Computer Input and output devices

October 7, 2017 | Author: Salah Ud Din Ayubi | Category: Computer Data Storage, Disk Storage, Printer (Computing), Floppy Disk, Cd Rom
Share Embed Donate


Short Description

Input and output devices...

Description

Form 3 Computer Studies

INPUT AND OUTPUT DEVICES

1.

An Overview of Input and Output Devices

Input, Output and Secondary Storage Devices are collectively known as peripherals

The processor or Central Processing Unit (CPU) makes all the calculations of the computer. In order for a process to be possible we need to feed in data to the computer through the input devices. The computer will then process the data according to a particular program and finally deliver information through the output devices. If the information produced needs to be stored for the future, we will store this into a secondary storage peripheral device.

Input Device

Computer

Output Device

INPUT

PROCESS

OUTPUT

- Page 1 -

Form 3 Computer Studies

Input and Output Devices Examples

- Page 2 -

Form 3 Computer Studies

>

Input devices are all those hardware equipment that are used to enter data into the computer.

Keyboard

This is the most common and widely used input device. There are different types of keyboards but the QWERTY keyboard is the most widely used. Apart from the normal alphabetical keys, the keyboard has:

-

A Numeric Keypad

-

Navigation Keys

-

Function Keys

Function keys change function used according to the application being used.

Mouse or Trackball

The second most commonly used input device is the mouse. The mouse helps the user to point and access items on the computer. Its main function is to control the cursor or pointer on the computer’s screen. The mouse can have 2 or 3 buttons, used according to the software application being used. Today, most mice also have a scroll wheel which is used mainly to scroll through documents.

- Page 3 -

Form 3 Computer Studies

The trackball has the same basic functions of the mouse. The only difference is that the trackball is stationary and one doesn’t need to move it on a mouse pad. In order to navigate with the pointer, the user must move a ball situated at the top of the device. Similar to the mouse, the trackball has 2 or 3 buttons used to select items from the screen.

Touchpad

This is a small sensitive pad used on portable computers (laptops). The touch pad is used as a pointing device. The pointer is moved on screen by touching the touch pad with the finger. Tapping on the touch pad will give the same results as when using the mouse buttons. The touchpad is particularly useful for persons with disability whom can have limitations in moving their hand.

- Page 4 -

Form 3 Computer Studies

Advantages

Disadvantages

- Relatively inexpensive

- When gripped too tightly

- Very little finger movement

can cause muscle strain

needed to reach buttons

- Uses more desk space than other pointing devices - Must be cleaned regularly

- Uses less desk space than

- Wrist is bent during use

mouse

- More finger movement

- Requires less arm and

needed to reach buttons

hand movement than

than with other pointing

mouse

devices

- Small footprint

- Places more stress on

- Least prone to dust

index finger then other pointing devices do - Small active area makes precise cursor control difficult

Scanner

The scanner is a device that transfers printed text and images to a computer. Today, most home users have a scanner connected to their computers. These are generally called flatbed (others less common such as barcode readers are called handhelds). The scanner alone is not enough to capture the data and transform it to a format that can be understood by the computer.

- Page 5 -

Form 3 Computer Studies

In fact, one needs a number of software:



Driver Software – Used to control the scanner hardware.



Photo Editing Software – Used to edit scanned photos before being stored, printed or used in projects or websites.



Optical Character Recognition Software (OCR) – When a printed document is scanned, normally this is stored as an image and thus the OCR is used to convert this picture to word processing format for editing.

Joystick

This device is well known with young people as it is mainly used for playing computer games. As the name implies, it is like a stick connected to a platform, which can be moved in all directions. These movements in turn will move something on screen depending on the game. Usually joysticks have buttons also called triggers.

Barcode Reader

When we buy products from shops we usually see small labels containing white and black stripes called barcodes. These labels contain information on the product. In order to read this information, one must pass the barcode in front of a special reader. This reader can be in a form of a pen or installed on the shop’s counter. The barcode reading consists of a light emitting diode that will emit light on the code. The reflected light from the barcode is translated to the computer by a light sensitive diode.

- Page 6 -

Form 3 Computer Studies

Optical Mark Reader

This device reads marks in predetermined places on specially prepared cards. These are usually used in multiple-choice questions. The student will have to fill a space with a pencil, usually HB. The filled examination paper is then inserted into the OMR so as to enable it to read the answers marked.

Magnetic Ink Character Reader (MICR)

This system uses special ink to write numbers with coded magnetic ink. This special ink contains the written numbers magnetically. This system is widely used on cheques issued by banks. The MICR is much faster than OCR or other methods when reading codes and thus identifying cheques.

1

2

3

4

Federal Reserve

Branch / City

Bank Number

Parity Check Digit (for

District, 2 digits: 01 to

Designation &

12

Clearing

reading error control)

- Page 7 -

Form 3 Computer Studies

Graphics Table

Professionals, such as draftsmen and engineers, usually use this input device. It is used to speed up their drawing work. The device consists of a hand held operated device (similar to a pen) used to trace diagrams placed on a digitised table. The drawing will then be transferred to the computer.

Pen

Pens are used on hand held computers such as PDA’s (Personal Data Assistant). These hand held computers have a special sensitive screen. When the user touches the screen it will interact with the computer

- Page 8 -

Form 3 Computer Studies

Summary of Input Devices

Input Device

Advantages

Disadvantages

Keyboard

Typists can use with ease

Relatively slow

Mouse

No typing skills are required

At times can be tricky to use

Light Pen

No typing skills are required

Needs much software to make it versatile

Bar Code Reader

Quick and easy entry of data

Needs specialized software

under non-ideal conditions OCR

Can be programmed to read

Elaborate hardware and

text and neat handwriting

software required, needs training

Mark Reader

Fast input

Elaborate hardware and software required

MICR

High volume, very reliable

Only 14 characters are represented

Joystick

Easier than keyboard

Special interface needed

Digital camera

Easy image capture

Still relatively costly

Graphics Tablet

Enables operator to enter

Slow

pictures Speech Reader

No hands needed

Limited vocabulary

Touch Screen

Easy operation

Needs specialised hardware

Intuitive

and software

Can have add-ons for

Relatively slow

Hand Held Terminals

sophisticated operations Scanner

No artistic performance

High quality graphics require

required

large amounts of disk space

- Page 9 -

Form 3 Computer Studies

< < Output Devices >>

After processing the inputted data, the computer will give its output. This output can be in two different formats:

OUTPUT as Softcopy INPUT

PROCESS

OUTPUT as Hardcopy



Softcopy – Visual (monitor) or Sound (speakers)



Hardcopy – Output on a tangible (something you can touch) such as a printer printout.

- Page 10 -

Form 3 Computer Studies

Monitor or Visual Display Unit (VDU)

The monitor is the most common type of output device and is also called Visual Display Unit (VDU).

Visual Display Units

1. Monochrome – This type of display uses

2. Colour – This type of display uses more

only one type of colour or a greyscale

than one type of colour and is generally called RGB monitors. The RGB stand for Red, Green and Blue and a combination of these colours are used to display the image on the monitor. Colour monitors can display range from 16 to 16.7 million colours.

Resolution

This term refers to the clarity or sharpness of a printout or display screen. The more pixels there are per square inch, the better and greater the resolution.

1

1

LOW Resolution

HIGH Resolution

- Page 11 -

Form 3 Computer Studies

One can find different standards for monitors. They support different colour depths (number of colours it supports). The most common standards for monitors are:

1. VGA (Video Graphics Array) mode appeared in 1987. It offered a resolution of 720x400 in text mode and a resolution of 640 by 480 (640x480) in 16-colour graphics mode. It also offered a resolution of 1024 x 768. The VGA quickly became the baseline display mode for PCs.

2. SVGA (Super Video Graphics Array) is a graphics mode which can display 256 colours at resolutions of 640x200, 640x350 and 640x480. SVGA can also display higher definitions such as 800x600 or 1024x768 by using fewer colors.

3. XGA (eXtended Graphics Array). is an IBM display standard introduced in 1990. Today, it is the most common appellation of the 1024 × 768 pixels display resolution, but the official definition is broader than that. It was not a new and improved replacement for Super VGA, but rather became one particular subset of the broad range of capabilities covered under the "Super VGA" umbrella. The initial version of XGA expanded upon IBM's VGA, adding support for two resolutions: • •

800 × 600 pixels with high color (16 bits per pixel, i.e. 65,536 colors). 1024 × 768 pixels with a palette of 256 colors (8 bits per pixel)

The Different Types of Monitors

The different types of monitors are:

Cathode Ray Tube (CRT) – uses the same technology as used in

television

sets. The CRT uses a vacuum tube in which an electron gun is installed.

When

electrons fired by the electron gun touch the phosphor layer situated

at the

internal side of the screen, this will glow. This dot of light is called a

Pixel.

- Page 12 -

Form 3 Computer Studies

Liquid Display Unit / Liquid Crystal Display (LCD) – we usually find this installed in laptops and handheld computers. The technology used is different from that of the CRT. LCD uses tiny capsules filled with liquid crystals. When the molecules of the liquid are subjected to an electric field, the liquid crystals align and light reflects off them. Without the field, their alignment reverts to its original, nonreflecting arrangement, so the elements appear dark. Combinations of LCD’s are arranged to form patterns of reflected light that spell out numbers, symbols or letters. TFT (Thin Film Transistor) is a variant of LCD which uses thin

film

transistor technology to improve image quality.

Summary of Video Glossary

CRT

Cathode ray tube (monitor)

VDU

Video display unit (monitor)

LCD

Liquid crystal display – as available on hand held games and potables

Pixel

The smallest area on a screen, seen closely as a tiny dot

14” 15” 17” 21”

This is the length measured in inches (1 inch = 2.54cm) of the screen measured diagonally, that across two corners.

VGA

Video graphics array, this provided, 1. Introduced analogue monitors to the computer system; that is colour was no longer restricted to fixed colours but allowed different hues and colour blending. 2. Graphics resolution of 1024 x 768 pixels 3. Allows 256 colours

SVGA

Super Video Graphics Array As above but allows 16.7 million colour hues

Bit map

Computer memory that represents a video image

Side NOTE:

A terminal is an integration of a VDU with a keyboard. There are two types of

terminals, namely INTELLIGENT TERMINLAS (having a CPU) AND DUMB TERMINALS (no CPU)

-

Intelligent terminals can do some local processing of data and then communicate with a main computer just to relay the results

-

In a dumb terminal, all processing must be done through the main computing system

Printers - Page 13 -

Form 3 Computer Studies

Printers are output devices that transfer the output of the computer on paper (hardcopy). The printers can be divided into two categories Impact and Non-Impact:



Impact – refers to all those printers whose printing heads touch the paper. An example is the Dot matrix printer.



Non-Impact – are all those printers whose printing heads do not touch the paper. An example is a Laser or an Ink-Jet printer.

The following is a list of the different types of printers that exist:

Daisy Wheel Printers

This type of printer is rarely used any more since new printer technology, which is more efficient and economic, has been discovered. The principle of this type of printer is that number and letter are each situated on metal leafs as shown.

These leafs make part of the daisy wheel. In order to print, the daisy wheel rotates while a hammer will strike each character, which will make contact with the printer ribbon and the paper.

- Page 14 -

Form 3 Computer Studies

Line Printers

As the name suggests these type of printers will print one whole document line at one go. There are two basic types of line printers:

1. Barrel Printers – This printer has a number of disks each containing all the letters and numbers. These disks are situated one near each other on a shaft and can rotate independently from each other. Lines are written by revolving each disk in the correct position in order to form a complete line. A row of hammers will strike the ribbon and papers.

2. Chain Printers – All the alphabet and numbers are imprinted on a chain. In order to write on paper, a hammer will strike the right characters to print.

- Page 15 -

Form 3 Computer Studies

Dot Matrix Printers

Dot matrix printers are categorised as character printers because they write one character at a time. The printing head is made up of several pins, which form a column. The printing head is attached to a belt which moves it from side to side along the width of the paper and at the same time the paper is rolled up by means of a roller. In order to write, the head pins are fired with the aid of an electro magnet, which hit the ribbon and paper.

Inkjet Printers

These types of printers are the most popular nowadays. It is basically what most home users have today. These printers have good resolution, are silent and for small amount of printing are not particularly expensive. These printers are called page printers. There are two types of technologies used:

1. The first type (called Bubble Jet) has a chamber containing ink. The ink is heated up with tiny electrical heaters. This will cause the ink to expand and form a bubble. The bubble will burst and the ink transferred on paper.

2. The second type (called Ink Jet) uses a piezo quartz nozzle. When electricity is passed through it, it vibrates and transfers the ink on paper.

- Page 16 -

Form 3 Computer Studies

In the inkjet printing mechanism, the print head has several tiny nozzles, also called jets. As the paper moves past the print head, the nozzles spray ink onto it, forming the characters and images.

Laser Printers

Laser printers offer the best quality in terms of printout quality and resolution. On the other hand they are the most expensive to run. Laser printers are called page printers since they print one page at a go. The laser printer uses a laser beam, a drum and a toner.

Summary of Printer Classification

Printer Classification Printers can be subdivided into four groups CHARACTER

LINE

GRAPHICS

PAGE

Prints character at a

Prints a whole line at

Printers used for

Prints a whole page at

time

a time

graphics such as CAD

a time

Printer Glossary

CPS

characters per second (how many characters it is able to print in 1 second)

NLQ

near letter quality (very good print)

Draft Mode

lowest printable resolution, it is also the quickest but not the best output, it is usually used for spell checking before the actual print

DPI

dots per inch, this gives the resolution of the print, the higher the dpi the higher the resolution – more clear

Resident

available on board (the printer) usually fonts or buffer memory

Scalable

can be set in different sizes.

Example: a

Font

a a

aa

aa

typeface or particular type of written characters - Page 17 -

Form 3 Computer Studies

Example: Tahoma, Times New Roman, Arial Spooling

A printer works relatively very slow when compared to a CPU. In order to free the CPU to attend to other tasks during printing, the printing job (file) is temporarily stored on disk, tape, or memory. The printer will then receive the file to print chunk by chunk – enough to keep it busy. This compensates for slow operating speeds of some peripheral devices. When spooling is to a printer’s memory, this is also known as memory buffer.

Memory buffer

Printers have memory buffers to speed up their operation. Printing speeds are very slow compared to computer speeds and the printing job is spooled to a printer’s memory buffer. This is usually in the region of 10k to 50k RAM on small office printers. The computer downloads quickly in the fraction of a second the printing job to buffer memory. When the data in the buffer is exhausted, the next chunk of printing data is downloaded again by the computer in a split second. Sophisticated printers use large memory buffers and buffer area may be split into two separate memory areas.

Side NOTE:

On-line or Off-line

A peripheral device may be off-line or on-line

ON-LINE:

refers to when a peripheral device is under the control of the CPU i.e. connected to the computer and usable

OFF-LINE:

refers to when a peripheral device is not under the control, and cannot be controlled by the CPU

Plotters

- Page 18 -

Form 3 Computer Studies

The plotter uses pens to write on paper and is usually used for engineering drawings. There are two types of plotters:

1. Flatbed Plotter – This uses a flat paper which is fixed, and pens (or styluses) that move on it draw the required design.

2. Drum Plotter – Here the paper moves along a drum vertically while pens move side to side horizontally. - Page 19 -

Form 3 Computer Studies

Summary of Output Devices

Output Device

Advantages

Disadvantages

Dot Matrix Printer

Versatile graphics and text,

Average quality, slow speed

cheap Daisywheel Printer

Letter quality print

Very slow, no graphics

Chain Printer

Fast

No graphics

Line Printer

Can cope with high volumes

Very noisy, average quality

Thermal Printer

Quiet

Special paper needed

Ink – Jet Printer

Very quiet

Ink smears occasionally

Laser Printer

High quality, fast

Expensive to run

Flatbed Plotter

Large paper handling

Very expensive

capabilities Drum Plotter

Large paper handling

Very expensive

capabilities, occupies less space Microfilm Viewer

Very small

Needs special machine to view

VDU

Fast output, vivid colors

Radiation (High on CRT and low on LCD)

Speech Synthesizer

Do not need to use eyes

- Page 20 -

Limited sound range

Form 3 Computer Studies

Vector and Raster

Vector – Is a line calculated in two dimensions

and is

defined by its end points, which are x-y coordinates on a grid. Thus pictures are composed of mathematically-defined geometric

shapes

such as points, lines, arcs and other geometric

figures.

If the picture or diagram is enlarged, it does not

affect

the quality. Vectors are best used where high contrast and colour is needed such as the design

of

logos and geographical maps Vector images have many advantages, but the primary disadvantage is that they're unsuitable for producing photo-realistic imagery. Vector images

are

usually made up of solid areas of colour or gradients, but they cannot depict the continuous subtle tones of a photograph.

Raster – The picture image is created using a complex series of dots or pixels. Raster stores the colour of each pixel in memory, and thus one needs a lot more memory than if using vector. Thus the overall picture will occupy more memory on the storage media. Raster pictures can be enlarged but they tend to lose quality. Raster images are also known as bitmap images. These type of images use bits (1 or

0)

to describe each pixel’s attributes such as colour. The quality of a raster image depends entirely on the image resolution.

Soundcard and Speakers

- Page 21 -

Form 3 Computer Studies

These devices are used to produce sound from the computer system. The soundcard is a card installed in the tower case of the computer. Its role is to convert the signal coming out of the computer to a format that can be reproduced by the external speakers.

Computer Categories

Special Purpose (Dedicated) Computers:

These are built to solve only one particular task. VCR

and Optical recorders/players, Auto-pilot, Automatic Washing Machines, Mobile Phones, GPS, etc. will have an embedded computer to control them. The program for these computers is normally ‘hard coded’ that is built in the machine’s ROM (Read Only Memory). Embedded systems controlling common appliances are one form of dedicated computers – they have a CPU, Input Output devices, software stored in ROM and some RAM as workspace.

General Purpose Computers:

On the other hand, these can perform more than one

task provided that the correct instructions are loaded in the computer, therefore depending on what PROGRAM we load, the computer may act differently.

Examples:

- Computer + ‘Word’

used for word processing – typing

- Computer + ‘Excel’

used for accounting purposes – spreadsheet

- Computer + ‘Paint’

used for drawing

- Computer + ‘AutoCAD’

used for designing layouts – architects, engineers, etc.

SECONDARY STORAGE DEVICES - Page 22 -

Form 3 Computer Studies

Secondary storage devices cannot be classified under input or output devices. These devices are used to store data for later use.

Secondary storage devices can be categorised in 3 main groups:

1. Magnetic 2. Optical 3. Electronic

1. Magnetic Storage

Magnetic storage devices store the data on a magnetic layer. Examples of such devices are: a. Floppy Disk b. Hard Disk c.

Magnetic Tape

The technology used is very simple to understand. The magnetic layer is magnetised when there is a binary 1 and left un-magnetised when there is a binary 0.

Floppy Disk

Floppy disks store small amount of data typically not larger than 1.44MB. These small diskettes are used mainly to transport small files from one computer to another. - Page 23 -

Form 3 Computer Studies

The construction of the floppy is basically a plastic disk coated with magnetic material, enclosed in a PVC jacket to protect the magnetic material.

In order to write data to a floppy this must be first formatted. This procedure involves the creation of sectors and tracks. On the diskette, data is recorded on closed concentric rings (tracks).

Each track is divided into sectors. These are invisible wedged-shaped sections used by the computer for storage reference purposes.

Data Access Area

Hard Plastic Jacket

Metal protective plate (shutter) that moves aside (in disk drives) to expose data access are on disk

Label

- Page 24 -

Form 3 Computer Studies

Hub

Write Protection notch. The notch in this diagram shows that the floppy disk is not write protected.

- Page 25 -

Form 3 Computer Studies

- Page 26 -

Form 3 Computer Studies

- Page 27 -

Form 3 Computer Studies

Hard Disks

As the name implies, hard disks are built with metal or glass platters covered with a substance that allows data to be held in the form of magnetised spots. Today hard disks are composed of more than one disk (also named as platter), which are stacked on each other. This technology gives the possibility of having large storage capacity. Typically computer systems today have an 80GB (or more) hard disk capacity.

- Page 28 -

Form 3 Computer Studies

- Page 29 -

Form 3 Computer Studies

Magnetic Tape

This type of storage media is used in large computers where large amounts of data are stored. The tape is made up of a thin plastic tape having horizontal running tracks and vertical frames. The data to be stored is divided into:

a. The Header – Including file name and number of blocks b. Block – of data separated by inter block gaps c.

Trailer – containing number of blocks, to be used as cross reference with the header

Examples – Reel to Reel tape drive and Cassette Tape drive

Magnetic tape is ideally suited to store a list of records whose sequential order is sorted for later processing. Payroll systems and record updating is ideal for tape. A sorted tape can be used to issue pay cheques, update a list of customers etc.

Protection of Magnetic Storage

1. Do not put media in areas where magnetic field is present 2. Do not bend (Floppy Disks and Tape) 3. Do not store in high temperatures and / or in humid areas 4. Do not store in dusty environment

2. Optical Storage

The CD-ROM Disk

CD-ROM stands for Compact Disk – Read Only Memory. This is an optical disk where information is stored at the time of manufacturing. Examples of CD-ROM are Music CD’s and software that one buys from computer shops such as games. Optical disks write data with a high power laser beam, which records data by burning tiny pits onto the surface of the disk. In order to read data, a low power laser beam reads data by reflecting smooth areas, which are interpreted as 1 bits, and not reflecting pitted areas which are interpreted as 0 bits.

The typical storage capacity of a CD-ROM is 650Mb, which makes them a very versatile data storage media when it comes to store data for short and long term periods of time. - Page 30 -

Form 3 Computer Studies

Re adi ng Dat a

Re adi ng “1” The lase r beams reflects off the smooth surface, which is interpreted as a 1 bit.

Reading “0” The laser beam enters a pit and is not reflected, which is interpreted as a 0 bit.

- Page 31 -

Form 3 Computer Studies

CD-R

CR-R which stands for Compact Disk- Recordable is a CD format that allows users to use a CD-R drive to write data, only once, onto a specially manufactured disk that can then be read by a standard CD-Rom drive.

CD-RW

CD-RW stands for Compact Disk – Rewritable. This type of media allows users to copy and erase data. Thus, this disk can be used over and over again.

DVD-Rom

DVD-Rom stands for Digital Video Disk or Digital Versatile Disk. This optical disk looks like a normal CD but in fact, it can store much more data than a CD

The following is a list of the most common DVD types with their respective capacities:

a. Single Sided / Single layer – 4.7Gb b. Single Sided / Double layer – 8.5Gb c.

Double Sided / Single layer – 9.4Gb

d. Double Sided / Double layer – 17Gb Typically, these types of disks are used to store movies as well as modern computer games where a large amount of data is required.

- Page 32 -

Form 3 Computer Studies

3. Electronic Storage

- Page 33 -

Form 3 Computer Studies

Electronic memory is the latest technology in secondary storage media. This is also referred to as Flash memory. Flash memory is non-volatile solid-state computer memory storage that can be electrically erased and reprogrammed. It is a technology that is primarily used in memory cards and USB flash drives for general storage and transfer of data between computers and other digital products. It is a specific type of EEPROM (Electrically Erasable Programmable Read-Only Memory) This type of memory media has no mechanical moving parts and thus it offers some advantages when compared to the other type of media. Advantages: 1. Very small 2. Does not consume a lot of energy in order to function 3. Noiseless 4. Limited heat emission 5. Portable

Disadvantages: 1. Limited amount of memory capacity when compared to the other type of media (Currently big advancements are being made and the maximum capacity of this media is 60GB).

Because of their small size and big capacity, electronic memory is suitable to be used in portable devices. Today electronic memory is being used in Digital cameras, Mp3 Players, PDAs, Mobile phones and Laptops.

- Page 34 -

Form 3 Computer Studies

Data Access Methods

We have two types of data access methods: a. Serial Access:

- Cassette tape - Tape Stream

b. Random (Direct) Access:

- Floppy Disk - Hard Disk - Zip Disk - CD-Rom - DVD - Flash Memory

Serial Access VS Random Access

Imagine one has a thousand records stored on a secondary storage device and one needs to access the 543rd record. In serial access, one has to access the preceding 542 records before homing in on to the 543rd record. On the other hand, in random (direct) access, one is given the possibility to go directly to the particular record required.

Serial Access Method

Serial access is where the items are read, one at a time, from the physical start of the file, in the order in which they are stored.

Data is stored on tape in Binary Coded Decimal Format. A tape is made up of horizontally running tracks and vertical frames. When a file is stored on tape, the program is divided into:

a. a file header (including the file name and number of blocks) b. number of blocks (of a fixed number of records), each separated by inter-block gaps c.

a trailer (with the number of blocks for cross checking with the program header)

- Page 35 -

Form 3 Computer Studies

- Page 36 -

Form 3 Computer Studies

In serial access methods, as a means of security, parity checking is used. This is a means to check tape data integrity. Horizontal parity utilises a tape track for checking whilst Vertical parity uses a frame for parity checking. Both can be used for optimum integrity and error correction.

There are two types of parity systems – Odd and Even parity. In even parity, the tape drive ensures that both horizontally and vertically, there is an even number of 1’s. This system works similarly for odd parity. The only difference is that the 0’s are used instead of 1’s.

An even parity bit is set to 1 if the number of ones in a given set of bits is odd (making the total number of ones, including the parity bit, even). An odd parity bit is set to 1 if the number of ones in a given set of bits is even (making the total number of ones, including the parity bit, odd).

Parity Bit Summary

- Even Parity a. Set to 1 if number of 1’s is odd b. Set to 0 if number of 1’s is even

- Odd Parity a. Set to 1 if number of 1’s is even b. Set to 0 if number of 1’s is odd

Transmission sent using odd parity: a. b. c. d. e.

A A B B B

wants to transmit: 1001 A computes parity bit value: (1^0^0^1) = 1 adds parity bit and sends: 10011 receives: 10011 computes overall parity: 1^0^0^1^1 = 1 reports correct transmission after observing expected odd result.

This mechanism enables the detection of single bit errors, because if one bit gets flipped due to line noise, there will be an incorrect number of ones in the received data. In the two examples above, B's calculated parity value matches the parity bit in its received value, indicating there are no single bit errors. Consider the following example with a transmission error in the second bit:

- Page 37 -

Form 3 Computer Studies

Transmission sent using even parity: a. b. c. d. e.

A A A B B

wants to transmit: 1001 computes parity bit value: 1^0^0^1 = 0 adds parity bit and sends: 10010 *** TRANSMISSION ERROR *** receives: 11010 B computes overall parity: 1^1^0^1^0 = 1 reports incorrect transmission after observing unexpected odd result.

B's calculated parity value (1) does not match the parity bit (0) in its received value, indicating the bit error.

Even Parity Example

1

0

0

0

1

0

0

1

0

1

Even Parity Track

1

1

1

1

1

1

1

1

1

1

T

1

1

1

1

1

1

1

1

1

1

R

0

0

0

0

0

1

1

0

0

0

A

0

0

0

0

0

0

1

0

0

1

C

0

0

0

0

0

0

1

0

0

1

K

0

1

1

1

0

1

0

1

1

0

S

1

0

0

1

1

0

0

1

0

0

0

1

1

0

0

0

1

1

1

1

Frames

The diagram above shows the logical file structure on a tape (long pieces of plastic ribbon coated with magnetic material). Parity checking is used as a measure of security, that is, to ensure that the original data is not corrupt or missing in any way.

In the above diagram (which shows part of a tape ribbon), parity checking is even and this can be in both horizontal (tracks) and/or vertical axis (frames). Check and count the bits for every frame and then for every track. Parity can be even or odd.

If therefore the above file is transferred to a computer and if one single bit is wrong, then the parity will no longer hold and the user gets an error display.

- Page 38 -

Form 3 Computer Studies

Direct Access Method – Hard disk, Zip disk and floppy disk

Formatting a floppy disk or hard disk means preparing the medium to receive data. Mostly when a new disk is bought, the surface are is free and not organized. In order to start writing data onto a disk, one must format it or prepare the area into chunks where the data is stored (like boxes in a room to organise our storage). Formatting prepares the disk into round concentric circles called TRACKS (like an athletics track). Tracks are then subdivided into smaller pieces to form SECTORS. Even though the outer sector is larger in area than the inner sectors, they will still hold the same amount of data.

Floppy disks rotate at about 360rpm. Data transfer is around 10k to 100k per second. They consist of 80 tracks and of 256 sectors per track. Floppy disks are lightweight, portable, relatively cheap, rewritable, and can store 1.44Mb of data (they can store more if special software is used for compression of data). Magnetic medium is brown in colour and soft. Disk allows random access. This is achieved by storing each new file at the start of a new sector. If for example, program one occupies sectors 0, 1, 2 and half of sector 3, file two will be stored in sector 4, leaving half sector 3 empty. All programs stored on disk are catalogued in a directory for easy searching. This is done by the operating system. A file is not necessarily stored in sequential sectors but may be fragmented.

Hard disks are not readily portable (some exist which can be removed), becoming cheaper, rewritable, typical storages nowadays at around 30GB (and more). Magnetic medium is shining silver metal and

- Page 39 -

Form 3 Computer Studies

hard. Since hard disks are getting larger and larger an important factor to look at when buying a new hard disk is its access time.

Zip disks are very popular for making backups both in the industry, offices and at home. They are magnetic disks but the media is made of high density magnetic material – meaning that the surface is more densely packed with magnetic particles. This allows for high density of data too. Zip disks use special compression software which packs large amounts of data into smaller sized data. Zip disks require special zip drives and special software compression. Typical zip disks are of 100Mb and 250Mb capacities and are small cartridge like in shape.

Zip Drive

Zip Disk Access time – the time taken for a hard disk to seek data and is measure in milliseconds (1/1000th of a second). If you have a hard disk with an access time of 10ms, a file of 10Mb will take less than another with 12ms to access. Typical access time (time to seek data) is between 9ms / 12ms, the lower the access time the costlier. Hard disks usually consist of 2 or more similar disks mounted on a common spindle, this is then known as stack.

- Page 40 -

Form 3 Computer Studies

A stack is a number of rigid disks put on top of each other on a spindle or pivot. Files are accessed by making reference not just to the track and sector but also on side number. Same track numbers on different disks are known as cylinders. These were used on mainframe computers.

Direct Access Method – Optical Disks

This is the most promising secondary storage technology; optical storage involves the use of a high power laser beam to burn microscopic spots off the aluminium disk’s surface coating. Data is represented by the presence of holes along a smooth shining surface. Binary ‘0’, aluminium surface burnt out presence of holes. Binary ‘1’, aluminium surface reflects back. A much lower power beam is then used to retrieve the data. The patterns of spots detected by the laser during a read operation are converted into electronic signals used by the computer.

The capacity of the optical disk is enormous compared with most magnetic disk storage devices. A 5.25” optical disk, little larger in size than a diskette, can store between 600Mb to 17GB.

Standard Density

Double Density

- Page 41 -

Quadruple Density

Form 3 Computer Studies

CD-Rom (medium)

CD-Rom stands for Compact Disk Read Only Memory – note that these disks are for reading and only store the information that the manufacturer records on it. The user cannot erase, change, or add to it, only read it. This type of optical disk is used primarily for storing huge amounts of data – such as government statistics, encyclopaedias, medical reference books, and dictionaries. CD-Rom’s have an access time of about 160ms and a transfer rate of up to 800KB/s

The CD-Rom is an optical storage disk – meaning it can be read by light sensing equipment. The difference between this and magnetic type storage is the large amount of data it can hold. In fact, a CDRom can store up to 600Mb of data. Unlike the hard disk it is portable. A CD-Rom allows manufacturers to store video clips, still pictures and sound tracks apart from text to create what we now call multimedia.

- Page 42 -

Form 3 Computer Studies

CD-R – WORM (medium)

WORM stand for Write Once Read Many

This type of video disk allows for recording onto the next free tracks until the disk is full. This type of medium is recorded only once.

CD-RW – Erasable Optical Disks (medium)

Erasable optical disks are an alternative to large capacity hard disks. They store 1,400 times as much data as diskettes. In contrast to CD-Rom’s, erasable disks can be modified and erased. The removable disks provide convenience and security along with huge storage capacity. Optical disks can also be used to back up fixed hard disks. Many experts think that optical storage will become the most efficient inexpensive storage method. They offer 15,000 tpi (tracks per inch), compared to 96 tpi of floppy disks.

NOTE that although nowadays we have re-writable CD’s they are still not suitable for storing word processing documents, databases etc. for they do not allow editing and manipulation (Save to CD cannot be performed like to a floppy disk). They can only store an exact copy, which cannot be altered. Be careful to exam questions regarding this.

DVD – Digital Video Disk (medium)

The DVD medium is similar to the CD-Rom disk. There are no visible differences except that the tracks are more closely packed. Therefore there are more tracks on the DVD than on the CD-Rom disk. These new disks allow far more storage than the previous CD-Rom and today are available with a capacity of around 17GB. This large amount of storage enables the inclusion of more video clips; in fact, the most significant development sector for the DVD is in the film industry. One can already rent full feature films on DVD’s. The advantage of DVD’s over the original video cassette tapes is the high quality digital sound and video. These films are sometimes also provided with different language tracks pre-recorded so one can choose the language in which to listen to the sound track

- Page 43 -

Form 3 Computer Studies

Optical Disk Drives

A CD-Rom is similar to an audio CD but with the recording tracks much thinner and closer to each other. Therefore, the disk would be holding much more tracks for recording. At first there were two or three major standards, which meant that not all CD-Rom drives were compatible to read all CD Rom’s. However agreement was reached and a standard was set up. The CD-Rom drive uses a laser light to read data on the tracks while the disk is spinning at a standard speed. These speeds have been increasing rapidly from 1x to 40x. A high-speed CD-Rom drive, allows for better access time and better refresh rates.

Access Time – the time taken for the transfer of data from the CD to the computer

Refresh Rates – higher refresh rates prevent the video picture from flickering.

DVD devices operate much on the same principle as CD-Rom drives. They use a laser light to trace the video signal on the tracks. The tracks are however more compact and since the layout of these tracks is totally different from that of the CD-Rom drive new standards had to be agreed.

Backing Storage Device, Media and Access Type

DEVICE

MEDIA

TYPE

ACCESS

Cassette Tape Drive

Cassette Tape

Magnetic

Serial

Reel to Reel Tape Drive

Reel Tape

Magnetic

Serial

Floppy Disk Drive

Floppy Disk

Magnetic

Direct

Hard Disk Drive

Hard Disk

Magnetic

Direct

Zip Drive

Zip Disk

Magnetic

Direct

CD-Rom Drive

CD-Rom

Optical

Direct

WORM Drive

WORM

Optical

Direct

CD-R, CD-RW

CD-R, CD-RW

Optical

Direct

DVD Drive

DVD

Optical

Direct

Flash Memory Unit

Flash Memory Card

Electronic

Direct

- Page 44 -

Form 3 Computer Studies

BOOLEAN LOGIC Computers are effectively complex calculators. All inputs to the computer from keyboard, mouse and other input devices must be translated to numbers. This is done so that the computer would be able to work out the problem and produce the required output.

The computer uses TWO numbers: 1 and 0

Discrete (Digital) and Continuous (Analogue) Data

Discrete data or digital data consists of a set of pulses, which may be counted. A switch can be either on or off (1 or 0). Integer numbers are also discrete – you cannot have a whole number between 5 and 6 for example. Other examples of discrete data are car mileometer readings, heartbeats etc.

Modern computers can only store and process digital data. Hence any analogue data which needs to be processed by a computer must be first converted to digital form. This is done by taking samples of the analogue data at fixed time intervals. These samples are then converted to the digital equivalent. Modems are used to convert analogue data to digital and vice versa. Examples of Analogue type:-

Speedometer, Thermometer, Spring Balance

Examples of Digital type:-

Mileometer, Digital Thermometer, Pulse or Heartbeat Reading.

- Page 45 -

Form 3 Computer Studies

Logic Gates

Logic gates are electronic devices that are used in the computer to work out these mathematical calculations. Logic gates are fed with a particular binary number consisting of two or more digits and generate a single output. Logic gates have rules which determine the output of a logic gate depending on the input of the logic gate. These rules are known as truth tables.

In this course we are going to concentrate on three basic logic gates:

-

AND Gate

-

OR Gate

-

NOT Gate

What is a logic circuit? A combination of logic gates which perform several logic functions such as: -

control the flow of information

-

carry out arithmetic and logic (ALU) functions

-

help to store information and time operations

OR Gate

AND Gate

A C

B

A C

Input

Output

B

A

A C

C

OR

B

NOT Gate

AND

B

- Page 46 -

Input

Output NOT

Form 3 Computer Studies

The OR Gate

The OR gate can be compared to an electric circuit consisting of a battery, a bulb which represents the output, and two switches, switch A and switch B which represent the inputs connected as shown above.

Two inputs (A and B), when combined in an electrical circuit using an OR Logic Gate will yield an output (C) which is equal to either 0 (false) or 1 (true), depending on which values, 0 or 1, the inputs have. In general, OR is true when either or both inputs (A and B) are true, otherwise, OR is false.

The following truth table shows when an OR Logic Gate is true and when it is false. Input A

Input B

Output C

1

1

1

1

0

1

0

1

1

0

0

0

The only time Output Y is true (equal to 1) is when either or both Inputs A and B are true (equal to 1);

when both Inputs A and B are false (equal to 0), Output Y is also false (equal to 0).

The AND Gate

The AND gate can be compared to an electric circuit consisting of a battery, a bulb which represents the output, and two switches, switch A and switch B which represent the inputs connected as shown above.

Two inputs (A and B), when combined in an electrical circuit using an AND Logic Gate will yield an output (C) which is equal to either 0 (false) or 1 (true), depending on which values, 0 or 1, the inputs have. In general, AND is true only when both inputs (A and B) are true, otherwise, AND is false. (When any Logic Gate is true, it means that electrical current is able to go through it; when it is false, electrical current is not allowed to go through it.)

The following truth table shows when an AND Logic Gate is true and when it is false.

Input A

Input B

Output C

1

1

1 - Page 47 -

Form 3 Computer Studies

1

0

0

0

1

0

0

0

0

The only time Output Y is true (equal to 1) is when Inputs A and B are both true (equal to 1), otherwise Output Y is false (equal to 0).

The NOT Gate

The NOT Gate has only one input and one output as shown in the table before.

Whenever an Input is true (only one Input is required), the NOT makes it false. Similarly, whenever an Input is false, the NOT makes it true. The NOT gate is also known as an inverter.

The following table shows when Output C is true and when it is false.

Input (A or B or Combination)

Output C

1

1

0

0

Output combinations VS Inputs

The amount of inputs to a logic gate will determine the number of possible outputs. This can be worked out by following this simple calculation: For “n” number of inputs to the gate, the combinations produced can be calculated by using 2n

-

Where ‘n’ stands for the number of inputs to the gate

-

Where 2 stands for the binary number that can have only two digits either 1 or 0

Example: A gate with 2 inputs 22 = 4 A gate with 3 inputs 23 = 8 - Page 48 -

Form 3 Computer Studies

A gate with 4 inputs 24 = 16 Etc….

Boolean Expressions

What is a Boolean expression? • An expression which uses Boolean operators such as AND, NOT, OR. • An expression that results in a value of either TRUE or FALSE

The logic circuits (diagrams) can be represented by using Boolean algebra.

When building the Boolean expression, the following symbols should be used at all times:

1)

A OR B represented as A + B

2)

A AND B represented as A.B

3)

NOT A represented as Ā

- Page 49 -

Form 3 Computer Studies

Example:

A

NOT

X

B

AND

C

In order to work out a Boolean expression, one must follow some basic steps:

a. The Boolean expression is a representation of the logic circuit b. The expression is the relation of the output with respect to the relative gate inputs c.

Always work out the Boolean expression starting from output to the input

d. The logic circuit is made up from a number of gates, thus it is good practise to see the circuit as being made up of a number of gates rather than as a whole

- Page 50 -

Form 3 Computer Studies

- Practical Examples -

Example 1:

The figure below shows a logic circuit:

A

X

NOT

B

C

AND

a. Complete the truth table for:

A

B

X

C

0

0

1

0

0

1

1

1

1

0

0

0

1

1

0

0

b. Represent the logic circuit in Boolean algebra:

C = ((NOT A) AND B) C = ((Ā) . B)

- Page 51 -

Form 3 Computer Studies

The figure below helps to understand better how the Boolean expression above was constructed:

A NOT

B

AND

C

C = ((Ā) . B)

- Page 52 -

Form 3 Computer Studies

BINARY CONVERSIONS

Objectives:

1. Representation of numbers in binary 2. Conversion from Binary to Decimal and vice versa 3. Conversion from Hexadecimal to Decimal and vice versa 4. Conversion from Hexadecimal to Binary and vice versa 5. Perform Binary Arithmetic – addition and subtraction 6. Understand the concept of registers, complementation, ranges, left and right shifts 7. Numerical overflow 8. How to calculate number of bits required representing a number 9. Representation of negative numbers 10. Representation of characters – ASCII and EBCDIC

Number Systems

As discussed in the Boolean Logic chapter, the computer is basically a complex calculator. A computer must translate everything to number form and perform a series of calculations before it can work out something. It does not use the Decimal number system as us humans but uses Binary numbers and Hexadecimal numbers. This chapter will help us to understand better how the conversions are made, and how calculations are achieved.

Why Binary?

A computer, being an electronic machine is made up of switches, that is, the circuits are either in the ON state or in the OFF state. The binary number system is the ideal number system to represent the twostates because it has only two digits: zero and one. A term commonly used to refer to 1 or 0 in binary system is bit. A bit is defined as a Binary Digit that can be either 0 or 1. A group of 8 bits is called a byte. The number of bits processed by a processor is called the wordlength and is determined by the computer

- Page 53 -

Form 3 Computer Studies

manufacturer. The following terms are often used as a unit of memory measure of a computer. For example, we speak of gigabytes of hard-disk space and megabytes of RAM



A BIT (Binary Digit) is one of the digits used in binary notation, i.e. 0 or 1.



A BYTE is made up of 8 bits.



A KILOBYTE is 210 bytes = 1024 bytes.



A MEGABYTE is 210 Kilobytes = 1024 Kilobytes.



A GIGABYTE is 210 Megabytes = 1024 Megabytes.

Decimal or Denary system

As already mentioned, human beings use the Decimal number system to perform calculations. This number system is based on the manipulation of 10 basic numbers

System

Base

Digits Used

Decimal

Base 10

0,1,2,3,4,5,6,7,8,9

Binary System

The computer is made up of electronic circuits, which in turn are made of switches. A switch can be either ON or OFF, meaning it can only have TWO states.

System

Base

Digits Used

Binary

Base 2

0,1

- Page 54 -

Form 3 Computer Studies

Hexadecimal System

Hexadecimal numbers are used by the computer for addressing the memory locations. Hexadecimal system uses a 16-digit system

System

Base

Digits Used

Hexadecimal

Base 16

0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

As the Hexadecimal system has more digits than the Decimal system, letters had to be added to the system:

A

=

10

B

=

11

C

=

12

D

=

13

E

=

14

F

=

15

- Page 55 -

Form 3 Computer Studies

Decimal to Binary Conversion

In order to convert a Decimal number to Binary, we must divide the decimal number by 2 successively. If the number has a remainder, this is equal to 1, if not it will equal to 0:

Example:

2

4

2

15

2

2

2

r0

2

7

1

r0

2

0

r1

2

ANS: 0010

2

48

r1

2

24

r0

3

r1

2

12

r0

1

r1

2

6

r0

0

r1

2

3

r0

2

1

r1

0

r1

ANS: 01111

ANS: 0110000

Most Significant Bit (MSB) and Least Significant Bit (LSB)

110101

Most Significant Bit (MSB)

Least Significant Bit (LSB)

- Page 56 -

Form 3 Computer Studies

Binary to Decimal Conversion

1st Method:

Using a general formula to convert to decimal from any base: (n x basex) + ..(n x base3) + (n x base2) + (n x base1) + (n x base0)

Example – For Binary system (Base 2):

Convert 11101 to Decimal (1 x 24) + (1 x 23) + (1 x 22) + (1 x 21) + (1 x 20)

(1 x 16) + (1 x 8) + (1 x 4) + (0 x 2) + (1 x1)

16 + 8 + 4 + 0 + 1 =29 nd

2 Method:

Short method of conversion – by weight

Binary place value

27

26

25

24

23

22

21

20

Weight

128

64

32

16

8

4

2

1

Example – For Binary system (Base 2)

Convert 11101 to Decimal

1

1

1

0

1

16

8

4

2

1

16 + 8 + 4 + 0 + 1 =29

NOTE: In this method you only ADD where there is a Binary 1 - Page 57 -

Form 3 Computer Studies

Convert from Decimal to Hexadecimal

1st Method – By Division

In this method, the decimal number is divided by 16. In this way a remainder from 0 to 15 is obtained. You must keep in mind that in Hexadecimal we have to convert from 0 to 15 into A to F respectively.

Example:

16

30

16

1

r14

0

r1

ANS: 1

14

ANS: 1

E

16

100

16

6 0

ANS: 6

16

1024

r4

16

64

r0

r6

16

4

r0

0

r4

4

ANS: 4

0

0

2nd Method – By Grouping

In this method, one must first change the decimal number to binary. Secondly, the binary number must be grouped in groups of 4 bits each, starting from the least significant bit. Finally each individual group in converted to decimal again, and any number greater than 9 must be converted to A to F.

- Page 58 -

Form 3 Computer Studies

Example: Convert from Decimal to HEX

Decimal Number:

166

Step 1:

Convert to Binary:

10100110

Step 2:

Group in 4 bit groups:

Step 3:

Change to decimal:

ANS:

1010 0110

10

6

A

6

Convert from Hexadecimal to Decimal

1st Method:

As used in Binary to Hexadecimal conversion we are going to use the same method. This can be shown more clearly through the following example:

Convert A516 to Decimal

A516

= (A x 161)

+

(5 x 160)

= (10 x 16)

+

(5 x 1)

= 160

+

5

= 16510

- Page 59 -

Form 3 Computer Studies

2nd Method:

The second method involves the Hexadecimal number being grouped. Secondly, each number is converted to a 4-bit binary number. Thirdly, each 4-bit number is grouped in a single binary number and finally this number is converted to decimal.

Convert B316 to Decimal

HEX Number:

B3

Step 1:

Divide into single numbers:

Step 2:

Convert each number to binary:

Step 3:

Regroup:

Step 4:

Convert to decimal:

B

3

1011

0011

10110011

17910

- Page 60 -

Form 3 Computer Studies

Converting from Hexadecimal to Binary

Converting Hexadecimal numbers to Binary is relatively simple. One must first get each HEX number and convert it into a 4-bit binary number. Finally, the individual 4-bit binary numbers are grouped together to form a single binary digit.

Example:

Convert A4F16 to Binary

HEX Number:

A4F

Step 1:

Divide into single numbers:

Step 2:

Convert each number to binary:

Step 3:

Group together:

A

4

F

1010

0100

1111

1010010011112

Convert from Binary to Hexadecimal

Converting from Binary to Hexadecimal follows the same principle as used in the HEX to Binary conversion. The Binary number is first divided into 4-bit binary groups. Each group is converted to decimal and then finally to HEX.

- Page 61 -

Form 3 Computer Studies

Example:

Convert 110011012 to Hexadecimal

Binary Number:

Step 1:

Divide into 4-bit groups:

Step 2:

Convert to decimal

Step 3:

Convert to HEX

11001101

1100

1101

12

13

C

D = CD16

Binary Arithmetic

As mentioned before, the computer is a complex calculator and certain arithmetic calculations take place. In this course we are going to concentrate on learning how to perform addition and subtraction on Binary numbers.

Addition: Since in Binary we only use two numbers; 1 and 0 calculations are very simple to understand. However, some rules have to be followed:

0 0 1 1

+ + + +

0 1 0 1

= = = =

0 1 1 0 carry1

- Page 62 -

Form 3 Computer Studies

Example: Add the following binary numbers: 1) 1101 + 1100 2) 1000 + 0111

Sum (1)

Sum (2)

Carry 1

1101 + 1100 11001

13 12 25

1000 + 0111 1111

8 7 15

Carry 1

Subtraction: Subtraction is not as easy as addition, since computers are not capable to perform subtraction. For this reason, we must use addition. Consider the following

Subtract X from Y ADD (-X) to Y

= =

Y–X Y + (-X)

In the end the two above examples will give the same result. This concept is known as COMPLIMENTATION. In order to assign a negative quantity to a binary number one must perform 1’s and 2’s compliment.

1’s Compliment In order to find the one’s compliment of a binary digit one must replace ones (1’s) with zero’s (0’s) and vice versa. Example: Find the one’s compliment of 11001010

Binary digit

11001010

Convert

00110101

- Page 63 -

Form 3 Computer Studies

2’s Compliment

To achieve the two’s compliment, you must add a binary 1to the one’s compliment of a binary number Thus following the result obtained in the example above we have:

One’s compliment ADD 1

00110101 +1

Two’s compliment

110110

Subtraction Rules

1. Arrange binary digits to have both the same length 2. Calculate 2’s compliment of number to be subtracted 3. Add this to the other binary number – ignore the carry number to keep the original size

Example: Work out 110 – 11

- Page 64 -

Form 3 Computer Studies

Step 1: 110 – 011 110 + ( - 011 )

Step 2:- Find two’s compliment of the negative number Number 1’s compliment Add 1

011 100 +1

2’s compliment

101

Step 3: 110 + 101 1011 Ignore the carry so ANS is:

11

Registers

In our computer, information is held in the form of Binary digits and stored in Registers, these being like binary containers or drawers. Registers have certain limits or sizes; in other words an 8-bit register cannot contain a 6-bit binary digit. A number that it is too big to be represented in a register of a particular size causes a Numerical Overflow Error.

For Example: A 3bit register is used to store the number 810 810 = 10002 – As it can be clearly seen you need 4 bits to represent the decimal number 8. In this case an Overflow Error will be generated.

A Number overflow error can also be generated if the number is too small to be represented in the register. A register can contain integers, that is the quantity of a whole number. This whole number can be positive, negative or zero. - Page 65 -

Form 3 Computer Studies

Unsigned Integers – can only be positive or zero. If we take a 3-Bit digit, we can have the following numbers:

Example: Binary 000 001 010 011 100 101 110 111

Integer 0 1 2 3 4 5 6 7

In order to determine how many different combinations or codes can be obtained using a number of digits; one can use the expression 2n.

Example: How many different combinations can be obtained using 8 bits? 28 = 256 combinations

To determine the largest number that can be obtained using a number of bits one must use 2n - 1 Example: What is the largest number that can be represented using 8 bits? 28 - 1 256 – 1 = 255 We subtract one since the numbers start from zero. In this case the range is between 0 and 255 Thus, the larger the size of the register, the greater is the largest number that can be stored in it as illustrated in the table below: Size of register 2 bits 4 bits 8 bits 16 bits

Different codes 22 = 4 24 = 16 28 = 256 216 = 65536

Largest integer 4-1 = 3 16-1 = 15 256-1 = 255 65536-1 = 65535

Range From 0 to From 0 to From 0 to From 0 to

3 15 255 65535

Signed Integers Signed integers are all those integer numbers that can be either Positive, Negative or Zero. Signed integers can be represented as follows: - Page 66 -

Form 3 Computer Studies



Sign and Magnitude Representation



One’s Compliment Representation



Two’s Compliment Representation

One’s compliment and Two’s compliment were discussed earlier when we dealt with the binary subtraction.

Sign and Magnitude representation

This mode has a bit after the most significant bit that shows if the number is positive or negative. When this bit is 1, it is negative and when it is 0 it shows that it is positive. Example: The 4-bit register in the example is representing -6

0

1

1

0

0 means Positive 1 means Negative

The Range of Signed Integers

In order to obtain the range of signed integers that can be represented in an X-bit register, the following expression can be used:

- (2n-1) < x < + (2n-1 -1)

- Page 67 -

Form 3 Computer Studies

Example: What is the range of signed integers that can be represented in a 4-bit register?

- (24-1 - 1) < x < + (24-1 - 1) - (23 - 1) < x < + (23 - 1) - (8 - 1) < x < + (8 - 1) - (7) < x < + (7)

This shows that the range is between -7 to 7

Representation of characters

As we already know, all information going in the computer must be changed to binary numbers. Thus each character must be assigned by a numerical code referred to as a Character Code. The Character Set is the group of codes that can be used. The number of codes that can be created in this character set is dependant on the size of the bits used to store the character. Example: if an 8-bit is used, 256 (28) characters can be represented

There are two standards that are widely used: -

ASCII Character Set

-

EBCDIC Character Set

Refer to page 368, 369 and 370 of your text book

- Page 68 -

Form 3 Computer Studies

APPLICATION SOFTWARE

1.

Hardware and System software (Operating System) alone do not provide a single specialised task

2.

Application Software is a type of software that performs task to directly benefit or assist the user

3. Application Software is installed on top of an Operating System such as MS Windows. The Operating System itself is NOT a type of Application Software

4

MS Windows is a popular Operating System on small computers. Windows provides an easy interface between the computer and the user.

It uses pictures (graphical

representations) which look like ‘push buttons’ on the screen and the user can use the mouse to select them. This interface idea is known as Graphical User Interface (GUI). The following image shows the familiar GUI of MS Windows XP

- Page 69 -

Form 3 Computer Studies

Definition of Application Software: A complete system for a particular application supplied by an external body or written in-house, for general use by individual installations using their own data.

Application Software Examples: 1. Word Processing 2. Spreadsheets 3. Databases 4. Accounting 5. Games 6. Internet Browser 7. Desktop Publishing

- Page 70 -

Form 3 Computer Studies

Different Application Software:

APPLICATIONS SOFTWARE

Productivity Software Word processing

Business Specialty Software Desktop publishing

Spreadsheets Personal finance Presentation Graphics

Entertainment Software

Home / Personal Software

Games

Cookbooks

Etc..

Medical

Encyclopedias guides

Almanacs

CAD / CAM

Gardening

Library searches Etc..

Home repair

Painting

Etc..

Communications

Hypertext

Groupware

Multimedia authoring (and multimedia software components such as animation software, music/MIDI, sound capture and editing, video capture and editing, speech synthesis, drawing, painting, hardware support )

Browsers

books

Home decoration

Drawing

Suites

Phone

Project management

Database managers

Desktop accessories

Education / Reference Software

Off the shelf and Custom made Application Software The Application software can either be bought off the shelf or else custom made to the buyers’ needs. Off the shelf: Are the ones we find in the computer shops developed by large software houses, made for the general user. Since the market for such software is larger, the price is lower. Custom made: These are designed to meet the buyers’ needs and specifications, and can be guaranteed to full fill all the functions required by the customer.

- Page 71 -

Form 3 Computer Studies

Advantages and Disadvantages of buying off the shelf software Advantages / Benefits (ref to book pg 277): 1. Cheaper in price. A wider market is reached; more people are ready to buy the software 2. Quicker and less costly implementation. Can be performed by the user, implementation is simple and doesn’t require knowledge on the software 3. Greater system efficiency. The software would be fully compatible with the operating system 4. Proven and tested. Tested thoroughly by a specialized team 5. Documentation provided with the package Reliable documentation that can help the user to install and operate the software 6. Changes automatically catered for by the supplier The different options to change settings are provided by the software manufacturer 7. User friendly Simple, easy to understand and to use Disadvantages / Reluctance: 1. Processing logic does not always fit the true situation of the hardware, requirements are difficult to meet Examples of requirements that are hard to meet: Hard disk space – Not large enough, and not enough RAM 2. Too ‘Generic’, might have to change present procedure to accommodate the package (Should be vice versa) Due to the limitations offered by this type of software, it might be needed to adopt the present procedures to the software. This can be very stressful for the user and thus prone to errors. 3. The package is not efficient in certain aspects (some information irrelevant to the environment). Since the software is not designed on the specific environment that is going to be used in, some functions will not be efficient. An example would be Payroll software. 4. Integration with other packages could be very difficult or impossible. The newly installed software might create some problems with other applications (Conflict). User – Friendly (ref book pg 278) User friendly software goes beyond simply performing the data-processing tasks required by the application. The software application will be designed to make the life of the user easier when using it.

- Page 72 -

Form 3 Computer Studies

Some features of a user friendly software: i.

Easy to use: Lets the user do the job with minimum effort

ii.

Robust: Application should be tolerant to user’s mistakes and allow recovery if something should go wrong.

iii.

Attractive and ergonomically designed: Attractive screen layouts and colours; Ergonomically designed: Working in a way the user finds it natural and comfortable.

iv.

Helpful: If a mistake is done, the application should give the user a clear explanation of what was wrong and how to recover from the error. The system should issue warning messages and request confirmation before allowing the user to proceed. On-line help, through telephone line or through Internet. One should not underestimate the importance of user-friendliness for the success of a system – all too often a computer system does not succeed simply because users do not accept it.

Integrated packages (ref book pg 279) Care should be taken that application software would be fully compatible. To eliminate the risk of incompatibility is to purchase an ‘Integrated package’. An Integrated package is a package of different application software such as Word Processors and Spreadsheets but with reduced functions. Examples of application software packages are ‘Microsoft Works’ and ‘Lotus Works’. This kind of application software costs less and takes less space on the hard disk. Another solution for incompatibility is to purchase a ‘Suit of applications’ such as ‘Microsoft Office’. This type of package would be made up of different full applications software. These cost more than the integrated software package, but less if you had to buy the applications one by one. Takes more space on the hard disk, for example MS Office 2003 takes about 400Mb of hard disk space. Applications of Information Technology Common to most Organizations (ref book pg 279) Certain computer applications and information systems are universal and equally appropriate for different companies. Payroll 1. Payroll software mainly deals with salaries, tax and National Insurance of the employees. 2. The two primary outputs of a payroll system are cheques or payslips.

- Page 73 -

Form 3 Computer Studies

Accounts 1.

The accounting package keeps track of money owed to the company for goods sold or services provided.

2. Production and updates of invoices, bills and statements. 3. The accounts payable systems is the other side of the accounts functions. 4. Monetary transaction that occurs within an organization must be properly recorded (transfer of funds). 5. This kind of application software provides financial statement, which includes the profit and loss statement and the balance sheet.

Inventory Management and Control 1.

A fixed-asset inventory record is maintained for each item and includes such data as date purchased, cost, location, and inventory item number.

2. These records are maintained for asset-control and tax purposes. 3. Inventory systems monitor the quantity on hand and the location of each item. Such a system will monitor and help eliminate stock outs (out of stock) and over stocking of raw materials.

Human Resource Development 1.

Human resource development systems maintain data on employees, such as educational background and salary history

2. The system includes data on performance reviews, skills, and professional development.

Manufacturing 1. In a manufacturing company, the order entry and processing system accepts and processes customer orders. 2. When an order is made, the system takes care to feed data, either to the warehouse if the item is in stock or if it is out of production. It also feeds data to the accounts receivable system for billing. 3. The system monitors the orders from the order entry until the product is delivered to the customer.

Production scheduling Manufacturing resources (materials, machinery and workers) are allocated through the production process in order to minimise time and increase efficiency of the production line.

- Page 74 -

Form 3 Computer Studies

Project Management 1. This application software provides the management with a tool to keep projection within budget and on time. 2. The tasks, which are going to make up the project, are put one after each other in their order so that the project can be finished. 3. This software will give the management a tool to plan the project without involving any expensive measures.

Robotics 1. An industrial robot is best at tasks that are repetitive and tasks that require precision movements, moving heavy loads, and working in hazardous areas. 2. This software application will give access to the robot programmer to load the set of tasks that the robot has to perform to carry out the job.

Computer Integrated Manufacturing The integration of computers and manufacturing is called Computer Integrated Manufacturing (CIM). The process usually follows these steps: 1. An engineer uses a Computer-Aided Design (CAD) system to design the part. 2. The design specifications are produced and stored on magnetic disk. 3. The specifications, now in an electronic database, become input to another computer system that generates programs to control the robots and machine tools that handle and make the part. 4. The tools provide data for order processing, inventory management, shop floor scheduling, and general accounting. Some computer – integrated manufacturing systems go one step further and provide a link between the manufacturer and the customer via electronic data interchange.

Word processors (ref book pg 282) A WORD PROCESSOR is a program, which is used for preparing documents, typing letters, and producing reports. Advantages of word processors over traditional typewriters:      

Ease of correction Automatic Formatting Multiple copies and Form Letters Automatic Features Search and replace facilities Spelling checkers and thesaurus - Page 75 -

Form 3 Computer Studies

  

Font changes Mail Merge Other features: Multi column text, grammar checker, table formatting, inclusion of drawings

Desk top publishing (ref book pg 284) Desk Top Publishing (DTP), involves using a computer, mouse, scanner, printer and Desk Top Publishing application software for mixing text and graphics to produce high quality printed output for commercial printing. The emphasis is not on the entry of text (as it is with wordprocessing), but the ability to compose text and format the document in a manner that comes close to the quality achieved with professional typesetting equipment. Desktop Publishing Software is used for:    

Catalogues Brochures Presentations Reports

Desktop Publishing Software is NOT used for:    

Memos News releases Addressing Mailing list

- Page 76 -

Form 3 Computer Studies

DTP software must offer the following capabilities:



Allow high – quality composition of text:

The results must be of typeset quality, meaning that proportional spacing, kerning, tracking and leading control, and justification of both right and left margins is possible. Automatic hyphenation is also usually supported.



Support page composition:

This allows the user to arrange text and images on the display screen as desired – in columns, sidebars, and so on. The arrangement on the screen is the same as that which appears when the page is printed.



Incorporate graphics:

This makes it possible for the user to move text and images as desired. The DTP software does not usually allow the user to create the text and the image data – these must be created using other software (a word processor for the text, and a graphics package for the graphics) and then imported into the DTP program for exact placement.



Provide editing capabilities:

All DTP software allows the user to edit text. Such text editing facilities are usually minimal, and only meant for performing small corrections or adding captions and headings.



Printed results should be of high quality:

Although this of course depends more on the printer than the DTP software, it does mean that the software must support high-resolution printers (typically at least 300 dpi resolution). > Nowadays, Word Processors such as MS Word will also provide desktop publishing features such as automatic table of contents and index creation, multi-column documents, tables, frames, embedded graphics objects etc. Even providing such DTP features however, software such as MS Word still is considered a Word Processor and not a Desktop Publisher.

Spread sheets (ref book pg 285) An electronic spreadsheet is a tool for performing calculations on data. Used generally for accounting purposes, the spreadsheet is made up of columns and rows. By using a spreadsheet program, one is able to automatically recalculate a whole sheet of figures every time a single value is altered. 1. Components of a spreadsheet. As mentioned earlier, the spreadsheet is made up of columns labelled with letters (A to Z, AA to AZ, BA to BZ etc.) and rows labelled with numbers. The intersection of a column and a row is called a CELL. Each cell has an address or coordinates for (e.g. A1, B6, F17, etc.) 2. Labels, Values and Formulas. In each cell, the user may insert one of three types of items – LABELS, VALUES and FORMULAS (or FORMULAE). The following example spreadsheet will be used for illustration.

- Page 77 -

Form 3 Computer Studies

Lables are words to describe particular items such as Bread, Tomatoes, Meat etc. Values are numeric quantities like LM 0.15, LM 0.30 etc. Value cells are sometimes called Input cells, since the user inputs data to the spreadsheet via these cells, and represent the variables or parameters of the system being modelled by the spreadsheet. Formulas describe computations to be made on the contents of the cells (formulas are not displayed on the spreadsheet – they are computed, and their results displayed instead). For this reason, formula cells are sometimes called Output cells or Result cells, since they serve to display the results of computations performed by the spreadsheet. The real power of a spreadsheet comes from the fact that formulas are recalculated every time the value in a value cell changes – the output cells change dynamically as the input parameters are varied. Spreadsheet formulas can perform: I. II. III. IV.

Financial calculations Mathematics Statistics Date calculations

3. Operations on Cell. Spreadsheets can carry operations on cells or group of cells such as: clear, move, delete and copy whole rows and columns. 4. Data Graphing. A nice feature of spreadsheets is to display selected values in graphical form:

- Page 78 -

Form 3 Computer Studies

 Line graphs  Bar graphs  Scatter plots  Area graphs

5. Spreadsheet publishing. Modern spreadsheets support desktop publishing features such as fonts, colours, graphics and borders. These features are useful for preparing presentation and reports.

Database systems (ref book pg 288) Databases are typically used for storing and accessing data. A Database can be simply defined as a collection of information that is organized so that it can easily be accessed, managed, and updated. Basic terminology used in Database environments: Record: A structured collection of data regarding a single person, and is composed of fields. By structured we mean that, for example, an employee’s record is not just a haphazard collection of facts and figures, but is a form which entries for the employee’s name, number, address, rank and any other item of data thought desirable for record purposes. Fields: A field holds a single item of information about that individual (for example: name, surname, address etc.) Fields come in various types, depending on the type of data to be stored. Some common field types are: - Page 79 -

Form 3 Computer Studies

a.

Numeric

b.

Date fields

c.

Logical fields (or Boolean fields)

d.

Text fields

e.

Memo fields

f.

Picture fields

Note: for more information on fields, follow text book page 289 The Database Management systems (ref book pg 289) The Data Base Management Systems (DBMS) is a software package for creating, maintaining and retrieving data from a database. Although the term database is frequently taken to include BOTH the collection of data AND the package which provides access to the data (the DBMS), strictly speaking this is not so. We will use the following terms for clarity: Database:

A collection of data in the form of records.

DBMS:

The software which manages a database. It may include custom written applications.

Database System:

The combination of application software (perhaps written using the DBMS itself) and the data on which it operates.

Facilities offered by a database system include: 1. Creating the database 2. Updating records 3. Retrieval of data 4. Reduction of data Data Integrity In order to minimise the chances of inputting the wrong data in the Database, the database software must be required to perform integrity checks whenever an update operation is attempted. Such checks may involve:  Type checking: The DBMS will ensure that only the appropriate type of data is entered in a field – e.g. only numbers in a numeric field, only dates in a date field, and only Y / N entry in a logical field.  Range checking: The DBMS may be instructed to only accept values within a certain range for a numeric or date field – for example the DBMS may reject a date of birth which is less than 16 years ago or more than 61 years ago, or a PAYE rate less than 0 or more than 35  Limited options: This is similar to range checking, but is usually applicable only to textual data. The DBMS can be instructed to accept only a value from a limited set of possible values. For example, only village / city names from a predefined list may be acceptable in an address field. - Page 80 -

Form 3 Computer Studies

When a value entered in such a field, the DBMS can immediately check that the value entered is in the list, and if not reject it. This practically eliminates mistyping such fields.  Required fields: While certain fields may not apply in certain cases (e.g. telephone number) and therefore may be left blank, others are required (e.g. an employee number and employee name). The DBMS will ensure that required fields are not left blank.  Mutually dependant fields: Certain fields may depend on other fields. For example in a record, which contained fields MARRIED and WIFE’S NAME, entering ‘N’ for the first should force you to leave the second blank, and vice versa. The DBMS may be instructed to carry out such checks.  Unique fields: Certain fields may be declared unique, such as the employee number field. Such fields are called key fields, and serve to uniquely identify a record. The DBMS can ensure that data entered in such fields is indeed unique.

Data Retrieval (ref book pg 291) Databases are quite useless unless one can retrieve the stored data. Asking the DBMS to fetch data from the database is called querying the database. Some databases have Query language (e.g. SQL); a simple English like language for describing what data is needed from the database. Others support Query By Example (QBE), in which you give an example of what you need by partially filling in a blank record and letting the DBMS find all the records matching your example. QBE tends to be simpler, but less versatile, than using a query language. Report generation is a special form of querying, in which the output of the query, which can include data grouping, subtotals and totals are printed out in the form of a report. Data Security (ref book pg 291) Database security involves 2 issues: 1. Ensuring confidentiality (or Protection of Privacy): This can be achieved by assigning database users’ selective access. That is what users can view from the database. Thus the user is given selective access to the database on a NEED TO KNOW basis. The user’s view of the database is restricted to only those fields in each record to which they have access. 2. Protection against damage: This can be achieved by assigning what users can and cannot change from the data. This is called an access type. Distinction is commonly made between authorisation to read (view) and authorisation to write (change) – someone may be granted access to 5 fields in a database, but only granted permission to change 2 of those fields – the others may be viewed but not altered.

- Page 81 -

Form 3 Computer Studies

Simulations (ref book pg 292)

Computer Simulated Train

Computer simulations are useful scientific and business tools. They enable computers to pretend (simulate) that they are carrying out a number of things from simulating a queue at the post office, to working out what would happen in the event of a nuclear war. Computer simulations are usually based on mathematical models held inside the computer that represent the physical process being carried out in the real world. Virtual reality simulations are different from computer simulations because they require special interface devices that transmit the sight, sound and sensations of the simulated world to the user. Interface devices include:  Head mounted display (HMD), equipped with screens directed to the eye for the vision, earphones for the sound, and position tracker to monitor the location of the user.  The haptic interface (Haptic technology, technology that interfaces with the user through the sense of touch), which relays the sense of touch and other physical sensations in the virtual world. Uses of Virtual Reality: Virtual reality is currently used to explore and manipulate experimental data in ways that were not possible before.  Therapists use VR to treat sufferers of child abuse and people who are afraid of heights.  Muscular dystrophy patients can learn how to use a wheelchair through virtual reality.  Surgeons may use VR to plan and practise an operation on a virtual patient rather than a real person. - Page 82 -

Form 3 Computer Studies

 Architects could take clients on a virtual tour of a new house before it was built.  VR could be used to train the operators of aircraft and other complicated machinery.  Network VR simulations could enable people in many different locations to participate together in teleconferences, virtual surgical operations, or simulated military training exercises.

- Page 83 -

Form 3 Computer Studies

THE INTERNET

Objectives  To understand the nature of the Internet as in terms of a global network of computers connected together.  Discover the different uses of the Internet such as email, information, browsing, file transfer, socialising, and the use of other computers on the net.  Discuss HTML and URL and their uses in the world of the Internet.

The Internet ‘What is it?’ (ref book pg 395)  In order to understand the nature of the Internet, one must have a basic knowledge of networking.

 Networks is the term used when a number of computers are connected together in order to share resources and achieve communication from one place to another.  LANs (Local Area Networks) as they are generally called are a network of computers that cover a small geographical area – usually only the building of the company.  The internet can be described as a global network of computer networks. These networks vary in nature and size, such as, huge government departments, university and college networks, large companies such as IBM and many other commercial systems and non profitable organizations.  People use the internet for different reasons such as, email, file transfer, information retrieval, social chatting, and checking on news, weather etc.  In 1969 the USA government started a project called DARPA in order to connect computers that are geographically distant from each other. This was required as a means of exchanging military research information between researchers at different locations. - Page 84 -

Form 3 Computer Studies

By time, this network started evolving both in number and technology and in 1990 the Internet that we know today was launched.  Today, the Internet connects millions of computers together that share resources and knowledge. The Uses of the Internet: The use of the internet can be divided into the following five major categories: 1. The Email (Electronic Mail)

 Probably the most common use of the internet. Email is much faster than traditional methods of sending documents (postal system). Documents travel as binary files and are then converted back into plain text using special software. Email is efficient and convenient.  The email provides the facility to send letters through the Internet to people who have access to the net. Multiple copies can be sent to multiple addresses just by adding the address to the address list.  You can check for post at any time of day.  This is achieved by means of special application software such as Microsoft Outlook Express or Netscape Communicator.  One of the greatest features of emails is the ability of attaching files to the letter in the form of documents, pictures, sounds, and movies. 2. Information Browsing

 One of the most used features of the Internet is to search for particular information through large databases all over the world

- Page 85 -

Form 3 Computer Studies

 This information provided in the form of web sites makes part of the so – called World Wide Web or more commonly known as WWW. This is a means to search information centres all over the world.  Examples of software used to access the WWW are MS Internet Explorer and the Mozilla Firefox 3. File Transfer  FTP or File Transfer Protocol is a system used on the Internet to make possible the transfer of information from one computer or network to another.  Anonymous FTP refers to those archive sites which allow anyone to access it. 4. Socializing – Chat and Newsgroups  An important part of the Internet which is widely used by youngsters is the Chat or Internet Relay Chat – IRC. With this facility, people can communicate real – time through the keyboard.  Another form of socialising, are newsgroups (known as Usenet). This allows you to post and read articles on newsgroups. Usually newsgroups are grouped and have a particular topic . 5. HTML – Hypertext Mark-up Language  HTML is a language that is used to create Web – Sites. This language gives the facility of linking different pages together.  On web – sites this can be seen when the cursor is dragged over a particular word or phrase. The cursor will change from an arrow sign to a palm sign. When the mouse button is double clicked on that word or phrase, another page will be loaded. 6. URL – Universal Resource Locator  This is the address that shows in which computer (information centre) the web – site is held.  An Internet address (for example, http://www.4sale.com/trade/), usually consisting of the access protocol (http), the domain name (www.4sale.com), and optionally the path to a file or resource residing on that server (trade). 7. Study Note In this chapter we have gone through the basics sections that make up the Internet. We have also included some hints on how to send / receive emails and the basic steps for using Browsing software. At this point, you should be able to:  Understand the nature of the Internet as in terms of a global network of computers connected together.  Understand the different uses of the Internet such as Email, Information browsing, File transfer, Socializing and the use of other computers on the net. - Page 86 -

Form 3 Computer Studies

 Describe HTML and URL and their uses in the world of the Internet.  Describe the basic features of the email and browsing software. 8. > Q1. What are the advantages of the email as compared to the conventional written letter? Q2. Describe the term URL Q3. How can the Internet promote socializing between people of different countries and cultures?

9. Glossary ANSI

American National Standards Institute

Anonymous FTP

Allows user to download files from a site

ASCII

American Standard Code for Information Interchange

Com

A code is ms-dos that refers to a serial port

DNS

Domain name system is a database system for translating computer domain names into numeric internet addresses.

E-mail

Electronic mail, a method of sending messages via the computer instead of post.

Encryption

A method of coding data to prevent unauthorised access

Ethernet

A type of high speed local area network

File Server

A computer that stores files on the Internet, making them available for access by various internet tools.

Firewall

A security device to help protect a private network from internet hackers. It’s a machine with two network interfaces that is configured to restrict what protocols can be used across the boundaries and to decide what internal IP addresses can be seen to the external internet.

Forum

A message area, where messages are left and seen

Frame

A block of data with header and trailer information attached

FTP

File transfer protocol, this defines how the files are transferred over the internet.

HTTP

Hypertext Transport Protocol

HTML

Hypertext Mark-Up Language

Hub

A device connected to many other devices

Hz

Hertz – one cycle per second

IP

Internet Protocol

- Page 87 -

Form 3 Computer Studies

IRC

International Relay Chat – allows many users to chat in real time worldwide.

ISDN

Integrated Services Digital Network combines voice and digital network services in one medium.

Log

A record of file operations

Login

The process of identifying yourself on an online system. Generally a two part action, first the input of your username followed by your password.

Mailing List

A discussion group whose messages are distributed by email

Net Surfer

Someone who ‘surfs’ the internet, wondering around looking for something of interest to visit

Newsgroup

Message area, defined by subject matter, which forms part of the Usenet

Node

A computer attached to a network

Offline

Not connected to an online system

PPP

Point – to – Point protocol, allows the computer to use TCP/IP over standard telephone lines

Site

Any of the individual networks that as a whole comprise the internet

SMTP

Simple Mail Transfer Protocol – used to transfer email between computers as part of the TCP/IP protocol family.

URL

Uniform Resource Locator, an attempt to standardise the location or address details of internet resources, commonly used on the WWW.

- Page 88 -

Form 3 Computer Studies

MULTIMEDIA

1. Objectives 

What does the word Multimedia mean;



Basic hardware and software requirements;



Benefits of Multimedia;



Where it is used.

2. Multimedia 

Definition of Multimedia: Multimedia is a general term applied to all hardware devices and software that offer a combined solution to video, audio and text presentations. The presentations are usually interactive, which mean that the user may take an active part in selection. This is the most active developing field for peripherals and software alike.



The elements that make up a multimedia product therefore include: - Video - Audio - Text - Graphics and still picture - Animation

- Page 89 -

Form 3 Computer Studies

If a product contains at least three of these elements, it can be claimed to have multimedia properties, but if no sound or moving pictures are present, then the benefits that can be obtained from using it are limited. 3. Multimedia technology Multimedia technology can be subdivided into 2 categories: a. Multimedia Hardware and Software b. The Transport and storage medium 4. Multimedia Hardware and Software  Most PC’s (Personal Computers) today are equipped with hardware that can support Multimedia products (application software).  However, the minimum requirements by multimedia products are:  Operating system – MS Windows 95 or 98  CPU – 486DX2 / 66Mhz  RAM – 12MB for Windows 95 and 16MB for Windows 98  Screen display – 640 x 480 pixels, 256 colours  CD-Rom Speed – Double speed (2x)  Hard disk space – 6MB  Audio – 8-bit sound card  Other – Speakers or headphones and a mouse  As you can see, the minimum requirements shown above are way below what is available in many computers today. 5. The transport and storage media  Multimedia products (software) are stored in digital formats. The standard media for the storage and transport of Multimedia software has become the CD-ROM and more recently the DVD-ROM.  The reason for adopting such a standard was for the excellent features that the CD and DVD can offer. Such features are slim and portable size and have great storage capacity. 6. Benefits of Multimedia  There is an old Chinese proverb that says:

“I listen and I forget I see and I remember I do and I learn”  This proverb clearly and concisely explains the benefits of Multimedia products.  Apart from the motivation created by the sound and vision powerful presentations, most multimedia products are interactive, thus the user is involved in the activity carried out by the program.

- Page 90 -

Form 3 Computer Studies

7. Where is multimedia used? There are three main targets where multimedia is used: A.> Businesses Businesses are multimedia products for the staff training programs and for public information systems or Kiosks. B.> Entertainment for home and leisure use Multimedia products today are being used for leisure products. These can vary from: - Games; - DVD’s on PC - Interactive TV C.> Education Encyclopedias and books on CD-ROMs are becoming a common asset to find in modern homes. Apart from these, you can also find programs with multimedia features designed to teach a particular school subject to students. Examples of application software and places where multimedia is widely used: - The Internet (WWW) - Office application software such as PowerPoint, FrontPage, and MS Word. - Encarta Encyclopedia 8. Study Note:  In this chapter we have discussed the meaning of the word multimedia and the basic powerful presentation features that this can offer.  We have also discussed the basic software, hardware requirements for the good functioning of multimedia products and the storage / transport media used.  Finally, we have mentioned the three main areas where this technology is being used, and we have also seen some practical examples that we use every day.

9. > Q1. Write a short essay of about 300 words describing the basic features of multimedia and what you think multimedia can offer in the near future (10 – 15 years from today). Q2. Select a multimedia product that you use on your PC and describe what makes it so interesting.

- Page 91 -

Form 3 Computer Studies

SOFTWARE 1. Objectives  What is software and why it is needed;  The difference between Application software and System software;  Installing computer System software and Application software;  Discuss the purchasing of software and software piracy and protection;  Nature of software;  Discuss System software, Control programs, Operating Systems, System utilities, Diagnostics and program software. 2. Software  A computer system is made up of the hardware (physical electronics in or attached to the computer caser) and the software (a program made up of instructions that tell the hardware what to do);  Software programs can be divided into two main groups: - Application Software - System Software (refer to figure on page 267)

- Page 92 -

Form 3 Computer Studies

 The main job of the System software or Operating system as it is normally called, deals with the control of the computer hardware whilst the Application software caters for particular applications such as Payroll, Stock control, Word processor etc.  In order to run an Application software, an Operating system must be loaded first. 3. Installing a computer Operating system  To install an OS, it is recommended to backup or take a copy of the contents, if any, of your hard disk since the hard disk is usually formatted prior to the OS installation.  This procedure can be dangerous, since if it is not performed as it should be, precious data can be lost. It is thus advised that the installation documentation be read carefully.  Otherwise, it is best to seek help from a professional. Usually, the installation of new operating systems like Windows has a friendly installation wizard that will guide you through the process of loading. 4. Application Software  In order to install the Application Software, it is necessary to have an Operating System previously installed;  Most modern application software comes on a CD or DVD. Installing a program is not simply done by copying the contents of the CD onto the hard disk.  In order to perform the program installation one usually needs to run the installer or setup program usually present. This program provides an interface and guides you step by step on how to install the program.  In the progress, program files might be uncompressed, put into their correct sub directories, and the system configured for usage.  If a problem with the installation should arise, you should consult the installation manuals provided with the software. 5. Buying Software There are a number of benefits when buying original software:  It ensures that you have the latest version, including manuals and all accompanying support material;  You can be given help from the manufacturer if you have trouble;  Upgrades at reduced prices;  It is requested by law that you only purchase licensed software (refer to book ‘The software Copyright Law’ page 273);  Reduces virus risks.

- Page 93 -

Form 3 Computer Studies

6. What is software piracy? a. Industrial Piracy – Occurs when an individual attempts duplication and distribution on a large scale for profit. b. Corporate Piracy – This occurs when a copy of a single / one user licensed software is installed on a LAN server and many people connected to the network can have access to and use this software. c.

Reseller Piracy – This occurs when computer hardware companies or shops sell computers which are pre-installed with non-licensed software.

d. Home Piracy – An example of this form of piracy is the trading of copied software with friends.

Please read the first paragraph on book page 270 so as to have an idea of the amount of software piracy that takes place in Malta and the rest of the world. 7. Software protection  In order to produce software, software manufacturing companies spend a lot of money and resources for producing that software;  Thus they adopt different systems in order to prevent their software from being copied illegally;  Hereunder are some of the most commonly adopted protection systems (refer to book pg 270);

a. Security lock or Dongles: These are hardware devices that are physically attached to the ports of the computer. Before running, the software will check if the dongle is present. If it is not present the software will be useless.

- Page 94 -

Form 3 Computer Studies

b. Keyword protection: This is frequently used with cheap software. This system demands that every time you start the program, the software will ask you to enter a particular word from the user’s manual. Each time the program is used, a different word from a different page will be demanded. Although it is quite easy to photocopy the manual, it is frequently not worth it since the software is quite cheap (and the manual usually quite thick).

c. Software Registration: The software owner will be asked to register the newly purchased software with the manufacturing company. This can be achieved by either sending a card supplied with the software by post, or by doing an on-line registration on the Internet. Your name and details will be listed at the mother company’s database, and thus this will give you some privileges, such as free help, cheap upgrades etc.

d. Key Disk Protection: The software disk will be formatted in a way that it cannot be copied. Every time you attempt to run the program, the software will ask you to insert the Key Disk in order to continue. This protection scheme isn’t very popular, because people who buy original software like to take a backup as a precaution.

8. The Software Copyright Law Basically, this is the section of law that explains the consequences of copying software illegally (refer book page 271 and 273). It is very important to check what type of software you are buying. (Refer to book page 271 – 1.9 & 1.10)

9. Nature of Software The term SOFTWARE includes all programs that control the computer’s activities. These are:

Programming Software System Software Operating Software

Application Software

Applied to solve particular problems

- Page 95 -

Form 3 Computer Studies

Systems Software:

All those programs which manage the functioning of a computer system and help the application software to run. It does not solve end-user problems. It enables users to make efficient use of the computing facilities for solving their problems. These manage the resources of a computer system, automate its operation and make easier, the writing, testing and debugging of user’s programs.

Control Programs: This is an integral part of the operating system, which handles the transfer of data between peripherals and internal storage, checks if peripherals are working properly and informs the operator if they are not. Control programs together with the Operating system fall under the Operating Software category.

The Operating System:

Is the combination of the system software and the control programs. The operating system uses the power of the computer to minimise human intervention. It manages jobs (program suites) handled by the machine, organises its program of work and maximises the throughput of jobs. An operating system can provide specialised facilities.

System Utilities: These programs are included within the operating system. They perform housekeeping tasks, such as formatting disks, backing up data and copying files, setting system parameters etc. (Example – Windows Explorer). Diagnostic Utilities:

These utilities perform hardware tests on particular devices to check if they are working correctly. Diagnostic programs, usually supplied by the computer manufacturer, perform hardware tests on specific components or devices, like testing of a parallel port, memory integrity or hard disk defects and data corruption on files. (Example - Scandisk).

Programming Software: These include all those programming tools necessary to create (code) programs (usually application software). These programs allow:  The writing of a source program file (using an editor)  Translation of source code into machine code  Production of the object program file  Testing and debugging aids  Program executor 10. Study Note At this stage you should be able to discuss:

 What is software and why it is needed;  The difference between Application software and System software;  How to install computer System software and Application software;  Discuss the purchasing of software and software piracy and protection;  Nature software;  Discuss System software, Control programs, Operating Systems, System Utilities,

Diagnostics and Programs software.

- Page 96 -

Form 3 Computer Studies

***************** *********** ***************** ********** *********** ********** ***** *********** *****

- Page 97 -

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF