0% found this document useful (0 votes)
35 views24 pages

Introduction To Computers

Uploaded by

Ratna Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views24 pages

Introduction To Computers

Uploaded by

Ratna Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Introduction to

Computers and
the Internet
2
Lesson 1
What Is a Computer?
n Personal Computer Hardware
n Peripherals
n Bits and Bytes
n Computer Speed and MHz and GHz
n Computer Types

Lesson 2
Software
n Obtaining Application Software

Lesson 3
The Internet
n Finding Information on the Web
n Evaluating Information on the Web

Lesson 4
Understanding E-mail
n Sending and Receiving E-mail and Other Forms of Digital Communication
n Dangerous E-mail

Lesson 5
Types of Computer Crimes
n Copyright Laws
n Acceptable Use Policies

Lesson 6
Computer Workers

3
4 Introduction to Computers and the Internet

WORDS TO KNOW
BIOS
Lesson 1
The basic input-output
system is the component
that checks your
computer’s components
and causes the operating
system to start.
CMOS
What Is a
Computer?
Complementary Metal
Oxide Semiconductor is a
chip whose configuration
is controlled by a setup
program.
CPU
The Central Processing
Unit is a chip, located on
the motherboard, which n Computers are a vital part of today’s world. They make controlling and
performs mathematical using devices faster, easier, and more accurate. They are in everything from
calculations and logic automobiles to washing machines.
functions.
n A computer is a machine that receives input (data), performs processing, and
Hardware produces output (information).
Refers to all the pieces n Uses of the computer can be viewed as variations of input–processing–output.
of physical equipment This is as true of complex tasks, like computer simulations of weather events, as
that make up a computer it is of common ones, like typing a letter. Some examples of input–processing–
system. output are given in the following table.
Input n If the input contains errors, the output will contain errors. Sometimes computers
Data entered into a break down. But most “computer errors” result from human errors—bad data or
computer. bad programming.
n Think of examples of input–processing–output from your own experience that
you might add to the table.

INPUT PROCESSING OUTPUT


Text typed on the keyboard Formatting and preparation for Letter, book report, memo, story
printing by word processing
program
Text typed on the keyboard and Text formatting, picture placement, Newsletter, advertisement, flyer
pictures inserted from disk drive or sizing, and scaling in desktop
downloaded from the Internet publishing program
Text and numbers typed on the Calculations performed in Banking record, budget, grade book
keyboard spreadsheet program
Text and numbers typed on the Formatting into tables, sorting, Address book, membership list,
keyboard searching, selection of data in product sales report, employee
database program information
Temperatures, wind velocities and Calculations based on Weather forecast
direction, air pressure readings, meteorological research and
frontal boundaries, humidity assumptions and comparisons with
readings, jet stream location and a database of weather patterns
speed
Introduction to Computers and the Internet 5

Personal Computer Hardware WORDS TO KNOW


LCD
n Hardware refers to all the pieces of physical equipment that make up a computer Liquid crystal display
system. The computer hardware you are most familiar with is probably the technology, similar to that
personal computer or PC. used in some television
sets, is used to display
n A PC includes several pieces of hardware or devices:
input on the monitor.
l The power supply is a device that distributes electricity to the various
components of the system. The electrical cord runs from the power supply Monitor
to an electrical outlet. The power supply also includes a fan that cools the An output device that
internal components. displays input and the
results of processing.
l The motherboard is the largest circuit board inside your personal computer.
It contains millions of electronic circuit elements on chips of silicon. These Motherboard
chips store programmed instructions in active memory (see RAM on the The largest circuit board
next page). They also execute the instructions stored in other chips. The inside your personal
motherboard has expansion sockets or slots (known as the bus, see the next computer.
page). These slots permit installation of additional circuit boards.
Output
l On the motherboard are some special ROM (Read-Only Memory) chips that Results of processing.
contain the BIOS (Basic Input/Output System). The BIOS is the component
that checks your computer’s components and causes the operating system to peripheral
start. A device connected to
the computer through the
bus.
Personal computer (PC)
Any general-purpose
computer whose size,
capabilities, and original
sales price make it useful
for individuals.
Power supply
A device that distributes
electricity to the various
Figure 1.1 A motherboard is like the brain of your computer. components of the
system.
Processing
Actions that computer
l To work properly, the BIOS needs to know the configuration of your
programs perform on the
computer’s hardware. This hardware information is stored in the CMOS
input.
(Complementary Metal Oxide Semiconductor)—
a chip whose configuration is controlled by a setup program. The CMOS RAM
includes information about the following components: Special chips connected
n System date and time to the CPU, is the area
where programs and data
n Mouse
reside while in use.
n Keyboard
ROM
n Hard drive (number of drives and their sizes)
Read-Only Memory
n DVD±R/W drive chips that contain the
BIOS (Basic Input/Output
System).
6 Introduction to Computers and the Internet

l The settings are permanently saved in a 64-byte l RAM (Random Access Memory), special
piece of CMOS. The CMOS power is supplied chips connected to the CPU, is the area where
by a small battery, so its contents are not lost programs and data reside while in use. When
when the PC is turned off. you start an application (Microsoft Word, for
l The CPU (Central Processing Unit) is a example), the computer places the program into
chip, located on the motherboard, which RAM. If you then open a document, it also loads
performs mathematical calculations and the document into RAM.
logic functions (determining if one value is n When you save a document, the CPU copies
greater than another, and so on). The CPU is the document from RAM to permanent stor-
often referred to as the brain of the computer age. When you close a document, the CPU
because it administers the functions of the other frees up the memory that was occupied by
components. When users say their machine has the document. When you close a program,
a Core 2 Duo processor, they are talking about memory is also freed up.
the CPU chip. n RAM holds data only so long as it has elec-
tricity. If the machine is turned off or loses
power, information in RAM is lost. That’s why
any changes not saved before the machine
is turned off cannot be retrieved.
n In modern PCs, RAM capacity is measured
in gigabytes. (See the section “Bits and
Bytes” for a definition of bits and bytes.) In
general, the more RAM your computer has,
the better it is able to run programs that re-
quire processing power.

Figure 1.2 The Core 2 Duo processor by Intel is a


widely used CPU chip.

l The bus is the main communication path,


or series of paths, on the motherboard that
connects the system’s components with
the CPU. The bus also connects external
components through expansion slots. These
slots can contain plug-in cards that let the
computer communicate with other devices, such
as monitors and printers.

Figure 1.3 The size and type of RAM varies on


different computers.
Introduction to Computers and the Internet 7

Peripherals
n A peripheral is a device connected to the computer l The mouse is an input device that you use to
through the bus. Many essential components of control a pointer that displays on the monitor. A
a PC system are peripherals, including monitors, wide variety of mouse pointing devices exists.
keyboards, and disk drives. Printers and scanners Some are moved over a surface and may be
are also peripherals. wireless; some let you use your thumb or fingers
n Some peripherals, because of their small size or to roll a ball that moves the pointer; others,
delicate nature, are mounted directly inside the especially on laptop computers, work when you
computer case. Video boards, inboard modems, drag your finger across a small screen called a
and sound cards are devices inside the computer touch pad.
that depend on the bus.
n Peripherals are often divided into two categories—
input devices and output devices. Some
peripherals serve as both input and output devices,
so the categories are not exclusive. Some common
peripherals and their functions are described below.
l The monitor is an output device that displays
input and the results of processing. Most
monitors on PCs and laptops use liquid crystal
display (LCD) technology, similar to that used in
Figure 1.5 This mouse is typical for use with
some television sets. (In fact, some computers
desktop computers.
can use TV sets as monitors.)

Regardless of the mouse type, when the


pointer is located at the spot where you want
the software to respond, you click the left button
once (click), the right button (right-click), or
the left button twice rapidly (double-click).
Wheel mice, such as the Microsoft IntelliMouse,
include a wheel between the two buttons. The
wheel can be used for scrolling and zooming in
Microsoft Office 2010.
The mouse pointer changes appearance to
indicate that the system is working. These
appearance changes are described in later
exercises.

Figure 1.4 LCD technology is used for most PC


monitors (top), as well as laptops (bottom).
8 Introduction to Computers and the Internet

l The keyboard is an input device with l Modems and other telecommunication


alphabetic, numeric, and function keys in a hardware (when used with the appropriate
standardized layout. (Some keyboards change software) serve as sources of both input and
the location of certain keys and include keys output. Telecommunication gives you access to
that other keyboards do not have.) The special the world outside your personal computer—to
keys (such as the Function, Ctrl (control), and such services as MSN and that vast network
Alt keys) are used alone or in combinations to of computers known as the Internet or World
cause programs to perform actions. Wide Web. A modem may be installed inside
l Most computers contain a hard disk (or hard the computer case (an internal modem) or
drive) and an Optical drive, such as a DVD the modem may be connected through a
drive. DVDs can be removed and carried from communications port (external modem).
one place to another; hard disks are installed l Printers, next to monitors and disk drives, are
inside the computer and are not considered the most common output devices. A wide variety
portable. of printer types is available:
Disk drives are identified by letter. The typical n Laser printers use copier-like technology to
personal computer has an optical drive spread patterns of toner and affix it to paper
identified as D:. It probably also has a hard drive using heat.
known as C:. n Ink Jet and Bubble Jet printers spray ink
Hard disks and DVDs and their drives serve as onto paper to produce the output.
both input and output devices. n Plotters use a needle to draw on paper; they
n When output such as a letter is stored are frequently used by engineers and archi-
(saved) on a hard disk or DVD, the disk is an tects to produce schematic drawings.
output device.
n When you retrieve data from a disk, it serves
as an input device.

Figure 1.7 An inkjet printer is a good choice for


printing photographs.

l Scanners, which let you create files from


pictures, drawings, or text, are input devices.
Figure 1.6 This hard disk drive would be
installed inside of a computer. l Voice input devices (microphones) are
becoming more common as hardware and
software makers improve their efficiency.
Introduction to Computers and the Internet 9

Bits and Bytes


n Your personal computer operates through a vast n A byte is the most common measurement of
number of on/off switches called binary digits or storage in the digital computer.
bits (bit is short for Binary digIT). All the reception
of input, processing, and output are accomplished
by bits that are either turned on or turned off.
Size Number of Bytes
Kilobyte 1,024 (8,192 bits)
n Bits are grouped together into bytes, a string of 8
1 thousand bytes
bits that can be translated by the computer into a
letter or an action. For example, when you press Megabyte 1,024,000
the capital letter A on the keyboard, a signal from 1 million bytes
the keyboard passes to the computer and gets Gigabyte 1,024,000,000
translated into a string of 8 bits that are represented 1 billion bytes
like this: 01000001. Each 0 represents a switch that Terabyte 1,024,000,000,000
is turned off and a 1 represents a switch that is 1 trillion bytes
turned on.

Computer Speed and MHz and GHz


n The speed of your personal computer is measured l Size of RAM. If RAM is too small for the kind of
in megahertz (MHz) or gigahertz (GHz). A Hertz is processing being performed, the system may
a single oscillation (up-and-down movement) per place some of the data or program on the hard
second of an electromagnetic wave. When coupled drive temporarily while processing other data.
with the prefix mega, it refers to millions of wave If your machine is slow, watch the light that
oscillations per second; when used with the prefix indicates that the hard drive is in use. If it lights
giga, it refers to billions of wave oscillations per up and goes out frequently while your program
second. is processing, your computer may not have
n In the computer, the activity of the CPU microchip enough RAM. Most recent computers come with
is coordinated by a clock that is part of the chip. 2 or more GB of RAM, but a computer that is
Thus, a 400 MHz chip has a clock that receives primarily for games or computer-aided design
electricity and switches on and off 400 million times may profit from more RAM.
per second. It is twice as fast as a chip that has a l Speed and capacity of the hard disk. If the

200 MHz clock. Similarly, a 1.2 GHz chip is three hard disk does not take advantage of the latest
times as fast as a chip with a 400 MHz clock. technology or is filled nearly to capacity, the
n The clock speed of your computer describes how computer’s efficiency will be impaired.
quickly computations are performed in RAM. A l Speed of the bus. If the CPU operates at

personal computer’s overall speed and efficiency, 1.6 GHz and the bus at 50 MHz, the bus
however, depend not only on the speed of the CPU slows the computer down when the CPU is
but also on the following: communicating with cards in the bus slots. More
recent bus speeds, however, reach 1,333 MHz
and more.
10 Introduction to Computers and the Internet

Computer Types
n The computer with which you are most familiar, and Servers may still control as much as 90% of the
the one with which you will probably have the most data major businesses rely on for their critical
direct contact throughout your life, is the personal applications, such as inventory, manufacturing,
computer. But you will have indirect contact with billing, and other accounting activities. For such
other, larger computers. applications, servers offer superior performance,
n If you make a career in science, higher reliability, and security, and they are usually easy to
mathematics, advanced computing, or military or expand as the business grows.
industrial research, you may use a supercomputer. n If you work at a telephone company, you may
Supercomputers are the fastest problem solvers use a PC to gain access to the large amounts of
available. They work at extremely high speeds. information stored under the control of a server.
Often, they process data in “parallel,” breaking a You may also use a “dumb” terminal (keyboard and
complicated problem into smaller units, each of monitor) directly connected by a network to the
which is handled by a part of the computer, then server. The terminals are called “dumb” because,
combined to produce the final result. (Some recent unlike PCs, they have no processing capabilities
“supercomputers” are made from a large number of of their own but simply give users direct access to
personal computers linked together because each server computing capacities.
PC can function like a part of a large computer.) n Personal computers come in a wide variety
of styles and sizes. Some are designed for the
desktop, with a cathode ray tube or LCD monitor
separate from the rest of the computer.
n Laptop computers and Personal Digital
Assistants (PDAs) grow lighter and sturdier with
each new version. Laptops are compact with built-
in liquid crystal display monitors that provide crisp
displays. Most hand-held computers are used
for a specific purpose, such as taking notes and
sending/receiving messages. Their portability
makes them ideal for salespeople and other
business professionals who travel a great deal.
n Tablet PCs, such as the Apple iPad, are another
type of portable computer that use touchscreens to
input and manipulate data.

Figure 1.8 Servers are used in many businesses


to manage large amounts of data.

n Servers are machines that many large companies


use to manage the huge amounts of data required
to keep their operations running. For example, your
local telephone company gathers usage data from
a large number of telephone users, calculates the
charges, and produces telephone bills. For this
huge undertaking, the company requires a machine
that can handle a large database, process rapidly, Figure 1.9 Though not as powerful as laptops,
and print quickly. While many personal computers tablet PCs are a convenient way to keep in touch
manage several gigabytes (billions of bytes) of when you’re traveling.
storage, server computers control and process
terabytes (trillions of bytes) of storage.
Introduction to Computers and the Internet 11

Lesson 2
WORDS TO KNOW
Application
The term application

Software comes from the idea that


a group of programs work
together to apply the
abilities of the computer
to a specific task, such
as word processing or
weather forecasting.
Application software
n Software refers to the instructions that allow a computer to run and act on the Programs that allow you
data that is input. Software is usually divided into two types: operating system to make the computer do
software and application software. Software and programs mean the same what you want, such as
thing. write a letter or browse
n Operating system software includes instructions that allow a computer to run. the Internet.
BIOS startup involves checking for equipment attached to the computer, such Boot-up
as the keyboard, to ensure that it is working and can communicate with the Computer startup
computer’s operating system. Operating system startup completes the boot- process.
up (computer startup) process and prepares the computer’s components and
environment for actual use. Unix, Linux, Mac OS, Windows XP, and Windows 7 Commercial software
are examples of operating systems. Copyrighted software
that you must buy before
n Application software includes programs that allow you to make the computer
using it.
do what you want—write a letter, browse the Internet, draw a picture, create a
computer program. Freeware
n Application software depends on the operating system. It uses operating system– Copyrighted software
specific instructions to tell the operating system to do something. Because given away for free.
application software interacts with the operating system in this way, applications Installed
designed for one operating system (Windows, for example) cannot run on a Prepared to run on a
different operating system (Unix or Mac OS, for example). computer.
n Application software can be educational in nature, such as a program that
Programs
teaches you how to type. Video games are examples of entertainment software.
Means the same thing as
n Software can also be used to communicate. A class project might require you software. (See below.)
to write a report and give a presentation. A word processing application like
Microsoft Word and a slideshow application like Microsoft PowerPoint would be Public domain software
the right choices in this case. Program that can be
shared, given away, or
even altered to meet
certain needs.
Software
The instructions that
allow a computer to run
and act on the data that
is input.
12 Introduction to Computers and the Internet

Obtaining Application Software


n Some application software is already loaded on n Application software must be installed, or prepared
new computers. You can also obtain additional to run on a computer, before it can be used. You
software in multiple forms. must copy it from a location such as a disk, a CD,
n Companies own the copyrights to the application or the Internet to the computer’s hard drive. Most
software they sell to the public. This prevents you programs come with an installation, or setup,
from illegally copying it to sell it to others, giving program that prompts you to load the software onto
it away, or sharing it. Commercial software is the computer. Companies that make commercial
copyrighted software that you must buy before software often provide printed or online guides, or
using it. telephone support, to help solve users’ problems.
n Some companies give away their copyrighted
software for free. This is known as freeware. The
companies allow users to install the program as
long as they do not resell it to other people.

Figure 1.10 There are many Web sites from


which you can download freeware.

n On occasion, program authors allow you to use Figure 1.11 Whether you download software
programs, share them, give them away, or even from the Internet, or purchase software from a
alter them to meet certain needs. This is called store, it will still need to be installed correctly on
public domain software. Beware, the quality of your computer before may use it.
these programs can vary widely, and they may
contain more errors than other types of software.
Introduction to Computers and the Internet 13

Lesson 3 WORDS TO KNOW


Boolean search
Operators such as AND,
OR, or NOT to link the
keywords in the search
box.

The Internet Cable modem


Needed for Internet
access through cable.
Dialup connection
Internet access between
a standard phone line
and a modem.

n The Internet is the global system of interconnected computer networks that is Digital Subscriber
used to share data and information. The Internet can be used for many different Lines (DSL)
things, from reading and sending electronic mail (e-mail) to storing data and Require a special
surfing the World Wide Web (WWW or Web). telephone line in order to
access the Internet.
n There are different ways to connect to the Internet. The reasons for various
options are availability, location, speed, and price. E-commerce
l The least expensive way to get online is to use a dialup connection The use of
between a standard phone line and a modem. These connections are telecommunications
called “dialup” because your computer must connect to the Internet by networks or the Internet
using a telephone number to contact a server. When the session is over, the to conduct business.
connection is broken. E-mail
l Some Digital Subscriber Lines (DSL) require a special telephone line. Electronic mail sent
Integrated Services Digital Network (ISDN) lines require a special ISDN and received over the
adapter and modem. As a result, both services cost more than regular phone Internet.
service. Furthermore, DSL and ISDN are not available in all areas.
Internet
l Cable television companies offer Internet access through cable modems. Global system of
This access is at speeds much faster than dialup modems. You need a interconnected computer
network card in your computer, a cable modem, and cable access. Satellite networks that is used
access is also very fast for downloading files to your computer, but it requires to share data and
a phone line and a modem for sending files to outside users. information.
n Multiple computers can be connected to one modem through a router. The
Integrated Services
router takes the Internet signal from the modem and splits it up so that multiple
Digital Network (ISDN)
computers can access it at once. Multiple computers connected together this
Internet connection that
way is known as a network.
requires a special ISDN
adapter and modem.
Link
A connection between
two different Web pages.
Network
Multiple computers
connected to one modem
through a router.

Figure 1.12 Linksys and Netgear are companies that make commonly used
routers. Does either one look like what you might have in your home?
14 Introduction to Computers and the Internet

WORDS TO KNOW n Since many devices that connect to the


Internet are portable, wireless Internet
Router
access is now very common. A wireless
Takes the Internet
network setup consists of a modem
signal from the modem
connected to a wireless router. The router
and splits it up so that
broadcasts the signal to any device in its
multiple computers can
coverage area. Devices must contain a
access it at once.
wireless card that can receive the signal
Search engine broadcast by the router.
Designed to search for n Since anyone with a wireless device can
information on the World access a network if they are in range,
Wide Web. most wireless networks are protected by
Subject guide some form of network security. This usually
Pages on the Web comes in the form of a password needed
grouped together under to connect your device to the wireless
network. Figure 1.13 Wireless devices
headings like Careers,
that can connect to a home
News, or Travel. n The Web consists of hundreds of millions
network include gaming
of different pages that are linked together.
Web browser platforms (such as Playstation),
A link is a connection between two
Used to access pages on computers, printers, faxes,
different Web pages. Clicking on a link will
the Web. smartphones, and tablet PCs.
transfer you from the current page to the
Wireless Internet destination page.
access n To access pages on the Web, users must
Connecting to the use a Web browser. A browser is a software application designed to connect to
Internet without being and display pages from the Web. Examples of browsers are Microsoft Internet
plugged into the router. Explorer, Mozilla Firefox, and Google Chrome.
Wireless router n One popular type of Web site is an e-commerce site like amazon.com or zappos.
Broadcasts the Internet com. E-commerce is the use of telecommunications networks or the Internet
signal to any device in its to conduct business. E-commerce is not new; companies have used wide area
coverage area. networks, or WANs, to do business for years.
World Wide Web n Thanks to the Internet and affordable computers, e-commerce has become
A system of interlinked accessible to anyone who has an Internet connection and a Web browser. More
hypertext documents and more Internet users are researching products, shopping, opening bank
accessed via the Internet. accounts, and trading stocks online. Many businesses realize that they may
lose customers if they do not have an online presence. In 2008, $141 billion was
spent shopping online. A site like amazon.com allows users to search for an item,
browse to find the right match, and read reviews that other buyers write about
how good an item is. Payment is made with a credit card, debit card, or online
payment service like PayPal.
n The Internet is useful for solving many real-life problems. When traveling, flight
information can be looked up in advance. That way, if your plane is cancelled,
instead of wasting a trip to the airport, you can reschedule your flight from your
own home. And, you can check what the weather will be like and if you were
traveling to another country you can find out what the current money exchange
rate is.
Introduction to Computers and the Internet 15

Finding Information on the Web


n Because the Web is so vast, it can be hard to n You can improve your chances of getting
locate information on a specific topic. Subject worthwhile results by conducting a Boolean
guides and search engines can help focus that search. To conduct a Boolean search, type an
task. operator such as AND, OR, or NOT to link the
n Many Web sites offer subject guides to the Web, keywords in the search box. For example, if you use
pages grouped together under headings like the word telescope as your keyword, the search
Careers, News, or Travel. These guides include only engine will list pages containing information about
pages that provide useful information about the every type of telescope. But if you are primarily
subject. interested in reflecting telescopes, you can use the
Boolean search telescope AND reflecting to see
n If you cannot locate what you are looking for in a
pages that include both terms and ignore pages
subject guide, use a search engine such as Bing,
that include only one of them.
Google™, Lycos®, or HotBot®. Type one or two
keywords that describe the subject you’re looking
for, and then click Search. The search engine
will display a list of Web pages that contain the
keywords you specified. For example, if you type
the word dog as your keyword, the search engine
will list Web pages that contain that word.

Evaluating Information on the Web


n You can find excellent and reliable information on Is the information presented logically and
l

the Web. As with print references, you can also find thoughtfully?
some Web pages that are biased, objectionable, l Does the language seem balanced and
misleading, inaccurate, or dangerous. Web objective, or is it biased and argumentative?
sites from universities, governments, and news
l What is the purpose of the page? Is the author
organizations are usually reliable, while a page
trying to sell you something or convince you
without an author or sources can be unreliable.
to believe something? Who benefits if the
n Verify any information you find by checking another information is accepted?
source. The freedom of the Web leads to a greater
l Who provides the server for publishing this Web
potential for error, since pages may not be checked
site? Who pays for the page?
for accuracy of the information they contain. Ask
l Does the page show when it was created or
yourself these questions about any information you
find on the Web: revised? Is the page up to date?
l Who is the author of the page? Is that author n Internet searches can help you find all sorts of
qualified to write about this topic? information. Research for a class project, help with
your computer, or finding a birthday gift for a friend
l Does the author indicate the source of the
can all be done using Internet searches.
information presented?
l Does the information appear to be accurate?

Are there misspelled words and bad grammar


that might indicate poor quality of content?
16 Introduction to Computers and the Internet

WORDS TO KNOW
alias
Lesson 4
A nickname for an e-mail
recipient.
attachments

Understanding
Anything sent with an
e-mail message.
blogs

E-mail
Short for weB log, a
page where a user writes
something for anyone on
the Internet to read and
comment on.
e-mail
Allows people to send
messages quickly and
easily to anyone with an
e-mail address. n E-mail allows people to send an unlimited number of messages quickly and
easily to anyone with an e-mail address. It is also less expensive than standard
e-mail address mail and voice, fax, and telephone messages. To use e-mail, all you need is a
Includes the mailbox computer, an Internet connection, e-mail software, and an e-mail account. E-mail
name (the part of the also lets you attach files to a message. Anything sent with an e-mail message
address before the @ is called an attachment. Common attachments include word-processing
symbol) and the server documents, spreadsheets, photos, artwork, and videos.
address.
n All e-mail addresses have two parts. The mailbox name is the part of the
e-mail client address before the “at” symbol (@) that identifies the user. The server address
Program that lets you follows the symbol. It names the domain name of the computer that houses
create, send, receive, and the mailbox. An e-mail server is a computer, operated by your Internet service
manage e-mails. provider (ISP), that handles three key jobs:
e-mail etiquette l accepts incoming messages
Following proper l sends outgoing messages
convention and courtesy l delivers incoming messages
in online correspondence.
n When you send a message, it goes
e-mail server from your computer to your ISP’s
A computer, operated e-mail server, which examines
by your Internet service the address of the recipient—the
provider (ISP). person to whom you are sending the
message. If the recipient uses the
e-mail viruses
same ISP as you do, the message
Programs that can
is delivered directly to the recipient’s
destroy data and cause
mailbox. If the recipient uses a
network problems.
different ISP, the message is sent
social network to that server through the Internet.
Allows users to connect The receiving server accepts the
with others on the Internet. message and delivers it to the
recipient’s mailbox. Figure 1.14 Every e-mail address has
texting
two basic parts—a mailbox name and
People sending over
a server address.
a network brief written
message with their
mobile phones or other
portable device.
Introduction to Computers and the Internet 17

Sending and Receiving E-mail and


Other Forms of Digital Communication
n Services such as Google Gmail, Microsoft Hotmail, n Instead of typing a complete address, you may be
as well as companies and universities, provide able to type an alias, or select it from a list. An alias
users with an e-mail address. Letters can be typed is an easy-to-remember nickname for the recipient,
on a computer and then sent to somebody’s e-mail such as Chris_R. The recipient’s name or address
address using these services. appears in the To: line of the message form.
n To send or receive e-mail, you use an e-mail Similarly, if you want to send a copy of the message
client, which is a program that lets you create, to other recipients, you can add their names or
send, receive, and manage e-mail messages. You addresses to the To: line or place them in the Cc:
may get the program from your ISP, as part of a line. (The characters Cc stand for “carbon copy.”)
productivity suite, or with a Web browser. n Next, fill in the Subject line. The Subject line gives
n To compose a new message, you click a button the recipient an idea of the message’s content and
within the e-mail client. The client displays a form may help the recipient decide whether to open it or
for you to complete. First, you must specify the delete it. Then, write the text message. You can add
message’s recipient. Depending on your e-mail attachments by clicking a button and then clicking
client’s features, you may select someone’s name the name of the file you want to attach to the e-mail.
from an address book. You may also type the e-mail Finally, click Send.
address, which can be a name or a combination
of letters and numbers. For example, the e-mail
address for Chris Rodriguez might be chris_
[email protected] or [email protected].

Send button
Click here
to create
a new Recipient’s address
message.
Subject line
Click here
to view
messages
in the Message
Inbox.

Figure 1.15 Creating an e-mail message with


Google’s Gmail.
18 Introduction to Computers and the Internet

n Suppose you received an e-mail message inviting n E-mail messages can also contain file attachments,
you to a party. You can respond to the invitation by such as Word documents, Excel spreadsheets,
clicking Reply, which responds only to the person and digital photos. The steps to attach a file to an
who sent you the message. You can also click e-mail message varies depending on the e-mail
Reply All, which responds to all the people who client that you use, but basically you click an attach
received the original message. Several things occur file icon—often the icon looks like a paperclip—and
when a response is prepared: then browse your computer for the file that you wish
l The client displays a reply form with the original to attach.
sender’s address shown in the To: field. n Use proper e-mail etiquette when communicating
l The subject field may show Re: in front of the over the Internet. Think of an e-mail like a regular
subject of the original message. (Re means letter. Open with a salutation such as “Dear Mr.
“regarding.”) Smith,” or “Hello Jane,” and end with a closing like
“Sincerely.” Writing in all capital letters is rude and is
l The original message is copied into the body
considered the equivalent of shouting at someone.
of the reply. Most e-mail programs give you the
Also, avoid abbreviations and slang such as “LOL”
option of including the original text in your reply.
and “ROFL.” These would never be included in a
l You can type your reply above or below the letter, and should also be left out of e-mails. Be sure
original text. to always include a brief subject line. Make sure to
n When you receive a message, you can pass it spell check your e-mail before sending.
along to someone else. This is called forwarding n A social network, such as Facebook, allows users
a message. For example, you could forward the to connect with other people on the Internet. Social
party invitation to your parents to ask them if you networks consist of individual pages for each user.
can attend. They will receive the message from you, The users can enter information about themselves,
but the Subject line may include the characters Fw: such as interests, work or school info, even
before the subject text to show that the message pictures. The user can then establish connections
has been forwarded. You can add your comments with other people on the social network,
before the original message’s text. exchanging messages and other communications.

Figure 1.16
Facebook is a popular social networking site. It allows users to enter personal information
about themselves, and customize their security settings to keep that information safe.
Introduction to Computers and the Internet 19

n Discussion boards and blogs are other ways n A blog, short for weB log, is a page where a user
to communicate over the Internet. A discussion writes something for anyone on the Internet to read
board is a place where different people can leave and comment on. Blog topics range from news
messages about a specific topic. Users can to cooking to personal stories. If your class has a
respond to each other, start new discussions, and blog or discussion board, it could be a good way to
leave links to Web sites with more information. ask questions about assignments or get help on a
n Some discussion boards include chat features so subject that you are having a hard time with. What
that you can communicate with other people in you post to a blog is for all to see, so be sure that
real-time, rather than post a message and wait for a you proofread your work and only post relevant
response. When chatting online, proper conduct is information.
essential. n Another form of digital communication is texting.
With texting, people send over a network brief
written message with their mobile phones or
other portable device. With texting, like with other
forms of communication, proper protocol must be
followed. That includes treating people with respect
and using appropriate language.

Dangerous E-mail
n Some e-mail messages can damage programs and
data. E-mail viruses are programs that can destroy
data and cause network problems. Most e-mail
viruses are sent as attachments to messages.
When the recipient opens the attachment, a script
or program can launch. This program can modify
or destroy data and programs, or change the
computer’s settings.
n Not all e-mail viruses are distributed as
attachments. Most e-mail programs can create
and open messages in HTML format. A virus
programmer can insert virus code directly in an
HTML-format message. If you receive an infected
message in HTML format, all you have to do is view
the message in your e-mail program. The virus then
infects your computer.
n Nearly all e-mail viruses copy themselves and then
send themselves to everyone in your address book.
When recipients see a message from you, they
think it’s safe to read. They open the message, and
the destructive process repeats itself.
n Beware of any e-mail attachment that has an .EXE,
.BAT, .COM, or .VBS extension at the end of its file
name. These files are usually programs that can
be used to launch a virus. If you’re uncertain of
an attachment, delete it and report it—don’t open Figure 1.17 It is important to have up-do-date
it! Running up-to-date virus protection software to virus protection software.
scan e-mail for harmful attachments is an important
safeguard.
20 Introduction to Computers and the Internet

WORDS TO KNOW
Copyright
Lesson 5
Gives the creator of an
original work exclusive
rights to it.

Types of
Ethics
A set of moral principles.
Fair use

Computer Crime
Means you can use a
portion of a copyrighted
work without permission
in certain cases.
Licensing infringement
Unauthorized distribution
of software.
Macro virus
Takes advantage of the n The Internet has opened the door to new kinds of crime and new ways of
macro languages in carrying out traditional crimes. Computer crime is any act that violates state or
applications, such as federal laws and involves using a computer. The term cybercrime often refers
word processors. specifically to crimes carried out by means of the Internet.
Phishing n Whether you’re working with a small home network of just two computers or a
When criminals try to lure large office with hundreds of networked computers, it’s important to understand
victims into giving them what kinds of threats your network may encounter. Regardless of the network
passwords, bank account size, being connected to a network opens up the risk of exposure to a virus or
numbers, or credit card computer attack.
details. n There are many different kinds of computer crime. Some of them require
Plagiarism criminals to have a deep knowledge of programming.
Using material without n A virus is a program that performs one or more tasks that the user doesn’t
crediting the source. expect. Some viruses are designed to do real harm, such as delete files, slow
down network traffic, disable programs, or allow an unauthorized person to
Scam
access the victim’s computer.
A trick to get your money.
n Most viruses are designed to hide themselves, avoiding detection by the victim
Software piracy for as long as possible. If a virus is copied to your computer, the machine is said
The illegal copying of to be “infected.” A virus can infect your computer in a number of ways. You might
computer programs. receive an infected disc from a friend. You might download an infected file from
Trojan horse a Web site or receive it attached to an e-mail message. Most viruses can affect
A program that does only the operating system in which they were written. However, they can spread
something useful but from one computer to another. It is important that you always run antivirus
also, hidden from software, such as Norton, on your computer.
view, does something n A macro virus takes advantage of the macro languages in application programs,
destructive. such as word processors or spreadsheets. Macro viruses launch themselves
when an infected file is opened. These viruses are different from normal viruses
Virus
because they can work on different operating systems.
A program that performs
one or more tasks that
the user doesn’t expect.
Worm
A computer virus
commonly hidden inside
another program.
Introduction to Computers and the Internet 21

n The most common computer viruses work by hiding n A special kind of scam is called phishing. Phishing
inside another program. Although a worm doesn’t criminals try to lure victims into giving them
need to be hidden within another program, worms passwords, bank account numbers, or credit card
are commonly hidden inside document files in the details. For example, in a typical phishing scam,
form of macros. Most worms make many copies of a thief sends an e-mail message that looks as if
themselves, using up the victim’s disk space and it is from your bank. The message may say that
memory. They spread to other computers through the bank needs you to verify or update account
network connections and by e-mail. The notorious information. When you click on a link within the
I Love You virus of the year 2000 created e-mail message, you are not taken to the real Web site
messages and mailed itself to other computers of the bank. Instead, you link to a site that has
using the e-mail addresses found on the victim’s been created to look like the bank’s Web site, but
machine. has a slightly different URL or Web site name.
n A Trojan horse is a program that does something You are then asked to enter your account number,
useful but at the same time, hidden from view, password, and personal information number (PIN).
does something destructive. It can damage the The thief captures the information you enter and
system it enters, including erasing all the data can then steal from your account. To avoid phishing
on a hard drive. A Trojan horse might come in scams, do not link to any site from within an e-mail
the form of a simple game. The victim plays the message, and simply delete a message that asks
game; however, the program does something else you to update account information.
in the background, such as opening a port on n One kind of computer crime is very widespread.
the computer. Someone can then use this port to It is called software piracy, the illegal copying of
access the computer through the Internet. computer programs. One business group estimates
n Some computer crimes have nothing to do with that about one third of all software in use is pirated.
programming. Criminals use a computer to commit Most programs that people buy are licensed only
theft. Internet advertisements and e-mail messages to the purchaser. In other words, it is illegal for you
might claim that you can make huge sums of to copy such a program and give it to a friend. It
money with very little effort. According to these ads, is also illegal to accept a copy of software from
all you have to do is send some money to receive someone else. Software piracy is the easiest
full instructions. This is a scam—a trick to get your computer crime to prevent. Make sure that you pay
money. for all the software you use that requires payment.
Unauthorized distribution of software is considered
licensing infringement and is a crime typically
punishable with a fine.
n Although many computer criminals get away with
their crimes, cybercrimes can be considered a
felony crime in the United States, and if convicted
the criminal can face both jail time and fines. Fines
for cybercrime offenders range from $5,000 per
offense to $1,000,000, depending on the type
of offense and the number of previous crimes
committed.

Figure 1.18 What steps can you take to help


protect your computer from a virus?
22 Introduction to Computers and the Internet

Privacy in Cyberspace
n Many consumers share personal information n Some people say that individuals should have
about themselves, their habits, and their finances. the right to refuse to provide information about
Sometimes, however, such information is gathered themselves, as well as the right to have information
without a person’s knowledge or approval. about themselves removed from a database.
n Some businesses gather information from public Although such a guarantee does not yet exist in
records kept by the government. They may also the United States, you can protect your privacy. The
access information that people volunteer about main thing you can do is be careful to whom you
themselves in several ways: give out personal information about yourself.
l Web site registration—Many Web sites require n While it is up to the individual what information
visitors to fill out registration forms. he or she shares about him- or herself online, it is
never ethical to share confidential business-related
l Online purchases—Some Web sites gather
information online.
information about people who buy their goods
or services.
l Warranty registration—Products of all kinds
come with a warranty that enables the user to
get help if the product breaks or fails. To take
advantage of a product warranty, you usually
must register with the manufacturer. Some
warranty registrations ask for a great deal of
personal information.
l Sweepstakes entries—Many people fill out
sweepstakes entry forms hoping to win a prize.
In doing so, they provide important personal
information.
n What consumers may not know is that companies
that gather personal information often sell it to
other organizations, such as marketing companies, Figure 1.19 You may be required to provide a
whose job is to sell products and services to user name and password before accessing a
consumers. As a result, marketing companies computer network. Be sure to use a “strong”
have access to enormous quantities of data password.
about people. This information is stored in large
computerized databases.

Copyright Laws
n Laws that involve copyright protect individuals n The idea of fair use means you can use a portion
and companies from the theft or misuse of their of a copyrighted work without permission in certain
creative, literary, or artistic work. It is a crime to cases. Fair use applies when a limited portion
copy this kind of work without the permission of the of the work is used for research or as part of
person who owns the copyright to it. schoolwork. Reviewers also have the right to quote
part of an original work in their reviews.
Introduction to Computers and the Internet 23

n Computers and the Internet make it easy to copy n Professional writers learn how to properly cite and
someone else’s work, including other people’s use sources to avoid plagiarizing them. Writers
photographs, documents, videos, recorded sounds, must be able to apply strong language skills to
and music. Using material from a Web site or a develop their own ideas and express things in their
book without crediting the source is plagiarism. own words—not in the words of sources. Writers
This is copying someone else’s work and passing work in many different media, including books,
it off as your own. You should always follow the magazines, newspapers, television and radio, and
rules of fair use and acknowledge the source of the Internet.
information you use.

Acceptable Use Policies


n People who practice ethics behave morally. One l Users agree not to use inappropriate language,
way you can act ethically is to follow your school such as language that is profane, abusive, or
district’s acceptable use policy, or AUP, while using impolite.
computers at school. These policies identify for l Users agree not to copy copyrighted material or
computer users the responsibilities of Internet to damage computer equipment belonging to
use. They spell out certain rules of behavior and the school.
explain the consequences of breaking those rules.
l Users agree to respect the privacy of other
Many businesses use AUPs, too, to govern the way
people.
workers use company-owned computers.
n Users of school computers who do not follow these
n A school district’s AUP may include the following
rules may face consequences. They might lose
ethical guidelines:
privileges or be suspended from school activities.
l Users agree not to visit objectionable Web Very serious violations, such as using a school
sites that contain content that does not meet computer to threaten someone, may require police
community standards. involvement.

Figure 1.20
Your school district’s AUP provides guidelines for using your school’s computers,
network, and Internet access.
24 Introduction to Computers and the Internet

WORDS TO KNOW
Application
Lesson 6
programmer
People who ensure
that the programs the
organizations need are
created, maintained, and
improved.
CIO (Chief Information
Computer
Workers
Officer)
Department head of IT or
MIS.
DASD (Direct Access
Storage Device)
Person in charge of
managing disk storage.
Database administrator
and developer n Computer chips, hard disks, CD-ROM and DVD drives, and all other computer
People who specialize in components are designed by electronics engineers. They include hardware
designing and overseeing and software engineers. These professionals specialize in microcircuitry or
the maintenance of imaging technology or hundreds of other areas involved with the design and
databases. manufacture of computing equipment.
n Supercomputers and servers require specially trained personnel to keep them
Electronics engineer
running efficiently. Most server installations have a systems administrator who
People who design
has studied the inner workings of the server operating system and knows how to
computer chips, hard
keep it working correctly.
disks, CD-ROM and
DVD drives, and all other n In addition, such installations may have a person in charge of managing disk
computer components. storage, called a DASD (Direct Access Storage Device) manager. Just as
you may accumulate a great deal of data that you no longer need on your
Help desk professional personal computer, a server installation may pile up data it should archive (file
People who are trained to permanently elsewhere) and information needed only temporarily. The DASD
provide help to users of manager sees to it that the installation gets the most efficient use of its storage
applications. capacity.
Information systems n Server installations usually also have a staff of application programmers who
personnel ensure that the programs the organizations need are created, maintained, and
People who manage, improved. Such programmers work on fixing problems in programs, adding new
support, and maintain features, and creating special programs to perform specific tasks. Application
computer installations. programmers are necessary because many of the programs that run on servers
are not purchased from a software supplier.
IT (Information
Technology) n Companies like Microsoft, Google, Adobe, Nintendo, and other software vendors
Department in which also employ application programmers. They use a variety of programming
information systems languages to create and enhance the companies’ products.
personnel specialties n Database administrators and developers are people who specialize in
may be housed. designing and overseeing the maintenance of databases.
n Network administrators are people who specialize in making sure that
a company’s local area network operates efficiently. They need to be well-
acquainted with the operation and maintenance of personal computers.
Introduction to Computers and the Internet 25

n Help desk professionals are people who are trained to provide help to users WORDS TO KNOW
of applications. They work in the information processing department of large
MIS (Management
organizations and are called upon to install programs on PCs, answer questions
Information Systems)
about how to use programs, and help users recover from problems.
Another term for IT.
n Those who manage, support, and maintain computer installations are known
as information systems personnel. Their specialties may be housed in a Network administrator
department called MIS (Management Information Systems) or IT (Information People who specialize
Technology), and the department head may be a corporate officer called the in making sure that a
CIO (Chief Information Officer). company’s local area
network operates
n Web site designers and programmers are those who decide what Web pages
efficiently.
should look like and those who prepare the code that make Web pages perform
properly. Sometimes Web page design and programming are done by the same Systems administrator
person. In many cases, however, a graphics professional designs the look of a People who have studied
Web site, and a programmer makes sure that the Web site looks and works as the inner workings of the
designed. server operating system
n Web site programmers know how to use Web building tools like HTML (hypertext and know how to keep it
markup language) and Java and special-purpose programs like Adobe working correctly.
Dreamweaver. Web site designer and
n For more information on careers in information technology, you can look programmer
at the Web site of the Bureau of Labor Statistics, which is located at People who decide
http://www.bls.gov/oco. what Web pages should
look like and those who
prepare the code that
make Web pages perform
properly.

Figure 1.21 Computer technicians work to build


or repair computer systems. What skills and
interests do you think might be necessary to
become a computer technician?

You might also like