Sunday, 12 November 2017

Output Devices

Output Device
Following are few of the important output devices which are used in a computer.
  • Monitors
  • Graphic Plotter
  • Printer

Monitors

Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image depends upon the number of pixels.
There are two kinds of viewing screen used for monitors.
  • Cathode-Ray Tube (CRT)
  • Flat- Panel Display

Cathode-Ray Tube (CRT) Monitor

The CRT display is made up of small picture elements called pixels. The smaller the pixels, the better the image clarity, or resolution. It takes more than one illuminated pixel to form whole character, such as the letter ‘e’ in the word help.
A finite number of characters can be displayed on a screen at once. The screen can be divided into a series of character boxes - fixed location on the screen where a standard character can be placed. Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically. There are some disadvantages of CRT:
  • Large in Size
  • High power consumption

Flat-Panel Display Monitor

The flat-panel display refers to a class of video devices that have reduced volume, weight and power requirement in comparison to the CRT. You can hang them on walls or wear them on your wrists. Current uses of flat-panel displays include calculators, video games, monitors, laptop computer, graphics display.
The flat-panel display is divided into two categories:
·         Emissive Displays - The emissive displays are devices that convert electrical energy into light. Example are plasma panel and LED(Light-Emitting Diodes).
·         Non-Emissive Displays - The Non-emissive displays use optical effects to convert sunlight or light from some other source into graphics patterns. Example is LCD(Liquid-Crystal Device)

Printers

Printer is an output device, which is used to print information on paper.
There are two types of printers:
  • Impact Printers
  • Non-Impact Printers

Impact Printers

The impact printers print the characters by striking them on the ribbon which is then pressed on the paper.
Characteristics of Impact Printers are the following:
  • Very low consumable costs
  • Very noisy
  • Useful for bulk printing due to low cost
  • There is physical contact with the paper to produce an image
These printers are of two types
  • Character printers
  • Line printers

Character Printers

Character printers are the printers which print one character at a time.
These are further divided into two types:
  • Dot Matrix Printer(DMP)
  • Daisy Wheel

Dot Matrix Printer

In the market one of the most popular printers is Dot Matrix Printer. These printers are popular because of their ease of printing and economical price. Each character printed is in form of pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out to form a character that is why it is called Dot Matrix Printer.
Advantages
  • Inexpensive
  • Widely Used
  • Other language characters can be printed
Disadvantages
  • Slow Speed
  • Poor Quality

Daisy Wheel

Head is lying on a wheel and pins corresponding to characters are like petals of Daisy (flower name) that is why it is called Daisy Wheel Printer. These printers are generally used for word-processing in offices which require a few letters to be sent here and there with very nice quality.
Advantages
  • More reliable than DMP
  • Better quality
  • The fonts of character can be easily changed
Disadvantages
  • Slower than DMP
  • Noisy
  • More expensive than DMP

Line Printers

Line printers are the printers which print one line at a time.
These are of further two types
  • Drum Printer
  • Chain Printer

Drum Printer

This printer is like a drum in shape so it is called drum printer. The surface of drum is divided into number of tracks. Total tracks are equal to size of paper i.e. for a paper width of 132 characters, drum will have 132 tracks. A character set is embossed on track. The different character sets available in the market are 48 character set, 64 and 96 characters set. One rotation of drum prints one line. Drum printers are fast in speed and can print 300 to 2000 lines per minute.
Advantages
  • Very high speed
Disadvantages
  • Very expensive
  • Characters fonts cannot be changed

Chain Printer

In this printer, chain of character sets are used so it is called Chain Printer. A standard character set may have 48, 64, or 96 characters.
Advantages
  • Character fonts can easily be changed.
  • Different languages can be used with the same printer.
Disadvantages
  • Noisy

Non-impact Printers

Non-impact printers print the characters without using ribbon. These printers print a complete page at a time so they are also called as Page Printers.
These printers are of two types
  • Laser Printers
  • Inkjet Printers

Characteristics of Non-impact Printers

  • Faster than impact printers.
  • They are not noisy.
  • High quality.
  • Support many fonts and different character size.

Laser Printers

These are non-impact page printers. They use laser lights to produce the dots needed to form the characters to be printed on a page.

Advantages

  • Very high speed
  • Very high quality output
  • Give good graphics quality
  • Support many fonts and different character size

Disadvantages

·         Expensive.
·         Cannot be used to produce multiple copies of a document in a single printing.

Inkjet Printers

Inkjet printers are non-impact character printers based on a relatively new technology. They print characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output with presentable features.
They make less noise because no hammering is done and these have many styles of printing modes available. Colour printing is also possible. Some models of Inkjet printers can produce multiple copies of printing also.

Advantages

  • High quality printing
  • More reliable

Disadvantages


  • Expensive as cost per page is high
  • Slow as compared to laser printer

Input Devices

Input Devices
Following are few of the important input devices which are used in a computer:
  • Keyboard
  • Mouse
  • Joy Stick
  • Light pen
  • Track Ball
  • Scanner
  • Graphic Tablet
  • Microphone
  • Magnetic Ink Card Reader(MICR)
  • Optical Character Reader(OCR)
  • Bar Code Reader
  • Optical Mark Reader(OMR)
Keyboard
Keyboard is the most common and very popular input device which helps in inputting data to the computer. The layout of the keyboard is like that of traditional typewriter, although there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108 keys are also available for Windows and Internet.
The keys on the keyboard are as follows:
Sr.No
Keys
Description
1
Typing Keys
These keys include the letter keys (A-Z) and digit keys (0-9) which generally give same layout as that of typewriters.
2
Numeric Keypad
It is used to enter numeric data or cursor movement. Generally, it consists of a set of 17 keys that are laid out in the same configuration used by most adding machines and calculators.
3
Function Keys
The twelve function keys are present on the keyboard which are arranged in a row at the top of the keyboard. Each function key has unique meaning and is used for some specific purpose.
4
Control keys
These keys provide cursor and screen control. It includes four directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc).
5
Special Purpose Keys
Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.

Mouse

Mouse is most popular pointing device. It is a very famous cursor-control device having a small palm size box with a round ball at its base which senses the movement of mouse and sends corresponding signals to CPU when the mouse buttons are pressed.
Generally it has two buttons called left and right button and a wheel is present between the buttons. Mouse can be used to control the position of cursor on screen, but it cannot be used to enter text into the computer.

Advantages

  • Easy to use
  • Not very expensive
  • Moves the cursor faster than the arrow keys of keyboard.
  • Joystick
  • Joystick is also a pointing device which is used to move cursor position on a monitor screen. It is a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in a socket. The joystick can be moved in all four directions.
  • The function of joystick is similar to that of a mouse. It is mainly used in Computer Aided Designing(CAD) and playing computer games.
Light Pen
  • Light pen is a pointing device which is similar to a pen. It is used to select a displayed menu item or draw pictures on the monitor screen. It consists of a photocell and an optical system placed in a small tube. When the tip of a light pen is moved over the monitor screen and pen button is pressed, its photocell sensing element detects the screen location and sends the corresponding signal to the CPU.
Track Ball
  • Track ball is an input device that is mostly used in notebook or laptop computer, instead of a mouse. This is a ball which is half inserted and by moving fingers on ball, pointer can be moved. Since the whole device is not moved, a track ball requires less space than a mouse. A track ball comes in various shapes like a ball, a button and a square.
Scanner
  • Scanner is an input device which works more like a photocopy machine. It is used when some information is available on a paper and it is to be transferred to the hard disc of the computer for further manipulation. Scanner captures images from the source which are then converted into the digital form that can be stored on the disc. These images can be edited before they are printed.
Digitizer
  • Digitizer is an input device which converts analog information into digital form. Digitizer can convert a signal from the television or camera into a series of numbers that could be stored in a computer. They can be used by the computer to create a picture of whatever the camera had been pointed at. Digitizer is also known as Tablet or Graphics Tablet because it converts graphics and pictorial data into binary inputs. A graphic tablet as digitizer is used for doing fine works of drawing and image manipulation applications.
Microphone
  • Microphone is an input device to input sound that is then stored in digital form. The microphone is used for various applications like adding sound to a multimedia presentation or for mixing music.
  • Magnetic Ink Card Reader(MICR)
  • MICR input device is generally used in banks because of a large number of cheques to be processed every day. The bank's code number and cheque number are printed on the cheques with a special type of ink that contains particles of magnetic material that are machine readable. This reading process is called Magnetic Ink Character Recognition (MICR). The main advantages of MICR is that it is fast and less error prone.
Optical Character Reader(OCR)
  • OCR is an input device used to read a printed text. OCR scans text optically character by character, converts them into a machine readable code and stores the text on the system memory.
Bar Code Readers
  • Bar Code Reader is a device used for reading bar coded data (data in form of light and dark lines). Bar coded data is generally used in labelling goods, numbering the books etc. It may be a hand held scanner or may be embedded in a stationary scanner. Bar Code Reader scans a bar code image, converts it into an alphanumeric value which is then fed to the computer to which bar code reader is connected.

Optical Mark Reader(OMR)

OMR is a special type of optical scanner used to recognize the type of mark made by pen or pencil. It is used where one out of a few alternatives is to be selected and marked. It is specially used for checking the answer sheets of examinations having multiple choice questions.

Thursday, 2 March 2017

Computer Memory and its types



COMPUTER MEMORY


Memory is an essential element of a computer. Without its memory, a computer is of hardly any use. Memory plays an important role in saving and retrieving data. The performance of the computer system depends upon the size of the memory. Memory is of following types:

1. Primary Memory / Volatile Memory.
2. Secondary Memory / Non Volatile Memory.




1. Primary Memory / Volatile Memory: Primary Memory is internal memory of the computer. RAM AND ROM both form part of primary memory. The primary memory provides main working space to the computer.The following terms comes under primary memory of a computer are discussed below:

  • Random Access Memory (RAM): The primary storage is referred to as random access memory (RAM) because it is possible to randomly select and use any location of the memory directly store and retrieve data. It takes same time to any address of the memory as the first address. It is also called read/write memory. The storage of data and instructions inside the primary storage is temporary. It disappears from RAM as soon as the power to the computer is switched off. The memories, which lose their content on failure of power supply, are known as volatile memories .So now we can say that RAM is volatile memory.

  • Read Only Memory (ROM): There is another memory in computer, which is called Read Only Memory (ROM). Again it is the ICs inside the PC that form the ROM. The storage of program and data in the ROM is permanent. The ROM stores some standard processing programs supplied by the manufacturers to operate the personal computer. The ROM can only be read by the CPU but it cannot be changed. The basic input/output program is stored in the ROM that examines and initializes various equipment attached to the PC when the power switch is ON. The memories, which do not lose their content on failure of power supply, are known as non-volatile memories. ROM is non-volatile memory.

  • PROM: There is another type of primary memory in computer, which is called Programmable Read Only Memory (PROM). You know that it is not possible to modify or erase programs stored in ROM, but it is possible for you to store your program in PROM chip. Once the programmers’ are written it cannot be changed and remain intact even if power is switched off. Therefore programs or instructions written in PROM or ROM cannot be erased or changed.

  • EPROM: This stands for Erasable Programmable Read Only Memory, which overcome the problem of PROM & ROM. EPROM chip can be programmed time and again by erasing the information stored earlier in it. Information stored in EPROM exposing the chip for some time ultraviolet light and it erases chip is reprogrammed using a special programming facility. When the EPROM is in use information can only be read.

  • Cache Memory: The speed of CPU is extremely high compared to the access time of main memory. Therefore the performance of CPU decreases due to the slow speed of main memory. To decrease the mismatch in operating speed, a small memory chip is attached between CPU and Main memory whose access time is very close to the processing speed of CPU. It is called CACHE memory. CACHE memories are accessed much faster than conventional RAM. It is used to store programs or data currently being executed or temporary data frequently used by the CPU. So each memory makes main memory to be faster and larger than it really is. It is also very expensive to have bigger size of cache memory and its size is normally kept small.

  • Registers: The CPU processes data and instructions with high speed; there is also movement of data between various units of computer. It is necessary to transfer the processed data with high speed. So the computer uses a number of special memory units called registers. They are not part of the main memory but they store data or information temporarily and pass it on as directed by the control unit.

2. Secondary Memory / Non-Volatile Memory:  Secondary memory is external and permanent in nature. The secondary memory is concerned with magnetic memory. Secondary memory can be stored on storage media like floppy disks, magnetic disks, magnetic tapes, This memory can also be stored optically on Optical disks - CD-ROM. The following terms comes under secondary memory of a computer are discussed below:

  • Magnetic Tape: Magnetic tapes are used for large computers like mainframe computers where large volume of data is stored for a longer time. In PC also you can use tapes in the form of cassettes. The cost of storing data in tapes is inexpensive. Tapes consist of magnetic materials that store data permanently. It can be 12.5 mm to 25 mm wide plastic film-type and 500 meter to 1200 meter long which is coated with magnetic material. The deck is connected to the central processor and information is fed into or read from the tape through the processor. It’s similar to cassette tape recorder.

  • Magnetic Disk: You might have seen the gramophone record, which is circular like a disk and coated with magnetic material. Magnetic disks used in computer are made on the same principle. It rotates with very high speed inside the computer drive. Data is stored on both the surface of the disk. Magnetic disks are most popular for direct access storage device. Each disk consists of a number of invisible concentric circles called tracks. Information is recorded on tracks of a disk surface in the form of tiny magnetic spots. The presence of a magnetic spot represents one bit and its absence represents zero bit. The information stored in a disk can be read many times without affecting the stored data. So the reading operation is non-destructive. But if you want to write a new data, then the existing data is erased from the disk and new data is recorded.  For Example-Floppy Disk.

  • Optical Disk: With every new application and software there is greater demand for memory capacity. It is the necessity to store large volume of data that has led to the development of optical disk storage medium. Optical disks can be divided into the following categories: 
  1. Compact Disk/ Read Only Memory (CD-ROM
  2. Write Once, Read Many (WORM)
  3. Erasable Optical Disk

Thursday, 23 February 2017

Virus



A computer virus is a program designed to harm or cause harm on an infected computer. Its spreads through e-mail attachments, portable devices, websites containing malicious scripts and file downloads. A computer virus attaches itself to the host files and always activate whenever you open the infected files. The virus can replicate itself and then infect the other files on your computer causing more damage. Below is a list of different types of computer viruses and what they do.
Macro Viruses
These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb. They automatically infect the files with macros and also templates and documents that are contained in the file. They hide in documents shared through e-mail and networks.
Macro viruses include:
§  Relax
§  bablas
§  Melissa.A
§  097M/Y2K

Memory Resident Viruses
They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. They hide in RAM.
Memory Resident Viruses Include:
§  CMJ
§  meve
§  randex
§  mrklunky

Overwrite Viruses
These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replaces all the file content but the file size doesn’t change.
Overwrite Viruses Include:
§  Trj.Reboot
§  way
§  trivial.88.D

Direct Action Viruses
These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they keep on changing location.
Direct Action Viruses Include:
§  Vienna virus

Directory Virus
Also known as cluster virus or file system virus. They infect the computer’s directory by changing the path indicating file location. They are usually located in the disk but affect the entire directory.
Directory Viruses Include:
§  dir-2 virus

Web Scripting Virus
Most web pages include some complex codes in order to create an interactive and interesting content. Such a code is often exploited to cause certain undesirable actions. They mostly originate from the infected web pages or browsers.
Web Scripting Viruses Include:
§  JS.Fortnight – a virus that spreads via malicious emails.

Multipartite Virus
These type of viruses spread in many different ways. Their actions vary depending on the OS installed and presence of certain files. They tend to hide in the computer’s memory but do not infect the hard disk.
Multipartite Viruses Include:
§  flip
§  invader
§  tequila

FAT Viruses
These lardy viruses attack the file allocation table (FAT) which is the disc part used to store every information about the available space, location of files, unusable space etc.
FAT Viruses Include:
§  the link virus

Companion Viruses
These types of viruses infect files just like the direct action and the resident types. Once inside the computer, they ‘accompany’ other existing files.
Companion Viruses Include:
§  Asimov.1539
§  stator and terrax.1069

Polymorphic Virus
They encode or encrypt themselves in a different way every time they infect your computer. They use different encryption and algorithms. This makes it difficult for the antivirus software to locate them using signature or string searches (since they are very different in each encryption).
Polymorphic Viruses Include:
§  Marburg
§  tuareg
§  Satan bug
§  elkern

Worm
This program is very similar to a virus and has the ability to self-replicate leading to negative effects on your computer.
Worm Viruses Include:
§  lovgate.F
§  sobig.D
§  trile. C
§  PSWBugbear.B
§  Mapson

Trojans
Trojans can illegally trace important login details of users online. For example E-Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus installed.
Email Virus
This is a virus spread via an email. Such a virus will hide in an email and when the recipient opens the mail.
Browser Hijacker
This virus can spread in many different ways including a voluntary download. If infects certain browser functions especially in form of re-directing the user automatically to certain sites. A good example is Browser Hijackers Include:
§  the cool web search

Boot Infectors
They include the boot sector plus master boot record types. All the viral codes can be separate location; however they infect the hard disks or the floppy.
Boot Infectors Include:
§  the brain virus -it is the very first wild virus to be created.
From what we have seen, the many types of computer viruses and their effects are very harmful and can completely damage your system. Always make sure your system is up to date. Also install antivirus software. The antivirus program protects your computer and the personal information in it.