Computer Science Note
Computer Science Note
Computer Science Note
Hardware
Processing device
Control Arithmetic/
unit logic unit
Input devices Register storage area
Output devices
Memory
Secondary
storage
Memory
Speakers:
Speakers also produce an analogue output. The audio
program inside the boundary converts the digital
encoding of the sound to a series of electrical pulses
that are sent to the speaker.
one components are needed:
Storage, also known as mass media or auxiliary storage, refers to the various media on which a computer
system can store data.
◦ Data that will eventually be used
◦ Long-term
Storage devices hold programs and data in units called files.
Memory is a temporary workplace where the computer transfers the contents of a file while it is being used.
◦ Data that will be used in the near future
◦ Faster access than storage
Registers: Data immediately related to the operation being executed
◦ Faster access than memory
Cache memory
Cache memory is faster than main memory, but slower than the CPU and its registers.
Cache memory, which is normally small in size, is placed between the CPU and main
memory
compiled by Mebratu B.
3/16/2018
Cache
Small block of very fast temporary memory
Speed up data transfer
Instructions and data used most frequently or most recently
Types of Cache
Internal cache
◦ Level 1 (L1)
◦ Built into microprocessor
◦ Up to 128KB
External cache
◦ Level 2 (L2)
◦ Separate chips
◦ 256KB or 512 KB
◦ SRAM technology
◦ Cheaper and slower than L1
◦ Faster and more expensive than memory
compiled by Mebratu B.
3/16/2018
Magnetic Storage Optical Storage –
CD/DVD drive
compiled by Mebratu B.
3/16/2018
Platter Read/Write
head
compiled by Mebratu B.
3/16/2018
Floppy Disk Hard Drive CD ROM / DVD
compiled by Mebratu B.
3/16/2018
Computer software
Computer hardware cannot perform alone. To accomplish any
task, hardware must given a serious of instructions called
software.
a collection of programs and routines that support the operations of
performing a task using a computer. Software also includes
documentations, rules and operational procedures. Software makes
the interface between the user and the electronic components of the
computer.
The finite set of instructions that the computer follows to do a
given job is called program. The group of programs that the
computer needs to function is known as software.
We can classify software in two major parts
1. System Software
2. Application Software
Repeated division
37 / 2 = 18 remainder 1 (binary number will end with 1) : LSB
18 / 2 = 9 remainder 0
9 / 2 = 4 remainder 1
4 / 2 = 2 remainder 0
2 / 2 = 1 remainder 0
1 / 2 = 0 remainder 1 (binary number will start with 1) : MSB
Read the result upward to give an answer of 3710 = 1001012
◦ Binary-to-Decimal Conversion
A, 1011.1012 = (1 x 23) + (0 x 22)+ (1 x 21) + (1 x 2o) + (1 x 2-1) + (0 x 2-2) + (1
x 2-3)
= 810+ 0 + 210 + 110 + 0.510 + 0 + 0.12510
= 11.62510
B, 0.11001 2 = ?10
0.11001 = 1 · 2-1+ 1 · 2-2+ 0 · 2-3+ 0 · 2-4+ 1 · 2-5= 1 · 0.5 + 1 · 0.25 + 0 · 0.125
+ 0 · 0.0625 + 1 · 0.03125
= 0.5 + 0.25 + 0.03125 = 0.7812510
C, 1110002== ? 10
0.20+0.21+0.22+1.23+1.24+1.25 =0+0+0+8+16+32=5610
Hex-to-Binary Conversion
Binary-to-Hex Conversion
9F216 = 9 F 2
1 1 1 0 1 0 0 1 1 02 = 0 0 1 1 1 0 1 0 0 1 1 0
Addition 0+0 0 0
0+1 1 0
1+0 1 0
1+1 0 1
Subtraction 0-0 0 0
0-1 1 1
1-0 1 0
1-1 0 0
Multiplicati 0*0 0 0
on 0*1 0 0
1*0 0 0
1*1 1 0
dividend
quotient
divisor
Division is equivalent to subtracting the divisor
from the dividend a number of times equal to the
quotient.
Consider: 11102 / 00112 (4-bit dividend & divisor)
Quotient = 01002 and Remainder = 00102
8-bit registers for Remainder and Divisor (8-bit ALU
◦ At end this chapter student will able to understand what is network and
internet and it services and also how to construct computer network
◦ A collection of linked Web pages that has a common theme or focus is called
a Web site.
◦ The main page that all of the pages on a particular Web site are organized
http://www.chicagosymphony.org/civicconcerts/index.htm
1
7
compiled by Mebratu B. 3/16/2018 5
Threat of a computer system
◦ Threat is a source of probable trouble or attack to a system that
could cause losses. One the threat in computer system is virus.
◦ Computer viruses
Are software program that are able to reproduce themselves.
It is intellectual creation pf a human computer programmer.
Is a program that is intentionally done to harm users' program
without permission.
Not all virus are destructive, some virus viruses carry message
without harming program or data.
Virus - code that copies itself into other programs.
Worm - a program that replicates itself across the network (usually
riding on email messages or attached documents (e.g., macro
viruses).
Trojan Horse - instructions in an otherwise good program that
cause bad things to happen (sending your data or password to an
attacker over the net). 1
7
compiled by Mebratu B. 3/16/2018 6
Dangers(Symptoms) of computer viruses
◦ Change :it change actual data or text causing different sense.
◦ Slackness: cause slow computing operation because of the
load that their reproductive activity impose.
◦ Theft :virus can steal data and stolen data can be used to re-
steal other more data
◦ Scramble(mix): virus can scramble data and files
1
7
compiled by Mebratu B. 3/16/2018 7
There are three major type of viruses
◦ Boot sector viruses
Attach themselves to system code and hides behind boot sector of
hard disk
◦ File/program infector
Attach themselves to executable files or program run
Therefore file infector affect system performance.
◦ Macro viruses
Are hosted in user documents
Result can be just as destructive.
It represent larger threat as they attack data file rather than
executables
Although executable files can be easily replaced by reinstalling the
affected software ,documents are irreplaceable unless they have been
backed up onto other media
◦ System viruses
Attach themselves to the specific system files. E.g Command.com
1
7
compiled by Mebratu B. 3/16/2018 8
Potential paths for virus
◦ Viruses are transmitted through various media such as:
Storage devices .E.g. hard disk, floppy disk, flash disk,CD-ROM
Internet connection-mail attachments, sharing infected files
Direct cabling between PCs (network)
Rules for safe computer
These simple rules will protect /secure/your system from computer virus
infection
Never load unknown disks into system unless the disks are virus free
Don’t use infected software (executables ) unless they are free of virus
infection
Backup your data regularly to protect the data loss from any cause
Prevent unauthorized access
Lock your computer when not in use
Install antivirus program on to your computer
Turn on Windows Internet firewall.
Use Microsoft Update to keep Windows up-to-date automatically
Install and maintain antispyware software, such as Windows Defender
1
7
compiled by Mebratu B. 3/16/2018 9
Integrity:
◦ Guarantee that the data is what we expect
Confidentiality
◦ Keeping data and resources hidden
Reliability
◦ Computers should work without having unexpected problems
Authentication
◦ Guarantee that only authorized persons can access to the resources
Availability
◦ Enabling access to data and resources
180
Safety of the computer system
◦ Computers require uniform and uninterrupted power supply, no
noise interference and suitable environmental condition for
reliable operation.
◦ Power line problem
Voltage spikes –unrecognized and quick power OFF and ON
Voltage surges-over voltage
Voltage sages-under voltage
These power problem can be solved through the use of uninterrupted
power supply(UPS) because UPS stand between the utility power
and the system
◦ Environmental factors
Temperature –integrate circuit and other devices in computer
system are sensitive to temperature
Dust-Electro mechanical devices such as printer and disk drives
have a number of moving parts that get dirty causing overheating
and early failures. 1
8
compiled by Mebratu B. 3/16/2018 1
Measures
◦ Clean computer system and its peripherals periodically
◦ Use dust cover
◦ Keep computer room windows closed
◦ No smoking near the system
◦ Don’t touch the surface of disk drives and other internal components
◦ Clean the inside portion as well as the area with a vacuum cleaner
◦ Blow the dust in the screen
◦ Use soft brush to clean the screen
1
8
compiled by Mebratu B. 3/16/2018 2