Fundamentals of Computer
Fundamentals of Computer
S t u d y M a t e r i a l F o r Awareness
FUNDAMENTALS OF COMPUTER
What is a Computer?
An electronic device that accepts data and processes it into useful information is called a Computer.
There are two main aspects of the computer:
Input: The data we enter into the computer is called the input. Input, basically are raw facts
for which we want the system to process and give us an outcome.
Output: The answer that the computer provides in return of the raw data entered, is called
output.
Generations of Computer
There are a total of five Generations of Computer, with each Generation something new was
discovered to improvise the functioning and the use of the computer systems.
First Generation (Vacuum Tubes) – 1940-1956:
This Generation computers relied on Machine Language (the Language of 0s and 1s) and used
Vacuum tubes as components of memory. They were huge in size and occupied almost a room-size
area to fit in.
Given below are a few characteristic features of the 1st Generation of computer:
The price of managing these computers was very high.
They were huge.
They were not capable of multitasking, and only one task could be performed at a time.
There was no use of monitors; the output was directly given in the form of print outs.
The electricity consumption was very high.
Examples of computers developed in this generation are ENIAC – Electronic Numeric Integrated and
Computer, UNIVAC- Universal Automatic Computer, EDSAC – Electronic Delay Storage Automatic
Calculator and EDVAC – Electronic Discrete Variable Automatic Computer
1. Based on Size
2. Based on Purpose
3. Based on Types
The image given below gives a clear classification of the Types of Computers:
These may include basic calculators, laptops, desktop computers, mobile phones, etc., which can
help people with their basic necessary functions are included in the General Purpose computer type.
1. Keyboard
A simple device comprising keys and each key denotes either an alphabet, number or
number commands which can be given to a computer for various actions to be performed
It has a modified version of typewriter keys
The keyboard is an essential input device and computer and laptops both use keyboards to
give commands to the computer
2. Mouse
3. Joy Stick
It is a device which comprises a stick which is attached at an angle to the base so that it can
be moved and controlled
Mostly used to control the movement in video games
Apart from a computer system, a joystick is also used in the cockpit of an aeroplane,
wheelchairs, cranes, trucks, etc. to operate them well
4. Light Pen
It is a wand-like looking device which can directly be moved over the device’s screen
It is light-sensitive
Used in conjunction with computer’s cathode ray tube
5. Microphone
This device can scan images or text and convert it into a digital signal
When we place any piece of a document on a scanner, it converts it into a digital signal and
displays it on the computer screen
7. Barcode Reader
1. Monitor
The device which displays all the icons, text, images, etc. over a screen is called the Monitor.
When we ask the computer to perform an action, the result of that action is displayed on
the monitor.
Various types of monitors have also been developed over the years.
2. Printer
A device which makes a copy of the pictorial or textual content, usually over a paper is
called a printer.
For example, an author types the entire book on his/her computer and later gets a print out
of it, which is in the form of paper and is later published.
Multiple types of printers are also available in the market, which can serve different
purposes.
3. Speakers
4. Projector
An optical device which presents an image or moving images onto a projection screen is
called a projector.
Most commonly these projectors are used in auditoriums and movie theatres for the display
of the videos or lighting.
If a projector is connected to a computer, then the image/video displayed on the screen is
the same as the one displayed on the computer screen.
5. Headphones
They perform the same function as a speaker, the only difference is the frequency of sound.
Using speakers, the sound can be heard over a larger area and using headphones, the sound
is only audible to the person using them.
Also known as earphones or headset
1. Input Unit
2. Output Unit
3. Memory Unit
4. Control Unit
5. Arithmetical and Logical Unit
Input Unit
A computer will only respond when a command is given to the device. These commands can
be given using the input unit or the input devices.
For example: Using a keyboard we can type things on a Notepad and the computer
processes the entered data and then displays the output of the same of the screen.
The data entered can be in the form of numbers, alphabet, images, etc. We enter the
information using an input device, the processing units convert it into computer
understandable languages and then the final output is received by a human-understandable
language.
Output Unit
When we command a computer to perform a task, it reverts back for the action performed
and gives us a result. This result is called output. There are various output devices connected
to the computer. The most basic of which is a monitor. Whatever we write using a keyboard
or click using a mouse, is all displayed on the monitor.
Thus, the output unit gives us the final result once the entire processing is done within the
mechanism of a device.
For example: when we visit an ATM, we enter our details like language, pin, amount to be
withdrawn, etc. and then the final money which the cash dispenser releases is our outcome.
In this case, the cash dispenser acts as an output unit.
Memory Unit
When we enter the data into the computer using an input device, the entered information
immediately gets saved in the memory unit of the Central Processing Unit (CPU). Because of
the presence of some existing programming, the Memory Unit transmits the data further to
the other parts of the CPU.
Similarly, when the output of our command is processed by the computer, it is saved in the
memory unit before giving the output to the user.
Control Unit
This is the core unit which manages the entire functioning of the computer device. It is one
of the most essential components of the computer system.
The Control Unit collects the data entered using the input unit, leads it on for processing and
once that is done, receives the output and presents it to the user. It can be said to the
centre of all processing actions taking place inside a computer device.
Basically, the instructions taken, interpretation of entered data, issuing signals to execute
the data and then finally retrieving the data is all done in the Control Unit.
All these three units are elements of CPU and together help in the efficient working and processing
of data. It is also known as the “Brain of Computer” and no action can be conducted by a device
without the execution and permission of the Central Processing Unit.
The device is a close-knit circuit comparison microprocessor which helps in fetching the data and
proving suitable results to the user. Thus, CPU is the main processing unit of the computer.
Speed of the System – In case a virus is completely executed into your device, the time
taken to open applications may become longer and the entire system processing may start
working slowly
Pop-up Windows – One may start getting too many pop up windows on their screen which
may be virus affected and harm the device even more
Self Execution of Programs – Files or applications may start opening in the background of
the system by themselves and you may not even know about them
Log out from Accounts – In case of a virus attack, the probability of accounts getting hacked
increase and password protected sites may also get hacked and you might get logged out
from all of them
Crashing of the Device – In most cases, if the virus spreads in maximum files and programs,
there are chances that the entire device may crash and stop working
Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or the
Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files which are
required to start the Operating system of the computer. The virus either overwrites the
existing program or copies itself to another part of the disk.
Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and enters
the device while its execution is called a Direct Action Virus. If it gets installed in the
memory, it keeps itself hidden. It is also known as Non-Resident Virus.
Resident Virus – A virus which saves itself in the memory of the computer and then infects
other files and programs when its originating program is no longer working. This virus can
easily infect other files because it is hidden in the memory and is hard to be removed from
the system.
Multipartite Virus – A virus which can attack both, the boot sector and the executable files
of an already infected computer is called a multipartite virus. If a multipartite virus attacks
your system, you are at risk of cyber threat.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove the existing program and replace it with the malicious code by overwriting it.
Gradually it can completely replace the host’s programming code with the harmful code.
Polymorphic Virus – Spread through spam and infected websites, the polymorphic virus are
file infectors which are complex and are tough to detect. They create a modified or
morphed version of the existing program and infect the system and retain the original code.
File Infector Virus – As the name suggests, it first infects a single file and then later spreads
itself to other executable files and programs. The main source of this virus are games and
word processors.
Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file with
viruses. It is known as cavity virus. It will neither affect the size of the file nor can be
detected easily.
Macro Virus – A virus written in the same macro language as used in the software program
and infects the computer if a word processor file is opened. Mainly the source of such
viruses is via emails.
What is an Anti-Virus?
An anti-virus is a software which comprises programs or set of programs which can detect and
remove all the harmful and malicious software from your device. This anti-virus software is
designed in a manner that they can search through the files in a computer and determine the files
which are heavy or mildly infected by a virus.
Given below is a list of few of the major antivirus software which is most commonly used:
Norton Antivirus
F-Secure Antivirus
Kaspersky Antivirus
AVAST Antivirus
Comodo Antivirus
McAfee Antivirus
The first development was the introduction of host-to-host network interactions. This was
first observed in ARPANET in 1969. It was developed by Advanced Research Projects Agency
(APRA) of the Department of Defence, U.S. It was one of the first general usage of computer
networks.
Next step was commercialising the usage and making the transistors and transmitters fit in
smaller devices for convenient Internet usage for the general public. This was introduced in
the 1970s
Moving forward, satellites and wireless communication was the main target. Defence
Advanced Research Projects Agency (formerly ARPA), supported satellite-based radio
packets for mobile usage of networks
The next was the development of Transmission Control Protocol (TCP). This enabled
different machines and networks across the world to assemble data packets. It was in the
1980s that the TCP/IP approach was adapted by researchers and technologists, following
the footsteps of the U.S. Department of Defence
With the introduction of personal computers, the demand for commercial Internet usage
increased. This was the time when Ethernet and other Local Area Networks cam in the
foreground
In 1993, the web browser was introduced, which followed the point-and-click approach and
is now a widely used operation for Internet users
The late 1990s was the time when thousands of Internet Service Providers has taken up the
market and most of them were from the U.S.
And then the 21st century brought in an amalgamation of technology and wireless Internet
accessibility for its users. Wherein, wireless broadband services came in as a boon for
Internet users
Dial-Up – In such connections, users are required to link their phone line to a computer to
access the Internet. Under this connection, the user cannot make or receive phone calls
through tier home phone service.
Broadband – Provided either through cable or phone companies, Broadband is a high-speed
internet connection which is widely used today.
Wireless Connection – Wi-fi and Mobile service providers fall under this category. Internet
connectivity is made via radio waves and the Internet can be connected anywhere,
irrespective of the location. Given below are a few examples of wireless connection:
o Wi-fi – Wireless Fidelity or wi-fi allows high-speed internet connectivity without the
use of wires.
o Mobile Phones – All smartphones are now equipped with an option for Internet
connectivity which can be availed using Internet vouchers and packs. No external
connection or wire is required for these.
o Satellite – Where broadband connections are unavailable, satellites are used for
wireless Internet connectivity.
o Integrated Services Digital Network – ISDN allows users to sent audio or video data
using telephone lines.
TCP/IP Network Model – Transmission Control Protocol (TCP) and Internet Protocol (IP) are
the most widely used protocols for connecting networks. It divides any message into a series
of packets which are sent from source to destination
File Transfer Protocol – Program files, multimedia files, text files, documents, etc. can be
transferred from one device to another, using FTP
Hypertext Transfer Protocol – Used for transferring a hypertext from one device to two or
more devices. HTML tags are used for creating links and these links may be in the form of
text or images
Pros and Cons of Using the Internet
Intentionally or unintentionally, Internet usage is a part in the day to day lives of every individual.
The Internet has made lives easy and comfortable, but at the same time made human being
dependable for the smallest or biggest of information. Discussed below are the uses of the internet,
along with a few cons that it brings along.
Pros of Internet
Easy Access to Information – Information on anything and everything are available online.
The Internet makes it convenient to learn about new things at any point in time and get
details on various subjects, irrespective of time and place
Platform for Online Education – With the advanced technology, even students and adults
wish to learn new things and gaining knowledge at various online portals has become more
accessible
Job Hunting – Employers can look for employees on the internet and the job seekers can
apply online for jobs using the Internet
Platform to become an Entrepreneur – Today, thousands of people have started their own
websites and getting good business and users/customers by making their own websites and
selling products or services. This has become accessible due to Internet connectivity
Visual and Graphical Representation of Things – Various researches have shown that a
person tends to get more engaged with a graphical representation of things. Internet has
made this facility also convenient for both user and creator
Reduced the parameter of Distance – Social media has reduced the distance between
people as communication has become much easier because of Internet connection
With the Internet being an extremely essential part of daily life, it is important that a person is well
aware of the disadvantages of the Internet and its excess usage.
Cons of Internet
Dependency – The dependency of people for looking things and information online has
increased massively since the introduction of Internet and its easy access
Cyber Crime – People do not just use internet for learning purposes, cybercrime has also
been at a distinctive high because of effortless availability of resources
Distraction – People can easily find online games, interesting information, etc. online which
may be a cause of distraction for may
Bullying and Trolls – Online platforms are being used for unethical practises like bullying
people and trolling them
Computer Networks
What is a Computer Network?
A group of computers which are connected to each other and follow similar usage protocols for the
purpose of sharing information and having communications provided by the networking nodes is
called a Computer Network.
A network may be small where it may include just one system or maybe as large as what one may
want. The nodes may further be classified into various types. These include:
Personal Computers
Servers
Networking Hardware
General Hosts
Networking can be classified into three types:
Network Topologies
Given below are the eight types of Network Topologies:
Point to Point Topology – Point to Point topology is the simplest topology that connects two
nodes directly together with a common link.
Bus Topology – A bus topology is such that there is a single line to which all nodes are
connected and the nodes connect only to the bus.
Mesh Topology – This type of topology contains at least two nodes with two or more paths
between them.
Ring Topology – In this topology every node has exactly two branches connected to it. The
ring is broken and cannot work if one of the nodes on the ring fails.
Star Topology – In this network topology, the peripheral nodes are connected to a central
node, which rebroadcasts all the transmissions received from any peripheral node to all
peripheral nodes on the network, including the originating node.
Tree Topology – In this type of topology nodes are connected in the form of a tree. The
function of the central node in this topology may be distributed.
Line Topology – in this topology all the nodes are connected in a straight line.
Hybrid Topology – When two more types of topologies combine together, they form a
Hybrid topology.
Network Devices
Discussed below are a few important network devices from the exam point of view:
Operating System
An Operating System is the interface between the computer hardware and the end-user. Processing
of data, running applications, file management and handling the memory is all managed by the
computer OS. Windows, Mac, Android etc. Are examples of Operating systems which are generally
used nowadays.
All modern computing devices including Laptops, Tablet, mobile phones, etc. comprise an
Operating System which helps in the smooth working of the device.
Initially, the computers made did not have an Operating system and to run each program a
different code was used. This had made the processing of data more complex and time
taking
In 1956, the first operating systems were developed by General Motors to run a single IBM
computer
It was in the 1960s that IBM had started installing OS in the devices they launched
The first version of the UNIX operating system was launched in the 1960s and was written in
the programming language C
Later on, Microsoft came up with their OS on the request of IBM
Today, all major computer devices have an operating system, each performing the same
functions but with slightly different features
Multiple people at various terminals can use a program at the same time.
The main motive is to minimize the response time.
When two or more systems are connected to each other and one can open files which are
not present in their system but in other devices connected in the network.
Its usage has now increased over the years.
They use multiple central processors to serve real-time applications.
Failure of one system does not affect the other systems connected in the network.
They have one main server which is connected to other client servers.
All the management of files, processing of data, access to sharing files, etc. are performed
over this small network.
It is also a secure operating system for working with multiple users.
With the advancement in the field of technology, smartphones now are released with an
Operating system.
They are designed in a manner that they can help a small device work efficiently
It helps with memory management. It keeps a track of the files being saved in the Main
memory and the primary memory of the computer device
Whenever a computer is turned on, the Operating system automatically starts to work. Thus,
the booting and rebooting process of a computer device is also an important function of the
OS
It provides a user interface
Managing of basic peripheral devices is done by the operating system
Using the password protection option of an operating system, the data in the device can be
kept secure
It coordinates with the software and the user
Easy navigation and organisation of files and programs are managed by the OS
Any kind of program which needs to be run through the system is done by the operating
system
If any kind of error or bug is found during the program is detected using the operating
system
Microsoft Office
Microsoft Office is a software which was developed by Microsoft in 1988. This Office suite
comprises various applications which form the core of computer usage in today’s world.
2. MS Excel
3. MS PowerPoint
5. MS Outlook
6. MS OneNote