Transcript
7/29/2019 Comp Fundamentals Unit 3
1/57
Department of BCA Session: July 2008 Nov 2008 1/57
BCA103 - Computer Fundamentals
Computer software, or just software is a generalterm used to describe a collection of computerprograms, procedures and documentation that performsome tasks on a computer system.
What is Software?
Hardware is a general term that refers to thephysical artifacts of a technology. It may also meanthe physical components of a computer system, inthe form ofcomputer hardware.
What is Hardware?
A cultural artifact is a human-made object which
gives information about the culture of its creatorand users. The artifact may change over time inwhat it represents, how it appears and how and whyit is used as the culture changes over time.
http://en.wikipedia.org/wiki/Cultural_artifacthttp://en.wikipedia.org/wiki/Technologyhttp://en.wikipedia.org/wiki/Computer_systemhttp://en.wikipedia.org/wiki/Computer_hardwarehttp://en.wiktionary.org/wiki/objecthttp://en.wikipedia.org/wiki/Culturehttp://en.wikipedia.org/wiki/Culturehttp://en.wiktionary.org/wiki/objecthttp://en.wikipedia.org/wiki/Computer_hardwarehttp://en.wikipedia.org/wiki/Computer_systemhttp://en.wikipedia.org/wiki/Technologyhttp://en.wikipedia.org/wiki/Cultural_artifact7/29/2019 Comp Fundamentals Unit 3
2/57
Department of BCA Session: July 2008 Nov 2008 2/57
BCA103 - Computer Fundamentals
Middleware is the enabling technology ofenterpriseapplication integration. It describes a piece ofsoftware that connects two or more softwareapplications, allowing them to exchange data.
System software is any computer software whichmanages and controls computer hardware so thatapplication software can perform a task
Application software is a subclass of computersoftware that employs the capabilities of a computerdirectly and thoroughly to a task that the user wishesto perform.
What is Application Software?
What is System Software?
What is Middleware?
http://en.wikipedia.org/wiki/Enterprise_application_integrationhttp://en.wikipedia.org/wiki/Enterprise_application_integrationhttp://en.wikipedia.org/wiki/Enterprise_application_integrationhttp://en.wikipedia.org/wiki/Enterprise_application_integration7/29/2019 Comp Fundamentals Unit 3
3/57
Department of BCA Session: July 2008 Nov 2008 3/57
BCA103 - Computer Fundamentals
System software which is involved in integrating acomputer's various capabilities, but typically does notdirectly apply them in the performance of tasks that
benefit the user.
An electrical bulb is an application software.
Electric power generation plant is a system software.
What is computer programme?
A sequence of instructions written in a language thatcan be understood by the computer is called acomputer programme.
The software development is continuous process,where as hardware is a one time investment.
7/29/2019 Comp Fundamentals Unit 3
4/57
Department of BCA Session: July 2008 Nov 2008 4/57
BCA103 - Computer Fundamentals
Users
Application SoftwareSystem Software
Relationship between hardware to users.
Hardware
Examples of Application Software
Word Processing, Spreadsheets,Database Management Software
Graphics, multimedia, presentation software
7/29/2019 Comp Fundamentals Unit 3
5/57
Department of BCA Session: July 2008 Nov 2008 5/57
BCA103 - Computer Fundamentals
Service or Utility Software
File defragementation, Data compression
Backup software, data recovery software
Antivirus utility, screen savers.
System Software
TranslatorsCompilers, Assemblers, Interpreters
Operating system.
Operating system carries out variety of functions
Scheduling and loading, Resourcemanagement (memory,devices), Handlingerrors, CPU time management, MemoryManagement, communication with users.
7/29/2019 Comp Fundamentals Unit 3
6/57
Department of BCA Session: July 2008 Nov 2008 6/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Batch Processing- is known as serial, sequential, off line or stacked
job processing.
- Reduces the idle time of a computer systembecause transition from one job to another doesnot require operator intervention.
It allows sharing of computer resources amongmany users and programs,
- Does not allows the priority scheduling.
Batch processing has been associated withmainframe computers since the earliest days of
electronic computing in 1950sBatch processing has grown beyond its mainframeorigins, and is now frequently used in UNIXenvironments and Microsoft Windows too.
7/29/2019 Comp Fundamentals Unit 3
7/57
Department of BCA Session: July 2008 Nov 2008 7/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Multi-Tasking
Multitasking solves the problem by schedulingwhich task may be the one running at any giventime, and when another waiting task gets a turn.
In the case of a computer with a single CPU, onlyone task is said to be running at any point in time,meaning that the CPU is actively executinginstructions for that task.
The act of reassigning a CPU from one task toanother one is called a context switch.
Even on computers with more than one CPU,multitasking allows many more tasks to be runthan there are CPUs.
http://en.wikipedia.org/wiki/Scheduling_(computing)http://en.wikipedia.org/wiki/Context_switchhttp://en.wikipedia.org/wiki/Context_switchhttp://en.wikipedia.org/wiki/Scheduling_(computing)7/29/2019 Comp Fundamentals Unit 3
8/57
Department of BCA Session: July 2008 Nov 2008 8/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Multi-Processing- Two or more independent processors are linkedtogether in a coordinated system and instructionsfrom different and independent programs can beprocessed at the same instant in time by theprocessors.
- Many complex operations can be performed atthe same time.
- CPU can function on complementary units toprovide data and control for one another.
- Is used for major control applications such asrailroad control or airlines management.
7/29/2019 Comp Fundamentals Unit 3
9/57
Department of BCA Session: July 2008 Nov 2008 9/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Multi Programming- Is executing two or more different andindependent programs by the same computer.
- Permits more than one job to utilize the CPU timeat any moment using scheduling technique.
- The OS picks up any of the programs asscheduled and starts execution.
Multiprogramming doesn't give any guarantee thata program will run in a timely manner.
- Is optimize the resource utilization of a computersystem and supports multiple users.
Indeed, the very first program may very well run for
hours without needing access to a peripheral
7/29/2019 Comp Fundamentals Unit 3
10/57
Department of BCA Session: July 2008 Nov 2008 10/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Multi-ThreadingAs multitasking greatly improved the throughput ofcomputers, programmers started to implementapplications as sets of cooperating processes (e.g.one process gathering input data, one processprocessing input data, one process writing out results
on disk.)
Thus, threads are basically processes that run in
the same memory context.
Threads were born from the idea that the mostefficient way for cooperating processes to exchangedata would be to share their entire memory space
Threads are described as lightweightbecauseswitching between threads does not involvechanging the memory context.
http://en.wikipedia.org/wiki/Thread_(computer_science)http://en.wikipedia.org/wiki/Thread_(computer_science)7/29/2019 Comp Fundamentals Unit 3
11/57
Department of BCA Session: July 2008 Nov 2008 11/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Multi-ThreadingWhile threads are scheduled preemptively, someoperating systems provide a variant to threads,named fibers, that are scheduled cooperatively
Fibers are even more lightweight than threads
The simultaneous use of more than one CPU toexecute a program. Ideally, parallel processingmakes a program run faster because there are more
engines (CPUs) running it.
Parallel processing
separate CPUs can execute different portions withoutinterfering with each other.
http://en.wikipedia.org/wiki/Fiber_(computer_science)http://www.webopedia.com/TERM/P/execute.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/P/run.htmlhttp://www.webopedia.com/TERM/P/run.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/P/execute.htmlhttp://en.wikipedia.org/wiki/Fiber_(computer_science)7/29/2019 Comp Fundamentals Unit 3
12/57
Department of BCA Session: July 2008 Nov 2008 12/57
BCA103 - Computer Fundamentals
Types of Operating Systems
Online processingIt is a system that operates in an interactive modewith quick response time.
On line processing systems perform random andrapid input of transactions and provide immediate
access to the records.
operational deadlines from event to system response
Real time processing
By contrast, a non-real-time system is one for whichthere is no deadline, even if fast response or high
performance is desired or even preferred
The anti-lock brakes on a car are a simple exampleof a real-time computing system
http://en.wikipedia.org/wiki/Anti-lock_brakeshttp://en.wikipedia.org/wiki/Anti-lock_brakeshttp://en.wikipedia.org/wiki/Anti-lock_brakeshttp://en.wikipedia.org/wiki/Anti-lock_brakes7/29/2019 Comp Fundamentals Unit 3
13/57
Department of BCA Session: July 2008 Nov 2008 13/57
BCA103 - Computer Fundamentals
http://upload.wikimedia.org/wikipedia/commons/9/9d/ABS-Sensor.jpg7/29/2019 Comp Fundamentals Unit 3
14/57
Department of BCA Session: July 2008 Nov 2008 14/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
VirusA computer virus is a computer program that cancopy itself and infect a computer without permissionor knowledge of the user.
The original virus may modify the copies, or thecopies may modify themselves
A virus can only spread from one computer toanother when its host is taken to the uninfectedcomputer
Viruses are sometimes confused with computerworms and Trojan horses
A computer worm is a self-replicating computerprogram.
http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_program7/29/2019 Comp Fundamentals Unit 3
15/57
Department of BCA Session: July 2008 Nov 2008 15/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
VirusWorms almost always cause harm to the network, ifonly by consuming bandwidth, whereas virusesalmost always corrupt or modify files on a targetedcomputer.
Bandwidth (computing): a rate of data transfer, orbit rate, measured in bits per second
a Trojan horse, also known as a trojan, is malwarethat appears to perform a desirable function but infact performs undisclosed malicious functions.Therefore, a computer worm or virus may be aTrojan horse.
In general, a worm does not actually harm either thesystem's hardware or software.
http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malware7/29/2019 Comp Fundamentals Unit 3
16/57
Department of BCA Session: July 2008 Nov 2008 16/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
Residents Virus
Nonresident viruses can be thought of as consistingof a finder module and a replication module. Thefinder module is responsible for finding new files toinfect. For each new executable file the finder moduleencounters, it calls the replication module to infect
that file.
The virus loads the replication module into memorywhen it is executed and ensures that this module isexecuted each time the operating system is called to
perform a certain operation
Non-residents Virus
In this case, the virus infects every suitable programthat is executed on the computer.
7/29/2019 Comp Fundamentals Unit 3
17/57
Department of BCA Session: July 2008 Nov 2008 17/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
Most modern antivirus software is now designed tocombat a wide range of threats, including worms,phishing attacks, rootkits, trojan horses and othermalware
Antivirus software are computer programs thatattempt to identify, neutralize or eliminate malicioussoftware
In computing, phishing is the criminallyfraudulentprocess of attempting to acquire sensitive
information such as usernames, passwords and creditcard details, by masquerading as a trustworthy entityin an electronic communication.
Anti-Virus
http://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Rootkithttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malicious_softwarehttp://en.wikipedia.org/wiki/Malicious_softwarehttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Criminalhttp://en.wikipedia.org/wiki/Fraudhttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Fraudhttp://en.wikipedia.org/wiki/Criminalhttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Malicious_softwarehttp://en.wikipedia.org/wiki/Malicious_softwarehttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Rootkithttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Computer_worm7/29/2019 Comp Fundamentals Unit 3
18/57
Department of BCA Session: July 2008 Nov 2008 18/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
A rootkit is a program (or combination of severalprograms) designed to take fundamental control (inUnix terms "root" access, in Windows "Administrator"access) of a computer system, without authorizationby the system's owners and legitimate managers
Antivirus software typically uses two differentapproaches to identify virus:
1. examining (scanning) files to look for knownviruses matching definitions in a virus dictionary, and
2. identifying suspicious behavior from any computerprogram which might indicate infection
Anti-Virus
http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Computer_program7/29/2019 Comp Fundamentals Unit 3
19/57
Department of BCA Session: July 2008 Nov 2008 19/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
The suspicious behavior approach, by contrast,doesn't attempt to identify known viruses, butinstead monitors the behavior of all programs.
If one program tries to write data to an executable
program, for example, the antivirus software can flagthis suspicious behavior, alert a user, and ask what todo.
Unlike the dictionary approach, the suspiciousbehavior approach therefore provides protection
against brand-new viruses that do not yet exist inany virus dictionaries
Anti-Virus
http://en.wikipedia.org/wiki/Zero_day_virushttp://en.wikipedia.org/wiki/Zero_day_virushttp://en.wikipedia.org/wiki/Zero_day_virushttp://en.wikipedia.org/wiki/Zero_day_virus7/29/2019 Comp Fundamentals Unit 3
20/57
Department of BCA Session: July 2008 Nov 2008 20/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
Other approachesSome antivirus software use other types ofheuristic analysis.For example, it could try to emulate the beginning of the codeof each new executable that the system invokes beforetransferring control to that executable. If the program seemsto use self-modifying code or otherwise appears as a virus
However, this method could result in a lot of false positives.
Yet another detection method involves using a sandbox. Asandbox emulates the operating system and runs theexecutable in this simulation. After the program hasterminated, software analyzes the sandbox for any changeswhich might indicate a virus.
Also this method may fail as viruses can be nondeterministic so it will be impossible to detect it from one run.
Some virus scanners can also warn a user if a file is likely tocontain a virus based on the file type.
http://en.wikipedia.org/wiki/Heuristic_(computer_science)http://en.wikipedia.org/wiki/Self-modifying_codehttp://en.wikipedia.org/wiki/Sandbox_(computer_security)http://en.wikipedia.org/wiki/Nondeterministic_algorithmhttp://en.wikipedia.org/wiki/File_typehttp://en.wikipedia.org/wiki/File_typehttp://en.wikipedia.org/wiki/Nondeterministic_algorithmhttp://en.wikipedia.org/wiki/Sandbox_(computer_security)http://en.wikipedia.org/wiki/Self-modifying_codehttp://en.wikipedia.org/wiki/Self-modifying_codehttp://en.wikipedia.org/wiki/Self-modifying_codehttp://en.wikipedia.org/wiki/Heuristic_(computer_science)7/29/2019 Comp Fundamentals Unit 3
21/57
Department of BCA Session: July 2008 Nov 2008 21/57
BCA103 - Computer Fundamentals
Virus and Anti-virus
Computers SecurityThe computers security starts with a good virusscanner and never ends.
Typical approaches to improving computer securitycan include the following:1. Physically limit access to computers to only those
who will not compromise security.2. Hardware mechanisms that impose rules oncomputer programs, thus avoiding depending oncomputer programs for computer security.3. Operating system mechanisms that impose ruleson programs to avoid trusting computer programs.
A firewall is a device or set of devices configured topermit, deny, encrypt, decrypt, or proxy all computertraffic between different security domains based upona set of rules and other criteria.
7/29/2019 Comp Fundamentals Unit 3
22/57
Department of BCA Session: July 2008 Nov 2008 22/57
BCA103 - Computer Fundamentals
Machine and high level languages
Programming languages are said to be lower orhigher, depending on whether they are closer to thelanguage the computer itself uses or to the languagethat people use.
Here we will consider five levels (or generations) oflanguages:
1. Machine languages/1st generations2. Assembly languages / 2nd generations3. Procedural languages / 3rd generations4. Problem-oriented / 4th generations5. Natural languages / 5th generations
The closer the level is to human speech, the more it is
described as a user friendly language.
7/29/2019 Comp Fundamentals Unit 3
23/57
Department of BCA Session: July 2008 Nov 2008 23/57
BCA103 - Computer Fundamentals
Machine and high level languages
Machine languagesComputers are working two-state system, that is,on/off or yes/no.
In the early days of computers, with machines as theENIAC, which used vacuum tubes, one could actuallysee the tubes lit up or unlit (dark), corresponding to
the 1/0 binary stat the switch was either on or off.
In addition, in those early days there was no suchthing as software. There was only hardware withelectrical on/off switches.
Whenever a program was to be run, all the switches
had to be set sometimes as many as 6,000 switchesfor a single program.Then next program the switches had to be reset, aprocess that might take weeks.
7/29/2019 Comp Fundamentals Unit 3
24/57
Department of BCA Session: July 2008 Nov 2008 24/57
BCA103 - Computer Fundamentals
Machine and high level languages
Machine languagesAdvantage: execution is very fast and efficientbecause the computer can accept the machine codeas it is.
Disadvantage:1. there is no standard machine language2. The language are machine dependent.
Also called symbolic language or abbreviated ormnemonic code.Code are easily memorized replacing 0s and 1s of
machine language.
Assembly languages
Actually, assembly language do not replace machinelanguages.
7/29/2019 Comp Fundamentals Unit 3
25/57
Department of BCA Session: July 2008 Nov 2008 25/57
BCA103 - Computer Fundamentals
Machine and high level languages
The assembly languages code is very similar in formto machine language.
In fact, the first assembly languages had a one-to-one correspondence. That is, 20 assembly statementswould be translated into 20 machine statements.
Assembly languages
Advantage:1. standardized and easier to use than machinelanguage.2. Easier to debug because programs locate andidentify syntax errors.3. Operate very efficiently but not as efficient as themachine language.
Disadvantage:1. Still complex to code.2. Again machine dependent.3. Usually very long.
7/29/2019 Comp Fundamentals Unit 3
26/57
Department of BCA Session: July 2008 Nov 2008 26/57
BCA103 - Computer Fundamentals
Machine and high level languages
Assisted programmers by reducing further thenumber of computer operation details they had tospecify, so that concentrate more on the logic neededto solve the problem.
High level languages
The term "high-level language" does not imply that thelanguage is always superior to low-level programminglanguages - in fact, in terms of the depth of knowledge ofhow computers work required to productively program in agiven language, the inverse may be true.
high-level languages make complex programmingsimpler, while low-level languages tend to producemore efficient code
For this reason, code which needs to run particularlyquickly and efficiently may be written in a lower-levellanguage, even if a higher-level language would makethe coding easier.
http://en.wikipedia.org/wiki/Low-level_programming_languagehttp://en.wikipedia.org/wiki/Low-level_programming_languagehttp://en.wikipedia.org/wiki/Low-level_programming_languagehttp://en.wikipedia.org/wiki/Low-level_programming_languagehttp://en.wikipedia.org/wiki/Low-level_programming_languagehttp://en.wikipedia.org/wiki/Low-level_programming_language7/29/2019 Comp Fundamentals Unit 3
27/57
Department of BCA Session: July 2008 Nov 2008 27/57
BCA103 - Computer Fundamentals
Machine and high level languages
Procedural-oriented languageProblem-oriented language (BASIC, Pascal)Natural language
Types of High level languages
In a procedural-based programming language, aprogrammer writes out instructions that are followed
by a computer from start to finish.Example: c, c++, Basic, COBOL
Non procedural also called "declarative language,"users concentrate on defining the input and outputrather than the program steps required in aprocedural language such as C++, COBOL.
Query languages, report writers, interactive databaseprograms, spreadsheets and application generatorsare examples of non-procedural languages.
7/29/2019 Comp Fundamentals Unit 3
28/57
Department of BCA Session: July 2008 Nov 2008 28/57
BCA103 - Computer Fundamentals
MS DOS and Window OS
MSDOS is a single user operating system andtherefore all the resources are available to this user.
MS DOS
DOS contains three files:1. IO.SYS,2. MSDOS.SYS
3. Command.com
1. IO.SYSa) It verifies the input output devices and drivers.b) loads the file MSDOS.SYS from the hard disk
into memory.
2. MSDOS.SYSit is also called DOS Kernel.it is a link between BIOS and users applicationprograms.
7/29/2019 Comp Fundamentals Unit 3
29/57
Department of BCA Session: July 2008 Nov 2008 29/57
BCA103 - Computer Fundamentals
MS DOS and Window OS
MS DOSMSDOS has four important functions as:1. Process Control2. Memory management3. Application Program Interface (API)4. File Management System (FMS)
Process Control:Does the management of the program that is being
executedLoads program into the memory and initiates
execution of loaded program.
It also recovers the system files when programexecution is terminated in between.
7/29/2019 Comp Fundamentals Unit 3
30/57
Department of BCA Session: July 2008 Nov 2008 30/57
BCA103 - Computer Fundamentals
MS DOS and Window OS
Memory ManagementAllocates the memory to different application
programs.It also does file allocation according to memory
demand.
Application Program Interface:Works like an intelligent agent so that every program
is allotted to the various hardware devices.
File management system:Is the largest portion of the MSDOS.SYS.
It can read, write display and print the files.It can rename, copy and remove the files.
7/29/2019 Comp Fundamentals Unit 3
31/57
Department of BCA Session: July 2008 Nov 2008 31/57
BCA103 - Computer Fundamentals
MS DOS and Window OS
Command.comHas two portions as:
a) Resident portion. b) Transient portion.
Resident portion:
Contains internal commands in it.System can only be interrupted by using Ctrl+C incase of any execution error for job termination.
It displays the error message likeBad command or file nameAbort, Retry, Ignore?
It contains code required to reload the transientportion (external command) of command.com.
7/29/2019 Comp Fundamentals Unit 3
32/57
Department of BCA Session: July 2008 Nov 2008 32/57
BCA103 - Computer Fundamentals
MS DOS and Window OSTransient portion:It is the temporary portion of command.com.Any application program has shortage of memory
space, then transient portion is erased andmemory space is made available to applicationprogram.
When an application program is not in use orterminated, then it reload the erased portion.It displays dos prompt like A:/>, B:/>.
Booting:Can be defined loading of set of programs from the
ROM into RAM so that it creates an environment
for the execution of commands or furtherprocessing.
The loadable files are IO.SYS, MSDOS.SYS,Command.com
7/29/2019 Comp Fundamentals Unit 3
33/57
Department of BCA Session: July 2008 Nov 2008 33/57
BCA103 - Computer Fundamentals
MS DOS and Window OSWhile Booting:ROM startup routines set up addresses of ROM-BIOS
routines Interrupt Vector Table (IVT) at the lowend of memory.
RAM testROM startup routines check for standard and non-
standard equipment attached to computer.ROM startup routines reads from BIOS.For example,First attempt of booting from A:/> then C:/>
Types of Booting:Cold Booting: when we switched on. Slow in process.Hot Booting: when we press Reset button. Faster
than cold booting because it will not restartcomputer instead reload the files.
7/29/2019 Comp Fundamentals Unit 3
34/57
Department of BCA Session: July 2008 Nov 2008 34/57
BCA103 - Computer Fundamentals
MS DOS and Window OSInternal CommandsCLS DATE TIME VOLUME TIME VERCOPYCON TYPE REN DEL MD CDRD PATH COPY PROMPT
DIR DIR/P DIR/W DIR/S DIR with wildcard(*,?)
External Commands:EDIT to edit existing file.ATTRIB to change the attributes of files
example. +R read only, -R remove read only+H to hide -H to remove hide attribute
BACKUP create a copy to destination pathRESTORE copy the files in original pathCHKDSK DISKCOPY DELTREEFORMAT FDISK MOVE PRINT UNDELETE
7/29/2019 Comp Fundamentals Unit 3
35/57
Department of BCA Session: July 2008 Nov 2008 35/57
BCA103 - Computer Fundamentals
Database Management Systems
Information is the backbone of any organization.
What is information?Information is nothing but refined data, data that
have been put into a meaningful and usefulcontext and communicated to a recipient who
used it to make decisions.
Quality of InformationAccuracy:- means that information is free from mistakes and
errors
- Means that information is free from bias.- Manipulated information is worse than no
information.
7/29/2019 Comp Fundamentals Unit 3
36/57
Department of BCA Session: July 2008 Nov 2008 36/57
BCA103 - Computer Fundamentals
Database Management Systems
Quality of InformationTimeliness:- Means that getting the information to the
recipients within the needed time frame.- Breaking news
Relevancy:- Means the use of a piece of information for a
particular person.- Subjective matter.
What is Database?
A database consists ofdata, relationships, constraintsand schema.
- Data are binary computer representations ofstored logical entities.
7/29/2019 Comp Fundamentals Unit 3
37/57
Department of BCA Session: July 2008 Nov 2008 37/57
BCA103 - Computer Fundamentals
Database Management Systems
- Relationships represent a correspondence betweenthe various data elements.- Constraints are predicates that define the correct
database states where the scheme describes theorganization of data and relationships within thedatabase
- The schema defines the various views of thedatabase for database management systemcomponents use and for applications security.
Database- A collection of data designed to be used by
different people is called database.- The data are stored in such a fashion that they areindependent of the programs of people using thedata.
7/29/2019 Comp Fundamentals Unit 3
38/57
Department of BCA Session: July 2008 Nov 2008 38/57
BCA103 - Computer Fundamentals
Database Management SystemsWhy integrated database
- Data redundancyeach department has its own private files resultingstorage space is wasted. Hence the redundancycan be controlled.
- Data inconsistencyif a database is updated and not reflected in otherdepartment becomes data inconsistency.
- Integritymeans that the data in the database is accurate.
- Conflicting requirementsknowing the overall requirements as opposed to
the individual requirement, the database can bestructured to provide an overall service that isbest for the organization
7/29/2019 Comp Fundamentals Unit 3
39/57
Department of BCA Session: July 2008 Nov 2008 39/57
BCA103 - Computer Fundamentals
Database Management SystemsCharacteristics of data in a database
- Shareddata in a database are shared among differentusers and applications.
- Persistencethe data can live beyond the scope of the processthat created it.
- Validity: data should be correct with respect to thereal world.
- Security: data should be protected fromunauthorized access.
- Independent
the three levels in the schema (internal,conceptual and external) should be independent ofeach other so that the changes in the schema atone level should not affect the other levels.
7/29/2019 Comp Fundamentals Unit 3
40/57
Department of BCA Session: July 2008 Nov 2008 40/57
BCA103 - Computer Fundamentals
Database Management SystemsDatabase Management System
- A database management system (DBMS) is asoftware that provides services for accessing adatabase, while maintaining all the requiredfeature of the data.
Transaction processing
- Is a sequence is database operations thatrepresents a logical unit of work. It access adatabase and transforms it from one state toanother.
- It may be update, delete, modify etc.,
Concurrency management
- Is the database management activity ofcoordinating the actions of database manipulationprocess that operate concurrently, access shareddata and can potentially interfere with each other.
7/29/2019 Comp Fundamentals Unit 3
41/57
Department of BCA Session: July 2008 Nov 2008 41/57
BCA103 - Computer Fundamentals
Database Management SystemsRecovery
- Recovery mechanisms of a DBMS make sure thatthe database is returned to a consistent stateafter a transaction fails or aborts.
- Recovery is very much related to concurrency inthe sense that the more the concurrency, themore is the chance of an aborted transaction canaffecting many other transactions.
security- The level of access for each user and the
operations that each user can perform on the datawill be monitored and controlled by the DBMS
depending on the access privileges of the users.Language interface- Provides the definition and manipulation of the
data in the database. Ex DDL, DML
7/29/2019 Comp Fundamentals Unit 3
42/57
Department of BCA Session: July 2008 Nov 2008 42/57
BCA103 - Computer Fundamentals
Types of Database Management SystemsHierarchical Model
- Oldest database models (1950).- The hierarchical model assumes that a tree
structure is the most frequently occurringrelationship.
- This mislead restrictive view of relationships.
Network Model- Replaces the hierarchical tree with a graph thus
allowing more general connections among thenodes.
- A strict hierarchical arrangement is not possiblewhen an employee works for two departments,
then the tree will become graph.- In hierarchical model we have to place a data
simultaneously in two location in the list. Innetwork we can connect.
7/29/2019 Comp Fundamentals Unit 3
43/57
Department of BCA Session: July 2008 Nov 2008 43/57
BCA103 - Computer Fundamentals
Types of Database Management SystemsRelational Model
- The relational model uses tables to organize thedata elements. Each table corresponds to anapplication entity, and each row represents aninstance of that entity.
- For example , book database is an entity,- a book detail is an instance.
Object-oriented Model- OOM represents an entity as a class.- A class represents both object attributes as well
as the behavior of the entity.- For example, a book class will have not only the
book attributes (ISBN, Tile, Price) but alsoprocedure that imitate actions expected(updateprice()) of a book.
7/29/2019 Comp Fundamentals Unit 3
44/57
Department of BCA Session: July 2008 Nov 2008 44/57
BCA103 - Computer Fundamentals
Levels of database servicesPhysical Level
- At the lowest level, certain physical componentsorganize and store the raw data.
- In addition to hardware, these components includecontrol structures that track the location andformat of the stored data elements.
- Example: Buffer
- The physical layer typically has parameters thatcan be tuned for optimal performance under theaccess pattern of an applications.
- However in case of relation, object-orienteddatabase models, the tuning task is usually left tothe DBMS.
7/29/2019 Comp Fundamentals Unit 3
45/57
Department of BCA Session: July 2008 Nov 2008 45/57
BCA103 - Computer Fundamentals
Levels of database servicesConceptual Level
- Is isolating the data storage details to the physicallevel of DBMS, provides a convenientenvironment.
- The application objects exist at this level.Ex., Tables, views, triggers
- If the underlying hardware and OS changes, theconsequences limited to the interface between thephysical and conceptual layer.
- For example, OS is changed from UNIX to window,a new version of DBMS might be necessary.
7/29/2019 Comp Fundamentals Unit 3
46/57
Department of BCA Session: July 2008 Nov 2008 46/57
BCA103 - Computer Fundamentals
Levels of database servicesExternal Level
- Outer most layer- Different type of external views can use the same
conceptual view to satisfy the differing needs ofthe different users.
- The decoupling of the external and conceptuallevel is called logical data independence.
Database Design- A data base about a person may be consists of- Photograph, fingerprint, retina images- Name, age, sex, height, weight, address- Telephone number, blood, caste, religion, etc.,
Now the question is how much information about anentity should be collected.
7/29/2019 Comp Fundamentals Unit 3
47/57
Department of BCA Session: July 2008 Nov 2008 47/57
BCA103 - Computer Fundamentals
Database DesignData Normalization
- Normalization is the process of building databasestructures to store data.
- Data normalization is a corner stone of a relationaltheory.
- The different steps involved in data normalizationare called the normal forms.
- Each normal form builds upon the last version.
Keys- A key uniquely identifies a row in a table.Intelligent Keys- An intelligent key is based upon data values such
as a date, price, name.Non-Intelligent Keys- Is completely arbitrary, having no function or
meaning other than identification or a row.
7/29/2019 Comp Fundamentals Unit 3
48/57
Department of BCA Session: July 2008 Nov 2008 48/57
BCA103 - Computer Fundamentals
Database DesignIntelligent Keys
- Is problematic because the key value must bechanged to reflect changing data values.
- For example, price is changed, all related tablesmust be updated every time the key is updated.
Primary Keys- Is column in the table whose purpose is to
uniquely identify records from the same table.
Foreign Keys- A foreign key is a column in a table that uniquely
identifies the records from a different table.or
- The foreign key identifies a column or a set ofcolumns in one (referencing) table that refers to acolumn or set of columns in another (referenced)table
7/29/2019 Comp Fundamentals Unit 3
49/57
Department of BCA Session: July 2008 Nov 2008 49/57
BCA103 - Computer Fundamentals
Relationship
One-to-one- 1 to 1 relationships are rare, because data
elements related in this way are normally placedin the same table
One-to-many- When one data item can be linked to 0, 1 or many
other data items, you are dealing with a one-to-many relationship
- The same applies to the relationship that existsbetween a woman and her children. A woman can
have 0, 1 or many children and each child has onewoman as its mother.
7/29/2019 Comp Fundamentals Unit 3
50/57
Department of BCA Session: July 2008 Nov 2008 50/57
BCA103 - Computer Fundamentals
Relationship
Many-to-many- The many-to-many relationship is a relationship
where multiple rows from table A can correspond tomultiple rows in table B.
- An example of such a relationship is a school whereteachers teach students. In most schools each
teacher can teach multiple students and eachstudent can be taught by multiple teachers.- This relationships are problematic.- Normally this relationship expresses using
intersectiontables.- An intersection table contains two or more foreign
keys, relating the primary key values of two ormore tables to each other.
- The role of an intersection table is to convert manyto many into one-to-many.
7/29/2019 Comp Fundamentals Unit 3
51/57
Department of BCA Session: July 2008 Nov 2008 51/57
BCA103 - Computer Fundamentals
Normalization
- The guidelines for proper relational database designare laid out in the relational model. They aregrouped into 5 groups called "normalforms".
- The first normal form represents the lowest form ofdatabase normalization, the fifth represents thehighest form of database normalization.
- These normal forms are guidelines for gooddatabase design.- You are not obliged to adhere to all fivenormal
forms when designing a database.
- Nevertheless, you are advised to normalize you
database to some extent, because normalizationhas some significantadvantages in terms of theefficiency and maintainability of your database.
7/29/2019 Comp Fundamentals Unit 3
52/57
Department of BCA Session: July 2008 Nov 2008 52/57
BCA103 - Computer Fundamentals
Normalization
Whynormalization- Complex queries can be done using simple SQL
commands.
- Data Integrity.data integrity means that the data values in the
database are correct and consistent.
- Avoids data redundant
- Scalability.Scalability is the ability to meet with future growth
demands
7/29/2019 Comp Fundamentals Unit 3
53/57
Department of BCA Session: July 2008 Nov 2008 53/57
BCA103 - Computer Fundamentals
Normalization
The first normal form (1NF)A database table is a representation of an "entity" in
the system you are building.Examples of entities are order, customer, contact
moment, product, etc.Each row in the database table represents one
occurrence of an entity. For example in a customertable each row will contain information about 1customer.
Each table has a primary key, consisting of thesmallest possible number of fields.
Atomicity: each field contains one value. An adres forexample, would ideally be stored in three separatefields: number, street, city.
7/29/2019 Comp Fundamentals Unit 3
54/57
Department of BCA Session: July 2008 Nov 2008 54/57
BCA103 - Computer Fundamentals
Normalization
The second normal form (2NF)The second normal deals with data redundancy. The
rules comprised in the second normal form are asfollows.
The database fullfills all the requirements of thefirst normal form
All non-primary-key fields in a table must be fullydependent on the entire primary key of the table
The third normal form (3NF) Already meet the requirements of both 1NF and
2NF
Remove columns that are not fully dependent uponthe primary key.
http://databases.about.com/od/specificproducts/l/aa1nf.htmhttp://databases.about.com/od/specificproducts/a/2nf.htmhttp://databases.about.com/library/glossary/bldef-column.htmhttp://databases.about.com/library/glossary/bldef-primarykey.htmhttp://databases.about.com/library/glossary/bldef-primarykey.htmhttp://databases.about.com/library/glossary/bldef-column.htmhttp://databases.about.com/od/specificproducts/a/2nf.htmhttp://databases.about.com/od/specificproducts/l/aa1nf.htm7/29/2019 Comp Fundamentals Unit 3
55/57
Department of BCA Session: July 2008 Nov 2008 55/57
BCA103 - Computer Fundamentals
Normalization
For example, we will normalize following fields:Order NumberCustomer NumberUnit PriceQuantityTotal
Remember, our first requirement is that the table mustsatisfy the requirements of1NF and 2NF.Are there any duplicative columns?No.Do we have a primary key?Yes, the order number. Therefore, we satisfy the
requirements of 1NF.Are there any subsets of data that apply to multiple
rows? No, so we also satisfy the requirements of2NF.
7/29/2019 Comp Fundamentals Unit 3
56/57
Department of BCA Session: July 2008 Nov 2008 56/57
BCA103 - Computer Fundamentals
Normalization
Now, are all of the columns fully dependent upon theprimary key? The customer number varies with theorder number and it doesn't appear to depend uponany of the other fields.
What about the unit price? This field could be
dependent upon the customer number in a situationwhere we charged each customer a set price.
However, looking at the data above, it appears wesometimes charge the same customer differentprices. Therefore, the unit price is fully dependent
upon the order number.
The quantity of items also varies from order to order,so we're OK there.
7/29/2019 Comp Fundamentals Unit 3
57/57
Department of BCA Session: July 2008 Nov 2008 57/57
BCA103 - Computer Fundamentals
What about the total? It looks like we might be in
trouble here. The total can be derived bymultiplying the unit price by the quantity, thereforeit is not fully dependent upon the primary key. Wemust remove it from the table to comply with thethird normal form.
Perhaps we use the following attributes:
Order number
Customer number
Unit price
Quantity
Now our table is in 3NF. But you might ask, whatabout total? This is a derived field and it is best notto store it in the database at all. We can computeit.
top related