Coláiste Chiaráin IC3 Notes
Coláiste Chiaráin IC3 Notes
Coláiste Chiaráin IC3 Notes
Coláiste Chiaráin
IC3 Textbook
Page | 1
Coláiste Chiaráin IC3 Notes
Centralised systems can be cheaper for companies because they only need
Page | 2
Coláiste Chiaráin IC3 Notes
6. Netbook: Extremely light and portable laptop, usually with a 10” or smaller screen
and no CD Drive.
Other types of small laptops are Palmtops and Ultra Mobile Computers.
7. PDA (Personal Digital Assistant): A small handheld computer used with a pen
called a
stylus. Modern phones with PDA software (windows mobile etc) are called
smartphones.
Page | 3
Coláiste Chiaráin IC3 Notes
1. A computer system involved getting information in, storing it and working on it and
producing an output:
Input Process Output
Storag
e
2. A computer system is composed of you (the user), hardware (the physical parts you can
see and touch).
And software (instruction code which performs tasks).
IDE
5. The motherboard contains buses which carries data around.
Connectors
Ram Slots
6. Motherboard Features: PCI Expansion
IDE connectors are used to connect internal
CPU & FAN Slots
devices such as hard drives and CD Drives.
Newer machines use a similar but smaller
connector called SATA. Input / Output
RAM slots hold the memory. Ports
There is a socket for the CPU.
There are ports for input an output devices.
PCI Expansion slots allow users to add more internal
devices such as modems etc.
Page | 4
Coláiste Chiaráin IC3 Notes
8. Power Supply: Converts AC power from the wall to DC power for the internal
components.
9. Expansion Cards: Circuit boards that can be add to the system by plugging them into
the PCI expansion slots.
11. Memory: Working area for your computer to store what is being processed.
12. Battery: There is a small battery on the motherboard to power the system clock.
Section 3: Memory
Because there are two digits in the system we call it Binary. Each 1 or 0 is called
a bit (binary digit).
2. To make meaningful information bits are put in groups of 8. For example the letter
a in binary is 01100001. Groups of eight bits are called bytes. Bytes can be used
to make music, pictures, text and software.
Adding RAM to your computer can make it go faster or run more programs at
once.
Page | 5
Coláiste Chiaráin IC3 Notes
5. ROM (Read Only Memory) a memory chip build onto the motherboard that
starts the computer checks ram and loads the operating system. The contents
of ROM cannot be changed easily hence the term READ ONLY. The contents of
ROM are not lost when the computer is switched off.
7. Virtual Memory: If you are running low on memory your computer will try to
use the hard drive as temporary menu. It creates a page file to use. Virtual
memory is much slower than RAM.
If your hard drive runs out of virtual memory your computer may have problems.
8. Video Memory: Computing video output for games and software can be
complicated. Computers often have separate memory chips on the video card.
In lower end systems the system memory is shared with the video card.
Page | 6
Coláiste Chiaráin IC3 Notes
Section 4: Storage
1. Memory is used for files that are currently being worked on. Storage is the term used for
when files need to be held for longer.
2. Hard Drive Storage: The hard drive is used for long term permanent storage.
Information on the Hard Drive is stored magnetically on metal disks called platters.
A read/write head writes and erases information.
Information will remain even when the computer is shut down (non-volatile).
4. Over time information can get split up and spread around the disk. Defragmenting the
disk will join together split files and make your system run faster.
5. Removable Storage is any storage device that can be removed from the computer.
Examples include usb memory stick, cds, floppy disks etc.
Page | 7
Coláiste Chiaráin IC3 Notes
If you have an older machine you may improve the speed by removing old programs,
defragmenting your disks, adding more RAM or upgrading to a faster/bigger hard drive.
Other considerations when buying a computer are what software it comes with (Office –
Word etc does not automatically come free). Also if you have old equimpment you need to
check if it will be be compatible (will work with) your new computer.
Page | 8
Coláiste Chiaráin IC3 Notes
Section 6: Ports / Input & output
1. External devices are connected via ports. May older ports have been
replaced by the Universal Serial Bus (USB)
3. The most common input devices are the keyboard and mouse.
• The refresh rate is measured in Htz and refers to how quick the image on
the screen is drawn.
• Older monitors used big tubes called Cathode Ray Tubes (CRT)
• Newer monitors use Liquid Crystal Display (allowing for flat TVs)
• The image on the screen is made of tiny squares called pixels (picture
elements).
• The more pixels the screen has the more detailed an image it can display.
Common resolutions are: VGA (640 X 480), SVGA (800 x 600), XGA (1024 X
768). Multiply the numbers out to get the total number of pixels i.e. 1024 x
768 = 786432 pixels which is .8 of a megapixel.
• Dot Matrix: Older, slow, noisy, uses metal pins, still used for duplicate
receipts.
Page | 9
Coláiste Chiaráin IC3 Notes
• Inkjet: Good quality, colour printers. Cheap to buy printer but expensive ink.
7. Incompatible: Not all hardware works with every computer. If there is no device drivers
available for your computer system then the device will not work and is said to be
incompatible.
Page | 10
Coláiste Chiaráin IC3 Notes
2. Software programs are stored on the Hard Drive and must be loaded into the memory to
run.
4. Software programs often have problems even after release. Updates are often set via the
web. If there are major problems then a patch or fix will be
released to fix the problem code.
6. Upgrading to a new version can cause problems. If the new version of the software can
open files created by previous versions it is said to be backwards compatible. New
software may conflict with other programmes on your computer and cause problems.
Before upgrading you must consider:
c. Will your old files work, will you have to convert / transfer data.
7. The Operating System is the most important piece of software run on a computer. It
controls the hardware and allows the user to run other software code. There are a number
of different operating system available:
Page | 11
Coláiste Chiaráin IC3 Notes
flavours (Basic, home professional) offering different features. Windows is
described as a Graphical User Interface because it uses pictures (graphics) to help
you (user) to control the computer (interface).
Another term for this type of GUI is WIMP (Windows, Icons, Mouse, Pointer)
The main advantage of GUIs is that they are easy to use and require very little
training. Another term used is WYSISYG (What you see is what you get) because
when you print etc the output will look the same as it did on the screen.
11. UINX/LINUX are free operating systems developed by its users. While it is getting
easier to use it is still used mainly by computer experts. Linux uses a combination of
typed commands and a graphical user interface.
Page | 12
Coláiste Chiaráin IC3 Notes
2. Can be a combination of hardware and operating systems: PDAs, Desktops, Linux, Mac,
Windows, Printers.
4. Servers are used to organis and control the flow of data. Clients (also known as
Terminals) are used to access the data. There are smart terminals (that can perform tasks
on their own and access the network when needed) and dumb terminals (that require
network access to function).
5. Some networks do not have servers, these are called peer to peer because all
computers are of equal importance.
8. Disadvantage:
Networking experts may be required to set up / maintain network.
Network could expose sensitive data to hacking or viruses.
Page | 13
Coláiste Chiaráin IC3 Notes
10. Network Drives: Storage areas on a server that you can map and use on your own PC.
(EG Virtual-Classroom, Virtual-Homework).
Page | 14
Coláiste Chiaráin IC3 Notes
a. Transport Protocols: control how computers send, check, and route (address)
data.
2. Peer to Peer networks: Cheap & easy to set up. Ideal for home and small office. All
computers equal.
3. Client – Server Network: A dedicated server controls network traffic and managing
resources. Advantages:
a. Better performance and security.
b. Server can control who can access and when.
c. Called central server as files are stored here.
d. Can be any type of computer with server software installed.
e. Users must be clearly identified with access rights (user name and password).
f. Client can be any type of computer with network card and appropriate software
to connect.
6. Hubs/Switches/Routers:
a. Hubs are devices that connect computers together.
b. A switch is a smarter version of a hub that allows for faster data transfer.
c. A router is a device that allows a number of computers to share an internet
connection.
i. If you have broadband at home you will probably have a wired or
wireless router.
7. Firewall: Can be software or hardware. It filters data coming in and out of a network.
a. It prevents a network from external attack.
Page | 15
Coláiste Chiaráin IC3 Notes
c. Messages stored on network so they are not lost if recipient is not available.
9. Types of servers:
a. Domain Controller: Handles user and computer accounts.
b. File server: Used for back up and storing files on network (u: drive etc)
c. Web sever: Holds web pages. Database server: stores databases.
d. Mail server: stores and routes (directs) email
Page | 16
Coláiste Chiaráin IC3 Notes
The Internet
1. A world wide network of networks. Can be connected to via the phone line (modem or
broadband) as well as other options (wireless, television cable etc).
3. To access the Internet you need an Internet Service Provider. Eircom, Vodafone etc
are examples of ISPs.
4. To connect to an ISP via the phone line you need a modem. If the connection is
broadband you will need a network card (wired or wireless). Depending on the
connection you may need cables and a router.
5. Selecting an ISP: Make sure you have suitable hardware. Look at packages available
cost and what’s on offer? Will there be good support? Is the connection fast in your
area.
6. Dial up: A phone line. Modem needed. Low bandwidth (33 – 56 kbps). Charged for
time.
7. Cable: Comes through your TV cable (Chorus/UPC). “Always on” Much faster (1 – 8
mbps). Need a network card to connect one pc or a router to connect more than one.
T1 is a very fast but expensive line.
9. Intranet: A private LAN in a company using the same protocols as the internet. It has
the advantage of allowing people to share information & protecting the content from
being publicly accessible (google sites)
10. Extanet: Company shares information for e-commerce (e.g. checking stock and buying
from Amazon.com).
Email:
1. Requirements for Email: Computer with internet connection, address of recipient.
2. Advantages: Speed, Paper Trail, Sharing Information, Easy Access, Collaboration, Cost
Saving.
3. Internal Mail: Email that operates on a LAN. Mailboxes are on the user’s computer.
4. Internet Email: Mail is stored on mail servers run by ISPs.
Each server has its own unique address called a Domain name (e.g. gmail.com,
hotmail.com)
The protocol (rules) controlling how mail is uploaded and downloaded is called Post
Office Protocol (POP3)
6. Parts of an email:
Sender: The person sending the mail (from: field)
Recipient: The destination, the person receiving the mail (to: field)
Subject: What the mail is about, can send without but it should be on every mail
CC: Carbon copy – if you want to send a copy of the mail to someone other than the
main recipient.
BCC: Blind Carbon Copy – you cans send a copy using this the names of the people
Page | 17
Coláiste Chiaráin IC3 Notes
receiving the BCC will not be visible to the other recipients. (can prevent spam etc)
Body Text/message text: The content of the mail itself.
Attachments: extra files added to the message. Most ISPs have limits to the size (10 –
20 MB). Attachments appear in a separate line with the name of file or as an icon in the
message text.
8. Receiving mail: You can access mail via or the web or via a mail client.
Examples of mail clients include Thunderbird, Eudora, Outlook/Outlook express.
11. If you are replying to a mail and quoting the original use the symbol > before the text.
12. SPAM: Unsolicited email sent to many recipients (to promote products and services)
Spam is also known as ‘junk mail’. Spammers: people who send spam. They buy
address lists from companies who specialise in email marketing. May crawl net in
search of addresses.
Spam Filter: attempts to block spam. You may have a spam folder.
13. Common Problems: Nothing sent or received – check that your computer is
connecting to ISP mail server.
Check connections on router and computer. Restart computer / mail software. Check
ISP settings. Call ISP.
Attachments: Is it too big? Has it been blocked for security reasons (.exe or database
file). Own security settings too high?
Delivery failures: Email address does not exist at domain (wrong address). Mail
server for the domain down.
14. Viruses: Spread through attachments and links. Could be .exe or .bat but also text
files or pictures. Word documents can contain ‘macro viruses’.
Protection: Install anti virus program with latest updates. Do not open attachments
you aren’t expecting or from people you do not know. Scan attachments for viruses.
Hoax warnings: mails that claim to be virus warnings. Check using the website of
your anti virus program.
Page | 18
Coláiste Chiaráin IC3 Notes
15.
Page | 19