Computing Essentials 2010 Edition Timothy J. O'Leary
Computing Essentials 2010 Edition Timothy J. O'Leary
com
https://ebookgate.com/product/computing-
essentials-2010-edition-timothy-j-oleary/
OR CLICK HERE
DOWLOAD NOW
https://ebookgate.com/product/commercial-electrical-inspector-
icc-e2-exam-prep-2018th-edition-cliff-burger/
ebookgate.com
https://ebookgate.com/product/irish-immigrants-timothy-j-paulson/
ebookgate.com
https://ebookgate.com/product/clinical-psychology-8th-edition-timothy-
j-trull/
ebookgate.com
Clinical Psychology 7th Edition Timothy J. Trull
https://ebookgate.com/product/clinical-psychology-7th-edition-timothy-
j-trull/
ebookgate.com
https://ebookgate.com/product/topology-for-computing-1st-edition-afra-
j-zomorodian/
ebookgate.com
https://ebookgate.com/product/color-atlas-of-small-animal-anatomy-the-
essentials-1st-edition-thomas-o-mccracken/
ebookgate.com
https://ebookgate.com/product/svg-essentials-2nd-edition-j-david-
eisenberg/
ebookgate.com
https://ebookgate.com/product/edexcel-a2-chemistry-2nd-ed-edition-
facer/
ebookgate.com
Computing Essentials
2010 Edition
Computing Essentials
2010 Edition
Timothy J. O’Leary
Arizona State University
Linda I. O’Leary
Tata McGraw-Hill
Making IT Work for You: Character and Mark Recognition Devices 2-8
3 CMOS 4-12
vi Contents
Physical Connections 7-5
6 Wireless Connections 7-5
THE INTERNET, THE WEB, AND Connection Devices 7-7
ELECTRONIC COMMERCE 6-1 Modems 7-7
The Internet and the Web 6-3 Connection Service 7-8
Access 6-4 Data Transmission 7-9
Providers 6-4
Bandwidth 7-9
Browsers 6-5
Protocols 7-10
Communication 6-7 Networks 7-10
E-Mail 6-7
Terms 7-10
Instant Messaging 6-9
Network Types 7-12
Discussion Groups 6-9
Local Area Networks 7-12
Making IT Work for You: Blocking Spam 6-11
Home Networks 7-13
Search Tools 6-13 Metropolitan Area Networks 7-13
Search Engines 6-13
Wide Area Networks 7-14
Metasearch Engines 6-14
Network Architecture 7-14
Specialized Search Engines 6-14
Configurations 7-14
Electronic Commerce 6-15 Making IT Work for You: Home
Web Storefronts 6-16
Networking 7-15
Web Auctions 6-16
Strategies 7-18
Security 6-17
Organizational Internets: Intranets and
Web Utilities 6-18 Extranets 7-20
Telnet 6-18
Intranets 7-21
FTP 6-18
Extranets 7-21
Plug-ins 6-18
Firewalls 7-21
Filters 6-19
A Look to the Future: Toyota and Sony Create
A Look to the Future: Internet2 Is a High-
Wireless Robotic Car 7-22
Performance Network 6-20
8
7 BASIC APPLICATION SOFTWARE 8-1
COMMUNICATIONS AND Application Software 8-3
NETWORKS 7-1 Common Features 8-3
Communications 7-3 Web-based Applications 8-4
Connectivity 7-3 Making IT Work for You: Speech
The Wireless Revolution 7-3 Recognition 8-5
Communication Systems 7-4 Word Processors 8-7
Communication Channels 7-5
Contents vii
Features 8-7 Developing Multimedia Presentations 9-8
Case 8-7 Making IT Work for You: Digital Video
Spreadsheets 8-10 Editing 9-9
Features 8-10 Multimedia Authoring Programs 9-11
Case 8-11 Web Authoring 9-13
Database Management Systems 8-15 Web Site Design 9-13
Features 8-15 Web Authoring Programs 9-13
Case 8-15 Emerging Applications 9-14
Presentation Graphics 8-18 Virtual Reality 9-16
Features 8-18 Knowledge-based (Expert) Systems 9-16
Case 8-18 Robotics 9-17
Integrated Packages 8-20 A Look to the Future: The Future of Artificial
Case 8-20 Intelligence Is Emotional 9-18
Software Suites 8-21
Sharing Data between Applications 8-22
Copy and Paste 8-22
Object Linking and Embedding 8-22
A Look to the Future: Web-based Application
Software Updates Ease Maintenance 8-24
9
SPECIALIZED APPLICATION
SOFTWARE 9-1
Specialized Applications 9-3
Graphics 9-4
Desktop Publishing 9-4
Image Editors 9-4
Illustration Programs 9-4
Image Galleries 9-4
Graphics Suites 9-6
Audio and Video 9-6
Multimedia 9-7
Links and Buttons 9-8
viii Contents
INFORMATION TECHNOLOGY,
THE INTERNET, AND YOU
COMPETENCIES
After you have read this chapter, you should be able to:
1 Explain the five parts of an information system: people, procedures, software,
hardware, and data.
2 Distinguish between system software and application software.
3 Discuss the three kinds of system software programs.
4 Distinguish between basic and specialized application software.
5 Identify the four types of computers and the four types of microcomputers.
6 Describe the different types of computer hardware including the system unit, input,
output, storage, and communication devices.
7 Define data and describe document, worksheet, database, and presentation files.
8 Explain computer connectivity, the wireless revolution, and the Internet.
CONTENTS
Information Systems 1-4
People 1-6
Software 1-8
Types of Computers 1-10
Hardware 1-10
Data 1-14
Connectivity, the Wireless Revolution, and the Internet 1-15
CHAPTER 1
J
ust as the Internet and the Web have affected all
of us, they have affected computer technology as • Microcomputers are common tools in all areas
well. Today, communication links to the Internet of life. Writers write, artists draw, engineers
are a common feature of almost all computer sys- and scientists calculate—all on microcomput-
tems. Information technology (IT) is a modern ers. Students and businesspeople do all this,
term that describes this combination of tradition- and more.
al computer and communication technologies. • New forms of learning have developed. People
The purpose of this book is to help you who are homebound, who work odd hours, or
become competent with computer technology. who travel frequently may take courses on the
Computer competency refers to acquiring com- Web. A college course need not fit within the
puter-related skills. These skills are indispensable usual time of a quarter or a semester.
tools for today. They include how to efficiently • New ways to communicate, to find people
and effectively use popular application packages with similar interests, and to buy goods are
and the Internet. available. All kinds of people are using elec-
In this chapter, we first present an overview of tronic mail, electronic commerce, and the
an information system: people, procedures, soft- Internet to meet and to share ideas and prod-
ware, hardware, and data. It is essential to under- ucts.
stand these basic parts and how connectivity What about you? How are you using informa-
through the Internet and the Web expands the tion technology? Many interesting and practical
role of information technology in our lives. In uses have recently surfaced to make our personal
subsequent chapters, we will describe these parts lives richer and more entertaining. These applica-
of an information system in detail. tions range from recording digital video clips to
Fifteen years ago, most people had little to do creating personalized Web sites.
with computers, at least directly. Of course, they To be competent with IT, you need to know
filled out computerized forms, took computerized the five parts of an information system: people,
tests, and paid computerized bills. But the real procedures, software, hardware, and data.
work with computers was handled by specialists— Additionally, you need to understand connectivi-
programmers data entry clerks, and computer ty, the wireless revolution, the Internet, and the
operators. Web and to recognize the role of information
Then microcomputers came along and changed technology in your personal and professional life.
everything. Today it is easy for nearly everybody to
use a computer.
INFORMATION SYSTEMS
An information system has five parts: people, procedures, software, hardware, and
data. Connectivity allows computers to connect and share information, thereby
greatly expanding the capability and usefulness of an information system.
W hen you think of a microcomputer, perhaps you think of just the equipment itself. That is, you
think of the monitor or the keyboard. Yet, there is more to it than that. The way to think about
a microcomputer is as part of an information system. An information system has five parts: people,
procedures, software, hardware, and data. (See Figure 1-1.)
•� People: It is easy to overlook people as one of the five parts of an information system.
Yet this is what microcomputers are all about—making people, end users like you,
more productive.
•� Procedures: The rules or guidelines for people to follow when using software, hard
ware, and data are procedures. These procedures are typically documented in manuals
written by computer specialists. Software and hardware manufacturers provide manuals
with their products. These manuals are provided either in printed or electronic form.
•� Software: A program consists of the step-by-step instructions that tell the computer
how to do its work. Software is another name for a program or programs. The purpose
of software is to convert data (unprocessed facts) into information (processed facts).
For example, a payroll prgram would instruct the computer to take the number of
hours you worked in a week (data) and multiply it by your pay rate (data) to determine
how much you are paid for the week (information).
q CONCEPT CHECK
} What are the five parts of an information system?
} What is the difference between data and information?
} What is connectivity?
1-4 CHAPTER 1
PEOPLE
People are the most important part of an information system. Features in this book
include Making IT Work for You, Tips, and an interactive CD.
A lthough easy to overlook, people are surely the most important part of
any information system. Our lives are touched every day by computers and
information systems. Many times the contact is direct and obvious, such as
when we create documents using a word processing program or when we con-
nect to the Internet. Other times, the contact is not as obvious. Consider just
the four examples in Figure 1-2.
Throughout this book you will find a variety of features designed to help
you become computer competent and knowledgeable. These features include
Making IT Work for You, Tips, and the Computing Essential CD.
• Making IT Work for You. In the chapters that follow, you will find Making
IT Work for You features that present interesting and practical IT applica-
tions. Using a step-by-step procedure, you are provided with specific instruc-
Figure 1-2 Computers
in entertainment, business, tions on how to use each application. Figure 1-3 presents a list of these
education, and medicine applications.
Blocking Spam Are you tired of TV Tuner Cards and Video Clips
unwanted e-mail in your Inbox? Do you Want to watch your favorite television
frequently spend valuable time sorting program while you work? Perhaps you
through junk e-mail? Installing spam would like to include a video clip from
blocking software can help. One of the a television program or from a DVD in a
best known is Spam Bully. See page class presentation. It's easy using a TV
6-11. tuner card. See page 4-15.
Speech Recognition Tired of using
your keyboard to type term papers? WebCams and Instant Messaging
Have you ever thought about using Do you enjoy chatting with your
your voice to control application soft- friends? Are you working on a project
ware? Perhaps speech recognition is and need to collaborate with others in
just what you are looking for. See your group? What if you could see and
page 8-5. hear your group online? Perhaps
Digital Video Editing Do you want instant messaging is just what you're
to make your own movie? Would you looking for. See page 2-11.
like to edit some home movies and dis-
tribute them to family and friends on
DVDs? It's easy with the right equip-
ment and software. See page 9-9.
Virus Protection and Internet
Security Worried about computer
viruses? Did you know that others
could be intercepting your private
e-mail? It is even possible for them to
gain access and control of your com-
puter system. Fortunately, Internet
security suites are available to help
ensure your safety while you are on the
Internet. See page 5-15.
1-6
SOFTWARE
There are two kinds of software: system software and application soft-
ware. System software includes operating systems, utilities, and device
drivers. Application software is categorized as basic and specialized.
S oftware, as we mentioned, is another name for programs. Programs are the instructions that tell the com-
puter how to process data into the form you want. In most cases, the words software and programs are
interchangeable. There are two major kinds of software–system software and application software. You can
think of application software as the kind you use. Think of system software as the kind the computer uses.
SYSTEM SOFTWARE
The user interacts primarily with application
software. System software enables the appli-
cation software to interact with the computer
hardware. System software is "background"
software that helps the computer manage its
own internal resources.
System software is not a single program.
Rather it is a collection of programs, including the
following:
• Operating systems are programs that coor-
dinate computer resources, provide an inter-
face between users and the computer, and
run applications. Windows Vista and the Mac
OS X are two of the best-known operating
systems for today's microcomputer users. (See
Figure 1-4.)
• Utilities, also known as service programs,
perform specific tasks related to managing com-
puter resources. For example, the Windows util-
ity called Disk Defragmenter locates and elimi-
nates unnecessary file fragments and
rearranges files and unused disk space to
optimize computer operations.
�• Device drivers are specialized programs
designed to allow particular input or output
devices to communicate with the rest of the
computer system.
APPLICATION SOFTWARE
Application software might be described as
end user software. These programs can be cate- Figure 1-4 Windows and Mac
gorized as either basic or specialized applications. operating systems
Basic applications, or general-purpose applications are widely used in nearly all career areas.
They are the kinds of programs you have to know to be considered computer competent. One of
these basic applications is a browser to navigate, explore, and find information on the Internet.
Type Description
Browser Connect to Web sites and display Web pages
(See Figure 1-5.) The two most widely used browsers are Microsoft's Internet Explorer and Netscape's
Navigator. For a summary of the basic applications, see Figure 1-6.
Specialized applications, also known as special-purpose applications, include thousands of
other programs that are more narrowly focused on specific disciplines and occupations. Some of the
best known are graphics, audio, video, multimedia, Web authoring, and artificial intelligence pro-
grams.
q CONCEPT CHECK
} Describe the two major kinds of software.
} Describe three types of system software programs.
} Define and compare basic and specialized applications.
1-8 CHAPTER 1
TYPES OF COMPUTERS
Four types of computers are supercomputer, mainframe computer, minicomputer, and
microcomputer. Desktop, notebook, tablet PC, and handheld are types of microcom-
puters. Microcomputer hardware consists of the system unit, input/output, second-
ary storage, and communications devices.
C omputers are electronic devices that can follow instructions to accept input, process that input,
and produce information. This book focuses principally on microcomputers. However, it is almost
certain that you will come in contact, at least indirectly, with other types of computers.
There are four types of computers: supercomputers, mainframe computers, minicomputers, and micro-
computers.
• Supercomputers are the most powerful type of computer. These machines are special high-capacity
computers used by very large organizations. For example, NASA uses supercomputers to track and con-
trol space explorations.
• Mainframe computers occupy specially wired, air-conditioned rooms. Although not nearly as pow-
erful as supercomputers, mainframe computers are capable of great processing speeds and data stor-
age. For example, insurance companies use mainframes to process information about millions of pol-
icyholders.
• Minicomputers, also known as midrange computers, are refrigerator-sized machines. Medium-
sized companies or departments of large companies typically use them for specific purposes. For exam-
ple, production departments use minicomputers to monitor certain manufacturing processes and
assembly line operations.
• Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of
computer. There are four types of microcomputers: desktop, notebook, tablet PC, and handheld
computers. (See Figure 1-9.) Desktop computers are small enough to fit on top of or alongside a
desk yet are too big to carry around. Notebook computers, also known as laptop computers, are
portable, lightweight, and Fit into most briefcases.
• A tablet PC is a type of notebook computer that accepts your handwriting. This input is digitized
and converted to standard text that can be further processed by programs such as a word processor.
Handheld computers are the smallest and are designed to fit into the palm of one hand. Also
known as palm computers, these systems typically combine pen input, writing recognition, person-
al organizational tools, and communications capabilities in a very small package. Personal digital
assistants (PDA) are the most widely used handheld computer.
MICROCOMPUTER HARDWARE
To learn more about a
Hardware for a microcomputer system consists of a variety of different leading manufacturer of
devices. See Figure 1-8 for a typical desktop system. This physical equip- microprocessors,visit our
ment falls into four basic categories: system unit, input/output, second- Web site at www.olearyseries.com
ary storage, and communication. Because we discuss hardware in detail and select On the Web
later in this book, here we will present just a quick overview of the four Explorations.
basic categories.
•� System unit: The system unit, also known as the system cabinet or chassis, is a contain-
er that houses most of the electronic components that make up a computer system. (See Figure
1-9.) Two important components of the system unit are the microprocessor and memory. The
microprocessor controls and manipulates data to produce information. Many times the
microprocessor is contained within a protective cartridge. Memory also known as primary
storage or random access memory (RAM), holds data and program instructions for pro-
cessing the data. It also holds the processed information before it is output. Memory is some-
times referred to as temporary storage because its contents will typically be lost if the elec-
trical power to the computer is disrupted.
• Input/output: Input devices translate data and programs that humans can understand into
a form that the computer can process. The most common input devices are the keyboard and
the mouse. Output devices translate the processed information from the computer into a
form that humans can understand. The most common output devices are monitors or video
display screens (see Figure 1-10) and printers.
1-10 CHAPTER 1
Figure 1-8 Microcomputer
system
1-11 C H A P T the
Information Technology, E R Internet,
1 and You www.olearyseries.com 1-11
� Secondary storage: Unlike memory, secondary storage
On the Web Explorations devices hold data and programs even after electrical power to
the computer system has been turned off. The most important
To learn more about one of the leaders kinds of secondary media are floppy, hard, and optical disks.
in the development of DVD technology, Floppy disks are widely used to store and transport data from
visit our Web site at one computer to another. (See Figure 1-11.) They are called
www.olearyseries.com floppy because data is stored on a very thin flexible, or floppy,
and select On the Web Explorations. plastic disk. Hard disks are typically used to store programs
and very large data files. Using a rigid metallic platter, hard
disks have a much greater capacity and are able to access infor-
mation much faster than floppy disks. Optical disks use laser technology and have the greatest
capacity. (See Figure 1-12.) The two basic types of optical disks are compact discs (CDs) and digital
versatile (or video) discs (DVDs).
� Communication: At one time, it was uncommon for a microcomputer system to communicate with
other computer systems. Now, using communication devices, a microcomputer can communicate
with other computer systems located as near as the next office or as far away as halfway around the
world using the Internet. The most widely used communication device is a modem, which modifies
telephone communications into a form that can be processed by a computer. Modems also modify
computer output into a form that can be transmitted across standard telephone lines.
q CONCEPT CHECK
} What are the four types of computers?
} Describe the four types of microcomputers.
} Describe the four basic categories of microcomputer hardware.
1-12 CHAPTER 1
DATA
Data is unprocessed facts. Processing data creates information. Four common file
types are document, worksheet, database, and presentation.
D ata is raw, unprocessed facts, including text, numbers, images, and sounds. As we have mentioned
earlier, processed data becomes information. When stored electronically in files, data can be used
directly as input for the system unit.
Four common types of files (see Figure 1-13) are:
• Document files, created by word processors to save documents such as memos, term papers, and
letters.
• Worksheet files, created by electronic spreadsheets to analyze things like budgets and to predict
sales.
• Database files, typically created by database management programs to contain highly structured
and organized data. For example, an employee database file might contain all the workers' names,
social security numbers, job titles, and other related pieces of information.
• Presentation files, created by presentation graphics programs to save presentation materials. For
example, a file might contain audience handouts, speaker notes, and electronic slides.
q CONCEPT CHECK
} Define data. List four common types of files.
} Define connectivity and the wireless revolution. What is a network?
1-14 CHAPTER 1
A Look to the Future
Using and Understanding Infor- user should focus on these features. Chapters 4
through 7 explain what you need to know about
mation Technology Means Being hardware. A Buyer's Guide and an Upgrader's
Computer Competent Guide are presented at the end of this book for
those considering the purchase or upgrade of a
The purpose of this book is to microcomputer system.
help you use and understand
infor-mation technology. We SECURITY AND PRIVACY
want to help you become com-
puter competent in today's What about people? Experts
world and to provide you with agree that we as a society must
a foundation of knowledge so be careful about the potential
that you can understand how of technology to negatively
technology is being used today impact our personal privacy and
and anticipate how technolo- security. Additionally, we need
gy will be used in the future. to be aware of potential physi-
This will enable you to benefit cal and mental health risks asso-
from four important informa- ciated with using technology.
tion technology develop-ments. Finally, we need to be aware of negative effects on
our environment caused by the manufacture of com-
THE INTERNET AND THE WEB puterrelated products. Thus, Chapter 10 explores
each of these critical issues in detail.
The internet and the Web are considered by most
to be the two most important technologies for the ORGANIZATIONS
21st century. Understanding how to efficiently and
effectively use the internet to browse the Web, Almost all organizations rely on the quality and
communicate with others, and locate information flexibility of their information systems to stay
are indispensable computer competencies. These competitive. As a member or employee of an
issues are presented in Chapter 6, The internet, the organization, you will undoubtedly be involved
Web, and Electronic Commerce. in these information systems. Therefore, you
need to be knowledgeable about the different
POWERFUL SOFTWARE types of organizational information systems and
The software now available can do an extra-ordi- how they are used. Accordingly, we devote
nary number of tasks and help you in an end-less Chapters 11 through 14 to detail what you need
number of ways. You can create professional to know about information systems and how to
looking documents, analyze massive amounts of develop, modify, and maintain these systems.
data, create dynamic multimedia Web pages, and
much more. Today's employers are expecting the CHANGING TIMES
people they hire to be able to effectively and Are the times changing any faster now than they
efficiently use a variety of different types of soft- ever have? Most people think so. Whatever the
ware. Basic and specialized applications are pre- answer, it is clear we live in a fast-paced age. The
sented in Chapters 8 and 9. System software is Evolution of the Computer Age section present-
presented in Chapter 5. ed at the end of this book tracks the major devel-
POWERFUL HARDWARE opments since computers were first introduced.
After reading this book, you will be in a very
Microcomputers are now much more powerful than favorable position compared with many other
they used to be. New communication technologies people in industry today. You will learn not only
such as wireless networks are dramatically changing the basics of hardware, software, connectivity, the
the ways to connect to other computers, networks, internet, and the Web, but you will also learn the
and the internet. However, despite the rapid most current technology. You will be able to use
change of specific equipment, their essential fea- these tools to your advantage.
tures remain unchanged. Thus, the competent end
COMPETENCIES
After you have read this chapter, you should be able to:
1 Define input.
3 Discuss image capturing devices, including digital cameras, digital video cameras,
and audio input devices.
4 Define output.
5 Describe monitors, printers, and audio output devices.
6 Discuss combination input and output devices, including fax machines, multifunc-
tional devices, Internet telephones, and terminals.
CONTENTS
What is input? 2-3 Audio-input devices 2-10
Keyboard entry 2-3 What is output? 2-13
Point devices 2-5 Monitors 2-14
Scanning devices 2-7 Printers 2-16
Image capturing devices 2-9
CHAPTER 2
H ow do you get data to the CPU? How do you get While input devices convert what we understand
information out? Here we describe one of the most into what the system unit can process, output
unportant places where the computer interfaces devices convert what the system unit has processed
with people. We input text, music, and even into a form that we can understand. Output
speech, but we probably never think about the devices translate machine language into letters,
relationship between what we enter and what the numbers, sounds, and images that people can
computer processes. People understand language, understand.
which is constructed of letters, numbers, and Competent end users need to know about
punctuation marks. However, computers can under the most commonly used input devices, including
stand only the binary machine language of 0s and keyboards, mice, scanners, digital cameras,
1s. Input devices are essentially translators. input digitizing tablets, voice recognition, and MIDI
devices translate numbers, letters, and actions that devices. Additionally, they need to know about
people understand into a form that computers can the most commonly used output devices, including
process. monitors, printers, and audio output devices.
Have you ever wondered how information And, end users need to be aware of combination
processed by the system unit is converted into a input and output devices such as fax machines,
form that you can use? That is the role of output multifunctional devices, internet telephones, and
devices. terminals.
WHAT IS INPUT?
Input consists of data and instructions. Input devices translate what people understand
into a form that computers can process.
Input is any data or instructions that are used by a computer. They can come directly from you or from
other sources. You provide input whenever you use system or application programs. For example, when
using a word processing program, you enter data in the form of numbers and letters and issue commands
such as to save and to print documents. You also can enter data and issue commands by pointing to items,
or using your voice. Other sources of input include scanned or photographed images.
Input devices are hardware used to translate words, sounds, images, and actions that people
understand into a form that the system unit can process. For example, when using a word processor,
you typically use a keyboard to enter text and a mouse to issue commands. In addition to keyboards
and mice, there are a wide variety of other input devices. These include pointing, scanning, image
capturing, and audio-input devices.
KEYBOARD ENTRY
Keyboards translate numbers, letters, and special characters. Traditional, ergonomic, flexible, wireless, and PDA
are types of keyboards. Numeric keypads, toggle and combination keys are keyboard features.
q CONCEPT CHECK
} What is input? What are input devices?
} Discuss the five common types of keyboard designs.
} What are some common keyboard features?
2-4 CHAPTER 2
POINTING DEVICES
A mouse controls a pointer on the monitor. Joysticks are used primarily for games. Touch
screens are pressure-sensitive monitors. Light pens close circuits on special monitors. Tablet
PCs and PDAs use styluses.
P ointing, of course, is one of the most natural of all human gestures. Pointing devices provide a
comfortable interface with the system unit by accepting pointing gestures and converting them into
machine-readable input. There is a wide variety of different pointing devices, including the mouse, joy-
stick, touch screen, light pen, and stylus.
MOUSE
A mouse controls a pointer that is displayed on the monitor. The mouse pointer usually appears in
the shape of an arrow. It frequently changes shape, however, depending on the application. A mouse
can have one, two, or more buttons, which are used to select command options and to control the
mouse pointer on the monitor. Some mice have a wheel button that can be rotated to scroll through
information that is displayed on the monitor. Although there
are several different mouse types, there are three basic designs:
• Mechanical mouse is generally considered the traditional
type and was the most widely used. It has a ball on the
bottom and is attached with a cord to the system unit. As you
move the mouse across a smooth surface, or mouse pad, the
roller rotates and controls the pointer on the screen.
• Optical mouse has no moving parts. It emits and senses light
to detect mouse movement. This newer type of mouse has
some advantages compared to the mechanical mouse: it can be
used on any surface, is more precise, and does not require peri-
odic cleaning. (See Figure 2-5.)
• Cordless or wireless mouse is a battery-powered device
Figure 2-5 Optical mouse that typically uses radio waves or infrared light waves to
comunicate with the system unit. These devices eliminate the
mouse cord and free up desk space.
Three devices similar to a mouse are trackballs, touch surfaces, and pointing sticks. You can use the
trackball, also known as the roller ball, to control the pointer by rotating a ball with your thumb. (See
Figure 2-6.) You can use touch surfaces, or touch pads, to control the pointer by moving and tapping
your finger on the surface of a pad. (See Figure 2-7.) You can use a pointing stick, located in the mid-
dle of the keyboard, to control the pointer by directing the stick with your finger. (See Figure 2-8.)
Figure 2-6 Trackball Figure 2-7 Touch surface Figure 2-8 Pointing stick
TOUCH SCREEN
A touch screen is a particular kind of monitor with a clear plastic outer layer. Behind this layer are
crisscrossed invisible beams of infrared light. This arrangement enables someone to select actions or
commands by touching the screen with a finger. Touch screens are easy to use, especially when people
need information quickly. They are commonly used at restaurants, automated teller machines (ATMs),
and information centers. (See Figure 2-10.)
LIGHT PEN
A light pen is a light-sensitive penlike device. The light pen is
placed against the monitor. This closes a photoelectric circuit
and identifies the spot for entering or modifying data. For
example, light pens are used to edit digital images. (See Figure
2-11.)
2-6 CHAPTER 2
STYLUS
A stylus is a penlike device commonly used with tablet PCs
and PDAs. (See Figure 2-12.) A stylus uses pressure to draw
images on a screen. A stylus interacts with the computer
through handwriting recognition software. Handwriting
recognition software translates handwritten notes into
a form that the system unit can process.
Graphics tablets use a special graphics surface or
tablet and a stylus. Either the user sketches directly on the
tablet or traces images that have been placed on the
tablet. Graphics tablets are very specialized devices used
by artists for creating illustrations, by mapmakers to
record or trace maps, and by engineers to save mechanical
drawings digitally.
SCANNING DEVICES
Optical scanners copy or reproduce text and images. Bar code readers identify
and price products. Character and mark recognition devices recognize special
characters and marks.
S canners move across text and images. Scanning devices convert scanned text and images into a
form that the system unit can process. There are three types of scanning devices: optical scanners,
bar code readers, and character and mark recognition devices.
OPTICAL SCANNERS
An optical scanner, also known simply as a scanner, accepts documents consisting of text and/or
images and converts them to machine-readable form. These devices do not recognize individual letters
or images. Rather, they recognize light, dark, and colored areas that make up individual letters or
images. Typically, scanned documents are saved in files that can be further processed, displayed, print-
ed, or stored for later use. There are two basic types of optical scanners: flatbed and portable. (See
Figure 2-13.)
• Flatbed scanner is much like a copy machine. The image to be scanned is placed on a glass surface
and the scanner records the image from below.
• Portable scanner is typically a handheld device that slides across the image, making direct contact.
Optical scanners are powerful tools for a wide variety of end users, including graphics and advertising
professionals who scan images and combine them with text. Lawyers and students use portable scanners
as a valuable research tool to record information.
2-8 CHAPTER 2
q CONCEPT CHECK
} How are pointing and scanning devices different?
} Describe three types of scanners.
} Describe three common character and mark recognition devices.
q CONCEPT CHECK
} How are digital cameras different from traditional cameras?
} What is a WebCam?
AUDIO-INPUT DEVICES
Audio-input devices convert sounds for processing. Voice recognition systems accept
voice commands to control computer operations and to create documents. MIDI is a
standard for connecting musical instruments to the system unit.
A udio-input devices convert sounds into a form that can be processed by the system unit. By far the
most widely used audio-input device is the microphone. Audio-input can take many forms, includ-
ing the human voice and music.
VOICE
Voice recognition systems use a microphone, a sound card, and special soft-
ware. These systems allow users to operate computers and to create documents
using voice commands. Portable voice recognition systems are widely used by
doctors, lawyers, and others to record dictation. (See Figure 2-18.) These devices
are able to record for several hours before connecting to a computer system
to edit, store, and print the dictated information. Some systems are even able
to translate dictation from one language to another; such as from English
to Japanese.
Voice recognition is a common feature with many of today's newest soft-
ware applications. For example, recent versions of Microsoft's Word sup-
port voice recognition. Using the Language bar, you can switch between Figure 2-18 A portable
voice command mode and dictation mode. (See Figure 2-19.) voice recognition system
• Voice command mode allows the user to select menu items, toolbars, and
dialog box options. For example, to specify the use of the Times New Roman
font requires this command sequence:
Format>Font>Times New Roman>OK
2-10 CHAPTER 2
MAKING IT WORK FOR YOU
WEBCAMS AND INSTANT MESSAGING
Do you enjoy chatting with your friends? Are you working on a project
and need to collaborate with others in your group? What if you could
see and hear your group online? Perhaps instant messaging is just what
you're looking for. It's easy and free with an Internet connection and
the right software.
Sending Messages and Transferring Files Affer installing free instant
messaging soffware, you can exchange messages and files with friends. Your
friends are added to a list of contacts that shows you when your friends are online
and available to chat. For example, you could use Windows Messenger as follows:
1 • Add contacts by
clicking Add a contact
and following the on-
screen instructions. Contacts
currently
online
• Double-click the name
of a friend who
Send
appears in the Online file
section.
• Enter your message in Add a
Contact
the window that
appears.
• Click the Send button.
2 • Click Send a File or Photo in the I want to.., menu in the sidebar.
• Browse for the file you would like to share, and click Open.
Your friend is given an option to accept the file. Once your friend accepts, you can continue your conversation
without interruption while the file is transferred.
2-11
Using a WebCam In addition to typing text messages, some instant messaging soffware allows you to
have voice or video conversations over the Internet so you can see and hear the person you are collaborating with.
To do this, both users must have a microphone an speakers, as well as Web cameras for video conferencing. You
could hold a video conference using Windows
Messenger by following these steps.
1 • Start a conversation with a contact
as shown in the Sending Messages
Video image
of your friend
and Transferring Files section.
2-12
Language bar
You could issue this command using a mouse, or you could use a micro-
phone and state:
"Format font Times New Roman OK"
• Dictation mode allows the user to dictate text directly into a Word doc-
ument. For example, consider the following sentence:
"The national economy showed rapid growth."
You could enter this text using a keyboard or you could use a microphone
and state:
“The national economy showed rapid growth”
MUSIC
Musical instrument digital interface or MIDI is a standard that allows
musical instruments to connect to the system unit using a special MIDI port.
MIDI devices are specialized musical instruments that provide input in the
form of encoded digital signals representing musical sounds. MIDI devices can
be used to create, record, and play back musical compositions. The most com-
monly used MIDI device is an electronic keyboard. Others include MIDI vio-
lins, guitars, and even cellos. (See Figure 2-20.)
WHAT IS OUTPUT?
Output is processed data or information. Text, graphics, audio, and video are
types of output. Output devices translate processed information into a form
humans can understand.
O utput is processed data or information. Output typically takes the form of text, graphics, photos,
audio, and/or video. For example, when you create a presentation using a presentation graphics
program, you typically input text and graphics. You could also include photographs and even add voice
narration. The output would be the completed presentation.
Output devices are any hardware used to provide or to create output. They translate information
that has been processed by the system unit into a form that humans can understand. There are a wide
range of output devices. The most widely used are monitors, printers, and audio-output.
Monitor features include resolution, dot pitch, refresh rate, and size. CRT and flat-panel are
types of monitors. E-books, data projectors, and HDTV are specialty monitors.
T he most frequently used output device is the monitor. Also known as display screens or simply
as screens, monitors present visual images of text and graphics. The output is often referred to as
soft copy. Monitors vary in size, shape, and cost. Almost all, however, have some basic distinguishing
features.
FEATURES
The most important characteristic of a monitor is its clarity. Clarity refers to the quality and sharpness
of the displayed images. It is a function of several monitor features, including reolution, dot pitch,
refresh rate, and size.
• Resolution is one of the most important features.
Images are formed on a monitor by a series of dots or
pixels (picture elements). (See Figure 2-21.)
Resolution is expressed as a matrix of these dots or
pixels. For example, many monitors today have a reso-
lution of 1,280 pixel columns by 1,024 pixel rows for a
total of 1,310,720 pixels. The higher a monitor’s reso-
lution (the more pixels) the clearer the image pro-
duced. See Figure 2-22 for the most common monitor
resolutions.
• Dot pitch is the distance between each pixel. Most
newermonitors have a dot pitch of .31 mm (31/100th
of a millimeter) or less. The lower the dot pitch (the
shorter the distance between pixels), the clearer the Figure 2-21 Monitor resolution
images produced.
• Refresh rate indicates how often a displayed image is updated
Standard pixels
or redrawn on the monitor. Most monitors operate at a rate of 75
hertz, which means that the monitor is redrawn 75 times each sec- SVGA 800 600
ond. Images displayed on monitors with refresh rates lower than
XGA 1,024 768
75 hertz appear to flicker and can cause eye strain. The faster the
refresh rate (the more frequently images are redrawn), the better SXGA 1,280 1,024
the quality of images displayed.
UXGA 1,600 1,200
• Size or viewable size is measured by the diagonal length of a
monitor’s viewing area. Common sizes are 15, 17, 19, and 21
inches. The smaller the monitor size the better the quality of Figure 2-22 Resolution standards
images displayed.
CATHODE-RAY TUBE
The most common type of monitor for the office and the home is the cathode ray tube (CRT). (See
Figure 2-23.) These monitors are typically placed directly on the system unit or on the desktop. CRTs are
similar in size and technology to televisions. Compared to other televisions. Compared to other types
2-14 CHAPTER 2
of monitors, their primary advantages are low cost and excellent res-
On the Web Explorations olution. Their primary disadvantage is that they are bulky and occu-
Flat-panel monitors are quick- py a considerable amount of space on the desktop.
ly becoming the standard for
personal computers. To learn
FLAT-PANEL MONITOR
more about a leading manu- Because CRTs are too bulky to be transported easily, portable moni-
facturer in this industry, visit tors, known as flat-panel monitors, were developed. Flat-panel
our Web site at www.oleary- monitors are much thinner and require less power to operate than
series.com and select On the CRTs. These monitors are widely used with desktop, tablet PC, and
Web Explorations. handheld computers. (See Figure 2-24). There are two basic types of
flat-panel monitors: passive-matrix and active-matrix. Passive-
matrix, or dual-scan monitors,
create images by scanning the
entire screen. This type requires
very little power, but the clarity of
the images is not as sharp. Active-
matrix or thin film transistor
(TFT) monitors do not scan down
the screen; instead, each pixel is
independently activated. They can
display more colors with better
clarity. Active-matrix monitors are
more expensive and require more
power.
PRINTERS
Printer features include resolution, color capability, speed, and memory. Ink-jet, laser, and thermal are common
types of printers. Other types include dot-matrix, ploffer, photo, and portable.
Y ou probably use a printer with some frequency to print homework assignments, photographs, and
Web pages. Printers translate information that has been processed by the system unit and pres-
ent the information on paper. Printer output is often called hard copy.
FEATURES
There are many different types of printers. Almost all, however, have some basic distinguishing fea-
tures, including resolution, color capability, speed, and memory.
• Resolution for a printer is similar to monitor resolution. It is a measure of the clarity of images pro-
duced. Printer resolution, however, is measured in dpi (dots per inch). (See Figure 2-27.) Most
printers designed for personal use average 1,200 dpi. The higher the dpi, the better the quality of
images produced.
• Color capability is provided by most printers today. Users typically have the option to print either
with just black ink or with color. Because it is more expensive to print in color, most users select black
ink for letters, drafts, and homework. Color is used more selectively for final reports containing
graphics and for photographs.
• Speed is measured in the number of pages printed per minute. Typically, printers for personal use
average 15 to 19 pages per minute for single color (black) output and 13 to 15 pages per minute for
color output.
2-16 CHAPTER 2
Figure 2-27 Dpi comparison
• Memory within a printer is used to store printing instructions and documents waiting to be printed.
The more memory in a printer, the faster it will be able to create large documents.
INK-JET PRINTER
Ink-jet printers spray ink at high speed onto the surface of
paper. This process not only produces a letter-quality image but
also permits printing to be done in a variety of colors making
them ideal for select special applications. (See Figure 2-28.) Ink-
jet printers are the most widely used printers. They are reliable,
quiet, and relatively inexpensive. The most costly aspect of ink-jet
printers is replacing the ink cartridges. For this reason, most users
specify black ink for the majority of print jobs and use the more
expensive color printing for select applications. Typical ink-jet
printers produce 17 to 19 pages per minute of black-only output
and 13 to 15 pages of color output.
LASER PRINTER
Figure 2-28 A special application The laser printer uses a technology similar to that used in a
ink-jet printer photocopying machine. Laser printers use a laser light beam to
produce images with excellent letter and graphics quality. More
expensive than ink-jet printers, laser printers are faster and are used in applications requiring high-
quality output. (See Figure 2-29.)
THERMAL PRINTER
A thermal printer uses heat elements to produce images on heat-
sensitive paper. Originally these printers were only used in scientif-
ic labs to record data. More recently, color thermal printers have
been widely used to produce very high-quality color artwork and
text. Figure 2-29 A laser printer
Color thermal printers are not as popular
because of their cost and the requirement of special-
ly treated paper. They are special-use printers that
produce near-photographic output. They are widely
used in professional art and design work where very
high-quality color is essential.
OTHER PRINTERS
There are several other types of printers. These printers
include dot-matrix printers, chain printers, plotters,
photo printers, and portable printers:
• Dot-matrix printers form characters and
images using a series of small pins on a print
head. Once a widely used microcomputer print-
er, they are inexpensive and reliable but quite noisy. In general, they Figure 2-30 Photo printer
are used for tasks where high-quality output is not required.
• Plotters are special-purpose printers for producing a wide range of specialized output. Using out-
put from graphics tablets and other graphical input devices, plotters can create maps, images, and
architectural and engineering drawings. Plotters are widely used by graphic artists, engineers, and
architects to print out designs, sketches, and drawings.
• Photo printers are special-purpose printers designed to print photo-quality images from digital
cameras. (See Figure 2-30.) Most photo printers print 3" × 5" or 4" × 6" images on glossy, photo-
quality paper.
• Portable printers are usually small and lightweight printers designed to work with a notebook
computer. Portable printers may be ink-jet or laser printers, print in black and white or color, and
connect with USB or parallel port connections.
q CONCEPT CHECK
} Discuss these printer features: resolution, color capability, speed, and memory.
} What are the three printer types commonly used with microcomputers?
} Discuss dot-matrix, plotter, photo, and portable printers.
2-18 CHAPTER 2
AUDIO-OUTPUT DEVICES
Audio-output devices produce sounds for people. Speakers and headphones are the most common types.
Fax machines send and receive images over telephone lines. Multifunction devices have input
and output capabilities. Internet telephones use telephony to connect people. Dumb, intelli-
gent, network, or Internet are types of terminals.
On the Web Explorations M any devices combine input and output capabilities. ometimes
this is done to save space. Other times it is done for very special-
Multifunctional devices save ized applications. Common combination devices include fax
space and money, making machines, multifunction devices, Internet telephones, and terminals.
them a favorite in home FAX MACHINES
offices and small business- A fax machine, also known as a facsimile transmission machine, is
es. To learn more about a standard tool in nearly every office. At one time, all fax machines were
MFDs, visit our Web site at separate stand-alone devices for sending and receiving images over tele-
www.olearyseries.com and
phone lines. Now, most computer systems have that capability with the
select On the Web
simple addition of a fax/modem board. To send a fax, these devices scan
Explorations.
the image of a document converting the light and dark areas into a for-
mat that can be sent electronically over standard telephone lines. To receive a fax, these devices reverse
the process and print the document (or display the document on your monitor) using signals received from
the telephone line.
MULTIFUNCTION DEVICES
Multifunctional devices (MFD), also known as all in one (AIO) devices, typically combine the capa-
bilities of a scanner, printer, fax, and copy machine. These multifunctional devices offer a cost and
space advantage. They cost about the same as a good printer or copy machine but require much less
INTERNET TELEPHONE
Internet telephones are specialized input and output devices for receiving and sending voice com-
munication. Typically, these devices connect to the system unit through a USB port and operate much
like a traditional telephone.
Telephony is the transmission of telephone calls over computer networks. Also known as Internet
telephony, IP telephony, and Voice-over IP (VoIP), telephony uses the Internet rather than tradi-
tional communication lines to support voice communication. To place telephone calls using telephony
requires a high speed Internet connection and special software and/or hardware. The three most pop-
ular approaches are:
• Computer-to-computer communications allow individuals to place free long-distance calls. This
application requires that both parties have a computer and that their computers are on and connect-
ed to the Internet when a call is placed. The required software is available from a variety of sources
for free or at very low cost. MSN Explorer is one of the most widely used.
• Computer-to-traditional telephone communications allow a user to call almost any traditional
telephone from his or her computer. Only he person making the call needs to have a computer con-
nected to he Internet. The calling party subscribes to a special Internet phone service provider that
supplies the required software and charges a small monthly and/or per-minute fee. To see how this
works, consult your Computing Essentials CD or visit our Web site at www.olearyseries.com and
select Animations.
• Traditional telephone-to-traditional telephone communications do not require a computer.
The calling party subscribes to a special Internet phone service provider that supplies a special hard-
ware adapter that connects a traditional telephone to the Internet. The cost for this service is simi-
lar to the computer-to-traditional telephone approach.
Compared to traditional telephone calls, Internet supported calls may have a lower
sound quality. However, most users report that this difference is not significant.
Telephony promises to dramatically impact the telecommunications industry and to
reduce our costs for telephone communications.
TERMINALS
A terminal is an input and output device that connects you to a mainframe or other type of comput-
er called a host computer or server. There are four kinds of terminals:
• A dumb terminal can be used to input and receive data, but it cannot process data independently.
It is used to gain access and to send information to a computer.
Such a terminal is often used by airline reservation clerks to
access a mainframe computer for flight information. (See Figure
2-32.)
• Essentially, an intelligent terminal is a microcomputer with
communications software and a telephone hookup (modem) or
other communications link. These connect the terminal to the
larger computer or to the Internet. An increasingly popular type
Figure 2-32 Dumb terminal
2-20 CHAPTER 2
is the Net PC, also known as the Net Personal Computer. These low-cost and limit-
ed microcomputers typically have only one type of secondary storage (an internal hard
disk drive), a sealed system unit, and no expansion slots.
• A network terminal, also known as a thin client or network computer, is a low-
cost alternative to an intelligent terminal. Most network terminals do not have a hard-
disk drive and must rely on a host computer or server for application and system soft-
ware. These devices are becoming increasingly popular in many organizations.
• An Internet terminal, also known as a Web terminal or Web appliance, provides
access to the Internet and typically displays Web pages on a standard television set.
These special-purpose terminals offer Internet access without a microcomputer. Unlike
the other types of terminals, Internet terminals are used almost exclusively in the
home.
q CONCEPT CHECK
} What are the two most widely used audio-output devices?
} Describe the three most popular Internet telephony approaches.
} Describe the following combination devices: fax machine, MFD, Internet
telephone, and terminal.
2-22 CHAPTER 2
SECONDARY STORAGE
COMPETENCIES
After you have read this chapter, you should be able to:
1 Distinguish between primary and secondary storage.
2 Describe the traditional floppy disk and compare it to high capacity floppy disks.
3 Compare internal hard disks, hard-disk cartridges, and hard-disk packs.
4 Describe ways to improve hard-disk operations, including disk caching, redundant
arrays of inexpensive disks, and data compression and decompression.
5 Discuss the different types of optical disks.
6 Describe solid-state storage, Internet drives, and magnetic tape.
7 Discuss mass storage and mass storage devices.
CONTENTS
Storage 3-3 Other Types of Secondary
Storage 3-12
Floopy Disks 3-3
Mass Storage Devices 3-16
Hard Disks 3-6
Optical Disks 3-10
CHAPTER 3
S econdary storage devices are used to save, to back
up, and even to transport files consisting of data
Secondary storage devices have always been an
indispensable element in any computer system.
or programs from one location or computer to They have similarities to output and input devices.
another. Not long ago, almost all files contained Like output devices, secondary storage devices
only numbers and letters. The demands for saving receive information from the system unit in the
these files were easily met with low capacity flop- form of the machine language of 0s and 1s. Rather
py and hard-disk drives. For example, to save a than translating the information, however, second-
100-page research paper might require 400 KB of ary storage devices save the information in
storage, which easily fits onto a single floppy disk. machine language for later use. Like input devices,
In the past five years, however, secondary stor- secondary storage devices send information to the
age devices have been required to service much system unit for processing. However, the informa-
greater demands. Data storage has expanded from tion, since it is already in machine form, does not
text and numeric files to include digital music files,
need to be translated. it is sent directly to memory
photographic files, video files, and much more.
(RAM), where it can be accessed and processed by
These new types of files require secondary storage
the CPU.
devices that have much greater capacity. For exam-
Competent end users need to be aware of the
ple, a 10-minute video might require 100 MB of
different types of secondary storage. They need to
storage.
Today's secondary storage devices are routinely know the capabilities, limitations, and uses of flop-
used for a variety of tasks that were impossible just py disks, hard disks, optical disks, and other types of
a few years ago. CDs and DVDs, for example, store secondary storage. Additionally, they need to be
data that can be used over and over again. You can aware of specialty storage devices for portable
download music from the Internet, play it on your computers and to be knowledgeable about how
computer, and create custom CDs with the right large organizations manage their extensive data
hardware and software. resources.
STORAGE
Primary storage is volatile. Secondary storage is nonvolatile. Important stor-
age characteristics include media, capacity, storage devices, and access speed.
A n essential feature of every computer is the ability to save, or store, information. Random-access
memory (RAM) holds or stores data and programs that the CPU is presently processing. Before data
can be processed or a program can be run, it must be in RAM. For this reason, RAM is sometimes
referred to as primary storage.
Unfortunately, most RAM provides only temporary or volatile storage. That is, it loses all of its con-
tents as soon as the computer is turned off. Its contents are also lost if there is a power failure that dis-
rupts the electric current going into the system unit. This volatility results in a need for more perma-
nent or nonvolatile storage for data and programs.
We also need external storage because users need
much more storage capacity than is typically available
in a computer's primary or RAM memory.
Secondary storage provides permanent or non-
volatile storage. Using secondary storage devices,
such as a floppy disk drive, data and programs can be
retained after the computer has been shut off. This is
accomplished by writing files to and reading files from
secondary storage devices. Writing is the process of
saving information to the secondary storage device.
Reading is the process of accessing information from
Figure 3-1 Secondary storage secondary storage. This chapter focuses on secondary storage
media
devices.
Some important characteristics of secondary storage include:
• Media or medium, which is the actual physical material that holds the data and programs. (See Figure 3-1.)
• Capacity measures how much a partiular storage medium can hold.
• Storage devices are hardware that read data and programs from the medium. Most also write
to the medium.
• Access speed or access time measures the amount of time required by the storage device to
retrieve data and programs.
Most desktop microcomputer systems have floppy, hard, and optical disk drives.
FLOPPY DISKS
Floppy disks are removable storage media. The traditional floppy disk is 1.44 MB. Data is
recorded on tracks and sectors. Zip, SuperDisk, and HiFD are high capacity floppy disks.
F loppy disks, often called diskettes or simply disks, are portable or removable storage media.
They are typically used to store and transport word processing, spreadsheet, and other types of
files. They use flat circular pieces of Mylar plastic that have been coated with a magnetic material.
Floppy disk drives (FDD) store data and programs by altering the electromagnetic charges on the
3-4 CHAPTER 3
Discovering Diverse Content Through
Random Scribd Documents
mostly by Irish agitators. This ill feeling prevented the close co-
operation between the two greatest sections of the English-speaking
races, which would have meant so much for world peace and
harmony, and which would have laid the basis for a closer co-
operation of all the nations of predominant Nordic stock, in the
interest of the progressive evolution of mankind. A first object of
statesmanship should now be to regain that solidarity of the Nordics,
in the interests not merely of world progress, but of the very survival
of civilization.
Denominational questions in the United States were scarcely an
issue after the Revolution, for the bitter sectarian feeling that had
existed earlier was rapidly disappearing, and the Roman Catholics
had not yet been able to raise the issue of bigotry, for the country
was overwhelmingly Protestant. Of approximately 4,000,000 persons
in the United States in 1790, Catholic writers make varying claims
running as high as 35,000 or 45,000 persons of their faith. Without
stopping to inquire how many of those claimed for Rome were
merely nominal adherents, and how many were Negroes, one may
remark that at the most, about one American in each one hundred
might have had some affiliation with the Roman Church. When the
Catholic hierarchy was established for the first time in the United
States by the appointment of the Jesuit John Carroll as bishop of
Baltimore in 1789, he reported to his superiors that there were
about 16,000 Catholics in Maryland, including children and Negroes;
something over 7000 in Pennsylvania, some 3000 French around
Detroit, and about 4000 scattered through the rest of the country. To
this total of 30,000 might be added the unknown but small number
of nominal Catholics on the frontier, in the Mississippi Valley, and in
other regions where there were no priests to minister to them, and
where their children, at least, were fairly sure to grow up outside the
church. It is probably accurate to say that there never has been a
nation which was so completely and definitely Protestant as well as
Nordic as was the United States just after the American Revolution.
The total white population found in the United States by the first
census (1790) was 3,172,444. To this should be added, for the
present purpose, the population of parts of the continent that are
now, but were not then, in the United States, that is Louisiana and
Florida. The latter had but a few thousand inhabitants. The
Louisiana Purchase territory may be credited with 36,000, of whom
nearly one-half were Negroes. The French are estimated at about
12,000. Professor Hansen gives the figure of Whites only for the
Louisiana Purchase area in 1790 as 20,000. The addition of Negroes
would probably increase these population figures considerably. Texas
may be allotted 5000 (Spanish) Whites, New Mexico and Arizona
15,000, and California 1000 at this period. But it will be shown later
that the use of the word "White" in these Spanish-American lands is
frequently largely a "courtesy title." Finally, the census enumerators
did not reach the Old Northwest Territory, where there were already
some 11,000 residents, about equally divided between American and
French. The total white population of the territory now comprised in
the continental United States may therefore be put at approximately
3,250,000 in 1790.
Disregarding the French and Spanish in the outlying regions, the
only race, aside from the Nordic, that was important enough to be
counted at this period was the Alpine, represented by the Germans.
In Maine one in a hundred of the population might have been
German, but in the other New England states the Alpines were
negligible.[9] In the middle colonies they were an important element,
perhaps one in every ten or twelve in such States as New York, New
Jersey, and Maryland, and one-third of the whole population in
Pennsylvania. Through the Southern States they formed perhaps one
in twenty of the population, confined mainly to the upland regions
and, having spread over from these uplands and from Pennsylvania
into the west, they amounted to about one in seven in Kentucky and
Tennessee.
Nine-tenths of the whole white population of 1790 was therefore
Nordic in race, and ninety-nine hundredths of it Protestant in
religion. It was all English-speaking, save for the little island of
Pennsylvania Dutch, and for the French and Spanish on the frontiers.
It was all living under a political and cultural tradition that was
characteristically British.
At the time of the Revolution there were about 6,000,000 people in
England and about half that number in the colonies.
FOOTNOTES:
[9] Studying the percentage of various nationalities in Colonial
times, and later, one is guided partly by records of immigration,
partly by the names of the inhabitants, as recorded in census and
other returns. There was always a tendency, in an Anglo-Saxon
region, to corrupt names of other nationalities, occasionally in
such a way as to make them appear English. This fact must be
allowed for in all calculations in this field.
VIII
THE OLD NORTHWEST TERRITORY
The second period to be dealt with covers the years from the first
census, 1790, to the eve of the Civil War, 1860, and deals with the
organization of our government and the extension of settlement
westward to the Pacific. Free land and a very high birthrate among
native Americans led to a great increase of the population, so that
the white inhabitants of the United States, about three millions and
a quarter in 1790, became twenty-seven millions and a half, in 1860,
though immigration during the seventy-year period was not over
four and a quarter million.
From 1790 to 1820, no official record of immigrant arrivals was kept.
Thousands certainly arrived during those thirty years, but it seems
probable that they were nearly all English and Scotch.
Just as the termination in 1790 of the preceding period was marked
by a racial loss, caused by the expulsion of the Loyalists, so this later
period was terminated by an internecine Civil War, costing the
country three-fourths of a million Nordic lives, counting killed and
died of wounds only. The descendants of those men who gave their
lives for their country on both sides would have filled up the West,
instead of its being largely populated by the immigrants we
recklessly invited to our shores.
During the period referred to (1790-1860), there was, as said, no
heavy immigration except from two sources, Ireland and Germany,
and both of these occurred in the later portion of the period.
The displacement of agriculture by sheep in Scotland at the
beginning of the nineteenth century dispossessed thousands of
farmers who moved to America, sometimes with the active
assistance of their landlords. The population of some districts, as
Perthshire, Argyllshire, and Inverness-shire, fell sharply, because the
people, no longer able to make a living, moved away. North America
was the favorite destination.
Southern England experienced a similar movement. The price of
agricultural products, which had been forced up during the
Napoleonic wars, fell steadily for a long time. Farmers could not
make a living. The counties of Kent, Hampshire, Somerset, and
Surrey were the chief centers of emigration. These people also
turned their faces toward North America.
Ireland, too, was in perpetual ferment and the emigration from that
island was increased as the result of the abortive revolutionary
attempts of the United Irishmen in 1798 and 1803. After the leader
of the latter, Robert Emmet, was executed, his elder brother, Thomas
A. Emmet, came to New York, practised law, and within a decade
became the attorney-general of the state. The Emmets, like most
others of these Irish refugees, were Protestants in religion.
Later, in 1845, the potato crop failed in Ireland, and soon after the
starving peasantry, many of them from the lower types of western
Ireland, swarmed over here. The women became domestic servants
and the men day laborers, doing the heavy work of ditch digging
and railroad building. They were Roman Catholic and that fact
excited animosity in many sections of the country. They were not
welcome in the West when they drifted there. It was not unusual to
see on the frontier railroad stations and in advertisements in New
York newspapers, "No Irish need apply." There was some violence
and an American party was organized to check their entrance into
local politics, for which they showed great aptitude.
Since then, these Irish have been forced upward in the social scale
by later arriving immigrants over whom they had the advantage of
speaking English. They became the nucleus in America of the
present Roman Catholic Church, which has spread rapidly in this
country. The Irish did not take to agriculture and have never shown
much liking for the larger industries.
The total number of Irish immigrants during the forties and fifties
amounted to more than a million and a half, and that first migration
has been followed by a continuous stream of southern Irish down to
the last few years when the quota restrictions went into effect.
ROMAN CATHOLICS
1930
As soon as they secured a certain amount of wealth and rose in the
social scale, they established schools and colleges of their own, the
teachings and, indeed, the existence of which conflict with those of
the public-school system of the United States, and to that extent
they have impaired the unity of the nation. Some regiments of Irish
fought on the Northern side in the Civil War, but the draft riots of
New York were caused by the Irish who did not want to fight for the
Union. In addition to the shanty Irish there came over some middle-
class families of importance.
The second immigration of importance occurred a few years later
when a large number of Germans were forced over here by the
failure of the Revolution in Germany in 1848. These Germans were
very different from those who migrated to Pennsylvania in the
eighteenth century. Many of them were from northern Germany and
were Nordics, including individuals of some culture and distinction.
They settled in certain cities of the West, notably in Cincinnati,
Milwaukee, and Saint Louis. For the most part, however, they took
up public land and became hard-working farmers. They did not in
the mass improve the population already here intellectually, racially,
or physically, and they impaired our national unity, at least for the
time being, by the introduction of their own language.
At the end of the period here considered there were in the United
States more than one and a quarter millions of German-born, of
whom about one-fourth were Roman Catholics. This church, which in
1790 controlled not one in a hundred of the population, could in
1860 count upon one in every nine of the Whites.
Outside of the Irish and Germans, who were preponderantly Nordic,
there was not much immigration of importance. The census of 1860
enumerated 4,138,697 foreign-born persons out of a total of nearly
27,000,000 Whites. England, Scotland, and Canada accounted for
most of those who were neither Irish nor German. Thus at the end
of this period the racial unity of the United States was still virtually
unimpaired.
The French in the old Northwest Territory were negligible in number,
amounting to but a few thousands. The number of Mexicans in
Texas, Arizona, and New Mexico when we took over those countries
was but a few thousand more. These Mexicans considered
themselves Spanish; but as a matter of fact, the veneer of religion,
language, and culture was very thin, and racially most of them were
at least seven-eighths Indian. The same condition prevailed in
California in 1846; the number of Mexicans being even smaller than
in Texas.
Many of the original Colonial charters granted by the English kings
provided for a north and south boundary by latitude, but the
western boundary was often defined as the "South Sea," and not
unnaturally many of these boundaries overlapped. After the
Revolution, the original colonies were induced to cede to the Federal
Government their indefinite and conflicting claims to the western
lands. This general and important cession of territory had two
results: it gave the impoverished Federal Government lands which
could be sold for its own benefit, and it led to the establishment of
communities which looked to the Federal Government for everything
they needed, which in itself was a long step toward unity of
government.
In 1787 the western boundaries of New York and Pennsylvania were
fixed as they are at present, and out of the country south of the
Great Lakes, north of the Ohio River, and east of the Mississippi was
erected the Northwest Territory under the special guardianship of
the Federal Government.
This "Northwest Territory" had been seized during the Revolution by
an extraordinary group of adventurers and frontiersmen under
General George Rogers Clark. Thereby the Thirteen Colonies were in
physical possession of these districts south of the Great Lakes when
the Treaty of Paris was signed in 1783. Without such actual
possession of the Old Northwest, it would have remained part of
Canada, an outcome which would have limited the growth of the
United States westward or, more probably, have led to another war.
The reluctance of the British authorities in charge of the outposts in
this territory to surrender their forts in accordance with the terms of
the treaty, and their alleged backing of the Indians, were among the
causes underlying the War of 1812.
As population increased, new States were created in succession out
of this territory—Ohio (1803), Indiana (1816), Illinois (1818),
Michigan (1837), and Wisconsin (1848).
Ohio's first straggling settlers had pushed northwesterly across the
Ohio River during the Revolution, but the first real, permanent
settlement was by the New England Company which established
Marietta in 1788. This New England immigration, though soon
swamped by that from other States, played an important part in the
organization of the territory and in the shaping of its future policies.
Scarcely had the Massachusetts group, led by General Rufus
Putnam, taken possession of its vast grant around Marietta, when a
new group led by Judge J.C. Symmes of Kentucky occupied a grant
of a million acres between the Great and Little Miami Rivers,
including the sites of Cincinnati, Dayton, and many of the most
important of the early settlements of the territory.
Virginia had reserved a military district of more than four million
acres to reward its soldiers of the Revolution, and this quickly began
to be settled largely by veterans from Kentucky which was at that
time, it will be remembered, still a part of Virginia.
Connecticut on the other hand had stipulated for its own Western
Reserve of nearly 3,000,000 acres, extending in an oblong, 120
miles, from the boundary of Pennsylvania along Lake Erie, and the
settlement of Cleveland marked its nucleus.
Thus Ohio, within a few years after the Revolution, started with four
different growing points. The Virginia element increased the most
rapidly, partly because of its proximity to Kentucky, partly because of
its easy access by the Ohio River, so that the English and Ulster
Scots of the southern part of the State soon dominated the whole.
A similar element was continually coming across the Pennsylvania
border from the Monongahela country, and before long the
Pennsylvania emigration to Ohio became the greatest from any one
State, filling up the central part which comprised the great wheat
belt. Even as late as the Mexican War, one-fourth of the members of
the Ohio Legislature were natives of Pennsylvania, exceeding the
members born in any other State, or in all the New England States
combined, or in Ohio itself.
Through Kentucky came not merely Virginians but a steady stream
of Ulster Scots from North Carolina, many of whom, however, had
previously been Virginians. The southern parts of the State,
therefore, took on some of the complexion of the slave-holding
States, while the northern part was tinged by the culture of New
England and the Central States, many coming in from western New
York, which from the present point of view is to be regarded as
merely an extension of New England.
Thus for a score of years the population of the States to the south
and east of Ohio, which, dammed back by hostile Indians, had been
ready to overflow for some time, poured into the new territory. Then
the flood slackened until after the close of the War of 1812, when it
was renewed with vigor. Men from all parts of the United States who
had served with the western and northern forces in the War of 1812
had seen the beauties of the new country and determined to settle
there as soon as peace was declared and they could dispose of their
holdings at home. So far as New England was concerned this
tendency was accentuated by two remarkably cold winters in 1816
and 1817, which surpassed the memories of the oldest inhabitants.
General economic and social conditions were favorable for a
widespread movement of population. The northwestern part of Ohio
had been cleared of Indians and was then thrown open to
settlement.
This second great flood of immigration into Ohio was in general of
the same character as the first, bringing into the State from all sides
an almost purely Nordic population of British ancestry, except for the
small element of Pennsylvania Dutch who for a while kept much to
themselves, maintained their own customs and their own language,
and thus cut themselves off largely from the march of progress.
Their Alemannish dialect was rapidly becoming almost as far out of
line with the literary language of Germany as it was with the English
language of their adopted home.
Later Ohio received a quarter of a million of German and Irish
immigrants. But of the 2,339,511 inhabitants whom the State
contained in 1860, a million and a half were born in the State itself.
IX
THE MOUNTAINEERS CONQUER THE SOUTHWEST
Meanwhile the States of the lower Mississippi Valley were coming into
existence at a rapid rate.
Arkansas, at the time of the Louisiana Purchase, did not contain 500
white people. The current of immigration down the Mississippi had
gone past the Post at the mouth of the Arkansas River without
taking the trouble to turn aside. Settlement can scarcely be said to
have begun before 1807, and at the census three years later there
were only 1000 people in the territory.
It was not until after the passage by Congress in 1818 of the Land
Act that the pioneers, each carrying in a leather wallet a certificate
which entitled him to a homestead, began to work their boats up the
current of the Arkansas River. There was a steady though not rapid
arrival of settlers from Virginia, the Carolinas, Kentucky, and
particularly Tennessee—which has often been regarded as the
original parent of Arkansas.
Attempts have been made to trace a line of migration from the first
settlement in North Carolina, the undesirable character of which was
mentioned earlier, through Tennessee and down into Arkansas, and
to attribute to this element of the population the backwardness of
some parts of the last-named State. A few settlers came from
Georgia or Alabama up the Mississippi River but this involved a long
struggle with a strong current and it was easier for them to settle in
the blacklands of Mississippi or Louisiana.
There were about 14,000 persons in Arkansas in 1817 when it was
created a Territory. Thereafter it made a steady growth, derived
generally from all the Southern States of the Mississippi Valley, until
nearly the time of the Civil War when Indiana and Kentucky began to
contribute some settlers. Its population therefore was in general
made up almost wholly of British stock. Its 1860 population of
435,350 was one-fourth black, the Whites being almost wholly
native-born, a thousand Germans and a thousand Irish being lost in
the mass.
ebookgate.com