+ All Categories
Home > Documents > Cmf Terms Final

Cmf Terms Final

Date post: 04-Apr-2018
Category:
Upload: jyoti-bhanot
View: 232 times
Download: 0 times
Share this document with a friend

of 61

Transcript
  • 7/31/2019 Cmf Terms Final

    1/61

    100232140239 1

    1. MAIN MEMORY (RAM)

    If we were to sum all the bits of all registers within CPU, the total amount of memory probably

    would not exceed 5,000 bits. Most computational tasks undertaken by a computer require a lotmore memory. Main memory is the next fastest memory within a computer and is much larger

    in size. Typical main memory capacities for different kinds of computers are: PC 512MB,

    fileserver 2GB, database server 8GB. Computer architectures also impose an architectural

    constraint on the maximum allowable RAM. This constraint is normally equal to 2WordSize

    memory locations.

    RAM (Random Access Memory) is the most common form of Main Memory. RAM is normally

    located on the motherboard and so is typically less than 12 inches from the CPU. ROM (ReadOnly Memory) is like RAM except that its contents cannot be overwritten and its contents are

    not lost if power is turned off (ROM is non-volatile).

    Although slower than register memory, the contents of any location in RAM can still be read

    or written very quickly. The time to read or write is referred to as the access time and is

    constant for all RAM locations.In contrast to register memory, RAM is used to hold both

    program code (instructions) and data (numbers, strings etc). Programs are loaded into RAM

    from a disk prior to execution by the CPU.

    Locations in RAM are identified by an addressing scheme e.g. numbering the bytes in RAM

    from 0 onwards. Like registers, the contents of RAM are lost if the power is turned off.

    2. DMA (DIRECT MEMORY ACCESS)

    Stands for "Direct Memory Access.DMA is a method of transferring data from the computer's

    RAM to another part of the computer without processing it using the CPU. While most data that

    is input or output from your computer is processed by the CPU, some data does not require

    processing, or can be processed by another device. In these situations, DMA can save processing

    time and is a more efficient way to move data from the computer's memory to other devices. For

    example, a sound card may need to access data stored in the computer's RAM, but since it can

    process the data itself, it may use DMA to bypass the CPU. Video cards that support DMA can

  • 7/31/2019 Cmf Terms Final

    2/61

    100232140239 2

    also access the system memory and process graphics without needing the CPU. Ultra DMA hard

    drives use DMA to transfer data faster than previous hard drives that required the data to first be

    run through the CPU.

    In order for devices to use direct memory access, they must be assigned to a DMA channel. Each

    type of port on a computer has a set of DMA channels that can be assigned to each connected

    device. For example, a PCI controller and a hard drive controller each have their own set of

    DMA channels.

    3. INTERRUPT

    Interrupt refers to the transfer of program control from a currently running program to another

    service program as a result of an external or internal generated request.

    There are three types of interrupts which the CPU recognizes.

    Hardware Interrupt- This is any type of hardware event such as a key pressed on the keyboard,

    a hard disk completing the reading or writing of data, or the reception of an ethernet packet, etc.

    Many operating systems program a clock to issue interrupts at regular intervals so that the kernel

    is guaranteed to get control on a regular basis even if no hardware events occur and a user

    program never releases the CPU.

    Software Interrupt- When a user program needs to make a system call to the operating system,

    such as for I/O or to request more memory, it may issue a special instruction called a software

    interrupt to cause the CPU to switch processing to the kernel.

    Trap- A trap is issued by the CPU itself when it detects that something is wrong or needs special

    attention. In most cases a trap is issued when a user program performs an illegal instruction such

    as a divide by zero error or illegal memory reference.

    4. CACHE MEMORY

    Cache memory is a high speed memory buffer that temporarily stores data that processor needs.

    It stores random data usually stores on the first in first out basis. It enables the processor to

    continue working either at full speed. Cache memory is basically made up of static RAM

  • 7/31/2019 Cmf Terms Final

    3/61

    100232140239 3

    integrated into the processor. In static RAM binary values are stored using flip flops and logic

    gates. It holds its data until the power is supplied.

    Cache memory is usually placed between the processor and the main memory. Basically the

    main function of the cache memory is to accelerate your computer. Cache is a technology based

    on the memory subsystem of your computer. Caching allows you to do your computer tasks

    more rapidly. The value of cache is that it is much faster than the normal memory. The data is

    searched on the basis of address.

    There are two types of cache memory that is level 1 and level 2. Level 1 is memory that is of

    very high speed and can be accessed easily with the zero wait state. If the required data or

    instruction is not present on the level1 then level 2 is tried next. Today level 1 cache memory is

    mostly implemented within the processor, with level 2 referring to cache memory on

    motherboard. Nowadays, level2 cache is also becoming available on processor.

    5.STACK

    In computer science, a stack is a last in, first out (LIFO) abstract data type and data structure. A

    stack can have any abstract data type as an element, but is characterized by only three

    fundamental operations:push,pop and stack top. The push operation adds a new item to the top

    of the stack, or initializes the stack if it is empty. If the stack is full and does not contain enoughspace to accept the given item, the stack is then considered to be in an overflow state. The pop

    operation removes an item from the top of the stack. A pop either reveals previously concealed

    items, or results in an empty stack, but if the stack is empty then it goes into underflow state (It

    means no items are present in stack to be removed). The stack top operation gets the data from

    the top-most position and returns it to the user without deleting it. The same underflow state can

    also occur in stack top operation if stack is empty.

    A stack is a restricted data structure, because only a small number of operations are performed

    on it. The nature of the pop and push operations also means that stack elements have a natural

    order. Elements are removed from the stack in the reverse order to the order of their addition:

    therefore, the lower elements are those that have been on the stack the longest.

    http://en.wikipedia.org/wiki/Computer_sciencehttp://en.wikipedia.org/wiki/LIFO_(computing)http://en.wikipedia.org/wiki/Abstract_data_typehttp://en.wikipedia.org/wiki/Data_structurehttp://en.wikipedia.org/wiki/Abstract_data_typehttp://en.wikipedia.org/wiki/Elementhttp://en.wikipedia.org/wiki/Stack_overflowhttp://en.wikipedia.org/wiki/Stack_overflowhttp://en.wikipedia.org/wiki/Elementhttp://en.wikipedia.org/wiki/Abstract_data_typehttp://en.wikipedia.org/wiki/Data_structurehttp://en.wikipedia.org/wiki/Abstract_data_typehttp://en.wikipedia.org/wiki/LIFO_(computing)http://en.wikipedia.org/wiki/Computer_science
  • 7/31/2019 Cmf Terms Final

    4/61

    100232140239 4

    Representation of stack

    6.LOGICGATES

    A logic gate performs a logical operation on one or more logic inputs and produces a single logic

    output. The logic normally performed is Boolean logic and is most commonly found in digital

    circuits. Logic gates are primarily implemented electronically using diodes or transistors, but can

    also be constructed using electromagnetic relays, fluidics, optics, molecules, or even mechanical

    elements. A logic level is represented by a voltage or current, (which depends on the type of

    electronic logic in use). Each logic gate requires power so that it can source and sink currents to

    achieve the correct output voltage. In logic circuit diagrams the power is not shown, but in a full

    electronic schematic, power connections are required.

    7.VIRTUALMEMORY

    In computing, virtual memory is a memory management technique developed for multitasking

    Kernals. This technique virtualizes a computer architectures various forms of computer data

    storage(such as random access memory and Disk storage), allowing a program to be designed as

    though there is only one kind of memory, "virtual" memory, which behaves like directly

    addressable read/write memory (RAM).

    Systems that employ virtual memory:

    Use hardware memory more efficiently than do systems without virtual memory.

    Make the programming of applications easier:

    By hiding fragmentation.

    By delegating to the kernel the burden of managing the memory hierarchy.

    http://en.wikipedia.org/wiki/Logical_operationhttp://en.wikipedia.org/wiki/Boolean_logichttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Diodehttp://en.wikipedia.org/wiki/Transistorhttp://en.wikipedia.org/wiki/Relayhttp://en.wikipedia.org/wiki/Fluidicshttp://en.wikipedia.org/wiki/Opticshttp://en.wikipedia.org/wiki/Molecular_logic_gatehttp://en.wikipedia.org/wiki/Analytical_enginehttp://en.wikipedia.org/wiki/File:Data_stack.svghttp://en.wikipedia.org/wiki/Analytical_enginehttp://en.wikipedia.org/wiki/Molecular_logic_gatehttp://en.wikipedia.org/wiki/Opticshttp://en.wikipedia.org/wiki/Fluidicshttp://en.wikipedia.org/wiki/Relayhttp://en.wikipedia.org/wiki/Transistorhttp://en.wikipedia.org/wiki/Diodehttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Boolean_logichttp://en.wikipedia.org/wiki/Logical_operation
  • 7/31/2019 Cmf Terms Final

    5/61

    100232140239 5

    8. INSTRUCTION EXECUTION CYCLE

    In order to execute an instruction program, the control unit has to issue and coordinate a series of

    micro-instructions. These micro-instructions form the fetch-execute cycle. The operation of theCPU is usually described in terms of the Fetch-Execute cycle.

    Fetch-Execute Cycle The cycle raises many interesting questions, e.g.

    Fetch theInstruction What is an Instruction? Where is the Instruction? Why does it

    need to be fetched? Isn't it okay where it is? How does the

    computer keep track of instructions? Where does it put the

    instruction it has just fetched?

    Increment the Program

    Counter

    What is the Program Counter? What does the Program Counter

    count? Increment by how much? Where does the Program

    Counter point to after it is incremented?

    Decode the Instruction Why does the instruction need to be decoded? How does it get

    decoded?

    Fetch the Operands What are operands? What does it mean to fetch? Is this fetching

    distinct from the fetching in Step 1 above? Where are the

    operands? How many are there? Where do we put the operands

    after we fetch them?

    Perform the Operation Is this the main step? Couldn't the computer simply have done

    this part? What part of the CPU performs this operation?

    Store the results What results? Where from? Where to?

    Repeat forever Repeat what? Repeat from where? Is it really an infinite loop?

    Why? How do these steps execute any instructions at all?

    9.COMPILER

    A compiler is a computer program (or set of programs) that transforms source code written in a

    programming language (the source language) into another computer language (the target

  • 7/31/2019 Cmf Terms Final

    6/61

    100232140239 6

    language, often having a binary form known as object code.) The most common reason for

    wanting to transform source code is to create an executable program.

    The name "compiler" is primarily used for programs that translate source code from a high-level

    programming language to a lower level language (e.g., assembly language or machine code). If

    the compiled program can run on a computer whose CPU or operating system is different from

    the one on which the compiler runs, the compiler is known as a cross-compiler.

    A compiler is likely to perform many or all of the following operations: lexical analysis,

    preprocessing, parsing, semantic analysis (Syntax-directed translation), code generation, and

    code optimization.

    10. OPERATING SYSTEM

    An operating system (OS) is a set of programs that manage computer hardware resources and

    provide common services for application software. The operating system is the most important

    type ofsystem software in a computer system. A user cannot run an application program on the

    computer without an operating system, unless the application program is self booting.

    Time-sharing operating systems schedule tasks for efficient use of the system and may also

    include accounting for cost allocation of processor time, mass storage, printing, and other

    resources.For hardware functions such as input and output and memory allocation, the operating system

    acts as an intermediary between application programs and the computer hardware, although the

    application code is usually executed directly by the hardware and will frequently call the OS or

    be interrupted by it. Operating systems are found on almost any device that contains a

    computerfrom cellular phones and video game consoles to supercomputers and web servers.

    The basic functions that an Operating System should provide include :

    CPU and Process Management

    Memory Management

    I/O Management

    Information And Storage Management

    Network Management

    User Interface

    http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_hardwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/System_softwarehttp://en.wikipedia.org/wiki/Dynamic_memory_allocationhttp://en.wikipedia.org/wiki/Cellular_phonehttp://en.wikipedia.org/wiki/Video_game_consolehttp://en.wikipedia.org/wiki/Supercomputershttp://en.wikipedia.org/wiki/Web_servershttp://en.wikipedia.org/wiki/Web_servershttp://en.wikipedia.org/wiki/Supercomputershttp://en.wikipedia.org/wiki/Video_game_consolehttp://en.wikipedia.org/wiki/Cellular_phonehttp://en.wikipedia.org/wiki/Dynamic_memory_allocationhttp://en.wikipedia.org/wiki/System_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Computer_hardwarehttp://en.wikipedia.org/wiki/Computer_program
  • 7/31/2019 Cmf Terms Final

    7/61

    100232140239 7

    Program Execution

    Security

    Device Management

    Resource Allocation and Accounting

    11. BIOS

    BIO (basic input/output system) is the program a personal computer's microprocessor uses to

    get the computer system started after you turn it on.

    It also manages data flow between the computer's operating system and attached devices

    such as the hard disk, video adapter, keyboard, mouse, and printer. BIOS is an integral part

    of your computer and come with it when you bring it home. (In contrast, the operating

    system can either be preinstalled by the manufacturer or vendor or installed by the user.)

    BIOS is a program that is made accessible to the microprocessor on an erasable

    programmable read-only memory (EPROM) chip. When computer is turned on, the

    microprocessor passes control to the BIOS program, which is always located at the same

    place on EPROM.

    When BIOS boots up (starts up) your computer, it first determines whether all of the

    attachments are in place and operational and then it loads the operating system (or key parts

    of it) into your computer's random access memory (RAM) from your hard disk or diskette

    drive. With BIOS, your operating system and its applications are freed from having to

    understand exact details (such as hardware addresses) about the attached input/output

    devices. When device details change, only the BIOS program needs to be changed.

    Sometimes this change can be made during your system setup. In any case, neither your

    operating system nor any applications you use need to be changed.

    Although BIOS is theoretically always the intermediary between the microprocessor and I/O

    device control information and data flow, in some cases, BIOS can arrange for data to flow

    directly to memory from devices (such as video cards) that require faster data flow to be

    effective.

  • 7/31/2019 Cmf Terms Final

    8/61

    100232140239 8

    12. BYTE

    A byte is a set of 8 bits that represent a single character in the computer's memory. Do not

    confuse this term with "bite," as in taking a bite of a cookie, because that is totally different.

    While bits are often used to measure data transfer speeds, bytes are used to measure file

    sizes, hard disk space, and computer memory. Larger amounts of data are measured in units

    such as megabytes, gigabytes, and terabytes.

    For example, one kilobyte is equal to 1,024 bytes.In most computer systems, a byte is a unit

    of data that is eight binary digits long.

    A byte is the unit most computers use to represent a character such as a letter, number, or

    typographic symbol (for example, "g", "5", or "?").

    A byte can also hold a string of bits that need to be used in some larger unit for application

    purposes (for example, the stream of bits that constitute a visual image for a program that

    displays images or the string of bits that constitutes the machine code of a computer

    program).

    In some computer systems, four bytes constitute a word, a unit that a computer processor.

    13. REGISTER MEMORY

    Registers are memories located within the Central Processing Unit (CPU). They are few in

    number (there are rarely more than 64 registers) and also small in size, typically a register is less

    than 64 bits; 32-bit and more recently 64-bit are common in desktops.

    The contents of a register can be read or written very quickly however, often an order of

    magnitude faster than main memory and several orders of magnitude faster than disk memory.

    Different kinds of register are found within the CPU. General Purpose Registers are available

    for general use by the programmer. Unless the context implies otherwise well use the term

    "register" to refer to a General Purpose Register within the CPU. Most modern CPUs have

    between 16 and 64 general purpose registers. Special Purpose Registers have specific uses and

    are either non-programmable and internal to the CPU or accessed with special instructions by the

    programmer. Examples of such registers that we will encounter later in the course include: the

  • 7/31/2019 Cmf Terms Final

    9/61

    100232140239 9

    Program Counter register (PC), the Instruction Register (IR), the ALU Input & Output registers,

    the Condition Code (Status/Flags) register, the Stack Pointer register (SP). The size (the number

    of bits in the register) of the these registers varies according to register type. The Word Size of

    an architecture is often (but not always!) defined by the size of the general purpose registers.

    In contrast to main memory and disk memory, registers are referenced directly by specific

    instructions or by encoding a register number within a computer instruction. At the

    programming (assembly) language level of the CPU, registers are normally specified with

    special identifiers (e.g. R0, R1, R7, SP, PC)

    As a final point, the contents of a register are lost if power to the CPU is turned off, so registers

    are unsuitable for holding long-term information or information that is needed for retention after

    a power-shutdown or failure. Registers are however, the fastest memories, and if exploited can

    result in programs that execute very quickly.

    14. RISC (REDUCED INSTRUCTION SET COMPUTER)

    RISC is a class of computer architectures featuring a small number of primitive instructions, a

    constant hardware instruction length (in bits), and no memory accesses except by load" and

    store" instructions. The objective of a RISC architecture is to reduce the number of clock

    periods per (integer) instruction to 1 for most executions, in order to maximizeperformance.

    The following characteristics are typical of RISC architectures. Although none of these are

    required for anarchitecture to be called RISC, this list does describe most current RISC

    architectures, including the SPARC design.

    Singlecycle execution: Most instructions are executed in a single machine cycle.

    Hardwired control with little or no microcode: Microcode adds a level of complexity and

    raises the number of cycles per instruction.

    Load/Store, register-to-register design: All computational instructions involve registers.Memory accesses are made with only load and store instructions.

    Simple fixed-format instructions with few addressing modes: All instructions are the

    same length (typically 32 bits) and have just a few ways to address memory.

    Pipelining: The instruction set design allows for the processing of several instructions at

    the same time.

  • 7/31/2019 Cmf Terms Final

    10/61

    100232140239 10

    Highperformance memory: RISC machines have at least 32 generalpurpose registers

    and large cache memory.

    Migration of functions to software: Only those features that measurably improve

    performance are implemented in hardware. Software contains sequences of simple

    instructions for executing complex functions rather than complex instructions

    themselves, which improves system efficiency.

    More concurrency is visible to software: For example, branches take effect after

    execution of the following instruction, permitting a fetch of the next instruction during

    execution of the current instruction.

    The real keys to enhanced performance are single-cycle execution and keeping the cycle time as

    short as possible. Many characteristics of RISC architectures, such as load/store and register-to-

    register design, facilitate single-cycle execution. Simple fixed-format instructions on the other

    hand, permit shorter cycles by reducing decoding time.

    15. BOOTING

    To boot a computer is to load an operating system into the computer's main memory or random

    access memory (RAM). Once the operating system is loaded, it's ready for users to run

    applications. Sometimes there is an instruction to "reboot" the operating system. This simply

    means to reload the operating system. Booting or loading an operating system is different than

    installing it, which is generally an initial one-time activity. When you install the operating

    system, you may be asked to identify certain options or configuration choices. At the end of

    installation, your operating system is on your hard disk ready to be booted (loaded) into random

    access memory, the computer storage that is closer to the microprocessor and faster to work with

    than the hard disk. Typically, when an operating system is installed, it is set up so that when youturn the computer on, the system is automatically booted as well. If you run out of storage

    (memory) or the operating system or an application program encounters an error, you may get an

    error message or your screen may "freeze". In these events, you may have to reboot the operating

    system.

  • 7/31/2019 Cmf Terms Final

    11/61

    100232140239 11

    16. CISC (COMPLEX INSTRUCTION SET COMPUTER)

    A complex instruction set computer is a computer where single instructions can execute several

    low-level operations (such as a load from memory, an arithmeticoperation, and a memory store)and/or are capable of multi-step operations or addressing modes within single instructions.

    Examples of CISC instruction set architectures are System/360 through z/Architecture, PDP-11,

    VAX, Motorola 68k, and x86.

    CISC characteristics:

    Memory accesses and address arithmetic are tightly bound to instructions

    Rely on few registers, more memory references

    Note that memory hasn't kept pace with processor clock rate

    many instructions that access memory directly

    large number of addressing modes

    variable length instruction encoding

    support for misaligned accesses

    17. INTERLEAVED MEMORY

    When memory consists of several memory modules, some address bits will select the module,

    and the remaining bits will select a row within the selected module.

    When the module selection bits are the least significant bits of the memory address we call

    the resulting memory a low-orderinterleaved memory.

    When the module selection bits are the most significant bits of the memory address we call

    the resulting memory a high-order interleaved memory.

    Interleaved memory can yield performance advantages if more than one memory module can be

    read/written at a time:-

    (I) for low-order interleave if we can read the same row in each module. This is good for a

    single multi-word access of sequential data such as program instructions, or elements in a

    vector,

    http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Instruction_set_architecturehttp://en.wikipedia.org/wiki/Memory_%28computers%29http://en.wikipedia.org/wiki/Arithmetichttp://en.wikipedia.org/wiki/Memory_%28computers%29http://en.wikipedia.org/wiki/Addressing_modehttp://en.wikipedia.org/wiki/System/360http://en.wikipedia.org/wiki/Z/Architecturehttp://en.wikipedia.org/wiki/PDP-11http://en.wikipedia.org/wiki/VAXhttp://en.wikipedia.org/wiki/Motorola_68000_familyhttp://en.wikipedia.org/wiki/X86http://en.wikipedia.org/wiki/X86http://en.wikipedia.org/wiki/Motorola_68000_familyhttp://en.wikipedia.org/wiki/VAXhttp://en.wikipedia.org/wiki/PDP-11http://en.wikipedia.org/wiki/Z/Architecturehttp://en.wikipedia.org/wiki/System/360http://en.wikipedia.org/wiki/Addressing_modehttp://en.wikipedia.org/wiki/Memory_%28computers%29http://en.wikipedia.org/wiki/Arithmetichttp://en.wikipedia.org/wiki/Arithmetichttp://en.wikipedia.org/wiki/Memory_%28computers%29http://en.wikipedia.org/wiki/Instruction_set_architecturehttp://en.wikipedia.org/wiki/Computer
  • 7/31/2019 Cmf Terms Final

    12/61

    100232140239 12

    (ii) for high-order interleave, if different modules can be independently accessed by different

    units. This is good if the CPU can access rows in one module, while at the same time, the

    hard disk (or a second CPU) can access different rows in another module.

    18. BYTE ORDERING

    The ordering of bytes within a multi-byte data item defines the endian-ness of the architecture.

    In BIG-ENDIAN systems the most significant byte of a multi-byte data item always has the

    lowest address, while the least significant byte has the highest address.

    In LITTLE-ENDIAN systems, the least significant byte of amulti-byte data item always has the

    lowest address, while the most significant byte has the highest address.

    In the following example, table cells represent bytes, and the cell numbers indicate the address of

    that byte in main memory. Note: by convention we draw the bytes within a memory word left-to-

    right for big-endian systems, and right-to-left for little-endian systems.

    Word

    Address

    Big-Endian Word

    Address

    Little-Endian

    0 0 1 2 3 0 3 2 1 0

    4 4 5 6 7 4 7 6 5 4

    8 8 9 10 11 8 11 10 9 8

    12 12 13 14 15 12 15 14 13 12

    MSB -> LSB MSB > LSB

    19. INSTRUCTION

    Instruction isthe binary code that causes a computer's hardware to perform a specific task. It is

    also calleda hardware instruction.Instructionis a line of an assembly-language program that the

  • 7/31/2019 Cmf Terms Final

    13/61

    100232140239 13

    assembler translates into a hardware instruction. In assembly language an instruction is coded in

    a rigid format, such as

    operation operand1,operand2,operand3

    where the operands are registers, memory locations or numerical constants. An assembly-

    language program consists of a sequence of directives, declarations and instructions. Instructions

    are available in the Instruction set architecture of a computer system to the assembler

    programmer. Computers that share the same instruction set architecture need not have the same

    clock frequency, peripheral devices, or operating system.

    Machine instructions are classified into the following three categories:

    data transfer operations (memory, register, register, register)

    arithmetic logic operations (add, sub, and, or, xor, shift, etc)

    program control operations (branch, call, interrupt)

    20. COMPUTER BUS

    A bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which can be

    shared by multiple hardware components in order to communicate with one another.

    The purpose of buses is to reduce the number of "pathways" needed for communication between

    the components, by carrying out all communications over a single data channel. This is why the

    metaphor of a "data highway" is sometimes used.

    If only two hardware components communicate over the line, it is called a hardware port (such

    as a serial port or parallel port). A bus is characterised by the amount of information that can be

    http://en.kioskea.net/contents/pc/serie.php3http://en.kioskea.net/contents/pc/serie.php3http://en.kioskea.net/contents/pc/serie.php3http://en.kioskea.net/contents/pc/serie.php3
  • 7/31/2019 Cmf Terms Final

    14/61

    100232140239 14

    transmitted at once. This amount, expressed in bits, corresponds to the number of physical lines

    over which data is sent simultaneously. A 32-wire ribbon cable can transmit 32 bits in parallel.

    The term "width" is used to refer to the number of bits that a bus can transmit at once.

    In reality, each bus is generally constituted of 50 to 100 distinct physical lines, divided into three

    subassemblies:

    The address bus (sometimes called the memory bus) transports memory addresses which

    the processor wants to access in order to read or write data. It is a unidirectional bus.

    The data bus transfers instructions coming from or going to the processor. It is a

    bidirectional bus.

    The control bus (or command bus) transports orders and synchonisation signals coming

    from the control unit and travelling to all other hardware components. It is a bidirectional

    bus, as it also transmits response signals from the hardware.

    21. PROCESSOR

    A processor adds, subtracts, multiplies and divides numbers, tests inequalities, etc. The central

    processing unit (CPU) is the executive part of the computer, following the instructions of

    programs to the letter. In some computers one or more peripheral processors control routine tasks

    such as I/O in order toreduce the load on the CPU. A processor is usually classified as 4-, 8-, 16-

    or 32-bit, depending on the width of its data bus.

    22. CHIPSET

    A chipset is the component which routes data between the computer's buses, so that all the

    components which make up the computer can communicate with each other. The chipset

    originally was made up of a large number of electronic chips, hence the name. It generally has

    two components:

    The NorthBridge (also called the memory controller) is in charge of controlling transfers

    between the processor and the RAM, which is way it is located physically near the

    processor. It is sometimes called the GMCH, forrGraphic and Memory Controller Hub.

    http://en.kioskea.net/contents/base/binaire.php3http://en.kioskea.net/contents/base/binaire.php3
  • 7/31/2019 Cmf Terms Final

    15/61

    100232140239 15

    The SouthBridge (also called the input/output controller or expansion controller)

    handles communications between peripheral devices. It is also called the ICH (I/O

    Controller Hub). The tem bridge is generally used to designate a component which

    connects two buses.

    23. ACCUMULATOR

    In a computer's central processing unit (CPU), an accumulator is a register in which

    intermediate arithmetic and logic results are stored. Without a register like an accumulator, it

    would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to

    main memory, perhaps only to be read right back again for use in the next operation. Access to

    main memory is slower than access to a register like the accumulator because the technology

    used for the large main memory is slower (but cheaper) than that used for a register.

    The characteristic which distinguishes one register as being the accumulator of a computer

    architecture is that the accumulator (if the architecture were to have one) would be used as an

    implicit operand for arithmetic instructions. For instance, a CPU might have an instruction like:

    ADD memaddress

    http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Processor_registerhttp://en.wikipedia.org/wiki/Arithmetic_logic_unithttp://en.wikipedia.org/wiki/Primary_storagehttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Operandhttp://en.wikipedia.org/wiki/Instruction_(computer_science)http://en.wikipedia.org/wiki/Memory_addresshttp://en.wikipedia.org/wiki/Memory_addresshttp://en.wikipedia.org/wiki/Instruction_(computer_science)http://en.wikipedia.org/wiki/Operandhttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Primary_storagehttp://en.wikipedia.org/wiki/Arithmetic_logic_unithttp://en.wikipedia.org/wiki/Processor_registerhttp://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Computer
  • 7/31/2019 Cmf Terms Final

    16/61

    100232140239 16

    This instruction would add the value read from the memory location at memaddress to the value

    from the accumulator, placing the result in the accumulator. The accumulator is not identified in

    the instruction by a register number; it is implicit in the instruction and no other register can be

    specified in the instruction. Some architectures use a particular register as an accumulator in

    some instructions, but other instructions use register numbers for explicit operand specification

    24. INSTRUCTION PIPELINING

    In computers, a pipeline is the continuous and somewhat overlapped movement ofinstruction to

    the processor or in the arithmetic steps taken by the processor to perform an instruction.

    Pipelining is the use of a pipeline. Without a pipeline, a computer processor gets the first

    instruction from memory, performs the operation it calls for, and then goes to get the next

    instruction from memory, and so forth. While fetching (getting) the instruction, the arithmetic

    part of the processor is idle. It must wait until it gets the next instruction. With pipelining, the

    computer architecture allows the next instructions to be fetched while the processor is

    performing arithmetic operations, holding them in a buffer close to the processor until each

    instruction operation can be performed. The staging of instruction fetching is continuous. The

    result is an increase in the number of instructions that can be performed during a given time

    period.

    Computer processor pipelining is sometimes divided into an instruction pipeline and an

    arithmetic pipeline. The instruction pipeline represents the stages in which an instruction is

    moved through the processor, including its being fetched, perhaps buffered, and then executed.

    The arithmetic pipeline represents the parts of an arithmetic operation that can be broken down

    and overlapped as they are performed. Pipelines and pipelining also apply to computer memory

    controllers and moving data through various memory staging places.

    25. ASSOCIATIVE MEMORY

    An associative memory is a content addressable structure that maps a set of input patterns to a set

    of output patterns. A content addressable structure refers to a memory organization where the

    http://en.wikipedia.org/wiki/Addressing_mode#Implicithttp://searchcio-midmarket.techtarget.com/definition/instructionhttp://searchcio-midmarket.techtarget.com/definition/processorhttp://searchcio-midmarket.techtarget.com/definition/bufferhttp://searchcio-midmarket.techtarget.com/definition/bufferhttp://searchcio-midmarket.techtarget.com/definition/processorhttp://searchcio-midmarket.techtarget.com/definition/instructionhttp://en.wikipedia.org/wiki/Addressing_mode#Implicit
  • 7/31/2019 Cmf Terms Final

    17/61

    100232140239 17

    content is accessed by its content as opposed to an explicit address in the traditional computer

    memory system. The associative memory is of two types: auto associative and hetero associative.

    An auto associative memory retrieves a previously stored pattern that most closely

    resembles the current pattern.

    In hetero associative memory, the retrieved pattern is in general different from the

    input pattern not only in content but possibly also in type and format.

    26. DATA MINING

    Data mining (the analysis step of the Knowledge Discovery in Databases process, or KDD), a

    relatively young and interdisciplinary field of computer science is the process of discovering new

    patterns from large data sets involving methods from statistics and artificial intelligence but

    also database management. In contrast to for example machine learning, the emphasis lies on the

    discovery ofpreviously unknown patterns as opposed to generalizing known patterns to new data.

    Generally, data mining (sometimes called data or knowledge discovery) is the process of

    analyzing data from different perspectives and summarizing it into useful information -

    information that can be used to increase revenue, cuts costs, or both. Data mining software is one

    of a number of analytical tools for analyzing data. It allows users to analyze data from many

    different dimensions or angles, categorize it, and summarize the relationships identified.Technically, data mining is the process of finding correlations or patterns among dozens of fields

    in large relational databases.

    27. RELATIONALDATABASE

    The Relational model was first introduces by Dr. Edgar Frank Codd, an oxford-trained

    Mathematician, while working in IBM Research Centre in 1970s. He represented this idea in aclassical paper (A Relational Model of Data for Large Shared Data banks) and attracted

    immediate attention due to its simplicity and mathematical foundations. The Relational model is

    considered one of the most popular developments in the database technology because it can be

    used for representing most of the real world objects and the relationships between them.

  • 7/31/2019 Cmf Terms Final

    18/61

    100232140239 18

    Relational Model Terminology

    Relation Table

    Tuple Row, Record

    Attribute Column, Field

    Domain Set of Legal Values

    Cardinality Number of Rows

    Degree Number of Columns

    Primary Key Unique Identifier

    Foreign Key Identifier used to reference another table

    28. DISTRIBUTEDDATABASE

    A Distributed database is a single logical database that is spread physically across

    computers in multiple locations that are connected by a data communication links. In distributed database the user at any location can access data anywhere in the network as if

    the data were all stored at the users own location.

    The software that manages the distributed database and provides an access mechanism that

    makes this distribution transparent to the user is known as Distributed Database.

    Management System (DDBMS):- By the term transparent we mean that the user will be

    aware of one relational database schema, it doesnt matter where the data is located or how

    the query is executed.

    29. QUERY

    A query with respect to DBMS relates to user commands that are used to interact with a data

    base. The query language can be classified into data definition language and data manipulation

    language. The query consists of keywords and data variable which are required for the result.

  • 7/31/2019 Cmf Terms Final

    19/61

    100232140239 19

    30. DBA

    DBA is a person or group of persons who is responsible for management of the database.

    DBA is a highly skilled person with strong technical background to monitor various

    operations such as creating, modifying and maintaining which help in handling three levels

    Of the database.

    DBA has most of the powers such as defining schemas, storage structures and access

    Method strategies, physical organization, authorization and integrity constraints etc.

    DBA are the top level authority among all the persons connected to the database.

    The main responsibilities of DBA are:

    Deciding the information content of the database.

    Define the storage structure and access strategies.

    Defines external schemas for the users.

    Defines integrity constraints specifications.

    Granting of authorization for data access.

    Define strategy for backup and recovery.

    Installing and upgrading the DBMS and the application tools.

    Monitoring and optimizing the performance of the database.

    Plans the future storage requirements for the database system.

    31. RELATIONAL KEYS

    The word "key" is much used and abused in the context of relational database design. In pre-

    relational databases (hierarchical, networked) and file systems (ISAM, VSAM, et al) "key" oftenreferred to the specific structure and components of a linked list, chain of pointers, or other

    physical locator outside of the data. It is thus natural, but unfortunate, that today people often

    associate "key" with a RDBMS "index". We will explain what a key is and how it differs from an

    index.

  • 7/31/2019 Cmf Terms Final

    20/61

    100232140239 20

    There are only three types of relational keys

    Candidate Key

    As stated above, a candidate key is any set of one or more columns whose combined values

    are unique among all occurrences (i.e., tuples or rows). Since a null value is not guaranteed

    to be unique, no component of a candidate key is allowed to be null.

    There can be any number of candidate keys in a table Relational pundits are not in

    agreement whether zero candidate keys is acceptable, since that would contradict the

    (debatable) requirement that there must be a primary key.

    Primary Key

    The primary key of any table is any candidate key of that table which the database designer

    arbitrarily designates as "primary". The primary key may be selected for convenience,

    comprehension, performance, or any other reasons. It is entirely proper (albeit often

    inconvenient) to change the selection of primary key to another candidate key.

    Alternate Key

    The alternate keys of any table are simply those candidate keys which are not currently

    selected as the primary key. According to {Date95} "... exactly one of those candidate keys

    [is] chosen as the primary key [and] the remainder, if any, are then called alternate keys."

    An alternate key is a function of all candidate keys minus the primary key.

    32. ENTITY RELATIONSHIP DIAGRAM

    An entity-relationship (ER) diagram is a specialized graphic that illustrates the relationships

    between entities in a database. ER diagrams often use symbols to represent three different types

    of information. Also Known As: ER Diagram, E-R Diagram, entity-relationship model.

    Such a diagram consists of the following major components:

    Rectangles, which represent entity sets

    Ellipses, which represent attributes

    Diamonds, which represent relationship sets

    Lines, which link attributes to entity sets and entity sets to relationship sets

    Double ellipses, which represent multivalued attributes

    Dashed ellipses, which denote derived attributes

  • 7/31/2019 Cmf Terms Final

    21/61

    100232140239 21

    Double lines, which indicate total participation of an entity in a relationship set

    Double rectangles, which represent weak entity sets

    Examples:

    Consider the example of a database that contains information on the residents of a city. The ER

    diagram shown in the image above contains two entities -- people and cities. There is a single

    "Lives In" relationship. In our example, due to space constraints, there is only one attribute

    associated with each entity. People have names and cities have populations. In a real-world

    example, each one of these would likely have many different attributes.

    33. DATABASE REPLICATION

    Database replication can be used on many database management systems, usually with a

    master/slave relationship between the original and the copies. The master logs the updates, which

    then ripple through to the slaves. The slave outputs a message stating that it has received the

    update successfully, thus allowing the sending (and potentially re-sending until successfully

    applied) of subsequent updates. Multi-master replication, where updates can be submitted to any

    database node, and then ripple through to other servers, is often desired, but introduces

    substantially increased costs and complexity which may make it impractical in some situations.

    The most common challenge that exists in multi-master replication is transactional conflict

    prevention or resolution. Most synchronous or eager replication solutions do conflict prevention,

    while asynchronous solutions have to do conflict resolution. For instance, if a record is changed

    on two nodes simultaneously, an eager replication system would detect the conflict before

    confirming the commit and abort one of the transactions. A lazy replication system would allow

    both transactions to commit and run a conflict resolution during resynchronization. The

  • 7/31/2019 Cmf Terms Final

    22/61

    100232140239 22

    resolution of such a conflict may be based on a timestamp of the transaction, on the hierarchy of

    the origin nodes or on much more complex logic, which decides consistently on all nodes.

    Database replication becomes difficult when it scales up. Usually, the scale up goes with two

    dimensions, horizontal and vertical: horizontal scale up has more data replicas, vertical scale up

    has data replicas located further away in distance. Problems raised by horizontal scale up can be

    alleviated by a multi-layer multi-view access protocol. Vertical scale up is running into less

    trouble since internet reliability and performance are improving.

    34. NORMALIZATION:

    In the design of a relational database management system (RDBMS), the process of organizing

    data to minimize redundancy is called normalization. The goal of database normalization is to

    decompose relations with anomalies in order to produce smaller, well-structured relations.

    Normalization usually involves dividing large tables into smaller (and less redundant) tables and

    defining relationships between them. The objective is to isolate data so that additions, deletions,

    and modifications of a field can be made in just one table and then propagated through the rest of

    the database via the defined relationships.

    35. CLIENT/SERVER

    Client/server describes the relationship between two computer programs in which one

    program, the client, makes a service request from another program, the server, which fulfils

    the request.

    Although the client/server idea can be used by programs within a single computer, it is a

    more important idea in a network. In a network, the client/server model provides a

    convenient way to interconnect programs that are distributed efficiently across different

    locations. In the usual client/server model, one server, sometimes called a daemon, is

    activated and awaits client requests.

  • 7/31/2019 Cmf Terms Final

    23/61

    100232140239 23

    The clients make requests to the server and the server responds to the requests.

    36. COMMIT

    In Oracle changes you make to your data are not permanent until you tell Oracle to make

    them so. This is accomplished using a SQL statement known as Commit.

    A Commit ends your transaction and makes the changes you have made permanent.

    The syntax is:

    SQL>COMMIT;

    The following points should be remembered while using COMMIT statement.

    Whenever you execute a DDL statement (such as CREATE TABLE etc.) an implicit commit

    statement is generated before and after it is executed, even if the DDL fails. This is not in the

    case of DML statements.

    The Commit statement that one user issues have no effect on another users database

    changes.

    37. DATABASE

    Database can be defined as A well organized collection of data that are related in a

    meaningful way which can be accessed by different users but stored only once.

  • 7/31/2019 Cmf Terms Final

    24/61

    100232140239 24

    Consider an example of telephone directory in which names/surnames of a person is arranged

    in an alphabetical order. So it becomes easier to search any phone number corresponding to a

    particular name. If this ordering is not done in an organized manner then it is very difficult to

    search a phone number of a particular person, so this shows why databases are needed.

    Features of data in a Database

    It should be well organized.

    It should be related.

    It should be integrated or in other words it should be correct.

    It should represent the relationship with the real world.

    It should be shared among different users as well as applications. It should be stored permanently so that it can be used later on.

    It should be available when and where it is needed i.e. it should be accessible.

    It should be secured from the unauthorized users access.

    It should be stored only once and can be used again and again whenever it is required.

    It should be flexible to change.

    38. DATA DICTIONARY

    Data dictionary is a respiratory of description of data in the database.

    It contains information about Data Names of the tables, names of attributes of each

    table, length of attributes etc. Relationship between database transactions and data items

    referenced by them which is useful in determining which transactions are effected when

    certain data definitions are changed.

    Constraints on the data i.e. range of values permitted.

    Detailed information on physical database design.

    Description of database users, their responsibilities and access rights.

    Every Oracles database has a data dictionary; it is catalog of your entire Oracle database objects.

    As you create users, tables constraints and other database objects, Oracle automatically

    maintains a catalog of items stored in the data base.

  • 7/31/2019 Cmf Terms Final

    25/61

    100232140239 25

    Some of the examples are:

    USER_ CONSTRAINTS: The view used to see the constraints associated with the table.

    USER_TABLES: This view used to show information about the tables owned by the

    user.

    ALL_TABLES: this view is used to show information that you own and also the tables

    that you have been granted.

    ALL_USERS: this view is used to show all the usernames, User_ID and their date of

    creation.

    39. DATA INDEPENDENCE

    Data independence means that the application is independent of the storage structure and

    access strategy of data.

    In other words, the ability to modify the schema definition in one level should not affect the

    schema definition in the next higher level. Data independence is the type of data transparency

    that matters for a centralized DBMS.

    It refers to the immunity of user applications to make changes in the definition and

    organization of data.

    Physical data independence deals with hiding the details of the storage structure from user

    applications. The application should not be involved with these issues, since there is no

    difference in the operation carried out against the data.

    The data independence and operation independence together gives the feature of data

    abstraction. There are two levels of data independence.

    Two types of Data Independence:

    Physical Data Independence: The capacity to change the conceptual schema without

    having to change the external schemas and their application programs.

    Logical Data Independence :The capacity to change the internal schema without having

    to change the conceptual schema.

  • 7/31/2019 Cmf Terms Final

    26/61

    100232140239 26

    40. DBMS

    It is a collection of programs that enables user to create and maintain a database. In other words

    it is general-purpose software that provides the users with the processes of defining, constructing

    and manipulating the database for various applications. A Database Management System

    (DBMS) is a set ofcomputer programs that controls the creation, maintenance, and the use of the

    database with computer as a platform or of an organization and its end users. It allows

    organizations to place control of organization-wide database development in the hands of

    database administrators (DBAs) and other specialists. A DBMS is a system software package

    that helps the use of integrated collection of data records and files known as databases. It allows

    different user application programs to easily access the same database. DBMSs may use any of a

    variety ofdatabase models, such as the network model or relational model. In large systems, aDBMS allows users and other software to store and retrieve data in a structured way. Instead of

    having to write computer programs to extract information, user can ask simple questions in a

    query language. It helps to specify the logical organization for a database and access and use the

    information within a database. It provides facilities for controlling data access, enforcing data

    integrity, managing concurrency controlled, and restoring database. A DBMS is a set ofsoftware

    programs that controls the organization, storage, management, and retrieval ofdata in a database.

    DBMSs are categorized according to their data structures or types.

    41. VIEWS

    A view may be thought of as a virtual table, that is, a table that does not really exist in its own

    right but is instead derived from one or more underlying base table. In other words, there is no

    stored file that direct represents the view instead a definition of view is stored in data dictionary.

    Growth and restructuring of base tables is not reflected in views. Thus the view can insulate

    users from the effects of restructuring and growth in the database. Hence accounts for logical

    data independence.

    Views can provide advantages over tables:

    Views can represent a subset of the data contained in a table

    Views can join and simplify multiple tables into a single virtual table

    http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/End_userhttp://en.wikipedia.org/wiki/Database_administratorhttp://en.wikipedia.org/wiki/Database_modelhttp://en.wikipedia.org/wiki/Network_modelhttp://en.wikipedia.org/wiki/Relational_modelhttp://en.wikipedia.org/wiki/Data_structurehttp://en.wikipedia.org/wiki/Query_languagehttp://en.wikipedia.org/wiki/Data_accesshttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Software_programhttp://en.wikipedia.org/wiki/Software_programhttp://en.wikipedia.org/wiki/Organizationhttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Information_retrievalhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Join_%28SQL%29http://en.wikipedia.org/wiki/Join_%28SQL%29http://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Information_retrievalhttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Organizationhttp://en.wikipedia.org/wiki/Software_programhttp://en.wikipedia.org/wiki/Software_programhttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Data_accesshttp://en.wikipedia.org/wiki/Query_languagehttp://en.wikipedia.org/wiki/Data_structurehttp://en.wikipedia.org/wiki/Relational_modelhttp://en.wikipedia.org/wiki/Network_modelhttp://en.wikipedia.org/wiki/Database_modelhttp://en.wikipedia.org/wiki/Database_administratorhttp://en.wikipedia.org/wiki/End_userhttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Computer_program
  • 7/31/2019 Cmf Terms Final

    27/61

    100232140239 27

    Views can act as aggregated tables, where the database engine aggregates data (sum,

    average etc) and presents the calculated results as part of the data

    Views take very little space to store; the database contains only the definition of a view,

    not a copy of all the data it presents

    Depending on the SQL engine used, views can provide extra security

    Views can limit the degree of exposure of a table or tables to the outer world.

    42. DATA MODEL

    A data is an abstract model that describes how data is represented and accessed. Data models

    formally define data elements and relationships among data elements for a domain of interest.

    Data model explicitly determines the meaning of data, which in this case is known as structured

    data (as opposed to unstructured data, for example an image, a binary file or a natural language

    text, where the meaning has to be elaborated). Typical applications of data models include

    database models, design of information systems, and enabling exchange of data. Usually data

    models are specified in a data modeling language. A data model can be sometimes referred to as

    a data structure, especially in the context of programming languages. Data models are often

    complemented by function models, especially in the context ofenterprise models.

    A data model is a way finding tool for both business and IT professionals, which uses a set of

    symbols and text to precisely explain a subset of real information to improve communication

    within the organization and thereby lead to a more flexible and stable application environment.

    Communication and precision are the two key benefits that make a data model important to

    applications that use and exchange data. A data model is the medium which project team

    members from different backgrounds and with different levels of experience can communicate

    with one another. Precision means that the terms and rules on a data model can be interpreted

    only one way and are not ambiguous

    The main aim of data models is to support the development of information systems by providing

    the definition and format of data. According to West and Fowler (1999) "if this is done

    http://en.wikipedia.org/wiki/Sumhttp://en.wikipedia.org/wiki/Averagehttp://en.wikipedia.org/wiki/SQLhttp://en.wikipedia.org/wiki/Abstract_modelhttp://en.wikipedia.org/wiki/Data_%28computing%29http://en.wikipedia.org/wiki/Data_elementhttp://en.wikipedia.org/wiki/Unstructured_datahttp://en.wikipedia.org/wiki/Database_modelhttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Data_modelinghttp://en.wikipedia.org/wiki/Data_structurehttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Function_modelhttp://en.wikipedia.org/wiki/Enterprise_modelhttp://en.wikipedia.org/wiki/Wayfindinghttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Precisionhttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Precisionhttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Wayfindinghttp://en.wikipedia.org/wiki/Enterprise_modelhttp://en.wikipedia.org/wiki/Function_modelhttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Data_structurehttp://en.wikipedia.org/wiki/Data_modelinghttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Database_modelhttp://en.wikipedia.org/wiki/Unstructured_datahttp://en.wikipedia.org/wiki/Data_elementhttp://en.wikipedia.org/wiki/Data_%28computing%29http://en.wikipedia.org/wiki/Abstract_modelhttp://en.wikipedia.org/wiki/SQLhttp://en.wikipedia.org/wiki/Averagehttp://en.wikipedia.org/wiki/Sum
  • 7/31/2019 Cmf Terms Final

    28/61

    100232140239 28

    consistently across systems then compatibility of data can be achieved. If the same data

    structures are used to store and access data then different applications can share data.

    43. TRANSACTION

    A transaction is a unit of program execution that accesses and possibly updates various data

    items. Usually, a transaction is initiated by a user program written in a high-level data

    manipulation language or programming language (for example, SQL, COBOL, C, C++, or Java),

    where it is delimited by statements (or function calls) of the form begin transaction and end

    transaction. The transaction consists of all operations executed between the begin transaction and

    end transaction.

    To ensure integrity of the data, we require that the database system maintain the following

    properties of the transactions:

    Atomicity. Either all operations of the transaction are reflected properly in the database, or

    none are.

    Consistency. Execution of a transaction in isolation (that is, with no other transaction

    executing concurrently) preserves the consistency of the database.

    Isolation. Even though multiple transactions may execute concurrently, the system guarantees

    that, for every pair of transactions Ti and Tj , it appears to Ti that either Tj finished executionbefore Ti started, or Tj started execution after Ti finished. Thus, each transaction is unaware of

    other transactions executing concurrently in the system.

    Durability. After a transaction completes successfully, the changes it has made to the database

    persist, even if there are system failures.

    These properties are often called the ACID properties; the acronym is derived from the first

    letter of each of the four properties.

    44. SQL

    SQL (Structured Query Language) is a standard interactive and programming language for

    getting information from and updating a database. Although SQL is both an ANSI and an ISO

    standard, many database products support SQL with proprietary extensions to the standard

    http://searchsqlserver.techtarget.com/sDefinition/0,,sid87_gci211895,00.htmlhttp://searchdatacenter.techtarget.com/sDefinition/0,,sid80_gci213776,00.htmlhttp://searchdatacenter.techtarget.com/sDefinition/0,,sid80_gci214046,00.htmlhttp://searchdatacenter.techtarget.com/sDefinition/0,,sid80_gci214046,00.htmlhttp://searchdatacenter.techtarget.com/sDefinition/0,,sid80_gci213776,00.htmlhttp://searchsqlserver.techtarget.com/sDefinition/0,,sid87_gci211895,00.html
  • 7/31/2019 Cmf Terms Final

    29/61

    100232140239 29

    language. Queries take the form of a command language that lets you select, insert, update, find

    out the location of data, and so forth. There is also a programming interface.

    The SQL language has several parts:

    Data-definition language (DDL). The SQL DDL provides commands for defining relation

    schemas, deleting relations, and modifying relation schemas.

    Interactive data-manipulation language (DML). The SQL DML includes a query language

    based on both the relational algebra and the tuple relational calculus. It includes also commands

    to insert tuples into, delete tuples from, and modify tuples in the database.

    View definition. The SQL DDL includes commands for defining views.

    Transaction control. SQL includes commands for specifying the beginning and ending of

    transactions.

    Embedded SQL and dynamic SQL. Embedded and dynamic SQL define how SQL statements

    can be embedded within general-purpose programming languages, such as C, C++, Java, PL/I,

    Cobol, Pascal, and Fortran.

    Integrity. The SQL DDL includes commands for specifying integrity constraints that the data

    stored in the database must satisfy. Updates that violate integrity constraints are disallowed.

    Authorization. The SQL DDL includes commands for specifying access rights to relations and

    views.

    45. DECISION SUPPORT SYSTEM

    Decision support is methodology (or series of methodologies) designed to extract information

    from data and to use such information as a basis for decision making

    Decision support system (DSS) is

    Arrangement of computerized tools used to assist managerial decision making within

    business

    Usually requires extensive data massaging to produce information

    Used at all levels within organization

    Often tailored to focus on specific business areas

    Provides ad hoc query tools to retrieve data and to display data in different formats

  • 7/31/2019 Cmf Terms Final

    30/61

    100232140239 30

    46. ENTITY

    It is a 'thing' in the real world with an independent existence. An entity is something that has a

    distinct, separate existence, though it need not be a material existence. In particular, abstractions

    and legal fictions are usually regarded as entities. In general, there is also no presumption that an

    entity is animate. Entities are used in system developmental models that display communications

    and internal processing of, say, documents compared to order processing. An entity could be

    viewed as a set containing subsets. In philosophy, such sets are said to be abstract objects.

    Sometimes, the word entity is used in a general sense of a being, whether or not the referent has

    material existence; e.g., is often referred to as an entity with no corporeal form, such as a

    language. It is also often used to refer to ghosts and other spirits. Taken further, entity sometimes

    refers to existence or being itself.

    An entity may be a physical object such as a house or a car, an event such as a house sale or a car

    service, or a concept such as a customer transaction or order. Although the term entity is the one

    most commonly used, following Chen we should really distinguish between an entity and an

    entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given

    entity-type. There are usually many instances of an entity-type. Because the term entity-type is

    somewhat cumbersome, most people tend to use the term entity as a synonym for this term.

    An entity with an attribute

    47. DATABASE SCHEMA

    Databases change over time as information is inserted and deleted. The collection of information

    stored in the database at a particular moment is called an instance of the database. The overall

    design of the database is called the database schema. Schemas are changed infrequently, if at all.

    http://en.wikipedia.org/wiki/Existencehttp://en.wikipedia.org/wiki/Abstractionhttp://en.wikipedia.org/wiki/Legal_fictionhttp://en.wikipedia.org/wiki/Lifehttp://en.wikipedia.org/wiki/Set_%28mathematics%29http://en.wikipedia.org/wiki/Subsethttp://en.wikipedia.org/wiki/Philosophyhttp://en.wikipedia.org/wiki/Abstract_objecthttp://en.wikipedia.org/wiki/Beinghttp://en.wikipedia.org/wiki/Matterhttp://en.wikipedia.org/wiki/Ghosthttp://en.wikipedia.org/wiki/Spirithttp://upload.wikimedia.org/wikipedia/commons/9/90/Erd-entity-with-attribute.svghttp://en.wikipedia.org/wiki/Spirithttp://en.wikipedia.org/wiki/Ghosthttp://en.wikipedia.org/wiki/Matterhttp://en.wikipedia.org/wiki/Beinghttp://en.wikipedia.org/wiki/Abstract_objecthttp://en.wikipedia.org/wiki/Philosophyhttp://en.wikipedia.org/wiki/Subsethttp://en.wikipedia.org/wiki/Set_%28mathematics%29http://en.wikipedia.org/wiki/Lifehttp://en.wikipedia.org/wiki/Legal_fictionhttp://en.wikipedia.org/wiki/Abstractionhttp://en.wikipedia.org/wiki/Existence
  • 7/31/2019 Cmf Terms Final

    31/61

    100232140239 31

    Database systems have several schemas, partitioned according to the levels of abstraction. The

    physical schema describes the database design at the physical level, while the logical schema

    describes the database design at the logical level.A database may also have several schemas at

    the view level, sometimes called subschemas, that describe different views of the database. Of

    these, the logical schema is by far the most important, in terms of its effect on application

    programs, since programmers construct applications by using the logical schema. The physical

    schema is hidden beneath the logical schema, and can usually be changed easily without

    affecting application programs. Application programs are said to exhibit physical data

    independence if they do not depend on the physical schema, and thus need not be rewritten if the

    physical schema changes.

    48. INDEX

    An index can be created in a table to find data more quickly and efficiently.The users cannot see

    the indexes, they are just used to speed up searches/queries.

    SQL CREATE INDEX Syntax

    Creates an index on a table. Duplicate values are allowed:

    CREATE INDEX index_name ON table_name (column_name)

    SQL CREATE UNIQUE INDEX Syntax

    Creates a unique index on a table. Duplicate values are not allowed:

    CREATE UNIQUE INDEX index_name ON table_name (column_name)

    49. CONCURRENCY CONTROL

    When many people attempt to modify data in a database at the same time, a system of controls

    must be implemented so that modifications made by one person do not adversely affect those of

    another person. This is called concurrency control.

  • 7/31/2019 Cmf Terms Final

    32/61

    100232140239 32

    Concurrency control theory has two classifications for the methods of instituting concurrency

    control:

    Pessimistic concurrency control

    A system of locks prevents users from modifying data in a way that affects other users.

    After a user performs an action that causes a lock to be applied, other users cannot perform

    actions that would conflict with the lock until the owner releases it. This is called

    pessimistic control because it is mainly used in environments where there is high

    contention for data, where the cost of protecting data with locks is less than the cost of

    rolling back transactions if concurrency conflicts occur.

    Optimistic concurrency control

    In optimistic concurrency control, users do not lock data when they read it. When a user

    updates data, the system checks to see if another user changed the data after it was read. If

    another user updated the data, an error is raised. Typically, the user receiving the error

    rolls back the transaction and starts over. This is called optimistic because it is mainly used

    in environments where there is low contention for data, and where the cost of occasionally

    rolling back a transaction is lower than the cost of locking data when read.

    50. HIERARCHICAL DATABASE MODEL

    A hierarchical database model is a data model in which the data is organized into a tree-like

    structure. The structure allows representing information using parent/child relationships: each

    parent can have many children, but each child has only one parent (also known as a 1-to-many

    relationship). All attributes of a specific record are listed under an entity type.

    Example of an hierarchical model:

    In a database an entity type is the equivalent of a table. Each individual record is represented as a

    row, and each attribute as a column. Entity types are related to each other using 1:Nmappings,

    http://en.wikipedia.org/wiki/Data_modelhttp://en.wikipedia.org/wiki/Tree_data_structurehttp://en.wikipedia.org/wiki/Tree_data_structurehttp://en.wikipedia.org/wiki/Data_model
  • 7/31/2019 Cmf Terms Final

    33/61

    100232140239 33

    also known as one-to-many relationships. This model is recognized as the first database model

    created by IBM in the 1960s.

    51. FTP

    File Transfer Protocol is a standard network protocol used to transfer files from one host to

    another over a TCP-based network, such as the Internet. FTP is built on client-server architecture

    and utilizes separate control and data connections between the client and server.FTP users may

    authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the

    server is configured to allow it.

    As a user, you can use FTP with a simple command line interface (for example, from the

    Windows MS-DOS Prompt window) or with a commercial program that offers a graphical user

    interface. Your Web browser can also make FTP requests to download programs you select from

    a Web page. Using FTP, you can also update (delete, rename, move, and copy) files at a server.

    You need to logon to an FTP server. However, publicly available files are easily accessed using

    anonymous FTP.

    52. TOPOLOGY

    The physical topology of a network refers to the configuration of cables, computers, and other

    peripherals. Physical topology should not be confused with logical topology which is the method

    used to pass information between workstations.

    http://en.wikipedia.org/wiki/One-to-manyhttp://en.wikipedia.org/wiki/File:Hierarchical_Model.svghttp://en.wikipedia.org/wiki/One-to-many
  • 7/31/2019 Cmf Terms Final

    34/61

    100232140239 34

    There are many types of topologies depending upon their architecture:

    Bus Topology

    Star Topology

    Ring Topology

    Mesh Topology

    Hybrid Topology

    53. TRANSMISSION MEDIA

    A transmission medium (plural transmission media) is a material substance that can propagate

    energy waves. For example, the transmission medium for sound received by the ears is usually

    air, but solids and liquids may also act as transmission media for sound.The term transmission

    medium also refers to a technical device that employs the material substance to transmit or guide

    waves. Thus, an optical fiber or a copper cable is a transmission medium.

    A transmission medium can be classified as a:

    Linear medium, if different waves at any particular point in the medium can be superposed.

    Bounded medium, if it is finite in extent, otherwise unbounded medium; Uniform medium or homogeneous medium, if its physical properties are unchanged at

    different points;

    Isotropic medium, if its physical properties are the same in different directions.

    54. TWISTED PAIR CABLE

    Twisted pair cabling is a type of wiring in which two conductors (the forward and return

    conductors of a single circuit) are twisted together for the purposes of canceling out electro

    magnetic interference (EMI) from external sources; for instance, electromagnetic radiation from

    unshielded twisted pair (UTP) cables, and crosstalkbetween neighboring pairs. It was invented

    by Alexander Graham Bell.

    http://en.wikipedia.org/wiki/Cablinghttp://en.wikipedia.org/wiki/Electronic_circuithttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Crosstalkhttp://en.wikipedia.org/wiki/Alexander_Graham_Bellhttp://en.wikipedia.org/wiki/Alexander_Graham_Bellhttp://en.wikipedia.org/wiki/Crosstalkhttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Electronic_circuithttp://en.wikipedia.org/wiki/Cabling
  • 7/31/2019 Cmf Terms Final

    35/61

    100232140239 35

    A type of cable that consists of two independently insulated wires twisted around one another.

    The use of two wires twisted together helps to reduce crosstalkand electromagnetic induction.

    While twisted-pair cable is used by older telephone networks and is the least expensive type

    oflocal-area network (LAN) cable, most networks contain some twisted-pair cabling at some

    point along the network. Other types of cables used for LANs include coaxial cables and fiber

    optic cables.

    55. ASYNCHRONOUS TRANSMISSION

    In Asynchronous transmission, data is transmitted character by character at irregular

    intervals. That is, a sender sends a character at any convenient manner and receiver accepts

    it.

    For instance, transmission of data from a terminal to a computer is asynchronous because

    during data entry by an operator, time between successive keystrokes varies.

    To enable a receiver to recognize a character when it arrives, a transmitter frames each

    character by putting a start bit before it and one or two( depending upon system) stop bits

    after it.

    Asynchronous transmission is well suited to many input devices. Its advantage is that it does

    not require any local storage at sender or receiver end, because transmission takes place

    character by character. Hence, it is cheaper to implement.

    56. TCP/IP

    http://www.webopedia.com/TERM/C/crosstalk.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/C/coaxial_cable.htmlhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://www.webopedia.com/TERM/C/coaxial_cable.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/C/crosstalk.html
  • 7/31/2019 Cmf Terms Final

    36/61

    100232140239 36

    TCP- (Transmission Internet Protocol) is responsible for verifying the correct delivery of data

    from client to server. Data can be lost in the intermediate network. TCP adds support to detect

    errors or lost data and to trigger retransmission until the data is correctly and completely

    received.

    IP- (Internet protocol) is responsible for moving packet of data from node to node. IP forwards

    each packet based on a four byte destination address (the IP number). The Internet authorities

    assign ranges of numbers to different organizations. The organizations assign groups of their

    numbers to departments. IP operates on gateway machines that move data from department to

    organization to region and then around the world.

    57. BITRATE

    Bit rate, as the name implies, describes the rate at which bits are transferred from one location to

    another. In other words, it measures how much data is transmitted in a given amount of time. Bit

    rate is commonly measured in bits per second (bps), kilobits per second (Kbps), or megabits per

    second (Mbps). For example, a DSL connection may be able to download data at 768 kbps,

    while a Fire wire 800 connection can transfer data up to 800 Mbps.

    Bit rate can also describe the quality of an audio or video file. For example, an MP3 audio file

    that is compressed at 192 Kbps will have a greater dynamic range and may sound slightly more

    clear than the same audio file compressed at 128 Kbps. This is because more bits are used to

    represent the audio data for each second of playback. Similarly, a video file that is compressed at

    3000 Kbps will look better than the same file compressed at 1000 Kbps. Just like the quality of

    an image is measured in resolution, the quality of an audio or video file is measured by the bit

    rate.

    58. GOPHER

    A system that pre-dates the World Wide Web for organizing and displaying files on Internet

    servers. A Gopher server presents its contents as a hierarchically structured list of files. With the

  • 7/31/2019 Cmf Terms Final

    37/61

    100232140239 37

    ascendance of the Web, many gopher databases were converted to Web sites which can be more

    easily accessed via Web search engines.

    The Gopher protocol is a TCP/IP application layer protocol designed for distributing,

    searching, and retrieving documents over the Internet .Strongly oriented towards a menu-

    document design, the Gopher protocol was a predecessor of (and later, an alternative to) the

    World Wide Web.

    59. ATM

    Stands for "Asynchronous Transfer Mode". Most people know of ATMs as automated teller

    machines -- those friendly boxes that allow you to withdraw cash from your bank or credit

    account while charging you a ridiculous surcharge for the service. In the computer world,

    however, ATM has a different meaning. Asynchronous Transfer Mode is a networking

    technology that transfers data in packets or cells of a fixed size.

    ATM uses 53-byte cells (5 bytes for the address header and 48 bytes for the data). These

    extremely small cells can be processed through an ATM switch (not an automated teller

    machine) fast enough to maintain data transfer speeds of over 600 mbps. The technology was

    designed for the high-speed transmission of all forms of media from basic graphics to full-

    motion video. Because the cells are so small, ATM equipment can transmit large amounts of data

    over a single connection while ensuring that no single transmission takes up all the bandwidth. It

    also allows Internet Service Providers (ISPs) to assign limited bandwidth to each customer.

    While this may seem like a downside for the customer, it actually improves the efficiency of the

    ISP's Internet connection, causing the overall speed of the connection to be faster for everybody.

    60. DATATRANSFERRATE

    The data transfer rate is commonly used to measure how fast data is transferred from one

    location to another. For example, a hard drive may have a maximum data transfer rate of 480

  • 7/31/2019 Cmf Terms Final

    38/61

    100232140239 38

    Mbps, while your ISP may offer an Internet connection with a maximum data transfer rate of

    only 1.5 Mbps.

    Data transfer rates are typically measured in bits per second (bps) as opposed to bytes per

    second, which can be understandably confusing. Because there are eight bits in a byte, a

    sustained data transfer rate of 80 Mbps is only transferring 10MB per second. While this is

    confusing for consumers, Internet service providers must enjoy measuring data transfer rates in

    bps since it makes their Internet access speeds sound 8 x faster than they really are.

    61. EXTRANET

    Extranets are networks that connect companies with customers and partners.

    In Extranet a company has to work with the other like-minded organizations on the

    network, so that it is accessible to specific people or groups outside the organization.

    Extranets require more security and technical consideration because they have to send

    private information securely over public networks.

    Extranets provides a safe way to allow transactional business-to-business activities.

    Extranet is more complex and costly to set up and requires efficient internal systems.

    Example of Extranet:-

    Different banks are providing the facility of ATM (Automatic Teller Machine) cards with VISA

    facility means one can make use of HDFC ATM in ICICI ATM machine anywhere in the world.

    62. INTRANET

    An Intranet is a network within an organization uses technology similar to internet that

    enables users to find, use, share documents and web pages.

    Corporations use intranet to communicate with employees.

    In large companies, Intranet is being used by employees to obtain and share work-related

    documents, share knowledge, transfer documents from one terminal to another, access e-

  • 7/31/2019 Cmf Terms Final

    39/61

    100232140239 39

    learning tools and learn about company news. Any message from company broadcast to all

    computers.

    Intranets use traditional Internet protocols TCP/IP and HTTP to transfer data.

    Advantages of Intranet:-

    Intranet is based on Internet technologies and protocols. That means Intranet can make

    use of all the facilities of Internet.

    Intranet information is accessible using GUI based interface provided by web browsers.

    You can use the browsers such as Internet Explorer and Netscape Navigator.

    Intranets are easier and less expensive to setup and maintain than traditional networks.

    Documents on Intranet are written in HTML. One can produce HTML documents using

    Microsoft Word by saving the document as a web page.

    Since Intranets are based on Internet technology, they can also incorporate graphics,

    sound and video, e-mail, newsgroups facilities.

    Staff will find it simpler and more intuitive to use because it is accessed through a web

    browser provides an easy, point and click interface.

    An Intranet does not mean interconnection of a lot of people. Depending on your

    business need, it could link just 3 or 4 people in your organization.

    63. MULTIPLEXER

    In telecommunications and computer networks, multiplexing (also known as muxing) is a

    method by which multiple analog message signals or digital data streams are combined into one

    signal over a shared medium. The aim is to share an expensive resource. For example, in

    telecommunications, several telephone calls may be carried using one wire. Multiplexing

    originated in telegraphy, and is now widely applied in communications.

    The multiplexed signal is transmitted over a communication channel, which may be a physical

    transmission medium. The multiplexing divides the capacity of the low-level communication

    channel into several higher-level logical channels, one for each message signal or data stream to

    http://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Computer_networkshttp://en.wikipedia.org/wiki/Shared_mediumhttp://en.wikipedia.org/wiki/Telephone_callhttp://en.wikipedia.org/wiki/Multiplexing#Telegraphyhttp://en.wikipedia.org/wiki/Communication_channelhttp://en.wikipedia.org/wiki/Communication_channelhttp://en.wikipedia.org/wiki/Multiplexing#Telegraphyhttp://en.wikipedia.org/wiki/Telephone_callhttp://en.wikipedia.org/wiki/Shared_mediumhttp://en.wikipedia.org/wiki/Computer_networkshttp://en.wikipedia.org/wiki/Telecommunications
  • 7/31/2019 Cmf Terms Final

    40/61

    100232140239 40

    be transferred. A reverse process, known as demultiple


Recommended