Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
20 views

Introduction To Computing

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Introduction To Computing

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 154

Instructional Material

For

COMP 20013
Introduction to Computing

Compiled by:

Michael Anjelo O. Miguel, MIT


Overview
This instructional Material is designed to provide students with a breadth-first overview of
computing fundamentals. The materials covered in this course include concepts such as
components of the computer system, number system operation and conversion, data
representation, digital logic system, levels of programming, computer networks, computer
applications, current trends and issues.

This course provides and overview of the computing industry and computing profession
including research and applications in different fields; an appreciation of computing in different
fields such as Biology, Sociology, Environment and Gaming; an understanding of ACM
requirements; an appreciation of the history of computing; and knowledge of the key components
of computer systems (organization and architecture), malware, computer security, internet and
internet protocols, HTML 4/5 and CSS.

Course Outcomes
1. Explain fundamental principles, concepts and evolution of computing systems as they
relate to different fields.
2. Expound on the recent developments in the different computing knowledge areas
3. Analyze solutions employed by organizations to address different computing issues.
4. Identify and define the components of the computer system.
5. Compare and understand the different number systems such as binary, decimal, and
hexadecimal number systems.
6. Perform number conversion, fixed point and floating point number representation.
7. Understand the basics of digital logic system.
8. Identify the different levels of programming.
9. Understand the concepts of data communication, network components, protocols and
internet issues.
10. Be aware of the important social issues and the impact that it is having on society.
11. Demonstrate awareness of the important social and ethical issues and computing
technologies’ impact on such concerns.
12. Evaluate tools and techniques for purposes of identifying best practices in computing
development.

Assessment
Assessment is the systematic basis for making inferences about the learning and
development of students. It is the process of defining, selecting, designing, collecting, analyzing,
interpreting, and using information to increase students' learning and development.

Herewith, assessment is required at the end of every chapter in this instructional material.

Grading System

Midterm Grade = 70% Class Standing (Seatwork, Quizzes; Research, Exercises & Projects) +
30% Midterm Examination

Finals Grade = 70% Class Standing (Seatwork, Quizzes; Research, Exercises & Projects) + 30%
Finals Examination

Final Grade = (Midterm Grade + Finals Grade) / 2


Table of Contents

Overview of Information and Communications Technology ……………………………….1

Hardware …………………………..….34

Data Representation .……………………………..62

Peopleware ...……………………………73

Software …….…..……………………88

Computer Networks …………………………….105

Hypertext Mark-up Language …………………………….135

References …………………………….150
Overview of Information
and Communications
Technology

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Categorizes computers.
 Contrasts elements of computer system.
 Identifies various events/improvements in the computing world.
 Qualifies the understanding of computer usage
 Illustrate the IPO process
 Determine the classifications and generations of computers

1
Overview

Twenty first century has been the age of so many technological advancements aimed for
making the lives of people better. Technologically advance machines have generated more jobs,
a sign that computerization has been making economic impact. Furthermore, this product of
technological advancement has always been a major means for creating new physical and human
environments. Computer has cut the time needed for calculation enormously.

Technology has certainly changed the way of living. It has influenced the different aspects
of life and undoubtedly, it plays an important role in the lives of people from every walk of life.
Many of the complex and critical processes can be carried out with ease and efficiency with the
help of modern technology.

Computers are extremely important in the modern world of today. In the fast moving life
of the modern world of today, computers hold tremendous significance. Many of us will feel
crippled without a computer, as we have gotten so used to this machine. The importance of
computers cannot be denied in the corporate or business world, at the work place and even in
one's personal life.

In the modern work place, pen are paper are becoming extent. It will not be long, before
pen and paper stop to exist altogether. Same is the case in schools and colleges. Computer has
become an important tool for keeping databases, filing systems, track records. It has made record
keeping and account keeping much easier than it ever was. It helps an organization save tons of
times. It has made data analysis extremely easy, and it can be done at a single click of the mouse.

The emergence of computer-based information has greatly lessened the data processing
load of humans. Computers have become a lifeline of all types of businesses, big or small.
Computer technology has evolved dramatically over the years and has significantly changed
society. As technology advances, it transforms and improves society. Computer-related
technology allows for enhancement of social functions previously difficult or impossible to
execute. There are great resources available through your computer that can increase your
business knowledge, speed up your work output and help you make a positive impression on your
colleagues, clients and boss.

Elements of Computers

A computer is an electronic and programmable machine that accept data (input), process
it into useful and meaningful information (output). This conversion of raw data to meaningful
information through a process called data processing. Data is manipulated to produce results that
will lead to the resolution of a problem or improvement of an existing situation.

Similar to a production process, it follows a cycle where inputs (words, numbers, sound
and pictures) are fed to a process (computer systems, formula, software and hardware, etc.) to
produce output (information, insights and accomplishments). For Example, the user input 50+50
into the computer as data, the computer processes the data and the answer/result is 100 which
is information.

2
Input Process Output

-Cables -Receives Input -Sound


Data
-Keyboard -Visual
-Processes Data
-Microphone -Write disc
-Performs Action
-Internet -Printer

Figure 1-1 Input Process Output Model.

First, you enter the data using input such as cables, keyboard, microphone and internet.
In the next step of the IPO principle the data entered by the operating system or special software
are received and processed. The third and final step of the IPO principle is the output of the data.
The output of the data takes place via the common output devices of the computer. This is not
necessarily meant that they are printed. Also, the display on your monitor is already as output.
Other output devices include speakers and printers. The individual components of IPO must work
together to be able to utilize the data processing.

There are basically four basic functions of computers - input, storage, processing and
output. These are described below:

3
Input. Receiving or accepting
information from outside sources. The
most common way of performing this
function is through the information
entered through the keyboard and the
click of mouse.

Processing. This is really the core of


computer operation. The computer
processes the data that is fed to the
computer by various means and the
data already contained in internal
memory to produce the results that is
the core of all computer application. It
is here that raw data is transformed into meaningful information.

Central Processing Unit (CPU). Also known as the “Brain and Head of computer” it handles all
the instructions user give to the computer, and the faster it does this, the better. The parts of the
CPU are:

 Arithmetic/Logic Unit (ALU): The ALU is divided into units, an arithmetic unit (AU) and
a logic unit (LU).

 Arithmetic unit that performs all the mathematical operations, like addition,
subtraction, multiplication, division.

 Logic unit that performs all the logical operations like testing a value to see if is
true or false, and comparative analysis consist of comparisons like less than,
greater than, equal to or not etc.

 Control Unit: It controls and co-ordinate the overall functioning of the other units of the
computer. It controls the flow of data between them during processing taking the
instructions stored in the primary storage unit.

 Memory Unit: These are special, high-speed storage area within the Central processing
unit. The data must be represented in the memory before it can be processed e.g. if two
numbers are to be multiplied, both numbers must be in the memory, and the result is also
placed in the memory register. This is very fast memory and being on the CPU chip it is
close to the ALU. Its purpose it to prevent delays in programs or data arriving from main
memory. There are two types of computer memory inside the computer, RAM and ROM.

 Random Access Memory (RAM) the computer’s primary working memory which
program instructions and data are stored so that they are accessible directly to the
central processing unit (CPU). Computer memories therefore, are designed to give
the processor random access to the contents

4
Common RAM Chip

 Read Only Memory (ROM) –The portion of a computer’s does not lose its
contents when you switch off the power and that contains essential system
programs that neither you nor the computer can erase.

Common ROM chip

Output. The result produced by the central processing unit. Raw input data that has been
processed by the computer information. The results of the processing are made available for use
by any user or other devices. A printout on a sheet of paper that contains information is an
example.

Storage. The retention of program instructions, initial data, and intermediate data within the
computer. So that, this information is available for processing purposes. There are two types of
computer storage: primary storage and secondary storage.

Primary Storage –also known as the main storage is the area in a computer which
data is stored for quick access by computer’s process

Secondary Storage –A non-volatile storage medium such as a disk drive that stores
program instructions and data, even after you switch off power.

Computer Operations

There are certain operations that are basic to almost any computer a sound
understanding of these basic operations is a necessary prerequisite to examining the specific
operations of a particular computer.

5
Timing

The activities of the central processor are cyclical. The processor fetches an instruction,
performs the operations required, and fetches the next instruction, and so on. This orderly
sequence of events requires precise timing, and the CPU therefore requires a free running
oscillator clock which furnishes the reference for all processor actions. The combined fetch and
execution of a single instruction is referred to as an Instruction Cycle. The portion of a cycle
identified with a clearly defined activity is called a State.

Instruction Fetch

The first state(s) of any instruction cycle will be dedicated to fetching the next instruction.
The CPU issues a read signal and the contents of the program counter are sent to memory, which
responds by returning the next instruction word. The first byte of the instruction is placed in the
instruction register. If the instruction consists of more than one byte, additional states are required
to fetch each byte of the instruction.

When the entire instruction is present in the CPU, the program counter is incremented (in
preparation for the next instruction fetch) and the instruction is decoded. The instruction may call
for a memory read or write, an input or output and/or an internal CPU operation, such as a register
to register transfer or an add registers operation.

Memory Read

An instruction fetch is merely a special memory read operation that brings the instruction
to the CPU's instruction register. The instruction fetched may then call for data to be read from
memory into the CPU. The CPU again issues a read signal and sends the proper memory
address; memory responds by returning the requested word. The data received is placed in the
accumulator or one of the other general purposes registers (not the instruction register).

Memory Write

A memory write operation is similar to a read except for the direction of data flow. The
CPU issues a write signal, sends the proper memory address, then sends the data word to be
written into the addressed memory location.

Wait (memory synchronization)

The speed of the processing cycle, however, is limited by the memory's Access Time.
Once the processor has sent a read address to memory, it cannot proceed until the memory has
had time to respond. Most memories are capable of responding much faster than the processing
cycle requires. A few, however, cannot supply the addressed byte within the minimum time
established by the processor's clock.

Therefore a processor should contain a synchronization provision, which permits the


memory to request a Wait state. When the memory receives a read or write enable signal, it
places a request signal on the processor's READY line, causing the CPU to idle temporarily. After
the memory has had time to respond, it frees the processor's READY line, and the instruction
cycle proceeds.

Input/output

Input and Output operations are similar to memory read and write operations with the
exception that a peripheral 1/0 device is addressed instead of a memory location. The CPU

6
issues the appropriate input or output control signal, sends the proper device address and either
receives the data being input or sends the data to be output.

Data can be input/output in either parallel or serial form. All data within a digital computer
is represented in binary coded form. A binary data word consists of a group 5 of bits; each bit is
either a one or a zero. Parallel 1/0 consists of transferring all bits in the word at the same time,
one bit per line. Serial 1/0 consists of transferring one bit at a time on a single line. Naturally serial
1/0 is much slower, but it requires considerably less hardware than does parallel 1/0.

Interrupts

Interrupt provisions are included on many central processors, as a means of improving


the processor's efficiency. Consider the case of a computer that is processing a large volume of
data, portions of which are to be output to a printer. The CPU can output a byte of data within a
single machine cycle but it may take the printer the equivalent of many machine cycles to actually
print the character specified by the data byte. The CPU could then remain idle waiting until the
printer can accept the next data byte.

If an interrupt capability is implemented on the computer, the CPU can output a data byte
then return to data processing. When the printer is ready to accept the next data byte, it can
request an interrupt. When the CPU acknowledges the interrupt, it suspends main program
execution and automatically branches to a routine that will output the next data byte. After the
byte is output, the CPU continues with main program execution. Note that this is, in principle,
quite similar to a subroutine call, except that the jump is initiated externally rather than by the
program.

More complex interrupt structures are possible, in which several interrupting devices share
the same processor but have different priority levels. Interruptive processing is an important
feature that enables maximum utilization of a processor's capacity for high system throughput.

Hold

Another important feature that improves the throughput of a processor is the Hold. The
hold provision enables Direct Memory Access (DMA) operations. In ordinary input and output
operations, the processor itself supervises the entire data transfer. Information to be placed in
memory is transferred from the input device to the processor, and then from the processor to the
designated memory location. In similar fashion, information that goes from memory to output
devices goes by way of the processor.

Some peripheral devices, however, are capable of transferring information to and from
memory much faster than the processor itself can accomplish the transfer. If any appreciable
quantity of data must be transferred to or from such a device, then system throughput will be
increased by having the device accomplish the transfer directly. The processor must temporarily
suspend its operation during such a transfer, to prevent conflicts that would arise if processor and
peripheral device attempted to access memory simultaneously. It is for this reason that a hold
provision is included on some processors.

7
Characteristics of Computer Systems

The characteristics of computers that have made them so powerful and universally useful
are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly.

Speed

Computers work at an incredible speed, a computer is a very fast device. With speeds
reaching up to 50 million operations per second, the computer can process data faster than any
other machine designed to perform different tasks.

Accuracy

Accuracy of a computer is consistently high and the degree of accuracy of a particular


computer depends on the instructions and the type of processor. No other system can produce
as much accuracy as the computer system.

Storage

The Computer has an in-built memory where it can store a large amount of data. You can
also store data in secondary storage devices such as flash drive, which can be kept outside your
computer and can be carried to other computers. The factor that makes computer storage unique
is that it can store vast amount of data, but the fact that it can retrieve the information that the
user wants in a few seconds.

Diligence

The computer is a machine, does not suffer from the human traits of tiredness. Nor does
it lose concentration even after working continuously for a long time. This characteristic is
especially useful for those jobs where same tasks are done again and again. It can perform long
and complex calculations with same speed and accuracy from the start till the end.

Versatility

Computers are very versatile machines. It means the capacity to perform completely
different type of work. You may use your computer to prepare payroll slips. Next moment you may
use it for inventory management or to prepare electric bills.

Advantages and Disadvantages of Computer

Today, the computer is used in every field and has made our day to day tasks very easy
despite all the merits of computers, they also have their downsides. Read on to learn more about
the advantages and disadvantages of a computer.

8
Advantages of Computer

 Speed Up Work Efficiency

Computer help your work to be a lot easier, much more computing and calculating power
than an ordinary human. Computer also helps you communicate with friends, coworkers and other
contacts. You can download files through computer that you need in your work.

 Fast Communication

Computer is the fastest medium of communication rendering postal and chat


communication. Moreover, using the internet facilities, your message or any files with small
storage size can reach in any part of the world.

 Reduction in Paper Work

The use of computers for data processing in an organization/company leads to reduction


in paper work and speeds up the process. Data in electronic files can be updated, viewed,
retrieved and printed as and when required, the problem of maintenance of large number of files
gets reduced.

 Information Dissemination

Computer has web browser, it allows user to access to hundreds upon thousands of
websites that provide information for anything and everything. Website with search engines will
help you find information quickly.

 File Organization

Computer organizes your data and information. It automates various tasks that you cannot
do manually. Computers can store huge volumes of data; physical files that can fill a whole room
can be stored in one computer once they are digitized.

Disadvantages of Computer

 Cheating

Using computers to cheat is a general problem in universities and colleges. Many teachers
are very concerned about students cheating in their courses. With the information dissemination
capabilities of computer, students tend to use this as their advantage in their education to the
extent that they are already cheating.

 Technical Problems

Computer will always have technical problems/issues that will arise in the latter part of the
computer usage. For works or courses that require network access, technical issues can cause
major problems.

9
 Health risks

Too much time in front of monitor may harmfully affect your eyesight. Sitting in front of a
computer for too long without exercise can cause a weight gain and other health issues. Computer
can have negative effects on your social life and interactions with other people.

 Computer Crimes

This is one of the most controversial aspects of computer today. Computer can be a tool
to different computer crimes. Some people use the computer for negative activities. They use
computer to child pornography, cyber terrorism, cyber bullying, etc.

Therefore, we can conclude that with the modern technology development, the application
of computer technology has become a new trend in recently. Computer technology still has its
limitations and weakness. Consequently, when we try to apply computer technology and different
software programs to enhance our learning and share it with others, we should realize what the
advantages and disadvantages show in current computer technology in order to avoid for
misemploying and get its maximum benefits for our learning and the society.

Classifications/Categories of Computers

Over the years as technology keeps improving, more and more people are using computer
as part of their daily lives. Technology has become a significant matter in all our lives. Though
some are addicted to it, others only use it once in a while, but still we all have used it at least
once. Thankfully we have technology to make our lives easier.

Computers are actually all around us, and can be broken down into separate categories
depending on their size and processing power. Certain definitions have changed over time with
the speedy advances in technology –we have computers that can fit in the palm of our hands now
that have as much processing power as a computer that was the size of a whole room half a
century ago.

Let us take a look at the different types of computers which will help us understand their
functions and what they are used for.

Personal Computer (PC)

A stand-alone computer based on a microprocessor equipped with all the system, utility,
application software, and the input/output devices and other peripherals that a user needs to
perform one or more tasks. Usually used in home or office setting, also called microcomputer.

10
Desktop

Any PC that is designed to fit on a standard-sized desk and equipped with sufficient
memory and secondary storage to perform business computing tasks. They usually have more
power and storage compared to their movable counterparts.

11
Laptop or Notebook

A small portable computer that is light that can be placed/hold on the lap and can be
moved around is called laptop. The device can be carry the battery –operated device to classes
or meetings conveniently and store any notes or information in it. It integrates the parts of the
basic parts of computer (monitor, keyboard, pointing device, CPU, memory and hard drive) in one
system/device.

Netbook

This is similar to a laptop, the only difference being that it is smaller in size, which makes
it even more portable. It is also less expensive and performs the basic functions, but its internal
parts are not as powerful as a desktop or laptop.

12
Workstation

A powerful, single-user computer consists of a more powerful processor, greater memory


space and extra ability to perform specific computer instructions and work. Moreover, this
computer is commonly used by programmers, game developers, network administrators, video
or sound editors and graphic designers/artist.

Personal Digital Assistant (PDA)

A Personal Digital Assistant is a small, highly integrated computer usually using flash
memory for storage instead of a hard drive. It u keyboard. Those which use a digital pen for input
are called handheld computers. It is light, portable, has good battery life and fits within your palm,
because of which it is also called a palmtop.

13
Server

A computer that provides services that received from the users of the network. The
server’s main purpose is to provide certain computers. A whole room is necessary to fit the whole
server. It has powerful processors and better computer systems.

Wearable Computer

This device is worn on the body like a watch or visor and is often used by military
professionals or doctors to track human actions if their hands are engaged in other activities.
Smart watches and fabric PCs are examples of wearable computers.

All these types of computers serve a different purpose but there are a few things common
in all of them, that is, they help us save time and aid in achieving accuracy in our work. From
occupying a whole room to fitting in our pocket, the computer has indeed come a long way. And
the best part is that in spite of so many developments and differences in features, its journey has
just begun, as the possibilities of what they can do are limitless.

14
Activities/Assessment

I. Multiple Choice. Read each question carefully, and then CIRCLE THE ANSWER that best
fits the question.

1. It is known as the brain of any computer system.


A. ALU
B. Memory
C. CPU
D. Control unit
E. None of the above
2. Which part interprets program instructions and initiate control operations?
A. Input
B. Storage unit
C. Logic unit
D. Control unit
E. None of the above
3. A general purpose single-user microcomputer designed to be operated by one person at a
time is?
A. Special-purpose computer
B. KIPS
C. M
D. PC
E. None of the above
4. This device is worn on the body like a watch or visor and is often used by military professionals
or doctors to track human actions if their hands are engaged in other activities.
A. Supercomputer
B. Desktop
C. Mobile phone
D. Wearable computer
E. None of the above
5. Raw input data that has been processed by the computer information.
A. Process
B. Input
C. Output
D. Data
E. None of the above

II. Identification. Read each statement or question below carefully and fill in the blank(s) with
the correct answer.

1. ALU stands for _______________.


2._______________is the computer’s primary working memory in which program
instructions and data are stored so that they are accessible directly to the central processing unit

15
(CPU).
3.______________ is similar to a laptop, the only difference being that it is smaller in size, which
makes it even more portable.
4.______________ is the part of the computer that holds data and instructions for processing.
5. CPU stands for ______________.

III. Application. Read the questions carefully and confine your responses to an analysis of the
questions as written.

1. What is a CPU and explain how it works?

2. What are the advantages and disadvantages of computer?

3. What are the classifications/categories of computer?

4. Explain the importance of computers in the government.

5. Explain how the IPO model works?

16
History of Computers

"Who invented the computer?" is not a question with a simple answer. The real answer
is that many inventors contributed to the history of computers and that a computer is a complex
piece of machinery made up of many parts, each of which can be considered a separate invention.

In particular, when understanding the history of computer you should look and consider
for two things:

 The progression in hardware representation of a bit of data:

1. Vacuum Tubes (1950s) - one bit on the size of a thumb;

2. Transistors (1950s and 1960s) - one bit on the size of a fingernail;

3. Integrated Circuits (1960s and 70s) - thousands of bits on the size of a hand

4. Microprocessors (1970s and 2010) - millions of bits on the size of a finger nail.

5. Artificial Intelligence (2010 and on) - billions of bits on the size of a hand.

 The progression of the ease of use of computers:

1. Almost impossible to use except by very patient geniuses (inventors, scientists)


(1950s);

2. Programmable by highly trained people only (computer professionals, trainers, and


rich people)(1960s and 1970s);

3. Useable by just about anyone (kids, students, parents, professionals both technical
and non-technical people) (1980s and on).

The following brief history of computing is a timeline of how computers evolved from their
humble beginnings to the machines of today that surf the Internet, play games and stream
multimedia in addition to crunching numbers.

ENIAC, 1946

Electronic Numerical Integrator and Computer (ENIAC) was the first electronic general-
purpose computer. This was used in World War II for calculation of ballistic trajectories, but not
yet completed during that time. However, it was complete a year after the war.

17
SAGE, 1954

Semi-Automatic Ground Environment was a system of large computers designed to help


the Air Force track radar data in real time. It also produces a single unified image of the airspace
over a wide area. Its enormous computers and huge displays remain a part of cold war lore, and
a common prop in some movies.

NEAC 2203, 1960

This is a drum-based device manufactured by the Nippon Electric Company (NEC). The
NEAC 2203 is among the first transistorized computers. It was used for business, scientific and
engineering applications.

18
IBM System/360

IBM System/360 mainframe was the first to cover a complete range of applications, from
small to large, from commercial to scientific. System/360 was extremely successful in the market,
allowing customers to purchase a smaller system with the knowledge they would always be able
to migrate upward if their needs grew, without reprogramming of application software or replacing
peripheral devices.

Many consider the design one of the most successful computers in history, influencing
computer design for years to come. Higher-end System/360 models had roles in NASA's Apollo
missions as well as air traffic control systems.

19
CDC 6600, 1964

The Control Data Corporation's 6600 (CDC 6600) is believed to have been the first
computer to be designated as a "supercomputer," offering the fastest clock speed for its day (100
nanoseconds).An interactive display console allowed users to view graphical results as data were
being processed. The 6600 supported the FORTRAN 66 compiler and a program library.

DEC PDP-8, 1965

The 12-bit PDP-8, produced by Digital Equipment Corporation (DEC), is the first
successful commercial minicomputer. DEC proposed its own vision, by encouraging users to
educate themselves and take part in the evolution of the line. By virtue of their CMOS technology
they had low power requirements and were used in some embedded military systems.

20
Interface Message Processor, 1969

The Interface Message Processor provided a system independent interface to the


ARPANET that could be used by any computer system, thereby opening the Internet network
architecture from the very beginning. The interface message processor (IMP) was the first packet-
router. It was part of the ARPANET, the precursor to today's Internet. IMPs monitored network
status and gathered statistics. This laid the groundwork for the modern Internet and the network
architecture that makes it possible.

Kenbak-1, 1971

This computer is often considered as the world's first "personal computer" the Kenbak was
touted as an easy-to-use educational tool, but it failed to sell more than several dozen units.
Lacking a microprocessor, it had only 256 bytes of computing power and its only output was a
series of blinking lights.

21
Cray-1, 1976

The Cray-1 was a supercomputer designed, manufactured and marketed by Cray


Research. Featuring a central column surrounded by a padded, circular seat, the Cray-1 looked
like no other computer.

Apple I, 1976

The original Apple Computer, also known retroactively as the Apple I, or Apple-1, was
released by the Apple Computer Company (now Apple Inc.) in 1976. They were designed and
hand-built by Steve Wozniak. Wozniak's friend Steve Jobs had the idea of selling the computer.

Apple I was initially rejected by his bosses at Hewlett-Packard. Undeterred, he offered


it to Silicon Valley's Homebrew Computer Club and, together with his friend Steve Jobs, managed
to sell 50 pre-built models to The Byte Shop in Mountain View, California.

22
IBM Personal Computer, 1981

When the IBM Personal Computer (IBM 5150) was introduced to the world 34 years ago,
it was dramatically clear to most observers that IBM had done something very new and different.
Although IBM's launch of the Personal Computer (IBM 5150) in 1981 set the industry standard for
personal computing.

IBM had introduced a variety of small computers for individual users several years before
that. In short, the introduction of the IBM Personal Computer a quarter-century ago set a
worldwide personal computing standard and helped to establish a multibillion-dollar industry.

23
Osborne 1 Portable Computer, 1981

The Osborne 1 was the first commercially successful portable microcomputer, it includes
all the components required to be a completely useful and operational computer system:

 Two built-in floppy drives which hold 91K of data each, with floppy disk storage
compartments

 A detachable full-size keyboard with numeric keypad

 Built-in, albeit small, monochromes CRT monitor.

 Runs the CP/M Operating System, the most popular OS at the time.

Hewlett-Packard 150, 1983

Representing the first step in a technology widely available today, The HP-150 was a
"compact, powerful and innovative" computer made by Hewlett-Packard in 1983. The HP-150
personal computer featured a touch-sensitive screen that allowed users to activate a feature by
touching the screen. The PC had an MS-DOS operating system and an Intel 8088
microprocessor.

24
Deep Blue, 1997

Deep Blue was a chess-playing computer developed by IBM. The game is a collection
of challenging problems for minds and machines, but has simple rules, and so is perfect for such
experiments. Over the years, many computers took on many chess masters, and the computers
lost.

IPhone, 2007

The handy little device introduced by Apple CEO Steve Jobs in 2007 not only brings
together internet access, a regular cell phone, camera and media player, it supports a wide variety
of third party applications, or apps, that supply everything from recipes to maps of the night sky,
and wraps it all in a sleek, glossy exterior.

25
iPad, 2010

The iPad is a tablet computer designed and manufactured by Apple. In addition, it's half
an inch thick, weighs 1.5 pounds and features a 9.7 inch display. Since the iPad was released
in 2010, Apple has sold more than 67 million units of the device. The original iPad was an iPhone
gone IMAX and the first successful tablet the world had ever seen.

The iPad 2 made it thinner, lighter, and faster. The iPad 3 went Retina and LTE but not
comfortably so. The iPad 4 made Retina and LTE sing. And the iPad mini showed portability
could be just as important as power.

Android TV, 2014

A smart TV platform from Google built around the Android operating system. Users can
stream content to your TV via apps, both free and paid, using your internet connection. On that
front, it’s the same as Roku and Amazon Fire. You navigate through menus the same way, using
your phone as a remote to guide you as you go. Unlike other devices, however, Android has an
open system, giving Android TV access to apps Google might not officially approve of.

26
Apple Watch, 2015

Operates primarily in conjunction with the user's iPhone for functions such as configuring
the watch, calling and texting, and syncing data with iPhone apps, but can independently
connect to a Wi-Fi network for some tasks.

Surface Go, 2018

Surface Go is perfect for all your daily tasks, giving you laptop performance, tablet
portability, and a stunning touchscreen with the power of Windows 10.

Lenovo Yoga 5G, 2020

Lenovo Yoga 5G is a Windows 10 laptop with a 14.00-inch display that has a resolution
of 1920x1080 pixels. It is powered by a Snapdragon processor and it comes with 8GB of RAM.

27
I hope you have a better understanding of how the computer developed from giant
machinery to something that fits in your hand. The computed development follows a step by step
process. It started little by little and from low technology until it became high technology.

History and development of computers can change the process of data and information
manipulation because and of peoples storage” ’knowledge. Computers continue to develop and
upgrade. It can be viewed, collect and handle complicated information.

Generations of computers

The history of the computer goes back several decades however and there are five
definable generations of computers. Each generation is defined by a significant technological
development that changes fundamentally how computers operate –leading to more compact,
less expensive, but more powerful, efficient and robust machines.

The development of electronic computers can be divided into five generations


depending upon the technologies used. Each of the five generations of computers is
characterized by a major technological development that fundamentally changed the way
computers operate. The following are the five generations of computers.

First Generation Computers: Vacuum Tubes (1950s)

Second Generation Computers: Transistors (1950s and 1960s)

Third Generation Computers: Integrated Circuits (1960s and 70s)

Fourth Generation Computers: Microprocessors (1970s and 2010)

Fifth Generation Computers: Artificial Intelligence (2010 and on)

28
Generation Material Used Description Examples
First Generation Vacuum Tubes The first computers used
Computers
(1950s) vacuum tubes for circuitry and

magnetic drums for memory,

and were often enormous,

taking up entire rooms. They

were very expensive to

operate and in addition to

using a great deal of ENIVAC


electricity, generated a lot of

heat, which was often the

cause of malfunctions.

The beginning of commercial

computer age is from

UNIVAC (Universal

Automatic Computer).

UNIVAC-1.

Table 1.1 First Generation Computers

29
Generation Material Used Description Examples
Transistor
Second s Transistors replaced vacuum
Generation (1950s and
tubes and ushered in the
Computers 1960s)
second generation of

Computers. The transistor was

invented in 1947 but did not

see widespread use in

computers until the late 1950s.

The transistor was far superior IBM 7094 series


to the vacuum tube, allowing

computers to become smaller,

faster, cheaper, more energy-

efficient and more reliable

than their first-generation

predecessors.

Second-generation computers

still relied on punched cards


for input and printouts for IBM 1400 series

output.

The size of the computers was

decreased by replacing

vacuum tubes with transistors.

CDC 6600

Table 1.2 Second Generation Computers

30
Generation Material Used Description Examples
Third Generation Integrated The development of the
Computers Circuits (1960s
integrated circuit was the
and 70s)
hallmark of the third

generation of computers.

Transistors were miniaturized

and placed on silicon chips,

called semiconductors, which

drastically increased the speed IBM 370


and efficiency of computers.

Instead of punched cards and

printouts, users interacted

with third generation

computers through keyboards

and monitors and interfaced

with an operating system,

which allowed the device to


IBM System/360
run different. Computers for

the first time became

accessible to a mass audience


because they were smaller and

cheaper than their

predecessors.

The computer became smaller

in size, faster, more reliable

and less expensive.


UNIVAC 1108

Table 1.3 Third Generation Computers

31
Generation Material Used Description Examples
Fourth Microprocessor The microprocessor brought
Generation s (1970s and
the fourth generation of
Computers 2010)
computers, as thousands of

integrated circuits were built

onto a single silicon chip.

What in the first generation

filled an entire room could

now fit in the palm of the Apple Macintosh


hand.

As these small computers


becam
e more powerful, they

could be linked together to

form networks, which

eventually led to the

development of the Internet.

Fourth generation computers

also saw the development of

GUIs, the mouse and

handheld devices.

It greatly reduced the size of

computer. The size of modern

Microprocessors is usually one IBM PC

square inch. It can contain

millions of electronic circuits.

Table 1.4 Fourth Generation Computers

32
Generation Material Used Description Examples
Fifth Generation Artificial Fifth generation computing
Computers Intelligence
devices, based on artificial
(2010 and on)
intelligence, are still in

development, though there are

some applications, such as

voice recognition, that are

being used today. The goal of

fifth-generation computing is
IBM Watson
to develop devices that

respond to natural language

input and are capable of

learning and self-organization.

Can respond to its

surroundings using different

types of sensors. Scientists are

constantly working to increase

the processing power of

computers. They are trying to

create a computer with real IQ

with the help of advanced

programming and

technologies.

Table 1.5 Fifth Generation Computers

33
Computer Hardware

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Determine the different input, output and storage devices


 Distinguish the parts of Motherboard
 Explain the basics of digital logic system.
 Enumerate the Types of computer Keyboards, mouse, etc.
 Familiarized with the parts and functions of Keyboard
 Identifies different Hard drive connections

34
Introduction

Computer hardware is the collection of physical parts of a computer system. This is also
sometime called the machinery or the equipment of the computer. This refers to objects that you
can actually touch, like disks, disk drives, display screens, keyboards, printers, boards, chips and
many others.

A computer's hardware is comprised of many different parts, but perhaps the most
important of these is the motherboard. The motherboard is made up of even more parts that power
and control the computer. The motherboard brings all the core components together such as the
Central Processing Unit (CPU), Memory and Hard Disks. In short, the motherboard connects and
allows all of the components in the computer to work together. The main components of computer
system are the following:

 Motherboard

 Input Devices

 Output Devices

 Storage Devices

Figure 2.1 inside the Computer Case Parts

35
Motherboard

Motherboard is a printed circuit board that is the foundation of a computer that contains
the computer's basic circuitry and components. A motherboard is the physical arrangement in a
computer that allow compatible devices to connect to your computer when you need them -
devices like digital cameras, printers, etc. Most importantly, the motherboard allows hardware
components to communicate with one another. You may also be able to upgrade to a faster PC
by replacing the CPU chip.

If you were to open up your computer and take out the motherboard, you would probably
get pretty confused about all the different parts. Depending on the make and model of your
computer, it might look something like the picture below.

Input Devices

To interact with your computer, you need input devices. An input device for a computer
allows you to enter information. The fundamental task of computer input is to move information
from the brain of the user into the computer.

Examples of input devices include keyboards, mice, scanners, digital cameras and
joysticks. However, there are dozens of other devices that can also be used to input data into the

36
computer. Below is the list of some computer input devices that can be used with a computer or
a computing device.

Keyboard

The most frequently used input device for all computers. Moreover, keyboard provides
a set of alphabetic, numeric, punctuations, symbols and control keys. When an alphanumeric or
punctuation key is pressed, the keyboard sends a coded input signal to the computer, which
echoes the signal by displaying a character on-screen.

Types of Computer Keyboards

 Laptop Keyboards

The laptop computer keyboard is a small version of the typical QWERTY keyboard. A
typical laptop has the same keyboard type as a normal keyboard, except for the fact that most
laptop keyboards condense the symbols into fewer buttons to accommodate less space.

 Gaming Keyboards

Illuminated keyboards are useful for playing games, during the night, when it's too dark
to see the keyboard normally. The multimedia keys are also useful for adjusting the volume, for
changing the music tracks and for doing other things, while continually playing your game.

37
 Ergonomic Computer Keyboards

This computer keyboard designed with ergonomic considerations to minimize muscle


strain and a host of related problems.

 Laser Keyboards

The laser keyboard is a recent gadget to the computing world. This device projects the
keyboard on to a flat surface, such as a table or desk. This then allows you to type directly onto
the table. However, this invention still needs to be improved and can be frustrating to use at the
moment.

38
 Wireless Keyboards

The main benefits of using a wireless keyboard are that they help to reduce clutter, plus
allow you to control your device from a distance. For devices such as the TV that may be a few
feet away from where you are sitting, wireless keyboards are as much of a convenience as the
remote control.

The two main technologies powering wireless keyboards in the market today are:

Bluetooth: This is the most popular method of syncing your wireless keyboard to your computer.
It works with a range of devices that support Bluetooth, from tablets, some smartphones, to your
TV. On the flip side, they aren’t as hassle free to connect as RF keyboards.

Radio-frequency (RF): RF keyboards utilize a broadcast technique similar to the Wi-Fi standards
to create a wireless connection to your computer. Most keyboards that come with a dongle you
insert in the USB port to pair your wireless keyboard with uses 2.4 ghz RF technology. Setting up
the connection is painless, though with the dongle RF wireless keyboards are much more limited
in the types of devices it works with.

The downside of wireless keyboards is that they need to be recharged periodically, though
modern wireless keyboards can usually go for months, if not years, between a battery swap .

39
Parts and Functions of Keyboard

Character keys

The character keys are used for typing text, and in various combinations, as action
shortcuts in programs and computer games. These keys include the same letter, number,
punctuation, and symbol keys found on a traditional typewriter. It also includes number’s
symbols and special key.

Modifier keys

These keys are used alone or in combination with other keys to perform certain actions.
The most frequently used control keys are CTRL, ALT, and SHIFT. These keys are called
combination keys because they only work together with other key to perform specific task.

Enter and editing keys

These keys are used to create new line/paragraph in documents. Moreover, the main
function of these keys is to for editing purpose only.

System and GUI keys

40
These keys are commonly used in computer program actions. Most of the functions of
these keys will create a certain command faster than using your mouse. Aside from it, System
and GUI’s keys allows the user of program instructions to go.

Navigation keys

These keys provide navigation through documents and help you scroll in Web browsers.
In addition to this, using these keys will help the user to locate the cursor in documents.

Function Keys

The function keys are labeled F1 through F12. The functions keys are located at the top
of a keyboard and grouped into four. These keys are called function keys because they perform
special functions.

Numeric keypad

Numeric keypad allows you to enter numbers quickly. Numeric keypad compose of
numbers from 0 to 9 and symbols like (+, ‐/, and *) belong to this part of the keyboard. It is arranged
like a standard calculator used to enter numerical data.

Lock keys

User has to press a Lock key once to activate it, and you press that Lock key again to
deactivate it. When a lock key is on, a corresponding status light will appear in the right side of
your keyboard indicating which locks are enabled.

Shortcut Keys and their Functions:


Some commonly used computer shortcut keys are enumerated below.

Shortcut Keys Descriptions

Alt + F: File menu options in current program.

Alt + E: Edit options in current program.

F1: Universal Help in almost every Windows program.

Ctrl + A: Select all text.

Ctrl + X: Cut selected item

Shift + Del: Permanently delete selected item in computer system.

Ctrl + C: Copy selected item.

Ctrl + Ins: Copy selected item.

Ctrl + V: Paste selected item.

41
Shift + Ins: Paste selected item.

Home: Goes to beginning of current line.

Ctrl + Home: Goes to beginning of document.

End: Goes to end of current line.

Ctrl + End: Goes to end of document.

Shift + Home: Highlights from current position to beginning of line.

Shift + End: Highlights from current position to end of line.

Ctrl + Left arrow: Moves one word to the left at a time.

Ctrl + Right arrow: Moves one word to the right at a time.

Ctrl + Alt + Right arrow: Rotate the screen to the right.

Ctrl + Alt + Down arrow: Rotate the screen down.

Ctrl + Alt + Left arrow: Rotate the screen to the left.

Ctrl + Alt + Up arrow: Rotate the screen up or the default screen.

Table 2.1 Computer Shortcut Keys and their Functions

Mouse

An input device, equipped with one or more control buttons that is housed in a palm-sized
case and designed so that you can roll the cursor of the mouse. As the mouse moves, its circuits
relay signals that correspondingly move a pointer on-screen. The simplest of all mouse functions
is repositioning/moving the cursor: you can also use the mouse to trigger an event and choose
commands from menus, select text for editing purposes, move objects, and draw pictures on-
screen.

Two types of Internal Mouse Mechanisms:

 Mechanical Mouse

This is the traditional/commonly used mouse in the first boost of computer technology in
90’s. This mouse-coated ball on has the underside a rubber of the case. As you move mouse, the
ball rotates and optical sensors detect the motion.

42
 Optical Mouse

This mouse registers its position by detecting reflections from light-emitting diode that
directs beam downward. Optical mouse does not need cleaning, because it has no moving parts.
This all-electronic feature also eliminates mechanical fatigue and failure. This is an asset in
graphics applications, and it makes computer operation easier in general.

 Cordless Mouse

The mouse relays a signal to a base station wired to the computer's mouse port. The
cordless mouse requires power, which comes in the form of batteries. Infrared is much better for
precision when moving in small increments when compared to the other types of mouse.

43
 Gaming Mouse

A desktop mouse with additional functions to make it suited to computer gaming and high
intensity programming. These functions often include programmable buttons, higher sensitivity,
adjustable weight and faster response times.

44
The tables below shows the defaults for keyboard shortcuts. The current settings for all
shortcuts may be found in the Keyboard Options dialogue.

Shortcut Keys Descriptions


Selects text from where you click and hold to the point you
Click, hold, and drag: drag
and let go.
Double-click: If double-click a word, selects the complete word.

Double-click: Double-clicking on the left, center, or right of a blank line will


make the alignment of the text left, center, or right aligned.
Double-clicking anywhere after text on a line will set a tab
Double-click: stop.
Selects the line or paragraph of the text the mouse triple-
Triple-click: clicked.
Ctrl + Mouse wheel: Zooms in and out of document (Shortcut Keys and their
Functions).

Table 2.2 Mouse Shortcuts


Joystick

A cursor control device widely used for computer games and software applications. This
device is one of the greatest contributions in both computers and gaming.

45
Light pen

An input device that uses a light-sensitive stylus to enable you to draw on-screen draws
on a graphics tablet or select items from menus.

Computer Scanner

A peripheral device that digitizes text, photos, and artworks and stores the image as a
file you can merge with text in many word processing and page layout programs.

46
Microphone

A hardware device that allows computer user to input audio into their computers.
Microphone can be used as VoIP, Online Chatting and Voice Recognition.

Webcam

A webcam is a video camera that feeds or streams its image in real time to or through a
computer to computer network. When "captured" by the computer, the video stream may be
saved, viewed or sent on to other networks via systems such as the internet, and email as an
attachment. Webcam commonly used in video monitoring, video calling, videoconferencing,
commerce and video security.

47
Output Devices

An output device is any peripheral that receives data from a computer, usually for display,
projection, or physical reproduction. Most computer data output that is meant for humans is in the
form of audio or video. Thus, most output devices used by humans are in these categories.
Examples include monitors, projectors, speakers, headphones and printers.

Global Positioning System (GPS)

A space-based satellite navigation system that provides location and time information in
all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight
to four or more GPS satellites.

Headphones

Headphones originated from the earpiece, and were the only way to listen to electrical
audio signals before amplifiers were developed. Headphones may be used with stationary CD
and DVD players, home theater, personal computers, or portable devices (e.g. digital audio
player/mp3 player, mobile phone, etc.).

48
Monitor

Monitor is the piece of computer hardware that displays the video and graphics information
generated by the computer through the video card. Monitors are very similar to televisions but
usually display information at a much higher resolution.

Printer

A computer output device designed to print computer-generated text or graphics on paper.


Printers are different when it comes to its specifications such as speed, quality, noise, graphics
capabilities, weight, built-in fonts, purpose, drivers, and paper usage.

49
Projector

Projector also called a digital projection display system is a specialized computer display
that projects an enlarged image on a movie screen, projector screen and wall (as long as it
compliment to the image projection). Such device is commonly used in presentations.

Computer Speakers

A hardware device connected to a computer's sound card that outputs sound generated
by the computer. Some speakers are designed to work specifically with computers, while others
can be hooked up to any type of sound system. Regardless of their design, the purpose of
speakers is to produce audio output that can be heard by the listener.

50
Storage Devices

A storage device is any computing hardware that is used for storing, porting and extracting
data files and objects. The storage device may hold, or save, the information temporarily or
permanently. The computer's primary hard drive stores the operating system, applications, and
files and folders for users of the computer.

They are available in different form factors depending on the type of underlying device.
For example, a standard computer has multiple storage devices including RAM, cache, a hard
disk, an optical disk drive and externally connected USB drives.

Types of computer storage

 Magnetic storage devices

Magnetic storage is one of the most common types of storage used with computers and
is the technology that many computer hard drives use.

51
 Optical storage devices

Uses lasers and lights as its method of reading and writing data.

 Flash memory devices

Flash memory has started to replace magnetic media as it becomes cheaper and more
efficient solution.

 Online and cloud

Storing data online and in cloud storage is becoming popular as people need to access
their data from more than one device.

52
Hard drive

Hard drive is a data storage device used for storing and retrieving digital information. Your
Operating System is stored on your hard drive, as well as all your software programs, like
Microsoft Word/ Microsoft Offices.

What are the different types of hard drive connections?

There are four basic ways to connect your hard drive to your computer:

 USB

USB is the most common connection type for external devices, whether external hard
drive, thumb drives, flash drives, printers, cameras, all kinds of other devices. It is extremely easy
to use. Whether the computer is powered on or powered off, simply connect the cable to your
device and it should be ready to be used less than 30 seconds later (depending on your
computer's speed).

 FireWire

FireWire is a similar connection to USB, in that it is plug-and-play. Simply connect your


device to the computer and it will usually be ready to be used within 30 seconds. FireWire is
much more common in Mac computers than in Windows computers.

53
 Serial ATA (SATA)

Serial ATA is the most common connection for internal drives in modern PCs and Macs.
There can be multiple SATA ports on any one motherboard or controller card. One cable connects
one hard drive to one port on the motherboard (as opposed to Parallel ATA).

 eSATA

Describe as a less common, high-performance connection most commonly found in PCs.


An eSATA connection performs at speeds that most closely resemble an internal drive. eSATA
(external Serial ATA) is a high-performance interface most commonly found in Windows PCs, but
is fairly rare.

54
Compact Disk (CD)

An optical storage device, which data such as music, text, or graphic images is digitally
encoded. Compact disks provide read-only secondary storage features which allows only the
compute to write and read information from the disk, but cannot change or write new information

Jump drive or flash drive

A flash drive is a small storage device that can be used to transport files from one
computer to another. Flash drives are often referred to as pen drives, thumb drives, or jump drives.

USB flash drives have less storage capacity than an external hard drive, but they are
smaller and more durable because they do not contain any internal moving parts.

55
Memory card

An electronic flash memory storage disk commonly used in consumer electronic devices
such as digital cameras, MP3 players, mobile phones, and other small portable devices. There
are a handful of different types of memory cards on the market, each varying in size, compatibility,
and storage capacity. The most commonly used memory cards are listed below.

 CompactFlash (CF)

CompactFlash is a flash memory mass storage device used mainly in portable electronic
devices. The format was specified and the devices were first manufactured by SanDisk in 1994.

 MicroSD

MicroSD are the smallest removable flash memory cards, range in available sizes of 128
MB to 4 GB, and often used with cell phones.

56
 Multimedia Card/MMC

MMC is used as storage media for a portable device, in a form that can easily be removed
for access by a PC. . MMC and SD cards differ in their physical size, capacity and their usage.
Both come in different memory sizes as well. While MMCs can be used in a standard SD card
slot, the latter cannot be used in a MMC slot.

 SD Card

The SD card is a basic way of transferring information and storing it. The good thing
about it is that it’s a non-volatile solution just like the majority of storage devices and you don’t
need power source for it to keep the data.

57
Cloud storage

Cloud storage means "the storage of data online in the cloud," wherein a company's data
is stored in and accessible from multiple distributed and connected resources that comprise a
cloud. Cloud storage has several advantages over traditional data storage. Fo example, if you
store your data on a cloud storage system, you'll be able to get to that data from any location that
has Internet access.

Digital Logic System

Digital logic is the representation of signals and sequences of a digital circuit through
numbers. It is the basis for digital computing and provides a fundamental understanding on how
circuits and hardware communicate within a computer. Digital logic is typically embedded into
most electronic devices, including calculators, computers, video games, and watches. This field
is utilized by many careers that work with computers and technology, such as engineers and
repair technicians.

A main component of digital logic consists of five different logic gates:

 AND
 OR
 XOR
 NAND
 NOR

These basic logic gates are used in conjunction with one another to build elaborate
engineering designs that deliver various computing outcomes. In addition to other types of
circuitry and board and chip design, logic gates direct the computing and calculation work that
electronic technologies do on a device. For example, circuits use logic gates to construct the
outputs for digital numbers on calendars and other displays, by returning separate logical results
for each particular digital component or “side” of one of these digital numbers.

58
Simple Digital Logic Gates

Simple digital logic gates can be made by combining transistors, diodes and resistors with
a simple example of a Diode-Resistor Logic (DRL) AND gate and a Diode-Transistor Logic (DTL)
NAND gate given below.

The simple 2-input Diode-Resistor AND gate can be converted into a NAND gate by the
addition of a single transistor inverting (NOT) stage. Using discrete components such as diodes,
resistors and transistors to make digital logic gate circuits are not used in practical commercially
available logic IC’s as these circuits suffer from propagation delay or gate delay and also power
loss due to the pull-up resistors.

Another disadvantage of diode-resistor logic is that there is no “Fan-out” facility which is


the ability of a single output to drive many inputs of the next stages. Also this type of design does
not turn fully “OFF” as a Logic “0” produces an output voltage of 0.6v (diode voltage drop), so the
following TTL and CMOS circuit designs are used instead.

59
Activities/Assessment

I. Multiple Choice. Read each question carefully, and then CIRCLE THE ANSWER that best
fits the question.

1. The representation of signals and sequences of a digital circuit through numbers.


a. Logic gates
b. Digital logic
c. Circuit
d. Frequency
e. None of the above
2. Provides read-only secondary storage features which allows only the compute to write and
read information from the disk, but cannot change or write new information
a. DVD
b. Blue-Ray
c. CD
d. Diskette
e. None of the above
3. Any computing hardware that is used for storing, porting and extracting data files and objects.
a. Input devices
b. Storage devices
c. Output devices
d. Hard drive
e. None of the above
4. This mouse registers its position by detecting reflections from light-emitting diode that directs
beam downward.
a. Super mouse
b. Mouse
c. Mechanical mouse
d. Optical mouse
e. None of the above
5. A hardware device connected to a computer's sound card that outputs sound generated by
the computer.
a. Microphone
b. Printer
c. Webcam
d. Speaker
e. None of the above

II. Identification. Read each statement or question below carefully and fill in the blank(s) with
the correct answer.

1. _______________ is the collection of physical parts of a computer system.

60
2. _______________ is the most frequently used input device for all computers.
3. _______________ is a video camera that feeds or streams its image in real time to or through
a computer to computer network.
4. _______________ is a computer hardware designed with ergonomic considerations to
minimize muscle strain and a host of related problems.
5. _______________ these keys are commonly used in computer program actions.

III. Application. Read the questions carefully and confine your responses to an analysis of the
questions as written.

1. What are the different types of hard drive connections? Explain how it works.

2. Draw and label the parts of keyboard.

61
Data Representation

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Distinguishes the various number system and data representation


 Computes number system operation such addition, subtraction and complement.
 Determine different file sizes
 Answers/Practices various operations and conversions.

62
Introduction
Computers are amazing devices that enable people to do a wide variety of things with
them. People can use them to view information, listen to music, play games and more. In order
for computers to work, they must represent the information in some way. All data that is stored
within a computer, and transferred from or to a computer, is transmitted as a series of electrical
signals that are either on or off.

To process data, whether it be text, images or sounds, the computer must convert the
information into binary form. The binary number system is a base-2 number system. This means
it only has two numbers: 0 and 1. All information in a computer (words, pictures, movies and
sound) is stored and transmitted as sequences of bits, or binary digits.

In Digital Technologies, discrete representation of information using number codes. Data


may include characters (for example, alphabetic letters, numbers and symbols), images, sounds
and/or instructions that, when represented by number codes, can be manipulated, stored and
communicated by digital systems. For example, characters may be represented using ASCII code
or images may be represented by a bitmap of numbers representing each 'dot' or pixel.

They let you compute and calculate with numerical information; they let you send and
receive information over networks. Fundamental to all of this is that the computer has to represent
that information in some way inside the computer’s memory, as well as storing it on disk or
sending it over a network.

A digital system can understand positional number system only where there are a few
symbols called digits and these symbols represent different values depending on the position they
occupy in the number.

A value of each digit in a number can be determined using

 The digit

 The position of the digit in the number

 The base of the number system (where base is defined as the total number of digits
available in the number system).

Decimal Number System


The number system that we use in our day-to-day life is the decimal number system.
Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system,
the successive positions to the left of the decimal point represents units, tens, hundreds,
thousands and so on.

Each position represents a specific power of the base (10). For example, the decimal
number 1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds
position, and 1 in the thousands position, and its value can be written as

63
(1×1000) + (2×100) + (3×10) + (4×l)
(1×103) + (2×102) + (3×101) + (4×l00)
1000 + 200 + 30 + 1
1234

As a computer programmer or an IT professional, you should understand the following


number systems which are frequently used in computers.

Number System Description


Binary Number System Base 2. Digits used: 0, 1

Octal Number System Base 8. Digits used: 0 to 7

Decimal number system Ten (10) digits from 0 to 9

Hexa Decimal Number System Base 16. Digits used: 0 to 9, Letters used: A-

Binary Number System


A Binary number system has only two digits that are 0 and 1. Every number (value)
represents with 0 and 1 in this number system. The base of binary number system is 2, because
it has only two digits.
Octal Number System
Octal number system has only eight (8) digits from 0 to 7. Every number (value) represents
with 0,1,2,3,4,5,6 and 7 in this number system. The base of octal number system is 8, because it
has only 8 digits.
Decimal number system
Decimal number system has only ten (10) digits from 0 to 9. Every number (value)
represents with 0,1,2,3,4,5,6, 7, 8 and 9 in this number system. The base of decimal number
system is 10, because it has only 10 digits.
Hexadecimal Number System
A Hexadecimal number system has sixteen (16) alphanumeric values from 0 to 9 and A
to F. Every number (value) represents with 0,1,2,3,4,5,6, 7, 8, 9, A, B, C, D, E and F in this number
system. The base of hexadecimal number system is 16, because it has 16 alphanumeric values.
Here A is 10, B is 11, C is 12, D is 13, E is 14 and F is 15.

64
Table of the Numbers Systems with Base, Used Digits, and Examples:
Number System Base Use Digits Example
Binary 2 0, 1 (11110000)2

Octal 8 0,1,2,3,4,5,6,7 (360)8

Decimal 10 0,1,2,3,4,5,6,7,8,9 (240)10

Hexadecimal 16 0,1,2,3,4,5,6,7,8,9 (F0)16

A,B,C,D,E,F

Number System Conversions

There are three types of conversion:

 Decimal Number System to Other Base


[for example: Decimal Number System to Binary Number System]
 Other Base to Decimal Number System
[for example: Binary Number System to Decimal Number System
 Other Base to Other Base
[for example: Binary Number System to Hexadecimal Number System]

Decimal Number System to Other Base


To convert Number system from Decimal Number System to Any Other Base is quite easy; you
have to follow just two steps:
A) Divide the Number (Decimal Number) by the base of target base system (in which you want to
convert the number: Binary (2), octal (8) and Hexadecimal (16)).
B) Write the remainder from step 1 as a Least Signification Bit (LSB) to Step last as a Most
Significant Bit (MSB).
Decimal to Binary Conversion Result
Decimal Number is : (12345)10 Binary Number is:
11000000111001

65
Decimal Number is: (13)10 Binary Number is:
1101

Decimal Number is: (29)10 Binary Number is:


11101

Decimal to Octal Conversion Result


Decimal Number is: (12345)10 Octal Number is:
(30071)8

66
Decimal to Hexadecimal Conversion Result
Decimal Number is: (12345)10 Octal Number is:
(3039)16

Decimal Number is: (725)10 Hexadecimal Number is:


(2D5)16
Convert
10, 11, 12, 13, 14, 15
to its equivalent...
A, B, C, D, E, F

Other Base System to Decimal Number Base


To convert Number System from Any Other Base System to Decimal Number System,
you have to follow just three steps:
A) Determine the base value of source Number System (that you want to convert), and also
determine the position of digits from LSB (first digit’s position – 0, second digit’s position – 1 and
so on).
B) Multiply each digit with its corresponding multiplication of position value and Base of Source
Number System’s Base.
C) Add the resulted value in step-B.
Explanation regarding examples:
Below given exams contains the following rows:
A) Row 1 contains the DIGITs of number (that is going to be converted).

67
B) Row 2 contains the POSITION of each digit in the number system.
C) Row 3 contains the multiplication: DIGIT* BASE^POSITION.
D) Row 4 contains the calculated result of step C.
E) And then add each value of step D, resulted value is the Decimal Number.
Binary to Decimal Conversion
Binary Number is : (11000000111001)2

Octal to Decimal Conversion


Octal Number is : (30071)8
=12288+0+0+56+1
=12345
Decimal Number
is: (12345)10

Hexadecimal to Decimal Coversion


Hexadecimal Number is : (2D5)16

=512+208+5
=725
Decimal Number is: (725)10

Representation of non-numeric data in computer


 Representation of alphanumeric data
 There are 4 types of alphanumeric data: letters, digits, special symbols and control
characters.
 The most common codes to represent alphanumeric data is ASCII code
 American Standard Code for Information Interchange (ASCII)
 Each character uses 7 bits e.g.
 ‘A’ is represented by ‘1000001’ (65 in decimal)
 ‘a’ is represented by ‘1100001’ (90 in decimal)

68
 ‘1’ is represented by ‘0110001’ (49 in decimal)
 ‘?’ is represented by ‘0111111’ (63 in decimal)
 Delete is represented by ‘1111111’ (127 in decimal)

 Representation of Chinese characters


 Chinese characters are non-alphanumeric characters
 There are over ten thousand Chinese characters that are commonly used
 Since 16 bits can represent 2 16 (65536) patterns, 16 bits (2 bytes) are needed to
represent a Chinese character.
 Common code used to represent traditional Chinese characters is BIG-5
 Common codes used to represent simplified Chinese characters is GB (Guobiao),
used in Taiwan and HZ (Hanzi) used in Mainland China.

 Representation of non-alphanumeric characters


 Unicode can represent characters of different languages and is accepted globally.
It includes Chinese (traditional and simplified), English, French, Japanese, Korean
and many others.

Understanding the file sizes


Memory of a Computer is any physical device which is capable of storing information
whether it is large or small and stores it temporarily or permanently. For example, Random Access
Memory (RAM), is a type of volatile memory that stores information for a short interval of time, on
an integrated circuit used by the operating system.

Memory can be either volatile or non-volatile. Volatile memory is a type of memory that
loses its contents when the computer or hardware device is switched off. RAM is an example for
a volatile memory i.e. why if your computer gets rebooted while working on a program, you lose
all the unsaved data. Non-volatile memory, is a memory that keeps its contents saved even in the
case of power loss. EPROM ((Erasable Programmable ROM) is an example of a non-volatile
memory.

Characteristics of Main Memory

 Known as the main memory.


 Semiconductor memories.
 Faster than secondary memories.
 A computer cannot run without the primary memory.
 It is the working memory of the computer.
 Usually volatile memory.
 Data is lost in case power is switched off.

69
Units of Memory

Unit Shortened Capacity

Bit b 1 or 0 (on or off)

Byte B 8 bits

Kilobyte KB 1024 bytes

Megabyte MB 1024 kilobytes

Gigabyte GB 1024 megabytes

Terabyte TB 1024 gigabytes

Petabyte PB 1024 terabytes

Exabyte EB 1024 petabytes

Zettabyte ZB 1024 exabytes

Yottabyte YB 1024 zettabytes

Bits are the basic building blocks of not only data storage, but all computers. Computers
work in binary digits, combining 0’s and 1’s in countless patterns. These binary digits are known
as bits, and are the smallest possible unit for data storage.

When 8 bits are combined, you get a byte. Bytes are used to store a single character;
whether it’s a letter, number, or punctuation. All memory storage is expressed in terms of bytes,
so although bits might be the foundation upon which data storage is built, bytes are the building
blocks that truly denote the usability of any one storage solution.

Because storage is expressed in terms of bytes, all greater units are typically referred to
by their shortened names. This means that you could keep adding more prefixes to talk about
more and more data. Above terabyte, we have petabyte (PB), exabyte (EB), zettabyte (ZB), and
yottabyte (YB).

Once the numbers get high enough, it can be difficult to realistically visualize how much
data we’re talking about. This volume of data is really only relevant to tech giants and massive
corporations. But as the need for greater storage increases with the volume of data over time, we
will inevitably develop the necessary vocabulary.

70
Activities/Assessment

I. Application. Read the questions carefully and confine your responses to an analysis of the
questions as written.

Decimal to Binary Conversion Result


Decimal number is: (25673)10 Binary Number is :
______________________

Decimal to Octal Conversion Result


Decimal number is: (6260)10 Octal Number is :
_____________________

Decimal to Hexadecimal Conversion Result


Decimal number is: (1423)10 Hexadecimal Number is :
_____________________

71
Binary to Decimal Conversion
Binary number is: (111001)2

Octal to Decimal Conversion


Octal number is: (7014)8

Hexadecimal to Decimal Conversion


Hexadecimal number is: (E7A9)16

72
Peopleware

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Different uses of computer in the society


 Contrasts roles and job titles in the ICT profession
 Invites prospective professional for insights
 Organizes forum/discussion with ICT professional

73
Computers in the society
There was a time when computers were only heard of as a luxury. However today they
are an unavoidable part of success and development. No longer are they owned only through
theft and by the filthy rich, in fact computers are and will in the coming days and months be used
to accomplish the brilliant goals of success and unparalleled development of the society.
Moreover, the computer is being used in every field of life such as medical, business, industry,
airline and weather forecasting.

Roles of Computer in Health and Medicine

Maintaining Record System

Managing hospital records reports specific

information and issues regarding

managing and organizing clinical and non-

clinical hospital records. Maintaining

records primarily concerned with the

inserting, editing, searching and printing of

records for the best performance the

institution can give when it comes to the Patient Information System

information dissemination.

74
Analysis
Computerized tomography, more

commonly known as a CT or CAT scan, is

a diagnostic medical test that, produces

multiple images or pictures of the inside of

the body.

CT images of internal organs, bones, soft

tissue and blood vessels typically provide

greater detail than traditional x-rays. CT-Scan

Radiology
X-rays are a type of electromagnetic

radiation, just like visible light.

An x-ray machine sends individual x-ray

particles through the body. The images are

recorded on a computer or film.

The test is done in a hospital radiology

department or in the health care provider's

office. X-Ray

Roles of Computer in Money and Banking

E- Banking

Refers to the use of computers to carry out


banking transactions such as withdrawals
through cash dispensers or transfer of
funds at point of sale.

This also considered as one of the fastest


way of transactions involving money.

ATM Machine

75
Mobile Banking

Mobile banking has until recently (2010)

most often been performed via SMS or the

mobile web. Apple's initial success with

iPhone and the rapid growth of phones

based on Google's Android (operating

system) have led to increasing use of

special client programs, called apps,

downloaded to the mobile device. Mobile w/ Bank Transactions

Plastic Money
Generic term for all types of bank cards,

credit cards, debit cards, smart cards, etc.

Plastic money is the new and easier way of

paying for goods and services.

ATM card

Queuing System
Queuing is one of the biggest

contributions in stores, hospitals, banks

and government institutions and a

structured approach to queuing is being

expected by a large number of customers

and citizens.

Helps you organize your queues by

providing visitors with virtual and linear Counting System Monitor

queuing solutions and booked

appointments.

76
Roles of Computer in Law Enforcement

Databases
The shift from performing tasks manually

to placing the strain on IT systems in law

enforcement continues to advance. Whether

it is the introduction of informational

websites for the authority, it is clear that

technology is playing an ever increasing

role in a range of authority.


Police Information System

Sharing Information
Information sharing can often take place

without your consent. In many cases where

you are not asked your permission, the

information sharing will be reasonable and

expected. However, it should be clear why

the information is being shared and who is

involved.
Law Enforcement Website

Crime Scene Computing


Forensic reconstruction is essentially the
process of establishing a sequence of
events

about the occurrences during and after a

crime or other incident through the study,

analysis and interpretation of evidence. It

may not be known exactly what has

occurred due to lack of evidence or

witnesses but reconstructing the crime Auto-CAD of Crime Scene


scene will help in solving the case.

77
Roles of Computer in Information/Communications

Internet
Having Skype chat, being able to send a

message and read questions that other

students had as well. Having the ability to

talk/chat to others via skype was very

beneficial and importantly the accessibility

and ability to contact the tutor for even

minor 'glitches' when completing

assignments. Skype

E-mail
Email in business can be used for intra-

company communications, marketing

purposes and coordinating with business

partners, suppliers and customers. When

you need to get in touch with a person who

is hard to reach via telephone or is not

located in the same part of the country or

world. E-mail

Mobile Phones

Written, verbal and electronic


communication are considered best asset of
mobile phones. This device can also use to
connect with social media accounts, e-mail
accounts and different types of website that
can be browse through different web
browsers.

Mobile Phone

78
Roles of Computer in Government

Voting
Computerized voting is a superior form of

casting ballots. It allows for fairer and faster

voting. Automated election system (AES) is

a system that uses appropriate technology

to accomplish and aid such tasks as voting,

counting, consolidating, canvassing, and

transmission of election result, and other

electoral process.

Automated Election System (AES)

Registration

National Bureau of Investigation (NBI),

Bureau of Internal Revenue (BIR) and

Government Service Insurance System

(GSIS) are all part of executive department

of government which provides services to

the citizen of the Philippines. This

institution offers a more convenient way of

services by registering to their system.

NBI eCLearance System

Payment

The government is developing an online


payment system, or PhPay, that will enable
the public to pay for government
transactions through online payment
channels. This will make payment to the
government faster, easier and more
convenient.

GSIS Website

79
Roles of Computer in Business

Inventory Management

It can be used in the manufacturing industry


to create a work order, bill of materials and
other production-related documents.
Companies use inventory management
software to avoid product overstock and
outages. It is a tool for organizing inventory
data.

Inventory System

Presentations and Documents

Delivering effective and powerful


presentations is critical to business success.

It’s about making an your audience, whether


you are an entrepreneur pitching investors, a
startup presenting a new initiative, or a
manager asking for budget or staffing
resources.

Business Proposal Presenation

Multi-site Networks

Engaging with social media is a step your


business needs to take, not because your
competitors will, but for the sake of
pragmatism. Facebook gives you a fast,
FREE connection to literally millions of
potential users/customers and takes very
little time to build.

Facebook Fan Page

80
Roles of Computer in Transportation

Public Safety

There are systems that recognize license

plates on moving vehicles and systems that

monitor traffic flow and catch people

violating traffic laws. Although these

systems fall under the label of video

surveillance technology, CCTV as a crime

prevention option for a broader range of

crimes in public places. Closed-Circuit Television (CCTV)Video

Surveillance

Control with Wireless Systems


Not only do LEDs provide energy savings,

they also work longer without failing. The

typical LED will last from five to ten years,

where the incandescent light bulb burns

out a least once a year. This increases the

safety of the traffic signals, and reduces the

number of accidents due to traffic signals


LED Traffic Lights
being out of commission.

81
Roles of Computer in Education

Storage of Information

Flash drive, cellphone, laptop, personal


computer, CD, memory cards are examples
of storage devices that people used to store
information that they need in everyday
lives.

This also refers to device for recording


(storing) information (data).

Storage Devices

Audio-Visual aids in Teaching


Audio-visual aids can help with your

presentation because they can help take the

pressure off you and provide an

opportunity for variety in your

presentation. The use of an overhead

projector for example, can not only take the

focus off you but can also provide memory

prompts. Audio and Visual Presentation

Access to the Internet


As more people around the world gain

access to all the tools of the digital age, the

internet will play a greater role in everyday

life. And so far, people in emerging and

developing nations say that the increasing

use of the internet has been a good

influence in the realms of education,

personal relationships and the economy. Internet Surfing

82
Roles and Job Titles in IT

If you love technology and you’re looking for a job with high pay and a robust occupational
outlook, you’re in luck. The tech sector is booming, and IT occupations are expected to continue to
grow over the next decade. These jobs also pay far more than the median wage for all occupations.

People with jobs in information technology (IT)use computers, software, networks, servers,
and other technology to manage and store data. IT job titles can vary significantly from one company
to another. For instance, one company may recruit a "developer" while another company recruits a
"programmer" — but the work may be precisely the same at the two companies, despite the job title
variation. Also, many of the skills in this field are transferable, which means candidates may be
qualified for many different roles.

Some IT jobs with higher pay require that candidates have a bachelor’s degree, ideally in
computer science, software engineering, etc. Some employers care more about the quality of your
work than they do about your formal education. As such, many different kinds of IT jobs (such as
coding-related or software programming) evaluate candidates based on their portfolio and
experience.

Job Title Roles and Responsibilities

The work of a software engineer typically


includes designing and programming system-
level software: operating systems, database
systems, embedded systems and so on. They
Software Engineer understand how both software and hardware
function. The work can involve talking to clients
and colleagues to assess and define what
solution or system is needed, which means
there's a lot of interaction as well as full-on
technical work. Software engineers are often
found in electronics and telecommunications
companies. A computing, software engineering
or related higher degree is often needed.

Systems analysts investigate and analyse


business problems and then design information
systems that provide a feasible solution,
typically in response to requests from their
business or a customer. They gather
Systems analyst requirements and identify the costs and the time
needed to implement the project. The job needs
a mix of business and technical knowledge, and
a good understanding of people. It's a role for

83
analyst programmers to move into and typically
requires a few years' experience from
graduation.

These are the professional troubleshooters of


the IT world. Many technical support specialists
work for hardware manufacturers and suppliers
solving the problems of business customers or
Technical support consumers, but many work for end-user
companies supporting, monitoring and
maintaining workplace technology and
responding to users' requests for help. Some
lines of support require professionals with
specific experience and knowledge, but tech
support can also be a good way into the
industry for graduates.

The term 'consultant' can be a tagline for many


IT jobs, but typically technical consultants
provide technical expertise to, and develop and
implement IT systems for, external clients. They
can be involved at any or all stages of the
Technical consultant project lifecycle: pitching for a contract; refining
a specification with the client team; designing
the system; managing part or all of the project;
after sales support... or even developing the
code. A technical degree is preferred, but not
always necessary.

Web development is a broad term and covers


everything to do with building websites and all
the infrastructure that sits behind them. The job
is still viewed as the trendy side of IT years after
Web developer it first emerged. These days web development
is pretty technical and involves some hardcore
programming as well as the more creative side
of designing the user interfaces of new
websites. The role can be found in
organizations large and small.

84
Bugs can have a massive impact on the
productivity and reputation of an IT firm. Testers
try to anticipate all the ways an application or
system might be used and how it could fail.
Software tester They don't necessarily program but they do
need a good understanding of code. Testers
prepare test scripts and macros, and analyse
results, which are fed back to the project leader
so that fixes can be made. Testers can also be
involved at the early stages of projects in order
to anticipate pitfalls before work begins. You
can potentially get to a high level as a tester.

Code of Ethics for ICT Professionals


Professional ethical issues can occur in developing any Information Technology system.
However, the Internet and web allow many more people around the world to quickly connect to an
IT system. As a result professionals are more likely to confront ethical issues when dealing with the
Internet and the World Wide Web. Professionals may be called to account for their actions not only
in their own country, but in any jurisdiction in the world.

Establishing a code of ethics for information technology professionals encourages an IT


worker to behave ethically and responsibly with the tools and information of which his employers
have put him in control.

A code of ethics document sets the standards for what is expected of the IT professional. It
reinforces what is considered right and wrong by using verbiage such as “always” or “never” to be
as clear as possible. A code of ethics helps prevent IT professionals from behaving in a malicious
or harmful manner with company information and equipment.

A number of resources help IT professionals searching for ethical guidance within the scope
of their job duties. For example, IEEE has a code of ethics for its members; the Association of
Information Technology Professionals (AITP) has a code of ethics and standards of conduct; and
SANS has published an IT code of ethics. There are other examples beyond these three, and many
elements in these codes could be useful to higher education IT professionals. For example, among
other elements that describe ethical behavior in the profession, in general these codes assert that
IT professionals need to commit to:

 Integrity
 Competence
 Professional responsibilities
 Work responsibilities
 Societal responsibilities

85
Specific guidance stems from these general principles. Some common commitments between the
three codes are to:

 Maintain technical competence


 Avoid injury to others, their property, reputation, or employment
 Reject bribes, kickbacks, etc.

If you’re an IT professional and not familiar with one of the codes of ethics or standards of
conduct for the profession, consider taking the time to read one or more of them. If it’s been some
time since you’ve reviewed one, now might be a good time to refresh your knowledge. Given the
impact that IT professionals can have in the workplace and society in general, reflecting on the ethics
of how we behave as we carry out our duties should be one of our professional obligations.

In the end, making these decisions might come down to using your professional judgment.
Maybe, just maybe, it comes down to understanding that just because you can do something, it is
imperative to stop and think about whether you should do it. That’s where professional ethics will
serve you well.

86
Activities/Assessment

I. Essay. Please read all questions carefully and make sure you understand the facts before you
begin answering. Your essay should be as well organized and as carefully written as you can
make it.

1. 4 years from now, you’ll be looking for a job. Enumerate and explain at least three (3) jobs
that you wanted in the near future.

2. What are the roles of computer in the society that you belong? Explain your answer.

87
Computer Software

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Compares and contrasts various software categories


 Creates software categories matrix
 Explains software categories

88
Introduction

Software means computer instructions or data that interacts with the user. Without
software, computers would be useless. For example, without your Internet browser software you
would be unable to surf the Internet or read this page and without a software operating system.
Here is a diagram of software categorization.

Software

Application
System Software
Software

Operating General Purpose

Systems Software
Word Processing, E-
DOS, Windows, Unix-
Spreadsheet, Database,
Linux, MacOS
Telecommunications,
Utility Programs
Special Purpose
Software
Anti-Virus, File
Compression, Disk
Business-Accounting,
Language Education, Entertainment,
Translators Science and Engineering,

Assembler

Compiler

Interpreter

Table 5.1 Software Category Table

89
Application software

Application software or simply applications are programs designed to perform specific


tasks for users. Application software also enable the user to complete tasks such as creating
documents, spreadsheets, databases, and publications, doing online research, sending email,
designing graphics, running businesses, and even playing games.

Application software presents an overview of several productivity software applications,


graphic design/multimedia software applications, home/personal/educational software
applications, and communications software applications. Here are some examples of application
software categories.

 General Purpose Software


Microsoft Office Programs


Graphic Software

 Special Purpose Software


HandyCafe Internet Cafe Software


Computer-Aided Design Software


Audacity


BodyViz


Multiview


DOTA 2

General Purpose Software

General purpose application software is a type of software that can be used for a variety
of tasks. These applications may, therefore, be adopted and applied by many professionals,
including engineers, security analysts, accountants, chemists, medical officers and attorneys.
Although application software also is available as shareware, freeware, and public-domain
software, these usually have fewer capabilities than retail software packages.

 Microsoft Office Programs

Full installed Office applications (Word, PowerPoint, Excel, OneNote, and Outlook, plus
Publisher and Access for Windows PCs).

90
Microsoft Word

Logo Description

With Microsoft Word 2010 you can create more beautiful and
engaging documents, and you can work with more media types—
like online videos and pictures. Do more with your docs: Pop in an
online video, open a PDF and edit the content, align pictures and
diagrams with minimal fuss. Microsoft Word lets you go back and
edit your document as much as you like, before printing it. There are
many changes you can make: add text, delete text, copy text, move
text, change the style, and change the formatting.

Logo Description

Microsoft Excel 2010 has a brand new look and new features that
let you get away from walls of numbers and make better business
decisions. Several new functions in the math and trigonometry,
statistical, engineering, date and time, lookup and reference, logical,
and text functions categories. The new Quick Analysis tool lets you
convert your data into a chart or table in two steps or less. Preview
your data with conditional formatting, spark lines, or charts, and
make your choice stick in just one click.

Logo Description

Microsoft Office PowerPoint 2010 has a brand cleaner and primed


for use on tablets, so you can swipe and tap your way through
presentations. PowerPoint now supports more multimedia formats,
such as .mp4 and .mov with H.264 video and Advanced Audio
Coding (AAC) audio, and more high-definition content.

91
Logo Description

With Microsoft Office Access 2010 lets you create custom apps
fast without being a developer. Access creates the database
structure; complete with views that let you add and edit data. Under
the hood, Access apps use SQL Server to provide the best
performance and data integrity. Access functions used in
SQL/Queries and functions used in VBA code. Some functions can
be used as both, but some cannot. Visual objects used in forms and
reports expose their methods and properties in the VBA
programming environment, and VBA code modules.

Logo Description

With Microsoft Office Publisher 2010, you can easily communicate


your message in a variety of publication types, saving you time and
money. Whether you are creating brochures, newsletters, postcards,
greeting cards, or e-mail newsletters, you can deliver high-quality
results without having graphic design experience. Get the job done
right the first time with Publisher 2010.

Logo Description

With Microsoft Office Outlook 2010 has a brand cleaner. It’s


designed to help clear view of email, calendars, and contacts. You'll
be able to communicate more effectively by connecting efficiently
with others. You’ll besagesablebetter,becauseto youhandcan see
everything you need to know at a glance.

92
Logo Description

Microsoft Office OneNote 2010 is a digital notebook for capturing,


storing, and sharing all kinds of information. Full integration with the
cloud means you can free y drive so your notes and information are
saved and searchable wherever you go on nearly any mobile device,
tablet, or browser.

Table 5.1 Microsoft Office 2010

Shortcut Keys and their Functions: Below is a listing of all the major shortcut keys in Microsoft
Word.

Shortcut Keys Descriptions

Ctrl + A: Select all contents of the page.

Ctrl + B: Bold highlighted selection.

Ctrl + C: Copy selected text.

Ctrl + X: Cut selected text.

Ctrl + P: Open the print window.

Ctrl + F: Open find box.

Ctrl + I: Italic highlighted selection.

Ctrl + K: Insert link (Shortcut Keys and their Functions).

Ctrl + U: Underline highlighted selection.

Ctrl + V: Paste.

Ctrl + Y: Redo the last action performed.

Ctrl + Z: Undo last action.

Ctrl + L: Aligns the line or selected text to the left of the screen.

Ctrl + E: Aligns the line or selected text to the center of the screen.

Ctrl + R: Aligns the line or selected text to the right of the screen.

Ctrl + J: Aligns the line or selected text to justify.

93
Ctrl + M: Indent the paragraph.

Ctrl + Shift + F: Change the font.

Ctrl + Shift + >: Increase selected font +1pts up to 12pt and then increases font +2pts.

Ctrl + ]: Increase selected font +1pts.

Ctrl + Shift + <: Decrease selected font -1pts if 12pt or lower, if above 12 decreases font

by +2pt.

Ctrl + [: Decrease selected font -1pts.

Ctrl + Shift + *: View or hide non printing characters.

Ctrl + L: Moves one word to the left.

Ctrl + R: Moves one word to the right.

Ctrl + : Moves to the beginning of the line or paragraph.

Ctrl + : Moves to the end of the paragraph.

Ctrl + Del: Deletes word to right of cursor.

Ctrl + Backspace: Deletes word to left of cursor.

Ctrl + End: Moves the cursor to the end of the document.

Ctrl + Home: Moves the cursor to the beginning of the document.

Ctrl + Spacebar: Reset highlighted text to the default font.

Ctrl + 1: Single-space lines.

Ctrl + 2: Double-space lines.

Ctrl + 5: 1.5-line spacing.

Ctrl + Alt + 1: Changes text to heading 1.

Ctrl + Alt + 2: Changes text to heading 2.

Ctrl + Alt + 3: Changes text to heading 3.

Alt + Shift + D: Insert the current date.

Alt + Shift + T: Insert the current time.

Table 5.2 Microsoft Word Shortcut Keys

94
 Graphic Software

Graphic software is a form of application software that enables a person to manipulate


visual images on a computer. The two main types of graphics software feature raster graphics or
vector graphics. Most graphics programs have the ability to import and export one or more
graphics file formats. Computer graphics also can be used by other editing software such as
CorelDRAW, GIMP, SketchUp, and Adobe Photoshop. These programs allow viewing, editing,
and printing of photographs, and creation of animated or digital media. Some of the graphics
software titles covered on this book includes:

CorelDRAW

Logo Description

Corel revolutionized the graphic design industry when it introduced


CorelDRAW® in 1989. Today, the Company continues to lead the
market with its award-winning graphics and productivity software.
Corel is also at the forefront of the digital media revolution,
delivering innovative portfolio of photo, video and DVD software.
The

Company’s headquarters are lo major offices in the United States,


United Kingdom, Germany, Taiwan, China and Japan.

GIMP

Logo Description

GIMP is a multi-platform photo manipulation tool. GIMP is an


acronym for GNU Image Manipulation Program. The GIMP is
suitable for a variety of image manipulation tasks, including photo
retouching, image composition, and image construction. GIMP has
many capabilities. It can be used as a simple paint program, an
expert quality photo retouching program, an online batch processing
system, a mass production image renderer, etc.

95
SketchUp

Logo Description

SketchUp (formerly Google Sketchup) is a 3D modeling computer


program for a wide range of drawing applications such as
architectural, interior design, civil and mechanical engineering, film,
and video game design and available in a freeware version.
SketchUp users are architects, designers, builders, makers and
engineers. They are the people who shape the physical world. They
are important, and they deserve great tools because great tools
produce great work.

Table 5.3 Graphic Software

Special Purpose Software

Special purpose application software is a type of software created to execute one specific
task. It handles a specific job better as the software will be made to only handle that specific job,
and that alone. For example a DOTA 2 application on your computer will only allow you to play
DOTA 2. Here are some examples of the software with special purpose:

 HandyCafe Internet Cafe Software  BodyViz


 Computer-Aided Design Software  Multiview
 Audacity  DOTA 2

HandyCafe Internet Cafe Software was

written by using the latest technology and

concept. Many newly added features

contribute the software more elasticity and

skill. HandyCafe is an Internet Cafe

Software which brings prestige to the

business with an easy to use structure and


its reliability in the network media.

96
CAD, or computer-aided design (CAD), is
the use of computer technology for design
and design documentation. CAD software
replaces manual drafting with an automated
process. If you work in the architecture,

These programs can help you explore design


ideas, visualize concepts through
photorealistic renderings, and simulate how
a design will perform in the real world.
AutoCAD software was the first CAD
program, and it is still the most widely used
CAD application.

Audacity is a free, easy-to-use, multi-track


audio editor and recorder for Windows, Mac
OS X, GNU/Linux and other operating
systems. The interface is translated into
many languages. Audacity is free software,
developed by a group of volunteers and
distributed under the GNU General Public
License (GPL). Free software gives you the
freedom to use a program, study how it
works, improve it and share it with others.

BodyViz has extensive visualization features


that enable users to quickly and effectively
view and interact with their patient's data in a
never-before-seen 3D manner that is
changing the way medical professionals view
their world.

97
Multiview product line consists of: General
Ledger, Accounts Payable, Accounts
Receivable, Commitment Accounting and
Power Plan, a sophisticated
modeling/forecasting tool that is integrated
into the MULTIVIEW General Ledger.

Multiview’s powerful environment, ViewPoint


is far more than a financial report writer.
ViewPoint is a reporting environment that
gives you production financial reporting,
Business Intelligence coupled with drill-down
all in one tightly-integrated, powerful, and
easy-to-use package.

Dota2 is a game of infinite depth and


complexity. Every hero has an array of skills
and abilities that combine with the skills of
their allies in unexpected ways, to ensure
that no game is ever remotely alike. This is
one of the reasons that the Dota2
phenomenon has continued to grow.
Originating as a fan-made Warcraft 3

98
System Software

System software refers to the files and programs that make up your computer's operating
system and all utility programs that manage computer resources at a low level. System software
coordinates the activities and functions of hardware and software, and it controls the operations
of computer hardware. A computer's operating system is an example of system software.
Operating systems control the computer hardware and act as an interface with application
programs. System software also includes utility software, and language translators, which we will
be looking at in this chapter.

Operating System

An operating system (sometimes abbreviated as "OS") is the program that, after being
initially loaded into the computer by a boot program, manages all the other programs in a
computer. The operating system is the most important program that runs on a computer. Every
general-purpose computer must have an operating system to run other programs and
applications. Operating systems perform basic tasks, such as recognizing input from the
keyboard, sending output to the display screen, keeping track of files and directories on the disk,
and controlling peripheral devices such as disk drives and printers.

DOS (Disk Operating System) - DOS is an


operating system for x86-based personal
computers mostly developed by Microsoft.
Although the MS-DOS operating system is
rarely used today, the command shell
commonly known as the Windows command
line is still widely used.

99
Windows - Graphical operating systems
developed, marketed, and sold by Microsoft.
The GUI-based OS was introduced in1985
and has Some versions of Windows are the
following: Windows 10, Windows 8, Windows
7, Windows Vista, Windows XP Professional
and Windows XP.

Unix-Linux - Linux is an open source, free to


use operating system widely used for
computer hardware and software, game
development, tablet PCS, mainframes etc.
UNIX is an operating system commonly used
in internet servers, workstations.

MacOS - Apple's original concept for the


Macintosh deliberately sought to minimize the
user's conceptual awareness of the operating
system. Tasks which required more operating
system knowledge on other systems would
be accomplished by mouse gestures and
graphic controls on a Macintosh.

100
Utility Programs

Utility programs are software that plays a supporting role for users and developers. A
program that performs a specific task related to the management of computer functions,
resources, or files, as password protection, memory management, virus protection, and file
compression. In some usages, a utility is a special and nonessential part of the operating system.

The print "utility" that comes with the operating system is an example. Therefor absolutely
required to run programs.

Software Description Examples

Antivirus A computer program designed to detect the Avast

presence of a computer virus in a system. AVG Technologies

After detecting the virus, the user can Avira

choose different actions that can be apply to ESET

the virus detected. Antivirus program is Kaspersky Lab

also known as vaccine. McAfee

Symantec

File A utility program that compresses and 7-Zip

Compression decompresses files that may contain large WinRAR

amount of space. This program will allow WinZip

storage devices to have more space TAR

allocated for more files.

Backup A computer program that makes it easier to AOMEI Backupper


Software back up program and data files from hard Standard

disk to backup medium such as flash drive, Cobian Backup

CDs, DVDs and External Hard drive. COMODO Backup

Backup utility program will also prompt EaseUS Todo Backup

you when one disk is full and the next one FileFort Backup

is needed.

Table 5.4 Utility Programs

101
Language Translators

A computer language translator is a program that translates a set of code written in one
programming language into a functional equivalent of the code in another programming
language. Examples of widely used types of computer languages translators include
interpreters, compilers and assemblers.

Language Translators Description

Assembler An assembler is a low-level programming language for a computer

that takes basic computer instructions and converts them into a

pattern of bits that the computer's processor can use to perform its

basic operations.

Compiler A computer program that statements/instructions transforms human

readable source code in a programming language into another

language, such as PHP, Turbo Pascal, Borland C++ Builder and Java

SDK, and translates instructions into machine readable code that a

CPU can execute.

Interpreter A program that executes instructions written in a high-level

programming language that does not create an executable version of

a program; however, the interpreter translates and runs the program

at the same time.

Table 5.5 Language Translators

102
Activities/Assessment

I. Multiple Choice. Read each question carefully, and then CIRCLE THE ANSWER that best
fits the question.

1. The software that plays a supporting role for users and developers. A program that
performs a specific task related to the management of computer.
a. Utility Software
b. Assembler
c. Compiler
d. Translator
e. None of the above
2. A program that executes instructions written in a high-level programming language
that does not create an executable version of a program
a. Utility Software
b. Assembler
c. Compiler
d. Translator
e. None of the above
3. A computer program that statements/instructions transforms human readable source
code in a programming language into another language, such as PHP, Turbo Pascal,
Borland C++ Builder and Java SDK, and translates instructions into machine readable
code that a CPU can execute.
a. Utility Software
b. Assembler
c. Compiler
d. Translator
e. None of the above
4. A program that translates a set of code written in one programming language into a
functional equivalent of the code in another programming language.
a. Language Translator
b. Programming Language
c. Interpreter
d. Scripting Language
e. None of the above
5. Application software that enables a person to manipulate visual images on a computer.
a. Photo
b. MultiViewer
c. Filter
d. Graphic software
e. None of the above

103
II. Identification. Read each statement or question below carefully and fill in the blank(s) with
the correct answer.

1. _______________ a utility program that compresses and decompresses files that may
contain large amount of space. This program will allow storage devices to have more
space allocated for more files.
2. _______________ is the program that, after being initially loaded into the computer by a
boot program, manages all the other programs in a computer.
3. _______________ is a type of software that can be used for a variety of tasks.
4. _______________ Graphical operating systems developed, marketed, and sold by
Microsoft.
5. _______________ is an operating system commonly used in internet servers,
workstations.

III. Application. Read the questions carefully and confine your responses to an analysis of the
questions as written.

1. Draw and explain the “Software Category Table”.

104
Computer Networks

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Describes various network topology


 Evaluates network services
 Designs network topology
 Manipulates internet services
 Determine different types of website
 Displays awareness in the utilization of internet services.

105
Overview

Since the start of the 21st century, internet usage has been increasing rapidly than ever
before. Many people are now using it as their gateway to information. The internet is now
becoming the major source of information, communication and entertainment, replacing and
exterminating traditional ways of living.

Computer networks are the basis of communication in IT. They are used in a huge
variety of ways and can include many different types of network. A computer network is a set of
computers that are connected together so that they can share information. The earliest examples
of computer networks are from the 1960s, but they have come a long way in the half-century
since then.

An interconnection of multiple devices, also known as hosts, that are connected using
multiple paths for the purpose of sending/receiving data or media. Computer networks can also
include multiple devices/mediums which help in the communication between two different
devices; these are known as Network devices and include things such as routers, switches, hubs,
and bridges.

In the Philippines, several individuals and institutions have pioneered in providing


Internet services to people who have natural inclination to computers by the use of low-speed
mode of transmission in the late ‘80s. It is after when the broadcasting companies step into the
Internet Service Provider (ISP) business that Filipinos finally got the hand of getting wired in the
world through the use of Internet.

In this modern age we live in, numerous technologies had been developed for
convenience and other purposes. And the development of the website made a huge significance
for education, businesses, tourism, etc. Through the use of the World Wide Web, Students,
Businessman and other of the same sort found an indispensable tool for the research and
taxation. Using the variety of websites mailing list, news groups, and chat room, the wired
community was able to find new ways to do old things.

A website establishes a business’s presence as a serious business clients expect


businesses to have their own webs ways since the early development of electronic mails or e-
mails. Tremendous increase in bandwidth had allowed several so-called multimedia applications
to be offered to Internet Surfers.

World Wide Web (WWW) is a system of internet service that support formatted
documents such as HTML, HXTML, XML, and PHP. Tim Berners-Lee, a British scientist,
invented the World Wide Web (WWW) in 1989 after the first connection was established over
what is today known as the Internet. The Internet is a global interconnection of networks.

Web Browser is a software application used to locate, retrieve and display content
on the World Wide Web, including Web pages, images, video and other files and. As a
client/server model, the browser is the client run on a computer that contacts the Web server
and requests information.

106
Browser Name Description

“Camino®” is a registered trade


is used with permission. All rights are reserved. Other product

names may be trademarks of their respective companies. The

Camino logo is a registered trademark of the Mozilla Foundation

and is used with permission. Graphics within Camino and on the


Camino website are currently licensed from their authors. Work is

Camino underway to license all graphics in Camino, excluding the Camino

logo, under the Tri-License used elsewhere. Camino is no longer

being developed but still in use by others.


Chrome brings your open tabs, bookmarks and recent searches
from
your computer to your phone or tablet, and vice versa. That way
you

have your web on all of your devices. Just sign in on your other

devices to start syncing. Search and navigate from the same box.
Choose from results and suggestions that appear as you
type,
including your recent searches and visited websites, so you can
get

Google Chrome to what you want in a snap. Browse just the way you'd like with

Chrome themes, apps and extentions. Get straight to your favorite

web destinations with bookmarks and start pages. Your

Customizations will be kept in sync across all of your devices.

107
Your PC running Windows comes with Microsoft Edge already
installed. If you're having problems opening Microsoft Edge, make
sure it's set as your default browser and pin it to your Start screen
and taskbar. Microsoft Edge is an app that's installed with
Windows on your PC. If you make a different browser your default,
links won't automatically open in Microsoft Edge, and you'll only
be able to use Microsoft Edge for the desktop.
Microsoft Edge

Mozilla Firefox® is a free, open source, cross-platform, graphical


web browser developed by the Mozilla Corporation and hundreds of
volunteers. Beginning as a fork of the Navigator component of the
Mozilla Application Suite, Mozilla Firefox® has since become the
foundation's main development focus (along with the Thunderbird
mail and news client), replacing the Mozilla Suite as the foundation's
Mozilla Firefox official main software release.
Mozilla Firefox® is one of the most widely regarded and admired
web browsers available on the internet, today. Over the past several
years, it has been critically acclaimed by organizations such
as
Forbes.com, PC World, and CNet.

Opera has been hard at work to help speed up browsing. Videos


start faster thanks to built-in video support. On slow internet
connections, Opera Turbo can compress pages for faster, all-
conditions browsing.

Opera

108
The best browser for your Mac is the one that comes with your Mac.
Safari is faster and more energy efficient than other browsers, so sites

are more responsive and your notebook battery lasts longer between

charges. Built-in privacy features are stronger than ever. It works

with iCloud to let you browse seamlessly across all your devices.
And it gives you great ways to find and share your favorites. Put it

Safari all together, and no other browser offers such a rich web experience.

Safari is engineered specifically for Mac, so it takes advantage of the

powerful technologies built into every one. And Safari now offers

native support for Netflix.

So compared with Chrome and Firefox, you can browse for up to

two hours longer and watch Netflix videos up to three hours longer.

Browsing with Safari is blazing fast thanks to advanced JavaScript

engine optimizations that make websites and web applications feel

snappier.

The SeaMonkey project is a community effort to develop the


SeaMonkey all-in-one internet application suite. Such a software

suite was previously made popular by Netscape and Mozilla, and

the SeaMonkey project continues to develop and deliver high-quality

updates as well as new features and improvements to this concept.


Containing an Internet browser, email & newsgroup client, HTML

SeaMonkey editor, IRC chat and web development.

SeaMonkey is built on the open source Mozilla Gecko engine, the

same code which underlies the highly successful siblings Firefox and

Thunderbird. SeaMonkey benefits from the cross-fertilization with

these other projects, by gaining (and contributing) new features and

the ongoing security updates which are a modern necessity.

Table 6.1 Web Browsers

109
The Web server sends the information back to the Web browser which displays the results
on the computer or other Internet-enabled device that supports a browser. Moreover, Information
is send via HTTP and HTTPS. Hypertext Transfer Protocol (HTTP) Allows for the retrieval of
linked resources from across the Web. Furthermore, Hypertext Transfer Protocol Secure
(HTTPS) provides authentication of the visited website and to protect the privacy and integrity of
exchanged data.

A common way to get to a Web site is to enter the URL of its home page file in your Web
browser's address bar. Website is the combination of webpages, and webpage is a single page
composes of different web components like image, video, information, etc. In addition to this, any
file within that Web site can also be specified with a URL. Uniform Resource Locator (URL), it
is the global address of documents and other resources on the World Wide Web.

If you want to create a website for whatever difference between static website and dynamic
website. These are the two kinds of websites that currently exist on the Internet.

Static website is the simplest kind of website; it contains information that does not
change. Most of static websites are created for viewing purposes only.

Dynamic website has more functionality, flexibility and features. It also contains
information that can be change automatically. In addition to this, dynamic website is also used to
interact with the user. Aside from static and dynamic website, website can also be categorized
into different types of website.

Importance of Website

A company’s website is the most basic form o must have in today’s any business that
does environment other website is missing out on one of the most powerful marketing tools
available to them. Here are some of the benefits of putting up a website.

 Online Advertising Presence

 Transfer Information to Branches and Affiliates

 Educate Your Customers

 Worldwide Exposure

Different Types of Website

Originally, websites were purely informational. Before the web was opened to the public,
educational and research institutions and government agencies were able to make information
available to each other via text-only websites. Now that we have the World Wide Web, there are
more types of websites than you can learn. Here are some of the types of website:

Personal Website

A personal website is a group of Web pages that someone creates about themselves. Personal

110
website is primarily used for informative or entertainment purposes but can also be used for
personal career marketing, social networking, or personal expression. A personal website might
also be essential to professionals working in a creative field. It can be a good tool to showcase
your portfolio and provide a snapshot of your abilities.

URL: http://www.juris.com.ph/

Company Website

A website is a necessity for entrepreneurs, small businesses, home-based businesses,


and anybody selling products or services. Having a well-designed website can also be an effective
way to market your business and compete with larger brands in your industry. Modern consumers
expect brands to be online, and without a Web presence, you're losing a valuable opportunity to
make a good impression and gain those customers' business.

URL: https://www.redribbonbakeshop.com.ph/
E-Commerce Website

E-Commerce website Provide shoppers with the convenience of a fully integrated free
shopping cart and a secure checkout experience directly from the website. Most of the E-
commerce website provides a consistent shopping experience that works across desktop, tablet

111
and mobile devices. MetroDeal is an online shopping website in Indonesia and in the Philippines.
This online website features different products and services available at the market.

URL: http://www.metrodeal.com/

Government Website

Government website is built to provide interactions and services between the citizen,
employee, government and government agencies. Government website is restricted only to .gov
domain name to identify that the website is for government purposes only.

URL: http://www.gsis.gov.ph/

Social Networking Website

A social networking website enables users to create profile within the website among
people who share interests, activities, photos, videos, backgrounds or real-life connections. A
social network can also be a site to have forums, chat, video calling, share files, and other form

112
of communication. Facebook is a social networking website that makes it easy for you to connect
and share with your family and friends online.

URL: https://www.facebook.com/

Entertainment Website

Entertainment website is one of the most used and viewed website in the world.
Entertainment is a form of activity that holds the attention and interest of an audience, or gives
pleasure and delight. Entertainment website can be classify/categorize as (anime, manga,
broadcasting, comedy, dance, erotica and pornography, film, gambling, gaming, music, radio and
sports website. YouTube allows billions of people to discover watch and share originally-created
videos.

URL: https://www.youtube.com/

Blogging Website

"Blog" is an abbreviated version of "weblog," which is a term used to describe websites


that contains and maintain a blogger's or group of bloggers' own experiences, observations,

113
suggestions, opinions, etc., and often having images, videos, information and links to other
websites or Facebook pages. Kurtzky is the travelogue of journey across the Philippines and
neighboring countries, mixed with a pinch of awesome weirdness and a dash of awkward
craziness. Mark Rodel dela Rosa is the blogger of this website. He quoted, “I metamorphosed a
type of traveler who always tries to fit multiple activities in a single day just to make the most out
of my trip. I don’t bother about missing a meal on the more worthwhile. This is a good example.”
of a great blog website.

URL: http://www.kurtzky.com/

114
Search Engine and Portal Website

Portal is a term that a website specially designed to provide a starting point for web
consumers, and brings information together from diverse sources in a uniform way. Portal website
offers services to the consumers such as e-mail, forums, search engines, and online shopping.
Yahoo! is an Internet portal that incorporates a search engine and a directory of World Wide Web
sites organized in a hierarchy of topic categories. As a directory, it provides both new and
seasoned Web users the reassurance of a structured view of hundreds of thousands of Web sites
and millions of Web pages.

The original portals were search engines. Search Engine website is designed to search
for information on the World Wide Web. There are thousands of different search engines available
on the Internet, each with their own abilities and features. Today, the most popular and well known
search engine is Google.

URL: https://www.google.com.ph/

URL: https://ph.yahoo.com/

115
You may have already heard of SEO or Search Engine Optimization, but you are not quite
sure what it is or why you need it. All major search engines such as Google, Bing and Yahoo have
primary search results, where web pages and other content such as videos or local listings are
shown and ranked based on what the search engine considers most relevant to users.

Search engine optimization (SEO) is the science/art of increasing traffic to a website by


helping it ranks higher in organic (non-paid) search results from search engine. SEO will help you
position your website properly to be found at the most critical points in the buying process or when
people need your site.

Targeted visitors to a website can provide publicity, revenue, and exposure like no other
channel of marketing. Investing in SEO, whether through time or finances, can have an
exceptional rate of return compared to other types of marketing and promotion.

Search Engine Optimization (SEO) Techniques

Social Networking Sites

Creating an account to social media sites will help increase the ranking and visibility of the
website. By creating an account the user can share posts with links, post contents regarding a
specific website and by adding target customers. Social media has been a great factor for most
of the website or literally to the business in the whole world.

Blogging

Google has developed automatic algorithms that rank your site. They send out what are
called “spiders” to “crawl” your site and check whether your site is valuable or useless. These
indicators include things like backlinks, domain age, traffic, fresh content, etc. Well many people
speculate that if you were really serious about your website you would get your own name and
host it yourself. And Google only wants to point to websites that are considered serious and
trustworthy.

You should never compromise the structure or the readability of your text for SEO
purposes. If people like and understand your post, they are much more likely to link, tweet and
share your posts. This will lead to higher ranking and more traffic. Nevertheless, without
compromising on structure or readability, you can do something to improve your ranking even
further.

Search Engine Submission

Search engine submission is how a webmaster submits a website directly to a search


engine. While Search Engine Submission is often seen as a way to promote a web site, it
generally is not necessary because the major search engines like Google, Yahoo, and Bing use
crawlers, bots, and spiders that eventually would find most web sites on the Internet all by
themselves.

There are two basic reasons to submit a web site or web page to a search engine. The
first reason would be to add an entirely new web site because the site operators would rather not
wait for a search engine to discover them. The second reason is to have a web page or web site

116
updated in the respective search engine.

Domain Name and Web Server/Hosting

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. A
domain name locates and identifies organization or other entity on the Internet via Internet
Protocol (IP) address.

Domain names are easy for people to remember, however computers or machines,
access websites based on IP addresses. Top-Level Domain (TLD) and country code Top-
Level Domain (ccTLD) are the last part of the domain name; it identifies something about the
website such as its purpose, organization/business and geographical representation.

Meanwhile, a web hosting service is a type of service that provides storing, maintaining
and updating files of website to access via World Wide Web. Web hosts are companies that
provide space on a server owned or leased for use by clients, as well as providing Internet
connectivity, typically in a data center. In choosing a good hosting company and service, you must
take into consideration the following features:

Features
Bandwidth Unlimited
Disk Space Unlimited
Server Unlimited

Table 6.2 Web Hosting Features

Name Entity Notes


.com commercial Originally created to represent the
“commercial” intent

.org organization Domain used to denote "non-profit


organization"
.net network Generally used to denote "network
and computer" topics.
education
.edu higher education Originally intended for al
institutions anywhere in the world.
.gov national and state government agencies This domain was originally intended
for any kind of government office or
agency.

117
Table 6.3 Top Level Domain Name

Overview of Internetworking

Internetworking is the term for all the concepts, technologies, and generic devices
connecting in different networks. It allows people and their computers to communicate across
different kinds of networks using intermediary devices such as routers or gateway devices.

In real world scenario, internetworking started as a way to connect disparate types of


networking technology, connecting individual local-area networks (LANs) to create wide-area
networks (WANs), and connecting WANs to form even larger WANs.

Classification of Computer Networks

A computer network, or simply a network, is the practice of linking two or more computing
devices together for the purpose of sharing data. This allows networks to share resources (such
as printers and CDs), exchange files, or allow electronic communications. The connections
between nodes are established using group of interconnected (via cable and/or wireless)
computers and peripherals that is capable of sharing software and hardware resources between
many users. Networks can interconnect with other networks and contain sub networks. There are
very common classifications of networks, including the following.

118
By Scale

 Local Area Networks (LANs)

A LAN is a group of computers and other devices that are connected together in a
relatively small area. Most of LANs are used in home, school, computer laboratory, office building
or group of buildings. Data is sent in the form of packets and to regulate the transmission of the
packets, different technologies can be used. A LAN is useful for sharing resources like files,
printers, games or other applications. However, with the emergence of wireless networking,
wireless LANs has become a popular alternative.

 Wide Area Networks (WANs)

WAN is a collection of computers and network resources connected together that


distinguishes a broader telecommunication structure from a local area network (LAN) or collection
of LANs. Moreover, the spans are relatively large geographical area such as a state, province or
country. Large enterprises have their own private WANs to link remote offices, or they use the
Internet for connectivity. The Internet could be described as the biggest WAN in the world.

119
Campus Area Networks (CANs)

A campus network, campus area network, corporate area network or CAN is an


interconnection of local-area networks within a limited geographical space, such as a school
campus or a military base. The main feature of Campus Area Network (CAN) is that all of the
computers which are connected together have some relationship to each other. A campus area
network is larger than a local area network but is typically smaller than a wide area network
(WAN).

 Metropolitan Area networks MANs)

A metropolitan area network (MAN) consists of a computer network and devices across a
large geographical area that includes several buildings or even the entire city (metropolis).

120
 Home Area Networks (HANs)

A home network or home area network (HAN) is a type of local area network that is
deployed and operated within a small boundary, typically a house or small office/home office. A
HAN is a network contained within a user's home that connects a person's digital devices that are
wired and wirelessly connected into the network.

121
 Personal Area Networks (PANs)

A personal area network (PAN), short distance area wired or wireless network for
interconnecting devices centered around an individual person's workspace. PANs can be used
for communication among the personal devices themselves or for connecting to a higher level
network and the Internet. These interconnected devices might include laptop computers, PDAs,
cellphones, printers, PCs or other wearable computer devices.

Internet, Intranet and Extranet

 Internet

The Internet is a global network used to connect people, communities, and countries
around the world via computers. The Internet carries an extensive range of information resources
and services, such as the inter-linked hypertext documents, email, chat and peer-to-peer
networks for file sharing and telephony.

 Intranet

An intranet is a private network that is contained within an enterprise. It is usually a


corporation, accessible only by the organization's members, employees, or others with
authorization. An organization's intranet typically includes Internet access but is firewalled so that
its computers cannot be reached directly from the outside.

 Extranet

122
An extranet is a private network that require allows controlled access from outside of an
organization's intranet. These can include firewalls, server management, user authentication,
encryption of messages and the use of virtual private networks (VPNs) that tunnel through the
public network.

 Darknet

The "dark net," also known as the "dark web," is part of the greater "deep web," a network
of secret websites that exist on an encrypted network.

 By Network Topology

Network topology refers to how various nodes, devices, and connections on your network
are physically or logically arranged in relation to each other. Think of your network as a city, and
the topology as the road map. Just as there are many ways to arrange and maintain a city—such
as making sure the avenues and boulevards can facilitate passage between the parts of town
getting the most traffic—there are several ways to arrange a network. Each has advantages and
disadvantages and depending on the needs of your company, certain arrangements can give you
a greater degree of connectivity and security.

There are two approaches to network topology: physical and logical. Physical network
topology, as the name suggests, refers to the physical connections and interconnections between
nodes and the network—the wires, cables, and so forth. Logical network topology is a little more
abstract and strategic, referring to the conceptual understanding of how and why the network is
arranged the way it is, and how data moves through it.

Therese are the types of topology in computer networks:

 Bus Topology

Bus topology is a network type in which every computer and network device is connected
to single cable. When it has exactly two endpoints, then it is called Linear Bus topology.

 Ring Topology

It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.

123
 Star Topology

In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.

 Mesh Network

It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n (n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are:

1. Routing

2. Flooding

MESH Topology: Routing

124
In routing, the nodes have a routing logic, as per the network requirements. Like routing

logic to direct the data to reach the destination using the shortest distance. Or, routing logic which

has information about the broken links, and it avoids those node etc. We can even have routing

logic, to re-configure the failed nodes.

MESH Topology: Flooding

In flooding, the same data is transmitted to all the network nodes, hence no routing logic

is required. The network is robust, and it’s very unlikely to lose the data. But it leads to unwanted

load over the network.

 TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy.

125
 Hybrid Topology

It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology is
used, connecting these topologies will result in Hybrid Topology (ring topology and star topology).

 By Functional Relationship (Network Architectures)

Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data. Simply we can say that how
computers are organized and how tasks are allocated to the computer. The two types of network
architectures are used:

 Client-Server

o Client/Server network is a network model designed for the end users called clients,
to access the resources such as songs, video, etc. from a central computer known
as Server.
o The central controller is known as a server while all other computers in the network
are called clients.

126
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the
server for the permission. The server sends the response to the client 1 to initiate
its communication with the client 2.

 Peer-to-Peer Architecture

o Peer-To-Peer network is a network in which all the computers are linked together
with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but
this can lead to a problem if the computer with the resource is down.

127
As the world pushes full speed ahead into the digital era, IT and communication
technologies continue to push the boundaries of what people once considered possible. Devices
are getting smaller and yet more feature-rich, and individuals and companies large and small are
finding smarter ways to streamline operations by enhancing their IT infrastructure.

 By Connections

Many protocols can work with both wired and wireless networks. In recent years, however,
wireless technologies have grown and become much more popular. Wi-Fi and other wireless
technologies have become the favorite option for building computer networks. One of the
reasons for this is that wireless networks can easily support different types of wireless gadgets
that have become popular over the years, such as smartphones and tablets. Mobile networking
is now an important thing to consider because it's not going to go away anytime soon.

All of this contributes to the modern computer networking field, where there is so much
progress, and so much rapid evolution.

Network Devices
Computer networking devices are known by different names such as networking devices,
networking hardware, network equipment etc. However, all of the names mean the same but have
got different purposes. After covering different topics on network topologies and their advantages
and disadvantages, we are here once again with a series on the network devices.
Network Interface Card (NIC)
NIC converts the data packets between two different data transmission technologies. A
PC uses parallel data transmission technology to transmit the data between its internal parts while
the media that provides connectivity between different PCs uses serial data transmission
technology.

128
A NIC converts parallel data stream into the serial data stream and the serial data stream
into the parallel data stream.

Network Hub
Network Hub is a networking device which is used to connect multiple network hosts. A
network hub is also used to do data transfer. The data is transferred in terms of packets on a
computer network. So when a host sends a data packet to a network hub, the hub copies the data
packet to all of its ports connected to. Like this, all the ports know about the data and the port for
whom the packet is intended, claims the packet.

129
Network Switch

Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say
that a switch is more intelligent than a hub. While hub just does the work of data forwarding, a
switch does 'filter and forwarding' which is a more intelligent way of dealing with the data packets.

Modem
A Modem is somewhat a more interesting network device in our daily life. So if you have
noticed around, you get an internet connection through a wire (there are different types of wires)
to your house. This wire is used to carry our internet data outside to the internet world.

130
Network Router
A router is a network device which is responsible for routing traffic from one to another
network. These two networks could be a private company network to a public network. You can
think of a router as a traffic police who directs different network traffic to different directions.

Bridge
If a router connects two different types of networks, then a bridge connects two
subnetworks as a part of the same network. You can think of two different labs or two different
floors connected by a bridge.

131
Repeater
A repeater is an electronic device that amplifies the signal it receives. In other terms, you
can think of repeater as a device which receives a signal and retransmits it at a higher level or
higher power so that the signal can cover longer distances.

When these network devices take a particular configurational shape on a network, their
configuration gets a particular name and the whole formation is called Network topology.

132
Activities/Assessment

I. Identification. Read each statement or question below carefully and fill in the blank(s) with
the correct answer.

1. _______________ converts the data packets between two different data transmission
technologies.
2. _______________ is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data.
3. _______________ is short distance area wired or wireless network for interconnecting
devices centered around an individual person's workspace
4. _______________ is the practice of linking two or more computing devices together for
the purpose of sharing data.
5. _______________ is the science/art of increasing traffic to a website by helping it ranks
higher in organic (non-paid) search results from search engine.

II. Enumeration. Enumerate the following:

5 Network topologies 1.
2.
3.
4.
5.
5 Network devices 1.
2.
3.
4.
5.
5 SEO techniques 1.
2.
3.
4.
5.
5 Types of website 1.
2.
3.
4.
5.
5 Web browsers 1.
2.
3.
4.
5.

133
III. Application. Read the questions carefully and confine your responses to an analysis of the
questions as written.

1. Compare the web browsers using Venn diagram.

2. Compare the network topologies using Venn diagram.

134
HTML

Learning Outcomes:

After successful completion of this lesson, you should be able to:

 Explain the HTML Elements and Forms


 Create and Design a webpage
 Practices basic web development
 Determine different forms

135
Overview

HTML (HyperText Markup Language) is the most basic building block of the Web. It
defines the meaning and structure of web content. Other technologies besides HTML are
generally used to describe a web page's appearance/presentation (CSS) or functionality/behavior
(JavaScript). HTML was first created by Tim Berners-Lee, Robert Cailliau, and others starting in
1989.

"Hypertext" refers to links that connect web pages to one another, either within a single
website or between websites. Links are a fundamental aspect of the Web. By uploading content
to the Internet and linking it to pages created by other people, you become an active participant
in the World Wide Web.

HTML uses "markup" to annotate text, images, and other content for display in a Web
browser. HTML markup includes special "elements" such as <head>, <title>, <body>, <header>,
<footer>, <article>, <section>, <p>, <div>, <span>, <img>, <aside>, <audio>, <canvas>,
<datalist>, <details>, <embed>, <nav>, <output>, <progress>, <video>, <ul>, <ol>, <li> and many
others.

HTML is not a programming language; it is a markup language that defines the structure
of your content. HTML consists of a series of elements, which you use to enclose, or wrap,
different parts of the content to make it appear a certain way, or act a certain way. The enclosing
tags can make a word or image hyperlink to somewhere else, can italicize words, and can make
the font bigger or smaller, and so on. For example, take the following line of content:

My cat is very grumpy

If we wanted the line to stand by itself, we could specify that it is a paragraph by enclosing
it in paragraph tags:

<p>My cat is very grumpy</p>

Anatomy of an HTML element

The main parts of our element are as follows:

 The opening tag: This consists of the name of the element (in this case, p), wrapped in
opening and closing angle brackets. This states where the element begins or starts to
take effect — in this case where the paragraph begins.

136
 The closing tag: This is the same as the opening tag, except that it includes a forward
slash before the element name. This states where the element ends — in this case where
the paragraph ends. Failing to add a closing tag is one of the standard beginner errors and
can lead to strange results.
 The content: This is the content of the element, which in this case, is just text.
 The element: The opening tag, the closing tag and the content together comprise the
element.

Elements can also have attributes that look like the following:

Attributes contain extra information about the element that you don't want to appear in the
actual content. Here, class is the attribute name and editor-note is the attribute value. The class
attribute allows you to give the element an identifier that can be used later to target the element
with style information and other things.

An attribute should always have the following:

1. A space between it and the element name (or the previous attribute, if the element already
has one or more attributes).
2. The attribute name followed by an equal sign.
3. The attribute value wrapped by opening and closing quotation marks.

Note: Simple attribute values that don't contain ASCII whitespace (or any of the characters " ' ` =
< > ) can remain unquoted, but it is recommended that you quote all attribute values, as it makes
the code more consistent and understandable.

Nesting elements

You can put elements inside other elements too — this is called nesting. If we wanted to
state that our cat is very grumpy, we could wrap the word "very" in a <strong> element, which
means that the word is to be strongly emphasized:

<p>My cat is <strong>very</strong> grumpy.</p>

You do however need to make sure that your elements are properly nested. In the example
above, we opened the <p> element first, then the <strong> element; therefore, we have to close
the <strong> element first, then the <p> element. The following is incorrect:

<p>My cat is <strong>very grumpy.</p></strong>

The elements have to open and close correctly so that they are clearly inside or outside
one another. If they overlap as shown above, then your web browser will try to make the best
guess at what you were trying to say, which can lead to unexpected results. So don't do it!

137
Empty elements

Some elements have no content and are called empty elements. Take the <img> element
that we already have in our HTML page:

<img src="images/firefox-icon.png" alt="My test image">

This contains two attributes, but there is no closing </img> tag and no inner content. This
is because an image element doesn't wrap content to affect it. Its purpose is to embed an image
in the HTML page in the place it appears.

Anatomy of an HTML document

That wraps up the basics of individual HTML elements, but they aren't handy on their own.
Now we'll look at how individual elements are combined to form an entire HTML page. Let's revisit
the code we put into our index.html.

Example:

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<title>My test page</title>

</head>

<body>

<img src="images/firefox-icon.png" alt="My test image">

</body>

</html>

Here, we have the following:

 <!DOCTYPE html> — the doctype. It is required preamble. In the mists of time, when
HTML was young (around 1991/92), doctypes were meant to act as links to a set of rules
that the HTML page had to follow to be considered good HTML, which could mean
automatic error checking and other useful things. However these days, they don't do
much, and are basically just needed to make sure your document behaves correctly.
That's all you need to know for now.

 <html></html> — the <html> element. This element wraps all the content on the entire
page and is sometimes known as the root element.

138
 <head></head> — the <head> element. This element acts as a container for all the stuff
you want to include on the HTML page that isn't the content you are showing to your page's
viewers. This includes things like keywords and a page description that you want to appear
in search results, CSS to style our content, character set declarations and more.

 <meta charset="utf-8"> — This element sets the character set your document should
use to UTF-8 which includes most characters from the vast majority of written languages.
Essentially, it can now handle any textual content you might put on it. There is no reason
not to set this and it can help avoid some problems later on.

 <title></title> — the <title> element. This sets the title of your page, which is the title that
appears in the browser tab the page is loaded in. It is also used to describe the page when
you bookmark/favorite it.

 <body></body> — the <body> element. This contains all the content that you want to
show to web users when they visit your page, whether that's text, images, videos, games,
playable audio tracks or whatever else.

HTML Editors

Web pages can be created and modified by using professional HTML editors. Most
important, we need an HTML editor. There are many choices on the market. Here are a handful
of the most popular:

 Notepad (PC)

Notepad is a simple text editor for Microsoft Windows and a basic text-editing program
which enables computer users to create documents. It was first released as a mouse-based MS-
DOS program in 1983, and has been included in all versions of Microsoft Windows since Windows
1.0 in 1985.

139
 TextEdit

TextEdit is a simple, open-source word processor and text editor, first featured in NeXT's
NeXTSTEP and OpenStep. It is now distributed with macOS since Apple Inc.'s acquisition of
NeXT, and available as a GNUstep application for other Unix-like operating systems such as
Linux.

 Notepad ++

Another common choice for HTML and other language coders is Notepad ++. It is a tiny
program to download and perform the functions you need for writing clean code.

140
 Sublime Text 3

Sublime Text is a shareware cross-platform source code editor with a Python application
programming interface (API).

Follow the steps below to create your first web page with Notepad.

Step 1: Open Notepad (PC)


Windows 8 or later:
Open the Start Screen (the window symbol at the bottom left on your screen). Type
Notepad.
Windows 7 or earlier:
Open Start > Programs > Accessories > Notepad

Step 2: Write Some HTML

141
Step 3: Save the HTML Page

1. Save the file on your computer. Select File > Save as in the Notepad menu.

2. Name the file "index.htm" and set the encoding to UTF-8 (which is the preferred encoding
for HTML files).

Tip: You can use either .htm or .html as file extension. There is no difference, it is up to you.

Step 4: View the HTML Page in Your Browser


Open the saved HTML file in your favorite browser (double click on the file, or right-click -
and choose "Open with").

The result will look much like this:

142
HTML Element Reference - By Category

Basic HTML Tags

Tag Description
<!DOCTYPE> Defines the document type
<html> Defines an HTML document
<head> Contains metadata/information for the document
<title> Defines a title for the document
<body> Defines the document's body
<h1> to <h6> Defines HTML headings
<p> Defines a paragraph
<br> Inserts a single line break
<hr> Defines a thematic change in the content
<!--...--> Defines a comment

Formatting tags

Tag Description
<acronym> Not supported in HTML5. Use <abbr> instead.
Defines an acronym
<abbr> Defines an abbreviation or an acronym
<address> Defines contact information for the author/owner of a document/article
<b> Defines bold text
<bdi> Isolates a part of text that might be formatted in a different direction
from other text outside it
<bdo> Overrides the current text direction
<big> Not supported in HTML5. Use CSS instead.
Defines big text
<blockquote> Defines a section that is quoted from another source
<center> Not supported in HTML5. Use CSS instead.
Defines centered text
<cite> Defines the title of a work
<code> Defines a piece of computer code
<del> Defines text that has been deleted from a document

143
<dfn> Specifies a term that is going to be defined within the content
<em> Defines emphasized text
<font> Not supported in HTML5. Use CSS instead.
Defines font, color, and size for text
<i> Defines a part of text in an alternate voice or mood
<ins> Defines a text that has been inserted into a document
<kbd> Defines keyboard input
<mark> Defines marked/highlighted text
<meter> Defines a scalar measurement within a known range (a gauge)
<pre> Defines preformatted text
<progress> Represents the progress of a task
<q> Defines a short quotation
<rp> Defines what to show in browsers that do not support ruby annotations
<rt> Defines an explanation/pronunciation of characters (for East Asian
typography)
<ruby> Defines a ruby annotation (for East Asian typography)
<s> Defines text that is no longer correct
<samp> Defines sample output from a computer program
<small> Defines smaller text
<strike> Not supported in HTML5. Use <del> or <s> instead.
Defines strikethrough text
<strong> Defines important text
<sub> Defines subscripted text
<sup> Defines superscripted text
<template> Defines a container for content that should be hidden when the page
loads
<time> Defines a specific time (or datetime)
<tt> Not supported in HTML5. Use CSS instead.
Defines teletype text
<u> Defines some text that is unarticulated and styled differently from
normal text

144
HTML Forms

An HTML form is used to collect user input. The user input can then be sent to a server
for processing.

Forms and Input HTML Tags

Tag Description
<form> Defines an HTML form for user input
<input> Defines an input control
<textarea> Defines a multiline input control (text area)
<button> Defines a clickable button
<select> Defines a drop-down list
<optgroup> Defines a group of related options in a drop-down list
<option> Defines an option in a drop-down list
<label> Defines a label for an <input> element
<fieldset> Groups related elements in a form
<legend> Defines a caption for a <fieldset> element
<datalist> Specifies a list of pre-defined options for input
controls
<output> Defines the result of a calculation

The <form> Element

<form>
.
form elements
.
</form>

Form elements are different types of input elements, like: text fields, checkboxes, radio
buttons, submit buttons, and more.

145
The <input> Element
The <input> element is the most important form element.
An <input> element can be displayed in many ways, depending on the type attribute.
Here are some examples:

Type Description
<input type="text"> Displays a single-line text input field
<input type="radio"> Displays a radio button (for selecting one of many choices)
<input type="submit"> Displays a submit button (for submitting the form)

Example
A form with two text input fields:

<form>
<label for="fname">First name:</label><br>
<input type="text" id="fname" name="fname"><br>
<label for="lname">Last name:</label><br>
<input type="text" id="lname" name="lname">

</form>

This is how it will look like in a browser:


First name:

Last name:

Note: The form itself is not visible. Also note that the default width of an input field is 20
characters.

Radio Buttons

<input type="radio"> defines a radio button.


Radio buttons let a user select ONE of a limited number of choices.

146
Example
A form with radio buttons:

<form>
<input type="radio" id="male" name="gender" value="male">
<label for="male">Male</label><br>
<input type="radio" id="female" name="gender" value="female">
<label for="female">Female</label><br>
<input type="radio" id="other" name="gender" value="other">
<label for="other">Other</label>
</form>

This is how the HTML code above will be displayed in a browser:

The Submit Button


<input type="submit"> defines a button for submitting the form data to a form-handler. The
form-handler is typically a page on the server with a script for processing input data. The form-
handler is specified in the form's action attribute.

Example
A form with a submit button:

<form action="/action_page.php">

<label for="fname">First name:</label><br>

<input type="text" id="fname" name="fname" value="John"><br>

<label for="lname">Last name:</label><br>

<input type="text" id="lname" name="lname" value="Doe"><br><br>

<input type="submit" value="Submit">

</form>

147
This is how the HTML code above will be displayed in a browser:
First name:

Last name:

Sending form data to your web server

The last part, and perhaps the trickiest, is to handle form data on the server side. The
<form> element defines where and how to send the data thanks to the action and method
attributes.

The names are important on both the client- and server-side; they tell the browser which
name to give each piece of data and, on the server side, they let the server handle each piece of
data by name. The form data is sent to the server as name/value pairs.

To name the data in a form you need to use the name attribute on each form widget that
will collect a specific piece of data. Let's look at some of our form code again:

<form action="/my-handling-form-page" method="post">


<ul>
<li>
<label for="name">Name:</label>
<input type="text" id="name" name="user_name" />
</li>
<li>
<label for="mail">E-mail:</label>
<input type="email" id="mail" name="user_email" />
</li>
<li>
<label for="msg">Message:</label>
<textarea id="msg" name="user_message"></textarea>
</li>
...

In the example, the form will send 3 pieces of data named "user_name", "user_email", and
"user_message". That data will be sent to the URL "/my-handling-form-page" using the HTTP
POST method.

On the server side, the script at the URL "/my-handling-form-page" will receive the data
as a list of 3 key/value items contained in the HTTP request. The way this script will handle that
data is up to you. Each server-side language (PHP, Python, Ruby, Java, C#, etc.) has its own
mechanism of handling form data.

148
Activities/Assessment

I. Application. Read the questions carefully and confine your responses to an analysis of the
questions as written.

1. Create a simple webpage(s) using HTML tags, elements, attributes and forms

149
References

 https://www.tutorialspoint.com/computer_concepts/computer_concepts_characteristics_
of_computer_system.htm
 https://ecomputernotes.com/fundamental/introduction-to-computer/what-are-
characteristic-of-a-computer
 https://quicklearncomputer.com/characteristics-of-computer/
 https://codescracker.com/computer-fundamental/characteristics-of-computer.htm
 https://www.geeksforgeeks.org/classification-of-computers/
 https://ecomputernotes.com/fundamental/introduction-to-computer/write-a-detailed-note-
on-classification-of-computers
 https://www.cs.cmu.edu/~fgandon/lecture/uk1999/computers_types/
 https://lessonplan.edudelight.com/computer-as-ipo-system/
 https://www.digitaltrends.com/computing/what-is-a-cpu/
 https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading04.htm
 https://www.tutorialspoint.com/computer_fundamentals/computer_cpu.htm
 https://www.techopedia.com/definition/2851/central-processing-unit-cpu
 https://study.com/academy/lesson/central-processing-unit-cpu-parts-definition-
function.html
 https://www.webopedia.com/TERM/C/CPU.html
 https://www.computerhistory.org/timeline/computers/
 https://www.livescience.com/20718-computer-history.html
 https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading03.htm
 https://www.webopedia.com/DidYouKnow/Hardware_Software/FiveGenerations.asp
 http://people.bu.edu/baws/brief%20computer%20history.html
 https://www.nortonsecurityonline.com/security-center/evolution-of-computers.html
 https://www.tutorialspoint.com/computer_fundamentals/computer_generations.htm
 https://www.sciencedaily.com/terms/computer_software.htm
 https://study.com/academy/lesson/what-is-computer-software-definition-applications-
quiz.html
 https://www.computerhope.com/jargon/s/software.htm
 https://www.britannica.com/technology/software
 https://www.streetdirectory.com/etoday/different-types-of-computer-software-jjwap.html
 https://www.newworldencyclopedia.org/entry/computer_software

150
 https://computersciencewiki.org/index.php/Data_representation
 https://csfieldguide.org.nz/en/chapters/data-representation/numbers/
 https://www.digitaltechnologieshub.edu.au/teachers/topics/data-representation
 https://wikieducator.org/DATA_REPRESENTATION_IN_COMPUTER
 https://teachcomputerscience.com/data-representation/
 https://www.crucial.com/articles/pc-builders/what-is-computer-hardware
 https://web.stanford.edu/class/cs101/hardware-1.html
 https://searchnetworking.techtarget.com/definition/hardware
 https://www.neweggbusiness.com/t/computer-hardware/id-21
 https://computer.howstuffworks.com/what-is-computer-hardware.htm
 https://techterms.com/definition/peopleware
 https://www.techopedia.com/definition/5545/peopleware
 https://www.peopleware.do/
 https://www.fieldengineer.com/blogs/what-is-a-computer-network
 https://www.britannica.com/technology/computer-network
 https://www.geeksforgeeks.org/basics-computer-networking/
 https://www.javatpoint.com/types-of-computer-network
 https://www.techopedia.com/definition/25597/computer-network
 https://www.tutorialspoint.com/computer_fundamentals/computer_networking.htm
 https://www.tutorialspoint.com/web_developers_guide/web_browser_types.htm
 https://www.slimjet.com/en/lp/top-10-browsers.php
 https://www.wisdomjobs.com/e-university
 https://www.hostgator.com/blog/popular-types-websites-create/
 https://99designs.com/blog/web-digital/types-of-websites/
 https://www.websitebuilderexpert.com/designing-websites/types-of-websites/
 http://www.webyurt.com/popular-types-of-websites
 https://www.w3schools.com/html/
 https://html.com/
 https://html.spec.whatwg.org/
 https://www.w3.org/html/
 https://www.tutorialspoint.com/html/index.htm

151

You might also like