0% found this document useful (0 votes)
55 views91 pages

Book-Notes H

b

Uploaded by

sc435009101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
55 views91 pages

Book-Notes H

b

Uploaded by

sc435009101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 91
Computer Basics A computer is a machine that changes information from one form into another by performing four basic actions. Those actions are input, processing, output, and storage. Together, these actions make up the information processing cycle. By following a set of instructions, called a program, the computer turns raw data into organized information that Input raw data i) information processing people can use 1- Input entered raw data into a computer. This data can be as simple as letters and numbers or 1 oO as complex as color photographs, videos.Bit is Br short for binary digit. Each bit is a number, or a digit. A bit can have only two possible values—O --—_-computersonly understand 1s and 0s — orl binary Byte is group of eight. Each group is called a byte. the letter Ais coded as 01000001 * Akilobyte, or 1KB, is 1 thousand bytes. 1024 Bytes = 1KB + Amegabyte, or 1MB, is 1 million bytes. 1024 KB=1MB * gigabyte, or 1GB, is 1 billion bytes. 1024MB= 16GB * Aterabyte, or 1TB, is 1 thousand billion bytes. 1024GB=1TB Apetabyte, or 1PB, is one million gigabytes 1024TB=1PB Decimal 0123456789 Hexadecimal 0123456789 ABCDEF 0000 0100 4 04 Decimal HEXADECIMAL o aAMOOD>PLMOVHAHAYNE HEXADECIMAL VALUES Color can be represented by a three-byte combination where each byte represents the red, green, or blue (RGB) component of the displayed color. Decimal -> 0 to 256, since there are 256 possible RGB is 6-digit hexadecimal value The hexadecimal for white is FFFFFF, or complete intensity of all three colors, and black is 0000000. red, green, or blue (RGB) DIGITIZING TEXT + American Standard Code for Information Interchange (ASCII) is a common system, or character set, for coding letters that uses 8 bits. + Unicode, which uses 16 bits, is another. 66 42 01000010 a#66; ne PQ Rs T 67 43 01000011 #67; Capital c és 44 01000100 EE: Gapitld abe 6 D 69 45 01000101 ewes: Capital 70 46 01000110 F 71 47 01000111 @#71; 72 48 01001000 H: Capital H 73 49 01001001 I Capital 74 4A 01001010 J 3 Capital J 75 48 01001011 K K Capital K Capital F conta Latin Capital ; Letter D > iH} i Uicodenartes EEN Hrecose EY ~ [Ble ln el lela “ ASCIL Unicode 2- Processing The second step of the information processing cycle is called processing. In this step, the computer carries out a task using the data. CODED INSTRUCTIONS What the computer does depends on the instructions, or program, given to the computer. SPEED OF PROCESSING Computers can process data very rapidly, performing millions of operations every second. The ability to process data with lightning speed is another reason computers are so valuable. 3- Output The third step, output, is the result of the computer's processing presented to the user. To create output, the computer takes the bytes and turns them back into a form you can understand, such as an image on the screen 4- Storage The fourth operation is storage, which is the action by which a computer saves information.Computers have temporary memory chips used to store data during the processing stage RAM or permanent form on a device such as a hard drive. Every computer is composed of two basic components: 1- hardware includes the Physical features, which are every part that you can either see or touch. 2. Software includes all of the programs that tell a computer what to do and how to do it. oti CINE Terie) er ert Cras PC power supply Alternating current (AC) : the electricity travels in one direction and then reverses direction. Computers plug into the same type of AC outlet that other appliances use, but once the current reaches the computer's power supply it is converted to DC Direct current. That's because the internal computer components require DC. Direct Current (DC) Alternating Current (AC) Hardware- motherboard It contains the computer's basic circuitry and components. It has a socket for the CPU, RAM and expansion part (sound cards, graphic cards) and also connects together the CPU, memory, hard drives, optical drives, video card and more. A computer bus, also referred to as “the bus," is the path on the PC's motherboard to transfer data to and from the CPU and other PC components or PCs motherboard Hardware- motherboard An expansion card is an electronic circuit board that adds more functionality to a desktop computer. These cards are installed into the expansion slot of a computer motherboard, and they allow the computer to perform additional functions not offered by the motherboard. Video cards and sound cards are common example. + Serial ports move data one bit at a time. + Parallel ports move data in groups Serlal Communication Fa Comma ETHERNET PORTS AND CONNECTORS Ethernet is the most common networking technology used for local area networks (LANs) High-Definition Multimedia Interface (HDMI) is a digital cable standard for audio and video transmission. Each port is designed to accept a specific connector, so most connectors only fit into ‘one type of port. Hardware- CPU The most important piece of hardware in a computer is the central processing unit, or CPU. This is the device that processes data. The CPU is a small, thin piece of silicon attached to a circuit board in placed called socket. The (CPU) consists of : + control unit (CU) + arithmetic logic unit (ALU) Processor speed (CLOCK SPEED) measures in gigahertz - GHz means the number of instructions per second the computer executes, MULTICORE PROCESSORS Multicore processors have two or more CPUs so they can process data faster. dual core processor (two CPUs), and quad core processors (four CPUs). The more cores on the CPU, the higher the price. 7 Hardware— RAM The CPU temporarily stores the instructions and data it is using on RAM (random access memory) Because programs today are complex, they need a large amount of RAM to run. The amount of time that it takes RAM to receive a request from the processor and then read or write data is called memory speed. Like CPU processing speed, RAM speed is measured in MHz. it depend ona constant supply of power to keep their contents and when the power is lost, the RAM lose their contents. Memory [OTOTTTO] Location @ THDIOOTT Location 1) Datatomemery [OTOIOGTT (Location 3 000 10000 | (Location forint] TOTONTTO THOTT Toow tT TOTO TooTaOOT 00111110 | (Location 10) 12 Hardware— ROM ROM A second kind of memory is called read-only memory, or ROM. These chips contain the instructions that start the computer when you turn it on. The instructions in ROM typically do not change once this memory is placed on the motherboard. ‘THE BOOT PROCESS When you turn the computer on, you boot it. The first thing you see is the BIOS screen. Recall that BIOS stands for basic input/output system, and it manages and configures the computer's hardware. ‘THE POWER-ON SELF TEST As a computer boots, it performs a series of tests called the power-on self test (POST). During POST, the BIOS or UEFI (Unified Extensible Firmware Interface) checks the major components of the system, such as its memory, keyboard, and hard drive. It does this in part by reading information stored on the CMOS chip. CMOS, which stands for Complementary Metal-Oxide Semiconductor, is a battery-powered memory chip on the motherboard that stores information about the computer components. 13 Computer memory: Save sett — —_ = rou Boot BIOS ROM is nonvolatile memory, which means it stores its contents permanently, even when the computer is turned off. Recall that RAM, on the other hand, is volatile memory and only stores its contents temporarily; if the computer loses power, RAM's contents are lost. Some activities that decrease available device RAM memory include: + Running multiple programs at the same time. * Leaving device running for a long period of time without rebooting. + Running programs that use a lot of multimedia or 3D. + Undetected viruses or malware Programs running in the background 14 You can increase available device memory by + closing programs, you are not using. * rebooting the system, + using an antivirusand malware utility + You can identify and close or disable background programs using the Windows Task Manager or the Mac Activity Monitor. + Onsome devices, you may be able to install additional RAM chips. + If there is not enough RAM to hold the data, the CPU uses virtual memory is actually storage space on the hard disk that can function as memory when needed 15 Hardware- HDD Ahard disk drive (HDD) is data storage device that stores and retrieves di tal data using magnetic storage with one or more platters with magnetic material. HDDs are a type of non-volatile storage, retaining stored data when powered off. Parts of a Hard Drive PLATTERS a stack of metal disks that store information.The platters are storage media. Each platter is divided into tracks, or a set of circles on the surface of the platter, on which the data is recorded. Each track is divided into segments, called sectors. A cylinder is the same track location on all the stacked platters. READ/WRITE HEADS A small, needle-like component, called the read/write head, travels back and forth across the surface of each platter, retrieving and storing data. ZA = Ss CT] 16 Hardware— SSD SOLID STATE STORAGE A solid state disk (SSD) stores data on an array of flash memory chips organized as a disk drive. SSDs can access data faster than optical drives because they can read data directly from a specific flash SSD cell location. Unlike magnetic and optical drives, SSDs have no moving parts, SSDs are also quieter than hard disk drives, and lighter, which makes them suitable for ultralight notebook computers, Internal and External Storage A storage device installed inside your computer is called an internal storage device. One that is positioned outside your computer is referred to as an external storage device, EXTERNAL MAGNETIC DEVICES Other forms of magnetic storage devices include a variety of USB external hard drives. These can hold up to as much as 4 terabytes of data, and they are portable. (Solid Stote Drive) SSD vs HDD (Hord Disk Drive) 17 Hardware— Optical storage use laser beams to read information that has been stored on the reflective surface of a disc. These are called optical storage devices. Popular types of -> Compact discs (CDs), digital video discs (DVDs), and Blu-ray Discs (BDs) are optical storage devices. CD can store 650 to 700 megabytes of data. DVDs can store anywhere from 4.7 gigabytes to double that amount if the DVD is double-sided. Blu-ray Discs hold from 25 gigabytes to 128 gigabytes. Optical discs are made up of three layers. The bottom layer is a clear plastic. The middle layer is a thin sheet of aluminum. The top layer is a lacquer coating that protects the disc from scratches and dust.. LANDS AND PITS The surface of an optical disc stores data as a series of lands and pits. A land is a flat, reflective area on the surface of a disc. Lands reflect light from a laser's sensor and are recorded as a 1 by a computer. A pit is an indented area on the surface of a disc. Since no light is reflected by a pit, it is recorded as a 0. Land Land Land Land Land Yd 4 “LI itt Ww (000100001000001001001000001000000001010000 = -_ = I i) t A 18 Hardware—CPU vs RAM vs Hard disk CPU vs RAM vs Hard disk Factors that impact computer performance include processing speed, memory speed and size, and storage device speed and size. Hardware - Peripherals For most desktop systems, input devices, such as the keyboard and mouse, are separate from the case. So are output devices, such as monitors and printers. Hardware that is separate but can be connected to the case is called a peripheral. Not all computers have all this equipment as peripherals. Apple’s iMac® computers include the monitor as a physical part of the main system. Other computers may have built-in storage devices. Portable computers, such as laptops, have the keyboard, a touchpad, and a monitor all attached to the main unit. 19 Types of Computers Group Computer - Individuals Computer SUPERCOMPUTERS The largest and most powerful computers can process huge amounts of data very quickly. perform millions upon millions of calculations a second. The organizations using supercomputers do very complex work, such as forecasting the weather or creating detailed models of nuclear reactions. the most expensive. MAINFRAMES The mainframe is another type of computer used by government agencies and large corporations. Mainframe computers are used in centralized computing systems as the storage location for all or most of the data. For example, airline company employees use mainframes. The trend now is to replace mainframes with servers. SERVERS Most organizations connect their computers together in a network. All the computers that are part of the network are connected to a computer called a server. The server stores data and programs that people on the network can use on their personal computers. A computer connected to a network, called the host, uses a special program, called the client, to contact the server and get data from it. Unlike terminals, computers on a network can have their own disk storage, but the main source of data for the network is still the server. Types of Computers Group Computer - Individuals Computer WORKSTATIONS The most powerful and expensive personal computers are workstations. PERSONAL COMPUTERS Most individuals use personal computers to do everyday jobs more quickly and easily. Desktop computers are personal computers. Desktop computers may be connected to a network, or they may be standalone, which means they are not connected to any network. Small portable computers such as laptops and notebooks are as powerful as a desktop but can be easily carried around, Tablet computers are small, portable computers that have a flat panel display. The display is usually a touchscreen, which can be used with a finger or a stylus. SMARTPHONES A smartphone is 2 telephone with computing capabilities. Smartphones provide internet access using 3G, 4G, or Wi-Fi technology. Smartphones have built-in devices such as cameras, microphones, and speakers. EBs SKIOP Hybrid Netbook Espen Computer 24 Input and Output devices Input devices Input Devices Input means entering data, such as text, images, or sounds. Computer users can choose from several different input devices. Four basic types of input: 1, Data - Words, numbers, images, and sounds. 2. SOFTWARE INSTRUCTIONS - launching a program moves it into the computer's RAM. That makes the program availableto the CPU—and to you. 3. USER COMMANDS A command is an instruction that tells a software program what action to perform. For example, to open a program, save your work, or close a program, you must issue a command to the computer. RESPONSES - if you try to close a program without saving your work, the program will ask if you want to saveit. Before you can continue, you must input a response. 22 Input and Output devices Input devices TEXT AND COMMANDS Perhaps the most basic input device is the keyboard. speech-recognition software, users can input text by speaking into a microphone. handwriting-recognition software, users can input text by writing with a stylus directly on a device such as a tablet or screen. The software changes the words into digital data the computer can read. This software can be used by people with disabilitiesthat prevent them from typing. A mouse moves @ pointer on the monitor, which allows you to move around a document, or to select commands. A trackball, touchpad, or trackpad function similarly to a mouse. A touchscreen lets you input some commands by touching the monitor directly. motion- recognition software programs that let you input some commands by moving your hand across the display or by looking at a location on the screen. A joystick, often used in computer games, is yet another input device. 23 Input and Output devices Input devices Digital cameras for capturing and inputting photos and videos. digital camera, a computer chip takes the information from the lens and records it as pixels, or small dots, that form the image. global positioning systems (GPS) used to input maps and locations. MICROPHONE To input sounds. Scanners are devices that convert printed content into digital format so you can save it as a file on your computer. MICROPHONE via an audio interface or another analog-to-digital converter ee SUE sound card reduces the size of sound files by compressing the data. That way, the files take up less space in memory Scanner Most scanners have optical character recognition (OCR) software. When you scan printed text using this software, the text is turned into a digital text file, not an image file. Types of scanners: (sheet fed scanner, you insert the pages you want copied and the scanner pulls them through one at a time.) (Flatbed scanners work more like copy machines) (Handheld scanners are portable) 24 Input and Output devices Input devices Inputting Video videos must be in digital format. Common video file formats include MP4, AVI, and FLV. Connected to computer using a USB port. Some may have the ability to connect using wireless technology such as Bluetooth. To convert analog videos to digital format, 2 computer needs a video capture card, Like a sound card, this type of circuit board changes video images into a digital file. These cards also compress files so they occupy less disk space. Compressing a file may affect the quality, It also has its own memory, called video memory or VRAM, to free up space in the computer's memory. The video adapter card is installed on the motherboard. It processes video data for display on the monitor, allowingthe CPU and RAM to handle other tasks. GPU (graphics processing unit) 25 Input and Output devices Output devices An output device is any piece of hardware that displays or plays back the result of computer processing in one of the four forms of output. There are four types of output: text, graphics, video, and audio. MONITORS Both text and images are displayed on the monitor (OUTPUT IS CALLED SOFT COPY). Screen-magnifier software can make images on the monitor much larger for people who have difficulty seeing. + LCDs are very light and have a flat screen. They use little power Also, there are now two different techniques for producing color: thin film transistor (TFT) and passive matrix technology. TFT produces sharper color and images, so it is becoming the standard. + CRTS An older type of monitor is the cathode ray tube (CRT). these monitors are not only heavy and take up a lot of desk space, but they also heat up easily. CRTs use more electricity than LCDs. 26 Input and Output devices Output devices Printers A printer makes a paper copy of the display shown on a monitor. (OUTPUT IS CALLED HARD COPY) Types of Printers: 1. NONIMPACT PRINTERS Most computer users today use inkjet and laser printers to produce paper copies. Inkjet printers make images by spraying a fine stream of ink onto the paper. Laser printers use a powder called toner and operate like a copy machine, Both inkjet and laser printers are available in all-in-one versions that add fax, copier, and scanner capabilitiesat a very low cost. 2, IMPACT PRINTERS Dot matrix printers are a kind of impact printer that uses hammers or pins to press an ink-covered ribbon, They are noisy and the image quality is poor, but some are still used in businesses to provide copies of multi-part forms, like invoices. 3. The best printer for printing color images is a thermal transfer printer. 7 Input and Output devices Output devices Outputting Video DATA PROJECTORS : Digital light processing, or DLP, projectors use millions of tiny mirrors to create a very sharp image. DLP projectors can be used with large audiences. TELEVISIONS Some devices let you send video from a computer to a television. Many people find that their high-definition television (HDTV) makes an excellent output device. Outputting Sound To output sound to headphones or speakers, your computer must have @ sound card and speakers. The sound card changes digital sound files stored in the computer's I current. It sends that current to the speakers to produce audio memory into an elec output. Screen-magnifier software : can make images on the monitor much larger for people who have difficulty seeing. Braille printers can also provide output in a format some people with visual disabilities can read. Windows has a feature called Show Sounds. When activated, this feature shows a visual symbol when it plays a sound and displays spoken words as text. This feature can help people who have hearing difficulties. 28 Hardware-Storage Media and Storage Devices Storage Media and Storage Devices Storage has two components: 1- storage media. 2. storage devices STORAGE MEDIA In terms of storage, a medium is an object that physically holds data or program instructions. Flash memory, hard disks, magnetic tapes, compact discs, DVDs, and Blu- ray discs are examples of storage media. STORAGE DEVICES is a piece of hardware that holds the storage medium, sends data to the medium, and retrieves data from the medium. Hard drives, flash drives, and CD and DVD drives. STORAGE DEVICE STORAGE MEDIA 29 Hardware—SECONDARY STORAGE SECONDARY STORAGE DEVICES Other pieces of storage hardware are secondary storage. The following devices let you store data permanently—even when the computer is turned off. + Hard drives or External hard drives + Compact discs (CDs), digital video discs (DVDs), and Blu-ray Discs (BDs) are optical storage devices. + Cloud storage is online storage offered on various websites. + Memory cards store data for mobile devices like smartphones and digital cameras, Some memory cards can store up to 2 terabytes. ‘A computer stores data and program instructions in files. A file is a collection of related information or program code, which has been given a unique name. The type of file people most. often use is called a document, A document can be any kind of file that a user can create, save, and edit. A digital photois another type of document SECONDARY STORAGE CAPACITY 1. Hard disk drives hold the most data. 2. Thumb or flash drives hold the next largest amount of data. 3. CDs and DVDs hold the least amount of data. 50 Hardware—STORAGE Categories of Storage Devices (but not RAM) are divided into three categories: 1- READ-ONLY VERSUS READ/WRITE : A read-only device can only read data from the storage medium. You cannot change the data on the medium or save new data onto it. A CD-ROM drive or CD-R are an examples of a read-only device. Standard DVD players are another example of a read-only device. A read/write device not only can read data from the storage medium, but can write data onto the medium, as well. Hard drives, USB flash drives, CD-Rewritable drives (CD-RW), and DVD-RAM drives are commonly used examples of read/write devices. 2- SEQUENTIAL VERSUS RANDOM ACCESS : sequential storage device requires the computer to scan from the beginning of the medium to the end until it finds the data it needs such as tape drive. It is slow and cheap than other types of storage. It used to backup the data because it is provided high capacity, A random access storage device lets a computer go directly to the needed information. devices are much faster, and more expensive, A hard drive is an example of a random access storage device. CD-R Sequential access v T 99934 Paaeeve Random access 34 Hardware-STORAGE Categories of Storage Devices (but not RAM) are divided into three categories: 3- MAGNETIC STORAGE vs Optical Storage Magnetic storage devices are specially treated disks or tapes, such as those mentioned previously, that record information using magnetically sensitive materials, Example -> hard drives and tape drives. . Optical Storage A laser then scans the disc and changes the data into a form the computer can work with. CDs, DVDs, and Blu-ray Discs A laser sensor starts to read from the center of the disc’s spirals and moves outward. Limitations of Hard Drives The amount of information a hard drive can hold depends on several factors. the number of platters contained in the hard drive. The greater the number of platters, the more information a drive can store. the number of read/write heads. Generally, there is a read/write head for each side of each platter. However, sometimes one side of one platter will not have its own read/write head. That means information cannot be stored on that side. 32 Hardware—STORAGE EFFECTS OF PERFORMANCE The faster the hard drive, the faster your computer will read and write data. The platters in most hard drives can spin at a rate of 7,500 rpm (revolutions per minute), but some can spin at rates as high as 15,000 rpm. HARD DRIVE SPEED This is measured by its access time, the amount of time it takes for the device to begin reading the data. All storage devices are significantly slower than RAM. RAM speed is measured in nanoseconds, or billionths of a second. A storage device's speed is measured in milliseconds, or thousandths of a second. SSDs have better read performance because the data does not get fragmented into many locations, SSDs do have disadvantages, though. They cost more per gigabyte. Their limited number of write cycles means their performance declines over time. FLASH MEMORY DEVICES flash memory offer the speed of memory with the high capacity of a magnetic storage device. (faster) - > because they have no moving parts, and they do not require battery power to retain their data. these drives offer the advantages of speed, capacity, and cost. A USB flash drive has a USB connector that plugs into the USB port on a computer 33 Every computer is composed of two basic components: 1- hardware includes the Physical features, which are every part that you can either see or touch. 2. Software includes all of the programs that tell a computer what to do and how to do it. oti CINE Terie) er ert Cras 34 Software What Is Software? hardware is useless without software. Software includes all of the programs that tell a computer what to do and how to doit. Types of Software : Software + system software includes programs that help the computer work. There are two types of system software: 1, Operating systems (OS) lets the hardware devices communicate with one another and keeps them running efficiently, It also supports the hardware when applications programs are running. \__ 7 35, 2. utility software usually do maintenance and repair jobs that the operatingsystem cannot do itself. + application software : programs designed to help you do tasks such as writing a paper or makinga graph Software - Operating System An operating system (0S) is a set of instructions designed to work with a specific type of computer, such as Windows 10 for a PC or macOS for a Mac. The OS controls all the computer's functions. It also provides an interface, the on-screen tools you use to interact with the computer and your programs. The operating system performs several tasks: + Manages the (CPU) so that processing tasks are done. + Manages computer memory. + Manages files stored on the computer's disks. + Manages input and output devices. + Loads application programsinto memory. + Providing the user interface: organizing and displaying the options you see on your screen when you turn on your computer. AVOIDING CONFLICTS In most computers, especially personal computers, the operating system is stored on the hard drive. Before you can use the computer, a portion of the operating system must be loaded into memory. conflicts can occur when two programs try to occupy the same space in RAM. When this happens, one or both of the programs may crash, or stop working, until the conflictis resolved. 36 Software - Operating System. VERSIONING, UPDATES, AND UPGRADES Fix problems or make improvements is called update and usually delivered for free. Upgrade introduces new features and user need to buy it. Versioning is the process of numbering different releases of a particular software For example, release 1.0 might be the first version of the product UPGRADE. Release 1.1 might be an update first update. There are four kinds of operating systems: 1. REAL-TIME SYSTEMS are used to control large equipment, such as heavy machinery and scientific instruments, and to regulate factory operations. They require little user interaction. 2, SINGLE- USER/SINGLE-TASK SYSTEMS This kind of system lets one person do one task at a time. An example is the operating system that controlsa handheld computer. 3. SINGLE-USER/MULTITASKING SYSTEMS A multitasking system allows the computer to perform several jobs, either one after the other or at the same time, Most desktop and laptop computers today use this kind of system. 4, MULTI-USER SYSTEMS These systems allow many individuals to use one large computer. UNIX® is an example of this type of operatingsystem. 37 Software - Operating System Popular Operating System + MACOS X® In 1984, Apple® became the first computer maker to sell consumers a personal computer equipped with a GUI. Macintosh names both the computer and its operating system. some version of macOS runs all Macintosh computers. + MICROSOFT WINDOWS The Windows OS is currently the market leader, installed on more than 90 percent of personal computers. Early versions of Windows were based on MS-DOS. In fact, Windows 98 was the last version of Windows based on MS-DOS. + UNIX AND LINUX™ UNIX was one of the first operating systems ever written. It was designed to work on powerful business and scientific computers. Later versions of UNIX have been developed to work on personal computers. One of these versions of UNIX is Linux. Linux works with an optional GUI and is very fast compared to other operating systems, It is also unique in that it is an open source operating system, in which the source code used to create it is available to the public. Linux is free and can be downloaded from the internet, but most users buy it with other features. Though Apple and Microsoft dominate the market of OS for personal computers, Linux claims a share of the web client OS market. 38 Software - Operating System GUI - graphical user interface The operating system’s user interface lets you start programs, manage disks and files, and shut down the computer safely. To start the OS, you turn the computer on. During the startup procedure, the OS places part of itself into the computer's memory. DESKTOP Nowadays, computer operating systems are based on visual displays. The graphical user interface, or GUI (GOOee), lets you use a pointing device to interact with the workspace on the computer screen, called a desktop. ICONS : on the screen, pictures called icons or tiles represent resources on the computer, Operating Systems for Mobile Mobile operating systems have been designed to maximize the efficiency of a smaller touchscreen, limited memory, and limited storage capacity. Smartphones actually contain two operating systems: one that supports the user’s software and one that operates the phone's hardware. Three common mobile device operating systems are Apple's iOS, Microsoft's Windows Phone, and Google's Android. 39 Software - Operating System System Util Utility isa collection of programs that help you maintain and repair your computer. Today, many types of utilities are built into the operating system. The most important utilities are file managers, which let you work with data stored on your computer, ORGANIZING FILES The operating system, programs, and data are all stored in files, each with a name. Files can be grouped together into folders. Folders are also called directories. A folder can be divided into subfolders. USING FILES You can use an operating system's file manager to perform several tasks: + Create new folders or subfolders. + Move or copy items between folders or to other disks. + Delete files and folders. * Launch applications. FINDING FILES You can use the file finder utility from your operating system to help you look for a file. This utility can search for a file by its name, type, date, or even by looking for specific data inside the file. 40 Software - Operating System System Util NAMING FILES AND FOLDERS When you create a new file or folder, you give it a file name. Using descriptive names helps you identify the contents and keep your data organized. Most operating systems have specific file and folder naming conventions. They usually let you use file and folder names with up to 255 characters, including spaces and punctuation. You cannot use <>, /,\, |, 2, oF*. FILE TYPE Some operating systems, such as Windows, automatically add a period and a file extension to file names. A file extension is a short series of letters that indicate the application used to create the file and the file format. The file extension determines the file type. For example, a Microsoft Word document has the extension .doc or docx. xlsx extension opens in Microsoft Excel and a file with a .pdf extension opens in Adobe Reader or Acrobat. .txt Text Document .pptx Microsoft PowerPoint Presentation .wav Waveform Audio File .mp3 MP3 Audio File jpg JPEG Image File zip Compressed File .html HTML File .csv Comma Separated Values Document. a4 Software - Operating System System Util * DRIVER UTILITIES A driver utility contains data needed by programs to operate input and output devices such as a mouse and printer. Operating systems that have Plug and Play (PnP) capability can automatically detect new PnP- compatible devices. Otherwise, you can download the files from the device manufacturer's website, or use the installation CD/DVD. * PROGRAM UTILITIES Before you can use a program, you must install it on your hard drive. In Windows, you can use the Add/Remove Programs utility to ensure that your program installs properly. You can use the same utility to uninstall, or remove, a program you no longer need, or to reinstall a program thatis not working the way you want. + BACKUP UTILITIES Backup utility programs automatically copy data from the computer's hard drive to a backup storage device, such as an external hard drive or a CD. Operating systems usually include a backup utility such as Windows 10’s File History. You can set the utility to automatically backup files on a schedule, or you can backup files manually. You can create a full system backup, which is sometimes called a system image, or you can select the files to backup. 42 Software - Operating System System Util * FILE COMPRESSION UTILITIES File compression utilities are programs that reduce the size of files without harming the data. These programs make it easier to copy and transmit files because it is easier to transmit a smaller, compressed file. Most email programs have size limits for transmitting and receiving messages. Windows come with a builtin file compression utility you can use to compress—or zip—one or more files or folders. Select the items, select the Share tab, and then select Zip on the Ribbon. The zipped file has a .zip file extension. + DISK MANAGEMENT Running a utility called a disk scanner, which checks magnetic disks for errors, can fix this problem. A disk scanner looks for and tries to correct irregularities on a disk’s surface. You can use a disk cleaner utility to identify files such as cookies, offline web pages, and temporary files that you can delete to make more disk space available. + DISK DEFRAGMENTER Files-> saved in different areas of the hard drive. File fragmentation occurs when a file is broken into pieces that are saved in different places on a hard drive. + Operating systems come with utilities you can run in order to free up disk space. For example, Windows comes with Disk Cleanup 6 Software - Operating System System Util + VIRUS DETECTION Viruses and malware can enter your system through infected email messages, programs, and files. Malware is any type of software designed to damage or disable your computer system or data. A virus is a type of malware that can replicate, or copy, itself. A Trojan, or Trojan Horse, is a type of malware that allows unauthorized access to your computer. Antivirus and antimalware utilities constantly monitor your system for viruses and malware programs that can slow down processing or damage your data and devices. Once there, they can destroy or corrupt data. Antivirus programs check your computer’s memory and disks looking for virus code. Most programs can also check email and files as they are downloaded to your computer from the internet. If the program discovers a virus, it alerts you and then attempts to quarantine, or disable, and remove the virus. Operating systems often come with an antivirus utility such as Windows Defender. You can also installa program such as Norton Security Backup or McAfee Internet Security. 44 Software - Operating System POWER OPTIONS Using more power might increase performance, Some operating systems, such as Windows, have built-in power plans designed for maximum performance, maximum energy conservation, ora balance. POWER STATES: sleep mode, which may be called standby, power is shut off to non-essential components. Some power is used and data remains in RAM. In hibernate mode, data from RAM is saved to the hard disk and then power is shut down, USER CREDENTIALS One way to protect data is to set up user accounts that identify who can access a computer, Each user is assigned a username and a password that he or she must provide in order to gain access. Usually, the system's lock screen displays until the correct credentials are entered 45 Software - Application Application Software is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users. For example: Word processors for writing letters and reports Spreadsheets for working with numbersand doing math Databases for storing and finding information Presentation graphics for creating slide shows Desktop publishing for creating printer-ready publications such as brochures. Telecommunications for using the internet and email 46 Software - Application Application Software There are many different applications. They can be grouped into four main categories: 1- Productivity software helps people be more productive at work. (write reports, prepare financial plans). Graphics software makes it possible to draw, paint. Communication software allows computers to connect to the internet and to send email. 2- CUSTOM SOFTWARE Some organizations need software programs to do very specific jobs. Because these programs are custom written, they are usually quite expensive, 3+ OFF-THE-SHELF SOFTWARE Most people use software to do standard jobs. They might want to write letters or organize an album of photos. They can choose from many ready-made programs to handle these common tasks. These are called “off-the-shelf” programs because stores and companies that sell software online stock them. Most off-the- shelf software purchased online can be downloaded directly onto the buyer's computer. It is less expensive than custom software. 4- APPS “application” usually used for programs developed specifically for smartphones, tablet computers, and other handheld devices. “7 Software - Application Application Software classifications: * STAND-ALONE application specializes in one task. Stand-alone programs can have many useful and advanced features. However, may cost more than other forms of application software. + INTEGRATED SOFTWARE combine the basic features of several applications into one package it might require too much memory in your computer or may cost too much. They are not as powerful or as complete as their stand-alone, + PRODUCTIVITY SUITES combine several programs such as word- processing, spreadsheets, databases, and graphics in one package with full features. It cost more than integrated software, but usually they are cheaper than buying the stand-alone programs separately. Some common productivity suites include: Microsoft Office - Corel WordPerfect Office - Adobe Creative Suite. + WEB APPLICATIONS which may be called online or cloud apps, are applications that reside on a web server and run in a web browser. Recall that this type of computing is often called software as a service (SAAS). For example, Microsoft offers a version of its Microsoft Office suite online, and Google offers Google Docs. “s Software - Application Application Software types based on whether it is developed for a few users with very specific needs or whether it appeals to many users with shared needs. 1. VERTICAL APPLICATION is designed for a very limited purpose, such as restaurant management or medical billing. useful to one field or business, it is of little interest to others. 2. HORIZONTAL APPLICATION is a general- purpose program that meets the needs of many different users. It can be applied to many tasks. It also tends to be less expensive. Horizontal applications can be divided into several categories depending on the focus of the program. + PERSONAL PRODUCTIVITY The most popular horizontal applications are known as personal productivity programs such as word processors and database systems. + MULTIMEDIA APPLICATIONS combine text, graphics, video, and sound. These include: Desktop publishing—to combine text and graphics to produce newsletters and brochures. + INTERNET APPLICATIONS help users communicate over the internet, including: Web- browsers. = ONLINE OR MOBILE APPS. a9 Software - Application Application Software types based on cost, copyright, open source + COMMERCIAL SOFTWARE Companies own the copyrights to the application software they sell to the public. This prevents you from illegally copying it to sell it to others, giving it away, or sharing it. Also be called proprietary software, must buy before using. Software where the user doesn’t gain access to the program’s code is also called closed-source software. + SHAREWARE software that you can use on a try- before-you-buy basis is called shareware. You are also allowed to copy shareware and give it to your friends. * FREEWARE Some companies give away their copyrighted software for free. The companies allow users to install the program as long as they do not resell it. * OPEN-SOURCE SOFTWARE open source is not automatically “free” you may have to pay for it. However, unlike proprietary software, this kind of software makes the source code availableto the public. The idea is that the software will improve. * CREATIVE COMMONS license lets software copyright holders open some of their work for public while letting them hold onto other parts of their work such as the photo sharing site, * PUBLIC DOMAIN SOFTWARE allow you to use, share, give them away, or even alter them to meet certain needs. Beware: the quality of these programs can vary widely, and they may contain more errors than other types of software. 50 Software - Application Application Software Minimum System Requirements Each software program has minimum system requirements. The computer must meet the minimum hardware and software needs of the program for it to. work properly. your type of computer (Macintosh or PC compatible) microprocessor speed operating system (such as Linux, MacOS X, or Windows) available amount of memory (RAM) available hard drive space special equipment, such as speakers Software that is not compatible with your system will not work, icense types: Buying proprietary, copyrighted software comes with a software license, which allows the buyer to use and install the program, and sometimes entitles the buyer to receive free or reduced cost support and updates. Individuals might buy a single-user license for one copy of the program, or a single-seat license to install the program on a single computer. Organizations such as schools or businesses usually buy a volume or site license, which lets them install on multiple systems or a network for multiple users. Network licensing generally costs less per user and allows users to share resources 54 Software - Application Application Software - Documentations Most software packages provide directions on how to install the program, to use the application, and to troubleshoot, or correct, problems. These instructions, called documentation, are typically available in three forms: 1, information on the publisher's website 2. printed tutorials and reference manuals 3, electronic help screens in the program or on CD-ROM Application Terms: Windows : programs and documents display in windows, or rectangular, on-screen frames that can be opened, closed, resized, and rearranged. Most programs use a combination of drop-down menus (sometimes called pull-down menus) and buttons to present commands. In Microsoft Office, commands are on the Ribbon, a series of tabs at the top of the window. Each tab has a group of related commands for specific tasks. There is also a Quick Access Toolbar at the top of the application window. You can add and remove buttons so it displayscommands you use frequently. = Software - Application Application Software Application Terms: DIALOG BOX Dialog boxes and task panes provide options that let you customize the command. Often, you can set several options at the same time. Some of the ways you select optionsin a dialog boxare: Radio buttons which may be called option buttons, are small circles to the left of each item in a list of options. The selected item has a small dot inside the radio button. Only one option in the list can be selected, Check box are small squares to the left of each item in a list of options. Selected check boxes are marked with an X. Usually multiple options in the list can be selected. List box A list box is a scrollable list of choices. You can select one item in the list. The selected item usually displaysin a boxat the top of the list. Multiple selection list. A multiple-selection list box is also a scrollable list of choices, but each choice has a check box. You can select multiple items in the list by selecting multiple check boxes. 53 Software - Application Application Software - Application Terms REPRESENTING DATA Some programming languages require the programmer to assign a data type to variable data. Some common data types include : string, which is a sequence of characters that does not contain numbers used for calculations; numeric, which is numbers or amounts that are used in calculations; character, which is text; integers, which represent whole numbers; and date, which is the method of coding dates. Stringa, b, ¢; Chara, b, ¢; a="Hello,"; b="Bob"; 54 Communication and Networks Telecommunications Sending information over a telephone network. Telecommunications can be duplex or half- duplex. duplex communication, the people on both sides can communicate at same time, like on a phone call. In half-duplex communication only one side can communicate at a time, like through walkie-talkies, * For local calls, the phone company provides directly wired services between the homes and businesses that belong to the local network. + Landline telephones connect to a common network for telephone service, This common network, called the local loop, connects to the phone company’scentral office. + The local loop from the central telephone office to the user is still an analog system. An analog system sends electrical signals that carry voice and other sounds. + LONG-DISTANCE CALLS Outside the local loop, the long- distance telephone system today is mostly digital. Digital connections use computer code and can carry voice, data, and video ona single line. 55 Communica in and Networks Telecommunications Analog vs. Digital Communications People often confuse the terms “analog” and “digital” when they are talkingabout communications or computers. In analog communications, sounds such as @ person's voice or music start as waves or vibrations in the air. The vibrating air varies in frequency or pitch, which is how high or deep the sound is, as well as strength or loudness. A small microphone in the telephone converts the sound waves into varying patterns of electrical signals or radio waves. The pattern of electrical signals or radio waves is similar to the pattern of the sound waves. These signals are converted back into sound waves by a small loudspeaker in the receiver. In digital communications, sounds are converted into binary data (a series of 1s and Os) at the caller's end, The stream of 1s and 0s is transmitted without any variation in the pattern of electrical or radio waves. The receiver converts the binary data back into sound waves. 56 Communication and Networks Computer Networks A network is a group or system of connected things. A computer network, which may be called a data network, is two or more computing devices connected to each other so they can share data, devices, and other resources. NETWORK INTERFACE Cards NIC handles the flow of data to and from the computer in both wired and wireless networks. If the network is put together by actual cables, those cables connect to the NIC. NICs often have a light that blinks green and amber to alert you to activity it’s experiencing, WIRELESS ACCESS POINTS Even wireless networks require physical media. In ad ion to a wireless NIC in the device, the network needs a wireless transmitter, or hub, called a wireless access point (WAP). 57 Communication and Networks Computer Networks Specifically, computers communicate with languages called protocols. A protocol sets a standard format for data and rules for handling it. For computers to speak with one another, they must use the same protocol. Communication on the internet depends on all connected devices using software called TCP/IP (Transmission Control Protocol/Internet Protocol). Voice over Internet Protocol you can use the internet to send and receive messages over the telephone. Voice over Internet Protocol (VoIP) technology allows you to have a telephone connection over the internet. VoIP uses data sent digitally, with the Internet Protocol (IP), instead of analog telephone lines. Most VoIP applications, such as Skype and Facetime, integrate cameras so callers can see each other during their call. 58 Communication and Networks Computer Networks PHYSICAL MEDIA To create a computer network, each device must be able to communicate with the network. This requires establishing the physical connection using physical media. The medium can be any type of telecommunications connector: twisted pair telephone lines, coaxial cable, fiber-optic cable, or a microwave, radio, or infrared system. The WAP is the central transmitter for sending and receiving wireless signals. It may be built in to the wireless router, or it may be a separate device that connects to the router using an Ethernet connection, + TWISTED PAIR the entire telephone system depended on twisted pair technology. Twisted pair refers to a pair of copper wires that are twisted together to reduce interference, or outside noise. Twisted pair wiring can be either shielded (STP) or unshielded (UTP). Twisted pairs may be shielded to prevent electric interference from other sources. + COAXIAL Another type of copper cable is called coaxial. A coaxial cable, or coax, is a traditional analog wire used to transmit cable television. These copper wires connect a cable in the home to a neighborhood node, and from there to the service provider. 59 Communica Computer Networks Twisted pairs with color-coded plastic insulation Pale shields overall shield outer jacket Shielded twisted pair n and Networks ‘Twisted pairs with color coded plastic insulation outer Jacket Unshielded twisted pair Insulation Copper ‘copper mesh outer jacket Coaxial 60 Communication and Networks Computer Networks PHYSICAL MEDIA * FIBER-OPTIC CABLES Fiber-optic cables are strands of fiberglass that transmit digital data by pulses of light. These cables can carry large quantities of information. They work faster and more efficiently than copper wires. As they get lower in price, it is likely that fiber-optic cables will eventually replace copper completely. + 3G AND 4G Wireless communication frees users from traditional telephone lines. Messages are sent on radio or infrared signals. Cell phones use radio signals, Cell phone networks are usually referred to as 3G (short for third generation) or 4G (for fourth generation). WI-FI networks use radio signals to connect computers. If a cell phone has a Wi-Fi adapter, it can transmit calls and provide other services using the internet. + SATELLITES A satellite telephone, or sat phone, transmits signals using communications satellites orbiting Earth. The caller phone transmits a signal to a satellite, which sends the signal to a land-based center, which then sends the signal to the receiving phone. Because satellite phones do not rely on cell towers, they are useful in remote areas, includingat sea 61 Communication and Networks Computer Networks IP Addresses Each device that connects to the internet has to be uniquely identified. To do this, every computer is assigned a four-part number separated by periods called the internet protocol (IP) address. For example, the IP address for your computer might be 123.25.91.7 Any device with an IP address can communicate with any other device with an IP address over the internet. An IP address is usually automatically assigned by a Dynamic Host Configuration Protocol (DHCP) server. You can locate your computer's IP address and connection speed in the Network and Sharing Center in Windows and in the Network Utility on macOS. 123.25.91.7 + Aparts * 3 periods + Each part has number (0-255) 62 Communication and Networks Computer Networks IP Addresses PUBLIC AND PRIVATE NETWORKS When you use the computers in your local library, you are on a public network that anyone can access. The networks in your school or home, are private and usually require an ID and password for access. There are also public and private IP addresses. Public IP addresses are used by all computers connected to the internet by a modem, including your home network computers. Private IP addresses are used on internal networks, such as a company intranet. Private IP addresses cannot be contacted directly over the internet the way a computer with a public|P address can be, : t CI Pa tor nme s92.108.0.162 LS a i Router Re a Oe “ . ronan aes Public Address s92.t60.0.149 yasta1ae 63 Communication and Networks Computer Networks- Devices MODEM AND ROUTERS Modems and routers direct the input of data between multiple computers. Originally, modems were used to send computer data over telephone lines so computers could access the internet through dial-up. Modern modems can send information through cable, satellite, or DSL. The modem converts the data from analog format to the digital format 2 computer can understand, and then back to analog so it can be transmitted. When the modem changes the digital signal of the computer to the analog sounds used by telephones it is called (modulation) while (demodulation) is changes the analog signals back to digital. Modem speed is measured in bits per second (bps), which is the amount of data that can be sent in one second. a ‘Send Movie File. Modulation: Digital to Analog | Demodulation: Analog to Digital 64 Communication and Networks Computer Networks- Devices MODEM AND ROUTERS Routers forward data from one source to another, such as between two computers or between a computer and the internet. For internet access, a router is connected to a modem, usually using an Ethernet cable. The modem connects to an internet provider and the router directs the flow of data between the internet and computers. =) Bs 65 Communication and Networks Computer Networks- Terms A workstation is a computer connected to a computer network. It is often set up with the same operating system, applications, and access to resources as the other computers in the network. Ina large network, a workstation may also be called a node by the people who take care of the network. A gateway is a node on your network that enables communication with other networks, such as the router on a home network that lets you connect to the internet. WORKSTATION ALTERNATIVE Sometimes, in large organizations, network users work at a ‘terminal, which usually includes a keyboard, a monitor, and a pointing device, such as a mouse. A terminal can feel as if the computer is local, but it’s not. Users are actually sharing time on a central computer, with their own work displayed on their terminal’s monitor. Using terminals can save on the cost of purchasing workstations. They are also useful in situations with limited need for a workstation, such as a publiccomputer in a library. Network traffic : Once a network is created, the computers and other connected equipment can communicate with one another. The communication on a network is called network traffic is the electronic pulses of information sent by the network cards to carry data through the network wires to its destination. “6 Communication and Networks Computer Networks- Terms SHARING FILES : making files available to more than one user on the network. The file is stored on a network server so anyone with permission rights may access the file from any location. COLLABORATIVE SOFTWARE enables the network to help people work together more closely. users can share calendars, work on a document together, or even hold meetings through the network. Collaborative software is also called groupware. SHARING PERIPHERALS LAN allows users to access remote resources, such as printers, fax machines, or any other equipment, that is not connected directly to your computer, but is connected to the network. BANDWIDTH is the amount of data that can be sent through a modem or network connection, The more bandwidth, the faster the connection. It is usually measured in bits per second (bps) or in megabits per second (Mbps). The more bandwidth, the more information can be transferred in a given amount of time. 67 Communication and Networks Computer Networks- Terms BROADBAND Broadband is the general term for all high-speed digital connections that transmit at least 1.5 megabits per second (Mbps), though current broadband services usually transmit between 10 and 30 Mbps. Mobile phones use mobile broadband, which transmits around 10 Mbps. Several broadband technologies are available, including Digital Subscriber Line, cable, fiber optic, and 4G, and more are on the horizon, Broadband Types: + Fixed broadband refers to wired networks, such as fiber optic and (DSL), which are used for television and internet access. * Mobile broadband refers to networks like 3G and 4G, which are used by cellular phones and other mobile devices. 68 Communication and Networks Computer Networks- Terms BROADBAND Broadband transmission speed is affected by distance from the local telephone switching station, condition of the wiring and other equipment, and the number of people using the service. One of the most common fixed broadband services is Digital Subscriber Line (DSL). DSL uses the same copper wires telephones use, but transmits data in digital form rather than analog. DSL allows for very fast connections to the internet and features an “always-on” connection, DSL service also requires a modem There is one drawback to DSL: A user must be within a few miles of a local telephone switching station for a connection to be made. There are also two basic types: asymmetric DSL (ADSL), which has faster download speeds than upload speeds, and symmetric DSL (SDSL), which can send and receive data at the same speed. ADSL is more common. SDSL is generally used by businesses, while ADSL is used in private homes and businesses. 69 Communication and Networks Computer Networks- Terms BROADBAND SONET Telephone companies that offer DSL and other internet connection methods rely on a digital network called SONET. SONET stands for Synchronous Optical Network, It uses fiber optics to provide faster connections and greater bandwidth—from 52 Mbps to up to a whopping 40 gigabits per second (Gbps). VIRTUAL PRIVATE NETWORKS A virtual private network (VPN) is a private, secure network set up through a public network. VPNs are a more secure way to login to a private network from a computer on a publicnetwork. 70 Communication and Networks Computer Networks- Terms What Is an Intranet? is a private network that uses the same TCP/IP protocols as the internet. COMPARING INTRANETS AND THE INTERNET Intranets offer many of the same services the internet does, such as email and access to websites. Intranets are different from the internet in that they are not meant for public use, Firewall software prevents outsiders from accessing the intranet. CREATING AN EXTRANET allows for limited public access. Companies often use extranets so employees can access the network while they travel or when they work from home. Extranets are also used to share information with other businesses. veN Firewall ee Company Intranet 71 Communication and Networks Computer Networks - Network Topology A map of a network shows the physical structure of the network, including servers, workstations, and other network devices. The network's layout is called the network topology. collision occur when two computers try to access the network at the same time. To avoid such collisions, each computer divides its data into very small, fast-moving packets. * BUS TOPOLOGY An older network design, bus topology is rarely used now. In a bus, devices are connected to a single network line like a string of holiday lights. When one network device fails, the entire network fails, and adding new devices to the network can also be tricky. Bus 72 Communication and Networks Computer Networks- Network Topology * RING TOPOLOGY connects all the network devices in a circle. To control collisions, such networks pass tokens, or special units of data, around the ring. Only the workstation that has control of the token can send other data onto the network, Because of the token- passing technique, these networks are also called token rings. If the network is wireless, wireless token rings. Like bus topology, one fault can disrupt a ring network, but this network type has the advantage of not requiring a network server. 3 Communication and Networks Computer Networks- Network Topology STAR TOPOLOGY connects each network device to a central hub. A hub is a connection point for all the computers, printers, and other equipment on the network. Adding and removing devices to a star network is easy. If the hub loses power or fails, however, the network devices will not be able to communicate. Star topology avoids collisions by using strategies that manage contention STAR BUS TOPOLOGY connects multiple star networks along a bus. It is the most common design used in LANs today. A backbone is a fast network medium that provides communication among all of the networks. It links all the hubs in the school os af Star 74 Communication and Networks Computer Networks- Network Topology MESH TOPOLOGY the components are all connected directly to other components. Because this topology connects devices with multiple paths, redundancies exist. But, because all devices are cross-connected, the best path from one to another can be taken at any time. The drawback to mesh topology is that needing at least one and a half connections for each computer makes it very expensive to construct. This topology is usually used in the internet structure. 75 Communication and Networks Computer Networks- Network strategies Using a Peer-to-Peer Network Your peers are your equals means each user decides whether any files on his or her computer will be shared. Peer-to-peer networks are usually small, having anywhere from two to ten computers and easy to create. P2P networking has some drawbacks: Security problems can arise. Data can be hard to back up. With many users, file sharing can become difficult. Managing resources can be complicated. If one computer fails or is turned off, its resources are no longer available to the network. 7 \ = = \ 7 = — 76 Communication and Networks Computer Networks- Network strategies Using a Client/Server Network Large businesses usually use a client/server network. With this system, one powerful computer called Servers provides information and management services to the workstation computers, which are called clients. Server it contains the network operating system, other programs, and large data files. The network operating system (NOS) manages and secures the entire network. A client/server network is far more secure than a P2P network, EVALUATING A CLIENT/SERVER NETWORK For a large office, file servers are better than peer-to-peer networks, for several reasons: They offer a central location for files. Data is easy to back up and easy to recover. Servers are faster than workstations. Servers are rarely turned off, although they can be offline for maintenance. Security is easier to maintain. 77 Communication and Networks Computer Networks- Network Types Home, school and many business networks are usually local area networks (LANs). A LAN is 2 network in which all the workstations and other equipment are near one another. A LAN can have just a few or several hundred users. Small or large, a LAN lets its members share equipment and information, resulting in lower costs. Some of the key functions that benefit LAN users include sharing files, using collaborative software, and sharing peripherals. LAN ADMINISTRATOR design, install, and maintain the LANs in organizations. A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN). A wide area network (WAN) connects computers and other resources that are far apart. A business with offices in many places can use a WAN to link its LANs in different cities. Once a WAN is created, users may not even realize the files they are sharing are remote, And that's the way it should be. Users should not worry about the physical location of the shared files, just that the files are available. 78 Communication and Networks Computer Networks- Network Security On an unsecured network, anyone within the network can access information. Secured networks, however, limit access and protect the computing devices and users. Unsecure networks allow for free flow of information but leave little protection from hacking for the individual computers. Unsecured networks may be called public networks, although your home network may also be unsecured. An unsecured wireless network can be accessed by anyone within range of the wireless signal. It does not require a login or password and does not use encryption to protect data. Connecting to an unsecured network exposes your data and hardware devices to risks. secured networks prevent unauthorized access is by requiring users to enter an ID and password, Another way is by using a firewall. You can secure a wireless network by using an encryption protocol such as Wi-Fi Protected Access 2 (WPA2). 79 The internet and the web The Internet is a global WAN, or network of networks. It connects everything from a single smartphone to a data center housing hundreds of servers. The internet can even connect devices that run different operating systems. The internet is made up of three important parts: servers, clients, and protocols. SERVERS Internet servers are the computers that provide services to other computers by way of the internet. These services include processing email, storing web pages, or hosting cloud-based data, CLIENTS AND PROTOCOLS internet clients are the devices that request services from a server, A way to access the internet INTERNET SERVICE PROVIDERS An internet service provider (ISP) is a company that provides a link from your computing device to the internet. An ISP does not usually provide online services; it only provides an easy-to-use connection to the internet. However, some ISPs now offer cloud-based storage and email. 80 The internet and the web The Internet Differences between the Internet and other WANs: + The Internetis publicand WANs are usually private. + The Internetis not as secure as a private WAN connection. + A WAN is used for more than just browsing Web pages. It provides access to network resources. Web browser : Software has the ability to browse the contents of the web Examples of Web Browsers : + Google Chrome + Mozilla Firefox + Apple Safari + Microsoft Edge 81 The internet and the web The Internet - Accessing Information The World Wide Web (www) is a huge collection of hypertext documents, where certain words or pictures can serve as hyperlinks. A hyperlink is a link to another document on the World Wide Web. Every document has a unique address, called a uniform resource locator URL which tells exactly where the documentis located on the Internet. Hypertext Transfer Protocol (HTTP). HTTP sets the rules for how web servers and web browsers will respond to commands. Create Web documents by using HTML (Hyper Text Markup Language). Formatting the Web by a style sheet or a separate document that describes rules used to define how the elements of the pages in @ web site will look (Cascading Style Sheets or CSS). The difference between the Internet and the World Wide Web : + the Internet is a network of computer networks * the World Wide Web is a service available on the Internet 82 The internet and the web The Internet - Web Terms * A Web page is a document on the Web. + AWeb site is a collection of related pages, which are connected using hyperlinks + AWeb server stores Web pages and responds to requests from Web browsers + Most Web sites have a primary page called the home page or index page which appears when you first enter the site's URL. DNS (Domain Name System) : A domain name uses plain language to identify one or more IP addresses and is used by others to locate information on the internet. For example, an internet server computer’s domain name might be whitehouse.gov but its numeric IP address might be 206,166.48.45 The Domain Name System (DNS) a special server (DNS server) matches each domain name to the correct IP address. Within DNS, each computer on the internet must havea uniquename. 83 The internet and the web The Internet - DNS The central database of domain names is called the WHOIS database. You can look up information about the owner and servers of a certain domain on this database. The organization responsible for maintaining the database of registered domain names is the Internet Corporation for Assigned Names and Numbers (ICANN). Registrars are organizations that are authorized to reserve and give out domain names. Many of them are responsible for specific DNS registries. For example, the Public Interest Registry is responsible for maintaining the .org registry. If you want to register a .org domain name, you would contact the Public Interest Registry. 84 The internet and the web The Internet - SECOND- AND TOP-LEVEL DOMAINS Every domain name includes a second-level domain name and a top-level domain name. The top-level domain identifies which registry—or part of the internet—where the name is registered, The top-level domain starts with the last period in the address—called dot—and includes the suffix that displays to the right of the dot. The second-level domain name usually identifies a specific company, organization, or even individual. It displays to the left of the last dot, Example -- https://wwwwhitehouse.gov * https -> protocol + www > subdomain or third level domain + whitehouse > the second-level domain + gov-> the top-level domain The most common top-level domains are .com (commercial), .edu (education), .org (nonprofit organizations), .gov (government), .mil (military), and .net (network organizations). Other top- level domain names incude.biz (business) and .museum (arts and culture). New top-level domains are added as the need arises. Top-level domain country codes are two letter codes that identify the country where the site is located. For example, .us is the country code for the United States. 85 The internet and the web The Internet — URL PROTOCOL is the first part of a URL specifies the protocol required to access the document http:// Some URLs might have other protocols, such as FTP, which shows that the file should be retrieved with file transfer protocol. Another protocol, telnet, allows for access to remote computers. DOMAIN NAME The next part of a URL, such as www.fbi.gov, is the domain name. PATH lists the folder and subfolders, if any, containing the desired document. Thus, a URL such www.fbi.gov/employment/identifies/x1.php a folder named employment on the site’s web server. RESOURCE FILE NAME At the end of a URL, you may see the name of a file—the specific web resource for which you are looking. The resource may be an HTML document or a web page, a video clip, a text file, or another type of resource. The filename extension identifies the type of resource. 86 The internet and the web The Internet — FTP Transferring Files File Transfer Protocol (FTP) lets you transfer files on the internet. With an FTP client, you can transfer files from an FTP server to your computer in an operation called downloading. In uploading, you transfer files from the client to the server. File Transfer Issues + COMPUTER VIRUSES It’s 2 good idea to check all downloaded files for viruses before opening them. Most antivirus programs will do this for you automatically. + FILE COMPRESSION The larger a file is, the more time it takes to travel over a network. File compression is a way of reducing file size so it can travel more quickly over a network. Some compressed files are set to decompress automatically. Others must be decompressed using decompression software. Two widely used compression software programs for Windows and Mac devices are WinZip® and 7-Zip. 87 The internet and the web The Internet - Activities * Email Electronic mail, or email, allows people to send an unlimited number of messages quickly and easily to anyone with an email address. It is less expensive than standard mail and voice, fax, and telephone messages. To use email, all you need is a computing device with internet access, email software, and an email account. Email also lets you attach files to a message. Any file sent along with an email message is called an attachment. Email Addresses Like a computer on a network, every communication service user must have a unique identifier, usually called a username. All email addresses have two parts. The mailbox name is the art of the address before the “at” symbol (@) that identifies the user. The server address follows the symbol. It gives the domain name of the email server where the mailbox is stored, An email server is 2 computer, operated by your internet service provider (ISP), that accepts and delivers incoming messages and sends outgoing messages. There are two basic ways to access email: 1, Email clients which are sometimes referred to as desktop email applications, are installed on your computer such as Microsoft Outlookand Mozilla Thunderbird and Mailbird. 2. Web-based email, such as Outlook.comand Gmail, is accessed using a web browser. The internet and the web The Internet - Activities There are drawbacks to using email. The receiver may not open the email, so there is no guarantee it will be read. Criminals often hide viruses in email attachments. And, although there are not usually limits to the amount of text you can include in an email, there are limits to the size of attachments. * PORTALS A web or internet portal is a web page that pulls in and presents information in an organized way. Most web portals are customized by the user. For example, a web portal might display the weather, breaking news, a stock ticker, and a list of new email messages. It might have links to a search engine and a favorite magazine. Common web portals include Yahoo, AOL, and MSN. + SEARCH ENGINES is software that finds and lists information that meets a specified search such as Google, Yahoo, and Bing. Boolean search use special terms and characters Inclusion operations plus sign or the word AND Find only pages that contain a match for all the specified words example IT+job+Makkah, Exclusion operations minus sign or the word NOT Find pages that contain certain words but not others example IT+job Dammam 89 The internet and the web The Internet — Activities + TWEETS A tweet is a form of text messaging that uses the Twitter app; you send the message to the Twitter internet site, where any registered user can read it. Twitter limits most messages to 280 characters. + INSTANT MESSAGING Recall that instant messaging (IM) is a way for individuals and groups to communicate with their contacts in real time from device to device. You and the people you are communicating with must all be using the same IM app. IM is usually free. For example, Facebook Messenger, iMessage comes on Apple iPhones and iPads, Gmail has a Chat feature called Hangouts. Other common IM services include Skype, Slack, and Jabber (VOIP), Social networking is a way to use social media tools on the internet to make connections with other people such as Snapchat, Instagram, Facebook, and LinkedIn. Most social networking sites are free, although you have to register an account to use them. Some sites, like LinkedIn, help you make connections that can further your career. Some, like YouTube, provide entertainment, and, if other people like your posts, can become a career. 90 The internet and the web The Internet — Activities + PHOTO AND VIDEO SHARING Photo and video sharing is using the internet to send digital photos or video clips to another internet user such as Instagram, Snapchat, and YouTube. * PODCASTS is an audio or video file that is created for downloading to any device with an application that can play MP3 files example— iTunes and SoundCloud. + BLOGS or weblog—is a type of web page diary. People create blogs to share their thoughts and opinions. + Vlogs are video logs in which the viogger appears on video, * Wiki is a collaborative web page. Anyone can edit or create content on the page. The most notable wiki is Wikipedia.org. + WEB FEED A web feed is a service that automatically downloads web page content that 2 user has signed up for. May include the text of news, opinions, or audio/video files + Software as a Service (SaaS) applications are stored on cloud servers and can be accessed on the Internet. 1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy