Introduction To Computers
Introduction To Computers
Computers and
the Internet
2
Lesson 1
What Is a Computer?
n Personal Computer Hardware
n Peripherals
n Bits and Bytes
n Computer Speed and MHz and GHz
n Computer Types
Lesson 2
Software
n Obtaining Application Software
Lesson 3
The Internet
n Finding Information on the Web
n Evaluating Information on the Web
Lesson 4
Understanding E-mail
n Sending and Receiving E-mail and Other Forms of Digital Communication
n Dangerous E-mail
Lesson 5
Types of Computer Crimes
n Copyright Laws
n Acceptable Use Policies
Lesson 6
Computer Workers
3
4 Introduction to Computers and the Internet
WORDS TO KNOW
BIOS
Lesson 1
The basic input-output
system is the component
that checks your
computer’s components
and causes the operating
system to start.
CMOS
What Is a
Computer?
Complementary Metal
Oxide Semiconductor is a
chip whose configuration
is controlled by a setup
program.
CPU
The Central Processing
Unit is a chip, located on
the motherboard, which n Computers are a vital part of today’s world. They make controlling and
performs mathematical using devices faster, easier, and more accurate. They are in everything from
calculations and logic automobiles to washing machines.
functions.
n A computer is a machine that receives input (data), performs processing, and
Hardware produces output (information).
Refers to all the pieces n Uses of the computer can be viewed as variations of input–processing–output.
of physical equipment This is as true of complex tasks, like computer simulations of weather events, as
that make up a computer it is of common ones, like typing a letter. Some examples of input–processing–
system. output are given in the following table.
Input n If the input contains errors, the output will contain errors. Sometimes computers
Data entered into a break down. But most “computer errors” result from human errors—bad data or
computer. bad programming.
n Think of examples of input–processing–output from your own experience that
you might add to the table.
l The settings are permanently saved in a 64-byte l RAM (Random Access Memory), special
piece of CMOS. The CMOS power is supplied chips connected to the CPU, is the area where
by a small battery, so its contents are not lost programs and data reside while in use. When
when the PC is turned off. you start an application (Microsoft Word, for
l The CPU (Central Processing Unit) is a example), the computer places the program into
chip, located on the motherboard, which RAM. If you then open a document, it also loads
performs mathematical calculations and the document into RAM.
logic functions (determining if one value is n When you save a document, the CPU copies
greater than another, and so on). The CPU is the document from RAM to permanent stor-
often referred to as the brain of the computer age. When you close a document, the CPU
because it administers the functions of the other frees up the memory that was occupied by
components. When users say their machine has the document. When you close a program,
a Core 2 Duo processor, they are talking about memory is also freed up.
the CPU chip. n RAM holds data only so long as it has elec-
tricity. If the machine is turned off or loses
power, information in RAM is lost. That’s why
any changes not saved before the machine
is turned off cannot be retrieved.
n In modern PCs, RAM capacity is measured
in gigabytes. (See the section “Bits and
Bytes” for a definition of bits and bytes.) In
general, the more RAM your computer has,
the better it is able to run programs that re-
quire processing power.
Peripherals
n A peripheral is a device connected to the computer l The mouse is an input device that you use to
through the bus. Many essential components of control a pointer that displays on the monitor. A
a PC system are peripherals, including monitors, wide variety of mouse pointing devices exists.
keyboards, and disk drives. Printers and scanners Some are moved over a surface and may be
are also peripherals. wireless; some let you use your thumb or fingers
n Some peripherals, because of their small size or to roll a ball that moves the pointer; others,
delicate nature, are mounted directly inside the especially on laptop computers, work when you
computer case. Video boards, inboard modems, drag your finger across a small screen called a
and sound cards are devices inside the computer touch pad.
that depend on the bus.
n Peripherals are often divided into two categories—
input devices and output devices. Some
peripherals serve as both input and output devices,
so the categories are not exclusive. Some common
peripherals and their functions are described below.
l The monitor is an output device that displays
input and the results of processing. Most
monitors on PCs and laptops use liquid crystal
display (LCD) technology, similar to that used in
Figure 1.5 This mouse is typical for use with
some television sets. (In fact, some computers
desktop computers.
can use TV sets as monitors.)
200 MHz clock. Similarly, a 1.2 GHz chip is three hard disk does not take advantage of the latest
times as fast as a chip with a 400 MHz clock. technology or is filled nearly to capacity, the
n The clock speed of your computer describes how computer’s efficiency will be impaired.
quickly computations are performed in RAM. A l Speed of the bus. If the CPU operates at
personal computer’s overall speed and efficiency, 1.6 GHz and the bus at 50 MHz, the bus
however, depend not only on the speed of the CPU slows the computer down when the CPU is
but also on the following: communicating with cards in the bus slots. More
recent bus speeds, however, reach 1,333 MHz
and more.
10 Introduction to Computers and the Internet
Computer Types
n The computer with which you are most familiar, and Servers may still control as much as 90% of the
the one with which you will probably have the most data major businesses rely on for their critical
direct contact throughout your life, is the personal applications, such as inventory, manufacturing,
computer. But you will have indirect contact with billing, and other accounting activities. For such
other, larger computers. applications, servers offer superior performance,
n If you make a career in science, higher reliability, and security, and they are usually easy to
mathematics, advanced computing, or military or expand as the business grows.
industrial research, you may use a supercomputer. n If you work at a telephone company, you may
Supercomputers are the fastest problem solvers use a PC to gain access to the large amounts of
available. They work at extremely high speeds. information stored under the control of a server.
Often, they process data in “parallel,” breaking a You may also use a “dumb” terminal (keyboard and
complicated problem into smaller units, each of monitor) directly connected by a network to the
which is handled by a part of the computer, then server. The terminals are called “dumb” because,
combined to produce the final result. (Some recent unlike PCs, they have no processing capabilities
“supercomputers” are made from a large number of of their own but simply give users direct access to
personal computers linked together because each server computing capacities.
PC can function like a part of a large computer.) n Personal computers come in a wide variety
of styles and sizes. Some are designed for the
desktop, with a cathode ray tube or LCD monitor
separate from the rest of the computer.
n Laptop computers and Personal Digital
Assistants (PDAs) grow lighter and sturdier with
each new version. Laptops are compact with built-
in liquid crystal display monitors that provide crisp
displays. Most hand-held computers are used
for a specific purpose, such as taking notes and
sending/receiving messages. Their portability
makes them ideal for salespeople and other
business professionals who travel a great deal.
n Tablet PCs, such as the Apple iPad, are another
type of portable computer that use touchscreens to
input and manipulate data.
Lesson 2
WORDS TO KNOW
Application
The term application
n On occasion, program authors allow you to use Figure 1.11 Whether you download software
programs, share them, give them away, or even from the Internet, or purchase software from a
alter them to meet certain needs. This is called store, it will still need to be installed correctly on
public domain software. Beware, the quality of your computer before may use it.
these programs can vary widely, and they may
contain more errors than other types of software.
Introduction to Computers and the Internet 13
n The Internet is the global system of interconnected computer networks that is Digital Subscriber
used to share data and information. The Internet can be used for many different Lines (DSL)
things, from reading and sending electronic mail (e-mail) to storing data and Require a special
surfing the World Wide Web (WWW or Web). telephone line in order to
access the Internet.
n There are different ways to connect to the Internet. The reasons for various
options are availability, location, speed, and price. E-commerce
l The least expensive way to get online is to use a dialup connection The use of
between a standard phone line and a modem. These connections are telecommunications
called “dialup” because your computer must connect to the Internet by networks or the Internet
using a telephone number to contact a server. When the session is over, the to conduct business.
connection is broken. E-mail
l Some Digital Subscriber Lines (DSL) require a special telephone line. Electronic mail sent
Integrated Services Digital Network (ISDN) lines require a special ISDN and received over the
adapter and modem. As a result, both services cost more than regular phone Internet.
service. Furthermore, DSL and ISDN are not available in all areas.
Internet
l Cable television companies offer Internet access through cable modems. Global system of
This access is at speeds much faster than dialup modems. You need a interconnected computer
network card in your computer, a cable modem, and cable access. Satellite networks that is used
access is also very fast for downloading files to your computer, but it requires to share data and
a phone line and a modem for sending files to outside users. information.
n Multiple computers can be connected to one modem through a router. The
Integrated Services
router takes the Internet signal from the modem and splits it up so that multiple
Digital Network (ISDN)
computers can access it at once. Multiple computers connected together this
Internet connection that
way is known as a network.
requires a special ISDN
adapter and modem.
Link
A connection between
two different Web pages.
Network
Multiple computers
connected to one modem
through a router.
Figure 1.12 Linksys and Netgear are companies that make commonly used
routers. Does either one look like what you might have in your home?
14 Introduction to Computers and the Internet
the Web. As with print references, you can also find thoughtfully?
some Web pages that are biased, objectionable, l Does the language seem balanced and
misleading, inaccurate, or dangerous. Web objective, or is it biased and argumentative?
sites from universities, governments, and news
l What is the purpose of the page? Is the author
organizations are usually reliable, while a page
trying to sell you something or convince you
without an author or sources can be unreliable.
to believe something? Who benefits if the
n Verify any information you find by checking another information is accepted?
source. The freedom of the Web leads to a greater
l Who provides the server for publishing this Web
potential for error, since pages may not be checked
site? Who pays for the page?
for accuracy of the information they contain. Ask
l Does the page show when it was created or
yourself these questions about any information you
find on the Web: revised? Is the page up to date?
l Who is the author of the page? Is that author n Internet searches can help you find all sorts of
qualified to write about this topic? information. Research for a class project, help with
your computer, or finding a birthday gift for a friend
l Does the author indicate the source of the
can all be done using Internet searches.
information presented?
l Does the information appear to be accurate?
WORDS TO KNOW
alias
Lesson 4
A nickname for an e-mail
recipient.
attachments
Understanding
Anything sent with an
e-mail message.
blogs
E-mail
Short for weB log, a
page where a user writes
something for anyone on
the Internet to read and
comment on.
e-mail
Allows people to send
messages quickly and
easily to anyone with an
e-mail address. n E-mail allows people to send an unlimited number of messages quickly and
easily to anyone with an e-mail address. It is also less expensive than standard
e-mail address mail and voice, fax, and telephone messages. To use e-mail, all you need is a
Includes the mailbox computer, an Internet connection, e-mail software, and an e-mail account. E-mail
name (the part of the also lets you attach files to a message. Anything sent with an e-mail message
address before the @ is called an attachment. Common attachments include word-processing
symbol) and the server documents, spreadsheets, photos, artwork, and videos.
address.
n All e-mail addresses have two parts. The mailbox name is the part of the
e-mail client address before the “at” symbol (@) that identifies the user. The server address
Program that lets you follows the symbol. It names the domain name of the computer that houses
create, send, receive, and the mailbox. An e-mail server is a computer, operated by your Internet service
manage e-mails. provider (ISP), that handles three key jobs:
e-mail etiquette l accepts incoming messages
Following proper l sends outgoing messages
convention and courtesy l delivers incoming messages
in online correspondence.
n When you send a message, it goes
e-mail server from your computer to your ISP’s
A computer, operated e-mail server, which examines
by your Internet service the address of the recipient—the
provider (ISP). person to whom you are sending the
message. If the recipient uses the
e-mail viruses
same ISP as you do, the message
Programs that can
is delivered directly to the recipient’s
destroy data and cause
mailbox. If the recipient uses a
network problems.
different ISP, the message is sent
social network to that server through the Internet.
Allows users to connect The receiving server accepts the
with others on the Internet. message and delivers it to the
recipient’s mailbox. Figure 1.14 Every e-mail address has
texting
two basic parts—a mailbox name and
People sending over
a server address.
a network brief written
message with their
mobile phones or other
portable device.
Introduction to Computers and the Internet 17
Send button
Click here
to create
a new Recipient’s address
message.
Subject line
Click here
to view
messages
in the Message
Inbox.
n Suppose you received an e-mail message inviting n E-mail messages can also contain file attachments,
you to a party. You can respond to the invitation by such as Word documents, Excel spreadsheets,
clicking Reply, which responds only to the person and digital photos. The steps to attach a file to an
who sent you the message. You can also click e-mail message varies depending on the e-mail
Reply All, which responds to all the people who client that you use, but basically you click an attach
received the original message. Several things occur file icon—often the icon looks like a paperclip—and
when a response is prepared: then browse your computer for the file that you wish
l The client displays a reply form with the original to attach.
sender’s address shown in the To: field. n Use proper e-mail etiquette when communicating
l The subject field may show Re: in front of the over the Internet. Think of an e-mail like a regular
subject of the original message. (Re means letter. Open with a salutation such as “Dear Mr.
“regarding.”) Smith,” or “Hello Jane,” and end with a closing like
“Sincerely.” Writing in all capital letters is rude and is
l The original message is copied into the body
considered the equivalent of shouting at someone.
of the reply. Most e-mail programs give you the
Also, avoid abbreviations and slang such as “LOL”
option of including the original text in your reply.
and “ROFL.” These would never be included in a
l You can type your reply above or below the letter, and should also be left out of e-mails. Be sure
original text. to always include a brief subject line. Make sure to
n When you receive a message, you can pass it spell check your e-mail before sending.
along to someone else. This is called forwarding n A social network, such as Facebook, allows users
a message. For example, you could forward the to connect with other people on the Internet. Social
party invitation to your parents to ask them if you networks consist of individual pages for each user.
can attend. They will receive the message from you, The users can enter information about themselves,
but the Subject line may include the characters Fw: such as interests, work or school info, even
before the subject text to show that the message pictures. The user can then establish connections
has been forwarded. You can add your comments with other people on the social network,
before the original message’s text. exchanging messages and other communications.
Figure 1.16
Facebook is a popular social networking site. It allows users to enter personal information
about themselves, and customize their security settings to keep that information safe.
Introduction to Computers and the Internet 19
n Discussion boards and blogs are other ways n A blog, short for weB log, is a page where a user
to communicate over the Internet. A discussion writes something for anyone on the Internet to read
board is a place where different people can leave and comment on. Blog topics range from news
messages about a specific topic. Users can to cooking to personal stories. If your class has a
respond to each other, start new discussions, and blog or discussion board, it could be a good way to
leave links to Web sites with more information. ask questions about assignments or get help on a
n Some discussion boards include chat features so subject that you are having a hard time with. What
that you can communicate with other people in you post to a blog is for all to see, so be sure that
real-time, rather than post a message and wait for a you proofread your work and only post relevant
response. When chatting online, proper conduct is information.
essential. n Another form of digital communication is texting.
With texting, people send over a network brief
written message with their mobile phones or
other portable device. With texting, like with other
forms of communication, proper protocol must be
followed. That includes treating people with respect
and using appropriate language.
Dangerous E-mail
n Some e-mail messages can damage programs and
data. E-mail viruses are programs that can destroy
data and cause network problems. Most e-mail
viruses are sent as attachments to messages.
When the recipient opens the attachment, a script
or program can launch. This program can modify
or destroy data and programs, or change the
computer’s settings.
n Not all e-mail viruses are distributed as
attachments. Most e-mail programs can create
and open messages in HTML format. A virus
programmer can insert virus code directly in an
HTML-format message. If you receive an infected
message in HTML format, all you have to do is view
the message in your e-mail program. The virus then
infects your computer.
n Nearly all e-mail viruses copy themselves and then
send themselves to everyone in your address book.
When recipients see a message from you, they
think it’s safe to read. They open the message, and
the destructive process repeats itself.
n Beware of any e-mail attachment that has an .EXE,
.BAT, .COM, or .VBS extension at the end of its file
name. These files are usually programs that can
be used to launch a virus. If you’re uncertain of
an attachment, delete it and report it—don’t open Figure 1.17 It is important to have up-do-date
it! Running up-to-date virus protection software to virus protection software.
scan e-mail for harmful attachments is an important
safeguard.
20 Introduction to Computers and the Internet
WORDS TO KNOW
Copyright
Lesson 5
Gives the creator of an
original work exclusive
rights to it.
Types of
Ethics
A set of moral principles.
Fair use
Computer Crime
Means you can use a
portion of a copyrighted
work without permission
in certain cases.
Licensing infringement
Unauthorized distribution
of software.
Macro virus
Takes advantage of the n The Internet has opened the door to new kinds of crime and new ways of
macro languages in carrying out traditional crimes. Computer crime is any act that violates state or
applications, such as federal laws and involves using a computer. The term cybercrime often refers
word processors. specifically to crimes carried out by means of the Internet.
Phishing n Whether you’re working with a small home network of just two computers or a
When criminals try to lure large office with hundreds of networked computers, it’s important to understand
victims into giving them what kinds of threats your network may encounter. Regardless of the network
passwords, bank account size, being connected to a network opens up the risk of exposure to a virus or
numbers, or credit card computer attack.
details. n There are many different kinds of computer crime. Some of them require
Plagiarism criminals to have a deep knowledge of programming.
Using material without n A virus is a program that performs one or more tasks that the user doesn’t
crediting the source. expect. Some viruses are designed to do real harm, such as delete files, slow
down network traffic, disable programs, or allow an unauthorized person to
Scam
access the victim’s computer.
A trick to get your money.
n Most viruses are designed to hide themselves, avoiding detection by the victim
Software piracy for as long as possible. If a virus is copied to your computer, the machine is said
The illegal copying of to be “infected.” A virus can infect your computer in a number of ways. You might
computer programs. receive an infected disc from a friend. You might download an infected file from
Trojan horse a Web site or receive it attached to an e-mail message. Most viruses can affect
A program that does only the operating system in which they were written. However, they can spread
something useful but from one computer to another. It is important that you always run antivirus
also, hidden from software, such as Norton, on your computer.
view, does something n A macro virus takes advantage of the macro languages in application programs,
destructive. such as word processors or spreadsheets. Macro viruses launch themselves
when an infected file is opened. These viruses are different from normal viruses
Virus
because they can work on different operating systems.
A program that performs
one or more tasks that
the user doesn’t expect.
Worm
A computer virus
commonly hidden inside
another program.
Introduction to Computers and the Internet 21
n The most common computer viruses work by hiding n A special kind of scam is called phishing. Phishing
inside another program. Although a worm doesn’t criminals try to lure victims into giving them
need to be hidden within another program, worms passwords, bank account numbers, or credit card
are commonly hidden inside document files in the details. For example, in a typical phishing scam,
form of macros. Most worms make many copies of a thief sends an e-mail message that looks as if
themselves, using up the victim’s disk space and it is from your bank. The message may say that
memory. They spread to other computers through the bank needs you to verify or update account
network connections and by e-mail. The notorious information. When you click on a link within the
I Love You virus of the year 2000 created e-mail message, you are not taken to the real Web site
messages and mailed itself to other computers of the bank. Instead, you link to a site that has
using the e-mail addresses found on the victim’s been created to look like the bank’s Web site, but
machine. has a slightly different URL or Web site name.
n A Trojan horse is a program that does something You are then asked to enter your account number,
useful but at the same time, hidden from view, password, and personal information number (PIN).
does something destructive. It can damage the The thief captures the information you enter and
system it enters, including erasing all the data can then steal from your account. To avoid phishing
on a hard drive. A Trojan horse might come in scams, do not link to any site from within an e-mail
the form of a simple game. The victim plays the message, and simply delete a message that asks
game; however, the program does something else you to update account information.
in the background, such as opening a port on n One kind of computer crime is very widespread.
the computer. Someone can then use this port to It is called software piracy, the illegal copying of
access the computer through the Internet. computer programs. One business group estimates
n Some computer crimes have nothing to do with that about one third of all software in use is pirated.
programming. Criminals use a computer to commit Most programs that people buy are licensed only
theft. Internet advertisements and e-mail messages to the purchaser. In other words, it is illegal for you
might claim that you can make huge sums of to copy such a program and give it to a friend. It
money with very little effort. According to these ads, is also illegal to accept a copy of software from
all you have to do is send some money to receive someone else. Software piracy is the easiest
full instructions. This is a scam—a trick to get your computer crime to prevent. Make sure that you pay
money. for all the software you use that requires payment.
Unauthorized distribution of software is considered
licensing infringement and is a crime typically
punishable with a fine.
n Although many computer criminals get away with
their crimes, cybercrimes can be considered a
felony crime in the United States, and if convicted
the criminal can face both jail time and fines. Fines
for cybercrime offenders range from $5,000 per
offense to $1,000,000, depending on the type
of offense and the number of previous crimes
committed.
Privacy in Cyberspace
n Many consumers share personal information n Some people say that individuals should have
about themselves, their habits, and their finances. the right to refuse to provide information about
Sometimes, however, such information is gathered themselves, as well as the right to have information
without a person’s knowledge or approval. about themselves removed from a database.
n Some businesses gather information from public Although such a guarantee does not yet exist in
records kept by the government. They may also the United States, you can protect your privacy. The
access information that people volunteer about main thing you can do is be careful to whom you
themselves in several ways: give out personal information about yourself.
l Web site registration—Many Web sites require n While it is up to the individual what information
visitors to fill out registration forms. he or she shares about him- or herself online, it is
never ethical to share confidential business-related
l Online purchases—Some Web sites gather
information online.
information about people who buy their goods
or services.
l Warranty registration—Products of all kinds
come with a warranty that enables the user to
get help if the product breaks or fails. To take
advantage of a product warranty, you usually
must register with the manufacturer. Some
warranty registrations ask for a great deal of
personal information.
l Sweepstakes entries—Many people fill out
sweepstakes entry forms hoping to win a prize.
In doing so, they provide important personal
information.
n What consumers may not know is that companies
that gather personal information often sell it to
other organizations, such as marketing companies, Figure 1.19 You may be required to provide a
whose job is to sell products and services to user name and password before accessing a
consumers. As a result, marketing companies computer network. Be sure to use a “strong”
have access to enormous quantities of data password.
about people. This information is stored in large
computerized databases.
Copyright Laws
n Laws that involve copyright protect individuals n The idea of fair use means you can use a portion
and companies from the theft or misuse of their of a copyrighted work without permission in certain
creative, literary, or artistic work. It is a crime to cases. Fair use applies when a limited portion
copy this kind of work without the permission of the of the work is used for research or as part of
person who owns the copyright to it. schoolwork. Reviewers also have the right to quote
part of an original work in their reviews.
Introduction to Computers and the Internet 23
n Computers and the Internet make it easy to copy n Professional writers learn how to properly cite and
someone else’s work, including other people’s use sources to avoid plagiarizing them. Writers
photographs, documents, videos, recorded sounds, must be able to apply strong language skills to
and music. Using material from a Web site or a develop their own ideas and express things in their
book without crediting the source is plagiarism. own words—not in the words of sources. Writers
This is copying someone else’s work and passing work in many different media, including books,
it off as your own. You should always follow the magazines, newspapers, television and radio, and
rules of fair use and acknowledge the source of the Internet.
information you use.
Figure 1.20
Your school district’s AUP provides guidelines for using your school’s computers,
network, and Internet access.
24 Introduction to Computers and the Internet
WORDS TO KNOW
Application
Lesson 6
programmer
People who ensure
that the programs the
organizations need are
created, maintained, and
improved.
CIO (Chief Information
Computer
Workers
Officer)
Department head of IT or
MIS.
DASD (Direct Access
Storage Device)
Person in charge of
managing disk storage.
Database administrator
and developer n Computer chips, hard disks, CD-ROM and DVD drives, and all other computer
People who specialize in components are designed by electronics engineers. They include hardware
designing and overseeing and software engineers. These professionals specialize in microcircuitry or
the maintenance of imaging technology or hundreds of other areas involved with the design and
databases. manufacture of computing equipment.
n Supercomputers and servers require specially trained personnel to keep them
Electronics engineer
running efficiently. Most server installations have a systems administrator who
People who design
has studied the inner workings of the server operating system and knows how to
computer chips, hard
keep it working correctly.
disks, CD-ROM and
DVD drives, and all other n In addition, such installations may have a person in charge of managing disk
computer components. storage, called a DASD (Direct Access Storage Device) manager. Just as
you may accumulate a great deal of data that you no longer need on your
Help desk professional personal computer, a server installation may pile up data it should archive (file
People who are trained to permanently elsewhere) and information needed only temporarily. The DASD
provide help to users of manager sees to it that the installation gets the most efficient use of its storage
applications. capacity.
Information systems n Server installations usually also have a staff of application programmers who
personnel ensure that the programs the organizations need are created, maintained, and
People who manage, improved. Such programmers work on fixing problems in programs, adding new
support, and maintain features, and creating special programs to perform specific tasks. Application
computer installations. programmers are necessary because many of the programs that run on servers
are not purchased from a software supplier.
IT (Information
Technology) n Companies like Microsoft, Google, Adobe, Nintendo, and other software vendors
Department in which also employ application programmers. They use a variety of programming
information systems languages to create and enhance the companies’ products.
personnel specialties n Database administrators and developers are people who specialize in
may be housed. designing and overseeing the maintenance of databases.
n Network administrators are people who specialize in making sure that
a company’s local area network operates efficiently. They need to be well-
acquainted with the operation and maintenance of personal computers.
Introduction to Computers and the Internet 25
n Help desk professionals are people who are trained to provide help to users WORDS TO KNOW
of applications. They work in the information processing department of large
MIS (Management
organizations and are called upon to install programs on PCs, answer questions
Information Systems)
about how to use programs, and help users recover from problems.
Another term for IT.
n Those who manage, support, and maintain computer installations are known
as information systems personnel. Their specialties may be housed in a Network administrator
department called MIS (Management Information Systems) or IT (Information People who specialize
Technology), and the department head may be a corporate officer called the in making sure that a
CIO (Chief Information Officer). company’s local area
network operates
n Web site designers and programmers are those who decide what Web pages
efficiently.
should look like and those who prepare the code that make Web pages perform
properly. Sometimes Web page design and programming are done by the same Systems administrator
person. In many cases, however, a graphics professional designs the look of a People who have studied
Web site, and a programmer makes sure that the Web site looks and works as the inner workings of the
designed. server operating system
n Web site programmers know how to use Web building tools like HTML (hypertext and know how to keep it
markup language) and Java and special-purpose programs like Adobe working correctly.
Dreamweaver. Web site designer and
n For more information on careers in information technology, you can look programmer
at the Web site of the Bureau of Labor Statistics, which is located at People who decide
http://www.bls.gov/oco. what Web pages should
look like and those who
prepare the code that
make Web pages perform
properly.