Exposure Java 2007 Chapter 1
Exposure Java 2007 Chapter 1
1.2
Exposure Equation
1.3
1.4
1.5
Excessive Help
1.6
Computer Fundamentals
1.7
1.8
1.9
Chapter I
Page 1.1
Page 1.2
08-18-07
informal style. Students have told me in the past that it appears that I am talking
to them. In fact, I have been accused of writing with an accent. In case you all do
not realize it I was neither born in Texas nor the United States. I was born in
Holland, moved all over the place, ended up in the United States, took a test in
English, US government and US history, and then became an US citizen. Six
months after my new citizenship I was rewarded with an all-expenses-paid trip to
Vietnam. Today, I have forgotten several languages I learned in my youth, and I
cannot speak any language I remember without an accent.
A few more items on this personal relationship business. I was born in 1945. I
have been married to the sweetest wife in the world since April 9, 1967. Her name
is Isolde. I have four children, John, Greg, Maria, and Heidi. Furthermore, I have
a daughter-in-law, Diana, a son-in-law, David, and six grandchildren. My favorite
activities are skiing, rock climbing, rappelling, SCUBA diving, traveling and
writing. Now there is a slight problem. You know a little about me, but I know
nothing about you. Well perhaps we will meet one day, and I may also hear about
you from your teachers.
By the way, there is a way that I can get to know more about you. You can drop
me an e-mail line. Now please read this carefully. You may wish to send me a note
and say hi. You might even want to give me some constructive criticism about
these books. However, do not write and ask for advice on programs that do not
work. You have a computer science teacher. Your teacher knows your
assignments, knows your background, and knows your computer science level.
Your teacher can help you far more effectively than I possibly can at a distance.
Another point, I get frequent e-mail from students requesting to buy some of these
books that you are reading. I do not publish paper copies for sale. School districts
purchase a copy license, and each school district uses their own method for making
copies. You can approach your teacher about acquiring copies from them, if that is
an option at your school. Good, now that we have that straight, let me move on.
You may get the impression that all this informal style, and such, may take away
from the serious business of learning computer science. Do not believe that for
one minute. There are many pages ahead of you and each topic is going to get a
thorough treatment. Also do not think, just because this introduction is lighthearted, that everything will be in the same style. Some topics are duller than dirt
and you will just have to digest some discomfort and make the best of it. Other
topics are pretty intense, and I will do my best to make it clear what is happening,
but there are no promises. I will try hard to do my part and you need to do yours.
Just exactly what you need to do to learn will come a little later in this chapter.
Chapter I
Page 1.3
EXPOSURE
The point made by my sociology professor was so wonderfully simple and logical.
If you have zero exposure to something, you will be bewildered. If you have never
in your life seen a plane, heard a plane fly by, seen a picture of a plane, heard
anybody talk about a plane, you will be one frightened, confused puppy when the
first plane comes by.
Here are a couple more examples. When I came to the United States, I had
breakfast the way most American did. I poured myself a bowl of cereal, usually
Corn Flakes, and then proceeded to warm up some milk on the stove. The warm
milk was then poured over the Corn Flakes. As someone who grew up in Europe,
it was "obvious" to me that warm milk is what you put on cereal. I found it very
strange when I realized Americans put cold milk on cereal.
Many years later, I am on a cruise with my son John. An English couple sitting
across from us looks at my son and the following dialog transpires:
English Man:
Page 1.4
08-18-07
John:
"What is what?"
English Man:
John:
English Man:
"Iced Tea? Iced Tea? Good Lord Mildred. Did you ever
hear of such a thing."
English Woman:
The point trying to be made with these example is that exposure theory states that
nothing in life is obvious. What we do have are varying degrees of exposure. This
means the next time somebody says: It is painfully obvious to see the outcome of
this situation, do not get excited.
Translate that statement into: after being exposed to this situation for the last 20
years of my life, and having seen the same consequences for the same 20 years, it
is now easy for me to conclude the outcome.
Well, this good sociology professor - I wish I remembered his name and could give
him credit - impressed me with his obvious-bewilderment-exposure theory. Based
on his theory I have created an equation:
Chapter I
Page 1.5
08-18-07
explanation a second time around and allow time to flow through your brain.
There is not a channel you can change ... a button you can push ... a pill you can
take ... or a specialist you can pay, to soak up knowledge easily. You need
exposure, and surprise ... exposure takes effort. Ask a champion swimmer how
many laps they have completed? Ask anybody who is accomplished in any field
how they arrived. Let me know if they arrived on day one. I want to meet that
extraordinary person.
Chapter I
Page 1.7
Page 1.8
08-18-07
Work on the lab assignment. Ask for help when you are
stuck. Make sure to give clear questions.
Chapter I
Page 1.9
If you do not realize that copying other peoples work - with or without their
consent - is wrong, then it is time you discuss this issue with your parents to get
clarification on basic issues of right and wrong.
Computer lab assignments, that can be copied, are only a part of the total grade
picture. You also have to take written tests and you have to take computer lab
tests. If students study together, help each other with lab assignments, and if the
students learn from their study group, they will learn and do fine on tests.
Students who put in zero effort do not learn and fail tests miserably.
Those of you who are inclined to help your friends by letting them copy your
efforts need to consider the type of friend that you are. A true friend will teach and
prepare a buddy for upcoming quizzes and tests. Somebody who likes the quick
Page 1.10
08-18-07
popularity that comes with improper diskcopying allows a friend to fail in the
future.
Excessive Help
Do not get excessive help. Do not copy lab assignments. It is
wrong. You know it is wrong, and you will not learn.
Do form study groups. Do work together and help each other
understand difficult concepts. Do encourage your friends when
they are struggling.
Page 1.11
another story. In many cases incoming high school students have learned
computer history in middle school technology classes. It does seem odd to plunge
into a computer science course without at least some reference to where did this
come from anyway? What follows is a chronology of some of the major steps in
the history of computers. There are many, many significant large and small
contributions that are not mentioned. This at least is a small start.
Joseph Jacquard invents flexible cards that are punched with information in such a
manner that it is possible to program how cloth will be weaved. It was one of the
first examples of programming.
Page 1.12
08-18-07
Programming, 1842
Ada Lovelace designs programs that work for Babbage's analytical machine. She
is considered the mother of programming. Today a programming language is
named after Ada.
Z3, 1941
Konrad Zuse builds a calculating machine capable of automatic computations in
Germany during World War II.
Colossus, 1941-1944
This computer is developed in England in various stages and helps to decrypt the
secret code message of German communication during Word War II.
Mark I, 1944
Chapter I
Page 1.13
ENIAC, 1946
The ENIAC (Electronic Numerical Integrator and Computer) is the first fullyelectronic computer. The computer is two stories tall, weighs 80 tons, contains
19,000 vacuum tubes, and is programmed by walking inside the computer.
FORTRAN, 1954
FORTRAN (FORmula TRANslator) is invented by John Backus at IBM. It is the
first commercially successful programming language and is designed for engineers
and mathematicians.
COBOL, 1959
The business programming language COBOL (COmmon Business Oriented
Language) is developed based on the design of Grace Hopper.
08-18-07
BASIC, 1964
Tom Kurtz and John Kemeny of Dartmouth create BASIC (Beginners All-purpose
Symbolic Instruction Language). This language will later be the first programming
language for personal computers.
Pascal, 1969
Niklaus Wirth, a Swiss professor, creates the programming language Pascal,
designed for teaching computer science with proper structured programming to
university students.
Altair, 1975
Altair becomes the first personal computer. It is created by Ed Roberts and Bill
Yates. The computer costs $397.00 and has storage for 256 bytes.
Tandy/Commodore, 1977
Commodore and Tandy start selling personal computers. The Commodore and the
Apple computer require a television interface to view computer operations. The
Tandy RadioShak computer has its own CRT (monitor).
VisiCalc, 1979
Dan Bricklin created VisiCalc, a spreadsheet program, which becomes the first
wide spread software to be sold. Dan Bricklin initially lived in a hut somewhere in
the mountains of Montana and received an average of $30,000.00 a week for his
invention. He did not benefit from the tremendous boom in the spreadsheet
market, because his software could not get a patent.
Chapter I
Page 1.15
WordStar, 1979
MicroPro releases WordStar, which becomes the most popular word processing
software program.
MS-DOS, 1981
IBM decides not to create its own operating system for the personal computing
market and decide to out-source development of its operating system for its trivial
little personal computer department. Many companies reject IBM proposal.
Microsoft, an unknown little company run by Bill Gates, agrees to create the
operating system for the IBM Personal Computer and becomes a company larger
than IBM.
Macintosh, 1984
Apple starts to sell the Apple Macintosh computer. The mouse technology was
already developed earlier by Xerox Corporation and Apple actually introduced this
technology with its Lisa computer in 1982. The Lisa computer costs $10,000 and
is a commercial failure. The "Mac" was the first commercially successful computer
with the mouse/windows technology.
Page 1.16
08-18-07
Page 1.17
processing better in many areas compared to human beings. The three areas in
which a computer is superior to a human being are shown in figure 1.1.
Figure 1.1
You may be quick to accept that computers are faster, but you are not so sure
about the other two. Too often you have heard the term computer error and you
also remember hearing about data that was lost in the computer.
Well, let us start our computer lesson right now by clearing up some basic myths.
Computers do not make errors. Sure, it is possible for a computer to give
erroneous information. However, the computer is nothing but a stupid machine
that faithfully, and always accurately, follows instructions. If the instructions given
by a human being to a computer are faulty, then the computer will produce errors.
At the same time, many so-called computer errors are caused by sloppy data entry.
A person who receives an outrageous electric bill is told that the computer created
an erroneous bill. True, the computer printed the bill, but not until a data-entry
clerk had slipped an extra zero in the amount of electricity used for the previous
month.
Perhaps you are still not convinced. After all, what about the situation when a
computer breaks down? Wont that cause problems? Broken computers will
certainly cause problems. However, your computer will not work at all. Your
computer applications will not work and you are stuck, but the computer does not
suddenly start adding 2 + 2 = 5.
You may also have heard that people lose their computer information because of
problems with disk drives. Once again this happens, but computer users who keep
their computers and diskettes in a proper environment, along with a sensible
backup system, do not have such problems.
Well, you give up. No point arguing with a stupid book that cannot hear you.
Fine, the computer is faster, the computer is more accurate, and sure the computer
does not forget. But how is this managed electronically? You know that electricity
is incredibly fast, and you have every confidence that the flip of a switch turns on a
light or a vacuum cleaner. Todays computers are electronic, and just how does
electricity store information? How does a computer perform computations? How
does a computer translate keyboard strokes into desirable output? These are all
Page 1.18
08-18-07
good questions and an attempt will be made here to explain this in a manner that
does not become too technical.
Figure 1.2
A
B
C
D
E
short
Chapter I
Page 1.19
You, and your buddy, can now send messages back and forth. By pressing the
buzzer with long and short sounds. Letters and numbers can be created this way.
For instance the word BAD would be signaled as follows:
The secret of Morse code is the fact that electricity can be turned on, and it can be
turned off. This means that a flashlight can send long and short beams of light and
a buzzer can send long and short buzzing sounds. With an established code, such
as Morse code, we can now send combinations of long and short impulses
electronically. Very, very brief pauses occur between the shorts and longs of a
letter. Longer pauses indicate the separation between letters. This basically means
that electronically we can send human messages by turning electricity on and off in
a series of organized pulses. Does this mean that Samuel Morse invented the
computer? No, he did not get credit for starting the computer revolution, but it
does serve as a simple example to illustrate how electricity can process letters by
translating on and off situations into letters and numbers.
off on
0
Page 1.20
1
08-18-07
on
In this particular example, the second and eighth bulbs are on, and all the other
lights are off. This represents only one of 256 different combinations. Figure 1.5
will show three more combinations. It certainly is not Morse code, but using the
Morse code example, we can imagine that each one of the 256 combinations is
assigned to a letter, a number, or some other type of character.
The number system you use is base-10. Counting and computation in base 10 is
not simpler than other bases because it is base 10. It is simpler because you use
base 10. Sounds confusing, does it not? In elementary school, you practiced
multiplication tables in base 10. How many multiplication tables did you practice
in base 5 or base 8? Not too many, right? Rumor has it that people developed a
base 10 system, because of our ten fingers. Now in base 10 digits range from 0 to
9. After the largest digit 9, we must use two digits, like 10, 11, 12, 13, 14 etc. to
count higher.
Mathematically speaking, counting and computation is possible in many different
bases. A number system that is very skimpy in digits is base-2. Only the digits 0
and 1 are used. Many digits are needed for even small-valued numbers. The first
32 numbers in base-2, with the equivalent base-10 values are shown in figure 1.4.
Figure 1.4
Base 10
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Base-2
0
1
10
11
100
101
110
111
1000
1001
1010
1011
1100
1101
1110
1111
Base 10
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Base-2
10000
10001
10010
10011
10100
10101
10110
10111
11000
11001
11010
11011
11100
11101
11110
11111
Now consider these three 8-light-bulbs combinations in figure 1.5. Each one of
these combinations of on and off light bulbs can be viewed as a base-2 number.
Chapter I
Page 1.21
Figure 1.5
0
1
0
0
0
0
0
1
01000001 (base-2) = 65 (base 10)
0
1
0
0
0
0
1
0
01000010 (base-2) = 66 (base 10)
0
1
0
0
0
0
1
1
01000011 (base-2) = 67 (base 10)
Page 1.22
08-18-07
Chapter I
Page 1.23
Base 10
Base-2
Base 16
Base 5
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
0001 0000
0001 0001
0001 0010
0001 0011
0001 0100
0001 0101
0001 0110
0001 0111
0001 1000
0001 1001
0001 1010
0001 1011
0001 1100
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
10
11
12
13
14
15
16
17
18
19
1A
1B
1C
0
1
2
3
4
10
11
12
13
14
20
21
22
23
24
30
31
32
33
34
40
41
42
43
44
100
101
102
103
Page 1.24
08-18-07
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
0001 1101
0001 1110
0001 1111
0010 0000
0010 0001
0010 0010
0010 0011
0010 0100
0010 0101
0010 0110
0010 0111
0010 1000
0010 1001
0010 1010
0010 1011
0010 1100
0010 1101
0010 1110
0010 1111
0011 0000
0011 0001
0011 0010
0011 0011
0011 0100
0011 0101
0011 0110
0011 0111
0011 1000
0011 1001
0011 1010
0011 1011
0011 1100
0011 1101
0011 1110
0011 1111
0100 0000
1D
1E
1F
20
21
22
23
24
25
26
27
28
29
2A
2B
2C
2D
2E
2F
30
31
32
33
34
35
36
37
38
39
3A
3B
3C
3D
3E
3F
40
104
110
111
112
113
114
120
121
122
123
124
130
131
132
133
134
140
141
142
143
144
200
201
202
203
204
210
211
212
213
214
220
221
222
223
224
Did you observe the relationship between the base-2 and base-16 numbers? The
base-2 numbers are intentionally written with groups of four digits. Take a close
look, and you will see that any group of four base-2 digits corresponds to one
Chapter I
Page 1.25
base-16 digit. This makes conversion between base-16 and base-2 a rather simple
substitution job. The binary system is very tedious to view, and you can easily get
confused. For this reason you will see that many computer values, such as
memory addresses, are displayed in the hexadecimal, base-16 system.
Page 1.26
08-18-07
Measuring Memory
KB
Kilo Byte
MB
Mega Byte
GB
Giga Byte
TB
Tera Byte
PB
Peta Byte
EB
Exa Byte
1 thousand bytes
1 million bytes
1 billion bytes
1 trillion bytes
1 quadrillion bytes
1 quintillion bytes
The measuring memory diagram, in figure 1.6, may get a frown or two. The
information is technically incorrect. The diagram is meant to help remember the
measure size in a rounded manner. After all, Kilo does mean one-thousand.
Technically speaking one KB is 210 or 1,024 bytes. Using the same logic you can
compute that one MB is 220 or 1,048,576 bytes. I am sure you can live very
comfortably using the previous not really correct diagram.
The most significant chunk of silicon in your computer is the CPU chip. CPU
stands for Central Processing Unit and this chip is the brain of the computer. You
cannot call this chip ROM or RAM. On this tiny little chip are lots of permanent
instructions that behave like ROM, and there are also many places where
information is stored temporarily in the manner of a RAM chip. The CPU is one
busy little chip. You name it, the CPU does the job.
A long list of operations could follow here but the key notion is that you
understand that all the processing, calculating and information passing is controlled
by the Central Processing Unit. The power of your computer, the capabilities of
your computer, and the speed of your computer is based on your CPU chip more
than any other computer component.
Chapter I
Page 1.27
Secondary Storage
I just know that you are an alert student. ROM made good sense. RAM also
made sense, but you are concerned. If the information in RAM is toast when you
turn off the computer . . . then what happens to all the stored information, like
your research paper? Oh, I underestimated your computer knowledge. You do
know that we have hard drives, diskettes, zip diskettes, tapes, and CDs that can
store information permanently.
We have stored information on rust for quite some time. Did I say rust? Yes, I did
and perhaps you feel more comfortable with iron oxide. Tiny particles of iron
oxide on the surface of a tape or disk are magnetically charged positively or
negatively. In a different manner than the internal computer, but with a similar
logic, coded information is stored on a tape or a disk.
Please do keep in mind that this information will not disappear when the power is
turned off, but it can be easily altered. New information can be stored over the
previous information. A magnetic field of some type, like a library security gate,
heat in a car, dust in a closet, and peanut butter in a lunch bag can do serious
damage to your information.
You might be confused about the currently popular CD-ROMs. You can see that
they are external to the computer, but ROM implies Read Only Memory. CDs
store enormous amount of information. The information is permanent and thus
behaves like ROM. When you use a CD with a computer it behaves as if you had
added extra ROM to your computer internally. CDs do not use rust; they are far
too sophisticated for such a crude process. The CD is coded with areas that reflect
and absorb laser light. Once again we can create a code system because we have
two different states, on and off.
The on/off state is the driving force of the digital computer. What is digital?
Look at your watch. You can see digits, and you see the precise time. There is no
fractional time. A clock with hour, minute and second hands is an analog device.
It measures in a continuous fashion. A measuring tape is also analog, as is a
speedometer with a rotating needle. What is the beauty of digitizing something?
With digital information it is possible to always make a precise copy of the original.
It is easy to transfer, store and use digitized information. Entire pictures can be
converted to a digitized file and used elsewhere. I am sure you have been in movie
theaters where digital sound is advertised. So digital is the name of the game.
Just remember that not all digitizing is equally fast.
The internal memory of the computer is digital and it uses electronics. The access
of a hard disk involves electronics, but the information is read off a disk that
rotates and only one small part of the disk is readable at one time. Accessing a
disk drive is much slower than accessing internal memory.
Page 1.28
08-18-07
Any parent who has ever purchased a some assembly required toy has had to
wrestle with a sequence of instructions required to make the toy functional. So we
should be able to summarize all this programming stuff, apply it to computers and
place it in the definition diagram below.
Program Definition
A program is a sequence of instructions, which enables
a computer to perform a desired task.
Chapter I
Page 1.29
Page 1.30
08-18-07
Chapter I
Page 1.31
Page 1.32
08-18-07
This little experiment showed the major problem with human languages. Human
languages like English are idiomatic. We use all these idioms and proverbs, and
slang and special nuances that are meaningless to the computers. How can
computers figure out human language, when humans are confused? The bottom
line is that programming requires a restricted language. This language can have
human type words, but the words selected, the symbols and punctuation used, all
must have a very precise meaning. The manner in which the program language
structures its statements is called syntax. Program languages must have very
precise syntax. Compilers first check to see if a program has correct syntax. Only
after the syntax checks out, is the next step of translating into binary code
performed.
Chapter I
Page 1.33
As the demands for sophisticated computer uses grew, so did the demand for ever
more sophisticated computer programming languages. A new era with a powerful
programming technique was born called Object Oriented Programming (OOP).
You are hardly in a position to appreciate the finer features of OOP. Right now
appreciate that a new language had to be developed to incorporate the power of
OOP. Bjarne Stroustrup combined the popularity of the existing C language with
the demands for OOP and developed C++. C++ includes all the previous
capabilities of C, many improvements on the early C, and the new features of
object oriented programming. C++ actually is somewhat of a hybrid language
since object-oriented Style Programming is possible, but so is the older C-style
programming that today's modern programmers frown upon.
There is something else that you need to understand about this program language
stuff. You can say that there is one level above the compiler, called the linker. It
did not take computer scientists long to figure out that the majority of programs
use the same source code in each and every program. This is the type of code used
with input and output, mathematical calculations, etc. It seemed silly to keep
creating this code over and over again. Special library files of handy computer
routines were created and already translated into special machine code files. Now
these files cannot be executed by the CPU because the instruction set is not
complete. Such files are known as object files.
When modern programmers write a compiled program, like C++, they write their
own personal source code and the compiler checks their syntax to make sure
everything is written correctly. The first pass through the program is the compile
pass. Now a second pass links the compiled code with any other library file and
combines it into one nifty file that can be used by the computers CPU.
Page 1.34
08-18-07
like C++. This appealed to many college professors who did not like the fact that
C++ allowed, older non-OOP programming.
The College Board adopted Java as the AP Computer Science language to be used
for its examination starting with the 2003-2004 school year. And you have just
started a computer science course that will use Java as its programming language.
1.15 Networking
When you grow up in a certain environment, it can easily seem natural, as if the
environment was always the way you see it. Today's students think it is perfectly
normal that computers can use e-mail, play video games and surf the Internet. It
was not always that simple. Computers evolved and yes computers do seem to
evolve much faster than almost any other type of human creation.
The SneakerNet
Early personal computers were not networked at all. Every computer was a standalone computer. Some computers were hooked up to printers and many others
were not. If you needed to print something, and you were not directly connected
to a printer, you stored your document on a floppy diskette, walked to a computer
with an attached printer, and then printed the document. If a group of computer
programmers worked together on a project, they needed to get up frequently with
stored information to share it with other members in the team. Running around to
share computer information is now called the Sneaker Net. It may not be very
clever, but it does illustrate the environment.
Peer-to-Peer Networks
Computers did not wake up one day and hooked up to the Internet. The first
practical networks for personal computers were peer-to-peer networks. A peer-topeer network is a small group of computers with a common purpose all connected
Chapter I
Page 1.35
to each other. This small network allowed a single printer to be used by any
computer on the network and computers could also share information. These
types of networks were frequently called Local Area Networks or LANs. Initially,
the networks were true peer-to-peer networks. This means that every computer
on the network was equal. All computers were personal computer work stations.
Later, dedicated computers were used, called servers. A server is a specialty
computer that is connected to the LAN for one or more purposes. Servers can be
used for printing, logon authentications, permanent data storage and
communication. Many businesses would have multiple servers set up in such a
manner that some servers exist for the purpose of backing up the primary server.
Using backup systems, tape storage or other backup means insured computer
reliability in case of computer failure.
Page 1.36
08-18-07
connection. The amount of money you pay depends on the amount of traffic that
flows through your connection and the speed of your Internet connection.
Today many computers use a wireless connection to hook up to some local
network, that in turn hooks up to the Internet. Wireless connections are
convenient, but there are some problems. Signals are not always reliable, just like
cell phones. You may be stuck in an area somewhere where the signal is weak.
Furthermore, there is the security issue. Information that travels wireless is much
easier to pick by hackers than information that is channeled through cable.
Chapter I
Page 1.37
What does periphery mean? It means an imprecise boundary. If the computers are
located on the periphery of the classroom, then the computers are located against
the walls of the classroom. Computer hardware falls into two categories. There
are internal peripheral devices and external peripheral devices.
External peripheral devices were already mentioned. These are hardware, located
outside the computer and connected with some interface, which is usually a cable,
but it can also be wireless. The first external peripheral device you see is the
monitor. In the old days a monitor was called a CRT (Cathode Ray Tube). This
was appropriate with the bulky monitors that looked like old televisions. Today
many monitors use LCD (Liquid Crystal Display) screens. It is common now for
monitors to be 17, 19 or even 21 inches. This has changed since the early
computer days of 13 and 15 inch monitors.
Other external peripheral devices include a printer, keyboard, mouse, scanner,
jump drive or memory stick.
There are many internal peripheral devices that are connected to the computer
inside the computer case. These devices include the disk drive, CD ROM drive,
digital camera memory drive, network interface card and video card.
Computer Software
Computer software provides instructions to a computer. The most important
aspect of this course is to learn how to give correct and logical instructions to a
computer with the help of a programming language.
Software falls into two categories. There is system software and application
software. Usually, students entering high school are already familiar with
applications software.
Applications software runs an application on a computer. The whole reason why a
computer exists is so that it can assist people in some type of application. For
centuries, accounting kept large, complicated spreadsheets of business numbers.
Now these same numbers are entered on an electronic spreadsheet. You will not
experience the horror of finding some mistakes on the early pages of a thirty page,
typed, research paper. This type of mistake necessitates retyping the majority of
the pages. Today, this is a simple matter of inserting the corrections on a word
processor program. Spread sheets and word processors were the first software
applications. Currently, there are thousands of other applications to assist people
in every possible area from completing tax returns to playing video games.
System software involves the instructions that the computer requires to operate
properly. A common term is OS (operating system). The major operating systems
are Windows XP, UNIX and MAC OS. It is important that you understand the
Page 1.38
08-18-07
operation of your operating system. With OS you can store, move and organize
data. You can install new external devices like printers and scanners. You can
personalize your computer with a desktop appearance and color selections. You
can install additional applications and computer protection against losing data and
viruses.
1.17 Summary
This has been an introductory hodge-podge chapter. It is awkward to jump
straight into computer science without any type of introduction. Students arrive at
a first computer science course with a wide variety of technology backgrounds.
Some students know a little keyboarding and Internet access along with basic
word processing skills taught in earlier grades. Other students come to computer
science with a sophisticated degree of knowledge that can include a thorough
understanding of operating systems and frequently knowledge of one or more
program languages as well.
The secret of computer information storage and calculation is the binary system.
Information is stored in a computer with combinations of base-2 ones and zeroes.
Individual binary digits (bits) store a one or a zero. A one means true and a zero
means false. A set of eight bits forms one byte.
A byte can store one character in memory with ASCII, which allows 256 different
characters. The newer, international Unicode stores one character in two bytes for
a total of 65536 different characters.
Neither this chapter nor this book explained any details about the operating
system. Operating systems change frequently, or at least operating system versions
change to a new-and-improved model about every two or three years. A solid
knowledge of your computer's operating system is vital. Writing a computer
program requires knowledge of editing text, saving and loading files and moving
around the hard drive's directory system efficiently.
If your basic computer knowledge is weak, make sure to pick up additional
information from your teacher, library or bookstore. Technology is evolving and
students arrive in computer science classes with increased sophistication. In this
course no prior knowledge whatsoever about any programming language or
programming logic is assumed. However, a fundamental knowledge of basic
computer operations is essential.
Sun Microsystems created Java to be a programming language that is portable on many
computer platforms, a so-called platform-independent language. They also wanted the
language to be compatible with web page development.
Chapter I
Page 1.39
Early computers were stand-alone work stations. The first networked computers used
a "peer-to-peer" network. This was followed by LANs (Local Area Networks) that
connected dedicated specialty servers with computers and printers for a common
purpose. The Department of Defense developed the Internet as a means to provide
communication at war time.
Individuals, schools and businesses can set up a LAN at their private location without
paying a fee beyond the cost of the necessary hardware and software. Connection to
the Internet requires an ISP (Internet Service Provider) and a monthly connection fee.
Many computers today, especially laptop computers, have wireless network
connections. Such connections are convenient, but they are not as reliable and there is
also a greater security risk.
Computers use hardware and software. Hardware peripheral devices are the visible
computer components. There are external peripheral devices, such as monitors,
keyboards, printers and scanners. There are also internal peripheral devices like disk
drives, CD ROM drives, network interface cards and video cards.
Software falls into two categories of application software and operating system
software. Application software includes the common applications of word processing
and spreadsheets, but also tax return software and video games. Operating system
software runs the computer and allows the user to personalize the computer to his or
her needs and organize data.
Page 1.40
08-18-07