Professional Documents
Culture Documents
Comp Answer
Comp Answer
Advantages of computer
Multitasking: Multitasking is one of the major advantage of computer. Person can
perform multiple task, multiple operation, calculate numerical problems within few
seconds. Computer can perform trillion of instructions per second.
Speed:Now computer is not just a calculating device. Now a day’s computer has very
important role in human life. One of the main advantages of computer is its
incredible speed, which helps human to complete their task in few seconds. All the
operations can be performed very fast just because of its speed elsewise it takes a
long time to perform the task.
Cost/ Stores huge amount of data :It is a low cost solution. Person can save
huge data within a low budget. Centralized database of storing information is the
major advantage that can reduce cost.
Accuracy :One of the root advantage of computer is that can perform not only
calculations but also with accuracy.
Data Security :Protecting digital data is known as data security. Computer provide
security from destructive forces and from unwanted action from unauthorized users
like cyber attack or access attack.
Disadvantages Of Computer
The use of computer has also created some problems in society which are as follows.
Unemployment :Different tasks are performed automatically by using computers.
It reduces the need of people and increases unemployment in society.
Wastage Of Time And Energy: Many people use computers without positive
purpose. They play games and chat for a long period of time. It causes wastage of
time and energy. Young generation is now spending more time on the social media
websites like Facebook, Twitter etc or texting their friends all night through
smartphones which is bad for both studies and their health. And it also has adverse
effects on the social life.
Data Security: The data stored on a computer can be accessed by unauthorized
persons through networks. It has created serious problems for the data security.
Computer Crimes: People use the computer for negative activities. They hack the
credit card numbers of the people and misuse them or they can steal important data
from big organizations.
Privacy Violation: The computers are used to store personal data of the people.
The privacy of a person can be violated if the personal and confidential records are
not protected properly.
Health Risks: The improper and prolonged use of computer can results in injuries
or disorders of hands, wrists, elbows, eyes, necks and back. The users can avoid
health risks by using the computer in proper position. They must also take regular
breaks while using the computer for longer period of time. It is recommended to take
a couple of minutes break after 30 minutes of computer usage.
Impact On Environment: The computer manufacturing processes and computer
waste are polluting the environment. The wasted parts of computer can release
dangerous toxic materials. Green computer is a method to reduce the electricity
consumed and environmental waste generated when using a computer. It includes
recycling and regulating manufacturing processes. The used computers must be
donated or disposed off properly.
On the basis of the operation performed and methods used to store and process the
data information, computers can be classified into the following categories:
1. Analog computers
The analog computers represent data in the form of continuous electrical
signals having a specific magnitude. These computers are very fast in their
operations to be carried out at the same time. They are a powerful tool to solve
differential equations.
2. Digital Computers
The digital computer is also known as the digital information processing
system, is a type of computer that stores and processes data in the digital
form. Therefore each type of data is usually stored in these computers in terms
of 0s and 1s. The output produced by these computers is also in the digital
form.
3. Hybrid Computers
The hybrid computer is a combination of analog computer and digital
computer because it encompasses the best features of both these computers.
Therefore the hardware components of hybrid computers are usually the
mixture of analog and digital components. The hybrid computer is also less
expensive than the digital computers.
2) Based on Application
Different computers are designed for a different purpose so that they can perform
their tasks according to their capabilities. On the basis of different applications or
purpose, computers can be classified into the following categories:
Computers differ from each other in terms of their size, shape, and weights. Each
type of computers perform some unique functions and can be employed in the fields
suited to them. On the basis of size, shape the computers can be classified into the
following categories.
1. Microcomputers
A microcomputer is a small and cheap digital computer that is designed to be
used by individuals. It is built around a microprocessor, a storage unit, and an
I/o channel. The microcomputers are generally in the form of PCs,
workstations and notebook computers.
2. Mini computers
A minicomputer was first introduced in the year 1960 by Digital Equipment
Corporations(DEC). They were called minicomputers because of their smaller
size than the other computers of those time.
3. Mainframe computers
A mainframe computer is a very large computer that is employed by the large
business organization for handling major applications such as financial
transaction processing.
4. Super computers
A super computer is the fastest type of computers that can perform complex
operations at a very high speed. The super computer was first presented in the
year 1960s by Seymour Cray at Control Data Corporation(CDC). They are
more expansive than the other categories of computers.
Input Unit :The input unit consists of input devices that are attached to
the computer. These devices take input and convert it into binary
language that the computer understands. Some of the common input
devices are keyboard, mouse, joystick, scanner etc.
Central Processing Unit (CPU0 : Once the information is entered
into the computer by the input device, the processor processes it. The
CPU is called the brain of the computer because it is the control center of
the computer. It first fetches instructions from memory and then
interprets them so as to know what is to be done. If required, data is
fetched from memory or input device. Thereafter CPU executes or
performs the required computation and then either stores the output or
displays on the output device. The CPU has three main components
which are responsible for different functions – Arithmetic Logic Unit
(ALU), Control Unit (CU) and Memory registers
Arithmetic and Logic Unit (ALU) : The ALU, as its name suggests
performs mathematical calculations and takes logical decisions.
Arithmetic calculations include addition, subtraction, multiplication and
division. Logical decisions involve comparison of two data items to see
which one is larger or smaller or equal.
Control Unit : The Control unit coordinates and controls the data flow
in and out of CPU and also controls all the operations of ALU, memory
registers and also input/output units. It is also responsible for carrying
out all the instructions stored in the program. It decodes the fetched
instruction, interprets it and sends control signals to input/output
devices until the required operation is done properly by ALU and
memory.
Memory Registers : A register is a temporary unit of memory in the
CPU. These are used to store the data which is directly used by the
processor. Registers can be of different sizes(16 bit, 32 bit, 64 bit and so
on) and each register inside the CPU has a specific function like storing
data, storing an instruction, storing address of a location in memory etc.
The user registers can be used by an assembly language programmer for
storing operands, intermediate results etc. Accumulator (ACC) is the
main register in the ALU and contains one of the operands of an
operation to be performed in the ALU.
Memory : Memory attached to the CPU is used for storage of data and
instructions and is called internal memory The internal memory is
divided into many storage locations, each of which can store data or
instructions. Each memory location is of the same size and has an
address. With the help of the address, the computer can read any
memory location easily without having to search the entire memory.
when a program is executed, it’s data is copied to the internal memory
ans is stored in the memory till the end of the execution. The internal
memory is also called the Primary memory or Main memory. This
memory is also called as RAM, i.e. Random Access Memory. The time of
access of data is independent of its location in memory, therefore this
memory is also called Random Access memory (RAM). Read this
for different types of RAMs
Output Unit : The output unit consists of output devices that are
attached with the computer. It converts the binary data coming from
CPU to human understandable form. The common output devices are
monitor, printer, plotter etc.
1. System Software
A system software aids the user and the hardware to function and interact with
each other. Basically, it is a software to manage computer hardware behavior so
as to provide basic functionalities that are required by the user. In simple
words, we can say that system software is an intermediator or a middle layer
between the user and the hardware. These computer software sanction a
platform or environment for the other software to work in. This is the reason
why system software is very important in managing the entire computer system.
When you first turn on the computer, it is the system software that gets
initialized and gets loaded in the memory of the system. The system software
runs in the background and is not used by the end-users. This is the reason why
system software is also known as ‘low-level software’.
(2) Mouse : It’s a pointing device. The mouse is rolled over the mouse pad, which in
turn controls the movement of the cursor in the screen. We can click, double click or
drag the mouse. Most of the mouse’s have a ball beneath them, which rotates when
the mouse in moved. The ball has 2 wheels of the sides, which in turn mousse with
the movement of the ball. The sensor notifies the speed of its movements to the
computer, which in turn moves the cursor/pointer on the screen.
(4) Track Ball : Track ball is similar to the upside- down design of the mouse. The
user moves the ball directly, while the device itself remains stationary. The user spins
the ball in various directions to effect the screen movements.
(5) Light Pen : This is an input device which is used to draw lines or figures on a
computer screen. It’s touched to the CRT screen where it can detect raster on the
screen as it passes.
(6) Optical Character Rader : It’s a device which detects alpha numeric
characters printed or written on a paper. The text which is to be scanned is
illuminated by a low frequency light source. The light is absorbed by the dark areas
but reflected from the bright areas. The reflected light is received by the photocells.
(7) Bar Code Reader : This device reads bar codes and coverts them into electric
pulses to be processed by a computer. A bar code is nothing but data coded in form of
light and dark bars.
(8) Voice Input Systems : This devices converts spoken words to M/C language
form. A micro phone is used to convert human speech into electric signals. The signal
pattern is then transmitted to a computer when it’s compared to a dictionary of
patterns that have been previously placed in a storage unit of computer. When a close
match is found, the word is recognized.
(9) Plotter : Plotter is an O/P device that is used to produce graphical O/P on
papers. It uses single color or multi color pens to draw pictures as blue print etc.
(10) Digital Camera : It converts graphics directly into digital form. It looks like an
ordinary camera, but no film is used therein, instead a CCD (changed coupled
Divide) Electronic chip in used. When light falls, on the chip though the lens, it
converts light waves into electrical waves.
1. Security –The operating system uses password protection to protect user data and similar
other techniques. it also prevents unauthorized access to programs and user data.
2. Control over system performance –Monitors overall system health to help improve
performance. records the response time between service requests and system response to
have a complete view of the system health. This can help improve performance by providing
important information needed to troubleshoot problems.
3. Job accounting –Operating system Keeps track of time and resources used by various tasks
and users, this information can be used to track resource usage for a particular user or group
of user.
4. Error detecting aids –Operating system constantly monitors the system to detect errors and
avoid the malfunctioning of computer system.
5. Coordination between other software and users –Operating systems also coordinate and
assign interpreters, compilers, assemblers and other software to the various users of the
computer systems.
6. Memory Management –The operating system manages the Primary Memory or Main
Memory. Main memory is made up of a large array of bytes or words where each byte or
word is assigned a certain address. Main memory is a fast storage and it can be accessed
directly by the CPU. For a program to be executed, it should be first loaded in the main
memory. An Operating System performs the following activities for memory management:
It keeps tracks of primary memory, i.e., which bytes of memory are used by which user
program. The memory addresses that have already been allocated and the memory addresses
of the memory that has not yet been used. In multi programming, the OS decides the order in
which process are granted access to memory, and for how long. It Allocates the memory to a
process when the process requests it and deallocates the memory when the process has
terminated or is performing an I/O operation.
7. Processor Management –In a multi programming environment, the OS decides the order in
which processes have access to the processor, and how much processing time each process
has. This function of OS is called process scheduling. An Operating System performs the
following activities for processor management.
Keeps tracks of the status of processes. The program which perform this task is known as
traffic controller. Allocates the CPU that is processor to a process. De-allocates processor
when a process is no more required.
8. Device Management –An OS manages device communication via their respective drivers.
It performs the following activities for device management. Keeps tracks of all devices
connected to system. designates a program responsible for every device known as the
Input/Output controller. Decides which process gets access to a certain device and for how
long. Allocates devices in an effective and efficient way. Deallocates devices when they are
no longer required.
9. File Management –A file system is organized into directories for efficient or easy
navigation and usage. These directories may contain other directories and other files. An
Operating System carries out the following file management activities. It keeps track of
where information is stored, user access settings and status of every file and more… These
facilities are collectively known as the file system.
Visual Basic loop structures allow you to run one or more lines of code repetitively.
You can repeat the statements in a loop structure until a condition is True, until a
condition is False, a specified number of times, or once for each element in a
collection.
The following illustration shows a loop structure that runs a set of statements until a
condition becomes true:
While Loops : The While...End While construction runs a set of statements as long
as the condition specified in the While statement is True. For more information,
see While...End While Statement.
Advantage of DBMS
Disadvantage of DBMS
1. Increased costs:
Database systems require sophisticated hardware and software and highly skilled personnel.
The cost of maintaining the hardware, software, and personnel required to operate and manage
a database system can be substantial. Training, licensing, and regulation compliance costs are
often overlooked when database systems are implemented.
2. Management complexity:
Database systems interface with many different technologies and have a significant impact on a
company’s resources and culture.
The changes introduced by the adoption of a database system must be properly managed to
ensure that they help advance the company’s objectives. Given the fact that database systems
hold crucial company data that are accessed from multiple sources, security issues must be
assessed constantly.
3. Maintaining currency:
To maximize the efficiency of the database system, you must keep your system current.
Therefore, you must perform frequent updates and apply the latest patches and security
measures to all components.
Because database technology advances rapidly, personnel training costs tend to be significant.
Vendor dependence.
Given the heavy investment in technology and personnel training, companies might be reluctant
to change database vendors.
3 Normalization Normalization
) is not present in is present in RDBMS.
DBMS.