Prof Abdul quadir md (SCSE

)

Basic Structure of Computers

Functional Units

Arithmetic
Input and
logic

Memory

Output Control

I/O Processor

Figure 1.1. Basic functional units of a computer.

Information Handled by a Computer
• Instructions/machine instructions
 Govern the transfer of information within a computer as well
as between the computer and its I/O devices
 Specify the arithmetic and logic operations to be performed
 Program
• Data
 Used as operands by the instructions
 Source program
• Encoded in binary code – 0 and 1

main memory  Secondary storage – larger and cheaper . Memory Unit • Store programs and data • Two classes of storage  Primary storage  Fast  Programs must be stored in memory while they are being executed  Large number of semiconductor storage cells  Processed in words  Address  RAM and memory access time  Memory hierarchy – cache.

• Registers • Fast control of ALU . Arithmetic and Logic Unit (ALU) • Most computer operations are executed in ALU of the processor. • Load the operands into memory – bring them to the processor – perform operation in ALU – store the result back to memory or retain in the processor.

Control Unit • All computer operations are controlled by the control unit. • The timing signals that govern the I/O transfers are also generated by the control unit. under program control. • Operations of a computer:  Accept information in the form of programs and data through an input unit and store it in the memory  Fetch the information stored in the memory. into an ALU. where the information is processed  Output the processed information through an output unit  Control all activities inside the machine through a control unit . • Control unit is usually distributed throughout the machine instead of standing alone.

000000001 sec.024 bytes ~ 1 thousand – Megabyte(MB) = 220 = 1. Memory Size / Speed • Typical memory in a personal computer (PC): – 64MB .256MB • Memory sizes: – Kilobyte (KB) = 210 = 1.073.048.741.824 bytes ~ 1 billion • Memory Access Time (read from/ write to memory) – 50-75 nanoseconds (1 nsec.576 bytes ~ 1 million – Gigabyte (GB) = 230 = 1.) • RAM is – volatile (can only store when power is on) – relatively expensive CMPUT101 Introduction to (c) Yngvi Bjornsson 8 Computing . = 0.

.

on the other hand.  Computer software. Software is a set of instructions for a computer to perform specific operation .  Computer hardware is the collection of all the parts you can physically touch. hardware and software.  A computer system consists of two major elements: hardware and software. is not something you can touch.

Software • “A set of instructions given to the computer to solve a problem is called Software.” • “Software is a single/collection of programs that performs a particular task. M. • Different software's are used to solve different problems.” • Software is also called Program. Hammad Waseem 11 .

Types Of Software • There are two types of software on the basis of their functionality: – System Software – Application Software M. Hammad Waseem 12 .

• It is also known as application package. Application Software • Application Software includes programs that do real work for user. • Application software is used to perform various applications on the computer. M. Hammad Waseem 13 . • Application Software is created to perform specific tasks for a user.

Hammad Waseem 14 . Examples – Microsoft Word – Microsoft Excel – Lotus 123 – Photoshop etc M.

Hammad Waseem 15 . M. lease . Custom software • Custom software (also known as bespoke software or tailor made software's) is software that is specially developed for some specific organization or other user. Packaged Software • Packaged Software is a Software that is ready-made and available for sale. or license to the general public.

M. • It consists of the basic operations as follows: – Saving data on disk – Making computer to work for us – Printing a document etc. Hammad Waseem 16 . • It enables application programs to execute properly. System Software • System Software is set of programs to control and manage the operations of a computer hardware.

Examples • Examples of System Software's are: – Operating Systems – Utility Programs – Device Drivers M. Hammad Waseem 17 .

Operating System (OS)
• An operating system (OS) is a collection
of software that manages computer
hardware resources and provides
common services for computer
programs.
• The operating system is a vital component of
the system software in a computer system.
• Application programs usually require an
operating system to function.
M. Hammad Waseem 18

Device Driver
• A Device Driver is a computer
program that operates or controls a
particular type of device that is attached to
a computer.
– Like printers

M. Hammad Waseem 19

RAM versus ROM comparison chart
RAM ROM
Random Access Memory or RAM is a Read-only memory or ROM is also a
form of data storage that can be form of data storage that can not be
accessed randomly at any time, in any easily altered or reprogrammed.Stores
order and from any physical location., instuctions that are not nescesary for
allowing quick access and re-booting up to make the computer
manipulation. operate when it is switched off.They
are hardwired.

Random Access Memory Read-only memory

RAM allows the computer to ROM stores the program required to
read data quickly to run applications. It initially boot the computer. It only
allows reading and writing. allows reading.

RAM is volatile i.e. its contents are lost It is non-volatile i.e. its contents are
when the device is powered off. retained even when the device is
powered off.
The two main types of RAM are static The types of ROM include PROM,
RAM and dynamic RAM. EPROM and EEPROM.

. Compiler Interpreter Compiler Interpreter 1 Takes Entire program as Takes Single instruction input as input .

In short OS is the computer’s master control program. Types of operating system: Operating system can be organized into four types. They are build into the circuitry of a device and are not loaded from a disk drive. Single-user/single-tasking operating system 3. relatively small OS. 1. A real time OS is needed to run real time application .USING OPERATING SYSTEM: The OS is an example of system software. Real-time operating system 2. Multi-user/multitasking operating system 1. Real-time operating system A real time operating system is a very fast.software that controls the system’s hardware and that interacts with the user and application software. Single-user/multitasking operating system 4. The OS provides you with the tool that enables you to Interact with the PC.

OS can only manage a single task at a time. machinery. The disadvantages of Single-user/multitasking operating system is the increased size. 2. life support system. . scientific instruments.Real time application are needed to run medical diagnostics equipment. Single-user/single-tasking operating system: An operating system that allows a single user to perform just one task at a time is a single-user/single-tasking operating system. complexity to support multitasking. MS-DOS is one example of a single tasking OS. and industrial systems. Single-user/multitasking operating system: A Single-user/multitasking operating system is one that allows a Single user to perform two or more functions at once. The multi- tasking features of these OSs have greatly increased the productivity of people in the large variety of jobs because they can accomplish in less time. 3.

Multi-user/multitasking operating system:  A Multi-user/multitasking operating system is an operating system that allows multiple users to use programs that are simultaneously running on a single network server. In a Multi-user/multitasking operating system environment. all or most of the computing occurs at the server. and mainframe operating system such as MVS. the user can not do any work in the application of server. A disadvantages is that if the network connection to the server is Broken. The advantage of these operating system is that they can be managed by simply making changes to one server rather than to many desktop computer. .4.UNIX. Ex. VMS.

000.000.Size and Time Units for Computers Unit Amount of Memory Byte 8 bits Kilobyte (kB) 1.000 (1012) bytes * This number is an approximation.000. 3-26 . 2000 by Prentice Hall.000 (106) bytes Gigabyte (GB) 1.000 (109) bytes Terrabyte 1. The exact value is 1.000.024 bytes.000.000.000 (103) bytes* Megabyte (MB) 1.

3-27 .The Five Computer Components The central processor Secondary storage Input devices Output devices Communication devices 2000 by Prentice Hall.

The Central Processor • The central processor consists of two parts – The central processing unit (CPU) • Arithmetic-log unit (ALU) • The control unit – Primary storage • Random access memory (RAM) • Read-only memory (ROM) • Cache memory 2000 by Prentice Hall. 3-28 .

3-29 . Secondary Storage • There are two main types of secondary storage – Sequential • Magnetic tape – Direct access • Magnetic disks • Redundant array of independent disks (RAID) • CD-ROM • Digital Versatile Disk (DVD) 2000 by Prentice Hall.

Input Devices • Input devices are the devices through which a computer accepts data – Touch screens – Voice-recognition systems – Optical character reader (OCR) 2000 by Prentice Hall. 3-30 .

Output Devices

• An output device is any device that helps
the user to view the output of the
computer
– Computer screen (video display terminal)
– Printers

2000 by Prentice Hall. 3-31

Features of the Three Types of Printers

Type of Printer Features

Dot Matrix Cheapest type of printer. Uses pins to press on a
ribbon to make characters. Noisiest type of printer.
Higher-quality output than the dot matrix. Uses a
Inkjet nozzle to spray ink onto a page. Produces about 2 to 8
ppm. Can print documents in color. Quieter than a dot
matrix printer, but more expensive to operate.
Highest-quality output, comparable to magazine
output. Quietest printer. Typically the most expensive
Laser printer. Produces 4 to 16 ppm or more.

2000 by Prentice Hall. 3-32

Communication Devices

• Devices that allow users separated by
distance and time to exchange
documents, files, graphics, and other
digital information.

2000 by Prentice Hall. 3-33

Computers That Support Different Work-
group Sizes

Personal Information Enterprise-wide
Work-group Systems
Systems Systems

• PCs
• Midrange or
• Laptops/Notebooks • Supercomputers
Minicomputers
• Hand-held Computers • Mainframes
• Workstations
• Pen-based Computers

2000 by Prentice Hall. 3-34

3-35 . Supercomputers • Some of the fastest and largest computers available today are supercomputers • Supercomputers have two common characteristics – The ability to process instructions in parallel (parallel processing) – The ability to automatically recover from failures (fault tolerance) 2000 by Prentice Hall.

financial applications. 3-36 . operate. and maintain 2000 by Prentice Hall. investment analysis. payroll. and other applications that require extensive computations • Many users can simultaneously use the mainframe • One large disadvantage of the mainframe is that it is expensive to purchase. Mainframes • Mainframes are frequently enterprise-wide systems and are ideal for transaction processing.

Midrange. they are workhorses that can deliver excellent “bang for the buck” • Workstations lie somewhere between midrange and personal computers – They can be used by individuals or groups – They are faster and more sophisticated than PCs – They include numerous productivity tools that increase efficiency 2000 by Prentice Hall. and Workstations • Although midrange computers are slower and often have less memory than mainframes. 3-37 .or Minicomputers.

3-38 . such as data entry. and assembly line work • Network computers function by downloading all applications from a central computer and obtaining and storing all data back on the central computer • Network computers can offer cost efficiencies. also known as “thin clients” is a simplified version of a personal computer – They are used mainly to access programs that reside on a company’s network or on the Internet • Network computers are well suited for task-oriented jobs. but they rely heavily on network traffic and can cause bottlenecks 2000 by Prentice Hall. Network Computers • The network computer. order entry.

Microcomputers or Personal Computers (PCs) • The memory size and processing capabilities of microcomputers are less than mainframes and midrange computers • However. hardware technology advances have made the PC a compact and powerful machine • A PC can be configured to meet the specific needs of users 2000 by Prentice Hall. 3-39 .

3-40 . Handheld. Notebooks. and Pen-based • These computers are battery operated so they can be used anytime. anywhere • The portability of notebook and handheld computers has increased the productivity of many employees 2000 by Prentice Hall. Mobile Computers: Laptops.

3-41 . Can download text. Often. A Comparison of Types of Mobile Computers Type Description Laptop Fits on a user’s lap and is slightly larger than a notebook. Has a floppy drive. 2000 by Prentice Hall. Smaller than a laptop or notebook computer. Has full PC functionality with a reduced keypad and screen. and other applications from PCs and transmit Wrist data via infrared rays. the keyboard requires an electronic pen to input data. Uses an electronic writing pad and a light-sensitive electronic pen to Pen-based input data. photos. users input information on the LCD watch face that turns into a small keyboard. Has full PC functionality with a reduced keypad and screen and no floppy Notebook drive. Has a built-in monitor that Handheld can be operated from the palm of one’s hand so the keyboard and screen are smaller than a laptop.

Six Technical Considerations in Buying a PC Clock Monitors Speed Processor RAM Expansion Secondary Slots Storage 2000 by Prentice Hall. 3-42 .

don’t fix it” does not apply to hardware capacity and reliability 2000 by Prentice Hall. 3-43 .Business Guidelines for Hardware Success • Cost Is Only Part of the Story – Many benefits resulting from information systems are intangible and tough to measure • increased productivity • improved decision making • faster customer service • Don’t Compromise on Capacity and Reliability – The motto “If it ain’t broke.

goes on . Binary number systems • 2 1.16 8 4 2 1.8 4 2 1.4 2 1.

.

 Connection can be through a copper wire. . microwaves. fiber optics. infrared or satellite.  Two computers are set to be interconnected if they are able to exchange information.What is a Computer Network?  Collection of autonomous computers interconnected by a single technology is called computer network.

CATEGORIES OF NETWORKS .

Lower limit: 1 km  Twisted pair cable or Co-axial cable connects the plug in cards to form a network.  Upper limit: 10 km .  Data transferred in High speed which ranges from 100 Mbps to gigabit for system development and have a low implementation cost. campus etc.  Designed to share resources between PCs and workstation such as hardware or data. . Single room. A Local Area Network (LAN) is a collection of networking equipment located geographically close together. E.g.

A work to internet connections would most likely require broadcast network (LAN) with a connection to the internet (packet switched network) .

.

• Increased information exchange between different departments in an organization.• Cost reductions through sharing of information and databases. • Networks are difficult to set up and need to be maintained by skilled technicians. rather than just one user in the case of a stand-alone machine. or between individuals. . • If the file server develops a serious fault. resources and network services. • Special security measures are needed to stop users from using programs and data that they should not have access to. • The trend to automate communication and manufacturing process. all the users are affected.

 There are three topologies of LAN Network Ring Topology Bus Topology LAN Topologies Star Topology .

.

.

 A MAN uses distributed queue dual bus. The metropolitan area network (MAN) is designed to extend over an entire city.  It may be a single network such as cable television network available in many cities. Bus A MAN Bus B .  Range: Within 100 km (a city).

 The dual bus used in MAN helps the transmission of data in both  It is difficult to make the system direction simultaneously. secure from hackers and  A Man usually encompasses industrial espionage (spying) several blocks of a city or an graphical regions. It provides a good back bone for  More cable required for a MAN a large network and provides connection from one place to greater access to WANs. entire city. another. .

• Network that provides long distance transmission of data. • Range: Beyond 100 km. . a continent. voice. image and video information over large geographical areas that may comprise a country.

The bigger the connecting workstations. This avoids problems where some users may have older information than others. •Everyone on the network can use the same data. maintaining a network is a anyone else on the network. . network the more expensive it is. •Security is a real issue when many •Expensive things (such as printers or different people have the ability to use phone lines to the internet) can be shared information from other computers. by all the computers on the network Protection against hackers and viruses adds without having to buy a different peripheral more complexity and expense. These full-time job which requires network messages can have pictures. or supervisors and technicians to be data included with them (called employed. sounds.•Covers a large geographical area so long •Need a good firewall to restrict outsiders distance businesses can connect on the from entering and disrupting the network one network. •Messages can be sent very quickly to •Once set up. attachments). for each computer. •Setting up a network can be an expensive. •Shares software and resources with slow and complicated.

.

•ISDN ( Integrated service digital network) 2 types Basic rate interface Primary rate interface •Frame relay •Switched multimegabit data service (SMDS) •Synchronous optical network (SONET) •High data link controlled (HDLC) •Synchronous Data Link Control (SDLC) .

.

SMDS network (ARCNET). radio. 100kbps to Optimized for a large Long distance 100mbps geographical area than LAN. FDDI. Cost cheaper costly expensive Equipment NIC. Range is Beyond 100 10 km Range is100 km km Media Used Uses guided media Uses guided as well as Uses unguided media unguided media Speed A high speed i. BASIS LAN MAN WAN Full Form Local Area Network Metropolitan Area Network Wide Area Network Range A communication network This network shares the A communication network linking a number of stations in characteristics of packet distinguished from a Local Area same local area. infra-red needed laser protocols Attached Resource computer Frame relay and ATM. communications. which may or may not be provided by public packet network. switch and hub Modem and router Microwave. Network. Range is 1 to broadcasting networks. Token ring asynchronous transfer mode(ATM) .e.

• . Routers • Routers are small electronic devices that join multiple computer networks together via either wired or wireless connections.

Router .

.

• . the signal is much simpler and doesn't require the analog-to- digital conversion. the modem converts data between analog and digital formats in real time for two-way network communication. modem • A modem is a hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection. • In the case of the high-speed digital modems popular today. which was once the most popular way to access the internet. • In the case of transmission over an analog telephone line.

.

hub • Hub is the most basic networking device that connects multiplecomputers or other network devices together .

hub .

switch
• A network switch (also called switching hub, bridging hub,
officially MAC bridge) is a computer networking device that
connects devices together on a computernetwork by using
packet switching to receive, process, and forward data to the
destination device.

Internet
• It is a worldwide/global system of
interconnected computer networks. It uses the
standard Internet Protocol (TCP/IP). Every computer
in Internet is identified by a unique IP address. IP
Address is a unique set of numbers (such as
110.22.33.114) which identifies a computer’s
location.
• A special computer DNS (Domain Name Server) is
used to provide a name to the IP Address so that
the user can locate a computer by a name. For
example, a DNS server will resolve a
name https://www.google.com to a particular IP
address to uniquely identify the computer on which
this website is hosted

Intranet • Intranet is the system in which multiple PCs are connected to each other. PCs in intranet are not available to the world outside the intranet. . Usually each organization has its own Intranet network and members/employees of that organization can access the computers in their intranet.

.

all versions of Microsoft Windows utilize a GUI.  For example. Douglas Engelbart. rather than using only text via the command line. GUI  Graphical User Interface. Later. on January 19. . whereas MS-DOS does not. Apple introduced the Lisa computer.  Below is a picture of the Windows 7 Desktop and an example of a GUI. the first commercially available computer. and a group of other researchers in 1981. a GUI (pronounced as either G-U-I or gooey) allows the use of icons or other visual indicators to interact with electronic devices. 1983.  The GUI was first developed at Xerox PARC by Alan Kay.

.

. deleting. and moving files. the keyboard can also be utilized by using keyboard shortcuts or arrow keys. such as opening. How does a GUI work? • A GUI uses windows. and menus to carry out commands. icons. • Although many GUI operating systems are navigated through the use of a mouse.

• Because of their ease of use. like Unix or MS-DOS. What are the benefits of GUI? • Unlike a command line operating system or CUI. . GUI operating systems have become the dominant operating system used by today's end-users. • GUI operating systems are much easier to learn and use because commands do not need to be memorized. users do not need to know any programming languages. • Additionally.

What are examples of a GUI operating system? • Microsoft Windows • Apple System 7 and macOS • Chrome OS • Linux variants like Ubuntu • How does the user interact with a GUI? • Typically the user uses a pointing device such as the mouse to interact and use most aspects of the GUI. it is also possible to interact with a GUI using a keyboard or other input device. . However.

e. Word.• Are all operating systems GUI? • No.e. Outlook) • Internet browser (i. Chrome. • What are examples of a GUI interface? • GNOME • KDE • Any Microsoft program (i. Internet Explorer. Early command line operating systems like MS- DOS and even some versions of Linuxtoday have no GUI interface. Excel. Firefox) .

.

.

.

Windows XP • Multitasking . Unix.An operating system capable of supporting and utilizing more than one computer processor. Windows XP . See the multi-user definition for a complete definition. Examples of operating systems that would fall into this category are: • Linux. Examples of operating systems that would fall into this category are: • Linux. Examples of operating systems that would fall into this category are: • Linux. Windows 8 • Multithreading .• Multi-user . Examples of operating systems that would fall into this category are: • Linux.Operating systems that allow different parts of a software program to run concurrently.A multi-user operating system allows for multiple users to use the same computer at the same time and different times.An operating system that is capable of allowing multiple software processes to run at the same time. Unix. Unix. Unix. Windows 2000 • Multiprocessing .

Memory hirerachy .

floating-point) • File access pointer(s) • Memory (perhaps?) . the operating system saves the state of the active process and restores the state of the new process. Context switching • When an event occurs. • This mechanism is called a Context Switch. • What must get saved? Everything that the next process could or will damage. For example: • Program counter (PC) • Program status word (PSW) • CPU registers (general purpose.

– the data on which the program will execute. • The components of a process are: – the program to be executed. . – the resources required by the program—such as memory and file(s)—and – the status of the execution. Process • A process is a program in execution.

Mainframe Systems • Reduce setup time by batching similar jobs • Automatic job sequencing – automatically transfers control from one job to another. First rudimentary operating system. • Resident monitor – initial control in monitor – control transfers to job – when job completes control transfers pack to monitor CS1252-OPERATING SYSTEM UNIT I 89 .

Memory Layout for a Simple Batch System CS1252-OPERATING SYSTEM UNIT I 90 .

CS1252-OPERATING SYSTEM UNIT I 91 .programmed Batch Systems Several jobs are kept in main memory at the same time.Multi . and the CPU is multiplexed among them.

.

• CPU scheduling – the system must choose among several jobs ready to run. • Allocation of devices. • Memory management – the system must allocate the memory to several jobs. OS Features Needed for Multiprogramming • I/O routine supplied by the system. CS1252-OPERATING SYSTEM UNIT I 93 .

• On-line communication between the user and the system is provided. it seeks the next “control statement” from the user’s keyboard. Time-Sharing Systems–Interactive Computing • The CPU is multiplexed among several jobs that are kept in memory and on disk (the CPU is allocated to a job only if the job is in memory). when the operating system finishes the execution of one command. CS1252-OPERATING SYSTEM UNIT I 94 . • On-line system must be available for users to access data and code. • A job swapped in and out of memory to the disk.

.

small printers. • Can adopt technology developed for larger operating system’ often individuals have sole use of computer and do not need advanced CPU utilization of protection features. display screens. Linux) CS1252-OPERATING SYSTEM UNIT I 96 . MacOS. Desktop Systems • Personal computers – computer system dedicated to a single user. UNIX. • I/O devices – keyboards. • May run several different types of operating systems (Windows. mice. • User convenience and responsiveness.

Parallel Systems
• Multiprocessor systems with more than on CPU
in close communication.
• Tightly coupled system – processors share
memory and a clock; communication usually
takes place through the shared memory.
• Advantages of parallel system:
– Increased throughput
– Economical
– Increased reliability
• graceful degradation
• fail-soft systems

CS1252-OPERATING SYSTEM UNIT I
97

Parallel Systems (Cont.)
• Symmetric multiprocessing (SMP)
– Each processor runs and identical copy of the
operating system.
– Many processes can run at once without
performance deterioration.
– Most modern operating systems support SMP
• Asymmetric multiprocessing
– Each processor is assigned a specific task; master
processor schedules and allocated work to slave
processors.
– More common in extremely large systems

CS1252-OPERATING SYSTEM UNIT I
98

Symmetric Multiprocessing Architecture

CS1252-OPERATING SYSTEM UNIT I
99

Server
• A server is a computer program that provides
services to other computer programs (and
their users) in the same or other computers.

• The computer that a server program runs in is
also frequently referred to as a server. That
machine may be a dedicated server or used
for other purposes as well.

is a computer program that serves requested HTML pages or files. • A Web server. for example. • The Web browser in your computer is a client that requests HTML files from Web servers. . • A Web client is the requesting program associated with the user. Server • Servers are often categorized in terms of their purpose.

.

• Advantages of distributed systems. – Resources Sharing – Computation speed up – load sharing – Reliability – Communications CS1252-OPERATING SYSTEM UNIT I 103 . processors communicate with one another through various communications lines. such as high-speed buses or telephone lines. Distributed Systems • Distribute the computation among several physical processors. • Loosely coupled system – each processor has its own local memory.

.

Distributed Systems (cont) • Requires networking infrastructure. CS1252-OPERATING SYSTEM UNIT I 105 . • Local area networks (LAN) or Wide area networks (WAN) • May be either client-server or peer-to- peer systems.

both communicating over a computer network or on the same computer. client systems and server systems. Client server systems • Client-server is a software architecture model consisting of two parts. • A client server application is a distributed system made up of both client and server software. .

.

General Structure of Client-Server CS1252-OPERATING SYSTEM UNIT I 108 .

• Provides high reliability. Clustered Systems • Clustering allows two or more systems to share storage. • Symmetric clustering: all N hosts are running the application. . • Asymmetric clustering: one server runs the application while other servers standby.

.

industrial control systems. • Often used as a control device in a dedicated application such as controlling scientific experiments. and some display systems. . medical imaging systems. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter increments of time. typically without buffer delays. • Real-Time systems may be either hard or soft real-time. Real-Time Systems • A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in. • Well-defined fixed-time constraints.

.

What is HTML? • HTML is the standard markup language for creating Web pages. but use them to render the content of the page . "table". "paragraph". • HTML stands for Hyper Text Markup Language • HTML describes the structure of Web pages using markup • HTML elements are the building blocks of HTML pages • HTML elements are represented by tags • HTML tags label pieces of content such as "heading". and so on • Browsers do not display the HTML tags.

A Simple HTML Document • Example • <!DOCTYPE html> <html> <head> <title>Page Title</title> </head> <body> <h1>My First Heading</h1> <p>My first paragraph.</p> </body> </html> .

Example Explained • The <!DOCTYPE html> declaration defines this document to be HTML5 • The <html> element is the root element of an HTML page • The <head> element contains meta information about the document • The <title> element specifies a title for the document • The <body> element contains the visible page content • The <h1> element defines a large heading • The <p> element defines a paragraph .

HTML Tags • HTML tags are element names surrounded by angle brackets: • <tagname>content goes here.</tagname> • HTML tags normally come in pairs like <p> and </p> • The first tag in a pair is the start tag. the second tag is the end tag • The end tag is written like the start tag.. but with a forward slash inserted before the tag name ..

Firefox. Safari) is to read HTML documents and display them. IE. Web Browsers • The purpose of a web browser (Chrome. but uses them to determine how to display the document: . • The browser does not display the HTML tags.

.

HTML Page Structure • Below is a visualization of an HTML page structure:Note: Only the content inside the <body> section (the white area above) is displayed in a browser. • .

• The <!DOCTYPE> declaration is not case sensitive. • It must only appear once. and helps browsers to display web pages correctly. • The <!DOCTYPE> declaration for HTML5 is: • <!DOCTYPE html> . The <!DOCTYPE> Declaration • The <!DOCTYPE> declaration represents the document type. at the top of the page (before any HTML tags).

there have been many versions of HTML: HTML 3. Version Year HTML 1991 HTML Versions HTML 2.2 1997 HTML 4.01 1999 XHTML 2000 HTML5 2014 .0 1995 Since the early days of the web.

Write HTML Using Notepad or TextEdit • Web pages can be created and modified by using professional HTML editors. . • However. • We believe using a simple text editor is a good way to learn HTML. • Follow the four steps below to create your first web page with Notepad or TextEdit. for learning HTML we recommend a simple text editor like Notepad (PC) or TextEdit (Mac).

• Windows 7 or earlier: • Open Start > Programs > Accessories > Notepad . Type Notepad. Step 1: Open Notepad (PC) • Windows 8 or later: • Open the Start Screen (the window symbol at the bottom left on your screen).

• <!DOCTYPE html> <html> <body> <h1>My First Heading</h1> <p>My first paragraph.</p> </body> </html> . Step 2: Write Some HTML • Write or copy some HTML into Notepad.

.

There is no difference.html as file extension. • Name the file "index. Select File > Save as in the Notepad menu.htm or . • You can use either .htm" and set the encoding to UTF-8 (which is the preferred encoding for HTML files). • . Step 3: Save the HTML Page • Save the file on your computer. it is up to you.

Step 4: View the HTML Page in Your Browser • Open the saved HTML file in your favorite browser (double click on the file. or right-click .and choose "Open with"). • The result will look much like this: .

• <h1> defines the most important heading. <h6> defines the least important heading: . HTML Headings • HTML headings are defined with the <h1> to <h6> tags.

• <!DOCTYPE html> • <html> • <body> • <h1>This is heading 1</h1> • <h2>This is heading 2</h2> • <h3>This is heading 3</h3> • <h4>This is heading 4</h4> • <h5>This is heading 5</h5> • <h6>This is heading 6</h6> • </body> • </html> .

</p> • <p>This is another paragraph.• HTML Paragraphs • HTML paragraphs are defined with the <p> tag: • <!DOCTYPE html> • <html> • <body> • <p>This is a paragraph.</p> • </body> • </html> .

w3schools.com">This is a link</a> • </body> • </html> .• HTML Links • HTML links are defined with the <a> tag: • <!DOCTYPE html> • <html> • <body> • <a href="https://www.

width. • The source file (src). and height are provided as attributes: • <!DOCTYPE html> • <html> • <body> • <img src="w3schools.com" width="104" height="142"> • </body> • </html> .jpg" alt="W3Schools.• HTML Images • HTML images are defined with the <img> tag. alternative text (alt).

The value of the title attribute will be displayed as a tooltip when you mouse over the paragraph: .• The title Attribute • Here. a title attribute is added to the <p> element.

to display the title attribute as a tooltip.• <!DOCTYPE html> • <html> • <body> • <h2>The title attribute</h2> • <p title="I'm a tooltip"> • Mouse over this paragraph. • </p> • </body> • </html> .

• HTML Horizontal Rules • The <hr> tag defines a thematic break in an HTML page. • The <hr> element is used to separate content (or define a change) in an HTML page: . and is most often displayed as a horizontal rule.

</p> • <hr> • <h2>This is heading 2</h2> • <p>This is some other text.</p> • </body> • </html> .• <!DOCTYPE html> • <html> • <body> • <h1>This is heading 1</h1> • <p>This is some text.</p> • <hr> • <h2>This is heading 2</h2> • <p>This is some other text.

and choose "Inspect" or "Inspect Element" to see what elements are made up of (you will see both the HTML and the CSS). or similar in other browsers. You can also edit the HTML or CSS on-the-fly in the Elements or Styles panel that opens. . right-click in the page and select "View Page Source" (in Chrome) or "View Source" (in IE). This will open a window containing the HTML source code of the page.• How to View HTML Source? • Have you ever seen a Web page and wondered "Hey! How did they do that?" • View HTML Source Code: • To find out. • Inspect an HTML Element: • Right-click on an element (or a blank area).

HTML Style • <!DOCTYPE html> • <html> • <body> • <p>I am normal</p> • <p style="color:red.">I am big</p> • </body> • </html> .">I am blue</p> • <p style="font-size:36px.">I am red</p> • <p style="color:blue.

HTML Style • <!DOCTYPE html> • <html> • <body style="background-color:powderblue.</p> • </body> • </html> ."> • <h1>This is a heading</h1> • <p>This is a paragraph.

">This is a heading</h1> • <p style="color:red.• HTML Text Color • The color property defines the text color for an HTML element: • <!DOCTYPE html> • <html> • <body> • <h1 style="color:blue.">This is a paragraph.</p> • </body> • </html> .

• HTML Fonts • The font-family property defines the font to be used for an HTML element: • <!DOCTYPE html> • <html> • <body> • <h1 style="font-size:300%.</p> • </body> • </html> • .">This is a heading</h1> • <p style="font-size:160%.">This is a paragraph.

• HTML Text Alignment • The text-align property defines the horizontal text alignment for an HTML element: • <!DOCTYPE html> • <html> • <body> • <h1 style="text-align:center.">Centered Heading</h1> • <p style="text-align:center.">Centered paragraph.</p> • </body> • </html> • .

• More so because the term CLOUD is intriguing and some people even wonder how do clouds that rain can even remotely be used in Computing. . and many are curious to know what cloud computing is and how it works. Cloud Computing • Cloud computing is currently the buzzword in IT industry.

Storage OS software) a service over a network (usually on the internet) rather than physically having the computing resources at the customer location. Google Cloud . What is Cloud Computing? • Cloud Computing can be defined as delivering computing power( CPU. • Example: AWS. RAM. Azure. Network Speeds.

.

.

.

.

.

• Not all businesses can afford high cost of in-house IT infrastructure and back up support services. • Large and small scale businesses today thrive on their data & they spent a huge amount of money to maintain this data. Why Cloud Computing? • With increase in computer and Mobile user’s. • Perhaps its efficiency in storing data. data storage has become a priority in all fields. • For them Cloud Computing is a cheaper solution. It requires a strong IT support and a storage hub. computation and less maintenance cost has succeeded to attract even bigger businesses as well .

.

.

.

.

.

.

.

.

.

.

.

.

.

.

Characteristic of Cloud Computing • Lower IT infrastructure and computer costs for users • Improved performance • Fewer Maintenance issues • Instant software updates • Improved compatibility between Operating systems • Backup and recovery • Performance and Scalability • Increased storage capacity • Increase data safety .

Types of Clouds .

computing resources are provided for a community and organizations. computing resources are deployed for one particular organization. governed and operated by government.• Private Cloud: Here. an academic or business organization. • Community Cloud: Here.B2B (Business to Business) private cloud or B2C ( Business to Consumer) public . Here the computing resource is owned. • Public Cloud: This type of cloud is used usually for B2C (Business to Consumer) type interactions. owned and operated by the same organization. This method is more used for intra-business interactions. • Hybrid Cloud: This type of cloud can be used for both type of interactions . . This deployment method is called hybrid cloud as the computing resources are bound together by different clouds. Where the computing resources can be governed.

.

.

What is Cloud Computing Architecture? .

. • It comprise of interfaces and applications that are required to access the cloud computing platform. • Front end consist client part of cloud computing system. Cloud Computing Architecture • Cloud computing comprises of two components front end and back end.

It is under providers control. it comprises of the resources that are required for cloud computing services. servers. security mechanism etc. Cloud Computing Architecture • While back end refers to the cloud itself. . data storage. • It consists of virtual machines.

. while another important component is algorithm for resource allocation. • The user disk space is allocated on the distributed file system. • Data is never stored in one place only and in case one unit fails the other will take over automatically. Cloud Computing Architecture • Cloud computing distributes the file system that spreads over multiple hard disks and machines.

a program like Deep Fritz. will be able to defeat the best chess players in the world. Kasparov easily defeated the machine in a two game match. running on virtually any cheap laptop computer. • In 1989. lost a match against a German software program called Deep Fritz. • In 1996. • Since then. This represented the first time that a machine had defeated the top human chess player. in the near future. Can a Computer Do a Lawyer's Job? • IF ROBOTS CAN PLAY CHESS. Vladimir Kramnik. Again Kasparov defeated the computer.. While IBM's Deep Blue was a completely custom computer about the size of a refrigerator.. Garry Kasparov. IBM came back with an improved version of Deep Blue that finally defeated Kasparov in a six game match. In 1997. computer chess has continued to progress. Deep Fritz is a program that runs on a computer using two standard Intel processors. It seems highly likely that. . Deep Thought was designed at Carnegie Mellon University and IBM. Kasparov faced a new computer developed by IBM called Deep Blue. the world chess champion faced off against a special computer called Deep Thought. In 2006. the new world chess champion.

• It's natural for us to give this brute force accomplishment a lower status than the creativity and precise thinking exhibited by an exceptional human being. • Yet. • Who can say what is going on in a human chess master's head when he or she plays a match? • We simply don't know. • In the case of the computer. degree of creativity--at least within the confines of a highly defined set of rules. And therefore it becomes to us something mysterious and especially creative. but because it is almost unimaginably fast. But the question for us here is: will that protect us from brute force algorithms that can do our . • The computer is simply calculating through millions of different possible moves and then picking the best one. The computer's advantage arises not from the fact that it is genuinely smart. creativity is a trait that we are very reluctant to ascribe to a machine--even if that machine can beat a human at chess. we know exactly what is happening. however. It is using a brute force algorithm. Could a computer formulate a strategy for an important legal case? • When we think of what it takes for a human being to be a world chess champion.

CAN THEY PRACTICE LAW? • If you agree that the game of chess requires creativity within a set of defined rules. then could not something similar be said about the field of law? • Currently there are jobs in the United States for many thousands of lawyers who rarely. They research case law. go into a courtroom. if ever. and write briefs which summarize relevant court cases and legal strategies from the past. They work at law firms and spend much of their time in the library or accessing legal databases through their computers. • These attorneys are employed in the areas of legal research and contracts. . They suggest possible strategies and legal arguments for new cases that come to their firms. • They review contracts and look for loopholes.

• there are already teams of lawyers who specialize in researching case in the United States. .

and then eventually evolve into a full automation solution. . • We see the fruition of this body of research every time we use Google or any other advanced Internet search engine. What about automation? • Can a computer do the lawyer's job? • One of the primary research areas in artificial intelligence has focused on creating "smart" algorithms that can quickly search. evaluate and summarize information. • The software may start out as a productivity tool to make the lawyer's job easier. • We can expect that such smart algorithms will increasingly be used in the field of legal research.

then why can it not also iterate through every known legal argument since the days when Cicero held forth in the Roman Forum? Would this be a "lesser" form of legal creativity? Perhaps it would. a brute force algorithm may ultimately prevail. • What about the more advanced or creative aspects of the lawyer's job? • Could a computer formulate a strategy for an important legal case? • For the time being. but as we saw in the case of chess. it is easier to automate some parts of the lawyer's job than others. • For example.• Obviously. • As I pointed out with the radiologist automating even a portion of the lawyer's job will quickly result in fewer attorneys on the payroll. If a computer can evaluate millions of possible chess moves. But would that matter to our lawyer's employer? • . finding and summarizing relevant case law would be a likely target for an initial effort. this may be a challenge.

we can probably expect some important advances in this area. • In the future. HUMANIZING THE ROBOT MIND • Although the practical applications of artificial intelligence have so far emphasized brute force solutions. • Neural nets are currently being used in areas such as visual pattern recognition. especially as the engineers who design neural nets work more closely with scientists who are uncovering the secrets of how our brains work. . which are a special type of computer that is built upon a model of the human brain. • A very important area of study revolves around the idea of neural nets. it is by no means true that this is the only approach being taken in the field.

he archetypal example is the Microsoft Office suite. creating presentations. . now gone online. drafting. building spreadsheets and databases. If there is one thing lawyers universally understand. it’s that they need productivity software to do all the basic things required of desk jockeys: emailing. Productivity software.Essential Software for the Modern Law Practice • 1.

• Among other general features. . so you can edit it. If you want to be paperless — and who doesn’t these days. let’s face it — a PDF conversion program is a must- have. you can then apply OCR to your scanned images — that renders the text. PDF conversion software. include PDFCreator and CutePDf. • PDF conversion software allows you to scan paper to PDF and. receive paper documents. add encryption. but Nuance’s Power PDF is a lower-cost alternative.• 2 . at least. remove metadata and build forms. • Free conversion tools. Adobe Acrobat continues to be the leader in the clubhouse. you’ll be able to package PDFs. with enterprise-level options. since most law firms still. where necessary.

typewriters. A document automation program allows you to customize existing templates in a number of ways.• 3. But clearly. Document automation/document assembly software. there are better ways to build documents in this bright future. or worse yet. including by adding client information . I shudder to think that there are not insignificant pockets of lawyers out there still dedicated to mail merge.

offline access/briefcase. integration with related software (Microsoft Word. • Major features common to a number of these applications include version control. standalone document management tools offer more robust versions of those features. integration with existing folder systems (Google Drive. your server). Although most document automation tools feature some level of document management control. or different features altogether. matter management. labeling/tagging and global search capability (with in-depth search functionality) . Document management software. check-in/check-out features (an additional level of access control).• 4 . generally speaking. Outlook).

case management software includes: • Contact management (with global search for conflicts checks) • Email archive • Document management • Calendar management (with sync options for your existing email/calendar system) • Time. Case management software (sometimes referred to as practice management software) purports to be a holistic solution. accessible package. billing and accounting .• 6. Case management software. Generally speaking. in that it will wrap the majority of common features for law firm management into a single.

• Since that’s the case.• 7. Data backup tools. Data management is the holy grail of law firm management. though. it makes good sense to back up the data you already have. Because no one system is fail-safe. you may set your mind far more at ease by using two systems in conjunction — and it probably makes sense to pair a local backup with a cloud version. .

• If you do. and which ones are not. . including the ability to add notes to files. Customer relationship management (CRM) software. Using data to drive marketing decisions is next-level law firm management.• 8. a CRM will provide basic contact management tools. when you learn what tactics are successful. and more robust features that will walk you through the many pathways from leads to conversions. • CRM tools allow you to better render the data you take in — assuming you take it in effectively in the first place. Gaining a better understanding of how you close business will help you to close more of it.

• 9. sometimes referred to as enterprise social networks. internal communication systems. Many law firms are turning to restricted-access. Programs with calendaring features allow you to assign tasks and make notes on those items . The problem with email is that literally anybody can send you one. but you still have to delete it. • That’s what’s so vexing about unfiltered spam — you don’t have to reply. Internal communication platform.

defamation and mischief. such as theft. Cyber Law of India • Cyber crimes can involve criminal activities that are traditional in nature. • The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act. . all of which are subject to the Indian Penal Code. 2000. fraud. forgery.

Cyber Terrorism. • The computer as a weapon :-using a computer to commit real world crimes. • e.g. • e. Pornography etc. EFT frauds. IPR violations. DOS attack etc. . Hacking. We can categorize Cyber crimes in two ways • The Computer as a Target :-using a computer to attack other computers. Credit card frauds.g. Cyber Crime regulated by Cyber Laws or Internet Laws. Virus/Worm attacks.

• TechnicalAspects Technological advancements have created new possibilities for criminal activity. in particular the criminal misuse of information technologies such as .

computer system or computer network. computer system or computer network . or memory function resources of a computer. • Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer. arithmetical. Unauthorized access & Hacking:- • Access means gaining entry into. instructing or communicating with the logical.

transferring money from various bank accounts to their own account followed by withdrawal of money. such as to stealing the credit card information. • They possess the desire to destruct and they get the kick out of such destruction.• Every act committed towards breaking into a computer and/or network is hacking. • Hackers write or use ready-made computer programs to attack the target computer. • Some hackers hack for personal monetary gains. .

• Trojans come in two parts. the attacker will then use the Client to connect to the Server and start using the trojan. . • The name Trojan Horse is popular. When the victim (unknowingly) runs the server on its machine. Trojan Attack:- • The program that act like something useful but do the things that are quiet damping. a Client part and a Server part. The programs of this kind are called as Trojans.

• Programs that multiply like viruses but spread from computer to computer are called as worms. Virus and Worm attack:- • A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. .

Email bombing • E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address. Defamatory emails • 7. • 5. E-mail & IRC related crimes:- • 1. Email frauds . Email Spamming • Email "spamming" refers to sending email to thousands and thousands of users . Email spoofing • Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Sending threatening emails • 6.similar to a chain letter. • 2. • 4. • 3 Sending malicious codes through email • E-mails are used to send viruses. Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.

. thereby preventing access to a service • attempts to prevent a particular individual from accessing a service • attempts to disrupt service to a specific system or person. • Examples include • attempts to "flood" a network. thereby preventing legitimate network traffic • attempts to disrupt connections between two machines. This causes the resource to crash thereby denying access of service to authorized users. Denial of Service attacks:- • Flooding a computer resource with more requests than it can handle.

writings etc.” • This would include pornographic websites. • Pornography delivered over mobile phones is now a burgeoning business. etc. Pornography • The literal mining of the term 'Pornography' is “describing or showing sexual acts in order to cause sexual excitement through books. photos. • Research shows that 50% of the web-sites containing potentially illegal contents relating to child abuse were ‘Pay-Per-View’.There are more than 420 million individual pornographic webpages today. This indicates that abusive images of children over Internet have been highly commercialized.” . pornographic material produced using computers and use of internet to download and transmit pornographic videos. “driven by the increase in sophisticated services that deliver video clips and streaming video. films. pictures. • Adult entertainment is largest industry on internet. in addition to text and images.

. fire and rescue systems etc.It is cheaper than traditional terrorist methods.Cyberterrorism is more anonymous than traditional terrorist methods. trail traffic control.Cyberterrorism can be conducted remotely. • 4.Cyberterrorism has the potential to affect directly a larger number of people. Others like police. • 1. • 2. air traffic control. power plants. telecommunication networks are the most likely targets. • 3. a feature that is especially appealing to terrorists.The variety and number of targets are enormous. banks. • 5. medical. Cyber Terrorism:- • Targeted attacks on military installations. • Cyberterrorism is an attractive option for modern terrorists for several reasons.

• Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami. Banking/Credit card Related crimes:- • In the corporate world. • Use of stolen card information or fake credit/debit cards are common. . Internet hackers are continually looking for opportunities to compromise a company’s security in order to gain access to confidential banking and financial information.

In fact. that offer online gambling. . Online gambling:- • There are millions of websites hosted on servers abroad. it is believed that many of these websites are actually fronts for money laundering.

. • In general. entering the chat-rooms frequented by the victim. constantly bombarding the victim with emails etc. the harasser intends to cause emotional distress and has no legitimate purpose to his communications. Cyber Stacking:- • Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim.

.• . Identity Theft :- Identity theft is the fastest growing crime in countries like America. • Identity theft is a vehicle for perpetrating other types of fraud schemes. • Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud.

fire or excess electric supply etc. sexual preferences. • v. financial status etc. Breach of Privacy and Confidentiality • Privacy • Privacy refers to the right of an individual/s to determine when. • Confidentiality • It means non disclosure of information to unauthorized or unwanted persons. how and to what extent his or her personal data will be shared with others. such information should be protected. • In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person. • . • u.• Theft of computer system (Hardware):- • This type of offence involves the theft of a computer. Physically damaging a computer system:- • Physically damaging a computer or its peripherals either by shock. • Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records. some part(s) of a computer or a peripheral attached to the computer.