SlideShare a Scribd company logo
1 of 41
Introduction to computers and
programming
Content
• Hardware
• Information storage
 RAM, ROM
 HD, DVD
• Display
 Images
 Characters (fonts)
• File system/type
 Encryption
 Compression
• Network
 Protocols
 Packets
• Programming
 Algorithm
 Pseudocode
 Flowchart
• Languages
• Source code
 Example
The computer
Internally
The connections
Information storage
• 1 bit
• 8 bits
• 16 bits
• 32 bits
• 64 bits
• bit (1 or 0)
• byte (octet) (28
)
• word (216
)
• double (232
)
• long double (264
)
Encoding information on a fixed element of length n with a
base b gives bn
non-redundant possibilities
Information coding
• Binary
 0 or 1
• Octal
 0-7
• Hexadecimal
 0-9+A-F
• Decimal
 0-9
• How to count
• 128+32+16+4+1=
 181 (decimal)
 265 (octal)
 B5 (hexadecimal)
• Signed vs unsigned
 0 to 255
 -127 to +127
128 64 32 16 8 4 2 1
1 0 1 1 0 1 0 1
Operations on bits
• Booleans:
 0 = false = no
 1 = true = yes
• Operators:
 AND
 OR
 XOR
 NOT
• Example tables
AN
D
0 1
0 0 0
1 0 1
OR 0 1
0 0 1
1 1 1
XO
R
0 1
0 0 1
1 1 0
RAM/ROM
Memory mapping
Address Values
0000
0001
0002
..
..
..
..
FFFF
• Size reminder:
• Kilobyte Kb 210
~103
• Megabyte Mb 220
~106
• Gigabyte Gb 230
~109
• Terabyte Tb 240
~1012
• Petabyte Pb 250
~1015
• …
1 0 1 1 1 0 0 1
0 0 0 0 1 1 1 1
1 1 1 0 0 0 1 1
0 0 1 0 0 1 0 0
HD/DVD
track
sector
head
Display
• Screen pixel or dots
• Color coding: 32 bits
• 1 pixel = 3 bytes of color (RGB)+1
byte alpha channel (transparency)
• 1600x1200x4bytes=7,5 Mb!
• Fonts
 Bitmap
 Vectors
 TrueType, OpenType,
PostScript
QuickTime™ et un
décompresseur TIFF (non compressé)
sont requis pour visionner cette image.
Keyboard/Mouse
• Each key (or combination
of keys) of the keyboard
sends a code to the
computer.
• The code is interpreted and
converted to the
corresponding ASCII or
Unicode number.
• The mouse movements
 1 to 4 bytes (vertical &
horizontal)
• Buttons
 Clicked, pressed, rolled
buttons
ASCII & Unicode
• ASCII 7/8 bits
• Unicode
 UTF-8/16/32 bits
 ISO-8859 (Latin)
• od -c od -h
•
Software layers
ROM
Hardware
Operating System
User Interface
Software
Files
CPU, RAM, HD, DVD
Word, scripts, mail, web browser…
Data (.doc, .mp3)
BIOS
Linux
CLI, X-Windows
Windows
Windows
MacOSX
Firmware
Quartz
File systems
• Method the OS uses to store information
 Storage unit, directories, subdirectories (Windows,
VMS)
 Single arborescence (Linux, MacOSX, all Unix)
• What exactly is a file?
 a piece of information (text, graphic, data, music
program, script)
 it is identified by a name and an logical address (or
path)
 other informations: date, size, type, creator,
ownership, physical address…
File system organisation
Disk 1 Disk 2
Directories
Subdirectories
Windows
DOCS PROGS
WORD EXCEL
CONFIG DATA
EXPT1 EXPT2
/
/usr /home
phil johnlocal
bin lib
emacs X11
Unix
D:C:
Disk 1
Disk 2
Path
• The path is the logical address used by
the system or the user to locate a file.
• Example:
/bd_du_Palais/35/etage/4/appart/12/Dupont_ Jean.txt
filename
suffix
path
File types
• Executable
 .exe
 .app
 Unix requires « x »
• Data
 Text (.txt)
 Music (.mp3)
 Image (.jpg, .gif)
 Movie (.mpg, .mov)
 Binary (.bin)
• Special cases in Unix
 STDIN
 STDOUT
 STDERR
Encryption / compression
• Compression
 Reducing the size of files
 E.g., .mp3, .gz, .jpg, .zip
• Encryption
 Protecting your privacy
 E.g., .pgp
• Packing
 Grouping the files
 E.g., .tar
Networks
• Direct
 USB 11Mb-480Mb
 Ethernet 10Mb-1Gb
• Wired
 Modem 56Kb
 ADSL 600Kb-8Mb
 LAN 10Mb-10Gb
• Wireless
 Bluetooth 1Mb-20Mb
 WIFI (AirPort) 11Mb-54Mb
Network (ethernet or wireless)
• Computer talk to each
other via network
protocols
 ip, tcp, http, ftp, …
• TCP/IP
 transmission control
protocol/internet protocol
• Handshaking
• Transmission
• Ackowledgement
• DNS
 Domain Name Server
• URL
 Universal Resource
Locator
• IP addess
 192.42.197.51
DNS reminder
Primary DNS
Root DNS
Local DNS
Client query Target server
1
2 3
45
6
www.expasy.org
129.194.8.64
*.org
dns.anywhere.net
client.anywhere.net
www.expasy.org ??
Packets
The data travels within
units called packets
Packet breakout
Usual TCP/IP payload per packet: 512 bytes
Introduction to programming
What is a program?
• How to cook?
• The algorithm
• Are you a programmer?
Pseudocode
• This is the pseudocode for a game of Monopoly
Flowcharts
Flowcharts details
Languages
• Low level (processor dependent)
 Machine code, assembler
• High level: structured, procedural
 Fortran, C, Pascal…
• High level: object oriented
 C++, Java, C#, Perl, Objective-C…
• Virtual machines
 Java, C#…
• Scripting
 Perl, Python, JavaScript…
Source code -> Object code
• Compiler+linker
 Fortran, C, Pascal, C++…
• Interpreter
 Basic, Perl…
• Intermediate
 Java
• Compiler+linker
 Fast to execute, but slow
to debug
• Interpreter
 Slow to execute, but fast
to debug (no need to
recompile)
• Intermediate
 Slow…
Source code
• Instructions
 Statement, blocks
 Affectation
 Operators
 Loops
 Tests
 Subroutines
 Comments
• Data structures
 Variable
 List
 Array
 Hash
 Pointers
 Objects
Source code (2)
• Statement, blocks
 One or more
instructions for the
processor
• Affectation
 Change to a variable
• Operator
 affect one or more
variable
 + * - / AND OR NOT…
• Variable
 A region in memory
that can be modified
 Exists in different
types
 Scalar, char, numeric,
boolean
 List, array
 Hash
 Combination->data
structure
Source code (3)
• Loops
 Allow the computer to
repeat blocks
• Tests
 Decide what to do
• Subroutines
 Programs frequently
called (functions)
• Comments
 The most important
lines of the source
code…
• Pointers
 Reference to region in
memory (address)
• Objects
 Combination of data
and code
Example: a text to treat
« Noon rings out. A wasp, making an ominous sound, a sound akin to a klaxon or a
tocsin, flits about. Augustus, who has had a bad night, sits up blinking and purblind. Oh
what was that word (is his thought) that ran through my brain all night, that idiotic word
that, hard as I'd try to pun it down, was always just an inch or two out of my grasp - fowl
or foul or Vow or Voyal? - a word in a quizz which, by association, brought into play an
incongruous mass and magma of nouns, idioms, slogans and sayings, a confusing,
amorphous outpouring which I sought in vain to control or turn off but which wound
around my mind a whirlwind of a cord, a whiplash of a cord, a cord that would split again
and again, would knit again and again, of words without communication or any possibility
of combination, words without pronunciation, signification or transcription but out of
which, notwithstanding, was brought forth a flux, a continuous, compact and lucid flow: an
intuition, a vacillating frisson of illumination as if caught in a flash of lightning or in a mist
abruptly rising to unshroud an obvious sign - but a sign, alas, that would last an instant
only to vanish for good. »
Gilbert Adair
Result…
a=97
b=15
c=26
d=35
f=23
g=32
h=44
i=90
j=1
k=5
l=33
m=17
n=91
o=104
p=15
q=1
r=43
s=59
t=77
u=52
v=4
w=31
x=2
y=13
z=2
Do you see any problem??
Try with this:
« The quick brown fox, jumps
over the lazy dog. »
Flowchart
Source code example
#!/usr/bin/perl -w # essential line of all perl scripts
$filename = "avoid.txt"; # affect « avoid.txt » to the variable $filename
# open the file, or exit
open(FILE, $filename) || die "Cannot open file ‘$filename’nn";
@text = <FILE>; # add each line of the file to an array
close FILE;
foreach $line (@text) { # read one line from the array into $line and repeat for each line
@table = split(//,$line); # read each character of the line in an array
while ($char=pop(@table)) { # read one character of the array 'table' and repeat for all
$char =~ s/[^a-z]//; # keep only the alphabetical character a to z
if ($char) { # check if the character exists and execute the block
$count{$char}++; # if yes, increment by one the hash 'count'
}
}
}
# print each character and its number of occurence one per line
foreach $c (keys %count) {
print "$c=$count{$c}n";
}
exit; # quit the program
Tips
• Think about your
problem
• Create a flowchart
• Create the
pseudocode
• Verify the memory
used by your
variables
• Write the code
• Test the code
 For all the possible
functions or cases (if
possible)
 Give it to users as a
beta (if not possibe)
 Sell it (if you work for
Microsoft©
… ;-)
• Debug
Summary of the week
• Monday
 Intro computers &
programming
 Intro Unix
 Tutorial Unix
• Tuesday
 Intro Perl
 Regexp & Perl In-liners
• Wednesday
 Object Oriented
programming
 BioPerl
 EMBOSS
• Thursday
 Database indexing
 BLAST
 HTML & cgi-bin
• Friday
 Finish exercises
 Users questions
Unix
• Next presentation…
VassiliosVassilios aliasalias
UnixMan!!!UnixMan!!!

More Related Content

What's hot

What's hot (6)

Python build your security tools.pdf
Python build your security tools.pdfPython build your security tools.pdf
Python build your security tools.pdf
 
A Quick Introduction to Linux
A Quick Introduction to LinuxA Quick Introduction to Linux
A Quick Introduction to Linux
 
Unix command line concepts
Unix command line conceptsUnix command line concepts
Unix command line concepts
 
Unleash your inner console cowboy
Unleash your inner console cowboyUnleash your inner console cowboy
Unleash your inner console cowboy
 
Console comparsions
Console comparsionsConsole comparsions
Console comparsions
 
Dns
DnsDns
Dns
 

Viewers also liked

Sierra Club QC
Sierra Club QCSierra Club QC
Sierra Club QCRoseBas
 
Tableau de bord-transition-énergétique
Tableau de bord-transition-énergétiqueTableau de bord-transition-énergétique
Tableau de bord-transition-énergétiqueACPOIRIER
 
Effets de l’exposition des grappes
Effets de l’exposition des grappesEffets de l’exposition des grappes
Effets de l’exposition des grappesRiccagioia Scpa
 
Copeaux de bois
Copeaux de boisCopeaux de bois
Copeaux de boismarkfrm
 
Condamnation pénale de Robert Eringer pour diffamation et injure publique env...
Condamnation pénale de Robert Eringer pour diffamation et injure publique env...Condamnation pénale de Robert Eringer pour diffamation et injure publique env...
Condamnation pénale de Robert Eringer pour diffamation et injure publique env...Berntin
 
Transit Fret sur route sur les passages franco-italiens principaux 2012
Transit Fret sur route sur les passages franco-italiens principaux 2012Transit Fret sur route sur les passages franco-italiens principaux 2012
Transit Fret sur route sur les passages franco-italiens principaux 2012INTERALPES Alcotra 2007-2013
 
Cm6.06 part2 identification_etcapitalisation_ing
Cm6.06 part2 identification_etcapitalisation_ingCm6.06 part2 identification_etcapitalisation_ing
Cm6.06 part2 identification_etcapitalisation_ingidigroupe6
 
Merlin le magicien du roi Arthur
Merlin le magicien du roi ArthurMerlin le magicien du roi Arthur
Merlin le magicien du roi ArthurEdmond Nollomont
 
C'est magique!
C'est magique!C'est magique!
C'est magique!Carmen
 
Cm6.01 part2 outils_etmethodes_ing
Cm6.01 part2 outils_etmethodes_ingCm6.01 part2 outils_etmethodes_ing
Cm6.01 part2 outils_etmethodes_ingidigroupe6
 
Accessibilite web
Accessibilite webAccessibilite web
Accessibilite webneuros
 
Dans quel contexte employer Zend ou Drupal
Dans quel contexte employer Zend ou DrupalDans quel contexte employer Zend ou Drupal
Dans quel contexte employer Zend ou Drupalneuros
 
Mirelis - Présentation de la Ville de Montréal
Mirelis - Présentation de la Ville de MontréalMirelis - Présentation de la Ville de Montréal
Mirelis - Présentation de la Ville de MontréalLouis-Alexandre Cazal
 
Liste inscrits 19 kms
Liste inscrits 19 kmsListe inscrits 19 kms
Liste inscrits 19 kmstcvdl
 
Cinema petit point et gros pois
Cinema petit point et gros poisCinema petit point et gros pois
Cinema petit point et gros poissandrine128
 

Viewers also liked (20)

Sierra Club QC
Sierra Club QCSierra Club QC
Sierra Club QC
 
Tableau de bord-transition-énergétique
Tableau de bord-transition-énergétiqueTableau de bord-transition-énergétique
Tableau de bord-transition-énergétique
 
Effets de l’exposition des grappes
Effets de l’exposition des grappesEffets de l’exposition des grappes
Effets de l’exposition des grappes
 
Copeaux de bois
Copeaux de boisCopeaux de bois
Copeaux de bois
 
Calameo
CalameoCalameo
Calameo
 
Condamnation pénale de Robert Eringer pour diffamation et injure publique env...
Condamnation pénale de Robert Eringer pour diffamation et injure publique env...Condamnation pénale de Robert Eringer pour diffamation et injure publique env...
Condamnation pénale de Robert Eringer pour diffamation et injure publique env...
 
Transit Fret sur route sur les passages franco-italiens principaux 2012
Transit Fret sur route sur les passages franco-italiens principaux 2012Transit Fret sur route sur les passages franco-italiens principaux 2012
Transit Fret sur route sur les passages franco-italiens principaux 2012
 
Cm6.06 part2 identification_etcapitalisation_ing
Cm6.06 part2 identification_etcapitalisation_ingCm6.06 part2 identification_etcapitalisation_ing
Cm6.06 part2 identification_etcapitalisation_ing
 
Merlin le magicien du roi Arthur
Merlin le magicien du roi ArthurMerlin le magicien du roi Arthur
Merlin le magicien du roi Arthur
 
C'est magique!
C'est magique!C'est magique!
C'est magique!
 
Cm6.01 part2 outils_etmethodes_ing
Cm6.01 part2 outils_etmethodes_ingCm6.01 part2 outils_etmethodes_ing
Cm6.01 part2 outils_etmethodes_ing
 
Accessibilite web
Accessibilite webAccessibilite web
Accessibilite web
 
Dans quel contexte employer Zend ou Drupal
Dans quel contexte employer Zend ou DrupalDans quel contexte employer Zend ou Drupal
Dans quel contexte employer Zend ou Drupal
 
Sus aux moustiques
Sus aux moustiquesSus aux moustiques
Sus aux moustiques
 
Voeux aux acteurs economiques 2013
Voeux aux acteurs economiques 2013Voeux aux acteurs economiques 2013
Voeux aux acteurs economiques 2013
 
Mirelis - Présentation de la Ville de Montréal
Mirelis - Présentation de la Ville de MontréalMirelis - Présentation de la Ville de Montréal
Mirelis - Présentation de la Ville de Montréal
 
Pat 3
Pat 3Pat 3
Pat 3
 
Saint valentin (1)
Saint valentin (1)Saint valentin (1)
Saint valentin (1)
 
Liste inscrits 19 kms
Liste inscrits 19 kmsListe inscrits 19 kms
Liste inscrits 19 kms
 
Cinema petit point et gros pois
Cinema petit point et gros poisCinema petit point et gros pois
Cinema petit point et gros pois
 

Similar to Intro computeRRR

Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersVisualBee.com
 
C101 – Intro to Programming with C
C101 – Intro to Programming with CC101 – Intro to Programming with C
C101 – Intro to Programming with Cgpsoft_sk
 
What's with the 1s and 0s? Making sense of binary data at scale with Tika and...
What's with the 1s and 0s? Making sense of binary data at scale with Tika and...What's with the 1s and 0s? Making sense of binary data at scale with Tika and...
What's with the 1s and 0s? Making sense of binary data at scale with Tika and...gagravarr
 
Erlang Message Passing Concurrency, For The Win
Erlang  Message  Passing  Concurrency,  For  The  WinErlang  Message  Passing  Concurrency,  For  The  Win
Erlang Message Passing Concurrency, For The Winl xf
 
Unicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsUnicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsRay Paseur
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesMilind Patil
 
Understanding Character Encodings
Understanding Character EncodingsUnderstanding Character Encodings
Understanding Character EncodingsMobisoft Infotech
 
What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...
What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...
What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...gagravarr
 
Webinar: Understanding Storage for Performance and Data Safety
Webinar: Understanding Storage for Performance and Data SafetyWebinar: Understanding Storage for Performance and Data Safety
Webinar: Understanding Storage for Performance and Data SafetyMongoDB
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The ComputerNasir Jumani
 
10 instruction sets characteristics
10 instruction sets characteristics10 instruction sets characteristics
10 instruction sets characteristicsSher Shah Merkhel
 
Bioinformatics p1-perl-introduction v2013
Bioinformatics p1-perl-introduction v2013Bioinformatics p1-perl-introduction v2013
Bioinformatics p1-perl-introduction v2013Prof. Wim Van Criekinge
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptAlula Tafere
 
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013midnite_runr
 

Similar to Intro computeRRR (20)

Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
C101 – Intro to Programming with C
C101 – Intro to Programming with CC101 – Intro to Programming with C
C101 – Intro to Programming with C
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Bioinformatics v2014 wim_vancriekinge
Bioinformatics v2014 wim_vancriekingeBioinformatics v2014 wim_vancriekinge
Bioinformatics v2014 wim_vancriekinge
 
Mifare Desfire Technology
Mifare Desfire TechnologyMifare Desfire Technology
Mifare Desfire Technology
 
What's with the 1s and 0s? Making sense of binary data at scale with Tika and...
What's with the 1s and 0s? Making sense of binary data at scale with Tika and...What's with the 1s and 0s? Making sense of binary data at scale with Tika and...
What's with the 1s and 0s? Making sense of binary data at scale with Tika and...
 
Erlang Message Passing Concurrency, For The Win
Erlang  Message  Passing  Concurrency,  For  The  WinErlang  Message  Passing  Concurrency,  For  The  Win
Erlang Message Passing Concurrency, For The Win
 
Unicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set CollisionsUnicode, PHP, and Character Set Collisions
Unicode, PHP, and Character Set Collisions
 
Abap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfilesAbap slide class4 unicode-plusfiles
Abap slide class4 unicode-plusfiles
 
Understanding Character Encodings
Understanding Character EncodingsUnderstanding Character Encodings
Understanding Character Encodings
 
Huffman Codes
Huffman CodesHuffman Codes
Huffman Codes
 
What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...
What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...
What's With The 1S And 0S? Making Sense Of Binary Data At Scale With Tika And...
 
Komdat-Kompresi Data
Komdat-Kompresi DataKomdat-Kompresi Data
Komdat-Kompresi Data
 
Webinar: Understanding Storage for Performance and Data Safety
Webinar: Understanding Storage for Performance and Data SafetyWebinar: Understanding Storage for Performance and Data Safety
Webinar: Understanding Storage for Performance and Data Safety
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 
10 instruction sets characteristics
10 instruction sets characteristics10 instruction sets characteristics
10 instruction sets characteristics
 
Bioinformatics p1-perl-introduction v2013
Bioinformatics p1-perl-introduction v2013Bioinformatics p1-perl-introduction v2013
Bioinformatics p1-perl-introduction v2013
 
Memory
MemoryMemory
Memory
 
Lecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.pptLecture_ASCII and Unicode.ppt
Lecture_ASCII and Unicode.ppt
 
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
 

Recently uploaded

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 

Recently uploaded (20)

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 

Intro computeRRR

  • 1. Introduction to computers and programming
  • 2. Content • Hardware • Information storage  RAM, ROM  HD, DVD • Display  Images  Characters (fonts) • File system/type  Encryption  Compression • Network  Protocols  Packets • Programming  Algorithm  Pseudocode  Flowchart • Languages • Source code  Example
  • 6. Information storage • 1 bit • 8 bits • 16 bits • 32 bits • 64 bits • bit (1 or 0) • byte (octet) (28 ) • word (216 ) • double (232 ) • long double (264 ) Encoding information on a fixed element of length n with a base b gives bn non-redundant possibilities
  • 7. Information coding • Binary  0 or 1 • Octal  0-7 • Hexadecimal  0-9+A-F • Decimal  0-9 • How to count • 128+32+16+4+1=  181 (decimal)  265 (octal)  B5 (hexadecimal) • Signed vs unsigned  0 to 255  -127 to +127 128 64 32 16 8 4 2 1 1 0 1 1 0 1 0 1
  • 8. Operations on bits • Booleans:  0 = false = no  1 = true = yes • Operators:  AND  OR  XOR  NOT • Example tables AN D 0 1 0 0 0 1 0 1 OR 0 1 0 0 1 1 1 1 XO R 0 1 0 0 1 1 1 0
  • 9. RAM/ROM Memory mapping Address Values 0000 0001 0002 .. .. .. .. FFFF • Size reminder: • Kilobyte Kb 210 ~103 • Megabyte Mb 220 ~106 • Gigabyte Gb 230 ~109 • Terabyte Tb 240 ~1012 • Petabyte Pb 250 ~1015 • … 1 0 1 1 1 0 0 1 0 0 0 0 1 1 1 1 1 1 1 0 0 0 1 1 0 0 1 0 0 1 0 0
  • 11. Display • Screen pixel or dots • Color coding: 32 bits • 1 pixel = 3 bytes of color (RGB)+1 byte alpha channel (transparency) • 1600x1200x4bytes=7,5 Mb! • Fonts  Bitmap  Vectors  TrueType, OpenType, PostScript QuickTime™ et un décompresseur TIFF (non compressé) sont requis pour visionner cette image.
  • 12. Keyboard/Mouse • Each key (or combination of keys) of the keyboard sends a code to the computer. • The code is interpreted and converted to the corresponding ASCII or Unicode number. • The mouse movements  1 to 4 bytes (vertical & horizontal) • Buttons  Clicked, pressed, rolled buttons
  • 13. ASCII & Unicode • ASCII 7/8 bits • Unicode  UTF-8/16/32 bits  ISO-8859 (Latin) • od -c od -h •
  • 14. Software layers ROM Hardware Operating System User Interface Software Files CPU, RAM, HD, DVD Word, scripts, mail, web browser… Data (.doc, .mp3) BIOS Linux CLI, X-Windows Windows Windows MacOSX Firmware Quartz
  • 15. File systems • Method the OS uses to store information  Storage unit, directories, subdirectories (Windows, VMS)  Single arborescence (Linux, MacOSX, all Unix) • What exactly is a file?  a piece of information (text, graphic, data, music program, script)  it is identified by a name and an logical address (or path)  other informations: date, size, type, creator, ownership, physical address…
  • 16. File system organisation Disk 1 Disk 2 Directories Subdirectories Windows DOCS PROGS WORD EXCEL CONFIG DATA EXPT1 EXPT2 / /usr /home phil johnlocal bin lib emacs X11 Unix D:C: Disk 1 Disk 2
  • 17. Path • The path is the logical address used by the system or the user to locate a file. • Example: /bd_du_Palais/35/etage/4/appart/12/Dupont_ Jean.txt filename suffix path
  • 18. File types • Executable  .exe  .app  Unix requires « x » • Data  Text (.txt)  Music (.mp3)  Image (.jpg, .gif)  Movie (.mpg, .mov)  Binary (.bin) • Special cases in Unix  STDIN  STDOUT  STDERR
  • 19. Encryption / compression • Compression  Reducing the size of files  E.g., .mp3, .gz, .jpg, .zip • Encryption  Protecting your privacy  E.g., .pgp • Packing  Grouping the files  E.g., .tar
  • 20. Networks • Direct  USB 11Mb-480Mb  Ethernet 10Mb-1Gb • Wired  Modem 56Kb  ADSL 600Kb-8Mb  LAN 10Mb-10Gb • Wireless  Bluetooth 1Mb-20Mb  WIFI (AirPort) 11Mb-54Mb
  • 21. Network (ethernet or wireless) • Computer talk to each other via network protocols  ip, tcp, http, ftp, … • TCP/IP  transmission control protocol/internet protocol • Handshaking • Transmission • Ackowledgement • DNS  Domain Name Server • URL  Universal Resource Locator • IP addess  192.42.197.51
  • 22. DNS reminder Primary DNS Root DNS Local DNS Client query Target server 1 2 3 45 6 www.expasy.org 129.194.8.64 *.org dns.anywhere.net client.anywhere.net www.expasy.org ??
  • 23. Packets The data travels within units called packets
  • 24. Packet breakout Usual TCP/IP payload per packet: 512 bytes
  • 26. What is a program? • How to cook? • The algorithm • Are you a programmer?
  • 27. Pseudocode • This is the pseudocode for a game of Monopoly
  • 30. Languages • Low level (processor dependent)  Machine code, assembler • High level: structured, procedural  Fortran, C, Pascal… • High level: object oriented  C++, Java, C#, Perl, Objective-C… • Virtual machines  Java, C#… • Scripting  Perl, Python, JavaScript…
  • 31. Source code -> Object code • Compiler+linker  Fortran, C, Pascal, C++… • Interpreter  Basic, Perl… • Intermediate  Java • Compiler+linker  Fast to execute, but slow to debug • Interpreter  Slow to execute, but fast to debug (no need to recompile) • Intermediate  Slow…
  • 32. Source code • Instructions  Statement, blocks  Affectation  Operators  Loops  Tests  Subroutines  Comments • Data structures  Variable  List  Array  Hash  Pointers  Objects
  • 33. Source code (2) • Statement, blocks  One or more instructions for the processor • Affectation  Change to a variable • Operator  affect one or more variable  + * - / AND OR NOT… • Variable  A region in memory that can be modified  Exists in different types  Scalar, char, numeric, boolean  List, array  Hash  Combination->data structure
  • 34. Source code (3) • Loops  Allow the computer to repeat blocks • Tests  Decide what to do • Subroutines  Programs frequently called (functions) • Comments  The most important lines of the source code… • Pointers  Reference to region in memory (address) • Objects  Combination of data and code
  • 35. Example: a text to treat « Noon rings out. A wasp, making an ominous sound, a sound akin to a klaxon or a tocsin, flits about. Augustus, who has had a bad night, sits up blinking and purblind. Oh what was that word (is his thought) that ran through my brain all night, that idiotic word that, hard as I'd try to pun it down, was always just an inch or two out of my grasp - fowl or foul or Vow or Voyal? - a word in a quizz which, by association, brought into play an incongruous mass and magma of nouns, idioms, slogans and sayings, a confusing, amorphous outpouring which I sought in vain to control or turn off but which wound around my mind a whirlwind of a cord, a whiplash of a cord, a cord that would split again and again, would knit again and again, of words without communication or any possibility of combination, words without pronunciation, signification or transcription but out of which, notwithstanding, was brought forth a flux, a continuous, compact and lucid flow: an intuition, a vacillating frisson of illumination as if caught in a flash of lightning or in a mist abruptly rising to unshroud an obvious sign - but a sign, alas, that would last an instant only to vanish for good. » Gilbert Adair
  • 38. Source code example #!/usr/bin/perl -w # essential line of all perl scripts $filename = "avoid.txt"; # affect « avoid.txt » to the variable $filename # open the file, or exit open(FILE, $filename) || die "Cannot open file ‘$filename’nn"; @text = <FILE>; # add each line of the file to an array close FILE; foreach $line (@text) { # read one line from the array into $line and repeat for each line @table = split(//,$line); # read each character of the line in an array while ($char=pop(@table)) { # read one character of the array 'table' and repeat for all $char =~ s/[^a-z]//; # keep only the alphabetical character a to z if ($char) { # check if the character exists and execute the block $count{$char}++; # if yes, increment by one the hash 'count' } } } # print each character and its number of occurence one per line foreach $c (keys %count) { print "$c=$count{$c}n"; } exit; # quit the program
  • 39. Tips • Think about your problem • Create a flowchart • Create the pseudocode • Verify the memory used by your variables • Write the code • Test the code  For all the possible functions or cases (if possible)  Give it to users as a beta (if not possibe)  Sell it (if you work for Microsoft© … ;-) • Debug
  • 40. Summary of the week • Monday  Intro computers & programming  Intro Unix  Tutorial Unix • Tuesday  Intro Perl  Regexp & Perl In-liners • Wednesday  Object Oriented programming  BioPerl  EMBOSS • Thursday  Database indexing  BLAST  HTML & cgi-bin • Friday  Finish exercises  Users questions
  • 41. Unix • Next presentation… VassiliosVassilios aliasalias UnixMan!!!UnixMan!!!