BSC Computer Science Notes
BSC Computer Science Notes
A Text Code is a Static Code that allows you to enter text that you want people to see when
they scan the code.
Some disadvantages of the Text Code are that the codes cannot be changed or reused and if
you have any problems with the text code we unfortunately cannot help you with them.
Another disadvantage is that you cannot get additional features out of the QR Code such as
tracking information or Design Codes. One way to have the same effect as a Text Code while
still getting those features is to host a PDF or Document online
What is Flash Memory Technology?
Flash memory was first introduced in the 1980s and since then it has been used in many
applications and products: USB memory sticks, Compact Flash cards, SD memory cards,
computer non-volatile memory, solid state hard drives and more.
Flash memory is a non-volatile form of electronic data storage and as a result it is used in many
areas where short and medium term data storage is needed.
Computer Clock
Computers use an internal clock to synchronize all of their calculations. The clock ensures that
the various circuits inside a computer work together at the same time.
Clock speed is measured by how many ticks per second the clock makes. The unit of
measurement called a hertz (Hz), which is technically one cycle per second, is used to measure
clock speed.
What does Coprocessor mean?
A coprocessor is a supplementary processor unit or an entirely different circuitry that is
designed to complement the central processing unit (CPU) of a computer. Its basic functionality
is to offload other processor-intensive tasks from the CPU in order to achieve accelerated
system performance, by allowing the CPU to focus on tasks essential to the system. There are
various types of coprocessors available to perform unique tasks – from I/O interfacing or
encryption, string processing, floating-point arithmetic and signal processing.
Types of Microprocessor
Microprocessors are classified into five types, namely:
CISC-Complex Instruction Set Microprocessors, RISC-Reduced Instruction Set Microprocessor,
ASIC- Application Specific Integrated Circuit, Superscalar Processors, DSP’s-Digital Signal
Microprocessors.
1. Complex Instruction Set Microprocessors
The short term of Complex Instruction Set Microprocessors is CISM and they classify a
microprocessor in which orders can be performed together along with other low-level activities.
These types of processors perform different tasks like downloading, uploading, recalling data
into the memory card, and recalling data from the memory card. Apart from these tasks, it also
does complex mathematical calculations in a single command.
2. Reduced Instruction Set Microprocessor
The short term of Reduced Instruction Set Microprocessor is RISC. These types of
processors are made according to the function in which the microprocessor can carry out small
things in specific commands. In this way, these processors complete more commands at a
faster rate.
3. Superscalar Microprocessors
Superscalar processor facsimiles the hardware on the processor to perform various
tasks at a time. These processors can be used for ALUs or multipliers. They have different
operational units and these processors can carry out more than one command by continuously
transmitting several instructions to the extra operational units inside the processor.
4. The Application Specific Integrated Circuit
The short term of Application Specific Integrated Circuit processor is an ASIC. These
processors are used for particular purposes that include automotive emissions control or
personal digital assistant’s computer. This type of processor is made with the proper
specification, but apart from these, it can also be made with off the shelf gears.
5. Digital Signal Multiprocessors
Digital signal processors are also called DSP’s, these processors are used to encode and
decode the videos or to convert the D/A (digital to analog) &A/D (analog to digital). They need a
microprocessor that is excellent in mathematical calculations. The chips of this processor are
employed in RADAR, home theaters, SONAR, audio gears, TV set-top boxes, and Mobile phones
Magnetic disk: A magnetic disk is a storage device that uses a magnetization process to read,
write, rewrite and access data. The Magnetic disk is made of a set of circular platters. It is
covered with a magnetic coating and stores data in the form of tracks, spots, and sectors. Hard
disks, zip disks, and floppy disks are common examples of magnetic disks. The number of bits
stored on each track does not change by using the simplest constant angular velocity.
Optical disk: An optical disk is any computer disk that uses optical storage techniques and
technology to read and write data. It is a storage device in which optical (light) energy is used. It
is a computer storage disk that stores data digitally and uses laser beams to read and write
data. It uses the optical technology in which laser light is centered to the spinning disks.
System Software
System software is a type of computer program that is designed to run a computer's hardware
and application programs. If we think of the computer system as a layered model, the system
software is the interface between the hardware and user applications.
The operating system is the best-known example of system software. The OS manages all the
other programs in a computer.
Shareware
Shareware is software that is distributed free on a trial basis with the understanding that the
user may need or want to pay for it later. Some software developers offer a shareware version
of their program with a built-in expiration date (after 30 days, the user can no longer get access
to the program). Other shareware (sometimes called lite ware) is offered with certain
capabilities disabled as an enticement to buy the complete version of the program.
What is application software?
Application software is a type of computer program that performs a specific personal,
educational, and business function. Each program is designed to assist the user with a particular
process, which may be related to productivity, creativity, and/or communication.
User interface
The OS provides a user interface (UI), an environment for the user to interact with the machine.
The UI is either graphical or text-based.
it uses less memory
Running Programs
The OS is used to run programs by clicking on an icon, selecting the program from a menu, or
typing in an instruction at the command line.
When the OS runs a piece of software it has to find the program files on the storage drive, load
them into main memory, and instruct the CPU to start executing the program from the
beginning.
In each case, the OS performs the same sequence of steps:
1. the program code is found on the storage drive
2. a section of RAM is reserved for the program and space is allocated for the program's
data
3. the program code is copied from storage into the reserved space in the memory
4. the CPU program counter is set to the memory location of the first instruction in the
program, and execution begins
Managing Files
The OS manages how data is organized into files. This makes it easier for the user to see files
using programs like the Windows File Explorer or Mac OS X Finder. The OS organizes where and
how files are stored, deleted, read, found and repaired. It detects errors such as missing disks
or incorrect file names, and informs the user that errors have occurred.
Each file has a unique name and the OS maintains a set of look-up tables that relate file names
to locations on storage drives.
Hierarchies:
File systems work in a similar way to the way that libraries organize books. Folders and
directories correspond to different sections of the library. Inside each folder can be other
folders (sub-sections within a subject) and files (the books themselves). If you need to access a
specific file you just need to know how to look for it in the index which describes where each
file is located.
Managing Hardware:
The first task, managing the hardware and software resources, is very important, as various
programs and input methods compete for the attention of the central processing unit (CPU)
and demand memory, storage and input/output (I/O) bandwidth for their own purposes. In this
capacity, the operating system plays the role of the good parent, making sure that each
application gets the necessary resources while playing nicely with all the other applications, as
well as husbanding the limited capacity of the system to the greatest good of all the users and
applications.
Utility Programs:
Utility programs, commonly referred to as just "utilities," are software programs that add
functionality to your computer or help your computer perform better. These include antivirus,
backup, disk repair, file management, security, and networking programs
Maintenance utilities
These include:
Backup - This allows the user to restore the system to a previous state which is saved as
a backup. This is only usually used if a system malfunctions.
Disk cleaner - The storage drive is divided into a number of clusters. The table of
contents serves as an address book, keeping a record of each file and the clusters used
to store that file. When a file is deleted, the address to the location on the disk is
removed.
Disk defragmentation - When files are deleted, unused clusters become available for
reuse. These can end up being distributed across a drive, especially if the original files
were small. If a large file is then written to a drive, its data could be spread across
different clusters leading to file fragmentation. Defragmentation involves rearranging
the information on a disk so that files appear in continuous sequences of clusters. This
will improve file access times. Most modern operating systems run this process
automatically.
User accounts - allow the user to allocate specific users and protects personal files and
programs from unauthorized access.
Firewall - can be used to filter between trusted and untrusted networks and prevent
programs from communicating through the use of ports.
Uses of Computer Networks
Router
A router is a connecting device that transfers data
packets between different computer networks.
Typically, they are used to connect a PC or an
organization’s LAN to a broadband internet connection.
They contain RJ-45 ports so that computers and other
devices can connect with them using network cables
Bridges
A bridge connects two separate Ethernet network
segments. It forwards packets from the source network
to the destined network.
Gateways
Network Software
Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.
Explanation
In using network software, the size and scope of a network plays a key role in decision making.
Companies or other parties can choose specific network software tools for setup and
installation. Other network software resources help administrators and security personnel to
monitor a network to protect it against a range of attacks, to prevent data breaches, or to limit
unauthorized access. Other tools help to make network operations work better.
Another category of network software is related to network virtualization. With new virtual
networks, various tools take the place of old legacy systems built on physical hardware setups.
In general, network software must be applied according to security needs. This can include
factors such as whether a network is attached to the global Internet as well as specific goals and
objectives for use.
Data Communication over Telephone Lines
We can use serial I/O technique to send data over long distance through telephone lines. But,
telephone lines are designed to handle some specific range of voice; the bandwidth of
telephone lines range from 300 Hz to 3300 Hz. When the time of digital signals will be in
nanoseconds then we requires a bandwidth of several megahertz.
What is Modem?
A modem is short form of Modulator/Demodulator. Modem is a hardware component/device
which can connects computer and other devices such as router and switch to internet. Modems
converts or modulates the analog signals coming from telephone wire into digital form i.e in
form of 0 s and 1 s.
Modems of present time can transfer data at rates of 300-2400 bps (bits per second).
Generally, two types of modulation techniques are used: frequency-shift keying (FSK) for low-
speed modems and phase shift keying (PSK) for high-speed modems.
The first modems were “dial-up” which means we have to dial a phone number to connect
computer to ISP. Their maximum data transfer rate is almost 56 kbps. Modern modems are DSL
or cable modems. They have high data transfer rate and wider frequency range as compared to
dial-up modems.
ISDN
ISDN or Integrated Services Digital Network is a circuit-switched telephone network system that
transmits both data and voice over a digital line. You can also think of it as a set of
communication standards to transmit data, voice, and signaling.
These digital lines could be copper lines. It was designed to move outdated landline technology
to digital.
ISDN connections have a reputation for providing better speeds and higher quality than
traditional connections. Faster speeds and better connections allow data transmissions to travel
more reliably.
T1
A T1 line is a dedicated transmission connection between a service provider and client. It uses
an advanced telephone line to carry more data than a traditional standard analog line that
carries a single channel of data at 64 Kbps.
T1 line speed is consistent and constant. A T1 line can carry 24 voice channels for telephone
calls or digital data at a rate of 1.544 Mbps, and with usage of compression, carried channels
double to 48.
Explanation
Developed by AT&T Bell Laboratories in the late 1960s, traditional T1 lines use copper wire, but
most new installations use optical fiber. T1 lines use pulse-code modulation, which allows coder
and decoder sharing by multiple voice trunks. Channels are preconfigured to carry voice traffic
or Internet data
T3
A T3 line is a dedicated physical circuit that uses high-speed media to transmit data, voice and
video at the rate of 45 Mbps. It offers a broadband connection consisting of 672 individual
channels of 64 kilobits each.
They are commonly used in applications requiring high bandwidth, such as in research centers
and big organizations, to provide uninterrupted data transmission, and other multi-channel
services such as email and Internet. Other applications include Internet telephony, large file
transfers, telemedicine, videoconferencing, credit card processing and more.
A T3 line is also known as digital signal level 3 (DS3)
Explanation
T3 refers to the trunk line level 3, and is sometimes used interchangeably with DS3 (digital
signal level 3). In practice, the DS3 signal is transmitted over a T3 physical line, consisting of a
fiber optic cable or coaxial cable. The T3 lines, which are symmetrical and duplex, have equal
speeds on both upload and download, and therefore allow simultaneous transmissions without
clogging the data lines.
ATM
ATM stands for Asynchronous Transfer Mode. It is a switching technique that uses time
division multiplexing (TDM) for data communications.
ATM networks are connection oriented networks for cell relay that supports voice, video and
data communications. It encodes data into small fixed - size cells so that they are suitable for
TDM and transmits them over a physical medium.
The size of an ATM cell is 53 bytes: 5 byte header and 48 byte payload. There are two different
cell formats - user-network interface (UNI) and network-network interface (NNI). The below
image represents the Functional Reference Model of the Asynchronous Transfer Mode.
ATM Networks (tutorialspoint.com)