0% found this document useful (0 votes)
34 views24 pages

THEME 27 Computer Systems. Hardware, Software

The document outlines the basic concepts of computer systems, including definitions of data, information, and processing, as well as the significance of the binary system and digital signals. It explains the structure of a computer, detailing its hardware components like the CPU, memory, and input/output peripherals, along with the roles of software. Additionally, it covers algorithms, programming, and the classification of computer systems based on their applications and types.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views24 pages

THEME 27 Computer Systems. Hardware, Software

The document outlines the basic concepts of computer systems, including definitions of data, information, and processing, as well as the significance of the binary system and digital signals. It explains the structure of a computer, detailing its hardware components like the CPU, memory, and input/output peripherals, along with the roles of software. Additionally, it covers algorithms, programming, and the classification of computer systems based on their applications and types.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Public Employment Offer 2016

Administrative Assistant of the Andalusian Health


Service
TOPIC 27. Computer Systems. Basic concepts,
information coding. Hardware, functional
structure of a computer, physical components,
input and output peripherals. Software, logical
support of a computer: basic concepts, current
operating systems (Windows, Unix). Basic
computer maintenance (Preventive and
Corrective). Basic knowledge of computer
security (Firewall, Anti-virus, Intrusion
Detection System). Basic concepts of mobility
devices (laptops, tablets, mobile phones).

1. Computer Systems. Basic concepts, information coding.

1.1. Basic definitions in computing.

• Data is brief, specific information provided in a specific format that can be


processed by a computer.
• Information consists of a set of interrelated and ordered data
according to a specific structure. This information can be stored, processed and
transmitted electronically, as well as transformed into a format for input and
comprehension by a human being (using a keyboard, screen, printer listing, etc.).
• Process or processing: Treatment and transformation of the information produced in
a computer in order to obtain results useful to humans.
• From the field of computing, communication is defined as the transmission of
information between different entities organized according to certain basic rules.
• The concept of coding is very important in communication. Message encoding is
essential to understanding its meaning. In the computer world, information is
encoded at different levels of complexity, the most basic of which is called the
BINARY SYSTEM. The binary system is based on digital signals that take only two
possible values (zero or one).
• A magnitude is a factor that can be measured, either by human senses or by other
means. In our computing context we can consider magnitude and signal as equivalent
concepts. A magnitude or signal is analog when it is continuous in time. A
magnitude or signal is discrete when it varies over time taking defined values, it
never takes intermediate values.

1.2. Digital signals and the binary system.

Digital signals are a specific case of discrete quantities. They are very important
since they are the basis for the functioning of modern computers.

Computers only handle digital signals; all the information they handle and the
operations they perform are encoded using them. The reason for this is due to

Topic 27. Computer systems. Hardware, software Page 1


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
mathematical and electronic design issues, which condition and simplify the construction
of computers and the programs that manage them.
The binary system is the numbering system used by computers. The base of the
binary system (as its name indicates) is two, which means that it only has two symbols:
0 and 1, compared to ten in the decimal system.
The digit 0 is generally used to represent the low level of the binary signal, and 1
for the high level. In computer physics, 0 would be equivalent to the absence of voltage
in the electric current, while 1 means the presence of current.

1.3. Bits, bytes and other measures of information.

The minimum amount of information that we can represent with the binary
system is called a bit, from Binary digit. The bit is one of the basic units of the binary
system and therefore of computing.
For example, if we want to say that something is black or white we can use a bit
(0 white - 1 black or vice versa), or to encode the sex of a person we can use a bit (0
male - 1 female or vice versa). No more than two values can be encoded with a bit.
The binary system can encode any number, using strings of zeros and ones.
These chains increase in length as the amount represented grows. For example, the
number 4 is 100 in binary, but 2010 is 11111011010.
A fundamental concept in computing is the Byte, a unit of information used as a
multiple of the bit. It is generally equivalent to 8 bits, which is why it is called an octet in
Spanish. To facilitate the handling of these binary strings, sets of binary digits are
grouped together. The most important groups are:

Name Initials Number of bytes (each byte contains 8 bits)


Byte or octet B 1
Kilobyte KB 1.024
Megabyte MB 1.048.576
Gigabyte GB 1.073.741.824
Terabyte TB 1.099.511.627.776
Petabyte PB 1.125.899.906.842.620
Exabyte EB 1.152.921.504.606.850.000
Zettabyte ZB 1.180.591.620.717.410.000.000
Yottabyte YB 1.208.925.819.614.630.000.000.000

Looking at this table we can see the following:


□ The multiplication factor in the third column is 1,024 times the previous amount
instead of 1,000 as in other magnitudes. This happens because 210 is equivalent to
1024 instead of 1,000 (remember that we are working in binary).
□ The byte or octet is considered the most important unit from the practical point of
view of computing, just as the bit was from the theoretical point of view because
it represents the smallest possible amount of information.

Page 2 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
1.4. Basics of digital electronics.

□ Physical level: Components and Circuits

Electronic circuits are mainly made up of resistors, capacitors, transistors, etc.


Currently, the most commonly used components, transistors, have evolved and are
grouped into very small and complex integrated circuits. This is achieved through a
significant process of miniaturization and inclusion in small silicon wafers. These are
protected from the outside in a plastic capsule, constituting the chips or integrated
circuits.

□ Logical Level: Logic Gates and Boolean Algebra

The operation of the computer is based on mathematical operations based on the


binary system, called Boolean algebra (also Boolean logic or binary logic), which was
developed in 1854 by the British mathematician George Boole. Boolean algebra governs
digital electronic circuits.
The logic level is based on ideal digital circuits that perform basic Boolean
operations. These ideal circuits are called logic gates and by combining them we can
achieve very complex operations, which are represented in tables called truth tables that
indicate how logic gates react to a combination of their input signals. All the operations
that a computer is capable of performing are based on these basic circuits.

1.5. Algorithms, programs and instructions.

□ Algorithm: Detailed description of a process or task by specifying the steps to follow


to achieve it. This concept is very important for computer programmers and
fundamental in computer science, since the design of a good algorithm constitutes a
previous phase to the development of any program.
□ Program: Set of instructions that controls the operation of a computer to achieve
results. The translation of an algorithm into its corresponding computer program is
done using a programming language. The programming language has its own syntax
that regulates the writing of instructions in an appropriate format.
□ Instruction: A specification that details the instructions that a CPU, that is, the
computer's microprocessor, can understand and execute.

1.6. Hardware and software.

The terms hardware and software are used to define the physical and logical parts
of a computer system respectively. The definitions of both terms are:
□ Hardware: Physical components and devices of a computer system.
□ Software: Programs that control the operation of a computer system. These programs
have very varied functions and cover many areas.

1.7. Computer science and computer systems.

The most widespread definition of computer science is: science that studies the
automatic and rational processing of information. But a computer by itself is not capable
of performing a useful task. This must be programmed, supervised and exploited by

Topic 27. Computer systems. Hardware, software Page 3


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
human beings. In addition, the computer needs software to perform these tasks.
A computer system is a system that allows information to be stored and
processed in an interrelated manner between the parts that compose it:
□ Hardware, which includes computers or any type of smart electronic device, such as
processors, memory, external storage systems, etc.
□ Software includes the operating system, firmware and applications, with database
management systems being especially important.
□ Human support includes technical staff who create and maintain the system (analysts,
programmers, operators, etc.) and the users who use it.

The Architecture of a Computer System is defined as the subset of rules,


standards and procedures that specify the interrelations that must exist between the
components and elements, physical and logical, of a Computer System and the
characteristics that each of these components must meet.
Depending on their application, computer systems can be classified as general-
use systems, which are used for various types of applications, or specific-use systems,
which are characterized by running one or very few programs. In specific-use systems,
the input/output units are fully adapted to the application, such as video game or robot
programs.
Depending on the type of computer used, computer systems are classified as:
□ Supercomputers: These are the fastest type of computer, they are also the most
expensive and are used for specialized applications that require a large amount of
calculation, for example weather forecasting, graphic animations, fluid dynamics,
nuclear research and oil exploration.
□ Large systems or mainframes: Very expensive and powerful, they are capable of
supporting hundreds or even thousands of users simultaneously. While a
supercomputer channels all its capacity into executing a few programs as quickly as
possible, a mainframe executes multiple programs concurrently.
□ Minicomputers (small servers): Medium-sized multiprocessor system, manages
hundreds of users simultaneously at a lower cost than a large system.
□ Workstations: Type of computer used in CAD/CAM engineering applications,
graphic design, software development, and other types of applications that require
moderate computing power and high graphics capabilities.
□ Microcomputers: Relatively inexpensive computer designed for an individual user
although it is used in conjunction with others to form computer networks. They
integrate the entire CPU into a single chip. Its use is very varied, from word
processing, accounting, database applications, games. In this group, Personal
Computers (PC) stand out.
□ Thin terminals: A client computer that relies on the central server for processing
tasks, and focuses primarily on transporting input and output between the user and
the remote server. They typically run only Web browsers or remote desktop
programs, meaning all significant processing occurs on the server they rely on.
2. Hardware, functional structure of a computer, physical
components, input and output peripherals.

2.1. Basic structure of a computer.

A computer is made up of a set of subsystems or components with specific


functions within its overall operation. Following traditional architecture, a computer

Page 4 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
consists of three fundamental subsystems:
□ Central Processing Unit: It is the subsystem in charge of extracting
sequentially from memory, analyze and execute instructions, as well as coordinate
all the computer's subsystems.
□ Memory: It is responsible for storing the instructions that make up the program and,
eventually, the data and results.
□ Input/Output Subsystems: They allow the computer to communicate with the outside
world.

a) Central Processing Unit (CPU)


It is the component responsible for processing information and regulating the
activity of the entire computer system. It is made up of the following units:
• Control unit that reads, interprets and executes the instructions of the program
being executed
• Arithmetic logic unit (ALU or UAL), performs logical and arithmetic operations
• A register area or storage area where the data being processed is stored.

The central processing unit is usually called by the acronyms CPU (Central
Process Unit) or UCP (Central Processing Unit), processor or microprocessor.
Central processing units are mainly characterized by the architecture used, the
length of the data word in bits, the use of coprocessors and the clock frequency in MHz
or GHz.

b) Memory
It is the computer unit where the data and instructions of the running programs
are stored, which the central processing unit recovers and records in it through the two
basic operations defined on it, one for reading and the other for writing. For
communication, both units, the CPU and the memory, are directly connected to the same
bus. Its capacity is usually measured in Megabytes or Gigabytes.
There are many criteria that can be chosen to classify memory types, one of them
being the possibility of writing to it:
• RAM (direct or random access): Selecting an addressable memory unit always
requires the same time, regardless of its physical location. This type of memory is
known as RAM (Random Access Memory). It is characterized by being able to read
and write on it. The computer's main memory is of this type. The information
contained in it is erased when there is no electrical current.
• ROM (Read Only Memory): This is recorded during the manufacturing process and

Topic 27. Computer systems. Hardware, software Page 5


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
cannot be rewritten. Among them, we can distinguish:
• ROM: configured at the time of manufacture, once configured they cannot be
erased.
• EPROM (Erasable Programmable ROM): They can be erased (by exposing them
to ultraviolet rays) and can then be programmed.
• EEPROM (Electrically Programmable ROM): These are electrically erasable
EPROM memories without having to be removed from their socket to be
exposed to ultraviolet rays. An example of these is the BIOS (where the basic
configuration of the computer components is stored).

c) Input/Output Subsystems or Peripherals


Peripherals are physical elements external to the computer that allow
communication between the central processing unit and the outside. Peripherals can be
classified into the following main categories:
□ Input: These are those through which information is introduced into the computer.
They are input peripherals:
■ Keyboard
■ Mouse
■ Digitizer tablet
■ Scanner
■ Stylus pen
■ Output: These are used to display and/or represent computer information. The most
used are:
■ Video system
■ Printer:
* Matrix or needle
* Laser
* Inkjet
* Dye sublimation
*Wax or thermal transfer
■ Plotter
□ Input/output peripherals: These are those that allow communication between
computers through a physical transmission medium. These peripherals have gained
undoubted importance in recent years, as they allow access to the organization's
resources or sharing information and peripherals between users of a community. This
type of peripherals includes:
■ Network cards
■ Multifunction printers
■ Touch screens

Page 6 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
□ Storage peripherals: They store the data used by the CPU, so that it can be used once
it has been removed from main memory, since this is erased every time the computer
is turned off.
■ Hard disk
■ Optical disc (CD, DVD or Blu-Ray)
■ Flash drives (USB flash drives, SD cards, microSD cards, etc.)
d) Bus
Among the basic components that define the structure of a computer, the bus
must be included. It constitutes the physical medium through which all the components
of a computer communicate with each other. Its capacity and performance must
correspond to the service demand made by the components connected to it, such as the
central processing unit, memory, etc.
A bus can be characterized from a technological point of view by several factors,
of which the most significant are its data word length, the arbitrary protocol and its
transfer speed in Megabytes or Gigabytes.

2.2. Storage units.

Storage units are peripheral devices of the system that act as a support medium
for programs, data and files.
Mass storage drives are used in all existing computing environments:
mainframes, desktops, laptops, etc.
Storage units or devices are also called secondary memory, in comparison to the
main memory found in a computer. They are classified according to the recording
method they use:

□ MAGNETIC DEVICES
■ Magnetic Tape: Characters are recorded on a tape in the
form of combinations of dots, on tracks parallel to the
longitudinal axis of the tape. These tapes are sequential
type support, with he
inconvenience that in order to access a certain piece of
information it is necessary to read all the information that
precedes it, with the consequent loss of time.
■ Hard Drive: It is currently the main information storage
subsystem in computer systems. It is a device responsible
for storing information persistently on a computer;
program files are saved in it. There are internal units
(cheaper but fixed) and external units (somewhat more
expensive but with the advantage of portability). They
are classified according to their physical size in inches
(1.8”, 2.5” or 3.5”). They are usually connected through a
SATA port.

Topic 27. Computer systems. Hardware, software Page 7


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
■ Floppy disk or flexible disk: A flexible disk or also
diskette (in English floppy disk), is a circular piece of
magnetic material that allows the recording and reading
of data, thin and flexible (hence its name) enclosed in a
thin rigid plastic casing. They are classified in 3 ½ and 5
¼ inch formats, although they are practically extinct.

□ OPTICAL DEVICES
■ CD-Rhttp://www.monografias.com/trabajos/
multimediaycd/multimediaycd.shtml: 650 MB or 700 MB
compact disc
capacity that can be read as many times as desired, but
whose content cannot be modified once it has been
recorded. Since they cannot be erased or rewritten, they
are suitable for storing files or other sets of unchanging
information.
■ CD-RW: It has the capacity of the CD-R with the difference that these discs are
rewritable multiple times. CD-RW drives can record information on both CD-R
and CD-RW discs.
■ DVD-ROM: is a compact disc with the capacity to store from 4.3 GB of
data on one side only. There are DVDs that store data on both sides of the disc,
and can even combine double-sided with a double layer to result in a maximum
storage capacity of 17 GB. DVD-ROM drives are capable of reading CD-R and
CD-RW disc formats.
■ DVD-RAM: It has a capacity of 2.6 GB on one side of the disc and 5.2 GB on the
other.
a double-sided disc. DVD-RAMs are capable of reading any CD-R or CD-RW
disc but are not capable of writing to them. DVD-RAMs are rewritable but the
discs cannot be read by DVD-ROM drives.
■ BLU-RAY: Also known as BD, is an optical disc format
used for high definition video and with a high-density data storage capacity
greater than that of DVD. It can store from 25 to 500 GB depending on the
number of layers and their density.

□ MAGNETO-OPTICAL DEVICES
■ MiniDisc: Small disc (almost the size of a
half a CD) initially designed to hold up to 80 minutes of
audio. It can be used to store computer data or audio
tracks. Magneto-optical recording is a combined system
that records information magnetically under the
incidence of a laser beam, and reproduces it by optical
means.

□ FLASH MEMORIES
■ Memory cards: non-volatile memory devices, meaning they retain data even
when not powered by an electrical source. They are used in digital cameras,
mobile phones and digital music devices. Its capacity increases rapidly, and there
are several types depending on their design:
1 Compact Flash (CF)
1 Smartmedia (SM)

Page 8 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
1 Memory Stick (MS)
» Multimedia Card (MMC)
» Secure Digital (SD)
1 MiniSD
1 MicroSD
1 XD Picture (XD)

■ Pen Drive or Memory Stick: It is a small


storage device that uses flash memory to save
information. They are resistant to the
scratches and dust that have plagued previous
forms of portable storage, such as CDs and
floppy disks. They are easily recognized by
operating systems, are inexpensive, and have
large storage capacity.
■ SSD hard drives: Most SSD drives are non-
volatile NAND flash memories, resulting in a
very fast, high-capacity, robust and small-
sized device. Being non-volatile memories, they
do not require any type of constant power supply
or batteries to avoid losing the stored data.

■ CLOUD STORAGE
This option frees up space on desktop computers
and transfers files to remote hard drives, which
normally guarantees the availability of information. There are two types of
online storage: short-term storage, normally used for transferring large files
via the Web; and long-term storage, used to store information that would
normally be stored on a personal computer's hard drive.

3. Software, logical support of a computer: basic


concepts, current operating systems (Windows,
Unix).

Software is the logical equipment or logical support of a computer


system, which includes the set of necessary logical components that make it
possible to carry out specific tasks, as opposed to the physical components that
are called hardware.
The most widespread definition of software is the set of computer
programs, procedures, rules, documentation and associated data, which are part
of the operations of a computing system.
Logical components include, among many others, computer applications;
such as the word processor, which allows the user to perform all tasks related
to text editing; the so-called system software, such as the operating system,
which basically allows the rest of the programs to function properly, also
facilitating the interaction between the physical components and the rest of the
applications, and providing an interface with the user.
For practical purposes, software can be classified into three main types:

Topic 27. Computer systems. Hardware, software Page 9


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
□ System software or operating systems: Programs that are essential for the operation
of a computer device; they manage its hardware resources and facilitate certain basic
tasks for the user, programmer or other program groups, isolating it especially from
the processing related to the internal characteristics of: memory, disks, ports and
communication devices, printers, screens, keyboards, etc. System software offers the
user and the programmer appropriate high-level interfaces, drivers, tools and support
utilities that allow the maintenance of the global system. Includes among others:
■ Operating systems
■ Device Drivers
■ Diagnostic tools
■ Correction and Optimization Tools
■ Servers
■ Utilities
■ Programming software: Also called programming languages or development
systems. It is the set of tools that allow the programmer to develop computer
programs, using different alternatives and programming languages, in a practical
way. They basically include:
■ Text editors (not to be confused with word processors)
■ Compilers
■ Interpreters
■ Linkers
■ Debuggers
■ Integrated Development Environments (IDE): They group the previous tools in a
visual environment to facilitate the programmer's work.
■ Application software: These are the result of developments made with the
programming languages of the previous group, which originate the applications that
end users manage in any field of activity that can be automated or assisted, especially
in business. In this group we find word processors, graphic editors, design programs,
databases, etc. Among many others, it includes the following varieties:
■ Applications for industrial automation and system control
■ Office applications (word processors, spreadsheets, presentations...)
■ Educational software
■ Enterprise software
■ Databases
■ Telecommunications (for example the Internet and its entire logical structure)
■ Social networks (Facebook, Twitter, Whatsapp, Instagram, etc.)
■ Video games
■ Medical software
■ Numerical and symbolic calculation software
■ Computer Aided Design (CAD) Software
■ Computer Aided Manufacturing (CAM) Software
3.1. Definition of operating system.

An operating system is a program that performs very important functions of


communication between the user and the machine, as well as control and management of
the device, be it a computer, mobile phone, tablet, DVD player, etc. It is a program or set
of programs with the following objectives:
1. Control the operation of the hardware of the device on which they operate.
2. Hide complicated details and make the device easier for the user to use.
3. Effectively manage available device resources for proper use and optimal
performance.

Page 10 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
Today's operating systems are made up of a set of small programs with well-
defined functions that work together as a homogeneous system. The most important are
the control programs responsible for coordinating and optimizing the most important
resources of the device, such as the processor, memory or peripherals. Operating systems
group these resource management modules into a set called the kernel.

3.2. Operating system components.

□ Process management
A process is simply a running program that needs resources to perform its task: CPU
time, memory, files, and I/O devices. The operating system is responsible for
creating and destroying processes, stopping and resuming them, and allowing them
to communicate and synchronize.
Process management could be similar to office work. You can have a list of tasks to
do and set high, medium, low priorities for them, for example. We should start by
doing the high priority tasks first and when they are finished continue with the
medium priority tasks and then the low priority tasks.
□ Main memory management
Memory is a large, compartmentalized store of information that is accessed by a
single address. This fast-access data store is shared by the CPU and I/O devices, is
volatile, and loses its contents in the event of system failures.
□ Managing secondary storage
A secondary storage system is necessary, since main memory (primary storage) is
volatile and also too small to store all the programs and data. The operating system is
responsible for planning disks, managing free space, assigning and ordering data
storage.
□ The entry and exit system
It consists of a temporary storage system (cache), a device driver interface and
another for specific devices. The operating system must manage the temporary I/O
storage as well as usage requests.
□ File system
Files are collections of related information, defined by their creators. These store
programs and data such as images, text, database information, etc. The operating
system is responsible for managing files and folders, as well as making periodic
backups.
□ Protection systems
Mechanism that controls the access of programs or users to system resources,
responsible for distinguishing between authorized and unauthorized use, as well as
specifying the security controls to be performed.
□ Communications system
To maintain communications with other systems, it is necessary to be able to control
the sending and receiving of information through network interfaces.
Communication points must also be created and maintained for applications to send
and receive information, and virtual connections must be created and maintained
between applications that are running locally and those that are running remotely.

Topic 27. Computer systems. Hardware, software Page 11


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
□ System programs
They are utility applications that are supplied with the operating system but are not
part of it. They provide a useful environment for developing and executing
programs. Some of these utilities are used to manage files, provide information on
the status of the system, support programming languages, manage communications,
etc.
□ Resource Manager
As a resource manager, the operating system manages:
□ The central processing unit (where the microprocessor is housed)
□ Input and output devices
□ Main (or direct access) memory
□ Disks (or secondary memory)
□ Processes (or running programs)
□ And in general all the resources of the system

3.3. Security in operating systems.

Operating systems require good computer security, both for hardware and for
programs and data. The most widespread mechanisms that operating systems provide to
ensure security are the following:
□ Authentication using passwords (passwords)
□ Sharing resources to authorized groups
□ Definition of access policies according to a hierarchical or group work scheme
□ Availability of information safeguarding systems

3.4. Windows operating system.

Microsoft Windows is the name of a family of distributions for PCs,


smartphones, servers and embedded systems (vending machines, photocopiers, etc.),
available for multiple architectures. Microsoft introduced an operating environment
called Windows on November 20, 1985 as an add-on to MS-DOS (the first mass-market
text-based PC operating system) in response to the growing interest in graphical user
interfaces (GUI).
Its name comes from the English word “windows”, which means window, that is,
the boxes where the applications that are running are presented. Its features include:
□ The main window from which you access the operating system is called the desktop.
□ On the desktop we can place icons, which are small graphic images that allow us to
directly access installed applications or data files (office package documents, photos,
music, videos, etc.)
□ In addition to the desktop, we can use the “Start” button, usually located at the
bottom left of the desktop, from where we can access practically all installed
applications and many other features of the operating system.
□ Allows handwriting recognition
□ Support for virtual hard disks
□ Optimized performance on multi-core processors (several cores working at the same
time)
□ Support for systems using multiple graphics cards from different vendors

Page 12 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
□ Windows Media Center (media management)
□ Small basic utility applications: Paint (photo editing), Wordpad (word processor),
calculator, Windows explorer (examines files and folders on storage drives), task
scheduler (allows you to automate tasks that you specify), etc.
□ Control panel, from which you can calibrate the color of the screen, calibrate the
shape of the text that appears on the screen, time, language, configure peripherals or
network connections such as the Internet, etc.
□ Troubleshooting Assistant
□ Credential Manager (User Permissions)
□ Icons in the notification area (bottom right of the desktop) that display information
about running applications or operating system details
□ Maximum file length of 260 characters, including path
□ The Activity Center, where the safety categories and equipment maintenance are
integrated

Microsoft Windows came to dominate the global personal computer market, with
more than 90% of the market share. The first version was released in 1985 and became
widely used thanks to its window-based graphical user interface (GUI). Until that time
and until much later as the heart of Windows, the most widely used operating system
was MS-DOS (Microsoft Disk Operating System), which at that time had a command
line-based interface, that is, in text mode, since it lacked graphical presentations. The
first version in Spanish was Windows 3.0.
The latest versions of this operating system are Windows 10 for desktop
computers, Windows Server 2016 for servers, and Windows Phone 10 for mobile
devices.
Windows 10 was released to the general public on July 29, 2015, being the first
version that has integrated all Windows devices, being a single operating system for
desktops, laptops, smartphones and tablets offering a better experience and eliminating
some problems that were presented with the previous version, Windows 8.
3.5. Unix operating system.

Unix is a portable, multitasking, multi-user


operatinghttp://es.wikipedia.org/wiki/Sistema_operativo system originally developed in
1969 by a group of employees at AT&T's Bell Laboratories. Throughout history, a large
number of commercial implementations of UNIX have emerged. However, a small set of
products have consolidated the market and prevail thanks to a continuous development
effort by their manufacturers.
The Unix system is an operating system that supports multiple users as well as
multiple tasks, which means that it allows multiple programs to run simultaneously on a
single computer or multiprocessor by one or more users. This system has one or more
command interpreters (shell) as well as a large number of commands and many utilities
(assemblers, compilers for various languages, word processor, email, etc.). Furthermore,
it is highly portable, meaning that it is possible to deploy a Unix system on almost any
hardware platform.
Today, Unix systems have gained a foothold in professional and university
environments thanks to their stability, high level of security and compliance with
standards, especially with regard to networks.
UNIX is composed of three fundamental parts:
■ Kernel (or core): Responsible for managing system resources (terminals, printers,

Topic 27. Computer systems. Hardware, software Page 13


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
disks, etc.).
■ File System: Establishes the organization of data storage on the disk.
■ Shell: It is the UNIX command interpreter. Although it is nothing more than a
utility program, is the part that the user uses to communicate with the operating
system: the UNIX user interface.

3.5.1. Linux

Linux is a free and freely distributed operating system inspired by the Unix
system, originally written by the Finnish Linus Torvalds. Being an open source system,
this operating system has been growing and improving with the help of thousands of
programmers from around the world through the Internet. In some cases it is also called
GNU/Linux, because the system software usually comes from the free GNU operating
system.
Linux is not generally as easy to use as other operating systems, although great
efforts are being made to make it easier to use. Despite all this, Linux's enormous
flexibility, great stability and low cost have made this operating system a very interesting
option for users who work over networks, surf the Internet, or are engaged in
programming.
One of the first concepts that appear when starting out with Linux is the concept
of distribution. A distribution is a grouping of the Linux operating system kernel and a
number of other general-purpose and not-so-general-purpose applications. The most
popular distributions are Debian, Slackware, OpenSUSE and Ubuntu.
□ Guadalinex
Guadalinex is a Linux distribution promoted by the Andalusian Government to
encourage the use of free software in its community. It is inspired by GnuLinEx, a
similar project from the Junta de Extremadura. Initially it was based on the “Debian
GNU/Linux” distribution and since version 3.0 it is based on another distribution called
“Ubuntu”.
It includes everything you need to have a truly usable system: Internet tools,
office applications and a host of utilities such as multimedia players, graphic design
editors, development applications, etc.
The current version of Guadalinex V9 introduces several new features, the first
being that it changes the distribution used until now to develop on Linux Mint. In
addition, there is a 'lite' version of Guadalinex with fewer technical requirements and
features, as well as one intended for professional use called GECOS.

4. Basic computer maintenance (Preventive and


Corrective).

Both preventive maintenance (avoiding or minimising the appearance of


problems) and corrective maintenance (alleviating or eliminating problems that have
occurred) refer to the software section, since the maintenance referred to in the hardware
section must be carried out mostly by the corresponding technical service.
Preventive maintenance consists of constant attention to cleaning, checking and

Page 14 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
tuning the different components of a computer system. Most of the problems that arise in
daily work are due to the lack of a specific computer application for equipment
maintenance.
Maintenance has techniques to give it a longer and incident-free useful life. We
must keep in mind that it is necessary to maintain the software since continuous use
generates a series of changes in the original configuration of the system, causing drops in
performance that, when accumulated over time, can cause serious problems.
The main preventive recommendations are:
■ Check the reliability of the websites you access, as some may contain malware
(malicious software).
■ Have an updated antivirus, since the virus database must be updated to face new
threats that are rapidly emerging.
■ Have a firewall to prevent intruders from entering our computer and prevent attacks
on the computer. Modern antivirus solutions often include a firewall, although some
operating systems already have one built-in.
■ Scan and clean your PC from time to time using computer applications designed for
this purpose, such as cleaning system files of redundant or outdated information,
removing malware, unnecessary files, etc.
■ Avoid SPAM messages that arrive in emails. These messages usually arrive from an
unknown sender and are stored in the Spam folder. They are generally viruses or
other malware of low severity, but sometimes they can have fatal consequences such
as formatting the computer and
hence the loss of important files from the computer.

As for corrective software maintenance, it refers to the correction, repair or total


reinstallation of a software application that is presenting inadequate functioning. This
maintenance ranges from any design software, office software, etc. to an operating
system.
Despite testing and verification that occurs earlier in the software life cycle,
programs may still have defects. Corrective maintenance aims to locate and eliminate
possible program defects.
A failure occurs when the behavior of a system is different from that stated in the
specification. Software failures can include, but are not limited to:
■ Processing, for example, incorrect output from a program.
■ Performance, such as an excessively high response time when searching for
information.
■ Programming, for example, inconsistencies in the design of a program.
■ Documentation, for example, inconsistencies between the functionality of a program
and the user manual.

For a standard user, the most common incidents that occur in applications or
programs are the following:
o Presence of Viruses: refers to the intrusion of computer viruses that begin to damage
the software and must be repaired immediately so that the programs are not lost.
o Improper use of the operating system: is the misuse of the main software and
applications of a computer.
o Improper use of applications: refers to the misuse of programs, which can cause

Topic 27. Computer systems. Hardware, software Page 15


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
junk data errors in the operating system.
o Power failures: This is the loss or alteration of electricity that causes the computer
to shut down, causing errors in the operating system. In the Windows operating
system, the next time the computer starts, it will ask us if we want to run the option
to repair the system.

Possible solutions to the above problems are as follows:


■ Application updates: In order to receive these updates, we must be properly
registered with the software manufacturer, a necessary requirement for our
applications to be at the forefront.
■ Operating System Repair: refers to patches or updates that are installed to improve
performance or fix security holes.
■ Repairing or replacing applications: This refers to reinstalling software or replacing it
with software that works properly.
■ Complete change of the operating system: this is the change of version or to another
different system.
Carrying out proper corrective software maintenance generates advantages such
as reliability (the ability to perform a required function under established conditions for
a given period of time), longer equipment life, lower repair costs and reduced loss of
time.
Although part of the preventive maintenance of the software can be carried out by
the Andalusian Health Service workers themselves, corrective maintenance is carried out by
IT service professionals, since they are the only ones who have the permits to be able to
carry out these interventions.
5. Basic knowledge of computer security (Firewall, Anti-
virus, Intrusion Detection System).

Computer Security is understood as a set of techniques and procedures that


guarantee:
□ Availability of information: Avoid data loss or inability to process it
□ System Integrity: Using the most up-to-date, accurate, authoritative and complete
information
□ Data confidentiality: Guarantee each person's access to the information that
corresponds to them, handling it according to pre-established restrictions
□ Accountability: Positive association of a process with its source of authorization,
such that users are responsible for the actions they perform.
□ Auditability: Statistics on aspects such as system logins, resource usage, user
actions, etc.
□ Usability: There should be no unacceptable restrictions on users, nor should they
negatively affect the efficiency of information systems.

Computer security can be studied from two aspects, both closely related and
sharing objectives and budgets:
• Physical security: Set of mechanisms and standards aimed at protecting people,
facilities, equipment and communication elements from potential damage.
• Logical security: Set of operations and techniques aimed at protecting information
against destruction, modification, improper disclosure or delay in its management.

The security of information systems is currently being addressed in a


comprehensive manner, taking into account the variety of services offered by these

Page 16 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
systems and the complexity of communications.

5.1. Firewalls.

A firewall is a part of a system or network that is designed to block unauthorized


access while allowing authorized communications. It is also known as a traffic filter.
It is a device or set of devices configured to allow, limit, encrypt, decrypt traffic
between different areas based on a set of rules and other criteria.
Firewalls can be implemented in hardware or software, or a combination of both.
Firewalls are frequently used to prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially intranets. All messages entering or
leaving the intranet pass through the firewall, which examines each message and blocks
those that do not meet specified security criteria. It is also common to connect the
firewall to a third network, called a demilitarized zone or DMZ, where the organization's
servers are located that must remain accessible from the outside network.
A properly configured firewall adds necessary protection to the network, but it
should never be considered sufficient. Computer security covers more areas and more
levels of work and protection.
Limitations depend on the type of attack, as if it uses traffic that is accepted by
the firewall (for example, using expressly open TCP ports) or simply does not use the
network, it will still be a threat. The following list shows some of these risks:
• A firewall cannot protect against attacks whose traffic does not pass through it.
• The firewall cannot protect against threats to which you are exposed by internal
attacks or negligent users. The firewall cannot prevent corporate spies from copying
sensitive data onto physical storage media (disks, memory sticks, etc.) and removing
it from the building.
• The firewall cannot protect against social engineering attacks (i.e., the practice of
obtaining sensitive information by manipulating legitimate users and tricking them
into gaining access to the system by falsifying their identity).
• The firewall cannot protect against possible attacks to the internal network by
computer viruses through files and software. The real solution is for the organization
to install antivirus software on every machine to protect against viruses arriving
through any storage medium or source.
• The firewall does not protect against security breaches in services and protocols
whose traffic is permitted. Services published on the Internet must be properly
configured and secured.

5.2. Antivirus.

In computing, antivirus programs are programs whose objective is to detect or


eliminate computer viruses. They were born during the 1980s. Over time, the emergence
of more advanced operating systems and the Internet has led to antivirus programs
evolving into more advanced programs that not only seek to detect computer viruses, but
also block them, disinfect files and prevent them from becoming infected. They are now
able to recognize other types of malware, such as spyware, worms, Trojans, rootkits
(continuous privileged access to a computer but which keeps its presence hidden from
administrators' control by corrupting the normal functioning of the operating system or

Topic 27. Computer systems. Hardware, software Page 17


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
other applications), etc.
These applications must be kept up to date, otherwise we run the risk of exposing
the computer system to newly created threats for which the antivirus program is not
prepared.
As for the term virus, it is a concept that includes applications that permanently
or temporarily alter the functioning of the computer where they are introduced. The
concept of viruses is mainly applicable to desktop or laptop computers, although in
practice they can affect any electronic device such as tablets or smartphones. There are
different types of computer viruses:
• Software virus: An application that attaches itself to other applications and runs when
its carrier is running. It is extended when the carrier is copied onto magnetic media
or installed in other physical equipment. They have the ability to self-replicate.

• Worm: Application that moves through the memory of networked computers. It has
its own identity. It is designed to search for unoccupied memory areas where it can
copy itself repeatedly, until it manages to overflow the memory. It spreads by taking
advantage of network facilities such as email.
• Logic bomb: These are programs that are activated when a specific event occurs. The
condition is usually a date (Time Bombs), a key combination, or certain technical
conditions (Logic Bombs). If the condition does not occur it remains hidden from the
user.
• Trojans: Create a security hole to steal information or alter the hardware system or,
in an extreme case, allow an external user to control the computer. It can go
unnoticed for a long time.
• Hoax: They are not viruses nor do they have the ability to reproduce on their own.
These are messages with false content that encourage users to make copies and send
them to their contacts. They often appeal to moral sentiments (“Help a child with
cancer”) or to the spirit of solidarity (“Warning about a new, very dangerous virus”),
trying to take advantage of the lack of experience of novice users.
• Joke: Like hoaxes, they are not viruses, but they are annoying. For example, a
page that moves from one side to the other, and if you try to close it, a window
may appear that says: “The window cannot be closed.”

In any of the above cases, the infected operating system begins to experience a
series of anomalous or unexpected behaviors. These behaviors are what give the trace of
the problem and must allow for its recovery.
The most common actions that a virus can cause are the following:
• Attaching itself to a program installed on the computer, allowing it to spread over the
network or removable storage units, such as USB drives.
• Display humorous, usually annoying, messages or images on the screen.
• Slow down or crash your computer.
• Destroy information stored on the disk, in some cases vital to the system, which will
prevent the computer from functioning.
• Reduce disk space.
• Annoying the user by closing windows, moving the mouse...
• Messages that automatically run programs, such as your email program directly
opening an attachment.
• Social engineering, for example, phishing (impersonating a company so that the user
reveals their login details and makes fraudulent use of them).

Page 18 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
• Installing other software that may contain one or more malicious programs.
Methods to contain or reduce the risks associated with viruses can be active or
passive. Active methods are based on the type of antivirus we have:
• Detection only: These are vaccines that only update infected files, however, they
cannot delete or disinfect them.
• Detection and disinfection: These are vaccines that detect infected files and can
disinfect them.
• Detection and action abort: These are vaccines that detect infected files and stop the
actions caused by the virus.
• Signature comparison: These are vaccines that compare the signatures of suspicious
files to determine if they are infected.
• File Signature Comparison: These are vaccines that compare the signatures of
attributes stored on your computer.
• By heuristic methods: these are vaccines that use heuristic methods (reasoning and
deductive methods) to compare files.
• User Summoned: These are vaccines that are instantly activated by the user
• Invoked by system activity: These are vaccines that are instantly activated by
operating system activity.

On the other hand, passive methods refer to making backups, which guarantee
data recovery when none of the above has worked. Companies should also have a plan
and details of all installed software to have a contingency plan in case of problems.

5.3. Intrusion detection system.

An intrusion detection system (or IDS) is a program for detecting unauthorized


access to a computer or network.
It usually has virtual sensors, such as a network sniffer (data packet or
information block analyzer) with which the IDS core can obtain external data (generally
about network traffic). Using these sensors, the IDS detects anomalies that may indicate
the presence of attacks or false alarms.
The operation of these tools is based on the detailed analysis of network traffic,
which, upon entering the analyzer, is compared with signatures of known attacks, or
suspicious behavior, such as port scanning, malformed packets, etc. The IDS not only
analyzes what type of traffic it is, but also reviews the content and its behavior.
Normally this tool is integrated with a firewall. The intrusion detector is unable to
stop attacks on its own, except those that work together in a gateway device with firewall
functionality, becoming a very powerful tool since it unites the intelligence of the IDS
and the blocking power of the firewall, being the point where the packets must
necessarily pass and can be blocked before entering the network.
IDSs typically maintain a database of “signatures” of known attacks. These
signatures allow the IDS to distinguish between normal PC usage and fraudulent usage,
and/or between normal network traffic and traffic that may be the result of an attack or
attempted attack.
There are two types of intrusion detection systems:
■ HIDS (HostIDS): The operating principle of a HIDS depends on the success of the
intruders, who will generally leave traces of their activities on the attacked computer
when they attempt to take over it for the purpose of carrying out other activities.

Topic 27. Computer systems. Hardware, software Page 19


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
HIDS attempts to detect such modifications on the affected equipment, and report its
findings.
■ NIDS (NetworkIDS): A network-based IDS, detecting attacks on the entire network
segment. Your interface must be actively running to capture all network traffic.

While both are related to information network security, an IDS differs from a
firewall in that the latter generally scans externally for intrusions to prevent them from
occurring. A firewall limits access between networks, to prevent an intrusion, but it does
not determine an attack that may be occurring internally on the network. An IDS
evaluates an intrusion when it takes place and generates an alarm. An IDS also watches
for attacks that originate within the system. This is typically achieved by examining
communications, identifying through heuristics or patterns (known as signatures),
common, already classified attacks, and taking action to alert an operator.
To implement an intrusion detection system, it must be taken into account that it
is possible to opt for a hardware, software or even a combination of these two solutions.
The possibility of introducing a hardware element is due to the high processor
requirement in networks with a lot of traffic and the large memory consumption for
signature records and databases with possible attacks.

6. Basic concepts of mobility devices (laptops, tablets,


mobile phones).

6.1.Notebook computer.

A laptop or notebook is a portable or portable personal computer, typically


weighing 1 to 3 kg. They are capable of performing most of the tasks performed by
desktop computers, also called “desktop or tower” computers, with similar capacity and
with the advantage of their reduced weight and size; added to the fact that they have the
capacity to operate for a certain period of time without being connected to an electrical
network.
The English word laptop translated into Spanish means: lap (lap) and top (on
top), that is, a computer that can rest on the legs.
They usually work with a battery or with an adapter that allows both charging the
battery and supplying power. A specification for wireless charging of laptop batteries is
currently being developed. They usually have a small battery that allows the clock and
other data to be maintained in the event of a power shortage.
In general, for the same price, laptops tend to have less power than desktop
computers, including less hard drive capacity, less graphics and audio capabilities, and
less powerful microprocessors. However, they usually consume less energy and are
quieter.
There is no manufacturing standard, as each company has its own design and
construction style. This increases the prices of components if they need to be replaced or
repaired, and makes them harder to obtain. There are even often incompatibilities
between laptop components from the same manufacturer.
Let's look at a number of features specific to laptops:
■ All of its hardware components are designed to generate the lowest possible energy

Page 20 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
consumption, in addition to including mechanisms that reduce consumption by
deactivating components that are not being used.
■ It takes up little space and therefore allows you to enjoy more free space.
■ It weighs relatively little
■ Few cables are needed for its operation, making connecting devices easier than with a
traditional desktop computer.
■ They usually have an LED screen to achieve greater energy savings and battery life.
■ They have a smaller keyboard than a desktop PC, although they now include a
separate numeric keypad, which is very useful in business environments.
■ They have a touchpad, which functions as a mouse.
■ They have an Ethernet network port to be able to connect by cable to a local area
network, which can indirectly provide Internet access, or through a router to provide
direct access to the Internet without being connected to a local network.
■ They have Wi-Fi wireless connections and in some cases a Bluetooth system.
■ They are usually equipped with several USB ports to connect external devices such
as a traditional mouse, external hard drive, USB flash drives, etc.
■ Some computers have other connections such as a Firewire port, which is used to
connect digital video cameras primarily.
■ They have a video output to be able to make presentations with the help of a
projector, using VGA connections, which are older, or HDMI, the most current ones
that provide high definition output.

In addition to conventional laptops, there are other models with different features
and prices:
■ Ultrabook. It is characterized by being extremely light and thin, compared to its
predecessors. They appeared in 2011, created by the microprocessor manufacturing
company INTEL. However, the term has become commonly used to refer to this type
of computer, even though they may contain processors and chipsets (integrated
circuits) from other manufacturers. It represents a more powerful option than a
traditional laptop with greater processing power and graphics, more memory, a larger
screen, and ultimately, better features, although its price is significantly higher.
■ Netbook. It is a category of portable computer, low cost and small in size, which
provides greater mobility and autonomy. Although computers with this name were
created as early as 1999, it was not until 2008 that the current specifications for these
computers were established. What defines a netbook is not its size, but the reduction
of internal components since they fundamentally lack an optical drive and
consequently reduce their weight. Netbooks are generally cheaper because they are
optimized for more basic uses, such as multimedia functions or Internet browsing.
They have much less powerful processors but with clearly lower consumption.

6.2. Tablets or tablets.

A tablet computer, also known in many places as a tablet computer (from the
English "tablet" or "tablet computer"), is a portable computer larger than a smartphone or
PDA, integrated with a touch screen (single or multi-touch) with which interaction is
primarily achieved with the fingers or a pointer, without the need for a physical keyboard
or mouse. The latter are replaced by a virtual keyboard and, in certain models, by a
wheel integrated into one of the edges of the screen.
The term can apply to a variety of formats that differ in the size or position of the
screen relative to a keyboard. The standard format is called a slate, usually 7 to 12

Topic 27. Computer systems. Hardware, software Page 21


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
inches, and lacks an integrated keyboard although it can be connected to a wireless one
(for example, Bluetooth) or via a USB cable (many operating systems directly recognize
USB keyboards and mice).
Mini tablets are similar but smaller in size, often 7 to 8 inches. Another format is
the convertible laptop, which has a physical keyboard that rotates on a hinge or slides
under the screen, allowing it to be handled as a classic laptop or as a tablet. The same is
true for hybrid devices, which have a physical keyboard but can be separated from it to
act as a whiteboard.
Booklets include two screens, at least one of them touch-sensitive, displaying a
virtual keyboard on it.
Phonographs are large smartphones that combine the features of tablets with
those of tablets, or use parts of both.
In 2001, the Finnish company Nokia developed a prototype tablet, weighing
almost two kilos and with a ten-inch touch screen. However, the first devices on the
commercial market only appeared at the beginning of the 21st century. Microsoft
launched the Microsoft Tablet PC, which it licensed to several tablet manufacturers, but
it had relatively little success. In 2010, Apple introduced the iPad and achieved
commercial success. Subsequently, most manufacturers have tablet models in their
catalogue, which has caused the market to be flooded with an immense quantity of
tablets with different sizes, applications, prices and operating systems.
The main functionalities of tablets are:
• Reading e-books
• Offline reading of web pages
• Consultation and editing of office suite documents
• Web browsing (via WiFi, USB or internal 3G).
• Telephone calls, if they are 3G, thus replacing the mobile phone; a Bluetooth hands-
free kit is usually used
• GPS
• Music playback
• Viewing videos and movies, loaded from internal memory, memory or USB hard
drive
• HD video and photo camera
• Videoconference

The tablet works like a computer, except that it is lighter in weight and more
oriented towards multimedia environments, reading content and web browsing than
towards professional uses. It can read a USB memory stick or external hard drive.
Some tablets have 3.5 minijack (headphone connection), VGA or HDMI
connectors to connect to a television or computer monitor.
Tablets, like traditional computers, can run different operating systems. These are
divided into two classes:
o Operating systems based on the desktop of a traditional computer
The most popular are Microsoft Windows and a variety of Linux systems. o Post-
PC operating systems (similar to those on smartphones)

The most popular ones include Google's Android. There are also products with
Windows 8, Google's Chrome OS, FireFox Os, Apple's iOS and other alternatives.

Page 22 Topic 27. Computer systems. Hardware, software


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
Currently, the most widely used operating system is Google's Android, with a
vast majority of the market share far above its competitors, around 90%. This operating
system is based on the Linux kernel and was designed primarily for touchscreen mobile
devices such as smartphones and tablets, as well as smart watches, televisions and cars.

6.3. Mobile phones.

The mobile phone is an electronic wireless device for accessing and using the
services of the mobile telephone network. It is also called cellular in most Latin
American countries because the service works through a network of cells, where each
signal repeater antenna is a cell, although mobile telephone networks also exist.
The first mobile phone in 1983 weighed 800 grams and had no screen. These
devices have evolved into today's smartphones, which are a type of mobile phone built
on a mobile computing platform, with a greater capacity to store data and perform
activities, similar to that of a minicomputer, and with greater connectivity than a
conventional mobile phone. The term “smart,” as used for marketing purposes, refers to
the ability to be used as a pocket computer, even replacing a personal computer in some
cases. Its functionalities include, among others, the following:
■ Multitasking capability
■ Multi-capacitive touch screen (allows you to distinguish multiple pressure points at
the same time)
■ Connecting to Wi-Fi wireless networks
■ Wireless Internet connection capability (3G and 4G technology)
■ Email
■ Internet browsing
■ Sending and receiving short text messages (SMS)
■ Electronic diary
■ Front and rear camera
■ Digital photography and video editing
■ Video call
■ GPS satellite positioner
■ Digital television
■ Alarm clock
■ Calculator
■ Micro-projector
■ Portable radio
■ Playing MP3 music and other formats
■ Contact Management
■ Accelerometers
■ Ability to manage office documents in formats such as PDF and Microsoft Office
New developments planned for smartphones include features such as payment
methods, locators and personal identifiers.
Almost all smartphones also allow users to install additional software, often even
from third parties, which gives these phones a wealth of applications in different fields.
For example, there are programs to manage Primary Care appointments with Salud
Responde.
These devices have RAM, internal storage memory and in some cases can be
expanded through external memory cards, usually MicroSD.
The most commonly used operating systems for smartphones are:

Topic 27. Computer systems. Hardware, software Page 23


Public Employment Offer 2016
Administrative Assistant of the Andalusian Health
Service
or Google Android
or Microsoft Windows Phone
or Mozilla's Firefox OS
or Apple iOS
or BlackBerry OS
or Samsung Bada
or Nokia Symbian
or MeeGo from Moblin and Maemo
or webOS
or Windows CE
o Other minority options
Like any other computing device, it is exposed to security risks, so extreme
precautions must be taken, just as with computers, by installing antivirus systems and
installing applications that allow the device to be cleaned of malware (malicious
software).
The current trend in the smartphone market is moving towards the tabléfono or
tabletofono (a contraction of tablet and telephone) which are alternatives in Spanish for
the term: Phablet (from the English: contraction of phone and tablet) or fableta, informal
names used to designate mobile or portable electronic devices, with touch screens
between approximately 5 and 7 inches, and with multiple hardware and software
features.
This type of device combines the functionalities and capabilities of a smartphone
with a tablet, and may incorporate a stylus, that is, a digital pen or pointer.

Page 24 Topic 27. Computer systems. Hardware, software

You might also like