time to time. This leads to the need of
sharing of information among different agents (individual). Which may be at different
places or locations Date communication is the exchange of information between two
agents. For exchange of information the information should be transmitted from one
point to another through a transmission media called Channel. The following figure
shows the different components of data communication.
Mode of transmission
The transmission medium may be physical (it connects the transmitter and receivers
through wire) or logical (Their are different mode of transmission)
Transmission Media
Transmission Medium is the physical path between transmitter and receiver in a data
communication system. The characteristics and quality of data transmission are
determined both by the characteristics of the medium and characteristics of the signal.
Media of data transmission:
1) Guided Transmission media- Data transmission is through solid medium
(wired system).
2) Unguided Transmission media– Data transmission through air /space (i.e
wireless system)
Commonly used guided media:
Twisted pair
Coaxial cable
Optical fiber
Computer Networks
When a computer system is processing data all by itself, without any interaction or
interconnection with any other computer system, it is called a stand-alone computer
system. A Network System is a system of two or more computers that are connected to
each other for the purpose of data communication and sharing of resources.
A network also consists of communication channels that are responsible for connecting
devices with each other and transmitting information..
Some of the most important advantages of a computer network system are:
Data sharing between different users of computers with certain amount of
data security and access control.
Sharing of software application systems.
Distribution of computing load on computers at distributed locations to
reduce peak load.
Sharing or high power computing resources situated at a central location
on a need basis.
Sharing of costly special devices by several computer users.
Types of Networks
Networks may be classified based on a number of parameters:
Span of Control
Geographical Span
1) According to Span of Control
Based on span of control computer networks can be classified into two major groups:
Centralized Network
Distributed Network
Introduction to Information Technology
I) Centralized Network
Centralized network has one main CPU that processes all information requests and
handles communication. The main CPU in a centralized network is usually a mainframe
or minicomputer capable of handling the processing workload of many people
simultaneously. People interface with the host computer by using terminals and other
input and output devices.
A terminal is a hardware device consisting of a keyboard and monitor. There are two
types of terminals:
Dumb Terminals
Intelligent Terminals
Terminals that have no storage or processing capabilities are called dumb terminals.
Because dumb terminals do not have any processing capabilities, they must be connected
to a host computer that can perform any processing functions necessary.
Intelligent terminals, on the other hand, do have limited storage and processing
capabilities.
I) Distributed Network
Distributed network is a collection of workstations connected to each other, along with
various shared storage and input and output devices (for example, scanners and printers).
In a distributed network each workstation can handle some, if not all, of its own
processing. Workstations in a distributed network also maintain local information and
software.
Distributed Network can be either
Client/Server, or
Peer-to-Peer
F i l e S e r v e r
Introduction to Information Technology
Peer to peer
MAN
LAN LAN LAN
WAN
6.3 Network Topology (Bus, Star, Ring)
The way in which connections are made is called the topology of the network. Network
topology specifically refers to the physical layout of the network, especially the locations
Network Topologies
Introduction to Information Technology
The term topology, or more specifically, network topology, refers to the arrangement or
physical layout of computers, cables, and other components on the network. "Topology"
is the standard term that most network professionals use when they refer to the network's
basic design. In addition to the term "topology," you will find several other terms that are
used to define a network's design:
Physical layout
Design
Diagram
Map
A network's topology affects its capabilities. The choice of one topology over another
will have an impact on the:
Type of equipment that the network needs
Capabilities of the network
Growth of the network
Way the network is managed
Developing a sense of how to use the different topologies is a key to understanding the
capabilities of the different types of networks.
Before computers can share resources or perform other communication tasks they must
be connected. Most networks use cable to connect one computer to another. However, it
is not as simple as just plugging a computer into a cable connecting to other computers.
Different types of cable—combined with different network cards, network operating
systems, and other components—require different types of arrangements. To work well, a
network topology takes planning. For example, a particular topology can determine not
only the type of cable used but also how the cabling runs through floors, ceilings, and
walls. Topology can also determine how computers communicate on the network.
Different topologies require different communication methods, and these methods have a
great influence on the network.
There are four basic types of computer topology: bus, star, ring and mesh.
1 Bus Topology
The bus topology is often referred to as a "linear bus" because the computers
are connected in a straight line. This is the simplest and most common method of
networking computers. Figure 5 shows a typical bus topology. It consists of a single cable
called a trunk (also called a backbone or segment) that connects all of the computers in
the network in a single line.
Workstation
Workstation
Central Server
Hub Workstation
Workstation
Workstation Workstation
Workstation
The ring type consists of a network configuration that connects nodes at certain intervals on
a ring-shaped, high-speed data transmission line. All nodes share the ring - the ring is
connected separately to the transmitting and receiving sections of each node. Data placed
on the ring by a station makes its round on the ring.
Each node receives the data and checks to see if the data is addressed to it. When the data
is received by the node to which it is addressed, the node accepts and responds accordingly.
Otherwise, the node reproduces and repeats the data for transmission to the next node.
Workstation
Laser printer
Token-ring
Workstation Server
ASCII Printer
Workstation
• The receiving computer takes the token and copies the message and leaves the
token to rotate
• The sender again takes the token and removes the massage from the token to
make the token empty
4. Mesh topology
Mesh topology has multiple connection between each of the nodes on the network.
Each computer connects with separate cabling.
Mesh fdfffsdf
Mesh topology
{ }The Internet
Definition
The Internet is a term used to describe a worldwide
network of computer networks connecting millions of
computers around the world.
The Internet is one of the largest, most widely used networks (in fact, a network of
networks) that has evolved and grown overtime. It is a group of two or more networks
that are :
o Interconnected physically
o Capable of communicating and sharing data with each other
o Able to act together as a single network.
The Internet connects millions of computers globally and provides worldwide
communications to businesses, homes, schools, and governments.
Brief History{tc \l 2 "5.5 THE INTERNET "} of the Internet
The Internet has had a relatively brief, but explosive history so far. It grew out of an
experiment begun in the 1960's by the U.S. Department of Defense. Its goal was to create
a method for widely separated computers to transfer data efficiently even in the event of a
nuclear attack. If part of the network were damaged or destroyed, the rest of the system
still had to work. That network was ARPANET, which linked U.S. scientific and
academic researchers. It was the forerunner of today's Internet.
Today's Internet is made up of a loose collection of interconnected commercial and non-
commercial computer networks, including on-line information services to which users
subscribe. Servers are scattered around the world, linked to the Internet using modems,
phone lines, and satellite links.
From a handful of computers and users, today the Internet has grown to thousands of
regional networks that can connect millions of users. It has grown explosively in the
1990s to thousands of regional networks that can connect millions of users. There are
Introduction to Information Technology
millions of server computers on the Internet, each providing some type of information or
service. The number of users of the Internet is harder to measure.
Because the Internet is a world-wide distributed collection of computers rather than one
central computer that everyone ties into, there is no central, controlling agency, nor can
there ever be (No one is in charge of the Internet). There are organizations, which
develop technical aspects of this network and set standards for creating applications on it,
but no governing body is in control. The Internet backbone, through which Internet traffic
flows, is owned by private companies. Any computer on the Internet that is properly
configured can share information with any other computer found there
Advantages of the Internet
The Internet helps in various ways:
To get information
You could get information about people, products, organizations, research data,
electronic versions of the printed media, etc. from the Internet. You can get easy access to
a wealth of information and entertainment. As such it is often described as the prototype
for a world wide information "superhighway".
To provide information
Most of what you want to provide could be considered global advertising. The best and
most inexpensive way to let people know who you are, what you are doing/have done,
and how
Publishing: including full test articles, reports, abstracts, computer programs, and
demonstrations
Extension: in which some of the delays associated with the printed media,
may be reduced.
Teaching: The possibilities here include both distance learning and assistance for
students
Sharing/exchanging information with the outside world.
Ability to communicate
The Internet gives people the ability to communicate with other connected
computer users through electronic mail and real time typed conversations (bulletin
boards, databases, and discussion groups). Users will be able to use electronic mails
to transmit messages, announcements and document/file attachments to other users
within the Intranet or over the Internet.
How big is the Internet?
It's difficult to judge the size of the Internet. People and systems are being added
daily. However, it is estimated that in the United States alone, more than 27.5 million
people are connected to the Internet.
There are over 150,000 unique domain names in the US alone.
Some of the largest Internet Search Engines have over 30 million web documents
listed, with an annual growth rate exceeding 28%.
There are more than 65 countries currently connected to the Internet.
Introduction to Information Technology
Internet Connectivity
You can connect to the Internet in one of two basic ways, dialing into an Internet service
provider’s (ISP) computer, or with a direct connection to an Internet service provider.
The difference is mainly in the speed and cost. In most cases, you connect to your ISP
using a telephone line modem. This type of connection is called the Dial-up connection.
Sometimes you go in for a direct connection.
Dial-up Connection
To establish a conventional dial-up connection to the Internet, you will need the
following
An account with an ISP ((a company that provides the Internet access)
A telephone connection
A computer
Modem (external/internal)
A communication software
Your Internet Service Provider (ISP) will install the following in your computer:
Telecommunications Software
A World Wide Web Browser.
An Email program.
An FTP Program (optional)
A Newsgroup Reader
With all this software installed, you will be ready to access the Internet. Your computer
will dial a local number, which is provided by your ISP. Once you have logged into your
ISP, you are connected to the Internet.
There are two classes of computers on the Internet, HOSTS and CLIENTS. Unless you
have a permanent link to the Internet and your machine is always connected and on-line,
then you are probably a client and not a host.
6.7.4.2. Direct Connection
You can also get a direct connection to your ISP, where you have a fixed cable or a
dedicated phone line to the ISP. Often the dedicated line is an ISDN (Integrated Services
Digital Network) line that is a higher speed version of the standard phone line.
Applications and Services on the Internet
The Internet is actually very boring since it is nothing more than hardware connections. It
is the Internet applications and services that make the Internet come alive.
Internet applications include
World Wide Web (WWW),
Electronic mail,
File Transfer
Telnet
Discussion Groups
Usenet (News Group),
Internet Relay Chat,
Search Services
World Wide Web
In simpler terms, the Web is an Internet-based computer network that allows users on one
computer to access information stored on another through the worldwide network.
Introduction to Information Technology
The WWW is an Internet service that provides a network of interactive documents and
the software to access them. It is based on documents called web pages that combine
text, pictures, forms, sound, animation and hypertext links called hyperlinks. To navigate
the WWW, users “Surf” from one page to another by pointing and clicking on the
hyperlinks in text or graphics.
E-Mail
EMAIL is the ability to write a message to someone, using a mail program, and use the
Internet as a means of delivering that message. Email is not a free service. The cost of your
email is covered in your service charge to your provider.
E-mail is the most popular application of computer communication system. For the purpose
of our discussion, we shall adopt the simplest definition of E-mail as follows:
Email (Electronic mail) refers to a computer-based system allowing two or more people to
communicate through the transmission of character coded or graphic information by
electronic means.
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange
messages. Each user of e-mail has a mailbox address to which messages are sent.
Messages sent through e-mail can arrive within a matter of seconds.
{ }{tc \l 3 ""}A typical electronic mail system requires:
Personal Computer/workstation (through which messages are created, edited, and
displayed);
Communication software (which make electronic mail possible);
Telephone line (which links the sending and receiving computers);
Modem (to provide the communications link), and
Account: e-mail address and password (Mail box address and mail box ownership)
Just as a letter makes stops at different postal stations along its way, e-mail passes from
one computer, known as a mail server, to another as it travels over the Internet. Once it
arrives at the destination mail server, it is stored in an electronic mailbox until the
recipient retrieves it. This whole process can take seconds, allowing you to quickly
communicate with people around the world at any time of the day or night.
To send e-mail, you need a connection to the Internet and access to a mail server that
forwards your mail. The standard protocol used for sending Internet e-mail is called
SMTP, short for Simple Mail Transfer Protocol. It works in conjunction with POP
servers. POP stands for Post Office Protocol.
When you send an e-mail message, your computer routes it to an SMTP server. The
server looks at the e-mail address (similar to the address on an envelope), then forwards it
to the recipient's mail server. Once the message arrives at the destination mail server, it's
stored until the addressee retrieves it. You can send e-mail anywhere in the world to
anyone who has an e-mail address. Remember, almost all Internet service providers and
all major online services offer at least one e-mail address with every account.
Telnet
Telnet is a program that allows you to log into computers on the Internet and use online
databases, library catalogs, chat services, and more. To Telnet to a computer, you must
know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3).
Introduction to Information Technology
FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to
transfer files between computers. Anonymous FTP is an option that allows users to
transfer files from thousands of host computers on the Internet to their personal computer
account. FTP sites contain books, articles, software, games, images, sounds, multimedia,
course work, data sets, and more.
CHAPTER -SEVEN
C omputer Security and Computer Virus
Parts of a Disk
Boot sector
Hard disk drives, floppy diskettes, and logical drives (partitions) all have boot sectors
where critical drive information is stored.
On all PC fixed disks, the first physical sector is reserved for a short bootstrap program.
This sector is the master Boot (MBR). It also includes the partition table.
Partition Table
PC disks are often split in logical blocks known as partition. Information required to
access these partitions ,as well as a flag which indicates which partition should be used to
boot the system(the active partition) is stored in the Master Boot Record.
What is computer virus?
Virus
A virus is an independent program which reproduces itself. It may attach to other
programs; it may create copies of itself (see companion viruses). It may attach itself to
any executable code, including but not limited to boot sectors and /or partition sectors of
hard and/or floppy disks. It may damage, corrupt or destroy data, or degrade system
performance.
Types of viruses
Multi-Partite
A virus which able to infect both files and boot sectors is said to be multi-partite. Such
viruses are highly infectious.
A virus which infects the boot sector of a fixed or floppy disk. Any formatted disk (even
one that is blank, or only contains text data, for example ) may contain a boot sector
virus. An attempt to boot from a diskette infected with a boot sector virus will cause the
Introduction to Information Technology
virus to become active in memory. This type of virus will place a copy of itself on the
Master Boot Record(MBR) or the boot sector of the hard drive. Every time you boot
your system from that point on , you will have the virus active in memory. These are the
most common viruses. Any attempt to disinfect these viruses while a virus is active in
memory will be defeated since it will re- write itself to the disk as soon as you remove it.
Additionally, many of these are stealth viruses. For safety’s sake, you should always
attempt to disinfect these viruses after a cold boot to a write –protected diskette.
Circular infection
A type of infection that occurs when 2 viruses infect the boot sector of a disk, rendering
the disk unbootable. Removing one virus will generally causes a re-infection with the
other virus.
Companion Virus
A virus which infects executable files by creating a ‘companion’ file with the same name
but an .COM extension. Since DOS executes .COM files, followed by .EXE files, and
finally .BAT files, the virus loads before the executable file.
Cross-Linked Files
Cross-linking is a common phenomena rarely associated with viruses. It occurs when two
files appear to share the same clusters on the disk.
Dropper
A dropper is a program containing a virus which has been compressed with PKLite, Diet,
LZExe, etc. it has been designed to deposit the virus onto a hard disk, floppy disk, a file,
or into memory. The children of this process are not droppers.
Encryption
Among the most difficult to detect, encrypted viruses use a brief encryption loop at the
start of the program to make the rest of the program unintelligible. This means that
scanners relaying on signature files have only a few bytes to look for. The encryption key
also changes each time a polymorphic virus replicates.
False Positive
A false positive occurs when a scanner identifies a file as infected when in fact it is not.
In addition to redirection for the boot information, these viruses attack .COM and .EXE
(executable files) files when opened or copied and hides the file size changes from the
DIR command. The major problem arises when an attempt is made to use CHKDSK/F
and there appears to be a difference in the reported file size and the apparent size.
CHKDSK assumes this is the result of some cross-linked files and attempts to repair the
damage. The result is the destruction of the files involved. The FRODO or 4096 virus is
famous for this kind of damage.
See also Stealth Virus and Full Stealth Virus.
In this case, all normal calls to file locations are cached while the virus subtracts its own
length so that it appears clean.
Heuristics
A rule-based method of identifying new viruses. This method of scanning does not rely
on specific virus signatures. The advantage of the heuristic scan is that it is not fooled by
a new variant of an existing virus. However, it might occasionally report suspicious code
in normal programs. For example, the scanning of a program may generate the message:
F-PROT will issue a stronger warning based on the likelihood of a program really
containing a virus.
Integrity Checker
A program which checks for changes to files. Integrity checkers, when used correctly,
can provide an excellent second line of defense against new viruses or variants.
In the Wild
Viruses found “In the Wild” are viruses which are known to be spreading, as opposed to
viruses which are not currently spreading, but are confined “in the zoo.”
Joke Programs
F-PROT detects the presence of several well-known joke programs which can interrupt
the normal operation of a PC. While joke programs are generally not harmful in any way,
their side effects are often mistaken for those of a virus.
Macro Virus
A macro virus is a virus written in one of the many macro languages. The macro viruses
spread via infected files, which can be documents, spreadsheets, databases, or any
computer program which allows use of a macro language. At present these viruses can
Introduction to Information Technology
infect Microsoft Word and Lotus Ami Pro documents. See also Macro Virus information
section.
Polymorphism
Stealth Virus
These viruses actively hide themselves while running. The first common virus, the
BRAIN (discovered in the wide in 1986), was a stealth virus. It infects the boot sector of
a floppy diskette and any attempts to read the boot sector with BRAIN active would be
redirected to a copy of the original boot sector someplace else on the diskette.
A Trojan (or Trojan Horse) is a program which carries out an unauthorized function
while hidden inside an authorized program. It is designed to do something other than
what it claims to, and frequently is destructive in its actions.
Virus Simulator
A virus simulator is a program which creates files that “look like” viruses. Such files are
questionable for testing purposes because they are not really infected. F-PROT will not to
be fooled by a simulator.
Virus Variant
Worm
A worm is a program, which reproduces by copying itself over and over, system to
system. Worms are self-contained and generally use networks to spread.
Your computer may be infected by either one or more of the above internet
and network attacks. You can easily identify that your computer is infected
by any of the above if you see one or more of the following symptoms:
Users can take several precautions to protect their home and work computers
and mobile devices from these malicious infections. Some of the Tips for
preventing virus and other malware are:
A firewall is the best solution for such attacks. A firewall is Security system
consisting of hardware and/or software that prevents unauthorized network
access. Personal firewall utility is a Program that protects personal
computer and its data from unauthorized intrusions. The firewall Monitors
transmissions to and from computer and also informs you of attempted
intrusion
Information Theft
Information theft occurs when someone steals personal or confidential
information. To Safeguards against information theft there exist different
alternatives the well known methods are encryption and digital signature.
System Failure