CSIR GOLDEN JUBILEE SERIES
HIS MASTER'S
SLAVE
TAPAN BHATTACHARYA
HIS MASTER'S SLAVE
TAPAN
BHATTACHARYA
Publicati...
48 downloads
761 Views
8MB Size
Report
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
Report copyright / DMCA form
CSIR GOLDEN JUBILEE SERIES
HIS MASTER'S
SLAVE
TAPAN BHATTACHARYA
HIS MASTER'S SLAVE
TAPAN
BHATTACHARYA
Publications & Information Directorate Dr. K.S. Krishnan Marg New Delhi 110 012 India
His Master's Slave Tapan Bhattacharya © Publications & Information Directorate First Edition : November 1991 Second Edition : November 1992 Third Edition : August 1995 I S B N : 81-7236-018-5
CSIR Golden Jubilee Series Publication No. 3 Series Editor
Dr. Bal Phondke
Volume Editor
Parvinder Sindhoo
Cover Design
Pradip Banerjee
Illustrations
Pradip Banerjee, Neeru Sharma, Sushila Vohra, Neeru Vijan, P.R. Mehta and Mohan Singh
Production
V. Ramachandran, K.B. Nagpal, Sudhir Chandra, Mamgain, Vinod Sharma and Radhe Shiam
Designed, Printed and Published by Publications & Information Directorate (CSIR) Dr. K.S. Krishnan Marg, New Delhi 110 012 India
Foreword The Council of Scientific & Industrial Research (CSIR), established in 1942, is committed to the advancement of scientific knowledge, and economic and industrial development of the country. Over the years CSIR has created a base for scientific capability and excellence spanning a wide spectrum of areas enabling it to carry out research and development as well as provide national standards, testing and certification facilities. It has also been training researchers, popularizing science and helping in the inculcation of scientific temper in the country. The CSIR today is a well-knit and action-oriented network of 41 laboratories spread throughout the country with activities ranging from molecular biology to mining, medicinal plants to mechanical engineering, mathematical modelling to metrology, chemicals to coal and so on. While discharging its mandate, CSIR has not lost sight of the necessity to remain at the cutting edge of science in order to be in a position to acquire and generate expertise in frontier areas of technology. CSIR's contributions to high-tech and emerging areas of science and technology are recognized among others for precocious flowering of tissue cultured bamboo, DNA fingerprinting, development of non-noble metal zeolite catalysts, mining of polymetallic nodules from the Indian Ocean bed, building an all-composite light research aircraft, high temperature superconductivity, to mention only a few. Being acutely aware that the pace of scientific and technological development cannot be maintained without a steady influx of bright young scientists, CSIR has undertaken a vigorous programme of human resource development which includes, inter alia, collaborative efforts with the University Grants Commission aimed at nurturing the budding careers of fresh science and technology graduates. However, all these would not yield the desired results in the absence of an atmosphere appreciative of advances in science
and technology. If the people at large remain in awe of science and consider it as something which is far removed from their realms, scientific culture cannot take root. CSIR has been alive to this problem and has been active in taking science to the people, particularly through the print medium. It has an active programme aimed at popularization of science, its concepts, achievements and utility, by bringing it to the doorsteps of the masses through both print and electronic media. This is expected to serve a dual purpose. First, it would create awareness and interest among the intelligent layman and, secondly, it would help youngsters at the point of choosing an academic career in getting a broad-based knowledge about science in general and its frontier areas in particular. Such familiarity would not only kindle in them deep and abiding interest in matters scientific but would also be instrumental in helping them to choose the scientific or technological education that is best suited to them according to their own interests and aptitudes. There would be no groping in the dark for them. However, this is one field where enough is never enough. This was the driving consideration when it was decided to bring out in this 50th anniversary year of CSIR a series of p r o f u s e l y illustrated and specially written p o p u l a r monographs on a judicious mix of scientific and technological subjects varying from the outer space to the inner space. Some of the important subjects covered are astronomy, meteorology, oceanography, new materials, immunology and biotechnology. It is hoped that this series of monographs would be able to whet the varied appetites of a wide cross-section of the target readership and spur them on to gathering further knowledge on the subjects of their choice and liking. An exciting sojourn through the wonderland of science, we hope, awaits the reader. We can only wish him Bon voyage and say, happy hunting.
Preface Notwithstanding his pre-eminent position at the pinnacle of evolution, man is essentially a weak animal. He is not as strong as a wild bull or as supple as a deer. He cannot heave loads as heavy as an elephant can; nor can he run as fast as a cheetah does. He does have, however, one faculty in which he is superior to other members of the animal kingdom. That is his intellectual capacity. Quite naturally he has used this acumen to subjugate other animals and to enhance his own prowess or rather to camouflage his weakness. Having achieved that with a reasonable measure of success, man's appetite for ruling the world grew. He set about, therefore, to acquire even greater degrees of strengths. That led to the designing and constructing of various machines. These gave more power to his elbow but not to his brain. His next goal, obviously, was to do just that. At the same time, the relative ease with which man has been able to get these inanimate slaves has brought to the fore the inherent laziness of man. He is wont to get tired pretty soon of the tedium associated with repetitive operations. These considerations have weighed heavily in the acquisition of the latest of his inanimate slaves, the personal computer. This latter day version of the valet is as loyal to and as conscientious of the well being of its master as the legendary Jeeves of the Wodehousian fame. Unlike the latter, however, this valet lacks innate intelligence. To tap its potential fully and to harness its built-in abilities to the maximum the master has to understand the style of functioning of this dumb servant. Once the master has mastered the basic principles on which the servant obeys his master's commands no task is beyond the slave's comprehension or performing ability. So much so that there is an inherent danger that the master might be lulled into total dependence on the servant and is likely to get the roles reversed.
Acknowledgements The motivation to write a simple story on desktop personal computers came from a two-month assignment as a Visiting Professor in Calcutta University last year. I was asked to teach the basics of personal computers to graduate students and research scholars. I was overwhelmed by the response of my students, who wanted to learn more than what I could possibly know and teach. The excitement was infectious. I must thank all my students for this pleasant infection. I am also grateful to my good friend Prof. Sitesh Roy who was instrumental for my being there. The motivation was there. But, the stimulus came from another trusted friend, Dr. Bal Phondke. He is an acknowledged and much honoured popular science writer. Naturally, he inspired an amateur like me to write for the public. The encouragement was followed by painstaking observation and constructive assessment of the manuscript. My grateful thanks to you, Bal. After all, what are good friends for! In spite of her temporary ailment, the meticulous and methodical manner in which Ms. Gayatri Moorthy went through the manuscript and offered suggestions is amazing. I am immensely grateful to you, Gayatri. Quite often, I badly needed friendly shoulders to cry on. I am fortunate to have such understandingfriends. How can I ever forget the support and help I received from K. Santhanam, his wife, Ramanujam Ashokand Kameshwari Subramaniam! Thank you indeed, Santy, Jaya, Ashok and Kame. There are others who have helped me in various ways. In particular, I am grateful to Dr. B. Bhargava for his comments and suggestions on the manuscript. Finally, they say that it is a wife's prerogative to nag her husband. Tne nagging regularity with which my wife was after me to complete the work, and that too from a distance of some 1,400 km, is unbelievable. I am confident that I would not have completed the book without that nagging. Thank you,Shakuntala. Tapan Bhattacharya
To SHARMISTHA Perhaps some day, you too will use your oum inanimate slave to give relief to your suffering patients. —Baba
Contents Evolution
... 1
The Anatomy
...15
Bit by Bit
...29
Child's Play
... 39
Commanding the Slave
... 47
Muscle Power
... 59
Disease and Ailment
... 70
Master's Role
... 83
Glossary
... 87
The Conception uman species has always been authoritative. The urge for survival has made man dominate over others. Through the ages man has ruled the world, and he still does. In earlier times, he dominated over his own personal human slaves. But, man is also a conscientious being. His scruples did not finally allow him to continue treating another human being as a slave. That is why machines were invented; machines which would obey c o m m a n d s f a i t h f u l l y without any protest. And that is why computers also came into being.
H
Evolution
It actually started some 3,000 years before the birth of Jesus Christ. During those days, the Mesopotamians quite unknowingly laid the foundation of the computer era. They discovered the earliest form of a bead-andwire counting machine, which subsequently came to be known as abacus. Almost 3,000 years later, the Chinese improved upon the abacus, so that they could count and calculate fast. Even today, the Chinese use the abacus widely in their daily commercial and banking activities. In April
2
HIS M A S T E R ' S SLAVE
1991, an abacus knowledge contest held in China attracted more than 2.4 million participants. Many Chinese have claimed that an abacus is sometimes faster than a computer!
The abacus
The concept and development of a computer had to come some day. One cannot do without c o u n t i n g and m a n i p u l a t i n g numbers, which are required in every sphere of human activity.
In addition, precision is of utmost importance. Errors in calculations and mathematical tables could prove disastrous to engineers, scientists, astronomers, navigators, bankers and merchants. But, the manual preparation of precise mathematical tables is not only tedious, but is also subject to human errors. Therefore, there always has been a need for a machine which would count faithfully without mistakes, and a computer is basically a counting machine. However, the concept of a computer did not materialize overnight. Just as the growth and development of mature biological species normally take place in fits and starts over the ages, the computer concept also took thousands of years to mature. The idea evolved gradually with continuous advancement in the scientific, mathematical and engineering fields during the 19th and 20th centuries. Thousands of ideas, concepts and discoveries in physical sciences and mathematics, particularly in the fields of algebra, trigonometry, calculus, numbering and counting systems, contributed to the strengthening of the perception. For example, the idea of logarithm developed in 1614 by the Scottish nobleman, John NAPIER (1550-1617), who also devised a set of numbering rods known as Napier's Bones, notably reduced the tedium of repetitive calculations.
EVOLUTION
3
The Napier's Bones — a primitive calculating device
But the computer concept really took root in 1821. Charles BABBAGE (1791-1871), an Englishman who once taught mathematics at Cambridge, designed three Difference Engines, one after the other, which were expected to calculate logarithmic tables to a high degree of precision. The first engine was the earliest complete design for an automatic calculator. Babbage went on trying to build the engine for 12 years. Even before it was half complete, he designed his second engine, which was to be lighter and faster. This was also not complete, when he started on his third improved engine, which too was not completed. However, later in 1843, the first engine was built and demonstrated in Sweden. Babbage was undoubtedly a genius. Characteristically, therefore, he quickly lost interest in his Difference Engines. Instead, in 1833 he started designing an Analytical Engine which was to become the real ancestor of the modern day computer. Indeed, with the methodical design of his Analytical Engine, which also was never built, Babbage meticulously established the basic principles on which today's computers work. While his Difference Engines could only add numbers, the Analytical Engine was capable of all four arithmetical
4
HIS MASTER'S SLAVE
operations — addition, subtraction, multiplication and division. It had a number of features startlingly similar to those in today's electronic computers. The modern concept of a central processor Stor-
Charles Babbage — a man ahead of his time who designed two counting'machines: (A) the * Difference Engine and (B) the Analytical Engine a §
e
memory
i n p u t - o u t p u t d e v i c e s w e r e all i n c l u d e d i n h i s d e s i g n .
'
area,
and
EVOLUTION
5
It is interesting to note that Lady Ada AUGUSTA (1815-1853) Countess of Lovelace and daughter of the p o e t lord B Y R O N worked closely with Babb a g e in the d e s i g n of programs for the Analytical Engine. An ardent admirer of Babbage and a brilliant interpreter of his work Lady Lovelace used her influence to interest others in the Analytical engine. Even the concept of using punched cards was first introduced by BabAda Augusta Byron Lovelace bage. The Science Museum in London has recently completed building the second Difference Engine to mark the 200th birth anniversary of Charles Babbage in December 1991 — a fitting tribute to the acknowledged father of modern computers.
The Birth What Charles Babbage could only dream about but not build, was fabricated in 1887 by an American named Herman HOLLERITH (1869-1926). He was working in the U.S. Census Department. He fabricated the first electromechanical punched-card tabulator. The machine had a battery of noisy mechanical switches and gears, which had to be adjusted manually. Postcard-sized paper cards were punched in a typewriter-like machine. These were used to feed instructions to the computer. The machine was used by the U.S.
6
HIS M A S T E R ' S S L A V E
Herman Hollerith with his tabulating machine
Department of Census to compile their 1880 census data. The total time taken to complete the compilation was three years, which otherwise would have taken about a decade. In comparison, modern computers can do the same job in a few hours. In 1924, the first computer company was launched in U.S.A. This company, named International Business Machine Corporation (IBM), made significant contributions to the research, development and growth of computers over the next seven decades. In fact, the desktop personal computer was first introduced by IBM more than half a century later. Prof. Howard AIKEN (1900-1973) in U.S.A. constructed in 1943 an electromechanical computer named MARK-1, which could multiply two 10-digit numbers in five seconds — a record at that time! In comparison, the same multiplication would take only a minute fraction of a second for our personal computer today.
7
EVOLUTION
Till the beginning of World War II, computers were electromechanical. They were also rather slow. Moreover,
Hollerith's punched card
before a specific computation could be performed, a huge array of switches and mechanical gears had to be manually adjusted to give the necessary commands to the computer for carrying out a task. It appeared that the operator had to toil more than the computer. Naturally, he was not happy. He wanted a computer which could obey his commands and do a job quickly without demanding human labour. Therefore, his attention was focussed on the development of an electronic computer, which was expected to be faster and more reliable, and could be operated without manual labour.
The Nursery The first acknowledged working model of a prototype electronic digital computer was designed in 1939 by John V. AT AN ASOFF of Iowa State College in U.S.A. Also during the early forties, the U.S. government initiated a project for developing an Electronic Numerical Integrator and Cal-
8
HIS M A S T E R ' S SLAVE
culator (ENIAC). At the Moore School of the University of Pennsylvania, a team of about 50 scientists and engineers completed the first large scale electronic computer in 1946. In the previous year, John von NEUMANN, the Hungarian born renowned space scientist who was also an adviser to the ENIAC project, first propounded the concept of a more versatile electronic computer named Electronic Discrete Variable Automatic Computer (EDVAC). This machine was finally built in 1950. It had the distinction of being the first computer with commands and programs stored in it. Till about I960, electronic computers were using vacuum tube devices or valves. Consequently, they were huge in size occupying large rooms and consuming a large amount of electrical energy. A lot of heat was also generated inside the room. Commands and instructions to the machine were fed using punched cards, which were originally thought of by Charles Babbage but introduced by Herman Hollerith. Computer users were always seen carrying a huge bunch of punched cards. The punching of cards and reading them were performed by mechanical machines which were noisy and took a lot of time and labour. All in all, the whole operation appeared to be rather messy. Further, it still did not satisfy the need to have a machine which would obey its master without demanding any manual labour. The beginning of the sixties witnessed the advent of the earliest form of solidstate computers. Valves and punched cards were gradually replaced with their second-generation cousins — transistors and magnetic tapes. Soon, the transistors were also replaced by their third-generation cousin — the microprocessor. Thousands of transistors and other electronic elements could be integrated in a single semiconductor device to form, the integrated circuit (IC) or the chip. The size of a chip was about the size of a small flower except that it was rectangular. This revolutionary development made one single chip capable of performing all the essential functions, which were being accomplished by hundreds of
EVOLUTION
9
A silicon chip; Size of the chip compared to that of a Petunia flower (inset)
mechanical switches and gears and several valves in the earlier computers. Such a small-sized chip was totally responsible for carrying out the processing and computing tasks. Hence, it was called the microprocessor. Using solid state microprocessors, the first supercomputer was built in 1975 and was named CRAY-I. This was at that time the fastest computer on earth, performing a million more calculations than the ENIAC in a space one thousand times smaller. A much more powerful version of the CRAY supercomputer has recently been procured by India for extensive meteorological studies and forecasts.
10
HIS M A S T E R ' S SLAVE
However, much more exciting was the phenomenal development of microprocessor chips that opened up the possibility of a microcomputer.
The Micro Till the mid seventies, computers were mostly what is currently known as mainframes. They had large capacity and high processing speeds, and were exceptionally reliable. However, only large organizations could afford to buy them, because they were enormously expensive. During the late seventies, less expensive mini computers came into the market. Although minis had considerably lower capacity and speed, these could be bought by smaller organizations who did not have access to mainframes. Both mainframes and minis are essential for analyzing and processing a large
The supercomputer
EVOLUTION
11
The desktop personal computer being operated in a modern office
volume of data in a short time. For example, the analyses of the 1991 Indian population census data, or the daily railway reservation of millions of people, could not possibly be carried out without a mainframe computer.
12
HIS M A S T E R ' S SLAVE
However, what man wanted was a personal slave. The mainframes and minis could never satisfy that requirement. There was an acute need for a small, inexpensive and manageable desktop microcomputer which could be used profitably by individuals, small organizatipns and business houses. But, the micro revolution remained a dream till the end of-the seventies. During the late seventies and early eighties, a number of commercial events helped the advent of a desktop microcomputer. In U.S.A., Seattle Computers launched the first electronic circuitry for a microcomputer using the then available microprocessor chip. In England, Sinclair introduced a home computer named ZENIX using another type of chip. This used a home television as the monitor. Although severely limited in processing speed and capacity as per current standards, this device immediately became popular. Finally in 1981, IBM first introduced a desktop computer for home use, which was trademarked as Personal Computer or PC. Soon, this was followed by hunreds of clones and compatibles made by other companies, whose performance was sometimes vastly superior to the original IBM PC. During the early eighties, Apple Computers in U.S.A. came out with a microcomputer using another chip. This was named Macintosh or simply MAC, and it immediately became a successful competitor to the IBM PC. More powerful microprocessor chips were gradually developed and introduced by many companies. Thus, the capacity, processing speed and reliability of desktop computers went on increasing. Thus, after two decades of dominance by the mainframes and minis, began the era of the microcomputer, or simply micro. It is not as if the utility and relevance of the mainframes and minis diminished. Not in the least. In fact, their utility went on increasing to handle highly complex, involved and intricate computations. Nevertheless, with the introduction of micros, man finally possessed a personal slave. An entirely new sphere of com-
EVOLUTION
13
14
HIS M A S T E R ' S SLAVE
puter activity flourished in small offices, shops, small business houses and commercial agencies; schools, colleges and educational institutions; and what is more exciting, in private homes where millions of individuals could neither afford nor have access to a mainframe or even a mini. Soon, the coupling of desktop micros with mainframes and minis using telephone lines opened up another new domain of information exchange. Over the past one decade, the basic microprocessor chip has undergone considerable advancement, close on the heels of the revolutionary achievements in the Very Large Scale Integration (VLSI) technology. In the IBM PC world, revolutionary changes have taken place in a short span of time. The original IBM PC had extremely limited capabilities in terms of speed of computation and available space for information and data storage. When, in the early eighties, the information storage capacity was substantially enhanced with the introduction of innovative electronic devices, the PC-XT was born. However, both PC and PC-XT used the same microprocessor chip, and hence, they had the same speed of computation. Within a couple of years, a more versatile and faster chip was used, thus giving birth to the PC-AT. During the latter half of the eighties, this chip too was replaced by a still faster and more versatile chip. The early nineties saw even this chip being replaced by its more powerful next generation. With technological advancement coming in leaps and bounds, the desktop personal computers in the early nineties have become as powerful and versatile as the mainframes and minis of yesteryear. Finally, the common man can afford a home computer which will obey his commands and instructions without demur or protest. Man's dream of ruling over a machine, which could act as a faithful slave and follow his commands sincerely, seemed to have been finally achieved.
The Slave here is no dearth of science fiction tales depicting computers ruling over mankind. The basic premise in such fiction is that a computer is more intelligent than a human being. It also presupposes that a computer has a brain. And, if it has a brain, it also must have a memory. On a different scale, the desktop microcomputers have sometimes been projected to be more powerful than most human beings, because apparently they do things which many human beings cannot do.
T The Anatomy
The truth, however, is different. With the birth of the desktop m i c r o c o m p u t e r , the common man has undoubtedly found a faithful slave, which will obey his c o m m a n d s w i t h o u t protest. A micro is a man-made inanimate slave, which is apparently capable of performing wonders. But, does it possess any intelligence at all? Does it have a brain? A memory? For, if it does not, how would it understand and obey its master's commands? In order to answer these questions, we have to look deeper into a c o m p u t e r ' s p h y s i q u e and anatomy.
16
HIS MASTER'S SLAVE
INP UT DE VICE BRAIN SENSE ORGANS OUTPUT DEVICE HEART
DIGESTIVE SYSTEM
CPU
ELECTRICAL POWER
POWER STATION
T h e factors essential for the functioning of a h u m a n b o d y c o m p a r e d to the basic faculties of a computer system
In a rather simplistic manner, we may visualize that a human body functions satisfactorily because of three factors. The human body has a heart, which acts as its life support. It has a brain which guides, directs and governs all its actions. It also has some assets by means of which it can feed itself for survival and growth, and which help it to communicate with the outside world. Undoubtedly, there are other essential functions in a human body. However, we are concerned here with only these three factors.
THE ANATOMY
17
In fact, for all satisfactorily functioning slaves, animate or inanimate, these three requirements are absolutely essential. The slave must be alive, it must have a faculty to guide and govern its actions and it must be able to communicate with its master. If our inanimate slave, the personal desktop computer, is to obey our commands faithfully, it must also possess these three basic faculties. Firstly, our slave must be alive. That is not difficult to visualize. As long as the computer is kept switched on, in principle, it can perform and is alive. The externally supplied electrical energy keeps it functional and acts as its life support. But, there is a catch in this. One must admit that the slave lives from day to day. It is alive and performing only as long as the electrical power input is maintained. As soon as the power is switched off, it is dead. This factor has a critical influence on the working characteristics of our slave. Secondly, our slave must have an acceptable control centre which would guide, direct and govern its performance. Lastly, it must also possess suitable resources (peripherals) by means of which it can communicate with its master.
The Brain All human actions are controlled and directed by the brain. Similarly, if your slave computer has to follow commands faithfully, it must also have some form of control centre. Because your slave is inanimate, it would require constant guidance to carry out tasks assigned to it. Otherwise, it cannot function. In the electromechanical computers of yesteryears, such guidance was supplied manually by adjusting mechanical switches and gears. The control centre in the desktop computer is known as the Central Processing Unit or CPU. This is the brain of the slave. Human brain has three components — cerebrum, cerebellum and brain stem. The cerebrum is responsible for
HIS MASTER'S SLAVE
18
COMPUTER PROCESSING
INPUT
MAIN MEMORY
OUTPUT
STORAGE
BRAIN
SENSORY NEURON
MOTOR NEURON
T h e CPU of a c o m p u t e r is comparable to the h u m a n brain. Just as an electrical impulse is carried in and out of the brain b y special neurons, so does the informational flow occurs through the input-output devices in a c o m p u t e r system
intelligence, judgement and memory in a human being. The cerebellum coordinates the muscular movements and other activities of a human body. The stem regulates desires like thirst, hunger, etc. In a somewhat similar manner, the CPU also has three components which are responsible for three different functions. The two components, which are basically responsible for counting operations, are its Control Unit (CU)
19
THE ANATOMY
and Arithmetic Logic Unit (ALU). The CU controls and guides the interpretation, flow and manipulation of all data and information. On the other hand, the ALU performs all the four arithmetical and some logical operations. In other words, the CPU is capable of guiding, directing and performing the two essential and critical operations, viz. counting and arithmetic logic. These two primary components of the computer b r a i n are contained in the s e m i c o n d u c t o r microprocessor chip, which ultimately determines its capability and versatility. However, it would be quite wrong to think that since the slave has a brain it has intelligence as well. The desktop computer is very hard working, sincere and conscientious. It will act as a perfect slave, as long as it is able to understand what its master wants. And you are the master! But, you have to always command your slave to carry out a specific task. It cannot anticipate or guess what you want. This is because, it can neither think on its own, nor does it have any imaginaMEMORY
PROCESSING
MEMORY
INPUT OUTPUT T h e a n a t o m y of a c o m p u t e r system
20
HIS M A S T E R ' S SLAVE
tion. In other words, it is like a dumb object, which can act as a docile slave who is not bright, imaginative or intelligent. Peter NORTON, an American professional, who has been a pioneer in the field of computer training, compares a desktop microcomputer with an "office worker, with lots of energy but absolutely no initiative, no commonsense, no independence".
Well, if the slave has a brain, it must also have the faculty which we call memory. Indeed, it does possess a memory, which is the third constituent of the CPU. However, the memory of a computer is most unlike human memory. A human being can remember stored information for a long time. Don't you still remember many adventures and antics of your childhood? But your slave has no such faculty. Its memory is temporary. You, as its master, can put information into its memory and take it out any time you want. It can recall as long as its memory has something that can be recalled. Remember, your slave lives from day to day. Therefore, it cannot remember anything after it is switched off. A computer's memory is more like a predefined working place, where it temporarily keeps information and data to facilitate its performance. Peter Norton compares the computer memory with the table of an office worker. As long as he is working there, the office worker uses his table for keeping papers, files, pens, pencils, paper weights and so on. At the end of the work period, he clears up his table and removes all materials. Next day, when he starts working again, he repeats the same procedure. Similarly, a computer's memory is used for temporarily storing information and instructions. The computer uses its memory to keep instructions for a command given by its master. After the task is performed, it clears its memory, and totally forgets all about it. The memory space is then available for the next task to be performed.
THE ANATOMY
21
Norton's analogy
22
HIS M A S T E R ' S S L A V E
The memory of a computer forms the primary storage unit, just like the table of the office worker. Technically, this unit is known as Random Access Memory (RAM). It consists of a series of semiconductor integrated circuit chips. These chips can store information as long as there is electrical power input, As soon as the power is switched off, the memory is totally erased. Therefore, RAM works as a volatile memory. However, one must be very careful in stretching the analogy of an office worker too far. In most cases, the office worker does not wait for his superior's instructions to start his work. He normally uses his brain and memory to start working on his own at the beginning of a work day. Your personal computer cannot do that. Further, the office worker generally uses his intelligence to overcome most difficulties, or a lack of suitable instructions, and carries on his work. A computer gets stuck if there is a lack of correct instructions. For example, if a word like command is spelt as comand, the office worker will immediately recognize it as a spelling mistake, and carry on his work regardless. But, a computer will refuse to accept the misspelt word. It will only caution the user that an error has occurred. Unless a fresh command' is issued with the correct spelling, it would refuse to continue its work. Thus, the basic difference between the two cases lies in the irrefutable fact that while an office worker can think and use his intelligence, your personal slave cannot.
The Limbs If we compare the slave with an office worker, then there must be allied facilities similar to those available in an office. An office worker has his table, which has some drawers. In addition, he has his file cabinet. He stores papers, files and other stationery in these drawers and cabinets. When he requires any article, he takes it out of the drawer or the cabinet and puts it on top of his table for carrying out his work. That
THE ANATOMY
23
is the accepted and convenient method of doing one's office work. The office worker has two different storage places. The first place is the top of his table, where things are kept temporarily when required. This is the primary storage space, because the worker carries out his job here. The other storage place consists of the drawers and cabinets where he can store things permanently. This is his secondary storage place. In a similar manner, your computer must also have analogous storage spaces, where it can stockpile all required items for use. Further, just like the facilities available in an office, it must also have two types of storage places — primary and secondary. RAM acts as the primary storage space in the desktop computer. But it must also have its secondary storage space, analogous to the drawers and cabinets of the office worker. In this secondary storage unit, things may be stored as long as they are not destroyed. The primary storage unit receives the master's commands and instructions from its secondary storage. This is similar to the office worker taking out things from his drawers and putting them on the table top. The difference between the two is that, while the office worker physically takes out the required items from his table drawers, instructions are only read by the CPU from its secondary storage unit. The information physically remains stored in the secondary storage unit, unless it is intentionally or accidentally destroyed. The two most important secondary storage media are the floppy diskette (or simply floppy) and the hard disk. A well known and proven method is used to record information on them. It is the same magnetic method which is used to record either music in your audio cassette tapes, or pictures in the video cassettes. Both the floppy and the hard disk are made by coating a thin layer of high-performance magnetic
HIS MASTER'S SLAVE
24
material on a flat and circular plastic base, similar to the preparation of the audio or video tapes. As is done for an audio or video tape, the information to be stored is converted into magnetic signals. To store the information, the mag(B) h a v e just o n e netic surfaces of the storage medium are magnetized in accordance with the generated signals. An audio cassette tape moves linearly in front of a readwrite head for the recorded music to be played. A floppy requires a disk drive with one or more heads, for the purpose of reading or writing. However, unlike an audio or video (A) A floppy o r a hard disk has two mag-
netic surfaces whereas a u d i o / v i d e o tapes
Tape Disk platter
Read-write head Head Movable arms
Head
Rotating shaft
Direction of cassette tape
The read-write mechanism in a hard disk c o m p a r e d to that in a n audio cassette
25
THE ANATOMY
A
typical disk pack
show-
ing read-write heads
tape, the floppy has two magnetic surfaces on the two opposite sides. Therefore, a floppy disk drive has two aligned read-write heads for the two surfaces. The circular floppy diskette inside its protective paper packet rotates, with its two surfaces facing the two heads. But, unlike the head in an audio tape recorder, the two readwrite heads in a floppy drive also move linearly along the disk radius. Thus, the circular motion of the flopp y a n d t h e l i n e a r m o v e m e n t of the
heads together cover the two opposite disk surfaces completely. A hard disk has a number of aligned platters, each similar to a floppy. Each platter has a pair of read-write heads on its two opposite sides. The larger the number of platters in a hard disk, the larger its storage capacity. Generally, a hard disk has a considerably higher storage capacity than a floppy. Unlike a floppy disk, the hard disk is hermetically sealed to avoid dust, moisture or other contaminants which may otherwise spoil the active magnetized surfaces of the platters.
Hearing and Talking If you are the boss, you may orally instruct your office worker to carry out what you want. Alternatively, you may write a note giving the required instructions. Your office worker can hear or read. Therefore, he would understand and follow your instructions. But, your slave computer is different. Generally speaking, it cannot hear and understand your voice. It also cannot read and interpret something scribbled on a piece of paper. At least not yet. Therefore, you need an input device to communicate with the computer.
26
HIS MASTER'S SLAVE
1 CM
Enter*-1
• Shift
Shift
Alt
The QWERTY layout
The most important input device is the keyboard. There are others like the Mouse or a Joy Stick which is used mostly for playing computer games. The computer keyboard is similar to the typewriter that the office worker uses, but with some important diffrences. Firstly, it is electronic and it cannot type on paper. The keyboard can be conceptually divided into two parts. The first part is exactly the same as the typewriter. This part has English alphabets, numerals, punctuation marks and some other characters like the + and - signs. In fact, the layout of this portion of the keyboard is exactly the same as any standard English typewriter. This is called the QWERTY layout, because the characters are laid
THE ANATOMY
27
out in that order from left to right on the second line from the top. The second portion has no counterpart in a standard typewriter. Pressing a key in this part has a special meaning to the computer. It is essentially equivalent to feeding the computer with a small command or a program. In particular, the key marked Enter (or Return in some keyboards) is an important and frequently used key. It acts as an entrance gate to allow any command or instruction to be fed to the computer. Pressing this key opens the gate. For example, you can type anything. But, uless you press the Enter key after typing, the computer will not read whatever you have typed. Similarly, there are many other special keys on the computer keyboard, each of which has an exclusive meaning to your slave. For instance, pressing the key marked Del deletes the currently typed character and so on. Just as your slave requires you to communicate with it through input devices like the keyboard, it too is in need of a mechanism to communicate with its master. In other words, it requires an output device. Such a device serves the purpose of depicting the results of computer processing in the realworld language. Your slave talks to you through its output device. The most common output device is the monitor or screen or video display unit (VDU). In computer jargon, it is called a console. On the screen you can not only see what you type, but also the results of computer processing. Other important output devices are printers, plotters, etc. As the names suggest, they would give you the processed results or a plotted output on paper.
Capability Notwithstanding all its brain and memory, its storage units and input and output devices, our faithful slave can only
28
HIS M A S T E R ' S S L A V E
count. In addition, it can also perform some logical operations on numbers, like comparing one number with the other. And it can perform both operations fast. That is all it can do. Indeed, our slave computer is nothing but a counting device. But then, so is an electronic calculator. A computer possesses its memory. But so does a calculator. What is then the difference between the two? The basic difference lies in the fact that, while a computer is also able to perform some logical operations, a calculator generally cannot. Due to this expertise, our slave can do many things, which apparently seem to us totally unconnected with counting. Thus, when a personal computer helps you write, edit and process texts, or draw lifelike pictures, or dial a telephone number on command, it appears that it can really do miracles. Such apparently miraculous tasks are performed by your slave computer only because it can count, it can carry out certain logical operations and because it possesses what is commonly known as its memory.
Learning to Cry new-born child does not know how to talk But it knows how to communicate with its surroundings. The child is born with vocal cords which it uses quite effectively. Through crying and apparently meaningless sounds, it expresses its hunger, joy, anguish and other emotions. As the child grows, it listens to the words spoken by others and starts imitating them. Bit by bit, it picks up spoken words and sounds, and starts c o m m u n i c a t i n g with others. Then the child grows up to read and write. It starts communicating in a more proficient manner. Gradually, the link of a spoken and written language makes the child an articulate member of its community.
A
Bit by Bit
Something even more basic must happen to your slave computer, before it can communicate with its master. It must first learn to cry. Further, it is alive only from day to day. Therefore, it m u s t l e a r n e v e r y time it is switched on. A desktop personal computer is an assembly of interconnected e l e c t r o n i c c o m p o n e n t s and
30
HIS M A S T E R ' S S L A V E
devices. The required energy for its becoming and staying alive comes from the input electrical energy. Also, the only possible means for the computer to communicate with the outside world is through electrical energy. Fortunately, this energy can be easily altered, either by changing its voltage, or current, or both. If we use direct current, its direction — positive or negative — can be used to designate contrasting characters. Therefore, in principle, it is possible for the slave computer to use varying levels of electrical energy to communicate with its master. Well, things are not so simple after all! We know that a communicable human language should have its written characters — alphabets, numbers and others. It must also have certain rules and regulations for spelling, grammar, sentence composition and so on. Finally, the language must also be unambiguous and consistent. Such constraints are equally applicable to the slave, even though it is inanimate. On the face of it, this does not seem to pose much problem, if one uses the vehicle of electrical energy to define different characters of the language. One can immediately see that electrical energy may be rather easily altered to represent various characters. One could use electrical pulses of varying magnitudes (heights) to represent different characters of the language. For example, an electrical pulse of, say, 1.0 Volt may represent the English character capital A, 1.1 Volt B, and so on and so forth. The computer brain should be able to detect the magnitudes of the incoming electrical pulses and interpret them correctly. In principle, such a scheme sounds good. However, there are some major complications. It turns out that such a scheme would be inefficient and unreliable, due to some inherent characteristics of electronics. Firstly, in order to represent 52 English alphabetic characters (26 upper case and 26 lower case) along with the 10 numbers and many other essential characters like punctuation marks or arithmetic signs, the electronics would have to generate electrical pulses of as
BIT BY BIT
31
many different magnitudes. That itself is a tall order. Secondly, the pulse magnitudes will have to be closely spaced, because one has to accommodate at least 128 characters within a reasonable and practical voltage range. Also, the electronic detection system would have to be sensitive enough to correctly distinguish between pulses having slightly different magnitudes. Furthermore, some unwanted noise or electrical disturbance in the system might alter a pulse height, thus causing problems of reliability.
Bits to Byte Now, suppose we represent each character in terms of a number. Say the number 65 represents capital A, 66 capital B, and so on. In such a case, we need to produce electrical signals to represent only 10 numbers from 0 to 9, and nothing more. The task becomes simpler. The number of distinct signals reduces from 128 to only 10. The scheme sounds great. But, wait! It can be simplified even more by having only two basic signals representing 0 and 1, and nothing more. The two electrical signals can also be easily discernible, if one is a null or no signal at all, and the other is a signal with a non-zero pulse height, something similar to an ON-OFF switch or a YESNO answer with nothing in between. Such a scheme would be e m i n e n t l y s u i t a b l e for the electronics, because it is easy to distinguish between nothing and something. But, how is it possible to use only two basic signals to communicate with the computer! The G e o r g e B o o l e _ a n £ n g l i s h answer lies in the use of the genius who developed the conB o o l e a n m e t h o d of n u m b e r cept of Binary system
HIS MASTER'S SLAVE
32
counting, a system named after the 19th century mathematician George BOOLE (1815-1864). In our day to day life, we use a decimal numbering system with a base of 10. This system uses 10 digits, starting from 0 and ending in 9. In the Boolean system, which is also called the binary system, the counting is done with a base of 2, with just-two digits 0 and 1. When we designate a number in our language as, say, 28, we actually multiply the first digit 2 by 10 and add it to the second digit 8 to get the result as 28. Similarly, the number 9083 actually stands for: 9083 = 9 0 0 0 + 0 + 80 + 3 = [(9x 103) +(0x 102) + (8x 10')+ (3x 10°)]
BINARY EQUIVALENT
DECIMAL NUMBER 0
=
(0x2 2 )
+
(0x2')
+
(0x2°)
=
000
1
=
(Ox2 2 )
+
(0x2')
+
(1x2°)
=
001
2
=
(0x2 2 )
ove. OTHERWISE ,he VA 10 ^ ^ , m " will be i d f i " ' " ' -
MUSCLE POWER
65
Undoubtedly, a desktop computer would be hopelessly inadequate to handle such volume of data, however powerful it may be. On the other hand, consider the list of addresses and telephone numbers you have to use frequently, which contains, say, 500 entries. It is extremely easy for your personal computer to handle, analyze and report whatever portion of the data you wish to be manoeuvered v These two extreme examples are intended to stress the act that, in principle, data handling and analyses can be performed by your slave in the same way as in a mainframe. The two major differences are the volume of data that can be handled and the processing speed. A basic philosophy behind the efficient use of a desktop computer is to avoid, or at least reduce, the drudgery and monotony of carrying out a task which is either absolutely routine or highly repetitive in nature. Handling and analyses of a large volume of repetitive data fall in this category. Therefore, a desktop computer is ideally suited for such purposes, subject to the limitations imposed by its performance versatility and speed. The skill in handling data has resulted in a number of practical and highly efficient software packages, ranging from financial analyses to hospital, library and institution management. In particular, for shops, small business establishments, schools, colleges, universities, research institutions, small m a n u f a c t u r i n g units, professionals and individuals, the capability for data analyses and data-based management has turned out to be a bonanza. Indeed, virtually any type of data-based management service can be provided by a desktop computer. In addition to the routine analyses of different types of data and information, your slave is also capable of performing a number of complicated numerical and mathematical analyses. These include almost all types of statistical and regression analyses, equation solving through numerical
66
HIS MASTER'S S L A V E
means and curve fitting to a set of data. There are a number of software packages available in the market, each catering to a specific set of tasks.
Graphics and Animation Perhaps the most spectacular tasks performed by our desktop slave involve graphics and animation packages. Apart from the capability of drawing various types of charts,
Computer graphics
MUSCLE POWER
67
graphs and line diagrams, and text, headlines and banners in a number of attractive fonts, these packages are capable of producing life-like drawings with or without animation. Much of the computer graphics and animation that you see on your television can be produced by your slave. This skill has immensely improved the quality and efficacy of educational, commercial and other audio-visual presentations, lecture-demonstration programs and mass communication, in general. Ultimately, it is the limit of human ingenuity which may restrict the application of the seemingly limitless graphic and animation capabilities of your computer.
CAD/CAM Two major areas where your desktop computer can effectively contribute are drafting of many engineering designs and controlling of some manufacturing processes. These
CAD/CAM
68
HIS MASTER'S S L A V E
capabilities have led to the development of two highly successful application areas called Computer Aided Design (CAD) and Computer Aided Manufacture (CAM). The practice of manual drafting of designs for buildings, machine tools, automobiles, furniture and many other products is slowly giving way to computer drafting. Draftsmen, who were toiling with a large drawing sheet and a set of pencils, erasers, scales and set-squares, are now drafting the same things on a computer screen, with a single drawing showing both isometric and planar views at the flip of a key. The drudgery and monotony of hours of manual labour have reduced considerably. Qualified software packages and hardware interfaces are available for your slave to supervise and control routine manufacturing jobs on a production shop floor. Both CAD and CAM are extensively used to facilitate design, drafting and production control.
Artificial Intelligence Perhaps the most exciting development in the personal computer field is the advent of AI or Artificial Intelligence. This name was first coined in 1956 by Dartmouth College Asstt. Prof. John McCarthy. As the name indicates, attempts are being made to teach a computer to make its own decisions under a set of given conditions. The field is wide open for development, and once fully developed it should contribute substantially in various decision making processes, such as in the battlefield. AI primarily belongs to main-frames and minis, because it requires a huge memory capacity and large processing speed. Nonetheless, a small amount of AI has already made inroads in the desktop field as well. In particular, there are great possibilities for its use in the field of education and training of the handicapped.
MUSCLE POWER
69
A robot at work
And More There are many other useful applications of your desktop computer. Innovative and new ideas to utilize our docile slave more effectively are constantly coming up. Improvements and advancements in both hardware and software have been contributing to the growth of new application areas. Some important application areas, which have not been discussed in our brief resume above, include education and training, music composition, literal translation of documents from one language to another and hardware-based interface with telephone, telex and fax facilities.
m
Virus nce people got used to the faithful slave computer, they could never imagine that it could strike work someday, and refuse to obey its master. It did precisely that during the latter part of 1987, first in U.S.A. and then the world over. Not only did it just refuse to work, but it started behaving in a puzzling manner. What was more alarming was that the stored files on the hard disks started getting damaged or corrupted. It was reported that many important stored files in a U.S. Defence Department office were lost beyond possible retrieval. This became a crisis situation and all experts started spending sleepless nights to determine the reason for such unusual behaviour by a docile slave. Finally, it was discovered that the culprit was a man-made virus.
O Disease and Ailment
The menace posed by computer viruses m e r c i l e s s l y destroying important stored data and information was first widely publicized in 1988 by a Time magazine article in U.S.A. It was found that two computer viruses named Brain and Ashar, written by two P a k i s t a n i
DISEASE AND AILMENT
71
Welcome to the dungeon...
brothers, Basit and Amjad of Lahore, were already creating havoc with stored files in many desktop computers. A computer infected with Ashar virus used to flash a message Welcome to the dungeon... on the screen, ironically an apt message to warn about its alarmingly damaging character. The Ashar virus actually replaces a whole program by something totally useless. The presence of the Brain virus was detected by the disk name or volume label getting modified to C Brain. It also destroys files and slows down the processing speed considerably. These highly damaging viruses infect the boot sector of the hard or floppy disk and start destroying everything written on it. The two brothers later
72
HIS M A S T E R ' S S L A V E
claimed that their intention was honourable. However, computer experts never believed that. That was the beginning of the virus menace. One would expect that, similar to a living being, your desktop slave would also have some disorders once a while. Most wellunderstood problems arise due to hardware failure. That is nothing abnormal. Hardware failure happens to any electronic system and a desktop computer is no exception. Particularly in dusty and humidity prone areas, a piece of hardware may fail to function properly. A floppy, or occasionally the hard disk, may fail permanently due to the environment or improper handling. However, unless physical damage results due to mishandling or vandalism, permanent hardware failures are rare. The important thing is that the problems due to hardware failure can be understood and rectified with relative ease. However, the most damaging kind of computer disease is due to the impertinent and flippant behaviour of a group of human beings, who want to extract fun out of the discomfort of serious computer users. This alarming disease is caused by infection with one or more man-made computer viruses. The disease is often difficult to diagnose and considerably more challenging to cure. Since its first introduction during 1987, it has been creating devastation in the desktop computer world.
The name virus has been derived from its biological equivalent. Though non-living and artificially created, a computer virus has marked similarities with its biological counterpart. A biological virus is actually a molecular species containing information coded in a nucleic acid core with a covering protein coat. It has the potential to replicate itself. A computer virus, on the other hand, is a small program having
DISEASE AND AILMENT
73
Attachment
j Introduction of ' iHral genetic matter into host cell,
Clean floppi,
Computer virus
I
Host cell genetic matter lost | Copies of viral genetic matter made
Infectea floppy
Virus spreads to otl
'oppy and hard disks
Host cell swarming until vims
Lysis of host cell ii'all and release of virus
T h e c o m p u t e r virus (right) replicates much like a biological virus (left)
74
HIS M A S T E R ' S S L A V E
a set of coded instructions to carry out the desired disorder and destruction, as also to replicate itself. Thus, both forms of viruses contain coded instructions to carry out a set of activities, when certain specified conditions are met. While a biological virus is characterized by its strain, each computer virus has its distinct signature. Similar to the biological counterpart, a computer virus has to replicate and multiply to survive. In both cases, a host is required to sustain the replication process. The replication process of a computer virus is very similar to that of a biological virus, where an animal or a human body acts as the host. A computer virus is first introduced by its creator on to a host — usually a floppy disk containing some useful programs. When that infected floppy is used in a desktop computer, the virus quietly moves either to an uninfected and clean floppy or to the hard disk. When the infected floppy or hard disk is used along with an uninfected floppy in a computer, the virus spreads itself again to infect the clean floppy. That is how it multiplies and replicates. However, unlike the biological viruses, all computer viruses are artificially created, with malicious intentions. The creators are knowledgeable human beings, sadly displaying a sadistic desire to extract some sort of fun at the cost of serious computer users. With the advancement in biotechnology and genetic engineering, it is possible to alter the strains of biological viruses to make them more or less potent. Likewise, it is not difficult to alter a computer virus. Therefore, several versions of the same computer virus have invaded the world computer scene. The only difference is that the altered versions of computer viruses are almost always more potent and harmful. As of August 1991, more than 600 computer viruses have been identified and named. Many of them happen to be aliases of some other more well known viruses. Even if these
DISEASE AND AILMENT
75
aliases are discounted, there are still more than 500 computer viruses which have already been identified. And, the list is growing every day!
Symptoms Fortunately, the virus infected host computer exhibits a set of symptoms characteristic of each virus. This makes it possible to diagnose the infection. Once infected, appropriate vaccines can be used as a cure. Similarly, preventive
The Trojan horse virus infection
76
HIS M A S T E R ' S S L A V E
measures against possible future infection may be carried out by means of suitable immunization processes. Viruses may be broadly divided into three types: Trojan horse, boot sector and file viruses. The most dangerous of them all is the Trojan horse virus. It is capable of destroying files or damaging disks much more severely than any other type of virus. Like the historical Trojan horse, this virus disguises itself as a genuine program, and hence is very hard to detect. The boot sector virus replaces a disk's original boot record with its own code. Remember, when your slave computer is first switched on, the ROM BIOS directs it to read the boot sector of the DOS system disk, which is the first location of the disk. In fact, whenever a floppy or hard disk is used, the computer first reads the boot sector. If that sector is infected, the virus signature would be read and stored into the RAM before anything else. If the signature is in the RAM, any subsequent operation would spread it to all floppy and hard disks. Almost all Trojan horse and boot sector viruses reduce the speed of your computer by substantially increasing the operation times. Viruses which affect the boot sector of a disk eventually result in totally damaging the disk with the consequent loss of all files. The file viruses mostly infect executable files. Infected executable files start behaving in a puzzling manner. Quite often, the lengths of infected files are increased by a preset amount, typical of the virus infecting them. In fact, an unaccountable increased length of an executable file is almost a sure sign of virus infection. There may be many possible infection symptoms. The symptoms may not always be apparent to the user. They depend on what the virus has been created for. Apparent symptoms vary from the regular flashing of funny messages
D I S E A S E A N D AILMENT
77
ori screen to the complete destruction of all files stored in a disk. However, most viruses manifest themselves in some apparent abnormality or suspicious activity. For example, if your computer suddenly starts flashing a message on the screen which says Stoned, Legalize Marijuana or Happy Birthday, you can be sure that the Stoned or Joshi virus has struck If you find that your computer continuously refuses to boot from the hard disk, chances are that the disk may have been infected. If you suspect that your PC is taking much longer time to execute certain programs, there is a likelihood that a virus must have infected your system. If during routine operation, your slave computer suddenly refuses to function (hangs up), a virus must have invaded. Such suspicious symptoms are more or less definitive indications of some virus having infected the system. There could be other questionable and unnatural symptoms as well. However, all viruses do not produce such obvious symptoms. Indeed, there is a virus called Do nothing virus which remains resident in the RAM and which slowly corrupts the programs and files. You may not be aware of its presence, till it is too late. Some viruses continuously go on increasing the infected file lengths. No other apparent or external symptoms are shown. Unless the infected files are regularly compared with the corresponding uninfected ones, you may not be aware of the virus attack till it is beyond your control. Some viruses alter commonly used internal DOS commands producing totally unexpected and damaging results. For instance, the internal COPY command is meant to copy a file from one disk to another disk or subdirectory. Some viruses are capable of altering this internal DOS command in such a way that, instead of copying, the command will actually erase the file. Such dangerous symptoms are not always easy to detect immediately, unless a qualified virus scanning program is used to check the disk.
HIS M A S T E R ' S S L A V E
78
Colourful Names Computer viruses have one interesting aspect. Unlike the biological viruses, most of these have been tagged with colourful names. Sometimes, when a new virus is detected by vigilant observers, it is named after its creator if that name is known. Human ego being what it is, some virus creators do advertise their names. Thus, viruses like Ashar and Joshi were so tagged. However, such cases are rare. In general, viruses tend to get named after the nature of damages they are capable of inflicting. For example, the Friday the 13th virus has been so named because of the irrecoverable damage it does on a friday which falls on the 13th
HISM
R'SS i
E V
The Raindrop virus attack
DISEASE AND AILMENT
79
of any month. Infection by this virus makes the .COM and .EXE files gradually increase in length, every time such a file is loaded in the memory. Program delays are slowly introduced, resulting in considerably slower processing speeds. If an infected file is loaded in the memory on any friday which falls on the 13th of a month, the file is totally erased. Similarly, there are the April 1st, April 15, Tuesday 1st and Black Monday viruses. The Raindrop or Falling Letters virus is so named because its attack is manifested in the sudden showering of characters on the screen, resulting in a spectacular visual effect. Similarly, we have names like AIDS, Happy New Year, Christmas, Armageddon, Beast, Blood, Disk Killer, Datacrime, Doctor and Joker. Often, viruses have been named after certain countries, places or political leaders, apparently due to some similarities. Thus, we have viruses like Alabama, Big Italian, Icelandic, Iraqi, Tel-Aviv, PLO, Jerusalem, Pakistani (same as Brain), India, Saddam, Kennedy, Hong Kong, Taiwan, Korea, City of Sofia, Lisbon, Vienna, Pentagon, New Zealand and Hawaii. Looking at the colourful and entertaining virus names one must admit that vigilant virus watchers certainly do not lack humour! •
Prevention and Cure But, there is nothing funny or humorous about this dangerous and lethal man-made virus menace. Days, months and years of labour can be destroyed and annihilated at the blink of an eye by this plague, unless precautionary and preventive measures are consciously taken to fight the menace. Fortunately, for serious computer users, as the number of psychotic virus creators increases all over the world, the number of alert virus watchers and immunizers is also growing.
HIS M A S T E R ' S S L A V E
80
Just as vaccines protect humans against diseases so do anti-virus programs counter computer viruses
Serious users must always be alert to counter this deadly disease. There are four'essential steps to achieve and sustain that alertness: *
All storage media must be occasionally scanned for possible virus infection. This should include all the
DISEASE AND AILMENT
81
suspicious activities which are not normally expected from our faithful slave computer. *
Mercilessly kill the virus if it is detected anywhere.
*
All preventive measures must be taken to safeguard the storage media. These would include the use of memory-resident virus detection and elimination programs, immunization of important files against subsequent attack and being suspicious and wary of other's floppy disks, even if these come from your closest friends or relatives.
*
All original uninfected programs must be stored in uninfected floppy disks. It should also be ensured that these floppies are so protected that nothing can ever be written on them.
There are some excellent virus scanning programs available in the market. These scanning programs work on the basis of a known characteristic of any virus. Each virus is identified by its specific signature, which consists of a series of bytes. If the signature is known, it becomes easy to detect the presence of the corresponding virus. A virus scanning program searches the storage disk for several such known signatures which have earlier been identified. In fact, some more qualified programs search for any suspicious or questionable activity on the disk. If the disk is infected or any suspicious activity detected, the scanning program cautions the user accordingly. It kills the virus and only then loads the disinfected file into RAM for further processing. If requested by the user, some highly complex anti-virus programs may also immunize selected disk files against all possible subsequent attacks. Thus, the most important requirement to fight the menace is to identify as many virus signatures as possible. Absence of some viruses does not necessarily mean the absence of others as well. Therefore, the primary task is to find out and collect the signatures of all viruses. To fight the virus menace
82
HIS M A S T E R ' S S L A V E
collectively, serious computer users must, therefore, exchange information on viruses as widely and freely as possible. The menace has undoubtedly come to stay, and there is a great need to prevent its spread. The only way one can do that is to join hands with others fighting the menace. Only through such a collective effort, we would be able to use our slave to' its fullest capacity.
Going Places
Master's Role
ay by day, the slave is getting more compact. No longer is it necessary for the slave to stay on the desktop. It is going places by faithfully following the master. Thanks to the revolutionary advancement in electronics, battery-powered laptop c o m p u t e r s , with a size smaller than a brief case, are being widely used. Travelling salesmen, businessmen and other professionals have found the laptop computer a boon in their daily chores. From the l a p t o p to the notebook (or palmtop) computer was a natural outcome. The slave is now being carried not as a brief case, but inside its master's pocket as a notebook, just like an electronic calculator. However, the latest entrant is the pen computer. It looks like a notebook computer. But, instead of a keyboard, a pen-like stylus is used to point to a task on the computer screen for the slave to act. It can also recognize its master's handwriting. Because it is easier for us to use a pen or a pencil, rather than a keyboard or mouse,
84
HIS M A S T E R ' S S L A V E
this i n n o v a t i o n has really been a blessing. But the l i m i t l e s s human brain is never satisfied in its pursuit for e x c e l l e n c e . T h e Japanese industry has already demonstrated s o m e p r o t o t y p e s of wearable personal computers. Such a computer is designed also to act as a personal adornment. The output and input devices may be worn like a wrist watch or as an atThelaptop tractive waist band. The wearer will have a thin tube running down the back-under the clothes, which would contain all other hardware. At present, such a c o m p u t e r has b e e n designed to do only a limited set of tasks. But, it is only a matter of time for it to learn more. By the beginning of the next century, the slave will perhaps be a constant c o m p a n i o n of the master as an attractive personal adornment. The master will be in a position to get every
*';.--
The pen computer
M A S T E R ' S ROLE
85
service while on the move — everything that is achieved today using a standard desktop personal computer.
Master's Initiative Indeed, by imparting the slave with skillful education and know-how, the human ingenuity has made it small in size and extremely powerful. But, there is always a limitation. The slave can learn up to a certain point and no more. Undoubtedly, its learning capability goes on increasing every day, as new and more powerful chips are developed. Yet, somewhere along the line, the slave will have to admit its failure and refuse to learn more. That is where the master has to make use of the limitless human intelligence and skill to overcome the refusal of the slave to learn more. Human ingenuity has so far overcome almost all problems arising out of its stubborn behaviour. Therefore, life has become easier for the computer users. However, in spite of the availability of several excellent facilities, it is necessary for us - the masters - to marshal many functional disciplines and work ethics, if we wish to handle this powerful slave gainfully. For example, we may need to know the precise spellings and formats of commands we wish to use. It is mandatory for us to be aware of how to feed in data and'information, when required. We need to understand and follow instructions, if any, which may appear on the screen during the processing of a given task. Even with the latest pen computer, we need to know how to use it correctly to get maximum out of our slave. While the masters' learning is undoubtedly essential, it is not the end in itself. In fact, it is just the beginning to continuously expand the capabilities of a powerful machine. A little additional learning makes the master adept in considerably reducing the drudgery, tedium and manual labour of many essential and useful activities.
86
HIS M A S T E R ' S S L A V E
Ingenuity of the human brain is yet unrivalled
The relief from drudgery may be so great that within a short time the master may subconsciously start depending completely on the slave. For instance, when the master becomes so indifferent as to command the slave to add two single digit numbers, which should best be done mentally, the dependence becomes total. Eventually, the master may start losing the faculty of independent thinking reaching an inevitable point of no return. Perhaps then, the master becomes the slave, and the slave the master!
Abacus: An ancient device used for counting. It utilizes the base five numbering system. Chip: Integration of thousands of electronic devices and components on a single, rectangular slice of silicon. It is the key to the microelectronic revolution in computers. Compatible: A computer which is operation and performance-wise similar to a computer of a well known make. Compile: To convert a source program to a program which a computer can recognize and understand. Disk drive: An electromechanical device similar to a cassette tape drive used to read/write on a storage device.Hard disk: A flat magnetic plate like a gramophone record used for storing data. Hardware: The physical parts of a computer that includes the mechanical, electrical and the electronic devices. Immunization: A process which induces resistance in the body against a disease. Input device: A device used by a computer user to enter data into the central processing unit of a computer. Magnetic tape: A plastic tape having a coated surface to store data in the from of magnetized regions. Microprocessor An integrated circuit that performs a variety of operations in accordance with a set of instructions. It is widely used as a control device for microcomputers, automobiles, household appliances and so on. Mouse: A device that fits in the palm of a hand and can be moved across a flat surface to control the movement of the cursor - a marker on the display screen which indicates the position where a specific operation is performed for formatting a page on DTP. A mouse generally has three buttons used
88
HIS M A S T E R ' S S L A V E
for different operations. It is an aid for those who have little or no typing skill. Output device: A device used in a computer to output the data to the computer user. Peripherals: All hardware other than the CPU in a computer. Program: A set of coded instructions that direct a computer to follow a given logical sequence to perform a particular task. Software: The combination of a set of programs and documentation that enables the computer to perform a set of defined tasks. Vaccines: Biological or chemical agents employed to evoke immunological memory against a disease. Similarly, in a computer, anti-virus programs counter computer viruses.
BRILLIANT
in scope, design, applica- . tion and performance, the Personal Computer(PC) is earning laurels for faultless service. Adept at perfectly and swiftly executing logical commands, in enhancing imaginative conceptualization and information retrieval, in blending precision with promptness while eliminating the tedium of routine, PCs are flawless slaves, skillful, compliant and willing provided the master instructs it in an appropriate yet authoritative manner. In the fast paced brave new world o f today, PCs are intrinsic to efficiency, versatility and success. This attractive and lavishly illustrated book, written especially for the nonspecialist, demystifies the core concepts of computers while highlighting the bond between the human master and his impeccably proficient inanimate slave. Against the backdrop of a canvas rich in detail unfolds the riveting story of a modern day genie of the bottle, the PC, truly his master's slave.
About the Author Dr Tapan Bhattacharya (b.1936) did his M.Sc.(Tech) in Radio Physics & Electronics from Calcutta University and M.S. and Ph.D. from Illinois Institute of Technology(IIT), Chicago, a s a fellow of the International Atomic Energy Agency and later a s a Research Assistant at IIT. Dr Bhattacharya was a trainee at the Trombay Training School of the Atomic Energy Establishment {now BARC). After that he served BARC a s a senior scientist for about 17 years and Central Electronics Ltd (CEL) as Project Manager, Group Manager and finally General Manager. Based in Delhi, Dr Bhattacharya is at present a consultant in ' photovoltaics, semiconductors and PC uses. . During his illustrious career Dr Bhattacharya. has worked on a very wide range of basic, applied and even technoeconomitf aspects of photovoltaics, semiconductors and semiconductor devices. He is the author of about 85 technical papers, reports, studies, etc. His Master's Slave is his first popular science monograph.
ISBN : 81-7236-018-5