Introduction To Computer Science: Chapter I Topics
Introduction To Computer Science: Chapter I Topics
1.2
Exposure Equation
1.3
1.4
1.5
Excessive Help
1.6
Computer Fundamentals
1.7
1.8
1.9
Chapter I
Page 1
Page 2
08-07-11
informal style. Students have told me in the past that it appears that I am talking
to them. In fact, I have been accused of writing with an accent. In case you all do
not realize it I was neither born in Texas nor the United States. I was born in
Holland, moved all over the place, ended up in the United States, took a test in
English, US government and US history, and then became an US citizen. Six
months after my new citizenship I was rewarded with an all-expenses-paid trip to
Vietnam. Today, I have forgotten several languages I learned in my youth, and I
cannot speak any language I remember without an accent.
A few more items on this personal relationship business. I was born in 1945. I
have been married to the sweetest wife in the world since April 9, 1967. Her name
is Isolde. I have four children, John, Greg, Maria, and Heidi. Furthermore, I have
a daughter-in-law, Diana, a son-in-law, David, and seven grandchildren. My
favorite activities are skiing, rock climbing, rappelling, SCUBA diving, ballroom
dancing, traveling and writing. Now there is a slight problem. You know a little
about me, but I know nothing about you. Well perhaps we will meet one day, and
I may also hear about you from your teachers.
By the way, there is a way that I can get to know more about you. You can drop
me an e-mail line. Now please read this carefully. You may wish to send me a note
and say hi. However, do not write and ask for advice on programs that do not
work. You have a computer science teacher. Your teacher knows your
assignments, knows your background, and knows your computer science level.
Your teacher can help you far more effectively than I possibly can at a distance.
Another point, I get frequent e-mail from students requesting to buy some of these
books that you are reading. I do not publish paper copies for sale. School districts
purchase a copy license, and each school district uses their own method for making
copies. You can approach your teacher about acquiring copies from them, if that is
an option at your school. Good, now that we have that straight, let me move on.
You may get the impression that all this informal style, and such, may take away
from the serious business of learning computer science. Do not believe that for
one minute. There are many pages ahead of you and each topic is going to get a
thorough treatment. Also do not think, just because this introduction is lighthearted, that everything will be in the same style. Some topics are duller than dirt
and you will just have to digest some discomfort and make the best of it. Other
topics are pretty intense, and I will do my best to make it clear what is happening,
but there are no promises. I will try hard to do my part and you need to do yours.
Just exactly what you need to do to learn will come a little later in this chapter.
Chapter I
Page 3
EXPOSURE
The point made by my sociology professor was so wonderfully simple and logical.
If you have zero exposure to something, you will be bewildered. If you have never
in your life seen a plane, heard a plane fly by, seen a picture of a plane, heard
anybody talk about a plane, you will be one frightened, confused puppy when the
first plane comes by.
Here are a couple more examples. When I came to the United States, I had
breakfast the way most Americans did. I poured myself a bowl of cereal, usually
Corn Flakes, and then proceeded to warm up some milk on the stove. The warm
milk was then poured over the Corn Flakes. As someone who grew up in Europe,
it was "obvious" to me that warm milk is what you put on cereal. I found it very
strange when I realized Americans put cold milk on cereal.
Many years later, I am on a cruise with my son John. An English couple sitting
across from us looks at my son and the following dialog transpires:
English Man:
Page 4
08-07-11
John:
"What is what?"
English Man:
John:
English Man:
"Iced Tea? Iced Tea? Good Lord Mildred. Did you ever
hear of such a thing."
English Woman:
The point trying to be made with these examples is that exposure theory states that
nothing in life is obvious. What we do have are varying degrees of exposure. This
means the next time somebody says: It is painfully obvious to see the outcome of
this situation, do not get excited.
Translate that statement into: after being exposed to this situation for the last 20
years of my life, and having seen the same consequences for the same 20 years, it
is now easy for me to conclude the outcome.
Well, this good sociology professor I wish I remembered his name and could
give him credit impressed me with his obvious-bewilderment-exposure theory.
Based on his theory I have created an equation:
Chapter I
Page 5
08-07-11
explanation a second time around and allow time to flow through your brain.
There is not a channel you can change ... a button you can push ... a pill you can
take ... or a specialist you can pay, to soak up knowledge easily. You need
exposure, and surprise ... exposure takes effort. Ask a champion swimmer how
many laps they have completed? Ask anybody who is accomplished in any field
how they arrived. Let me know if they arrived on day one. I want to meet that
extraordinary person.
Chapter I
Page 7
Page 8
08-07-11
Work on the lab assignment. Ask for help when you are
stuck. Make sure to give clear questions.
Chapter I
Page 9
If you do not realize that copying other peoples work - with or without their
consent - is wrong, then it is time you discuss this issue with your parents to get
clarification on basic issues of right and wrong.
Computer lab assignments, that can be copied, are only a part of the total grade
picture. You also have to take written tests and you have to take computer lab
tests. If students study together and help each other with lab assignments, and if
the students learn from their study group, they will learn and do fine on tests.
Students who put in zero effort do not learn and fail tests miserably.
Those of you who are inclined to help your friends by letting them copy your
efforts need to consider the type of friend that you are. A true friend will teach and
Page 10
08-07-11
prepare a buddy for upcoming quizzes and tests. Somebody who likes the quick
popularity that comes with improper diskcopying allows a friend to fail in the
future.
Excessive Help
Do not get excessive help. Do not copy lab assignments. It is
wrong. You know it is wrong, and you will not learn.
Do form study groups. Do work together and help each other
understand difficult concepts. Do encourage your friends when
they are struggling.
Chapter I
Page 11
Page 12
08-07-11
Programming, 1842
Countess Ada Lovelace was Charles Babbages assistant. She designed programs
that work for Babbage's analytical machine. Some concepts in todays modern
languages are based on ideas she came up with before electronic computers were
ever invented. She is considered The Mother of Programming. Today a
programming language is named after Ada.
ABC, 1940
The first electronic digital computer was invented by John Atanasoff and Clifford
Berry at Iowa State University. They called it the Atanasoff Berry Computer or
ABC.
Z3, 1941
Chapter I
Page 13
Colossus, 1941-1944
This computer was developed in England in various stages and helps to decrypt the
secret code message of German communication during Word War II.
Mark I, 1944
This relay-based computer was developed by Harvard University and IBM. Grace
Hopper, then a Navy Lieutenant, becomes the first programmer of the Mark I.
ENIAC, 1946
The ENIAC (Electronic Numerical Integrator and Computer) is the first
functionally useful fully-electronic computer. The computer is two stories tall,
weighs 80 tons, contains 19,000 vacuum tubes, and is programmed by walking
inside the computer.
UNIVAC I, 1951
The UNIVAC I (UNIVersal Automatic Computer) was the worlds first
commercially available computer. While the Mark I and the ENIAC were not for
sale, any company with enough money could actually purchase a UNIVAC I
computer. The computer became famous when it correctly predicted the results of
the 1952 presidential election.
08-07-11
IBM started to sell the first computer with a stored computer program. This
computer uses vacuum tubes and is called a first-generation computer.
FORTRAN, 1954
FORTRAN (FORmula TRANslator) was invented by John Backus at IBM. It is
the first commercially successful programming language and is designed for
engineers and mathematicians.
COBOL, 1959
The business programming language COBOL (COmmon Business Oriented
Language) was developed based on the design of Grace Hopper.
Chapter I
Page 15
BASIC, 1964
Tom Kurtz and John Kemeny of Dartmouth created BASIC (Beginners Allpurpose Symbolic Instruction Language). This language will later be the first
programming language for personal computers.
Pascal, 1969
Niklaus Wirth, a Swiss professor, created the programming language Pascal,
designed for teaching computer science with proper structured programming to
university students. It became the first language used for the AP Computer
Science Examination.
Altair, 1975
Altair was the first personal computer. It was created by Ed Roberts and Bill
Yates. The computer costs $397.00 and has storage for 256 bytes.
Tandy/Commodore, 1977
Commodore and Tandy started selling personal computers. The Commodore and
the Apple computer required a television interface to view computer operations.
The Tandy RadioShak computer has its own CRT (monitor).
VisiCalc, 1979
Dan Bricklin created VisiCalc, a spreadsheet program, which became the first wide
spread software to be sold. Dan Bricklin initially lived in a hut somewhere in the
mountains of Montana and received an average of $30,000.00 a week for his
invention. He did not benefit from the tremendous boom in the spreadsheet
market, because his software could not get a patent.
Page 16
08-07-11
WordStar, 1979
MicroPro released WordStar, which becomes the most popular word processing
software program in the late seventies and eighties.
MS-DOS, 1981
IBM decided not to create its own operating system for the personal computing
market and decide to out-source development of its operating system for its trivial
little personal computer department. Many companies rejected IBMs proposal.
Microsoft, an unknown little company run by Bill Gates, agrees to create the
operating system for the IBM Personal Computer and becomes a company larger
than IBM.
Macintosh, 1984
Apple started to sell the Apple Macintosh computer. The mouse technology was
already developed earlier by Xerox Corporation and Apple actually introduced this
technology with its Lisa computer in 1982. The Lisa computer costs $10,000 and
was a commercial failure. The "Mac" was the first commercially successful
Chapter I
Page 17
Page 18
08-07-11
Chapter I
Page 19
Page 20
08-07-11
Figure 1.2
short - long
short
You, and your buddy, can now send messages back and forth. By pressing the
buzzer with long and short sounds. Letters and numbers can be created this way.
For instance the word BAD would be signaled as follows:
The secret of Morse code is the fact that electricity can be turned on, and it can be
turned off. This means that a flashlight can send long and short beams of light and
a buzzer can send long and short buzzing sounds. With an established code, such
as Morse code, we can now send combinations of long and short impulses
electronically. Very, very brief pauses occur between the shorts and longs of a
letter. Longer pauses indicate the separation between letters. This basically means
that electronically we can send human messages by turning electricity on and off in
a series of organized pulses. Does this mean that Samuel Morse invented the
computer? No, he did not get credit for starting the computer revolution, but it
does serve as a simple example to illustrate how electricity can process letters by
translating on and off situations into letters and numbers.
Chapter I
Page 21
(long signals) on a paper tape as the message was received. Now that explains a
paper memory, and perhaps you even remember something about punched
computer cards, but we still have not gotten to an electronic memory.
Suppose you line up a series of light bulbs. How about picking eight bulbs? Each
light bulb is capable of being turned on and off. With these eight light bulbs we
can create 256 different combinations. Two tables are shown in figure 1.3 below.
The first diagram shows on and off. The second diagram uses 1 and 0. In
Computer Science, 1 means on and 0 means off.
Figure 1.3
off on
0
on
In this particular example, the second and eighth bulbs are on, and all the other
lights are off. This represents only one of 256 different combinations. Figure 1.5
will show three more combinations. It certainly is not Morse code, but using the
Morse code example, we can imagine that each one of the 256 combinations is
assigned to a letter, a number, or some other type of character.
The number system you use is base-10. Counting and computation in base 10 is
not simpler than other bases because it is base 10. It is simpler because you use
base 10. Sounds confusing, does it not? In elementary school, you practiced
multiplication tables in base 10. How many multiplication tables did you practice
in base 5 or base 8? Not too many, right? Rumor has it that people developed a
base 10 system, because of our ten fingers. Now in base 10, digits range from 0 to
9. After the largest digit 9, we must use two digits, like 10, 11, 12, 13, 14 etc. to
count higher.
Mathematically speaking, counting and computation are possible in different bases.
A number system that is very skimpy in digits is base-2. Only the digits 0 and 1
are used. Many digits are needed for even small-valued numbers. The first 32
numbers in base-2, with the equivalent base-10 values are shown in figure 1.4.
Figure 1.4
Base 10
0
1
2
3
4
Page 22
Base-2
0
1
10
11
100
Base 10
16
17
18
19
20
08-07-11
Base-2
10000
10001
10010
10011
10100
5
6
7
8
9
10
11
12
13
14
15
101
110
111
1000
1001
1010
1011
1100
1101
1110
1111
21
22
23
24
25
26
27
28
29
30
31
10101
10110
10111
11000
11001
11010
11011
11100
11101
11110
11111
Now consider these three 8-light-bulbs combinations in figure 1.5. Each one of
these combinations of on and off light bulbs can be viewed as a base-2 number.
Figure 1.5
0
1
0
0
0
0
0
1
01000001 (base-2) = 65 (base 10)
0
1
0
0
0
0
1
0
01000010 (base-2) = 66 (base 10)
0
1
0
0
0
0
1
1
01000011 (base-2) = 67 (base 10)
Chapter I
Page 23
performed in any base. With our clever binary system, we now have a means to
store information and make electronic calculations possible as well.
We have now learned that information can be stored in base-2 numbers. Base-2
numbers can store characters by using a system that equates numbers like the base2 equivalent of 65 to A. At the same time, mathematical operations now become
an electronic reality. In other words, the magic of on/off switches allows both
electronic storing of information as well as electronic computation.
We can also add some terminology here. A single bulb can be on or off and this
single light represents a single digit in base-2, called a Binary digit, which is
abbreviated to Bit. We also want to give a special name to the row of eight light
bulbs (Bits) that make up one character. This row shall be called a Byte. Keep in
mind that Byte is not plural for Bit. There is one problem with storing characters
in a single byte. You only have access to 256 different combinations or characters.
This may be fine in the United States, but it is very inadequate for the international
community. Unicode is now becoming very popular and this code stores
characters in 2 bytes. The result is 65,536 different possible characters. Java has
adopted Unicode, as have many technical organizations. The smaller ASCII code
is a subset of Unicode.
08-07-11
pattern was set that would continue for decades. Small is not only smaller, it is
also better. The small tube gave place to the pea-sized transistor, which was
replaced by the planar transistor and bits were miniaturized, becoming smaller and
smaller. Today, a mind-boggling quantity of bits fits on a microchip.
This is by no means a complete story of the workings of a computer. Very, very
thick books exist that detail the precise job of every component of a computer.
Computer hardware is a very complex topic that is constantly changing. Pick up a
computer magazine, and you will be amazed by the new gadgets and the new
computer terms that keep popping up. The intention of this brief introduction is to
help you understand the essence of how a computer works. Everything revolves
around the ability to process enormous quantities of binary code, which is capable
of holding two different states: 1 and 0.
Chapter I
Page 25
kinds of chips are found in cars, microwaves, cell phones and many electronic
appliances that perform a similar task day after day.
Computers also have information chips that store permanent information. Such
chips are called Read Only Memory chips or ROM chips. There is a bunch of
information in the computer that should not disappear when the power is turned
off, and this information should also not be altered if the computer programmer
makes some mistake. A ROM chip can be compared to a music CD. You can
listen to the music on the CD, but you cannot alter or erase any of the recordings.
Another type of chip stores information temporarily. Once again, information is
stored in many bytes, each made up of eight bits, but this information requires a
continuous electric current. When the power is gone, so is the information in these
chips. Computer users also can alter the information of these chips when they use
the computer. Such chips can store the data produced by using the computer, such
as a research paper or it can store the current application being used by the
computer. The name of this chip is Random Access Memory chip or RAM chip.
Personally, I am not happy with that name. I would have preferred something that
implies that the chip is Read and Write, but then nobody asked for my opinion
when memory chips were named.
The amount of memory in a computer is measured in bytes, not bits. Modern
computers have so many bytes that usually memory is indicated as so many
kilobytes or megabytes of memory. Kilobytes are rapidly fading from the
computer scene and gigabytes are alive and well in current computer terminology.
Figure 1.6
Measuring Memory
KB
Kilo Byte
MB
Mega Byte
GB
Giga Byte
TB
Tera Byte
PB
Peta Byte
EB
Exa Byte
1 thousand bytes
1 million bytes
1 billion bytes
1 trillion bytes
1 quadrillion bytes
1 quintillion bytes
The measuring memory diagram, in figure 1.6, may get a frown or two. The
information is technically incorrect. The diagram is meant to help remember the
measure size in a rounded manner. After all, Kilo does mean one-thousand.
Technically speaking one KB is 210 or 1,024 bytes. Using the same logic you can
compute that one MB is 220 or 1,048,576 bytes. I am sure you can live very
comfortably using the previous not really correct diagram.
Page 26
08-07-11
The most significant chunk of silicon in your computer is the CPU chip. CPU
stands for Central Processing Unit and this chip is the brain of the computer. You
cannot call this chip ROM or RAM. On this tiny little chip are lots of permanent
instructions that behave like ROM, and there are also many places where
information is stored temporarily in the manner of a RAM chip. The CPU is one
busy little chip. You name it, the CPU does the job.
A long list of operations could follow here but the key notion is that you
understand that all the processing, calculating and information passing is controlled
by the Central Processing Unit. The power of your computer, the capabilities of
your computer, and the speed of your computer is based on your CPU chip more
than any other computer component.
Secondary Storage
I just know that you are an alert student. ROM made good sense. RAM also
made sense, but you are concerned. If the information in RAM is toast when you
turn off the computer . . . then what happens to all the stored information, like
your research paper? Oh, I underestimated your computer knowledge. You do
know that we have hard drives, diskettes, zip diskettes, tapes, and CDs that can
store information permanently.
We have stored information on rust for quite some time. Did I say rust? Yes, I did
and perhaps you feel more comfortable with iron oxide. Tiny particles of iron
oxide on the surface of a tape or disk are magnetically charged positively or
negatively. In a different manner than the internal computer, but with a similar
logic, coded information is stored on a tape or a disk.
Please do keep in mind that this information will not disappear when the power is
turned off, but it can be easily altered. New information can be stored over the
previous information. A magnetic field of some type, like a library security gate,
heat in a car, dust in a closet, and peanut butter in a lunch bag can do serious
damage to your information.
You might be confused about the currently popular CD-ROMs. You can see that
they are external to the computer, but ROM implies Read Only Memory. CDs
store enormous amount of information. The information is permanent and thus
behaves like ROM. When you use a CD with a computer it behaves as if you had
added extra ROM to your computer internally. CDs do not use rust; they are far
too sophisticated for such a crude process. The CD is coded with areas that reflect
and absorb laser light. Once again we can create a code system because we have
two different states, on and off.
The on/off state is the driving force of the digital computer. What is digital?
Look at your watch. You can see digits, and you see the precise time. There is no
Chapter I
Page 27
fractional time. A clock with hour, minute and second hands is an analog device.
It measures in a continuous fashion. A measuring tape is also analog, as is a
speedometer with a rotating needle. What is the beauty of digitizing something?
With digital information it is possible to always make a precise copy of the original.
It is easy to transfer, store and use digitized information. Entire pictures can be
converted to a digitized file and used elsewhere. I am sure you have been in movie
theaters where digital sound is advertised. So digital is the name of the game.
Just remember that not all digitizing is equally fast.
The internal memory of the computer is digital and it uses electronics. The access
of a hard disk involves electronics, but the information is read off a disk that
rotates and only one small part of the disk is readable at one time. Accessing a
disk drive is much slower than accessing internal memory.
Page 28
08-07-11
Any parent who has ever purchased a some-assembly-required toy has had to
wrestle with a sequence of instructions required to make the toy functional. So we
should be able to summarize all this programming stuff, apply it to computers and
place it in the definition diagram below.
Program Definition
A program is a sequence of instructions, which enables
a computer to perform a desired task.
A programmer is a person who writes a program for a
computer
Page 29
You are happy with the fact that a program is a set of instructions to perform a
given task. So what needs to be done is understand how instructions are
communicated to a computer. At this stage, we have talked quite a bit about
binary code, digital information and you have a pretty good hunch that our
computers are not using Star Trek technology. So do not try to talk to a computer
in English and tell it to finish your history homework.
For decades computer scientists have struggled with computers understanding
human language. It has not been easy. We have made remarkable progress and a
brief history of programming languages will help to understand where we are
today, and what you will be doing this school year in computer science.
Page 30
08-07-11
such that any set of four-digit base-2 numbers can be represented by one base-16
number. It is certainly easier to work with one-fourth the digits.
A programmer first wrote a set of instructions in the special Assembly Language
code. This code was then translated by a so-called Assembler. The Assembler
translated the mnemonic short word instructions into pure, binary machine code
that could be processed by the computer.
Chapter I
Page 31
Page 32
08-07-11
cumbersome language that never gained much popularity. Then there were a host
of many other short-lived languages.
BASIC (Beginner All-purpose Symbolic Instructional Code) was designed for
beginning college students. BASIC became the first popular program language
for personal computers in the seventies. BASIC required little memory, and it was
the only language that could initially be handled by the first micro computers.
In the late seventies, early eighties, Pascal took a strong hold in the educational
community. Pascal was developed by Niklaus Wirth, specifically for the purpose
of teaching proper computer science programming techniques. This language was
adopted for the Advanced Placement Computer Science Examination in 1984 and
stayed in that position until the 1998 exam.
In the early seventies, the UNIX operating system was developed at the Bell
laboratories. This operating system was written in several languages some of
which were called BCPL or just plain B. A later version of the language was
called C, since it followed B. In the eighties, the C language became very popular
as the language of choice for operating systems.
As the demands for sophisticated computer uses grew, so did the demand for ever
more sophisticated computer programming languages. A new era with a powerful
programming technique was born called Object Oriented Programming (OOP).
You are hardly in a position to appreciate the finer features of OOP. Right now
appreciate that a new language had to be developed to incorporate the power of
OOP. Bjarne Stroustrup combined the popularity of the existing C language with
the demands for OOP and developed C++. C++ includes all the previous
capabilities of C, many improvements on the early C, and the new features of
object oriented programming. C++ actually is somewhat of a hybrid language
since object-oriented Style Programming is possible, but so is the older C-style
programming, which today's modern programmers frown upon.
There is something else that you need to understand about this program language
stuff. You can say that there is one level above the compiler, called the linker. It
did not take computer scientists long to figure out that the majority of programs
use the same source code in each and every program. This is the type of code used
with input and output, mathematical calculations, etc. It seemed silly to keep
creating this code over and over again. Special library files of handy computer
routines were created and already translated into special machine code files. Now
these files cannot be executed by the CPU because the instruction set is not
complete. Such files are known as object files.
When modern programmers write a compiled program, like C++, they write their
own personal source code and the compiler checks their syntax to make sure
everything is written correctly. The first pass through the program is the compile
pass. Now a second pass links the compiled code with any other library file and
combines it into one nifty file that can be used by the computers CPU.
Chapter I
Page 33
1.14 Networking
When you grow up in a certain environment, it can easily seem natural, as if the
environment was always the way you see it. Today's students think it is perfectly
normal that computers can use e-mail, play video games and surf the Internet. It
was not always that simple. Computers evolved and yes computers do seem to
evolve much faster than almost any other type of human creation.
SneakerNet
Page 34
08-07-11
Early personal computers were not networked at all. Every computer was a standalone computer. Some computers were hooked up to printers and many others
were not. If you needed to print something, and you were not directly connected
to a printer, you stored your document on a floppy diskette, walked to a computer
with an attached printer, and then printed the document. If a group of computer
programmers worked together on a project, they needed to get up frequently with
stored information to share it with other members in the team. Running around to
share computer information is now called the Sneaker Net because sharing files or
printing files requires you to put on your sneakers and walk to another computer.
It may not be very clever, but it does illustrate the environment.
Peer-to-Peer Networks
Computers did not wake up one day and hooked up to the Internet. The first
practical networks for personal computers were peer-to-peer networks. A peer-topeer network is a small group of computers with a common purpose all connected
to each other. This small network allowed a single printer to be used by any
computer on the network and computers could also share information. These
types of networks were frequently called Local Area Networks or LANs. Initially,
the networks were true peer-to-peer networks. This means that every computer
on the network was equal. All computers were personal computer work stations.
Cient-Server Networks
Peer-to-peer networks do not work well when networks get large. Special,
dedicated computers, called servers, were needed. A server is a specialty computer
that is connected to the LAN for one or more purposes. Servers can be used for
printing, logon authentications, permanent data storage, web site management and
communication. Many businesses would have multiple servers set up in such a
manner that some servers exist for the purpose of backing up the primary server.
Using backup systems, tape storage or other backup means insured computer
reliability in case of computer failure.
Chapter I
Page 35
It may come as a shock to you, but the Internet was not created so that teenagers
could play video games and download music. The Internet has its origins in the
"Cold War." If you do not know what the "Cold War" is ask your Social Studies
teacher, your parents or any old person over 30. During the Cold War there was a
major concern about the country being paralyzed by a direct nuclear hit on the
Pentagon. It used to be that all military communications traveled through the
Pentagon. If some enemy force could knock out the Pentagon, the rest of the
military establishment communication would be lost. A means of communication
had to be created that was capable to keep working regardless of damage created
anywhere. This was the birth of the Internet. The Internet has no central location
where all the control computers are located. Any part of the Internet can be
damaged and all information will then travel around the damaged area.
08-07-11
Computer science, like all technical fields, has a huge library of technical terms and
acronyms. Volumes can be filled with all kinds of technical vocabulary. Have no
fear; you will not be exposed to volumes, but at the end of this chapter you do
need some exposure to the more common terms you will encounter in the
computer world. You have already learned about different types of memory,
programming languages and networking. There are a few important computer
terms that you need to understand.
For starters, it is important that you understand the hardware and software
difference. These are the two biggest divisions in the computer business.
Hardware involves all the computer components that can be seen, felt, picked up
and dropped, like a monitor, a mouse, a jump drive. Software involves the set of
computer instructions that are coded on a disk, a CD, or a hard drive.
Chapter I
Page 37
Computer Software
Computer software provides instructions to a computer. The most important
aspect of this course is to learn how to give correct and logical instructions to a
computer with the help of a programming language.
Software falls into two categories. There is system software and application
software. Usually, students entering high school are already familiar with
applications software.
Applications software runs an application on a computer. The whole reason why
a computer exists is so that it can assist people in some type of application. For
centuries, accounting kept large, complicated spreadsheets of business numbers.
Now these same numbers are entered on an electronic spreadsheet. You will not
experience the horror of finding some mistakes on the early pages of a thirty page,
typed, research paper. This type of mistake necessitates retyping the majority of
the pages. Today, this is a simple matter of inserting the corrections on a word
processor program. Spread sheets and word processors were the first software
applications. Currently, there are thousands of other applications to assist people
in every possible area from completing tax returns to playing video games.
System software involves the instructions that the computer requires to operate
properly. A common term is OS (operating system). The major operating systems
are Windows XP, Window Vista, UNIX and MAC OS. It is important that you
understand the operation of your operating system. With OS you can store, move
and organize data. You can install new external devices like printers and scanners.
You can personalize your computer with a desktop appearance and color
selections. You can install additional applications and computer protection against
losing data and viruses.
1.16 Summary
Page 38
08-07-11
Chapter I
Page 39
Page 40
08-07-11