Introduction To Computers 2022 Edition - Nodrm
Introduction To Computers 2022 Edition - Nodrm
Introduction To Computers 2022 Edition - Nodrm
to
Computers
2022 Edition
By
Darrell Hajek,
Cesar Herrera
Copyright 2022
i
Preface:
In 2017 we learned that the prices of the texts used in our introductory computer literacy
course had increased significantly (to over $150.) We felt that this was, not only excessive,
but counterproductive, since very few students would be likely to buy the texts at that price.
We looked for alternative texts for the course but found none that we considered adequate
for both content and price, and so, we decided to write our own.
We have tried to include all of the material necessary for an introductory course for computer
literacy, but, in order to maintain a low price for our students, we have attempted to keep
the content to ONLY what would be desirable for such a course. We fully expect that many
will disagree with the choices we have made, both in what we have included and (probably
even more) in what we have failed to include. We are revisiting these decisions as we prepare
new editions regularly. Suggestions and recommendations are welcome. The 2022 edition has
several new topics and several topics from earlier editions have had information significantly
updated. These topics include: Updated information about supercomputers, quantum
computing, ransomware, solid state drives, VUI systems, cybersecurity, NFT's and
cryptocurrency.
ii
Contents
Contents
1 Introduction ............................................................................................................ 1
1.1 Evolution of the Computer: ...................................................................................... 1
1.1.1 Earliest Devices ............................................................................................................... 1
1.1.2 1600’s: Mechanical Calculators ..................................................................................... 2
1.1.3 1800’s: Babbage .............................................................................................................. 3
1.1.4 1940’s: Electromechanical and Electronic Computers ................................................. 3
1.1.5 1950’s: Commercial Computers..................................................................................... 4
1.1.6 1960’s and Beyond:......................................................................................................... 5
1.1.6.1 Artificial Intelligence ................................................................................................... 5
1.1.6.2 Virtual Reality ............................................................................................................. 6
1.1.6.2.1 Haptic Technology ....................................................................................................................... 6
1.1.6.3 Voice User Interface .................................................................................................... 7
1.1.7 Different classes of computers: ...................................................................................... 7
1.1.7.1 Mainframe computers .................................................................................................................... 7
1.1.7.2 Minicomputers................................................................................................................................. 8
1.1.7.3 Supercomputers .............................................................................................................................. 8
1.1.7.4 Personal Computers...................................................................................................................... 10
1.1.7.4.1 Classes of Personal Computers ................................................................................................ 10
1.1.7.5 PDA’s .............................................................................................................................................. 11
1.1.7.6 Smartphones .................................................................................................................................. 12
1.1.7.7 Tablet Computers ......................................................................................................................... 12
1.1.7.8 Embedded Computers .................................................................................................................. 13
1.1.7.9 Smart TV’s ..................................................................................................................................... 13
iii
Contents
iv
Contents
3 Software ................................................................................................................ 49
3.1 System Software....................................................................................................... 49
3.1.1 Operating Systems ........................................................................................................ 49
3.1.1.1 Single Tasking Systems ................................................................................................................ 49
3.1.1.2 Multi-Tasking Systems ................................................................................................................. 50
3.1.1.3 Multi User Systems / Time Sharing Systems ............................................................................. 50
3.1.1.3.1 Dartmouth Time Sharing System (DTSS) ............................................................................................ 51
3.1.1.3.2 UNIX ........................................................................................................................................................ 51
v
Contents
3.3.1.2 Ethical and Unethical Uses of Computers and Computer Programs ..................................... 64
3.3.1.2.1 Unethical Behavior.................................................................................................................................. 64
3.3.1.2.1.1 Piracy .................................................................................................................................................................... 65
3.3.1.2.1.2 Cyberbullying....................................................................................................................................................... 65
3.3.1.2.2.2 Cyberbullying....................................................................................................................................................... 67
vi
Contents
vii
Contents
5. Input ..................................................................................................................... 99
5.1 Keyboards ................................................................................................................. 99
5.1.1 Keyboard Types.......................................................................................................... 100
5.1.1.1 Standard Computer Keyboard.................................................................................................. 100
5.1.1.2 Laptop Size Keyboards............................................................................................................... 101
5.1.1.3 Flexible Keyboards...................................................................................................................... 101
5.1.1.4 On-Screen Keyboards ................................................................................................................. 101
5.1.1.5 Projection Keyboards ................................................................................................................. 102
5.1.2 Keyboard Layouts ...................................................................................................... 103
5.1.2.1 QWERTY Keyboard .................................................................................................................. 103
5.1.2.2 Dvorak Simplified Keyboard ..................................................................................................... 103
viii
Contents
ix
Contents
x
Contents
xi
Contents
xii
Contents
xiii
Contents
O ...................................................................................................................................... 203
P ...................................................................................................................................... 203
Q ...................................................................................................................................... 204
R ...................................................................................................................................... 205
S ....................................................................................................................................... 205
T ...................................................................................................................................... 206
U ...................................................................................................................................... 207
V ...................................................................................................................................... 207
W ..................................................................................................................................... 208
X ...................................................................................................................................... 208
Y ...................................................................................................................................... 208
Z ...................................................................................................................................... 208
10-Answer Key ........................................................................................................ 209
1.4 Questions: ............................................................................................................... 209
1.4.1 Completion.................................................................................................................. 209
1.4.2 Multiple Choice .......................................................................................................... 210
1.4.3 True-False ................................................................................................................... 211
2.8 Questions: ............................................................................................................... 212
2.8.1 Completion.................................................................................................................. 212
2.8.2 Multiple Choice .......................................................................................................... 213
2.8.3 True-False ................................................................................................................... 214
3.4 Questions ................................................................................................................ 215
3.4.1 Completion.................................................................................................................. 215
3.4.2 Multiple Choice .......................................................................................................... 215
3.4.3 True-False ................................................................................................................... 216
4.11 Questions .............................................................................................................. 217
4.11.1 Completion................................................................................................................ 217
4.11.2 Multiple Choice ........................................................................................................ 218
4.11.3 True-False ................................................................................................................. 219
5.5 Questions ................................................................................................................ 220
xiv
Contents
xv
Introduction to Computers – Chapter 1
1 Introduction
Humans have always found it necessary to perform some kinds of calculations, and
over the centuries, people have used many devices to perform these calculations. The
complexity of these devices has been increasing as technology has improved. With the
progress of the technology, new uses are continuously being developed for the devices.
The oldest known calculating device is the abacusi, which was invented in Asia over
2,000 years ago.
Since the development of the abacus, calculating devices have been continuously
refined, culminating with our modern digital computers.
Today, computers play a very important role in solving a huge variety of problems. The
modern uses of computers include: (among many others)
allowing various kinds of calculations to be performed very quickly,
automating repetitive processes,
storing and manipulating large quantities of data,
allowing access to the Internet,
Supporting distance education.
This chapter provides a review of the developments that resulted in the construction of
the first computer. It also presents a brief description of the evolution of the computer
from its origins until this century.
1.1 Evolution of the Computer:
1.1.1 Earliest Devices
Humans have been using different kinds of devices to help them do calculations since well
before recorded history began.
Probably the first calculating aids people used
were their fingers.
(fingers, of course, would probably not be
considered to be devices in the sense we would
normally use the term.)
The earliest widely used mechanical calculating
device, the iiabacus, was used by the Sumerians
and Egyptians as early as 2000 BC. Its use was Abacus
widespread among the Romans, Indians, Chinese
and Japanese.
1
Introduction to Computers – Chapter 1
Several kinds of analog devices were constructed in ancient and medieval times for the
purpose of performing astronomical calculations. These include the Antikythera
mechanismiii and the astrolabeiv, both developed in ancient Greece (c. 150–100 BC),
Astrolabe
A computer-generated reconstruction
of the front and back of the Antikythera
Mechanism.
1.1.2 1600’s: Mechanical Calculators
Throughout the 17’th century there was a great deal of interest in designing and building
mechanical calculators. Particularly noteworthy were the calculators designed and built
by Blaise Pascalv and by Gottfried Leibnitzvi (who also described the binary number
system that is used in all modern computers.) It was in this period that the slide rulevii
first appeared (designed primarily by John Napier with improvements by Isaac Newton.)
2
Introduction to Computers – Chapter 1
3
Introduction to Computers – Chapter 1
4
Introduction to Computers – Chapter 1
5
Introduction to Computers – Chapter 1
6
Introduction to Computers – Chapter 1
7
Introduction to Computers – Chapter 1
1.1.7.2 Minicomputers
Minicomputers are a class of smaller computers that
developed in the mid-1960s and cost much less than
the mainframe and mid-size computers from IBM.
When single-chip CPUs appeared, beginning with the
Intel 4004 in 1971, personal computers appeared on
the market, and the term "minicomputer" came to
mean a machine that lies in the middle range of the
computing spectrum, smaller than the mainframe
computers but larger than the small personal
computers (often referred to as microcomputers.)
Minicomputers usually took up one (or only a few) 19-
inch rack cabinets, while at that time, a mainframe
might fill an entire room. A PDP-8 on display at the
Smithsonian's National
The definition of minicomputer is vague, and,
Museum of American
consequently, there are a number of candidates for History in Washington, D.C
being the first minicomputer. An early and highly
successful minicomputer was Digital Equipment Corporation's (DEC) PDP-8xvii,
which was launched in 1964 and cost from US $16,000 upwards.
The term minicomputer is no longer widely used. The term midrange computer is
now preferred.
1.1.7.3 Supercomputers
Supercomputers are computers that have world-class computational capacity. In
2015, such machines could perform quadrillions of floating point operations per
second.
xviii
Supercomputers were introduced in the 1960s, made initially, and for decades
thereafter, primarily by Seymour Cray at Control Data Corporation (CDC), then at
Cray Research and at subsequent companies, all bearing his name or monogram.
The first computer to be
commonly referred to as a
supercomputer was the
CDC6600, released in 1964. It
was designed by Cray and was
the fastest in the world by a large
margin. It demonstrated that
there was a viable
supercomputing market when
one hundred computers were sold
at $8 million each.
8
Introduction to Computers – Chapter 1
Cray left CDC in 1972 and formed his own company, Cray Research Inc. In 1976,
Cray Research delivered the Cray-1xix which became one of the most successful
supercomputers in history.
In Nov 2018, the IBM Summit at Oak Ridge National
Laboratory became the fastest supercomputer in the
world. Before Nov 2018, the two fastest machines
were both in China. The Sunway TaihuLight at
China's National Supercomputing Center in Wuxi,
was fastest and second fastest was the Tianhe-2 at the
National Supercomputer Center in Guangzho.
The US government has also contracted another (to
be named Frontier) designed to be 50 times faster
Cray-1 preserved at the
than Summit. Frontier was scheduled for completion Deutsches Museum
in 20211.
In November 2021, the Fugaku, made
by Fujitsu, and located in the RIKEN
Center for Computational Science in
Kobe, Japan was recognized as the
fastest supercomputer in the world.
As of 2019, China had 227
supercomputers while the US had Fujitsu Fugaku Supercomputer
109.
Supercomputers are used in a wide range of computationally intensive tasks in
various fields, including quantum mechanics, weather forecasting, climate research,
oil and gas exploration, molecular modeling (computing the structures and properties
of chemical compounds, biological macromolecules, polymers, and crystals), and
physical simulations (such as simulations of the early moments of the universe,
airplane and spacecraft aerodynamics, the detonation of nuclear weapons, and
nuclear fusion). Throughout their history, supercomputers have been essential in the
field of cryptanalysis.
1
In a Dec. 23, 2021 article, the program director, said “Some early users will get access to Frontier
this summer” and projected “full user operations on Jan. 1, 2023.”
9
Introduction to Computers – Chapter 1
10
Introduction to Computers – Chapter 1
IBM Simon
and charging
Apple Newton and I-Phone
Palm TX base
11
Introduction to Computers – Chapter 1
1.1.7.6 Smartphonesxxv
Smartphones typically combine the
features of a cell phone with those of
other popular mobile devices, such
as personal digital assistant, media
player and GPS navigation unit. It is
the mobile phone functionality that
distinguishes the smart phone from
the PDA.
Most smartphones have a
touchscreen user interface, can run Smartphones
third-party apps, and have cameras
built in.
12
Introduction to Computers – Chapter 1
13
Introduction to Computers – Chapter 1
14
Introduction to Computers – Chapter 1
1.1.8.4 VideoTelephony
The improvement in communication speed enabled the development of visual, as
well as audio communication.
VideoTelephony/Videoconferencing can enable individuals in distant locations to
participate in meetings on short notice, with time and money savings. Technology
such as VoIP can be used in conjunction with desktop videoconferencing to enable
low-cost face-to-face meetings without leaving homes or desks, especially for
businesses or schools with widespread offices or large or multiple campuses. The
technology is also used for telecommuting, in which employees work from home.
Because of widespread high speed internet access and relatively cheap webcams
(often built into tablets, portable computers and smartphones) videotelephony has
become much more common, and recent coronavirus problems have motivated
business (and schools) to make widespread use of it as means of communication for
videoconferencing/online classes.
Probably the first major provider of videotelephony services was Skype, but Zoom
has recently become a dominant player in that market.
1.1.8.5 Virtual Private Networks
As computers started becoming ubiquitous, many businesses began connecting their
computers and computing equipment in private local area networks.
The use of private computer networks provides numerous benefits 2, but it is
extremely expensive to implement a private network covering an area larger than a
single building. If a business were to utilize traveling salesmen, roaming
representatives, or branch offices, it would be impossible to construct a private
network connecting all of its users/nodes. Virtual private networks (VPN’s) were
developed in order for such businesses to enjoy the benefits of private networking
systems but without having to invest in the construction of extensive computer
communication systems.
These systems make use of public networks (usually the Internet) for
communications but give the appearance/impression to the users of working on a
private local network.
2
If they didn’t provide benefits, nobody would use them.
15
Introduction to Computers – Chapter 1
16
Introduction to Computers – Chapter 1
17
Introduction to Computers – Chapter 1
18
Introduction to Computers – Chapter 1
19
Introduction to Computers – Chapter 1
The COVID-19 pandemic has forced K-12 school districts and universities to close
and send students home. This reality has forced the education industry to increasingly
turn to online instruction. In many respects, the education industry's move to remote
instruction is similar to the increased adoption of telecommuting in the workplace.
As noted earlier, computer literacy is becoming an essential skill, both socially and
for employment. Unfortunately, many children (and adults) have less access to
computers and computing technology than do others. This digital divide in classes of
people, those who have access and those who don’t, has important consequences for
society.
1.3.5 Hacking and Malware
Unfortunately, the widespread use of computers and communications technology has
given new avenues of attack to those who wish to take advantage of us or to do us
harm. We must now protect our children (and ourselves) against cyberbullying, our
computers must be protected against malware and businesses (as well as individuals)
must go to great lengths to protect their systems against attacks by “hackers”. 3
'Malware' is a term used to refer to a variety of forms of hostile or intrusive software,
including computer viruses, worms, Trojan horses, ransomware, spyware, adware,
scareware, and other malicious programs. Malware is often disguised as normal
software, or comes embedded in non-malicious files.
Malware is often used to gain information such as personal identification numbers or
details, bank or credit card numbers, and passwords. If left unprotected, personal and
networked computers can be at considerable risk against these threats, and so our
computers are often defended by various types of protection elements, including
firewalls, anti-virus software, and various kinds of network hardware.
According to Check Point’s Cyber Attack Trends: 2020 Mid-Year Report, these were
the five most common types of malware in the first half of 2020:
1. Cryptomining Malware: Cryptocurrency mining software is designed to take
advantage of the fact that some cryptocurrencies pay miners for solving Proof
of Work computational puzzles. Cryptomining malware uses the infected
computer’s CPU resources to solve these problems, making money for the
malware operator.
2. Mobile Malware: While many people focus on computer malware, mobile
malware is a growing issue. Mobile malware is now the most common type of
malware behind cryptomining malware. This malware family covers a wide
range of functionality. The most common mobile malware variants are
droppers that deliver other types of mobile malware but also include adware
functionality.
3
The term hacker was once used to describe a computer expert who used his technical
knowledge to overcome a problem. It has, however, come to be used to describe someone who
uses technical knowledge to break into computer systems.
20
Introduction to Computers – Chapter 1
21
Introduction to Computers – Chapter 1
22
Introduction to Computers – Chapter 1
23
Introduction to Computers – Chapter 1
1.4 Questions:
1.4.1 Completion
1. Humans have always found it necessary to perform some kinds of calculations,
and over the centuries, people have used many _______ to perform these
calculations.
1. The oldest known calculating device is the _______ which was invented in Asia
over 2000 years ago.
1.1.1 Several kinds of analog computers were constructed in ancient and medieval
times to perform astronomical calculations. These include the Antikythera
mechanism and the __________, both developed in ancient Greece (c. 150–100
BC)
1.1.4 The world's first programmable, electronic, digital computers were the
________computers, developed for British codebreakers during World War II to
help in the cryptanalysis.
1.1.4 In the United States, _________, the first general purpose, programmable
computer was initially designed to compute artillery firing tables for the US
army.
1.1.7 Starting around _______, computer manufacturers began specializing –
producing different types of computers aimed at specific segments of the
market.
1.1.7.1 __________computers are computers used primarily by commercial and
governmental organizations for critical applications and bulk data processing
such as census, industry and consumer statistics, enterprise resource planning
and transaction processing.
1.1.7.1 The term “_________” originally referred to the large cabinets that housed
the central processing unit and main memory of early computers. Later, the term
was used to distinguish high-end commercial machines from less powerful units.
1.1.7.2 The term minicomputer is no longer widely used. The term _______
computer is now preferred.
1.1.7.3 The first computer to be commonly referred to as a supercomputer was the
__________, released in 1964.
1.1.7.3 Supercomputers were introduced in the 1960s, made initially, and for
decades primarily by Seymour _____ at Control Data Corporation (CDC), then
at subsequent companies, all bearing his name or monogram
24
Introduction to Computers – Chapter 1
25
Introduction to Computers – Chapter 1
1.1.1 The astrolabe, a kind of analog computer, was developed in ancient _____
a) India
b) China
c) Greece
d) Egypt
e) none of the above)
1.1.2 _________ described the binary number system that is used in all modern
computers
a) Pascal
b) Leibnitz
c) Newton
d) Lovelace
e) none of the above
1.1.3 _________ designed the analytical engine, which was, in fact, a
programmable computer. The design for the analytical engine included many
ideas that were later incorporated into widely used computers beginning in the
1940’s
a) Pascal
b) Leibnitz
c) Newton
d) Lovelace
e) none of the above
1.1.4 _________ was the world's first programmable, electronic, digital computer
a) Colossus Mark 1
b) ENIAC
c) LEO 1
d) UNIVAC
e) none of the above
1.1.5 _________ was the first computer used for commercial business applications
a) Colossus Mark 1
b) ENIAC
c) LEO 1
d) UNIVAC
e) none of the above
26
Introduction to Computers – Chapter 1
1.1.5 _________ was the first mass-produced computer, with approximately 2000
installations.
a) Colossus Mark 1
b) ENIAC
c) LEO 1
d) UNIVAC
e) none of the above
1.1.5 It was in the ________’s that IBM entered the computer business
a) 1920
b) 1930
c) 1940
d) 1950
e) none of the above
1.1.6 During the 1960’s
a) the world’s computing hardware began to convert from vacuum tube to solid
state devices
b) computer main memory moved away from magnetic core memory devices to
solid-state semiconductor memory
c) with the introduction of the graphical user interface (GUI), the use of
computers no longer required specialized training
d) all of the above
e) none of the above
1.1.7.4 The first successfully mass marketed personal computer was the ______
a) Apple II
b) TRS-80
c) Commodore PET
d) IBM PC
e) none of the above
1.1.7.5 The term PDA first appeared in January 1992, referring to the _______
a) Apple Newton
b) IBM Simon
c) Nokia Communicator
d) Palm TX
e) none of the above
1.1.7.5 The ________ can be considered the first smartphone.
a) Apple Newton
b) IBM Simon
c) Nokia Communicator
d) Palm TX
e) none of the above
27
Introduction to Computers – Chapter 1
1.4.3 True-False
1.1.3. One of the reasons that Babbage failed to make a working difference engine
is that he turned his attention to a more advanced design which he called the
analytical engine.
1.1.4 By the 1940’s it was becoming clear that electronic devices could do
computation faster than mechanical devices.
1.1.7.3 As of 2018, the fastest supercomputer was the Cray 1
1.1.7.4 Laptop computers have developed to the point that they have essentially the
same capabilities as desktop computers.
28
Introduction to Computers – Chapter 1
29
Introduction to Computers – Chapter 2
2. Computer Components
Almost all modern computers have pretty much the same design. They
all have the same basic components. These basic components are:
Processorxxvii: The component which actually performs the
actions/executes the commands that the computer carries out.
Processor
Memory: The component where data, information and programs
(codes for commands to be executed) are stored.
Computer memory (Also often referred to as Primary storage,
Random Access Memory or RAMxxviii) is typically volatile
(Volatile means that when the computer is turned off, the
contents of memory are erased.) RAM
Secondary Storage: Components that store information / data from
one session to another. (Nonvolatile storage.) Some of the most common types of
secondary storage media are:
Solid State Drives: A solid-state drive (SSD) is a solid-state storage device that
uses integrated circuit assemblies to store data.
Hard Disk Drivesxxix
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data
storage device used for storing and retrieving digital information using one or
more rigid ("hard") rapidly rotating disks (platters) coated with magnetic
material.
Optical Storage:
Optical storage is data storage on an optically readable medium xxx(CD or
DVD). Data is recorded by making marks in a pattern that can be read back with
the aid of light, usually a beam of laser light precisely focused on a spinning
disc. Optical storage differs from other data storage techniques that make use of
other technologies such as magnetism or semiconductors.
Flash drives
A xxxiUSB flash drive, also known under a variety of other names, is a data
storage device that includes flash memory and has an integrated Universal Serial
Bus (USB) interface.
USB flash drives are typically removable and rewritable, and physically
much smaller than an optical disc.
SanDisk Cruzer
Micro
Hard Disk
a brand of USB
Drive (Open) Optical disk
flash drives
Secondary Storage Devices
31
Introduction to Computers – Chapter 2
Input devices:
Input devices are components/devices
which allow us to put information/data
into the computer memory.
The most common input devices are:
xxxii
keyboard Keyboard
xxxiii
mouse Mouse
Output devices:
Output devices are components/devices
which allow the computer to communicate
information/data from computer memory to
users and/or other computing devices.
The most common output devices are: Monitor
Printer
xxxiv
monitors
xxxv
printers
Communications Devices:
Communications devices are devices which facilitate communication with other
devices. These include: Network Interface Controller (NIC), Wireless
communications devices, Bluetooth interface controllers, Ethernet ports, modems
Bus:
The component which facilitates movement of data from one place to another within
the computer.
32
Introduction to Computers – Chapter 2
The processor relies on a crystal circuit called the A desktop PC clock generator
xxxix
Clock Generator. The clock generates electronic
pulses (called ticks or clock cycles) at regular
intervals. These clock ticks control the timing of the computer operations.
2.1.1 Overclocking
In an effort to get better performance, some users change the system clocks on their
computers to run at higher speeds. This is called “overclocking”.
Overclocking will result in a system that runs faster but it can also cause data errors.
(The CPU might read the content of a cell before it has stabilized.) The most common
problem that overclocking will cause, however, is overheating. If a CPU runs at a
higher speed than it is designed for, it will use more energy than the designer
anticipated and produce more heat, possibly more heat than can be dispersed.
33
Introduction to Computers – Chapter 2
2.2 Memory
The term "memory", (or primary memory, or primary storage) refers to addressable
semiconductor memory, i.e. integrated circuits consisting of silicon-based transistors,
resistors capacitors, etc.
Most such semiconductor memory consists of binary memory cells (flip-flops which can
be in one of two states), each state representing one bit of information (0 or 1).
Since the information stored in an individual memory cell is extremely limited, the cells
in computer memory are arranged in groups of 8 cells (each group of 8 cells is referred
to as a byte.)
Each byte is assigned a number as its address. The address is used to identify the
individual byte and to allow the computer to identify a byte in order to reference its
contents or to change its contents.
The contents of the memory cells (the collection of 0’s and/or 1’s represented by the
states of the memory cells) are used to represent information.
Of course, the content of a single cell can only represent one of two items, the 0 state
representing one of them and the 1 state representing the other.
In order to deal situations involving more than two values, it is necessary to use
groups of cells. As mentioned above, the most common group consists of 8 cells, and
is called a byte.
The time it takes for the processor to reference a memory cell is pretty much
independent of where it is located in memory. That is the reason primary memory is
called random access memory.
This makes primary memory different from other direct-access data storage media
(such as hard disks, CD’s, DVD’s.) For those types of media the time required to
read and write data items varies significantly depending on where they are located
on the recording medium.
The time difference is due to mechanical considerations, such as media
rotation speeds and arm movement delays.
There are two distinct types of technology used for primary memory: Random Access
Memory (RAM) and Read Only Memory (ROM)
The computer can read information from, but cannot write to, locations in ROM.
Access to information in ROM tends to be much slower than to RAM. Most home or
office computers include secondary storage device(s) and have only a minimal
34
Introduction to Computers – Chapter 2
hardware initialization core and bootloader4 in ROM (known as the BIOS in IBM-
compatible computers.) This is the minimum configuration necessary to allow the
computer to load the rest of the operating system from disk into RAM where it can
be accessed more efficiently. This arrangement also results in an operating system
that is relatively easy to upgrade.
ROM is implemented using nonvolatile types of memory (The contents do not
change when the computer is powered down and then later restarted.)
Data items can be read from both RAM and ROM but can only be written to locations
in RAM.
RAM is normally associated with volatile types of memory. (When the computer
is turned off the contents of volatile memory are erased.)
As stated earlier, access to locations in RAM is generally much faster than to
locations in ROM. This is one of the reasons that, in most systems, only minimal
initialization software will be in ROM.
There are, in fact several different types of RAM, some of which are much faster than
others (and more expensive and use more power and generate more heat.)
In order to achieve greater execution speed but hold costs down, computer
manufacturers use relatively cheap memory for most of their RAM but include a
small amount of (more expensive) high speed circuitry. This faster (and more
expensive) storage is called cache memory.
A system will attempt use cache memory for information that is likely to be
accessed frequently, and/or in the immediate future.
4
When the computer is powered on, it typically does not have an operating system or its loader in
RAM. The computer first executes a relatively small program stored ROM, along with some
needed data, to initialize RAM, and to access a secondary storage device from which the
operating system programs and data can be loaded into RAM.
35
Introduction to Computers – Chapter 2
Modern computer systems typically have two orders of magnitude more secondary
storage than primary storage.
In modern computers, xlhard disk drives are normally
used as secondary storage although solid state drives
(SSD’s) are becoming more common. The time
taken to access a given byte of information stored on
a hard disk is typically a few thousandths of a
second, (a few milliseconds.) Access times for solid
state drives is three to four times faster than for hard Diagram labeling the major
disk drives, but would still be measured in components of a computer
milliseconds. HDD
36
Introduction to Computers – Chapter 2
2.4.1 Keyboard:
A xlikeyboard is a typewriter-style device, which uses
buttons or keys, to act as mechanical levers or electronic
switches.
Many (most) early computers used xliipunched cards for Keyboard
their primary input, but by the late 1980’s, interaction via
keyboard had become the most common input method.
2.4.2 Mouse:
A xliiimouse is a pointing device that detects motion on a Punched card for a
surface. This motion is typically translated into the motion FORTRAN program
of a pointer/cursor on a display. This supports interaction
with a graphical user interface (GUI).
The cursor is a symbol on the screen (usually a blinking
vertical bar) that indicates where the next interaction by
the user (entry of a character from keyboard, clicking a
mouse button) will have its effect.
A mouse will normally have two or more buttons that the
Mouse
user can press (click) to interact with the GUI.
The movements of the mouse on the surface are used to control the position of the
pointer on the screen. The pointer identifies the place where actions of the user
take place. Hand movements are replicated by the pointer. Clicking or hovering
(stopping movement while the cursor is within the bounds of an area) can
select/identify an element (such as a file, program, or action) from a display of
names, or (in graphical interfaces) small images (called "icons".)
For example, a text file might be represented by an icon consisting of a picture
of a paper notebook. Clicking while the cursor hovers over this kind of icon
might cause a text editing program to open a window in which the contents of
that text file are displayed.
2.4.3 Scanner:
An xlivimage scanner — (usually just called a scanner) is a
device that optically scans pictures, print documents,
handwriting, or objects, and creates digital images of them.
Variations of the flatbed scanner (where the document is
placed on a glass window for scanning) are commonly
found in offices.
Flatbed Scanner
37
Introduction to Computers – Chapter 2
2.4.4 Touchscreen:
A xlvtouchscreen is a visual display that is sensitive to where a user presses on it and
transmits this information to the computer.
Users can give input by touching the screen with
their fingers and/or with a special stylus/pen.
Some touchscreens require users to wear specially
coated gloves, and others use a special stylus/pen.
A user can use the touchscreen to react to what is
Capacitive touchscreen of a
displayed and to control how it is displayed.
mobile phone
A touchscreen enables the user to interact directly
with what is displayed, rather than using an intermediate device, such as a mouse,
touchpad, etc.
Touchscreens are common in devices such as game consoles, tablet computers, and
smartphones.
The popularity of smartphones, tablets, and many types of
information appliances is driving an ever-increasing
demand for, and acceptance of, touchscreens on portable
and functional electronics.
Touchscreens are also found in the medical field and in
heavy industry, as well as for automated teller machines
(ATMs), and xlvikiosks. (Kiosks are used in places like
museums where keyboard and mouse systems do not An Internet kiosk in
allow a suitably intuitive, rapid, or accurate interaction Hemer, Germany
by the user with the display's content.)
2.4.5 Digital Cameras:
Digital cameras store images in a digital format. These images can be stored on
portable media (such as a flash drive) and this media can be used to transfer them to
a computer’s memory or storage.
Many computers (especially laptops, tablets and smartphones) come with digital
cameras built in. With these, the graphic images (digital photos) are automatically
placed in the computer storage where they can be accessed for processing by graphic
editing software and/or sent to other devices/users using the computer’s
communications software.
38
Introduction to Computers – Chapter 2
2.4.6 Microphones:
The widespread use of voice controlled/responsive systems (Apple SIRI, Microsoft
Cortana, Google Assistant, Amazon Alexa) has been made possible by radically
improved natural language processing software and by the common inclusion of
sound detection devices (aka microphones) in the computing devices (rather a
necessary component of a smartphone.)
2.5 Output Devices
When a computer has finished carrying out its information processing, the user will
probably want to learn something about what the results were (why else would he/she
be using the computer?)
For the computer to communicate the processing results, it needs some kind of output
device.
An output device is a piece of computer equipment used to communicate the results
of data processing that an information processing system (such as a computer) has
carried out.
An output device converts the electronically generated information into a form that a
human can see, read, hear, feel, ... somehow get a sense of what the results of the
processing were.
The most common kinds of output devices can be divided into two classes: those that
produce output that users can see and those that produce output that users can hear.
2.5.1 Audio output devices:
Audio output devices can, in turn, be divided into two classes: those designed to
broadcast sound more or less publicly, so that most people within a reasonable area
can hear it, and those designed to produce output for only one person.
2.5.1.1 Speakers
Computer xlviispeakers are output devices used by the
computer to produce sounds.
Computer Speakers can be built into the
motherboard or can be attached as external Computer speakers
(peripheral) units.
39
Introduction to Computers – Chapter 2
2.5.1.2 Headphones:
xlviii
Headphones are low volume speakers that are placed on a band around the
user’s head, holding them close to, or even in the ears. The speakers produce low
volume sounds so that only the user can hear them. They may be used to prevent
other people from hearing the sound either for privacy or to prevent disturbance,
as in listening in a public library. They can also provide a level of sound fidelity
greater than loudspeakers of similar cost. Part of their ability to do so comes from
the lack of any need to perform room correction treatments with headphones.
xlix
Headphones are also
useful for video games,
as they allow players to
judge the position of an
off-screen sound
source (such as the
footsteps of an In-ear headphones
Headphones
opponent or their gun
fire).
2.5.2 Visual Display Devices
There are two general classes of visual display devices: those that produce output in
a form referred to as soft copy (devices on which the output is temporary) and those
that produce hard copy output (output in physical form.).
2.5.2.1 Screen (Monitor)
The term monitor [also referred to as a video display terminal (VDT) and/or
video display unit (VDU)] refers to a display screen for video images, (and the
case that holds it.)
Monitors are examples of soft copy devices, since their displays are regularly
changed/modified and/or replaced.
The early computer monitors were constructed like the early TVs, as CRT’s
(Cathode Ray Tubes) with a fluorescent screen illuminated by streams of
electrons.
Modern monitors are created using flat panel display technology.
40
Introduction to Computers – Chapter 2
An organic light-emitting
diode (OLED) is a light-
emitting diode (LED)
embedded on flexible plastic.
OLED’s are used to create
displays on flexible materials
for use for applications like
wearable devices and on
curved surfaces and on
surfaces that change shape.
41
Introduction to Computers – Chapter 2
2.5.2.3 Printers
A liiprinter is an output device that prints graphics or text
on paper or similar physical media.
Printers produce hard copy output, as opposed to the
previously described output devices which were all
soft copy devices.
The two most common kinds of printer are laser printers Printer
and inkjet printers.
Monochrome (black and white) laser printers are commonly found in offices,
where they are used to produce text documents. Color laser printers are more
expensive than monochrome, but their prices are going down, and they are
becoming more common.
Inkjet printers are cheaper than laser printers and can produce relatively
high quality color output. They are commonly found in homes and small
businesses.
2.6 Communications Devices
There are several kinds of communications devices used in computers. Some duplicate
the functionalities of others and some provide relatively specialized services.
2.6.1 NIC’s
Many computers come with communications devices preinstalled. The most common
of these devices is the Network Interface Controller (NIC)
A network interface controller is a computer hardware component that connects
a computer to a computer network. (Typically using the Ethernet protocol.)
Early network interface controllers were commonly implemented on expansion
cards that plugged into a computer bus, but most modern computers have a
network interface built into the motherboard.
2.6.2 Wireless
Most modern computers come with hardware capable of wireless communication,
either with a router or with other computers.
Wireless hardware for a desktop computer eliminates the need to run network
cable from the router to the computer.
Wireless hardware can also give a laptop or desktop computer the capability to
communicate wirelessly with other computers, without the need for a router.
42
Introduction to Computers – Chapter 2
2.6.3 Bluetooth
liii
Bluetooth is a wireless technology now included on many
smartphones, laptops and desktop computers. It allows the
computer to communicate wirelessly with other devices
that have the hardware necessary to send and/or receive
Bluetooth signals.
A typical Bluetooth
One popular way of utilizing Bluetooth technology on a mobile phone headset.
computer is with a mouse capable of Bluetooth
communication. This eliminates the need for a wire.
Wireless control of and communication between a mobile phone and a handsfree
headset was one of the earliest Bluetooth applications to become popular.
2.6.4 Ethernet Ports
The livEthernet Port is another popular communication device that comes built into
many personal computers. It allows the computer to
communicate with another computer, a router or other
networking device using Ethernet cable.
In an effort to offer models that are as light and
simple as possible many laptop manufacturers,
have chosen to stop including an Ethernet port and
have users to rely on the laptop's wireless interface
for external communication.
2.6.5 Modems
A lvmodem (modulator-demodulator) is a network hardware device that encodes
(modulates) digital information for transmission using carrier wave signals to be
transmitted and then decoded (demodulated) by another modem on the receiving unit.
(Often the carrier waves are audio signals carried by telephone lines but modems can
use any analog signals.) Currently the most common form of modem is the cable
modem which allows access to high speed Internet service through the cable
television network.
43
Introduction to Computers – Chapter 2
44
Introduction to Computers – Chapter 2
2.8 Questions:
2.8.1 Completion
2. The component which actually performs the actions/executes the commands that
the computer carries out is called the processor or ______
2.1 The _________ interprets and carries out the basic instructions that result in the
computer doing what we want it to do.
2.2 The term "memory", (primary memory, primary storage) is ___________
semiconductor memory, i.e. integrated circuits consisting of silicon-based
transistors.
2.2 Data items can be read from both RAM and ROM, but can be written only to
locations in _______
2.2 Most home or office computers include magnetic disk drives and have only a
minimal hardware initialization core and bootloader in ROM (known as the
______in IBM-compatible computers).
2.2 In order to achieve greater execution speed but hold costs down, computer
manufacturers use relatively cheap memory for most of their RAM but include a
small amount of (more expensive) high speed circuitry. This is called
________memory.
2.4 Traditional _______devices include the keyboard, mouse and scanner.
2.4.2 A text file might be represented by a picture of a paper notebook, and clicking
while the cursor hovers over this _______might cause a text editing program to
open the file in a window.
2.4.4 A(n) _________is a visual display which is sensitive to where a user is
pressing on it and transmits this information to the computer.
2.5.2.1.1 Very large displays generally use _______display technology.
2.5.2.1.2 OLED’s are used to produce _____ displays.
2.5.2.2 The two most common printer mechanisms are black and white ________
printers, used primarily for common text documents, and color inkjet printers.
2.5.2.3 The newest types of projectors are ________projectors.
45
Introduction to Computers – Chapter 2
2.1 The central processing unit has two subdivisions, the control unit and the
_______
a) CPU
b) ALU
c) VDU
d) OSU
e) none of the above
46
Introduction to Computers – Chapter 2
2.3 The time taken to access a given byte of information stored on a hard disk is
typically a few thousandths of a second, (a few_________.)
a) microseconds
b) milliseconds
c) nanoseconds
d) macroseconds
e) none of the above
2.3 The time taken to access a given byte of information stored in random-access
memory is measured in billionths of a second (_________.)
a) microseconds
b) milliseconds
c) nanoseconds
d) macroseconds
e) none of the above
47
Introduction to Computers – Chapter 2
48
Introduction to Computers – Chapter 3
3 Software
Of course a computer is of little use unless it has programs to execute, programs that will
make it do things a user might want it to do.
Computer programs (collectively known as Computer Software) can generally be divided
into two classifications: System Software and Application Software
System software is software which provides an interface and services both for users and
for other software.
Application software is software designed to provide specific services for users.
3.1 System Software
System software is often divided into two classifications: Operating Systems (often
referred to as simply OS’s) and Utility Programs
3.1.1 Operating Systems
The operating system allows the components of a computer to work together.
(Some examples of operating systems are:
UNIX, Microsoft Windows, Mac OS X, Android, iOS, and Linux)
An operating system would include programs that interface:
• users with hardware.
• users with software.
• software with hardware.
• software with other software.
An operating system will have programs that perform tasks like:
• transferring data between primary memory and secondary storage
• rendering output onto a display device.
3.1.1.1 Single Tasking Systems
The earliest operating systems required users to type their programs (and their
commands for the operating system) on punched cards. The cards would be placed
(in proper order) into a card reader. The cards would be read, and the program
would be executed.
These early operating systems were inherently single tasking systems, executing
one program at a time. They would have to finish one program before beginning
another.
49
Introduction to Computers – Chapter 3
50
Introduction to Computers – Chapter 3
5
10 seconds might seem quite a long wait time today, but users of the single user systems
common at that time would typically have to wait overnight, and a waiting time of several days
was not uncommon.
51
Introduction to Computers – Chapter 3
52
Introduction to Computers – Chapter 3
3.1.1.4.2.1 Mac OS
The lvii"classic" Mac OS is the original Macintosh
operating system that was introduced in 1984
along with the first Macintosh computer and it
remained in primary use on Mac’s through 2001.
It was originally named "System Software", or The original Macintosh
simply "System"; System Software and
Finder, released in 1984
Apple rebranded it as "Mac OS" in 1996.
Mac OS is characterized by its monolithic system. It was noted as being
easy to use, but was criticized for its limited memory management, lack of
memory protection and access controls, and for its propensity for conflicts
among extensions.
53
Introduction to Computers – Chapter 3
Linux was originally developed for Intel x86 based personal computers but
has since been ported to many other platforms and is used on more different
platforms than any other operating system.
54
Introduction to Computers – Chapter 3
55
Introduction to Computers – Chapter 3
3.1.1.5.2 iOS
lxi
iOS is a mobile operating system created and developed by
Apple Inc. exclusively for its hardware. It is the operating
system that presently powers many of the company's mobile
devices, including the iPhone, iPad, and iPod Touch. It is the
second most popular mobile operating system globally. Only
Android is more popular. iPad tablets have also been the
second most popular, by sales (second to Android) since 2013.
The iOS user interface is based on direct manipulation, using
multi-touch gestures. It implements interface control elements
including sliders, switches, and buttons. Interaction with the
system includes gestures such as swipe, tap, pinch, and reverse pinch, all of
which have specific definitions within the context of the iOS operating system
and its multi-touch interface. Internal accelerometers are used by some
applications to sense movement of the device.
56
Introduction to Computers – Chapter 3
57
Introduction to Computers – Chapter 3
58
Introduction to Computers – Chapter 3
• Content access software is used primarily to access content without editing but may
include software that allows for content editing. Such software addresses the needs
of individuals and groups to consume digital entertainment and published digital
content.
o Examples include media players, web browsers, and help browsers.
• Educational software is related to content access software, but has the content or
features adapted for use in by educators or students.
o For example, it may deliver evaluations (tests) and/or track progress through
material. Educational software is also available for support of collaborative
activities.
• Simulation software simulates physical or abstract systems for research, training or
entertainment purposes.
• Media development software generates print and electronic media for others to
consume, most often in a commercial or educational setting. This includes graphic-
art software, desktop publishing software, multimedia development software, HTML
editors, digital-animation editors, digital audio and video composition, and many
others.
• Product engineering software is used in developing hardware and software products.
This includes computer-aided design (CAD), computer-aided engineering (CAE),
computer language editing and compiling tools, integrated development
environments, and application programmer interfaces.
• Entertainment Software can refer to video games, screen savers, programs to display
motion pictures or play recorded music, and other forms of entertainment which can
be experienced through use of a computing device.
3.2.1 Productivity Software
Productivity software is a term that has come to be used to describe a type of software
that helps users produce things. In particular, it tends to refer to software that helps
in the production of business-related things such as documents, databases, graphs,
worksheets and presentations.
Common examples of office productivity software include word processors, database
management systems (DBMS), graphics software, and spreadsheet applications. The
term is sometimes also used for any type of application that is used to help people do
their jobs and is used for programs supporting collaboration and communication.
59
Introduction to Computers – Chapter 3
60
Introduction to Computers – Chapter 3
3.2.2.2 Shareware
During the 1980’s several independent software authors, lacking financial means
to mount large scale advertising campaigns, developed a new system for
marketing their products. They distributed free copies of their programs,
recommended that people who received the programs copy them and give the
copies to friends, family, colleagues and/or anybody who might have an interest.
It was suggested (but usually not required) that, after using the programs for a
period of time, the user, if he/she wanted to continue using them, might send some
kind of payment to the program authors.
Software distributed/marketed in this way (recommending users share the
software and requesting subsequent payment) came to be known as shareware.
3.2.2.3 Freeware
Freeware is software that is available for use at no monetary cost. In other words,
while freeware may be used without payment it is most often proprietary software,
and usually modification, re-distribution or reverse-engineering (without the
author's permission) is prohibited. Two historic examples of freeware include
Skype and Adobe Acrobat Reader.
Freeware, although itself free of charge, may be intended to benefit its producer.
The source code of freeware is typically not available to users.
3.2.2.4 Open Source Software
Open-source software (OSS) is a type of computer software whose source code
is released under a license in which the copyright holder grants users the rights to
study, change, and redistribute the software.
Open-source software is often developed in a collaborative public manner.
3.2.2.5 SaaS
Software as a Service (or SaaS) is a way of delivering access to centrally hosted
applications over the Internet—as a service. SaaS applications are sometimes
called web-based software, on-demand software, or hosted software. Whatever
the name, SaaS application programs run on a SaaS provider’s servers. Instead of
installing and maintaining software, a user simply accesses it via the Internet,
freeing him/herself from complex software and hardware management. The
provider manages access to the application, including security, availability, and
performance. SaaS business applications are usually accessed by users using a
web browser. Unlike traditional software, which is conventionally sold as a
perpetual license with an up-front cost (often with an optional ongoing support
fee), SaaS providers generally price applications om a subscription basis, most
commonly charging a monthly or annual fee.
61
Introduction to Computers – Chapter 3
SaaS has become a common delivery model for many business applications.
Centralized hosting of business applications dates back to the 1960s. Starting in
that decade, IBM and other mainframe providers conducted a service bureau
business, often referred to as time-sharing or utility computing. Such services
included offering computing power and database storage from their worldwide
data centers. These services were marketed primarily to banks and other large
organizations.
As businesses and individuals began to acquire their own computers, this type of
service became less widely used until the expansion of the Internet during the
1990s brought about a new class of centralized computing, called Application
Service Providers (ASP’s). These provided businesses with the service of hosting
and managing specialized business applications, and had the goal of reducing
costs through central administration and through the solution provider's
specialization in a particular business application.
SaaS essentially extends the idea of the ASP model but:
• While most initial ASP's focused on managing and hosting third-party
software, as of 2012 SaaS vendors had begun to develop and manage their
own software.
• Whereas many initial ASPs offered more traditional client-server
applications, which would require installation of software on users' personal
computers, SaaS solutions of today rely predominantly on the Web and their
use normally only requires a web browser.
3.3 Ethical Issues Related to Computer Software
Ethical issues related to computer software can be divided into two categories:
• issues related to users of computers and their software
• and issues for software developers (and distributers)
62
Introduction to Computers – Chapter 3
Piracy is Ethical
Some think that there is nothing wrong with software piracy. They believe in
the freedom of information and expression (ie. "information wants to be free").
According to them, it is acceptable and ethical to copy the software because
they have a right to the information contained in the software. They also hold
the idea of that reproduction and distribution of software a part of fair use
within copyright law.
Some pirates have cited their first amendment rights as an excuse for piracy.
They claim that since posting information in electronic form is protected by the
first amendment, the distribution of illegal software is an exercise of the rights
of self-expression and should not be infringed upon.
Some think that software piracy doesn't hurt anyone, that it is a victimless
crime. They believe that, with the rising prices of software, software
manufacturers are really not hurt by pirates making illegal copies of their
programs. They think since they are not going to pay for the software anyway,
it is OK to get it free.
Another common excuse runs along the lines of "the software is really not
worth the money they're charging anyway." The argument continues that since
the software is buggy, it's really not a crime to distribute faulty products.
Finally, some claim that they're simply "testing" the software. "If I really like it,
I'll pay for it," runs the common excuse, "but this program just sits on my hard
drive and I almost never use it."
Piracy is Unethical
This view holds that piracy is really not a victimless crime. Due to software
piracy, the industry has seen some 12 billion dollars and over 100,000 jobs lost.
The attraction of piracy is due to its anonymity and the ease with which illegal
copies of software can be made and distributed. However, every person who
makes illegal copies is contributing to the monetary losses caused by piracy.
63
Introduction to Computers – Chapter 3
Information really does not "want to be free." People who write the software
have rights to profit from it, just as people who write books have the sole right
to sell them. Copying software is depriving the rightful owners of software of
hard-earned wages.
Software piracy cannot be protected by the first amendment, because the first
amendment does not cover illegal activities. Just as yelling "Fire!" in a crowded
theater is not protected by the first amendment, neither is the distribution of
illegal software.
The claim that pirates have a right to make illegal copies of software because
the software is buggy, or too expensive, or not frequently used by the pirate, is
also flawed. Someone might think a Rolls-Royce is too expensive and not worth
the money, but this doesn't give him the right to steal it. Or, the fact that you
almost never watch television doesn't give you the right to steal a TV.
Pirating software costs everyone. Since not as many copies of software are
sold, the software manufacturers have to raise prices. This means that the
legitimate users are incurring higher costs due to piracy.
In short, piracy is not as "victimless" a crime as it may seem. Software
developers, distributors, and, ultimately, end users, are all hurt by piracy.
3.3.1.2 Ethical and Unethical Uses of Computers and Computer
Programs
The widespread use of computers has introduced a new level of insecurity into all
of our lives and provided most of us with new opportunities to engage in new
behaviors, many of which are (or at least have the potential of being) unethical.
64
Introduction to Computers – Chapter 3
3.3.1.2.1.1 Piracy
The issue of software piracy is dealt with at great length in another section,
but there is no question that accepting unauthorized copies of software,
and/or allowing friends and associates to make copies of software you have
purchased, would be illegal, in addition to being, at the very best,
questionable, ethically speaking.
3.3.1.2.1.2 Cyberbullying
Although bullying has always been a part of life, the emergence of social
networking has given enormously greater powers to would be bullies. (A
number of widely publicized incidents in which the victims were driven to
suicide can attest to this.)
Clearly the parents of possible victims have a responsibility to protect their
children from these online predators, but the parents of potential bullies
also have a moral/ethical responsibility to monitor their children, and to
prevent them from engaging in such behavior.
3.3.1.2.1.3 Plagiarism
Documents with all kinds of information are widely available on the
Internet (as well as images and videos) and software to copy from the online
documents and paste what was copied into documents of our own is also
generally available. It is easy to forget our ethical (and legal) duty to
attribute the source of what we are using.
There is also a booming cottage industry of people who will write papers
and do homework assignments for high school and college students.
Needless to say, submitting someone else’s work as one’s own is frowned
on by teachers everywhere, and must be considered an ethical violation.
65
Introduction to Computers – Chapter 3
66
Introduction to Computers – Chapter 3
Most victims of identity theft do not realize that they are victims until their
lives have been negatively impacted. Many people do not find out that their
identities have been stolen until they are contacted by financial institutions
or discover suspicious activities on their bank accounts. According to an
article by Herb Weisbaum, everyone in the US should assume that their
personal information has been compromised at some point. It is therefore
of great importance to watch out for warning signs that your identity has
been compromised.
3.3.1.2.2.2 Cyberbullying
A common definition of cyberbullying is "an aggressive, intentional act or
behavior that is carried out by a group or an individual, using electronic
forms of contact, repeatedly and over time against a victim who cannot
easily defend him or herself."
There are many variations of this definition. One such is from the National
Crime Prevention Council and is more specific: "the process of using the
Internet, cell phones or other devices to send or post text or images intended
to hurt or embarrass another person."
Components such as the repetition of the behavior and the power
imbalance between the bully and victim, and their applicability to
electronic harassment, are debated.
Cyberbullying is often similar to traditional bullying, although there are
some distinctions. Victims of cyberbullying may not know the identity of
their bully, or why the bully is targeting them. The harassment can have
wider-reaching effects on the victim than traditional bullying, as the content
used to harass the victim can be spread and shared easily among many
people, and often remains accessible for a long time after the initial
incident. The victim is also sometimes exposed to the harassment whenever
they use technology, as opposed to traditional harassment where the bully
often must be in physical proximity to the target.
3.3.1.2.2.3 Being Hacked
Many people get hacked and do not even have a clue about it, till it is too
late. If you do not want to have your computer hacked, you really have to
be on alert and remain vigilant for strange behavior in e-mail messages,
credit card statements and unusual computer behavior.
67
Introduction to Computers – Chapter 3
68
Introduction to Computers – Chapter 3
69
Introduction to Computers – Chapter 3
70
Introduction to Computers – Chapter 3
6
Encryption is the process of encoding a message or information in such a way that only
authorized parties can access it and those who are not authorized cannot. Encryption does not
itself prevent interference, but denies the intelligible content to a would-be interceptor. Computer
Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some
of their data in transit, and 53% utilized encryption for some of their data in storage. Most
modern encryption systems are public key systems. In public-key encryption schemes, the
encryption key is published for anyone to use and encrypt messages, but only the receiving party
has access to the decryption key that enables messages to be read. Public-key encryption was first
described in a classified document in 1973.Before then all encryption schemes were symmetric-
key (also called private-key). A publicly available public key encryption application called Pretty
Good Privacy (PGP) was written in 1991 by Phil Zimmermann, and distributed free of charge
with source code;
71
Introduction to Computers – Chapter 3
will be fixed eventually. How hard should we work to fix the problems that
somehow slipped into running code? Do we drop everything? How do we decide
whether a bug is serious enough to be fixed?
Isaac Asimov confronted this issue long ago when he wrote his laws of robotics and
inserted one that forbid a robot from doing nothing if a human would be harmed
through the robot's inaction. Of course his robots had positronic brains that could
see all the facets of a problem instantly and solve them. The questions for
developers are so complicated that many bugs go ignored and unfixed because no
one wants to even think about them.
Can a company prioritize the list fairly? Are some customers more important than
others? Can a programmer play favorites by choosing one bug over another? This
is even more difficult to contemplate when you realize that it's hard to anticipate
how much harm will come from any given bug.
3.3.2.6 Ethical dilemma No. 6: How much to code -- or compromise -- to
prevent misuse
The original Apple Web camera came with a clever mechanical extra, a physical
shutter that blocked the lens when it was off. The shutter and the switch were linked
together; there was no way to use the camera without opening the shutter yourself.
Some of the newer webcams come with an LED that's supposed to be illuminated
when the camera is activated. It usually works, but anyone who has programmed a
computer knows there may be a place in the code where the camera and the LED
can be decoupled. If that can be found, the camera can be turned into a spying
device.
The challenge for the engineer is anticipating misuse and designing to prevent it.
The Apple shutter is one of the obvious and effective examples of how it can be
done elegantly. When I was working on a book about cheating on the SAT, I met
one hacker who was adding networking software to his calculator. After some
deliberation, he decided to only support wired protocols because he was afraid kids
would sneak a calculator with Wi-Fi into an exam. By supporting only wired
protocols, he ensured that anyone in a test would need to run a wire to their
neighbor's machine. He hated skipping the wireless protocols, but he felt the risk of
abuse was too high.
3.3.2.7 Ethical dilemma No.7: How far to defend customers against data
requests
If you collect data, it's a safe bet that your organization will someday be caught
between serving your customers and serving the government. Requests to deliver
data to legal entities are becoming increasingly common, leaving more and more
software and services organizations to contemplate to what extent they will betray
their customers' privacy before the law. You can scrutinize these requests and even
hire your own lawyers to contest whether they are truly lawful, but the reality is that
the courts will be debating legalities long after your funding runs out.
There are no easy solutions. Some companies are choosing to leave the business
rather than lie to their customers. Others are trying to be more open about requests,
which the government often tries to forbid.
72
Introduction to Computers – Chapter 3
3.3.2.8 Ethical dilemma No.8: How to deal with the international nature of
the Internet
The Internet runs everywhere, avoiding many of the traditional barriers at the
borders. This can be a recipe for legal headaches when customers A and B are in
different countries. That's only the beginning, because servers C and D are often in
entirely different countries as well.
This leads to obvious ethical issues. Europe, for instance, has strict laws about
retaining personal information and views privacy breaches as ethical failures. Other
countries insist on companies keeping copious records on dealings. Whose laws
should a company follow when customers are in different countries? When data is
in different counties? When data is transferred across international lines?
Keeping up with every legal contingency can be Herculean, leaving many
organizations surely tempted to bury their heads in the sand.
3.3.2.9 Ethical dilemma No.9: How much to give back to open source
Everyone knows that open source is free. You don't pay anything and that's what
makes it so wonderful and complex. But not everyone contemplates the ethical
issues that come with using that free code. All of the open source packages come
with licenses and you need to follow them.
Some of the licenses don't require much sacrifice. Licenses like the Apache License
or the MIT License require acknowledgement and that's about it. But other licenses,
such as the GNU General Public License, ask you to share all your enhancements.
Parsing open sources licenses can present ethical challenges. One manager from a
big public company told me, "We don't distribute MySQL, so we don't owe anyone
anything." He was keying on the clause, written decades ago, that tied the license's
obligations to the act of redistributing software. The company used MySQL for its
Web apps, so he felt it could take without giving back.
There are no simple ways to measure the ethical obligations, and many
programmers have wasted many keystrokes arguing about what they mean. Still,
the entire endeavor will grind to a halt if people stop giving. The good news is that
it's often in everyone's best interest to contribute because everyone wants the
software to remain compatible with their use of it.
3.3.2.10 Ethical dilemma No.10: How much monitoring is really warranted
Maybe your boss wants to make sure the customers aren't ripping off the company.
Maybe you want to make sure you get paid for your work. Maybe some spooky guy
from the government says you must install a backdoor to catch bad guys. In every
case, the argument is filled with assurances that the backdoor will only be used, like
Superman's powers, to support truth and justice. It won't be used against political
enemies or the less fortunate. It won't be sold to despotic regimes.
But what if the bad guys discover the hidden door and figure out how to use it
themselves? What if your backdoor is used to support untruths and injustices? Your
code can't make ethical decisions on its own. That's your job.
73
Introduction to Computers – Chapter 3
74
Introduction to Computers – Chapter 3
3.1.1.4.2.3 ________ has the largest installed base of all general-purpose operating
systems.
3.1.1.5.2 In the iOS operating system, internal _________ are used by some
applications to respond to shaking the device or rotating it.
3.1.2 The term system software can also be used for software development tools
(like________, linkers and debuggers.)
3.2 __________ software (also called end-user programs) includes such things as
database programs, word processors, Web browsers and spreadsheets.
3.2 The collective noun application software refers to all applications collectively.
This distinguishes it from ________ software, which is mainly involved with
running the computer.
3.2 An application _______ consists of multiple applications bundled together.
They usually have related functions, features and similar user interfaces. They
are often able to interact with each other, e.g. open each other's files.
3.2 ________ Software can refer to video games, screen savers, programs to display
motion pictures or play recorded music.
3.3.1.1 Some pirates have cited their _____ amendment rights as an excuse for
piracy.
3.4.2 Multiple Choice
3. Computer programs (collectively known as Computer Software) can generally
be divided into two classifications:
a) System Software and User Software
b) System Software and Application Software
c) Network Software and User Software
d) Network Software and Application Software
e) none of the above
3. _________ software is software which provides an interface and services to users
and other software
a) System
b) User
c) Network
d) Application
e) none of the above
75
Introduction to Computers – Chapter 3
76
Introduction to Computers – Chapter 3
3.1.1.5.1 Android works with a user interface that is mainly based on direct
manipulation, using touch gestures that loosely correspond to real-world actions,
such as_________, to manipulate on-screen objects
a) swiping
b) tapping
c) pinching
d) all of the above
e) none of the above
3.2 Business applications often come in_______, e.g. Microsoft Office, LibreOffice
and iWork, which bundle together a word processor, a spreadsheet, etc
a) combos
b) suites
c) factions
d) all of the above
e) none of the above
3.4.3 True-False
3.1.1.2 In the early days of computing, CPU time was expensive, and peripherals
were very slow.
3.1.1.4 The earliest personal computers generally featured operating systems with
rather primitive command line interfaces.
3.1.1.4 Personal computers are intended to be operated directly by an end-user who
is not necessarily a computer expert or technician.
3.1.1.4.2 The first commercially available computer with a GUI was the Apple
Macintosh.
3.1.1.5 The vast majority of modern smartphones use one of three operating
systems: Android, Linux, or iOS.
3.2 A Web Browser is considered to be a systems program.
3.3.1.1 There are two contrasting ethical views on the issue of piracy, and both have
their valid points.
3.3.1.2.1.6 Some employers make it a practice to monitor employees’ activities
while at work.
3.3.1.2.2.1 The majority of identity theft victims do not realize that they are victims
until it has negatively impacted their lives.
3.3.1.2.2.2 Traditional bullying is much more serious than cyberbullying.
3.3.1.2.2.4 Computer viruses currently cause hundreds of thousands of dollars
worth of economic damage each year.
77
Introduction to Computers – Chapter 4
4 lxiiSystem Unit
In a desktop computer, most of the electronic components are housed
in an enclosure a called the lxiiisystem unit. These units are usually
rectangular, most are made of steel, aluminum and/or plastic.
lxiv
4.1 Motherboards
System Unit
A motherboard (also known as the mainboard or system board)
is the main printed circuit board (PCB) found in general purpose
microcomputers and other expandable systems.
It holds the electronic components of a system, such as the central
processing unit (CPU) and memory modules. The motherboard
allows communication between the components and provides
connectors for peripherals. Motherboard
The term Motherboard specifically refers to a PCB with expansion capability and
will typically have components attached to it. These peripherals might include
interface cards, sound cards, video cards, network cards, hard drives, and/or other
forms of persistent storage and a variety of other custom components.
lxv
4.1.1 CPU: Microprocessor
A central processing unit (CPU) is electronic circuitry
within a computer that carries out the instructions of a
computer program by performing the basic arithmetic,
logical, control and input/output (I/O) operations specified by
the instructions.
Principal components of a CPU include the arithmetic Microprocessor
logic unit (ALU) and the control unit. The ALU performs
arithmetic and logic operations, processor registers that supply operands to the
ALU and store the results of ALU operations. The control unit orchestrates the
fetching (from memory) and execution of instructions by directing the
coordinated operations of the ALU, registers and other components.
Most modern CPUs are contained on a single integrated circuit (IC) chip. (i.e. most
modern CPU’s are microprocessors.)
79
Introduction to Computers – Chapter 4
7
The first commercially available microprocessor (Intel 4004, released in 1971) was a 4 bit
processor.
80
Introduction to Computers – Chapter 4
8
(Nobody EVER refers to direct access memory as DAM. Everybody calls it RAM)
81
Introduction to Computers – Chapter 4
9
Information quoted from https://www.zdnet.com/article/eight-leading-quantum-computing-
companies-in-2020/
82
Introduction to Computers – Chapter 4
83
Introduction to Computers – Chapter 4
84
Introduction to Computers – Chapter 4
85
Introduction to Computers – Chapter 4
86
Introduction to Computers – Chapter 4
87
Introduction to Computers – Chapter 4
88
Introduction to Computers – Chapter 4
10
It is also common to use the lowercase letters: a, b, c, d, e and f instead of the uppercase letters
A-F
89
Introduction to Computers – Chapter 4
90
Introduction to Computers – Chapter 4
4.6.1.3 EBCDIC
IBM had difficulty adjusting their many card punch machines to accommodate
ASCII coding, and so developed their own coding system which they called
extended binary coded decimal interchange code (EBCDIC) which was more
compatible with their existing hardware. EBCDIC is an eight-bit character
encoding, and was created to extend the existing Binary-Coded Decimal (BCD)
Interchange Code (BCDIC).
EBCDIC was announced with the release of the IBM System 360. When the
system 360 became wildly successful, so did EBCDIC. Now all IBM mainframe
and midrange peripherals and operating systems use EBCDIC as their inherent
encoding.
4.7 Adapter cards:
An adapter card (expansion card, expansion board, or accessory card) is a printed
circuit board that can be inserted into an electrical connector, or expansion slot on a
computer motherboard to add functionality to a computer system via the expansion bus.
4.7.1 Expansion bus:
An expansion bus is a computer bus which moves information between the internal
hardware components of a computer system (including the CPU and RAM) and
peripheral devices. It is a collection of wires and protocols that supports the
expansion of the capabilities of a computer.
4.8 Bay:
The system unit of a desktop computer will normally have open spaces built in where
equipment such as disk drives can be installed.
These open spaces are called bays, or often drive bays.
A drive bay is a standard-sized area where hardware can be added to a computer.
Over the years since its introduction, the IBM PC and its compatibles have had
many form factors of drive bays. The form factors that have seen common use are
the 5.25", 3.5", 2.5" and 1.8" drive bays. These names do not refer to the width of
the bay itself, but rather to the sizes of the disks used by the drives that would be
mounted in these bays.
Drive bays are commonly used for the installation of disk drives, but they can also
be used for front-end USB ports, I/O bays, card readers, fans, fan controllers, RAID
controllers, tool storage, and many other things.
91
Introduction to Computers – Chapter 4
92
Introduction to Computers – Chapter 4
93
Introduction to Computers – Chapter 4
4.11 Questions
4.11.1 Completion
4. In a desktop computer, most of the electronic components are housed in an
enclosure a called the ______unit.
4.1 A(n) ________ is the main printed circuit board (PCB) found in general
purpose microcomputers and other expandable systems.
4.1.1 Most modern CPUs are _________ meaning they are contained on a single
integrated circuit (IC) chip.
4.2 Each word in computer memory has a unique_______, a number which is used
in identifying the cell to read or modify its contents.
4..4 ______memory, is random access memory (RAM) that a computer
microprocessor can access more quickly than it can access regular RAM.
4.5.1 _______is the term usually used to describe the small amount of memory on a
computer motherboard that stores the BIOS settings. Some of these BIOS
settings include the system time and date as well as hardware settings.
4.6.1.16 One of the earliest (and still one of the most commonly used) systems for
storing representations of characters in computer memory is______
4.6.1.2 ________is a computing industry standard for the consistent encoding,
representation, and handling of text expressed in most of the world's writing
systems.
4.7.1 An expansion bus is a computer bus which moves information between the
internal hardware of a computer system (including the CPU and RAM) and
peripheral devices. It is a collection of wires and _______ that allows for the
expansion of a computer.
4.8 A system unit will normally have open spaces built in where equipment such as
disk drives can be installed. These open spaces are called _______
4.9 In computer hardware, a(n) _______ serves as an interface between the
computer and other computers or peripheral devices.
4.9.1 A USB port is a standard cable connection interface for personal computers
and consumer electronics devices. USB stands for Universal Serial_______, an
industry standard for short-distance digital data communications.
94
Introduction to Computers – Chapter 4
95
Introduction to Computers – Chapter 4
4.1.1.3 ________ is a CPU design strategy based on the idea that with a larger,
more complex instruction set, programs can be written using fewer instructions,
and thus run faster.
a) FLOPS
b) ROM
c) RISC
d) CISC
e) none of the above
4.1.1.3 ________is a CPU design strategy based on the insight that a simplified
instruction set can provide higher performance. The simplified instruction set
allows the CPU to be optimized to execute these instructions more efficiently
a) FLOPS
b) ROM
c) RISC
d) CISC
e) none of the above
4.2.1.1 Each cell in computer memory has a unique _______, a number which is
used in identifying the cell to read or modify its contents
a) ID
b) address
c) locater
d) site
e) none of the above
4.3 An instruction cycle (sometimes called a fetch–decode–execute cycle) is the
basic operational process of a computer. It is the process by which a computer
retrieves a program instruction from its memory, determines what actions the
instruction dictates, and carries out those actions. This cycle is repeated
continuously by a computer's _________, from boot-up to when the computer is
shut down.
a) ALU
b) Ports
c) motherboard
d) CPU
e) none of the above
4.4 Cache memory is _______
a) fast but expensive
b) fast and cheap
c) slow and expensive
d) slow and cheap
e) none of the above
96
Introduction to Computers – Chapter 4
97
Introduction to Computers – Chapter 4
4.11.3 True-False
4.2.1 RAM is considered "random access" because it is hard to predict how long it
will take for the processor to access any given cell.
4.5 ROM access is slower than RAM access.
4.5 ROM is implemented using nonvolatile types of memory.
4.6 Computer designers have come to use analog equipment to store representations
of data.
4.6.1.1 ASCII codes use 8 bits.
4.8 Four form factors are in common use today, the 5.25", 3.5", 2.5" or 1.8" drive
bays. These names refer to the width of the disks used by the drives mounted in
these bays.
98
Introduction to Computers – Chapter 5
5. Input
In computing, an input device is a peripheral (a piece of computer hardware equipment)
used to produce/provide data and control signals for transfer into a computer.
Examples of input devices include keyboard, mouse, touchscreen, touchpad, scanner,
digital camera and joystick.
5.1 Keyboards
In computing, a lxixcomputer keyboard is a typewriter-style device
which uses an arrangement of buttons or keys that act as electronic
switches.
A keyboard typically has characters engraved or printed on the keys
and each press of a key typically corresponds to a single written
symbol.
Keyboard
While most keyboard keys produce letters, numbers or signs
(characters), other keys or simultaneous key presses can produce actions or cause the
computer to execute commands.
Despite the development of alternative input devices, such as the mouse, touchscreen,
pen devices, character recognition and voice recognition, the keyboard remains the most
commonly used device for direct (human) input of alphanumeric data into computers.
In normal usage, the keyboard is used for entry of text and numbers into word processors,
text editors and/or other programs.
Earlier keyboards had keypress interpretation built in (pressing a key would send the
ASCII code for the corresponding character) but in a modern computer the
interpretation of key presses is generally left to the software.
A computer keyboard distinguishes each physical key from every other and reports
all key presses to the controlling software.
Keyboards are also used for computer gaming, either with regular keyboards or by using
keyboards with special gaming features.
A keyboard can also be used to give commands to the operating system of a computer,
A well known example would be the Control-Alt-Delete combination, which, in
Microsoft Windows, will bring up a task window or shut down the machine.
Before the development of GUI’s (graphical user interfaces) users communicated with
their computers’ operating systems by typing commands with their keyboards. The
commands would be interpreted and executed by a command line interface.
A command-line interface is a type of user interface operated entirely by typing
commands on a keyboard (or possibly another device that does the job of a keyboard.)
99
Introduction to Computers – Chapter 5
100
Introduction to Computers – Chapter 5
101
Introduction to Computers – Chapter 5
102
Introduction to Computers – Chapter 5
103
Introduction to Computers – Chapter 5
104
Introduction to Computers – Chapter 5
5.2 Scanners
An image scanner - (usually abbreviated to just scanner) - is a device that optically scans
images and converts them to digital representations of the images. There are various
kinds of scanners. Among them are:
lxxii
flatbed scanners where the document is placed on a glass window for scanning.
lxxiii
Hand-held scanners, where the scanning device is moved by hand
lxxiv
3D scanners that are often used for industrial design, reverse engineering, test
and measurement, gaming, and other applications.
Color scanners that typically read RGB (red-green-blue color) data.
This data is processed with some proprietary algorithm to correct for
different exposure conditions and sent to the computer via the device's
input/output interface (usually USB).
Color depth (the number of bits that a scanner uses to represent colors in
its images) varies depending on the scanner but is usually at least 24 bits.
High quality models have 36-48 bits of color depth.
lxxv
Document scanners are scanners designed specifically to process collections
of loose leaf papers, usually just for text. These scanners generally have
document feeders, usually larger than those sometimes found on copiers
or all-purpose scanners. The main function of document scanners is to
capture the images of scanned documents or text and save these
images digitally to picture or PDF formats. Scanning technology
has advanced and most document scanners can distinguish
variations in color. Those with built-in optical character recognition
(OCR) software are able to convert images into editable text.
Optical character recognition (OCR) is the conversion of images of
typed, handwritten or printed text into machine-encoded text, whether
from a scanned document, a photo of a document, a scene-photo (for
example the text on signs and billboards in a landscape photo) or from
subtitle text superimposed on an image (for example from a television
broadcast). It is widely used as a form of information entry from
printed paper data records, whether passport documents, invoices,
bank statements, computerized receipts, business cards, mail, printouts
of static-data, or any suitable documentation. It is a common method
of digitizing printed texts so that they can be electronically edited,
searched, stored more compactly, displayed on-line, and used in
machine processes.
105
Introduction to Computers – Chapter 5
106
Introduction to Computers – Chapter 5
5.3.1 Mouse
A computer mouselxxvi is a pointing device. It is a small
object you can roll along a hard, flat surface. This motion
is translated into the movement of the cursor and allows
a smooth control of the graphical user interface.
Invented by Douglas Engelbart of Stanford Research
Center in 1963, and pioneered by Xerox in the 1970s,
the mouse is one of the great breakthroughs in Mouse
computer interaction.
Physically, a mouse is an object that will be held in the user's hand, and normally has
one or more buttons. Mice often also have other elements (such as "wheels") that
enable a wider range of input and additional control over the GUI.
The mouse is important for graphical user interfaces because you can simply point to
options and objects (move the cursor over them) and click on them (by pressing and
then releasing a mouse button.)
Applications that make use of these capabilities are often called point-and-click
programs.
The mouse is particularly useful for graphics programs that allow you to draw
pictures by using the mouse like a pen, pencil, or paintbrush.
There are three basic types of mice.
1. Mechanical mouse: Has a rubber or metal ball on its underside that can
roll in all directions. Mechanical sensors within the mouse detect the
direction the ball is rolling and move the screen pointer accordingly.
107
Introduction to Computers – Chapter 5
5.3.2 Trackball
A lxxviitrackball is a pointing device consisting of a ball held
by a socket containing sensors to detect a rotation of the ball.
(Like an upside-down mechanical mouse.)
The user rolls the ball with the thumb, fingers, or the palm
of the hand to move a pointer. Trackball
In some ways, a trackball will be better than a mouse:
At times, a mouse can reach an edge of its working area while the operator still
wishes to move the screen pointer farther. With a trackball, the operator just
continues rolling, whereas a mouse would have to be lifted and re-positioned.
Because trackballs for personal computers are stationary, they may require less
space for operation than a mouse and may be easier to use in confined or cluttered
areas. They are often preferred in laboratory settings for this reason.
Many people with a mobility impairment use trackballs as an assistive technology
input device. Access to an alternative pointing device has become even more
important for these people with the dominance of GUI type operating systems.
Trackball users often state that they are not limited to using the device on a flat
desk surface. Trackballs can be used while browsing a laptop while the user is in
bed or sitting in an armchair.
Trackballs are also useful for computing on boats (or other unstable platforms)
where an unexpected movement (like a rolling deck) could produce unintended
input.
5.3.3 Joystick
A joystick is a lever that moves in all directions and
controls the movement of the pointer/cursor. A joystick
works very much like a mouse, except that with a mouse
the cursor stops moving as soon as you stop moving the
mouse, but with a joystick, the pointer continues moving
in the direction the joystick is pointing. To stop the pointer,
you must return the joystick to its upright position.
Most joysticks include two buttons called triggers.
Joysticks are used mostly for computer games (the idea Joystick
is to emulate an aircraft flight control system), but they
are also used occasionally for CAD/CAM systems and other applications.
Joysticks are also used for controlling machines such as cranes, trucks, underwater
unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius
lawn mowers.
108
Introduction to Computers – Chapter 5
5.3.4 Touchscreen
A touch screen is a computer display screen that is also an input device. The screens
are sensitive to pressure.
A user interacts with the computer by touching pictures, icons or words on the
screen.
Smartphones use touchscreens almost universally, and they are becoming more
common on laptops as well.
There are three types of touch screen technology:
Resistive: A resistive touch screen panel is coated with a thin metallic electrically
conductive and resistive layer that causes a change in the electrical current
which is registered as a touch event and sent to the controller for processing.
Resistive touch screen panels are generally more affordable but offer only
75% clarity and the layer can be damaged by sharp objects. Resistive touch
screen panels are not affected by outside elements such as dust or water.
Surface wave: Surface wave technology uses ultrasonic waves that pass over the
touch screen panel. When the panel is touched, a portion of the wave is
absorbed. This change in the ultrasonic waves registers the position of the
touch event and sends this information to the controller for processing.
Surface wave touch screen panels are the most advanced of the three types,
but they can be damaged by outside elements.
Capacitive: A capacitive touch screen panel is coated with a material that stores
electrical charges. When the panel is touched, a small amount of charge is
drawn to the point of contact. Circuits located at each corner of the panel
measure the charge and send the information to the controller for processing.
Capacitive touch screen panels must be touched with a finger unlike resistive
and surface wave panels that can use fingers and stylus. Capacitive touch
screens are not affected by outside elements and have high clarity.
109
Introduction to Computers – Chapter 5
Examples of Gamepads
110
Introduction to Computers – Chapter 5
111
Introduction to Computers – Chapter 5
In the United States, the National Security Agency has made use of a type of speech
recognition for keyword spotting since at least 2006. This technology allows analysts to
search through large volumes of recorded conversations and isolate mentions of
keywords.
Neural networks have been used in many aspects of speech recognition such as phoneme
classification, isolated word recognition, audiovisual speech recognition, audiovisual
speaker recognition and speaker adaptation.
Automobiles: Simple voice commands may be used to initiate phone calls, select
radio stations or play music from a compatible smartphone, MP3 player or music-
loaded flash drive.
Medical documentation: Speech recognition can be implemented as front-end or
back-end of the medical documentation process. Front-end speech recognition is
where the provider dictates into a speech-recognition engine, the recognized
words are displayed as they are spoken, and the dictator is responsible for editing
and signing off on the document. With a back-end (or deferred) speech
recognition the provider dictates into a digital dictation system, the voice is routed
through a speech-recognition machine and the recognized draft document is
routed along with the original voice file to an editor, who edits the draft and the
report is finalized. Deferred speech recognition is widely used in the industry.
Telephony: Speech recognition is now commonplace In the field of telephony, and is
becoming more widespread in the fields of computer gaming and simulation.
Education: Speech recognition can be useful for learning a second language. It can
teach proper pronunciation, as well as help in developing fluency and speaking
skills.
Among these are Amazon Alexa, Microsoft Cortana, Apple Siri, and Nuance Dragon.
112
Introduction to Computers – Chapter 5
113
Introduction to Computers – Chapter 5
5.5 Questions
5.5.1 Completion
5. Examples of ______ devices include keyboards, mouse, scanners, digital cameras
and joysticks.
5. In computing, an input device is a(n) ________ (piece of computer hardware
equipment) used to provide data and control signals into a computer.
5.1 In computing, a computer keyboard is a(n) _________-style device which
uses an arrangement of buttons or keys to act as electronic switches.
5.1 In normal usage, the keyboard is used as a(n) ______entry interface.
5.1.1.3 The vast majority of flexible keyboards in the market are made from
_________
5.1.1.5 ________keyboards display an image of keys, usually with a laser, onto a
flat surface. The device then uses a camera or infrared sensor to "watch" where
the user's fingers move and will count a key as being pressed when it "sees" the
user's finger touch the projected image.
5.1.2.1 The common _______-based layout was designed early in the era of
mechanical typewriters, so its ergonomics were compromised to allow for the
mechanical limitations of the typewriter.
5.1.2.2 Proponents of the _______ keyboard claim the layout requires less finger
motion and reduces errors compared to the standard layout.
5.2 An image _______ is a device that optically scans images and converts them to
digital representations of the images.
5.3.5 Capturing data with a graphics tablet, by tracing or entering the corners of
linear poly-lines or shapes, is called ______
114
Introduction to Computers – Chapter 5
115
Introduction to Computers – Chapter 5
5.1.2.3 The ________ keyboard layout is used in France, Belgium and some
neighboring countries
a) QWERTZ
b) DVORAK
c) AZERTY
d) QWERTY
e) none of the above
5.2 An image scanner—usually abbreviated to just scanner—is a device that
optically scans images and converts them to digital representations of the
images. There are various kinds of scanners. Among them are:
________scanners where the document is placed on a glass window for
scanning
a) flatbed
b) window
c) document
d) industrial
e) none of the above
5.2 An image scanner—usually abbreviated to just scanner—is a device that
optically scans images and converts them to digital representations of the
images. There are various kinds of scanners. Among them are:
________ scanners that are often used for industrial design, reverse engineering,
test and measurement, gaming and other applications
a) flatbed
b) window
c) document
d) industrial
e) none of the above
5.3 A ______device is an input interface that allows a user to input spatial data to a
computer by controlling the position of a cursor on the computer display
a) cursor
b) spatial
c) pointing
d) all of the above
e) none of the above
5.3.1The most common pointing device is the _______
a) touchscreen
b) mouse
c) touchpad
d) trackball
e) none of the above
116
Introduction to Computers – Chapter 5
117
Introduction to Computers – Chapter 5
5.4.3 True-False
5.1 A keyboard typically has characters engraved or printed on the keys and each
press of a key typically corresponds to a single written symbol.
5.1 Despite the development of alternative input devices, such as the mouse,
touchscreen, pen devices, character recognition and voice recognition, the
keyboard remains the most commonly used device for direct (human) input of
alphanumeric data into computers.
5.1.1.1 The IEEE has established a standard computer keyboard design that all
manufacturers conform to.
5.1.1.2 Keyboards on laptops and notebook computers usually have a shorter travel
distance for the keystroke, shorter over travel distance, but always have the same
set of keys.
5.2 There are a number of different arrangements of alphabetic, numeric, and
punctuation symbols on keys of computer keyboards.
5.2 Document scanners produce very high resolution images.
5..3.3 Most joysticks include buttons called triggers.
5.3.4 Resistive touch screen panels are not affected by outside elements such as
dust or water.
5.3.4 Capacitive touch screens are not affected by outside elements and have high
clarity
5.3.6 Touchpads are a quite expensive and are found only on high end laptop
computers.
118
Introduction to Computers – Chapter 6
6 Output
After a computer has processed some data (by executing a program) it will probably be
desirable for the computer to produce some kind of tangible effect in the outside world. (It
should produce some kind of output.)
Users normally want to have some indication of what the computer is doing or has
done. (There is typically some reason for running the program, after all.)
Computers have come to be able to produce a number of different kinds of output. Some
of the general classes of computer output are text, graphics, tactile, audio, and video.
Text consists of characters that are used to create words, sentences, and paragraphs.
Video consists of images displayed sequentially at speeds fast enough to create the
appearance of full motion.
The great majority of the output produced by computers can be divided into two classes:
output that users can see (visual output) and output that users can hear (audio output.)
119
Introduction to Computers – Chapter 6
120
Introduction to Computers – Chapter 6
6.1.1.2.1 LCD
Most modern flat-panel displays use LCD (liquid crystal display)
technologies.
Light is passed through liquid crystals to create the pixels.
LCD screens are usually back-lit to make them easier to read in bright
environments. They are thin and light and provide good linearity and
resolution.
A thin layer of liquid crystal (a liquid having crystalline properties) is
sandwiched between two electrically conducting plates. The front plate has
transparent electrodes deposited on it, and the back plate is illuminated.
By applying electrical signals across the plates, different regions of the
liquid crystal can be activated, to control their polarization properties.
These segments can either transmit or block light. An image is produced
by passing light through selected segments of the liquid crystal to the
viewer. LCD’s are used in various kinds of electronic devices, including
watches, cellphones, and calculators, as well as notebook computers.
Liquid crystal displays are lightweight, compact, portable, and cheap. They are
also more reliable, and easier on the eyes than CRTs.
6.1.1.2.2 Gas Plasma
Very large displays often use plasma display technology.
A lxxxplasma display consists of two glass
plates separated by a thin gap filled with a
gas such as neon. Each of these plates has
several parallel electrodes running across
it. The electrodes on the two plates are at
right angles to each other. A voltage
applied between the two electrodes one on
each plate causes a small segment of gas at
the two electrodes to glow. The glow of gas
segments can then be maintained by a Plasma Display Technology
lower voltage continuously applied to all
electrodes.
121
Introduction to Computers – Chapter 6
122
Introduction to Computers – Chapter 6
OLED
123
Introduction to Computers – Chapter 6
OLED’s can be printed onto any suitable substrate by an inkjet printer or even by
screen printing, making them theoretically (at least in theory) cheaper to produce
than LCD or plasma displays (although the materials are more expensive than for
LCD’s.) OLED’s also have a much faster response time than LCD’s.
The biggest technical problem for OLEDs is that they have a much more limited
lifetime than do LCD’S or gas plasma displays. They are also much more subject
to water damage.
6.1.1.4 Projectors
lxxxii
A projector or image projector is an optical device
that projects an image (or moving images) onto a surface
(often a projection screen.)
The computer sends the image data to its video card,
which then sends the video image to the projector. Acer Projector
124
Introduction to Computers – Chapter 6
125
Introduction to Computers – Chapter 6
126
Introduction to Computers – Chapter 6
lxxxiv
6.1.2.2 Laser Printers
Laser printing is an electrostatic digital
printing process. It produces high-quality text
and graphics (but only moderate-quality
photographs.) Laser printing operates by
passing a laser beam back and forth over a
charged cylinder (called a "drum") to create an
electrostatic representation of the desired
image.
The drum then attracts electrically charged Diagram of a laser printer
powdered ink (called toner) and transfers this image onto paper. The paper is then
heated, fusing the ink onto the paper.
Laser printing differs from other printing technologies in that each page is always
rendered in a single continuous process without any pausing in the middle. Other
technologies can pause between characters and/or lines. A laser printer needs
enough memory to hold the bitmap image of an entire page.
Memory requirements increase with the square of the number of dots per inch.
During the 1980s, memory chips were still very expensive, which is why, at
that time, entry-level laser printers came with four-digit retail prices. Later,
memory prices plunged, and 1200 dpi laser printers have been widely available
in the consumer market since 2008.
Laser printers that print on plastic sheets, are also available.
6.1.2.3 Dot Matrix Printers
lxxxv
Dot matrix printing or impact matrix
printing is a kind of computer printing that
uses a print head that pushes wires against
an ink-soaked cloth ribbon to make dots on
the paper. Letters are drawn out of a dot
Dot Matrix
matrix, and varied fonts, as well as arbitrary
graphics can be produced.
Each dot is produced by a tiny metal rod, also called a "wire" or "pin", which is
extruded from the print head by the power of a tiny electromagnet or solenoid.
In the 1970s and 1980s, dot matrix impact printers were generally considered the
best combination of expense and versatility, and until the 1990s they were by far
the most common form of printer used with personal and home computers. They
are not, however, very quiet.
Dot matrix printers are still preferred where fan fold paper is desired and/or where
there is a requirement for multiple copies (since non-impact printers do not
support carbon copies.)
127
Introduction to Computers – Chapter 6
128
Introduction to Computers – Chapter 6
129
Introduction to Computers – Chapter 6
0123456789abcdxyzABCDXYZ
A commonly used san-serif font is named Ariel
0123456789abcdxyzABCDXYZ
6.1.3.2 Font-Style
The term “font-style” refers to whether a font is printed/displayed using any of a
few properties (each of which can be used in combination with any, or all, of the
others):
Bold
Italicized
Underlined
6.1.3.3 Font-Size
The font size (or text size) is the overall size (usually the height) of a font shown
on a screen or printed on a page.
130
Introduction to Computers – Chapter 6
Earbuds
Headset with Computer Speakers
microphone Headphones
131
Introduction to Computers – Chapter 6
6.3 Questions
6.3.1 Completion
6. After a computer executed a program, has processed some data, it will probably
be desirable for the computer to produce some kind of tangible effect in the
outside world; for it to produce some kind of _______
6.1.1 A(n) _________ creates a visual display for you to view from processed data.
6.1.1.2.2 A(n) _______display consists of two glass plates separated by a thin gap
filled with a gas such as neon.
6.1.1.3 A(n) ______ is a light-emitting diode (LED) in which the emissive
electroluminescent layer is a film of organic compound that emits light in
response to an electric current.
6.1.1.3 Flexible OLED’s are often used in ________ devices.
6.1.1.4 Most projectors create an image by shining a light through a small
transparent lens, but some newer types of projectors can project the image
directly, by using _______
6.1.2.2 _______printing differs from other printing technologies in that each page is
always rendered in a single continuous process without any pausing in the
middle, while other technologies like inkjet can pause every few lines.
6.1.2.4.1 A(n) ______ printer is a piece of computer software whose user interface
and API resembles that of a printer driver, but which is not connected with a
physical computer printer. It can be used to create a file which is an image of the
data which would be printed, for archival purposes or as input to another
program.
6.1.2.4.5 _______printers are widely used in cash registers, ATMs, gasoline
dispensers and some older inexpensive fax machines.
6.1.2.4.7 Pen-based ______were an alternate printing technology once common in
engineering and architectural firms.
6.1.3.1 A(n) ______is a small line attached to the end of a stroke in a letter or
symbol.
6.1.3.3 There are approximately ___________ points in one inch.
6.2 _________are designed to allow a single user to listen to an audio source
privately, in contrast to a speaker, which emits sound into the open air, for
anyone nearby to hear.
132
Introduction to Computers – Chapter 6
133
Introduction to Computers – Chapter 6
6.1.2.2 ________ printing differs from other printing technologies in that each page
is always rendered in a single continuous process without any pausing in the
middle, while other technologies can pause every few lines
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.3 ________ printing is a type of computer printing which uses a print head
that prints by impact, striking an ink-soaked cloth ribbon against the paper
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.3 In the 1970s and 1980s, __________ printers were generally considered the
best combination of expense and versatility, and until the 1990s they were by far
the most common form of printer used with personal and home computers
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.2.4.3 ________ printers are most commonly used as color office printers, and
are excellent at printing on transparencies and other non-porous media
a) Dot matrix
b) Inkjet
c) Laser
d) Thermal
e) none of the above
6.1.3.3 The font size (or text size) is the overall size (generally height) of a font
shown on a screen or printed on a page. A font is typically measured in:
a) pt
b) px
c) pc
d) em
e) none of the above
134
Introduction to Computers – Chapter 6
135
Introduction to Computers – Chapter 7
7 Storage
Computer data storage, often called storage or memory, is technology consisting of
computer components and recording media used to retain/store digital data. It is a core
function and fundamental component of computers.
In practice, almost all computers use a
storage hierarchy, which puts fast but
expensive (and small) storage options
closer to the CPU and slower but larger
and cheaper options farther away.
Generally, the fast but volatile
technologies (which lose data when
power is turned off) are referred to as
"memory" (sometimes primary
storage), while persistent, but slower,
technologies are referred to as
"storage"; or “secondary storage”.
Secondary storage (also known as external memory or auxiliary storage) also differs
from primary storage in that it is not directly accessible by the CPU.
The computer system usually uses its input/output channels to access secondary
storage and transfers the desired data into and out of intermediate areas (buffers) in
primary storage (memory/RAM).
Secondary storage does not lose the data when the device is powered down—it is
non-volatile.
Secondary storage is typically also two orders of magnitude less expensive than
primary storage (memory/RAM).
Modern computer systems typically have two orders of magnitude more secondary
storage than primary storage.
In modern computers, hard disk drives are by far the most common form of secondary
storage, although solid-state drives (SSD’s) are fast gaining in popularity. Some other
examples of secondary storage technologies are optical disk drives, flash memory
(e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched
cards, standalone RAM disks, and Iomega Zip drives.
137
Introduction to Computers – Chapter 7
device used for storing and retrieving digital information using one or more rigid
("hard") rapidly rotating disks (called platters) coated with ferromagnetic material.
The platters are paired with magnetic heads arranged on a movable actuator arm. These
heads can read and write data from/to the platter surfaces.
The surfaces of each of the platters are divided into circular “tracks” and each track is
subdivided into a number of “sectors”. The actuator arm can move relatively quickly to
the track where given data is (or is to be) stored, and then the disk will rotate to where
the appropriate sector passes by the read/write head.
138
Introduction to Computers – Chapter 7
The two most common form factors for modern HDDs are 3.5-inch, for desktop
computers, and 2.5-inch, primarily for laptops. HDDs are connected to systems by
standard interface cables such as PATA (Parallel ATA), SATA (Serial ATA), USB
or SAS (Serial attached SCSI) cables.
Introduced by IBM in 1956, HDDs had become the dominant secondary storage
device for general-purpose computers by the early 1960s. Continuously improved,
HDDs have maintained this position into the modern era, although SSD’s are now
beginning to challenge their dominance.
As the 1980s began, HDDs were a rare and very expensive additional feature on
personal computers, but by the late 1980s their cost had been reduced to the point
where they had become standard on all but the cheapest computers.
Most HDDs in the early 1980s were sold to end users as external, add-on
subsystems. These subsystems were not sold under the drive manufacturer's name
but under the subsystem manufacturer's name
such as Corvus Systems and Tallgrass Technologies,
or under the name of the computer system
such as the Apple ProFile.
In 1983, the IBM PC/XT came out with an internal 10 MB HDD included, and soon
thereafter personal computers with internal HDDs started becoming much more
common.
7.1.1 RAID
Random Array of Inexpensive Disks
When relatively inexpensive (albeit smaller and, in many cases less reliable) hard
disks started to be marketed, it was recognized that by using several smaller hard
disks instead of just one large disk, one could create a system having a large
capacity, without the (often extreme) expense of a high capacity drive.
Such a system could have several advantages:
Price: It was usually possible to buy large storage capacity for less money as
a combination of smaller cheaper drives than a single high capacity drive
would cost. The smaller drives were manufactured in large quantities, resulting
in economies of scale. The smaller drives were also more readily available.
Reliability: With several different drives, it would be possible to put duplicate
data on more than one drive. Then, if one drive were to fail, its data would not
be lost.
Access Speed: With data in a large file stored on different drives, the system
can read different portions of the file from the different drives simultaneously.
This could result in faster upload times than would be possible with a single
drive.
139
Introduction to Computers – Chapter 7
In a RAID system, data can be distributed across the drives in several different
ways and these different storage systems are referred to as RAID levels. The
different RAID levels vary according to redundancy and performance.
The different schemes, or data distribution layouts, are named by the word
RAID followed by a number,
for example RAID 0 or RAID 1.
Each scheme, or RAID level, provides a different balance among the key
goals: reliability, availability, performance, and capacity.
RAID levels greater than RAID 0 provide protection against unrecoverable
sector read errors, as well as against failures of whole physical drives.
7.2 Solid-State Drives
A solid-state drive (SSD) is a solid-state storage device that uses integrated circuit
assemblies to store data persistently. Such a device would function as secondary storage
in the hierarchy of computer storage. They are also sometimes called solid-state devices
or even solid-state disks (even though SSDs lack the physical spinning disks and
movable read–write heads used by HDDs and floppy disks.)
Compared with electromechanical drives, SSDs are typically more resistant to physical
shock, run silently, and have quicker access times.
Unlike a hard drive, an SSD has no moving parts, which gives it its advantages, such as
faster access time, noiseless operation, higher reliability, and lower power consumption.
As the costs have come down, SSDs have become suitable replacements for a standard
hard drive in both desktop and laptop computers. SSDs are also a solution for
applications that don't require a lot of storage. Since SSDs were first released, major
improvements were made, prices have decreased, and storage capacities have increased.
SSD’s with capacities over 4 TB are currently available for home computers.
7.3 Optical Storage Devices
lxxxix
Optical storage is the storage of data on an optically readable medium. Data is
recorded by making marks in a pattern that can be read back using light, usually a beam
of laser light, precisely focused on a spinning optical disc.
Rotating optical storage devices, such as CD and DVD
drives, have even longer access times than do hard disk
drives.
The three most common optical media are CD, DVD and
Blu-ray. CDs store about 300,000 pages of text or roughly
700 MB. DVDs are commonly used for movies and hold
CD/DVD Disk Drive
around 4.7 GB of memory. Blu-ray has five times the
storage of DVD and is used for high-definition (HD) movies. On a single-layer disc,
Blu-ray can hold 25GB of data, and a dual-layer disc can hold 9 hours of an HD
movie or about 50GB of data.
140
Introduction to Computers – Chapter 7
141
Introduction to Computers – Chapter 7
142
Introduction to Computers – Chapter 7
143
Introduction to Computers – Chapter 7
This format became the most popular of the “superfloppy” products which filled
a niche in the portable storage market in the late 1990s.
However, the zip drive was never popular enough to replace the 3.5-inch floppy
disk. Later versions of the disc matched the capacity available on rewritable CDs
but were later far surpassed by rewritable DVDs.
Zip drives fell out of favor for mass portable storage during the early 2000s.
144
Introduction to Computers – Chapter 7
145
Introduction to Computers – Chapter 7
146
Introduction to Computers – Chapter 7
147
Introduction to Computers – Chapter 7
148
Introduction to Computers – Chapter 7
149
Introduction to Computers – Chapter 7
7.4.2 Magnetic tape remains a viable alternative to disk in some situations due to
a) lower cost per bit
b) faster data access
c) greater storage density
d) all of the above
e) none of the above
7.4.2 _________ have/has historically offered enough advantage in cost over disk
storage to make it a viable product, particularly for backup, where media
removability is necessary
a) Punched cards
b) Punched paper tape
c) Magnetic tape
d) all of the above
e) none of the above
7.4.3 It was common to find a selection of _______ containing useful programs in
most minicomputer installations
a) Punched cards
b) Punched paper tape
c) Magnetic tape
d) all of the above
e) none of the above
7.4.5 The _______ format became the most popular of the superfloppy products
which filled a niche in the late 1990s portable storage market
a) CD
b) cloud
c) ZIP
d) RAID
e) none of the above
7.9.3 True-False
7. In practice, almost all computers use a storage hierarchy, which puts fast but
expensive (and small) storage options close to the CPU and larger and more
expensive options farther away.
7. Generally, the fast but volatile technologies (which lose data when off power) are
referred to as "memory", while slower persistent technologies are referred to as
"storage".
7.1 Hard disks are typically about a million times faster than memory.
7.1 Most HDDs in the early 1980s were sold to PC end users as an external, add-on
subsystem.
150
Introduction to Computers – Chapter 7
7.1.1. In a RAID system, data can be distributed across the drives in one of several
ways, referred to as RAID levels.
7.3 USB flash drives are immune to electromagnetic interference (unlike floppy
disks) and are unharmed by surface scratches (unlike CDs).
7.4.4 By 1950 punched cards had been replaced by magnetic tape throughout
almost all industry and government.
151
Introduction to Computers – Chapter 8
11
https://www.britannica.com/technology/Internet
153
Introduction to Computers – Chapter 8
The openness of design has enabled the Internet architecture to grow to a global
scale.
In practice, an individual will often access the Internet from his home, using a
modem to connect to a local Internet service provider (ISP).
The ISP connects to a regional network which, in turn, connects to a national
network.
In an office, a computer (often a desktop computer) might be connected to a
local area network and the company would have a corporate intranet, which,
in turn, might connect to any of several national Internet service providers.
In general, small local Internet service providers connect to medium-sized
regional networks which connect to larger national networks, which then
connect to very large high bandwidth12 networks which make up what is called
the Internet backbone.
Most ISP’s have several redundant network cross-connections to other
providers in order to ensure continuous availability.
The companies running the Internet backbone operate very high bandwidth
networks relied on by governments, corporations, large organizations, and
other Internet service providers. Their physical infrastructures often include
global connections through underwater cables and satellite links. These
connections enable communication between different countries and
continents.
8.1.3 Internet Services
One of the reasons that the Internet has had such a profound effect is that it provides
a number of valuable “services” for its users.
Among these services are e-mail, file transfer protocol (FTP), instant messaging
(IM), voice over internet protocol (VoIP), Chat Rooms, and (probably most widely
known) the World Wide Web (WWW)
12
The term bandwidth is often used to describe the amount of data transferred to or
from the website or server within a prescribed period of time. It is usually described
as a number of bits per second. This usage is technically incorrect, but very
common.
154
Introduction to Computers – Chapter 8
13
Microsoft has replaced Internet Explorer with another browser, Microsoft Edge, and, as of 2020,
has discontinued support for Explorer.
155
Introduction to Computers – Chapter 8
156
Introduction to Computers – Chapter 8
157
Introduction to Computers – Chapter 8
158
Introduction to Computers – Chapter 8
8.2 E-Commerce
The term E-commerce (also written as e-Commerce, eCommerce or similar variations)
refers to trading in products or services using computer networks, such as the Internet.
When done properly, ecommerce is often faster, cheaper, and more convenient than
the traditional methods of buying and selling goods and services.
E-commerce is usually divided into three classifications: Business-to-Consumer (B2C),
Consumer-to-Consumer (C2C) and Business-to-Business (B2B).
8.2.1 Business-to-Consumer (B2C)
B2C refers to transactions in which a consumer (user) purchases goods or services
from a business.
Amazon.com is currently the largest company specializing in online B2C business.
8.2.1.1 Online shopping
Online shopping (sometimes known as e-tail from "electronic retail" or e-
shopping) is a form of electronic commerce which allows consumers to buy goods
or services from a seller over the Internet using a web browser. (Some related
terms are: e-web-store, e-shop, e-store, Internet shop, web-shop, web-store, online
store, online storefront and virtual store.)
An online shop evokes the physical analogy of buying products or services at a
bricks-and-mortar retailer or shopping center.
Even to the point of providing an electronic “shopping cart” to allow users to
select several items to purchase before paying for their entire selection.
8.2.2 Consumer-to-Consumer (C2C)
C2C refers to transactions in which one individual (a consumer) purchases goods and
or services from another individual (not a company.)
eBay Inc. is a multinational corporation and e-commerce company, providing
consumer to consumer (as well as business to consumer) sales services via Internet.
8.2.3 Business–to-Business (B2B)
Business to Business or B2B refers to electronic commerce between businesses rather
than between a business and consumers. B2B businesses often deal with hundreds or
even thousands of other businesses, either as customers or suppliers. Carrying out
these transactions electronically provides vast competitive advantages over
traditional methods.
The number of B2B e-commerce transactions is much greater than the number of
B2C and C2C transactions.
159
Introduction to Computers – Chapter 8
14
www.forbes.com/sites/forbesfinancecouncil/2017/10/24/
160
Introduction to Computers – Chapter 8
161
Introduction to Computers – Chapter 8
162
Introduction to Computers – Chapter 8
163
Introduction to Computers – Chapter 8
8.2.4.3 Cryptocurrencies
Cryptocurrencies are a kind of (alternative) digital currency. Cryptocurrencies use
decentralized control as opposed to centralized electronic money and central
banking systems. The decentralized control of each cryptocurrency works through
distributed ledger technology, (typically a blockchain15) that serves as a public
financial transaction database.
15
A blockchain is a continuously growing list of records, called blocks, which are linked and secured
using cryptography. Each block typically contains a pointer as a link to a previous block, a
timestamp and transaction data. By design, blockchains are inherently resistant to modification
of the data.
164
Introduction to Computers – Chapter 8
8.2.4.3.1 NFT’s
The blockchain technology used by cryptocurrencies is also used to
implement “non fungible tokens” (NFT’s.)
As with cryptocurrency, these tokens are stored on a shared ledger
implemented as a blockchain and provide records of who owns something.
The records cannot be forged because the ledger is maintained by thousands
of computers around the world.
The digital tokens are used as certificates of ownership for assets (usually
virtual assets.) NFTs are "one-of-a-kind" assets in the digital world that can
be bought and sold like any other piece of property, but which have no
tangible form of their own. They have come into prominence for their use as
proof of ownership of “original copies” of works of digital art and have
traded for millions of dollars.
NFTs can also contain smart contracts that may give the artist, for example,
a cut of any future sale of the token.
8.3 Wikis
A wiki is a website which allows collaborative modification of its content and structure.
The encyclopedia project Wikipedia is by far the most popular wiki-based website, and
is, in fact, one of the most widely viewed sites of any kind of the world.
Wikis are generally designed with the philosophy of making it easy to correct mistakes,
rather than avoiding mistakes in the first place.
Critics of publicly editable wiki systems argue that these systems could be easily
tampered with, while proponents argue that the community of users will (usually)
catch malicious content and correct it quickly.
8.4 Blogs
A blog (a truncation of the expression web log) is a discussion or informational site
published on the World Wide Web and consisting of entries ("posts") typically displayed
in reverse chronological order (the most recent post appears first.) The term
“blogosphere” is commonly used to refer to the collection of all blogs together as a
connected community.
Until 2009, blogs were usually the work of single individuals, and often covered single
subjects.
More recently "multi-author blogs" (MAB’s) have developed These typically have posts
written by large numbers of authors but are professionally edited.
The emergence and growth of blogs in the late 1990s coincided with the advent of web
publishing tools that facilitated the posting of content by non-technical users. Before
165
Introduction to Computers – Chapter 8
this, creating and posting on a blog required some sophistication on the use of the
Internet, and most blogs tended to emphasize technical and computer oriented themes.
A majority of blogs are interactive, allowing visitors to leave comments and even
message each other on the blogs. In this sense, blogging can be seen as a form of social
networking.
Many bloggers report some sort of income from their blogs. This is most often in the
form of ad revenue, but paid speaking engagements are also common.
8.5 Podcasts and Webcasts
A podcast is a form of digital media that consists of a series of audio or digital radio
episodes, subscribed to and downloaded through web syndication or streamed online to
a computer or mobile device. The term podcast is made by combining words "pod" and
"broadcast.
A webcast is a media presentation distributed over the Internet using streaming media
technology to distribute a single content source to many simultaneous listeners/viewers.
A webcast may either be distributed live or on demand. Essentially, webcasting is
“broadcasting” over the Internet.
Webcasting differs from podcasting in that webcasting refers to live streaming while
podcasting simply refers to media files being made available on the Internet.
8.6 Surfing the Web
Viewing a web page on the World Wide Web normally begins either by typing the URL
of the page into a web browser, or by following a hyperlink to that page or resource. The
web browser then initiates a series of background communication messages to fetch and
display the requested page.
In the 1990s, using a browser to view web pages—and to move from one web page to
another through hyperlinks—came to be known as 'web surfing'.
8.7 Using Search Engines
Since there are millions (billions?) of Web pages, nobody could possibly remember the
URL’s of all of them. For this reason, (and probably other reasons as well) programs
known as search engines were developed to help users find documents that they might
be interested in.
Search engines are programs that search for documents using specified keywords. They
return lists of the documents where these keywords were found.
The term search engine really refers to a general class of programs, but the term is
often used to specifically describe systems like Google, Bing and Yahoo! Search.
Systems that enable users to search for documents on the World Wide Web.
166
Introduction to Computers – Chapter 8
167
Introduction to Computers – Chapter 8
There are many other Social networking sites outside of the US: Nexopia in Canada;
Badoo, Bebo, Vkontakte (Russia), Delphi, Draugiem.lv (Latvia), iWiW (Hungary),
Nasza-Klasa (Poland), Soup (Austria), Glocals in Switzerland, Skyrock, The Sphere,
StudiVZ (Germany), Tagged, Tuenti (mostly in Spain), Myspace, Xanga and XING
in parts of Europe; Hi5 in South America and Central America; Mxit in
Africa;Cyworld, Mixi, Renren, Friendster, Sina Weibo and Wretch in Asia and the
Pacific Islands.
There have been attempts to standardize these services to avoid the need to
duplicate entries of friends and interests (the FOAF standard and the Open Source
Initiative.)
A 2013 survey found that 73% of U.S adults use social networking sites.
8.9 How the Web Works
The functioning of the World Wide Web requires the support of many different
structures, both physical and conceptual/intellectual.
8.9.1 HTML
HyperText Markup Language, commonly referred to as HTML, is the standard
language used to create web pages. Web browsers can read HTML files and interpret
them as code describing visible (and/or audible) web pages.
HTML is used to describe the structure of a website.
HTML elements form the building blocks of all websites.
HTML allows images and objects to be embedded and can be used to create
interactive forms.
It provides a means to create structured documents by denoting structural code
for text, describing such things as headings, paragraphs, lists, links, quotes,
and other items.
8.9.2 Firewalls
In the late 1980’s, people working in computer science became aware of the need for
network security to protect the computers and data on their networks.
Worms and viruses were beginning to proliferate, and hackers were starting to
attempt to gain access to the networks, some with purely malicious intent to
damage the systems, and others hoping to gain access to the information stored in
the system.
One of the security techniques that has been developed to protect networks is the
firewall.
There are two kinds of firewalls: network firewalls and host-based firewalls.
A network firewall is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined security rules.
A network firewall typically establishes a barrier between one network and
other outside networks.
Host-based firewalls provide software on a host that controls network traffic
in and out of that single machine.
168
Introduction to Computers – Chapter 8
8.9.3 Routers
Computers (on networks) must send and receive
information to and from computers, often computers
on other networks. It is the function of devices called
routers to determine where to send and whether to
accept/receive such information.
A router is a networking device that forwards data Typical home router
packets between computer networks. Routers perform
the "traffic directing" operations on the Internet.
Information to be transmitted to other computers is divided into data packets.
Each data packet is typically forwarded from one router to another through the
networks that constitute the internetwork until it reaches its destination node.
A router is connected to two or more data lines from different networks (as
opposed to a network switch, which connects the data lines of one single network).
When a data packet comes in on one of the lines, the router reads the address
information in the packet to determine its ultimate destination. Then, using
information in its routing table or routing policy, it directs the packet to the next
network on its journey.
8.9.4 Servers
Recall from chapter 2, that:
A server is a computer that receives and responds to requests from client
machines. The server provides services to clients, usually by sending information
of some kind or receiving and processing information of some kind.
In context of the World Wide Web, a server is typically a computer (connected to the
Internet, of course) on which a number of Web pages are stored, and which will send
a copy of a page when it receives a request.
8.9.4.1 Dark Web
Most of the Web pages on the Internet are accessible by means of links in other
pages and/or can be found using search engines. There are, however a large
number of Web sites that are hidden from such searches. These “Darknet”
websites are accessible only through specific encryption protected networks.
Two examples of such networks are Tor ("The Onion Routing" project) and
I2P ("Invisible Internet Project".)
Tor browser and Tor-accessible sites are widely used among the darknet users
and can be identified by the domain ".onion".
While Tor focuses on providing anonymous access to the Internet, I2P specializes
on allowing anonymous hosting of websites.
169
Introduction to Computers – Chapter 8
Identities and locations of darknet users stay anonymous and cannot be tracked
due to the layered encryption system. The darknet encryption technology routes
users' data through a large number of intermediate servers. This protects the users'
identity and guarantees anonymity. The transmitted information can be decrypted
only by a subsequent node in the scheme, which leads to the exit node. The
complicated system makes it almost impossible to reproduce the node path and
decrypt the information layer by layer. Because of the high level of encryption,
websites are not able to track geolocation and IP of their users, and users are not
able to get this information about the hosts. Thus, communication between
darknet users can talk, blog, and share files confidentially.
The darknet is often used for illegal activity such as illegal trade, and media
exchange for pedophiles and terrorists.
8.9.5 TCP, UDP and IP
The Transmission Control Protocol (TCP) is a core protocol of the Internet.
It originated in the initial network implementation in which it worked together with
the Internet Protocol (IP)
The combination is commonly referred to as TCP/IP.
TCP provides reliable, ordered, and error-checked delivery of a stream of packets
between applications running on hosts communicating over an IP network and is
the protocol used by major Internet applications/services such as the World Wide
Web, email, remote administration and file transfer.
The User Datagram Protocol (UDP) is another widely used protocol of the
internet.
UDP also provides delivery of a stream of packets between applications running
on hosts communication over an IP network. The UDP packets, however, are
not error checked. UDP is used for applications such as Internet telephony in
which the time of arrival is important, and the loss or miscommunication of
occasional packet can be tolerated.
8.9.6 Local Area Networks
As personal computers have become cheaper and easier to use, it is increasingly
common for a family to have several computers in their home. These computers, then,
are often connected to each other to facilitate intercommunication.
Such a group of interconnected computing devices forms what we call a local
area network (LAN.)
Connecting the devices in a LAN allows the users to transfer information from one
computer to another easily. It also allows them to share access to resources, such as
printers and internet access devices.
In addition to computers and printers, LAN’s often include such devices as
routers, modems and gateways.
Devices in a LAN will typically communicate by means of either a physical
medium (typically twisted pair cable) or radio waves (WIFI).
170
Introduction to Computers – Chapter 8
8.9.6.1 Intranet
The TCI/IP protocols can also be used for private local networks. Such networks
are called intranets. Intranets can be connected to the Internet or can be completely
isolated.
An intranet's websites and software applications look and act just like those on
any other kind of network.
8.9.6.2 Extranet
If an intranet is connected to the Internet, its websites and software are typically
protected by a firewall and are inaccessible from outside. When a company allows
external access to part of its intranet (for example, some parts might be accessible
to customers or suppliers outside the company) it is called an extranet.
xcviii
8.9.6.3 Twisted Pair
Twisted pair cabling is a type of wiring in which two
conductors of a single circuit are twisted together for the
purposes of canceling out electromagnetic interference
(EMI).
It was invented by Alexander Graham Bell.
Twisted Pair Cable
8.9.6.4 WIFI
Wi-Fi (or WiFi) is a local area wireless computer networking technology that
allows electronic devices to connect to the network, mainly using the 2.4 gigahertz
(12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands.
Many devices can use Wi-Fi, e.g. personal computers, video-game consoles,
smartphones, digital cameras, tablet computers and digital audio players. These
can use wireless technology to connect to other network resources such as
printers, modems, routers, access points and/or gateways.
8.9.6.4.1 WIFI Encryption
Wireless networks are generally not as secure as wired networks. Wired
networks, at their most basic level, send data between two devices that are
connected by a network cable. Wireless networks, on the other hand, broadcast
data in every direction to every device (within range) that happens to be
listening.
Several wireless security protocols have been developed to protect the home
wireless networks. These wireless security protocols include WEP, WPA, and
WPA2.
In addition to preventing uninvited guests from connecting to your wireless
network, wireless security protocols encrypt your private data as it is being
transmitted over the airwaves.
171
Introduction to Computers – Chapter 8
16
In software design, look and feel is a term used with respect to a GUI and comprises
aspects of its design, including elements such as colors, shapes, layout, and typefaces
(the "look"), as well as the behavior of dynamic elements such as buttons, boxes, and
menus (the "feel"). The term can also refer to aspects of a non-graphical user interface
(such as a command-line interface), as well – mostly to parts to its functional properties.
The term is used in reference to both software and websites. “Look and feel” also
applies to other products. In documentation, for example, it refers to the graphical layout
(document size, color, font, etc.) and the writing style. In the context of equipment, it
refers to consistency in controls and displays across a product line.
172
Introduction to Computers – Chapter 8
17
This section was copied from the University of Phoenix Web Site
173
Introduction to Computers – Chapter 8
• Be friendly. Remember that even though you can’t see the person you’re connecting
with online, you’re still connecting with someone. Before posting a comment, ask
yourself “Would I say this to a person face to face?” If the answer is “no,” don’t post
it.
• Avoid responding when emotions are running high. If you’re angry about
something someone has posted, don’t reply to their message until you’ve had a chance
to calm down. Remember, your posted messages can be seen by everyone, even
potential employers.
• Before posting anyone’s picture on any social networking site, get the person’s
permission. Give your friends, family members and co-workers the opportunity to
control their digital selves.
8.10.1.2 Emoticons
Writers often use “emoticons” to convey their feelings in electronic
communications like text messages, e-mails and message boards. Emoticons
blend text and punctuation together to visually portray facial expressions.
(Tilt your head slightly to the left to read the following emoticons
• :-) Smiling
• ;-) Winking and smiling
• :-D Laughing
• :-( Frown
• :-o Oh!
174
Introduction to Computers – Chapter 8
8.10.1.3 Hashtags
A hashtag is a type of tag used on social networks allowing users to apply
dynamic, user-generated tagging that makes it possible for others to find messages
with specific themes or content Hashtags allow easy, informal markup.
Users create and use hashtags by placing the number sign or pound sign # (also
known as the hash character) in front of a string of alphanumeric characters,
usually a word or unspaced phrase, in or at the end of a message. The hashtag may
contain letters, digits, and underscores Searching for a hashtag will yield each
message that has been tagged with it.
The use of hashtags originated on Twitter but quickly spread to other social media,
and later into the popular culture.
8.10.2 Computer Security
Computer security (also known as cybersecurity or IT security) is the protection
of information systems from theft or damage to the hardware, the software, and to
the information on them, as well as from disruption or misdirection of the services
that the systems provide.
Computer security includes controlling physical access to the hardware, as well
as protecting against harm that may come through network access and
unauthorized injection of data and code.
It also involves protection against harm through malpractice by operators,
whether intentional, accidental, or having been tricked into deviating from
secure procedures.
The field of computer security is of growing importance due to the increasing reliance
of computer systems in most societies.
Computer systems now include a very large range of portable devices,
including not only laptop computers, but also as a wide variety of "smart" devices,
smart devices such as smartphones, smart televisions and many tiny devices
participating in the Internet of Things.
These are frequently easy targets for thieves.
Networks include not only the Internet and private data networks, but also
Bluetooth, Wi-Fi and other wireless networks which are, in many cases, very
public and easy to hack.
Computer security covers all the processes and mechanisms by which digital
equipment, information and services are protected from unintended or unauthorized
access, change or destruction and the process of applying security measures to ensure
confidentiality, integrity, and availability of data.
175
Introduction to Computers – Chapter 8
176
Introduction to Computers – Chapter 8
18
A backdoor is a method, often secret, of bypassing normal authentication. Backdoors are often
used for securing remote access to a computer.
19
Denial of service is typically accomplished by flooding the targeted machine or resource with
superfluous requests in an attempt to overload systems and prevent some or all legitimate
requests from being fulfilled. In a distributed denial-of-service attack (DDoS attack), the
incoming traffic flooding the victim originates from many different sources. This makes it
impossible to stop the attack simply by blocking a single source.
177
Introduction to Computers – Chapter 8
178
Introduction to Computers – Chapter 8
8.10.2.2.6 Adware
Adware, or advertising-supported software, is any software package that
automatically renders advertisements in order to generate revenue for its
author. It often includes functions designed to analyze which Internet sites the
user visits and to present advertising pertinent to the types of goods or services
featured there.
The term is sometimes used to refer to software that displays unwanted
advertisements and this would fall into the classification of malware.
In legitimate software, the advertising functions are integrated into or bundled
with the program. Adware is usually seen by the developer as a way to recover
development costs, and in some cases, it may allow the software to be provided
to the user free of charge or at a reduced price. Some software is offered in
both an advertising-supported mode and a paid, advertisement-free mode. The
advertisement free mode is usually available by an online purchase of a license
or registration code for the software that unlocks the mode, or the purchase
and download of a separate version of the software.
8.10.2.2.7 Scareware
Internet security writers use the term "scareware" to describe software
products that produce frivolous and alarming warnings or threat notices.
Usually these are for fictitious or useless commercial firewall and registry
cleaner software. The software is often packaged with a look and feel that
mimics legitimate security software in order to deceive consumers.
8.10.2.3 Cookies
Cookies are small files which are stored on a user's computer. They are designed
to hold a modest amount of data specific to a particular client and website and can
be accessed either by the web server or the client computer. A cookie allows
information to be carried from one visit to the website (or related site) to the next
without having to burden the server with massive amounts of data storage. Storing
the data on the server without using cookies would also be problematic because it
would be difficult to retrieve a particular user's information without requiring a
login on each visit to the website.
Although many people worry about “Cookies” as a security problem, they do not,
in themselves, present a major threat to privacy, since they can only be used to
store information that the user has volunteered or that the web server already has.
Some commercial websites do include embedded advertising material which is
served from a third-party site, and it is possible for such adverts to store a cookie
for that third-party site. Such a cookie could contain information fed to it from the
containing site - such information might include the name of the site, particular
products being viewed, pages visited, etc. When the user later visits another site
containing a similar embedded advert from the same third-party site, the
advertiser will be able to read the cookie and use it to determine some information
about the user's browsing history. This enables publishers to serve adverts targeted
at a user's interests, so in theory having a greater chance of being relevant to the
user. Many people see such 'tracking cookies' as an invasion of privacy since they
allow an advertiser to build up profiles of users without their consent or
knowledge.
179
Introduction to Computers – Chapter 8
20
Source www.computerworld.com/article/2556908/security0/biometric-authentication.html
180
Introduction to Computers – Chapter 8
These protection plans provide questionable value, and some promoters of these
services have been charged by the Federal Trade Commission for misleading sales
practices and false claims. This is not to say that Identity theft is not a serious
problem.
In 2010 there were 8.1 million identity fraud victims (this was down 27% from
the year before.) Clearly, this constitutes a serious threat, but the number, 8.1
million victims, overstates the danger.
According to the U.S. Department of Justice, more than 80 percent of what
gets reported as identity theft involves fraudulent charges on existing
accounts. In most of these cases a cardholder’s liability is limited to $50 for
a lost or stolen credit card and for debit cards, liability for an unauthorized
transaction is limited to $50 if it is reported within two business days of the
date a cardholder learns of it.
8.10.4.1 Social Engineering
Often identity theft (as well as many other types of breaches of security) is brought
about by means of psychological manipulation, i.e. “social engineering”
This can take many forms. At its simplest, just a phone call asking for information
can often be all that is needed. More sophisticated schemes exist and two that have
come to enjoy some public notoriety are called “phishing” and “spear phishing”.
8.10.4.1.1 Phishing
Phishing is a technique for obtaining private information by sending an e-
mail that appears to come from a legitimate source
—bank, credit card company, …—
requesting "verification" of information and warning of some consequence if
the requested information is not ”verified.” The e-mail will usually contain a
link to a fraudulent web page that seems legitimate. This Web page will have
a form requesting information such as home address, PIN number for ATM,
and/or credit card number.
8.10.4.1.2 Spear Phishing
Phishing attempts directed at specific individuals or companies have been
termed spear phishing. In contrast to bulk phishing, spear phishing attackers
will gather and use personal information about their target to increase their
probability of success. Spear phishing gained notoriety when it was learned
that the tactic had been used successfully to gain access to accounts related to
the 2016 presidential campaign of Hillary Clinton.
181
Introduction to Computers – Chapter 8
182
Introduction to Computers – Chapter 8
183
Introduction to Computers – Chapter 8
For those who have access to the right technology, there is evidence that
learning online can be more effective than traditional in person learning in a
number of ways. Some research 21 shows that on average, students retain 25-
60% more material when learning online compared to learning in a classroom.
This is mostly due to the students being able to learn faster online; e-learning
requires 40-60% less time to learn than in a traditional classroom setting
because students can learn at their own pace, going back and re-reading when
they need to, skipping, or accelerating through concepts as they choose.
The effectiveness of online learning does vary among age groups. The general
consensus is that children, especially younger children, require a structured
environment because kids tend to be easily distracted. For younger students to
get the full benefit of online learning, there needs to be an effort to provide this
structure and to go beyond simply replicating a physical class/lecture through
video capabilities.
Even before COVID-19, there already had been high growth and adoption in
education technology, and, of course, there has been a significant surge in
usage since the pandemic began. While some believe that the unplanned and
rapid move to online learning – with no training, insufficient bandwidth, and
little preparation – will result in a poor user experience that is not conducive
to sustained growth, others believe that a new hybrid model of education will
emerge, with significant benefits. There are, however, challenges to overcome.
Some students without reliable internet access and/or technology struggle to
participate in digital learning. In the US, there is a significant gap between
those from privileged and disadvantaged backgrounds: while virtually all 15-
year-olds from a privileged background said they had a computer to work on,
nearly 25% of those from disadvantaged backgrounds did not22.
Many are concerned that the pandemic will further widen the digital divide.
21
https://www.shiftelearning.com/blog/bid/301248/15-facts-and-stats-that-reveal-the-power-of-
elearning
22
https://www.oecd.org/pisa/
184
Introduction to Computers – Chapter 8
23
FaceTime is Apple's video and audio chatting platform that lets iPhone users communicate with
one another through the standard FaceTime video protocol or using the FaceTime audio
feature.
185
Introduction to Computers – Chapter 8
8.11 Questions
8.11.1 Completion
8.1.1 The Internet was originally developed by the US federal government, a
project of _______
8.1.1 The Internet first came into being in 1964 as an interconnection between four
_______: one at University of California Santa Barbara, one at University of
California Los Angeles, one at Stanford University and one at the University of
Utah.
8.1.2 In practice, an individual will often access the Internet from his home, using
a(n) ______ to connect to a local Internet service provider (ISP)
8.1.3.1 The World Wide Web is a system of “web______” (documents and other
web resources.)
8.1.3.1 WWW web pages are identified by _______’s.
8.1.3.1 The public use of the Internet, and the World Wide Web in particular, began
to explode in the early 1990’s. This was sparked primarily by the 1993 release
of “_______”, the first widely available browser with graphic capabilities.
8.1.3.1.2 WWW pages are often written in__________, which enables an easy-to-
use and flexible connection and sharing of information over the Internet.
8.1.3.1.2 WWW web pages are interlinked by _______ links.
8.1.3.1.3 The communication between client and server takes place using the
Hypertext Transfer ________(HTTP).
8.2 The term E-commerce (also written as e-Commerce, eCommerce or similar
variations), refers to trading in products or services using computer ________
8.2.1 ________.com is currently the largest company specializing in online B2C
business.
8.2.2 ______Inc. is an American multinational corporation and e-commerce
company, providing consumer to consumer (as well as business to consumer)
sales services via Internet.
8.3 A ______is a website which allows collaborative modification of its content and
structure directly from the web browser.
8.6 In the 1990s, using a browser to view web pages—and to move from one web
page to another through________—came to be known as 'web surfing'.
8.9.1 ________, is the standard language used to create web pages.
186
Introduction to Computers – Chapter 8
8.9.2 A network ________is a network security system that monitors and controls
the incoming and outgoing network traffic based on predetermined security
rules.
8.9.3 Computers (on networks) must send and receive information to and from
computers, often computers on other networks. It is the function of devices
called _______ to determine where to send and whether to accept/receive such
information.
8.9.4 A ________is a computer that receives and responds to requests from client
machines.
8.9.6 Devices in a LAN will typically communicate by means of either a physical
medium (typically twisted pair cable) or radio waves (________).
8.10.1 The term “________” is used to refer to online etiquette over networks, such
as online communities, forums, and even online learning environments.
8.1.3 The Internet has had a profound effect because it provides a number of
valuable “services” for its users. Among these services is ______
a) FTP
b) IM
c) VoIP
d) all of the above are Internet services
e) none of the above
187
Introduction to Computers – Chapter 8
8.1.3.1 The World Wide Web is a system of “web pages” (documents and other
web resources) which are identified by “_______” and are interlinked by
hypertext links
a) URL’s
b) VDT’s
c) widgets
d) podlets
e) none of the above
8.1.3.1 Web pages can be accessed via the Internet using a program called a “Web
_______
a) Accesser
b) Searcher
c) Browser
d) Surfer
e) none of the above
188
Introduction to Computers – Chapter 8
8.1.3.3 ______ is a standard network protocol used to transfer computer files from
one host to another host over a TCP-based network (such as the Internet.)
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
8.1.3.4 ______ is a type of online chat which offers real-time text transmission over
the Internet
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
8.1.3.5 _______ is a methodology for the delivery of voice communications (and
other kinds of multimedia sessions) over the Internet
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
8.2.1 _________ refers to transactions in which a user purchases goods or services
from a company.
a) B2B
b) B2C
c) C2B
d) C2C
e) none of the above
8.2.2 _________ refers to transactions in which one individual purchases goods and
or services from another individual.
a) B2B
b) B2C
c) C2B
d) C2C
e) none of the above
8.2.3 The number of _______ e-commerce transactions is much greater than the
number of transactions of the other classes.
a) B2B
b) B2C
c) C2B
d) C2C
e) none of the above
189
Introduction to Computers – Chapter 8
8.7 Is a system that enables users to search for documents on the World Wide Web
a) Google
b) Bing
c) Yahoo! Search
d) all of the above
e) none of the above
8.8 Social network sites are web-based services that allow individuals to:
a) create public profiles
b) create lists of users with whom to share connections
c) view and cross the connections within the systems
d) all of the above
e) none of the above
8.9.3 A router is a networking device that forwards data ________ between
computer networks
a) clusters
b) globules
c) packets
d) cells
e) none of the above
8.9.5 ________ is the protocol used by major Internet applications such as the
World Wide Web, email, remote administration and file transfer
a) HTML
b) IP
c) TCP
d) all of the above
e) none of the above
8.10.1 Following the rules of netiquette _______
a) improves the readability of your messages
b) lays the groundwork for making trustworthy connections
c) helps other people to better understand you
d) all of the above
e) none of the above
8.10.4.1 Using the Internet to ask large numbers of people for small
investments/donations to help provide capital to open a business is known as
___________.
a) kickstarting
b) crowdfunding
c) collaborating
d) all of the above
e) none of the above
190
Introduction to Computers – Chapter 8
8.11.3 True-False
8.1.2 The architecture of the Internet is based on the specification of the TCP/IP
protocol, and was designed to connect any two networks.
8.1.2 In order to reduce expenses, most ISP’s limit their external Internet
connections to one backbone connection.
8.1.3.1 In 1995, Microsoft released its browser, Internet Explorer. Explorer (mostly
by virtue of being free) quickly became the most widely used browser in the
world.
8.1.3.1.1 The Internet is one of the services provided by WWW.
8.1.3.1.2 In addition to text, hypertext is also used to implement links to tables,
images, videos, sounds (music) and other content forms.
8.4 A majority of blogs are interactive.
8.5 Webcasting differs from podcasting in that podcasting refers to live streaming
while webcasting simply refers to media files placed on the Internet.
191
Index
9. Index
3D printer; 128
3D scanner; 105
A
Abacus; 1
Accelerometer; 12, 566, 125
Activity monitoring; 66
Adapter card; 91, 93
Address; 34, 81
Address Bus; 44, 8081
Addressable memory; 81
Adobe; 61, 131
Adobe Acrobat Reader; 61
Adobe Postscript; 131
ADSL; 44
Adware; 20, 176, 17920
AI (artificial intelligence); 5, 17, 86, 113
AIX; 51
Alexa; 7, 39, 112, 113
Alexa Skills; 113
ALU; 33, 79
Amiga; 52, 57
Amiga Autoconfig; 57
Analytical engine; 3
Android; 2149, 53, 53, 55, 77, 113, 155
Android Auto; 555
Android TV; 55
Android Wear; 55
ANN; 17
Anti-virus; 20, 68
Antikythera mechanism; 2
AOL: 158, 172
Apple;10, 53, 56, 111
Apple II; 10
Apple App Store; 55
Apple Lisa; 52
Apple Macintosh; 52
Apple Newton; 111
Apple Pay; 116
Apple SIRI; 39, 112, 113
Apple TV; 113
AppleDOS; 52
AppleWatch; 113
193
Index
194
Index
Broadband; 15884
Browser; 13, 58, 59, 61, 65, 86, 144, 155, 156, 158, 162, 166,168
Buffer; 35, 13735
Bullying; 65
Bundle; 588, 179
Byte; 34, 36, 81, 90
C
C (programming language); 86
C++; 86
C*; 86
C2C; 159
Cache; 35, 87
CAD; 59, 108
CAE; 58
Camera; 12, 23, 36, 38, 55, 72, 99, 102, 108, 162, 171
CamScanner; 21
Card reader; 499
CD; 31 35, 36, 140
CDC; 8
Cell; 33, 34, 81
Central Processing Unit (CPU); 7, 16, 33, 50, 79, 84
CERN; 155
Chat room; 158
Chinese Wall; 147
Chrome OS; 54
Chromebook; 54
Circuit board; 32, 79, 91
CISC; 8181
Client; 14, 62, 157, 169, 179
Client-server application; 62
Client server network;14,
Clock; 33, 80
Clock Cycle; 33
Clock Generator; 33
Clock speed; 80
Clock Tick; 3333
Cloud storage; 144
CMOS; 88
COBOL; 86
Color depth; 105
Color scanner; 105
195
Index
Colossus; 3
Command Line Interface; 52, 77, 99
Commercial Software; 60
Commodore; 10, 52
Commodore Amiga; 52
Commodore PET; 10
Compiler; 56, 87
Computer Ethics; 65, 69
Computer Forensics; 22, 29
Computer Literacy; 18, 20
Computer network; 13, 19, 42, 159, 169, 171
Computer program; 15, 49, 57, 64, 79, 85
Computer Software; 49, 61, 62
Content access software; 5958
Control Data Corporation; 8
CDC; 8
CDC 6600; 8
Control Unit; 33, 7933
Cookies: 179
Cortana; 7, 39, 112, 113
CP/M; 52
CPU; 8, 16, 20, 33, 5033, 7935, 81, 84, 8779
Cray; 8
CRM; 58
Crowdfunding; 182
CRT; 40, 12040
Cryptanalysis; 3, 9
Cryptocurrency; 20, 164
Cryptomining; 20
Cursor; 37, 106, 108
Cyberbullying; 20, 64, 65, 67
Cyberstalking; 22
D
Daisy wheel printer; 129
Data compression; 145
Datagram; 170
Darknet: 169
Dark Web: 169169
DARPA; 83, 111, 153
Database; 58, 62
Data Bus; 44, 80
196
Index
DBMS; 58
DDoS; 21, 177
DDWG; 93
Debug; 566, 86
DEC; 8
Desktop publishing software; 589
Device Driver; 57
Difference engine; 3
Digital;
Digital-animation editors; 59
Digital Cameras; 38, 55
Digital currency; 163
Digital divide; 20, 184
Digital Equipment Corporation (DEC); 8
Digital images; 37
Digital photos; 38
Digital Research; 52
Digital wallet; 160
Digital watch; 13
DIP switch; 57
Direct carrier billing (DCB); 163
DisplayPort; 93
Distance education; 183
Document scanner; 105
Dot matrix printer; 125, 127
Dragon Dictate; 111
DSL; 44
DTSS; 51
DVD; 35, 36, 140
DVI; 93
Dvorak Simplified Keyboard; 103
Dye-sublimation printer; 128
E
EBCDIC; 91
e-commerce; 5, 159, 186
e-mail; 5, 154, 157
Educational software; 19, 59
Electronic payment; 160
embedded computers; 13
embedded systems;13
Emoticon; 174
Encryption; 71, 169, 171
197
Index
ENIAC; 4
Enterprise Software; 58
Entertainment Software; 59
Ergonomics; 103
Ethernet; 32, 43
Ethics; 62, 66, 69, 173
EULA; 60
Event calendars; 55
Expansion bus; 91
Extranet; 171
F
Facebook; 5, 13, 19, 167
Facial Recognition Technology; 22
Fiber-optic; 44
File transfer protocol (FTP); 154, 157
Firewall; 20, 168, 171, 179
first amendment rights; 63
Flash Drive; 381, 112, 137, 141, 180
Flatbed scanner; 37, 105
Flat panel display; 40, 120
Flat panel technology; 41, 12037
Flexible display; 41
Flexible keyboard; 101
Flip-flop; 3434, 81
Floating point; 8, 80
FLOPS; 80
Floppy disk; 142
FOAF; 168
Font-face; 130
Font-style; 130
Forensics; 22, 29
FORTRAN; 86
Freeware; 61
Frontier; 9
FRT; 22, 23
FTP; 154, 157
Fugaku; 9
Fujitsu; 7, 9
G
Game consoles; 38, 55, 110, 123, 171
Gamepad; 110
198
Index
199
Index
Hybrid vehicles; 13
Hyperlink; 156, 166
Hypertext; 156
HyperText Markup Language; 156. 168
I
I/O; 79, 91
I2P; 169
IBM; 4, 7, 9, 10, 57, 62, 882
IBM 650; 4
IBM compatible; 88
IBM Mainframe; 8
IBM Microchannel; 57
IBM Personal Computer (PC); 10
IBM Q network; 82
IBM Simon; 11
IBM Summit; 9
IC; 79
Icon;37, 52, 55, 109
Identity Theft; 66, 181
iFLYTEK; 111
Image scanner; 37, 105
Image projector; 41, 124
Infostealer; 21
Inkjet printer; 42, 126
Instant Messaging (IM); 5, 154, 158
instruction cycle; 84
instruction register (IR); 8484
instruction set; 81
Integrated circuit; 4, 31, 34, 45, 79, 88, 140
integrated development environment (IDE); 59
Intel; 8 54, 80
Intel 4004; 8, 80
Intel x86; 54
Intelligent agent; 5
Interface card; 79
Internet; 5, 13, 199, 73, 153
Internet of Things (IoT);14, 175
Internet service provider (ISP); 154, 185
Internet payment; 162
Interpreter; 87
Intranet; 154, 171
Iomega; 137, 143
200
Index
201
Index
202
Index
203
Index
204
Index
R
RAID; 139
RAID levels’ 140
Random Access Memory (RAM); 31, 34, 81, 87, 88
Ransomware; 20, 176, 178
rar (data compression format); 145
Read only memory (ROM); 34, 88
Register; 79, 84
Resolution; 41, 106105, 120, 129
Ritchie, Dennis; 51, 86
RISC; 81
robots.txt; 16781
ROM; 34, 88
Rotational latency; 356, 138
Router; 13, 42, 169
S
SaaS; 60, 61, 144
SATA; 139
Scanner; 36, 37, 105
ScanSoft; 113
Scareware; 20, 176, 179
Secondary Storage; 35, 34, 35, 49, 88, 137, 139, 140, 141
Search engine; 166
Seek time; 36, 138
Semiconductor memory; 5, 34, 81
Serial port; 92
Server;14, 54, 58, 61, 73, 144, 157, 169, 170, 172, 179
Shareware; 61
Silicon; 34
Silicone; 101, 126
Simulation software; 59
Single Tasking System; 49
SIRI; 7, 39, 112, 113
Site license; 60
Skype; 15, 61, 158
Slide rule; 2
Smartphone; 11, 12, 15, 23, 386, 38, 533, 53, 55, 65, 102, 109, 112, 17156, 160, 171
Smart TV; 13, 56
SMS; 163
Social engineering: 181
Social networking; 19, 65, 166, 167
205
Index
206
Index
Tianhe-2; 9
Time Sharing System; 50, 51
Time-slice; 50
TOR; 169
Torvalds, Linus; 54
Touchpad; 38, 99, 110
Touchscreen; 112, 368, 101, 109
Trackball; 108
Transistor; 4, 5, 344, 45
Trojan 20(Trojan horse); 20, 176, 178
TRS 80; 10
Twitter; 5, 13, 19, 167, 175
U
UDP; 170
Unicode; 90
Unicode Transformation Formats (UTF); 90
Unisys; 7
UNIVAC; 4
Universal Serial Bus (USB); 31, 44, 92
UNIX; 49, 51, 54, 86, 90, 145
USB; 31, 44, 92, 137, 139, 141, 180
Utility Programs; 49, 56
V
VDT; 40, 12040
VDU; 40, 12040
Video cameras; 55
Videoconferencing: 155, 18
Video Connector; 93
Video cards; 79, 93, 124
Video games; 40, 55, 59, 110, 125
Video projector; 124
VideoTelephony: 15
Vimeo; 13
Virtual assistant; 7, 113
Virtual keyboard; 12, 55, 102
Virtual objects; 6
Virtual printer; 128
Virtual private network (VPN); 15, 172
Virtual reality (VR); 6, 125
Virus; 20, 29, 56, 64, 66, 68, 74, 168, 176, 177, 178
VoIP; 15, 154, 158
207
Index
208
Answer Key
10-Answer Key
(Answers to half of the end of chapter questions.)
1.4 Questions:
1.4.1 Completion
1. Humans have always found it necessary to perform some kinds of calculations,
and over the centuries, people have used many _______ to perform these
calculations
ANS: devices
1.1.1 Several kinds of analog computers were constructed in ancient and medieval
times to perform astronomical calculations. These include the Antikythera
mechanism and the __________, both developed in ancient Greece (c. 150–100
BC)
ANS: astrolabe
1.1.4 In the United States, _________, the first general purpose, programmable
computer was initially designed to compute artillery firing tables for the US
army
1.1.7.1 __________computers are computers used primarily by commercial and
governmental organizations for critical applications and bulk data processing
such as census, industry and consumer statistics, enterprise resource planning
and transaction processing
ANS: Mainframe
1.1.7.2 The term minicomputer is no longer widely used. The term _______
computer is now preferred
ANS: midrange
1.1.7.3 Supercomputers were introduced in the 1960s, made initially, and for
decades primarily by Seymour _____ at Control Data Corporation (CDC), then
at subsequent companies, all bearing his name or monogram.
ANS: Cray
1.1.7.7 A(n) _______computer is a mobile computer with a touchscreen display,
circuitry and battery in a single unit
ANS: tablet
1.1.8 With increased use of computers it became important to move data from one
computer to another quickly and efficiently. This, then, motivated the
development of computer _________
ANS: networks
209
Answer Key
1.1.8.1 A(n) ______ is a computer that receives and responds to requests from
client machines.
ANS: server
1.3.4 The term _______ was once used to describe a computer expert who used his
technical knowledge to overcome a problem. It has come, in the popular
culture, to be used to describe someone who uses his technical knowledge to
break into computer systems.
ANS: hacker
1.4.2 Multiple Choice
1. The oldest known calculating device is the abacus which was invented in
_______over 2000 years ago.
a) Asia
b) Rome
c) India
d) Greece
e) none of the above
ANS: A
1.1.2 _________ described the binary number system that is used in all modern
computers
a) Pascal
b) Leibnitz
c) Newton
d) Lovelace
e) none of the above
ANS: B
1.1.4 _________ was the world's first programmable, electronic, digital computer
a) Colossus Mark 1
b) ENIAC
c) LEO 1
d) UNIVAC
e) none of the above
ANS: A
1.1.5 It was in the ________’s that IBM entered the computer business
a) 1920
b) 1930
c) 1940
d) 1950
e) none of the above
ANS: D
210
Answer Key
1.1.7.4 The first successfully mass marketed personal computer was the ______
a) Apple II
b) TRS-80
c) Commodore PET
d) IBM PC
e) none of the above
ANS: C
1.1.7.5 The ________ can be considered the first smartphone.
a) Apple Newton
b) IBM Simon
c) Nokia Communicator
d) Palm TX
e) none of the above
ANS: B
1.1.8.1 A ________ is a computer that receives and responds to requests from other
machines
a) client
b) server
c) peer
d) all of the above
e) none of the above
ANS: B
1.4.3 True-False
1.1.3. One of the reasons that Babbage failed to make a working difference engine
is that he turned his attention to a more advanced design which he called the
analytical engine
ANS: T
1.1.7.3 As of 2018, the fastest supercomputer was the Cray 1
Ans F,
In Nov 2018, the IBM Summit at Oak Ridge National Laboratory became the
fastest supercomputer in the world. Before Nov 2018, the two fastest machines
were both in China.
1.1.7.8 The reduction in size, price and power consumption of computer
components has made it possible to install general purpose computers as
embedded systems in many devices)
Ans F
The reduction in size, price and power consumption of computer components
has made it possible to install specialized computers as embedded systems in
many devices
211
Answer Key
1.3.5 The term hacker was once used to describe a computer expert who used his
technical knowledge to overcome a problem. It has come, in the popular
culture, to be used to describe someone who uses his technical knowledge to
break into computer systems
Ans T
1.3.6 Since the early 1980’s computer crime and computer related crime have
increased.
Ans T
2.8 Questions:
2.8.1 Completion
2. The component which actually performs the actions/executes the commands that
the computer carries out is called the processor or ______
Ans CPU
2.2 The term "memory", (primary memory, primary storage) is ___________
semiconductor memory, i.e. integrated circuits consisting of silicon-based
transistors
Ans addressable
2.2 Most home or office computers include magnetic disk drives and have only a
minimal hardware initialization core and bootloader in ROM (known as the
______in IBM-compatible computers).
Ans BIOS
2.4 Traditional _______devices include the keyboard, mouse and scanner.
Ans input
2.4.4 A(n) _________is a visual display which is sensitive to where a user is
pressing on it and transmits this information to the computer
Ans touchscreen
2.5.2.1.2 OLED’s are used to produce _____ displays
Ans flexible
2.5.2.3 The newest types of projectors are ________projectors
Ans handheld
212
Answer Key
2.3 On modern computers _____ are normally used for secondary storage
a) hard disk drives
b) optical drives
c) flash drives
d) all of the above
e) none of the above
Ans A
2.3 The time taken to access a given byte of information stored in random-access
memory is measured in billionths of a second (_________.)
a) microseconds
b) milliseconds
c) nanoseconds
d) macroseconds
e) none of the above
Ans C
213
Answer Key
214
Answer Key
3.4 Questions
3.4.1 Completion
3. _______ software is software which provides an interface and services both for
users and for other software
Ans System
3.1.1.4.2.2 On PCs, _______is the most popular operating system
Ans Windows
3.1.1.4.2.3 ________ has the largest installed base of all general-purpose operating
systems
Ans Linux
3.1.2 The term system software can also be used for software development tools
(like________, linkers and debuggers)
Ans compilers
3.2 The collective noun application software refers to all applications
collectively. This distinguishes it from ________ software, which is mainly
involved with running the computer.
Ans system
3.2 _________Software can refer to video games, screen savers, programs to
display motion pictures or play recorded music
Ans Entertainment
3.4.2 Multiple Choice
3. Computer programs (collectively known as Computer Software) can generally
be divided into two classifications:
a) System Software and User Software
b) System Software and Application Software
c) Network Software and User Software
d) Network Software and Application Software
e) none of the above
Ans B
3. _________ software is software designed to provide specific services for users
a) System
b) User
c) Network
d) Application
e) none of the above
Ans D
215
Answer Key
3.4.3 True-False
3.1.1.2 In the early days of computing, CPU time was expensive, and peripherals
were very slow
Ans T
3.1.1.4 Personal computers are intended to be operated directly by an end-user who
is not necessarily a computer expert or technician
Ans T
3.1.1.5 The vast majority of modern smartphones use one of three operating
systems: Android, Linux, or iOS
Ans F
The vast majority of modern smartphones use one of two operating systems:
Android or iOS
216
Answer Key
3.3.1.1 There are two contrasting ethical views on the issue of piracy, and both have
their valid points.
Ans T
3.3.1.2.2.1 The majority of identity theft victims do not realize that they are victims
until it has negatively impacted their lives.
Ans T
3.3.1.2.2.4 Computer viruses currently cause hundreds of thousands of dollars
worth of economic damage each year.
Ans F
Computer viruses currently cause billions of dollars' worth of economic
damage each year
4.11 Questions
4.11.1 Completion
4. In a desktop computer, most of the electronic components are housed in an
enclosure a called the ______unit
Ans system
4.1.1 Most modern CPUs are _________ meaning they are contained on a single
integrated circuit (IC) chip.
Ans microprocessors
4..4 ______memory, is random access memory (RAM) that a computer
microprocessor can access more quickly than it can access regular RAM
Ans Cache
4.6.1.16 One of the earliest (and still one of the most commonly used) systems for
storing representations of characters in computer memory is______
Ans ASCII
4.7.1 An expansion bus is a computer bus which moves information between the
internal hardware of a computer system (including the CPU and RAM) and
peripheral devices. It is a collection of wires and _______ that allows for the
expansion of a computer
Ans protocols
4.9.1 A USB port is a standard cable connection interface for personal computers
and consumer electronics devices. USB stands for Universal Serial_______, an
industry standard for short-distance digital data communications
Ans Bus
217
Answer Key
218
Answer Key
219
Answer Key
5.5 Questions
5.5.1 Completion
5. Examples of ______ devices include keyboards, mouse, scanners, digital cameras
and joysticks
Ans input
5.1 In computing, a computer keyboard is a(n) _________-style device which
uses an arrangement of buttons or keys to act as electronic switches
Ans typewriter
5.1.1.3 The vast majority of flexible keyboards in the market are made from
_________
Ans silicone
5.1.2.1 The common _______-based layout was designed early in the era of
mechanical typewriters, so its ergonomics were compromised to allow for the
mechanical limitations of the typewriter
Ans QWERTY
5.2 An image _______ is a device that optically scans images and converts them to
digital representations of the images
Ans scanner
220
Answer Key
5.1.1.1 There are three different PC keyboards: The three differ somewhat in the
placement of:
a) the function keys
b) the control keys
c) the return key
d) all of the above
e) none of the above
Ans D
5.1.1.4 _______ keyboards have become very popular for cell phones, due to the
additional cost and space requirements of other types of hardware keyboards
a) Projection
b) Flexible
c) Software
d) all of the above
e) none of the above
Ans C
5.1.2.3 The _______ keyboard layout is widely used in Germany and much of
Central Europe
a) QWERTZ
b) DVORAK
c) AZERTY
d) QWERTY
e) none of the above
Ans A
5.2 An image scanner—usually abbreviated to just scanner—is a device that
optically scans images and converts them to digital representations of the
images. There are various kinds of scanners. Among them are:
________scanners where the document is placed on a glass window for
scanning
a) flatbed
b) window
c) document
d) industrial
e) none of the above
Ans A
5.3 A ______device is an input interface that allows a user to input spatial data to a
computer by controlling the position of a cursor on the computer display
a) cursor
b) spatial
c) pointing
d) all of the above
e) none of the above
Ans C
221
Answer Key
222
Answer Key
6.3 Questions
6.3.1 Completion
6. After a computer executed a program, has processed some data, it will probably
be desirable for the computer to produce some kind of tangible effect in the
outside world; for it to produce some kind of _______
Ans output
6.1.1.2.2 A(n) _______display consists of two glass plates separated by a thin gap
filled with a gas such as neon
Ans plasma
6.1.1.3 Flexible OLED’s are often used in ________ devices
Ans wearable
6.1.2.2 _______printing differs from other printing technologies in that each page is
always rendered in a single continuous process without any pausing in the
middle, while other technologies like inkjet can pause every few lines.
Ans Laser
6.1.2.4.5 _______printers are widely used in cash registers, ATMs, gasoline
dispensers and some older inexpensive fax machines.
Ans Thermal
6.1.3.1 A(n) ______is a small line attached to the end of a stroke in a letter or
symbol.
Ans serif
6.2 _________are designed to allow a single user to listen to an audio source
privately, in contrast to a speaker, which emits sound into the open air, for
anyone nearby to hear.
Ans Headphones
6.2 In the context of telecommunication, a ______is a combination of a headphone
and a microphone.
Ans headset
223
Answer Key
224
Answer Key
225
Answer Key
7.0 ________storage does not lose the data when the device is powered down—it is
non-volatile
Ans Secondary
7.2 With _____ storage, data is recorded by making marks in a pattern that can be
read back with the aid of light, usually a beam of laser light
Ans optical
7.3 A flash drive is a data storage device that includes flash memory with an
integrated _______ interface
Ans USB
7.4.3 Paper tape was widely used during much of the twentieth century for
___________communication
Ans teleprinter
7.4.5 The ______drive is a medium-to-high-capacity (at the time of its release)
removable floppy disk storage system that was introduced by Iomega in late 1994
Ans Zip
7.9.2 Multiple Choice
7.0 Modern computer systems typically have________
a) two orders of magnitude more secondary storage than primary storage but
data are kept for a longer time in primary storage
b) two orders of magnitude more secondary storage than primary storage and
data are kept for a longer time in secondary storage
c) two orders of magnitude more primary storage than secondary storage and
data are kept for a longer time in primary storage
d) two orders of magnitude more primary storage than secondary storage but
data are kept for a longer time in secondary storage
e) none of the above
Ans B
7.1 The most common form factor for modern HDDs in desktop computers is
_______ inches
a) 8
b) 5.25
c) 3.5
d) 2.5
e) none of the above
Ans C
226
Answer Key
227
Answer Key
7.4.5 The _______ format became the most popular of the superfloppy products
which filled a niche in the late 1990s portable storage market.
a) CD
b) cloud
c) ZIP
d) RAID
e) none of the above
Ans C
7.9.3 True-False
7. In practice, almost all computers use a storage hierarchy, which puts fast but
expensive (and small) storage options close to the CPU and larger and more
expensive options farther away.
Ans T
7.1 Hard disks are typically about a million times faster than memory.
Ans F
Hard disks are typically about a million times slower than memory.
7.1.1. In a RAID system, data can be distributed across the drives in one of several
ways, referred to as RAID levels.
Ans T
7.4.4 By 1950 punched cards had been replaced by magnetic tape throughout
almost all industry and government.
Ans F
By 1950 punched cards had become ubiquitous in industry and government.
8.11 Questions
8.11.1 Completion
8.1.1 The Internet was originally developed by the US federal government, a
project of _______.
Ans DARPA
8.1.2 In practice, an individual will often access the Internet from his home, using
a(n) ______ to connect to a local Internet service provider (ISP).
Ans modem
8.1.3.1 WWW web pages are identified by _______’s.
Ans URL
8.1.3.1.2 WWW pages are often written in__________, which enables an easy-to-
use and flexible connection and sharing of information over the Internet.
Ans HTML
228
Answer Key
8.1.3.1.3 The communication between client and server takes place using the
Hypertext Transfer ________(HTTP).
Ans Protocol
8.2.1 ________.com is currently the largest company specializing in online
B2C business.
Ans Amazon
8.3 A ______is a website which allows collaborative modification of its
content and structure directly from the web browser.
Ans wiki
8.6 In the 1990s, using a browser to view web pages—and to move from one
web page to another through hyperlinks—came to be known as 'web
_______’
Ans surfing
8.9.2 A network ________is a network security system that monitors and
controls the incoming and outgoing network traffic based on
predetermined security rules.
Ans firewall
8.9.4 A ________is a computer that receives and responds to requests from client
machines.
Ans server
8.9.6 Devices in a LAN will typically communicate by means of either a
physical medium (typically twisted pair cable) or radio waves
(________)
Ans wifi
8.10.2.2 ________ is any software used to disrupt computer operations, gather
sensitive information, or gain access to private computer systems.
Ans malware
229
Answer Key
8.1.3.1 The World Wide Web is a system of “web pages” (documents and other
web resources) which are identified by “_______” and are interlinked by
hypertext links
a) URL’s
b) VDT’s
c) widgets
d) podlets
e) none of the above
Ans A
230
Answer Key
8.1.3.3 ______ is a standard network protocol used to transfer computer files from
one host to another host over a TCP-based network (such as the Internet.)
a) WWW
b) FTP
c) Email
d) VoIP
e) none of the above
Ans B
231
Answer Key
232
Introduction to Computers – Image References
11-Image References
i
Abacus: This image comes from the 12th edition of the Encyclopædia Britannica or earlier.
The copyrights for that book have expired and this image is in the public domain
ii
Pullan, J. M. (1968). The History of the Abacus. New York, NY: Frederick A. Praeger, Inc.,
Publishers. ISBN 978-0-09-089410-9. LCCN 72075113
iii
Credit: Antikythera Mechanism Research Project
iv
Astrolabe: Photo taken by Andrew Dunn Whipple Museum of the History of
Science Location Cambridge, United Kingdom Established 1944 Website, The Whipple
Museum's website. Andrew Dunn uploaded it first to the English Wikipedia on 6. Nov. 2004
and released it there under CC-BY-SA-2.0
v
Pascal’s calculator: Photographer David Monniaux / (2005) Permission is granted to copy,
distribute and/or modify this document under the terms of the GNU Free Documentation
License, Version 1.2 or any later version published by the Free Software Foundation;
vi
Leibnitz calculator: "Leibnitzrechenmaschine" by User:Kolossos - recorded by me in
de:Technische Sammlungen der Stadt Dresden (with photo permission). Licensed under CC
BY-SA 3.0 via Commons
vii
Slide Rule: ArnoldReinhold - Own work (I took this picture of an artifact in my possession
on February 3, 2006. The object itself is functional in nature, was created before 1970 and
has no copyright notice, either on front or back.) Permission is granted to copy, distribute
and/or modify this document under the terms of the GNU Free Documentation License,
Version 1.2 or any later version published by the Free Software Foundation
viii
Babbage Analytical Engine: Bruno Barral: licensed under the Creative Commons
Attribution-Share Alike 2.5 Generic license
ix
By Unknown - This file is from the collections of The National Archives (United Kingdom), catalogued
under document record FO850/234. For high quality reproductions of any item from The National
Archives collection please contact the image library.This tag does not indicate the copyright status of
the attached work. A normal copyright tag is still required. See Commons:Licensing for more
information.English | français | italiano | македонски | +/−, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=501979
x
ENIAC: US Army Photo: This image is a work of a U.S. Army soldier or employee, taken or
made as part of that person's official duties. As a work of the U.S. federal government, the
image is in the public domain
xi
UNIVAC I: This image is a work of a U.S. Army soldier or employee, taken or made as part
of that person's official duties. As a work of the U.S. federal government, the image is in the
public domain
xii
By Cushing Memorial Library and Archives, Texas A&M - Flickr: IBM Processing Machine, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=17397582
xiii
Photo from Museum of LEO Computers Society
xiv
By ESA, CC BY-SA 3.0-igo
233
Introduction to Computers – Image References
xv
By National Aeronautics and Space Administration. - http://gimp-savvy.com/cgi-
bin/img.cgi?ailsxmzVhD8OjEo694; originally uploaded by Bayo
xvi
By Lawrence Livermore National Laboratory, Attribution,
https://commons.wikimedia.org/w/index.php?curid=1565787
xvii
PDP-8: This work has been released into the public domain by its author, Alkivar at
Wikipedia
xviii
By Jitze Couperus - Flickr: Supercomputer - The Beginnings, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=19382150
xix
Cray I: Clemens PFEIFFER: licensed under the Creative Commons Attribution-Share Alike
2.5 Generic license
xx
Commodore PET: Rama & Musée Bolo: This work is free software licensed under the
Creative Commons Attribution-Share Alike 2.0 France license.
xxi
IBM PC 5150: Rama & Musée Bolo: This work is free software licensed under the Creative
Commons Attribution-Share Alike 2.0 France license.
xxii
By Blake Patterson from Alexandria, VA, USA - Newton and iPhone: ARM and ARM, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=7039806
xxiii
IBM Simon: Bcos47: The copyright holder of this work, released the work into the public
domain
xxiv
Palm TX: Stefano Palazzo: Permission granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version 1.2 or any
later version published by the Free Software Foundation;
xxv
By Maurizio Pesce from Milan, Italia - OnePlus One vs LG G3 vs Apple iPhone 6 Plus vs Samsung
Galaxy Note 4, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=46026497
xxvi
Copied from Official Apple Support
xxvii
Intel 80486DX CPU. Bottom view with gold plated pins ---- Photograph © Andrew Dunn,
9 November 2005. This file is licensed under the Creative Commons Attribution-Share Alike
2.0 Generic license.
xxviii
By No machine-readable author provided. Cyberdex assumed (based on copyright claims). - No
machine-readable source provided. Own work assumed (based on copyright claims)., Public Domain,
https://commons.wikimedia.org/w/index.php?curid=647267
xxix
Hard Drive; Author: Evan-Amos; This file is licensed under the Creative Commons
Attribution-Share Alike 3.0 Unported license
xxx
Optical Disk; Author: Ubern00b; Permission is granted to copy, distribute and/or modify
this document under the terms of the GNU Free Documentation License, Version 1.2 or any
later version
xxxi
SanDisk Cruzer Micro; Author: Evan-Amos; The copyright holder of this work has released this
work into the public domain.
xxxii
Typing example.ogv. Modifications made by Parzi. This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xxxiii
Tastenmaus von Microsoft; Author: Darkone; This file is licensed under the Creative
Commons Attribution-Share Alike 2.5 Generic license
234
Introduction to Computers – Image References
xxxiv
TFT_LCD_display_Samsung_SyncMaster_510N.jpg: Author: MaGioZal; This work is free
software; you can redistribute it and/or modify it under the terms of the GNU General
Public License as published by the Free Software Foundation; either version 2 of the License,
or any later version
xxxv
HP LaserJet 5 printer; Author: Thiemo Schuff; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Germany license
xxxvi
Motherboard; Author: Julianprescott2604juuly; This file is licensed under the Creative
Commons Attribution-Share Alike 4.0 International license
xxxvii
CPU; Author: Andrew Dunn; This file is licensed under the Creative Commons Attribution-Share
Alike 2.0 Generic license
xxxviii
CPU Block Diagram; Author: Lambtron; This file is licensed under the Creative Commons
Attribution-Share Alike 4.0 International license
xxxix
Clock Generator; Author: Audrius Meskauskas Audriusa; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xl
"Hard drive-en" by I, Surachit. Licensed under CC BY-SA 3.0 via Commons
xli
Typing example.ogv. Modifications made by Parzi. This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xlii
Punched card: Author: Arnold Reinhold; This file is licensed under the Creative Commons
Attribution-Share Alike 2.5 Generic license
xliii
Tastenmaus von Microsoft; Author: Darkone; This file is licensed under the Creative
Commons Attribution-Share Alike 2.5 Generic license
xliv
Scanner; Author: Luke Launderville; This work is licensed under the Creative Commons Attribution-
ShareAlike 3.0 License
xlv
Capacitive touchscreen of a mobile phone; Author: Medvedev; This file is licensed under the
Creative Commons Attribution 3.0 Unported license
xlvi
An Internet kiosk in Hemer, Germany; Author: Asio otus; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
xlvii
Speakers for notebook computers; Author: Evan-Amos; this work was released into the public
domain
xlviii
Headphones; Author: Adamantios; This file is licensed under the Creative Commons Attribution-
Share Alike 3.0 Unported, 2.5 Generic, 2.0 Generic and 1.0 Generic license
xlix
In-ear headphones; Author: Ballerinus; This file is licensed under the Creative Commons
Attribution-Share Alike 3.0 Unported license
l
Flat Panel Display; Author: Freeware-flo; Permission is granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version 1.2 or any later version
li
Projector; Author: Michael Movchin; This file is licensed under the Creative Commons Attribution-
Share Alike 3.0 Unported license
lii
HP LaserJet 5 printer; Author: Thiemo Schuff; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Germany license
liii
Bluetooth mobile phone headset; Author: ed g2s • talk; This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
liv
Maria Toutoudaki/Stockbyte/Getty Images
lv
By Pratyeka - Own work, CC BY-SA 4.0,
https://commons.wikimedia.org/w/index.php?curid=54659127
235
Introduction to Computers – Image References
lvi
By Rama & Musée Bolo - Own work, CC BY-SA 2.0 fr,
https://commons.wikimedia.org/w/index.php?curid=36769003
lvii
By unknown, https://en.wikipedia.org/w/index.php?curid=1016513
lviii
By Screenshot is taken and uploaded by Tyomitch (talk · contribs),
https://en.wikipedia.org/w/index.php?curid=2611871
lix
GPL, https://commons.wikimedia.org/w/index.php?curid=1191127
lx
By Developers.android.com -
https://developer.android.com/design/media/index_landing_page.png, CC BY 2.5,
https://commons.wikimedia.org/w/index.php?curid=20780279
lxi
By www.apple.com, https://en.wikipedia.org/w/index.php?curid=51694141
lxii
By DigiBarn Computer Museum - www.digibarn.com, CC BY 3.0,
https://commons.wikimedia.org/w/index.php?curid=3276768
lxiii
By DigiBarn Computer Museum - www.digibarn.com, CC BY 3.0,
https://commons.wikimedia.org/w/index.php?curid=3276768
lxiv
By Julianprescott2604juuly - Own work, CC BY-SA 4.0,
https://commons.wikimedia.org/w/index.php?curid=38794746
lxv
CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=406963
lxvi
By No machine-readable author provided. Cyberdex assumed (based on copyright claims). - No
machine-readable source provided. Own work assumed (based on copyright claims)., Public Domain,
https://commons.wikimedia.org/w/index.php?curid=647267
lxvii
CMOS Battery on a Computer Motherboard. © Steve Gschmeissner / Science Photo
Library / Getty Images
lxviii
Ports on the back of an Apple Mac Mini
Evan-Amos - Own work
Public Domain
lxix
Typing example.ogv. Modifications made by Parzi. This file is licensed under the Creative
Commons Attribution-Share Alike 3.0 Unported license
lxx
By Drawn by Mysid in CorelDRAW. - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=364930
lxxi
Public Domain, https://commons.wikimedia.org/w/index.php?curid=874943
lxxii
Canon CanoScan N 650U Image Scanner. This is an example of a flatbed reflective
scanner
By Luke Launderville - I created this work entirely by myself., CC BY-SA 3.0,
https://en.wikipedia.org/w/index.php?curid=19637143
This image is licensed under the Creative Commons Attribution-ShareAlike 3.0 License.
lxxiii
By Chris Whytehead, Chris's Acorns – CC-BY-SA-3.0, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=18033660
lxxiv
By Creative Tools from Halmdstad, Sweden - CreativeTools.se - VIUscan - Laser-scanned - ZPrinter
- 3D printed - Viking Belt Buckle 24, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=12419129
lxxv
By Zuzu (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0) or GFDL
(http://www.gnu.org/copyleft/fdl.html)], via Wikimedia Commons
lxxvi
Tastenmaus von Microsoft; Author: Darkone; This file is licensed under the Creative
Commons Attribution-Share Alike 2.5 Generic license
236
Introduction to Computers – Image References
lxxvii
By Suimasentyottohensyuushimasuyo - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=1509949
lxxviii
By Cyrotux - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=2696533
lxxix
Flat Panel Display; Author: Freeware-flo; Permission is granted to copy, distribute and/or modify
this document under the terms of the GNU Free Documentation License, Version 1.2 or any later
version
lxxx
By Jari Laamanen - Own work, FAL, https://commons.wikimedia.org/w/index.php?curid=1829066
lxxxi
By Septagram at English Wikipedia - Transferred from en.wikipedia to Commons by Liftarn using
CommonsHelper., Public Domain, https://commons.wikimedia.org/w/index.php?curid=12137116
lxxxii
By Michael Movchin - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=21150893
lxxxiii
By Evan-Amos - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=62084213
lxxxiv
By KDS4444 - Own work, CC BY-SA 4.0,
https://commons.wikimedia.org/w/index.php?curid=47285674
lxxxv
By Fourohfour - Own work, CC BY-SA 2.5,
https://commons.wikimedia.org/w/index.php?curid=596036
lxxxvi
By Original uploaded by Pointillist (Transfered by Gavin.perch) - Original uploaded on
en.wikipedia, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=13654118
lxxxvii
By http://muzyczny.pl - http://muzyczny.pl, CC BY-SA 4.0-3.0-2.5-2.0-1.0,
https://commons.wikimedia.org/w/index.php?curid=15232513
lxxxviii
This photo was taken by Evan-Amos as a part of Vanamo Media, which creates public
domain works for educational purposes
lxxxix
By Evan-Amos - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=39729457
xc
By Original: Evan-Amos Derivative work: Beao - This file was derived from: Usb-thumb-
drive.jpg, Public Domain, https://commons.wikimedia.org/w/index.php?curid=12862548
xci
By George Chernilevsky - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=6963942
xcii
By Daniel P. B. Smith. - Image by Daniel P. B. Smith.;, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=7097264
xciii
By TedColes - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=11736857
xciv
By Arnold Reinhold - I took this picture of an artifact in my possession. The card was
created in the late 1960s or early 1970s and has no copyright notice., CC BY-SA 2.5,
https://commons.wikimedia.org/w/index.php?curid=775153
xcv
By Morn - Own work, CC BY-SA 3.0,
https://commons.wikimedia.org/w/index.php?curid=30135961
xcvi
https://www.mobiletransaction.org/different-types-of-mobile-payments/
xcvii
https://www.mobiletransaction.org/different-types-of-mobile-payments/
xcviii
By Baran Ivo - Own work, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=2964670
237