Beruflich Dokumente
Kultur Dokumente
latest technology.
the different ways you can navigate your way through it. For
INFORMATION REPRESENTATION - highlights the different
Hardware - Peripherals
Input Devices
2)
Hardware - Peripherals
How a mouse works
Input Devices - Mouse (1 of
Each roller is attached to an optical encoder, a disc A Digitising Tablet is a pointing device that
which has gaps in its surface. The rotation of the facilitates the accurate input of drawings and
encoder interrupts two beams of light between the designs.
LEDs and their detectors.
These pulses of light are fed to the computer and
A digitising tablet with pen
are used to determine the speed and direction of the
mouse's movement. A drawing can be placed directly on the tablet,
and the user traces outlines or inputs coordinate
Hardware - Peripherals
positions with a hand-held stylus.
Input Devices - Joystick
Hardware - Peripherals
The joystick is a rotary lever. Similar to an aircraft's
control stick, it enables you to move within the Input Devices - Touch
screen's environment, and is widely used in the Sensitive Screen
computer games industry.
Hardware – Peripherals
Hardware - Peripherals
A Light Pen is a pointing device shaped like a pen Input Devices - Digital
and is connected to a VDU. Stills Camera
The tip of the light pen contains a light-sensitive
element which, when placed against the screen,
detects the light from the screen enabling the
computer to identify the location of the pen on the Digital Stills Cameras capture an
screen. image which is stored in memory
within the camera. When the memory
A light pen
is full it can be erased and further
images captured.
Light pens have the advantage of 'drawing' directly A digital stills
onto the screen, but this can become uncomfortable, The digital images can then be camera
and they are not as accurate as digitising tablets. downloaded from the camera to a
computer where they can be
Hardware - Peripherals
displayed, manipulated or printed.
Input Devices - Space Mouse
Hardware - Peripherals
The Space mouse is different from a normal mouse Input Devices - Magnetic Ink
as it has an X axis, a Y axis and a Z axis. It can be Character Recognition
used for developing and moving around 3-D
environments.
A computer can read numbers and letters printed
with ink containing magnetic material.
Scanners allow information such as a photo or text
to be input into a computer. Scanners are usually
either A4 size (flatbed), as shown below, or hand-
held to scan a much smaller area.
A cheque detailing the MICR number
MICR is used by banks to process cheques. The If text is to be scanned, you would use an Optical
account details at the bottom of the cheque can be Character Recognition (OCR) program to recognise
accurately read in this manner since MICR is not the printed text and then convert it to a digital text
affected by dirt. file that can be accessed using a computer.
Hardware - Peripherals
Hardware - Peripherals
Hardware - Peripherals
A bar code
Input Devices - Scanners An infra-red bar code reader
A bar code is a pattern printed in lines of differing
thickness. The system gives fast and error-free entry
of information into the computer.
Hardware - Peripherals A store card showing the square microprocessor chip
Keyboard
Hardware - Peripherals
Hardware - Peripherals
With a video capture board in one of your
Output Devices
computer's expansion slots you can capture video
(photographic) images through a video camera.
The video capture board digitises the image.
These devices display information that has been
held or generated within a computer.
Some examples are shown below.
improves as the number of pixels is increased. Most
• VDU or Monitor • Ink Jet Printer monitors have a 4:3 width to height ratio.
• Printer • Robot Hardware - Peripherals - Output Devices
• Impact Printer • Machine Tool VDUs - Screen Resolution
• Dot Matrix Printer • Synthesized Voice
• Daisywheel Printer • Plotter
• Non-Impact Printer • Flatbed Plotter The standard user interface on the PC was originally
• Thermal Printer • Drum Plotter a text-only mode. With the increased resolution of
VDUs applications are now written in graphics mode
• Laser Printer • Electrostatic Plotter
using individual pixels. A recent standard has been
640 x 480 pixels on the screen (this is called VGA)
Hardware - Peripherals and the present standard is 800 x 600 (called SVGA).
Output Devices - VDUs
Hardware - Peripherals
Non-impact printers are much quieter than impact Thermal printer paper tends to darken over time due
printers as their printing heads do not strike the to exposure to sunlight and heat. The standard of
paper. print produced is poor.
Most non-impact printers produce dot-matrix Thermal printers are widely used in battery powered
patterns. equipment such as portable calculators.
Several different technologies have been used to
Hardware - Peripherals
provide a variety of printers.
Output Devices - Laser
The main types of non-impact printer are:
Printer
○ Thermal Printer
○ Laser Printer
○ Ink Jet Printer Laser Printers use a laser beam and dry powdered
Hardware - Peripherals ink to produce a fine dot matrix pattern. This method
of printing can generate about 4 pages of A4 paper
Output Devices - Thermal
How a laser printer works
per minute.
Hardware - Peripherals
Toner is attracted to parts of the drum with a high Inkjet printers use colour cartridges which combine
charge. The drum rotates and transfers the toner to magenta, yellow and cyan inks to create colour
the paper which has an even greater electrical tones. A black cartridge is also used for crisp
charge. Finally a heater fixes the toner onto the monochrome output.
paper. This method of printing can generate up to 200 cps
and allows for good quality, cheap colour printing.
Hardware - Peripherals
We are still a long way from the science fiction Output devices - Voice
robots and androids portrayed by the film industry.
Hardware - Peripherals
This type of plotter is fast, but the quality is
generally considered to be poor when compared to
Output Devices - Drum pen plotters.
Plotters
Peripheral Devices - Output
Hardware - Peripherals
Printed output
Storage Devices - Hard Disk
Storing information on the hard disk
• Hard Disk
High data rates demand that the disk rotates at a
• Magnetic Tape
high speed (about 3,600 rpm). As the disk rotates
• Floppy Disk read/write heads move to the correct track.
The disk is sealed and lubricated and the head within magnetic tape. This characteristic has
hovers on a cushion of air just above the disk to prompted its use in the regular backing up of hard
avoid damage. These are therefore called floating disks.
heads.
The storage capacity of a hard disk can be
Hardware - Peripherals
Gigabytes (Gb), i.e. thousands of Megabytes
(1000Mb), of information. Storage Devices - Floppy
Disk
Hardware - Peripherals
A recording medium consisting of a thin tape with a Data is stored in tracks and sectors.
coating of a fine magnetic material, used for
recording analogue or digital data. Data is stored in
frames across the width of the tape. The frames are
grouped into blocks or records which are separated
from other blocks by gaps. A 3.5" floppy disk
Magnetic tape is a serial access medium, similar to The floppy disks are usually 3.5" in size. However,
an audio cassette, and so data (like the songs on a older floppy disks may be in use; these would be
music tape) cannot be quickly located. 5.25" in size.
Double sided high density 3.5" disks can hold 1.44
Mb of data.
Once data is stored on a floppy disk it can be 'write
A JAZ drive with cartridge -
TM protected' by clicking a tab on the disk. This
one of the many types of magnetic storage devices available
prevents any new data being stored or any old data
However large amounts of information can be stored being erased.
Hardware - Peripherals
INPUTS OUTPUTS
Hardware
Computer Logic Voltages at the inputs can be set to +5v (called 'logic
1' or 'high') or to 0v (called 'logic 0' or 'low').
Hardware
Logic circuit components are called 'gates'. Logic Computer Logic - 'OR' Gate
circuits are used to perform all the internal
operations of a computer. Computer logic is based
on a branch of mathematical logic called Boolean
Algebra (named after the mathematician George The output of an OR gate is a 1 if one or the other or
Boole). both of the inputs are 1, but a 0 if both inputs are 0.
In this section you will learn about: A B C
• 'OR', 'AND' and 'NOT' Gates 0 0 0
0 1 1
• the half adder as an example of a logic circuit
1 0 1
• the 'NOR', 'NAND' and 'Exclusive OR' Gates 1 1 1
Truth
Hardware
Table
Computer Logic - Gates Click on the inputs to see how changing
their logic state affects the output. All the
possibilities are shown in the table called a
'Truth Table'.
A logic gate is a general purpose electronic device
Hardware
used to construct logic circuits. All logic gates have
inputs and outputs. The state of the output is set by Computer Logic - 'AND' Gate
0 1
1 0
Truth
The output of an AND gate is only 1 if both Table
its inputs are 1. For all other possible inputs
Click on the inputs to see how changing
the output is 0.
their logic state affects the output. All the
A B C possibilities are shown in the table called a
0 0 0 'Truth Table'.
0 1 0 Hardware
1 0 0
1 1 1 Computer Logic - The Half
Truth Adder Circuit
Table
Hardware
Computer Logic - Exclusive 1 What is the output state of an OR gate if
OR (XOR) gate . the inputs are 0 and 1?
Top of Form
0
The output of the XOR gate is a 1 if either
but not both inputs are 1 and a 0 if the 1
inputs are both 0 or both 1.
2
A B C Bottom of Form
0 0 0
0 1 1
1 0 1
Hardware
1 1 0
Truth Processor and Memory
Table
CPU - ALU
CPU - Registers (2 of 2)
A ROM chip
Static RAM
Dynamic RAM
RAM chips are produced on pieces of silicon
in a manner similar to that of
microprocessors.
Dynamic Memory is often referred to as
Semiconductor RAM memory can be divided volatile memory.
into two major groups, Static Ram and
Data is stored within the capacitance of a
Dynamic Ram .
transistor. The capacitor (A device designed to hold
electrical charge in an electrical circuit)is unable to
prevent the charge from slowly discharging.
This would result in the loss of data. A
solution to this problem is the introduction
of additional circuitry which performs a
'memory refresh' by periodically restoring
the charge.
Dynamic memory is cheaper than Static
memory and is used in larger memory microprocessor is dedicated
systems. to a particular task.
In these instances ROM has
Hardware - Processor and Memory - Memory provided a cost effective
Read Only Memory (1 of 2) way of storing software to
be used by the
microprocessor.
Washing machines use
In this example ROM is used ROM chips to store progam
ROM is responsible for storing permanent to store the various information
Microcomputers
A CD-ROM
Bottom of Form
Generations of Computers -
Exercises
First generation
Second generation
Hoover generation
Bottom of Form
Software
Word Processors
Word processors
provide a very flexible
way of creating and
editing documents. • Keyboard to input data
They have greatly • Computer Base Unit to process the
contributed to the data
popularity of the • Monitor to display documents
Personal Computer (PC)
and its acceptance as • Printer to produce a hard copy
an essential piece of Software - Word Processors
office equipment.
Applications
Created documents can
be stored and used
again, modified as
necessary for the new People who use Word Processors:
job.
• Authors and playwrights who write
books and scripts for films or plays
• Lawyers who produce legal documents
and contracts
Software - Word Processors • Secretaries who write letters
Hardware • Mail order companies who send out
the same letters addressed to
different customers
There are many word processing packages available. EachThe Insertion Point(The point within a document where
package has its own way of manipulating text, but they allthe cursor is positioned to manipulate text characters) is
follow the same basic steps: indicated by a flashing cursor bar or an
• Creating your document underscore.
This can be moved by clicking with
• Editing the text
the mouse at any point within the
• Page Layout document, or by using the keyboard.
• Advanced tools (spell check, mail merge, etc.) • The up and down arrows move
• Saving, retrieving and printing documents the insertion point up or down
one line.
Software - Word Processors • The left and right arrows move
the insertion point left or right
Creating a Document one character.
• Page Up or Page Down move
the insertion point up or down
several lines at a time,
A document is a word processor file which
contains text. It can be any size (one word • Home moves the insertion point
or 200 pages). to the beginning of a line, and
End moves the insertion point
To create a document you must first type in
to the last character in a line.
some text.
Using the keyboard, text is typed onto the You have a choice of either writing over
page of the document which is seen on the existing text at the insertion point or
monitor screen. inserting new text .
Software - Word Processors
Software - Word Processors Selecting a Text Block
Once text has been written into a • Cut
word processor document you may • Copy
wish to alter it. To do this the text to
• Paste
be altered must first be selected.
• Clear
You can select text in two ways:
Mouse: You can select text with the
mouse by clicking with the left button Glossary Entry :- Buffer
at the start of the block, holding the It is often possible to move selected text by
button down as you drag it over the dragging the text to the required position in
text and then releasing it at the end a document (not necessarily the same
of the block. document), by using the mouse. To copy
Keyboard: You can also select a block selected text do the same actions as
using keyboard keys, e.g. Shift + End described above, but hold down a control
or Shift + Page Down to select a line key on your keyboard e.g. Ctrl key (for
or block of text. Windows®) or Alt key (for Mac)
© Microsoft Corporation
To lay a document out in a
professional way sections of
the text can be indented Software - Word Processors
(moved in from the left hand Page Layout - Columns
border of the text area).
Important points can be
highlighted by the addition
of a bullet (a mark - black © Microsoft Corporation
dot, asterix, square, etc.) at Many word processors allow
the beginning of the line. you to format the page into
Alternatively, points may be separate columns of text.
numbered.
Advanced Tools
Botto
m of
Form
Before printing your document you can view
it (or 'Print preview' it), which shows how Creating and editing
the document will appear when it is printed. documents
Storing information
The printer can be set up to
the required page
orientation, printing quality,
etc.
Software
Applications Example (1 of 2)
Spreadsheets earned their name before the
period of computers. Paper-based
spreadsheets were used by businesses to
plan for the future. They consisted of The sales manager for Rossi's Tile Plant
numbers "spread" over a grid on the paper. wants to see the effect of a possible
increase in sales of their 'Delux' tiles on
The planning activity involved frequent their profits.
amendments and laborious recalculation Using a spreadsheet the sales manager
every time there was a change in the data could increase the projected sales figure
used to do the planning or forecasting already present on the spreadsheet and
activity. view the effect on his company's profit
Traditionally the columns of the grid column.
represented a time period of a day, week,
month or year.
Software - Spreadsheets
Applications Example (2 of 2)
The sales manager could ask:
"What if I increase sales of 'Delux' tiles from There are many types of functions that
10,000 to 13,000 units ?" accompany spreadsheets. Many of these
functions serve as useful tools in
performing everyday calculations.
For example the SUM (number1,
number2,...) function is a standard function,
found in many spreadsheet packages, used
for adding numbers together:
© Microsoft Corporation
Software - Spreadsheets
What they do
© Microsoft Corporation
Spreadsheets can be used to:
As you can see the SUM function has
Calculate data: Many spreadsheets come automatically added the values together in
with formulas built-in. Spreadsheets the cell C2.
calculate data through functions.
Software - Spreadsheets
Analyse data: Spreadsheets make data easy
to analyse. Analysing Data
Present data: Spreadsheets are able to
show data in a variety of formats.
Spreadsheets are used for analysing data.
Software - Spreadsheets This application of a spreadsheet makes use
of the spreadsheet as a decision-making
Calculate Data tool.
Software - Spreadsheets
Presenting Data
Software - Spreadsheets
Worksheet
© Microsoft Corporation
Software - Spreadsheets
Macros
Most spreadsheet computer programs can
draw graphs from the data in the
worksheet.The graphs or charts can be:
Macros enable you to record a sequence of
keystrokes and mouse actions which can
then be replayed when the user initiates the
macro.
Macros are mainly used to avoid manually
performing repetitive activities within a
spreadsheet. Macros can be used to: the year (Jan-April).
• insert predefined text into a cell Software - Spreadsheets
• create a weekly printout of reports Example - Layout
• set a standard column width for every
new worksheet you open
Software - Spreadsheets
We tell Sam that we have decided that the
Example first step in creating Sam's spreadsheet will
be to create the layout. This involves
entering text within cells and formatting the
width of columns.
The following example provides you with an We have decided that the spreadsheet
incomplete worksheet. By entering the should look as follows:
required text, numbers, and formulas you
are guided through the steps necessary to
complete the worksheet.
© Microsoft Corporation
Example - Formulas
© Microsoft Corporation
Analyse data
Calculate data
Software
Databases (1 of 3)
© Microsoft Corporation
Finally we can see that Sam predicts a total
sales value of 190 by the end of the first A database is an organised way of storing
four months. We could change the data in information about a set of similar things. It
the table and the formulas would could be a sort of address book, a catalogue
automatically recalculate the results in the of someone's stamp collection, information
affected cells. about football teams, details of a building
company's projects and equipment in use,
Software - Spreadsheets
etc.
Spreadsheets Exercises If we were making a database to store
information about a group of students, what
kind of information would we want? Let us
look at some of the data that might be
This multiple choice section will ask 6 questions to
test your knowledge and total your score. You will be related to two students called Sue and
given the opportunity to try the quiz again once you Wayne:
have finished all the questions.
1 What can you NOT do with a
. spreadsheet?
© Microsoft Corporation
© Microsoft Corporation The data displayed has been extracted from
a Table containing the data for the whole
Software group.
Databases (2 of 3) Software
Databases (3 of 3)
• Payments Fields (1 of 2)
© Microsoft Corporation
Forms
• Currency fields store data in a Forms are also designed for ease of data
currency format. entry. Data is typed directly into the boxes
in the form, one record at a time.
Software - Databases
Software - Databases
Records
Forms
Reports allow users to extract
and present the information
they require as hardcopy
Forms are used to customise the display of
(printed output).
information in the database. Many of the
fields existing within a table will feature in
a form. Forms are used to display only one
record at a time.
Software - Databases
Primary Key (1 of 2)
Reports
© Microsoft Corporation
© Microsoft Corporation
every record in a table. If several unique The foreign key in the table 'Books' is the
identifier fields exist in a table they are field 'Publisher' and it is the primary key for
known as candidate keys. (No candidate the table 'Publishers'.
keys exist in our table above).
Software - Databases
Software - Databases
Queries The Query has used the common factor of
"Publisher" to generate a new table with
data on book titles and publishers'
telephone numbers, which were fields in
You can use Queries to analyse, and change the two separate tables.
data in different ways. You can also use Software - Databases
them as the source of records for reports
Example - Setting up tables
and forms. They can be used to bring
together data from two or more different
tables in a database by linking the Primary
Key of one table with the Foreign Key of
The first step towards creating a database
is to set up the relevant tables of
information.
We will create a database that stores the
names and examination results of a group
of students. This will require two tables: a
another: 'Student' table and a 'Subject/marks' table.
© Microsoft Corporation
First we need to create the fields for our
The upper half of the Query form above tables, then we need to enter the data.
shows the fields in the two tables to be
linked, and the links which are to be used.
The check boxes in the lower half are for
selecting the fields from the separate
tables which are to be included in the new
combined table to be created by the Query:
© Microsoft Corporation
© Microsoft Corporation
Example - Creating a query (1
of 3)
Software - Databases
© Microsoft Corporation
Software - Databases
© Microsoft Corporation Example - Creating a query (2
of 3)
Software - Databases
In this example we will need to link the
tables by a common field. The "Student ID"
is common to both tables and will be used
to link the tables:
© Microsoft Corporation
© Microsoft Corporation
Software - Databases
Example - Creating a Query © Microsoft Corporation
(3 of 3)
Software - Databases
Example - Creating a report
We want to find out which girls had exam
marks over 70% in Physics. So we need to
tell the database we are interested only in
students who are girls - in the Sex field we In many cases we perform queries in order
add 'F'. We need to tell the field 'Physics' to to print out the results in a Report. Here is
display exam results better than 70%, and the first page of our report showing the
then we have to display the highest exam student Pauline Bennet as the girl having
results first: the highest exam result in Physics:
This stage of database design involves
identifying the nature and use of data in the
organisation. Performing a database
Software - Databases investigation for a library system will
require the investigator to note facts about
Database Development books held in the library.
Software - Databases
The following section covers Database Data Investigation (2 of 2)
Development.
Two key stages are identified in the
development of a database:
Facts that should be noted when
Data investigation
investigating books for a library system
Data modelling
include:
Software - Databases
Title
Data Investigation (1 of 2)
Author
Publish
er
ISBN
Software - Databases Relationships - One to One
Data Modelling
Software - Databases
This relationship can be illustrated when a
Data Modelling -
student borrows several books from a
Relationships library at the same time, but a book can be
borrowed by only one student at a
particular time.
Relationships are used to show how
different objects in a database system
relate to each other. There are three kinds
of relationships: Software - Databases - Data Modelling
One to one Relationships - Many to Many
One to many
Many to many
Software - Databases - Data Modelling
This type of relationship can be illustrated
when we consider that a student can study entity. The entity 2 Acacia Avenue
several subjects and each subject will have 'student' may have 01245 673246
many students. attributes such as: Sarah Stephen
Names 156 Birch Tree Walk
Addresses
01718 489729
Software - Databases Telephone
numbers James Treggar
Data Modelling - Entities Flat 4, High Road
0171 347 8734
Software - Databases
Entities are objects or concepts meaningful
to the organisation about which data needs Data Modelling - Library
to be kept. Model Example
Software - Databases
Advantages of DTP
© Adobe Systems Inc.
A DTP program showing text 'snaking' into columns
DTP and word processing are in many respects
Software - Desk Top Publishing similar but there are a number of
Features of DTP - Kerning distinct advantages of using DTP.
Here are some:
1. There is more control over the
way text is arranged and
Better DTP systems use fonts with in-built formatted.
tables specifying the space necessary 2. DTP can be used to bring lots
between each specific pair of letters. This of different files together on the same
special treatment of spacing between document.
specific letter pairs is known as "kerning".
You can import images into a DTP document
Kerning is the process from a scanner, graphics from a drawing
of adjusting the package, frames from a video camera and text
spacing between the from a word processor .
characters. Some
letters fit well against
others and some fit Software
poorly. For example, a Systems Software (1 of 2)
'T' followed by an 'o' © Quark, Inc
is ungainly if the Floating tool bar with 'kerning'
option highlighted
standard spacing is
Click on the diagram to jump to the area of interest or continue with the navigation
Systems software was developed in order to arrow above.
automate the following routine tasks: DBMS=Database Management Services
Mini/Mainframe*
3. Memory allocation
4. File handling system This requires the operating system to work through
a series of programs that are held in a queue. The
Examples of operating systems for PCs are MS-DOS
®
operating system is responsible for scheduling the
, UNIX, Microsoft Windows 95® and Microsoft
jobs according to priority and the resources they
Windows NT®.
require.
NOTE: Operating systems such as UNIX that were normally
associated with minicomputers are now able to run on the new Example:
and more powerful PC ranges. A large company would use batch processing to
Software - Systems Software automate their payrolls. This would find the list of
employees, calculate their monthly salary (with tax
Operating Systems - Mini &
deductions) and print the corresponding payslips.
Mainframe
Batch processing is useful for this purpose since
these procedures are repeated for every employee
Mini and mainframe computers make use of: each month.
This involves the CPU allocating individual slices of Operating Systems - Services
time to a number of users on the computer system.
As the number of users increases the response time
for each terminal declines. The speed of the CPU
Operating systems are responsible for providing
essential services within a computer system: wants the PC to perform
• Initial loading of programs and automatically when it is booted.
transfer of programs between
secondary storage and main Software - Systems Software - Operating Systems
memory
MS-DOS® - config.sys
• Supervision of the input/output
devices
• File management
The CONFIG.SYS file contains commands that are
• Protection facilities
used to instruct MS-DOS® to install devices, set the
number of possible open files, set the number of
Software - Systems Software - Operating Systems logical drives available, etc. The CONFIG.SYS file has
Services - Initial Loading certain commands that are exclusive to it.
Example:
The DEVICE command is used to load an installable
device driver into the operating system.
When a computer system is switched on, or 'booted',
an operating system is automatically loaded. e.g. DEVICE = C:\MOUSE\MOUSE.SYS
installs the mouse driver into memory.
For Example:
A PC running under MS-DOS® loads the following
programs:
IO.SYS controls input/output devices
Software - Systems Software - Operating Systems
MSDOS.SYS loads MS-DOS®
MS-DOS® - command.com
CONFIG.SYS configures the device drivers
COMMAND.COM loads the command line interpreter
AUTOEXEC.BAT sets the procedures the user
The COMMAND.COM file automatically loads MS- Software - Systems Software - Operating Systems
DOS® commands into the computer's memory when Services - Loading
the system is booted. These commands (such as dir, Applications
del, time, type, etc.) are held together under the
COMMAND.COM file and are referred to as internal
commands.
Operating systems are responsible for managing the
MS-DOS® consists of internal and external
transfer of programs from the hard disk into main
commands. External commands are held on a disk
memory.
and are loaded to memory only when they are being
used. External commands are held in the DOS Advanced operating systems, such as UNIX, use
directory and have .COM or .EXE as their extension. virtual memory(Virtual memory uses management controllers to
increase the system memory by mapping sections to the hard disk
For example FORMAT.COM and PRINT.EXE. using an LRU (least recently used) algorithm. This fools the
application into believing that it has a lot of memory available.) to
Software - Systems Software - Operating Systems run large applications. MS-DOS® applications
overcome the same problem by using overlays(The
MS-DOS® - autoexec.bat limited size of the memory provided noticeable limitations on
hardware of computer systems in the past, when attempts were
made to load programs into the main memory that were too large.
This resulted in the programs being divided manually into smaller
segments that were then individually fed into the main memory.
path instructs MS-DOS® to look for program files in the current directory,
Theseand then
smaller any other
sections directories
are called 'OVERLAYSthat
). are
specified in the path.
Software - Systems Software - Operating Systems
e.g. SET PATH=C:\;C:\DOS;C:\WINDOWS
Services - I/O Supervision
prompt determines the appearance of the DOS
prompt
e.g. prompt $p$g shows the prompt as Operating systems provide a supervision of the
C:\DOS> ($p shows the current directory input/output devices that are connected to a
and $g shows ">") computer system. They do this by incorporating
specialised input/output routines for the various
types of devices. • delete <filename> etc) interfacing.
Device drivers accompany operating systems and
Software - Systems Software - Operating Systems
enable a computer system to be configured for
specific hardware. Most hardware peripheral devices Services - Protection
have their own device drivers which need to be Facilities
installed for the operating system to communicate
with these devices.
Example: Operating systems provide protection policies that
The MS-DOS file config.sys configures the device ensure privacy and prevent damage to information
drivers. contained within the computer system. This is
Software - Systems Software - Operating Systems
achieved through the use of passwords and access
rights.
Services - File Management
Software - Systems Software
Systems Services -
Languages Software - Systems Software
© Microsoft Corporation
Computer Languages
Introduction (1 of 3)
Computer Languages
This unit of the course is divided into five modules: Introduction (2 of 3)
Language
Elements
Computer Languages
Elements - Subroutines (2 of
2)
If...Then...Else statements allow decisions to be
made in a program. This includes deciding which
statements are to be executed. In the example
In the C programming language subroutines are below the variables 'aboveNinety' and 'belowNinety'
known as functions. A function is a group of are first set to the value zero. The value 1 is added
statements that perform a specific task and often to 'aboveNinety' or 'belowNinety' for each 'Score'
return a value to the statement that calls it. that is over or below 90 using the If ... Then ... Else
'C' functions allow you to write well organised statement. The results are then printed to the
programs that perform different tasks in separate screen.
parts of a large program. e.g.
aboveNinety := 0;
Computer Languages belowNinety := 0;
Elements - If .... Then .... Else IF (Score > 90) THEN
(1 of 2) aboveNinety := aboveNinety + 1;
ELSE
belowNinety := belowNinety +1;
print aboveNinety , "Language(s) above 90%";
print belowNinety , "Language(s) below 90%";
Computer Languages
First Generation
Assembly Language formed the second generation
of computer languages. Assembly makes use of a The LOAD instruction tells the microprocessor to
list of simple operations that a computer can put in the register the contents of:
perform. These operations are contained within the
• a constant
Instruction Set.
• a word or byte from memory
The basic Instruction Set includes several types of
instructions written using short words called • or the contents of another register
'Mnemonics' which are recognisable abbreviated Computer Languages
versions of English words.
Memory Addresses
Computer Languages
Mnemonics
Memory addresses direct the computer to where
data is located or where it is to be transferred.
Assembly language makes use of easily identifiable Assembly Language uses easily identifiable
operation codes called mnemonics, instead of the symbolic addressing and allows the programmer to
numeric operation codes used in machine code. work in the more familiar base ten number system.
Operational codes or Data Transfer Instructions, In the example below the variables TOTALSCORE,
make up the computer's instruction set and tell the FRENCHSCORE AND ENGLISHSCORE are
microprocessor what operation to perform. addressed by their names (symbolic addressing),
not by their physical address in memory.
This may involve moving binary numbers from one
temporary memory store, called a 'Register', to Example Code:
another, or storing a number in a specific memory MOV AX, TOTALSCORE puts the value of
location. TOTALSCORE into AX
Computer Languages MOV BX, FRENCHSCORE puts the value of
Data Transfer FRENCHSCORE into BX
ADD AX, BX adds the value in BX to the
value in AX space on the extreme left is filled
ADD AX, 50
by a 0. The syntax differs
adds 50 to the value in AX
depending on the particular micro-
MOV TOTALSCORE, AX puts the value in AX back into processor the program is going to
TOTALSCORE run under.
MOV AX,10110111B Puts the
AX and BX are registers.
binary value
So if to begin with TOTALSCORE equals 15 and 10110111 into
FRENCHSCORE equals 20 then TOTALSCORE AX
would become 15+20+50=85 after this part of the
code has run. SHR AX,1 1 logical right
The decimal number 50 is an example of the base shift is
ten number system being used in assembler. performed on
the number
Program Explanation
Computer Languages
A10: Names the marker for the
program so it knows where to Assembly Language Program
go to
ADD AX,01 adds 1 to the value in AX
JMP A10 the program goes to the A10 Assembly Language is described as a low-level
marker and executes the code language because, for every assembly language
below it. command there will be one corresponding machine
code instruction. For example, to add decimals 566
Jump may have to be replaced by 'branch' for some
and 678 together:
processors used to run the code.
Machine Assembly
Description
Code Code
Load the hexadecimal value 0236H to the
B8 0236 MOV AX, 0236H
register AX.
Computer Languages
Load the hexadecimal value 02A6H to the
8B D8 MOV BX, 02A6H
Store Mnemonic register BX
Add the contents of the register AX to
03 D8 ADD BX, AX
register BX
Computer Languages
Compilers (2 of 2)
Interpreters
e.g. Instructions for making a cup of Coffee: 4GLs contain the following advantages and
1) Pour water in the kettle.
disadvantages:
2) Boil the water. Advantages Disadvantages
3) Add a teaspoon of coffee to a cup.
• They possess friendly • The downside of a
4) Fill the cup 3/4 full with boiling water.
interfaces 4GL is that the
5) Add milk
programs run slower
6) Stir the contents of the cup with a teaspoon. • They are easier to use
than those of earlier
than previously used
Computer Languages language generations
high level languages
because their
Fourth Generation (3 of 4) • The programming machine code
language contained equivalent is
within a 4GL is considerably longer
closely linked to the and more complicated
English language to execute
The 4GL programmer would only have to be
structure
concerned with what quantity of coffee should be • The recent popularity
prepared and if milk and sugar should be added. of 4GLs is closely
linked to the
Non-procedural languages state the goal to be development of fast
achieved, but not the steps required in order to microprocessors
achieve the goal. Note:
Having said all of this it is not easy to identify languages that
Using a 4GL to create an application that it was not
are in the purest sense 4GLs.
intended for will create problems for a programmer.
Computer Languages
e.g. Instructions for making a cup of Coffee:
Fifth Generation
1) Make a cup of coffee.
Computer Languages
Fourth Generation (4 of 4)
inputs. For example, if we pose the
question "Is John the father of Sam?"
The database then searches its list of
Fifth generation languages are normally associated facts and returns an answer.
with the field of artificial intelligence. Artificial Prolog query Database Result
Father(Terry, Sue)
intelligence, built up through logic programming, father(Terry, John)
? father(John, Sam) Yes
models a real world environment or situation. father(John, Sam)
female(Sam)
Artificial intelligence aims to support flexible and
informed patterns of behaviour within a computer.
The main contenders within the fifth generation
language category are:
Computer Languages
• Prolog 2
Prolog (2 of 3)
• Expert Systems
• Knowledge Based Systems
Prolog supports 'symbolic processing'
which is based on applying rules of
Computer Languages thumb that manipulate symbols in
Prolog (1 of 3) order to achieve a program goal.
The fact that Sue likes John can be
represented in Prolog as:
"likes(Sue,John)".
Prolog is a non-procedural logic based
language. Prolog involves building up a
knowledge base (database) where Computer Languages
relationships are represented. Prolog Prolog (3 of 3)
then uses a built-in facility in order to
draw logical conclusions from a user's
representing the way in which an expert would
Summary: proceed.
ADVANTAGES DISADVANTAGES
Interface Engine: The mechanism which controls the
• Logic based languages • It can be very difficult to reasoning process performed upon the knowledge
are able to represent the design a database that
real world more accurately represents
base.
accurately. relationships. Computer Languages
• Prolog is able to derive • Prolog is not best
Expert Systems (2 of 2)
new rules from the suited to solving
existing rules contained complex arithmetical
within the knowledge computations.
base. • Prolog programs are
Expert systems are
not best suited to the
current PC architecture designed to apply
(sequential execution) facts and rules of
and are best optimised thumb obtained from
on parallel architectures an expert in the
(fifth generation
types of problems
computers).
addressed by that
expert.
Rules are formulated on an IF...THEN...basis.
Computer Languages An example of a successfully developed expert
system is MYCIN. This expert system was developed
Expert Systems (1 of 2)
to provide medical diagnosis and prescription.
The system contains rules that associate symptoms
with diseases. For example,
Expert Systems are models of human expert "IF Redspots THEN Measles".
behaviour and are made up of two components:
Computer Languages
Knowledge Base: Interelated set of rules
Knowledge Based Systems
Program Development -
System Analysis
Knowledge Based Systems
are essentially the same as
Expert Systems.
A major difference between System Analysis involves
the two systems concerns the creating a formal model of the
quality of the information problem to be solved. The
stored within the knowledge model is created by:
base, and whether it is in fact • talking to the users to
'expert knowledge'. assess
their needs
Computer Languages
• understanding the
Program Development -
complete problem
Steps
to be solved
• making a formal
representation of the
Steps to Program Development are... system being designed
• System Analysis
• Specification and Design
Computer Languages
• Program
Program Development -
• Debug
Specification and Design
• Alpha Test
• Beta Test
• Deliver the Software
Computer Languages
Programmers use the
At this stage a detailed design is specification to write the code
written which defines the following: necessary to fulfil all the
requirements of the program. The
code is a text based file which
• Data Structures: defining the format and type when compiled creates the
of data the program will use. program.
• User Interface: the design of the screen the A good programmer will
user will see and use to enter data or display consider:
data. • Future Maintenance: any code that may be
• Inputs: defining the kind of data to enter into modified in future and should be allowed for
the program. when writing the code.
• Outputs: the possible data displayed from the • Code Readability: this enables programmers
system. to identify areas of code quickly and easily.
• Algorithms: the methods of calculating • Documentation: a document showing how the
outputs depending on the inputs. program works.
Computer Languages Computer Languages
Program Development - Program Development -
Program Debug
Virtually all programs have defects specification will be corrected at this
in them called 'bugs' and these stage.
need to be eliminated. Bugs can
arise from errors in the logic of the Computer Languages
program specification or errors in Program Development - Beta
the programming code created by a Test
programmer.
Special programming tools assist
the programmer in finding and
This is a more wide-ranging trial where the
correcting bugs.
application is given to a selection of users with
Some bugs are difficult to locate different levels of experience.
and fixing them is like solving a
complex puzzle. This is where we hope that the remaining bugs are
found, but some may remain undetected or unfixed.
Computer Languages
Program Development -
Alpha Test
Computer Languages
Program Development -
This is a small scale trial of the
Software Delivery
program. The application is given to
a few expert users to assess
whether it is going to meet their
needs and that the user interface is
suitable.
Bugs and missing features due to
the application being unfinished will
be found. Any errors in the code and
Variables receive data and messages
The completed software is packaged enabling two or more computers to
with full documentation and delivered communicate
to the end users.
Computer Languages -
Exercises
Analysis (1 of 3)
If there is no computer system then the first The aim of a feasibility study is to see whether it is
task will be to look at existing manual possible to develop a system at a reasonable cost.
systems. At the end of the feasibility study a decision is taken
It is possible to find out about existing whether to proceed or not.
systems in a number of ways:
A feasibility study contains the general requirements
• Talking to the people who work with of the proposed system.
the system.
Let us consider the task of setting up an Information
• Questionnaires to existing users.
System for a nursery and seeing how Information
• Observing how people use the system. Technology can help it run more efficiently.
• Reading existing manuals.
Developing an Information System
Developing an Information System
Feasibility study (2 of 2)
Analysis (3 of 3)
Address Telephone Membership • How will the data be entered into the
Name
Smith, Tony 12 Fields Rd No. No. system?
Jackson, Jake 9 Man Gdns 0543 3445545 001342 Developing an Information System
Timms, Tony 87 Colly 0563 9545752 001234
Fogett, Carol Row 0543 8653653 001789 Design - File Design
9 Shaw St 0563 9657564 001455
Developing an Information
System - Exercises
Developing an Information System
Information Representation
Information and Data
Information Representation
Information Representation
Decimal to Binary
Conversion Exercise:
Example: In a weighting 8 8
12 weights: 83 82
64 32 16 8 4 2 1 table: 1 0
8 position
3 2 1 0
1 0 0 0 1 0 1 0 number:
51 6
Hence: 128 + 8 + 2 = 138 value: 8 1
2 4
Information Representation
Codes - Representing
Characters (BCD)
Information Representation - Codes
Representing Numerical less bit available to represent the value of
Values - Unsigned integers the number, so the maximum size of the
number is reduced.
e.g. An unsigned 8 bit integer could go up
to 255 while the 7 bits of a signed integer
As you go from right to left in a binary could only go up to 128; the remaining bit
number each bit of 0 or 1 represents an of 0 or 1 must indicate the sign.
ascending power of 2. So a 4 bit number can
go up to a maximum of 1111 = 15 decimal, If we take 0 to represent a plus sign and a 1
an 8 bit number can go up to 11111111 = to represent a minus sign then 01111111 =
255, and a 16 bit number can go up to +128 while 11111111 = -128
65535. Any larger numbers than this would In this would
need 32 bits. Computers will have a limit as 00000111
system +7 be
to how many bits they can handle. would
and -7 10000111
be
So far we have only worked with whole
numbers that are also positive numbers. Adding we decim 10001110 binary = -14
We could call them Unsigned Integers. get 0 al, decimal!
This is not really satisfactory.
Information Representation - Codes
Information Representation - Codes
Signed integers are positive or negative A system which works better is where we
whole numbers. The first bit of the binary evaluate negative numbers by counting
representation of a signed integer is used down from zero to the negative number. So
to represent the sign (positive or negative) -1 decimal would be 11111111 (check this
of the number. This means that there is one by adding decimal 1 or binary 00000001 to
it). 24 23 22 21 20 2-1 2-2 2-3
Looking at some numbers above and below 16 8 4 2 1 1/2 1/4 1/8
zero using this system:
0 1 0 0 1 1 0 1
00000100 =4 in decimal 8+1+1/2+1/8 = 9+4/8+1/8 =
00000011 =3 9+5/8 or 9.625
00000010 =2
Note: It is beyond the scope of this course to cover
00000001 =1
real numbers in more detail.
00000000 =0
11111111 =-1
11111110 =-2 Information Representation
11111101 =-3
Computer Arithmetic
11111100 =-4
Now pairs of positive and negative numbers
of the same integer do add up to zero.
Negative numbers represented this way are Computers perform arithmetic functions
said to be in Two's complement form. working at the bit level (in a binary system).
Information Representation
Binary addition
Representing Numerical follows the same
Values - Real Numbers basic rules for
decimal addition,
except only 1 and 0
are the allowed
Real numbers are any number in the digits.
number system, including fractions of whole
numbers. They can either be represented Binary subtraction is
using fractional (fixed point binary) or more complicated as
floating point binary. it involves using two's
complement and
Example: binary addition.
A fixed point binary number
Information Representation Information Representation
The basic rules for binary addition are To perform a binary subtraction you first
shown below. have to represent the number to be
subtracted in its negative form. This is
0 1 1 known as its two's complement.
+0 +0 +1
0 1 10 The two's complement of a binary number is
obtained by:
(10 in binary = 2 in
decimal) 1. Replacing all the 1's with 0's and the
To add two bytes 0's with 1's. This is known as its one's
(two 8 bit numbers) complement.
the individual bits of 2. Adding 1 to this number by the rules
each byte are added of binary addition.
and any carry bits Now you have the two's complement.
generated are added
in the same way as a
carry operation in Example:
decimal arithmetic. The decimal subtraction 29 - 7 = 22 is the
same as adding (29) + (-7) = 22
Example: To add the decimal numbers 29
1. Convert the number to be subtracted
and 7 we convert them to binary and add
to its two's complement:
the bits following the rules above:
000001
29 00011101 (decimal 7)
11
+7 00000111 111110 (one's
00 complement)
36 00100100
+
000000 (add 1) 59
01
111110 (two's
01 complement)
60
0001110
29
1
+- 1111100
7 1
(1)00010
22
110
Information Representation -
Exercises
Networks
Types of Network -
Client/Server (1 of 2)
Client/server networks
consist of two kinds of
computer. The clients
are usually computer
workstations sitting on
the desks of employees
A network is a system that sends and in an organisation. The
receives data and messages enabling two or servers are usually
more computers to communicate with each more powerful
other. computers and are held
in a central location or can be accessed by another workstation.
locations within an
organisation. Peer-to peer networks are often much
simpler to set up than client/server
Networks networks. However, they lack some of the
Types of Network - advantages normally associated with
Client/Server (2 of 2) networks such as centrally managed
security and ease of backing up files.
Peer-to-peer networks would really only be
set up among a few computers within an
There are several types of servers, for office or single room.
example file servers which store and
Networks
distribute files and applications, and print
servers which control printers. Networks - Local Area and
Client/Server networks need client software Wide Area Networks
which is installed on the workstations and in
addition, they also need server software
such as Windows NT® Server or Novell
Netware®. A network contained within one building or
site is called a Local Area Network (LAN).
Anetwork that spans several sites across a
Networks city, country or even the world is called a
Types of Network - Peer-to- Wide Area Network (WAN).
peer A Client/Server network may be a LAN or
WAN, however a peer-to-peer network can
only be a LAN.
The most famous and widely used Wide
Peer-to-peer networks have workstations Area Network is the Internet which contains
connected to each other but do not have many thousands of servers and many
servers. millions of clients right across the world.
Files can be shared between workstations,
Networks
and a printer connected to one workstation
Networks - Servers server. The computer is thus a file server
and print server together.
A server is a computer Networks
that performs a service for Servers - File Servers
other computers on the
network.
A network may have
several types of servers. File servers store the files that are created
LANs and WANs have file by the network users. They also store
servers and print servers. applications such as word processing
The Internet has other programs, spreadsheets etc.
types of servers such as Users can access parts of a file server's
web servers and mail hard disk which will appear as an extra
servers. drive on their own computer. Applications
can either be run from the fileserver, or
Networks
they can be downloaded to the user's
Servers - Print Servers workstation.
In addition, the fileserver often runs the
network software which controls the
network.
Print servers control the printers on the
network. When a file is printed, the file is Networks
sent to the print server which assigns it to Networks - Security (1 of 2)
the printer that has been requested by the
user.
A print server may be a dedicated computer
or a user's workstation. It may also be a Most companies and organisations have
small control box or card that slots into the computer files that are critical to their
printer itself. business. The files may be technical
Alternatively the print server may actually specifications of products, customer
reside on the same computer as the file accounts etc. Military organisations and
industries will have files that are important When a workstation wishes
to the defence of the country. to send data, it uses the
This makes it vitally important to ensure client network software to
that the files are secure. enclose the data in a
'packet' containing a
Networks 'header' and a 'trailer'.
Networks - Security (2 of 2) The header and trailer contain information
for the destination computer. For example,
the header contains the address of the
destination computer.
Networks store their files centrally on a file The exact form the packets take is
server. This makes it much easier to determined by the protocol the network
maintain security than with a large number uses.
of stand-alone computers with the files
saved on their own hard disks. Networks
Networks
Physical Connections -
Fibre optic cables have a Electromagnetic Waves (1 of
thin strand of glass in the 2)
centre that carries the
light pulses.
Topology - Star (2 of 2)
Both ends of the backbone must be
terminated with resistive end connectors to
absorb the data packets and stop them
being reflected. The cables used in star topologies are either
A bus topology is easy to install but difficult shielded or unshielded twisted pair wires
to reconfigure. It should also be noted that (STP or UTP).
a fault along the bus will be difficult to Star topologies are difficult to install, but
locate and will affect the whole network. once installed are easy to maintain and
Networks expand. A fault in a cable only affects the
computer or node it is attached to and is
Topology - Star (1 of 2) easy to locate.
Networks
Topology - Ring
Technologies - FDDI
Token Ring networks work by passing a
special packet called a 'token' from one
computer to the next. When a computer
receives a token and wants to transmit FDDI (Fibre Distributed Data Interface) uses
data, it keeps the token and sends a data fibre optic cable in a physical dual ring
packet. topology.
The packet travels in turn to each computer It is intended for large organisations with
which re-transmits the packet. When the large traffic and high speed requirements.
computer to which the packet is addressed Packets travel in opposite directions along
receives the packet, it copies the data and the two rings so that a fault in one ring will
re-transmits the packet with a 'received' not bring down the network.
notification. Like Token Ring, FDDI uses a token passing
Networks system to prevent collisions.
Technologies - Token Ring (3 Networks
of 3) Technologies - ATM
(Asynchronous Transfer
Mode)
different standards which allow computers
ATM is an emerging to communicate with each other.
technology and has been A protocol defines how computers identify
designed for the each other, the form the data packets
international should take, and how data is processed
telecommunications once it reaches its destination.
industry.
Networks
It provides a way of
linking a wide range of Networks - Protocols (2 of 2)
devices such as
telephones and computers
into one seamless
network and removes the Common protocols are:
distinction between LANs from Novell
IPX
and WANs. Netware®
ATM is very fast, with NetBios/NetB from Windows
speeds up to several EUI® NT®
Gigabits per second, and
is used for transmitting TCP/IP from Unix
video and sound. The network protocols operate through the
network cables, therefore the above
protocols and others can operate through
Ethernet or Token Ring networks.
Networks
Networks - Protocols (1 of 2)
Networks
Networks - Internet (1 of 4)
Network protocols can be likened to
languages which have structures and rules.
Different protocols will therefore have
The Internet has become so ingrained in
today's world that people forget it has
really only come about in the last few years.
The Internet started as an American Any company or individual can set up a Web
defence project in the 1970s to try and Server to distribute material ranging from
make the military computer network atomic physics to the latest ski conditions in
infrastructure resistant to a Russian nuclear the Alps.
attack. The main purposes of the Internet are to
allow people to search for and obtain
Networks
information on any number of subjects via
Networks - Internet (2 of 4) the World Wide Web and to send and
receive electronic mail.
Networks
Networks - Intranet
Networks
Networks - Internet (3 of 4)
Recently it was realised that Internet Other Network Elements -
technology could be harnessed within a Repeaters
company or organisation, allowing network
users to use web browsers to access
company information.
The 'Intranet' was thus born. Because a signal on a wire degrades after
some distance, a repeater captures the
The advantages are obvious: technical signal and rebuilds it. It then transmits the
information, manuals, etc. can be placed on rebuilt signal.
an internal web server to be accessed by A repeater can therefore extend the length
employees within the company. It is of a network.
probable that within the next few years
most organisations will have Intranets in The central hub in a star network is an
place of, or in addition to, the more example of a repeater.
traditional networks. Networks
Networks Other Network Elements -
Networks - Other Network Bridges (1 of 2)
Elements
Networks
Whereas a bridge
filters out packets
according to their • Files can be stored on a central
physical address, computer (the file server) allowing
routers filter out data to be shared throughout an
traffic according to organisation.
their protocols.
• Files can be backed up more easily
As an example, an Ethernet network with when they are all on a central
TCP/IP and IPX protocols on it can have a
given the opportunity to try the quiz again once you
fileserver rather than when they are have finished all the questions.
scattered across a number of
1 Give a definition of a network
independent workstations.
. Top of Form
established, ensuring that the network A system to allow the user to make
users may only have access to certain requests for information from the
files and applications. central computer
Networks An organised way of storing
information about a set of similar
Networks - Advantages (2 of things
2)
A system that receives data and
messages enabling two or more
computers to communicate
Networks - Exercises
Internet Internet
Telephone line
Bottom of Form
Internet - Exercises