Essential Introduction To Computers Notes
Essential Introduction To Computers Notes
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A major part of understanding computers is to know what goes into them (data), what comes out of
them (information), and to understand the process of turning data into information, also known as the
information processing cycle.
Understanding the difference between data and information is important. Clifford Stoll - lecturer,
computer security expert, and author (The Cuckoo's Egg: Tracking a Spy through the Maze of
Computer Espionage and Silicon Snake Oil: Second Thoughts on the Information Superhighway are
two of his most popular works) - notes a wide gap between data and information. Information has a
pedigree, or lineage. Its source is known, whether a respected professor or a seventh grader. "The
Internet has great gobs of data," Stoll maintains, "and little, little information."
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Non-impact printers represent the fastest growing segment of the printer market. The drops of ink that
form an ink-jet printer character are similar to the dots that form a dot matrix character figure, but there
are many more of them. Good quality paper must be used with ink-jet printers so that the ink does not
bleed. The speed quoted for impact printers often is measured in characters per second (cps). Like inkjet printers, laser printer speed is measured in pages per minute (ppm). Although they are fast, all
printers are much slower than computers. Because of this, most printers have a buffer that temporarily
stores a few pages, allowing the computer to dump output into the buffer and continue processing. The
most widely used PC monitors are 14- or 17-inch (measured from one corner to the diagonally
opposite corner). With the growing popularity of portable computers, the clarity of LCD displays
continues to improve. The quality of a monitor's display depends largely on three factors:
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
manufactured in an environment that typically is cleaner than a hospital operating room. Storage
capacity can be increased on both hard disks and floppy disks with compression programs such as
Stacker, WinZip, or PKZIP.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A database file is a collection of related data called records, each of which consists of a group of related
facts called fields. The data can be manipulated, or a report, called a query, can be created based on
user-specified criteria. Although most spreadsheet packages can manage data tables of a few thousand
records, database software can efficiently handle much larger data tables.
Word processing and spreadsheet software came out around 1980. Presentation graphics software was
not introduced until the mid to late 1980s. Nevertheless, it can be argued that presentation graphics
software has had almost as great an impact on business, and on how people do business, as either of
the older applications. Presentation graphics packages include libraries of clip art that can be inserted
into slides and a slide sorter that can be used to organize the order effectively in which slides are
presented.
and
Equipment
and
the
Communicating with a computer is becoming the standard today for both business and personal use.
The communications channels are constantly being upgraded in order to send information faster.
Communications technologies have changed the way people interact through the use of e-mail,
videoconferencing, and the Internet.
Many vendors sell network versions of their software. The network version resides on the network
server and can be accessed by each computer on the network. When a network version is purchased, a
site license is obtained from the vendor. The fee for the site license, usually based on the number of
computers on the network, is less than the purchase of individual packages for each computer.
The number of people using the Internet is growing by 5% each month. Paul Moritz, a vice president
at Microsoft, maintains that, "In the long run, it's hard to exaggerate the importance of the Internet."
The Web, an innovation of Tim Berners-Lee, debuted in 1989. Since then, the Web has experienced
astounding growth. Some experts claim that the size of the Web doubles every 60 days. Using links to
move from one document to another often is called surfing the Web. Two popular Web browsers are
Netscape Navigator and Microsoft Internet Explorer.
How t o P u r c h as e, I n st al l , an d Mai n t ai n a C o m p ut e r
At some point in your life, you will probably decide to purchase a computer. Aside from understanding
the components discussed earlier, it also is important to be able to find the computer that best fits your
needs. For example, most new computers come with application software already installed. If you do
not use this software, then it is of no value even though you got it for "free." There are several things to
look for when purchasing a new computer. If possible, speak to someone who is familiar with the
purchasing process and can guide you along.
For most people, buying a computer is an expensive experience. Despite this, many people are woefully
uninformed when they set out to purchase a computer. Although desktop computer systems remain
popular, since 1993 sales of laptop, notebook, and smaller computers have rivalled sales of larger
systems, partly because of their enhanced capabilities and increased use by field sales forces. Be careful
when setting up a computer system. Failure to follow health guidelines can lead to painful, and even
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
permanent, disabilities. Government studies indicate repetitive stress disorder (RSI) and cumulative
trauma disorder (CTD), the most commonly reported problems associated with prolonged keyboard
use, are responsible for half of work-related illnesses. Computer security is an increasingly important
issue. A survey of American companies with more than 200 personal computers showed that over 60%
had suffered at least one virus attack. Two of the major sources of viruses, free software and illegally
copied software, more commonly are used by small companies and private individuals, so the
percentage of PC users affected by viruses may be much higher. E-mail attachments have been the
carriers of several recent virus attacks that have infected both business and home computer users.
E-Commerce
Conducting business online is known as electronic commerce, or e-commerce, and includes such
commercial activities as shopping and investing. The three types of e-commerce that exist today are
business to consumer (B2C), consumer to consumer (C2C), and business to business (B2B).
If you have access to a computer, an Internet connection, and a means to pay for products or services,
you can participate in e-commerce. Today, users can participate in e-commerce not only through
desktop computers, but also through mobile devices such as laptop and handheld computers, pagers,
and cellular phones. M-commerce (mobile commerce) is the term some people use to describe ecommerce activities that take place using mobile devices.
The more popular uses of e-commerce include shopping and investing. On the Web, you can buy and
sell stocks, order flowers, purchase groceries and airline tickets, and even buy a car!
Three types of e-commerce exist: business to consumer (B2C), consumer to consumer (C2C), and
business to business (B2B). Of the three, most e-commerce takes place between businesses, making
B2B e-commerce transactions the most common.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
There are two categories of computer software: system software and application software.
System software consists of the programs that control the operations of a computer and its devices.
Two types of system software are the operating system and utility programs.
An operating system (OS) coordinates all activities among hardware devices and contains instructions
that allow you to run application software.
A utility program performs specific tasks, usually related to managing a computer, its devices, or its
programs. You interact with software through its user interface.
Application software consists of programs that perform specific tasks for users. Popular application
software includes word processing software, spreadsheet software, database software, and presentation
graphics software. Application software can be
Packaged software (copyrighted software that meets the needs of a variety of users),
In-house/Custom software (tailor-made software developed at a users request),
Freeware (copyrighted software provided at no cost),
Public-domain software (software donated for public use with no copyright restrictions), or
Shareware (copyrighted software distributed free for a trial period).
D i s c u s s t h e u s e s o f t h e I n t e r n e t a n d t h e Wor l d W i d e W eb
The worlds largest network is the Internet, which is a worldwide collection of networks that links
together millions of businesses, government agencies, educational institutions, and individuals. Users
connect to the Internet to send messages, access information, shop for goods and services, meet or
converse with other users, and access sources of entertainment and leisure. Most users connect to the
Internet through an Internet service provider (ISP) or an online service provider (OSP). The World
Wide Web is a popular segment of the Internet that contains billions of documents called Web pages.
These documents can contain text, graphics, sound, video, and built-in connections, or links, to other
Web pages stored on computers throughout the world.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A personal computer can perform all of its input, processing, output, and storage activities by itself.
Personal computers include desktop computers and notebook computers.
A desktop computer is designed so the system unit, input devices, output devices, and any other devices
fit entirely on or under a desk or table. Variations of desktop computers include
Tower models (computers with tall and narrow system units that can sit vertically on the floor),
All-in-one computers (less expensive computers that combine the monitor and system unit into
a single device), and
Workstations (more expensive and powerful computers designed for work that requires intense
calculation and graphics capabilities).
A notebook computer is a portable personal computer small enough fit on your lap. Notebook and
desktop computers are used at home or in the office to perform application software-related tasks or to
access the Internet.
A handheld computer is a small computer that fits in your hand. Handheld computers can perform
specific, industry-related functions, or can be general-purpose. A PDA (personal digital assistant) is a
handheld computer that provides personal organizer functions, such as a calendar, appointment book,
and notepad.
An Internet appliance is a computer with limited functionality whose main purpose is to connect to the
Internet from home.
A mid-range server is more powerful and larger than a workstation computer. Users typically access a
mid-range server through a personal computer or a terminal, which is a device with a monitor and a
keyboard that usually has no stand-alone processing power.
A mainframe is a large, expensive, very powerful computer that can handle hundreds or thousands of
connected users simultaneously.
A supercomputer is the fastest, most powerful, and most expensive category of computer.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A large business user works for a company that has a large number of employees and computers
usually connected to a network.
The power user such as an engineer, architect, or desktop publisher typically works with
multimedia, which combines several media elements into one application, and requires the capabilities
of a workstation or other powerful computer.
U n d e r s t a n d h o w a u s e r c a n b e a W eb p u b l i s h e r
In addition to being a recipient of information, Internet users have the ability to provide information to
other connected users around the world. Users can create a Web page with word processing software or
with Web page authoring software. Publishing a Web page is the process of making it available on the
Internet.
Computer Literacy
It is difficult to think of a field in which computers are not used. In addition to general-purpose
computers, special-purpose computers are used in everything from automobiles to electric razors.
Consider how computers have influenced our daily lives, both positively and negatively. (To err is
human, but to really foul things up requires a computer. Anonymous, from a BBC Radio
broadcast.) List ways in which computers are being used today. What is the most common use? What
is the most unusual use? As a result of the expanding use of computers, in 1986 Florida became the
first state to demand computer literacy of all students by grade 12.
Computer
Although computers are thought of as a relatively recent innovation, the term computer has a long
history. Prior to 1940, computer was a job title that referred to anyone performing calculations.
11
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Consider how data is different from information. Data is processed into information. Clifford Stoll
lecturer, computer security expert, and author of Silicon Snake Oil: Second Thoughts on the
Information Superhighway notes a wide gap between data and information. Stoll insists that
information has a pedigree, or lineage. Its source is known, whether by a respected professor or a
seventh grader. The Internet has great gobs of data, Stoll maintains, and little, little information.
The first three operations in the information processing cycle input, process, and output are
performed to process data into information, while the fourth operation storage refers to a
computers electronic reservoir capability. Think about how we perform each phase in the information
processing cycle in the human computer (i.e., the human brain) while completing a common task,
such as learning a telephone number.
Computer Components
Different types of input devices are designed to transmit different types of data or to transmit data in
different ways. Think of other input devices (joysticks, scanners, digital cameras, and so on) and the
different types of data they transmit or the different ways they transmit data.
Because it is more lasting than output from a monitor or speaker, the printers output often is called
hard copy. Think of other output devices with which you are familiar (data projectors, computer output
microfilm, and so on).
Some computer components are considered internal, while others are considered external. External
components are called peripherals. Input, output, and communications devices often are peripheral
devices.
The difference between the temporary character of memory and permanent nature of storage will be
made painfully clear the first time you experience a power failure while working on a computer. Think
of other examples of storage devices (magnetic tape, PC Cards, and so on).
The capability to communicate may be one of the most significant factors influencing how computers
are used now and in the future.
C o m p u t e r P ow e r
In one billionth of a second, an electronic signal travels almost 12 inches. This means that todays
supercomputer (the fastest, most powerful, and most expensive category of computers) can perform 1.8
trillion operations per second. If a person did one arithmetic operation a second without stopping, it
would take more than 31,000 years to perform the number of operations a supercomputer can do in
one second. Researchers predict that one day computer speed will be measured in exaflops, or one
quintillion (1 x 1018) calculations per second.
The reliability of computer components often is measured in MTBF (mean time between failure, in
hours). A typical component might be rated 10,000 MTBF.
12
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Although the term computer error is widespread, most computer errors can be traced to human
mistakes. Consider instances of computer error with which you are familiar. How might human
blunders have resulted in the computer error? Why are people apt to blame computers?
Supercomputers have more than 600 gigabytes of memory, meaning that they can store more than 600
billion letters, numbers, and special characters, and have 2 terabytes (2 trillion bytes) of disk space.
Equally important is the speed at which data can be retrieved, processed, and stored again.
Connected computers can share each operation in the information processing cycle. To recognize the
value of communication, imagine trying to solve a problem individually, and then trying to solve the
same problem with the assistance of several classmates.
Computer Software
The difference between computer hardware and computer software is important. A 3-inch floppy disk
is hardware; however the programs stored on it are software. Programs or software, like data, are input
into the computer.
Because you interact with it directly, you may be more consciously aware of application software than
system software. Remember that system software determines how you interact with application software.
Popular operating systems include DOS (Disk Operating System), Windows 3.x (technically, not an
operating system but an operating environment that makes DOS easier to use), Windows 95, Windows
98, Windows 2000, Windows XP, Mac OS, OS/2, UNIX, Linux (rhymes with cynics), and NetWare.
DOS was developed by Microsoft for IBM personal computers. DOS started Microsofts climb to the
top of the software world -- at one time, versions of DOS were used worldwide by more than 100
million people. DOS has a command-line interface, meaning that people have to memorize and type
instructions.
Today, operating systems with a graphical user interface, such as Microsofts Windows, are far more
popular.
Most application software packages are designed to be used with specific operating systems. Much of
the software with which you are familiar is packaged software. Because of their complexity, most
software programs are written by teams of programmers working together. Just as people understand a
variety of spoken languages (English, French, Chinese, and so on), computers recognize a number of
programming languages.
Networks
A network with which you might be familiar is the school computer lab. Consider resources that can
be shared on a network. For example, the school computer lab may share a single printer. Think of
advantages of sharing resources. Why are most business computers part of a network?
The Internet
Estimates claim that more than 50 percent of U.S. homes are connected to the Internet, and more than
13 million do so through an online service provider. Although the growth rate of the Internet and
online services has slowed from a peak of more than 140 percent in 1994-95, the growth rate still is
around 20 percent annually. Surveys show the number of Web site visitors continues to expand rapidly,
13
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
practically doubling every year. Interestingly, surveys show that teenage boys and girls are accessing the
Internet for different reasons. While boys seem to focus on entertainment, girls use the Internet more
for schoolwork and chat.
Computer Categories
In addition to differences in size, speed, processing capabilities, and price, other factors, such as the size
of main memory and number of peripheral devices, also can be considered when categorizing
computers. Rapid changes in technology make it difficult to define categories precisely. As a rule of
thumb, todays PCs have about as much memory and processing power as the mainframes of a decade
ago.
Think of personal computers with which you are familiar. How is the computer used? What factors
influence the choice of a personal computer? In addition to such obvious considerations as processing
speed and amount of memory, less apparent factors, such as available software or even the computers
footprint (the amount of space it occupies on the work surface) also may be important. A desktop
computer monitor often is placed on top of the system unit case. This sometimes can be an ergonomic
problem, forcing users to look up. Server computers often are used in academic environments. What
features of server computers would make them particularly attractive to schools? In todays mobile
society, notebook computers have become indispensable tools. Since 1993, sales of notebooks and
smaller computers have rivalled sales of larger systems, partly because of their enhanced capabilities and
increased use by field sales forces. The capabilities of handheld computers also continue to expand.
Visor, a new handheld computer from Handspring, is an electronic organizer but also offers video
games, a cell phone, a modem, an MP3 player, and a two-way pager. Called the Swiss Army knife of
handheld computers, Visor uses the Palm operating system, which is the same operating system used
by the Palm Pilot, a popular handheld computer from 3Com, and is available for about $200.
The growing movement toward decentralization in business, coupled with the increasing power of midrange servers, has led to a recent trend away from mainframe computers and toward mid-range servers.
What advantages might mid-range servers have over mainframe computers for a business?
Organizations that deal with huge, constantly changing collections of data accessed simultaneously by
many users, such as banks, insurance companies, universities, and government agencies, often use
mainframe computers. Despite this, mainframe sales are declining approximately 10 percent per year.
One of the most important features of supercomputers is their capability to create complex, threedimensional images almost instantaneously. Television networks often use supercomputers to generate
complicated images and then give viewers the sense of going through the image. Due to their size
and expense, only large businesses and government agencies use supercomputers. IBMs Option Blue
supercomputer was used by the Department of Energy to simulate nuclear explosions, allowing the
effects of aging and adverse conditions on nuclear weapons to be explored without underground
detonations.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Individuals in higher income levels have greater access to the Internet than people in lower levels and
the gap may be growing.
Women are under-represented in todays computer classes and technology jobs.
A number of efforts are being made to narrow the digital divide.
Networks have changed the face of both small and large business. In the 1970s, executives usually
worked with monthly reports; in the 1980s, they used weekly reports; today, daily or even hourly
reports are available. How have computers affected the efficiency of businesses? What impact have
computers had on the interpersonal side of business (i.e., employee and customer relationships)?
How have computers changed peoples jobs? Have computers cost any people their jobs?
Web P u b l i s h i n g
With todays Web page authoring software, children as young as 10 years old, and sometimes younger,
can create and publish their own Web pages. If you created a Web page, what type of information
would you provide? Why? Would you be interested in seeing someone elses Web page? Why or why
not? If you have created a Web page, what type of software did you use? What was the most difficult
part of creating your Web page?
15
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
CHAPTER 2
THE INTERNET AND WORLD WIDE WEB
Overview
Discuss how the Internet works
Understand ways to access the Internet
Identify a URL
Search for information on the Web
Describe the types of Web pages
Recognize how Web pages use graphics, animation, audio, video, and virtual reality
Define Webcasting
Describe the uses of electronic commerce (e-commerce)
Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms, and instant
messaging work
Identify the rules of netiquette
This chapter introduces one of the most significant innovations of the past half century the Internet.
The Internet is defined, and the history of the Internet is detailed. You discover how the Internet works
and learn about Internet service providers and online services, connecting to the Internet, how data
travels the Internet, and Internet addresses. The World Wide Web, search engines, and multimedia on
the Web are explained. You become familiar with Webcasting, electronic commerce, Web publishing,
and other Internet services including e-mail, FTP, Telnet, newsgroups, mailing lists, chat rooms, instant
messaging and VOIP. Finally, netiquette, the Internet code of acceptable behaviour by users, is
described.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A wireless service provider (WSP) provides wireless Internet access to users with wireless modems or
Web-enabled handheld computers or devices.
Employees and students often connect to the Internet through a business or school network that
connects to a service provider. For home or small business users, dial-up access provides an easy and
inexpensive way to connect to the Internet.
With dial-up access, you use a computer, a modem, and a regular telephone line to dial into an ISP or
OSP. Some home and small business users opt for newer, high-speed technologies.
DSL (digital subscriber line) provides high-speed connections over a regular copper telephone line.
A cable modem provides high-speed Internet connections through a cable television network.
Identify a URL
The most widely used service on the Internet is the World Wide Web. The World Wide Web (WWW
or Web) consists of a worldwide collection of electronic documents called Web pages. A browser is a
software program used to access and view Web pages. Each Web page has a unique address, called a
URL (Uniform Resource Locator) that tells a browser where to locate the Web page. A URL consists
of a protocol, domain name, and sometimes the path to a specific Web page or location on a Web
page. Most URLs begin with http://, which stands for hypertext transfer protocol, the communications
standard that enables pages to transfer on the Web.
S e a r c h f o r i n f o r m a t i o n o n t h e W eb
A search engine is a software program you can use to find Web sites, Web pages, and Internet files. To
find a Web page or pages, you enter a relevant word or phrase, called search text or keywords, in the
search engines text box. Many search engines then use a program called a spider to read pages on Web
sites and create a list of pages that contain the keywords. Any Web page that is listed as the result of the
search is called a hit. Each hit is a link that can be clicked to display the associated Web site or Web
page.
D e s c r i b e t h e t y p e s o f W eb p a g e s
There are six basic types of Web pages.
An advocacy Web page contains content that describes a cause, opinion, or idea.
A business/marketing Web page contains content that promotes or sells products or services.
An informational Web page contains factual information.
A news Web page contains newsworthy material including stories and articles relating to current events,
life, money, sports, and the weather.
A portal Web page offers a variety of Internet services from a single, convenient location.
17
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A personal Web page is maintained by a private individual who normally is not associated with any
organization.
R e c o g n i z e h o w W eb p a g e s u s e g r a p h i c s , a n i m a t i o n , a u d i o , v i d e o ,
and virtual reality
Many exciting Web pages use multimedia. Multimedia refers to any application that integrates text with
one of the following elements: graphics, sound, video, virtual reality, or other media elements.
A graphic is a digital representation of information such as a drawing, chart, or photograph. Two
common file formats for graphical images on the Web are JPEG (Joint Photographic Experts Group)
and GIF (Graphics Interchange Format), which use compression techniques to reduce the size of
graphics files and thus speed downloading.
Animation is the appearance of motion created by displaying a series of still images in rapid sequence.
One popular type of animation, called an animated GIF, uses computer animation and graphics
software to combine several images into a single GIF file.
Audio is music, speech, or any other sound. A common format for audio files on the Web is MP3, a
popular technology that compresses audio. More advanced Web audio applications use streaming audio,
which transfers audio data in a continuous and even flow, allowing users to listen to the sound as it
downloads.
Video consists of full-motion images that are played back at various speeds. Video files often are quite
large in size. The Moving Pictures Experts Group (MPEG) defines a popular video compression
standard. Streaming video allows you to view longer or live video images as they are downloaded.
Virtual reality (VR) is the use of computers to simulate a real or imagined environment that appears as
a three-dimensional (3-D) space. A VR world is an entire 3-D site that contains infinite space and
depth.
D e f i n e W eb c a s t i n g
Pull technology is a method of obtaining information that relies on a client such as your computer to
request a Web page from a server. On the other hand, Webcasting, also called push technology, is a
method of obtaining information in which a server automatically downloads content to your computer
at regular intervals or whenever updates are made to the site. Webcasting saves time by delivering
information at regular intervals and allows users to view Web content when they are offline, that is,
when they are not connected to the Internet.
18
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Consumer to consumer (C-to-C or C2C) e-commerce occurs when one consumer sells directly to
another. An online auction is an example of consumer to consumer e-commerce.
Business to business (B-to-B or B2B) e-commerce, which is the most prevalent type of e-commerce,
takes place between businesses, with businesses typically providing services to other businesses.
E x p l a i n h o w e - m a i l , F T P, n e w s g r o u p s a n d m e s s a g e b o a r d s , m a i l i n g
lists, chat rooms, and instant messaging work
A variety of services are used widely on the Internet, including e-mail, FTP, newsgroups and message
boards, mailing lists, chat rooms, and instant messaging.
E-mail (electronic mail) is the transmission of messages and files via a computer network. You use an
e-mail program to create, send, receive, forward, store, print, and delete messages. To receive messages,
you need an e-mail address, which is a combination of a username and a domain name that identifies a
user.
FTP (File Transfer Protocol) is an Internet standard that allows you to upload and download files with
other computers on the Internet. An FTP server is a computer that allows you to use FTP to upload
files to, and download files from, an FTP site. With anonymous FTP, anyone can transfer some, if not
all, available files.
A newsgroup is an online area in which users conduct written discussions about a particular subject.
The computer that stores and distributes newsgroup messages is called a news server. You use a
program called a newsreader to access a newsgroup, read previously entered messages (called articles),
and add (post) messages of your own. A thread consists of the original article and all subsequent
related replies. In a moderated newsgroup, a moderator reviews articles and posts them, if appropriate.
A message board is a popular Web-based type of discussion group that does not require a newsreader
and typically is easier to use than a newsgroup.
A mailing list is a group of e-mail names and addresses given a single name. To add your e-mail name
and address to a mailing list you subscribe to it; to remove your name, you unsubscribe.
A chat is real-time (meaning everyone involved in the chat is online at the same time) typed
conversation that takes place on a computer. A location on an Internet server that permits users to chat
is called a chat room. Some chat rooms support voice chats and video chats, where you can hear or see
others and they can hear or see you as you chat. A chat client is a program on your computer that
allows you to connect to a chat server and start a chat session.
Instant messaging (IM) is a real-time Internet communications service that notifies you when one or
more people are online and then allows you to exchange messages or join a private chat room.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
20
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
National ISPs include AT&T, Earthlink, and WorldCom. Two popular OSPs are America Online
(AOL) and the Microsoft Network (MSN). Some online services supply specific types of information.
For example, Dow Jones provides financial and business news, and Imagination offers games and
entertainment. WSPs include GoAmerica Communications, OmniSky, and SprintPCS. The role of WSP
is expected to grow. Industry analysts predict that by 2003, more than 60 million people will use
wireless Web-enabled devices to connect to the Internet. The CEO of Amazon.com goes even farther,
projecting that in 10 years all Internet connections be wireless.
Although most ISPs charge a standard fee for dial-up access, to attract users (who view advertisements
on an ISPs home page) some ISPs now are providing free service. Following this lead, a Californiabased DSL recently advertised free, high-speed Internet access (a service that usually costs $50 a
month) to users who agree to ads aimed at their demographic group.
URLs
On a Web page, a link is a built-in connection to another related Web page or part of a Web page. A
link can be a word, phrase, or image. URLs make it possible to navigate using links, because each link
is connected to a URL. When you click a link, the Web site or document associated with the URL is
displayed. Some people refer to this activity of jumping from one Web page to another as surfing the
Web.
URLs are registered for a standard fee (usually about $70). To acquire an appropriate URL, some
companies are willing to spend a great deal more for a URL that already has been registered. Recently,
eCompanies paid an entrepreneur $7.5 million for a Web address. This more than doubled the previous
record Compaqs purchase of altavista.com for $3 million.
S e a r c h i n g t h e Web
The World Wide Web is an incredible source of information on almost any topic. There are almost 2.5
billion Web pages. Exploring this vast reservoir for the answer to a search engine users query, which
usually is expressed in just a few keywords, is a daunting task. No wonder an engineering head at
AltaVista described search engines as a combination of wizardry and witchcraft.
Often, simple search queries yield an overwhelming number of results. This is attributed to several
factors:
The limitations of search engines. A query about mustangs on the American plains might produce
results involving Southern Methodist University's football team and the Ford car.
The nature of queries. While a traditional researcher, such as a librarian, uses queries averaging 14
words, the typical Internet query is just over one word.
The creators of Web pages. Developers of commercial Web pages sometimes distort results by
repeating frequently requested keywords in the background, where spiders see them but people do not.
Despite these difficulties, search engines are among the most popular sites on the Web. When choosing
a search engine, experts suggest that novice users, and users looking for obscure information, turn first
to the larger search engines (AltaVista, Yahoo!, Lycos, and so on) because they are easiest to use and
cast the largest net.
21
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
T y p e s o f Web P a g e s
Advocacy Web pages established for political candidates, called e-campaigning, has become an
important part of politics. Surveys show that more than 50 percent of Internet users turn to the Web for
information about political topics.
Business/marketing Web pages used for shopping on the Internet are increasingly popular. In 1999, 17
million households shopped online. This figure is expected to grow to 49 million by 2004. A survey of
back-to-school shoppers 34 years old and younger showed that 17 percent planned to shop online for
their childrens school needs. Perhaps more significant, only 6 percent of surveyed shoppers reported
being uncomfortable with buying on the Internet.
Educational institutions frequently publish informational Web pages. Today, most colleges have Web
sites that offer course descriptions, information about the student population, and registration costs and
deadlines. When shopping for college, surveys show that high school seniors use the Web more than
catalogues or guidebooks; about 80 percent of college-bound students start looking at college Web sites
as sophomores.
News Web pages are the most popular Web sites among Americans with access to the Internet.
Although these Web sites often are associated with newspapers, magazines, television stations, or radio
stations, some are published only online, without a related print or broadcast media.
Portal Web pages often offer the following free services: search engine, news, sports and weather, free
personal Web pages, reference tools, shopping malls, e-mail, instant messaging, newsgroups, and chat
rooms. The dictionary defines a portal as a door or gateway. Portal Web pages are gateways to a host
of services.
Personal Web pages sometimes use Web cams to provide minute-by-minute views of life in a dorm
room, an apartment, a new-born babys crib, or even the inside of a refrigerator. One devotee of these
personal Web pages says visitors often develop a sort of relationship with the Web page developer.
Perhaps this observation is true; some personal Web pages receive more than 1,000 hits a day.
H o w Web P a g e s U s e M u l t i m e d i a
Multimedia can bring a Web page to life, increase the types of information available on the Web,
expand on the Webs potential uses, and make the Internet a more entertaining place to explore.
Because Web pages with multimedia take longer to download, most browsers allow users to turn off
some multimedia elements (such as graphics) and show a text-only version, speeding the display of a
Web page.
Choose a topic for a Web page, such as your school or your class. How could multimedia enhance the
page? What multimedia elements would you use? How?
Web c a s t i n g
Some people use Webcasting to download copyrighted material, such as music, from Web sites. Many
young, unknown musicians see music Web sites as a way to gain exposure, but some already-popular
musicians see sharing music on Web sites as little more than theft. The heavy metal rock band Metallica
sued Napster (a music Web site) for copyright violations. A number of colleges have placed a ban on
music Web sites. These schools maintain that students downloading and sharing music creates a
22
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
tremendous amount of traffic, clogging the schools computer systems. As a result, the schools are
using filtering software to deny access to music Web sites. Several student groups have formed to
protest this response.
E-Commerce
Today, more than 50 percent of Web sites are commercial. Online product sales total more than $6
billion, which represents a twelve-fold increase in just five years. These numbers should be kept in
perspective in 1999, e-commerce still represented only 0.5 percent of U.S. consumer spending.
Business to consumer e-commerce often allows buyers to purchase directly from businesses, eliminating
the middleman and thus providing goods and services at lower costs. Other advantages of e-commerce
include:
Global presence
Two-way communication
Decreased costs
Businesses advertise with their own Web site or on another companys Web site. The most successful
Web advertisements are on popular sites, such as search engines. In terms of audience, advertising on
the Web is expensive. The cost to reach 1,000 consumers is about $75 on the Web, $60 in a
newspaper, $44 in a magazine, and $5 on television. Yet, Web advertisements do offer advantages:
Unlike traditional media advertising, which is passive (and often ignored by the audience), Web
advertising is interactive. The audience expresses an interest in the product by clicking a hyperlink and
choosing to view a Web ad.
For many products, Web users are the ideal customers. Web users tend to be students or highly
educated consumers in their late 30s, with average incomes of about $55,000.
W h a t p r o d u c t s c o u l d b e n e f i t m o s t f r o m a d v e r t i s i n g o n t h e Web .
Why?
Web P u b l i s h i n g
Deciding upon the purpose of the Web site and the audience for whom it is intended will make it
easier to determine what should and should not be included on the Web site. Web publishing is an
increasingly commonplace Internet activity. With the assistance of word processing packages, Web page
authoring software, or Web sites that assist in the creation of Web pages, even elementary school
children are developing personal Web pages.
Internet Services
23
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
It is estimated that the number of e-mail users has increased 300 percent during the past five years, and
the number of e-mail messages sent per day has increased 400 percent. While its growth has been
phenomenal, not everyone is happy with e-mails ever-increasing use. In a business setting, some feel
that e-mail can be counter-productive. They contend that employees spend too much time writing and
reading e-mail on inconsequential topics subjects they never would commit to paper. In a social
setting, some wonder if e-mail is fitting in every situation. Although e-mail is suitable for casual
messages, most believe it is inappropriate for more serious or formal communication, such as a
wedding invitation. How do you feel about these reservations regarding e-mail?
Many files on anonymous FTP sites are public domain software, freeware, or shareware. Public domain
software is not copyrighted and therefore can be distributed at no cost. Freeware also is available at no
cost but, because it is copyrighted, it cannot be resold. Shareware can be downloaded and tried for free,
but a license fee must be paid if the software is kept. Shareware users who pay the license fee may
receive a manual, notification of new releases or tips, and access to technical support. The quality of
freeware, public domain software, and shareware varies greatly.
The real-time character of chat makes chat rooms different from newsgroups or mailing lists. The extent
to which a chat room is monitored varies. In some chat rooms, particularly those aimed at adults, a
monitors presence hardly is noticed. Chat rooms intended for minors, however, often are monitored
closely. Chat rooms can be an invaluable experience for children, letting them share thoughts and ideas
with people their own age from around the country, or even around the world. Yet, to ensure that
content is appropriate, parents may want to oversee a childs first few chat room visits.
Netiquette
Netiquette can be applied to all aspects of the Internet. Which netiquette rules are most important?
Which rules are least important? Why? What rules, if any, would you add? In her book, Guide for the
Turn-of-the-Millennium, syndicated columnist Judith Martin (Miss Manners) offers guidelines for use
of
the
Internet
and
other
technological
innovations.
Web
sites
such
as
http://www.fau.edu/netiquette/netiquette.html also offer advice on Internet manners.
24
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
CHAPTER 3
A P P L I C A T I O N S O F T WAR E
Overview
Define application software
Identify the widely used products and explain the key features of different software applications
This chapter discusses the role of the system software with respect to application software. It then
presents an overview of several productivity software applications, graphic design/multimedia software
applications, home/personal/educational software applications, and communications software
applications. The chapter then identifies various Web applications. Finally, learning aids and supports
tools within application software products are presented.
25
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Identify the widely used products and explain the key features of
People use productivity software to become more effective and efficient while performing daily activities.
Word processing software allows users to create and manipulate documents that contain text and
graphics. With word processing software, you can insert clip art into a document; change margins;
find and replace text; use a spelling checker to check spelling; place a header and footer at the top
and the bottom of a page; and vary font (character design), font size (character scale), and font style
(character appearance).
With spreadsheet software, data is organized in rows and columns, which collectively are called a
worksheet. The intersection of a row and column, called a cell, can contain a label (text), a value
(number), or a formula or function that performs calculations on the data and displays the result.
Database software allows you to create and manage a database. A database is a collection of data
organized to allow access, retrieval, and use of that data. A query is used to retrieve data according
to specified criteria, which are restrictions the data must meet.
Presentation graphics software is used to create presentations that communicate ideas, messages,
and other information to a group through a slide show. You can use a clip gallery to enhance your
presentation with clip art images, pictures, video clips, and audio clips.
A personal information manager (PIM) is software that includes an appointment calendar to
schedule activities, an address book to maintain names and addresses, and a notepad to record ideas,
reminders, and important information. A software suite is a collection of individual applications sold
as a single package.
Project management software allows you to plan, schedule, track, and analyze the progress of a
project. Accounting software helps companies record and report their financial transactions.
Power users often use software that allows them to work with graphics and multimedia.
Computer-aided design (CAD) software assists in creating engineering, architectural, and scientific
designs.
Desktop publishing (DTP) software is used to design and produce sophisticated documents. DTP
is developed specifically to support page layout, which is the process of arranging text and graphics
in a document.
Paint software is used to draw graphical images with various on-screen tools.
26
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
E-mail software is used to create, send, receive, forward, store, print, and delete e-mail (electronic
mail).
A Web browser is a software application used to access and view Web pages.
A chat client is software that allows you to connect to a chat room, which permits users to chat via
the computer.
A newsreader is a software program used to participate in a newsgroup, which is an online area on
the Web where users conduct written discussion about a particular subject.
An instant messenger is a software program installed to use instant messaging (IM), a real-time
communications service that notifies you when one or more people are online and then allows you
to exchange messages or files.
Groupware is a software application that helps groups of people on a network work together and
share information.
A videoconference is a meeting between two or more geographically separated people who use a
network or the Internet to transmit audio and video data.
I d e n t i f y v a r i o u s p r o d u c t s a v a i l a b l e a s W eb a p p l i c a t i o n s
A Web application is a software application that exists on a Web site. To access the Web application,
you visit the Web site that offers the program. Some Web applications are free; for others, you pay for
27
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
use, service, support, or when a certain action occurs. Web-based training (WBT) is a type of CBT
(computer-based training) that uses Internet technology. Many Web sites offer WBT to the general
public. An application service provider (ASP) is a third-party organization that manages and distributes
software and services on the Web.
Describe
the
applications
learning
aids
avai l able
with
many
software
Application Software
Popular types of application software can be categorized by their general use: productivity software,
graphics design/multimedia software, home/personal/educational software, and communications
software. An application can belong to more than one category. For example, an e-mail program can be
considered both productivity software and communications software.
System Software
Many application programs are designed to run with a specific operating system. When shopping for
an application software package, buyers must make sure they have a compatible operating system. A
software package designed to be used with the Macintosh operating system may not work with the
Windows operating system. The operating system version also is important. An application designed for
Windows XP may not work with Windows 3.1. Yet, because most operating systems are downward
compatible, software written for earlier versions of an operating system (such as Windows 98) usually
can be used with recent versions of the operating system (such as Windows XP).
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
The user interface plays a key role in application software. Studies have found that GUI users generally
complete tasks more accurately, work faster, are more productive, and feel less fatigue than users of a
text interface. The Macintosh operating system the first popular GUI actually was developed from
an earlier GUI-based operating system created by Xerox.
The first version of Windows (1985) imitated the Macintoshs GUI (Apple sued Microsoft,
unsuccessfully, for copyright infringement). Although some users still feel the Macintosh interface is
superior, today some form of Windows is used on almost 90 percent of personal computers. Because
of this, even competitive products often use similar features, such as the same menu names.
Starting an Application
To click an object on the screen, you move the pointer to the object and then press and release a button
on the mouse. Often, applications also can be started by double-clicking the icon that represents the
application.
When an application is started, the right-hand corner of the application window title bar usually
displays three buttons:
Minimize When clicked, this button reduces a window to a button on the taskbar.
Restore When clicked, this button returns a window to its initial size. When a window does not
fill the desktop, the Restore button is replaced by a Maximize button that, when clicked, enlarges
the window so it covers the entire desktop.
Close When clicked, this button closes the window. The Close button removes the window from
the desktop and its button from the taskbar.
A dialog box can contain option buttons, check boxes, text boxes, and command buttons. Option
buttons stipulate desired alternatives; check boxes turn specific capabilities on or off; text boxes allow
text to be entered; and command buttons immediately perform an action, such as implementing (OK)
or ignoring (Cancel) the choices made in a dialog box. Shortcut menus can change depending on
where the pointer rests when the mouse is right-clicked. Dimmed commands on a menu or shortcut
menu are unavailable.
Some applications use automatically display a smart tag when you perform a certain action. Clicking
the smart tag displays a menu of commands related to the action.
Software
Word processing software is used for creating, editing, formatting, saving, and printing documents. In
the modern office, word processing software has replaced the typewriter for almost all written work.
The editing capabilities of word processing software have altered the creative process. The freedom to
express yourself without reservation, knowing you easily can revise what you have written, can improve
the quality of written work. It is good practice to save a document before printing it. When a document
is saved, it exists as a file, or named collection of data, instructions, or information. A file name
uniquely identifies each file. Restrictions on file names once were severe; file names could be no more
than eight characters long, and many characters, including spaces, could not be used. In Windows XP,
however, a file name can have up to 255 characters, including spaces.
29
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Some spreadsheet programs offer more than 200 internal functions. When creating a spreadsheet,
formulas and functions usually must be preceded by a special character (such as =, +, or @) to
distinguish them from labels or values. Formulas use cell references, or addresses, of cells that contain
values. When formulas are copied from one cell to another, the cell references change to reflect the new
location. This update is called relative referencing. Another powerful capability, called goal-seek, finds
what value is needed to reach a specified goal.
While spreadsheet packages can manage data tables of a few thousand records, database software can
efficiently handle much larger data tables. In a database, common data types include text, numeric,
currency, date, memo, hyperlink, and object. When identifying data types, numbers treated as text (such
as zip codes, Social Security numbers, or telephone numbers) sometimes are referred to as
alphanumeric data because they are not used in calculations. The results of a database query are placed
in an ANSWER table.
Although introduced years after word processing and spreadsheet software, presentation graphics
software has had almost as great an impact on business, and on how people do business, as either of
the older applications. Presentations often include an outline with the text from each slide, audience
handouts that can be distributed to the audience, and a notes page with additional notes for the
presenter. Some presentation graphics packages offer templates for various presentations (company
meeting, financial report, marketing plan, progress report, employee orientation, training, and so on).
PIMs essentially are free style database managers. They are very popular with people who spend
much of their time in business travel. These people, often called road warriors, find PIMs a valuable
part of the arsenal they bring to their daily battles. Like a daily planner, PIMs must be reviewed
regularly to be effective.
Unlike word processing software, DTP software increases hardware requirements. Because of its
relatively low cost (an advanced DTP system can be purchased for less than $10,000) and the speed,
control, security, and flexibility offered by desktop publishing, many companies are using DTP instead
of outside printing firms for their publishing needs.
Paint software and image editing software have had a tremendous impact on commercial art.
Commercial artists praise the capabilities offered by these applications. At the same time, many feel
these applications have led clients to demand more, both in terms of time and expectations. As a result,
some commercial artists believe their income, actually has dropped because of graphic software.
Most software for home, personal, and educational use is relatively inexpensive. It still pays to shop
around. Prices for some software for home/personal use, such as integrated software, can vary greatly
for the same brand depending on the vendor. Some personal finance packages can prepare reports on
income and expenses, budget, net worth, taxes, and investments.
Personal finance software wizards (automated assistants) can help to balance accounts, prepare budgets,
plan mortgages, calculate savings, and arrange retirements. Legal software is designed to facilitate
creation of standard documents; unusual circumstances might still demand the services of a lawyer. Tax
preparation software also is best used by people in fairly common circumstances.
30
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
For some students, educational software is a welcome alternative to traditional classes, allowing them to
work privately at their own pace. Reference software articles often include links that, when clicked,
display related articles. Because referenced material can change frequently, some reference software
packages can be updated via the World Wide Web.
Computer communications touch everyones life. Consider the ATM that knows a bank balance even
though it is located 500 miles from the bank. Many e-mail programs allow users to send registered
mail with a return receipt guaranteeing the recipient received the message. E-mail and personal
information management (PIM) software sometimes also are considered part of groupware. Although
e-mail has assumed an important role in business messages, traditional paper letters and memos still are
used In fact, some maintain that the amount of paper correspondence has increased.
Web A p p l i c a t i o n s
Web applications can be a better buy than packaged applications. For example, a $50 packaged
antivirus program can be replaced by a Web application that costs less than $30 annually, is updated
frequently, and uses less space on a hard disk. In addition, packaged software might include features
you will never use, which increases the cost of the package. Often, you can use the standard version of
a similar Web application for less money or even for free, and only pay more for the additional features
you want. Web applications can save businesses money with reduced installation, upgrade, and
maintenance costs. Some social analysts believe that the lower cost of Web applications also can help
close the digital divide.
For Web application vendors, benefits include easier updating and debugging (error correcting),
removal of packaging and distribution costs, and elimination of software piracy (the illegal copying and
selling of software). Despite their advantages, analysts point out that Web applications may not be right
for everyone. For some consumers, paying a monthly fee ultimately costs more than the one-time
purchase of packaged software. Also, many households do not have the fast Internet connection needed
for certain Web applications to run smoothly. Finally, some people worry that files stored at a Web
application site can be infected with viruses. Web application vendors believe these worries are
groundless and that Web applications benefit both buyers and sellers.
Learning Aids
In many applications, an audible beep indicates an error, and the last entry should be reviewed.
Function key f1 often is used to activate the Help feature. Some applications have a Help button that,
when clicked, changes the mouse pointer to a Help arrow. This arrow can be used to obtain help on a
command, button, or bar by pointing at the item and clicking. Many software developers have
eliminated users manuals in favor of extensive online Help. Computer stores occasionally carry a few
trade books, but entire aisles of computer-related books can be found in most large book stores.
For some applications, other learning aids, such as tutorials or keyboard templates, are available.
Tutorials are step-by-step instructions using real examples that show how to use an application.
Tutorials can be printed, software-based, or Internet-based. Keyboard templates (plastic sheets that fit
around a portion of the keyboard) illustrate the keyboard commands for various tasks. Wizards can be
used to help create memorandums, meeting agendas, fax cover sheets, flyers, letters, resumes, charts,
forms, reports, awards, pleadings, calendars, postcards, envelopes, mailing labels, newsletters, and Web
pages. Some applications also offer document templates, which are special documents that provide basic
31
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
tools for shaping a final document. The availability of learning aids and support tools is an important
consideration in selecting an application package.
32
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
CHAPTER 4
THE COM PONE NTS OF THE SYSTE M UNI T
Overview
Describe the components in the system unit
Explain how the CPU uses the four steps of a machine cycle to process data
Describe the types of expansion slots and cards in the system unit
Chapter presents the components in the system unit, described how memory stores data, instructions,
and information, and discusses the sequence of operations that occur when a computer executes an
instruction. The chapter included a comparison of various microprocessors on the market today.
Explain how the CPU uses the four steps of a machine cycle to
process data
The central processing unit (CPU), also called a processor, significantly impacts overall computing
power and manages most of a computers operations. The CPU contains the control unit and the
arithmetic/logic unit.
The control unit directs and coordinates most of the operations in the computer. For every instruction,
the control unit repeats a set of four basic operations called the machine cycle:
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
The arithmetic/logic unit (ALU) performs the execution part of the machine cycle. Specifically, the
ALU carries out three operations:
Arithmetic operations performing calculations, which include addition, subtraction, multiplication,
and division
Comparison operations comparing data items to determine if the first item is greater than, equal to,
or less than the other item
Logical operations working with conditions and logical operators such as AND, OR, and NOT
34
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
form a byte. A byte provides enough different combinations of 0s and 1s to represent 256 individual
characters including numbers, letters of the alphabet, punctuation marks, and other characters.
The combinations of 0s and 1s used to represent data are defined by patterns called coding schemes.
Popular coding schemes are ASCII, EBCDIC, and Unicode. Coding schemes make it possible for
humans to interact with a digital computer that recognizes only bits. Every character you type on a
keyboard is converted into a corresponding byte, a series of on/off electrical states the computer can
process.
T h e s y s t e m u n i t c o n t a i n s s e v e r a l t y p e s o f m e m o r y.
RAM (random access memory) consists of memory chips that the processor can read from and write
to. Most RAM is volatile memory, meaning that its contents are lost when the computers power is
turned off. Two basic types of RAM chips are dynamic RAM and static RAM.
Dynamic RAM (DRAM) must be re-energized constantly or it loses its contents.
Static RAM (SRAM) is faster and more reliable than DRAM and has to be re-energized less often, but
it is much more expensive.
Memory cache, also called a cache store or RAM cache, improves processing time by storing frequently
used instructions and data.
ROM (read-only memory) refers to memory chips that only can be read and used; that is, they cannot
be modified. ROM is non-volatile memory (NVM), meaning that its contents are not lost when the
computers power is turned off. A variation of the ROM chip, called programmable read-only memory
(PROM), is a blank chip on which you can place items permanently.
Flash memory, also known as flash ROM or flash RAM, is non-volatile memory that can be erased
electronically and reprogrammed.
Complementary metal-oxide semiconductor (CMOS) memory, another type of memory chip, stores
configuration information about the computer and uses battery power to retain information when the
power to the computer is off.
35
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Describe the types of expansion slots and cards in the system unit
An expansion slot is an opening, or socket, where you can insert a circuit board into the motherboard.
These circuit boards called cards, expansion cards, boards, expansion boards, adapters, adapter cards,
interface cards, add-ins, or add-ons -- add new devices or capabilities to the computer. Four types of
expansion cards found in most computers are a video card, a sound card, a network interface card,
and a modem card.
A video card converts computer output into a video signal that is sent through a cable to the monitor,
which displays an image.
A sound card enhances the sound-generating capabilities of a personal computer by allowing sound to
be input through a microphone and output through speakers.
A network interface card (NIC) is a communications device that allows the computer to communicate
via a network.
A modem card is a communications device that enables computers to communicate via telephone lines
or other means. Many of todays computers support Plug and Play, a capability with which the
computer automatically can configure expansion boards and other devices as you install them.
Notebook and other portable computers have a special type of expansion slot used for installing a PC
Card, which is a thin credit card-sized device that adds memory, disk drives, sound, fax/modem, and
communications capabilities to a mobile computer.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Notebook computers
Handheld computers
The CPU
The power of personal computer processor chips (the chips that contain the CPU) has grown at an
astounding rate. As chips become older and more widely used, price cuts usually are introduced.
Several factors affect CPU processing speed. CPUs in most of todays personal computers use
pipelining, a technique that increases processing speed by beginning execution of a second machine
cycle instruction before the first instruction is completed. CPUs also use high-speed storage locations,
called registers, to hold data and instructions temporarily. The control unit relies on a small chip called
the system clock to synchronize all computer operations. The speed at which a processor executes
instructions is called clock speed, or clock rate, and is measured in megahertz (MHz). The system clock
is a major factor affecting processor speed. A higher clock speed means the CPU can process more
instructions per second.
Processor Comparison
Although once frequently used, the term microprocessor is much less common today.
Sometimes you can upgrade your processor to increase the computers performance. There are three
forms of upgrades:
With a chip for chip upgrade, the existing processor chip is replaced with a new one
With a piggyback upgrade, the new processor is stacked on top of the old one
With a daughterboard upgrade, the new processor is on a small circuit board (the daughterboard)
that plugs into the motherboard
38
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
The past three years have seen a steady drop in the cost of computers. PC prices plunged as a result of
lower prices for processors, memory chips, and hard drives. Consumers also are showing increased
interest in new less powerful, but less expensive, personal computers that work perfectly well for the
most popular uses word processing, Internet access, and spreadsheet applications. The surge in lowpriced computer sales has had an impact on Intel, the worlds largest processor manufacturer. By
focusing on making inexpensive processor chips, rivals AMD and Cyrix are making inroads into Intels
dominance. Intels response, the Celeron, has proven popular, but the lower-priced chip offers a
smaller profit margin.
Data Representation
Just as the decimal system (10 digits) is suited to human anatomy (10 fingers), the binary system (2
digits) is perfect to represent the on-off states (2 states) of a computer. Basic coding standards make it
possible for components within computers to communicate, allow manufacturers to be confident that
the components they produce will operate correctly in a computer, and enable consumers to purchase
components that are compatible with their systems. In the ASCII-8 and EBCDIC codes, the first four
characters represent the zone, and the last four characters represent the digits 1 through 8. ASCII,
originally a seven-bit code, was expanded to eight bits in an effort to provide for symbols used in other
nations. Unicode, a 2-byte (16-bit) code, can represent 216, or 65,536, characters. The system employs
the codes used by ASCII and also includes other alphabets (such as Cyrillic and Hebrew), special
characters (including religious symbols), and some of the word writing symbols used by various
Asian countries.
Memory
Because computers use the binary number system, the actual values for the units in which memory and
storage are measured are based on powers of 2. For example, one kilobyte = 210 = 1,024.
RAMs volatility, and its ability to be changed, are its most distinguishing characteristics. When RAM is
purchased it comes in banks of nine chips eight are needed to represent a byte and the ninth is
needed for parity. RAM chips usually are packaged on small circuit boards called single inline memory
modules (SIMMs) or dual inline memory modules (DIMMs) that are inserted into the motherboard.
During the past 20 years, the price of RAM has dropped an average of 20 percent each year, but its
capacity has more than doubled every two years.
Similar to flash ROM, another variation of ROM, called EEPROM (electrically erasable programmable
read-only memory), can be erased electrically and rewritten. Because of its non-volatile nature,
EEPROM is used in electronic cash registers to store item prices.
The amount of time it takes the processor to read data from memory, called access time, directly affects
how fast the computer can process data. Memory access time is measured in terms of nanoseconds, or
billionths of a second.
39
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
CHAPTER 5
INPUT
Overview
Describe the two types of input
List the characteristics of a keyboard
Identify various types of keyboards
Identify various types of pointing devices
Explain how a mouse works
Describe different mouse types
Explain how voice recognition works
Understand how to input data into a handheld computer
Identify the uses of a digital camera
Describe the various techniques used for video input
Describe the uses of PC video cameras and web cams
Explain how scanners and other reading devices work
Identify alternative input devices for physically challenged users
In this chapter, you learn what input is and what input devices are. The keyboard is presented and
different keyboard types are described. You are introduced to various pointing devices, such as the
mouse, trackball, touchpad, pointing stick, joystick, touch screen, and pen input. Scanners and reading
devices, including optical scanners, optical readers, magnetic ink character recognition readers, and data
collection devices are explained. You learn about digital cameras, audio input, speech recognition, video
input, and videoconferencing. Finally, input devices for physically challenged users are explored.
40
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A program is a series of instructions that tells a computer how to perform the tasks necessary to
process data into information.
A command is an instruction given to a computer program.
A user response is an instruction you issue to the computer by responding to a question posed by a
computer program.
Any hardware component that allows you to enter data, programs, commands, and user responses into
a computer is an input device.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A mouse is a pointing device, designed to fit comfortably under the palm of your hand, that is
moved across a flat surface.
A trackball is a stationary pointing device with a ball mechanism on its top.
A touchpad is a flat, rectangular pointing device that is sensitive to pressure and motion.
A pointing-stick is a pressure-sensitive pointing device shaped like a pencil eraser that is positioned
between keys on the keyboard.
A joystick is a vertical lever mounted on a base.
A light pen is a handheld device that contains a light source or can detect light.
A touch screen is a touch-sensitive display on the screen.
A stylus looks like a ballpoint pen but uses pressure, instead of ink, to write text and draw lines.
An electronic pen can be used on a graphics tablet, which consists of a flat, rectangular, electronic
plastic board used to input graphical data.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
first voice recognition programs were speaker dependent. With speaker-dependent software, the
computer makes a profile of your voice, which means you have to train the computer to recognize your
voice. Today, most voice recognition programs use speaker-independent software, which has a built-in
set of word patterns and does not have to be trained to recognize your voice. Some voice recognition
software requires discrete speech, meaning that you have to speak slowly and separate each word with a
short pause. Most voice recognition products, however, support continuous speech, allowing you to
speak in a flowing conversational tone.
43
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Many video devices use analogue video signals. To input video from these devices, the device is
plugged into a video capture card, an expansion card that converts the analogue signal into a digital
signal the computer can understand.
A digital video (DV) camera is a new generation of video camera that records video as digital signals,
instead of using analogue signals, and therefore does not require a video capture card. Video files can
demand huge amounts of storage space.
Video compression reduces the size of video files by recognizing that only a small portion of an image
changes from frame to frame. Instead of storing every frame in its entirety, a video compression
program might store an initial frame and then store only the changes from one frame to the next.
A video decoder is a card that decompresses video. A video digitizer can be used to capture an
individual frame from a video and save the still picture in a file.
D e s c r i b e t h e u s e s o f P C v i d e o c a m e r a s a n d Web c a m s
A PC camera is a DV camera that allows home users to record, edit, capture video and still images, and
make video telephone calls on the Internet. During a video telephone call, both parties can see each
other as they talk. Although usually placed on top of the monitor and attached to a computers USB
port, some PC cameras are portable and can be used anywhere.
44
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
CHAPTER 6
OUTPUT
Overview
Identify the purpose of data projectors, fax machines, and multifunction devices
In this chapter, you learn what is output and what are output devices. Display devices are introduced,
including CRT monitors, flat-panel displays, video cards, and high-definition television. You explore
monitor quality and monitor ergonomics. Various types of printers are presented, such as impact
printers, non-impact printers, portable printers, plotters and large-format printers, and special-purpose
printers. You find out about audio output and other output devices, including data projectors, facsimile
machines, and multifunction devices. Finally, you become acquainted with terminals and output devices
for physically challenged users.
45
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
47
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A label printer is a small printer that prints on an adhesive type material that can be placed on a variety
of items.
A portable printer is a small, lightweight printer that allows a mobile user to print from a notebook or
handheld computer while travelling.
Plotters are sophisticated printers used to produce high-quality drawings such as blueprints, maps, and
circuit diagrams.
A large-format printer, which operates like an ink-jet printer but on a larger scale, creates photorealistic quality colour prints.
of
data
projectors,
fax
machines,
and
A data projector takes the image on a computer screen and projects it onto a large screen so that an
audience of people can see the image. Two smaller, lower priced data projectors are an LCD projector,
which uses liquid crystal display technology, and a digital light processing (DLP) projector, which uses
tiny mirrors.
A facsimile (fax) machine transmits and receives documents over telephone lines. A fax modem is a
communication device that allows you to send (and sometimes receive) electronic documents as faxes.
A multifunction device (MFD) is a single piece of equipment that looks like a copy machine but
provides the functionality of a printer, scanner, copy machine, and sometimes a fax machine.
CHAPTER 7
STORAGE
48
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Overview
Differentiate between storage and memory
This chapter explains various storage media and storage devices. Students discover how memory is
different from storage. Floppy disks are introduced, and characteristics of a floppy disk, floppy disk
drives, care of floppy disks, and high-capacity floppy disks are presented. Hard disks are explained, and
students find out about characteristics of a hard disk, how a hard disk works, removable hard disks,
hard disk controllers, RAID, and maintaining data on a hard disk. Compact discs, including CD-ROMs
and DVD-ROMs, are described. Finally, students learn about tapes, PC Cards, and other types of
storage such as smart cards, microfilm and microfiche.
49
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A storage medium (media is the plural) is the physical material on which items are kept. A storage
device is the computer hardware that records and retrieves items to and from a storage medium. Storage
devices can function as sources of input and output.
When storage devices transfer items from a storage medium into memory a process called reading
they function as sources of input.
When storage devices transfer items from memory to a storage medium a process called writing
they function as sources of output.
Types of storage media include floppy disks, hard disks, compact discs, tape, PC Cards, microfilm, and
microfiche.
50
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
51
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
and warm water or a specialized CD cleaning kit, and you can repair scratches on the bottom surface
with a specialized compact disc repair kit.
D i f f e r e n t i a t e b e t w e e n C D - R O M s , C D - RW s , a n d DVD - R O M s
A CD-ROM, or compact disc read-only memory, is a compact disc that uses the same laser technology
as audio CDs. For a computer to read items stored on a CD-ROM, you insert the disc into a CDROM drive or CD-ROM player. When viewing animation or video, the speed of a CD-ROM drive, or
data transfer rate, is important. A higher the data transfer rate, results in smoother playback of images
and sounds.
Most standard CDs are single-session because manufacturers record (write) all items to the disc at one
time. Variations of standard CD-ROMs, such as PhotoCD, CD-R (compact disc-recordable), and CDRW (compact disc-rewritable), are multisession, which means additional data, instructions, and
information can be written at a later time.
A PhotoCD is a compact disc that contains digital photographic images.
A CD-R (compact disc-recordable) is a multisession compact disc onto which you can record your
own items.
A CD-RW (compact disc-rewritable) is an erasable disc you can write on multiple times.
A DVD-ROM (digital video disc-ROM) is an extremely high-capacity compact disc capable of storing
from 4.7 GB to 17 GB. In order to read a DVD-ROM, you must have a DVD-ROM drive. You also
can obtain recordable and rewritable versions of DVD.
A DVD-R (DVD-recordable) allows you to write on it once and read (play) it many times.
With the new rewritable DVD, called a DVD+RW, you can erase and record on the disc multiple times.
52
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
An enterprise storage system is a strategy that focuses on the availability, protection, organization, and
backup of storage in a company. To implement an enterprise storage system, a company uses a
combination of techniques.
A server stores items needed by users on a network. A RAID system ensures that data is not
lost.
A tape library is a high-capacity tape system that works with multiple tape cartridges for storing
backups of data, information, and instructions.
A CD-ROM jukebox holds hundreds of CD-ROMs that can contain application programs and
data.
An Internet backup can store data, information, and instructions on the Web.
A network attached storage (NAC) is an easy way to add hard disk space to a network.
A storage area network (SAN) is a high-speed network that connects storage devices.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Compact discs
Caring for compact discs
CD-ROMs, CD-RWs, and DVD-ROM
Tape
Enterprise storage systems
PC cards and miniature storage media
Microfilm and microfiche
1 KB stores approximately page of text. Depending on speed and size, rough costs for RAM are
about $40 to $50 per megabyte, while hard disk storage costs are around $0.20 per megabyte.
Floppy Disks
Although the 5.25-inch floppy disk is physically larger, the storage capacity for a 5.25-inch floppy disk is
less than for a comparable 3.5-inch floppy disk. Because of the 3.5-inch floppy disks greater durability
and superior storage capacity, the 5.25-inch floppy disk at best can be considered a very endangered
species. With its rigid plastic shell, it may be difficult to see the 3.5-inch disk as floppy. The name is
justified, however, by the disks ancestry and the fact that, if the protective shell is removed, the disk on
which the data is written is indeed floppy. Today, most new computers (although not the new Apple
iMac) come with a 3.5-inch floppy disk drive; a few manufacturers still will, for a price, add a 5.25-inch
floppy disk drive.
54
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
The procedure for formatting a floppy disk depends on the operating system. Floppy disks are softsectored, meaning that the number of sectors is not predetermined. The cluster concept creates an odd
situation: one file with 100,000 bytes requires less disk space (about 25 clusters at 8 sectors per cluster
and 512 bytes per sector) than 1,000 small files of 100 bytes each (1,000 clusters).
A floppy disk spins at about 300 revolutions per minute. When writing data, the floppy disk drives
read/write head generates electronic impulses that change the magnetic polarity of areas along a track to
represent the 1 or 0 bits being recorded. When reading data, the read/write head senses the magnetic
areas that have been recorded.
High-Capacity Disks
The three types of high-capacity disks were developed by three different manufacturers: SuperDisk is
from Imation, HiFD is from Sony Electronics, Inc, and the Zip drive is from Iomega.
Although manufacturers always are concerned about software piracy (unlawfully duplicating or
distributing proprietary software), many recommend that users create a backup of programs before
installing them on a computer. Backup guards against system failures, such as a head crash, and human
errors, such as inadvertently deleting key files. If you ever accidentally delete a file, seek help
immediately from a computer support person who sometimes can recover the erased file.
Hard Disks
In the early 1980s, hard disk drives were called Winchester drives because they had two 30-megabyte
disks, a characteristic reminiscent of the Winchester 30-30 rifle. In addition to making hard disks more
efficient and allowing the installation of multiple operating systems, large hard disks may be partitioned
to:
Unlike floppy disk read/write heads, hard disk read/write heads do not touch the disk surface. Because
of the close tolerance between the disk head and the rotating disk surface, hard disk drives are
manufactured in an extremely clean setting, typically cleaner than a hospital operating room. Many hard
disk drives are warranted for five years, but most warranties are prorated, meaning that if it fails in the
first year it can be replaced at 20 percent of the original cost. All warranties are void, however, if the
drive is opened, because contaminated air and dust render the drive unusable.
On a personal computer, a hard disk controller (HDC) is the interface for the hard disk. Many external
hard drives use a USB port as their interface. Two other types of HDCs are the EIDE (Enhanced
Integrated Drive Electronics) controller, which can support up to four hard disks, and SCSI (small
55
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
computer system interface) controllers, which can support multiple disk drives as well as other
peripherals.
A removable hard disk is a disk drive in which a plastic or metal case surrounds the hard disk so that
you can remove it from the drive. Two reasonably priced, removable hard disks are the Jaz disk,
which can store up to 2 GB, and the Peerless disk, which can store up to 20 GB.
A RAID (redundant array of independent disks) system integrates two or more hard disks, duplicating
data, instructions, and information to improve data reliability.
Compact Discs
Laser disks first were developed by RCA for showing home movies. The 14-inch optical disk was a
derivative of these early 1980s video disks. Advantages that compact discs offer over hard disks include:
greater data density, less expense (bit for bit), increased durability, and no head crashing.
C D - R O M s , C D - RW s , a n d DVD - R O M
On a computer, screen displays for software used to play audio CDs resemble typical CD players, but
the controls are accessed with a pointing device. A single CD-ROM can store the entire Encyclopedia
Britannica with room left over. You write on a CD-R using a CD recorder or a CD-R drive and special
software. To write on a CD-RW disc, you must have CD-RW software and a CD-RW drive. A
multiread CD-ROM drive can read audio CDs, data CDs, CD-Rs, and CD-RWs.
On one side, a DVD-ROM can store up to 13 times the amount of information that can be stored on a
CD-ROM. Double-sided DVD-ROMs (DVD-ROMs that store data on both sides), can store up to 26
times the amount of information stored on a CD-ROM.
A DVD+RW is similar to a CD-RW, except it has storage capacities up to 4.7 GB. To write on
DVD+RW discs, you must have a DVD writer.
56
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Along with processor speed, amount of memory, and hard disk capacity, CD-ROM drive speed is a
featured element of almost every personal computer advertisement. Like CD-ROM drives, DVD-ROM
drive speeds are indicated with the letter X to represent the standard speed of a DVD drive. That speed,
however, is considerably faster than the data transfer rate of the original CD-ROM. While a 24X CDROM drive has a data transfer rate of 3,600 KB per second, a 5X DVD-ROM has a data transfer rate of
6,750 KB per second.
Tap e
Magnetic tape was developed in the mid-1950s to replace the earlier method of storing data on punched
cards. To better understand the difference between sequential access and direct access (or random
access), compare an audio cassette tape to a CD-ROM. An audio cassette tape is sequential; to listen to
the fourth song it is necessary to listen to (or fast-forward through) the first three songs. A CD is
direct; it is possible to go straight to the fourth song. For what applications would sequential storage be
appropriate? For what applications would it be unsuitable? Tape cartridges can be purchased formatted
or unformatted. One-quarter-inch wide cartridge tapes typically are 600 feet long. Unattended tape
backup is a great time saver. Consider how many 1.44 MB floppy disks are needed and how much time
is required (removing disks as they become full and inserting new disks) to back up 150 MB of data.
With tape backup, you can press a key, go about other business, and return to remove the finished
backup tape.
57
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
58
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
CHAPTER 8
OPERATI NG SYSTE M S AND UTI L I TY PROGR AM S
Overview
Describe the two types of software
Understand the startup process for a personal computer
Describe the term user interface
Explain features common to most operating systems
Know the difference between stand-alone operating systems and network operating systems
Identify various stand-alone operating systems
Identify various network operating systems
Recognize devices that use embedded operating systems
Discuss the purpose of the following utilities: file viewer, file compression, diagnostic,
uninstaller, disk scanner, disk defragmenter, backup, and screen saver
System software is an essential part of a computer system. This chapter defines system software and
discusses two types of system software: operating systems and utility programs. You learn what an
operating system is and explore user interfaces, operating systems features, and operating system
functions. A variety of popular operating systems are described including DOS, Windows 3.x, Windows
95, Windows 98, Windows 2000, Windows XP, Windows CE, the Mac OS, OS/2, UNIX, Linux, and
NetWare. You discover what happens when they start a computer and why a boot disk is important.
Finally, a number of utility programs are explained.
59
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A utility program performs a specific task, usually related to managing a computer, its devices, or its
programs.
When you turn on the computer, the power supply sends an electrical signal to devices located in
the system unit.
The processor chip resets itself and looks for the ROM chip that contains the BIOS (basic
input/output system), which is firmware that holds the startup instructions.
The BIOS executes the power-on self test (POST) to make sure hardware is connected properly
and operating correctly.
The POST results are compared with data in a CMOS chip on the motherboard. If the POST
completes successfully, the BIOS searches for specific operating system files called system files.
Once located, the boot drive (the drive from which your personal computer starts), loads the
system files from storage (the hard disk usually drive C) into memory (RAM) and executes them.
Next, the kernel of the operating system loads into memory and takes control of the computer.
The operating system loads configuration information. In Windows XP, the registry consists of
several file that contain the system configuration information.
When complete, the Windows XP desktop and icons display, and programs in the Start-Up folder
are executed.
With a command-line interface, you type keywords or press special keys to enter data or
instructions.
A graphical user interface (GUI) allows you to use menus and visual images such as icons, buttons,
and other graphical objects to issue commands.
An icon is a small image that represents a program, an instruction, a file, or some other object.
60
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
A single user/single tasking operating system allows only one user to run one program at a time.
A multitasking operating system allows a single user to work on two or more applications that
reside in memory at the same time.
A multi-user operating system enables two or more users to run a program simultaneously.
A multiprocessing operating system can support two or more CPUs running programs at the same
time. Managing memory involves assigning items to an area of memory while they are being
processed. The purpose of memory management is to optimize use of random access memory
(RAM).
With virtual memory (VM), the operating system optimizes memory by allocating a portion of a
storage medium, usually the hard disk, to function as additional RAM.
Scheduling jobs (operations the processor manages) involves determining the order in which jobs
are processed.
Spooling increases efficiency by placing print jobs in a buffer (an area of memory or storage where data
resides while waiting to be transferred) until the printer is ready, freeing the processor for other tasks.
Configuring devices establishes communication with each device in the computer. A device driver is a
small program that tells the operating system how to communicate with a device. Accessing the Web
may entail including a Web browser and e-mail program in the operating system. Monitoring
performance helps to identify and solve system problems.
A performance monitor is a program that assesses and reports information about various system
resources and devices. Providing housekeeping services entails performing storage and file management
functions. A file manager performs such functions as formatting and copying disks; listing the files on a
storage medium; checking the amount of used and unused space on a storage medium; organizing,
copying, deleting, moving, and sorting files; and creating shortcuts (icons on the desktop that run a
program when clicked).
Administering security involves establishing user accounts on a network. Each account typically requires
a user name and a password to log on, or access, the network.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
supports a network. A network is a collection of computers and devices connected together via
communications media and devices such as cables, telephone lines, and modems. In some networks, the
server is the computer that controls access to the hardware and software on a network and provides a
centralized storage area. The other computers on the network, called clients, rely on the server(s) for
resources.
DOS (Disk Operating System) refers to several single user, command-line and menu-driven
operating systems developed in the early 1980s for personal computers.
Windows 3.x refers to early operating environments that, although not operating systems, provided
a graphical user interface to work in combination with DOS and simplify its use.
Windows NT Workstation is a client operating system that can connect to a Windows NT Server.
Developed as an upgrade to Windows 95, the Windows 98 operating system is easier to use and
more integrated with the Internet. Windows 98 includes Microsoft Internet Explorer, a popular Web
browser, Windows Explorer, a file manager, and an Active Desktop that works similarly to Web
links.
Windows 2000 Professional is a complete, reliable multitasking client operating system for
business desktop and business notebook computers.
Windows Millennium Edition is an operating system that has features specifically for the home
user.
Windows XP is Microsofts fastest, most reliable Windows operating system, providing quicker
startup, better performance, and a new, simplified visual look.
Windows XP Home Edition is an upgrade to Windows Millennium Edition, while Windows XP
Professional Edition is an upgrade to Windows 2000 Professional.
The Mac OS, the latest version of the Macintosh operating system (the first commercially successful
graphical user interface), is a multitasking operating system available only on Apple computers.
OS/2 Warp Client is IBMs GUI multitasking client operating system that supports networking,
Java, the Internet, and speech recognition.
62
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Network operating systems include NetWare, Windows NT Server, Windows 2000 Server,
Windows .NET Server, OS/2 Warp Server for E-business, UNIX, Linux, and Solaris.
Novells NetWare is a widely used network operating system designed for client/server networks.
Windows NT Server is the operating system used by servers in the Windows NT client/server
network environment.
The Windows 2000 Server family consists of three products:
Windows 2000 Server (for the typical business network),
Windows 2000 Advanced Server (for e-commerce applications), and
Windows 2000 Database server (for demanding, large-scale applications).
Windows .NET Server is an upgrade to Windows 2000 Server. The Windows .NET Server family
includes four products:
Windows .NET Standard Server (for the typical small- to medium-sized business network),
Windows .NET Enterprise Server (for medium- to large-sized businesses, including those with ecommerce applications),
Windows .NET Datacenter (for business with huge volumes of transactions and large-scale
databases), and
Windows .NET Web Server (for Web server and Web hosting businesses).
OS/2 Warp Server for E-business is IBMs network operating system designed for all sizes of
business.
UNIX is a multitasking, command-line operating system implemented on many different types of
computers. Because it is both a stand-alone operating system and a network operating system, some
call UNIX a multipurpose operating system.
Linux is a popular, free, multitasking UNIX-type operating system.
Solaris, a version of UNIX developed by Sun Microsystems, is a network operating system
designed for e-commerce applications.
63
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
The Palm OS is the operating system used on Palm handheld computers from Palm, Inc., and Visor
handheld computers from Handspring.
Discuss the purpose of the following utilities: file viewer, file compression, diagnostic, uninstaller,
disk scanner, disk defragmenter, backup, and screen saver
Most operating systems include several utility programs that perform specific tasks related to managing
a computer, its devices, or its programs.
File viewer is a utility that allows you to display and copy the contents of a file.
A file compression utility shrinks the size of a file.
A diagnostic utility compiles technical information about a computers hardware and certain system
software programs and then prepares a report outlining any identified problems.
An uninstaller is a utility that removes an application, as well as any associated entries in the system
files.
A disk scanner is a utility that (1) detects and corrects both physical and logical problems on a hard
disk, and (2) searches for and removes unnecessary files.
A disk defragmenter is a utility that reorganizes files and unused space on a computers hard disk
so data can be accessed more quickly and programs can run faster.
A backup utility copies, or backs up, selected files or an entire hard drive onto another disk or tape.
A screen saver is a utility that causes the monitors screen to display a moving image on a blank
screen if no keyboard activity occurs for a specified period.
System software
Starting a computer
User interface
Features of operating systems
Stand-alone and network operating system
Stand-alone operating systems
Network operating systems
Embedded operating systems
Utility programs
System Software
Software is a key component of any information system. Of the total number of corporate dollars spent
on computing, the software share is increasing while the hardware share is decreasing. Typically,
different sizes of computers use different operating systems, and even the same types of computers may
not use the same operating system. The operating system that a computer uses sometimes is called the
software platform, or platform. Application software packages often require a specific software platform.
A cross-platform application, however, is one that runs on multiple operating systems.
Starting a Computer
64
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
When you turn on a computer after it has been powered off, you are performing a cold boot. When
you restart a computer that already has been powered on, you are performing a warm boot. Your
typically can perform a warm boot by pressing a combination of keys on the keyboard (in Windows,
CTRL+ALT+DEL), selecting options from a menu, or pressing a Reset button on the computer.
If you watch the screen closely as the POST is conducted, the value for the total amount of memory
can be seen to change as it is measured in the memory test. If the POST results do not match the data
on the CMOS chip, an appropriate message should appear. The boot program typically is the first side,
first track, and first sector of the hard disk. When you install an operating system, one of the installation
steps involves making an emergency disk from which you can start your computer if the hard disk is
damaged.
User Interface
You can interact with an operating system directly (as you do when copying files, moving files,
formatting disks, and so on) or indirectly (as you do when working with an application program). An
operating system is intended to be transparent; that is, it does not have to be understood, considered, or
even known. The operating system with which an application program will work is specified on the
application software package. The application programs you want to use should be considered before
deciding on an operating system, and the operating system must be considered when choosing
application software.
A graphical user interface is designed to be easier to use (more user-friendly) than a command-line
interface. As an example of this user-friendly nature, consider how a relatively simple task, such as
deleting a file, is performed with a command-line interface and with a GUI. With a command-line
interface, you might type DEL followed by the file name in quotation marks. Therefore, you must
remember the command, type it correctly, and use the proper syntax. On the other hand, with a GUI
you need only select (click) the file name in the file manager window and then click the Delete
command on a menu or the Delete button on a toolbar. Although most people find a GUI the easiest
interface to use, some long-time computer virtuosos still feel a command-line user interface is more
efficient.
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
printers have buffers, and printer manufacturers are eager to sell DRAM. The term spooling comes
from the observation that placing print jobs temporarily in a buffer is somewhat like winding thread
onto a spool so that it can be used at a later time. Today, adding and configuring devices is easier
because most devices support Plug and Play, which means the computer can recognize a new device
and automatically load the necessary drivers. A feature of Windows 95, Plug and Play initially was
greeted with mixed reviews. In fact, some wags claimed the new technology was more accurately called,
Plug and Pray.
Processor utilization the amount of time that the processor is working and not idle is one way of
monitoring system performance. In addition to the programs that come with most operating systems,
several utility programs are available to monitor system performance. Formatting a disk is the process of
preparing it for reading and writing. Today, most floppy and hard disks are preformatted by the
manufacturer. If you format a disk that already contains data, the formatting process erases the file
location information, but it does not erase the actual files on the disk. Therefore, if you accidentally
format a disk, often you can unformat it with a utility program. System security usually is most
important for large systems or networks. For single-user PCs, adequate system security can be a key in
the users pocket.
66
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Windows 1.0, released in 1985, was Microsofts first attempt with a graphical user interface. It was not
until five years later, however, with the release of Windows 3.0, that computer users began to take
Windows seriously. Windows required 2 MB of memory (with 4 MB recommended) and an 80386 or
newer processor, so it could not be used with many older PCs. Nevertheless, because Windows 3.0 was
easier to use than DOS, eventually most software was written, and many popular DOS programs were
rewritten, to work with Windows.
Despite the advantages of Windows 95 and a heavily-funded promotional campaign, a poll of DOS
and Windows 3.x users showed not everyone immediately embraced the new operating system. When
asked how likely they were to adopt Windows 95 within the next six months, respondents replied:
extremely likely
possible
not likely
dont know
10%
35%
53%
2%
W h y a r e p e o p l e o f t e n r e l u c t a n t t o a d o p t a n e w o p e r a t i n g s y s t e m?
The inclusion of Internet Explorer in the Windows 98 operating system led to an antitrust suit against
Microsoft. Prosecutors insisted that the incorporation of a browser was an attempt by Microsoft to
eliminate competition from rival Web browsers (such as Netscape Navigator). Microsoft maintained that
the addition simply was an enhancement to the operating system. Although Microsoft advertised
Windows 98 less heavily than Windows 95, many vendors took up the slack. One retailer offered
Windows 98 with the opportunity to buy a new computer for $98. The promotion evidently worked. A
buyer waited in line 11 hours for a chance to buy the new operating system and discount computer.
When asked if he would have come out simply for Windows 98 (his current computer ran Windows
3.1), he replied, Not a chance.
Windows 2000 was released in February, 2000 and was touted as a boon for all businesses, from small
companies with no more than two desktop computers to large corporations with vast networks.
Windows Millennium is a result of Microsofts recognition that the needs of business and home users
are different.
For years, the Macintosh operating system had features that made it far easier to use than other
operating systems. For example, people could give files sensible names (like Letter to Grandma)
instead of the cryptic, eight-character strings (like letgrand.txt) demanded by DOS and Windows 3.x.
While Windows 95 incorporated many of these features, Macintosh devotees still feel their operating
system is easier to use. Until recently, the Macintosh operating system was proprietary. In 1994 the
operating system was licensed, but experts feel Apples promotion has been lukewarm. New standards
let IBM computers run Apple software. More than 4,000 applications are designed to run under the
Mac OS. Microsoft has developed the more popular Mac OS applications.
IBM supplies OS/2 (Operating System/2) Warp with its high-end personal computers. OS/2 originally
was developed jointly by IBM and Microsoft to replace MS-DOS. As an interim measure, Microsoft
developed Windows, an operating environment to work with DOS. The eventual popularity of
67
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Windows, coupled with the initial poor sales of OS/2, resulted in Microsoft and IBM going their
separate ways, with Microsoft concentrating on Windows and IBM continuing to develop OS/2.
Features offered in OS/2 Warp include:
Utility Programs
Utilities generally reside in storage until summoned by the user or operating system kernel. Microsoft
was the target of several lawsuits for allegedly incorporating utility programs developed by others into
their DOS operating system. Some versions of DOS were modified because of this litigation. In light of
the ever-increasing number of utility programs included with operating systems, will a market remain
for separate utility programs?
In addition to the utilities mentioned in this chapter, other Windows 98 utilities include:
DirectX Enhances multimedia capabilities on the computer, providing better playback of different
types of multimedia and managing 3-D graphics better than console computers.
68
B a s i c I n f o r m a t i o n Te c h n o l o g y C o n c e p t s
Drive Converter (FAT 32) Converts the hard drive to the FAT32 file system, an enhancement that
stores data more efficiently, creating extra disk space and helping programs run faster.
Registry Checker Finds and fixes registry problems each time the computer is started,
automatically scanning the registry for inconsistent data structures.
System File Checker Keeps track of critical files that make the computer run, restoring the files if
they are moved or changed.
Microsoft Magnifier Makes the screen more readable by displaying a magnified portion in a
separate window and making it possible to alter the colour scheme and contrast of the magnification
window for easier visibility.
Desktop enhancers Change the desktop look and organization, allowing users to create and switch
between multiple desktops.
File conversion Converts from one file format to another so that a file can be used by another
application.
Internet organizers Helps in the management and use of favorite Web sites, searching the Web
and reporting on site changes.
Antivirus programs Prevent, detect, and remove computer viruses.
Some utility programs are used primarily by select groups. For example, text editors -- utility programs
that make it easy to work with lists and records -- are popular with programmers and people who work
with databases. PC Tools and Norton Utilities are popular utility software packages for personal
computers.
69