We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 91
Computer Basics A computer is a machine that changes information from one form into another
by performing four basic actions. Those actions are input, processing, output, and storage.
Together, these actions make up the information processing cycle. By following a set of
instructions, called a program, the computer turns raw data into organized information that
Input raw data i) information
processing
people can use
1- Input entered raw data into a computer. This
data can be as simple as letters and numbers or 1 oO
as complex as color photographs, videos.Bit is Br
short for binary digit. Each bit is a number, or a
digit. A bit can have only two possible values—O --—_-computersonly understand 1s and 0s —
orl binaryByte is group of eight. Each group is called a byte. the letter Ais coded as 01000001
* Akilobyte, or 1KB, is 1 thousand bytes. 1024 Bytes = 1KB
+ Amegabyte, or 1MB, is 1 million bytes. 1024 KB=1MB
* gigabyte, or 1GB, is 1 billion bytes. 1024MB= 16GB
* Aterabyte, or 1TB, is 1 thousand billion bytes. 1024GB=1TB
Apetabyte, or 1PB, is one million gigabytes 1024TB=1PBDecimal 0123456789
Hexadecimal 0123456789 ABCDEF
0000 0100
4
04
Decimal
HEXADECIMAL
o
aAMOOD>PLMOVHAHAYNEHEXADECIMAL VALUES Color can be represented by a three-byte combination where
each byte represents the red, green, or blue (RGB) component of the displayed color.
Decimal -> 0 to 256, since there are 256 possible RGB is 6-digit hexadecimal value The
hexadecimal for white is FFFFFF, or complete intensity of all three colors, and black is
0000000.
red, green, or blue
(RGB)DIGITIZING TEXT
+ American Standard Code for Information Interchange (ASCII) is a common system, or
character set, for coding letters that uses 8 bits.
+ Unicode, which uses 16 bits, is another.
66 42 01000010 a#66;
ne PQ Rs T
67 43 01000011 #67; Capital c
és 44 01000100 EE: Gapitld abe 6 D
69 45 01000101 ewes: Capital
70 46 01000110 F
71 47 01000111 @#71;
72 48 01001000 H: Capital H
73 49 01001001 I Capital
74 4A 01001010 J 3 Capital J
75 48 01001011 K K Capital K
Capital F
conta Latin Capital ;
Letter D >
iH}
i
Uicodenartes EEN
Hrecose EY
~ [Ble ln el lela
“
ASCIL Unicode2- Processing The second step of the information processing cycle is called processing. In this
step, the computer carries out a task using the data. CODED INSTRUCTIONS What the
computer does depends on the instructions, or program, given to the computer. SPEED OF
PROCESSING Computers can process data very rapidly, performing millions of operations every
second. The ability to process data with lightning speed is another reason computers are so
valuable.
3- Output The third step, output, is the result of the computer's processing presented to the user.
To create output, the computer takes the bytes and turns them back into a form you can
understand, such as an image on the screen
4- Storage The fourth operation is storage, which is the action by which a computer saves
information.Computers have temporary memory chips used to store data during the processing
stage RAM or permanent form on a device such as a hard drive.Every computer is composed of two basic components:
1- hardware includes the Physical features, which are every part that you can either see or
touch.
2. Software includes all of the programs that tell a computer what to do and how to do it.
oti
CINE
Terie)
er ert
CrasPC power supply
Alternating current (AC) : the electricity travels in one direction and then reverses
direction. Computers plug into the same type of AC outlet that other appliances use, but
once the current reaches the computer's power supply it is converted to DC Direct current.
That's because the internal computer components require DC.
Direct Current (DC) Alternating Current (AC)Hardware- motherboard
It contains the computer's basic circuitry and components. It has a socket for the CPU, RAM and
expansion part (sound cards, graphic cards) and also connects together the CPU, memory, hard drives,
optical drives, video card and more. A computer bus, also referred to as “the bus," is the path on the
PC's motherboard to transfer data to and from the CPU and other PC components or PCs
motherboardHardware- motherboard
An expansion card is an electronic circuit board that adds more functionality to a desktop computer.
These cards are installed into the expansion slot of a computer motherboard, and they allow the
computer to perform additional functions not offered by the motherboard. Video cards and sound
cards are common example.
+ Serial ports move data one bit at a time.
+ Parallel ports move data in groups
Serlal Communication Fa CommaETHERNET PORTS AND CONNECTORS Ethernet is the most common networking technology
used for local area networks (LANs)
High-Definition Multimedia Interface (HDMI) is a digital cable standard for audio and video
transmission.
Each port is designed to accept a specific connector, so most connectors only fit into
‘one type of port.
Hardware- CPU
The most important piece of hardware in a computer is the central processing
unit, or CPU. This is the device that processes data. The CPU is a small, thin
piece of silicon attached to a circuit board in placed called socket. The (CPU) consists of :
+ control unit (CU)
+ arithmetic logic unit (ALU)
Processor speed (CLOCK SPEED) measures in gigahertz - GHz means the number of instructions
per second the computer executes,
MULTICORE PROCESSORS Multicore processors have two or more CPUs so they can process data
faster. dual core processor (two CPUs), and quad core processors (four CPUs). The more cores on
the CPU, the higher the price. 7Hardware— RAM
The CPU temporarily stores the instructions and data it is using on RAM (random access memory)
Because programs today are complex, they need a large amount of RAM to run. The amount of
time that it takes RAM to receive a request from the processor and then read or write data is
called memory speed. Like CPU processing speed, RAM speed is measured in MHz. it depend ona
constant supply of power to keep their contents and when the power is lost, the RAM lose their
contents.
Memory
[OTOTTTO] Location @
THDIOOTT Location 1)
Datatomemery [OTOIOGTT (Location 3
000 10000 | (Location
forint]
TOTONTTO
THOTT
Toow tT
TOTO
TooTaOOT
00111110 | (Location 10)
12Hardware— ROM
ROM A second kind of memory is called read-only
memory, or ROM. These chips contain the instructions
that start the computer when you turn it on. The
instructions in ROM typically do not change once this
memory is placed on the motherboard.
‘THE BOOT PROCESS When you turn the computer on, you boot it. The first thing you see is the
BIOS screen. Recall that BIOS stands for basic input/output system, and it manages and
configures the computer's hardware.
‘THE POWER-ON SELF TEST As a computer boots, it performs a series of tests called the power-on
self test (POST). During POST, the BIOS or UEFI (Unified Extensible Firmware Interface) checks the
major components of the system, such as its memory, keyboard, and hard drive. It does this in
part by reading information stored on the CMOS chip. CMOS, which stands for Complementary
Metal-Oxide Semiconductor, is a battery-powered memory chip on the motherboard that stores
information about the computer components.
13Computer memory:
Save sett —
—_ = rou Boot
BIOS
ROM is nonvolatile memory, which means it stores its contents permanently, even when the
computer is turned off. Recall that RAM, on the other hand, is volatile memory and only
stores its contents temporarily; if the computer loses power, RAM's contents are lost.
Some activities that decrease available device RAM memory include:
+ Running multiple programs at the same time.
* Leaving device running for a long period of time without rebooting.
+ Running programs that use a lot of multimedia or 3D.
+ Undetected viruses or malware Programs running in the background
14You can increase available device memory by
+ closing programs, you are not using.
* rebooting the system,
+ using an antivirusand malware utility
+ You can identify and close or disable background programs using the Windows Task Manager
or the Mac Activity Monitor.
+ Onsome devices, you may be able to install additional RAM chips.
+ If there is not enough RAM to hold the data, the CPU uses virtual memory is actually
storage space on the hard disk that can function as memory when needed
15Hardware- HDD
Ahard disk drive (HDD) is data storage device that stores and retrieves di
tal data using magnetic
storage with one or more platters with magnetic material. HDDs are a type of non-volatile
storage, retaining stored data when powered off.
Parts of a Hard Drive
PLATTERS a stack of metal disks that store
information.The platters are storage media.
Each platter is divided into tracks, or a set of circles on
the surface of the platter, on which the data is
recorded.
Each track is divided into segments, called sectors.
A cylinder is the same track location on all the stacked
platters.
READ/WRITE HEADS A small, needle-like component,
called the read/write head, travels back and forth
across the surface of each platter, retrieving and
storing data.
ZA
= Ss
CT]
16Hardware— SSD
SOLID STATE STORAGE A solid state disk (SSD) stores data
on an array of flash memory chips organized as a disk
drive. SSDs can access data faster than optical drives
because they can read data directly from a specific flash
SSD cell location. Unlike magnetic and optical drives, SSDs
have no moving parts, SSDs are also quieter than hard disk
drives, and lighter, which makes them suitable for
ultralight notebook computers, Internal and External
Storage A storage device installed inside your computer is
called an internal storage device. One that is positioned
outside your computer is referred to as an external storage
device, EXTERNAL MAGNETIC DEVICES Other forms of
magnetic storage devices include a variety of USB external
hard drives. These can hold up to as much as 4 terabytes
of data, and they are portable.
(Solid Stote Drive)
SSD vs HDD
(Hord Disk Drive)
17Hardware— Optical storage
use laser beams to read information that has been stored on the reflective surface of a disc.
These are called optical storage devices. Popular types of -> Compact discs (CDs), digital video
discs (DVDs), and Blu-ray Discs (BDs) are optical storage devices. CD can store 650 to 700
megabytes of data. DVDs can store anywhere from 4.7 gigabytes to double that amount if the
DVD is double-sided. Blu-ray Discs hold from 25 gigabytes to 128 gigabytes. Optical discs are
made up of three layers. The bottom layer is a clear plastic. The middle layer is a thin sheet of
aluminum. The top layer is a lacquer coating that protects the disc from scratches and dust..
LANDS AND PITS The surface of an optical disc stores data as a series of lands and pits. A land is
a flat, reflective area on the surface of a disc. Lands reflect light from a laser's sensor and are
recorded as a 1 by a computer. A pit is an indented area on the surface of a disc. Since no light is
reflected by a pit, it is recorded as a 0.
Land Land Land Land Land
Yd 4
“LI itt Ww
(000100001000001001001000001000000001010000
= -_ =
I i) t A 18Hardware—CPU vs RAM vs Hard disk
CPU vs RAM vs Hard disk Factors that impact computer performance include processing speed,
memory speed and size, and storage device speed and size.
Hardware - Peripherals
For most desktop systems, input devices, such as the keyboard and mouse, are separate from the
case. So are output devices, such as monitors and printers. Hardware that is separate but can be
connected to the case is called a peripheral. Not all computers have all this equipment as
peripherals. Apple’s iMac® computers include the monitor as a physical part of the main system.
Other computers may have built-in storage devices. Portable computers, such as laptops, have
the keyboard, a touchpad, and a monitor all attached to the main unit.
19Types of Computers
Group Computer - Individuals Computer
SUPERCOMPUTERS
The largest and most powerful computers can process huge amounts of
data very quickly. perform millions upon millions of calculations a
second. The organizations using supercomputers do very complex
work, such as forecasting the weather or creating detailed models of
nuclear reactions. the most expensive.
MAINFRAMES
The mainframe is another type of computer used by government
agencies and large corporations. Mainframe computers are used in
centralized computing systems as the storage location for all or most
of the data. For example, airline company employees use mainframes.
The trend now is to replace mainframes with servers.
SERVERS
Most organizations connect their computers together in a network. All
the computers that are part of the network are connected to a
computer called a server. The server stores data and programs that
people on the network can use on their personal computers. A
computer connected to a network, called the host, uses a special
program, called the client, to contact the server and get data from it.
Unlike terminals, computers on a network can have their own disk
storage, but the main source of data for the network is still the server.Types of Computers
Group Computer - Individuals Computer
WORKSTATIONS The most powerful and expensive personal computers are workstations.
PERSONAL COMPUTERS Most individuals use personal computers to do everyday jobs more
quickly and easily. Desktop computers are personal computers. Desktop computers may be
connected to a network, or they may be standalone, which means they are not connected to any
network. Small portable computers such as laptops and notebooks are as powerful as a desktop
but can be easily carried around, Tablet computers are small, portable computers that have a flat
panel display. The display is usually a touchscreen, which can be used with a finger or a stylus.
SMARTPHONES A smartphone is 2 telephone with computing capabilities. Smartphones provide
internet access using 3G, 4G, or Wi-Fi technology. Smartphones have built-in devices such as
cameras, microphones, and speakers.
EBs
SKIOP Hybrid Netbook
Espen Computer
24Input and Output devices
Input devices
Input Devices Input means entering data, such as text, images, or sounds. Computer users can
choose from several different input devices.
Four basic types of input:
1, Data - Words, numbers, images, and sounds.
2. SOFTWARE INSTRUCTIONS - launching a program moves it into the computer's RAM. That
makes the program availableto the CPU—and to you.
3. USER COMMANDS A command is an instruction that tells a software program what action to
perform. For example, to open a program, save your work, or close a program, you must issue
a command to the computer.
RESPONSES - if you try to close a program without saving your work, the program will ask if
you want to saveit. Before you can continue, you must input a response.
22Input and Output devices
Input devices
TEXT AND COMMANDS Perhaps the most basic input device is the keyboard. speech-recognition
software, users can input text by speaking into a microphone. handwriting-recognition software,
users can input text by writing with a stylus directly on a device such as a tablet or screen. The
software changes the words into digital data the computer can read. This software can be used
by people with disabilitiesthat prevent them from typing.
A mouse moves @ pointer on the monitor, which allows you to move around a document, or to
select commands. A trackball, touchpad, or trackpad function similarly to a mouse. A
touchscreen lets you input some commands by touching the monitor directly. motion-
recognition software programs that let you input some commands by moving your hand across
the display or by looking at a location on the screen. A joystick, often used in computer games, is
yet another input device.
23Input and Output devices
Input devices
Digital cameras for capturing and inputting photos and videos. digital camera, a computer chip
takes the information from the lens and records it as pixels, or small dots, that form the image.
global positioning systems (GPS) used to input maps and locations. MICROPHONE To input
sounds. Scanners are devices that convert printed content into digital format so you can save it as
a file on your computer.
MICROPHONE
via an audio interface or another
analog-to-digital converter
ee SUE
sound card reduces the size of sound files by
compressing the data. That way, the files take up
less space in memory
Scanner
Most scanners have optical character
recognition (OCR) software. When you
scan printed text using this software, the
text is turned into a digital text file, not an
image file.
Types of scanners: (sheet fed scanner, you
insert the pages you want copied and the
scanner pulls them through one at a time.)
(Flatbed scanners work more like copy
machines) (Handheld scanners are
portable)
24Input and Output devices
Input devices
Inputting Video videos must be in digital format. Common
video file formats include MP4, AVI, and FLV. Connected to
computer using a USB port. Some may have the ability to
connect using wireless technology such as Bluetooth. To
convert analog videos to digital format, 2 computer needs a
video capture card, Like a sound card, this type of circuit
board changes video images into a digital file. These cards also
compress files so they occupy less disk space. Compressing a
file may affect the quality, It also has its own memory, called
video memory or VRAM, to free up space in the computer's
memory. The video adapter card is installed on the
motherboard. It processes video data for display on the
monitor, allowingthe CPU and RAM to handle other tasks.
GPU (graphics processing
unit)
25Input and Output devices
Output devices
An output device is any piece of hardware that displays or plays back
the result of computer processing in one of the four forms of output.
There are four types of output: text, graphics, video, and audio.
MONITORS Both text and images are displayed on the monitor
(OUTPUT IS CALLED SOFT COPY). Screen-magnifier software can make
images on the monitor much larger for people who have difficulty
seeing.
+ LCDs are very light and have a flat screen. They use little power Also,
there are now two different techniques for producing color: thin film
transistor (TFT) and passive matrix technology. TFT produces
sharper color and images, so it is becoming the standard.
+ CRTS An older type of monitor is the cathode ray tube (CRT). these
monitors are not only heavy and take up a lot of desk space, but they
also heat up easily. CRTs use more electricity than LCDs.
26Input and Output devices
Output devices
Printers A printer makes a paper copy of the display shown on a
monitor. (OUTPUT IS CALLED HARD COPY)
Types of Printers:
1. NONIMPACT PRINTERS Most computer users today use inkjet and
laser printers to produce paper copies. Inkjet printers make images
by spraying a fine stream of ink onto the paper. Laser printers use a
powder called toner and operate like a copy machine, Both inkjet
and laser printers are available in all-in-one versions that add fax,
copier, and scanner capabilitiesat a very low cost.
2, IMPACT PRINTERS Dot matrix printers are a kind of impact printer
that uses hammers or pins to press an ink-covered ribbon, They are
noisy and the image quality is poor, but some are still used in
businesses to provide copies of multi-part forms, like invoices.
3. The best printer for printing color images is a thermal transfer
printer.
7Input and Output devices
Output devices
Outputting Video DATA PROJECTORS : Digital light processing, or DLP, projectors use millions of
tiny mirrors to create a very sharp image. DLP projectors can be used with large audiences.
TELEVISIONS Some devices let you send video from a computer to a television. Many people
find that their high-definition television (HDTV) makes an excellent output device.
Outputting Sound To output sound to headphones or speakers, your computer must have @
sound card and speakers. The sound card changes digital sound files stored in the computer's
I current. It sends that current to the speakers to produce audio
memory into an elec
output.
Screen-magnifier software : can make images on the monitor much larger for people who have difficulty
seeing. Braille printers can also provide output in a format some people with visual disabilities can read.
Windows has a feature called Show Sounds. When activated, this feature shows a visual symbol when it
plays a sound and displays spoken words as text. This feature can help people who have hearing difficulties.
28Hardware-Storage Media and Storage Devices
Storage Media and Storage Devices Storage has two components:
1- storage media.
2. storage devices
STORAGE MEDIA In terms of storage, a medium is an object that physically holds data or
program instructions. Flash memory, hard disks, magnetic tapes, compact discs, DVDs, and Blu-
ray discs are examples of storage media. STORAGE DEVICES is a piece of hardware that holds the
storage medium, sends data to the medium, and retrieves data from the medium. Hard drives,
flash drives, and CD and DVD drives.
STORAGE DEVICE
STORAGE MEDIA
29Hardware—SECONDARY STORAGE
SECONDARY STORAGE DEVICES Other pieces of storage hardware are secondary storage. The
following devices let you store data permanently—even when the computer is turned off.
+ Hard drives or External hard drives
+ Compact discs (CDs), digital video discs (DVDs), and Blu-ray Discs (BDs) are optical storage
devices.
+ Cloud storage is online storage offered on various websites.
+ Memory cards store data for mobile devices like smartphones and digital cameras, Some
memory cards can store up to 2 terabytes.
‘A computer stores data and program instructions in files. A file is a collection of related
information or program code, which has been given a unique name. The type of file people most.
often use is called a document, A document can be any kind of file that a user can create, save,
and edit. A digital photois another type of document
SECONDARY STORAGE CAPACITY
1. Hard disk drives hold the most data.
2. Thumb or flash drives hold the next largest amount of data.
3. CDs and DVDs hold the least amount of data. 50Hardware—STORAGE
Categories of Storage Devices (but not RAM) are divided into
three categories:
1- READ-ONLY VERSUS READ/WRITE : A read-only device can
only read data from the storage medium. You cannot change
the data on the medium or save new data onto it. A CD-ROM
drive or CD-R are an examples of a read-only device. Standard
DVD players are another example of a read-only device. A
read/write device not only can read data from the storage
medium, but can write data onto the medium, as well. Hard
drives, USB flash drives, CD-Rewritable drives (CD-RW), and
DVD-RAM drives are commonly used examples of read/write
devices.
2- SEQUENTIAL VERSUS RANDOM ACCESS :
sequential storage device requires the computer to scan from
the beginning of the medium to the end until it finds the data
it needs such as tape drive. It is slow and cheap than other
types of storage. It used to backup the data because it is
provided high capacity, A random access storage device lets a
computer go directly to the needed information. devices are
much faster, and more expensive, A hard drive is an example of
a random access storage device.
CD-R
Sequential access
v
T
99934
Paaeeve
Random access
34Hardware-STORAGE
Categories of Storage Devices (but not RAM) are divided into three categories:
3- MAGNETIC STORAGE vs Optical Storage Magnetic storage devices are specially treated
disks or tapes, such as those mentioned previously, that record information using magnetically
sensitive materials, Example -> hard drives and tape drives. . Optical Storage A laser then
scans the disc and changes the data into a form the computer can work with. CDs, DVDs, and
Blu-ray Discs A laser sensor starts to read from the center of the disc’s spirals and moves
outward.
Limitations of Hard Drives
The amount of information a hard drive can hold depends on several factors.
the number of platters contained in the hard drive. The greater the number of platters, the
more information a drive can store.
the number of read/write heads. Generally, there is a read/write head for each side of each
platter. However, sometimes one side of one platter will not have its own read/write head.
That means information cannot be stored on that side.
32Hardware—STORAGE
EFFECTS OF PERFORMANCE
The faster the hard drive, the faster your computer will read and write data. The platters in most
hard drives can spin at a rate of 7,500 rpm (revolutions per minute), but some can spin at rates
as high as 15,000 rpm. HARD DRIVE SPEED This is measured by its access time, the amount of
time it takes for the device to begin reading the data. All storage devices are significantly slower
than RAM. RAM speed is measured in nanoseconds, or billionths of a second. A storage device's
speed is measured in milliseconds, or thousandths of a second. SSDs have better read
performance because the data does not get fragmented into many locations, SSDs do have
disadvantages, though. They cost more per gigabyte. Their limited number of write cycles means
their performance declines over time.
FLASH MEMORY DEVICES
flash memory offer the speed of memory with the high capacity of a magnetic storage device.
(faster) - > because they have no moving parts, and they do not require battery power to retain
their data. these drives offer the advantages of speed, capacity, and cost. A USB flash drive has a
USB connector that plugs into the USB port on a computer
33Every computer is composed of two basic components:
1- hardware includes the Physical features, which are every part that you can either see or
touch.
2. Software includes all of the programs that tell a computer what to do and how to do it.
oti
CINE
Terie)
er ert
Cras
34Software
What Is Software? hardware is useless without software.
Software includes all of the programs that tell a computer what
to do and how to doit.
Types of Software : Software
+ system software includes programs that help the computer
work. There are two types of system software:
1, Operating systems (OS) lets the hardware devices
communicate with one another and keeps them running
efficiently, It also supports the hardware when
applications programs are running. \__ 7
35,
2. utility software usually do maintenance and repair jobs
that the operatingsystem cannot do itself.
+ application software : programs designed to help you do
tasks such as writing a paper or makinga graphSoftware - Operating System
An operating system (0S) is a set of instructions designed to work with a
specific type of computer, such as Windows 10 for a PC or macOS for a
Mac. The OS controls all the computer's functions. It also provides an
interface, the on-screen tools you use to interact with the computer and
your programs.
The operating system performs several tasks:
+ Manages the (CPU) so that processing tasks are done.
+ Manages computer memory.
+ Manages files stored on the computer's disks.
+ Manages input and output devices.
+ Loads application programsinto memory.
+ Providing the user interface: organizing and displaying the options you
see on your screen when you turn on your computer.
AVOIDING CONFLICTS In most computers, especially personal computers,
the operating system is stored on the hard drive. Before you can use the
computer, a portion of the operating system must be loaded into
memory. conflicts can occur when two programs try to occupy the same
space in RAM. When this happens, one or both of the programs may
crash, or stop working, until the conflictis resolved.
36Software - Operating System.
VERSIONING, UPDATES, AND UPGRADES
Fix problems or make improvements is called update and usually delivered for free. Upgrade
introduces new features and user need to buy it. Versioning is the process of numbering
different releases of a particular software For example, release 1.0 might be the first version of
the product UPGRADE. Release 1.1 might be an update first update.
There are four kinds of operating systems:
1. REAL-TIME SYSTEMS are used to control large equipment, such as heavy machinery and
scientific instruments, and to regulate factory operations. They require little user
interaction.
2, SINGLE- USER/SINGLE-TASK SYSTEMS This kind of system lets one person do one task at a
time. An example is the operating system that controlsa handheld computer.
3. SINGLE-USER/MULTITASKING SYSTEMS A multitasking system allows the computer to
perform several jobs, either one after the other or at the same time, Most desktop and
laptop computers today use this kind of system.
4, MULTI-USER SYSTEMS These systems allow many individuals to use one large computer.
UNIX® is an example of this type of operatingsystem. 37Software - Operating System
Popular Operating System
+ MACOS X® In 1984, Apple® became the first computer maker to sell consumers a personal
computer equipped with a GUI. Macintosh names both the computer and its operating
system. some version of macOS runs all Macintosh computers.
+ MICROSOFT WINDOWS The Windows OS is currently the market leader, installed on more
than 90 percent of personal computers. Early versions of Windows were based on MS-DOS.
In fact, Windows 98 was the last version of Windows based on MS-DOS.
+ UNIX AND LINUX™ UNIX was one of the first operating systems ever written. It was
designed to work on powerful business and scientific computers. Later versions of UNIX
have been developed to work on personal computers. One of these versions of UNIX is
Linux. Linux works with an optional GUI and is very fast compared to other operating
systems, It is also unique in that it is an open source operating system, in which the source
code used to create it is available to the public. Linux is free and can be downloaded from
the internet, but most users buy it with other features. Though Apple and Microsoft
dominate the market of OS for personal computers, Linux claims a share of the web client
OS market. 38Software - Operating System
GUI - graphical user interface
The operating system’s user interface lets you start programs, manage disks and files, and shut
down the computer safely. To start the OS, you turn the computer on. During the startup
procedure, the OS places part of itself into the computer's memory. DESKTOP Nowadays,
computer operating systems are based on visual displays. The graphical user interface, or GUI
(GOOee), lets you use a pointing device to interact with the workspace on the computer
screen, called a desktop. ICONS : on the screen, pictures called icons or tiles represent
resources on the computer,
Operating Systems for Mobile
Mobile operating systems have been designed to maximize the efficiency of a smaller
touchscreen, limited memory, and limited storage capacity. Smartphones actually contain two
operating systems: one that supports the user’s software and one that operates the phone's
hardware. Three common mobile device operating systems are Apple's iOS, Microsoft's
Windows Phone, and Google's Android.
39Software - Operating System
System Util
Utility isa collection of programs that help you maintain and repair your computer. Today, many
types of utilities are built into the operating system. The most important utilities are file
managers, which let you work with data stored on your computer,
ORGANIZING FILES The operating system, programs, and data are all stored in files, each with a
name. Files can be grouped together into folders. Folders are also called directories. A folder
can be divided into subfolders. USING FILES You can use an operating system's file manager to
perform several tasks:
+ Create new folders or subfolders.
+ Move or copy items between folders or to other disks.
+ Delete files and folders.
* Launch applications.
FINDING FILES You can use the file finder utility from your operating system to help you look for
a file. This utility can search for a file by its name, type, date, or even by looking for specific
data inside the file.
40Software - Operating System
System Util
NAMING FILES AND FOLDERS When you create a new file or folder, you give it a file name.
Using descriptive names helps you identify the contents and keep your data organized. Most
operating systems have specific file and folder naming conventions. They usually let you use
file and folder names with up to 255 characters, including spaces and punctuation. You cannot
use <>, /,\, |, 2, oF*.
FILE TYPE Some operating systems, such as Windows, automatically add a period and a file
extension to file names. A file extension is a short series of letters that indicate the application
used to create the file and the file format. The file extension determines the file type.
For example, a Microsoft Word document has the extension .doc or docx. xlsx extension
opens in Microsoft Excel and a file with a .pdf extension opens in Adobe Reader or Acrobat. .txt
Text Document .pptx Microsoft PowerPoint Presentation .wav Waveform Audio File .mp3 MP3
Audio File jpg JPEG Image File zip Compressed File .html HTML File .csv Comma Separated
Values Document.
a4Software - Operating System
System Util
* DRIVER UTILITIES A driver utility contains data needed by programs to operate input and
output devices such as a mouse and printer. Operating systems that have Plug and Play
(PnP) capability can automatically detect new PnP- compatible devices. Otherwise, you can
download the files from the device manufacturer's website, or use the installation CD/DVD.
* PROGRAM UTILITIES Before you can use a program, you must install it on your hard drive.
In Windows, you can use the Add/Remove Programs utility to ensure that your program
installs properly. You can use the same utility to uninstall, or remove, a program you no
longer need, or to reinstall a program thatis not working the way you want.
+ BACKUP UTILITIES Backup utility programs automatically copy data from the computer's
hard drive to a backup storage device, such as an external hard drive or a CD. Operating
systems usually include a backup utility such as Windows 10’s File History. You can set the
utility to automatically backup files on a schedule, or you can backup files manually. You can
create a full system backup, which is sometimes called a system image, or you can select the
files to backup.
42Software - Operating System
System Util
* FILE COMPRESSION UTILITIES File compression utilities are programs that reduce the size of
files without harming the data. These programs make it easier to copy and transmit files
because it is easier to transmit a smaller, compressed file. Most email programs have size
limits for transmitting and receiving messages. Windows come with a builtin file
compression utility you can use to compress—or zip—one or more files or folders. Select the
items, select the Share tab, and then select Zip on the Ribbon. The zipped file has a .zip file
extension.
+ DISK MANAGEMENT Running a utility called a disk scanner, which checks magnetic disks
for errors, can fix this problem. A disk scanner looks for and tries to correct irregularities on
a disk’s surface. You can use a disk cleaner utility to identify files such as cookies, offline web
pages, and temporary files that you can delete to make more disk space available.
+ DISK DEFRAGMENTER Files-> saved in different areas of the hard drive. File fragmentation
occurs when a file is broken into pieces that are saved in different places on a hard drive.
+ Operating systems come with utilities you can run in order to free up disk space. For
example, Windows comes with Disk Cleanup 6Software - Operating System
System Util
+ VIRUS DETECTION Viruses and malware can enter your system through infected email
messages, programs, and files. Malware is any type of software designed to damage or
disable your computer system or data. A virus is a type of malware that can replicate, or
copy, itself. A Trojan, or Trojan Horse, is a type of malware that allows unauthorized access
to your computer. Antivirus and antimalware utilities constantly monitor your system for
viruses and malware programs that can slow down processing or damage your data and
devices. Once there, they can destroy or corrupt data. Antivirus programs check your
computer’s memory and disks looking for virus code. Most programs can also check email
and files as they are downloaded to your computer from the internet. If the program
discovers a virus, it alerts you and then attempts to quarantine, or disable, and remove the
virus. Operating systems often come with an antivirus utility such as Windows Defender. You
can also installa program such as Norton Security Backup or McAfee Internet Security.
44Software - Operating System
POWER OPTIONS
Using more power might increase performance, Some operating systems, such as Windows,
have built-in power plans designed for maximum performance, maximum energy conservation,
ora balance.
POWER STATES:
sleep mode, which may be called standby, power is shut off to non-essential components.
Some power is used and data remains in RAM. In hibernate mode, data from RAM is saved to
the hard disk and then power is shut down,
USER CREDENTIALS One way to protect data is to set up user accounts that identify who can
access a computer, Each user is assigned a username and a password that he or she must
provide in order to gain access. Usually, the system's lock screen displays until the correct
credentials are entered
45Software - Application
Application Software
is a computer program designed to carry out a specific task other than one relating to the
operation of the computer itself, typically to be used by end-users.
For example:
Word processors for writing letters and reports
Spreadsheets for working with numbersand doing math
Databases for storing and finding information
Presentation graphics for creating slide shows
Desktop publishing for creating printer-ready publications such as brochures.
Telecommunications for using the internet and email
46Software - Application
Application Software
There are many different applications. They can be grouped into four
main categories:
1- Productivity software helps people be more productive at work. (write reports, prepare
financial plans). Graphics software makes it possible to draw, paint. Communication software
allows computers to connect to the internet and to send email.
2- CUSTOM SOFTWARE Some organizations need software programs to do very specific jobs.
Because these programs are custom written, they are usually quite expensive,
3+ OFF-THE-SHELF SOFTWARE Most people use software to do standard jobs. They might want
to write letters or organize an album of photos. They can choose from many ready-made
programs to handle these common tasks. These are called “off-the-shelf” programs because
stores and companies that sell software online stock them. Most off-the- shelf software
purchased online can be downloaded directly onto the buyer's computer. It is less expensive
than custom software.
4- APPS “application” usually used for programs developed specifically for smartphones, tablet
computers, and other handheld devices. “7Software - Application
Application Software classifications:
* STAND-ALONE application specializes in one task. Stand-alone programs can have many
useful and advanced features. However, may cost more than other forms of application
software.
+ INTEGRATED SOFTWARE combine the basic features of several applications into one package
it might require too much memory in your computer or may cost too much. They are not as
powerful or as complete as their stand-alone,
+ PRODUCTIVITY SUITES combine several programs such as word- processing, spreadsheets,
databases, and graphics in one package with full features. It cost more than integrated
software, but usually they are cheaper than buying the stand-alone programs separately.
Some common productivity suites include: Microsoft Office - Corel WordPerfect Office -
Adobe Creative Suite.
+ WEB APPLICATIONS which may be called online or cloud apps, are applications that reside
on a web server and run in a web browser. Recall that this type of computing is often called
software as a service (SAAS). For example, Microsoft offers a version of its Microsoft Office
suite online, and Google offers Google Docs. “sSoftware - Application
Application Software types based on whether it is developed for a few users with very specific
needs or whether it appeals to many users with shared needs.
1. VERTICAL APPLICATION is designed for a very limited purpose, such as restaurant
management or medical billing. useful to one field or business, it is of little interest to
others.
2. HORIZONTAL APPLICATION is a general- purpose program that meets the needs of many
different users. It can be applied to many tasks. It also tends to be less expensive.
Horizontal applications can be divided into several categories depending on the focus of the
program.
+ PERSONAL PRODUCTIVITY The most popular horizontal applications are known as personal
productivity programs such as word processors and database systems.
+ MULTIMEDIA APPLICATIONS combine text, graphics, video, and sound. These include:
Desktop publishing—to combine text and graphics to produce newsletters and brochures.
+ INTERNET APPLICATIONS help users communicate over the internet, including: Web-
browsers.
= ONLINE OR MOBILE APPS. a9Software - Application
Application Software types based on cost, copyright, open source
+ COMMERCIAL SOFTWARE Companies own the copyrights to the application software they
sell to the public. This prevents you from illegally copying it to sell it to others, giving it away,
or sharing it. Also be called proprietary software, must buy before using. Software where the
user doesn’t gain access to the program’s code is also called closed-source software.
+ SHAREWARE software that you can use on a try- before-you-buy basis is called shareware.
You are also allowed to copy shareware and give it to your friends.
* FREEWARE Some companies give away their copyrighted software for free. The companies
allow users to install the program as long as they do not resell it.
* OPEN-SOURCE SOFTWARE open source is not automatically “free” you may have to pay for
it. However, unlike proprietary software, this kind of software makes the source code
availableto the public. The idea is that the software will improve.
* CREATIVE COMMONS license lets software copyright holders open some of their work for
public while letting them hold onto other parts of their work such as the photo sharing site,
* PUBLIC DOMAIN SOFTWARE allow you to use, share, give them away, or even alter them to
meet certain needs. Beware: the quality of these programs can vary widely, and they may
contain more errors than other types of software.
50Software - Application
Application Software
Minimum System Requirements Each software program has minimum system requirements.
The computer must meet the minimum hardware and software needs of the program for it to.
work properly. your type of computer (Macintosh or PC compatible) microprocessor speed
operating system (such as Linux, MacOS X, or Windows) available amount of memory (RAM)
available hard drive space special equipment, such as speakers Software that is not compatible
with your system will not work,
icense types:
Buying proprietary, copyrighted software comes with a software license, which allows the
buyer to use and install the program, and sometimes entitles the buyer to receive free or
reduced cost support and updates. Individuals might buy a single-user license for one copy of
the program, or a single-seat license to install the program on a single computer.
Organizations such as schools or businesses usually buy a volume or site license, which lets
them install on multiple systems or a network for multiple users. Network licensing generally
costs less per user and allows users to share resources
54Software - Application
Application Software - Documentations
Most software packages provide directions on how to install the program, to use the
application, and to troubleshoot, or correct, problems. These instructions, called
documentation, are typically available in three forms:
1, information on the publisher's website
2. printed tutorials and reference manuals
3, electronic help screens in the program or on CD-ROM
Application Terms:
Windows : programs and documents display in windows, or rectangular, on-screen frames that
can be opened, closed, resized, and rearranged.
Most programs use a combination of drop-down menus (sometimes called pull-down menus)
and buttons to present commands.
In Microsoft Office, commands are on the Ribbon, a series of tabs at the top of the window.
Each tab has a group of related commands for specific tasks.
There is also a Quick Access Toolbar at the top of the application window. You can add and
remove buttons so it displayscommands you use frequently. =Software - Application
Application Software
Application Terms:
DIALOG BOX Dialog boxes and task panes provide options that let you
customize the command. Often, you can set several options at the same
time. Some of the ways you select optionsin a dialog boxare:
Radio buttons which may be called option buttons, are small circles to
the left of each item in a list of options. The selected item has a small dot
inside the radio button. Only one option in the list can be selected,
Check box are small squares to the left of each item in a list of options.
Selected check boxes are marked with an X. Usually multiple options in
the list can be selected.
List box A list box is a scrollable list of choices. You can select one item in
the list. The selected item usually displaysin a boxat the top of the list.
Multiple selection list. A multiple-selection list box is also a scrollable list
of choices, but each choice has a check box. You can select multiple items
in the list by selecting multiple check boxes.
53Software - Application
Application Software - Application Terms
REPRESENTING DATA Some programming languages require the programmer to assign a data
type to variable data.
Some common data types include :
string, which is a sequence of characters that does not contain numbers used for calculations;
numeric, which is numbers or amounts that are used in calculations; character, which is text;
integers, which represent whole numbers; and date, which is the method of coding dates.
Stringa, b, ¢; Chara, b, ¢;
a="Hello,";
b="Bob";
54Communication and Networks
Telecommunications
Sending information over a telephone network. Telecommunications can be duplex or half-
duplex. duplex communication, the people on both sides can communicate at same time, like
on a phone call. In half-duplex communication only one side can communicate at a time, like
through walkie-talkies,
* For local calls, the phone company provides directly wired services between the homes and
businesses that belong to the local network.
+ Landline telephones connect to a common network for telephone service, This common
network, called the local loop, connects to the phone company’scentral office.
+ The local loop from the central telephone office to the user is still an analog system. An
analog system sends electrical signals that carry voice and other sounds.
+ LONG-DISTANCE CALLS Outside the local loop, the long- distance telephone system today is
mostly digital. Digital connections use computer code and can carry voice, data, and video
ona single line.
55Communica
in and Networks
Telecommunications
Analog vs. Digital Communications People often confuse the terms “analog” and “digital” when
they are talkingabout communications or computers.
In analog communications, sounds such as @ person's voice or music start as waves or
vibrations in the air. The vibrating air varies in frequency or pitch, which is how high
or deep the sound is, as well as strength or loudness. A small microphone in the telephone
converts the sound waves into varying patterns of electrical signals or radio waves. The pattern
of electrical signals or radio waves is similar to the pattern of the sound waves. These signals
are converted back into sound waves by a small loudspeaker in the receiver. In digital
communications, sounds are converted into binary data (a series of 1s and Os) at the caller's
end, The stream of 1s and 0s is transmitted without any variation in the pattern of electrical or
radio waves. The receiver converts the binary data back into sound waves.
56Communication and Networks
Computer Networks
A network is a group or system of connected things. A computer network, which may be called a
data network, is two or more computing devices connected to each other so they can share data,
devices, and other resources.
NETWORK INTERFACE Cards NIC
handles the flow of data to and from the computer in both wired and wireless networks. If the
network is put together by actual cables, those cables connect to the NIC. NICs often have a light
that blinks green and amber to alert you to activity it’s experiencing,
WIRELESS ACCESS POINTS Even wireless networks require physical media. In ad
ion to a
wireless NIC in the device, the network needs a wireless transmitter, or hub, called a wireless
access point (WAP).
57Communication and Networks
Computer Networks
Specifically, computers communicate with languages
called protocols. A protocol sets a standard format for
data and rules for handling it. For computers to speak
with one another, they must use the same protocol.
Communication on the internet depends on all
connected devices using software called TCP/IP
(Transmission Control Protocol/Internet Protocol).
Voice over Internet Protocol you can use the internet to
send and receive messages over the telephone. Voice
over Internet Protocol (VoIP) technology allows you to
have a telephone connection over the internet. VoIP uses
data sent digitally, with the Internet Protocol (IP), instead
of analog telephone lines. Most VoIP applications, such
as Skype and Facetime, integrate cameras so callers can
see each other during their call.
58Communication and Networks
Computer Networks
PHYSICAL MEDIA To create a computer network, each device must be able to communicate
with the network. This requires establishing the physical connection using physical media. The
medium can be any type of telecommunications connector: twisted pair telephone lines,
coaxial cable, fiber-optic cable, or a microwave, radio, or infrared system. The WAP is the
central transmitter for sending and receiving wireless signals. It may be built in to the wireless
router, or it may be a separate device that connects to the router using an Ethernet connection,
+ TWISTED PAIR the entire telephone system depended on twisted pair technology. Twisted
pair refers to a pair of copper wires that are twisted together to reduce interference, or
outside noise. Twisted pair wiring can be either shielded (STP) or unshielded (UTP). Twisted
pairs may be shielded to prevent electric interference from other sources.
+ COAXIAL Another type of copper cable is called coaxial. A coaxial cable, or coax, is a
traditional analog wire used to transmit cable television. These copper wires connect a cable
in the home to a neighborhood node, and from there to the service provider.
59Communica
Computer Networks
Twisted
pairs with
color-coded
plastic
insulation
Pale
shields
overall
shield
outer
jacket
Shielded twisted pair
n and Networks
‘Twisted
pairs with
color coded
plastic
insulation
outer
Jacket
Unshielded twisted pair
Insulation Copper
‘copper
mesh
outer
jacket
Coaxial
60Communication and Networks
Computer Networks
PHYSICAL MEDIA
* FIBER-OPTIC CABLES Fiber-optic cables are strands of fiberglass that transmit digital data by
pulses of light. These cables can carry large quantities of information. They work faster and
more efficiently than copper wires. As they get lower in price, it is likely that fiber-optic
cables will eventually replace copper completely.
+ 3G AND 4G Wireless communication frees users from traditional telephone lines. Messages
are sent on radio or infrared signals. Cell phones use radio signals, Cell phone networks are
usually referred to as 3G (short for third generation) or 4G (for fourth generation). WI-FI
networks use radio signals to connect computers. If a cell phone has a Wi-Fi adapter, it can
transmit calls and provide other services using the internet.
+ SATELLITES A satellite telephone, or sat phone, transmits signals using communications
satellites orbiting Earth. The caller phone transmits a signal to a satellite, which sends the
signal to a land-based center, which then sends the signal to the receiving phone. Because
satellite phones do not rely on cell towers, they are useful in remote areas, includingat sea
61Communication and Networks
Computer Networks
IP Addresses
Each device that connects to the internet has to be uniquely identified. To do
this, every computer is assigned a four-part number separated by periods called the internet
protocol (IP) address. For example, the IP address for your computer might be 123.25.91.7
Any device with an IP address can communicate with any other device with an IP address over
the internet. An IP address is usually automatically assigned by a Dynamic Host Configuration
Protocol (DHCP) server. You can locate your computer's IP address and connection speed in the
Network and Sharing Center in Windows and in the Network Utility on macOS.
123.25.91.7
+ Aparts
* 3 periods
+ Each part has number (0-255)
62Communication and Networks
Computer Networks
IP Addresses
PUBLIC AND PRIVATE NETWORKS When you use the computers in your local library, you are on
a public network that anyone can access. The networks in your school or home, are private and
usually require an ID and password for access. There are also public and private IP addresses.
Public IP addresses are used by all computers connected to the internet by a modem, including
your home network computers. Private IP addresses are used on internal networks, such as a
company intranet. Private IP addresses cannot be contacted directly over the internet the way
a computer with a public|P address can be,
: t
CI Pa tor nme
s92.108.0.162 LS
a i Router
Re
a
Oe “ .
ronan aes
Public Address
s92.t60.0.149
yasta1ae
63Communication and Networks
Computer Networks- Devices
MODEM AND ROUTERS Modems and routers direct the input of data between multiple
computers. Originally, modems were used to send computer data over telephone lines so
computers could access the internet through dial-up. Modern modems can send information
through cable, satellite, or DSL. The modem converts the data from analog format to the digital
format 2 computer can understand, and then back to analog so it can be transmitted. When
the modem changes the digital signal of the computer to the analog sounds used by
telephones it is called (modulation) while (demodulation) is changes the analog signals back to
digital. Modem speed is measured in bits per second (bps), which is the amount of data that
can be sent in one second.
a
‘Send Movie File.
Modulation: Digital to Analog | Demodulation: Analog to Digital
64Communication and Networks
Computer Networks- Devices
MODEM AND ROUTERS
Routers forward data from one source to another, such as between two computers or between
a computer and the internet. For internet access, a router is connected to a modem, usually
using an Ethernet cable. The modem connects to an internet provider and the router directs
the flow of data between the internet and computers.
=) Bs
65Communication and Networks
Computer Networks- Terms
A workstation is a computer connected to a computer network. It is often set up with the same
operating system, applications, and access to resources as the other computers in the network.
Ina large network, a workstation may also be called a node by the people who take care of the
network. A gateway is a node on your network that enables communication with other
networks, such as the router on a home network that lets you connect to the internet.
WORKSTATION ALTERNATIVE Sometimes, in large organizations, network users work at a
‘terminal, which usually includes a keyboard, a monitor, and a pointing device, such as a mouse.
A terminal can feel as if the computer is local, but it’s not. Users are actually sharing time on a
central computer, with their own work displayed on their terminal’s monitor. Using terminals
can save on the cost of purchasing workstations. They are also useful in situations with limited
need for a workstation, such as a publiccomputer in a library.
Network traffic : Once a network is created, the computers and other connected equipment
can communicate with one another. The communication on a network is called network traffic
is the electronic pulses of information sent by the network cards to carry data through the
network wires to its destination. “6Communication and Networks
Computer Networks- Terms
SHARING FILES : making files available to more than one user on the network. The file is stored
on a network server so anyone with permission rights may access the file from any location.
COLLABORATIVE SOFTWARE enables the network to help people work together more closely.
users can share calendars, work on a document together, or even hold meetings through the
network. Collaborative software is also called groupware.
SHARING PERIPHERALS LAN allows users to access remote resources, such as printers, fax
machines, or any other equipment, that is not connected directly to your computer, but is
connected to the network.
BANDWIDTH
is the amount of data that can be sent through a modem or network connection, The more
bandwidth, the faster the connection. It is usually measured in bits per second (bps) or in
megabits per second (Mbps). The more bandwidth, the more information can be transferred in
a given amount of time.
67Communication and Networks
Computer Networks- Terms
BROADBAND
Broadband is the general term for all high-speed digital connections that transmit at least 1.5
megabits per second (Mbps), though current broadband services usually transmit between 10
and 30 Mbps. Mobile phones use mobile broadband, which transmits around 10 Mbps. Several
broadband technologies are available, including Digital Subscriber Line, cable, fiber optic, and
4G, and more are on the horizon,
Broadband Types:
+ Fixed broadband refers to wired networks, such as fiber optic and
(DSL), which are used for television and internet access.
* Mobile broadband refers to networks like 3G and 4G, which are used by cellular phones and
other mobile devices.
68Communication and Networks
Computer Networks- Terms
BROADBAND
Broadband transmission speed is affected by distance from the local telephone switching
station, condition of the wiring and other equipment, and the number of people using the
service.
One of the most common fixed broadband services is Digital Subscriber Line (DSL). DSL uses
the same copper wires telephones use, but transmits data in digital form rather than analog.
DSL allows for very fast connections to the internet and features an “always-on” connection,
DSL service also requires a modem There is one drawback to DSL: A user must be within a few
miles of a local telephone switching station for a connection to be made.
There are also two basic types: asymmetric DSL (ADSL), which has faster download speeds
than upload speeds, and symmetric DSL (SDSL), which can send and receive data at the same
speed. ADSL is more common. SDSL is generally used by businesses, while ADSL is used in
private homes and businesses.
69Communication and Networks
Computer Networks- Terms
BROADBAND
SONET Telephone companies that offer DSL and other internet connection methods rely on a
digital network called SONET. SONET stands for Synchronous Optical Network, It uses fiber
optics to provide faster connections and greater bandwidth—from 52 Mbps to up to a
whopping 40 gigabits per second (Gbps).
VIRTUAL PRIVATE NETWORKS A virtual private network (VPN) is a private, secure network set
up through a public network. VPNs are a more secure way to login to a private network from a
computer on a publicnetwork.
70Communication and Networks
Computer Networks- Terms
What Is an Intranet? is a private network that uses the same TCP/IP protocols as the internet.
COMPARING INTRANETS AND THE INTERNET Intranets offer many of the same services the
internet does, such as email and access to websites. Intranets are different from the internet in
that they are not meant for public use, Firewall software prevents outsiders from accessing the
intranet. CREATING AN EXTRANET allows for limited public access. Companies often use
extranets so employees can access the network while they travel or when they work from
home. Extranets are also used to share information with other businesses.
veN
Firewall
ee
Company Intranet
71Communication and Networks
Computer Networks - Network Topology
A map of a network shows the physical structure of the network, including servers,
workstations, and other network devices. The network's layout is called the network topology.
collision occur when two computers try to access the network at the same time. To avoid such
collisions, each computer divides its data into very small, fast-moving packets.
* BUS TOPOLOGY An older network design, bus topology is rarely used now. In a bus, devices
are connected to a single network line like a string of holiday lights. When one network
device fails, the entire network fails, and adding new devices to the network can also be
tricky.
Bus
72Communication and Networks
Computer Networks- Network Topology
* RING TOPOLOGY connects all the network devices in a circle. To control collisions, such
networks pass tokens, or special units of data, around the ring. Only the workstation that
has control of the token can send other data onto the network, Because of the token-
passing technique, these networks are also called token rings. If the network is wireless,
wireless token rings. Like bus topology, one fault can disrupt a ring network, but this
network type has the advantage of not requiring a network server.
3Communication and Networks
Computer Networks- Network Topology
STAR TOPOLOGY connects each network device to a central hub. A hub is a connection
point for all the computers, printers, and other equipment on the network. Adding and
removing devices to a star network is easy. If the hub loses power or fails, however, the
network devices will not be able to communicate. Star topology avoids collisions by using
strategies that manage contention
STAR BUS TOPOLOGY connects multiple star networks along a bus. It is the most common
design used in LANs today. A backbone is a fast network medium that provides
communication among all of the networks. It links all the hubs in the school
os
af
Star
74Communication and Networks
Computer Networks- Network Topology
MESH TOPOLOGY the components are all connected directly to other components. Because
this topology connects devices with multiple paths, redundancies exist. But, because all
devices are cross-connected, the best path from one to another can be taken at any time.
The drawback to mesh topology is that needing at least one and a half connections for each
computer makes it very expensive to construct. This topology is usually used in the internet
structure.
75Communication and Networks
Computer Networks- Network strategies
Using a Peer-to-Peer Network Your peers are your equals means each user decides whether
any files on his or her computer will be shared. Peer-to-peer networks are usually small, having
anywhere from two to ten computers and easy to create. P2P networking has some drawbacks:
Security problems can arise. Data can be hard to back up. With many users, file sharing can
become difficult. Managing resources can be complicated. If one computer fails or is turned off,
its resources are no longer available to the network.
7 \
= =
\ 7
= —
76Communication and Networks
Computer Networks- Network strategies
Using a Client/Server Network Large businesses usually use a client/server network. With this
system, one powerful computer called Servers provides information and management services
to the workstation computers, which are called clients. Server it contains the network
operating system, other programs, and large data files. The network operating system (NOS)
manages and secures the entire network. A client/server network is far more secure than a P2P
network, EVALUATING A CLIENT/SERVER NETWORK For a large office, file servers are better
than peer-to-peer networks, for several reasons: They offer a central location for files. Data is
easy to back up and easy to recover. Servers are faster than workstations. Servers are rarely
turned off, although they can be offline for maintenance. Security is easier to maintain.
77Communication and Networks
Computer Networks- Network Types
Home, school and many business networks are usually local area networks (LANs). A LAN is 2
network in which all the workstations and other equipment are near one another. A LAN can
have just a few or several hundred users. Small or large, a LAN lets its members share
equipment and information, resulting in lower costs. Some of the key functions that benefit
LAN users include sharing files, using collaborative software, and sharing peripherals. LAN
ADMINISTRATOR design, install, and maintain the LANs in organizations.
A metropolitan area network (MAN) is a computer network that connects computers within a
metropolitan area, which could be a single large city, multiple cities and towns, or any given
large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller
than a wide area network (WAN).
A wide area network (WAN) connects computers and other resources that are far apart. A
business with offices in many places can use a WAN to link its LANs in different cities. Once a
WAN is created, users may not even realize the files they are sharing are remote, And that's the
way it should be. Users should not worry about the physical location of the shared files, just
that the files are available. 78Communication and Networks
Computer Networks- Network Security
On an unsecured network, anyone within the network can access information. Secured
networks, however, limit access and protect the computing devices and users.
Unsecure networks allow for free flow of information but leave little protection from hacking
for the individual computers. Unsecured networks may be called public networks, although
your home network may also be unsecured. An unsecured wireless network can be accessed by
anyone within range of the wireless signal. It does not require a login or password and does not
use encryption to protect data. Connecting to an unsecured network exposes your data and
hardware devices to risks.
secured networks prevent unauthorized access is by requiring users to enter an ID and
password, Another way is by using a firewall. You can secure a wireless network by using an
encryption protocol such as Wi-Fi Protected Access 2 (WPA2).
79The internet and the web
The Internet
is a global WAN, or network of networks. It connects everything from a single smartphone to a
data center housing hundreds of servers. The internet can even connect devices that run
different operating systems. The internet is made up of three important parts: servers, clients,
and protocols. SERVERS Internet servers are the computers that provide services to other
computers by way of the internet. These services include processing email, storing web pages,
or hosting cloud-based data, CLIENTS AND PROTOCOLS internet clients are the devices that
request services from a server,
A way to access the internet
INTERNET SERVICE PROVIDERS An internet service provider (ISP) is a company that provides a
link from your computing device to the internet. An ISP does not usually provide online
services; it only provides an easy-to-use connection to the internet. However, some ISPs now
offer cloud-based storage and email.
80The internet and the web
The Internet
Differences between the Internet and other WANs:
+ The Internetis publicand WANs are usually private.
+ The Internetis not as secure as a private WAN connection.
+ A WAN is used for more than just browsing Web pages. It provides access to network
resources.
Web browser : Software has the ability to browse the contents of the web
Examples of Web Browsers :
+ Google Chrome
+ Mozilla Firefox
+ Apple Safari
+ Microsoft Edge
81The internet and the web
The Internet - Accessing Information
The World Wide Web (www) is a huge collection of hypertext documents, where certain words
or pictures can serve as hyperlinks. A hyperlink is a link to another document on the World
Wide Web. Every document has a unique address, called a uniform resource locator URL which
tells exactly where the documentis located on the Internet.
Hypertext Transfer Protocol (HTTP). HTTP sets the rules for how web servers and web
browsers will respond to commands. Create Web documents by using HTML (Hyper Text
Markup Language). Formatting the Web by a style sheet or a separate document that
describes rules used to define how the elements of the pages in @ web site will look (Cascading
Style Sheets or CSS).
The difference between the Internet and the World Wide Web :
+ the Internet is a network of computer networks
* the World Wide Web is a service available on the Internet
82The internet and the web
The Internet - Web Terms
* A Web page is a document on the Web.
+ AWeb site is a collection of related pages, which are connected using hyperlinks
+ AWeb server stores Web pages and responds to requests from Web browsers
+ Most Web sites have a primary page called the home page or index page which appears
when you first enter the site's URL.
DNS (Domain Name System) :
A domain name uses plain language to identify one or more IP addresses and is used by others
to locate information on the internet. For example, an internet server computer’s domain
name might be whitehouse.gov but its numeric IP address might be 206,166.48.45
The Domain Name System (DNS) a special server (DNS server) matches each domain name to
the correct IP address. Within DNS, each computer on the internet must havea uniquename.
83The internet and the web
The Internet - DNS
The central database of domain names is called the WHOIS database. You can look up
information about the owner and servers of a certain domain on this database.
The organization responsible for maintaining the database of registered domain names is the
Internet Corporation for Assigned Names and Numbers (ICANN). Registrars are organizations
that are authorized to reserve and give out domain names. Many of them are responsible for
specific DNS registries. For example, the Public Interest Registry is responsible for maintaining
the .org registry. If you want to register a .org domain name, you would contact the Public
Interest Registry.
84The internet and the web
The Internet - SECOND- AND TOP-LEVEL DOMAINS
Every domain name includes a second-level domain name and a top-level domain name. The
top-level domain identifies which registry—or part of the internet—where the name is
registered, The top-level domain starts with the last period in the address—called dot—and
includes the suffix that displays to the right of the dot. The second-level domain name usually
identifies a specific company, organization, or even individual. It displays to the left of the last
dot, Example -- https://wwwwhitehouse.gov
* https -> protocol
+ www > subdomain or third level domain
+ whitehouse > the second-level domain
+ gov-> the top-level domain
The most common top-level domains are .com (commercial), .edu (education), .org (nonprofit
organizations), .gov (government), .mil (military), and .net (network organizations). Other top-
level domain names incude.biz (business) and .museum (arts and culture). New top-level
domains are added as the need arises. Top-level domain country codes are two letter codes
that identify the country where the site is located. For example, .us is the country code for the
United States.
85The internet and the web
The Internet — URL
PROTOCOL is the first part of a URL specifies the protocol required to access the document
http:// Some URLs might have other protocols, such as FTP, which shows that the file should
be retrieved with file transfer protocol. Another protocol, telnet, allows for access to remote
computers.
DOMAIN NAME The next part of a URL, such as www.fbi.gov, is the domain name.
PATH lists the folder and subfolders, if any, containing the desired document. Thus, a URL such
www.fbi.gov/employment/identifies/x1.php a folder
named employment on the site’s web server. RESOURCE FILE NAME At the end of a URL, you
may see the name of a file—the specific web resource for which you are looking. The resource
may be an HTML document or a web page, a video clip, a text file, or another type of resource.
The filename extension identifies the type of resource.
86The internet and the web
The Internet — FTP
Transferring Files File Transfer Protocol (FTP) lets you transfer files on the internet. With an FTP
client, you can transfer files from an FTP server to your computer in an operation called
downloading. In uploading, you transfer files from the client to the server.
File Transfer Issues
+ COMPUTER VIRUSES It’s 2 good idea to check all downloaded files for viruses before
opening them. Most antivirus programs will do this for you automatically.
+ FILE COMPRESSION The larger a file is, the more time it takes to travel over a network. File
compression is a way of reducing file size so it can travel more quickly over a network. Some
compressed files are set to decompress automatically. Others must be decompressed using
decompression software. Two widely used compression software programs for Windows
and Mac devices are WinZip® and 7-Zip.
87The internet and the web
The Internet - Activities
* Email Electronic mail, or email, allows people to send an unlimited number of messages
quickly and easily to anyone with an email address. It is less expensive than standard mail and
voice, fax, and telephone messages. To use email, all you need is a computing device with
internet access, email software, and an email account. Email also lets you attach files to a
message. Any file sent along with an email message is called an attachment.
Email Addresses Like a computer on a network, every communication service user must have a
unique identifier, usually called a username. All email addresses have two parts. The mailbox
name is the art of the address before the “at” symbol (@) that identifies the user. The server
address follows the symbol. It gives the domain name of the email server where the mailbox is
stored, An email server is 2 computer, operated by your internet service provider (ISP), that
accepts and delivers incoming messages and sends outgoing messages.
There are two basic ways to access email:
1, Email clients which are sometimes referred to as desktop email applications, are installed
on your computer such as Microsoft Outlookand Mozilla Thunderbird and Mailbird.
2. Web-based email, such as Outlook.comand Gmail, is accessed using a web browser.The internet and the web
The Internet - Activities
There are drawbacks to using email. The receiver may not open the email, so there is no
guarantee it will be read. Criminals often hide viruses in email attachments. And, although
there are not usually limits to the amount of text you can include in an email, there are limits
to the size of attachments.
* PORTALS A web or internet portal is a web page that pulls in and presents information in an
organized way. Most web portals are customized by the user. For example, a web portal might
display the weather, breaking news, a stock ticker, and a list of new email messages. It might
have links to a search engine and a favorite magazine. Common web portals include Yahoo,
AOL, and MSN.
+ SEARCH ENGINES is software that finds and lists information that meets a specified search
such as Google, Yahoo, and Bing. Boolean search use special terms and characters Inclusion
operations plus sign or the word AND Find only pages that contain a match for all the specified
words example IT+job+Makkah, Exclusion operations minus sign or the word NOT Find pages
that contain certain words but not others example IT+job Dammam
89The internet and the web
The Internet — Activities
+ TWEETS A tweet is a form of text messaging that uses the Twitter app; you send the message
to the Twitter internet site, where any registered user can read it. Twitter limits most messages
to 280 characters.
+ INSTANT MESSAGING Recall that instant messaging (IM) is a way for individuals and groups
to communicate with their contacts in real time from device to device. You and the people you
are communicating with must all be using the same IM app. IM is usually free. For example,
Facebook Messenger, iMessage comes on Apple iPhones and iPads, Gmail has a Chat feature
called Hangouts. Other common IM services include Skype, Slack, and Jabber (VOIP),
Social networking is a way to use social media tools on the internet to make connections with
other people such as Snapchat, Instagram, Facebook, and LinkedIn. Most social networking
sites are free, although you have to register an account to use them. Some sites, like LinkedIn,
help you make connections that can further your career. Some, like YouTube, provide
entertainment, and, if other people like your posts, can become a career.
90The internet and the web
The Internet — Activities
+ PHOTO AND VIDEO SHARING Photo and video sharing is using the internet to send digital
photos or video clips to another internet user such as Instagram, Snapchat, and YouTube.
* PODCASTS is an audio or video file that is created for downloading to any device with an
application that can play MP3 files example— iTunes and SoundCloud.
+ BLOGS or weblog—is a type of web page diary. People create blogs to share their thoughts
and opinions.
+ Vlogs are video logs in which the viogger appears on video,
* Wiki is a collaborative web page. Anyone can edit or create content on the page. The most
notable wiki is Wikipedia.org.
+ WEB FEED A web feed is a service that automatically downloads web page content that 2
user has signed up for. May include the text of news, opinions, or audio/video files
+ Software as a Service (SaaS) applications are stored on cloud servers and can be accessed on
the Internet.
1