SlideShare a Scribd company logo
Introduction to computers and
programming
Content
• Hardware
• Information storage
 RAM, ROM
 HD, DVD
• Display
 Images
 Characters (fonts)
• File system/type
 Encryption
 Compression
• Network
 Protocols
 Packets
• Programming
 Algorithm
 Pseudocode
 Flowchart
• Languages
• Source code
 Example
The computer
Internally
The connections
Information storage
• 1 bit
• 8 bits
• 16 bits
• 32 bits
• 64 bits
• bit (1 or 0)
• byte (octet) (28
)
• word (216
)
• double (232
)
• long double (264
)
Encoding information on a fixed element of length n with a
base b gives bn
non-redundant possibilities
Information coding
• Binary
 0 or 1
• Octal
 0-7
• Hexadecimal
 0-9+A-F
• Decimal
 0-9
• How to count
• 128+32+16+4+1=
 181 (decimal)
 265 (octal)
 B5 (hexadecimal)
• Signed vs unsigned
 0 to 255
 -127 to +127
128 64 32 16 8 4 2 1
1 0 1 1 0 1 0 1
Operations on bits
• Booleans:
 0 = false = no
 1 = true = yes
• Operators:
 AND
 OR
 XOR
 NOT
• Example tables
AN
D
0 1
0 0 0
1 0 1
OR 0 1
0 0 1
1 1 1
XO
R
0 1
0 0 1
1 1 0
RAM/ROM
Memory mapping
Address Values
0000
0001
0002
..
..
..
..
FFFF
• Size reminder:
• Kilobyte Kb 210
~103
• Megabyte Mb 220
~106
• Gigabyte Gb 230
~109
• Terabyte Tb 240
~1012
• Petabyte Pb 250
~1015
• …
1 0 1 1 1 0 0 1
0 0 0 0 1 1 1 1
1 1 1 0 0 0 1 1
0 0 1 0 0 1 0 0
HD/DVD
track
sector
head
Display
• Screen pixel or dots
• Color coding: 32 bits
• 1 pixel = 3 bytes of color (RGB)+1
byte alpha channel (transparency)
• 1600x1200x4bytes=7,5 Mb!
• Fonts
 Bitmap
 Vectors
 TrueType, OpenType,
PostScript
QuickTime™ et un
décompresseur TIFF (non compressé)
sont requis pour visionner cette image.
Keyboard/Mouse
• Each key (or combination
of keys) of the keyboard
sends a code to the
computer.
• The code is interpreted and
converted to the
corresponding ASCII or
Unicode number.
• The mouse movements
 1 to 4 bytes (vertical &
horizontal)
• Buttons
 Clicked, pressed, rolled
buttons
ASCII & Unicode
• ASCII 7/8 bits
• Unicode
 UTF-8/16/32 bits
 ISO-8859 (Latin)
• od -c od -h
•
Software layers
ROM
Hardware
Operating System
User Interface
Software
Files
CPU, RAM, HD, DVD
Word, scripts, mail, web browser…
Data (.doc, .mp3)
BIOS
Linux
CLI, X-Windows
Windows
Windows
MacOSX
Firmware
Quartz
File systems
• Method the OS uses to store information
 Storage unit, directories, subdirectories (Windows,
VMS)
 Single arborescence (Linux, MacOSX, all Unix)
• What exactly is a file?
 a piece of information (text, graphic, data, music
program, script)
 it is identified by a name and an logical address (or
path)
 other informations: date, size, type, creator,
ownership, physical address…
File system organisation
Disk 1 Disk 2
Directories
Subdirectories
Windows
DOCS PROGS
WORD EXCEL
CONFIG DATA
EXPT1 EXPT2
/
/usr /home
phil johnlocal
bin lib
emacs X11
Unix
D:C:
Disk 1
Disk 2
Path
• The path is the logical address used by
the system or the user to locate a file.
• Example:
/bd_du_Palais/35/etage/4/appart/12/Dupont_ Jean.txt
filename
suffix
path
File types
• Executable
 .exe
 .app
 Unix requires « x »
• Data
 Text (.txt)
 Music (.mp3)
 Image (.jpg, .gif)
 Movie (.mpg, .mov)
 Binary (.bin)
• Special cases in Unix
 STDIN
 STDOUT
 STDERR
Encryption / compression
• Compression
 Reducing the size of files
 E.g., .mp3, .gz, .jpg, .zip
• Encryption
 Protecting your privacy
 E.g., .pgp
• Packing
 Grouping the files
 E.g., .tar
Networks
• Direct
 USB 11Mb-480Mb
 Ethernet 10Mb-1Gb
• Wired
 Modem 56Kb
 ADSL 600Kb-8Mb
 LAN 10Mb-10Gb
• Wireless
 Bluetooth 1Mb-20Mb
 WIFI (AirPort) 11Mb-54Mb
Network (ethernet or wireless)
• Computer talk to each
other via network
protocols
 ip, tcp, http, ftp, …
• TCP/IP
 transmission control
protocol/internet protocol
• Handshaking
• Transmission
• Ackowledgement
• DNS
 Domain Name Server
• URL
 Universal Resource
Locator
• IP addess
 192.42.197.51
DNS reminder
Primary DNS
Root DNS
Local DNS
Client query Target server
1
2 3
45
6
www.expasy.org
129.194.8.64
*.org
dns.anywhere.net
client.anywhere.net
www.expasy.org ??
Packets
The data travels within
units called packets
Packet breakout
Usual TCP/IP payload per packet: 512 bytes
Introduction to programming
What is a program?
• How to cook?
• The algorithm
• Are you a programmer?
Pseudocode
• This is the pseudocode for a game of Monopoly
Flowcharts
Flowcharts details
Languages
• Low level (processor dependent)
 Machine code, assembler
• High level: structured, procedural
 Fortran, C, Pascal…
• High level: object oriented
 C++, Java, C#, Perl, Objective-C…
• Virtual machines
 Java, C#…
• Scripting
 Perl, Python, JavaScript…
Source code -> Object code
• Compiler+linker
 Fortran, C, Pascal, C++…
• Interpreter
 Basic, Perl…
• Intermediate
 Java
• Compiler+linker
 Fast to execute, but slow
to debug
• Interpreter
 Slow to execute, but fast
to debug (no need to
recompile)
• Intermediate
 Slow…
Source code
• Instructions
 Statement, blocks
 Affectation
 Operators
 Loops
 Tests
 Subroutines
 Comments
• Data structures
 Variable
 List
 Array
 Hash
 Pointers
 Objects
Source code (2)
• Statement, blocks
 One or more
instructions for the
processor
• Affectation
 Change to a variable
• Operator
 affect one or more
variable
 + * - / AND OR NOT…
• Variable
 A region in memory
that can be modified
 Exists in different
types
 Scalar, char, numeric,
boolean
 List, array
 Hash
 Combination->data
structure
Source code (3)
• Loops
 Allow the computer to
repeat blocks
• Tests
 Decide what to do
• Subroutines
 Programs frequently
called (functions)
• Comments
 The most important
lines of the source
code…
• Pointers
 Reference to region in
memory (address)
• Objects
 Combination of data
and code
Example: a text to treat
« Noon rings out. A wasp, making an ominous sound, a sound akin to a klaxon or a
tocsin, flits about. Augustus, who has had a bad night, sits up blinking and purblind. Oh
what was that word (is his thought) that ran through my brain all night, that idiotic word
that, hard as I'd try to pun it down, was always just an inch or two out of my grasp - fowl
or foul or Vow or Voyal? - a word in a quizz which, by association, brought into play an
incongruous mass and magma of nouns, idioms, slogans and sayings, a confusing,
amorphous outpouring which I sought in vain to control or turn off but which wound
around my mind a whirlwind of a cord, a whiplash of a cord, a cord that would split again
and again, would knit again and again, of words without communication or any possibility
of combination, words without pronunciation, signification or transcription but out of
which, notwithstanding, was brought forth a flux, a continuous, compact and lucid flow: an
intuition, a vacillating frisson of illumination as if caught in a flash of lightning or in a mist
abruptly rising to unshroud an obvious sign - but a sign, alas, that would last an instant
only to vanish for good. »
Gilbert Adair
Result…
a=97
b=15
c=26
d=35
f=23
g=32
h=44
i=90
j=1
k=5
l=33
m=17
n=91
o=104
p=15
q=1
r=43
s=59
t=77
u=52
v=4
w=31
x=2
y=13
z=2
Do you see any problem??
Try with this:
« The quick brown fox, jumps
over the lazy dog. »
Flowchart
Source code example
#!/usr/bin/perl -w # essential line of all perl scripts
$filename = "avoid.txt"; # affect « avoid.txt » to the variable $filename
# open the file, or exit
open(FILE, $filename) || die "Cannot open file ‘$filename’nn";
@text = <FILE>; # add each line of the file to an array
close FILE;
foreach $line (@text) { # read one line from the array into $line and repeat for each line
@table = split(//,$line); # read each character of the line in an array
while ($char=pop(@table)) { # read one character of the array 'table' and repeat for all
$char =~ s/[^a-z]//; # keep only the alphabetical character a to z
if ($char) { # check if the character exists and execute the block
$count{$char}++; # if yes, increment by one the hash 'count'
}
}
}
# print each character and its number of occurence one per line
foreach $c (keys %count) {
print "$c=$count{$c}n";
}
exit; # quit the program
Tips
• Think about your
problem
• Create a flowchart
• Create the
pseudocode
• Verify the memory
used by your
variables
• Write the code
• Test the code
 For all the possible
functions or cases (if
possible)
 Give it to users as a
beta (if not possibe)
 Sell it (if you work for
Microsoft©
… ;-)
• Debug
Summary of the week
• Monday
 Intro computers &
programming
 Intro Unix
 Tutorial Unix
• Tuesday
 Intro Perl
 Regexp & Perl In-liners
• Wednesday
 Object Oriented
programming
 BioPerl
 EMBOSS
• Thursday
 Database indexing
 BLAST
 HTML & cgi-bin
• Friday
 Finish exercises
 Users questions
Unix
• Next presentation…
VassiliosVassilios aliasalias
UnixMan!!!UnixMan!!!

More Related Content

PPT
Intro computer fundamentals
Prabhu Govind
 
PPT
introduction for computers
Yogesh Chaure
 
PPT
COMPUTER INTRODUCTION
Amit Sharma
 
PPT
R tech introcomputer
Rose Rajput
 
PPTX
Unix - Filters/Editors
ananthimurugesan
 
PPTX
Linux Fundamentals
DianaWhitney4
 
PDF
Perl Programming - 01 Basic Perl
Danairat Thanabodithammachari
 
ODP
Linux Introduction (Commands)
anandvaidya
 
Intro computer fundamentals
Prabhu Govind
 
introduction for computers
Yogesh Chaure
 
COMPUTER INTRODUCTION
Amit Sharma
 
R tech introcomputer
Rose Rajput
 
Unix - Filters/Editors
ananthimurugesan
 
Linux Fundamentals
DianaWhitney4
 
Perl Programming - 01 Basic Perl
Danairat Thanabodithammachari
 
Linux Introduction (Commands)
anandvaidya
 

What's hot (6)

PDF
Python build your security tools.pdf
TECHNOLOGY CONTROL CO.
 
PPT
A Quick Introduction to Linux
Tusharadri Sarkar
 
PDF
Unix command line concepts
Artem Nagornyi
 
PDF
Unleash your inner console cowboy
Kenneth Geisshirt
 
DOCX
Console comparsions
copelandadam
 
PPT
Dns
aimanqalla
 
Python build your security tools.pdf
TECHNOLOGY CONTROL CO.
 
A Quick Introduction to Linux
Tusharadri Sarkar
 
Unix command line concepts
Artem Nagornyi
 
Unleash your inner console cowboy
Kenneth Geisshirt
 
Console comparsions
copelandadam
 
Ad

Similar to Intro compute (20)

PPTX
Introduction to computers
VisualBee.com
 
PPTX
Introduction to Coding
St. Petersburg College
 
PPT
Savitch Ch 01
Terry Yoast
 
PPT
Savitch ch 01
Terry Yoast
 
PPT
Savitch ch 01
Terry Yoast
 
DOCX
Computer components
chrisjosewanjira
 
PDF
Ict topic 2
kwongliik
 
PPT
py4inf-01-intro.ppt
RosemeireArgentiniDe1
 
PPT
Computer Programming Computer Programming
arifhasan88
 
PPTX
Computer Fundamentals.pptx
JaimeCanchela1
 
PPT
Savitch_ch_01.ppt
DenisSuljakovic1
 
PPTX
Introduction to programming concepts
hermiraguilar
 
PPT
Introduction to Programming
Chaffey College
 
PPTX
Introduction to programming concepts
hermiraguilar
 
PDF
How to Interpret the Contents of Stored Memory Data
adil raja
 
PPT
Chapter 1.ppt
BakhitaSalman
 
PPT
computer programming introduction ppt.ppt
AlazarAlemayehu2
 
PDF
C progrmming
Shivam Singhal
 
PDF
6272 cnote
P Kiran Sree
 
PPT
Computer Basics Final.ppt
Pooja Nanda
 
Introduction to computers
VisualBee.com
 
Introduction to Coding
St. Petersburg College
 
Savitch Ch 01
Terry Yoast
 
Savitch ch 01
Terry Yoast
 
Savitch ch 01
Terry Yoast
 
Computer components
chrisjosewanjira
 
Ict topic 2
kwongliik
 
py4inf-01-intro.ppt
RosemeireArgentiniDe1
 
Computer Programming Computer Programming
arifhasan88
 
Computer Fundamentals.pptx
JaimeCanchela1
 
Savitch_ch_01.ppt
DenisSuljakovic1
 
Introduction to programming concepts
hermiraguilar
 
Introduction to Programming
Chaffey College
 
Introduction to programming concepts
hermiraguilar
 
How to Interpret the Contents of Stored Memory Data
adil raja
 
Chapter 1.ppt
BakhitaSalman
 
computer programming introduction ppt.ppt
AlazarAlemayehu2
 
C progrmming
Shivam Singhal
 
6272 cnote
P Kiran Sree
 
Computer Basics Final.ppt
Pooja Nanda
 
Ad

More from Usman Shah (20)

PPTX
Pneumatic and hydraulic conveying
Usman Shah
 
PPTX
Pelletization and granulation
Usman Shah
 
PPTX
Particulate technology (electrostatic precipitator)
Usman Shah
 
PPT
Particle size distribution
Usman Shah
 
PPT
Flow pattern of fluids
Usman Shah
 
PPTX
Cyclone separator
Usman Shah
 
PPTX
Belt conveyors and elevators
Usman Shah
 
DOCX
Assignment cre lab
Usman Shah
 
PPTX
Group 2
Usman Shah
 
PPTX
Group 1
Usman Shah
 
PPTX
Jamshaid ppt
Usman Shah
 
PPTX
Intro to reactor design
Usman Shah
 
PPTX
Differential method of analysis of data
Usman Shah
 
PPTX
Difference between batch,mixed flow &amp; plug-flow reactor
Usman Shah
 
PPTX
Cre24
Usman Shah
 
PPTX
Cre ppt
Usman Shah
 
PPTX
Cre ppt saud
Usman Shah
 
PPTX
Catalyst activation
Usman Shah
 
PPTX
Batch reactor designing
Usman Shah
 
PPT
What is cre
Usman Shah
 
Pneumatic and hydraulic conveying
Usman Shah
 
Pelletization and granulation
Usman Shah
 
Particulate technology (electrostatic precipitator)
Usman Shah
 
Particle size distribution
Usman Shah
 
Flow pattern of fluids
Usman Shah
 
Cyclone separator
Usman Shah
 
Belt conveyors and elevators
Usman Shah
 
Assignment cre lab
Usman Shah
 
Group 2
Usman Shah
 
Group 1
Usman Shah
 
Jamshaid ppt
Usman Shah
 
Intro to reactor design
Usman Shah
 
Differential method of analysis of data
Usman Shah
 
Difference between batch,mixed flow &amp; plug-flow reactor
Usman Shah
 
Cre24
Usman Shah
 
Cre ppt
Usman Shah
 
Cre ppt saud
Usman Shah
 
Catalyst activation
Usman Shah
 
Batch reactor designing
Usman Shah
 
What is cre
Usman Shah
 

Recently uploaded (20)

PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 

Intro compute

  • 1. Introduction to computers and programming
  • 2. Content • Hardware • Information storage  RAM, ROM  HD, DVD • Display  Images  Characters (fonts) • File system/type  Encryption  Compression • Network  Protocols  Packets • Programming  Algorithm  Pseudocode  Flowchart • Languages • Source code  Example
  • 6. Information storage • 1 bit • 8 bits • 16 bits • 32 bits • 64 bits • bit (1 or 0) • byte (octet) (28 ) • word (216 ) • double (232 ) • long double (264 ) Encoding information on a fixed element of length n with a base b gives bn non-redundant possibilities
  • 7. Information coding • Binary  0 or 1 • Octal  0-7 • Hexadecimal  0-9+A-F • Decimal  0-9 • How to count • 128+32+16+4+1=  181 (decimal)  265 (octal)  B5 (hexadecimal) • Signed vs unsigned  0 to 255  -127 to +127 128 64 32 16 8 4 2 1 1 0 1 1 0 1 0 1
  • 8. Operations on bits • Booleans:  0 = false = no  1 = true = yes • Operators:  AND  OR  XOR  NOT • Example tables AN D 0 1 0 0 0 1 0 1 OR 0 1 0 0 1 1 1 1 XO R 0 1 0 0 1 1 1 0
  • 9. RAM/ROM Memory mapping Address Values 0000 0001 0002 .. .. .. .. FFFF • Size reminder: • Kilobyte Kb 210 ~103 • Megabyte Mb 220 ~106 • Gigabyte Gb 230 ~109 • Terabyte Tb 240 ~1012 • Petabyte Pb 250 ~1015 • … 1 0 1 1 1 0 0 1 0 0 0 0 1 1 1 1 1 1 1 0 0 0 1 1 0 0 1 0 0 1 0 0
  • 11. Display • Screen pixel or dots • Color coding: 32 bits • 1 pixel = 3 bytes of color (RGB)+1 byte alpha channel (transparency) • 1600x1200x4bytes=7,5 Mb! • Fonts  Bitmap  Vectors  TrueType, OpenType, PostScript QuickTime™ et un décompresseur TIFF (non compressé) sont requis pour visionner cette image.
  • 12. Keyboard/Mouse • Each key (or combination of keys) of the keyboard sends a code to the computer. • The code is interpreted and converted to the corresponding ASCII or Unicode number. • The mouse movements  1 to 4 bytes (vertical & horizontal) • Buttons  Clicked, pressed, rolled buttons
  • 13. ASCII & Unicode • ASCII 7/8 bits • Unicode  UTF-8/16/32 bits  ISO-8859 (Latin) • od -c od -h •
  • 14. Software layers ROM Hardware Operating System User Interface Software Files CPU, RAM, HD, DVD Word, scripts, mail, web browser… Data (.doc, .mp3) BIOS Linux CLI, X-Windows Windows Windows MacOSX Firmware Quartz
  • 15. File systems • Method the OS uses to store information  Storage unit, directories, subdirectories (Windows, VMS)  Single arborescence (Linux, MacOSX, all Unix) • What exactly is a file?  a piece of information (text, graphic, data, music program, script)  it is identified by a name and an logical address (or path)  other informations: date, size, type, creator, ownership, physical address…
  • 16. File system organisation Disk 1 Disk 2 Directories Subdirectories Windows DOCS PROGS WORD EXCEL CONFIG DATA EXPT1 EXPT2 / /usr /home phil johnlocal bin lib emacs X11 Unix D:C: Disk 1 Disk 2
  • 17. Path • The path is the logical address used by the system or the user to locate a file. • Example: /bd_du_Palais/35/etage/4/appart/12/Dupont_ Jean.txt filename suffix path
  • 18. File types • Executable  .exe  .app  Unix requires « x » • Data  Text (.txt)  Music (.mp3)  Image (.jpg, .gif)  Movie (.mpg, .mov)  Binary (.bin) • Special cases in Unix  STDIN  STDOUT  STDERR
  • 19. Encryption / compression • Compression  Reducing the size of files  E.g., .mp3, .gz, .jpg, .zip • Encryption  Protecting your privacy  E.g., .pgp • Packing  Grouping the files  E.g., .tar
  • 20. Networks • Direct  USB 11Mb-480Mb  Ethernet 10Mb-1Gb • Wired  Modem 56Kb  ADSL 600Kb-8Mb  LAN 10Mb-10Gb • Wireless  Bluetooth 1Mb-20Mb  WIFI (AirPort) 11Mb-54Mb
  • 21. Network (ethernet or wireless) • Computer talk to each other via network protocols  ip, tcp, http, ftp, … • TCP/IP  transmission control protocol/internet protocol • Handshaking • Transmission • Ackowledgement • DNS  Domain Name Server • URL  Universal Resource Locator • IP addess  192.42.197.51
  • 22. DNS reminder Primary DNS Root DNS Local DNS Client query Target server 1 2 3 45 6 www.expasy.org 129.194.8.64 *.org dns.anywhere.net client.anywhere.net www.expasy.org ??
  • 23. Packets The data travels within units called packets
  • 24. Packet breakout Usual TCP/IP payload per packet: 512 bytes
  • 26. What is a program? • How to cook? • The algorithm • Are you a programmer?
  • 27. Pseudocode • This is the pseudocode for a game of Monopoly
  • 30. Languages • Low level (processor dependent)  Machine code, assembler • High level: structured, procedural  Fortran, C, Pascal… • High level: object oriented  C++, Java, C#, Perl, Objective-C… • Virtual machines  Java, C#… • Scripting  Perl, Python, JavaScript…
  • 31. Source code -> Object code • Compiler+linker  Fortran, C, Pascal, C++… • Interpreter  Basic, Perl… • Intermediate  Java • Compiler+linker  Fast to execute, but slow to debug • Interpreter  Slow to execute, but fast to debug (no need to recompile) • Intermediate  Slow…
  • 32. Source code • Instructions  Statement, blocks  Affectation  Operators  Loops  Tests  Subroutines  Comments • Data structures  Variable  List  Array  Hash  Pointers  Objects
  • 33. Source code (2) • Statement, blocks  One or more instructions for the processor • Affectation  Change to a variable • Operator  affect one or more variable  + * - / AND OR NOT… • Variable  A region in memory that can be modified  Exists in different types  Scalar, char, numeric, boolean  List, array  Hash  Combination->data structure
  • 34. Source code (3) • Loops  Allow the computer to repeat blocks • Tests  Decide what to do • Subroutines  Programs frequently called (functions) • Comments  The most important lines of the source code… • Pointers  Reference to region in memory (address) • Objects  Combination of data and code
  • 35. Example: a text to treat « Noon rings out. A wasp, making an ominous sound, a sound akin to a klaxon or a tocsin, flits about. Augustus, who has had a bad night, sits up blinking and purblind. Oh what was that word (is his thought) that ran through my brain all night, that idiotic word that, hard as I'd try to pun it down, was always just an inch or two out of my grasp - fowl or foul or Vow or Voyal? - a word in a quizz which, by association, brought into play an incongruous mass and magma of nouns, idioms, slogans and sayings, a confusing, amorphous outpouring which I sought in vain to control or turn off but which wound around my mind a whirlwind of a cord, a whiplash of a cord, a cord that would split again and again, would knit again and again, of words without communication or any possibility of combination, words without pronunciation, signification or transcription but out of which, notwithstanding, was brought forth a flux, a continuous, compact and lucid flow: an intuition, a vacillating frisson of illumination as if caught in a flash of lightning or in a mist abruptly rising to unshroud an obvious sign - but a sign, alas, that would last an instant only to vanish for good. » Gilbert Adair
  • 38. Source code example #!/usr/bin/perl -w # essential line of all perl scripts $filename = "avoid.txt"; # affect « avoid.txt » to the variable $filename # open the file, or exit open(FILE, $filename) || die "Cannot open file ‘$filename’nn"; @text = <FILE>; # add each line of the file to an array close FILE; foreach $line (@text) { # read one line from the array into $line and repeat for each line @table = split(//,$line); # read each character of the line in an array while ($char=pop(@table)) { # read one character of the array 'table' and repeat for all $char =~ s/[^a-z]//; # keep only the alphabetical character a to z if ($char) { # check if the character exists and execute the block $count{$char}++; # if yes, increment by one the hash 'count' } } } # print each character and its number of occurence one per line foreach $c (keys %count) { print "$c=$count{$c}n"; } exit; # quit the program
  • 39. Tips • Think about your problem • Create a flowchart • Create the pseudocode • Verify the memory used by your variables • Write the code • Test the code  For all the possible functions or cases (if possible)  Give it to users as a beta (if not possibe)  Sell it (if you work for Microsoft© … ;-) • Debug
  • 40. Summary of the week • Monday  Intro computers & programming  Intro Unix  Tutorial Unix • Tuesday  Intro Perl  Regexp & Perl In-liners • Wednesday  Object Oriented programming  BioPerl  EMBOSS • Thursday  Database indexing  BLAST  HTML & cgi-bin • Friday  Finish exercises  Users questions
  • 41. Unix • Next presentation… VassiliosVassilios aliasalias UnixMan!!!UnixMan!!!