CPF Unit 2
CPF Unit 2
Input Devices
Input devices are used to take raw data as input
from the user.
Input device enables the user to send data,
information, or control signals to a computer. The
Central Processing Unit (CPU) of a computer receives
the input and processes it to produce the output.
4) Joystick
It is made up of a stick with a spherical base. The base is
fitted in a socket that allows free movement of stick. The
movement of stick controls cursor on screen. In joystick,
cursor keeps moving in direction of joystick whereas, in
mouse, the cursor moves only when mouse moves.
5) Light Pen
6) Microphone
It is a computer input device that is used to input the
sound. It receives sound vibrations and converts them
into audio signals or sends to a recording medium. The
audio signals are converted into digital data and stored in
computer. The microphone also enables the user to
telecommunicate with others. It is also used to add
sound to presentations.
i) Dynamic:
10) Touchpad
1) Monitor
The monitor is display unit or screen of the computer. It
is the main output device that displays the processed
data or information as text, images, audio or video.
i) CRT Monitor
2) Projector
3) Printer
A printer produces hard copies of processed data. It
enables the user, to print images, text or any other
information onto paper. Printers enable the generation
of hard copies for record-keeping, presentations and
other purposes, from household to professional settings.
Based on the printing mechanism, the printers are of two
types: Impact Printers and Non-impact Printers.
o Impact Printers: They are of two types:
A. Character Printers
i. Dot Matrix printers
ii. Daisy Wheel printers
B. Line printers
i. Drum printers
ii. Chain printers
o Non-impact printers: They are of two types:
A. Laser printers
B. Inkjet printers
Impact Printer
The impact printer uses a hammer or print head to print
character or images onto paper. The hammer or print
head strikes or presses an ink ribbon against the paper to
print characters and images.
A) Character Printers
Character printer prints a single character at a time or
with a single stroke of the print head or hammer. It does
not print one line at a time. Today, these printers are not
in much use due to their low speed and because only the
text can be printed. Character printers are of two types-
i) Dot Matrix Printer
Dot Matrix Printer is an impact printer. The characters
and images printed by it are patterns of dots. These
patterns are produced by striking ink soaked ribbon
against paper with a print head. The print head contains
pins that produce a pattern of dots on the paper to form
the individual characters. Speed of Dot Matrix printers is
around 200-500 characters per second.
ii) Daisy Wheel Printer
B) Line Printers:
Line printer prints one line at a time. It is a high-speed
impact printer as it can print 500 to 3000 lines per
minute. Drum printer and chain printer are examples of
line printers.
i) Drum Printer:
Non-Impact Printer:
Non-impact printers don't print characters or images by
striking a print head or hammer on ink ribbon placed
against paper. They print characters and images without
direct physical contact between the paper and the
printing machinery. These printers can print a complete
page at a time, so they are also known as page printers.
i) Laser Printer:
4) Speakers
Speakers are important output devices that transform
electrical impulses into audible sounds. The audio system
improves multimedia experience by providing high-
quality audio output, whether listening to the song,
viewing films, playing video games.
Types of speakers
o Stereo Speakers: Stereo speakers comprise left and
6) Plotter
A plotter is a specialized output device used to generate
high-quality, accurate, and detailed graphics. It's popular
in fields like engineering, architecture, and graphic
design. Plotters utilize a pen or marker to draw
continuous lines on diverse media such as paper, or film.
Plotters are capable of creating accurate drawings, maps,
blueprints, and technical diagrams. They are valued for
their ability to handle large-format prints and deliver
precise output, making them essential tools in industries
that require precise graphical representation.
Computer Hardware
Hardware refers to the physical components of a
computer or a machine that we can see and touch. It is a
physical component that is used in different ways to
build a computer or any other machine. The Memory
Devices, Processor, Central Processing Unit, Mouse, and
the keyboard all are examples of hardware in computer
system. The screen on which you are viewing this page
example of hardware. A computer system would not be
existing without hardware and not able to run software.
Computer Software
Software is a collection of procedures, instructions,
documentation that tells a computer exactly what to do
or allows users to interact with a computer. Most of the
computers may be useless without software. For
example, if a software program, MS-Word is not installed
into your computer, you cannot make any document that
can be completed through MS-Word. Also, you cannot
surf the Internet or visit any website if your system has
no Internet browser software. The browser could not run
on computer without an operating system. The Google
Chrome, MS Word, Excel are examples of software.
2. Application Software
Storage Devices, Input Devices, Output Devices, Operating Systems, Application Software, and
and Internal components are the primary Programming Software are the main categories
categories of hardware. of software.
Hardware can be seen and touch as it is a physical, The software can be seen but cannot be touched
electronic device. as it is virtual, not physical.
Computer viruses cannot affect hardware. Computer viruses can affect software.
Hardware can be replaced with a new one if it is The software is reinstalled if it gets damaged.
damaged.
Through the network, hardware cannot be The software can be transferred easily.
transferred electrically. Only, it can be physically
transferred.
Examples of hardware are Keyboard, Printer, Examples of software are Google Chrome,
Monitor, Mouse, Hard disk and more. MySQL, MS Word, Excel, PowerPoint, Notepad,
Photoshop and more.
Operating System
An Operating System can be defined as an interface
between user and hardware.
The operating system is a connecting medium
between the user and the hardware.
It helps the users to access the hardware in an
efficient manner.
It also makes sure that all the computer resources
will be used in an efficient and smooth way without
any problems.
For example, when seniors pass their instructions to
the juniors, and in the same way, the users gives the
instructions to the operating system.
It is responsible for the execution of all the
processes, Resource Allocation, CPU management,
File Management and many other tasks.
2.Device Management
Operating system manages the communication between
computer system and the peripheral devices connected
to I/O port of the system. It also makes sure when a
program is executed or terminated, it will stop
communication between device and computer.
An operating system regulates device connection using
drivers. This management is done by the OS. The OS:
∙ Allocates and deallocates devices to different processes.
∙ Keeps records of the devices.
∙ Decides which process can use which device for how
much time.
3.File Management
It specifies which process receives the file and for how
long. It also keeps track of information, location, uses,
status, and so on. These groupings of resources are
referred to as file systems. The files on a system are
stored in different directories. The OS:
∙ Keeps records of the status and locations of files.
∙ Allocates and deallocates resources.
∙ Decides who gets the resources.
4.Process Management
The process is a program under execution. When more
than one process runs on the system the OS decides how
and when a process will use the CPU. Hence, the name is
also CPU Scheduling. The OS does
∙ Allocates and deallocates processor to the processes.
∙ Keeps record of CPU status.
Certain algorithms used for CPU scheduling are :
∙ First Come First Serve (FCFS)- In this which comes first
is served first by the CPU until it is completed.
∙ Shortest Job First (SJF)- process which has shortest
execution time will be served first by CPU.
∙ Round-Robin Scheduling- there is a specific time quanta
assigned for each process. If process is not executed in
time quanta, it is sent to waiting queue for its next turn.
∙ Priority-based scheduling- Processes are given priority
based on different criteria and scheduled according to
highest priority.
5.Resource Allocation
Operating system manages all resources of computer
system. It ensures use of all resources by managing
which resource is used by which process and for how
much time.
8.Security
Computer security is important aspect of operating
system. Reliability of operating system is determined by
how much better security it provides. Modern operating
systems use a firewall for security. A firewall is a security
system that monitors every activity happening in the
computer and blocks that activity in case of any threat.
9.Monitoring activities
Operating system takes care of activities of computer
system during various processes. This aborts the program
if there are errors. OS sends messages to user for any
error in input/output device. It also provides security to
system when used in systems operated by multiple
users. So that illegal users cannot get data from system.
Bootloader The bootloader loads all the resources The bootloader distributes the resources of
of the CPU in the profile of a single the CPU based on the priority of the users.
superuser.
Super User A superuser gets all the powers of Superuser does not exist for a multi-user
maintaining the system and making operating system as each entity has control
changes to ensure the system runs over their working.
smoothly.
Complexity Single-User Operating System is simple The Multi-User Operating systems are
and easy to design. complicated as they have to apply complex
techniques to share the resources among
various users.
Performance Only one task at one time gets Schedules different tasks for performance at
performed. any rate.
Example MS-DOS, Windows 95, Windows NT, Mainframes, IBM AS400, Linux & Unix
Windows 2000, Personal Computers, Distributed OS, etc.
etc.
Advantages of Multiprogramming OS
o Overall performance is increased as the CPU always
Disadvantages of Multiprogramming OS
o Multiprogramming systems provide an environment
to other methods.
o Security and integrity of user programs loaded in
expensive to build.
Disadvantages of Multithreading
It also introduces complexity and potential issues
related to synchronization and concurrency.
Computer Virus
Computer viruses are unwanted software programs
or pieces of code that interfere with the functioning
of the computer.
They spread through contaminated files, data, and
insecure networks.
Once it enters your system, it can replicate to
produce copies of itself to spread from one program
to another program and from one infected computer
to another computer.
So, we can say that it is a self-replicating computer
program that interferes with the functioning of the
computer by infecting files, data, programs, etc.
Types of Computer Virus
1.Overwrite Virus
It is the simplest computer virus that overwrites the code
of host computer system's file with its own malicious
code. The content of infected file is replaced partially or
completely without changing the size of file. Thus, it
destroys original program code by overwriting it with its
defective code. The infected files must be deleted or
replaced as this virus cannot be removed or disinfected.
2.Append Virus
This virus appends its malicious code to the end of host
program's file. After that, it alters file's header in a way
that file's header is redirected to start of the malicious
code of the append virus. Thus, this code is executed
each time the program runs. However, it does not
destroy the host program rather it modifies it in a way
that it holds the virus code and enables code to run itself.
3.Macro Virus
Macro virus alters or infects the macros of a document or
data file. It is embedded as a macro in a document and
adds its codes to the macros of the document. The virus
spreads when infected documents are opened in other
computers. It also spreads through software programs,
which execute macros such as Ms Word, Ms Excel.
4.Boot Virus
Boot virus alters the boot sector program stored in the
hard disk or any other storage device such as floppy
disks. It replaces the boot sector program with its own
malicious version. It infects the computer only when it is
used to boot up the computer. If it enters after the boot-
up process, it will not infect the computer. Usually, it
enters into your system through corrupt media files,
infected storage devices and insecure computer
networks. The spread of this virus is very rare these days
due to the decline in the use of floppy disk and use of
boot-sector safeguards in present-day operating systems.
5.Resident Virus
The resident virus stays permanently in the primary
memory (RAM) of computer. When you start the
computer, it becomes active and corrupts the files and
programs running on the computer.
6.Multipartite Virus
Multipartite virus spreads and infects in multiple ways. It
infects both the boot sector and the executable files
stored on the hard drive simultaneously. When you turn
on a computer, the boot sector virus is triggered as it
latches on to the hard drive, which has the data for
starting up the computer. Once it is triggered, the
program files also get infected.
9.Trojan Horse
Trojan horse is a malware like a virus or a worm. It can't
replicate like virus and worm. Trojan horse hides itself in
a program. Once you install any such program, the trojan
horse enters into your computer. It can provide
unauthorized access to your computer, send your files to
other computers, and may delete files or make other
unwanted changes in your computer.
10.Cavity virus
It is also known as a space filler virus. As name suggests,
this virus tends to install itself by occupying the empty
sections of a file. It is not easy to detect this virus as it
fills empty spaces without changing the size of the file.
11.CMOS Virus
It infects the CMOS, which stands for complementary
metal-oxide semiconductor and is a memory chip that
contains the system configuration. This virus can erase or
reset the system configuration.
12.Encrypted Virus
It encrypts its payload to make its detection more
difficult. It comprises two parts: an encrypted virus body
and a decryptor, which decrypts the virus when it is
executed. After decryption, the virus can execute itself in
order to replicate and become a resident.
13.Executable Virus
It is a non-resident computer virus, which resides in an
executable file. Whenever the infected file is executed, it
infects the other files.
14.Polymorphic Virus
It creates its thousands of copies itself; in each copy, it
changes sequence and byte values to evade detection by
antivirus software. Even best antiviruses may not be able
to detect this virus. Polymorphic viruses affect data types
functions, generally spread through spam infected sites.
15.Rabbit Virus
It is capable of creating new processes, and each new
process further creates new processes. This process
continues until this virus utilizes all available resources in
system and system falls short of resources. It may cause
target system to slow down and crash. For eg, it is like an
Infinite loop that repeatedly creates processes that
consume lots of CPU cycles ,operating system resources.
16.Stealth Virus
It is a hidden computer virus, which specifically attacks
operating system processes. It usually hides itself in
partitions, files or boot sectors and is capable of going
unnoticed during antivirus or anti-malware scans, i.e., it
can avoid detection intentionally.
Characteristics of computer viruses
They can be spread through various means, such as
email attachments, infected software downloads,
and USB drives.
They can hide themselves on a computer, making
them difficult to detect and remove.
They can cause harm to a computer's operating
system, files, and programs.
Some viruses are designed to steal personal
information, such as login credentials or credit card
numbers.
Some viruses can be used to remotely control an
infected computer, part of a botnet.
Some viruses are designed to spread to as many
computers as possible in order to cause widespread
damage.
They are transferred from one element to another.
Antivirus software
Antivirus software is a sort of application that
defends computers from malware such as viruses,
computer worms, trojans, spyware, botnets,
rootkits, keyloggers, and other threats.
Antivirus software scans your computer for viruses,
finds them, and removes them.
Anti-virus software comes in range of versions and
formats.
Antivirus software is designed to protect computers
and, once viruses are detected, to destroy them.
Most of the antivirus software allows for both
automated and manual screening.
List of Top 10 Antivirus Software
1. Norton
Each of Norton's antivirus packages provides great
protection against malware and system load is
significantly reduced. They contain firewall extensive
browser protection features to keep you secure online.
2. Bitdefender
It also provides the best value with features such as
secure browser with a virtual keyboard, a Wi-Fi network
scanner, defense system against encrypting ransomware.
3. Kaspersky
Kaspersky show great malware detection capability and
have a quality to moderate effect on the system.
4. McAfee
McAfee Antivirus Plus is only antivirus solution that
identifies rising number of devices in a single household.
5. Webroot
Webroot Secure AntiVirus is a fascinating Windows and
Mac application that employs unique approach to
malware detection.
6. ESET
ESET is a secure antivirus that excels at guarding your
gadgets against malware, phishing scams, ransomware
and online threats.It also provides excellent capabilities
that can assist you in recovering your device if it is lost.
7. Sophos
Sophos is simple antivirus with strong malware detection
rates, a user-friendly dashboard, and a few useful
features, such as remote management.
8. Avast
Avast offers a variety of features and tools to improve
your cybersecurity. Avast's plan includes standard
features and functionalities.
9. Panda
Panda Dome is a multi-featured antivirus with a high-
quality cybersecurity defenses. It has password organizer
which includes password analyzer that examines all of
your passwords and informs you how strong they are and
how long it will take someone to crack them.