government college of technology abbottabad computer litracy

advertisement

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Home > Notes > Lesson 1

| Discovering Computers | Windows XP

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Essential Introduction to Computers

1.

Define the term computer and discuss the four basic computer operations: input, processing, output, and storage

2.

Define data and information

3.

Explain the principle components of the computer and their use

4.

Describe the use and handling of floppy disks and hard disks

5.

Discuss computer software and explain the difference between system software and application software

6.

Identify several types of personal computer application software

7.

Discuss computer communications channels and equipment and the Internet and World

Wide Web

8.

Explain how to purchase, install, and maintain a personal computer, a notebook computer, and a handheld computer

9.

Define e-commerce

1. Computer: Input, Processing, Output, and Storage

In today's world, computers are used for almost every task imaginable. Routine activities such as paying bills, buying groceries, or communicating with a friend can be done with a computer.

That is why it is important not only to know how to use a computer, but also to understand the components of a computer and what they do.

Recent studies report that almost 40% of homes surveyed have personal computers, and this number is growing. Given the widespread use of computers, computer literacy - a knowledge and understanding of computers and computer uses - has become an essential ingredient in the recipe for success in today's world. Florida was the first state to demand computer literacy of all students by grade 12.

Collectively, the electric, electronic, and mechanical equipment that makes up a personal computer is called hardware. Devices that surround the system unit (i.e., the keyboard, mouse, speakers, monitor, and so on) sometimes are known as peripheral devices.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Computers manipulate (process) data (input) to produce information (output) and hold (store) that information for future use. These operations are completed incredibly quickly. Today's supercomputer can perform 1.8 trillion operations per second. If a person did one arithmetic operation a second without stopping, it would take more than 31,000 years to perform the number of operations a supercomputer can do in one second.

2. Data and Information

A major part of understanding computers is to know what goes into them (data), what comes out of them (information), and to understand the process of turning data into information, also known as the information processing cycle.

Understanding the difference between data and information is important. Clifford Stoll - lecturer, computer security expert, and author ( The Cuckoo's Egg: Tracking a Spy Through the Maze of

Computer Espionage and Silicon Snake Oil: Second Thoughts on the Information Superhighway are two of his most popular works) - notes a wide gap between data and information. Information has a pedigree, or lineage. Its source is known, whether a respected professor or a seventh grader.

"The Internet has great gobs of data," Stoll maintains, "and little, little information."

3. Components of the Computer and Their Use

A computer consists of five primary hardware components: input devices, the central processing unit (CPU), memory, output devices, and storage devices. These components work together with software to perform calculations, organize data, and communicate with other computers.

Different types of input devices transmit different types of data or transmit data in different ways. A keyboard is used to transmit alpha/numeric data by typing. In addition to the standard keys in the typing area, an enhanced keyboard contains:

 function keys that can be programmed to perform specific tasks

 status lights that indicate modes that can be turned on and off by toggle keys (e.g., caps lock and num lock) a numeric keypad that allows for rapid entry of numbers arrow keys and other cursor-control keys (e.g., home, end, page up, and page down) that

 control the on-screen movement of the insertion point special keys such as esc, shift, ctrl, and alt that have varying functions depending on the software

The mouse, like a trackball or joystick, is called a pointing device because it controls the movement of a pointer, or mouse pointer, on the computer screen. The first mouse was a onebutton, rectangle shaped device invented by Doug Engelbart in 1964. A mouse is very easy to use. It requires empty desk space, however, and forces the user to remove a hand from the keyboard to give a command.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Different CPUs function at different speeds. The rate at which computer operations take place is measured in megahertz (MHz), or millions of electronic pulses per second. This rate varies among computers and should be a consideration when purchasing a personal computer.

Computers have two basic types of memory. RAM (random access memory) is volatile, meaning that its contents are lost when the computer is turned off. ROM (read-only memory) is nonvolatile because it retains its contents even when the power is turned off. ROM stores information that does not change, such as the instructions and data used to start the computer when it is first turned on.

Like input devices, different types of output devices convey different types of information or convey information in different ways. Printer output sometimes is called hard copy because of its physical, touchable character. Monitor output, on the other hand, is called soft copy because it has only an electronic, intangible existence. Non-impact printers represent the fastest growing segment of the printer market. The drops of ink that form an ink-jet printer character are similar to the dots that form a dot matrix character figure, but there are many more of them. Good quality paper must be used with ink-jet printers so that the ink does not bleed. The speed quoted for impact printers often is measured in characters per second (cps). Like ink-jet printers, laser printer speed is measured in pages per minute (ppm). Although they are fast, all printers are much slower than computers. Because of this, most printers have a buffer that temporarily stores a few pages, allowing the computer to dump output into the buffer and continue processing. The most widely used PC monitors are 14- or 17-inch (measured from one corner to the diagonally opposite corner). With the growing popularity of portable computers, the clarity of LCD displays continues to improve. The quality of a monitor's display depends largely on three factors:

 resolution - the number of pixels displayed

 dot pitch - the distance between pixels refresh rate - the speed with which images are redrawn on the screen

Storage devices are different from memory. Memory, sometimes called primary storage, is fast, short-term, volatile, and relatively expensive. Storage devices, on the other hand, are slower, long-term, nonvolatile, and less expensive.

4. Floppy Disks and Hard Disks

The data and information used in a computer needs to be stored for future use. The memory of a computer only holds items temporarily while they are being processed. When not being processed, these items must be stored in auxiliary storage devices. These devices include floppy disks, hard disks, CD-ROM, and DVD-ROM. When selecting a storage device it is important to know that each device holds different amounts of information.

Although floppy disks once were available in two sizes, the 5.25-inch floppy disk rarely is used today, and some believe it is destined for the same fate as the eight-track tape. Because of its rigid plastic shell, it may be difficult to see the 3.5-inch disk as "floppy." The name is justified,

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk however, not only by the disk's ancestry but also by the flexible character of the disk itself. When a floppy disk drive is reading from or writing to a floppy disk, a light turns on next to the drive.

Floppy disks never should be inserted into or removed from the drive when this light is on. Most magnetic disks are read/write storage media. Some optical discs, such as CD-ROMs, usually can be read from but not written to. Each track on a formatted floppy disk is very narrow. To see how narrow, try to draw 80 lines in a 11/4-inch space (the approximate radius of the floppy disk surface). Floppy disks are soft-sectored, meaning that the number of sectors is not predetermined. Floppy disk access time depends on the time needed to locate the correct track, the time required to rotate the disk to the proper sector, and the time necessary to transfer the data into main memory.

Although personal computer hard disks usually are fixed (i.e., not removable), some portable computers have removable hard disk drives. Unlike floppy disks, hard disks constantly are spinning, at a rate 10 to 20 times faster than floppy disks. Therefore, access time for hard disks is significantly less than access time for floppy disks. While a floppy disk read/write head rests on the disk, the read/write head for a hard disk hovers about 10 millionths of an inch above the disk surface. Contamination on the disk - a speck of dust (about 1550 millionths of an inch), a fingerprint (about 600 millionths of an inch), or a particle of smoke (about 250 millionths of an inch) - can cause a "head crash," destroying data and rendering the disk drive unusable. For this reason, hard disk drives are sealed and manufactured in an environment that typically is cleaner than a hospital operating room. Storage capacity can be increased on both hard disks and floppy disks with compression programs such as Stacker, WinZip, or PKZIP.

5. Computer Software: System Software and Application Software

There are two categories of computer software: system software and application software.

System software serves as the interface between a user and the computer's hardware. An example of system software would be an operating system such as Microsoft Windows. Application software consists of programs designed to perform specific tasks. An example of application software would be a spreadsheet program, such as Microsoft Excel.

A 3.5-inch floppy disk is computer hardware, but the programs stored on it are computer software. Although there are two types of software, system software and application software are designed to work hand-in-glove; that is, application software packages are designed to work with specific kinds of system software. By telling the computer how to perform common functions, the operating system frees application software to concentrate on producing information. Popular operating systems include Windows, the Mac OS, OS/2, UNIX, Linux, DOS, and NetWare.

Operating systems that have a graphical user interface (GUI) often are called user-friendly.

Studies have found that GUI users generally complete tasks more accurately, work faster, are more productive, and feel less fatigue.

To understand the relationship between application software and system software, draw four concentric circles. Label the innermost circle CPU , the next operating system , the next

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk application software , and the last user . The resultant diagram illustrates how the operating system helps to insulate the user and application program from computer hardware.

6. Types of Personal Computer Application Software

Many types of application software are available. The more popular application software includes word processing software, electronic spreadsheet software, database software, presentation graphics software, communications software, and electronic mail software.

Knowing the function of each type of application software is one of the most important ingredients of being computer literate.

Several years ago, a survey of large and small businesses showed that the most often used applications were:

Word processing and spreadsheet (used by 100% of those surveyed)

Communications, electronic mail, database, and presentation graphics (used by about

95%)

 Desktop publishing (used by about 85%)

 Project management (used by about 70%)

 Personal information management (used by about 50%)

In word processing, any work developed through the writing process is a document. Word processing software makes it easier to create, edit, format, and print documents. Many word processing packages include a spell checker, grammar checker, and thesaurus.

The first spreadsheet software, VisiCalc, was introduced in 1979. By immediately displaying the results of changes, electronic spreadsheet packages provide a capability called what-if analysis.

Another powerful capability, called goal-seek, finds what value is needed to reach a specified goal.

A database file is a collection of related data called records, each of which consists of a group of related facts called fields. The data can be manipulated, or a report, called a query, can be created based on user-specified criteria. Although most spreadsheet packages can manage data tables of a few thousand records, database software can efficiently handle much larger data tables.

Word processing and spreadsheet software came out around 1980. Presentation graphics software was not introduced until the mid to late 1980s. Nevertheless, it can be argued that presentation graphics software has had almost as great an impact on business, and on how people do business, as either of the older applications. Presentation graphics packages include libraries of clip art that can be inserted into slides and a slide sorter that can be used to organize the order effectively in which slides are presented.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

7. Computer Communications Channels and Equipment and the Internet and World

Wide Web

Communicating with a computer is becoming the standard today for both business and personal use. The communications channels are constantly being upgraded in order to send information faster. Communications technologies have changed the way people interact through the use of email, videoconferencing, and the Internet.

Many vendors sell network versions of their software. The network version resides on the network server and can be accessed by each computer on the network. When a network version is purchased, a site license is obtained from the vendor. The fee for the site license, usually based on the number of computers on the network, is less than the purchase of individual packages for each computer.

The number of people using the Internet is growing by 5% each month. Paul Moritz, a vice president at Microsoft, maintains that, "In the long run, it's hard to exaggerate the importance of the Internet." The Web, an innovation of Tim Berners-Lee, debuted in 1989. Since then, the Web has experienced astounding growth. Some experts claim that the size of the Web doubles every

60 days. Using links to move from one document to another often is called surfing the Web . Two popular Web browsers are Netscape Navigator and Microsoft Internet Explorer.

8. How to Purchase, Install, and Maintain a Computer

At some point in your life, you will probably decide to purchase a computer. Aside from understanding the components discussed earlier, it also is important to be able to find the computer that best fits your needs. For example, most new computers come with application software already installed. If you do not use this software, then it is of no value even though you got it for "free." There are several things to look for when purchasing a new computer. If possible, speak to someone who is familiar with the purchasing process and can guide you along.

For most people, buying a computer is an expensive experience. Despite this, many people are woefully uninformed when they set out to purchase a computer. Although desktop computer systems remain popular, since 1993 sales of laptop, notebook, and smaller computers have rivaled sales of larger systems, partly because of their enhanced capabilities and increased use by field sales forces. Be careful when setting up a computer system. Failure to follow health guidelines can lead to painful, and even permanent, disabilities. Government studies indicate repetitive stress disorder (RSI) and cumulative trauma disorder (CTD), the most commonly reported problems associated with prolonged keyboard use, are responsible for half of workrelated illnesses. Computer security is an increasingly important issue. A survey of American companies with more than 200 personal computers showed that over 60% had suffered at least one virus attack. Two of the major sources of viruses, free software and illegally copied software, more commonly are used by small companies and private individuals, so the percentage of PC users affected by viruses may be much higher. E-mail attachments have been

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk the carriers of several recent virus attacks that have infected both business and home computer users.

9. E-Commerce

Conducting business online is known as electronic commerce, or e-commerce, and includes such commercial activities as shopping and investing. The three types of e-commerce that exist today are business to consumer (B2C), consumer to consumer (C2C), and business to business (B2B).

If you have access to a computer, an Internet connection, and a means to pay for products or services, you can participate in e-commerce. Today, users can participate in e-commerce not only through desktop computers, but also through mobile devices such as laptop and handheld computers, pagers, and cellular phones. M-commerce (mobile commerce) is the term some people use to describe e-commerce activities that take place using mobile devices.

The more popular uses of e-commerce include shopping and investing. On the Web, you can buy and sell stocks, order flowers, purchase groceries and airline tickets, and even buy a car!

Three types of e-commerce exist: business to consumer (B2C), consumer to consumer (C2C), and business to business (B2B). Of the three, most e-commerce takes place between businesses, making B2B e-commerce transactions the most common.

Home > Notes > Discovering Computers > Chapter 1

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Site Map |

Chapter 1: Introduction to Computers

| Overview | Expand Your Knowledge

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Overview 1.

Explain the importance of computer literacy

2.

Define the term computer

3.

Identify the components of a computer

4.

Explain why a computer is a powerful tool

5.

Differentiate among the various types of software

6.

Explain the purpose of a network

7.

Discuss the uses of the Internet and the World Wide Web

8.

Describe the categories of computers and their uses

9.

Identify the various types of computer users

10.

Understand how a user can be a

Web publisher

This chapter presents a broad survey of concepts and terminology related to computers. The idea of computer literacy is introduced. You discover what a computer is and what it does. You learn about the components of a computer, the power of computers, computer software, and networks and the Internet. Categories of computers are identified, including personal computers, minicomputers, mainframe computers, and supercomputers.

You discover how people employ computers, from home users to large business users. Finally, you learn how people use computers to provide information. Reading and understanding the material in this chapter should help you better understand these topics as they are presented in more detail in the following chapters.

Explain the importance of computer literacy

Computers have touched every part of our lives: the way we work, the way we learn, the way we live, even the way we play. It almost is impossible to go through a single day without encountering a computer, a device dependent on a computer, information produced by a computer, or a word that was introduced or whose meaning has changed with the advent of computers. Because of the significance of computers in today’s world, it is important to be computer literate. Being computer literate means you have knowledge and understanding of computers and their uses.

Define the term computer

A computer is an electronic machine, operating under the control of instructions stored in its own memory, that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. Computers process data to create information. Data is a collection of raw unprocessed facts, figures, and symbols. Information is data that is organized, meaningful, and useful. To process data into information, a computer uses hardware and software. Hardware is the electric, electronic, and mechanical equipment that makes up a computer. Software is the series of instructions that tells the hardware how to perform tasks.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Identify the components of a computer

Computer hardware components include input devices, output devices, a system unit, storage devices, and communications devices. An input device is any hardware component that allows a user to enter data and instructions into a computer. Six commonly used input devices are the keyboard, mouse, microphone, scanner, digital camera, and PC camera. An output device is any hardware component that can convey information to a user. Three commonly used output devices are a printer, a monitor, and speakers.

The system unit is a box-like case made from metal or plastic that protects the internal electronic components of the computer from damage. The system unit contains the central processing unit and memory. The central processing unit ( CPU ) is the electronic device that interprets and carries out the basic instructions that operate the computer. Memory is a temporary holding place for data and instructions.

A storage device records and retrieves data to and from a storage medium. Six common storage devices are a floppy disk drive, a Zip

®

drive, a hard disk drive, a CD-ROM drive, a CD-RW drive, a DVD-ROM drive, and a DVD+RW drive. A communications device enables computer users to communicate and exchange items such as data, instructions, and information with another computer. A modem is a communications device that enables computers to communicate usually via telephone lines or cable.

Explain why a computer is a powerful tool

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers. Computers allow users to generate correct information quickly, hold the information so it is available at any time, and share the information with other computer users.

Differentiate among the various types of software

There are two categories of computer software: system software and application software.

System software consists of the programs that control the operations of a computer and its devices. Two types of system software are the operating system and utility programs. An operating system ( OS ) coordinates all activities among hardware devices and contains instructions that allow you to run application software. A utility program performs specific tasks, usually related to managing a computer, its devices, or its programs. You interact with software through its user interface.

Application software consists of programs that perform specific tasks for users. Popular application software includes word processing software, spreadsheet software, database software, and presentation graphics software. Application software can be packaged software

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

(copyrighted software that meets the needs of a variety of users), custom software (tailor-made software developed at a user’s request), freeware (copyrighted software provided at no cost), public-domain software (software donated for public use with no copyright restrictions), or shareware (copyrighted software distributed free for a trial period).

Explain the purpose of a network

A network is a collection of computers and devices connected together via communications devices, such as a modem, and communications media, such as cables, telephone lines, cellular radio, and satellites. Networks allow users to share resources , such as hardware devices, software devices, data, and information. Most business computers are networked, either by a local area network (LAN) in a limited geographic area or by a wide area network (WAN) in a large geographical area.

Discuss the uses of the Internet and the World Wide Web

The world’s largest network is the Internet , which is a worldwide collection of networks that links together millions of businesses, government agencies, educational institutions, and individuals. Users connect to the Internet to send messages, access information, shop for goods and services, meet or converse with other users, and access sources of entertainment and leisure.

Most users connect to the Internet through an Internet service provider (ISP) or an online service provider (OSP). The World Wide Web is a popular segment of the Internet that contains billions of documents called Web pages. These documents can contain text, graphics, sound, video, and built-in connections, or links, to other Web pages stored on computers throughout the world.

Describe the categories of computers and their uses

The six major categories of computers are personal computers, handheld computers, Internet appliances, mid-range servers, mainframes, and supercomputers. These categories are based on differences in size, speed, processing capabilities, and price. A personal computer can perform all of its input, processing, output, and storage activities by itself. Personal computers include desktop computers and notebook computers. A desktop computer is designed so the system unit, input devices, output devices, and any other devices fit entirely on or under a desk or table.

Variations of desktop computers include tower models (computers with tall and narrow system units that can sit vertically on the floor), all-in-one computers (less expensive computers that combine the monitor and system unit into a single device), and workstations (more expensive and powerful computers designed for work that requires intense calculation and graphics capabilities).

A notebook computer is a portable personal computer small enough fit on your lap. Notebook and desktop computers are used at home or in the office to perform application software-related tasks or to access the Internet. A handheld computer is a small computer that fits in your hand.

Handheld computers can perform specific, industry-related functions, or can be general-purpose.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

A PDA ( personal digital assistant ) is a handheld computer that provides personal organizer functions, such as a calendar, appointment book, and notepad. An Internet appliance is a computer with limited functionality whose main purpose is to connect to the Internet from home.

A mid-range server is more powerful and larger than a workstation computer. Users typically access a mid-range server through a personal computer or a terminal , which is a device with a monitor and a keyboard that usually has no stand-alone processing power.

A mainframe is a large, expensive, very powerful computer that can handle hundreds or thousands of connected users simultaneously. A supercomputer is the fastest, most powerful, and most expensive category of computer.

Identify the various types of computer users

Computer users can be divided into five categories: home user, small office/home office users, mobile users, large business users, and power users. A home user spends time on the computer for personal and business communications, budgeting and personal financial management, entertainment, and Web access. A small office/home office ( SOHO ) user includes any company with fewer than 50 employees, as well as self-employed people that work out of their home. A mobile user travels to and from a main office or school to conduct business, communicate, or do homework. A large business user works for a company that has a large number of employees and computers usually connected to a network. The power user – such as an engineer, architect, or desktop publisher – typically works with multimedia , which combines several media elements into one application, and requires the capabilities of a workstation or other powerful computer.

Understand how a user can be a Web publisher

In addition to being a recipient of information, Internet users have the ability to provide information to other connected users around the world. Users can create a Web page with word processing software or with Web page authoring software. Publishing a Web page is the process of making it available on the Internet.

Expand Your

Knowledge

1.

Computer literacy

2.

Computer

3.

Computer components

4.

Computer power

6.

Networks

7.

The Internet

8.

Computer categories

9.

Types of computer users

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

5.

Computer software 10.

Web publishing

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

Computer Literacy

It is difficult to think of a field in which computers are not used. In addition to general-purpose computers, special-purpose computers are used in everything from automobiles to electric razors.

Consider how computers have influenced our daily lives, both positively and negatively. (“To err is human, but to really foul things up requires a computer.” – Anonymous, from a BBC Radio broadcast.) List ways in which computers are being used today. What is the most common use?

What is the most unusual use? As a result of the expanding use of computers, in 1986 Florida became the first state to demand computer literacy of all students by grade 12.

Computer

Although computers are thought of as a relatively recent innovation, the term computer has a long history. Prior to 1940, “computer” was a job title that referred to anyone performing calculations.

Consider how data is different from information. Data is processed into information. Clifford

Stoll – lecturer, computer security expert, and author of Silicon Snake Oil: Second Thoughts on the Information Superhighway – notes a wide gap between data and information. Stoll insists that information has a pedigree, or lineage. Its source is known, whether by a respected professor or a seventh grader. “The Internet has great gobs of data,” Stoll maintains, “and little, little information.”

The first three operations in the information processing cycle — input, process, and output — are performed to process data into information, while the fourth operation — storage — refers to a computer’s electronic reservoir capability. Think about how we perform each phase in the information processing cycle in the “human computer” (i.e., the human brain) while completing a common task, such as learning a telephone number.

Computer Components

Different types of input devices are designed to transmit different types of data or to transmit data in different ways. Think of other input devices (joysticks, scanners, digital cameras, and so on) and the different types of data they transmit or the different ways they transmit data.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Because it is more lasting than output from a monitor or speaker, the printer’s output often is called hard copy. Think of other output devices with which you are familiar (data projectors, computer output microfilm, and so on).

Some computer components are considered internal, while others are considered external.

External components are called peripherals . Input, output, and communications devices often are peripheral devices.

The difference between the temporary character of memory and permanent nature of storage will be made painfully clear the first time you experience a power failure while working on a computer. Think of other examples of storage devices (magnetic tape, PC Cards, and so on).

The capability to communicate may be one of the most significant factors influencing how computers are used now and in the future.

Computer Power

In one billionth of a second, an electronic signal travels almost 12 inches. This means that today’s supercomputer (the fastest, most powerful, and most expensive category of computers) can perform 1.8 trillion operations per second. If a person did one arithmetic operation a second without stopping, it would take more than 31,000 years to perform the number of operations a supercomputer can do in one second. Researchers predict that one day computer speed will be measured in exaflops, or one quintillion (1 x 10 18 ) calculations per second.

The reliability of computer components often is measured in MTBF (mean time between failure, in hours). A typical component might be rated 10,000 MTBF.

Although the term “computer error” is widespread, most computer errors can be traced to human mistakes. Consider instances of computer error with which you are familiar. How might human blunders have resulted in the computer error? Why are people apt to blame computers?

Supercomputers have more than 600 gigabytes of memory, meaning that they can store more than 600 billion letters, numbers, and special characters, and have 2 terabytes (2 trillion bytes) of disk space. Equally important is the speed at which data can be retrieved, processed, and stored again.

Connected computers can share each operation in the information processing cycle. To recognize the value of communication, imagine trying to solve a problem individually, and then trying to solve the same problem with the assistance of several classmates.

Computer Software

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

The difference between computer hardware and computer software is important. A 3½-inch floppy disk is hardware; however the programs stored on it are software. Programs or software, like data, are input into the computer.

Because you interact with it directly, you may be more consciously aware of application software than system software. Remember that system software determines how you interact with application software. Popular operating systems include DOS (Disk Operating System),

Windows 3.x (technically, not an operating system but an operating environment that makes

DOS easier to use), Windows 95, Windows 98, Windows 2000, Windows XP, Mac OS, OS/2,

UNIX, Linux (rhymes with cynics ), and NetWare. DOS was developed by Microsoft for IBM personal computers. DOS started Microsoft’s climb to the top of the software world -- at one time, versions of DOS were used worldwide by more than 100 million people. DOS has a command-line interface, meaning that people have to memorize and type instructions.

Today, operating systems with a graphical user interface, such as Microsoft’s Windows, are far more popular.

Most application software packages are designed to be used with specific operating systems.

Much of the software with which you are familiar is packaged software. Because of their complexity, most software programs are written by teams of programmers working together. Just as people understand a variety of spoken languages (English, French, Chinese, and so on), computers recognize a number of programming languages.

Networks

A network with which you might be familiar is the school computer lab. Consider resources that can be shared on a network. For example, the school computer lab may share a single printer.

Think of advantages of sharing resources. Why are most business computers part of a network?

The Internet

Estimates claim that more than 50 percent of U.S. homes are connected to the Internet, and more than 13 million do so through an online service provider. Although the growth rate of the

Internet and online services has slowed from a peak of more than 140 percent in 1994-95, the growth rate still is around 20 percent annually. Surveys show the number of Web site visitors continues to expand rapidly, practically doubling every year. Interestingly, surveys show that teenage boys and girls are accessing the Internet for different reasons. While boys seem to focus on entertainment, girls use the Internet more for schoolwork and chat.

Computer Categories

In addition to differences in size, speed, processing capabilities, and price, other factors, such as the size of main memory and number of peripheral devices, also can be considered when

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk categorizing computers. Rapid changes in technology make it difficult to define categories precisely. As a rule of thumb, today’s PCs have about as much memory and processing power as the mainframes of a decade ago.

Think of personal computers with which you are familiar. How is the computer used? What factors influence the choice of a personal computer? In addition to such obvious considerations as processing speed and amount of memory, less apparent factors, such as available software or even the computer’s “footprint” (the amount of space it occupies on the work surface) also may be important. A desktop computer monitor often is placed on top of the system unit case. This sometimes can be an ergonomic problem, forcing users to look up. Server computers often are used in academic environments. What features of server computers would make them particularly attractive to schools? In today’s mobile society, notebook computers have become indispensable tools. Since 1993, sales of notebook, and smaller computers have rivaled sales of larger systems, partly because of their enhanced capabilities and increased use by field sales forces. The capabilities of handheld computers also continue to expand. Visor, a new handheld computer from Handspring, is an electronic organizer but also offers video games, a cell phone, a modem, an MP3 player, and a two-way pager. Called the “Swiss Army knife of handheld computers,” Visor uses the Palm operating system, which is the same operating system used by the Palm Pilot, a popular handheld computer from 3Com, and is available for about $200.

The growing movement toward decentralization in business, coupled with the increasing power of mid-range servers, has led to a recent trend away from mainframe computers and toward midrange servers. What advantages might mid-range servers have over mainframe computers for a business?

Organizations that deal with huge, constantly changing collections of data accessed simultaneously by many users, such as banks, insurance companies, universities, and government agencies, often use mainframe computers. Despite this, mainframe sales are declining approximately 10 percent per year.

One of the most important features of supercomputers is their capability to create complex, three-dimensional images almost instantaneously. Television networks often use supercomputers to generate complicated images and then give viewers the sense of “going through” the image.

Due to their size and expense, only large businesses and government agencies use supercomputers. IBM’s Option Blue supercomputer was used by the Department of Energy to simulate nuclear explosions, allowing the effects of aging and adverse conditions on nuclear weapons to be explored without underground detonations.

Types of Computer Users

A major concern related to the home user is the digital divide , which is the idea that the people of the world can be separated into two distinct groups: those that have access to technology with

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk the ability to use it and those that do not have access to technology or are without the ability to use it. Recent reports suggest that the digital divide exists on several levels:

 Individuals in higher income levels have greater access to the Internet than people in lower levels, and the gap may be growing.

 African-Americans earning less than $40,000 are less than half as likely to own a computer as whites in the same income group.

 Women are under-represented in today’s computer classes and technology jobs.

A number of efforts are being made to narrow the digital divide.

Networks have changed the face of both small and large business. In the 1970s, executives usually worked with monthly reports; in the 1980s, they used weekly reports; today, daily or even hourly reports are available. How have computers affected the efficiency of businesses?

What impact have computers had on the “interpersonal” side of business (i.e., employee and customer relationships)? How have computers changed people’s jobs? Have computers cost any people their jobs?

Web Publishing

With today’s Web page authoring software, children as young as 10 years old, and sometimes younger, can create and publish their own Web pages. If you created a Web page, what type of information would you provide? Why? Would you be interested in seeing someone else’s Web page? Why or why not? If you have created a Web page, what type of software did you use?

What was the most difficult part of creating your Web page?

Home > Notes > Discovering Computers > Chapter 2

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Site Map |

Chapter 2: The Internet and World Wide Web

| Overview | Expand Your Knowledge

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Overview 1.

Discuss how the Internet works

2.

Understand ways to access the

Internet

3.

Identify a URL

4.

Search for information on the

Web

5.

Describe the types of Web pages

6.

Recognize how Web pages use graphics, animation, audio, video, and virtual reality

7.

Define Webcasting

8.

Describe the uses of electronic commerce (e-commerce)

9.

Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms, and instant messaging work

10.

Identify the rules of netiquette

This chapter introduces one of the most significant innovations of the past half century – the

Internet. The Internet is defined, and the history of the Internet is detailed. You discover how the

Internet works and learn about Internet service providers and online services, connecting to the

Internet, how data travels the Internet, and Internet addresses. The World Wide Web, search engines, and multimedia on the Web are explained. You become familiar with Webcasting, electronic commerce, Web publishing, and other Internet services including e-mail, FTP, Telnet, newsgroups, mailing lists, chat rooms, and instant messaging. Finally, netiquette, the Internet code of acceptable behavior by users, is described.

Discuss how the Internet works

The Internet is a worldwide collection of networks that links millions of businesses, government offices, educational institutions, and individuals. Data is transferred over the Internet using servers , which are computers that manage network resources and provide centralized storage areas, and clients , which are computers that can access the contents of the storage areas.

The data travels over communications lines. Each computer or device on a communications line has a numeric address called an IP (Internet protocol) address , the text version of which is called a domain name . Every time you specify a domain name, a DNS ( domain name system ) server translates the domain name into its associated IP address, so data can route to the correct computer.

Understand ways to access the Internet

You can access the Internet through an Internet service provider, an online service provider, or a wireless service provider. An Internet service provider ( ISP ) provides temporary Internet connections to individuals and companies. An online service provider ( OSP ) also supplies

Internet access, in addition to a variety of special content and services. A wireless service provider ( WSP ) provides wireless Internet access to users with wireless modems or Webenabled handheld computers or devices.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Employees and students often connect to the Internet through a business or school network that connects to a service provider. For home or small business users, dial-up access provides an easy and inexpensive way to connect to the Internet. With dial-up access , you use a computer, a modem, and a regular telephone line to dial into an ISP or OSP. Some home and small business users opt for newer, high-speed technologies. DSL ( digital subscriber line ) provides high-speed connections over a regular copper telephone line. A cable modem provides high-speed Internet connections through a cable television network.

Identify a URL

The most widely used service on the Internet is the World Wide Web. The World Wide Web

( WWW or Web ) consists of a worldwide collection of electronic documents called Web pages .

A browser is a software program used to access and view Web pages. Each Web page has a unique address, called a URL ( Uniform Resource Locator ), that tells a browser where to locate the Web page. A URL consists of a protocol, domain name, and sometimes the path to a specific

Web page or location on a Web page. Most URLs begin with http ://, which stands for hypertext transfer protocol , the communications standard that enables pages to transfer on the Web.

Search for information on the Web

A search engine is a software program you can use to find Web sites, Web pages, and Internet files. To find a Web page or pages, you enter a relevant word or phrase, called search text or keywords

, in the search engine’s text box. Many search engines then use a program called a spider to read pages on Web sites and create a list of pages that contain the keywords. Any Web page that is listed as the result of the search is called a hit . Each hit is a link that can be clicked to display the associated Web site or Web page.

Describe the types of Web pages

There are six basic types of Web pages. An advocacy Web page contains content that describes a cause, opinion, or idea. A business/marketing Web page contains content that promotes or sells products or services. An informational Web page contains factual information. A news

Web page contains newsworthy material including stories and articles relating to current events, life, money, sports, and the weather. A portal Web page offers a variety of Internet services from a single, convenient location. A personal Web page is maintained by a private individual who normally is not associated with any organization.

Recognize how Web pages use graphics, animation, audio, video, and virtual reality

Many exciting Web pages use multimedia. Multimedia refers to any application that integrates text with one of the following elements: graphics, sound, video, virtual reality, or other media elements.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

A graphic is a digital representation of information such as a drawing, chart, or photograph. Two common file formats for graphical images on the Web are JPEG ( Joint Photographic Experts

Group ) and GIF ( Graphics Interchange Format ), which use compression techniques to reduce the size of graphics files and thus speed downloading.

Animation is the appearance of motion created by displaying a series of still images in rapid sequence. One popular type of animation, called an animated GIF , uses computer animation and graphics software to combine several images into a single GIF file.

Audio is music, speech, or any other sound. A common format for audio files on the Web is

MP3 , a popular technology that compresses audio. More advanced Web audio applications use streaming audio , which transfers audio data in a continuous and even flow, allowing users to listen to the sound as it downloads. Video consists of full-motion images that are played back at various speeds. Video files often are quite large in size. The Moving Pictures Experts Group

( MPEG ) defines a popular video compression standard. Streaming video allows you to view longer or live video images as they are downloaded.

Virtual reality ( VR ) is the use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space. A VR world is an entire 3-D site that contains infinite space and depth.

Define Webcasting

Pull technology is a method of obtaining information that relies on a client such as your computer to request a Web page from a server. On the other hand, Webcasting , also called push technology , is a method of obtaining information in which a server automatically downloads content to your computer at regular intervals or whenever updates are made to the site.

Webcasting saves time by delivering information at regular intervals and allows users to view

Web content when they are offline , that is, when they are not connected to the Internet.

Describe the uses of electronic commerce (e-commerce)

Electronic commerce ( e-commerce ) is a financial business transaction that occurs over an electronic network such as the Internet. Today, there are three types of e-commerce. Business to consumer ( B-to-B or B2C ) e-commerce consists of the sale of goods to the general public.

Customers visit an online business through an electronic storefront , which contains descriptions, graphics, and a shopping cart that allows customers to collect their purchases.

Consumer to consumer ( C-to-C or C2C ) e-commerce occurs when one consumer sells directly to another. An online auction is an example of consumer to consumer e-commerce. Business to business ( B-to-B or B2B ) e-commerce , which is the most prevalent type of e-commerce, takes place between businesses, with businesses typically providing services to other businesses.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms, and instant messaging work

A variety of services are used widely on the Internet, including e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms, and instant messaging. E-mail ( electronic mail ) is the transmission of messages and files via a computer network. You use an e-mail program to create, send, receive, forward, store, print, and delete messages. To receive messages, you need an e-mail address , which is a combination of a username and a domain name that identifies a user.

FTP ( File Transfer Protocol ) is an Internet standard that allows you to upload and download files with other computers on the Internet. An FTP server is a computer that allows you to use

FTP to upload files to, and download files from, an FTP site . With anonymous FTP , anyone can transfer some, if not all, available files. A newsgroup is an online area in which users conduct written discussions about a particular subject. The computer that stores and distributes newsgroup messages is called a news server . You use a program called a newsreader to access a newsgroup, read previously entered messages (called articles ), and add ( post ) messages of your own.

A thread consists of the original article and all subsequent related replies. In a moderated newsgroup , a moderator reviews articles and posts them, if appropriate. A message board is a popular Web-based type of discussion group that does not require a newsreader and typically is easier to use than a newsgroup. A mailing list is a group of e-mail names and addresses given a single name. To add your e-mail name and address to a mailing list you subscribe to it; to remove your name, you unsubscribe .

A chat is real-time (meaning everyone involved in the chat is online at the same time) typed conversation that takes place on a computer. A location on an Internet server that permits users to chat is called a chat room . Some chat rooms support voice chats and video chats , where you can hear or see others and they can hear or see you as you chat. A chat client is a program on your computer that allows you to connect to a chat server and start a chat session. Instant messaging ( IM ) is a real-time Internet communications service that notifies you when one or more people are online and then allows you to exchange messages or join a private chat room.

Identify the rules of netiquette

Netiquette , which is short for Internet etiquette, is the code of acceptable behaviors users should follow while on the Internet. Rules for e-mail, newsgroups, and chat rooms include:

 Keep messages brief and use proper grammar and spelling.

 Be careful when using sarcasm and humor.

 Be polite and avoid offensive language.

 Avoid sending flames (abusive messages) and spam (unsolicited junk mail).

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

 Do not use all capital letters, which is the equivalent of SHOUTING!

 Use emoticons (such as :) for smile) to express emotion.

 Use abbreviations (such as BTW for by the way) for popular phrases.

 Clearly identify a spoiler , which is a message that reveals a solution to a game or an ending to a movie or program.

 Read the FAQ (frequently asked questions) document.

 Do not assume all material is accurate or up-to-date.

 Never read someone’s private e-mail.

Expand Your

Knowledge

1.

The Internet

2.

Accessing the Internet

3.

URLs

4.

Searching the Web

5.

Types of Web Pages

6.

How Web Pages Use Multimedia

7.

Webcasting

8.

E-Commerce

9.

Web Publishing

10.

Internet Services

11.

Netiquette

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

The Internet

The Internet has had a profound affect on the world of computers. Microsoft CEO Bill Gates claims, “The Internet is pervasive in everything we’re doing.” The Internet also has assumed an increasing prominence in the world at large. Today, the letters “www” seem an omnipresent part of advertisements on buses, billboards, and magazines.

The Internet, as it is known today, was born in 1983 when ARPANET was split into two interconnected networks: ARPANET and MILNET. The size of the Internet doubled when

NSFnet joined the Internet in 1986.

The Internet has proven to be a reliable means of transmitting data. Occasionally, however, transmission problems do occur. For 30 minutes in the spring of 1995, all of the traffic destined

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk for MIT was sent through a small wire in Florida, a situation described as equivalent to routing all of the flights bound for O’Hare to a driveway.

Accessing the Internet

National ISPs include AT&T, Earthlink, and WorldCom. Two popular OSPs are America Online

(AOL) and the Microsoft Network (MSN). Some online services supply specific types of information. For example, Dow Jones provides financial and business news, and Imagination offers games and entertainment. WSPs include GoAmerica Communications, OmniSky, and

SprintPCS. The role of WSP is expected to grow. Industry analysts predict that by 2003, more than 60 million people will use wireless Web-enabled devices to connect to the Internet. The

CEO of Amazon.com goes even farther, projecting that in 10 years all Internet connections be wireless.

Although most ISPs charge a standard fee for dial-up access, to attract users (who view advertisements on an ISP’s home page) some ISPs now are providing free service. Following this lead, a California-based DSL recently advertised free, high-speed Internet access (a service that usually costs $50 a month) to users who agree to ads aimed at their demographic group.

URLs

On a Web page, a link is a built-in connection to another related Web page or part of a Web page. A link can be a word, phrase, or image. URLs make it possible to navigate using links, because each link is connected to a URL. When you click a link, the Web site or document associated with the URL is displayed. Some people refer to this activity of jumping from one

Web page to another as surfing the Web .

URLs are registered for a standard fee (usually about $70). To acquire an appropriate URL, some companies are willing to spend a great deal more for a URL that already has been registered.

Recently, eCompanies paid an entrepreneur $7.5 million for a Web address. This more than doubled the previous record – Compaq’s purchase of altavista.com for $3 million.

Searching the Web

The World Wide Web is an incredible source of information on almost any topic. There are almost 2.5 billion Web pages. Exploring this vast reservoir for the answer to a search engine user’s query, which usually is expressed in just a few keywords, is a daunting task. No wonder an engineering head at AltaVista described search engines as a combination of “wizardry and witchcraft.”

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Often, simple search queries yield an overwhelming number of results. This is attributed to several factors:

 The limitations of search engines . A query about mustangs on the American plains might produce results involving Southern Methodist University's football team and the Ford car.

 The nature of queries . While a traditional researcher, such as a librarian, uses queries averaging 14 words, the typical Internet query is just over one word.

 The creators of Web pages . Developers of commercial Web pages sometimes distort results by repeating frequently requested keywords in the background, where spiders see them but people do not.

Despite these difficulties, search engines are among the most popular sites on the Web. When choosing a search engine, experts suggest that novice users, and users looking for obscure information, turn first to the larger search engines (AltaVista, Yahoo!, Lycos, and so on) because they are easiest to use and cast the largest net.

Types of Web Pages

Advocacy Web pages established for political candidates, called “e-campaigning,” has become an important part of politics. Surveys show that more than 50 percent of Internet users turn to the

Web for information about political topics.

Business/marketing Web pages used for shopping on the Internet are increasingly popular. In

1999, 17 million households shopped online. This figure is expected to grow to 49 million by

2004. A survey of back-to-school shoppers 34 years old and younger showed that 17 percent planned to shop online for their children’s school needs. Perhaps more significant, only 6 percent of surveyed shoppers reported being uncomfortable with buying on the Internet.

Educational institutions frequently publish informational Web pages. Today, most colleges have

Web sites that offer course descriptions, information about the student population, and registration costs and deadlines. When shopping for college, surveys show that high school seniors use the Web more than catalogs or guidebooks; about 80 percent of college-bound students start looking at college Web sites as sophomores.

News Web pages are the most popular Web sites among Americans with access to the Internet.

Although these Web sites often are associated with newspapers, magazines, television stations, or radio stations, some are published only online, without a related print or broadcast media.

Portal Web pages often offer the following free services: search engine, news, sports and weather, free personal Web pages, reference tools, shopping malls, e-mail, instant messaging, newsgroups, and chat rooms. The dictionary defines a “portal” as a door or gateway. Portal Web pages are gateways to a host of services.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Personal Web pages sometimes use Web cams to provide minute-by-minute views of life in a dorm room, an apartment, a new-born baby’s crib, or even the inside of a refrigerator. One devotee of these personal Web pages says visitors often develop a sort of “relationship” with the

Web page developer. Perhaps this observation is true; some personal Web pages receive more than 1,000 hits a day.

How Web Pages Use Multimedia

Multimedia can bring a Web page to life, increase the types of information available on the Web, expand on the Web’s potential uses, and make the Internet a more entertaining place to explore.

Because Web pages with multimedia take longer to download, most browsers allow users to turn off some multimedia elements (such as graphics) and show a text-only version, speeding the display of a Web page.

Choose a topic for a Web page, such as your school or your class. How could multimedia enhance the page? What multimedia elements would you use? How?

Webcasting

Some people use Webcasting to download copyrighted material, such as music, from Web sites.

Many young, unknown musicians see music Web sites as a way to gain exposure, but some already-popular musicians see sharing music on Web sites as little more than theft. The heavy metal rock band Metallica sued Napster (a music Web site) for copyright violations. A number of colleges have placed a ban on music Web sites. These schools maintain that students downloading and sharing music creates a tremendous amount of traffic, clogging the school’s computer systems. As a result, the schools are using filtering software to deny access to music

Web sites. Several student groups have formed to protest this response.

E-Commerce

Today, more than 50 percent of Web sites are commercial. Online product sales total more than

$6 billion, which represents a twelve-fold increase in just five years. These numbers should be kept in perspective – in 1999, e-commerce still represented only 0.5 percent of U.S. consumer spending.

Business to consumer e-commerce often allows buyers to purchase directly from businesses, eliminating the middleman and thus providing goods and services at lower costs. Other advantages of e-commerce include:

 twenty-four hour access

 global presence

 two-way communication decreased costs

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

 lower product display and storage costs reduced salesperson costs

Businesses advertise with their own Web site or on another company’s Web site. The most successful Web advertisements are on popular sites, such as search engines. In terms of audience, advertising on the Web is expensive. The cost to reach 1,000 consumers is about $75 on the Web, $60 in a newspaper, $44 in a magazine, and $5 on television. Yet, Web advertisements do offer advantages:

Unlike traditional media advertising, which is passive (and often ignored by the audience), Web advertising is interactive. The audience expresses an interest in the product by clicking a hyperlink and choosing to view a Web ad.

For many products, Web users are the ideal customers. Web users tend to be students or highly educated consumers in their late 30s, with average incomes of about $55,000.

What products could benefit most from advertising on the Web. Why?

Web Publishing

Deciding upon the purpose of the Web site and the audience for whom it is intended will make it easier to determine what should and should not be included on the Web site. Web publishing is an increasingly commonplace Internet activity. With the assistance of word processing packages,

Web page authoring software, or Web sites that assist in the creation of Web pages, even elementary school children are developing personal Web pages.

Internet Services

It is estimated that the number of e-mail users has increased 300 percent during the past five years, and the number of e-mail messages sent per day has increased 400 percent. While its growth has been phenomenal, not everyone is happy with e-mail’s ever-increasing use. In a business setting, some feel that e-mail can be counter-productive. They contend that employees spend too much time writing and reading e-mail on inconsequential topics – subjects they never would commit to paper. In a social setting, some wonder if e-mail is fitting in every situation.

Although e-mail is suitable for casual messages, most believe it is inappropriate for more serious or formal communication, such as a wedding invitation. How do you feel about these reservations regarding e-mail?

Many files on anonymous FTP sites are public domain software, freeware, or shareware. Public domain software is not copyrighted and therefore can be distributed at no cost. Freeware also is available at no cost but, because it is copyrighted, it cannot be resold. Shareware can be downloaded and tried for free, but a license fee must be paid if the software is kept. Shareware users who pay the license fee may receive a manual, notification of new releases or tips, and

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk access to technical support. The quality of freeware, public domain software, and shareware varies greatly.

The real-time character of chat makes chat rooms different from newsgroups or mailing lists.

The extent to which a chat room is monitored varies. In some chat rooms, particularly those aimed at adults, a monitor’s presence hardly is noticed. Chat rooms intended for minors, however, often are monitored closely. Chat rooms can be an invaluable experience for children, letting them share thoughts and ideas with people their own age from around the country, or even around the world. Yet, to ensure that content is appropriate, parents may want to oversee a child’s first few chat room visits.

Netiquette

Netiquette can be applied to all aspects of the Internet. Which netiquette rules are most important? Which rules are least important? Why? What rules, if any, would you add? In her book, Guide for the Turn-of-the-Millennium , syndicated columnist Judith Martin (Miss Manners) offers guidelines for use of the Internet and other technological innovations. Web sites such as http://www.fau.edu/netiquette/netiquette.htm

also offer advice on Internet manners.

Home > Notes > Discovering Computers > Chapter 3

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Site Map |

Chapter 3: Application Software

| Overview | Expand Your Knowledge

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Overview 1.

Define application software

2.

Understand how system software interacts with application software

3.

Identify the role of the user interface

4.

Explain how to start a software application

5.

Identify the widely used products and explain the key features of different software applications

6.

Identify various products available as Web applications

7.

Describe the learning aids available with many software applications

This chapter discusses the role of the system software with respect to application software. It then presents an overview of several productivity software applications, graphic design/multimedia software applications, home/personal/educational software applications, and communications software applications. The chapter then identifies various Web applications.

Finally, learning aids and supports tools within application software products are presented.

Define application software

Application software consists of programs designed to perform specific tasks for users.

Application software can be used as a productivity/business tool; to assist with graphics and multimedia projects; to support home, personal, and educational activities; and to facilitate communications. Specific application software products, called software packages , are available from software vendors. Although application software also is available as shareware, freeware, and public-domain software, these usually have fewer capabilities than retail software packages.

Understand how system software interacts with application software

System software consists of programs that control the operations of a computer and its devices.

System software serves as the interface between a user, the application software, and the computer’s hardware. One type of system software is the operating system. Before application software can be run, the operating system , which contains instructions that coordinate the activities among computer hardware devices, must be loaded from the hard disk into the computer’s memory.

Identify the role of the user interface

The user interface controls how you enter data or instructions and how information displays on the computer screen. Many of today’s software programs have a graphical user interface. A graphical user interface ( GUI ) combines text, graphics, and other visual images to make software easier to use.

Explain how to start a software application

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Both the Microsoft Windows and the Apple Macintosh operating systems use the concept of a desktop. The desktop is an on-screen work area with common graphical elements such as icons , buttons , menus, links, windows, and dialog boxes . A software application can be started by clicking its program name on a menu , or list of commands . Clicking the program name instructs the operating system to transfer the program’s instructions from a storage medium into memory.

Once started, the application displays in a window on the desktop. A window is a rectangular area of the screen that is used to show the program, data, and/or information. At the top of the window is a title bar that contains the window’s name.

Identify the widely used products and explain the key features of

productivity/business software applications graphic design/multimedia software applications home/personal/educational software applications communications software applications

People use productivity software to become more effective and efficient while performing daily activities. Word processing software allows users to create and manipulate documents that contain text and graphics. With word processing software, you can insert clip art into a document; change margins ; find and replace text; use a spelling checker to check spelling; place a header and footer at the top and the bottom of a page; and vary font (character design), font size (character scale), and font style (character appearance).

With spreadsheet software, data is organized in rows and columns, which collectively are called a worksheet . The intersection of a row and column, called a cell , can contain a label (text), a value (number), or a formula or function that performs calculations on the data and displays the result.

Database software allows you to create and manage a database. A database is a collection of data organized to allow access, retrieval, and use of that data. A query is used to retrieve data according to specified criteria , which are restrictions the data must meet.

Presentation graphics software is used to create presentations that communicate ideas, messages, and other information to a group through a slide show . You can use a clip gallery to enhance your presentation with clip art images, pictures, video clips, and audio clips.

A personal information manager ( PIM ) is software that includes an appointment calendar to schedule activities, an address book to maintain names and addresses, and a notepad to record ideas, reminders, and important information. A software suite is a collection of individual applications sold as a single package.

Project management software allows you to plan, schedule, track, and analyze the progress of a project. Accounting software helps companies record and report their financial transactions.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Power users often use software that allows them to work with graphics and multimedia.

Computer-aided design ( CAD ) software assists in creating engineering, architectural, and scientific designs. Desktop publishing ( DTP ) software is used to design and produce sophisticated documents. DTP is developed specifically to support page layout , which is the process of arranging text and graphics in a document.

Paint software is used to draw graphical images with various on-screen tools. Image editing software provides the capability to modify existing images. Video editing software and audio editing software can be used to modify video and audio segments.

Multimedia authoring software is used to create electronic interactive presentations that can include text, images, video, audio, and animation. Web page authoring software is designed to create Web pages and to organize, manage, and maintain Web sites.

Many software applications are designed specifically for use at home or for personal or educational use. Integrated software combines several productivity software applications that share a similar interface and common features into a single package.

Personal finance software is an accounting program that helps pay bills, balance a checkbook, track income and expenses, follow investments, and evaluate financial plans.

Legal software assists in the creation of legal documents and provides legal advice. Tax preparation software guides users through the process of filing federal taxes. Personal DTP software helps develop conventional documents by asking questions, presenting predefined layouts, and supplying standard text.

Photo-editing software is used to edit digital photographs. A clip art/image gallery is a collection of clip art and photographs that can be used in all types of documents. Home design/landscaping software assists with planning or remodeling.

Educational software teaches a particular skill and exists for about any subject. Reference software provides valuable and thorough information for all individuals. Entertainment software includes interactive games, videos, and other programs designed to support a hobby or provide amusement.

One of the main reasons people use computers is to communicate and share information. E-mail software is used to create, send, receive, forward, store, print, and delete e-mail ( electronic mail ). A Web browser is a software application used to access and view Web pages. A chat client is software that allows you to connect to a chat room , which permits users to chat via the computer. A newsreader is a software program used to participate in a newsgroup , which is an online area on the Web where users conduct written discussion about a particular subject. An instant messenger is a software program installed to use instant messaging ( IM ), a real-time communications service that notifies you when one or more people are online and then allows you to exchange messages or files. Groupware is a software application that helps groups of people on a network work together and share information. A videoconference is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data.

Identify various products available as Web applications

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

A Web application is a software application that exists on a Web site. To access the Web application, you visit the Web site that offers the program. Some Web applications are free; for others, you pay for use, service, support, or when a certain action occurs. Web-based training

( WBT ) is a type of CBT (computer-based training) that uses Internet technology. Many Web sites offer WBT to the general public. An application service provider ( ASP ) is a third-party organization that manages and distributes software and services on the Web.

Describe the learning aids available with many software applications

Many software applications and Web sites provide learning aids. Online Help is the electronic equivalent of a user manual. Usually integrated into an application software package, online

Help often is context-sensitive , meaning that the Help information is related to the current task being attempted. Most online Help also provide links to Web sites that have a FAQs page. FAQs

(Frequently Asked Questions) supply answers to common queries. Many books are available to help you learn to use the features of a personal computer application package. A wizard is an automated assistant that helps complete a task by asking questions and then performing actions based on the answers.

Expand Your

Knowledge

1.

Application software

2.

System software

3.

The user interface

4.

Starting an application

5.

Software

6.

Web applications

7.

Learning aids

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

Application Software

Popular types of application software can be categorized by their general use: productivity software, graphics design/multimedia software, home/personal/educational software, and communications software. An application can belong to more than one category. For example, an e-mail program can be considered both productivity software and communications software.

System Software

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Many application programs are designed to run with a specific operating system. When shopping for an application software package, buyers must make sure they have a compatible operating system. A software package designed to be used with the Macintosh operating system may not work with the Windows operating system. The operating system version also is important. An application designed for Windows XP may not work with Windows 3.1. Yet, because most operating systems are downward compatible, software written for earlier versions of an operating system (such as Windows 98) usually can be used with recent versions of the operating system

(such as Windows XP).

The User Interface

The user interface plays a key role in application software. Studies have found that GUI users generally complete tasks more accurately, work faster, are more productive, and feel less fatigue than users of a text interface. The Macintosh operating system – the first popular GUI – actually was developed from an earlier GUI-based operating system created by Xerox.

The first version of Windows (1985) imitated the Macintosh’s GUI (Apple sued Microsoft, unsuccessfully, for copyright infringement). Although some users still feel the Macintosh interface is superior, today some form of Windows is used on almost 90 percent of personal computers. Because of this, even competitive products often use similar features, such as the same menu names.

Starting an Application

To click an object on the screen, you move the pointer to the object and then press and release a button on the mouse. Often, applications also can be started by double-clicking the icon that represents the application.

When an application is started, the right-hand corner of the application window title bar usually displays three buttons:

 Minimize

– When clicked, this button reduces a window to a button on the taskbar.

 Restore

– When clicked, this button returns a window to its initial size. When a window does not fill the desktop, the Restore button is replaced by a Maximize button

 that, when clicked, enlarges the window so it covers the entire desktop.

Close

– When clicked, this button closes the window. The Close button removes the window from the desktop and its button from the taskbar.

A dialog box can contain option buttons, check boxes, text boxes, and command buttons. Option buttons stipulate desired alternatives; check boxes turn specific capabilities on or off; text boxes allow text to be entered; and command buttons immediately perform an action, such as implementing (OK) or ignoring (Cancel) the choices made in a dialog box. Shortcut menus can

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk change depending on where the pointer rests when the mouse is right-clicked. Dimmed commands on a menu or shortcut menu are unavailable.

Some applications use automatically display a smart tag when you perform a certain action.

Clicking the smart tag displays a menu of commands related to the action.

Software

Word processing software is used for creating, editing, formatting, saving, and printing documents. In the modern office, word processing software has replaced the typewriter for almost all written work. The editing capabilities of word processing software have altered the creative process. The freedom to express yourself without reservation, knowing you easily can revise what you have written, can improve the quality of written work. It is good practice to save a document before printing it. When a document is saved, it exists as a file, or named collection of data, instructions, or information. A file name uniquely identifies each file. Restrictions on file names once were severe; file names could be no more than eight characters long, and many characters, including spaces, could not be used. In Windows XP, however, a file name can have up to 255 characters, including spaces.

Some spreadsheet programs offer more than 200 internal functions. When creating a spreadsheet, formulas and functions usually must be preceded by a special character (such as =, +, or @) to distinguish them from labels or values. Formulas use cell references, or addresses, of cells that contain values. When formulas are copied from one cell to another, the cell references change to reflect the new location. This update is called relative referencing. Another powerful capability, called goal-seek, finds what value is needed to reach a specified goal.

While spreadsheet packages can manage data tables of a few thousand records, database software can efficiently handle much larger data tables. In a database, common data types include text, numeric, currency, date, memo, hyperlink, and object. When identifying data types, numbers treated as text (such as zip codes, Social Security numbers, or telephone numbers) sometimes are referred to as alphanumeric data because they are not used in calculations. The results of a database query are placed in an ANSWER table.

Although introduced years after word processing and spreadsheet software, presentation graphics software has had almost as great an impact on business, and on how people do business, as either of the older applications. Presentations often include an outline with the text from each slide, audience handouts that can be distributed to the audience, and a notes page with additional notes for the presenter. Some presentation graphics packages offer templates for various presentations

(company meeting, financial report, marketing plan, progress report, employee orientation, training, and so on).

PIMs essentially are “free style” database managers. They are very popular with people who spend much of their time in business travel. These people, often called road warriors, find PIMs

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk a valuable part of the arsenal they bring to their daily battles. Like a daily planner, PIMs must be reviewed regularly to be effective.

Unlike word processing software, DTP software increases hardware requirements. Because of its relatively low cost (an advanced DTP system can be purchased for less than $10,000) and the speed, control, security, and flexibility offered by desktop publishing, many companies are using

DTP instead of outside printing firms for their publishing needs.

Paint software and image editing software have had a tremendous impact on commercial art.

Commercial artists praise the capabilities offered by these applications. At the same time, many feel these applications have led clients to demand more, both in terms of time and expectations.

As a result, some commercial artists believe their income, actually has dropped because of graphic software.

Most software for home, personal, and educational use is relatively inexpensive. It still pays to shop around. Prices for some software for home/personal use, such as integrated software, can vary greatly for the same brand depending on the vendor. Some personal finance packages can prepare reports on income and expenses, budget, net worth, taxes, and investments.

Personal finance software wizards (automated assistants) can help to balance accounts, prepare budgets, plan mortgages, calculate savings, and arrange retirements. Legal software is designed to facilitate creation of standard documents; unusual circumstances might still demand the services of a lawyer. Tax preparation software also is best used by people in fairly common circumstances.

For some students, educational software is a welcome alternative to traditional classes, allowing them to work privately at their own pace. Reference software articles often include links that, when clicked, display related articles. Because referenced material can change frequently, some reference software packages can be updated via the World Wide Web.

Computer communications touch everyone’s life. Consider the ATM that “knows” a bank balance even though it is located 500 miles from the bank. Many e-mail programs allow users to send “registered mail” with a return receipt guaranteeing the recipient received the message. Email and personal information management (PIM) software sometimes also are considered part of groupware. Although e-mail has assumed an important role in business messages, traditional paper letters and memos still are used In fact, some maintain that the amount of paper correspondence has increased.

Web Applications

Web applications can be a better buy than packaged applications. For example, a $50 packaged antivirus program can be replaced by a Web application that costs less than $30 annually, is updated frequently, and uses less space on a hard disk. In addition, packaged software might

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk include features you will never use, which increases the cost of the package. Often, you can use the standard version of a similar Web application for less money or even for free, and only pay more for the additional features you want. Web applications can save businesses money with reduced installation, upgrade, and maintenance costs. Some social analysts believe that the lower cost of Web applications also can help close the “digital divide.”

For Web application vendors, benefits include easier updating and debugging (error correcting), removal of packaging and distribution costs, and elimination of software piracy (the illegal copying and selling of software). Despite their advantages, analysts point out that Web applications may not be right for everyone. For some consumers, paying a monthly fee ultimately costs more than the one-time purchase of packaged software. Also, many households do not have the fast Internet connection needed for certain Web applications to run smoothly.

Finally, some people worry that files stored at a Web application site can be infected with viruses. Web application vendors believe these worries are groundless and that Web applications benefit both buyers and sellers.

Learning Aids

In many applications, an audible “beep” indicates an error, and the last entry should be reviewed.

Function key F1 often is used to activate the Help feature. Some applications have a Help button that, when clicked, changes the mouse pointer to a Help arrow. This arrow can be used to obtain help on a command, button, or bar by pointing at the item and clicking. Many software developers have eliminated user’s manuals in favor of extensive online Help. Computer stores occasionally carry a few trade books, but entire aisles of computer-related books can be found in most large book stores.

For some applications, other learning aids, such as tutorials or keyboard templates, are available.

Tutorials are step-by-step instructions using real examples that show how to use an application.

Tutorials can be printed, software-based, or Internet-based. Keyboard templates (plastic sheets that fit around a portion of the keyboard) illustrate the keyboard commands for various tasks.

Wizards can be used to help create memorandums, meeting agendas, fax cover sheets, flyers, letters, resumes, charts, forms, reports, awards, pleadings, calendars, postcards, envelopes, mailing labels, newsletters, and Web pages. Some applications also offer document templates, which are special documents that provide basic tools for shaping a final document. The availability of learning aids and support tools is an important consideration in selecting an application package.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Site Map |

Chapter 4: The Components of the System Unit

| Overview | Expand Your Knowledge |

Overview 1.

Describe the components in the system unit

2.

Explain how the CPU uses the four steps of a machine cycle to process data

3.

Define a bit and describe how a series of bits represents data

4.

Differentiate between the various types of memory

5.

Describe the types of expansion slots and cards in the system unit

6.

Explain the difference between a serial, a parallel, and a USB port

7.

Describe how buses contribute to a computer's processing speed

8.

Identify components in a notebook computer

9.

Identify components in a handheld computer

Chapter 4 presented the components in the system unit, described how memory stores data, instructions, and information, and discussed the sequence of operations that occur when a computer executes an instruction. The chapter included a comparison of various microprocessors on the market today.

Describe the components in the system unit

The system unit , sometimes called the chassis , is a box-like case housing the electronic components of a computer that are used to process data. System unit components include the processor, memory module, cards, ports, and connectors. Many of the system unit’s components

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk reside on a circuit board called the motherboard . The motherboard contains many different types of chips , or small pieces of semiconducting material, on which one or more integrated circuits ( IC ) are etched. An integrated circuit is a microscopic pathway capable of carrying electronic current. Each IC can contain millions of transistors , which act as switches for electronic signals.

Explain how the CPU uses the four steps of a machine cycle to process data

The central processing unit ( CPU ), also called a processor , significantly impacts overall computing power and manages most of a computer’s operations. The CPU contains the control unit and the arithmetic/logic unit. The control unit directs and coordinates most of the operations in the computer. For every instruction, the control unit repeats a set of four basic operations called the machine cycle : (1) fetching the instruction or data item from memory, (2) decoding the instruction into commands the computer understands, (3) executing the commands, and, if necessary, (4) storing , or writing the result to memory. The arithmetic/ logic unit ( ALU ) performs the execution part of the machine cycle. Specifically, the ALU carries out three operations:

 Arithmetic operations – performing calculations, which include addition,

 subtraction, multiplication, and division

Comparison operations – comparing data items to determine if the first item is greater than, equal to, or less than the other item

 Logical operations – working with conditions and logical operators such as

AND, OR, and NOT

 Compare and contrast various personal computer processors on the market today

A personal computer’s CPU usually is contained on a single chip, which some call a microprocessor . Intel is a leading manufacturer of personal computer processors. Most highperformance PCs use a processor from Intel called the Pentium

®

processor. A second Intel brand, called the

Celeron™

, is designed for less expensive PCs. Two more brands, called the

Xeon™ and Itanium™ processors, are ideal for workstations and low-end servers. Intelcompatible processors have the same internal design as Intel processors and perform the same functions, but are made by other companies and often are less expensive. An alternative design to the Intel-style processor, the Motorola processor , is found in Apple Macintosh and Power

Macintosh systems. A new type of processor designed for lower-costing personal computers and

Internet appliances, called an integrated CPU , combines functions of a processor, memory, and a video card on a single chip. Today’s processors are equipped with

MMX

™ technology , a built-in set of instructions that manipulates and processes multimedia data more efficiently.

Intel’s

SSE instructions and AMD’s

3DNow!™

are two other technologies that improve a processor’s performance of multimedia, the Web, and 3-D graphics. To optimize and extend battery life for notebook computers, Intel® mobile processors use SpeedStep™ technology and

AMD processors use

PowerNow!™ technology

.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Define a bit and describe how a series of bits represents data

Most computers are digital , meaning they understand only two discrete states: on and off. These states are represented using two digits, 0 ( off ) and 1 ( on ). Each on or off value is called a bit

(short for bi nary digi t ), the smallest unit of data a computer can handle. Eight bits grouped together as a unit form a byte . A byte provides enough different combinations of 0s and 1s to represent 256 individual characters including numbers, letters of the alphabet, punctuation marks, and other characters.

The combinations of 0s and 1s used to represent data are defined by patterns called coding schemes. Popular coding schemes are ASCII , EBCDIC, and Unicode . Coding schemes make it possible for humans to interact with a digital computer that recognizes only bits. Every character you type on a keyboard is converted into a corresponding byte, a series of on/off electrical states the computer can process.

Differentiate between the various types of memory

Memory is a temporary storage place for data, instructions, and information. Memory stores the operating system, application programs, and the data processed by application programs. A byte is the basic storage unit in memory. Memory size is measured by the number of bytes available for use. A kilobyte ( KB or K ) of memory is approximately one thousand bytes, a megabyte

( MB ) is approximately one million bytes, and a gigabyte ( GB ) is approximately one billion bytes. The system unit contains several types of memory.

RAM ( random access memory ) consists of memory chips that the processor can read from and write to. Most RAM is volatile memory

, meaning that its contents are lost when the computer’s power is turned off. Two basic types of RAM chips are dynamic RAM and static RAM.

Dynamic RAM ( DRAM ) must be re-energized constantly or it loses its contents. Static RAM

( SRAM ) is faster and more reliable than DRAM and has to be re-energized less often, but it is much more expensive.

Memory cache , also called a cache store or RAM cache , improves processing time by storing frequently used instructions and data. ROM ( read-only memory ) refers to memory chips that only can be read and used; that is, they cannot be modified. ROM is nonvolatile memory

( NVM

), meaning that its contents are not lost when the computer’s power is turned off. A variation of the ROM chip, called programmable read-only memory ( PROM ), is a blank chip on which you can place items permanently.

Flash memory , also known as flash ROM or flash RAM , is nonvolatile memory that can be erased electronically and reprogrammed. Complementary metal-oxide semiconductor

( CMOS ) memory , another type of memory chip, stores configuration information about the computer and uses battery power to retain information when the power to the computer is off.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Describe the types of expansion slots and cards in the system unit

An expansion slot is an opening, or socket, where you can insert a circuit board into the motherboard. These circuit boards – called cards , expansion cards , boards , expansion boards , adapters , adapter cards , interface cards , add-ins , or add-ons -- add new devices or capabilities to the computer. Four types of expansion cards found in most computers are a video card, a sound card, a network interface card, and a modem card.

A video card converts computer output into a video signal that is sent through a cable to the monitor, which displays an image. A sound card enhances the sound-generating capabilities of a personal computer by allowing sound to be input through a microphone and output through speakers.

A network interface card ( NIC ) is a communications device that allows the computer to communicate via a network. A modem card is a communications device that enables computers to communicate via telephone lines or other means. Many of today’s computers support

Plug and Play , a capability with which the computer automatically can configure expansion boards and other devices as you install them.

Notebook and other portable computers have a special type of expansion slot used for installing a

PC Card , which is a thin credit card-sized device that adds memory, disk drives, sound, fax/modem, and communications capabilities to a mobile computer.

Explain the difference between a serial, a parallel, and a USB port

A cable often attaches external devices to the system unit. A port is the interface, or point of attachment, to the system unit. Ports have different types of connectors , which are used to join a cable to a device. Male connectors have one or more exposed pins, while female connectors have matching holes to accept the pins. Most computers have three types of ports: serial, parallel, and USB. A serial port is a type of interface that connects a device to the system unit by transmitting data only one bit at a time. Serial ports usually connect devices that do not require fast data transmission rates, such as a mouse, keyboard, or modem. A parallel port is an interface that connects devices by transferring more than one bit at a time. Many printers connect to the system unit using a parallel port. A universal serial bus ( USB ) port can connect up to 127 different peripheral devices with a single connector type, greatly simplifying the process of attaching devices to a personal computer.

Describe how buses contribute to a computer's processing speed

Bits are transferred internally within the circuitry of the computer along electrical channels. Each channel, called a bus , allows various devices inside and attached to the system unit to communicate with each other. The bus width , or size of the bus, determines the number of bits that can be transferred at one time. The larger the bus width, the fewer number of transfer steps

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk required and the faster the transfer of data. In most computers word size (the number of bits the

CPU can process at a given time) is the same as the bus width. Every bus also has a clock speed.

The higher the bus clock speed, the faster the transmission of data, which results in applications running faster. A computer has two basic types of buses. A system bus connects the CPU to main memory. An expansion bus allows the CPU to communicate with peripheral devices.

Identify components in a notebook computer

Users with mobile computing needs often have a mobile computer, such as a notebook computer and/or handheld computer. A notebook computer, also called a laptop computer, can run either using batteries or using a standard power supply. In addition to the motherboard, processor, memory, sound card, PC Card slot, and drive bay, the system unit for a notebook computer also houses other devices, such as the keyboard, pointing device, speakers, and display.

Identify components in a handheld computer

Handheld computers run strictly on battery. Similar to desktop and notebook computers, handheld computers have a system unit that contains electronic components that process data. A handheld computer’s system unit also contains a display and may house speakers and some form of keyboard and/or pointing device. Handheld computers often have an IrDA port so you can communicate wirelessly with other computers. Many also include a serial port.

Expand Your

Knowledge

1.

The system unit

2.

The CPU

3.

Processor comparison

4.

Data representation

5.

Memory

6.

Expansion slots and expansion cards

7.

Ports

8.

Buses

9.

Notebook computers

10.

Handheld computers

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

The System Unit

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

The motherboard in the system unit contains different types of chips. Manufacturers package chips so the chips can be attached to circuit boards, such as the motherboard. Types of chip packages include:

Dual inline package ( DIP ), which consists of two parallel rows of downwardpointing thin metal feet (pins)

Pin grid array ( PGA ) package , which holds a larger number of pins because the pins are mounted on the surface of the package

 Flip chip-PGA ( FC-PGA ) package , which places chips on the opposite side (flip side) of the pins

 Single edge contact ( SEC ) cartridge , which connects to the motherboard on one of its edges

The CPU

The power of personal computer processor chips (the chips that contain the CPU) has grown at an astounding rate. As chips become older and more widely used, price cuts usually are introduced.

Several factors affect CPU processing speed. CPUs in most of today’s personal computers use pipelining , a technique that increases processing speed by beginning execution of a second machine cycle instruction before the first instruction is completed. CPUs also use high-speed storage locations, called registers , to hold data and instructions temporarily. The control unit relies on a small chip called the system clock to synchronize all computer operations. The speed at which a processor executes instructions is called clock speed , or clock rate , and is measured in megahertz ( MHz ). The system clock is a major factor affecting processor speed. A higher clock speed means the CPU can process more instructions per second.

Processor Comparison

Although once frequently used, the term “microprocessor” is much less common today.

Sometimes you can upgrade your processor to increase the computer’s performance. There are three forms of upgrades:

 With a chip for chip upgrade , the existing processor chip is replaced with a new one

 With a piggyback upgrade , the new processor is stacked on top of the old one

 With a daughterboard upgrade , the new processor is on a small circuit board

(the daughterboard ) that plugs into the motherboard

The past three years have seen a steady drop in the cost of computers. PC prices plunged as a result of lower prices for processors, memory chips, and hard drives. Consumers also are showing increased interest in new less powerful, but less expensive, personal computers that

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk work perfectly well for the most popular uses – word processing, Internet access, and spreadsheet applications. The surge in low-priced computer sales has had an impact on Intel, the world’s largest processor manufacturer. By focusing on making inexpensive processor chips, rivals AMD and Cyrix are making inroads into Intel’s dominance. Intel’s response, the

Celeron™, has proven popular, but the lower-priced chip offers a smaller profit margin.

Data Representation

Just as the decimal system (10 digits) is suited to human anatomy (10 fingers), the binary system (2 digits) is perfect to represent the on-off states (2 states) of a computer. Basic coding standards make it possible for components within computers to communicate, allow manufacturers to be confident that the components they produce will operate correctly in a computer, and enable consumers to purchase components that are compatible with their systems.

In the ASCII-8 and EBCDIC codes, the first four characters represent the zone, and the last four characters represent the digits 1 through 8. ASCII, originally a seven-bit code, was expanded to eight bits in an effort to provide for symbols used in other nations. Unicode, a 2-byte (16-bit) code, can represent 2

16

, or 65,536, characters. The system employs the codes used by ASCII and also includes other alphabets (such as Cyrillic and Hebrew), special characters (including religious symbols), and some of the “word writing” symbols used by various Asian countries.

Memory

Because computers use the binary number system, the actual values for the units in which memory and storage are measured are based on powers of 2. For example, one kilobyte = 2

10

=

1,024.

RAM’s volatility, and its ability to be changed, are its most distinguishing characteristics. When

RAM is purchased it comes in banks of nine chips – eight are needed to represent a byte and the ninth is needed for parity. RAM chips usually are packaged on small circuit boards called single inline memory modules ( SIMMs ) or dual inline memory modules ( DIMMs ) that are inserted into the motherboard. During the past 20 years, the price of RAM has dropped an average of 20 percent each year, but its capacity has more than doubled every two years.

Similar to flash ROM, another variation of ROM, called EEPROM ( electrically erasable programmable read-only memory ), can be erased electrically and rewritten. Because of its nonvolatile nature, EEPROM is used in electronic cash registers to store item prices.

The amount of time it takes the processor to read data from memory, called access time , directly affects how fast the computer can process data. Memory access time is measured in terms of nanoseconds , or billionths of a second.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Expansion Slots and Expansion Cards

Plug and Play was a much-touted feature of the Windows 95 and Windows 98 operating systems.

A PC Card slot, usually located on the side of a notebook computer, allows a PC Card to be changed without having to open the system unit. There are three types of PC Cards:

Type I cards add memory capabilities to the computer

Type II cards contain communications devices

Type III cards house devices such as hard disks

Ports

Port connectors are devised to be foolproof – each is designed so it can fit only one type of socket in only one correct position. Serial ports always are male on the system case. Cables connected to parallel ports often are employed over shorter distances.

Special-purpose ports include:

 1394 port – a port that can connect multiple devices requiring faster data transmission speeds such as digital cameras and DVD drives

 MIDI (musical instrumental digital interface) port – a special type of serial port designed to connect the system unit to a musical instrument

 SCSI (small computer system interface) port – a high-speed parallel port used to

 attach peripheral devices such as disk drives and printers

IrDA port – a port that allows wireless devices to transmit signals to a computer via infrared light waves

Buses

A highway analogy can help clarify how bus width affects the speed of data transfer. Data moves like cars – the more lanes (greater the bus width) the faster the traffic (data) flow. Ideally, buses used to transfer data should be large enough to use the processing power of registers. Sometimes, however, manufacturers reduce bus size to cut costs.

Word size, which indicates the number of bits processed in each machine cycle, has been compared to the amount of coffee produced with each turn of a coffee grinder’s handle.

Theoretically, if word size doubles then processor throughput also could double.

The types of expansion buses on a motherboard determine the types of cards you can add to a computer. Types of expansion buses include:

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

An ISA ( Industry Standard Architecture ) bus , the most common and slowest expansion bus, connects to devices such as a mouse, modem card, sound card, and low-speed network card

 A local bus is a high-speed expansion bus used to connect higher speed devices such as hard disks

An Accelerated Graphics Port ( AGP ) is a bus designed by Intel to improve the speed with which 3-D graphics and video transmit

 The universal serial bus ( USB ) and 1394 bus are buses that eliminate the need to install expansion cards into expansion slots

 A PC Card bus is the expansion bus for a PC Card

Notebook Computers

A typical notebook computer often has a keyboard/mouse, IrDA, serial, parallel, video, and USB ports. The keyboard/mouse port allows users who are uncomfortable with a notebook computer’s smaller keyboard and less-traditional pointing devices (often a touch pad or pointing stick) to connect a full-sized keyboard or a mouse to the computer.

Handheld Computers

One of the most popular handheld computers is the Palm Pilot from 3Com. First introduced in

1996, a recent version, Palm IIIc, offers a color screen and an expandable, full-sized keyboard.

Another pioneering handheld computer is Visor from Handspring. Visor runs the Palm operating system and features an expansion slot that can accommodate add-ons such as digital cameras and music players. Visor’s greatest innovation, however, may be the slot in the back, which can accommodate modules with various functions including a pager, an MP3 music player, videogame cartridges, and a module that converts the Visor into a cell telephone.

Home > Notes > Discovering Computers > Chapter 5

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Site Map |

Chapter 5: Input

| Overview | Expand Your Knowledge |

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Overview 1.

Describe the two types of input

2.

List the characteristics of a keyboard

3.

Identify various types of keyboards

4.

Identify various types of pointing devices

5.

Explain how a mouse works

6.

Describe different mouse types

7.

Explain how voice recognition works

8.

Understand how to input data into a handheld computer

9.

Identify the uses of a digital camera

10.

Describe the various techniques used for video input

11.

Describe the uses of PC video cameras and web cams

12.

Explain how scanners and other reading devices work

13.

Identify alternative input devices for physically challenged users

In this chapter, you learn what is input and what are input devices. The keyboard is presented and different keyboard types are described. You are introduced to various pointing devices, such as the mouse, trackball, touchpad, pointing stick, joystick, touchscreen, and pen input. Scanners and reading devices, including optical scanners, optical readers, magnetic ink character recognition readers, and data collection devices are explained. You learn about digital cameras, audio input, speech recognition, video input, and videoconferencing. Finally, input devices for physically challenged users are explored.

Describe the two types of input

Input is any data or instructions entered into the memory of a computer. Two types of input are data and instructions. Data is a collection of unorganized items that can include words, numbers, pictures, sounds, and video. A computer processes data into information, which is organized, meaningful, and useful. Instructions can be in the form of programs, commands, or user responses. A program is a series of instructions that tells a computer how to perform the tasks necessary to process data into information. A command is an instruction given to a computer program. A user response is an instruction you issue to the computer by responding to a question posed by a computer program. Any hardware component that allows you to enter data, programs, commands, and user responses into a computer is an input device.

List the characteristics of a keyboard

The keyboard is an input device that contains keys you press to enter data into a computer.

Desktop computer keyboards usually have from 101 to 105 keys, while keyboards for smaller computers contain fewer keys. All keyboards have a typing area used to type letters of the alphabet, numbers, punctuation marks, and other basic characters. Many desktop computer

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk keyboards also have a numeric keypad designed to make it easier to enter numbers, function keys programmed to issue commands and accomplish certain tasks, arrow keys used to move the insertion point (a symbol on the screen that indicates where the next typed character will display), and toggle keys that can be switched between two different states.

Identify various types of keyboards

A standard computer keyboard sometimes is called a QWERTY keyboard because of the layout of its typing area. An enhanced keyboard has 12 function keys along the top row, 2 ctrl keys, 2 alt keys, and a set of arrow and additional keys between the typing area and the numeric keypad.

Cordless keyboards transmit data via infrared light waves. Keyboards for notebook and handheld computers usually have smaller and fewer keys than desktop computers. A portable keyboard is a full-sized keyboard you can attach to and remove from a handheld computer. Some manufacturers have designed ergonomic keyboards to reduce the chance of workplace injuries.

The goal of ergonomics is to incorporate comfort, efficiency, and safety into the design of workplace items.

Identify various types of pointing devices

In a graphical user interface, the pointer is a small symbol on the screen. A pointing device is an input device that allows you to control the pointer. Common pointing devices include the mouse, trackball, touchpad, pointing stick, joystick, touch screen, light pen, and a stylus. A mouse is a pointing device, designed to fit comfortably under the palm of your hand, that is moved across a flat surface. A trackball is a stationary pointing device with a ball mechanism on its top. A touchpad is a flat, rectangular pointing device that is sensitive to pressure and motion. A pointing-stick is a pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on the keyboard. A joystick is a vertical lever mounted on a base. A light pen is a handheld device that contains a light source or can detect light. A touch screen is a touchsensitive display on the screen. A stylus looks like a ballpoint pen but uses pressure, instead of ink, to write text and draw lines. An electronic pen can be used on a graphics tablet, which consists of a flat, rectangular, electronic plastic board used to input graphical data.

Explain how a mouse works

As you move a mouse across a flat surface, the movement is translated into signals that are sent to the computer, and the pointer on the screen also moves. When you move the mouse to the right, the pointer moves to the right on the screen. For Windows users, the top of a mouse has at least two buttons and sometimes also a wheel. Generally, you use a mouse to move the pointer on the screen to an object and then press a button, or click, to perform a certain action on that object. Other operations you can perform using a mouse include right-click, double-click, drag, right-drag, rotate wheel, and press wheel button.

Describe different mouse types

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

A mechanical mouse has a rubber or metal ball on its underside. When the ball rolls in a certain direction, electronic circuits in the mouse translate the movement into signals that are sent to the computer. For better traction, you should place a mechanical mouse on a mouse pad. An optical mouse has no moving parts; instead it uses devices that emit and sense light to detect the mouse’s movement. An optical mouse can be used on nearly all surfaces, is more precise than a mechanical mouse, and does not require cleaning. A cordless mouse, or wireless mouse, is a battery powered device that transmits data using wireless technology, such as radio waves or infrared light waves. A cordless mouse uses technology very similar to that of a cordless keyboard.

Explain how voice recognition works

Voice input is the process of entering data by speaking into a microphone that is attached to the sound card on a computer. Voice recognition is the computer’s capability of distinguishing spoken words. The first voice recognition programs were speaker dependent. With speakerdependent software, the computer makes a profile of your voice, which means you have to train the computer to recognize your voice. Today, most voice recognition programs use speakerindependent software, which has a built-in set of word patterns and does not have to be trained to recognize your voice. Some voice recognition software requires discrete speech, meaning that you have to speak slowly and separate each word with a short pause. Most voice recognition products, however, support continuous speech, allowing you to speak in a flowing conversational tone.

Understand how to input data into a handheld computer

To satisfy the input needs of many different types of users, handheld computers provide many different ways to input data. A handheld computer typically includes a basic stylus. With the stylus, you can enter data using an on-screen keyboard or using handwriting recognition software that translates handwritten letters and characters into symbols the computer understands. Other input alternatives available with some handheld computers include attaching a full-sized keyboard, transferring data from a desktop computer, using voice input, and attaching a digital camera.

Identify the uses of a digital camera

A digital camera is used to take pictures and store the photographed images digitally instead of on traditional film. Pictures are stored on a storage medium, such as a floppy disk, SuperDisk,

Clik! disk, PC Card, compact flash card, memory stick, mini-CD, or microdrive. Many digital cameras allow you to review and edit the images while they are in the camera. You also can download, or transfer a copy of, the stored image to a computer. Once on a computer, the pictures can be edited with photo-editing software, printed, faxed, sent via electronic mail, included in another document, or posted to a Web site. There are three basic types of digital cameras. A studio camera is a stationary digital camera used for professional studio work. A

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk field camera is a portable camera, often used by photojournalists, that has many lenses and other attachments. A point-and-shoot camera is more affordable and lightweight and provides acceptable quality photographic images for the home or small business user.

Describe the various techniques used for video input

Video input, or video capture, is the process of entering a full-motion recording into a computer and storing the video on a storage medium. Many video devices use analog video signals. To input video from these devices, the device is plugged into a video capture card, an expansion card that converts the analog signal into a digital signal the computer can understand. A digital video (DV) camera is a new generation of video camera that records video as digital signals, instead of using analog signals, and therefore does not require a video capture card. Video files can demand huge amounts of storage space. Video compression reduces the size of video files by recognizing that only a small portion of an image changes from frame to frame. Instead of storing every frame in its entirety, a video compression program might store an initial frame and then store only the changes from one frame to the next. A video decoder is a card that decompresses video. A video digitizer can be used to capture an individual frame from a video and save the still picture in a file.

Describe the uses of PC video cameras and Web cams

A PC camera is a DV camera that allows home users to record, edit, capture video and still images, and make video telephone calls on the Internet. During a video telephone call, both parties can see each other as they talk. Although usually placed on top of the monitor and attached to a computer’s USB port, some PC cameras are portable and can be used anywhere. A

Web cam is a video camera whose output displays on a Web page. Some Web sites have live

Web cams that display still pictures and update the displayed images at specified time intervals.

Explain how scanners and other reading devices work

Scanners and optical readers can capture data from a source document, which is the original form of the data. A scanner is a light-sensing input device that reads printed text and graphics and then translates the results into a form a computer can use. One of the more popular scanners is a flatbed scanner, which works similarly to a copy machine except it creates a file of the document in memory instead of a paper copy. Many scanners include OCR software, which converts a scanned image into a text file that can be edited. An optical reader uses a light source to read characters, marks, and codes and converts them into digital data that a computer can process.

Three types of optical readers are optical character recognition, optical mark recognition, and bar code scanner. Optical character recognition (OCR) is a technology that reads typewritten, computer printed, or handwritten characters from ordinary documents and translates the images into a form that the computer can understand. Optical mark recognition (OMR) devices read hand-drawn marks such as circles or rectangles. A bar code scanner uses laser beams to read bar codes, which are identification codes consisting of vertical lines and spaces of different widths.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Another type of reader, called a magnetic-ink character recognition (MICR) reader, reads text printed with magnetized ink and is used almost exclusively by the banking industry.

Identify alternative input devices for physically challenged users

Whether at work or at home, it may be necessary to obtain input devices that address physical limitations. Voice recognition is ideal for blind or visually impaired users, but several other input devices also are available. A keyguard, which is placed over the keyboard, allows people with limited hand mobility to rest their hands on the keyboard and guides a finger or pointing device so that only one key is pressed. Keyboards with larger keys and on-screen keyboards on which keys are pressed using a pointing device also can help. Pointing devices such as small trackballs controlled with a thumb or one finger and head-mounted pointers also are available for users with motor disabilities. Two new developments are gesture recognition and computerized implant devices. With gesture recognition the computer will be able to detect human motions.

Computerized devices implanted in the brain will allow paralyzed individuals to transmit signals to the computer.

Expand Your

Knowledge

1.

Input

2.

The keyboard

3.

Keyboard Types

4.

Pointing devices

5.

Using a mouse

6.

Mouse types

7.

Voice recognition

8.

Handheld computer input

9.

Digital cameras

10.

Video input

11.

PC video cameras and web cams

12.

Scanners and reading devices

13.

Input devices for physically challenged users

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

Input

Of the four operations in the information processing cycle – input, process, output, and storage – input is the operation to which computer users are most closely linked and on which each subsequent action depends.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Typed commands use keywords – specific words, phrases, or codes that a program recognizes as instructions. Keywords are an essential element of command-driven programs, such as DOS. The problem with keywords is that:

 they must be memorized, and they must be entered correctly

This makes command-driven programs difficult to use. Menu-driven programs and graphical user interfaces eliminate the problems of having to memorize and correctly type keywords.

The Keyboard

Data entered through the keyboard averages about one error for every 300 characters, while data entered more directly, such as with a scanning device, averages only one error for every 3 million characters. Nevertheless, the keyboard continues to be the most popular input device.

Some special keys – ALT, CTRL, and SHIFT – almost always are used in combination with other keys. Desktop computer keyboards generally have two ways to enter numbers – the numeric keypad and the row of number keys above the alphabetic keys. Think of situations in which both would be used. The numeric keypad also contains arrow keys, but these keys are active only when the keypad is turned off. Although the purpose of function keys varies, some developers have tried to standardize certain keys (such as using F1 to access online Help). In addition to the NUM LOCK key, other toggle keys are the CAPS LOCK key and the INSERT key. Unlike the CAPS LOCK key on a typewriter, the CAPS LOCK key on a computer keyboard cannot be used to print the special characters on the keys in the number row.

Keyboard Types

Keyboards are used primarily to enter alphanumeric data. Not surprisingly, keyboards for oriental languages are significantly more complex than the keyboard shown in Figure 5-3. The

QWERTY keyboard was devised in 1867 by Christopher Sholes, inventor of the first practical commercial typewriter. Ironically, Sholes’ intent when designing the keyboard was to slow typists down; if typists worked too quickly, keys had a tendency to jam. Many feel the

QWERTY keyboard is an anachronism, and its continued use is counterproductive. A more recent design, called the Dvorak keyboard (named for August Dvorak, American educator, 1895-

1975) places the most frequently used keys in the middle of the typing area. Studies have shown that trained typists using the Dvorak keyboard are up to 20 times faster than trained QWERTY typists. Despite this, the Dvorak keyboard rarely is used. Repetitive stress injury (RSI) afflicts more than 1.8 million people in the United States. A debilitating repetitive stress injury that plagues some keyboard users is carpal tunnel syndrome. This painful wrist injury affects sufferers not only when working at the keyboard, but when performing other tasks as well. The wrist rest on the keyboard in Figure 5-3 is designed to reduce wrist strain.

Pointing Devices

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

The original mouse was a one-button, cigarette-pack shaped device invented by Doug Engelbart in 1964. Today, many software manufacturers have made the mouse (or a related pointing device) an essential part of their applications. When the screen is cluttered or pointer targets are small, however, some experienced users still prefer keyboard commands if they are offered.

Some people feel that a touchpad is the most difficult pointing device to use. To satisfy divergent preferences, several laptop computers include both a pointing stick and a touchpad.

Although trackballs, touchpads, and pointing stick devices require less space than a mouse

(making them popular for portable computers), most people find them harder to use. Because of this a smaller mouse, called Mouse2Go, has been developed for use on a small pad that clips to the side of a portable computer.

Joystick concepts evolved from actual use in jet fighter airplanes, where joysticks allowed pilots to control an aircraft’s movement quickly and precisely.

Although touch screen users touch a symbol on the screen, it is the location where the touch occurred, not the symbol contacted, that is important. Because they are so user-friendly, even people unfamiliar with computers are comfortable with touch screens.

Using a Mouse

The major advantage of a mouse is that it is easy to use. The disadvantages are twofold: first, the mouse requires additional desk space, making it difficult to use in cramped locations; and second, mouse use demands that a hand be taken from the keyboard (unlike a pointing stick, which can be used without removing a hand from the keyboard). When a mouse has two buttons, one is the primary mouse button and the other is the secondary mouse button. To reverse the functions of these buttons or change other mouse options in Windows 98, point to Settings on the

Start menu, click Control Panel on the Settings submenu, then double-click the Mouse icon in the Control Panel window. In the Mouse Properties dialog box that displays, the Basics tab allows you to change pointer speed, button selection, and double-click speed.

Mouse Types

Since its introduction in 1965, the mouse has gone through several transformations. Microsoft’s

“green eye” mouse, an early mouse with two buttons, was released in 1983 and now is a collector’s item. Other interesting mouse variations include Spectrum’s RingMouse (which uses infrared to point), Interlink’s wireless mouse (often used for presentations), and Interlink’s

DuraPoint PC mouse (an incredibly durable mouse that gained the Pentagon’s interest). A new mouse from Immersion Corporation provides tactile sensations, with an internal motor that allows users to “feel” the desktop. The mouse – which senses cursor position, identifies screen objects, and sends pulses to a motor beneath the surface of the mouse – lets users feel icons, sense Web links, or bump through menu commands.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Voice Recognition

Some experts believe voice input eventually will be the most common way to operate a computer. Speech recognition is particularly welcome to people with certain disabilities.

Although speech recognition continues to improve, developers admit that advertisements touting high accuracy rates generally assume a standard vocabulary. Specialized words, regional accents, and local dialects reduce accuracy. Even a 95 percent accuracy rate, meaning that on average 1 out of every 20 words is wrong, may not inspire confidence. (Imagine if, in conversation, every

20 th word spoken was misinterpreted.) Nevertheless, voice recognition systems are gaining in popularity.

Handheld Computer Input

Instead of using a keyboard, with most handheld computers you write or make selections on the computer screen with a stylus. Although a handheld computer typically includes a basic stylus, you can buy more elaborate models that have a ballpoint pen at one end and a stylus at the other.

Digital Cameras

Some manufacturers use dots per inch to represent a digital camera’s resolution, or the sharpness and clarity of the image it produces. Dots per inch ( DPI ) is the number of pixels in an inch of screen display. A pixel is a single point in an electronic image. Digital cameras for the consumer range from 640 x 480 dpi to 1,792 to 1,200 dpi. The actual photographed resolution is called the optical resolution . Some manufacturers also state enhanced resolution , which uses a special formula to add pixels between those generated by the optical resolution. With the price of digital cameras decreasing, will the era of film-based cameras soon come to an end? Why or why not?

Video Input

Video input is used in a variety of ways, from developing training films to creating presentation enhancements. Video input also has been used in the workplace to record (sometimes secretly) office or assembly-line workers in an effort to find possible quality or efficiency problems. Do you think this secret recording is ethical? Why or why not?

PC Video Cameras and Web Cams

Estimates suggest that currently more than 9,000 Web sites use Web cams. Web cams are used to put everything from college dorm rooms to taxi cabs on the Web. The first personal Web page to use a Web cam was the JenniCam, which showed the daily life of a college co-ed. The site started in 1996 as a project for a computer class and still receives more than 4.5 million hits a day. Web cams also have more practical uses. Recently, some day-care centers have installed

Web cams so parents can use the center’s Web page to check on their children. This use of Web cams, however, has not been without controversy. Due to the usually slower speeds of Web cam

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk videos, it can be difficult for parents to tell the difference between a day care worker’s loving pat on the head and a rap on the noggin.

Scanners and Reading Devices

In general, scanners and reading devices increase input accuracy and efficiency by reducing the role of the weak link in the input process – the human operator. Optical readers are highly specialized. Devices that read one set of codes, marks, or characters may not be able to read another.

An optical mark reader identifies the position, not the shape, of a mark. You may be familiar with optical marks from tests in which you use a pencil to fill in ovals or rectangles that represent the answers.

Bar codes minimize input errors, keep inventories up to date, help to track sales trends, and eliminate the need to price individual items. The identifying numbers on a UPC code can be entered if the scanner fails. This number is not the item’s cost – prices are obtained from a database when the item is scanned. Some consumer groups, however, claim price databases not always are accurate, and that the absence of individual item pricing makes comparing costs difficult.

The MICR font, adopted by the American Banking Association in the 1950s, is standard throughout the banking industry. The special shapes of MICR characters make them easier for a machine to read. MICR readers can interpret magnetic characters even if someone has written over them. If the magnetic ink on a check is damaged, however, the data must be typed into the system. The importance of MICR readers to the banking industry is staggering – half of the U.S. population would be needed to process checks if it were done manually.

Input Devices for Physically Challenged Users

Some input aids for physically challenged people are relatively simple (such as keyguards), while others are much more sophisticated (such as head-mounted pointers). Chin-operated joysticks also are available. Another input system, called Eyegaze or ERICA (Eyegaze Response

Interface Computer Aid), was developed by Thomas Hutchinson of the University of Virginia, who as a boy was paralyzed temporarily by an accident. With a camera mounted on the computer and directed at a user’s eye, the Eyegaze system can determine to within a ¼ inch where on the screen a user is looking. By staring at the spot for about ¼ second, a user can activate a choice.

Adaptive technology has given many people their best opportunity to communicate, work, and play. As a six-year-old victim of cerebral palsy said in her first message, “It’s about time.”

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Home > Notes > Discovering Computers > Chapter 6

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Chapter 6: Output

| Overview | Expand Your Knowledge

Overview 1.

Define the four categories of output

2.

Identify the different types of display devices

3.

Describe factors that affect the quality of a display device

4.

Identify monitor ergonomic issues

5.

Explain the differences among various types of printers

6.

Describe the uses of speakers and headsets

7.

Identify the purpose of data projectors, fax machines, and multifunction devices

8.

Explain how a terminal is both an input and output device

9.

Identify output options for physically challenged users

In this chapter, you learn what is output and what are output devices. Display devices are introduced, including CRT monitors, flat-panel displays, video cards, and high-definition television. You explore monitor quality and monitor ergonomics. Various types of printers are presented, such as impact printers, nonimpact printers, portable printers, plotters and largeformat printers, and special-purpose printers. You find out about audio output and other output devices, including data projectors, facsimile machines, and multifunction devices. Finally, you become acquainted with terminals and output devices for physically challenged users.

Define the four categories of output

Output is data that has been processed into a useful form called information. Four types of output are text, graphics, audio, and video. Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer storage space) that are used to create words, sentences, and paragraphs. Graphics are digital representations of nontext information such as drawings, charts, photographs, and animation (a series of still images in rapid sequence that gives the illusion of motion). Audio is music, speech, or any other sound.

Video consists of images played back at speeds to provide the appearance of full motion. An output device is any computer component capable of conveying information to a user.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Identify the different types of display devices

A display device is an output device that visually conveys text, graphics, and video information.

Information shown on a display device is called soft copy because the information exists electronically and is displayed for a temporary period of time. Display devices include CRT monitors, LCD monitors and displays, gas plasma monitors, and televisions. A CRT monitor is a monitor that is similar to a standard television set because it contains a cathode ray tube. A cathode ray tube ( CRT ) is a large, sealed, glass tube. The front of the tube is a screen coated with phosphor material that glows as an electron beam moves back and forth, which produces an image on the screen. LCD monitors and LCD displays use liquid crystal to present information on the screen. A liquid crystal display ( LCD ) has liquid crystals between two sheets of material. When an electric current passes through the crystals, they twist, causing some light waves to be blocked and allowing others to pass through, which creates the images.

Similar to an LCD display, a gas plasma monitor is a flat-panel display . A gas plasma monitor, however, substitutes a layer of gas for the liquid crystal material. When voltage is applied, the gas releases ultraviolet light that causes pixels on the screen to glow and form an image. An

NTSC converter converts a computer’s digital signal into an analog signal that a standard television set can display. High-definition television ( HDTV ) is a type of television set that works with digital broadcasting signals and supports a wider screen and higher resolution than a standard television set.

Describe factors that affect the quality of a display device

The quality of a CRT monitor depends largely on its resolution, dot pitch, and refresh rate. The quality of an LCD monitor or display depends primarily on its resolution.

A CRT monitor’s screen is coated with tiny dots of phosphor material, called pixels , that glow when electrically charged to produce an image. Resolution , which describes the sharpness and clearness of that image, is related directly to the number of pixels a monitor can display. The greater the number of pixels the display uses, the better the quality of the image. Dot pitch , a measure of image clarity, is the distance between each pixel on a display. The smaller the distance between pixels (dot pitch), the sharper the image. Refresh rate is the speed that a monitor redraws images on the screen. Refresh rate should be fast enough to maintain a constant, flicker-free image.

The resolution of an LCD monitor or display generally is proportional to the size of the monitor or display. That is, the resolution increases for larger monitors and devices.

Identify monitor ergonomic issues

The goal of ergonomics is to incorporate comfort, efficiency, and safety into the design of items in the workplace. Features that address monitor ergonomic issues include controls to adjust the

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk brightness, contrast, positioning, and height and width of images. Newer monitors have digital controls that allow you to fine-tune the display. Many monitors also have a tilt and swivel base so the angle of the screen can be altered to minimize neck strain and glare. Monitors produce a small amount of electromagnetic radiation ( EMR ), which is a magnetic field that travels at the speed of light. High-quality monitors should comply with MPR II , a standard that defines acceptable levels of EMR for a monitor.

Explain the differences among various types of printers

A printer is an output device that produces text and graphics on a physical medium such as paper or transparency film. Printed information is called hard copy because the information exists physically and is a more permanent from of output. Printers can be grouped in two categories: impact and nonimpact.

Impact printers form characters and graphics by striking a mechanism against an ink ribbon that physically contacts the paper. A dot-matrix printer is an impact printer that prints images when tiny wire pins on a print head mechanism strike an inked ribbon. A line printer is an impact printer that prints an entire line at one time. Two popular types of line printers are band printers and shuttle-matrix printers .

Nonimpact printers form characters and graphics without actually striking the paper. An inkjet printer is a nonimpact printer that sprays drops of ink onto a piece of paper. A laser printer is a nonimpact printer that creates images using a laser beam and powdered ink, called toner . A thermal printer is a nonimpact printer that generates images by pushing electrically heated pins against heat-sensitive paper. Although the print quality of standard thermal printers generally is low, two special types of thermal printers, thermal wax-transfer printers and dye-sublimation printers , have a much higher print quality.

Some printers are used for special purposes. A photo printer is a color printer that can produce photo lab quality pictures as well as printing everyday documents. A label printer is a small printer that prints on an adhesive type material that can be placed on a variety of items. A portable printer is a small, lightweight printer that allows a mobile user to print from a notebook or handheld computer while traveling. Plotters are sophisticated printers used to produce high-quality drawings such as blueprints, maps, and circuit diagrams. A large-format printer , which operates like an ink-jet printer but on a larger scale, creates photo-realistic quality color prints.

Describe the uses of speakers and headsets

An audio output device produces music, speech, or other sounds. Two commonly used audio output devices are speakers and headsets. Most personal computers have an internal speaker that outputs low-quality sound. Many users add high-quality stereo speakers or purchase PCs with larger speakers built into the sides of the monitor. A woofer can be added to boost low bass

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk sounds. A headset plugged into a port on the sound card allows only the user to hear sound from the computer.

Identify the purpose of data projectors, fax machines, and multifunction devices

A data projector takes the image on a computer screen and projects it onto a large screen so that an audience of people can see the image. Two smaller, lower priced data projectors are an LCD projector , which uses liquid crystal display technology, and a digital light processing ( DLP ) projector , which uses tiny mirrors. A facsimile ( fax ) machine transmits and receives documents over telephone lines. A fax modem is a communication device that allows you to send (and sometimes receive) electronic documents as faxes. A multifunction device ( MFD ) is a single piece of equipment that looks like a copy machine but provides the functionality of a printer, scanner, copy machine, and sometimes a fax machine.

Explain how a terminal is both an input and output device

A terminal is a device that performs both input and output because it consists of a keyboard

(input), a monitor (output), and a video card. A dumb terminal has no processing power and cannot function as an independent device. Dumb terminals connect to a host computer that performs the processing and then sends the output back to the dumb terminal. An intelligent terminal has memory and a processor that has the capability of performing some functions independent of the host computer. Some special-purpose terminals perform specific tasks and contain features designed for a particular industry. A point-of-sale ( POS ) terminal is a specialpurpose terminal used to record purchases at the point where a consumer buys a product or service. An automatic teller machine ( ATM ) is a self-service, special-purpose terminal used to access your bank account.

Identify output options for physically challenged users

For users with mobility, hearing, or vision disabilities, many different types of output devices are available. For example, hearing-impaired users can instruct programs to display words instead of sound. With the Windows operating system, physically challenged users can set options to make programs easier to use. Visually impaired users can change the size or color of text to make words easier to read. Blind users can use speech output, where the computer reads information that displays on the screen. A Braille printer outputs information in Braille onto paper.

Expand Your 1.

Output 6.

Audio output

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Knowledge 2.

Display devices

3.

Monitor quality

4.

Monitor ergonomics

5.

Printers

7.

Other output devices

8.

Terminals

9.

Output devices for physically challenged users

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

Output

For computer users, output may be the most significant stage of the information processing cycle. Output is the goal of input and processing. It provides the information users need to work and make decisions. Output used by a machine often is an intermediate result. Eventually it will be processed into a form that can be used by people.

Sound Blaster is the de facto standard for computer audio. You may be familiar with audio output from certain cars and vending machines: “Fasten seat belts” or “Please deposit twentyfive cents.” Voice output telephone calls promoting banks, services, or political candidates are increasingly common. Yet, audio output is not always welcome. Voice output once was employed in grocery store checkouts. Because of negative public reaction, however, it has been discontinued.

Display Devices

Although “soft” implies a touchable quality, soft copy only has an electronic, intangible existence, unlike the physical presence of hard copy (printed material).

So much information today is in color that sales of monochrome monitors have plummeted. A number of less expensive monitors that use gray scaling, however, are popular among business users.

The CRT in a monitor uses from 15,000 to 20,000 volts to accelerate electrons from the gun to the screen. Servicing of monitors, therefore, only should be done by trained personnel. Color monitors sometimes are known as RGB monitors (for red, green, and blue). Red, green, and blue are light’s primary colors. These three fundamental colors are not the same as the three primary pigments you may have mixed in art class (red, yellow, and blue). Believe it or not, when red light and green light mix the result is seen as yellow light.

Application software sometimes requires a specific video standard for optimal performance. A factor to keep in mind when purchasing a monitor is that any video card capable of a higher

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk resolution can run programs that require lower resolution levels – a concept called backward compatibility. The CGA standard monitor, introduced in 1981, had a 640 x 200 resolution and displayed four colors. Today’s SVGA monitor has a resolution more than 6 times better and can display 16.7 million colors. Although flat-panel displays use relatively little power and the clarity of the images they produce continues to improve, they are not as bright as CRT monitors.

Because active matrix displays are much clearer than passive matrix displays, most of today’s notebook computers have active matrix displays. LCD screens often are backlighted but consume microwatts of power and give off virtually no heat. Gas plasma screens, while much brighter, consume hundreds or thousands of times more power than LCDs.

Monitor Quality

In some ways, pixel images on a monitor are similar to the works created by pointillist painters like Georges Seurat.

The flickering that is seen on some monitors is a result of a too-slow refresh rate. Older monitors refresh images using a technique called interlacing, in which the an electron beam draws only half the horizontal lines with each pass. Most of today’s monitors are noninterlaced. For the eyes, noninterlaced monitors tend to be less tiring than interlaced monitors. All video display devices look better in a dark environment.

Monitor Ergonomics

Studies show that working in an ergonomically designed environment lessens fatigue, reduces injury, and increases productivity.

Printers

Varying requirements have led to the development of printers with different capabilities. In addition to the questions posed in Figure 6-15, the following factors should be considered when purchasing any printer:

 What is the total printer cost? (Supplies and maintenance should be weighed along with initial price.)

 How much is the printer used? (The duty cycle, or recommended maximum output per month, and the mean time between failure (MTBF), or estimated time before a component needs service, are key considerations.)

 What type of output will be produced? (A printer’s capabilities must match output

 requirements.)

Who will use the output? (External correspondence requires better quality printing than internal-only reports.)

Are multiple copies necessary? (Only impact printers can produce multiple copies on a single pass.)

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Is color required? (Color significantly adds to the cost of some printers.)

Where will the printer be used? (Impact printers are noisy in closed locations, but are more resistant to extreme conditions.)

For a printer to function, the appropriate printer driver must be installed in the computer. Drivers are software that transform the computer’s output into signals a printer can understand and use.

Most printer manufacturers include driver software. Because most printers are 1,000 times slower than computers, all printers have a buffer that temporarily stores a few pages, allowing the computer to dump output into the buffer and continue processing.

Print quality depends on dots per inch and the amount of overlap. Letter quality ( LQ ) print corresponds to that produced by a typewriter. Many impact printers produce near letter quality

( NLQ ) print, which is slightly less clear than letter quality. Although most dot-matrix printers use continuous-form paper (in which individual sheets are connected together), some also can use single-sheet paper without removing any paper by “parking” continuous-form paper while a single sheet is printed.

Nonimpact printers represent the fastest growing segment of the printer market. One attraction of nonimpact printers is their quiet operation. Imagine the noise level in an office with several impact printers operating simultaneously! Due to separate development, printer resolution is expressed in dots per inch while monitor resolution is stated in pixels per inch (which is dependent on dot pitch). The resolution of a high-end printer is about 10 times better than the resolution of an SVGA monitor. Although high resolution is good, more dpi requires additional memory.

Unlike other types of nonimpact printers, the image produced by ink-jet printers can smear if moistened. Although laser printers are popular, they do not handle all printing jobs well. Special feeders are needed to print multiple envelopes, and multipart forms cannot be used at all.

Audio Output

Like other computer components, high-quality speakers are growing smaller. NXT has developed speakers for its flat-panel technology that deliver superior sound despite being only one sixty-fourth of an inch thick. The speaker technology has been licensed by NEC, Acer, and

Mission and is included in their new PCs and notebooks.

Other Output Devices

Data projectors are particularly useful when demonstrating computer software packages. A data projector, along with the modem-equipped notebook computer and portable printer, is part of the arsenal of business travelers. With these weapons, the “road warrior” can create, transmit, receive, and project sales presentations.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Which device – a stand-alone fax machine or a fax modem – would be most useful for a home user. For a small office? For a large office? Why?

Under what circumstances might you consider purchasing an MFD. Why?

Terminals

Terminals also sometimes are called display terminals or video display terminals (VDTs).

Historically, terminals have been dumb and dependent on a mainframe, to which they were connected by a cable, called an umbilical cord , for any processing. The advent of inexpensive personal computers gave rise to terminals with independent processing capabilities. Personal computers that function as intelligent terminals are connected to switch boxes that allow them to operate as PCs or to access a mainframe. Although they are intelligent terminals, some workstations are designed without disk drives so restricted data cannot be downloaded or copied.

Some terminals, such as credit card authorization devices in department stores, look very little like normal computers. POS (point-of-sale) terminal printers are special-purpose printers used at supermarket checkouts. These usually are low-grade dot-matrix printers that have seven or nine pins.

Output Devices for Physically Challenged Users

If, when using Windows, the Accessibility command does not appear on the Accessories submenu, you may have to install Accessibility Options. To install Accessibility Options, open the Add/Remove Programs Properties dialog box at the Windows Setup tab by clicking Start, pointing to Settings, clicking Control Panel, double-clicking Add/Remove Programs, and then clicking the Windows Setup tab. If you used a CD to install Windows, you will be prompted to insert it into your computer. Under Components, click to select the Accessibility Options check box and then click OK.

In Windows, the Accessibility Properties dialog box can be used to change both input and output options for physically challenged users. To open the Accessibility Properties dialog box, click the Start button, point to Settings, click Control Panel on the Settings submenu, and then doubleclick the Accessibility Options icon in the Control Panel dialog box. The Accessibility Properties dialog box can be used to change:

 Keyboard options – StickyKeys (allows the SHIFT, >alt, and CTRL keys, which usually are used with other keys, to be used by pressing one key at a time), FilterKeys (ignores brief or repeated keystrokes), and ToggleKeys (plays a tone when a toggle key is pressed)

 Sound options – SoundSentry (generates visual warnings when a sound is made) and

ShowSounds (displays captions for program speech and sound)

 Display options – High Contrast (uses colors and fonts designed for easy reading)

Mouse options – MouseKeys (allows pointer to be controlled with the numeric keypad)

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Home > Notes > Discovering Computers > Chapter 7

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 |

Chapter 7: Storage

| Overview | Expand Your Knowledge

Overview 1.

Differentiate between storage and memory

2.

Identify various types of storage media and storage devices

3.

Explain how a floppy disk stores data

4.

Identify the advantages of using high-capacity disks

5.

Describe how a hard disk organizes data

6.

Identify the advantages of using an Internet hard drive

7.

Explain how a compact disc stores data

8.

Understand how to care for a compact disc

9.

Differentiate between CD-

ROMs, CD-RWs, and DVD-

ROMs

10.

Identify the uses of tape

11.

Understand how an enterprise storage system works

12.

Explain how to use PC cards and other miniature storage media

13.

Identify uses of microfilm and microfiche

This chapter explains various storage media and storage devices. Students discover how memory is different from storage. Floppy disks are introduced, and characteristics of a floppy disk, floppy disk drives, care of floppy disks, and high-capacity floppy disks are presented. Hard disks are explained, and students find out about characteristics of a hard disk, how a hard disk works, removable hard disks, hard disk controllers, RAID, and maintaining data on a hard disk.

Compact discs, including CD-ROMs and DVD-ROMs, are described. Finally, students learn about tapes, PC Cards, and other types of storage such as smart cards, microfilm and microfiche.

Differentiate between storage and memory

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Memory, which is composed of one or more chips on the motherboard, is a temporary holding place for data and instructions during processing. The contents of volatile memory , such as

RAM, are lost when the power to the computer is turned off. The contents of nonvolatile memory , such as ROM, are not lost when power is removed from the computer. Storage holds items such as data, instructions, and information for future use; that is, storage holds these items while they are not being processed. Storage is nonvolatile, which means the items in storage are retained even when power is removed from the computer. Compared to memory, the access time

(the time it takes to locate a single item) for storage is slow.

Identify various types of storage media and storage devices

A storage medium (media is the plural) is the physical material on which items are kept. A storage device is the computer hardware that records and retrieves items to and from a storage medium. Storage devices can function as sources of input and output. When storage devices transfer items from a storage medium into memory – a process called reading – they function as sources of input. When storage devices transfer items from memory to a storage medium – a process called writing – they function as sources of output. Types of storage media include floppy disks, hard disks, compact discs, tape, PC Cards, microfilm, and microfiche.

Explain how a floppy disk stores data

A floppy disk is a portable, inexpensive storage medium that consists of a thin, circular, flexible plastic disk with a magnetic coating enclosed in a square-shaped plastic shell. A floppy disk drive ( FDD ) is a device that can read from and write on a floppy disk. When you insert a floppy disk into a floppy disk drive, a shutter on the disk’s plastic shell slides to the side to expose the disk’s recording surface. A floppy disk is a type of magnetic media because it uses magnetic patterns to store items. Data is stored in tracks and sectors. A track is a narrow recording band that forms a full circle on the surface of the disk. The disk’s storage locations consist of pieshaped sections, which break the track into small arcs called sectors . For reading and writing purposes, sectors are grouped into clusters. A cluster consists of two to eight sectors and is the smallest unit of space used to store data. Formatting is the process of preparing a disk for reading and writing.

Identify the advantages of using high-capacity disks

A high-capacity disk drive is a disk drive that uses disks with capacities of 100 MB and greater

(remember, a typical floppy disk can store only up to 1.44 MB). High-capacity disks are used to store large graphics, audio, or video files and for backup. A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. Three highcapacity disk drives are the SuperDisk™ drive, the HiFD™ drive, and the Zip ®

drive. The

SuperDisk™ drive reads from and writes on a 120 MB or 250 MB SuperDisk™. The HiFD™

( High-Capacity FD ) drive reads from and writes on a 200 MB HiFD™ disk. The Zip

®

drive is

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk a high-capacity disk drive that uses a Zip

®

disk. The Zip

®

disk is larger and thicker than a 3.5inch floppy disk and can store 100 MB or 250 MB of data.

Describe how a hard disk organizes data

A hard disk , or hard disk drive , consists of several inflexible, circular platters that store items electronically. A platter in a hard disk is made of aluminum, glass, or ceramic and is coated with a material that allows items to be recorded magnetically on its surface. Each platter has two read/write heads, one for each side. Because of the stacked arrangement of the platters, the location of the read/write heads often is referred to by its cylinder , which is the location of a single track through all platters. Some computers improve hard disk access time by using a disk cache , which is a portion of memory that the processor uses to store frequently accessed items. A hard disk can be divided into separate areas, called partitions , each of which functions as if it were a separate hard disk drive.

Identify the advantages of using an Internet hard drive

An Internet hard drive is a service on the Web that provides storage to computer users. People use Internet hard drives to:

 Eliminate the need to transport files when away from a desktop computer

 Instantaneously save large audio, video, and graphics files when surfing the Web

 Make audio files, video clips, or pictures available to family, friends, co-workers,

 and customers

Immediately view time-critical data and images while away from a main office or

 location

Store offsite backups of data

Explain how a compact disc stores data

A compact disc ( CD ) is a flat, round, portable metal storage medium that usually is 4.75 inches in diameter and less than one-twentieth of an inch thick. Compact discs store items using microscopic pits (indentations) and land (flat areas) that are in the middle layer of the disc. A high-powered laser light creates the pits in a single track, divided into evenly spaced sectors, that spirals from the center to the edge of the disc. A low-powered laser reads items by reflecting light off the disc surface. The reflected light is converted into a series of bits that the computer can process.

Understand how to care for a compact disc

With proper care, a compact disc is guaranteed to last five years, but could last up to 50 years.

Compact discs should not be stacked or exposed to excessive heat, cold, sunlight, or contaminants. A compact disc should be held by its edges (do not touch the underside of the

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk disc) and placed in its protective case, called a jewel box , when it is not being used. You can clean the bottom surface with a soft cloth and warm water or a specialized CD cleaning kit, and you can repair scratches on the bottom surface with a specialized compact disc repair kit.

Differentiate between CD-ROMs, CD-RWs, and DVD-ROMs

A CD-ROM , or compact disc read-only memory , is a compact disc that uses the same laser technology as audio CDs. For a computer to read items stored on a CD-ROM, you insert the disc into a CD-ROM drive or CD-ROM player . When viewing animation or video, the speed of a

CD-ROM drive, or data transfer rate , is important. A higher the data transfer rate, results in smoother playback of images and sounds.

Most standard CDs are single-session because manufacturers record (write) all items to the disc at one time. Variations of standard CD-ROMs, such as PhotoCD, CD-R (compact discrecordable), and CD-RW (compact disc-rewritable), are multisession , which means additional data, instructions, and information can be written at a later time. A PhotoCD is a compact disc that contains digital photographic images. A CD-R ( compact disc-recordable ) is a multisession compact disc onto which you can record your own items. A CD-RW ( compact disc-rewritable ) is an erasable disc you can write on multiple times.

A DVD-ROM ( digital video disc-ROM ) is an extremely high-capacity compact disc capable of storing from 4.7 GB to 17 GB. In order to read a DVD-ROM, you must have a DVD-ROM drive . You also can obtain recordable and rewritable versions of DVD. A DVD-R ( DVDrecordable ) allows you to write on it once and read (play) it many times. With the new rewritable DVD, called a DVD+RW , you can erase and record on the disc multiple times.

Identify the uses of tape

Tape , one of the first storage media used with mainframe computers, is a magnetically-coated ribbon of plastic capable of storing large amounts of data and information at low cost. Because it requires sequential access , or consecutive reading and writing of data, tape is used for long-term storage and backup. (Floppy disks, hard disks, and compact discs all use direct access , which means you can locate a data item immediately, without having to move through all the items stored in front of it.)

Understand how an enterprise storage system works

An enterprise storage system is a strategy that focuses on the availability, protection, organization, and backup of storage in a company. To implement an enterprise storage system, a company uses a combination of techniques. A server stores items needed by users on a network.

A RAID system ensures that data is not lost. A tape library is a high-capacity tape system that works with multiple tape cartridges for storing backups of data, information, and instructions. A

CD-ROM jukebox holds hundreds of CD-ROMs that can contain application programs and

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk data. An Internet backup can store data, information, and instructions on the Web. A network attached storage ( NAC ) is an easy way to add hard disk space to a network. A storage area network ( SAN ) is a high-speed network that connects storage devices.

Explain how to use PC Cards and other miniature storage media

A PC Card is a thin, credit card-sized device that fits into a PC Card slot on a notebook or personal computer. PC Cards are used to add storage, memory, communications, and sound capabilities. A smart card stores data on a thin microprocessor embedded in a card similar in size to an ATM card. Two types of smart cards exist: intelligent and memory. An intelligent smart card contains a processor and has input, process, output, and storage capabilities. A memory card has only storage capabilities.

Identify uses of microfilm and microfiche

Microfilm and microfiche store microscopic images of documents on roll or sheet film.

Microfilm uses a 100- to 215-foot roll of film. Microfiche uses a small sheet of film, usually about four inches by six inches. Libraries and large organizations use microfilm and microfiche to archive relatively inactive documents and files.

Expand Your

Knowledge

1.

Memory vs. storage

2.

Storage media and devices

3.

Floppy disks

4.

High-capacity disks

5.

Hard disks

6.

Advantages of an Internet Hard

Drive

7.

Compact discs

8.

Caring for compact discs

9.

CD-ROMs, CD-RWs, and

DVD-ROM

10.

Tape

11.

Enterprise storage systems

12.

PC cards and miniature storage media

13.

Microfilm and microfiche

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

Memory vs. Storage

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

In general, memory (RAM) is fast, short-term, and volatile. Storage, on the other hand, is slower, long-term, and nonvolatile. Like nonvolatile memory, the contents of storage are retained when a computer’s power is turned off. Unlike most nonvolatile memory, however, the contents of storage usually can be erased or changed.

Storage Media and Devices

The first computer storage medium was a punched card. Herman Hollerith’s punched card tabulating machine helped complete the 1890 census in just 2½ years (compared to 8 years for the 1880 census) at a savings of more than $5 million. Hollerith later founded the Tabulating

Machine Company, which eventually became known as International Business Machines (IBM).

An understanding of storage terms is very important for purchasers, and users, of storage devices.

 1 Kilobyte (KB) ≈ 1 thousand bytes

1 Megabyte (MB) ≈ 1 million bytes

1 Gigabyte (GB) ≈ 1 billion bytes

1 Terabyte (TB) ≈ 1 trillion bytes

1 Petabyte (PB) ≈ 1 quadrillion bytes

1 KB stores approximately ½ page of text. Depending on speed and size, rough costs for RAM are about $40 to $50 per megabyte, while hard disk storage costs are around $0.20 per megabyte.

Floppy Disks

Although the 5.25-inch floppy disk is physically larger, the storage capacity for a 5.25-inch floppy disk is less than for a comparable 3.5-inch floppy disk. Because of the 3.5-inch floppy disk’s greater durability and superior storage capacity, the 5.25-inch floppy disk at best can be considered a very endangered species. With its rigid plastic shell, it may be difficult to see the

3.5-inch disk as “floppy.” The name is justified, however, by the disk’s ancestry and the fact that, if the protective shell is removed, the disk on which the data is written is indeed floppy.

Today, most new computers (although not the new Apple iMac) come with a 3.5-inch floppy disk drive; a few manufacturers still will, for a price, add a 5.25-inch floppy disk drive.

The procedure for formatting a floppy disk depends on the operating system. Floppy disks are soft-sectored, meaning that the number of sectors is not predetermined. The cluster concept creates an odd situation: one file with 100,000 bytes requires less disk space (about 25 clusters at

8 sectors per cluster and 512 bytes per sector) than 1,000 small files of 100 bytes each (1,000 clusters).

A floppy disk spins at about 300 revolutions per minute. When writing data, the floppy disk drive’s

read/write head generates electronic impulses that change the magnetic polarity of areas

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk along a track to represent the 1 or 0 bits being recorded. When reading data, the read/write head senses the magnetic areas that have been recorded.

High-Capacity Disks

The three types of high-capacity disks were developed by three different manufacturers:

SuperDisk™ is from Imation, HiFD™ is from Sony Electronics, Inc, and the Zip ®

drive is from

Iomega.

Although manufacturers always are concerned about software piracy (unlawfully duplicating or distributing proprietary software), many recommend that users create a backup of programs before installing them on a computer. Backup guards against system failures, such as a head crash, and human errors, such as inadvertently deleting key files. If you ever accidentally delete a file, seek help immediately from a computer support person who sometimes can recover the

“erased” file.

Hard Disks

In the early 1980s, hard disk drives were called “Winchester” drives because they had two 30megabyte disks, a characteristic reminiscent of the Winchester 30-30 rifle. In addition to making hard disks more efficient and allowing the installation of multiple operating systems, large hard disks may be partitioned to:

 Limit software disasters (which usually are confined to one partition)

Shorten path lengths and assist in file keeping

Save keystrokes (operating systems usually return to the directory they left)

 Enhance security (different partitions may warrant different safety levels)

Permit variable frequencies of backup

Allow unattended backups (smaller partitions may fit on a single tape)

Unlike floppy disk read/write heads, hard disk read/write heads do not touch the disk surface.

Because of the close tolerance between the disk head and the rotating disk surface, hard disk drives are manufactured in an extremely clean setting, typically cleaner than a hospital operating room. Many hard disk drives are warranted for five years, but most warranties are prorated, meaning that if it fails in the first year it can be replaced at 20 percent of the original cost. All warranties are void, however, if the drive is opened, because contaminated air and dust render the drive unusable.

On a personal computer, a hard disk controller ( HDC ) is the interface for the hard disk. Many external hard drives use a USB port as their interface. Two other types of HDCs are the EIDE

( Enhanced Integrated Drive Electronics ) controller, which can support up to four hard disks, and SCSI ( small computer system interface ) controllers, which can support multiple disk drives as well as other peripherals. A removable hard disk is a disk drive in which a plastic or

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk metal case surrounds the hard disk so that you can remove it from the drive. Two reasonably priced, removable hard disks are the

Jaz® disk

, which can store up to 2 GB, and the Peerless™ disk , which can store up to 20 GB.

A RAID ( redundant array of independent disks ) system integrates two or more hard disks, duplicating data, instructions, and information to improve data reliability.

Advantages of an Internet Hard Drive

When your computer’s hard disk is full, an Internet hard drive can provide additional storage space. Ease of use, number of features, and amount of storage space varies, based on the specific

Internet hard drive Web site. Do you trust the security of online storage services? What types of information might you store online? What are other advantages and disadvantages of Internet hard drives?

Compact Discs

Laser disks first were developed by RCA for showing home movies. The 14-inch optical disk was a derivative of these early 1980s video disks. Advantages that compact discs offer over hard disks include: greater data density, less expense (bit for bit), increased durability, and no head crashing.

Caring for Compact Discs

Compare the proper care guidelines for using floppy disks (page 7.9) with the proper care guidelines for using compact discs (page 7.19). How are the guidelines similar? How are they different?

CD-ROMs, CD-RWs, and DVD-ROM

On a computer, screen displays for software used to play audio CDs resemble typical CD players, but the controls are accessed with a pointing device. A single CD-ROM can store the entire Encyclopedia Britannica with room left over. You write on a CD-R using a CD recorder or a CD-R drive and special software. To write on a CD-RW disc, you must have CD-RW software and a CD-RW drive . A multiread CD-ROM drive can read audio CDs, data CDs,

CD-Rs, and CD-RWs.

On one side, a DVD-ROM can store up to 13 times the amount of information that can be stored on a CD-ROM. Double-sided DVD-ROMs (DVD-ROMs that store data on both sides), can store up to 26 times the amount of information stored on a CD-ROM.

A DVD+RW is similar to a CD-RW, except it has storage capacities up to 4.7 GB. To write on

DVD+RW discs, you must have a DVD writer .

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Along with processor speed, amount of memory, and hard disk capacity, CD-ROM drive speed is a featured element of almost every personal computer advertisement. Like CD-ROM drives,

DVD-ROM drive speeds are indicated with the letter X to represent the standard speed of a DVD drive. That speed, however, is considerably faster than the data transfer rate of the original CD-

ROM. While a 24X CD-ROM drive has a data transfer rate of 3,600 KB per second, a 5X DVD-

ROM has a data transfer rate of 6,750 KB per second.

Tape

Magnetic tape was developed in the mid-1950s to replace the earlier method of storing data on punched cards. To better understand the difference between sequential access and direct access

(or random access), compare an audio cassette tape to a CD-ROM. An audio cassette tape is sequential; to listen to the fourth song it is necessary to listen to (or fast-forward through) the first three songs. A CD is direct; it is possible to go straight to the fourth song. For what applications would sequential storage be appropriate? For what applications would it be unsuitable? Tape cartridges can be purchased formatted or unformatted. One-quarter-inch wide cartridge tapes typically are 600 feet long. Unattended tape backup is a great time saver.

Consider how many 1.44 MB floppy disks are needed and how much time is required (removing disks as they become full and inserting new disks) to back up 150 MB of data. With tape backup, you can press a key, go about other business, and return to remove the finished backup tape.

Enterprise Storage Systems

Large business users often utilize an enterprise storage system strategy. Why? What makes an enterprise storage system strategy attractive to large business users?

PC Cards and Miniature Storage Media

Smart cards can hold the equivalent of 30 typewritten pages of data and cost from $5 to $50.

Smart card readers are about $100. As a storage media for an individual’s medical history, smart cards offer obvious benefits. The cards can be carried in a wallet with, or in lieu of, an insurance card, providing both insurance records and an immediate, up-to-date medical history. A form of smart cards, called Personal Information Carriers (PICs) is being adopted by the army to replace dog tags. Think of other ways that smart cards and electronic money (e-money) could be used.

Will digital cash someday replace conventional currency? Why or why not?

Microfilm and Microfiche

Microfilm and microfiche images are so small that they can be read only with a microfilm and microfiche reader. Large organizations use microfilm and microfiche to archive inactive files.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Home > Notes > Discovering Computers > Chapter 8

| Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8

| Site Map |

Chapter 8: Operating Systems and Utility

Programs

| Overview | Expand Your Knowledge |

Overview 1.

Describe the two types of software

2.

Understand the startup process for a personal computer

3.

Describe the term user interface

4.

Explain features common to most operating systems

5.

Know the difference between stand-alone operating systems and network operating systems

6.

Identify various stand-alone operating systems

7.

Identify various network operating systems

8.

Recognize devices that use embedded operating systems

9.

Discuss the purpose of the following utilities: file viewer, file compression, diagnostic, uninstaller, disk scanner, disk defragmenter, backup, and screen saver

System software is an essential part of a computer system. This chapter defines system software and discusses two types of system software: operating systems and utility programs. You learn what an operating system is and explore user interfaces, operating systems features, and operating system functions. A variety of popular operating systems are described including DOS,

Windows 3.x, Windows 95, Windows 98, Windows 2000, Windows XP, Windows CE, the Mac

OS, OS/2, UNIX, Linux, and NetWare. You discover what happens when they start a computer and why a boot disk is important. Finally, a number of utility programs are explained.

Describe the two types of software

Two types of software are application software and system software. Application software consists of programs that perform specific tasks for users, such as a word processing program, email program, or Web browser. System software consists of the programs that control the

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk operations of a computer and its devices. The two types of system software are operating systems and utility programs. An operating system ( OS ) is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A utility program performs a specific task, usually related to managing a computer, its devices, or its programs.

Understand the startup process for a personal computer

Booting is the process of starting or restarting a computer. When you turn on the computer, the power supply sends an electrical signal to devices located in the system unit. The processor chip resets itself and looks for the ROM chip that contains the BIOS ( basic input/output system ), which is firmware that holds the startup instructions. The BIOS executes the power-on self test

( POST ) to make sure hardware is connected properly and operating correctly. The POST results are compared with data in a CMOS chip on the motherboard. If the POST completes successfully, the BIOS searches for specific operating system files called system files . Once located, the boot drive (the drive from which your personal computer starts), loads the system files from storage (the hard disk – usually drive C) into memory (RAM) and executes them.

Next, the kernel of the operating system loads into memory and takes control of the computer.

The operating system loads configuration information. In Windows XP, the registry consists of several file that contain the system configuration information. When complete, the Windows XP desktop and icons display, and programs in the StartUp folder are executed.

Describe the term user interface

A user interface controls how you enter data and instructions and how information displays on the screen. Two types of user interfaces are command-line and graphical. With a command-line interface , you type keywords or press special keys to enter data or instructions. A graphical user interface ( GUI ) allows you to use menus and visual images such as icons, buttons, and other graphical objects to issue commands. A menu is a set of commands from which you can choose. An icon is a small image that represents a program, an instruction, a file, or some other object.

Explain features common to most operating systems

Most operating systems perform similar functions that include managing programs, managing memory, scheduling jobs, configuring devices, accessing the Web, monitoring performance, providing housekeeping services, and administering security. Managing programs directly affects your productivity. A single user/single tasking operating system allows only one user to run one program at a time. A multitasking operating system allows a single user to work on two or more applications that reside in memory at the same time. A multi-user operating system enables two or more users to run a program simultaneously.

A multiprocessing operating system can support two or more CPUs running programs at the same time. Managing memory involves assigning items to an area of memory while they are

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk being processed. The purpose of memory management is to optimize use of random access memory (RAM). With virtual memory ( VM ), the operating system optimizes memory by allocating a portion of a storage medium, usually the hard disk, to function as additional RAM.

Scheduling jobs (operations the processor manages) involves determining the order in which jobs are processed.

Spooling increases efficiency by placing print jobs in a buffer (an area of memory or storage where data resides while waiting to be transferred) until the printer is ready, freeing the processor for other tasks. Configuring devices establishes communication with each device in the computer. A device driver is a small program that tells the operating system how to communicate with a device. Accessing the Web may entail including a Web browser and e-mail program in the operating system. Monitoring performance helps to identify and solve system problems.

A performance monitor is a program that assesses and reports information about various system resources and devices. Providing housekeeping services entails performing storage and file management functions. A file manager performs such functions as formatting and copying disks; listing the files on a storage medium; checking the amount of used and unused space on a storage medium; organizing, copying, deleting, moving, and sorting files; and creating shortcuts

(icons on the desktop that run a program when clicked).

Administering security involves establishing user accounts on a network. Each account typically requires a user name and a password to log on , or access, the network.

Know the difference between stand-alone operating systems and network operating systems

A stand-alone operating system is a complete operating system that works on a desktop or notebook computer. A network operating system (also called network OS or NOS ) is an operating system that supports a network. A network is a collection of computers and devices connected together via communications media and devices such as cables, telephone lines, and modems. In some networks, the server is the computer that controls access to the hardware and software on a network and provides a centralized storage area. The other computers on the network, called clients , rely on the server(s) for resources.

Identify various stand-alone operating systems

Stand-alone operating systems include DOS, Windows 3.x, Windows 95, Windows NT

Workstation, Windows 98, Windows 2000 Professional, Windows Millennium Edition,

Windows XP Home Edition, Windows XP Professional Edition, Mac OS, OS/2 Warp Client,

UNIX, and Linux. UNIX and Linux also function as network operating systems.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

DOS ( Disk Operating System ) refers to several single user, command-line and menu-driven operating systems developed in the early 1980s for personal computers. Windows 3.x

refers to early operating environments that, although not operating systems, provided a graphical user interface to work in combination with DOS and simplify its use. Windows 95 is a true multitasking operating system – not an operating environment – with an improved graphical interface. Windows NT Workstation is a client operating system that can connect to a Windows

NT Server. Developed as an upgrade to Windows 95, the Windows 98 operating system is easier to use and more integrated with the Internet. Windows 98 includes Microsoft Internet Explorer , a popular Web browser, Windows Explorer , a file manager, and an Active Desktop™ that works similarly to Web links. Windows 2000 Professional is a complete, reliable multitasking client operating system for business desktop and business notebook computers. Windows

Millennium Edition is an operating system that has features specifically for the home user.

Windows XP is Microsoft’s fastest, most reliable Windows operating system, providing quicker startup, better performance, and a new, simplified visual look. Windows XP Home Edition is an upgrade to Windows Millennium Edition, while Windows XP Professional Edition is an upgrade to Windows 2000 Professional.

The Mac OS , the latest version of the Macintosh operating system (the first commercially successful graphical user interface), is a multitasking operating system available only on Apple computers. OS/2 Warp Client is IBM’s GUI multitasking client operating system that supports networking, Java, the Internet, and speech recognition.

Identify various network operating systems

Network operating systems include NetWare, Windows NT Server, Windows 2000 Server,

Windows .NET Server, OS/2 Warp Server for E-business, UNIX, Linux, and Solaris™. Novell’s

NetWare is a widely used network operating system designed for client/server networks.

Windows NT Server is the operating system used by servers in the Windows NT client/server network environment. The Windows 2000 Server family consists of three products: Windows

2000 Server (for the typical business network), Windows 2000 Advanced Server (for ecommerce applications), and Windows 2000 Database server (for demanding, large-scale applications). Windows .NET Server is an upgrade to Windows 2000 Server. The Windows

.NET Server family includes four products: Windows .NET Standard Server (for the typical small- to medium-sized business network), Windows .NET Enterprise Server (for medium- to large-sized businesses, including those with e-commerce applications), Windows .NET

Datacenter (for business with huge volumes of transactions and large-scale databases), and

Windows .NET Web Server (for Web server and Web hosting businesses).

OS/2 Warp Server for E-business is IBM’s network operating system designed for all sizes of business.

UNIX is a multitasking, command-line operating system implemented on many different types of computers. Because it is both a stand-alone operating system and a network operating system,

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk some call UNIX a multipurpose operating system . Linux is a popular, free, multitasking

UNIX-type operating system.

Solaris™

, a version of UNIX developed by Sun Microsystems, is a network operating system designed for e-commerce applications.

Recognize devices that use embedded operating systems

The operating system on most handheld computers and small devices, called an embedded operating system , resides on a ROM chip. Popular embedded operating systems include

Windows CE, Pocket PC OS, and Palm OS

®

. Windows CE is a scaled-down Windows operating system designed for use on wireless communications devices and smaller computers such as handheld computers, in-vehicle devices, and Web-enabled devices. Pocket PC OS is a scaled-down operating system developed by Microsoft that works on a specific type of handheld computer, called a Pocket PC . The Palm OS

®

is the operating system used on Palm handheld computers from Palm, Inc., and Visor handheld computers from Handspring™.

Discuss the purpose of the following utilities: file viewer, file compression, diagnostic, uninstaller, disk scanner, disk defragmenter, backup, and screen saver

Most operating systems include several utility programs that perform specific tasks related to managing a computer, its devices, or its programs. A file viewer is a utility that allows you to display and copy the contents of a file. A file compression utility shrinks the size of a file. A diagnostic utility compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems. An uninstaller is a utility that removes an application, as well as any associated entries in the system files. A disk scanner is a utility that (1) detects and corrects both physical and logical problems on a hard disk, and (2) searches for and removes unnecessary files.

A disk defragmenter is a utility that reorganizes files and unused space on a computer’s hard disk so data can be accessed more quickly and programs can run faster. A backup utility copies, or backs up, selected files or an entire hard drive onto another disk or tape. A screen saver is a utility that causes the monitor’s screen to display a moving image on a blank screen if no keyboard activity occurs for a specified period.

Expand Your

Knowledge

1.

System software

2.

Starting a computer

3.

User interface

4.

Features of operating systems

5.

Stand-alone and network

6.

Stand-alone operating systems

7.

Network operating systems

8.

Embedded operating systems

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk operating system 9.

Utility programs

Here you will find additional information that will expand and enhance your knowledge beyond that contained in your textbook. Compare this information to what may be provided in a traditional classroom by your instructor or peers.

System Software

Software is a key component of any information system. Of the total number of corporate dollars spent on computing, the software share is increasing while the hardware share is decreasing.

Typically, different sizes of computers use different operating systems, and even the same types of computers may not use the same operating system. The operating system that a computer uses sometimes is called the software platform , or platform . Application software packages often require a specific software platform. A cross-platform application, however, is one that runs on multiple operating systems.

Starting a Computer

When you turn on a computer after it has been powered off, you are performing a cold boot .

When you restart a computer that already has been powered on, you are performing a warm boot . Your typically can perform a warm boot by pressing a combination of keys on the keyboard (in Windows, CTRL+ALT+DEL), selecting options from a menu, or pressing a Reset button on the computer.

If you watch the screen closely as the POST is conducted, the value for the total amount of memory can be seen to change as it is measured in the memory test. If the POST results do not match the data on the CMOS chip, an appropriate message should appear. The boot program typically is the first side, first track, and first sector of the hard disk. When you install an operating system, one of the installation steps involves making an emergency disk from which you can start your computer if the hard disk is damaged.

User Interface

You can interact with an operating system directly (as you do when copying files, moving files, formatting disks, and so on) or indirectly (as you do when working with an application program).

An operating system is intended to be transparent; that is, it does not have to be understood, considered, or even known. The operating system with which an application program will work is specified on the application software package. The application programs you want to use should be considered before deciding on an operating system, and the operating system must be considered when choosing application software.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

A graphical user interface is designed to be easier to use (more user-friendly) than a commandline interface. As an example of this user-friendly nature, consider how a relatively simple task, such as deleting a file, is performed with a command-line interface and with a GUI. With a command-line interface, you might type del followed by the file name in quotation marks.

Therefore, you must remember the command, type it correctly, and use the proper syntax. On the other hand, with a GUI you need only select (click) the file name in the file manager window and then click the Delete command on a menu or the Delete button on a toolbar. Although most people find a GUI the easiest interface to use, some long-time computer virtuosos still feel a command-line user interface is more efficient.

Features of Operating Systems

Early operating systems were single user/single tasking, but today most operating system are multitasking. Multitasking can be cooperative, in which programs switch when they reach a logical break point, or preemptive, in which programs switch based on priority and an allocated amount of time. Early versions of Windows used cooperative multitasking; Windows 95 and subsequent versions use preemptive multitasking. Upon termination, most programs relinquish their space in memory, which then is reallocated by the operating system. Some programs, however, stay in memory after they terminate. As a class, these programs are called TSR

(Terminate and Stay Resident) programs.

Virtual memory is employed with multitasking operating systems to maximize the number of programs that can use memory at one time. Paging , or the technique of swapping items between memory and storage, was developed before processors could address directly more than 1 MB of memory. All printers have buffers, and printer manufacturers are eager to sell DRAM. The term spooling comes from the observation that placing print jobs temporarily in a buffer is somewhat like winding thread onto a spool so that it can be used at a later time. Today, adding and configuring devices is easier because most devices support Plug and Play , which means the computer can recognize a new device and automatically load the necessary drivers. A feature of

Windows 95, Plug and Play initially was greeted with mixed reviews. In fact, some wags claimed the new technology was more accurately called, “Plug and Pray.”

Processor utilization – the amount of time that the processor is working and not idle – is one way of monitoring system performance. In addition to the programs that come with most operating systems, several utility programs are available to monitor system performance. Formatting a disk is the process of preparing it for reading and writing. Today, most floppy and hard disks are preformatted by the manufacturer. If you format a disk that already contains data, the formatting process erases the file location information, but it does not erase the actual files on the disk.

Therefore, if you accidentally format a disk, often you can unformat it with a utility program.

System security usually is most important for large systems or networks. For single-user PCs, adequate system security can be a key in the user’s pocket.

Stand-Alone and Network Operating System

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Many early operating systems were device dependent and proprietary. Device-dependent operating systems run only on a specific type of computer. Proprietary software is privately owned and limited to a specific vendor or computer mode. Today, the trend is towards deviceindependent operating systems that run on many manufacturers’ computers. Software that is not proprietary (i.e., that can work with a variety of computer models) sometimes is called portable or generic. Most of the operating systems discussed in this section are portable. When an operating system is proprietary, usually it is to boost hardware sales.

Operating systems for Apple computers and most mainframes initially were proprietary. Steve

Wozniak, cofounder of Apple Computers, believes the decision to make its innovative Macintosh operating system proprietary was one of the company’s greatest mistakes. “We had the most beautiful operating system,” Wozniak writes, “but to get it you had to buy our hardware at twice the price.” Wozniak now feels the operating system should have been licensed.

Stand-Alone Operating Systems

Bill Gates, founder of Microsoft and one of the wealthiest men in the world, began his fortune with the MS-DOS operating system. Although developed for IBM, Microsoft retained the rights to the operating system and licensed the source code to several hardware manufacturers, which resulted in multiple variations. An application written for one type of DOS, however, will work with any other variation. A number follows each version of PC-DOS or MS-DOS. The integer portion of the number indicates a major release, while the decimal portion indicates updates.

Thus, MS-DOS 6.2 means major version six, which has been updated twice. To a great extent, the popularity of DOS was a result of the large number of applications written to work with the operating system.

Windows 1.0, released in 1985, was Microsoft’s first attempt with a graphical user interface. It was not until five years later, however, with the release of Windows 3.0, that computer users began to take Windows seriously. Windows required 2 MB of memory (with 4 MB recommended) and an 80386 or newer processor, so it could not be used with many older PCs.

Nevertheless, because Windows 3.0 was easier to use than DOS, eventually most software was written, and many popular DOS programs were rewritten, to work with Windows.

Despite the advantages of Windows 95 and a heavily-funded promotional campaign, a poll of

DOS and Windows 3.x users showed not everyone immediately embraced the new operating system. When asked how likely they were to adopt Windows 95 within the next six months, respondents replied:

 extremely likely 10%

 possible 35%

 not likely 53%

 don’t know 2%

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Why are people often reluctant to adopt a new operating system?

The inclusion of Internet Explorer in the Windows 98 operating system led to an antitrust suit against Microsoft. Prosecutors insisted that the incorporation of a browser was an attempt by

Microsoft to eliminate competition from rival Web browsers (such as Netscape Navigator).

Microsoft maintained that the addition simply was an enhancement to the operating system.

Although Microsoft advertised Windows 98 less heavily than Windows 95, many vendors took up the slack. One retailer offered Windows 98 with the opportunity to buy a new computer for

$98. The promotion evidently worked. A buyer waited in line 11 hours for a chance to buy the new operating system and discount computer. When asked if he would have come out simply for

Windows 98 (his current computer ran Windows 3.1), he replied, “Not a chance.”

Windows 2000 was released in February, 2000 and was touted as a boon for all businesses, from small companies with no more than two desktop computers to large corporations with vast networks. Windows Millennium is a result of Microsoft’s recognition that the needs of business and home users are different.

For years, the Macintosh operating system had features that made it far easier to use than other operating systems. For example, people could give files sensible names (like “Letter to

Grandma”) instead of the cryptic, eight-character strings (like “letgrand.txt”) demanded by DOS and Windows 3.x. While Windows 95 incorporated many of these features, Macintosh devotees still feel their operating system is easier to use. Until recently, the Macintosh operating system was proprietary. In 1994 the operating system was licensed, but experts feel Apple’s promotion has been lukewarm. New standards let IBM computers run Apple software. More than 4,000 applications are designed to run under the Mac OS. Microsoft has developed the more popular

Mac OS applications.

IBM supplies OS/2 (Operating System/2) Warp with its high-end personal computers. OS/2 originally was developed jointly by IBM and Microsoft to replace MS-DOS. As an interim measure, Microsoft developed Windows, an operating environment to work with DOS. The eventual popularity of Windows, coupled with the initial poor sales of OS/2, resulted in

Microsoft and IBM going their separate ways, with Microsoft concentrating on Windows and

IBM continuing to develop OS/2. Features offered in OS/2 Warp include:

An enhanced graphical user interface

 Integrated business application software

Speaker-independent speech recognition software

 Desktop objects that allow users to connect directly to the Internet

 Integrated Java programming language that allows Java applications to run without a

Web browser

Support for multiple CPUs using multiprocessing

Network Operating Systems

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Many consider UNIX to be the most portable operating system. Although it has some shortcomings, UNIX often is used in “turnkey” systems designed for retail stores, doctors, dentists, veterinarians, and other small- to medium-businesses. Do you know what operating system is mentioned in the film Jurassic Park ? UNIX.

Despite the current dominance of Windows, some believe Linux is the operating system of the future. Because Linux is freeware, users can modify and improve the program code. In addition,

Linux is capable of running efficiently with less powerful processors, even the 80386. The story of Linux’s originator, Linus Torvalds, is told in the Technology Trailblazer on page 8.25.

Embedded Operating Systems

The latest Palm handheld computer, Palm IIIC, offers a color screen. When paired with a portable, expandable, attachable, nearly full-sized keyboard and file compression software, some reviewers say the Palm IIIC almost can replace a laptop. The Visor handheld computer runs the same operating system as the Palm but offers several additional features – videogames, cell telephone, modem, MP3 player, and two-way pager – at about half the cost.

Utility Programs

Utilities generally reside in storage until summoned by the user or operating system kernel.

Microsoft was the target of several lawsuits for allegedly incorporating utility programs developed by others into their DOS operating system. Some versions of DOS were modified because of this litigation. In light of the ever-increasing number of utility programs included with operating systems, will a market remain for separate utility programs?

In addition to the utilities mentioned in this chapter, other Windows 98 utilities include:

DirectX – Enhances multimedia capabilities on the computer, providing better playback of different types of multimedia and managing 3-D graphics better than console computers.

Drive Converter (FAT 32) – Converts the hard drive to the FAT32 file system, an enhancement that stores data more efficiently, creating extra disk space and helping programs run faster.

 Registry Checker – Finds and fixes registry problems each time the computer is started,

 automatically scanning the registry for inconsistent data structures.

System File Checker – Keeps track of critical files that make the computer run, restoring

 the files if they are moved or changed.

Microsoft Magnifier – Makes the screen more readable by displaying a magnified portion in a separate window and making it possible to alter the color scheme and contrast of the magnification window for easier visibility.

Some stand-alone utilities include:

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Desktop enhancers – Change the desktop look and organization, allowing users to create and switch between multiple desktops.

File conversion – Converts from one file format to another so that a file can be used by another application.

 Internet organizers – Helps in the management and use of favorite Web sites, searching the Web and reporting on site changes.

 Antivirus programs – Prevent, detect, and remove computer viruses. Viruses and antivirus programs are explored in Chapter 12.

Some utility programs are used primarily by select groups. For example, text editors -- utility programs that make it easy to work with lists and records -- are popular with programmers and people who work with databases. PC Tools and Norton Utilities are popular utility software packages for personal computers.

Home > Notes > Lesson 2

| Discovering Computers | Windows XP | |

Microsoft Windows XP and Office XP

| Windows XP |

1.

Describe the Microsoft Windows

XP user interface

2.

Identify the objects on the

Microsoft Windows XP desktop

3.

Perform basic mouse operations: point, click, right-click, doubleclick, drag, and right-drag

4.

Open, minimize, maximize, restore, scroll, and close a

Windows XP window

5.

Move and resize a window on the desktop

6.

Understand keyboard shortcut notation

7.

Launch and quit an application program

9.

Create, expand, and collapse a folder

10.

Select and copy one file or a group of files

11.

Rename and delete a folder or file

12.

Quit Windows Explorer

13.

Use Windows XP Help

14.

Shut down Windows XP

15.

Identify each application in

Microsoft Office XP

16.

Define the Internet, the World Wide

Web, and an intranet

17.

Explain how each Microsoft Office

XP application uses the Internet

18.

Understand the Microsoft Office XP

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

8.

Identify the elements of the

Exploring window

Help system

1. Microsoft Windows XP User Interface

A user interface is a combination of hardware and software that you use to communicate with a computer. The hardware portion of the interface consists primarily of the monitor, mouse, and keyboard. The software consists of the programs that engage you in a dialog. A graphical user interface (GUI) consists of graphics and icons as well as text, that provide a convenient, user friendly environment on the computer.

Older interfaces, called command-line interfaces, required you to type keyword commands or memorize special keyboard keystrokes to communicate with the interface. Most interfaces today are GUI, and incorporate intuitive, colorful graphics, the use of a mouse, and Web browser-like features. The net effect is that operating systems such as Windows 2000 are very user friendly.

2. Objects on the Microsoft Windows XP Desktop

The Windows XP desktop contains a variety of graphical and textual information. You will see icons, which represent documents or applications that you can launch. There are buttons, such as the close button, which shuts down a particular window. The bottom of the screen contains a taskbar, which contains a variety of buttons indicating which windows are currently open on the desktop. There is also a mouse pointer that you can control to point to the features of the desktop.

For Windows XP tips and tricks, visit Office XP More About Web page

( http://www.scsite.com/offXP/ ) and then click on Windows XP Tips and Tricks. To improve

Windows XP performance, visit Office XP More About Web page

( http://www.scsite.com/offXP/ ) and then click on Windows XP Performance.

Note that most of the items on the Windows XP desktop are considered to be objects. Even the desktop itself is an object. Every object has properties, which are unique to that object and affect what can be done to the object or what the object does. For example, one of the properties of an object is its color, such as the current color of the desktop.

3. Basic Mouse Operations: Point, Click, Right-click, Double-click, Drag, and Rightdrag

The mouse is a pointing device attached to the computer by a cable (unless it is infrared). To point the mouse means to move it across a flat surface until the mouse pointer is where you want it on the desktop. If you land on a standard icon, you will see a ScreenTip, which gives information about the icon. Single-clicking means to press the left mouse button once. You can also right-click the mouse, which will display a shortcut menu containing commands that are

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk specific to that icon. To double-click means to press the mouse button two times, in rapid succession. This generally has the effect of launching an application or document. To drag means to point to a desired item, hold down the left mouse button, move the item to the desired location, and then to release the left mouse button. You can also right-drag, which moves an item and displays a shortcut menu.

4. Open, Minimize, Maximize, Restore, Scroll, and Close a Windows XP Window

The upper right corner of a window normally has three buttons: minimize, maximize, and close.

If you click on the minimize button, the window is removed from the desktop and changes to a non-recessed button on the taskbar at the bottom of the screen. Clicking this button restores the window to its last size. If you click the maximize button, the window will occupy the entire desktop area. If you click the close button (X), the window closes and is removed from the taskbar. You can scroll a window by clicking the scroll arrows, clicking the scroll bar, or dragging the scroll box.

5. Move and Resize a Window on the Desktop

You can move a window anywhere on the desktop by pointing to the title bar and dragging. You can size a window by pointing to any of its corners. The mouse pointer changes to a two-headed arrow. If you drag the corner the window will grow or shrink depending on how you drag it. You can also resize a window by pointing to any of its borders and dragging.

6. Keyboard Shortcut Notation

To perform tasks using the keyboard you must understand the notation used to identify which keys to press. These are called keyboard shortcuts. One kind of shortcut consists of pressing a special function key, such as F1. A second shortcut method involves holding down one key and then pressing a second key, as in CTRL+ESC, which means hold down the CONTROL key and then press the ESCAPE key. In Windows XP, the F1 key gives you access to Help about

Windows XP. The CTRL+ESC combination opens the Start menu.

Note that most Windows functions can be accessed with keyboard shortcut keys. However, it is strongly recommended that you use the mouse, which is simpler, more direct, and more intuitive to use than memorizing the various keyboard shortcuts.

7. Launch and Quit an Application Program

An application program is a program that allows you to accomplish a specific task, e.g., word processing, or spreadsheet. Some applications are part of Windows XP, e.g., Windows Explorer.

Other are purchased separately, such as Office XP.

There are several ways to launch a program. One method involves the Start menu.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

First, click the Start button on the taskbar and then point to Programs. Once the Programs submenu appears, point to the program you want to launch. To quit a running program, point to and click the close (X) button in the right-hand corner of the application window.

Other ways to launch Internet Explorer include:

1.

Click Launch Internet Explorer Browser icon on the Quick Launch toolbar.

2.

Double-click the Internet Explorer icon on the desktop.

3.

Press CTRL+ESC, then press P, then press I.

8. Elements of the Exploring Window

Windows Explorer is an application that allows you to view the contents of the computer, the hierarchy of folders on the computer, and the files and folders in each folder. To start it, rightclick the My Computer icon and then point to and click the Explore menu item. The window contains a Folders pane, showing the names of the folders on the computer. The right side of the window shows the Contents pane.

You can change the size of each pane by dragging the bar that separates them. The Folders pane displays a hierarchical structure of folders. The Contents pane shows the contents of a given folder or icon.

Note that the status bar at the bottom of the my Computer window contains the number of folders, or objects, displayed on the Contents pane or the window. It also displays the amount of disk space the objects occupy and the amount of unused disk space. If the status bar does not display, click View on the menu bar and then click Status Bar.

9. Create, Expand, and Collapse a Folder

To display the contents of the local disk drive, point to and click the "Local Disk (C:)" folder name in the Folders pane of the My Computer window.

The Contents pane shows the files and folders accessible on the C: drive. The left pane of the

Contents pane contains information about the drive. If a folder contains non-visible subfolders, you will see a plus sign (+) to the left of its icon. To expand the folder point to and click the plus sign.

Another way to expand a folder is to double-click its icon. Alternatively, you can select the folder icon and press the PLUS SIGN (+) on the numeric keypad (or the RIGHT ARROW).

If a folder has been completely expanded you will see a minus sign (-). To collapse a folder, point to and click the minus sign. To create a new folder, right-click anywhere in the white area

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk of the Contents pane. Point to New on the shortcut menu. Point to and click Folder on the New submenu. Type a name for the new folder.

Another way to collapse a folder is to double-click its icon. Alternatively, you can select the folder icon and press the MINUS SIGN (-) on the numeric keypad (or the LEFT ARROW).

10. Select and Copy One File or a Group of Files

When copying files, the drive and folder containing the files to be copied are called the source drive and source folder respectively. The drive and folder receiving the copies are called the destination drive and folder.

You can select a group of files by holding down the CTRL key and then clicking on whichever files you want to select. To copy the group, click on any of the selected files and right-drag the group into the destination folder.

Release the right mouse button and point to and click the Copy Here option on the shortcut menu.

Note that you can select contiguous files (files listed in a row) by selecting the first file and then holding down the SHIFT key. Then select the last file in the group. All the intervening files will be selected.

To select all the displayed files, click Select All from the Edit menu and the click the OK button.

11. Rename and Delete a Folder or File

To rename a folder, point to the folder name. Click the name twice, but do not double-click the name. Type the new file name.

Other ways to rename a file include the following:

1.

Right-click the file name, click Rename on the shortcut menu, type a new name, and then press ENTER.

2.

You can also select the file name, and then click Rename from the File menu.

3.

Another method is to select the file name and then press F2. Finally, you can select the file name, press ALT+F and then press M.

To delete a file, right-click its name. Point to and click the Delete command on the shortcut menu. When the Confirm File Delete dialog box displays, click the Yes button.

There are many other ways to delete a file. Some of them include:

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

1.

Click the file name, click the Delete button on the Standard toolbar, and then click the

Yes button.

2.

Right-drag the file over the Recycle Bin, click Move Her, and then click the Yes button.

3.

Right-click the file name, click Delete and then click Yes.

Warning: deleting is one of the only ways you can do harm on a computer. Be very careful when deleting and make sure you really want to delete.

12. Quit Windows Explorer

After completing your work with Windows Explorer, you should quit the program. First point to the Close button (X) on the Exploring window title bar. Click the Close button.

13. Use Windows XP Help

Windows Help provides a variety ways to obtain help information. The Contents sheet allows you to browse by category. First click the Start button on the taskbar. Point to and click Help.

Click the Contents tab. The left pane is called the Navigation pane and contains four tabs. The right pane is called the topic pane. To find a topic in help, click the desired topic from the list in the Navigation pane. Click the desired subtopic. Click another subtopic if necessary. Finally, read the help information in the Contents pane.

Another method of obtaining help is to click an open area of the desktop and then press F1. You can also press the WINDOWS+F1 key combination.

A second method of searching is to use the Index sheet, which contains an alphabetized list of index entries. Click the Index tab and then type in a word to search for. Click the topic in the entries list. Click the Display button and read the information in the Contents pane.

14. Shut Down Windows XP

You should use the Shut Down command to shut down Windows XP. Click the Start button on the taskbar. Next, point to and click Shut Down on the Start menu. Point to and click OK on the

Shut Down Windows dialog box. Do not turn off the computer until Windows informs you that it is safe to do so.

Other ways to shutdown the computer include:

1.

Press CTRL+ESC, then press U. Press the ARROW keys to select Shut down, and then press ENTER.

2.

Press ALT+F1, then press the ARROW keys to select Shut down, and then press

ENTER.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

Note that you should never shut down the computer simply by turning it off. Windows has a shut down procedure that saves all open disk files and does other housekeeping activities. Turning off the computer without properly shutting down can result in a loss of data.

Microsoft Office XP

15. Identify Each Application in Microsoft Office XP

Microsoft XP is the latest edition of the office suite. It comes in three varieties: Standard,

Professional, and Developer. The Professional Edition includes Word 2002, Excel 2002, Access

2002, PowerPoint 2002, and Outlook 2002.

If you have a microphone you can use Office's Speech Recognition software to speak the names of toolbar buttons, menus, menu commands, list items, screen alerts, and dialog box controls.

You can dictate text or have the computer speak back a document that has already been entered.

More frequently used menu will be displayed at the top of a menu. More frequently used buttons will be displayed, while less frequently used ones are not displayed. Finally, Office XP makes it easy to share information with colleagues over the Internet.

You can obtain additional information about any Office XP application by clicking Help on the menu bar of any XP application window. Then click Office on the Web. Explore a Web page by clicking on a hyperlink. After clicking a hyperlink, click the Back button to display the last Web page.

16. Define the Internet, the World Wide Web, and an Intranet

The Internet is a worldwide network of thousands of computer networks and millions of computers. The World Wide Web is a user-friendly, graphical interface for exploring the

Internet. A Web site consists of a single Web page or multiple Web pages linked together. The first Web page in a particular site is called the home page. A unique address, called the Uniform

Resource Locator (URL) uniquely identifies each Web page. A browser allows you to locate and view a Web page.

An Intranet is a special type of Web that is available only to the users of a particular type of computer network, e.g., within a single company or organization.

GOVERNMENT COLLEGE OF TECHNOLOGY ABBOTTABAD

COMPUTER LITRACY PROGRAM www.gctatd.edu.pk

17. How Each Microsoft Office XP Application Uses the Internet

Each of the Office XP applications provides Internet accessibility. Word (word processor) makes it possible to design and publish Web pages, insert hyperlinks, as well as access other Web pages and send e-mail.

Excel (spreadsheet) allows you to create hyperlinks to other Office XP documents, to an Intranet, or to the Internet. You can save your spreadsheet as a static (unchanging) or dynamic (editable)

Web page.

Access (database management system) has similar capabilities. Data access pages permit you to share a database with other users on a network, intranet, or Internet.

PowerPoint (presentation graphics) has similar features and allows you to publish a slide presentation on the Internet or an intranet.

Publisher (desktop publishing) allows you to create professional-quality Web documents.

FrontPage is a Web authoring and site management tool.

Outlook (Desktop Information Management) helps you organize and schedule projects with the ability to share information with co-workers. Finally, the Web toolbar allows you to search for and open XP documents that you have placed on an intranet or the Internet.

18. Microsoft Office XP Help System

Office XP provides several ways of accessing help information from any of its applications. The

Office Assistant answers questions and suggest more efficient ways to complete a task. It displays whenever you start an XP application. You can also access help from the various Help buttons.

The Office Assistant is completely customizable and you can select one of nine Office

Assistants, including a variety of options on their behavior.

Download