SlideShare a Scribd company logo
1 of 45
Download to read offline
1 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 1 of 45
Task 01
Task 1.1
Data
Data are the collection of facts, numbers, letters, images and measurements that are not
processed in any mean.
e.g.:- Jack: - 64, 76
Katherine: - 86, 56
Salam: - 89, 67
Kumar: - 45, 35
According to the above example, you may notice a set of data has been arranged for some
specific purpose. However you may also realize that in order to get a correct idea, these data
has to be processed in some form.
Information
Information is systematically processed data that gives a capacity to understand meaning to
the recipient.
Information help us making decision or arriving at conclusions easily. However to make
decisions easily we have to organize data into information.
e.g.:
Name Marks for the first subject Marks for the second subject
Jack 64 76
Katherine 86 56
Salam 89 67
Kumar 45 35
Table 1.1
2 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 2 of 45
Different between Data & Information
Data Information
 Unprocessed facts and figures.
 Data can be identified as input of
computer.
 One could not understand the
data easily.
 Data is presented in an
unorganized way.
 Gives the results of a research
directly without arranging.
 The user can’t take decision by
only referring the data.
 Processed data.
 Information can be identified as output
of the computer.
 Information is meaningful and relevant
and it’s easy for the user to
understand.
 Information is presented in an
organized way.
 Gives the result of a research in a
proper arrangement.
 The information can be used
beneficially and take proper decision.
Table 1.2
3 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 3 of 45
Task 1.2
Computer System
The computer system can be categorized in to four main part.
1) Hardware
2) Software
3) Liveware
4) Firmware
1) Hardware
Physical (electronic or mechanical) parts of the computer external or internal are called
hardware.
a. Input devices
b. Output devices
c. CPU (Central processing unit)
d. Storage devices
Input Devices
The devices which are used to input information, instructions and commands are input
devices. Input devices convert data in to a form that machine understand.
e.g.: Keyboard, Mouse, Scanner, Microphone, Web camera, Light pen and etc....
Output Devices
Output devices used to output information. It processes the data and output it in a way the
user could understand.
e.g.:- Monitor, printer, speaker and etc….
CPU (Central Processing Unit)
The central processing unit processes the commands and instruction which given by the user.
Its main job is controlling the computer. It is also known as brain of the computer.
This consists of three parts.
 Control unit
 Arithmetic and logic unit (ALU)
 Memory registers
4 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 4 of 45
Storage Devices
Storage devices are used to store data & information in the computer. When CPU needs some
data, the data is brought from storage devices to memory and CPU.
There are two types of storage devices.
 Primary storage: RAM, ROM
 Secondary storage: Hard disk, DVD, Pen drive
2) Software
Software can be defined as a set of intangible rules and instructions that has been written
by using a certain computer language to do specific set of tasks.
It can be classified into two major categories.
 System Software
 Application Software
System Software
This is a type of software that runs on top of hardware to make the hardware useable
1) Operating System: It is a must for the computer to have an operating system to work.
The main function of an operating system is to provide an
interface for its
User by hiding the complexity of computer hardware and other
software so that user can easily access the relevant software.
e.g.: Windows, Linux, Mac and UNIX
Utilities Application Software
Operating System
Hardware
Figure 1.1
2) Utilities: These are the software that help the user efficiently use the computer.
e.g.: Anti-virus software, Troubleshooting tools and Diagnostic tools
User
5 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 5 of 45
Application Software
Application software is software that performs useful task and helps the computer itself.
Application software are mostly designed to fulfill the general user requirement. Application
software runs on the top of the system software by giving more features to the user in order
to utilize the available hardware devices.
 Packages: MS office package, graphic designing software
 Computer languages: Java, C++, Visual basic, Pascal, Fortran
3) Liveware
All type of users that use the computer system can be generally called as Liveware.
Liveware also plays a major role in computer system. Liveware is responsible for giving
commands and instructions to the computer, to get the work done.
e.g.: Normal computer user
Programmers
Data entry operators
4) Firmware
A set of rules and regulation written in the form of software and permanently stored
in ROM chips or BIOS chips by the chip manufactures.
It is another form of system tool helps to continue the system operations.
e.g.: Bootstrap programs
Self-diagnostic program
6 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 6 of 45
Task 1.3
Computer System Diagram
Computer System
Hardware
InputDevices
Output
Devices
CPU
Storage
Devices
Software
System
Software
Operating
System
Utilities
Application
Software
Computer
Language
Packages
Liveware
Computer
Users
Firmware
Bootstrap
Programs
Selfdiognastic
Programs
7 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 7 of 45
Task 1.4
Structure of the CPU
Data/Information Flow
Control Information Flow
Program Instruction Flow
Functionality of the CPU
The Central Processing Unit is called the brain of the computer. This consists of three parts:
1) Control Unit (CU)
2) Arithmetic & Logic Unit (ALU)
3) Memory Registers
1) Control Unit (CU)
All the controlling of the computer is done by this unit. This controls all the devices of
the computer giving the required commands when necessary.
2) Arithmetic Logic Unit (ALU)
This unit performs all kinds of arithmetic calculations and logical operations.
Control Unit
Arithmetic
&
Logical Unit
Primary Storage
Secondary Storage
Output DeviceInput Device
Figure 1.2
8 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 8 of 45
3) Memory Registers
The Memory registers are included in the processing unit and it stores the data which
are ready to be sent to the Central Processing Unit for calculations or processing.
Task 1.5
Clock Speed
In the Central Processing Unit, its speed is an important factor. The computer speed is
sometimes called the clock speed as well. The unit Hertz (Hz) is used to measure the speed of
the Central Processing Unit while units such as megahertz (MHz) and gigahertz (GHz) are used
to measure the speed of modern computers. In the comparison of computers, the speed is
considered a strong factor.
1000 Hz = 1 KHz
1000 KHz = 1 MHz
1000MHz = 1 GHz
9 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 9 of 45
Task 1.6
Bus Architectures
Buses can be easily identified on the motherboard and called as the center piece of
connecting all the peripheral devices to the computer system. A bus is a subsystem that
transfer data between computer components inside a computer or between computers.
Buses can be identified in 3 different forms, which do 3 different functionalities.
1. Data Bus
2. Address Bus
3. External data bus
Data Bus
It is responsible for transporting data only within the motherboard boundary to different
locations. A data bus has many different defining characteristics, but one of the most
important is its width. The width of a data bus refers to the number of bits (electrical wires)
that make up the bus. Common data bus widths include 1-, 4-, 8-, 16-, 32-, and 64-bit.
Address Bus
An address bus is a computer bus architecture used to transfer data between devices that are
identified by the hardware address of the physical memory (the physical address), which is
stored in the form of binary numbers to enable the data bus to access memory storage.
External data bus
All the external device will be connected to the mother board. Through the external ports,
external data buses responsible for transporting data from processor to external ports.
10 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 10 of 45
Task 1.7
MIPS
“Instruction per second” (IPS) is measure of a computer’s processor speed. The term is
commonly used in association with a numeric value such as thousand instruction per second
(KIPS), Million instruction per second (MIPS).
MIPS measures roughly the number of machine instructions that a computer can execute in
one second. However, different instructions require more or less time than others, and there
is no standard method for measuring MIPS. In addition, MIPS refers only to the CPU speed. A
computer with a high MIPS rating, therefore, might not run a particular application any faster
than a computer with a low MIPS rating.
Task 1.8
Pipelining
A pipeline is a set of data processing elements connected in series, so that the output of one
element is the input of the next one. In most of the cases we create a pipeline by dividing a
complex operation into simpler operations. We can also say that instead of taking a bulk thing
and processing it at once, we break it into smaller pieces and process it one after another.
Pipelining seeks to use every portion of the processor busy with some instruction.
FLOOPS
FLOPS means floating point operations per second. It is the process of identifying how many
floating points can be operated or processed within a second. FLOPS measures the computing
ability of a computer. A floating-point operation is a calculation of mathematical equation.
This is one main function of ALU under the instructions of Control Unit. Especially under the
arithmetic functions, ALU is responsible for the completion of floating point operations. This
indicates how faster a processer can perform and how faster the ALU can complete floating
point operations.
11 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 11 of 45
Task 1.9
Binaries in to Decimal
1. Write the binary number.
2. Find the place value of each digits.
3. Multiply the digits with the place value.
4. Add the values calculated above.
5. That sum represents the decimal value of the relevant binary value.
1) 110011002
1 1 0 0 1 1 0 02
110011002 = 20410
27
26
25
24
23
22
21
20
= (27*1) + (26*1) + (25*0) + (24*0) + (23*1) + (22*1) + (21*0) + (20*0)
= (128*1) + (64*1) + (32*0) + (16*0) + (8*1) + (4*1) + (2*0) + (1*0)
= 128 + 64 + 0 + 0 + 8 + 4 + 0 + 0
= 204
2) 101011102
1 0 1 0 1 1 1 0
101011102 = 17410
27
26
25
24
23
22
21
20
= (27*1) + (26*0) + (25*1) + (24*0) + (23*1) + (22*1) + (21*1) + (20*0)
= (128*1) + (64*0) + (32*1) + (16*0) + (8*1) + (4*1) + (2*1) + (1*0)
= 128 + 0 + 32 + 0 + 8 + 4 + 2 + 0
= 174
3) 111001012
1 1 1 0 0 1 0 1
111001012 = 22910
27
26
25
24
23
22
21
20
= (27*1) + (26*1) + (25*1) + (24*0) + (23*0) + (22*1) + (21*0) + (20*1)
= (128*1) + (64*1) + (32*1) + (16*0) + (8*0) + (4*1) + (2*0) + (1*1)
= 128 + 64 + 32 + 0 + 0 + 4 + 0 + 1
= 229
12 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 12 of 45
Task 1.10
Decimal in to Binaries
9710
2 97
2 48 - 1
2 24 - 0
2 12 - 0
2 6 - 0
2 3 - 0
2 1 - 1
0 - 1
9710 = 11000012
11210
2 112
2 56 0
2 28 0
2 14 0
2 7 0
2 3 1
2 1 1
1
11210 = 11100002
12710
2 127
2 63 1
2 31 1
2 15 1
2 7 1
2 3 1
2 1 1
0 1
12710 = 11111112
13 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 13 of 45
Task 02
Task 2.1
Storage Devices
Which are used to store data and information are called Storage devices.
Storage can be divided into two main parts:
1) Primary Storage
2) Secondary Storage
1) Primary Storage
Primary Storage devices are manufactured using Semiconductors. The main task of
the Primary Storage is to store data temporarily to provide the necessary data to the
Central Processing Unit. The basic task of the Secondary Memory is to store data,
instructions and information needed for further use.
Random access memory (RAM)
The main task of the Random Access Memory, is to store temporarily the data which are
needed to the Central Processing Unit. Everything in the Random Access Memory, which
belongs to the type of Volatile Memory, is lost with a power failure. Therefore, all the data or
information which is considered to be important should necessarily be saved in a unit of
Secondary Memory.
The capacity of the Random Access Memory is important for the efficiency of a computer.
Further, it is possible to increase the capacity of the Random Access Memory adding memory
units as required.
There are two main forms of RAM (Random Access Memory). They are:
 Static Random Access Memory - SRAM
 Dynamic Random Access Memory – DRAM
Primary
Memory
Random access
memory
Reed only
memory Cache memory
Figure 2.1
14 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 14 of 45
Read only memory (ROM)
The data or information needed by a computer for basic operation saved in the Read Only
Memory. It belongs to the type of non-volatile memory, will not be lost in a power failure.
All the necessary information is saved in the Read Only Memory by the manufacturer of the
computers and in modern computers it is possible to update this Memory when necessary.
There are several forms in the Read Only Memory. They are
 Programmable Read Only Memory - PROM
 Erasable Programmable Read Only Memory - EPROM
 Electrically Erasable Programmable Read Only Memory – EEPROM
Cache memory
The data needed for the Central Processing Unit goes through Random Access Memory.
However, Random Access Memory does not have the ability to supply data in the required
speed of the Central Processing Unit. The reason for this is that the speed of the Random
Access Memory is less than the speed of the Central Processing Unit. Cache Memory is used
to overcome this shortcoming.
2) Secondary Storage
Secondary Storage Units are used to store data steadily and safely. Many secondary
storage units are used to store data and given below are some of the main units.
Hard Disk
The most commonly used device to store data in the computer is the hard disk. In hard disks,
data are stored in platters and there can be several platters in a hard disk. All these platters
are fixed on one spindle. All these platters are rotated together in the same speed while a
read / write head is fixed in each platter separately to read and write. Hard disk records data
by magnetizing. A Normal Hard disk rotates 7200 per minute (7200 Rpm).
CD and DVD
Compact Disks and Digital Versatile Disks are the most commonly used devices today to store
data and move them around. However, these CDs and DVDs were mainly created for the fields
of music and cinema.
Later on, it was started to use these disks to store data in computers. We cannot differentiate
between CDs and DVDs externally. Normally, the capacity of a Compact Disk ranges was
650 MB – 900 MB. While the capacity of a Digital Versatile Disk ranges from 4.7 GB to 17 GB.
Floppy Disk
Floppy disks which are read and written using magnetic technology are becoming outdated
today. The data are read and written at a very low speed in floppy disks and their capacity is
very small compared to other data storage units. One advantage of floppy disks is that they
are portable. However, since their capacity is small, using them to move the large files used
today are inconvenient
e.g.: 3.5 inches floppy disk = 1.44Mb
15 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 15 of 45
Task 2.2
Volatility
The special feature of the volatile memory is that the data and information saved in it can be
lost as soon as a power disconnected. The Random Access Memory mentioned above too
belongs to this type. That means all the data or information saved in the Random Access
Memory will be lost in a power failure.
e.g.: RAM
Non Volatility
The data and information saved here is stable and a power failure does not affect this at all.
Non-volatile memory mostly used for the secondary storage.
e.g.: ROM, Hard disk, Flash memory, Floppy disk, Pen drive
Task 2.3
Differences between Internal & External Storage
Internal / Primary Storage External / Secondary Storage
Internal Storage is inside of a computer. External Storage is outside of a computer.
Internal storage stores information on your
computer.
External storage stores it on a portable
device.
Internal storage store the operating system
and programs the computer needs in order
to function.
External storage don't need to devote
storage space to operating systems and
programs.
Internal drives are installed inside the tower of
a computer.
External hard drives are located outside the
computer.
Faster data transmission. Speed less than internal storage.
Once an internal drive is installed, it has to be
removed to be used with another computer.
An external drive just has to be disconnected
and reconnected.
Internal drives are usually less expensive than
external drives.
External drives are expansive.
Table 2.1
16 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 16 of 45
Task 2.4
Difference between RAM & ROM
RAM ROM
RAM stands for random access memory. ROM stands for read only memory.
Volatile Non-Volatile
RAM is used for reading and writing. ROM is used for only reading
As soon as the computer is switched off
RAM will lose its data.
But ROM’s data is permanent.
Table 2.2
Difference between USB & DVD
USB DVD
A flash drive USB is little and can fit in
your pocket.
But DVD is bigger. It is difficult to carry.
USB needs no protection. But DVD needs a case to protect.
Can store more data and information. Storing data has a limit.
Can be erased and written several times. Cannot be used by erasing several times.
USB port is fixed with the computer. DVD needs a DVD-ROM to read it.
Table 2.3
External data bus & Data bus
 It is responsible for transporting data only within the motherboard boundary to
different locations but External data bus is responsible for transporting data packets
from processer to the external ports.
 Data bus transfers in two directions but External depends on peripheral attached.
17 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 17 of 45
Task 2.5
Hard disk & RAM Access Time
Consider about two situations which you want to access a file in your hard disk and you want
to access a file in your RAM.
RAM is form of primary storage which is directly accessible to the Central processing unit. But
Hard disks are secondary storage devices which are not connected directly to the CPU. When
you access a file in Hard disk, first hard disk sent the data to the RAM. Then through the RAM
only the data will be guided to the CPU operations. Because the Ram is faster than the hard
disk and it has taken less access time.
So accessing something that has been stored in the hard disk is the time consuming than
accessing RAM.
Task 2.6
Data seek time
Refers to the time a program or device takes to locate a particular piece of data. For disk
drives, the terms seek time and access time are often used interchangeably. Technically
speaking, however, the access time is often longer the seek time because it includes a brief
latency period.
Capacity
Storage capacity refers to how much disk space one or more storage devices provides. It
measures how much data a computer system may contain. For an example, a computer with
a 500GB hard drive has a storage capacity of 500 gigabytes. A network server with 4TB drives,
has a storage capacity of 4 terabytes. Storage capacity is often used synonymously with "disk
space." However, it refers to overall disk space, rather than free disk space.
Access Latency
In general, the period of time that one component in a system is spinning its wheels waiting
for another component. Latency, therefore, is wasted time. For example, in accessing data on
a disk, latency is defined as the time it takes to position the proper sector under the
read/write head.
Data bocks
A physical unit of data that can be conveniently stored by a computer on an input or output device.
The block is normally composed of one or more logical records or a portion of a logical record.
Synonymous with physical record.
18 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 18 of 45
Task 2.7
Data Transfer Rate
The speed with which data can be transmitted from one device to another. Data rates are often
measured in megabits (million bits) per second. These are usually abbreviated as Mbps respectively.
In telecommunications, data transfer is usually measured in bits per second. For example, a typical
low-speed connection to the Internet may be 33.6 kilobits per second (Kbps). On Ethernet local area
networks, data transfer can be as fast as 10 megabits per second.
19 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 19 of 45
Task 03
Task 3.1
Data Communication
Transmission of data from one place to another place is called Data Communication.
Medium
Basic parts needed for Data Communication
Sender
Sender or source is the data producer or the place where the data is produced for data
transmission.
e.g.: Imagine that you call a friend of yours. Then you become the Sender or Source.
Data communication Medium
The medium which is used to transmit data to the receiver is considered here.
e.g.: In the example mentioned above, the telephone line becomes the data
communication medium.
Receiver
The receiver is the person who gets data at the end.
e.g.: Your friend is the receiver in the above mentioned example.
Sender Receiver
Figure 3.1
20 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 20 of 45
Task 3.2
Data communication Media
Various media are used for data communication. It is possible to group all these media into
two main types:
1. Guided Media: If a particular physical medium is used for data communication, it is
called guided media.
2. Unguided Media: Communicating data using media which are not physical is simple
and common today. Those media are called unguided media.
Guided Media
Wires are used here for data communication and some most popular media are given below.
Twisted wire pair:
The normal wires used for daily activities can also
be used for data communication.
e.g.: Normal telephone wires
Co-axial Cables:
Co-axial cables, which consist of a copper net woven
around a copper wire, are also used for data
communication. This is used in antenna wires for
Television Sets.
Fiber Optics:
Fiber Optics is a very popular guided media used today
for data communication. This is used in modern
telephone lines.
Figure 3.2
Figure 3.3
Figure 3.4
21 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 21 of 45
Unguided Media
No physical medium is used here to build the relationship and the communication media
given below are widely used.
Radio waves
Radio waves, which are very familiar to our normal lives, can be used for data communication
very easily.
Infrared
Infrared, which possesses very low frequency light beams, can also be used for data
communication. These are largely used for data communication when cable less keyboards,
Mice and television remote controls are used.
Microwaves
Microwaves are used to communicate data to a longer distance and short signals which
contain higher frequencies are used here.
Examples of communication media mentioned above are Bluetooth, Wi-Fi, and WI-Max are
also used.
Task 3.3
Data Transmission Types
Data transmission can be done in two ways. Those are:
1. Serial data transmission
2. Parallel data transmission
1. Serial data transmission
Data is transmitted here one after the other (in a serial way). Such data transmission is done
in bits in a computer network. One wire is enough here for data transmission.
2. Parallel data transmission
Several bits are transmitted at a time in parallel data transmission and several wires are used
for this. In most of the instances, the use of at least eight wires for this is the normal way.
22 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 22 of 45
Task 3.4
Data Transmission Modes
Three main modes are noticed in data transmission. They are
1. Simplex
2. Half-Duplex
3. Duplex
1. Simplex
In simplex data transmission, data is directed one way. There is no any space for data
transmission to be directed the other way. The best examples which can be mentioned
here are television and radio transmission.
Data transmission is always done here only from sender to receiver
2. Half-Duplex
In Half-Duplex data transmission, data can be directed one way at a time. Though data
can be transmitted both ways here, until the data transmission to one direction is
over, data cannot be transmitted in the other direction.
The best example which can be cited here is the Walkie-talkie.
3. Duplex
In full duplex data transmission, data can be transmitted both ways at the same time.
The best example which can be shown here is the telephone.
Sender Receiver
Figure 3.5
Sender Receiver
Figure 3.6
Sender Receiver
Figure 3.7
23 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 23 of 45
Task 04
Task 4.1
Computer Network
The computer system which is connects two or more computers is called a computer network.
When a computer network is built, the resources of the computers can be commonly used.
In building such a computer network, various communication devices and techniques are
used to connect computers and other devices.
Advantages of computer Network
 Speed: Since the computers and other devices are well connected to one another in a
computer network, it is possible to transmit data and information very easily and fast.
 Cost: The high cost for computer programs and devices can be easily reduced when a
computer network is built. The reason for this high cost is that the computer software
has to be bought separately for each computer when the computers are used
separately.
 Ease in Centralized software management: In computer network, it is possible to
manipulate software installed in computers from one place. That means software can
be centrally managed.
 Sharing of resources: In computer networks, expensive special devices can be
commonly used. For instance, only one printer is sufficient for many computers in a
computer network.
 E-mail: Email can be used to exchange information very easily among computers.
Disadvantages of computer Network
 In certain networks (e.g. Star), breakdown of the main computer can adversely affect
the process of the entire computer system.
 There is a possibility to lose resources due to the errors of the network system.
 Outsiders may access the network and rob data and information there.
 Sometimes the user may not be able to access the required resources easily (e.g.: a
shared printer being used by many users at the same time).
 Controlling the network is not an easy task. It demands special computer software and
specially trained officers.
 Communication of Data and information can be disturbed due to the errors of the
network system.
24 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 24 of 45
Task 4.2
Devices that used in Computer Network
It can be noticed that many devices are used in computer networks. Let us consider the details
of the essential devices in computer networking.
Modem
The telephone line can be used to access Internet. The MODEM is a device that has to be used
here to build the necessary relationship to connect the computer to Internet through
telephone lines.
Network Hub
Network Hub is used in a computer network to connect several computers with one another.
Network Switch
Network switch is used in a computer network to exchange data and information in a regular
manner among the computers in the network. The main difference between Network Switch
and Hub is that in a Hub the data are broadcasted to all the devices that are connected to it
while in a switch the data are routed only to the relevant device.
Network Interface Card (NIC)
Network Interface Card is the card which contains the circuits which are necessary to connect
your computer to a network. It can be observed that some Motherboards contain circuits
which are necessary for networking.
25 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 25 of 45
Task 4.3
Types of Network
Work Group Network
No dedicated server, based on the way that a certain user access another user client and
server roles will be changing one to another. Workgroups are designed for small LANs in
homes, schools, and small businesses.
Server Based Network
In a server-based network, the server is the central location where users share and access
network resources. This dedicated computer controls the level of access that users have to
share resources. Shared data is in one location, making it easy to back up critical business
information. Each computer that connects to the network is called a client computer.
Scope of Network
As far as computer networks are concerned, we can identify three main types. They are:
1) Local Area Network (LAN)
2) Wide Area Network (WAN)
3) Metropolitan Area Network (MAN)
1) Local Area Network (LAN)
A Network that can be identified with in a geographical location can be called as Local
Area Network. In most of the instances, this kind of network is limited to one building
or else the network is built connecting a few places which are situated very close to
each other. For instance, a computer network built in a school or a university can be
called a Local Area Network.
2) Wide Area Network (WAN)
A computer network which is spread in a large area is called a Wide Area
Network. The best example which can be given for this is the Internet. No geographical
restriction can be shown in such a network.
3) Metropolitan Area Network (MAN)
Networks which are spread in a larger area than a Local Area Network but smaller than
Wide Area Network are called Metropolitan Area Networks. A computer network
which is maintained in a government institute can be cited as an example here.
The relevant divisional institutes are operated while being connected to this network.
For instance, a computer network which connects Divisional Secretariats can be called
a Metropolitan Area Network.
26 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 26 of 45
Task 4.4
Network Topologies
The way in which the connections are made is called the topology of the computer network.
Network topology specifically refers to the physical layout of the network, especially the
locations of the computers and how the cable is run between them.
1) Bus Topology
This computer network is built centering on a
main wire and connecting all the computers and
other devices to it. The advantages of this are the
need of a few wires and the convenience to fix
computers and other devices. A main
disadvantage of this is the fact that the whole
network depends on the main wire. Further,
closing the main wire at both ends using
terminators is a difficult task.
2) Star topology
The computers are connected here in the shape of
a star as shown in (Figure 4.2). A computer or a hub
or switch is used here in the middle to connect all
the computers to one another. It is very easy to
install a star network and it is relatively easy to
identify and correct errors there.
Further, the main disadvantage of this network are
the necessity to use a large number of wires to
connect computers to one another and the fact
that if the computer, hub or switch in the middle
breaks down, the whole system will be broken.
3) Ring topology
This network is arranged connecting computers to one
another in the form of a ring. Even though the need of
a few wires to connect computers can be mentioned as
an advantage, the main disadvantage in a ring network
is that if one computer does not operate, the whole
network will collapse.
Figure 4.1
Figure 4.2
Figure 4.3
27 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 27 of 45
4) Mesh topology
In mesh topologies there is no specific structure to
connect computers and other devices. This topology is
commonly used for most computer networks as it is
difficult and expensive to have redundant connection to
every computer. However, this topology is commonly
used for wireless networks. The main disadvantages in
a mesh network is that if certain connection fails only
that node will fail, other will work.
5) Hybrid topology
In Hybrid topology there is no specific structure, because the designers are authorized to
selecting and blending all the beneficial points of deferent modules, to develop a hybrid
module. When you are selecting two or more modules to develop a hybrid network, you must
consider about the advantages and disadvantages in each module.
Figure 4.4
Figure 4.5
28 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 28 of 45
Task 05
Task 5.1
Computer Operating System
We cannot use the computer without the Operating System. When we switch ON the
computer, the operating system functions automatically, creating the environment necessary
for us to use the computer. MS DOS, Windows, UNIX, Linux and Mac OS can be mentioned as
some of the most commonly used operating systems.
The main function of a computer operating system is to provide an interface for its users by
hiding the complexity of computer hardware and other software so that users can easily
access the relevant software. Moreover, the computer operating system should coordinate
all the devices to get the maximum benefit out of them.
User Interfaces
1. Command Line Interface (CLI)
2. Graphical User Interface (GUI)
Command Line Interface (CLI)
In the CLI a prompt is found in the screen. The user should type according to the given
instructions or special commands here. This interface is more difficult to learn because of its
need to memorize lot of different commands. Command Line Interfaces are found in
operating systems such as MS DOS, UNIX and Linux.
Graphical User Interface (GUI)
A graphical interface is used here to make use of the computer easier and simpler for the
user. A GUI Operating system is commonly navigated by using a computer mouse. There is no
need to keep the commands in mind and the computer can be handled very easily using
graphics. Graphical User Interface are found in operating system such as Microsoft Windows
and Mac OS X.
The following elements can be seen in the operating systems that give GUIs.
 Windows
 Icons
 Menus
 Pointer
29 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 29 of 45
Classification of operating System
Based on number of users and numbers of task, computer operating system can be classified
as:
 Single User – Single Task
e.g.: MS-DOS
 Single User – Multi Task
e.g.: Windows
 Multi User – Multi Task
e.g.: Server Operating systems
Task 5.2
Functions of an Operating System
The basic functions of an operating system can be divided into five categories:
1) Memory Management
2) Process Management
3) Device Management
4) File Management
5) Security Management
1) Memory Management
Providing allocations in the memory for various tasks too is another function of an operating
system. Computer memory is managed in an organized manner by the operating system when
several processes are done simultaneously so that there will be no clash among them.
Another function of an operating system is to release the memory to perform a new task
when the previous task is totally completed.
2) Process Management
Computer programs are the set of instructions that programmers write in language
for the computers to follow. When a program is running in the computer it is called a
"process".
Process management is a basic function of modern operating systems. However, only
one process operates at one time in the Central Processing Unit when several
processes are in operation. The processes are activated one at a time in a selected
order.
30 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 30 of 45
3) Device Management
Device Management is another function that has to be performed by the operating
system. An operating system has to handle various devices in various ways.
Some examples for these can be the hardware segments of a computer system such
as the printer. Factors such as the speed of the devices, amount of information, its
purpose, direction where information flows, protocol used to transmit information
(communication protocol) affect the management of devices.
4) File Management
The data/information is stored in secondary storage in the form of 'files'. You may
have used them to save information in computer and retrieved those later. It is very
important for a computer to save files in a place we want and to manage them
properly.
The operating system manages the processes of creating, naming, organizing,
accessing, using and protecting the files. It gives opportunity to create, copy, move,
rename, retrieve and delete files.
5) Security Management
The operating system also protects a computer system from external and internal
dangers. For example, the use of the user name and the password are two security
shield used by the operating system to control unauthorized entry into a computer.
31 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 31 of 45
Task 06
Task 6.1
Open source operating system
Open source software most often is associated with free software and while this might be
true on many open source programs the main difference is that a person can take open source
software, including an operating system such as Linux, and can modify and change the
program to suit their needs. The nice thing about an open source operating system like Linux
is how much you can customize it, the downside is that it requires quite a bit of knowledge
about computer programming.
Open Source & Windows
Windows: - Windows is the family of operating system (OS) from Microsoft, which is the most
famous OS in the world.
Open Source: - Linux is an example of Open Source software development and Free Operating
System (OS).
User interface
Windows: - The Windows GUI is an integral component of the OS and it is mainly influenced
by Apple Macintosh OS and Xerox.
Open Source: - Linux typically provides two GUIs, KDE and Gnome. But Linux GUI is optional.
Cost
Windows: - For desktop or home use, Windows can be expensive. A single copy can cost
around 15,000Rs to 20,000Rs, depending on the version of Windows.
Open Source: - Linux can be freely distributed, downloaded freely. There are priced versions for
Linux also, but they are normally cheaper than Windows.
Security
Windows: - There have been more than 60,000 viruses in Windows
Open Source: - Linux has had about 60-100 viruses listed till date. None of them actively
spreading nowadays.
File System
Windows: - FAT, FAT32, NTFS, exFAT
Open Source: - Ext2, Ext3, Ext4, Jfs, ReiserFS, Xfs, Btrfs, FAT, FAT32, NTFS
32 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 32 of 45
Open Source vs. Closed Source Operating System
Software, including operating systems and applications, is created using programming code.
Programmers write source code, which is then compiled into executable code, creating the
product that you ultimately run on your computer. There are many operating systems in use
for personal, business and industrial contexts, and some of them are closed source and some
are open. In general, an open source system is one in which the source code is visible to you,
and in a closed source system it's not.
Policy
The principle of open source software is that as a user you have a right to access the source
code. If you're using a closed source system, you don't have access to its source code, even
where the software has been purchased with a commercial license. As well as being able to
see how a program has been implemented, many open source licenses also allow you to
amend and redistribute the software, although often this depends on the type of license used.
Differences
Having access to source code isn't the only difference between open and closed source
systems. While closed source operating systems are typically developed by corporations and
worked on only by people within the organization, open source systems tend to be developed
by large communities. Because open source programs have visible code, users and consumers
of the software are able to identify bugs, and even fix them. Because of this, open source
systems are often updated more regularly than closed source systems.
33 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 33 of 45
Task 07
Task 7.1
Factors to be concerned when buying a computer
 We have to consider about how much money we have to buy a computer.
 If we want a computer to carry everywhere we should buy a laptop, Or If we want a
computer to use it home or office we can buy a desktop computer it depends on our
requirement.
 We should consider about the purpose why we want a computer, we should increase
its performance by adding a high capacity RAM & VGA to play games and to do graphic
designing OR If we want a computer for official purpose we should buy a high
performance microprocessor.
 We should consider about the capacity of Hard disk according to our requirements. If
we see the needs and buy according to it we can save our money.
 Buy a LCD or LED monitor instead of CRT monitor because CRT monitors absorbs more
electricity.
 Buy a disk drive you use the most. Buying a DVD drive is much better than a VCD drive.
 Buy additional hardware such as speakers, modem, Printer and etc….
 We have to consider about the kind of Operating system we put to our computer.
Whether it is a paid operating system (e.g. Windows) or an Open source operating
system (e.g. Linux).
 If we use internet it is a must to have an Internet security, if we don’t use internet
normal Virus guard is more than enough.
 Buy a brand new computer rather than a used one.
34 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 34 of 45
Task 7.2
Factors to consider when implementing a network
 We have to consider how many computers we are going to use in network.
 What type of equipment will the network contain? The following devices are the most
common things that a network can contain:
 Hub
 Switches
 Routers
 Modem
 You'll have to consider here the type of storage equipment needed, the capacity, the
speed etc.
 IP telephones - telephones that communicate through the IP protocol.
 Printers - printing equipment.
 Servers - machines dedicated to host critical services and applications.
 Computers - network hosts.
 Consider about the network type we are going to use.
 According to the environment where we are going to implement a network, we should
select the topology.
 After selecting topology we want to consider how much will it cost to implement the
whole network.
 Be cautious about the security of the network.
35 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 35 of 45
Task 7.3
Computer security measures
Physical Security
Physical security is measure that which are design to deny to unauthorized personal from
physically accessing a building, facility or stored information.
 Cooler fanes
 Using Casing.
 Using Fire guards.
 Cover up the computer.
 Use a UPS.
Logical Security
Logical Security safe guards a certain computer system in an intangible way.
 User Names and Passwords.
 Access control.
 Virus guards and firewalls.
 Backup and recovery.
Task 7.4
Sound cards
An expansion board that enables a computer to manipulate and output sounds. Sound cards
are necessary for nearly all CD-ROMs and have become commonplace on modern personal
computers. Sound functionality can also be integrated onto the motherboard, using basically
the same components as a plug-in card.
Memory
The term memory identifies data storage that comes in the form of chips, and the word
storage is used for memory that exists on tapes or disks. Every computer comes with a
certain amount of physical memory, usually referred to as main memory or RAM. A
computer that has 1 megabyte of memory, therefore, can hold about 1 million bytes.
There are several different types of memory:
 RAM (random-access memory)
 ROM (read-only memory)
 PROM
 EPROM
 EEPROM
External storage
36 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 36 of 45
In computing, external storage comprises devices that temporarily store information for
transporting from computer to computer. Such devices are not permanently fixed inside a
computer. External storage devices provides additional storage other than that available in
computer. Data can be transported easily from one place to another. It is useful to store
software. Types of external storage:
Magnetic storage
 Cassette tape
 Floppy disk
Optical storage
 CD
 DVD
Video Graphic Adapter
Video Graphic Adapter (VGA) is an expansion Card which can be fixed in expansion slot. It
generates a feed of images to a display.
37 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 37 of 45
Task 08
Task 8.1
Test Plan
The test plan keeps track of possible tests that will be run on the system after coding. It is a
document that develops as the project is being developed. The initial test plan is abstract and
the final test plan is concrete.
Objective of test plan
 Given idea about the cost price.
 Shows the suitable resources.
 Evaluate and test testing process.
 Shows the places that needed to be tested or corrected.
 Schedule testing activities according to the test strategy and project deadlines.
Task 8.2
Based on the available software testing time can be very with the relevant resources to be
utilized mostly the testing has to be done many times before a software implementation
Following are the objective of software testing:
1. To check the expected outcome.
2. To correct all identified errors.
3. To identify different ways of re-constructing the software.
White Box Testing
White-box testing is a methodology used to ensure and validate the internal framework,
mechanisms, objects and components of a software application. White-box testing verifies
code according to design specifications.
Advantages of White box testing
 It helps to optimize and re-construct the cording.
 It removes unnecessary lines of code.
 Facilitates finding of the locations of hidden errors in early phases of development.
 The testing is done by software experts, it can guaranty about the exact and it takes
very less time.
Disadvantages of white box testing
 Requires a skilled tester, so white box testing is very expensive.
 It might be time consuming without the help of knowledgeable testers.
 Code bit validation is difficult.
38 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 38 of 45
Black Box Testing
Black box testing is a software testing technique that focuses on the analysis of software
functionality, versus internal system mechanisms. Black box testing was developed as a
method of analyzing client requirements, specifications and high-level design strategies.
Advantages of Black box testing
 Save time in large system implementation
 Provides flexibility: Specific programming knowledge is not required.
 Conserves resources: Testers focus on software functionality.
 Mostly the testers will be conducting in user’s point of view.
Disadvantages of black box testing
 Test case/script design and maintenance may be problematic because black box
testing tools depend on known inputs.
 Graphical User Interface (GUI) interaction may damage test scripts.
 Sometimes testers must be struggling to identify and debug the tricky part of cording.
 Sometimes it is difficult to identify all the inputs in a given testing time period.
Task 8.3
Health & Safety issues in ICT
Using computer a lot can harm our body headache, Eye strain, back pain. We should follow
some health tips to avoid them.
 Headache and eyes strain – to avoid this take even a short break every two hours. Do
not focus in screen a lot. Clean the screen to remove dust.
 Back pain -- Stable, allowing easy freedom of movement and comfortable position.
 Numbness – Don’t sit too long in the chair.
 Migraine – Don’t get stressed too much.
39 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 39 of 45
Task 09
Task 9.1
User Training Needs
TNA is an effective way of identifying the space between the skills a business needs and what
employees have. Gathering information to find areas where employees could improve their
performance involve this. It helps us to identify the objectives in a training staff.
Objectives
 Analyze business goals and the skills required to meet these goals.
 Determine the changes in products or business process.
 Increase the sense of ownership and involvement of the students.
 Ascertain the most suitable evaluation mechanisms
 Determine what is the most appropriate delivery format - class based, online or a mix
of these and other formats
 Achieve a correct fit between the provider and student, i.e., the course matches
student needs and expectations
 Evaluate who want to be trained and how best to reach them.
 Evaluate the training place.
Task 9.2
Help Desk
A help desk is a resource intended to provide the customer or end user with information and
support related to a companies or institution's products and services. The purpose of a help
desk is usually to troubleshoot problems or provide guidance about products such as
computers, electronic equipment, food, apparel, or software. Corporations usually provide
help desk support to their customers through various channels such as toll-free numbers,
websites, instant messaging, or email. There are also in-house help desks designed to provide
assistance to employees.
 An incident only requires reporting once.
 It is simple to check when incidents are not effectively resolved, or action has not been
taken when required.
 Management information is more accessible and accurate.
 Complex support tasks and calculations are made easier.
40 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 40 of 45
Task 9.3
ICT based Training Plan
User trainings are common in most of the system implementation activities and it cost
additional amount of money with additional resources and time.
Prior to scheduling training activities, a requirement evaluation needs to be done to clearly
identify the potential need for the intended training activity.
Following are some reasons to scheduling the training:-
 To evaluate user performance.
 Intended system implementation.
 To get professionally qualified.
 To increase the efficiency and accuracy.
 To be secured and guaranteed under the relevant work.
Task 9.4
Objective of preparing a training schedule.
 The purpose of a training plane is to identify the work to be carried out.
 We can work according to the time schedule.
 We can save time.
 Can compare with exact outcome with the planned schedule.
 Make it easy to monitor.
 Make it easy to evaluate.
41 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 41 of 45
Task 10
Task 10.1
Computer security measures
Physical Security
Physical security is measure that which are design to deny to unauthorized personal from
physically accessing a building, facility or stored information.
 Cooler fanes: - There are two kind of cooler fans are available in the computer. One
is processor cooler fan it reduce the heat of the processor, And the other one is
normal cooler fan it cools the internal devices of the computer.
 We want use system casing to prevent dust from entering.
 Computer hardware is protected from fire damage by smoke detectors.
 Cover up the computer using a sheet of cloth while not in use.
 Use a UPS for avoiding immediate shut downs.
Logical security measures
 If you are using weak or no password, your computer can be hacked very easily. Your
password should be unique for each of your account.
 Use of reliable Antivirus and Anti Spyware Program. If you are not using any Antivirus
or Anti Spyware program then your PC is very much in danger to be infected with
Virus or Malware.
 You must update or install patches or latest version when they released. Otherwise
Intruders and hackers can take advantage of the vulnerabilities present in installed
software.
 Get a backup of system.
42 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 42 of 45
Task 10.2
Risks which can be identified within a Computer Network Environment
A risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of
computer services.
As a network consists of more than one user, it is essential to provide facilities to
communicate in a safe and confidential way. But there are some incidents which lead to
expose confidential data to outsiders and also which lead to loose data, like listed below:-
 Outsiders may access the network and rob data and information there.
 Unauthorized access and use of computer systems.
 Disk failure
 Power failure and surges
 Physical theft
 Computer Virus Threats
 Spyware Threats
Precautions that can be taken to prevent those risks
 Monitor the user through the main server in order to identify file sharing.
 User name and password for each user will help to prevent unauthorized access.
 Power problems (surges, blackouts, and brown-outs) can cause physical damage to a
computer, inducing a hard disk crash or otherwise harming the electronic components
of the computer. Common mitigation methods include using surge suppressors and
uninterruptible power supplies (UPS).
 To aid in recovering from a security breach or hard disk failure, create a boot disk on
a floppy disk which will help when recovering a computer after such an event has
occurred.
 Connect other peripherals through the main server. Then easily can identify when any
of them are removed from the machine.
 Keep backups of the entire system to use in a system failure.
 Cryptographic tools are available that can encrypt data stored on a computer’s hard
disk. Use these tools if the computer contains sensitive data or is at high risk of theft.
 Use of anti-virus software on computers. Keep anti-virus software up-to-date. Many
anti-virus packages support automatic updates of virus definitions.
43 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 43 of 45
Sending the
data via public
medium
Task 10.3
Encryption
Converting the readable form of data into unreadable form of data is called encryption. A
mathematical procedure for performing encryption on data. Through the use of an algorithm,
information is made into meaningless cipher text and requires the use of a key to transform
the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of
encryption algorithms
Why we use Encryption mechanism
If you don’t already know it, without encryption there is no such thing as privacy. At least not
for your data. It’s all 1′s and 0′s but doesn’t take a genius at all to recognize the data it
represents if it’s not encrypted when intercepted. And there are literally thousands of ways
to intercept data.
Sender
Readable
form of data
Unreadable
form of data
Unreadable
form of data
Readable
form of data
Receiver
ENCRYPTION
DECRYPTION
44 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 44 of 45
Task 10.4
How network management helps to reduce unauthorized activities
Computer network management by Network Infrastructure Technology can help you cut
costs and enhance productivity throughout your company, whether you have one location or
several locations throughout the world.
So it is important to reduce unauthorized access and data sharing with other parties because
it will directly affect the organization.
 Hacking is unauthorized accessing of private and confidential information or ICT based
assets by using crackers/tools to get the things done. Cracking user names and pass
words to get in to private network or to access private information like account details,
financial transactions also come under hacking.
 As most of the business information are confidential it is an essential need to avoid
hacking. So companies hire security experts for security guidance.
 Most management systems their own encryption systems to transfer confidential
information.
 A system may have its own firewall. Hackers find it hard to get through them because
they are not aware of its source codes.
 If the whole network is monitored through a main server, it is impossible to use USB
drives to transfer files.
45 | P a g e
International Diploma in Computing/Business Management
Computer platforms /combined assessment
Page 45 of 45
Reference
1) http://www.differencebetween.com
2) http://www.pccomputernotes.com
3) http://www.helpmasterpro.com/home/why-help-desk-software.aspx
4) http://en.wikipedia.org/wiki/FLOPS
5) http://www.pccomputernotes.com/clockspeed/clockspeed.htm
6) http://en.wikipedia.org/wiki/Network_topology
7) http://management.atwork-network.com/2008/04/15/mintzberg%E2%80%99s-10-
managerial-roles/
8) http://en.wikipedia.org/wiki/Category:Network_analyzers
9) http://en.wikipedia.org/wiki/Network_administrator
10) http://www.webopedia.com/TERM/N/network_management.html
11) http://en.wikipedia.org/wiki/Encryption
12) http://www.ictcomputertraining.com/
13) http://freehelpdesk.org/help-desk-software-benefits.php
14) http://www.helpdesksaas.com/blog/column/benefits-of-a-local-help-desk/
15) http://en.wikipedia.org/wiki/Non-volatile_memory
16) http://en.wikipedia.org/w/index.php?search=access+latency&title=Special%3ASearc
h
17) http://www.wisegeek.org/what-is-data-transfer-rate.htm
18) http://www.cert.org/tech_tips/home_networks.html#III-A

More Related Content

What's hot

Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft wareSamuel Igbanogu
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222Niraj Choudhary
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersAnn Mahrenholz
 
Basics of Computer for Students
Basics of Computer for StudentsBasics of Computer for Students
Basics of Computer for Studentsvethics
 
Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Makaha Rutendo
 
Introduction to computer lec (1)
Introduction to computer lec  (1)Introduction to computer lec  (1)
Introduction to computer lec (1)Samiullah Khan
 
Chapter4 Data Processing
Chapter4 Data ProcessingChapter4 Data Processing
Chapter4 Data ProcessingMuhammad Waqas
 
Fundamental units of computer
Fundamental units of computerFundamental units of computer
Fundamental units of computerSandeep Menon
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSMakaha Rutendo
 
Introduction To Computer Systems
Introduction To Computer SystemsIntroduction To Computer Systems
Introduction To Computer SystemsNaheed Azam
 
Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]Rafiq Azad
 
What is computer 1
What is computer 1What is computer 1
What is computer 1Shuja Qais
 
Basic computer organization
Basic computer organizationBasic computer organization
Basic computer organizationSAMIR NAIK
 
Basic computer organisation
Basic computer organisationBasic computer organisation
Basic computer organisationvito_carleone
 
Computers and Information Processing
Computers and Information ProcessingComputers and Information Processing
Computers and Information ProcessingJofred Martinez
 

What's hot (20)

Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft ware
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Basics of Computer for Students
Basics of Computer for StudentsBasics of Computer for Students
Basics of Computer for Students
 
Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)Advanced Systems Analyis Design (UML)
Advanced Systems Analyis Design (UML)
 
Introduction to computer lec (1)
Introduction to computer lec  (1)Introduction to computer lec  (1)
Introduction to computer lec (1)
 
Chapter4 Data Processing
Chapter4 Data ProcessingChapter4 Data Processing
Chapter4 Data Processing
 
Fundamental units of computer
Fundamental units of computerFundamental units of computer
Fundamental units of computer
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
 
Assignment
AssignmentAssignment
Assignment
 
Introduction To Computer Systems
Introduction To Computer SystemsIntroduction To Computer Systems
Introduction To Computer Systems
 
Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]Computer fundamental basic comuter organization [www.studysharebd.com]
Computer fundamental basic comuter organization [www.studysharebd.com]
 
What is computer 1
What is computer 1What is computer 1
What is computer 1
 
Basic organization of computer
 Basic organization of computer Basic organization of computer
Basic organization of computer
 
Csc 2313 (lecture 1)
Csc 2313 (lecture 1)Csc 2313 (lecture 1)
Csc 2313 (lecture 1)
 
Basic computer organization
Basic computer organizationBasic computer organization
Basic computer organization
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Grade 7 computer software
Grade 7  computer softwareGrade 7  computer software
Grade 7 computer software
 
Basic computer organisation
Basic computer organisationBasic computer organisation
Basic computer organisation
 
Computers and Information Processing
Computers and Information ProcessingComputers and Information Processing
Computers and Information Processing
 

Viewers also liked

Rhonda Exec Resume
Rhonda Exec ResumeRhonda Exec Resume
Rhonda Exec ResumeRhonda Boyke
 
CV Marius Alexander Myrtrøen 2015
CV Marius Alexander Myrtrøen 2015CV Marius Alexander Myrtrøen 2015
CV Marius Alexander Myrtrøen 2015alexandermyrtroen
 
психолого пед. тренінг
психолого пед. тренінгпсихолого пед. тренінг
психолого пед. тренінгElena Bosa
 
Graphic chapter 2
Graphic chapter 2Graphic chapter 2
Graphic chapter 2Pa'rig Prig
 
Tanggapan ICT Watch atas RPM Konten Negatif
Tanggapan ICT Watch atas RPM Konten NegatifTanggapan ICT Watch atas RPM Konten Negatif
Tanggapan ICT Watch atas RPM Konten NegatifICT Watch
 
Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...
Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...
Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...EX ARTHUR MEXICO
 

Viewers also liked (16)

Matric Certificate
Matric CertificateMatric Certificate
Matric Certificate
 
Vdo 777
Vdo 777Vdo 777
Vdo 777
 
Idi 008 av
Idi 008 avIdi 008 av
Idi 008 av
 
Rhonda Exec Resume
Rhonda Exec ResumeRhonda Exec Resume
Rhonda Exec Resume
 
ACTL_Journal_80_Spring_2016
ACTL_Journal_80_Spring_2016ACTL_Journal_80_Spring_2016
ACTL_Journal_80_Spring_2016
 
satish kumar
satish kumarsatish kumar
satish kumar
 
Nepal
NepalNepal
Nepal
 
Grupo #7
Grupo #7Grupo #7
Grupo #7
 
CV Marius Alexander Myrtrøen 2015
CV Marius Alexander Myrtrøen 2015CV Marius Alexander Myrtrøen 2015
CV Marius Alexander Myrtrøen 2015
 
4 lchtest n
4 lchtest n4 lchtest n
4 lchtest n
 
психолого пед. тренінг
психолого пед. тренінгпсихолого пед. тренінг
психолого пед. тренінг
 
Unidad8
Unidad8Unidad8
Unidad8
 
Graphic chapter 2
Graphic chapter 2Graphic chapter 2
Graphic chapter 2
 
2 hr
2 hr 2 hr
2 hr
 
Tanggapan ICT Watch atas RPM Konten Negatif
Tanggapan ICT Watch atas RPM Konten NegatifTanggapan ICT Watch atas RPM Konten Negatif
Tanggapan ICT Watch atas RPM Konten Negatif
 
Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...
Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...
Comunicado de prensa sat se publican los datos de 14,966 contribuyentes incum...
 

Similar to Basic IT

Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHISowmya Jyothi
 
Computer System
Computer SystemComputer System
Computer Systemhajjaz
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpINFOCHIEF institute
 
Pranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranaviVerma
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introductionVhe Cagande
 
Computers in accounting class 11th by Nithin
Computers in accounting class 11th by NithinComputers in accounting class 11th by Nithin
Computers in accounting class 11th by NithinNithin Patel
 
Computer Fundamentals lecture 1 Basic components of computer system.pptx
Computer Fundamentals lecture 1 Basic components of computer system.pptxComputer Fundamentals lecture 1 Basic components of computer system.pptx
Computer Fundamentals lecture 1 Basic components of computer system.pptxdbmscse61
 
janvichauhan110cs.pptx
janvichauhan110cs.pptxjanvichauhan110cs.pptx
janvichauhan110cs.pptxSANKETKOTAK5
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computersVishal Patyal
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxnoveriustelaumbanua
 
For first periodical test
For first periodical testFor first periodical test
For first periodical testroselynrequiso
 
For first periodical test
For first periodical testFor first periodical test
For first periodical testroselynrequiso
 
CS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdfCS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdfAsst.prof M.Gokilavani
 
COMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTESCOMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTESDr.MAYA NAYAK
 

Similar to Basic IT (20)

Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Itc lecture
Itc lectureItc lecture
Itc lecture
 
Computer System
Computer SystemComputer System
Computer System
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
C with lab
C with labC with lab
C with lab
 
Intro to computer
Intro to computerIntro to computer
Intro to computer
 
Pranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computerPranavi verma-fundamental unit of computer
Pranavi verma-fundamental unit of computer
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Computers in accounting class 11th by Nithin
Computers in accounting class 11th by NithinComputers in accounting class 11th by Nithin
Computers in accounting class 11th by Nithin
 
Computer Fundamentals lecture 1 Basic components of computer system.pptx
Computer Fundamentals lecture 1 Basic components of computer system.pptxComputer Fundamentals lecture 1 Basic components of computer system.pptx
Computer Fundamentals lecture 1 Basic components of computer system.pptx
 
janvichauhan110cs.pptx
janvichauhan110cs.pptxjanvichauhan110cs.pptx
janvichauhan110cs.pptx
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
For first periodical test
For first periodical testFor first periodical test
For first periodical test
 
What Is Computer
What Is ComputerWhat Is Computer
What Is Computer
 
What is computer
What is computerWhat is computer
What is computer
 
CS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdfCS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdf
 
COMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTESCOMPUTER ORGNAIZATION NOTES
COMPUTER ORGNAIZATION NOTES
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Basic IT

  • 1. 1 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 1 of 45 Task 01 Task 1.1 Data Data are the collection of facts, numbers, letters, images and measurements that are not processed in any mean. e.g.:- Jack: - 64, 76 Katherine: - 86, 56 Salam: - 89, 67 Kumar: - 45, 35 According to the above example, you may notice a set of data has been arranged for some specific purpose. However you may also realize that in order to get a correct idea, these data has to be processed in some form. Information Information is systematically processed data that gives a capacity to understand meaning to the recipient. Information help us making decision or arriving at conclusions easily. However to make decisions easily we have to organize data into information. e.g.: Name Marks for the first subject Marks for the second subject Jack 64 76 Katherine 86 56 Salam 89 67 Kumar 45 35 Table 1.1
  • 2. 2 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 2 of 45 Different between Data & Information Data Information  Unprocessed facts and figures.  Data can be identified as input of computer.  One could not understand the data easily.  Data is presented in an unorganized way.  Gives the results of a research directly without arranging.  The user can’t take decision by only referring the data.  Processed data.  Information can be identified as output of the computer.  Information is meaningful and relevant and it’s easy for the user to understand.  Information is presented in an organized way.  Gives the result of a research in a proper arrangement.  The information can be used beneficially and take proper decision. Table 1.2
  • 3. 3 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 3 of 45 Task 1.2 Computer System The computer system can be categorized in to four main part. 1) Hardware 2) Software 3) Liveware 4) Firmware 1) Hardware Physical (electronic or mechanical) parts of the computer external or internal are called hardware. a. Input devices b. Output devices c. CPU (Central processing unit) d. Storage devices Input Devices The devices which are used to input information, instructions and commands are input devices. Input devices convert data in to a form that machine understand. e.g.: Keyboard, Mouse, Scanner, Microphone, Web camera, Light pen and etc.... Output Devices Output devices used to output information. It processes the data and output it in a way the user could understand. e.g.:- Monitor, printer, speaker and etc…. CPU (Central Processing Unit) The central processing unit processes the commands and instruction which given by the user. Its main job is controlling the computer. It is also known as brain of the computer. This consists of three parts.  Control unit  Arithmetic and logic unit (ALU)  Memory registers
  • 4. 4 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 4 of 45 Storage Devices Storage devices are used to store data & information in the computer. When CPU needs some data, the data is brought from storage devices to memory and CPU. There are two types of storage devices.  Primary storage: RAM, ROM  Secondary storage: Hard disk, DVD, Pen drive 2) Software Software can be defined as a set of intangible rules and instructions that has been written by using a certain computer language to do specific set of tasks. It can be classified into two major categories.  System Software  Application Software System Software This is a type of software that runs on top of hardware to make the hardware useable 1) Operating System: It is a must for the computer to have an operating system to work. The main function of an operating system is to provide an interface for its User by hiding the complexity of computer hardware and other software so that user can easily access the relevant software. e.g.: Windows, Linux, Mac and UNIX Utilities Application Software Operating System Hardware Figure 1.1 2) Utilities: These are the software that help the user efficiently use the computer. e.g.: Anti-virus software, Troubleshooting tools and Diagnostic tools User
  • 5. 5 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 5 of 45 Application Software Application software is software that performs useful task and helps the computer itself. Application software are mostly designed to fulfill the general user requirement. Application software runs on the top of the system software by giving more features to the user in order to utilize the available hardware devices.  Packages: MS office package, graphic designing software  Computer languages: Java, C++, Visual basic, Pascal, Fortran 3) Liveware All type of users that use the computer system can be generally called as Liveware. Liveware also plays a major role in computer system. Liveware is responsible for giving commands and instructions to the computer, to get the work done. e.g.: Normal computer user Programmers Data entry operators 4) Firmware A set of rules and regulation written in the form of software and permanently stored in ROM chips or BIOS chips by the chip manufactures. It is another form of system tool helps to continue the system operations. e.g.: Bootstrap programs Self-diagnostic program
  • 6. 6 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 6 of 45 Task 1.3 Computer System Diagram Computer System Hardware InputDevices Output Devices CPU Storage Devices Software System Software Operating System Utilities Application Software Computer Language Packages Liveware Computer Users Firmware Bootstrap Programs Selfdiognastic Programs
  • 7. 7 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 7 of 45 Task 1.4 Structure of the CPU Data/Information Flow Control Information Flow Program Instruction Flow Functionality of the CPU The Central Processing Unit is called the brain of the computer. This consists of three parts: 1) Control Unit (CU) 2) Arithmetic & Logic Unit (ALU) 3) Memory Registers 1) Control Unit (CU) All the controlling of the computer is done by this unit. This controls all the devices of the computer giving the required commands when necessary. 2) Arithmetic Logic Unit (ALU) This unit performs all kinds of arithmetic calculations and logical operations. Control Unit Arithmetic & Logical Unit Primary Storage Secondary Storage Output DeviceInput Device Figure 1.2
  • 8. 8 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 8 of 45 3) Memory Registers The Memory registers are included in the processing unit and it stores the data which are ready to be sent to the Central Processing Unit for calculations or processing. Task 1.5 Clock Speed In the Central Processing Unit, its speed is an important factor. The computer speed is sometimes called the clock speed as well. The unit Hertz (Hz) is used to measure the speed of the Central Processing Unit while units such as megahertz (MHz) and gigahertz (GHz) are used to measure the speed of modern computers. In the comparison of computers, the speed is considered a strong factor. 1000 Hz = 1 KHz 1000 KHz = 1 MHz 1000MHz = 1 GHz
  • 9. 9 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 9 of 45 Task 1.6 Bus Architectures Buses can be easily identified on the motherboard and called as the center piece of connecting all the peripheral devices to the computer system. A bus is a subsystem that transfer data between computer components inside a computer or between computers. Buses can be identified in 3 different forms, which do 3 different functionalities. 1. Data Bus 2. Address Bus 3. External data bus Data Bus It is responsible for transporting data only within the motherboard boundary to different locations. A data bus has many different defining characteristics, but one of the most important is its width. The width of a data bus refers to the number of bits (electrical wires) that make up the bus. Common data bus widths include 1-, 4-, 8-, 16-, 32-, and 64-bit. Address Bus An address bus is a computer bus architecture used to transfer data between devices that are identified by the hardware address of the physical memory (the physical address), which is stored in the form of binary numbers to enable the data bus to access memory storage. External data bus All the external device will be connected to the mother board. Through the external ports, external data buses responsible for transporting data from processor to external ports.
  • 10. 10 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 10 of 45 Task 1.7 MIPS “Instruction per second” (IPS) is measure of a computer’s processor speed. The term is commonly used in association with a numeric value such as thousand instruction per second (KIPS), Million instruction per second (MIPS). MIPS measures roughly the number of machine instructions that a computer can execute in one second. However, different instructions require more or less time than others, and there is no standard method for measuring MIPS. In addition, MIPS refers only to the CPU speed. A computer with a high MIPS rating, therefore, might not run a particular application any faster than a computer with a low MIPS rating. Task 1.8 Pipelining A pipeline is a set of data processing elements connected in series, so that the output of one element is the input of the next one. In most of the cases we create a pipeline by dividing a complex operation into simpler operations. We can also say that instead of taking a bulk thing and processing it at once, we break it into smaller pieces and process it one after another. Pipelining seeks to use every portion of the processor busy with some instruction. FLOOPS FLOPS means floating point operations per second. It is the process of identifying how many floating points can be operated or processed within a second. FLOPS measures the computing ability of a computer. A floating-point operation is a calculation of mathematical equation. This is one main function of ALU under the instructions of Control Unit. Especially under the arithmetic functions, ALU is responsible for the completion of floating point operations. This indicates how faster a processer can perform and how faster the ALU can complete floating point operations.
  • 11. 11 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 11 of 45 Task 1.9 Binaries in to Decimal 1. Write the binary number. 2. Find the place value of each digits. 3. Multiply the digits with the place value. 4. Add the values calculated above. 5. That sum represents the decimal value of the relevant binary value. 1) 110011002 1 1 0 0 1 1 0 02 110011002 = 20410 27 26 25 24 23 22 21 20 = (27*1) + (26*1) + (25*0) + (24*0) + (23*1) + (22*1) + (21*0) + (20*0) = (128*1) + (64*1) + (32*0) + (16*0) + (8*1) + (4*1) + (2*0) + (1*0) = 128 + 64 + 0 + 0 + 8 + 4 + 0 + 0 = 204 2) 101011102 1 0 1 0 1 1 1 0 101011102 = 17410 27 26 25 24 23 22 21 20 = (27*1) + (26*0) + (25*1) + (24*0) + (23*1) + (22*1) + (21*1) + (20*0) = (128*1) + (64*0) + (32*1) + (16*0) + (8*1) + (4*1) + (2*1) + (1*0) = 128 + 0 + 32 + 0 + 8 + 4 + 2 + 0 = 174 3) 111001012 1 1 1 0 0 1 0 1 111001012 = 22910 27 26 25 24 23 22 21 20 = (27*1) + (26*1) + (25*1) + (24*0) + (23*0) + (22*1) + (21*0) + (20*1) = (128*1) + (64*1) + (32*1) + (16*0) + (8*0) + (4*1) + (2*0) + (1*1) = 128 + 64 + 32 + 0 + 0 + 4 + 0 + 1 = 229
  • 12. 12 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 12 of 45 Task 1.10 Decimal in to Binaries 9710 2 97 2 48 - 1 2 24 - 0 2 12 - 0 2 6 - 0 2 3 - 0 2 1 - 1 0 - 1 9710 = 11000012 11210 2 112 2 56 0 2 28 0 2 14 0 2 7 0 2 3 1 2 1 1 1 11210 = 11100002 12710 2 127 2 63 1 2 31 1 2 15 1 2 7 1 2 3 1 2 1 1 0 1 12710 = 11111112
  • 13. 13 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 13 of 45 Task 02 Task 2.1 Storage Devices Which are used to store data and information are called Storage devices. Storage can be divided into two main parts: 1) Primary Storage 2) Secondary Storage 1) Primary Storage Primary Storage devices are manufactured using Semiconductors. The main task of the Primary Storage is to store data temporarily to provide the necessary data to the Central Processing Unit. The basic task of the Secondary Memory is to store data, instructions and information needed for further use. Random access memory (RAM) The main task of the Random Access Memory, is to store temporarily the data which are needed to the Central Processing Unit. Everything in the Random Access Memory, which belongs to the type of Volatile Memory, is lost with a power failure. Therefore, all the data or information which is considered to be important should necessarily be saved in a unit of Secondary Memory. The capacity of the Random Access Memory is important for the efficiency of a computer. Further, it is possible to increase the capacity of the Random Access Memory adding memory units as required. There are two main forms of RAM (Random Access Memory). They are:  Static Random Access Memory - SRAM  Dynamic Random Access Memory – DRAM Primary Memory Random access memory Reed only memory Cache memory Figure 2.1
  • 14. 14 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 14 of 45 Read only memory (ROM) The data or information needed by a computer for basic operation saved in the Read Only Memory. It belongs to the type of non-volatile memory, will not be lost in a power failure. All the necessary information is saved in the Read Only Memory by the manufacturer of the computers and in modern computers it is possible to update this Memory when necessary. There are several forms in the Read Only Memory. They are  Programmable Read Only Memory - PROM  Erasable Programmable Read Only Memory - EPROM  Electrically Erasable Programmable Read Only Memory – EEPROM Cache memory The data needed for the Central Processing Unit goes through Random Access Memory. However, Random Access Memory does not have the ability to supply data in the required speed of the Central Processing Unit. The reason for this is that the speed of the Random Access Memory is less than the speed of the Central Processing Unit. Cache Memory is used to overcome this shortcoming. 2) Secondary Storage Secondary Storage Units are used to store data steadily and safely. Many secondary storage units are used to store data and given below are some of the main units. Hard Disk The most commonly used device to store data in the computer is the hard disk. In hard disks, data are stored in platters and there can be several platters in a hard disk. All these platters are fixed on one spindle. All these platters are rotated together in the same speed while a read / write head is fixed in each platter separately to read and write. Hard disk records data by magnetizing. A Normal Hard disk rotates 7200 per minute (7200 Rpm). CD and DVD Compact Disks and Digital Versatile Disks are the most commonly used devices today to store data and move them around. However, these CDs and DVDs were mainly created for the fields of music and cinema. Later on, it was started to use these disks to store data in computers. We cannot differentiate between CDs and DVDs externally. Normally, the capacity of a Compact Disk ranges was 650 MB – 900 MB. While the capacity of a Digital Versatile Disk ranges from 4.7 GB to 17 GB. Floppy Disk Floppy disks which are read and written using magnetic technology are becoming outdated today. The data are read and written at a very low speed in floppy disks and their capacity is very small compared to other data storage units. One advantage of floppy disks is that they are portable. However, since their capacity is small, using them to move the large files used today are inconvenient e.g.: 3.5 inches floppy disk = 1.44Mb
  • 15. 15 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 15 of 45 Task 2.2 Volatility The special feature of the volatile memory is that the data and information saved in it can be lost as soon as a power disconnected. The Random Access Memory mentioned above too belongs to this type. That means all the data or information saved in the Random Access Memory will be lost in a power failure. e.g.: RAM Non Volatility The data and information saved here is stable and a power failure does not affect this at all. Non-volatile memory mostly used for the secondary storage. e.g.: ROM, Hard disk, Flash memory, Floppy disk, Pen drive Task 2.3 Differences between Internal & External Storage Internal / Primary Storage External / Secondary Storage Internal Storage is inside of a computer. External Storage is outside of a computer. Internal storage stores information on your computer. External storage stores it on a portable device. Internal storage store the operating system and programs the computer needs in order to function. External storage don't need to devote storage space to operating systems and programs. Internal drives are installed inside the tower of a computer. External hard drives are located outside the computer. Faster data transmission. Speed less than internal storage. Once an internal drive is installed, it has to be removed to be used with another computer. An external drive just has to be disconnected and reconnected. Internal drives are usually less expensive than external drives. External drives are expansive. Table 2.1
  • 16. 16 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 16 of 45 Task 2.4 Difference between RAM & ROM RAM ROM RAM stands for random access memory. ROM stands for read only memory. Volatile Non-Volatile RAM is used for reading and writing. ROM is used for only reading As soon as the computer is switched off RAM will lose its data. But ROM’s data is permanent. Table 2.2 Difference between USB & DVD USB DVD A flash drive USB is little and can fit in your pocket. But DVD is bigger. It is difficult to carry. USB needs no protection. But DVD needs a case to protect. Can store more data and information. Storing data has a limit. Can be erased and written several times. Cannot be used by erasing several times. USB port is fixed with the computer. DVD needs a DVD-ROM to read it. Table 2.3 External data bus & Data bus  It is responsible for transporting data only within the motherboard boundary to different locations but External data bus is responsible for transporting data packets from processer to the external ports.  Data bus transfers in two directions but External depends on peripheral attached.
  • 17. 17 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 17 of 45 Task 2.5 Hard disk & RAM Access Time Consider about two situations which you want to access a file in your hard disk and you want to access a file in your RAM. RAM is form of primary storage which is directly accessible to the Central processing unit. But Hard disks are secondary storage devices which are not connected directly to the CPU. When you access a file in Hard disk, first hard disk sent the data to the RAM. Then through the RAM only the data will be guided to the CPU operations. Because the Ram is faster than the hard disk and it has taken less access time. So accessing something that has been stored in the hard disk is the time consuming than accessing RAM. Task 2.6 Data seek time Refers to the time a program or device takes to locate a particular piece of data. For disk drives, the terms seek time and access time are often used interchangeably. Technically speaking, however, the access time is often longer the seek time because it includes a brief latency period. Capacity Storage capacity refers to how much disk space one or more storage devices provides. It measures how much data a computer system may contain. For an example, a computer with a 500GB hard drive has a storage capacity of 500 gigabytes. A network server with 4TB drives, has a storage capacity of 4 terabytes. Storage capacity is often used synonymously with "disk space." However, it refers to overall disk space, rather than free disk space. Access Latency In general, the period of time that one component in a system is spinning its wheels waiting for another component. Latency, therefore, is wasted time. For example, in accessing data on a disk, latency is defined as the time it takes to position the proper sector under the read/write head. Data bocks A physical unit of data that can be conveniently stored by a computer on an input or output device. The block is normally composed of one or more logical records or a portion of a logical record. Synonymous with physical record.
  • 18. 18 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 18 of 45 Task 2.7 Data Transfer Rate The speed with which data can be transmitted from one device to another. Data rates are often measured in megabits (million bits) per second. These are usually abbreviated as Mbps respectively. In telecommunications, data transfer is usually measured in bits per second. For example, a typical low-speed connection to the Internet may be 33.6 kilobits per second (Kbps). On Ethernet local area networks, data transfer can be as fast as 10 megabits per second.
  • 19. 19 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 19 of 45 Task 03 Task 3.1 Data Communication Transmission of data from one place to another place is called Data Communication. Medium Basic parts needed for Data Communication Sender Sender or source is the data producer or the place where the data is produced for data transmission. e.g.: Imagine that you call a friend of yours. Then you become the Sender or Source. Data communication Medium The medium which is used to transmit data to the receiver is considered here. e.g.: In the example mentioned above, the telephone line becomes the data communication medium. Receiver The receiver is the person who gets data at the end. e.g.: Your friend is the receiver in the above mentioned example. Sender Receiver Figure 3.1
  • 20. 20 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 20 of 45 Task 3.2 Data communication Media Various media are used for data communication. It is possible to group all these media into two main types: 1. Guided Media: If a particular physical medium is used for data communication, it is called guided media. 2. Unguided Media: Communicating data using media which are not physical is simple and common today. Those media are called unguided media. Guided Media Wires are used here for data communication and some most popular media are given below. Twisted wire pair: The normal wires used for daily activities can also be used for data communication. e.g.: Normal telephone wires Co-axial Cables: Co-axial cables, which consist of a copper net woven around a copper wire, are also used for data communication. This is used in antenna wires for Television Sets. Fiber Optics: Fiber Optics is a very popular guided media used today for data communication. This is used in modern telephone lines. Figure 3.2 Figure 3.3 Figure 3.4
  • 21. 21 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 21 of 45 Unguided Media No physical medium is used here to build the relationship and the communication media given below are widely used. Radio waves Radio waves, which are very familiar to our normal lives, can be used for data communication very easily. Infrared Infrared, which possesses very low frequency light beams, can also be used for data communication. These are largely used for data communication when cable less keyboards, Mice and television remote controls are used. Microwaves Microwaves are used to communicate data to a longer distance and short signals which contain higher frequencies are used here. Examples of communication media mentioned above are Bluetooth, Wi-Fi, and WI-Max are also used. Task 3.3 Data Transmission Types Data transmission can be done in two ways. Those are: 1. Serial data transmission 2. Parallel data transmission 1. Serial data transmission Data is transmitted here one after the other (in a serial way). Such data transmission is done in bits in a computer network. One wire is enough here for data transmission. 2. Parallel data transmission Several bits are transmitted at a time in parallel data transmission and several wires are used for this. In most of the instances, the use of at least eight wires for this is the normal way.
  • 22. 22 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 22 of 45 Task 3.4 Data Transmission Modes Three main modes are noticed in data transmission. They are 1. Simplex 2. Half-Duplex 3. Duplex 1. Simplex In simplex data transmission, data is directed one way. There is no any space for data transmission to be directed the other way. The best examples which can be mentioned here are television and radio transmission. Data transmission is always done here only from sender to receiver 2. Half-Duplex In Half-Duplex data transmission, data can be directed one way at a time. Though data can be transmitted both ways here, until the data transmission to one direction is over, data cannot be transmitted in the other direction. The best example which can be cited here is the Walkie-talkie. 3. Duplex In full duplex data transmission, data can be transmitted both ways at the same time. The best example which can be shown here is the telephone. Sender Receiver Figure 3.5 Sender Receiver Figure 3.6 Sender Receiver Figure 3.7
  • 23. 23 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 23 of 45 Task 04 Task 4.1 Computer Network The computer system which is connects two or more computers is called a computer network. When a computer network is built, the resources of the computers can be commonly used. In building such a computer network, various communication devices and techniques are used to connect computers and other devices. Advantages of computer Network  Speed: Since the computers and other devices are well connected to one another in a computer network, it is possible to transmit data and information very easily and fast.  Cost: The high cost for computer programs and devices can be easily reduced when a computer network is built. The reason for this high cost is that the computer software has to be bought separately for each computer when the computers are used separately.  Ease in Centralized software management: In computer network, it is possible to manipulate software installed in computers from one place. That means software can be centrally managed.  Sharing of resources: In computer networks, expensive special devices can be commonly used. For instance, only one printer is sufficient for many computers in a computer network.  E-mail: Email can be used to exchange information very easily among computers. Disadvantages of computer Network  In certain networks (e.g. Star), breakdown of the main computer can adversely affect the process of the entire computer system.  There is a possibility to lose resources due to the errors of the network system.  Outsiders may access the network and rob data and information there.  Sometimes the user may not be able to access the required resources easily (e.g.: a shared printer being used by many users at the same time).  Controlling the network is not an easy task. It demands special computer software and specially trained officers.  Communication of Data and information can be disturbed due to the errors of the network system.
  • 24. 24 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 24 of 45 Task 4.2 Devices that used in Computer Network It can be noticed that many devices are used in computer networks. Let us consider the details of the essential devices in computer networking. Modem The telephone line can be used to access Internet. The MODEM is a device that has to be used here to build the necessary relationship to connect the computer to Internet through telephone lines. Network Hub Network Hub is used in a computer network to connect several computers with one another. Network Switch Network switch is used in a computer network to exchange data and information in a regular manner among the computers in the network. The main difference between Network Switch and Hub is that in a Hub the data are broadcasted to all the devices that are connected to it while in a switch the data are routed only to the relevant device. Network Interface Card (NIC) Network Interface Card is the card which contains the circuits which are necessary to connect your computer to a network. It can be observed that some Motherboards contain circuits which are necessary for networking.
  • 25. 25 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 25 of 45 Task 4.3 Types of Network Work Group Network No dedicated server, based on the way that a certain user access another user client and server roles will be changing one to another. Workgroups are designed for small LANs in homes, schools, and small businesses. Server Based Network In a server-based network, the server is the central location where users share and access network resources. This dedicated computer controls the level of access that users have to share resources. Shared data is in one location, making it easy to back up critical business information. Each computer that connects to the network is called a client computer. Scope of Network As far as computer networks are concerned, we can identify three main types. They are: 1) Local Area Network (LAN) 2) Wide Area Network (WAN) 3) Metropolitan Area Network (MAN) 1) Local Area Network (LAN) A Network that can be identified with in a geographical location can be called as Local Area Network. In most of the instances, this kind of network is limited to one building or else the network is built connecting a few places which are situated very close to each other. For instance, a computer network built in a school or a university can be called a Local Area Network. 2) Wide Area Network (WAN) A computer network which is spread in a large area is called a Wide Area Network. The best example which can be given for this is the Internet. No geographical restriction can be shown in such a network. 3) Metropolitan Area Network (MAN) Networks which are spread in a larger area than a Local Area Network but smaller than Wide Area Network are called Metropolitan Area Networks. A computer network which is maintained in a government institute can be cited as an example here. The relevant divisional institutes are operated while being connected to this network. For instance, a computer network which connects Divisional Secretariats can be called a Metropolitan Area Network.
  • 26. 26 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 26 of 45 Task 4.4 Network Topologies The way in which the connections are made is called the topology of the computer network. Network topology specifically refers to the physical layout of the network, especially the locations of the computers and how the cable is run between them. 1) Bus Topology This computer network is built centering on a main wire and connecting all the computers and other devices to it. The advantages of this are the need of a few wires and the convenience to fix computers and other devices. A main disadvantage of this is the fact that the whole network depends on the main wire. Further, closing the main wire at both ends using terminators is a difficult task. 2) Star topology The computers are connected here in the shape of a star as shown in (Figure 4.2). A computer or a hub or switch is used here in the middle to connect all the computers to one another. It is very easy to install a star network and it is relatively easy to identify and correct errors there. Further, the main disadvantage of this network are the necessity to use a large number of wires to connect computers to one another and the fact that if the computer, hub or switch in the middle breaks down, the whole system will be broken. 3) Ring topology This network is arranged connecting computers to one another in the form of a ring. Even though the need of a few wires to connect computers can be mentioned as an advantage, the main disadvantage in a ring network is that if one computer does not operate, the whole network will collapse. Figure 4.1 Figure 4.2 Figure 4.3
  • 27. 27 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 27 of 45 4) Mesh topology In mesh topologies there is no specific structure to connect computers and other devices. This topology is commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this topology is commonly used for wireless networks. The main disadvantages in a mesh network is that if certain connection fails only that node will fail, other will work. 5) Hybrid topology In Hybrid topology there is no specific structure, because the designers are authorized to selecting and blending all the beneficial points of deferent modules, to develop a hybrid module. When you are selecting two or more modules to develop a hybrid network, you must consider about the advantages and disadvantages in each module. Figure 4.4 Figure 4.5
  • 28. 28 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 28 of 45 Task 05 Task 5.1 Computer Operating System We cannot use the computer without the Operating System. When we switch ON the computer, the operating system functions automatically, creating the environment necessary for us to use the computer. MS DOS, Windows, UNIX, Linux and Mac OS can be mentioned as some of the most commonly used operating systems. The main function of a computer operating system is to provide an interface for its users by hiding the complexity of computer hardware and other software so that users can easily access the relevant software. Moreover, the computer operating system should coordinate all the devices to get the maximum benefit out of them. User Interfaces 1. Command Line Interface (CLI) 2. Graphical User Interface (GUI) Command Line Interface (CLI) In the CLI a prompt is found in the screen. The user should type according to the given instructions or special commands here. This interface is more difficult to learn because of its need to memorize lot of different commands. Command Line Interfaces are found in operating systems such as MS DOS, UNIX and Linux. Graphical User Interface (GUI) A graphical interface is used here to make use of the computer easier and simpler for the user. A GUI Operating system is commonly navigated by using a computer mouse. There is no need to keep the commands in mind and the computer can be handled very easily using graphics. Graphical User Interface are found in operating system such as Microsoft Windows and Mac OS X. The following elements can be seen in the operating systems that give GUIs.  Windows  Icons  Menus  Pointer
  • 29. 29 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 29 of 45 Classification of operating System Based on number of users and numbers of task, computer operating system can be classified as:  Single User – Single Task e.g.: MS-DOS  Single User – Multi Task e.g.: Windows  Multi User – Multi Task e.g.: Server Operating systems Task 5.2 Functions of an Operating System The basic functions of an operating system can be divided into five categories: 1) Memory Management 2) Process Management 3) Device Management 4) File Management 5) Security Management 1) Memory Management Providing allocations in the memory for various tasks too is another function of an operating system. Computer memory is managed in an organized manner by the operating system when several processes are done simultaneously so that there will be no clash among them. Another function of an operating system is to release the memory to perform a new task when the previous task is totally completed. 2) Process Management Computer programs are the set of instructions that programmers write in language for the computers to follow. When a program is running in the computer it is called a "process". Process management is a basic function of modern operating systems. However, only one process operates at one time in the Central Processing Unit when several processes are in operation. The processes are activated one at a time in a selected order.
  • 30. 30 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 30 of 45 3) Device Management Device Management is another function that has to be performed by the operating system. An operating system has to handle various devices in various ways. Some examples for these can be the hardware segments of a computer system such as the printer. Factors such as the speed of the devices, amount of information, its purpose, direction where information flows, protocol used to transmit information (communication protocol) affect the management of devices. 4) File Management The data/information is stored in secondary storage in the form of 'files'. You may have used them to save information in computer and retrieved those later. It is very important for a computer to save files in a place we want and to manage them properly. The operating system manages the processes of creating, naming, organizing, accessing, using and protecting the files. It gives opportunity to create, copy, move, rename, retrieve and delete files. 5) Security Management The operating system also protects a computer system from external and internal dangers. For example, the use of the user name and the password are two security shield used by the operating system to control unauthorized entry into a computer.
  • 31. 31 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 31 of 45 Task 06 Task 6.1 Open source operating system Open source software most often is associated with free software and while this might be true on many open source programs the main difference is that a person can take open source software, including an operating system such as Linux, and can modify and change the program to suit their needs. The nice thing about an open source operating system like Linux is how much you can customize it, the downside is that it requires quite a bit of knowledge about computer programming. Open Source & Windows Windows: - Windows is the family of operating system (OS) from Microsoft, which is the most famous OS in the world. Open Source: - Linux is an example of Open Source software development and Free Operating System (OS). User interface Windows: - The Windows GUI is an integral component of the OS and it is mainly influenced by Apple Macintosh OS and Xerox. Open Source: - Linux typically provides two GUIs, KDE and Gnome. But Linux GUI is optional. Cost Windows: - For desktop or home use, Windows can be expensive. A single copy can cost around 15,000Rs to 20,000Rs, depending on the version of Windows. Open Source: - Linux can be freely distributed, downloaded freely. There are priced versions for Linux also, but they are normally cheaper than Windows. Security Windows: - There have been more than 60,000 viruses in Windows Open Source: - Linux has had about 60-100 viruses listed till date. None of them actively spreading nowadays. File System Windows: - FAT, FAT32, NTFS, exFAT Open Source: - Ext2, Ext3, Ext4, Jfs, ReiserFS, Xfs, Btrfs, FAT, FAT32, NTFS
  • 32. 32 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 32 of 45 Open Source vs. Closed Source Operating System Software, including operating systems and applications, is created using programming code. Programmers write source code, which is then compiled into executable code, creating the product that you ultimately run on your computer. There are many operating systems in use for personal, business and industrial contexts, and some of them are closed source and some are open. In general, an open source system is one in which the source code is visible to you, and in a closed source system it's not. Policy The principle of open source software is that as a user you have a right to access the source code. If you're using a closed source system, you don't have access to its source code, even where the software has been purchased with a commercial license. As well as being able to see how a program has been implemented, many open source licenses also allow you to amend and redistribute the software, although often this depends on the type of license used. Differences Having access to source code isn't the only difference between open and closed source systems. While closed source operating systems are typically developed by corporations and worked on only by people within the organization, open source systems tend to be developed by large communities. Because open source programs have visible code, users and consumers of the software are able to identify bugs, and even fix them. Because of this, open source systems are often updated more regularly than closed source systems.
  • 33. 33 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 33 of 45 Task 07 Task 7.1 Factors to be concerned when buying a computer  We have to consider about how much money we have to buy a computer.  If we want a computer to carry everywhere we should buy a laptop, Or If we want a computer to use it home or office we can buy a desktop computer it depends on our requirement.  We should consider about the purpose why we want a computer, we should increase its performance by adding a high capacity RAM & VGA to play games and to do graphic designing OR If we want a computer for official purpose we should buy a high performance microprocessor.  We should consider about the capacity of Hard disk according to our requirements. If we see the needs and buy according to it we can save our money.  Buy a LCD or LED monitor instead of CRT monitor because CRT monitors absorbs more electricity.  Buy a disk drive you use the most. Buying a DVD drive is much better than a VCD drive.  Buy additional hardware such as speakers, modem, Printer and etc….  We have to consider about the kind of Operating system we put to our computer. Whether it is a paid operating system (e.g. Windows) or an Open source operating system (e.g. Linux).  If we use internet it is a must to have an Internet security, if we don’t use internet normal Virus guard is more than enough.  Buy a brand new computer rather than a used one.
  • 34. 34 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 34 of 45 Task 7.2 Factors to consider when implementing a network  We have to consider how many computers we are going to use in network.  What type of equipment will the network contain? The following devices are the most common things that a network can contain:  Hub  Switches  Routers  Modem  You'll have to consider here the type of storage equipment needed, the capacity, the speed etc.  IP telephones - telephones that communicate through the IP protocol.  Printers - printing equipment.  Servers - machines dedicated to host critical services and applications.  Computers - network hosts.  Consider about the network type we are going to use.  According to the environment where we are going to implement a network, we should select the topology.  After selecting topology we want to consider how much will it cost to implement the whole network.  Be cautious about the security of the network.
  • 35. 35 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 35 of 45 Task 7.3 Computer security measures Physical Security Physical security is measure that which are design to deny to unauthorized personal from physically accessing a building, facility or stored information.  Cooler fanes  Using Casing.  Using Fire guards.  Cover up the computer.  Use a UPS. Logical Security Logical Security safe guards a certain computer system in an intangible way.  User Names and Passwords.  Access control.  Virus guards and firewalls.  Backup and recovery. Task 7.4 Sound cards An expansion board that enables a computer to manipulate and output sounds. Sound cards are necessary for nearly all CD-ROMs and have become commonplace on modern personal computers. Sound functionality can also be integrated onto the motherboard, using basically the same components as a plug-in card. Memory The term memory identifies data storage that comes in the form of chips, and the word storage is used for memory that exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually referred to as main memory or RAM. A computer that has 1 megabyte of memory, therefore, can hold about 1 million bytes. There are several different types of memory:  RAM (random-access memory)  ROM (read-only memory)  PROM  EPROM  EEPROM External storage
  • 36. 36 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 36 of 45 In computing, external storage comprises devices that temporarily store information for transporting from computer to computer. Such devices are not permanently fixed inside a computer. External storage devices provides additional storage other than that available in computer. Data can be transported easily from one place to another. It is useful to store software. Types of external storage: Magnetic storage  Cassette tape  Floppy disk Optical storage  CD  DVD Video Graphic Adapter Video Graphic Adapter (VGA) is an expansion Card which can be fixed in expansion slot. It generates a feed of images to a display.
  • 37. 37 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 37 of 45 Task 08 Task 8.1 Test Plan The test plan keeps track of possible tests that will be run on the system after coding. It is a document that develops as the project is being developed. The initial test plan is abstract and the final test plan is concrete. Objective of test plan  Given idea about the cost price.  Shows the suitable resources.  Evaluate and test testing process.  Shows the places that needed to be tested or corrected.  Schedule testing activities according to the test strategy and project deadlines. Task 8.2 Based on the available software testing time can be very with the relevant resources to be utilized mostly the testing has to be done many times before a software implementation Following are the objective of software testing: 1. To check the expected outcome. 2. To correct all identified errors. 3. To identify different ways of re-constructing the software. White Box Testing White-box testing is a methodology used to ensure and validate the internal framework, mechanisms, objects and components of a software application. White-box testing verifies code according to design specifications. Advantages of White box testing  It helps to optimize and re-construct the cording.  It removes unnecessary lines of code.  Facilitates finding of the locations of hidden errors in early phases of development.  The testing is done by software experts, it can guaranty about the exact and it takes very less time. Disadvantages of white box testing  Requires a skilled tester, so white box testing is very expensive.  It might be time consuming without the help of knowledgeable testers.  Code bit validation is difficult.
  • 38. 38 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 38 of 45 Black Box Testing Black box testing is a software testing technique that focuses on the analysis of software functionality, versus internal system mechanisms. Black box testing was developed as a method of analyzing client requirements, specifications and high-level design strategies. Advantages of Black box testing  Save time in large system implementation  Provides flexibility: Specific programming knowledge is not required.  Conserves resources: Testers focus on software functionality.  Mostly the testers will be conducting in user’s point of view. Disadvantages of black box testing  Test case/script design and maintenance may be problematic because black box testing tools depend on known inputs.  Graphical User Interface (GUI) interaction may damage test scripts.  Sometimes testers must be struggling to identify and debug the tricky part of cording.  Sometimes it is difficult to identify all the inputs in a given testing time period. Task 8.3 Health & Safety issues in ICT Using computer a lot can harm our body headache, Eye strain, back pain. We should follow some health tips to avoid them.  Headache and eyes strain – to avoid this take even a short break every two hours. Do not focus in screen a lot. Clean the screen to remove dust.  Back pain -- Stable, allowing easy freedom of movement and comfortable position.  Numbness – Don’t sit too long in the chair.  Migraine – Don’t get stressed too much.
  • 39. 39 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 39 of 45 Task 09 Task 9.1 User Training Needs TNA is an effective way of identifying the space between the skills a business needs and what employees have. Gathering information to find areas where employees could improve their performance involve this. It helps us to identify the objectives in a training staff. Objectives  Analyze business goals and the skills required to meet these goals.  Determine the changes in products or business process.  Increase the sense of ownership and involvement of the students.  Ascertain the most suitable evaluation mechanisms  Determine what is the most appropriate delivery format - class based, online or a mix of these and other formats  Achieve a correct fit between the provider and student, i.e., the course matches student needs and expectations  Evaluate who want to be trained and how best to reach them.  Evaluate the training place. Task 9.2 Help Desk A help desk is a resource intended to provide the customer or end user with information and support related to a companies or institution's products and services. The purpose of a help desk is usually to troubleshoot problems or provide guidance about products such as computers, electronic equipment, food, apparel, or software. Corporations usually provide help desk support to their customers through various channels such as toll-free numbers, websites, instant messaging, or email. There are also in-house help desks designed to provide assistance to employees.  An incident only requires reporting once.  It is simple to check when incidents are not effectively resolved, or action has not been taken when required.  Management information is more accessible and accurate.  Complex support tasks and calculations are made easier.
  • 40. 40 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 40 of 45 Task 9.3 ICT based Training Plan User trainings are common in most of the system implementation activities and it cost additional amount of money with additional resources and time. Prior to scheduling training activities, a requirement evaluation needs to be done to clearly identify the potential need for the intended training activity. Following are some reasons to scheduling the training:-  To evaluate user performance.  Intended system implementation.  To get professionally qualified.  To increase the efficiency and accuracy.  To be secured and guaranteed under the relevant work. Task 9.4 Objective of preparing a training schedule.  The purpose of a training plane is to identify the work to be carried out.  We can work according to the time schedule.  We can save time.  Can compare with exact outcome with the planned schedule.  Make it easy to monitor.  Make it easy to evaluate.
  • 41. 41 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 41 of 45 Task 10 Task 10.1 Computer security measures Physical Security Physical security is measure that which are design to deny to unauthorized personal from physically accessing a building, facility or stored information.  Cooler fanes: - There are two kind of cooler fans are available in the computer. One is processor cooler fan it reduce the heat of the processor, And the other one is normal cooler fan it cools the internal devices of the computer.  We want use system casing to prevent dust from entering.  Computer hardware is protected from fire damage by smoke detectors.  Cover up the computer using a sheet of cloth while not in use.  Use a UPS for avoiding immediate shut downs. Logical security measures  If you are using weak or no password, your computer can be hacked very easily. Your password should be unique for each of your account.  Use of reliable Antivirus and Anti Spyware Program. If you are not using any Antivirus or Anti Spyware program then your PC is very much in danger to be infected with Virus or Malware.  You must update or install patches or latest version when they released. Otherwise Intruders and hackers can take advantage of the vulnerabilities present in installed software.  Get a backup of system.
  • 42. 42 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 42 of 45 Task 10.2 Risks which can be identified within a Computer Network Environment A risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of computer services. As a network consists of more than one user, it is essential to provide facilities to communicate in a safe and confidential way. But there are some incidents which lead to expose confidential data to outsiders and also which lead to loose data, like listed below:-  Outsiders may access the network and rob data and information there.  Unauthorized access and use of computer systems.  Disk failure  Power failure and surges  Physical theft  Computer Virus Threats  Spyware Threats Precautions that can be taken to prevent those risks  Monitor the user through the main server in order to identify file sharing.  User name and password for each user will help to prevent unauthorized access.  Power problems (surges, blackouts, and brown-outs) can cause physical damage to a computer, inducing a hard disk crash or otherwise harming the electronic components of the computer. Common mitigation methods include using surge suppressors and uninterruptible power supplies (UPS).  To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred.  Connect other peripherals through the main server. Then easily can identify when any of them are removed from the machine.  Keep backups of the entire system to use in a system failure.  Cryptographic tools are available that can encrypt data stored on a computer’s hard disk. Use these tools if the computer contains sensitive data or is at high risk of theft.  Use of anti-virus software on computers. Keep anti-virus software up-to-date. Many anti-virus packages support automatic updates of virus definitions.
  • 43. 43 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 43 of 45 Sending the data via public medium Task 10.3 Encryption Converting the readable form of data into unreadable form of data is called encryption. A mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms Why we use Encryption mechanism If you don’t already know it, without encryption there is no such thing as privacy. At least not for your data. It’s all 1′s and 0′s but doesn’t take a genius at all to recognize the data it represents if it’s not encrypted when intercepted. And there are literally thousands of ways to intercept data. Sender Readable form of data Unreadable form of data Unreadable form of data Readable form of data Receiver ENCRYPTION DECRYPTION
  • 44. 44 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 44 of 45 Task 10.4 How network management helps to reduce unauthorized activities Computer network management by Network Infrastructure Technology can help you cut costs and enhance productivity throughout your company, whether you have one location or several locations throughout the world. So it is important to reduce unauthorized access and data sharing with other parties because it will directly affect the organization.  Hacking is unauthorized accessing of private and confidential information or ICT based assets by using crackers/tools to get the things done. Cracking user names and pass words to get in to private network or to access private information like account details, financial transactions also come under hacking.  As most of the business information are confidential it is an essential need to avoid hacking. So companies hire security experts for security guidance.  Most management systems their own encryption systems to transfer confidential information.  A system may have its own firewall. Hackers find it hard to get through them because they are not aware of its source codes.  If the whole network is monitored through a main server, it is impossible to use USB drives to transfer files.
  • 45. 45 | P a g e International Diploma in Computing/Business Management Computer platforms /combined assessment Page 45 of 45 Reference 1) http://www.differencebetween.com 2) http://www.pccomputernotes.com 3) http://www.helpmasterpro.com/home/why-help-desk-software.aspx 4) http://en.wikipedia.org/wiki/FLOPS 5) http://www.pccomputernotes.com/clockspeed/clockspeed.htm 6) http://en.wikipedia.org/wiki/Network_topology 7) http://management.atwork-network.com/2008/04/15/mintzberg%E2%80%99s-10- managerial-roles/ 8) http://en.wikipedia.org/wiki/Category:Network_analyzers 9) http://en.wikipedia.org/wiki/Network_administrator 10) http://www.webopedia.com/TERM/N/network_management.html 11) http://en.wikipedia.org/wiki/Encryption 12) http://www.ictcomputertraining.com/ 13) http://freehelpdesk.org/help-desk-software-benefits.php 14) http://www.helpdesksaas.com/blog/column/benefits-of-a-local-help-desk/ 15) http://en.wikipedia.org/wiki/Non-volatile_memory 16) http://en.wikipedia.org/w/index.php?search=access+latency&title=Special%3ASearc h 17) http://www.wisegeek.org/what-is-data-transfer-rate.htm 18) http://www.cert.org/tech_tips/home_networks.html#III-A