THEME 27 Computer Systems. Hardware, Software
THEME 27 Computer Systems. Hardware, Software
Digital signals are a specific case of discrete quantities. They are very important
since they are the basis for the functioning of modern computers.
Computers only handle digital signals; all the information they handle and the
operations they perform are encoded using them. The reason for this is due to
The minimum amount of information that we can represent with the binary
system is called a bit, from Binary digit. The bit is one of the basic units of the binary
system and therefore of computing.
For example, if we want to say that something is black or white we can use a bit
(0 white - 1 black or vice versa), or to encode the sex of a person we can use a bit (0
male - 1 female or vice versa). No more than two values can be encoded with a bit.
The binary system can encode any number, using strings of zeros and ones.
These chains increase in length as the amount represented grows. For example, the
number 4 is 100 in binary, but 2010 is 11111011010.
A fundamental concept in computing is the Byte, a unit of information used as a
multiple of the bit. It is generally equivalent to 8 bits, which is why it is called an octet in
Spanish. To facilitate the handling of these binary strings, sets of binary digits are
grouped together. The most important groups are:
The terms hardware and software are used to define the physical and logical parts
of a computer system respectively. The definitions of both terms are:
□ Hardware: Physical components and devices of a computer system.
□ Software: Programs that control the operation of a computer system. These programs
have very varied functions and cover many areas.
The most widespread definition of computer science is: science that studies the
automatic and rational processing of information. But a computer by itself is not capable
of performing a useful task. This must be programmed, supervised and exploited by
The central processing unit is usually called by the acronyms CPU (Central
Process Unit) or UCP (Central Processing Unit), processor or microprocessor.
Central processing units are mainly characterized by the architecture used, the
length of the data word in bits, the use of coprocessors and the clock frequency in MHz
or GHz.
b) Memory
It is the computer unit where the data and instructions of the running programs
are stored, which the central processing unit recovers and records in it through the two
basic operations defined on it, one for reading and the other for writing. For
communication, both units, the CPU and the memory, are directly connected to the same
bus. Its capacity is usually measured in Megabytes or Gigabytes.
There are many criteria that can be chosen to classify memory types, one of them
being the possibility of writing to it:
• RAM (direct or random access): Selecting an addressable memory unit always
requires the same time, regardless of its physical location. This type of memory is
known as RAM (Random Access Memory). It is characterized by being able to read
and write on it. The computer's main memory is of this type. The information
contained in it is erased when there is no electrical current.
• ROM (Read Only Memory): This is recorded during the manufacturing process and
Storage units are peripheral devices of the system that act as a support medium
for programs, data and files.
Mass storage drives are used in all existing computing environments:
mainframes, desktops, laptops, etc.
Storage units or devices are also called secondary memory, in comparison to the
main memory found in a computer. They are classified according to the recording
method they use:
□ MAGNETIC DEVICES
■ Magnetic Tape: Characters are recorded on a tape in the
form of combinations of dots, on tracks parallel to the
longitudinal axis of the tape. These tapes are sequential
type support, with he
inconvenience that in order to access a certain piece of
information it is necessary to read all the information that
precedes it, with the consequent loss of time.
■ Hard Drive: It is currently the main information storage
subsystem in computer systems. It is a device responsible
for storing information persistently on a computer;
program files are saved in it. There are internal units
(cheaper but fixed) and external units (somewhat more
expensive but with the advantage of portability). They
are classified according to their physical size in inches
(1.8”, 2.5” or 3.5”). They are usually connected through a
SATA port.
□ OPTICAL DEVICES
■ CD-Rhttp://www.monografias.com/trabajos/
multimediaycd/multimediaycd.shtml: 650 MB or 700 MB
compact disc
capacity that can be read as many times as desired, but
whose content cannot be modified once it has been
recorded. Since they cannot be erased or rewritten, they
are suitable for storing files or other sets of unchanging
information.
■ CD-RW: It has the capacity of the CD-R with the difference that these discs are
rewritable multiple times. CD-RW drives can record information on both CD-R
and CD-RW discs.
■ DVD-ROM: is a compact disc with the capacity to store from 4.3 GB of
data on one side only. There are DVDs that store data on both sides of the disc,
and can even combine double-sided with a double layer to result in a maximum
storage capacity of 17 GB. DVD-ROM drives are capable of reading CD-R and
CD-RW disc formats.
■ DVD-RAM: It has a capacity of 2.6 GB on one side of the disc and 5.2 GB on the
other.
a double-sided disc. DVD-RAMs are capable of reading any CD-R or CD-RW
disc but are not capable of writing to them. DVD-RAMs are rewritable but the
discs cannot be read by DVD-ROM drives.
■ BLU-RAY: Also known as BD, is an optical disc format
used for high definition video and with a high-density data storage capacity
greater than that of DVD. It can store from 25 to 500 GB depending on the
number of layers and their density.
□ MAGNETO-OPTICAL DEVICES
■ MiniDisc: Small disc (almost the size of a
half a CD) initially designed to hold up to 80 minutes of
audio. It can be used to store computer data or audio
tracks. Magneto-optical recording is a combined system
that records information magnetically under the
incidence of a laser beam, and reproduces it by optical
means.
□ FLASH MEMORIES
■ Memory cards: non-volatile memory devices, meaning they retain data even
when not powered by an electrical source. They are used in digital cameras,
mobile phones and digital music devices. Its capacity increases rapidly, and there
are several types depending on their design:
1 Compact Flash (CF)
1 Smartmedia (SM)
■ CLOUD STORAGE
This option frees up space on desktop computers
and transfers files to remote hard drives, which
normally guarantees the availability of information. There are two types of
online storage: short-term storage, normally used for transferring large files
via the Web; and long-term storage, used to store information that would
normally be stored on a personal computer's hard drive.
□ Process management
A process is simply a running program that needs resources to perform its task: CPU
time, memory, files, and I/O devices. The operating system is responsible for
creating and destroying processes, stopping and resuming them, and allowing them
to communicate and synchronize.
Process management could be similar to office work. You can have a list of tasks to
do and set high, medium, low priorities for them, for example. We should start by
doing the high priority tasks first and when they are finished continue with the
medium priority tasks and then the low priority tasks.
□ Main memory management
Memory is a large, compartmentalized store of information that is accessed by a
single address. This fast-access data store is shared by the CPU and I/O devices, is
volatile, and loses its contents in the event of system failures.
□ Managing secondary storage
A secondary storage system is necessary, since main memory (primary storage) is
volatile and also too small to store all the programs and data. The operating system is
responsible for planning disks, managing free space, assigning and ordering data
storage.
□ The entry and exit system
It consists of a temporary storage system (cache), a device driver interface and
another for specific devices. The operating system must manage the temporary I/O
storage as well as usage requests.
□ File system
Files are collections of related information, defined by their creators. These store
programs and data such as images, text, database information, etc. The operating
system is responsible for managing files and folders, as well as making periodic
backups.
□ Protection systems
Mechanism that controls the access of programs or users to system resources,
responsible for distinguishing between authorized and unauthorized use, as well as
specifying the security controls to be performed.
□ Communications system
To maintain communications with other systems, it is necessary to be able to control
the sending and receiving of information through network interfaces.
Communication points must also be created and maintained for applications to send
and receive information, and virtual connections must be created and maintained
between applications that are running locally and those that are running remotely.
Operating systems require good computer security, both for hardware and for
programs and data. The most widespread mechanisms that operating systems provide to
ensure security are the following:
□ Authentication using passwords (passwords)
□ Sharing resources to authorized groups
□ Definition of access policies according to a hierarchical or group work scheme
□ Availability of information safeguarding systems
Microsoft Windows came to dominate the global personal computer market, with
more than 90% of the market share. The first version was released in 1985 and became
widely used thanks to its window-based graphical user interface (GUI). Until that time
and until much later as the heart of Windows, the most widely used operating system
was MS-DOS (Microsoft Disk Operating System), which at that time had a command
line-based interface, that is, in text mode, since it lacked graphical presentations. The
first version in Spanish was Windows 3.0.
The latest versions of this operating system are Windows 10 for desktop
computers, Windows Server 2016 for servers, and Windows Phone 10 for mobile
devices.
Windows 10 was released to the general public on July 29, 2015, being the first
version that has integrated all Windows devices, being a single operating system for
desktops, laptops, smartphones and tablets offering a better experience and eliminating
some problems that were presented with the previous version, Windows 8.
3.5. Unix operating system.
3.5.1. Linux
Linux is a free and freely distributed operating system inspired by the Unix
system, originally written by the Finnish Linus Torvalds. Being an open source system,
this operating system has been growing and improving with the help of thousands of
programmers from around the world through the Internet. In some cases it is also called
GNU/Linux, because the system software usually comes from the free GNU operating
system.
Linux is not generally as easy to use as other operating systems, although great
efforts are being made to make it easier to use. Despite all this, Linux's enormous
flexibility, great stability and low cost have made this operating system a very interesting
option for users who work over networks, surf the Internet, or are engaged in
programming.
One of the first concepts that appear when starting out with Linux is the concept
of distribution. A distribution is a grouping of the Linux operating system kernel and a
number of other general-purpose and not-so-general-purpose applications. The most
popular distributions are Debian, Slackware, OpenSUSE and Ubuntu.
□ Guadalinex
Guadalinex is a Linux distribution promoted by the Andalusian Government to
encourage the use of free software in its community. It is inspired by GnuLinEx, a
similar project from the Junta de Extremadura. Initially it was based on the “Debian
GNU/Linux” distribution and since version 3.0 it is based on another distribution called
“Ubuntu”.
It includes everything you need to have a truly usable system: Internet tools,
office applications and a host of utilities such as multimedia players, graphic design
editors, development applications, etc.
The current version of Guadalinex V9 introduces several new features, the first
being that it changes the distribution used until now to develop on Linux Mint. In
addition, there is a 'lite' version of Guadalinex with fewer technical requirements and
features, as well as one intended for professional use called GECOS.
For a standard user, the most common incidents that occur in applications or
programs are the following:
o Presence of Viruses: refers to the intrusion of computer viruses that begin to damage
the software and must be repaired immediately so that the programs are not lost.
o Improper use of the operating system: is the misuse of the main software and
applications of a computer.
o Improper use of applications: refers to the misuse of programs, which can cause
Computer security can be studied from two aspects, both closely related and
sharing objectives and budgets:
• Physical security: Set of mechanisms and standards aimed at protecting people,
facilities, equipment and communication elements from potential damage.
• Logical security: Set of operations and techniques aimed at protecting information
against destruction, modification, improper disclosure or delay in its management.
5.1. Firewalls.
5.2. Antivirus.
• Worm: Application that moves through the memory of networked computers. It has
its own identity. It is designed to search for unoccupied memory areas where it can
copy itself repeatedly, until it manages to overflow the memory. It spreads by taking
advantage of network facilities such as email.
• Logic bomb: These are programs that are activated when a specific event occurs. The
condition is usually a date (Time Bombs), a key combination, or certain technical
conditions (Logic Bombs). If the condition does not occur it remains hidden from the
user.
• Trojans: Create a security hole to steal information or alter the hardware system or,
in an extreme case, allow an external user to control the computer. It can go
unnoticed for a long time.
• Hoax: They are not viruses nor do they have the ability to reproduce on their own.
These are messages with false content that encourage users to make copies and send
them to their contacts. They often appeal to moral sentiments (“Help a child with
cancer”) or to the spirit of solidarity (“Warning about a new, very dangerous virus”),
trying to take advantage of the lack of experience of novice users.
• Joke: Like hoaxes, they are not viruses, but they are annoying. For example, a
page that moves from one side to the other, and if you try to close it, a window
may appear that says: “The window cannot be closed.”
In any of the above cases, the infected operating system begins to experience a
series of anomalous or unexpected behaviors. These behaviors are what give the trace of
the problem and must allow for its recovery.
The most common actions that a virus can cause are the following:
• Attaching itself to a program installed on the computer, allowing it to spread over the
network or removable storage units, such as USB drives.
• Display humorous, usually annoying, messages or images on the screen.
• Slow down or crash your computer.
• Destroy information stored on the disk, in some cases vital to the system, which will
prevent the computer from functioning.
• Reduce disk space.
• Annoying the user by closing windows, moving the mouse...
• Messages that automatically run programs, such as your email program directly
opening an attachment.
• Social engineering, for example, phishing (impersonating a company so that the user
reveals their login details and makes fraudulent use of them).
On the other hand, passive methods refer to making backups, which guarantee
data recovery when none of the above has worked. Companies should also have a plan
and details of all installed software to have a contingency plan in case of problems.
While both are related to information network security, an IDS differs from a
firewall in that the latter generally scans externally for intrusions to prevent them from
occurring. A firewall limits access between networks, to prevent an intrusion, but it does
not determine an attack that may be occurring internally on the network. An IDS
evaluates an intrusion when it takes place and generates an alarm. An IDS also watches
for attacks that originate within the system. This is typically achieved by examining
communications, identifying through heuristics or patterns (known as signatures),
common, already classified attacks, and taking action to alert an operator.
To implement an intrusion detection system, it must be taken into account that it
is possible to opt for a hardware, software or even a combination of these two solutions.
The possibility of introducing a hardware element is due to the high processor
requirement in networks with a lot of traffic and the large memory consumption for
signature records and databases with possible attacks.
6.1.Notebook computer.
In addition to conventional laptops, there are other models with different features
and prices:
■ Ultrabook. It is characterized by being extremely light and thin, compared to its
predecessors. They appeared in 2011, created by the microprocessor manufacturing
company INTEL. However, the term has become commonly used to refer to this type
of computer, even though they may contain processors and chipsets (integrated
circuits) from other manufacturers. It represents a more powerful option than a
traditional laptop with greater processing power and graphics, more memory, a larger
screen, and ultimately, better features, although its price is significantly higher.
■ Netbook. It is a category of portable computer, low cost and small in size, which
provides greater mobility and autonomy. Although computers with this name were
created as early as 1999, it was not until 2008 that the current specifications for these
computers were established. What defines a netbook is not its size, but the reduction
of internal components since they fundamentally lack an optical drive and
consequently reduce their weight. Netbooks are generally cheaper because they are
optimized for more basic uses, such as multimedia functions or Internet browsing.
They have much less powerful processors but with clearly lower consumption.
A tablet computer, also known in many places as a tablet computer (from the
English "tablet" or "tablet computer"), is a portable computer larger than a smartphone or
PDA, integrated with a touch screen (single or multi-touch) with which interaction is
primarily achieved with the fingers or a pointer, without the need for a physical keyboard
or mouse. The latter are replaced by a virtual keyboard and, in certain models, by a
wheel integrated into one of the edges of the screen.
The term can apply to a variety of formats that differ in the size or position of the
screen relative to a keyboard. The standard format is called a slate, usually 7 to 12
The tablet works like a computer, except that it is lighter in weight and more
oriented towards multimedia environments, reading content and web browsing than
towards professional uses. It can read a USB memory stick or external hard drive.
Some tablets have 3.5 minijack (headphone connection), VGA or HDMI
connectors to connect to a television or computer monitor.
Tablets, like traditional computers, can run different operating systems. These are
divided into two classes:
o Operating systems based on the desktop of a traditional computer
The most popular are Microsoft Windows and a variety of Linux systems. o Post-
PC operating systems (similar to those on smartphones)
The most popular ones include Google's Android. There are also products with
Windows 8, Google's Chrome OS, FireFox Os, Apple's iOS and other alternatives.
The mobile phone is an electronic wireless device for accessing and using the
services of the mobile telephone network. It is also called cellular in most Latin
American countries because the service works through a network of cells, where each
signal repeater antenna is a cell, although mobile telephone networks also exist.
The first mobile phone in 1983 weighed 800 grams and had no screen. These
devices have evolved into today's smartphones, which are a type of mobile phone built
on a mobile computing platform, with a greater capacity to store data and perform
activities, similar to that of a minicomputer, and with greater connectivity than a
conventional mobile phone. The term “smart,” as used for marketing purposes, refers to
the ability to be used as a pocket computer, even replacing a personal computer in some
cases. Its functionalities include, among others, the following:
■ Multitasking capability
■ Multi-capacitive touch screen (allows you to distinguish multiple pressure points at
the same time)
■ Connecting to Wi-Fi wireless networks
■ Wireless Internet connection capability (3G and 4G technology)
■ Email
■ Internet browsing
■ Sending and receiving short text messages (SMS)
■ Electronic diary
■ Front and rear camera
■ Digital photography and video editing
■ Video call
■ GPS satellite positioner
■ Digital television
■ Alarm clock
■ Calculator
■ Micro-projector
■ Portable radio
■ Playing MP3 music and other formats
■ Contact Management
■ Accelerometers
■ Ability to manage office documents in formats such as PDF and Microsoft Office
New developments planned for smartphones include features such as payment
methods, locators and personal identifiers.
Almost all smartphones also allow users to install additional software, often even
from third parties, which gives these phones a wealth of applications in different fields.
For example, there are programs to manage Primary Care appointments with Salud
Responde.
These devices have RAM, internal storage memory and in some cases can be
expanded through external memory cards, usually MicroSD.
The most commonly used operating systems for smartphones are: