Computer Fundamentals PDF
Computer Fundamentals PDF
Applications of Computers:
Computers are used in almost every field today. Some common applications
are:
Education – online learning, e-books, and research.
Business – Managing data, emails, and video meetings.
Healthcare – Keeping patient records and diagnosing diseases.
Entertainment – Watching movies, playing games, and listening to music.
Banking – Online banking, ATMs, and digital payments.
Shopping – Buying and selling products online.
Communication – Emails, video calls, and social media.
Science & Research – Weather forecasting, space exploration, and
experiments.
Features of Computers:
Speed – Can process millions of calculations in seconds.
Accuracy – Gives correct results if the input is correct.
Automation – Can perform tasks automatically without human help.
Storage – Stores large amounts of data.
Connectivity – Connects with the internet to share information.
Multitasking – Can run many programs at the same time.
User-Friendly – Easy to use with software and apps.
Advantages of Computers:
Fast and Efficient – Saves time and effort.
Stores Large Data – Keeps important files safely.
Reduces Human Effort – Automates work and reduces errors.
Helps in Learning – Provides access to knowledge and online courses.
Improves Communication – Connects people worldwide through emails
and video calls.
Entertainment – Offers games, music, movies, and social media.
Disadvantages of Computers:
Cybersecurity Issues – Can be hacked, and data can be stolen.
Health Problems – Long screen time can harm eyes and posture.
Expensive – High-quality computers and software can be costly.
Job Loss – Replaces some human jobs with automation.
Addiction – Overuse can lead to distraction and less physical activity.
Classification of Computers:
Computers can be classified based on their size, purpose, and processing
power.
Based on Purpose:
General-Purpose Computers – Used for various tasks (e.g., PCs, Laptops).
Types of Hardware:
Input Devices – Devices used to enter data into a computer.
Example: Keyboard, Mouse, Scanner, Microphone
Types of Software:
System Software – Controls computer hardware and system operations.
Example: Operating System
User Experience (UX) – How users feel when using a system (e.g., ease of use,
efficiency).
Input and Output Devices – How users interact with the system (e.g., keyboard,
touchscreens, voice commands).
Usability – Making systems simple, intuitive, and accessible for all users.
Importance of HCI:
Improves the ease of using computers and software.
Enhances productivity by reducing errors and confusion.
Helps in designing technology that is accessible to everyone.
Ensures a smooth and enjoyable user experience.
E-Classroom:
An E-classroom is a technology-enhanced learning space where digital tools
improve teaching and learning.
Features:
Smart Boards and Projectors – For interactive teaching.
Online Attendance Systems – Automates student tracking.
Virtual Labs – For online practical learning.
Cloud-Based Learning – Stores and shares study materials.
E-Library:
An E-Library is a digital collection of books, research papers, and study
materials accessible online.
Benefits:
24/7 access to books and journals.
Saves physical space and resources.
Searchable databases for easy information retrieval.
Examples: Google Books, World Digital Library
Data Analysis:
Data analysis involves processing and interpreting data to extract useful
insights. Computers assist in handling large datasets efficiently.
Features:
Handles large datasets efficiently.
Supports machine learning and AI models.
Used in academic and industry research.
Google Scholar:
Google Scholar is a free academic search engine that helps researchers find
scholarly articles, research papers, and books.
Features:
Searches peer-reviewed papers and journals.
Provides citation tracking.
Links to full-text PDFs and publisher websites.
Input and Output Technologies
Input Devices:
An input device is any hardware component used to enter data, commands, or
signals into a computer. These devices convert human actions (such as typing
or touching) into digital signals that the computer can process.
How it works:
The user interacts with the input device (e.g., pressing a key, moving a
mouse).
The device converts the action into electrical signals.
The signals are sent to the computer’s processor for interpretation.
The computer processes the data and responds accordingly.
Output Devices:
An output device is any hardware component that receives processed data
from the computer and presents it to the user in a readable form.
How it works:
The computer processes user input and generates an output signal.
The output signal is sent to the appropriate device.
The device converts the digital signal into a form understandable by
humans (text, images, sound, etc.).
Display Technologies:
Display technologies refer to the various methods used to visually present
information on screens.
Technologies:
DRAM (Dynamic RAM) – Common in desktops and laptops.
SRAM (Static RAM) – Faster but more expensive, used in cache memory.
ROM (Read-Only Memory) – Stores essential instructions for booting the
system.
Technologies:
PROM (Programmable ROM) – Can be programmed once.
EPROM (Erasable PROM) – Can be erased and reprogrammed.
EEPROM (Electrically Erasable PROM) – Used in BIOS firmware.
Cache Memory – High-speed memory between CPU and RAM for quick
access.
Registers – Ultra-fast memory inside the CPU for immediate data
processing.
Secondary Memory and Technologies:
Secondary memory (storage memory) is non-volatile, meaning data is retained
even when the computer is turned off. It is used for long-term data storage.
Cloud Storage – Remote servers storing data accessible via the internet.
Computers use primary memory for fast processing and secondary memory for
long-term storage, ensuring efficient and reliable computing.
Inside a Computer
Common Ports:
USB Ports (Type-A, Type-C) – Connect peripherals like mic and
keyboards.
Types:
PCIe (Peripheral Component Interconnect Express) – Used for graphics
cards, sound cards, and SSDs.
PCI Slots – Older standard for expansion cards.
M.2 Slots – For high-speed SSDs and Wi-Fi cards.
Ribbon Cables:
Ribbon Cables are flat, flexible cables used to connect internal components like
storage drives (HDD, SSD), optical drives, and older peripherals inside the
computer.
Third-Party Devices:
Third-party devices are additional components from external manufactures
that enhance a computer’s capabilities.
Examples:
Graphics Cards (NVIDIA, AMD) – Boosts gaming and video processing.
Sound Cards – Improves audio quality.
Cooling Systems (Liquid Cooling, Extra Fans) – Prevents Overheating.
Block Diagram of a Computer:
A block diagram represents the structure of a computer system, showing how
different components interact.
Logic Gates:
Logic gates are fundamental building blocks of digital circuits. They perform
logical operations on binary inputs (0s and 1s) to produce specific outputs.
Binary arithmetic is the way computers add, subtract, multiply, and divide
numbers using only 0s and 1s. Since computers work in binary (Base-2), they
perform calculations just like we do in the decimal system, but with only two
digits: 0 and 1.
Binary Addition:
Works like normal addition, but follows these rules:
0+0=0
0+1=1
1+0=1
1 + 1 = 10 (0 is written, 1 is carried forward)
Binary Subtraction:
Uses borrowing like in decimal subtraction.
Rules:
0–0=0
1–0=1
1–1=0
0 – 1 = 1 (borrow 1 from the next higher bit)
Binary Multiplication:
Same as decimal multiplication, but with 0s and 1s.
Rules:
0x0=0
0x1=0
1x0=0
1x1=1
Binary Division:
Follows the same rules as decimal division.
Example:
1010 / 10 = 101 (10 in binary divided by 2 gives 5)
The Central Processing Unit (CPU) is the brain of a computer. It performs all the
calculations, logic operations, and instructions required to run programs.
Functions of CPU:
The CPU has three main functions:
Fetch – Retrieves instructions from memory.
Decode – Interprets the instructions.
Execute – Carries out the instructions.
Components of CPU:
The CPU consists of several key components:
CPU Registers:
Small, high-speed memory locations inside the CPU.
Store temporary data, instructions, and addresses.
Examples: Accumulator (AC), Program Counter (PC), Instruction Register (IR),
Stack Pointer (SP).
Cache Memory:
Cache memory is a small, high-speed memory located inside or very close to
the CPU.
It stores frequently used data to make processing faster.
Uses:
Speeds up processing by reducing access time to data.
Reduces CPU waiting time for data from RAM.
Improves overall system performance.
System Bus – Types and Technologies:
The system bus is responsible for communication between CPU, memory, and
other components.
Bus Technologies:
PCI (Peripheral Component Interconnect)
PCIe (PCI Express) – Faster version for modern systems.
USB (Universal Serial Bus) – Used for external device connections.
Cyber Security Threats
Cybersecurity threats are dangers that target computers, networks, and data,
aiming to steal, damage, or disrupt systems. These threats come in various
forms, including malware, viruses, hacking, and data breaches. Protecting
against these threats is crucial for personal users, business, and governments.
Computer Virus:
A computer virus is a type of malware that attaches itself to files and spreads
when the infected file is opened.
Classification of Viruses:
File infector Viruses – Attach to executable files.
Boot Sector Viruses – Infect the boot section of a hard drive.
Macro Viruses – Target documents like Word or Excel.
Polymorphic Viruses – Change their code to evade detection.
Metamorphic Viruses – Completely rewrite themselves to avoid anti-
virus software.
Anti-Virus:
Anti-virus software detects, prevents, and removes malware.
Windows Defender – Built into windows; basic protection.
Norton Antivirus – Strong protection; requires a paid subscription.
McAfee – Offers web and identity protection features.
Bitdefender – Lightweight and powerful security software.
Kaspersky – Effective defection but has privacy concerns in some
countries.
Hacking:
Hacking is the process of gaining unauthorized access to a system or network.
Types of Hackers:
White Hat Hackers (Ethical Hackers) – Help improve security.
Black Hat Hackers – Malicious hackers who steal data or damage
systems.
Gray Hat Hackers – Sometimes break laws but don’t harm users.
Security Firewalls:
A firewall is a security system that monitors and controls incoming and
outgoing network traffic based on security rules.
Types of Firewalls:
Software Firewall – Installed on individual computers (e.g., Windows
Firewall).
Hardware Firewall – Physical devices that protect entire networks.
Cloud Firewall – Online-based protection for cloud environments.
Firewall Functions:
Blocks unauthorized access.
Filters harmful data packers.
Prevents malware from spreading.
Modern Computing:
Modern Computing has evolved significantly, enabling faster processing,
wireless connectivity, big data analysis, cloud-based solutions, and smart
devices. These advancements improve efficiently, automation, and accessibility
in various industries, including business, healthcare, and finance.
Wireless Technologies:
Wireless technologies allow devices to communicate without physical cables.
Data Mining:
Process of extracting useful patterns from large datasets.
Used in business, healthcare, fraud detection, and AI.
Cloud Computing:
Cloud computing allows users to store, process, and access data over the
internet instead of local computers.
Types of Cloud Computing:
Public Cloud – Services offered by providers like AWS, Google Cloud,
Microsoft Azure.
Private Cloud – Exclusive cloud services for business.
Hybrid Cloud – A mix of public and private cloud solutions.
Benefits:
Cost-effective and scalable.
Accessible from anywhere.
Improves data security and backup.
Mobile Computing:
Mobile computing allows users to work and access data from mobile devices
anywhere.
Applications:
Mobile banking
Online Shopping
GPS navigation
Remote work and communication
Internet of Things (IoT):
IoT connects smart devices to the internet to communicate and automate
tasks.
Examples:
Smart Home Devices – Smart lights, thermostats, security cameras.
Smart Cars – Self-driving vehicles and GPS tracking.
Industrial IoT (IIoT) – Automated manufacturing and monitoring systems.
Healthcare IoT – Wearable devices like smartwatches and health
monitors.
Embedded Systems:
Embedded systems are specialized computing systems built into devices to
perform dedicated functions.
Automobiles – ABS brakes, airbags, engine control.
Medical Devices – Pacemakers, MRI scanners.
Consumer Electronics – Smart TVs, gaming consoles.
Cryptocurrency:
Cryptocurrency is a digital currency that uses encryption for security.
Bitcoin (BTC) – The first and most well-known cryptocurrency.
Ethereum (ETH) – Supports smart contracts and decentralized apps.
Ripple (XRP) – Used for fast cross-border payments.
Features of Cryptocurrency:
Decentralized – No central authority like banks.
Uses blockchain for security.
Allows anonymous transactions.