SlideShare une entreprise Scribd logo
1  sur  8
Components of a Computer
System
Information is funny stuff. The information for the web page you are looking at is
recorded on a hard disk inside a computer located in New Britain, Connecticut. The
information was copied from that physical device to other physical devices perhaps
hundreds of times before it got to your computer where your web browser is using it to
display these words on your monitor. Clearly information is something different from the
devices used to store and transmit it.
A computer system consists of both hardware and information stored on hardware.
Information stored on computer hardware is often called software.
The hardware components of a computer system are the electronic and mechanical parts.
The software components of a computer system are the data and the computer programs.
Click Here to see the desktop system these notes were originally prepared on. (This
was back when anything to do with computers had to be beige. Everything in this
picture has since been replaced, except for the gargoyle.)
The major hardware components of a computer system are:
 Processor
 Main memory
 Secondary memory
 Input devices
 Output devices
For typical desktop computers, the processor, main memory, secondary memory, power
supply, and supporting hardware are housed in a metal case. Many of the components
are connected to the main circuit board of the computer, called the motherboard. The
power supply supplies power for most of the components. Various input devices (such
as the keyboard) and output devices (such as the monitor) are attached through
connectors at the rear of the case.
INTRODUCTION
the environment in which a GIS operates is defined by:
hardware - the machinery, including:
o a host computer
 ranging from a stand-alone microcomputer to a large mainframe supporting
many users
o several devices for handling input and output
software
o the programs that tell the computer what to do
o the data the programs will use
this unit provides a brief overview of computer hardware and software so that students will
have a basic understanding of how computers operate and will recognize some of the common
computer terminology
o important topics are covered in greater detail in later units
B. COMPUTER DATA
computer data is coded, manipulated and stored by use of an exclusive two-state condition
o in English such two-state forms of information can include yes/no, on/off, open/closed,
hole/no hole
o in simple electronic terms this two-state condition can be translated for the computer
into "switch open/switch closed", meaning that "there is electricity passing through the
circuit/there is no electricity passing through the circuit"
o note that one of the two exclusive states always exists
if one switch provides two different datum, how much data can we obtain from two switches?
o four - there are four combinations of open and closed switches
Binary notation
in computer terminology, this two state condition is represented in binary notation by the use of
1s and 0s
thus, two switches produce four codes - 00, 01, 10, 11
o three switches produce eight codes - 000, 001, 010, 011, 100, 101, 110, 111
in mathematical terms:
o 1 binary digit provides 21 = 2 alternatives
o 2 binary digits provide 22 = 4 alternatives
o 3 binary digits provide 23 = 8 alternatives
o 8 binary digits provide 28 = 256 alternatives
Bits and bytes
each binary digit is called a bit
o the complexity of computer circuitry is described in terms of the number of bits that can
be transmitted simultaneously
o this is determined by the number of wires that run parallel to one another on the
circuit-boards
o current PCs use 8, 16 and 32 bit paths
a group of 8 bits is called a byte
o bytes are the standard unit of measurement of computer data
ASCII coding system
to maximize efficiency, most computers store data in their own internal formats
o however, transfer of data requires the use of standard codes which are understood by
all systems
the most successful standard is ASCII (pronounced ass- key)
o ASCII originated well before computer communication as a code for Teletypes
o ASCII assigns the numbers 0 through 127 to 128 characters, including the upper and
lower case alphabets, numerals 0 through 9 and various special characters
o 128 different patterns can be generated using 7 bits in different combinations of on and
off
 any ASCII character can therefore be coded with 7 bits
o in practice, 8 bits (one byte) are used, the extra bit may be used to extend the code to
128 extra characters, or it simply may be redundant
by using binary notation, these codes can be converted into decimal numbers
o counting from the right, the 8 bits are numbered 0 through 7, and signify as follows:
Bit: 7 6 5 4 3 2 1 0 128s 64s 32s 16s 8s 4s 2s units
 e.g. the combination 01010101 is no 128s, one 64, no 32s, one 16, no 8s, one 4,
no 2s and one unit i.e. 64+16+4+1 = 85
o in the ASCII code system, code number 85 is an upper case U
 thus to store a U, the system stores a byte with the bit pattern 01010101
in ASCII, characters 0 through 32 often perform special functions
o e.g. character 7, 00000111, is the BEL character and rings a bell if received by many
terminals or devices
o e.g. character 12, 00001100, is the FF character and produces a form feed (new page) if
received by many printers
computer files which contain information coded in ASCII are easily transferred and processed by
different computers and programs
o such files are often called "ASCII" or "text" or "coded" files
o ASCII characters are the dominant basis for communication between different systems,
and communication with peripherals
files which are not ASCII are often coded in "binary" and generally can be processed or
understood only by specific programs
C. COMPUTER HARDWARE
computers consist of several different hardware components
Central processing unit (CPU)
the central processing unit is the essential component of a computer because it is the part that
executes the programs and controls the operation of all the hardware
o powerful computers may have several processors handling different tasks, although
there will need to be one central processing unit controlling the flow of instructions and
data through the subsidiary processors
the CPUs of PCs are based on a series of processors or "chips" from Intel
o "PC" models use the 8088 (8 bit)
o "AT" models use the 80286 (8/16 bits)
o current high powered machines use the 80386 (full 16 bits) and 80486
the Macintosh CPUs are based on the 68000 series of chips from Motorola
Memory
memory stores input for and output from the CPU as well as the instructions that are followed
by the CPU
the amount stored is measured in bits, bytes, Kbytes (K, Kb, 103 bytes), Megabytes (Mb, 106
bytes), Gigabytes (Gb, 109), Terabytes (Tb, 1012)
there are two kinds of memory:
main memory (or internal or primary memory) is essential for the operation of the computer, all
data and
instructions must be in main memory first before it can be processed by the computer
o most costly memory
o in the form of microchips integrated with the computer's central processor
o fastest access - any byte can be accessed equally rapidly (random access, hence it is
called RAM)
o temporary - since data and instructions are stored in main memory as electrical
voltages, power failures cause the loss of all data in main memory
o ranges from several hundred Kbytes for typical PC to many Megabytes for mainframes
secondary memory (or auxiliary memory or secondary storage) is used for large, permanent or
semi-permanent files
o GIS programs and data generally require very large amounts of storage
o data storage is covered after this overview of the components of computers
Peripherals
peripherals refer to all the other devices attached to computers that handle input and output
o input devices include keyboards, mice, trackballs, digitizers, disk drives
o output devices include screens, printers, plotters
o those devices important to GIS are examined in later units
D. DATA STORAGE
Storage media
computers can use several different media for storing information
o needed to store both raw data and programs
media differ by
o storage capacity
o speed of access
o permanency of storage
o mode of access
o cost
Fixed disks
most costly memory next to main/internal memory is fixed disk memory
ranges from 10 Megabytes for typical PC to hundreds of Gigabytes in large "disk farms"
random access but slower than internal memory
permanent (i.e. does not disappear when power is turned off), though data can be erased and
modified
Dismountable devices
dismountable devices can be removed for storage or shipping, include:
o floppy diskettes
 up to 1.44 Megabytes for PC - random access
o magnetic tapes
 tens of Megabytes for standard tape
 access is sequential, not random
 can take minutes to reach a particular set of data on the tape, depending on
where it is stored
o optical compact disks (CDs)
 around 250 Megabytes per CD
 random access, but the delay in reaching a given item of data may be 1 second
or more
Volumes
a volume is a single tape, CD, diskette or fixed disk, i.e. a physical unit of storage
Files
a file is a logical collection of data - a table, document, program, map
many files can be stored on a single volume
files are given names
o the rules for naming files vary among types of systems
the computer operating system keeps track of files stored in a volume by using a table called a
directory
o files are identified in the directory by name, size, date of creation and often type of
contents
files are often organized into subdirectories so that the user can group files under specific topics
E. SOFTWARE
Programs
a program is a sequence of related instructions, performed one step at a time by the CPU to
accomplish some task
o programs determine how computers respond to input, what will be displayed and
output
there are three types of programs: operating systems, language interpreters and compilers and
applications programs
Operating systems
an operating system (OS) is the software which controls the operation of the computer from the
moment it is turned on or "booted"
o the OS controls all input and output to and from the peripherals as well as the operation
of other programs
o allows the user to work with and manage files without knowing specifically how the
data is stored and retrieved
in multi-user systems, operating systems manage user access to the processor and peripherals
and schedule jobs
common operating systems include:
o IBM PCs and clones use MS-DOS (often called DOS), although there is some movement
to OS/2
o UNIX (and similar operating systems such as AIX, XENIX) is the dominant operating
system for workstations
o mainframes commonly use proprietary operating systems developed by their
manufacturers - VMS on DEC's VAX series, PRIMOS on Prime, CMS on IBM mainframes,
etc.
although functions performed by operating systems are similar, it can be very difficult to move
files or software from one to another
o many software packages run under only one operating system, or have substantially
different versions for different operating systems
Compilers and languages
since computers operate on electricity and binary operations, all instructions executed by
computers must be provided to the CPU in machine code
o however, humans do not have to interact with computers at this level
programs can be written in very specialized languages, called assemblers, which allow
programmers to take advantage of the specific capabilities of particular machines by addressing
the basic operations directly
o these languages are very cryptic and very difficult to use
o they are also system specific and cannot be transported from one type of computer to
another
most programs are created using standard high level languages such as C, Pascal, FORTRAN,
BASIC which are common across most computer systems, from micro to mainframe
o such programs are referred to as source code
o these languages generally use English words and familiar mathematical structure
a compiler is a program designed to convert a program written in a high level language to the
machine instructions of a specific computing system or "platform"
o the output of a C compiler for the IBM PC has almost nothing in common with the
output of a C compiler for a VAX mainframe
although high level languages are generally used in the development of application packages
such as GIS, it is normally compiled for specific platforms before distribution to the public
o this is done to protect the commercial interests of the developer
Applications programs
applications programs are programs used for all purposes other than performing operating
system chores or writing other programs
o includes GIS, word processors, spreadsheets, statistics packages and graphics programs,
airline reservation systems, payroll systems
F. EDITORS AND WORD PROCESSORS
are packages designed to modify or edit the contents of files
are most often used to edit written text or programs
o editing and creation of files of numerical data is best done with the special purpose
editors found in database packages or spreadsheets (see sections G and H)
editors and word processors are increasingly WYSIWYG ("what you see is what you get")
o the screen shows a picture of the contents of the file at all times
o well-known word processors for the IBM PC include Wordstar, WordPerfect and
Microsoft Word
linkage to a printer is essential so that the user can obtain "hard copy" of a file's contents
many mainframes offer their users several editors
o unfortunately there is little standardization of editors
an editor is the most important system to learn after the operating system
o it is difficult to make much effective use of a system without one
G. DATABASES
are packages designed to create, edit, manipulate and analyze data
to be suitable for a database, the data must consist of records which provide information on
individual cases, people, places, features, etc.
each record may contain several fields each of which contains one item of information
o the number and interpretation of the fields must be constant for each class of records
 e.g. each record in the class of "streets" may contain fields for name, length,
surface, type.
o field contents can be of many types - numeric or text, fixed or variable length
there can be several classes of records in a database
o e.g. an airline reservation database might have the following classes of records and
associated items: passengers: name, phone, flight numbers aircraft: type, registration
number, number of seats crew: names of pilot, copilot, cabin crew, home city flight:
number, departure and arrival times, aircraft
Functions of a database
creating and editing records, using customized screens
printing reports (summarizes of groups of records), using customized report forms, including
subtotals and totals
selecting records based on user-specified rules
updating records based on new information
linking records, e.g. to determine arrival time for a passenger by linking the passenger's record
with the correct flight record
Three types of database
network, hierarchical and relational are different ways of modeling data within a database
although all three are used, the relational model has been most successful within GIS
o it is discussed at length later in the course
o well-known relational database management systems (RDBMSs) include dBase, Oracle,
Info
o many of these have been used in specific GISs
many databases use the same language, SQL (Standard Query Language), for formulating
queries
H. SPREADSHEETS
are systems which allow the user to work with numerical data in tabular form
column and row totals, percentages etc. are automatically updated as data items are changed
Lotus 1-2-3 is a well-known spreadsheet for the IBM PC

Contenu connexe

Tendances

Itc lec 3 Ip cycle , system unit, interface
Itc lec 3 Ip cycle , system unit, interfaceItc lec 3 Ip cycle , system unit, interface
Itc lec 3 Ip cycle , system unit, interfaceAnzaDar3
 
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYAmy Jackie
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer systemmeisaina
 
Journey of Microprocessors By Basit Ali
Journey of Microprocessors By Basit AliJourney of Microprocessors By Basit Ali
Journey of Microprocessors By Basit AliBasit Ali
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...Sowmya Jyothi
 
CSC1100 - Chapter02 - Components of the System Unit
CSC1100 - Chapter02 - Components of the System UnitCSC1100 - Chapter02 - Components of the System Unit
CSC1100 - Chapter02 - Components of the System UnitYhal Htet Aung
 
Typical configuration of computer ppt
Typical configuration of computer  pptTypical configuration of computer  ppt
Typical configuration of computer pptProf. Dr. K. Adisesha
 
Computer hardware components by ni3
Computer hardware components by ni3Computer hardware components by ni3
Computer hardware components by ni3NITIN RAUT
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
Microprocessor Fundamentals
Microprocessor FundamentalsMicroprocessor Fundamentals
Microprocessor FundamentalsDiwaker Pant
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHISowmya Jyothi
 

Tendances (19)

Itc lec 3 Ip cycle , system unit, interface
Itc lec 3 Ip cycle , system unit, interfaceItc lec 3 Ip cycle , system unit, interface
Itc lec 3 Ip cycle , system unit, interface
 
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 
PCT SLIDE3
PCT SLIDE3PCT SLIDE3
PCT SLIDE3
 
Journey of Microprocessors By Basit Ali
Journey of Microprocessors By Basit AliJourney of Microprocessors By Basit Ali
Journey of Microprocessors By Basit Ali
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
 
18. the components of the system unit
18. the components of the system unit18. the components of the system unit
18. the components of the system unit
 
3 hardware
3 hardware3 hardware
3 hardware
 
Microprocessors
MicroprocessorsMicroprocessors
Microprocessors
 
CSC1100 - Chapter02 - Components of the System Unit
CSC1100 - Chapter02 - Components of the System UnitCSC1100 - Chapter02 - Components of the System Unit
CSC1100 - Chapter02 - Components of the System Unit
 
System Unit
System UnitSystem Unit
System Unit
 
Typical configuration of computer ppt
Typical configuration of computer  pptTypical configuration of computer  ppt
Typical configuration of computer ppt
 
Computer hardware components by ni3
Computer hardware components by ni3Computer hardware components by ni3
Computer hardware components by ni3
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
Microprocessor Fundamentals
Microprocessor FundamentalsMicroprocessor Fundamentals
Microprocessor Fundamentals
 
Fg a
Fg aFg a
Fg a
 
Processor2
Processor2Processor2
Processor2
 
System unit
System unitSystem unit
System unit
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 

Similaire à Computer components

CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basicsehillpamlico
 
Ap Power Point Chpt1
Ap Power Point Chpt1Ap Power Point Chpt1
Ap Power Point Chpt1dplunkett
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Computer summary
Computer summaryComputer summary
Computer summaryBarira Khan
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptxAyyappanSri
 
Components of the System Unit.pdf
Components of the System Unit.pdfComponents of the System Unit.pdf
Components of the System Unit.pdfODINARARCH
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functionsAbdullah-Al- Mahmud
 
computer hardware servicing lesson 2 ppt
computer hardware servicing lesson 2 pptcomputer hardware servicing lesson 2 ppt
computer hardware servicing lesson 2 pptRYANCENRIQUEZ
 
A+ certification (Core hardware) Pc Maintenance
 A+ certification (Core hardware) Pc Maintenance  A+ certification (Core hardware) Pc Maintenance
A+ certification (Core hardware) Pc Maintenance muhammadishrat11
 
Introduction to computer applications
Introduction to computer applications Introduction to computer applications
Introduction to computer applications funnyvideo55
 
E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp0112richa
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docxSamyaGufoor
 

Similaire à Computer components (20)

CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 
Ap Power Point Chpt1
Ap Power Point Chpt1Ap Power Point Chpt1
Ap Power Point Chpt1
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Ch3 storage devices
Ch3  storage devicesCh3  storage devices
Ch3 storage devices
 
Ch3
Ch3Ch3
Ch3
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Computer summary
Computer summaryComputer summary
Computer summary
 
ComputerFundementals.pptx
ComputerFundementals.pptxComputerFundementals.pptx
ComputerFundementals.pptx
 
Components of the System Unit.pdf
Components of the System Unit.pdfComponents of the System Unit.pdf
Components of the System Unit.pdf
 
Motherboard components and their functions
Motherboard components and their functionsMotherboard components and their functions
Motherboard components and their functions
 
computer hardware servicing lesson 2 ppt
computer hardware servicing lesson 2 pptcomputer hardware servicing lesson 2 ppt
computer hardware servicing lesson 2 ppt
 
A+ certification (Core hardware) Pc Maintenance
 A+ certification (Core hardware) Pc Maintenance  A+ certification (Core hardware) Pc Maintenance
A+ certification (Core hardware) Pc Maintenance
 
A+ hand out
A+ hand outA+ hand out
A+ hand out
 
Introduction to computer applications
Introduction to computer applications Introduction to computer applications
Introduction to computer applications
 
System Unit
System UnitSystem Unit
System Unit
 
Computer Visible Parts
Computer Visible PartsComputer Visible Parts
Computer Visible Parts
 
E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01
 
Basic+machine+organization
Basic+machine+organizationBasic+machine+organization
Basic+machine+organization
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docx
 

Plus de chrisjosewanjira

Plus de chrisjosewanjira (7)

Private cloud reference model ms
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model ms
 
Ethics
EthicsEthics
Ethics
 
Telecommunications architectures and standards
Telecommunications architectures and standardsTelecommunications architectures and standards
Telecommunications architectures and standards
 
E business models
E business modelsE business models
E business models
 
Ethics
EthicsEthics
Ethics
 
Threads
ThreadsThreads
Threads
 
Mechanistic systems
Mechanistic systemsMechanistic systems
Mechanistic systems
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Computer components

  • 1. Components of a Computer System Information is funny stuff. The information for the web page you are looking at is recorded on a hard disk inside a computer located in New Britain, Connecticut. The information was copied from that physical device to other physical devices perhaps hundreds of times before it got to your computer where your web browser is using it to display these words on your monitor. Clearly information is something different from the devices used to store and transmit it. A computer system consists of both hardware and information stored on hardware. Information stored on computer hardware is often called software. The hardware components of a computer system are the electronic and mechanical parts. The software components of a computer system are the data and the computer programs. Click Here to see the desktop system these notes were originally prepared on. (This was back when anything to do with computers had to be beige. Everything in this picture has since been replaced, except for the gargoyle.) The major hardware components of a computer system are:  Processor  Main memory  Secondary memory  Input devices  Output devices For typical desktop computers, the processor, main memory, secondary memory, power supply, and supporting hardware are housed in a metal case. Many of the components are connected to the main circuit board of the computer, called the motherboard. The power supply supplies power for most of the components. Various input devices (such as the keyboard) and output devices (such as the monitor) are attached through connectors at the rear of the case. INTRODUCTION the environment in which a GIS operates is defined by:
  • 2. hardware - the machinery, including: o a host computer  ranging from a stand-alone microcomputer to a large mainframe supporting many users o several devices for handling input and output software o the programs that tell the computer what to do o the data the programs will use this unit provides a brief overview of computer hardware and software so that students will have a basic understanding of how computers operate and will recognize some of the common computer terminology o important topics are covered in greater detail in later units B. COMPUTER DATA computer data is coded, manipulated and stored by use of an exclusive two-state condition o in English such two-state forms of information can include yes/no, on/off, open/closed, hole/no hole o in simple electronic terms this two-state condition can be translated for the computer into "switch open/switch closed", meaning that "there is electricity passing through the circuit/there is no electricity passing through the circuit" o note that one of the two exclusive states always exists if one switch provides two different datum, how much data can we obtain from two switches? o four - there are four combinations of open and closed switches Binary notation in computer terminology, this two state condition is represented in binary notation by the use of 1s and 0s thus, two switches produce four codes - 00, 01, 10, 11 o three switches produce eight codes - 000, 001, 010, 011, 100, 101, 110, 111 in mathematical terms: o 1 binary digit provides 21 = 2 alternatives o 2 binary digits provide 22 = 4 alternatives o 3 binary digits provide 23 = 8 alternatives o 8 binary digits provide 28 = 256 alternatives Bits and bytes each binary digit is called a bit o the complexity of computer circuitry is described in terms of the number of bits that can be transmitted simultaneously o this is determined by the number of wires that run parallel to one another on the circuit-boards o current PCs use 8, 16 and 32 bit paths a group of 8 bits is called a byte
  • 3. o bytes are the standard unit of measurement of computer data ASCII coding system to maximize efficiency, most computers store data in their own internal formats o however, transfer of data requires the use of standard codes which are understood by all systems the most successful standard is ASCII (pronounced ass- key) o ASCII originated well before computer communication as a code for Teletypes o ASCII assigns the numbers 0 through 127 to 128 characters, including the upper and lower case alphabets, numerals 0 through 9 and various special characters o 128 different patterns can be generated using 7 bits in different combinations of on and off  any ASCII character can therefore be coded with 7 bits o in practice, 8 bits (one byte) are used, the extra bit may be used to extend the code to 128 extra characters, or it simply may be redundant by using binary notation, these codes can be converted into decimal numbers o counting from the right, the 8 bits are numbered 0 through 7, and signify as follows: Bit: 7 6 5 4 3 2 1 0 128s 64s 32s 16s 8s 4s 2s units  e.g. the combination 01010101 is no 128s, one 64, no 32s, one 16, no 8s, one 4, no 2s and one unit i.e. 64+16+4+1 = 85 o in the ASCII code system, code number 85 is an upper case U  thus to store a U, the system stores a byte with the bit pattern 01010101 in ASCII, characters 0 through 32 often perform special functions o e.g. character 7, 00000111, is the BEL character and rings a bell if received by many terminals or devices o e.g. character 12, 00001100, is the FF character and produces a form feed (new page) if received by many printers computer files which contain information coded in ASCII are easily transferred and processed by different computers and programs o such files are often called "ASCII" or "text" or "coded" files o ASCII characters are the dominant basis for communication between different systems, and communication with peripherals files which are not ASCII are often coded in "binary" and generally can be processed or understood only by specific programs C. COMPUTER HARDWARE computers consist of several different hardware components Central processing unit (CPU) the central processing unit is the essential component of a computer because it is the part that executes the programs and controls the operation of all the hardware
  • 4. o powerful computers may have several processors handling different tasks, although there will need to be one central processing unit controlling the flow of instructions and data through the subsidiary processors the CPUs of PCs are based on a series of processors or "chips" from Intel o "PC" models use the 8088 (8 bit) o "AT" models use the 80286 (8/16 bits) o current high powered machines use the 80386 (full 16 bits) and 80486 the Macintosh CPUs are based on the 68000 series of chips from Motorola Memory memory stores input for and output from the CPU as well as the instructions that are followed by the CPU the amount stored is measured in bits, bytes, Kbytes (K, Kb, 103 bytes), Megabytes (Mb, 106 bytes), Gigabytes (Gb, 109), Terabytes (Tb, 1012) there are two kinds of memory: main memory (or internal or primary memory) is essential for the operation of the computer, all data and instructions must be in main memory first before it can be processed by the computer o most costly memory o in the form of microchips integrated with the computer's central processor o fastest access - any byte can be accessed equally rapidly (random access, hence it is called RAM) o temporary - since data and instructions are stored in main memory as electrical voltages, power failures cause the loss of all data in main memory o ranges from several hundred Kbytes for typical PC to many Megabytes for mainframes secondary memory (or auxiliary memory or secondary storage) is used for large, permanent or semi-permanent files o GIS programs and data generally require very large amounts of storage o data storage is covered after this overview of the components of computers Peripherals peripherals refer to all the other devices attached to computers that handle input and output o input devices include keyboards, mice, trackballs, digitizers, disk drives o output devices include screens, printers, plotters o those devices important to GIS are examined in later units D. DATA STORAGE Storage media computers can use several different media for storing information
  • 5. o needed to store both raw data and programs media differ by o storage capacity o speed of access o permanency of storage o mode of access o cost Fixed disks most costly memory next to main/internal memory is fixed disk memory ranges from 10 Megabytes for typical PC to hundreds of Gigabytes in large "disk farms" random access but slower than internal memory permanent (i.e. does not disappear when power is turned off), though data can be erased and modified Dismountable devices dismountable devices can be removed for storage or shipping, include: o floppy diskettes  up to 1.44 Megabytes for PC - random access o magnetic tapes  tens of Megabytes for standard tape  access is sequential, not random  can take minutes to reach a particular set of data on the tape, depending on where it is stored o optical compact disks (CDs)  around 250 Megabytes per CD  random access, but the delay in reaching a given item of data may be 1 second or more Volumes a volume is a single tape, CD, diskette or fixed disk, i.e. a physical unit of storage Files a file is a logical collection of data - a table, document, program, map many files can be stored on a single volume files are given names o the rules for naming files vary among types of systems the computer operating system keeps track of files stored in a volume by using a table called a directory o files are identified in the directory by name, size, date of creation and often type of contents files are often organized into subdirectories so that the user can group files under specific topics
  • 6. E. SOFTWARE Programs a program is a sequence of related instructions, performed one step at a time by the CPU to accomplish some task o programs determine how computers respond to input, what will be displayed and output there are three types of programs: operating systems, language interpreters and compilers and applications programs Operating systems an operating system (OS) is the software which controls the operation of the computer from the moment it is turned on or "booted" o the OS controls all input and output to and from the peripherals as well as the operation of other programs o allows the user to work with and manage files without knowing specifically how the data is stored and retrieved in multi-user systems, operating systems manage user access to the processor and peripherals and schedule jobs common operating systems include: o IBM PCs and clones use MS-DOS (often called DOS), although there is some movement to OS/2 o UNIX (and similar operating systems such as AIX, XENIX) is the dominant operating system for workstations o mainframes commonly use proprietary operating systems developed by their manufacturers - VMS on DEC's VAX series, PRIMOS on Prime, CMS on IBM mainframes, etc. although functions performed by operating systems are similar, it can be very difficult to move files or software from one to another o many software packages run under only one operating system, or have substantially different versions for different operating systems Compilers and languages since computers operate on electricity and binary operations, all instructions executed by computers must be provided to the CPU in machine code o however, humans do not have to interact with computers at this level programs can be written in very specialized languages, called assemblers, which allow programmers to take advantage of the specific capabilities of particular machines by addressing the basic operations directly o these languages are very cryptic and very difficult to use o they are also system specific and cannot be transported from one type of computer to another
  • 7. most programs are created using standard high level languages such as C, Pascal, FORTRAN, BASIC which are common across most computer systems, from micro to mainframe o such programs are referred to as source code o these languages generally use English words and familiar mathematical structure a compiler is a program designed to convert a program written in a high level language to the machine instructions of a specific computing system or "platform" o the output of a C compiler for the IBM PC has almost nothing in common with the output of a C compiler for a VAX mainframe although high level languages are generally used in the development of application packages such as GIS, it is normally compiled for specific platforms before distribution to the public o this is done to protect the commercial interests of the developer Applications programs applications programs are programs used for all purposes other than performing operating system chores or writing other programs o includes GIS, word processors, spreadsheets, statistics packages and graphics programs, airline reservation systems, payroll systems F. EDITORS AND WORD PROCESSORS are packages designed to modify or edit the contents of files are most often used to edit written text or programs o editing and creation of files of numerical data is best done with the special purpose editors found in database packages or spreadsheets (see sections G and H) editors and word processors are increasingly WYSIWYG ("what you see is what you get") o the screen shows a picture of the contents of the file at all times o well-known word processors for the IBM PC include Wordstar, WordPerfect and Microsoft Word linkage to a printer is essential so that the user can obtain "hard copy" of a file's contents many mainframes offer their users several editors o unfortunately there is little standardization of editors an editor is the most important system to learn after the operating system o it is difficult to make much effective use of a system without one G. DATABASES are packages designed to create, edit, manipulate and analyze data to be suitable for a database, the data must consist of records which provide information on individual cases, people, places, features, etc. each record may contain several fields each of which contains one item of information o the number and interpretation of the fields must be constant for each class of records  e.g. each record in the class of "streets" may contain fields for name, length, surface, type. o field contents can be of many types - numeric or text, fixed or variable length there can be several classes of records in a database
  • 8. o e.g. an airline reservation database might have the following classes of records and associated items: passengers: name, phone, flight numbers aircraft: type, registration number, number of seats crew: names of pilot, copilot, cabin crew, home city flight: number, departure and arrival times, aircraft Functions of a database creating and editing records, using customized screens printing reports (summarizes of groups of records), using customized report forms, including subtotals and totals selecting records based on user-specified rules updating records based on new information linking records, e.g. to determine arrival time for a passenger by linking the passenger's record with the correct flight record Three types of database network, hierarchical and relational are different ways of modeling data within a database although all three are used, the relational model has been most successful within GIS o it is discussed at length later in the course o well-known relational database management systems (RDBMSs) include dBase, Oracle, Info o many of these have been used in specific GISs many databases use the same language, SQL (Standard Query Language), for formulating queries H. SPREADSHEETS are systems which allow the user to work with numerical data in tabular form column and row totals, percentages etc. are automatically updated as data items are changed Lotus 1-2-3 is a well-known spreadsheet for the IBM PC