Professional Documents
Culture Documents
Arithmetic
Input and
logic
Memory
Output Control
I/O Processor
CMPUT101 Introduction to
(c) Yngvi Bjornsson 8
Computing
hardware and software.
Computer hardware is the collection of all the parts you can physically
touch.
M. Hammad Waseem 11
Types Of Software
There are two types of software on the basis of their
functionality:
System Software
Application Software
M. Hammad Waseem 12
Application Software
Application Software includes programs that do
real work for user.
Application Software is created to perform specific
tasks for a user.
M. Hammad Waseem 13
Examples
Microsoft Word
Microsoft Excel
Lotus 123
Photoshop etc
M. Hammad Waseem 14
Custom software
Custom software (also known as bespoke
software or tailor made software's)
is software that is specially developed for
some specific organization or other user.
Packaged Software
Packaged Software is a Software that
is ready-made and available for sale,
lease , or license to the general public.
M. Hammad Waseem 15
System Software
System Software is set of programs to
control and manage the operations of a
computer hardware.
M. Hammad Waseem 16
Examples
Examples of System Software's are:
Operating Systems
Utility Programs
Device Drivers
M. Hammad Waseem 17
Operating System (OS)
An operating system (OS) is a collection
of software that manages computer
hardware resources and provides
common services for computer
programs.
The operating system is a vital component of
the system software in a computer system.
Application programs usually require an
operating system to function.
M. Hammad Waseem 18
Device Driver
A Device Driver is a computer
program that operates or controls a
particular type of device that is attached to
a computer.
Like printers
M. Hammad Waseem 19
RAM versus ROM comparison chart
RAM ROM
Random Access Memory or RAM is a Read-only memory or ROM is also a
form of data storage that can be form of data storage that can not be
accessed randomly at any time, in any easily altered or reprogrammed.Stores
order and from any physical location., instuctions that are not nescesary for
allowing quick access and re-booting up to make the computer
manipulation. operate when it is switched off.They
are hardwired.
RAM is volatile i.e. its contents are lost It is non-volatile i.e. its contents are
when the device is powered off. retained even when the device is
powered off.
The two main types of RAM are static The types of ROM include PROM,
RAM and dynamic RAM. EPROM and EEPROM.
Compiler Interpreter
Compiler Interpreter
1 Takes Entire program as Takes Single instruction
input as input .
USING OPERATING SYSTEM:
The OS is an example of system software- software that controls
the systems hardware and that interacts with the user and
application software. In short OS is the computers master control
program. The OS provides you with the tool that enables you to
Interact with the PC.
Secondary storage
Input devices
Output devices
Communication devices
2000 by Prentice Hall. 3-27
The Central Processor
The central processor consists of two parts
The central processing unit (CPU)
Arithmetic-log unit (ALU)
The control unit
Primary storage
Random access memory (RAM)
Read-only memory (ROM)
Cache memory
PCs
Midrange or
Laptops/Notebooks Supercomputers
Minicomputers
Hand-held Computers Mainframes
Workstations
Pen-based Computers
Laptop Fits on a users lap and is slightly larger than a notebook. Has full PC
functionality with a reduced keypad and screen. Has a floppy drive.
Has full PC functionality with a reduced keypad and screen and no floppy
Notebook drive.
Smaller than a laptop or notebook computer. Has a built-in monitor that
Handheld can be operated from the palm of ones hand so the keyboard and screen
are smaller than a laptop. Often, the keyboard requires an electronic pen
to input data.
Uses an electronic writing pad and a light-sensitive electronic pen to
Pen-based input data.
Can download text, photos, and other applications from PCs and transmit
Wrist data via infrared rays; users input information on the LCD watch face that
turns into a small keyboard.
Clock
Monitors
Speed
Processor RAM
Expansion Secondary
Slots Storage
Ring Topology
Bus Topology
LAN
Topologies
Star Topology
The metropolitan area network (MAN) is designed to extend
over an entire city.
It may be a single network such as cable television network
available in many cities.
A MAN uses distributed queue dual bus.
Range: Within 100 km (a city).
Bus A
MAN
Bus B
It provides a good back bone for More cable required for a MAN
a large network and provides connection from one place to
greater access to WANs. another.
The dual bus used in MAN helps
the transmission of data in both It is difficult to make the system
direction simultaneously. secure from hackers and
A Man usually encompasses industrial espionage (spying)
several blocks of a city or an graphical regions.
entire city.
Network that provides long
distance transmission of
data, voice, image and
video information over
large geographical areas
that may comprise a
country, a continent.
Range: Beyond 100 km.
Covers a large geographical area so long Need a good firewall to restrict outsiders
distance businesses can connect on the from entering and disrupting the network
one network. Setting up a network can be an expensive,
Shares software and resources with slow and complicated. The bigger the
connecting workstations. network the more expensive it is.
Messages can be sent very quickly to Once set up, maintaining a network is a
anyone else on the network. These full-time job which requires network
messages can have pictures, sounds, or supervisors and technicians to be
data included with them (called employed.
attachments). Security is a real issue when many
Expensive things (such as printers or different people have the ability to use
phone lines to the internet) can be shared information from other computers.
by all the computers on the network Protection against hackers and viruses adds
without having to buy a different peripheral more complexity and expense.
for each computer.
Everyone on the network can use the
same data. This avoids problems where
some users may have older information
than others.
ISDN ( Integrated service
digital network) 2 types
Basic rate interface
Primary rate interface
Frame relay
Switched multimegabit
data service (SMDS)
Synchronous optical
network (SONET)
High data link controlled
(HDLC)
Synchronous Data Link
Control (SDLC)
BASIS LAN MAN WAN
Full Form Local Area Network Metropolitan Area Network Wide Area Network
Media Used Uses guided media Uses guided as well as Uses unguided media
unguided media
Speed A high speed i.e. 100kbps to Optimized for a large Long distance
100mbps geographical area than LAN. communications, which may or
may not be provided by public
packet network.
Router
modem
A modem is a hardware device that allows a computer to
send and receive data over a telephone line or a cable or
satellite connection.
Internet
It is a worldwide/global system of
interconnected computer networks. It uses the
standard Internet Protocol (TCP/IP). Every computer
in Internet is identified by a unique IP address. IP
Address is a unique set of numbers (such as
110.22.33.114) which identifies a computers
location.
A special computer DNS (Domain Name Server) is
used to provide a name to the IP Address so that
the user can locate a computer by a name. For
example, a DNS server will resolve a
name https://www.google.com to a particular IP
address to uniquely identify the computer on which
this website is hosted
Intranet
The GUI was first developed at Xerox PARC by Alan Kay, Douglas
Engelbart, and a group of other researchers in 1981.
Later, Apple introduced the Lisa computer, the first commercially
available computer, on January 19, 1983.
Multiprocessing - An operating system capable of supporting and utilizing more than one
computer processor. Examples of operating systems that would fall into this category are:
Linux, Unix, Windows XP
Multithreading - Operating systems that allow different parts of a software program to run
concurrently. Examples of operating systems that would fall into this category are:
Linux, Unix, Windows XP
Memory hirerachy
Context switching
Example
<!DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>
<h1>My First Heading</h1>
<p>My first paragraph.</p>
</body>
</html>
Example Explained
HTML 1991
HTML Versions
HTML 2.0 1995
Since the early days of the web, there have been many versions of HTML:
XHTML 2000
HTML5 2014
Write HTML Using Notepad or TextEdit
Windows 8 or later:
Open the Start Screen (the window symbol at
the bottom left on your screen).
Type Notepad.
Windows 7 or earlier:
Open Start > Programs > Accessories
> Notepad
Step 2: Write Some HTML
</body>
</html>
HTML Paragraphs
HTML paragraphs are defined with the <p> tag:
<!DOCTYPE html>
<html>
<body>
<p>This is a paragraph.</p>
<p>This is another paragraph.</p>
</body>
</html>
HTML Links
HTML links are defined with the <a> tag:
<!DOCTYPE html>
<html>
<body>
</body>
</html>
HTML Images
HTML images are defined with the <img> tag.
The source file (src), alternative text (alt), width, and height are provided
as attributes:
<!DOCTYPE html>
<html>
<body>
</body>
</html>
The title Attribute
Here, a title attribute is added to
the <p> element. The value of the title
attribute will be displayed as a tooltip when
you mouse over the paragraph:
<!DOCTYPE html>
<html>
<body>
</body>
</html>
HTML Horizontal Rules
The <hr> tag defines a thematic break in an
HTML page, and is most often displayed as a
horizontal rule.
The <hr> element is used to separate content
(or define a change) in an HTML page:
<!DOCTYPE html>
<html>
<body>
</body>
</html>
How to View HTML Source?
Have you ever seen a Web page and wondered "Hey! How did they do that?"
View HTML Source Code:
To find out, right-click in the page and select "View Page Source" (in Chrome) or
"View Source" (in IE), or similar in other browsers. This will open a window
containing the HTML source code of the page.
<p>I am normal</p>
<p style="color:red;">I am red</p>
<p style="color:blue;">I am blue</p>
<p style="font-size:36px;">I am big</p>
</body>
</html>
HTML Style
<!DOCTYPE html>
<html>
<body style="background-color:powderblue;">
<h1>This is a heading</h1>
<p>This is a paragraph.</p>
</body>
</html>
HTML Text Color
The color property defines the text color for an HTML element:
<!DOCTYPE html>
<html>
<body>
</body>
</html>
HTML Fonts
The font-family property defines the font to be used for an HTML element:
<!DOCTYPE html>
<html>
<body>
</body>
</html>
<!DOCTYPE html>
<html>
<body>
</body>
</html>
Cloud Computing
With increase in computer and Mobile users, data storage has become a
priority in all fields.
Large and small scale businesses today thrive on their data & they spent a
huge amount of money to maintain this data. It requires a strong IT
support and a storage hub.
Not all businesses can afford high cost of in-house IT infrastructure and
back up support services.
Public Cloud: This type of cloud is used usually for B2C (Business to
Consumer) type interactions. Here the computing resource is owned,
governed and operated by government, an academic or business
organization.
Hybrid Cloud: This type of cloud can be used for both type of
interactions - B2B (Business to Business) private cloud or B2C (
Business to Consumer) public . This deployment method is called
hybrid cloud as the computing resources are bound together by
different clouds.
What is Cloud Computing
Architecture?
Cloud Computing Architecture
Cloud computing comprises of two
components front end and back end.
In 1989, Garry Kasparov, the world chess champion faced off against a
special computer called Deep Thought. Deep Thought was designed at
Carnegie Mellon University and IBM. Kasparov easily defeated the
machine in a two game match.
Since then, computer chess has continued to progress. In 2006, the new
world chess champion, Vladimir Kramnik, lost a match against a German
software program called Deep Fritz. While IBM's Deep Blue was a
completely custom computer about the size of a refrigerator, Deep Fritz is
a program that runs on a computer using two standard Intel processors. It
seems highly likely that, in the near future, a program like Deep Fritz,
running on virtually any cheap laptop computer, will be able to defeat the
best chess players in the world.
Could a computer formulate a strategy for an
important legal case?
When we think of what it takes for a human being to be a world chess champion, degree of
creativity--at least within the confines of a highly defined set of rules.
Yet, creativity is a trait that we are very reluctant to ascribe to a machine--even if that
machine can beat a human at chess.
Who can say what is going on in a human chess master's head when he or she plays a match?
We simply don't know. And therefore it becomes to us something mysterious and especially
creative.
The computer is simply calculating through millions of different possible moves and then
picking the best one. It is using a brute force algorithm. The computer's advantage arises not
from the fact that it is genuinely smart, but because it is almost unimaginably fast.
It's natural for us to give this brute force accomplishment a lower status than the creativity
and precise thinking exhibited by an exceptional human being. But the question for us here
is: will that protect us from brute force algorithms that can do our
CAN THEY PRACTICE LAW?
If you agree that the game of chess requires creativity within a set
of defined rules, then could not something similar be said about the
field of law?
Currently there are jobs in the United States for many thousands of
lawyers who rarely, if ever, go into a courtroom.
They review contracts and look for loopholes. They suggest possible
strategies and legal arguments for new cases that come to their
firms.
there are already teams of lawyers who
specialize in researching case in the United
States.
What about automation?
Can a computer do the lawyer's job?
For example, finding and summarizing relevant case law would be a likely target
for an initial effort.
As I pointed out with the radiologist automating even a portion of the lawyer's job
will quickly result in fewer attorneys on the payroll.
What about the more advanced or creative aspects of the lawyer's job?
For the time being, this may be a challenge, but as we saw in the case of chess, a
brute force algorithm may ultimately prevail. If a computer can evaluate millions of
possible chess moves, then why can it not also iterate through every known legal
argument since the days when Cicero held forth in the Roman Forum? Would this
be a "lesser" form of legal creativity? Perhaps it would. But would that matter to
our lawyer's employer?
Neural nets are currently being used in areas such as visual pattern
recognition.
PDF conversion software allows you to scan paper to PDF and, where
necessary, you can then apply OCR to your scanned images that renders
the text, so you can edit it.
CRM tools allow you to better render the data you take in
assuming you take it in effectively in the first place.
They possess the desire to destruct and they get the kick
out of such destruction.
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a
particular address.
6. Defamatory emails
7. Email frauds
Denial of Service attacks:-
Privacy
Privacy refers to the right of an individual/s to determine when, how and to what extent his
or her personal data will be shared with others.
Breach of privacy means unauthorized use or distribution or disclosure of personal
information like medical records, sexual preferences, financial status etc.
Confidentiality
It means non disclosure of information to unauthorized or unwanted persons.
In addition to Personal information some other type of information which useful for business
and leakage of such information to other persons may cause damage to business or person,
such information should be protected.