Wednesday, 30 June 2021

Solved Assignments Class 11 Ch-1

 

CLASS -11  COMPUTER SCIENCE

    CHAPTER-1  GETTING STARTED WITH PYTHON


Assignments 

  • When  was  python  released  ?                                                                                      Ans. 1991

  • Who  was  python's  developer  and  which  two  languages   contributed  to it  as  a  programming  language  ?                                                                                           Ans.  Guido  Van  Russom is  the  developer  of python .                                                       The  two  languages  were :    i)  ABC language ( basic language )                                                                               ii)  Modula - 3

  • What is cross - platform software  ?                                                                              Ans . Those softwares that can run equally on variety of platforms like- Windows , Linux , Macintosh , etc.

  • What are the advantages of python programming language ?                                    Ans. Following are the benefits of using this language -                                                                       1 . Easy to use                          2. Expressive Language                                                 3 . Interpreted language         4 . It is complete in itself                                              5 . Cross- platform language    6 . Free and open source                                              7 . Variety of usage 

  • What are limitations of python programming language ?                                    Ans. Following are the disadvantages of using this language -                                                      1 . Slow language                        2. Lesser libraries than C , Java , Pearl                   3 . Not strong on type binding     4 . Not easily convertible 

  • In how many different ways can you work in python ?                                                 Ans . We can work in two ways i.e.  INTERACTIVE MODE  &  SCRIPT MODE in python .

  • What are advantages and disadvantages of working in Interactive Mode ?               Ans . Advantages :  It is very useful for testing a code and at the time of                                                    debugging .                                                                              Disadvantages  : It does not save the commands and the output comes sandwiched with  the input commands .

  •         
  • What are advantages and disadvantages of working in Script Mode ?                       Ans . Advantages :  It is very useful to save the code in the form of a program                                          and to run it later   on to get complete output .                        Disadvantages  : It is not as fast as interactive mode and is hectic to test code at the time of  debugging .                                                                                                                                                                                                                                                                                                                                                                                                                                               πŸ‘‰MORE MATERIALS TO BE UPLOADED STAY TUNEDπŸ‘ˆ

Saturday, 26 June 2021

CLASS 11 CS CHAPTER 22

 

CLASS -11  COMPUTER  SCIENCE

  CHAPTER- 22  ONLINE ACCESS & COMPUTER  SECURITY


πŸ””To download textbook pdf click on the ''DOWNLOAD'' button below -


NOTES FOR COMPLETE UNDERSTANDING -


  • Threats to Computer Security :
  • A Threat is a potential violation of security. 
  • When a threat is actually executed, it becomes attack. 
  • Those who executes such actions, or cause them to be executed are called attackers. 

  • Some common threats the average computer user faces everyday are:
  1. Viruses 
  2. Worms
  3. Trojans 
  4. Spyware
  5. Adware 
  6. Spamming 
  7. PC Intrusion
  8. Denial of Service 
  9. Sweeping 
  10. Password Guessing 
  11. Phishing 
  • They are also known as Malware that harms your computer.

  • Computer Viruses :
  • Computer Virus are malicious code/programs that cause damage to data and files on a system.
  • Virus can attack any part of a computer’s software such as boot sector, operating system, system areas, files, applications-program-macro etc. 
  • Two other similar programs also cause virus like effects. These are- 
  • Worms: a worm is a self replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled. 
  • Trojans Horses : A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer 

  • Damages caused by Viruses:                                                                                                                                                 – Damage or Delete files.                                                                                                 – Slow down your computer.                                                                                           – Invade your email programs.

  • Spyware :
  • Spyware is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. 
  • Spyware mostly get installed on your PC without your consent. 
  • Roughly 32% computers of the world are infected with some type of Malware. 
  • Damages caused by Spyware : 
  1. Compromises your data, computing habits and identity. 
  2. Alter PC settings. 
  3. Slow down your PC

  • Adware : 
  • These are the programs that deliver unwanted ads to your computer. 
  • They consume your network bandwidth. Adware is similar to spyware. 
  • You have to be very careful while installing a software.
  • Damages caused by Adware:                                           
  1. Adware tracks your information just like spyware. 
  2. Displays arrays of annoying advertising.
  3. Slow down your PC.

  • Spamming :
  • Spamming refers to the sending of bulk-mail by an identified or unidentified source.in malicious form, the attacker keeps on sending bulk mail until the mail-server runs out of disk space. 
  • Damages caused by Spamming-
  1. Spam reduces productivity. 
  2. Spam eats up your time.
  3. Spam can lead to worse things.

  • PC Intrusion :
  • Every PC connected to the internet is a potential target for hackers. PC intrusion can occur in any of the following form.
  • Sweeper Attack : This is another malicious program used by hackers which sweeps all the data from the system. 
  • Denial of Services: This eats up all the resources of the system and the system come to a halt. 
  • Password Guessing: Most hackers crack or guess passwords of system accounts and gain entry into remote computer systems.

  • Eavesdropping :
  • Unauthorized monitoring of other people's communications is called Eavesdropping. 
  • Eavesdropping can be carried out through all communication devices and media of today-telephone, emails, messaging, other internet services.
  • To prevent this, email messages have to be encrypted and digital signature are also effective. 

  • Phishing and Pharming 
  • In Phishing, an imposter uses an authentic looking e-mail or website to trick recipients into giving out sensitive personal information which may later used for cyber crimes and frauds. 
  • Pharming is an attack in which a hacker attempts to redirect a website’s traffic to another, bogus website. Even if the URL is correct, it can still be redirect to a fake website.

  • Cookies :
  • A Cookie is a small piece of data sent from a website and stored in a user’s web browser. Some cookies disappears after user closes his browser while others, know as tracking cookies, remain saved and load the next time user visits the same website. 
  • These cookies help track user’s browsing sessions and load information faster, but create some security and privacy concerns as well. These security and privacy concerns are-
  1. Session Data : when you visit a website regularly, you may not have to enter your user name and password to get in because the information is being pulled from a tracking cookie. If somebody found out the encryption key and acquired your cookies, he could discover your passwords. 
  2. Tracking Information : when you visit certain websites with advertisements, those ads create cookie that store and track your online patterns.
  3. Public Computers : when you work on a public computer in a similar manner as you work on personal computer, the people who have access to those computer may access your information also.

  • Solutions to Computer Security Threat :
  • The entire computer security is based on a system of actions and safeguards which have been categorized in two ways-
  1. Active Protection : It includes installing and using an antivirus that have internet security also which shows protection against threats such as viruses, spyware and PC intrusion. 
  2. Preventive Measures : Even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising

  • Solutions to Virus, Adware and Spyware :
  • Active Protection : 
  1. Use Anti-Virus and Anti-Spyware. 
  2. Download updates regularly.
  3. Run frequent full-system scans.
  • Preventive Measure : 
  1. Keep your system up-to-date. 
  2. Use caution when downloading files on the Internet. 
  3. Be careful with email. 
  4. Disable cookies, if possible.

  • Solutions to Spam and Eavesdropping :
  • Active Protection : 
  1. Use Anti-Virus. 
  2. Update your Anti-Virus regularly.
  • Preventive Measure : 
  1. Keep your email address private. 
  2. Use encryption in emails. 
  3. Be careful with E-mails. 
  4. Install Internet security services.

  • Solution to PC intrusion :
  • Active Protection : 
  1. Authorization 
  2. Authentication 
  3. Firewall
  • Preventive Measure : 
  1. Use Proper File Access Permission. 
  2. Disconnect from internet when away.

  • Solutions to Phishing and pharming attack :
  • Active Protection : 
  1. Take the computer offline. 
  2. Backup all files on the hard drive.
  3. List the information given to Phishing scammers. 
  4. Run Antivirus software. 
  5. Contact credit agencies to report any possibilities of identity theft.
  • Preventive Measure : 
  1. Don’t open emails from unknown sources. 
  2. When in doubt, do not click.

  • Firewall :
  • An Internet Firewall is a device or a software that is designed to protect your computer from data and viruses that you do not want. 
  • A firewall is so called because of the real firewalls used to secure buildings.

  • Software Firewall: 
  • A software firewall is a special type of software running on a computer. It protects your computer from outside attempts to control or gain access. 

  • Hardware Firewall: 
  • It is a physical piece of equipment designed to perform firewall duties. 
  • A hardware firewall may actually be another computer or dedicated piece of equipment which serves as a firewall.


           πŸ””MORE MATERIALS TO BE UPLOADED STAY TUNEDπŸ””



CLASS 11 CS CHAPTER 19

 

CLASS -11  COMPUTER  SCIENCE

        CHAPTER- 19  TABLE JOINS AND INDEXES IN SQL

πŸ””To download textbook pdf click on the ''DOWNLOAD'' button below -


NOTES FOR COMPLETE UNDERSTANDING -

  • JOINS :
  • Join is a query which combine rows of two or more tables. 
  • In a join-query, we need to provide a list of tables in FROM Clause. 
  • The process of combining multiple tables in order to retrieve data is called joining. 
  • Unrestricted join or cartesian product of both the tables gives all possible concatenations of all the rows of both the tables.
  • How to JOIN  ?
  • Using table aliases :
  • A table alias is a temporary label given along with table name in FROM clause .
  • Consider two relations as below :                                                                                            ( !! THESE TWO WILL  BE USED LATER ALSO !! )







  • Using another search conditions  :
  • Example - 


  • Types of JOINS for joining more than two tables :
  1. Equi-Join :                                                                                                                                                           The join , in which columns are compared for equality is called Equi- Join .
  2. Non-Equi Join :                                                                                                                                                   It is a query that specifies some relationship other than the equality between the columns .
  3. Natural Join :                                                                                                                                                      The join in which only one of the identical columns exists is called Natural Join .                                   

  • Types of JOIN Clause of SQL Select :
  • Cross Join :                                                                                                                                                               The cross join is a very basic type of join that simply matches each row from one table to every row of the other table .
  • Natural Join :                                                                                                                                                              same as above
  • Left Join :                                                                                                                                                                     When we use Left Join all rows from the first table will be returned whether they match or not to the second table . For unmatched rows of the first table NULL is shown in the columns of second table .
  • Right Join :                                                                                                                                                                 This also works in the same manner as done by Left Join but with the table order reversed .

  • Indexes in Database :
  • Index is a data structure maintained by a database that helps to find records within a table more quickly. 
  • An index stores the sorted/ordered values within the index field and their location in the actual table.
  • An index in a database is also a table which stores arranged values of one or more columns in a specific order.

  • Creation of Indexes in MySQL :
  • We can create indexes in MySQL by two methods -
  • At the time of table creation. 
  • Creation of index at some already existing table.

  • Advantages & Disadvantages of Indexes :
  • Advantages : 
  1. With Indexes, queries gives much better performance. 
  2. Data retrieval is much faster with Indexes. 
  3. Indexes are very useful for Sorting purpose. 
  4. Unique indexes guarantee uniquely identifiable records in the database.
  •  Disadvantages : 
  1. With Indexes, the performance of insert, update and delete decreases. As every time insert/update/delete operation happens, the index is to be updated accordingly. 
  2. Index consumes storage space and this increases with the number of fields used and the length of the table. 
  

              πŸ””MORE MATERIALS TO BE UPLOADED STAY TUNEDπŸ””


Wednesday, 23 June 2021

CLASS 11 CS CHAPTER 16

 

CLASS -11  COMPUTER  SCIENCE

               CHAPTER- 16  RELATIONAL  DATABASES


πŸ””To download textbook pdf click on the ''DOWNLOAD'' button below -



NOTES FOR COMPLETE UNDERSTANDING -


  • A Database System is generally a record storing system.
  • Collected form of data is referred as database. 
  • “Database" is actually a collection of interrelated data so that it can be used by various applications. 
  • Some of the Popular database softwares are-                                                                                          • MySQL (open Source)                                                                                                  • ORACLE Database                                                                                                        • MS SQL Server                                                                                                              • SQLite (open Source)                                                                                                    • MariaDB                                                                                                                        • PostgreSQL (open Source)

  • Aim of DBMS:
  • Database Management System (DBMS) is a software , it's purpose is to store , maintain and use databases. 
  • Its prime purpose is to perform operations on databases and to provide data when required. 
  • DBMS reduces Data Redundancy. 
  • It improves data security. 
  • It stores data n organized and Integrated form. 
  • Data remains error free. 
  • Data is available as and when required. 
  • Database follows a standard.

  • Relational Database Model :– 
  • In Relational Data model, data remains in the form of tables. 
  • A table is a combination of rows and columns which is also known as Relation . 
  •  In a table, a row shows relationship between values. A table is a collection of this relationship. 
  • Byte: A group of 8 bits used to store a character is known as byte. 
  • Data Item: Smallest unit of data. 
  • Record: It is a complete information made of data item. 
  • Table: A table is a collection of logical records.

  • Relational Model Terminology :
  • Relational Model was given by E. F. Codd of IBM. 
  • Terminology of Relation Model is:-
  • Relation: Basically a relation is a table. Its a collection of data in rows and columns. A relation has following features-                                                                                    • In a table, data in one column should be of same data type. Different columns can have data of different data types.                                                                               •  A column in a row can not have multiple values.                                                       • In a relation, each row is distinct. Any two rows cannot have exactly same data.                                                                                                                                           • There is no specific order of rows in a relation.                                                         • In a Relation i.e. table, there is no specific order of columns.

  • Domain: It is the collection/pool of values for a column is known as Domain. 
  • Tuple : rows of a table are known as tuples. 
  • Attribute : columns of a table are known as attributes. 
  • Degree : In a relation, number of attributes or columns is its Degree. 
  • Cardinality : In a relation, number of tuples or rows is its Cardinality.
  • Views – A View is a Virtual table which is based on some or specific data of a table
  • Keys – Some attributes has some properties because of that those attributes are known as keys. 
  • Primary Key : It is a attribute which is used to uniquely identify records of a relation & can be used to establish relationship with other relation. It is a mixture of unique & not null constraint. Generally all master tables have primary keys. 
  • Candidate Key : Its a group of attributes which have the properties to be selected as a primary key i.e. These attributes shows their capability to be a Primary Key. 
  • Alternate Key : A candidate key which is not a primary key is known as alternate key. 
  • Foreign Key : In a table, an attribute which is derived from primary key of some other table is known as foreign key in present table.

  • Referential Integrity: Referential integrity is a system of rules which is used by a DBMS to ensure that there is a valid relationship between related tables or not. 
  • Referential integrity is possible only when following conditions gets completed- 
  1. Primary key should have unique index.
  2. Related fields should have same datatype. 
  3. All tables should be of same database. 
  4. Primary key of Master table should have a reference with foreign key of transaction table. 
  5. Entry of that record in transaction table is not possible whose foreign key value does not exist in primary key of master table. 
  6. Deletion of that record from primary key table is not possible which has a related record in foreign key table. 
  7. Change in related records of primary key is not possible.

  • MySQL:
  • MySQL is an open source Relational Database Management System (RDBMS) which makes use of SQL (Structured Query Language). 
  •  It can be downloaded from www.mysql.org. 
  • In MySQL, information is stored in the form of tables.
  • A MySQL database can have multiple tables and thousands of records simultaneously.
  • It is a better option to store fast, reliable and big amount of data. 
  • MySQL was developed by MySQL AB company which is now a part of Sun Microsystems. 
  • SERVER : which responds to the requests of clients. 
  • CLIENTS : these are the programs which are attached to database server and send requests to server.
  • MySQL Features :                                                                                                                               – Fast Speed                                              – Easy to use.                                                 – Free of cost.                                            – Support of SQL.                                         – Portability.                                              – Various Data types.                                   – Secure.                                                                                                                           – Can handle large data (Scalability and limits).                                                         – Connectivity : uses various protocols to get connected with clients.                       – Localization : server can send error messages to clients in different languages.                                                                                                                                               – Clients and Tools. It provides various client and utility programs.

  • SQL:
  •  Structured Query Language (SQL) is used to access any database.
  • SQL stores the commands that are to be used in databases which are generally accepted by all RDBMS. 
  • SQL is a language which provides interface to create relational database and to operate upon them. 
  • Various versions of SQL are available. First version was developed in 1970 by San Jose Research Laboratory of IBM. 
  • In 1992, 2003, 2008 some updates were added.
  • SQL is being used by beginners and skilled users.

  • Processing Capabilities of SQL :
  1. Data Definition Language (DDL) 
  2. Interactive Data Manipulation Language(DML) 
  3. Embedded Data Manipulation Language: these are developed to be used in some programming languages 
  4. View Definition 
  5. Authorization 
  6. Integrity 
  7. Transaction Control

  • Data Definition Language (DDL) :
  • Command under this category are used to create or modify scheme of database. It is used to create data dictionary. 
  • Data Dictionary is a kind of metadata means Data about Data. A standard DDL should have following functions- 
  1. It should identify the types of data division. 
  2. It should give a unique name of each data item. 
  3. It should specify the proper data type. 
  4. It may define the length of data items.
  5. It may define the range of values of Data items. 
  6. It may specify means of checking for errors.
  7. It may specify privacy locks for preventing unauthorized reading or modification of the data.
  • DDL Commands Following commands are under this category- 
  • Create, alter and drop schema Objects:
  1. Create table
  2. create view
  3. create database
  • Alter Table
  • Drop Table 
  • Drop View 
  • Create Index 
  • Alter Index
  • Grant and Revoke privileges and rolls
  1. Grant
  2. Revoke
  • Maintenance Commands
  1. Analyze Table 
  2. Check Table 
  3. Restore Table etc.
  • DML Commands:
  • DML (Data Manipulation Language) is a kind of language used to access data, insert data and delete data from a data model. 
  • Data manipulation means- 
  1. Accessing the stored data from a Database.
  2. Insertion of new information into the Database. 
  3. Deletion of information from the Database. 
  4. modification of information in the Database. 
  • DMLs are basically of two types- 
  1. Procedural : specifies what data is needed and how to get it. 
  2. Non- Procedural: specifies what data is needed without specifying how to get it.
  • TCL Commands :
  • A transaction is one complete unit of work for ex- withdrawl of 2000 Rs/- from a bank Account. 
  • Following commands are used to successfully complete a transaction.
  • COMMIT : it makes all the changes permanent. 
  • ROLLBACK : undoes all the changes. 
  • SAVEPOINT : it marks a point upto which all earlier statements have been successfully completed. 
  • SET TRANSACTION : it establishes properties for the current transactions.
         
          πŸ””MORE MATERIALS TO BE UPLOADED STAY TUNEDπŸ””

Monday, 21 June 2021

CLASS 11 CS CHAPTER 15

 

CLASS -11  COMPUTER  SCIENCE

     CHAPTER- 15  INSIGHT  INTO  PROGRAM  EXECUTION


πŸ””To download textbook pdf click on the ''DOWNLOAD'' button below -



NOTES FOR COMPLETE UNDERSTANDING -


  • As we know that computer works on machine level language which is not understandable to a programmer, similarly programmer works with a language which is not understandable by a computer system. 
  • Programmer uses a specific language to write a program like –  C,  C++,  Java etc. 
  • These languages are indirectly understood by computer .
  • Thus, it is essential to convert the instructions written in programmer’s language into a machine compatible language.

  • Basic Flow of Compilation  :
  • Program written in a language is known as source code.
  • Source code is to be written as per the rules of a programming language. 
  • This source code is then converted to machine level language , known as binary code , in order to understand by a computer. 
  • So, a programmer prepares a source code that then  later is converted in to binary code so as to be executed by computer.



  • Translator :
  • A special software is needed to convert a Source Code into binary code which are as under-                    • Compiler                           • Interpreter 
  • Both these software changes source code into binary code but each has way of working different from other. 
  • Compiler works in exactly antonymous (opposite) way of that of interpreter .

  • Compilation :
  • Compiler takes source code and in few stages generates low level-code. 
  • Compilation process stages are      1. Processing                                                                                                                     2. Compilation                                                                                                                         I. Analysis [ front end phase ]                                                                                        II. Synthesis [ back end phase ]                                                                                 3. Assembly                                                                                                                       4. Linking                                                                                                                         5. Loader

  • Processing  : 
  • At this stage extra unnecessary code is removed other than source code like comments and the code which is necessary for the execution of a program is added.

  • Compilation :
  • Compilation phase has two sub stages  -
  • 1.  Analysis     [ front end phase ]                  
  •         Analysis Phase : Analysis phase prepares a table of symbols by all the tokens of source code.
  • 2.  Synthesis    [ back end phase ]   
  •         Synthesis Phase: This phase develops a syntax tree after traversing the source code. A syntax tree is a syntactic tree of source code.


  • Assembly Phase  :
  • This phase creates object code by the help of instructions received from assembly level, an object code is a variant of machine code. 

  • Linking :
  • The code reached in the system at this phase is actually binary code although computer is unable to execute the code as the important libraries required for execution are still not linked with the code. 
  • This work is carried out by linker. So in this phase, OS resolve all memory references & develops an executable (.exe file) file.

  • Loader  : 
  • Loader a part of compiler does loading of an executable file in memory.
  • So now the computer can run this .exe file without help of any additional software.

  • The Interpretation Process :
  • Working of an interpreter is like Compiler. It also changes source code to machine compatible code but it's different from compiler in a definite manner of working. 
  • It converts a program line by line by adding essential libraries. 
  • I.e. before the conversion & execution of second line, first line gets executed completely
  • Interpreter follows same manner of conversion & execution for the rest of the program.



  • Role of Operating System in program running 
  • As we know that execution  of an .exe file is free from any requirement for a computer system. 
  • This executable file executes with the help of operating system.
  • Now a days, importance and complexity of operating system has been increased much because of multiuser and multi-processing concepts. 
  • Operating system does a work of an  interface between a user & hardware. 
  • Also, operating system provides platform to a program to run.

  • OS as a Resource Manager  :
  • Static state of any program code is known as a program and in running state is known as process.
  • When many program executes at the same time, OS improves or enhance the capacity or capability of system by managing resources. Which is to be measured in the terms of throughput. 
  • Throughput= Number of jobs done Time taken 
  • For Multiple Processing, OS provides following function:-                                                       • Process Management                                                                                                     • Process Scheduling                                                                                                         • Memory Management                                                                                                   • I/O Management

  • Process Management  :
  • For execution a program arrives to operating system.
  • Then, a process scheduler of OS loads program into the memory. Now, the program becomes process. Which executes as per instructions.


  • When a program is all set for execution then it is transferred into memory & there it  becomes process. Now, this process follows following states.- 
  • Start State: A state that comes when a program for the first time gets transferred to memory. 
  • Ready State: A state comes when process gets ready for execution & waits as per its turn for CPU  . 
  • Running State: This state comes when CPU works on the process for execution. 
  • Waiting State:  A state that comes when process waits for some resources required for execution for ex- input from user. 
  • Terminated OR Exit: When CPU follows all instructions of a process, its execution gets completed and now it is terminated by OS. This terminated process now gets popped out from memory.


  • OS process manager prepares a data structure for managing of processes which is known as Process Control Block (PCB). 
  • OS develops PCB for every process.
  • When a process gets loaded into memory, it gets an ID that is referred as Process ID or PID and then its PCB is created.
  • PCB keeps important information about process to keep track of process .PCB keeps following information



  • Process Scheduling by OS :
  • As we all know that sometime number of  programs loads together in the computer memory for execution. It is very difficult to manage these processes. Following points are important to know for this --
  • Which process will get CPU time? 
  • Which process will be deleted from CPU?
  • Which process is to be shifted for I/O?
  • How to handle an interruption? 
  • Here interruption is a signal to CPU from a high priority process to have CPU time for it. 
  • This completes task is of OS process scheduler.
  • Process scheduling is an activity of process manager in which  the process manager removes running processes out of CPU & selects the next process.

  • There are some strategies for selection- 
  • First come first serve (FCFS)
  • Round robin scheduling (Round Robin Scheduling)
  • Smallest job first (Shortest Job Next ) etc . 
  • There are other strategies too. Process scheduler also makes some Process Scheduling Queues regarding the order of execution of process.                                                        – Job Queue : All lines of process in a system.                                                              – Ready queue: Line of process with read state.                                                          – Device Queues : like I/O line

  • Memory Management :
  • Since anything to be processed , needs to get load in memory so Memory Management part of OS is also very important. 
  • Memory manager perform following tasks-                                                                 • Stores address of every memory location.                                                                 • It keeps information of allocated memory to a process & required memory also.                                                                                                                                     •  It decides that when the memory is to be released to a process.                             • Responsibility for the protection of data in allocated memory. 
  • Some memory management techniques are-                                                                 – Single Memory Allocation                                                                                           – Partitioned memory allocation                                                                                   – Paged Memory Management                                                                                     – Segmented Memory Management

  • I/O Management :
  • When a process requires any input/output, OS takes this responsibility. 
  • I/O Manager then sends request to CPU that creates an interrupt for CPU. 
  • CPU sends running process for I/O process meanwhile it completes another process . As soon as I/O of first process gets completed, CPU again takes it for completion of other.

  • PARALLEL COMPUTING :
  • At the time of invention of computers, there was single processor in a system that could do only one job at a time. 
  • It performed one task after previous task. With the improvement in technique and development, processors became more able and multi-processor computers were also developed.
  • Multi-processor system can do more than one task at a time, that is known as PARALLEL COMPUTING . 
  • In a parallel computing system -                    
  • A problem is distributed into several individual units. 
  • Every unit executes its own instructions.
  • Instructions from each unit is completed by separate processor. 
  • For this, either multi-processor system is used or multiple systems are to be used by connecting them in network.
  • This saves time, makes a complex problem easy, makes full use of hardware & use peripherals optimally.

  • CLOUD COMPUTING :
  • Cloud Computing is an internet based process that uses computer application.
  • Google apps is an example of cloud computing which provides business applications online. 
  • It is of two types-          • Public Cloud like Google Drive, iCloud etc.                                                                • Private Cloud like BMC software

            πŸ””MORE MATERIALS TO BE UPLOADED STAY TUNEDπŸ””

WHY Software Developer ?