0% found this document useful (0 votes)
99 views86 pages

Computer Skills 2020

The document provides an overview of computer skills including introductions to computers, computer hardware, computer software, and applied lab materials. It discusses computer functions, generations, applications, networking, internet, hardware components, software types, and Microsoft applications. Lab exercises are also outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views86 pages

Computer Skills 2020

The document provides an overview of computer skills including introductions to computers, computer hardware, computer software, and applied lab materials. It discusses computer functions, generations, applications, networking, internet, hardware components, software types, and Microsoft applications. Lab exercises are also outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Arab American University

Faculty of Engineering and Information Technology

COMPUTER SKILLS
Prepared By
Computer Science Department
Prof. Mohammad Awad
Dr. Rami Hodrob
Dr. Mohammed Maree
Dr. Ahmad Ewais
Mr. Ra‘fat Amarneh

2020
Table of Contents

Title Page#
Chapter 1(Introduction to Computers) ……………………………………………………..2
Introductions ………………………………………………………………………………………………….2
How Computer Work ………………………………………………………………………………………....3
Computer Generations ……………………………………………….……………………………………….4
Modern Computer Applications ……………………………………………………………………………...6
Chapter 2 (Internet and E-Learning) ………………………………………………………………...……...9
Computer Network ……………………………………………………………………………………….…...9
Internet ……………………………………………………………………………………………..………..10
E-Lerning …………………………………………………………………………………………………....14
E-Learning Platforms ……………………………………………………………………………………..…17
Advantages of E-Learning ……………………………………………………………………………..……19
How to Use Model ………………………………………………………………………………………..…19
How to Use Zoom ………………………………………………………………………………………..….33
How to Access University Email ………………………………………………………………………..…..41
Chapter 3 (Computer Hardware) ………………………………………………………………………..….44
Introduction …………………………………………………………………………………….....................44
Computer Input ………………………………………………………………………………………...……45
Computer Output …………………………………………………………………………………………....51
Processing Devices ……………………………………………………………………………………….....54
Storage ………………………………………………………………………………………………...…….60
Chapter 4 (Computer Software) …………………………………………………………………………….72
Introduction ………………………………………………………………………………………………….72
Types of Computer Software ………………………………………………………………………………..72
Categories of Software ………………………………………………………………………………………75
Obtaining Software ………………………………………………………………………………………….76
File System ………………………………………………………………………………………………….77
Viruses and Malware ………………………………………………………………………………………..78
Chapter 5 (Applied Lab Material) ………………………………………………………………………….81
Microsoft Windwos …………………………………………………………………………………………81
Microsoft Word ………………………………………………………………………………………….…..82
Microsoft Excel ……………………………………………………………………………………….……..84
Microsoft PowerPoint ……………………………………………………………………………………… 85

1
Chapter One
Introduction to Computers
1.1 Introduction

Digital Literacy is a life skill. Computers, Information, and Communication Technologies have changed the
world more than any other invention over the past one hundred years. Today‘s world is an information-rich
and it has become a necessity for everyone to know about computers.

Figure 1.1 Digital world


A computer is an electronic data processing device, which:

1. Accepts and stores data input,


2. Processes the data input.
3. Generates the output in a required form.

Figure 1.2 Computer Functions

 Functionalities of a Computer
Any digital computer carries out the following four functions
• Step 1 − Takes data as input.
• Step 2 − Stores the data/instructions in its memory and uses them
as required.
• Step 3 − Processes the data and converts it into useful
information.
• Step 4 − Generates the output.

Figure 1.3 Computer Functions

2
 Data vs. Information
- Data is a representation of a fact or idea such as Numbers, Words, Pictures, Sounds.
- Information is data that has been organized or presented in a meaningful manner.

 Advantages of Computers
The following are certain advantages of computers:
 High Speed
 Accuracy
 Storage Capability
 Reliability
 Automation
 Reduction in Paper Work and Cost

Figure 1.4 Advantages of Computers


 Disadvantages of Computers
The following are certain disadvantages of computers:
 Can limit learning and create a dependency.
 The potential loss of privacy.
 Time consumption and lots of distractions.
 No I. Q. (Intelligence Quotient)

1.2 How Computers Work?


It is important to remember that computers are not "smart" in the way that we think of the word. That is, they
do not "think" as people do. However, they are extremely complex and very fast and run on cleverly designed
programs, so they give the impression of being "smart."

Figure 1.5 Smart Computing

3
Switches in computers are used to express numbers. If a switch is a "1," it reads as "TRUE." If the switch is a
"0," it reads as "FALSE." This uses only two digits, a 0 and a 1, which is referred to as binary counting. The
switch that controls the on-off in the computer is called Transistor, the transistor is used to design the
integrated circuit IC, which is designed for the microprocessors, now known as CPUs.

Figure 1.5 Transistors and ICs

1.3 Computer Generations and Types.

There are five computer generations known to date.

Table 1.1 Computers Generations

Figure 1.6 Computer Generations

4
Some Types of Computer Systems
1. Wearable devices:
 Google smartwatches and Apple Watch.
 Smart glasses,

Figure 1.7 Wearable Devices

2. Smartphone
3. Tablet

4. Hybrid Tablets
5. Ultrabook

6. Laptop (Notebook)

7. All-in-One ("AIO")

8. Desktop

Figure 1.8 Computer Devices

9. Workstation: Is a middle-range machine between a mainframe and a PC. Used for scientific & engineering
applications.

Figure 1.9 Workstations

5
10. Mainframe: This is a large, expensive, powerful computer that can handle hundreds or thousands of
connected users simultaneously.

Figure 1.10 Mainframe

11. Supercomputer:
 Is the fastest, most powerful computer
 The most expensive.
 The fastest supercomputers are capable of processing more than one quadrillion instructions in a
single second.
 Used in technical areas that deal with large numbers such as in weather forecasting.

Figure 1.11 Supercomputers

1.4 Modern Computer Applications:


 Business
A computer has become an integrated part of all business organizations.
The computer is used in business organizations for:
 Budgeting
 Sales analysis
 Financial forecasting
 Managing employee database

 Banking
Today, banking is almost totally dependent on computers.
Banks provide the following facilities −

6
 Online accounting facility, which includes checking current balance, making deposits and overdrafts,
checking interest charges, shares, and trustee records.
 ATMs that are completely automated are making it even easier for customers to deal with banks.

 Education
The computer helps in providing a lot of facilities in the education system.
 The computer provides a tool in the education system known as CBE
(Computer Based Education).
 CBE involves control, delivery, and evaluation of learning.
 Computer education is rapidly increasing the graph for many computer
students.
 There are several methods in which educational institutions can use a
computer to educate the students.

 Marketing
In marketing, uses of the computer are the following −
 Advertising − With computers, advertising professionals create art and
graphics, write and revise copy, and print and disseminate ads to sell
more products.
 Home Shopping − Home shopping has been made possible through the
use of computerized catalogs that provide access to product information
and permit direct entry of orders to be filled by the customers.

 Healthcare
Computers have become an important part of hospitals, labs, and
dispensaries. They are being used in hospitals to keep the record of patients
and medicines. It is also used in scanning and diagnosing different diseases.
ECG, EEG, ultrasounds and CT scans, etc. are also done by computerized
machines.
 Diagnostic System − Computers are used to collect data and identify the cause of illness.
 Lab-diagnostic System − All tests can be done and the reports are prepared by computer.
 Patient Monitoring System − These are used to check the patient's signs of abnormality such as in
Cardiac Arrest, ECG, etc.
 Pharma Information System − The computer is used to check drug labels, expiry dates, harmful side
effects, etc.
 Surgery − Nowadays, computers are also used in performing surgery.

 Engineering Design
Computers are widely used for engineering purpose.
Some of the fields are −

 Structural Engineering − Requires stress and strain analysis for the


design of ships, buildings, budgets, airplanes, etc.
 Industrial Engineering − Computers deal with design,
implementation, and improvement of integrated systems of people,
materials, and equipment.
 Architectural Engineering − Computers help in planning towns, designing buildings, determining a
range of buildings on a site using both 2D and 3D drawings.

7
 Communication
Communication is a way to convey a message, an idea, a picture, or speech
that is received and understood clearly and correctly by the person for
whom it is meant. Some main areas in this category are −
 E-mail
 Chatting
 Usenet
 FTP
 Telnet
 Video-conferencing

 Government
Computers play an important role in government services. Some major
fields in this category are
 Budgets
 Sales tax department
 Income tax department
 Computation of the male/female ratio
 Computerization of voters lists
 Computerization of PAN card
 Weather forecasting

8
Chapter Two
Internet and E-learning
2.1 Computer Network
A computer network is a group of two or more computer systems
linked together. Computers on a network are sometimes called nodes.
Computer networks are used to exchange data using shared resources
such as printers, CD-ROM, and files.
Benefits of computer networks
 Resource sharing.
 Time-saving
 Communication.

Figure 2.1 Computer Network


2.1.1 Data Communication Hardware
 Data communication hardware is used to transmit digital information between computers or between
computers and other computers or nodes.
 hardware devices are needed as:
1. Network Adapter Card (NIC) or Modem.
◦ NIC enables and controls the exchange of data
between the nodes in a LAN.
◦ Modem: modulate demodulate. Digital to analog to
digital.
2. Cables for a wired connection.
3. Telephone line, satellite, hub, or switch.
Figure 2.2 NIC (Network Interface Card)
2.1.2 Networks Classification
 Local Area Networks (LANs): located in single buildings or campuses.
 Wide Area Networks (WANs): WANs cover a large geographical area, and connect cities and
countries
2.1.3 Transfer media
 Wireless Communication:
 Wireless signals are electromagnetic waves, which can travel through the
vacuum of outer space and media such as air.
 No physical medium is necessary for wireless signals
Figure 2.3 Wireless Device
Wired Communication:
Used cables to transfer data such as fiber optics

Figure 2.4 Fiber Cable and Network Connector

9
2.2 Internet
2.2.1 What is the Internet?
- The internet is a global network of computers that works much like the postal system. The internet
enables computers to send one another small packets of digital data. Internet is a worldwide
collection of interconnected networks.
- The Internet has no central computer that controls it.
- To avoid conflict between internet addresses an organization founded by the US National
Foundation of science is responsible for regulating the internet like registering unique domain
names.

2.2.2 How it works


Internet data packets carry different types of data for different applications. Common types include
web pages, email messages, and large files that might be digital videos, music files or computer
programs.
Today, the web is often used to provide an easy-to-use interface for numerous applications, including
email, file transfer, Usenet newsgroups, and messages (Internet Relay Chat).
2.2.3 Internet Connection
The Internet connection can be established via one of the following:
- Connection Information Service Gateway.
 Connect via an Internet Service Provider (ISP): ISP: is a company that provides individuals
and organizations with access to the internet.
 Dial-up connection: using a modem and telephone line. (very slow about 56Kbps)
- Network connection:
 Via LAN that connected to the internet such as ADSL (Asymmetric Digital Subscriber Line).

2.2.4 Internet Protocol (IP)


Protocol: a set of rules and signals used when computers of the networks communicate.
Example: TCP/IP (Transmission Control Protocol/ Internet Protocol)

TCP/IP Protocol:
- TCP/IP is a communication protocol that permits data transmission over the internet.
- The software for this protocol comes with the system as windows.
- Each message sent is divided into packets. The packet is a piece of a message transmitted over the
network. Each packet contains the source address, a destination address, and the data.

2.2.5 Internet Browser


- Application software that presents you with a Graphical User Interface (GUI) for searching,
viewing, and managing information over any network.
- Examples: Internet Explorer and Netscape Communicator.

2.2.6 Domain Name


- Each computer on the internet is identified by its unique numeric address which consists of 4
numbers separated by dot with no spaces.
Example: 185.37.12.6
- the IP of the computer is not easy to remember then alphanumeric addresses are used as
www.aaup.edu

10
- to translate Internet addresses to their numeric values there is a server called DNS (Domain Name
Server) is used. This is a program (software) that runs on the computer server of LAN.\
 Domain Types:
- com: commercial
- edu: educational
- gov: government
- org: organization
- net: network.
- Info: information
- Ps, jo, fr, us, UK: National Domains

Figure 2.5 URL

 URL: (Uniform Resource Locator)


- consists of the access method (HTTP, FTP) followed by a colon, double slashes, domain name,
domain type, and any path to the page domain.

2.2.7 Email Address


- Consists of two parts separated by @.
- Example: user_name@domain_name.domain _type
[email protected]

Google Derive steps:


 After creating google E-mail go to:
 Upload or create files
 Share and organize files

Figure 2.6 Gmail and Google Drive


2.2.8 Web Search Engines
All of us use search engines, most of us daily. Even so, most people don't know how to search. This section
will teach you some powerful new about using Google in particular.(www.google.com).

 Basic Search

Figure 2.7 Basic Search

11
 Search at Specific Time

Figure 2.8 Specific Search

 Advanced Search
Google offers an Advanced Search Page with many of these options:

Figure 2.9 Advanced Search

12
 Search using Google Scholar

Figure 2.10 Google Scholar

13
2.3 E-learning1
2.3.1 Definitions
E-learning:2
A learning system based on formalized teaching but with the help of electronic resources is known as
E-learning. While teaching can be based in or out of the classrooms, the use of computers and the
Internet forms the major component of E-learning. E-learning can also be termed as a network-
enabled transfer of skills and knowledge, and the delivery of education is made to a large number of
recipients at the same or different times.
E-learning or Electronic learning it is a learning method that is facilitated and supported via
information and communication technology (ICT).

Figure 2.10 E-learning

Distance Learning: 3
Is a method of study where teachers and students do not meet in a classroom but use the internet, e-
mail, etc., to have classes. This means that students learn remotely and do not have face-to-face
learning with instructors or other students.

Figure 2.11 Distance Learning

Blended Learning:4
Blended learning is an approach to education that combines online educational materials and
opportunities for interaction online with traditional place-based classroom methods. It requires the
physical presence of both teacher and student, with some elements of student control over time, place,
path, or place.

Figure 2.12 Blended Learning

1
https://moodle.aaup.edu/course/view.php?id=7980
2
https://economictimes.indiatimes.com/definition/e-learning
3
https://www.uopeople.edu/blog/what-is-distance-learning/
4
https://en.wikipedia.org/wiki/Blended_learning

14
Flipped Classroom Learning:5
A flipped classroom is an instructional strategy and a type of blended learning focused on student
engagement and active learning, giving the instructor a better opportunity to deal with mixed levels,
student difficulties, and differentiated learning preferences during the in-class time. It moves
activities, including those that may have traditionally been considered homework, into the classroom.
In a flipped classroom, students watch online lectures, collaborate in online discussions, or carry out
research at home while engaging in concepts in the classroom with the guidance of a mentor.

Figure 2.13 Flipped Classroom Learning

Mobile Learning:6
Mobile learning (m-learning) is education via the Internet or network using personal mobile devices,
such as tablets and smartphones to obtain learning materials through mobile apps, social interactions,
and online educational hubs. It is flexible, allowing students access to education anywhere, anytime.
Mobile learning provides a way for educational institutions to deliver knowledge and educational
content to students on any platform, anyplace, and at the time of need. Students use mobile apps and
tools to complete and upload assignments to teachers, download course instruction, and work in
online social groups to complete tasks.

Figure 2.14 Mobile Learning

5
https://en.wikipedia.org/wiki/Flipped_classroom
6
https://www.webopedia.com/TERM/M/mobile-learning-m-learning.html

15
MOOCs and examples (Coursera, udacity, etc.):7
MOOCs (Massive Open Online Course) are online courses with video content. They enable large
numbers of participants to learn from top universities around the world. This is what you need to know
about MOOCs.

The most important MOOC platforms are:

Coursera:
Largest MOOC platform worldwide, over 20 million course participants. Many high-quality courses
were created by the universities of Stanford, Princeton, Yale, London, Munich, Zurich, and many
more.
edX:
Second largest MOOC platform, around 10 million learners. High-quality content from Harvard, MIT,
Berkeley, and Oxford, among others.
Udacity:
Created as a MOOC platform at Stanford. Now mostly programming courses in cooperation with
industry partners such as Google, Facebook, or Daimler. Course topics include artificial intelligence
and self-driving cars.
FutureLearn:
Largest European MOOC platform (UK-based). Includes various British and European universities;
however, courses are sometimes shorter in duration.

Figure 2.15 MOOCs

7
https://www.edukatico.org/en/report/mooc-massive-open-online-course-the-key-facts

16
2.3.2 E-learning Platforms
Moodle8:
Is a learning platform designed to provide educators, administrators, and learners with a single robust,
secure, and integrated system to create a personalized learning environment. It delivers a powerful set
of cross-platform learner-centric tools and collaborative learning environments that empower both
teaching and learning.

Figure 2.16 Moodle’s cross-platform interface

Blackboard9:
Is a Learning Management System (LSM) that provides powerful, yet simple tools and workflows
that help learners and instructors stay organized, easily take action, and engage with content and each
other. It provides a design and architecture approach that enables a seamless user experience across a
broad set of capabilities that will continue to evolve, in addition to a wide range of services that aim at
driving academic effectiveness and learner engagement to enable continuous improvement through
education insights.

Figure 2.17 Blackboard cross-platform interface

8
https://moodle.org/
9
https://www.blackboard.com/

17
Canvas10:
Is an open and reliable web-based software that allows institutions to manage digital learning,
educators to create and present online learning materials and assess student learning, and students to
engage in courses and receive feedback about skill development and learning achievement. It includes
a variety of built-in course construction and management tools that can be customized to create
unique and accessible teaching and learning experiences. In Canvas, administrative users are called
Admins. Admins oversee and manage an institution's Canvas account, or they may oversee and
manage a sub-account within an institution‘s Canvas account.

Figure 2.18 Canvas Learning Management Platform

Google Classroom11:
Is a free web service developed by Google for schools that aims to simplify creating, distributing, and
grading assignments. The primary purpose of Google Classroom is to streamline the process of
sharing files between teachers and students. It integrates docs, sheets, slides, Gmail, and calendar into
a cohesive platform to manage student and teacher communication.

Figure 2.19 Interface of Google Classroom App

10
https://www.instructure.com/canvas/
11
https://classroom.google.com/

18
2.3.3 Advantages of e-learning12
 saves time and money: As e-learning is conducted online, your learners can access teaching and
learning content anywhere and anytime. Learners don‘t requisite to take time out from their homes in
up normal situations such as COVID 19 or jobs to join classes. E-learning is also cost-effective where
learners and instructors save a considerable amount on travel and accommodation costs.
 leads to better retention: learners nowadays prefer interactive content where they would watch a video
or listen to a podcast rather than read through pages of a manual.
 E-learning is consistent: e-learning delivers consistent and standardized training every time where
each learner encounters the same experience irrespective of when and where he or she takes the
course.
 E-learning is scalable: it is a one-time investment and it encounters as many learners you need. The
more learners take the course, the faster you can recover the expense.
 E-learning offers personalization: e-learning makes it possible to satisfy individual needs. It lets
learners select their learning track and direct at their own pace.

2.4 How to use Moodle:

2.4.1. Log in to Moodle and View Courses:


You can access the AAUP Moodle platform following the URL link:
https://moodle.aaup.edu/?lang=en

Figure 2.20 The main page of AAUP-Moodle stage

12
https://trainingindustry.com/articles/e-learning/5-advantages-of-e-learning/

19
To log in to the Moodle platform by clicking on the (Login) at the top right of the screen.

Then you will be redirected to the login page. After that, you have to enter your user name and password the
same that you are using to log in to the portal.

Figure 2.21 Login page

After that, you will be redirected to the main page of your Moodle account.

Figure 2.22 the main page of user Moodle account

20
The list of courses that recently accessed by the student:

Figure 2.23 Recently accessed courses list

The list of all courses that the student enrolled in the current semester:

Figure 2.24 All courses list

To change the course view language by using the language menu on the left top of the main screen:

Language menu

21
Calendar page: to know dates of the upcoming events, exams, and assignments due dates.

Figure 2.25 Calendar page

Message Page: You can access the message page by clicking on the Message icon ( ) on the right top of
the main page.

Figure 2.26 Message page

22
2.4.2 View Course Activities:
To access the activities on a specific course you have to open the course main page by clicking on the course
name and it will be displayed as follows:

Figure 2.27 Course icon

Then you will be redirected to the course main page which includes all activities and learning resources.

Figure 2.28 Course main page

Some of Moodle activities icons:


 Quiz (exam)
 Assignment ( )
 Zoom Meeting ( )
 URL link ((
 File ( )
 Questionnaire ( )
 Announcement ( )
 Forum ( )
 Chat ( )

23
2.4.3 Assignment Activities:
To access the assignment on the course page by clicking on the assignment icon on the course main page
( ):

Figure 2.28 Assignment Activity on the course page

Then the student will be redirected to the assignment page as follow:

Figure 2.29 Assignment Details Page

 Assignment attached file ( ): This file includes questions of the assignment to be


answered.

 Submission status( ): it describes if there is a submission or not.


 Grading status ( ): This displays if the instructor has graded the assignment or not yet.
 Due Date ( ): the last date (deadline) to submit the assignment.

24
 Time Remaining ( ): This shows the number of hours till the assignment
deadline.
 Last modified ( ): the date of the last modification to the assignment done by the student.

 Add submission ( ): to submit a student‘s answer, click on the submit button ( ), then
the student will be redirected to the submission page as follow:

Figure 2.30 Assignment submission page

 The maximum number of files that students can submit ( ).


 Maximum size of files that students can submit ( ).

 Types of files that student can submit ( )


 To upload the answer file by clicking on the icon ( ).

Figure 2.31 Upload page

25
To upload the answer file:
1. Chose the Upload file option ( ).
2. Then click on the chose file ( ).
3. Then upload the file by clicking on ( )

Figure 2.32 Upload File

4. After the upload process complete, save the file by clicking on ( ).

Figure 2.33 Assignment submission page after uploading the attempt

26
5. The answer file will be saved as a draft ( ), which means a student can edit
or change his answer before the deadline.
6. To edit or change the draft submission, choose the edit submission button ( ).
7. Remove the draft answer file by using the remove submission button ( ).
8. To submit the answer file and change the submission status form draft (not submitted) to submit,
click on the Submit assignment button ( ),
then this message will appear to confirm the submission and to notify the student that he will not
be able to make any changes on the attempt.
9. After the confirmation of the submission, the student has to press the continue button ( ).

After submitting the assignment, the submission status will be changed to green color as shown in the next
figure.

Figure 2.34 The assignment page after the submission

27
4.4. Quizzes and Exams Activities:

1. First, the student needs to access the exam page by clicking on the exam icon ( ) on the course
page.

Figure 2.35 Exam start attempt page

1. Attempts allowed ( ): number of attempts that students can do.


2. This quiz opens at ( ): date and time when students can start the
attempt (start answering the quiz‘s activities).
3. This quiz closes at ( ): date and time to close the quiz.
4. Time limit ( ): time that will give to the student to complete the attempt.
5. To start the attempt by using the button ( ) then click on ( ).

Figure 2.36 Start attempt window

28
Figure 2.37 Exam (quiz) page
 Question text and chooses:

 Time left to close the exam (quiz) ( ).


 Move to the next question ( ).
 Move between questions using question icon:

 Icon of the answered question ( ).

 Icon of the non-answered question ( ).


 Students can put a flag on the question using this button ( ).
 Icon of the flagged question ( ).
 To remove the flag ( ).
 To finish the attempt ( )

29
Figure 2.38 Answers summary

 Return to the exam by using the button ( ).


 Submit the attempt ( ).

- This message to inform the student that he will not be able to change the answers.
- To submit and finish by using the button ( ).

Figure 2.39 Exam page after the submission

30
2.4.5. Communicate with teachers via Moodle:
 Using the participant icon ( ) on the course page, the student can view the list of participants.

Figure 2.40 Participant page


 Select the role teacher ( ) to get the teacher contacts.

31
 Click on the teacher name ( ).

Figure 2.41 User profile

 to send message to the instructor by using message icon ( )

32
2.5 How to use Zoom?
2.5.1 Login to Zoom using AAUP account
 In the beginning, you need to go to the Zoom website by following the link: https://zoom.us/

Figure 2.42 Zoom Main Page

 Then on the right, you can find the Resources list, click on it and then choose ―Download Zoom
Client‖

 Click on Download

33
 Then open the file that you downloaded and wait for it to be saved.

Figure 2.43 Zoom Download

34
 Click on ―Sign In‖ to Activate Account.

Figure 2.44 Login Page

 Next for verification, please confirm your date of birth. Then click the CONTINUE button.

 Fill Your Email Address (like [email protected] ) and then click Sign Up.

Figure 2.45 Sign Up

35
 A message will be sent to your AAUP email to activate your Zoom account.

 Now, to access your AAUP Webmail, enter the AAUP website: https://www.aaup.edu/ and click
on QUICK LINKS ->Webmail as shown in the next figure.

Figure 2.46 Quick Links

 Student can log in directly to your Webmail using the following link: http://email.aaup.edu

 Enter Email Address as ([email protected]) and Password:

36
 You will find the activation email in the Inbox folder or junk folder. Click on the ―Activate
Account‖ button that was included in the email or copy and paste the activation URL into your
browser to activate your account.

 After clicking on the activate account button, you will be asked if you are signing up on behalf of a
school, click the ―No‖ button, and then click ―Continue.‖ On the next page, fill in your first and
last name and a password as shown in the next figure.

37
 On the next page, you can invite other people to create a free Zoom account via email. You can
skip this step if you want by Clicking Skip this step.

38
2.5.2. Zoom Menu

Log in to Zoom Application:

The Zoom menu contains several features that can be used at any time throughout lecture meetings such as:

1. Join Audio: Mute or Unmute Microphone.


2. Start Video: - Click the Start and Stop Video button in the menu bar at the bottom to begin your video.

3. Chat: Students can send messages to everyone as public messages or specific participants as private
messages. You can also attach files to the chatbox.

39
4. Share Screen:

- The student is able to share his computer screen by clicking on the ―Share screen‖ function in Zoom.

- A new window will be displayed as shown in the next figure. Students can share Screens or specific
applications.

- To stop sharing the screen, click on the “Stop Share” button on top of your computer screen.

Finish Meeting, the student needs to click on the ―End button.

40
2.6 How to Access University Email

1. You can enter your email through the following link (http://email.aaup.edu) or the university official
website https://www.aaup.edu and click on the ―Quick Links‖ menu.
2. Use the same username that you use for the Portal, followed by the student's domain. Example
([email protected]).

3. Enter the same password used for the Portal.

41
- You will be able to view messages saved in the inbox, sent items, drafts, etc. folders.

Create and send an email message:


- At the top of the page, select New message.
- On the To line, enter the email address.
- On the Add, a subject line, enter a brief description of what your message is about.
- To attach a file to your message, select Attach. You can attach photos and documents from your
computer or OneDrive. Attachments always appear at the top of the email.
- Type your message in the body and then select Send.

42
Reply to an email message13:
In your message list, choose the message that you want to reply to.
- At the top right corner of the message pane, select or , or select and then
choose Reply or Reply all.
- Type your response message and then select Send.

13
https://moodle.aaup.edu/course/view.php?id=7980

43
Chapter Three
Computer Hardware
3.1 Introduction
All types of computers follow the same basic logical structure and perform the following five basic
operations for converting input data into information useful to their users.

S.No. Operation Description

The process of entering data and instructions into the computer


1 Take Input
system.

Saving data and instructions so that they are available for


2 Store Data
processing as and when required.

Performing arithmetic and logical operations on data to convert


3 Processing Data
them into useful information.

Output The process of producing useful information or results for the


4
Information user, such as a printed report or visual display.

Control the Directs the manner and sequence in which all of the above
5
workflow operations are performed.

Figure 3.1 Basic operation of computers, the hardware component of the computer

44
Computer Systems is the integration of physical components called Hardware and none physical components
called Software?

1. Hardware (H.W.): These are the touchable components and electronic devices (The physical parts of
the computer). The Central Processing Unit (CPU), Memory, and peripheral devices.
2. Software (S.W.): The programs that run over the computer.

Figure 3.2 The computer system (hardware and software)14

3.2 Computer Input


Input is when data from the outside world which is made digital and entered into a computer. Images
into a camera, sound into a microphone, text into a keyboard, or movement and clicks into a mouse or
trackpad—all of this is real-world information input into a computer

3.2.1 A keyboard
The keyboard is the oldest type of input still commonly used. There are two basic types of keyboards:
standard and extended. There are two basic types of keyboards: standard and
extended. Standard keyboards have the normal character keys (A-Z, 1-0), modifier keys (control, alt,
escape, etc.), and function keys. An extended keyboard also includes navigation keys (arrows, page
up/down, etc.) and a numeric keypad, a set of keys with numbers and mathematical keys for quick
number entry and calculations.

Figure 3.3 Basic computer keyboard

14
https://truongtuyetvy.weebly.com/unit-1-types-and-components-of-computer-systems.html

45
the keyboard contains keys you press to enter data and instructions into a computer or mobile device

Figure 3.4 Computer keyboard types

Keyboard Shortcuts:

These are the most common types. You begin by holding down one of the special shortcut keys:

keys;
Then, you press any letter key in addition, then let go of both keys. For example:

+ This combination will "Select All" ("A" for "All") of whatever you are selecting. Or:

+ This combination will close a window and/or quit the program. Or:

+ This combination will open the "My Computer" window


The Control, Alt, or Windows/Start, here are some common two-key shortcuts:

CTRL + O Open

CTRL + P Print

CTRL + N New (Document)

CTRL + S Save

CTRL + W Close Window

CTRL + A Select All

CTRL + X Cut

CTRL + C Copy

CTRL + V Paste

CTRL + Z Undo

CTRL + B Bold (for word processing)

46
CTRL + I Italic (for word processing)

CTRL + U Underline (for word processing)

ALT + TAB Switch Window (‗Windows Flip‘)

This shortcut closes the foremost window; if you are at the


ALT + F4
Desktop, it can be used to shut down the computer.

ALT + PRINT SCREEN Copies an image of the active window to the clipboard

WIND + D Show the Desktop

WIND + F Find Window

WIND + E Open "My Computer" Window

3.2.2 Pointing Device

It is an input device that allows a user to control a small symbol on the screen called the points. In a
graphical user interface (GUI), a pointer is a small symbol on the screen whose location and shape
change as a user moves a pointing device.

 Mouse
It is a small handheld pointing device. As you move a mouse, the pointer on the screen also moves.
The bottom of a mouse is flat and contains a mechanism that detects the movement of the mouse.

Figure 3.5 An optical mouse has buttons. A touch mouse often has no buttons

 Touchpad
It is a small, flat, rectangular pointing device that is sensitive to pressure and motion commonly used
on laptop computers.
 Pointing Stick
It is a pressure-sensitive pointing device, and it‘s shaped like a pencil eraser that is positioned between
keys on a mobile computer keyboard.
 Trackball
It is a stationary pointing device with a ball on its top or side.

Figure 3.6 The touchpad. Pointing stick. Trackball mouse

47
3.2.3 Touch Screens
It is a touch-sensitive display device. Touch screens are convenient because they do not require
a separate device for input.

Figure 3.7 Some types of touch screens

 Touch Input
Devices that utilize touch input include monitors for desktops and screens on laptops and tablets,
smartphones, portable media players, digital cameras, tablets, kiosks, and navigation systems.

 Desktop Monitors and Screens on Laptops and Tablets


These touch-enabled monitors and screens allow users to interact with the operating system without a
keyboard or pointing device. Instead of using a mouse to click an object on the screen.

 Smartphones
Its supports touch input includes tapping to run an app, sliding or swiping to scroll, and pinching and
stretching to zoom.

3.2.4 Digital Cameras


It produces digital images that can be stored in a computer, displayed on a screen, and printed. The big
advantage of the digital camera is making photos both inexpensive and fast because there is no film
processing.

Figure 3.8 Digital Camera15

3.2.5 Pen Input


With pen input, you touch a stylus or digital pen on a flat surface to write, draw, or make selections.

Figure 3.9 You use a stylus to write, draw, or make selections on a touchscreen that supports pen input

15
https://www.usa.canon.com/internet/portal/us/home/explore/solutions-services/mobile-apps/camera-connect

48
3.2.6 Graphics Tablet
A graphics tablet, also called a digitizer, is an electronic plastic board that enables a user to hand-draw
images, animations, and graphics. graphics tablet detects and converts movements of a stylus or digital
pen into digital signals that are sent to the computer.

Figure 3.10 Graphic Tablet16

3.2.7 Scanners and Reading Devices


Some input devices capture data directly from a source document -which is the original form of the data-,
and this saves the user‘s time. For instance, optical scanners, Optical readers, barcode readers, RFID (radio
frequency identification) readers, magnetic stripe card readers, and MICR (magnetic ink character
recognition) readers.

 Optical Scanners
An optical scanner is a light-sensing input device that reads printed text and graphics and then translates
the results into a form the computer can process. The quality of a scanner is measured by its resolution, that
is, the number of bits it stores in a pixel and the number of pixels per inch. Many scanners include OCR
(optical character recognition) software, which can read and Convert text documents into electronic files.
OCR software converts a scanned image into a text file that can be edited.

Figure 3.11 a. optical character recognition17 b. A flatbed scanner

 Bar Code Readers


It's a hand-held optical reader or stationary input device used to capture and read the information contained
in a bar code using laser beams. A barcode is an identification code that consists of either a set of vertical
lines and spaces of different widths or a two-dimensional pattern of dots, squares, and other images.

Figure 3.12 A barcode reader uses laser beams to read barcodes, QR code, and magnetic stripe

16
https://www.thearchitectsguide.com/blog/best-drawing-tablets
17
https://www.openpr.com/news/1847603/emerging-trends-in-optical-character-recognition-ocr

49
A QR code (quick response code) is known as a 2-D barcode because it stores information in both a vertical
and horizontal direction.

 Magnetic Stripe Readers


It used to read the magnetic stripe on the back of credit cards, entertainment cards, bank cards,
identification cards, and other similar cards. The stripe contains information identifying you and the card
issuer.

 MICR Readers
MICR (magnetic ink character recognition) devices read text printed with magnetized ink. MICR is used
mainly by the banking industry to ease the processing of cheques and other documents.

MICR Reader18

3.2.8 Smart Card


A small electronic device about the size of a credit card that contains electronic memory. They are
called smart cards as they can accept tiny memory chips embedded in them which act as
microprocessors where it is located under a gold contact pad on one side of the card. Used for a
variety of purposes such as storing digital cash and storing patient‘s medical records.

Construction of Smart Card19


3.2.9 Microphone
Microphones are built into most handheld and laptop devices, as well
as some desktop computers. Computers without microphones can
accept peripherals (using either an audio jack or USB) or can use a
microphone which is part of a headset. Speech recognition is
becoming more and more common.

3.2.10 Motion Sensors


Newer technology allows the camera to see
your eyes, face, hands, and body. The
technology "sees" what you do and can react
to that. Some video games have such a
system, where if you move your body, your
screen character moves in the same way.

18
https://www.magtekeurope.com/products/cheque-scanners/imagesafe.htm
19
https://www.electronicslovers.com/2020/03/smart-cards-what-are-they-and-how-do-they-work.html

50
3.3 Computer Output
The output is data that has been processed into a useful form. The form of output varies, depending on the
hardware and software being used and the requirements of the user. a user encounters four basic types of
output: text, graphics, audio, and video. These devices include: screen and printer.
Categories of output devices:
3.3.1 Monitors (Screen) and Graphics Adapter:
A display is an output device that visually conveys text, graphics, and video information. Displays
consist of a screen and the components that produce the information on the screen. Most current
displays are a type of flat-panel display, which means they have a shallow depth and a flat-screen.
monitors nowadays use pixels which is is one dot on your screen. Each pixel a separate color. Here is
a pixel as you might see it in a graphics editing program, like Photoshop:

Figure 3.13 Monitors pixels

This Figure shows the displays for a variety of computers and mobile devices. A monitor is a display
that is packaged as a separate peripheral device.

Monitor display Laptop and digital Navigation system Handheld game device Smartphone
camera displays display display display

Figure 3.14 A variety of display devices, it can be used to connect to the internet

Figure 3.15 Smart TVs enable you to connect to the Internet

51
The graphics adapter is the electronic device that links the monitor to the processor and motherboard. A
Graphics adapter can be inserted into an expansion slot on the motherboard. Nowadays, most of the
motherboards have graphics adapter built-in.

Figure 3.16 Graphics Adapter20.

3.3.2 Printers
Printers produce hard copy output. Printers can be chosen according to the price, size (and weight), speed,
quality of output, color requirement, and even noise level.
 Dot-matrix printer.
They used metal pins to strike the ink ribbon and paper. Letters would be formed by creating many small
dots in that letter's shape. These printers produced very low-quality tex

 Ink-jet printers (line printers):


Inkjet printers spray small dots of liquid ink on paper to create images. Printer resolution is measured by
the number of dots per inch (dpi) a printer can print.
- Its resolution is good, huge ink-jet printers used by Architects, its Line printer.
 Laser printers (page printers):
Its High speed, High resolution, and Speed of printing reach 32 pages per minute (ppm), Page printer.

Figure 3.17 Ink-jet printers, Laser printer, a dot-matrix printer, and inkjet printing21.

 All-in-One Printers
It‘s a single device that looks like a printer or a copy machine but provides the functionality of a printer,
scanner, copy machine, and perhaps a fax machine

20
https://computer.howstuffworks.com/graphics-card.htm
21
http://www.dp3project.org/technologies/digital-printing/inkjet

52
Figure 3.18 An all-in-one printer. A mobile printer. Plotter.

 A 3-D printer
can print solid objects, such as clothing, prosthetics, eyewear, implants, toys, parts, prototypes, and
more

Figure 3.19 3-D printer

3.3.3 Data Projectors


It‘s a device that takes the text and images displaying on a computer or mobile device screen and projects
the images on a larger screen. Two types of smaller;
• An LCD projector, and A digital light processing (DLP)

Figure 3.20 Data projector. Interactive whiteboard

3.3.4 Interactive Whiteboards


It‘s a touch-sensitive device, resembling a dry-erase board, which displays the image on a connected
computer screen, usually via a projector.

53
3.4 Processing Devices
Computers and mobile devices include components that are used for input, processing, output, storage, and
communications. Many of these components are inside the case that contains and protects the electronics of
the computer or mobile device from damage. These cases are available in a variety of shapes and sizes.

Figure 3.21 Cases for computers and mobile devices are available in a variety of shapes and sizes

The basic component of the computer is shown in this Figure.

Figure 3.22 System Unit Components

3.4.1 Motherboard
The motherboard is the main circuit board of the computer. Many electronic components, such as the
processor and memory, attach to the motherboard; others are built into it. The following Figure shows photos
of current desktop and laptop motherboards.

54
Figure 3.23 A desktop motherboard and a laptop motherboard

3.4.2 The Processors (CPU)

The basic instructions that operate a computer. The processor significantly impacts overall computing power
and manages most of a computer‘s operations. Some computer and chip manufacturers use the term
microprocessor to refer to a personal computer processor chip. Most processor chip manufacturers now offer
multi-core processors. A processor core, or simply core, contains the circuitry necessary to execute
instructions. The operating system views each processor core as a separate processor. A multi-core processor
is a single chip with two or more separate processor cores. Over the last twosome of years, the PC
instrumentalist has been offered first dual-core processors, then quad-core models and octo-core. Multi-core
processors are used in all sizes of computers.

Figure 3.24 A multicore processor22

The processor also called the Central Processing Unit (CPU): is the electronic component that interprets
and carries out the basic instructions that operate the computer.
CPU has three components:
1. CU (Control Unit): it Controls the flow of input/output, and it Used to fetch and decode instructions.
2. ALU (Arithmetic Logic Unit): Does the logical and arithmetic operations.
3. Registers: it‘s very high-speed storage arrears.

22
https://www.soundonsound.com/sound-advice/multi-core-processors-musicians

55
Processors contain a control unit (CU) and an arithmetic logic unit (ALU). These two components work
together to perform processing operations. The following Figure illustrates how other devices connected to the
computer communicate with the processor to carry out a task. When a user runs an application, for example,
its instructions transfer from a storage device to memory. Data needed by programs and applications enter
memory from either an input device or a storage device. The control unit interprets and executes instructions
in memory, and the arithmetic logic unit performs calculations on the data in memory. The resulting
information is stored in memory, from which it can be sent to an output device or a storage device for future
access, as needed.

Figure 3.25 computer system components23 and basic CPU connections

The control unit is the component of the processor that directs and coordinates most of the operations in the
computer and the arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations. A
processor contains small, high-speed storage locations, called registers that temporarily hold data and
instructions. Registers are part of the processor, not part of memory or a permanent storage device.

 Machine Cycle
A machine cycle comprises the steps that a computer's processor executes when it receives a
machine language instruction. modern CPUs can perform millions of machine cycles per second. For every
instruction, a processor repeats a set of four basic operations, which comprise a machine cycle:
(1) Fetching, (2) decoding, (3) executing, and, if necessary, (4) storing.

Figure 3.26 Machine Cycle

23
http://www.lankaitschool.com/2017/06/function-of-computer-system.html

56
3.4.3. Memory
Memory (RAM, ROM, and Cache):
 RAM (Random Access Memory): is used to store programs and other data waiting for processing,
Data will be lost when turning off the computer. RAM a volatile memory.
 ROM (Read Only Memory): it holds the instructions that boot (startup) and prepare a computer
for use. ROM is a non-volatile memory.
 Cache Memory: is a random access memory (RAM) that a computer microprocessor (CPU) can
access more quickly than it can access regular RAM. The CPU processes data looks first in the
cache memory, and if finds the data there, it does not have to do the more time-consuming reading
of data from larger memory (RAM).
The memory consists of electronic components that store instructions waiting to be executed by the

Figure 3.27 RAM and RAM installation24.

processor, data needed by those instructions, and the results of processing the data. Stores three basic
categories of items, each location in memory has an address. Memory size commonly is measured in MB,
gigabytes (GB) or terabytes (TB), and Computers and mobile devices contain two types of memory:

Figure 3.28 Types of Memory

Two common types of RAM exist:

24
https://www.digitaltrends.com/computing/what-is-ram/

57
RAM chips usually reside on a memory module and are inserted into memory slots.
Cache Memory speeds the processes of the computer because it stores frequently used instructions and data.

Figure 3.29 Cache Memory Levels

Read-Only Memory (ROM) refers to memory chips storing permanent data


and instructions.
Flash memory can be erased electronically and rewritten. CMOS technology
uses battery power to retain information when the power to the computer is off.
Access time is the amount of time it takes the processor to read from memory,
which is measured in nanoseconds. Today‘s computers support Plug and Play
technology, which means the computer automatically, can recognize peripheral
devices as you install them. Plug and Play support means you can plug in a
device and then immediately begin using it
Figure 3.30 EPROM
3.4.4 Expansion Slots and Cards

 Bus
It is a collection of wires through which data is transferred from
one part of the computer to another. A bus allows the various
devices both inside and attached to the system unit to
communicate with one another.
All buses consist of two parts:
 The address bus: Transfers information about where data should
go.
 The data bus: Transfers instructions coming from or going to the
processor. (Transfers actual data).

58
Types of Buses
A computer has a system bus, possibly a backside bus, and an expansion bus.
 A system bus, also called the front-side bus (FSB), is part of the motherboard and connects the
processor to the main memory.
 A backside bus (BSB) connects the processor to the cache.
 An expansion bus allows the processor to communicate with peripheral devices.

 Ports:
It is the interface between the computer and the outer world.

Figure 3.31 Computer cards, port location and Ports comparison - Intel Nuc 9 Pro versus Mac mini 25
Types of ports:
Serial Port
 Used for external modems and older computer mouse
 Two versions: 9 pins, 25 pin model
 Data travels at 115 kilobits per second

Parallel Port
 Used for scanners and printers
 25 pin model

PS/2 Port
 Used for old computer keyboard and mouse
 Most of the old computers provide two PS/2 port, each
for the mouse and keyboard
Universal Serial Bus (or USB) Port
 It can connect all kinds of external USB devices such as
an external hard disk, printer, scanner, mouse, keyboard,
etc.
 Most of the computers provide two USB ports as a
minimum.
 Data travels at 12 megabits per second.

Figure 3.32 Computer Ports

25
https://appleinsider.com/articles/20/06/01/intels-xeon-nuc-9-pro-kit-is-what-we-want-to-see-in-a-mac-pro-mini

59
VGA Port
 Connects monitor to a computer's video card.
 It has 15 holes.

Ethernet Port
 Connects to a network and high-speed Internet.
 Connects the network cable to a computer.

Game Port
 Connect a joystick to a PC
Digital Video Interface, DVI port
 Connects Flat panel LCD monitor to the computer's high-end video graphic cards.

3.5 Storage
The binary system uses two unique digits (0 and 1); Bits and bytes; Computers must translate S.W. into
binary form and then must translate it from a binary form into a language you can understand. Computers
operate with electronic switches that are either "on" or "off", corresponding to 1 or 0. Every Eight bits
grouped as a unit are called a byte. A byte represents a single character in the computer or mobile device.

Figure 3.33 Bits and Bytes

3.5.1 Binary and decimal numbering systems


A Binary Number is made up of only 0s and 1s. There is no 2, 3, 4, 5, 6, 7, 8, or 9 in Binary. A "bit" is a
single binary digit26.

Bit vs. Byte

26
https://www.mathsisfun.com/binary-number-system.html

60
Example of a Binary Number:
110100

We count in Decimal

Figure 3.34 Counting in Decimal

We Count using Binary like counting in decimal except we reach 10 much sooner.

Figure 3.35 Binary Counting27.

Figure 3.36 Binary Counting28

In Binary there are Ones, Twos, Fours, etc

27
https://www.mathsisfun.com/binary-number-system.html
28
https://www.mathsisfun.com/binary-number-system.html

61
Figure 3.37 Binary and Decimal Example

62
Figure 3.38 Binary to Decimal Example

(0101)2 = (5)10
(14)10 = (1110)2

 Binary to decimal Examples29

29
https://www.mathsisfun.com/binary-number-system.html

62
 Decimal to Binary
Reminders Way:
we need to write out the remainder in the reverse order —1100. So, 12 in the decimal system is
represented as 1100 in binary.

Figure 3.39 From decimal to Binary using reminders30.

 Binary addition:
Binary addition is as your everyday addition (decimal addition), but that it carries on a value of 2 instead
of a value of 10.

Figure 3.40 Binary Addition31 and binary addition example

30
https://indepth.dev/the-simple-math-behind-decimal-binary-conversion-algorithms/
31
https://www.howtogeek.com/367621/what-is-binary-and-why-do-computers-use-it/

63
 Binary Subtraction by 2’s Complement32

The operation is carried out using the following steps:


1) At first, 2‘s complement of the subtrahend is found.
2) Then it is added to the minuend.
3) If the final carryover of the sum is 1, it is dropped and the result is positive.
4) If there is no carryover, the two‘s complement of the sum will be the result and it is negative.

Example 1:

Example 2:

32
https://www.math-only-math.com/

64
3.5.2 Computer Encoding Systems
– The ASCII (American Standard Code for Information Interchange) code is 7 Bits. (2 7) =128
characters.
– The ANSI (American National Standards Institute) code is 8 Bits. (2 8) =256 characters.
– The Unicode is 16 Bits. (216) =65536 characters, which includes most of the languages of the world.

3.5.3 A storage medium


A storage medium, also called secondary storage, is the physical material on which a computer keeps data,
information, programs, and applications. Examples of storage media include internal hard disks, external
hard disks, solid-state drives (SSDs), memory cards, USB flash drives, optical discs, and network-
attached storage devices, magnetic stripe cards, smart cards, RFID tags, and microfilm. Cloud storage.

The following figure shows a variety of storage options:

Figure 3.41 A variety of storage options

65
Figure 3.42 Storage devices
3.5.4 Storage Operations
A storage device is a hardware that records and/or retrieves items to and from storage media.
Writing is the process of transferring data, instructions, and information from memory to a storage medium.
Reading is the process of transferring these items from a storage medium into memory.

Figure 3.43 Read and Write operations

3.5.5 Storage Capacity


Capacity is the number of bytes (characters) a storage medium can hold. The following Table identifies the
terms manufacturers may use to define the capacity of storage media. For example, a storage medium with a
capacity of 750 GB can hold approximately 750 billion bytes.

66
Figure 3.44 Disk properties

Example1: How many Bytes in 15 Kbytes?


15 KB = 15 * 210 = 15 * 1024 = 15360 Bytes.
Example2: How many Bits in 25 MB?
25 MB = 25 MB * 1024 *1024 * 8
= 25 MB * 220 * 8
=209715200 Bits.
Example3: How many GB in 20000 KB?
20000 / (1024*1024)

Types of mass storage devices and media:


1. Magnetic disk.
2. Magnetic Tape.
3. Optical Laser Disk.

Figure 3.45 Mass Storage devices

3.5.6 Magnetic Disks

 Hard Disk:
A hard disk also called a hard disk drive (HDD), is a storage device that contains one or more inflexible,
circular platters that use magnetic particles to store data. Depending on how the magnetic particles are
aligned, they represent either a 0 bit or a 1 bit.
Desktops and laptops often contain at least one hard disk. The entire hard disk is enclosed in an airtight,
sealed case to protect it from contamination. A hard disk that is mounted inside the computer‘s case.

67
Figure 3.46 Hard Disk

The surface of magnetic disks and hard disks is formatted as follows:


 Tracks are concentric (circles with the same center).
 A cylinder is the same-numbered tracks on each recording surface.
 Tracks are divided into sectors. The sector is the smallest unit that can be accessed on a disk. The number
of sectors depends on the density of the disk. Typically, the storage capacity of each sector in a track is
512 bytes. A bad sector is a sector that can‘t be accessed.
 A cluster consists of several adjacent sectors. Typically, the cluster size ranges from 8 to 64 sectors. For
512-bytes sectors, the size of a cluster ranges from 4096 bytes = 4 Kbytes to 32,768 bytes = 32 Kbytes.

Figure 3.47 The surface of magnetic disks

68
Figure 3.48 sector, track and cluster of magnetic disks

 Operations applied on Hard Disk


A. Defragmentation: Rearranging Clusters to enhance performance.
To enhance performance, fragments must be rearranged so that files are stored in contiguous clusters.
Such a process is called defragmentation. Many utility programs can be used to defragment the hard
disk. One comes with Windows, which is disk defragmenter: start – accessories - system tools – disk
defragmenter.
B. Partitioning: divide the hard disk into separate areas called partitions; each partition functions as if it
were a separate hard disk drive.
C. Formatting: The process of preparing the disk to be used (read/write). It erases the FAT. There are
two types of disk format: The high-level format that most users use and the low-level format. The
high-level format does not erase the data, just the FAT. The low-level format erases all data and
partition the hard disk into many partitions and divide each partition into tracks and sectors.

Figure 3.49 a. defragmentation b. partitioning and formatting

Figure 3.50 Disk partition and format using Windows

69
 Optical Laser Disks
An optical disc is a type of storage medium that consists of a flat, round, portable disc made of metal,
plastic, and lacquer that is written and read by a laser. Optical discs used in computers typically take
650 MB, 700 MB. The surfaces of the optical disk consist of one track in a spiral shape.
– CD: Compact Disk.
– DVD: Digital Versatile Disk or Digital Video Disk.
The speed of the CD drive 24X, 32x, 40x, 48x, 52x are representing the spin speed times the speed of
the original CD standard.

CDs of technology types:


 A CD-ROM (CD-read-only memory)
 A CD-R (CD-recordable)
 A CD-RW (CD-rewritable) 33

Figure 3.51 a. Optical disk and drive b. CD and DVD surface30


DVDs:
DVD quality far surpasses that of CDs, DVDs to have greater storage capacities and higher resolutions than
CDs.
– A DVD-ROM (DVD-read-only memory)
 DVD-R and DVD+R are competing DVD-recordable WORM formats.
 DVD-RW, DVD+RW, and DVD+RAM are competing for DVD-rewritable formats that users can
write on multiple times.

 Flash Memory Storage:


Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten. Flash
memory chips are a type of solid-state media. The lack of moving parts makes flash memory storage more
durable and shock-resistant than other types of media, such as magnetic hard disks or optical discs.

Figure 3.52 Flash Memory and SSD34

33
http://www.cs.cornell.edu/courses/cs4410/2016fa/slides/14-disksraid.pdf
34
https://noise.getoto.net/tag/ssd/

70
 SSDs:
An SSD (solid-state drive) is a flash memory storage device that contains its processor to manage its
storage, SSDs are used in all types of computers, including servers, desktops, laptops, tablets, and a
variety of mobile devices, such as portable media players and DV cameras. Some computers have both
a traditional hard disk and also an SSD. External SSDs also are available.

 Cloud Storage:
Some users choose cloud storage instead of storing data locally on a hard disk, SSD, or other media.
Cloud storage is an Internet service that provides storage to computer or mobile device users. Cloud
storage is available for home and business users, with various degrees of storage services available.
Cloud storage fee arrangements vary, depending on the user‘s storage requirements.

Figure 3.53 Cloud Storage30

Figure 3.54 Cloud Storage Examples.

Figure 3.55 Hierarchy of Storage.

71
Chapter Four
Computer Software
4.1 Introduction
Computer Software S.W. (Programs and Apps): A program, or software, consists of a series of related
instructions, organized for a common purpose, that tells the computer what tasks to perform and how to
perform them.

4.2 Types of Computer Software

4.2.1 System Software: consists of the programs that control or maintain the operations of the computer and
its devices.
An Operating Systems (OS) is a set of programs that coordinates all the activities among computer or mobile
device hardware. Other programs, often called tools or utilities, enable you to perform maintenance-type
tasks usually related to managing devices, media, and programs used by computers and mobile devices.

Figure 4.1. Example tasks that can be performed by the system software

Operating System Functions:


• Starting Computers and Mobile Devices
– If a computer or mobile device is off, you press a power button to turn it on.
• A user interface (UI) controls how you enter data and instructions and how information is displayed on
the screen. With a graphical user interface (GUI), you interact with menus and visual images.

Figure 4.2. UI Examples

72
• Operating systems typically provide a means to establish Internet connections.

Figure 4.3. OS Providing Means to Establish an Internet Connection

• Operating systems often provide users with a variety of tools related to managing a computer, its
devices, or its programs.

Figure 4.4. Various Computer Management Tools Provided by the OS

• A user account enables a user to sign in to, or access resources on, a network or computer
– A username, or user ID, identifies a specific user
– A password is a private combination of characters associated with the username

Figure 4.5. User Account Example

73
Figure 4.6. OS Interaction with a User, Application, and Hardware

Types of Operating Systems:

74
Mobile Operating Systems:
• The operating system on mobile devices and many consumer electronics is called a mobile operating
system and resides on the firmware.

• Android is an open-source, a Linux-based mobile operating system designed by Google for


smartphones and tablets
• iOS, developed by Apple, is a proprietary mobile operating system specifically made for
Apple‘s mobile devices
• Windows Phone, developed by Microsoft, is a proprietary mobile operating system that runs
on some smartphones

4.2.2. Applications Software: An application, or app, sometimes called application software, consists of
programs designed to make users more productive and/or assist them with personal tasks.

4.3 Categories of Software:


 Productivity applications can assist you in becoming more effective and efficient while performing
daily activities at work, school, and home. Productivity applications include word processing,
presentation, spreadsheet, database, note-taking, calendar, and contact management, project
management, accounting, personal finance, legal, tax preparation, document management, and
enterprise computing.
 Graphics and media applications include computer-aided design, desktop publishing, paint/
image editing, photo editing and photo management, video and audio editing, multimedia and
website authoring, media players, and disc burning.
 Personal Interest applications are designed specifically for lifestyle, medical, entertainment,
convenience, or education activities. Most of the programs in this category are relatively inexpensive;
many are free. Some applications focus on a single service, while others provide several services in a
single application.
 Communications applications are used to enable people to communicate and share information with
others.
 Security tools are used to protect your computers and mobile devices. You can use one or more
security tools. Security tools include personal firewalls, antivirus programs, malware removers, and
Internet filters. Although some of these tools are included with the operating system, you also can
purchase stand-alone programs that offer improvements or added functionality.
 File, disk, and system management tools perform maintenance-type tasks related to managing a
computer, its devices, or its programs, you can use one or more file, disk, and system management
tools. Functions provided by these tools include the following: managing files, searching, viewing
images, uninstalling software, cleaning up disks, defragmenting disks, setting up screen savers,
compressing files, maintaining a personal computer, and backing up files and disks. Although some of
these tools are included with the operating system, you also can purchase stand-alone programs that
offer improvements or added functionality.

75
Table 4.1. Program and App Categories

4.4. Obtaining Software:


Software is available in a variety of forms: retail, custom, web app, mobile app, mobile web app, shareware,
freeware, open-source, and public domain.
 Retail software: is mass-produced, copyrighted software that meets the needs of a wide variety of
users, not just a single user or company. Some retail software, such as an operating system, is
preinstalled on new computers and mobile devices. You also can purchase retail software from local
stores and on the web. With online purchases, you may be able to download purchased programs
immediately instead of waiting for the software to arrive by mail.
 Custom software: performs functions specific to a business or industry. Sometimes a company cannot
locate retail software that meets its unique requirements. In this case, the company may use software
developers to create tailor-made custom software. Custom software usually costs more than retail
software.
 A web app: is an application stored on a web server that you access through a browser. Users
typically interact with web apps directly by visiting a website, but some web apps also can be accessed
locally offline. Many websites provide free access to their apps. Some charge a onetime fee, while
others charge recurring monthly or annual subscription fees. You may be able to use part of a web app
free and pay for access to a more comprehensive program or pay a fee when a certain action occurs.

76
 A mobile app: is an application you download from a mobile device‘s app store, sometimes called a
marketplace or other location on the Internet to a smartphone or other mobile device. Some mobile
apps are preinstalled on a new mobile computer or device. Many mobile apps are free; others have a
minimal cost — often less than a few dollars.
 A mobile web app: is a web app that is optimized for display in a browser on a mobile device,
regardless of screen size or orientation. Many app developers opt for web delivery because they do not
have to create a different version for each mobile device‘s app store. Many web apps use a responsive
design, which means the app displays properly on any computer or device.
 Shareware: is copyrighted software that is distributed at no cost for a trial period. To use a shareware
program beyond that period, you send payment to the software developer or you might be billed
automatically unless you cancel within a specified period. Some developers trust users to send
payment if software use extends beyond the stated trial period. Others render the software useless if no
payment is received after the trial period expires. In some cases, a scaled-down version of the software
is distributed free, and payment entitles the user to the fully functional product.
 Freeware: is copyrighted software provided at no cost by an individual or a company that retains all
rights to the software. Thus, software developers typically cannot incorporate freeware in applications
they intend to sell. The word, free, in freeware indicates the software has no charge.
 Open-source software: is software provided for use, modification, and redistribution. This software
has no restrictions from the copyright holder regarding the modification of the software‘s internal
instructions and its redistribution. Open-source software usually can be downloaded from a web server
on the Internet, often at no cost. Promoters of open source software state two main advantages: users
who modify the software share their improvements with others, and customers can personalize the
software to meet their needs.
 Public-domain software: has been donated for public use and has no copyright restrictions. Anyone
can copy or distribute public-domain software to others at no cost.

4.5 Filesystem
A file is a collection of information that has a name called filename. Each file name has an extension that
distinguishes file types. So the filename is on the form file_name.ext_name example: letter.doc is a document
file.

Figure 4.7. Example of a file name with its extension

A folder (or directory) is a special file used to organize other files. I mean programs and information files
are placed in folders (directories).

77
Some Types of Files
1. ASCII file (Text file): a file that consists of ASCII characters, no images, no equations, and no special
format.
Example: *.txt (Notepad program)
2. Document file: That contains text, images, and other formatted text.
Example: *.doc (MS-Word program)
3. Spreadsheet file: That contains rows and columns of data.
Example: *.xls (MS-Excel program)
4. Web file: That can be opened by internet browsers.
Example: *.htm (Internet explorer program)
5. Executable program file: To execute (run) a computer program.
Example: *.exe , *.com
6. Graphics file: That contains digitized images (the binary code of the image).
Example: *.bmp , *.gif
7. Audio file: That contains digitized sound.
Example: *.wav , *.mp3
8. Video file: That contains digitized video frames and when played produced motion video.
Example: *.avi , *.mpeg
There is software available to compress audio, video, and graphics files to save space and to be able to send
and receive them over the internet.

4.6 Viruses and Malware


A computer virus is a potentially damaging program that affects a computer or device negatively by altering
the way it works. This occurs without the user‘s knowledge or permission. Once the virus is in a computer or
device, it can spread and may damage your files, programs and apps, and operating systems. Viruses do not
generate by chance. The programmer of a virus, known as a virus author, intentionally writes a virus
program. Writing a virus program usually requires significant programming skills. The virus author ensures
the virus can replicate itself, conceal itself, monitor for certain events, and then deliver its payload. A payload
is a destructive event or prank the virus delivers. Viruses can infect all types of computers and devices. Most
variations of viruses have two phases involved in their execution: infection and delivery. The first step in the
infection phase is the activation of the virus. The most common way viruses spread is by users running
infected programs or apps. During the delivery phase, the virus unleashes its payload, which might be a
harmless prank that displays a meaningless message — or it might be destructive, corrupting or deleting data
and files.

There are many types of computer viruses:


 Viruses that erase files and programs once they infect the computer.
 Viruses that sleep until a given time/date.
 Viruses that replicate themselves creating more and more copies of themselves taking the whole
memory and halting the system.
 Viruses that infect the FAT, for this type an expert can recover the lost data.
 Viruses that run the hard disk at its highest speed for hours to get overheated and physically damaged.
 Viruses that are capable of transmitting themselves over networks.
 Viruses that send a copy of themselves to each address in your address book. (email)

In addition to viruses, other malware includes worms, trojan horse programs, and rootkits.
• A worm resides in active memory and replicates itself over a network to infect computers and devices,
using up system resources and possibly shutting down the system.

78
• A trojan horse is a destructive program disguised as a real program, such as a screen saver. When a user
runs a seemingly innocent program, a trojan horse hiding inside can capture information, such as user
names and passwords, from your computer or enable someone to control your computer remotely. Unlike
viruses, trojan horses do not replicate themselves.
• A rootkit is a program that easily can hide and allow someone to take full control of your computer from
a remote location, often for nefarious purposes. For example, a rootkit can hide in a folder on your
computer. The folder appears empty because the rootkit has instructed your computer not to display the
contents of the folder. Rootkits can be very dangerous and often require special software to detect and
remove.

 Source of Viruses and Malware:


 Interchangeable magnetic disks
 The internet
 Local computer networks

 Antivirus Programs:
To protect a computer from virus attacks, users should install an antivirus program and keep it updated by
purchasing revisions or upgrades to the software. An antivirus program protects a computer against
viruses by identifying and removing any computer viruses found in memory, on storage media, or
incoming files.

Figure 4.8. Example of Antivirus Programs

Antivirus programs scan for programs that attempt to modify a computer‘s start-up files, the operating
system, and other programs that normally are read from but not modified. In addition, many antivirus
programs automatically scan files downloaded from the web, email attachments, opened files, and all
types of removable media inserted in the computer or mobile device.
Antivirus has a database of all known viruses. Each time you can check a single file or the hard disk for
viruses, the anti-virus checks the file and compare it with the definition of viruses in its database. The
database of the definitions of viruses must be updated regularly. If an antivirus program identifies an
infected file, it attempts to remove the malware. If the antivirus program cannot remove the infection, it
79
often quarantines the infected file. Quarantine is a separate area of a hard drive that holds the infected file
until the infection can be removed. This step ensures other files will not become infected. Quarantined
files remain on your computer or mobile device until you delete them or restore them. Most antivirus
programs also include protection against other malware, such as worms, trojan horses, and spyware. When
you purchase a new computer, it may include a trial version of antivirus software. Many email servers also
have antivirus programs installed to check incoming and outgoing email messages for viruses and other
malware.

Some of the most popular antiviruses are:

– Bitdefender 35 Antivirus
– Kaspersky36 Antivirus
– Symantec Norton37 Antivirus
– Webroot38 SecureAnywhere Antivirus
– McAfee39 Antivirus Plus
– Avast40 Antivirus
– Panda41 Antivirus
– AVG42 Antivirus
– Microsoft Defender43 Antivirus

35
https://www.bitdefender.com/
36
https://me.kaspersky.com/
37
https://us.norton.com/
38
https://www.webroot.com/us/en
39
https://www.mcafee.com/en-us/index.html
40
https://www.avast.com/
41
https://www.pandasecurity.com/
42
https://www.avg.com/
43
https://www.microsoft.com/en-us/windows/comprehensive-security

80
Chapter Five
Applied Lab Material
5.1 Microsoft Windows

 Control Panel
 create an account,
 do defragmentation,
 view computer specification,
 uninstaller programs and features
 Network and Sharing Center
 Internet options
 Create Files
 Create Folders
 Copy Files
 Compress Files and Folders
 Hide/ Show Files and Folders
 Search for Files
 Alt+Tab Keyboard
 File Explorer
 Multiple Desktops
 Windows Firewall

81
5.2 Microsoft Word

 Text format.
 Numbering/ bullets
 Page border.
 Insert page numbers.
 Header and footer.
 Insert picture/from a file, auto shapes
 Insert equations.
 Page design (themes)
 Watermark
 Page layout (columns)
 create a table of contents/ create a table of figures
 Insert table / table format
 Templates
 Insert Hyperlink, comments
 Insert page break

82
 Insert references (footnote)
 Review
 View

83
5.3 Microsoft Excel

 Page Format
 Add/ Delete Sheets
 Cell Format
 Data Validation.
 Conditional Format
 Filter And Sort
 Functions (Sum, Average, Max, Min, Count, If, SUMIF, COUNTIF, AVERAGEIF,
SUBTOTAL (outline), DATE, AND).
 Create Manual Equation (Function) As: (X5 +2y)/5xy
 Insert Charts

84
5.4 Microsoft PowerPoint

 Slide Format
 Insert Picture, Table, Chart, Shapes, SmartArt, WordArt, Date & Time, Object, Slide
Number
 Header and Footer
 Insert Slide/ Delete Slide
 Slide Design
 Slide Background
 Animation
 Transaction
 Insert Action
 Insert Sound and Video, Screen Recording.
 Slide Master (view)

End of the Course Summary


Reference:
1. Discovering Computers, 11th Edition, by Larry and Nancy Long

85

You might also like