Introduction To Computer Part 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Introduction to computer

Dr. Ajab Khan Kasi


History of Computer

 It all started with computer hardware in


about 1940s.

ENIAC 1943
History of Computer

 ENIAC (Electronic Numerical Integrator


and Computer), at the U.S. Army's
Aberdeen Proving Ground in Maryland.
◦ built in the 1940s,
◦ weighed 30 tons,
◦ was eight feet high, three feet deep, and 100
feet long
◦ contained over 18,000 vacuum tubes that
were cooled by 80 air blowers.
History of Computer

 Computers were using vacuum tube


technology.

ENIAC’s vacuum tubes


History of Computer

ENIAC’s backside
History of Computer

Programs were loaded into memory manually using switches, punched


cards, or paper tapes.

ENIAC : coding by cable connections


History of Computer

punch card
History of Computer
Paper tape
History of Computer
History of Computer

 As time went on, card readers, printers, and


magnetic tape units were developed as additional
hardware elements.
 Assemblers, loaders and simple utility libraries
were developed as software tools.
 Later, spooling and channel program methods
were developed sequentially.
 (Spooling refers to placing data into an intermediate storage area, where it is held
until the computer (or the user) is ready to process it)
 (In computing, a channel is a model for innerprocess communication and
synchronization via message passing. A message may be sent over a
channel, and another process or thread is able to receive messages sent
over a channel it has a reference to, as a stream)
History of Computer

Commodore PET,
1977
History of Computer

Finally, the idea of multiprogramming


came.
 Multiprogramming means sharing of
resources between more than one
processes.
 By multiprogramming the CPU time is
not wasted, because, while one process
moves on some I/O work, the OS picks
another process to execute till the
current one passes to I/O operation.
History of Computer

 With the development of interactive


computation in 1970s, time-sharing
systems emerged.
 In these systems, multiple users have
terminals (not computers) connected to a
main computer and execute their task in
the main computer.
History of Computer

Main computer; having a CPU


executing processes by
utilization of the OS, (e.g. UNIX).

Terminals are connected


to the main computer and
used for input and output.
No processing is made.
They do not have CPUs.
History of Computer

 Another computer system is the


multiprocessor system having multiple
processors sharing memory and
peripheral devices.
 With this configuration, they have greater
computing power and higher reliability.
History of Computer

 Multiprocessor systems are classified into


two as tightly-coupled and loosely-
coupled (distributed).
 In the tightly-coupled one, each
processor is assigned a specific duty but
processors work in close association,
possibly sharing the same memory.
 In the loosely coupled one, each
processor has its own memory and copy
of the OS.
History of Computer

 Use of the networks required OSs


appropriate for them.
 In network systems, each process runs in
its own machine but the OS have access to
other machines.
 By this way, file sharing, messaging, etc.
became possible.
 In networks, users are aware of the fact that
s/he is working in a network and when
information is exchanged. The user explicitly
handles the transfer of information.
History of Computer

Each is a computer having its own


CPU, RAM, etc. An OS supporting
networks is installed on them.
History of Computer

 Distributed systems are similar to


networks. However in such systems, there
is no need to exchange information
explicitly, it is handled by the OS itself
whenever necessary.
DBMS
Database Management System or DBMS in short refers to the technology of
storing and retrieving users data with greatest efficiency along with appropriate
security measures.

Why to Learn DBMS?


Traditionally, data was organized in file formats. DBMS was a new concept
then, and all the research was done to make it overcome the deficiencies in
traditional style of data management. A modern DBMS has the following
characteristics −

Real-world entity − A modern DBMS is more realistic and uses real-world


entities to design its architecture. It uses the behavior and attributes too. For
example, a school database may use students as an entity and their age as an
attribute.

Relation-based tables − DBMS allows entities and relations among them to


form tables. A user can understand the architecture of a database just by
looking at the table names.
DBMS
Isolation of data and application − A database system is entirely different
than its data. A database is an active entity, whereas data is said to be passive,
on which the database works and organizes. DBMS also stores meta data,
which is data about data, to ease its own process.

Consistency − Consistency is a state where every relation in a database


remains consistent. There exist methods and techniques, which can detect
attempt of leaving database in inconsistent state. A DBMS can provide
greater consistency as compared to earlier forms of data storing applications
like file-processing systems.

Query Language − DBMS is equipped with query language, which makes it


more efficient to retrieve manipulate data. A user can apply as many and as
different filtering options as required to retrieve a set of data. Traditionally it
was not possible where file-processing system was used.
Applications of DBMS
Database is a collection of related data and data is a collection of
facts and figures that can be processed to produce information.

Mostly data represents recordable facts. Data helps in producing


information, which is based on facts. For example, if we have data
about marks obtained by all students, we can then conclude about
toppers and average marks.

A database management system stores data in such a way that it


becomes easier to retrieve, manipulate, and produce information.
Following are the important characteristics and applications of DBMS.

ACID Properties − DBMS follows the concepts of Atomicity,


Consistency, Isolation, and Durability (normally shortened as ACID).
These concepts are applied on transactions, which manipulate data in
a database. ACID properties help the database stay healthy in multi-
transactional environments and in case of failure.
Applications of DBMS

Multiuser and Concurrent Access − DBMS supports multi-user environment and


allows them to access and manipulate data in parallel. Though there are restrictions
on transactions when users attempt to handle the same data item, but users are
always unaware of them.
Multiple views − DBMS offers multiple views for different users. A user who is in the
Sales department will have a different view of database than a person working in the
Production department.This feature enables the users to have a concentrate view of
the database according to their requirements.
Security − Features like multiple views offer security to some extent where users are
unable to access data of other users and departments. DBMS offers methods to
impose constraints while entering data into the database and retrieving the same at a
later stage. DBMS offers many different levels of security features, which enables
multiple users to have different views with different features. For example, a user in
the Sales department cannot see the data that belongs to the Purchase department.
Additionally, it can also be managed how much data of the Sales department should
be displayed to the user. Since a DBMS is not saved on the disk as traditional file
systems, it is very hard for miscreants to break the code.
Computer Viruses
A virus is a small piece of software that attached with a real program and
run/replicate when the real program is started.

For example, a virus might attach itself to a program such as a spreadsheet program.
Each time the spreadsheet program runs, the virus runs, too, and it has the chance to
reproduce (by attaching to other programs) or create disaster.

E-mail viruses: An e-mail virus travels as an attachment to e-mail messages, and usually
replicates itself by automatically mailing itself to dozens of people in the victim's e-mail
address book. Some e-mail viruses don't even require a double-click -- they launch
when you view the infected message in the preview pane of your e-mail software.

Trojan horses: A Trojan horse is simply a computer program. The program claims to do
one thing (it may claim to be a game) but instead does damage when you run it (it may
erase your hard disk). Trojan horses have no way to replicate automatically.

Worms: A worm is a small piece of software that uses computer networks and
security holes to replicate itself. A copy of the worm scans the network for another
machine that has a specific security hole. It copies itself to the new machine using the
security hole, and then starts replicating from there, as well.
some tips to avoid viruses
 Install anti-virus software from a reputable vendor. Update it and use it regularly.

 In addition to scanning for viruses on a regular basis, install an "on access" scanner
(included in most anti-virus software packages) and configure it to start each time
you start up your computer. This will protect your system by checking for viruses
each time you run an executable file.

 Use a virus scan before you open any new programs or files that may contain
executable code. This includes packaged software that you buy from the store as
well as any program you might download from the Internet.

 If you are a member of an online community or chat room, be very careful about
accepting files or clicking links that you find or that people send you within the
community.

 Make sure you back up your data (documents, bookmark files, important email
messages, etc.) on disc so that in the event of a virus infection, you do not lose
valuable work.
Thank You

You might also like