Computer Notes
Computer Notes
Characteristics of Computers:
Computers are powerful machines for a variety of reasons. The
computer’s ability to perform these tasks is because of the
following characteristics:
a) Speed:
Computers are fast in their operations and processing. The speed
is measured in millions of instructions per second (MIPS) or
billions of instructions per second (BIPS). The speed of a
processor is measured in terms of a clock cycle performed in
seconds. A single cycle of processing performed in a second is
called a Hertz. Current personal computers run at clock speeds
equivalent to a Megahertz (MHZ) or Gigahertz (GHZ).
b) Accuracy:
Computers have the ability of processing large amounts of data
and produce results without errors. Computer errors are due to
human errors or data that is not accurate. A computing phrase
GIGO (Garbage In Garbage Out) means that when wrong data
with errors is entered into the computer you get output with errors
from the computer.
c) Storage:
Computers can store large amounts of data before and after
processing in the computer’s memory (temporarily) and on the
storage media (permanently). The temporary memory of the
computer uses is called Random Access Memory (RAM).
Computers today use RAM chips with capacities ranging from 32
Megabytes (MB) to 8 Gigabytes (GB) and beyond.
d) Versatile:
Computers are said to be versatile because they are used to
perform a variety of tasks such as creating documents, sending
bills to customers, storing records, performing calculations,
entertainment, etc.
e) Diligence:
Computers are diligent machines because they repeat processing
tasks over and over again without making any errors or getting
tired. Once programmed, the computer automatically performs as
many cycles as possible and produces output in a short period of
time with less human interruption.
f) Reliability and Consistency:
Computers are reliable machines because the electronic
components inside the computer are dependable and have a low
failure rate. The high reliability of the components inside enables
computers to produce accurate and consistent results.
g) Communication:
A computer today can communicate with other computers often
wirelessly or through connected wires. Two computers located in
the same room can be connected by a communications device
i.e. a network switch to share stored data, instructions and
information.
COMPUTER TERMINOLOGIES
Data
This is a collection of raw and unprocessed facts,
including letters, figures, symbols, images, sound and
video that is relating to an activity.
Information
Information is organized, meaningful, and useful results or
output obtained after processing data, useful in making a
decision.
Bit
The smallest piece of information used by the computer
and is the short form of binary digit. In computer
language it is either a 0 (zero) or a 1(one)
Byte
A byte is a piece of information made up of 8 (eight) bits
that is used to represent one character.
Input
Any data or instructions that are entered into the memory
of the computer for processing.
Output
Data that has been processed into information which is in
a useful form from a computer.
Storage
A location where data, instructions and information are
held in a computer for future use. Storage takes place in
memory and on storage media e.g. hard disk, compact
disk, flash disks, digital versatile disk (DVD).
Processing
This refers to any action that converts input data into
information.
Hardware
Hardware is the physical electronic components that make
up a personal computer.
Software
Software is a series of instructions that directs the
computer on each task it will perform and how to do it.
Software is also called a computer program or
application program.
Booting:
Booting is the process of starting up a computer. There
are two methods of booting namely: cold booting and
warm booting.
Command:
A command is an instruction on a menu or a keystroke
that causes a program to perform a specific action.
File:
A collection of stored data, instructions, information or
programs that is assigned (given) a name.
Saving:
Saving is the process of writing a file onto a disk.
Disk:
A hardware device made of magnetic or optically fixed
material on which data can be stored.
Downloading:
Downloading is the process of receiving data from one
computer to another for example a web page from a
computer server on the Internet or a file from a computer
network.
Uploading:
Uploading is the process of transferring data from one
computer to another for example a document, graphics
through a computer network or to a server on the Internet.
Folder:
An electronic subdirectory which contains files.
Icon:
A graphical symbol representing an application program,
file, folder or command.
Memory:
Memory is a temporary holding area where data,
programs and instructions and information while
processing is taking place. RAM (Random Access
Memory) and ROM-BIOS (Read-Only Memory Basic Input
Output System) are two types of memory chips.
Menu:
A menu is an item in a program or computer screen
containing a series of commands from which a user can
make a selection.
Operating System:
A piece of system software that interacts between
hardware, application programs and the user to control the
computer and coordinate all computer resources.
Multi-tasking:
A method in computing that allows a user to run several
tasks also known as processes during the same period of
time. The tasks share common processing resources such
as the CPU and main memory.
Multi-Processing:
This is the use of two or more central processing units
(CPUs) within a single computer system. The term also
refers to the ability of a system to support more than one
processor and/or the ability to allocate tasks between
them.
Multi-user:
A term that defines an operating system or application
software that allows access by multiple users (two or more
users) of a computer at the same time.
Network:
A collection of computers and devices connected together
via communication channels i.e. telephone lines, and
transmission media i.e. network cables that allow
computers to share resources. There are basically two
types of networks
i) Local Area Network (LAN)
ii) Wide Area Network (WAN)
Internet
A worldwide collection of computer networks that links
millions of businesses, government agencies, educational
institutions and individuals.
DATA AND INFORMATION PROCESSING
Data processing involves a series of input, process, output, and
storage activities that converts data into information. These
series of activities are often called the information processing
cycle.
Below is a diagram illustrating the information processing cycle
Input Output
Storage
The Abacus
The abacus a mechanized pebble counter invented
around 500 BC as a traditional calculating aid. It is made
of a frame and a string of wires with beads on the wires to
perform calculations. The beads were slid along the rods
to add and subtract. The abacus has been used for the
last 2000 years and is still in use today.
Although the Analytical Engine was never built fully, its key
concepts, such as the capacity to store instructions, the
use of punched cards, primitive memory, and the ability to
print, can be found in many modern computers.
The Tabulating Machine
Dr. Herman Hollerith, a census statistician in the United
States of America, invented a tabulating machine that was
used for the government census in 1890. The Tabulating
Machine used punched cards to record and sort data or
information. Each hole punched stored data about where
people lived, their ages, and what their jobs were. Dr.
Hollerith later set up his company, Hollerith Tabulating
Company that combined with two other companies to
create the Computing Tabulating Recording (CTR)
company, later renamed International Business
Machines (IBM) in 1924.
The Colossus
Alan Turing, a British and other experts completed a secret code
breaking computer called the Colossus at the British Intelligence
Centre in Bletchley Park in 1943. It was developed to decode
(interprete) messages sent to the Germany forces. Each colossus
was using 1,500 vacuum tubes and a series of pulleys
transported continuous rolls of punched paper tape containing
possible solutions to a particular code.
THE ENIAC
John Presper Eckert and John Mauchly started working on the
ENIAC I in 1943 at the Moore School of
Electrical Engineering in the University of
Pennsylvania. They built the first large
scale electronic digital computer for the
military known as the ENIAC or Electrical
Numerical Integrator and Computer. It
was completed in 1946. The U.S. military
sponsored their research since they
needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for
target accuracy). The ENIAC computer at the time was
approximately one thousand times faster than older
electromechanical relay switched computers.
THE ASCC
In 1937, Howard H. Aiken started working on the Automatic
Sequence Controlled Calculator (ASCC), which was more
popularly known as the "Harvard Mark I" at Harvard, with the
help of IBM during World War II. It brought Babbage's principles
of the analytical engine almost to full realization, while adding
important new features. The Harvard Mark-1 was a room-sized,
relay-based calculator. The Harvard Mark-1 was used to produce
mathematical tables but was soon superseded by stored program
computers.
It was 51 feet long, eight feet high and weighed five tons. It had
78 adding machines and calculators linked together, 3,300 relays,
over 500 miles of wire. It was the largest electromechanical
calculator and was used by the Navy during the war to run
repetitive calculations for the production of mathematical tables.
9) ICT in COMMUNICATION
An organization such as a business or school provides
communications services to employees, students, or customers.
The different uses of computers for communication include:
a) Accessing the Internet and World Wide Web (WWW):
The Internet is a worldwide collection of networks that link
millions of businesses, government agencies, education
institutions, and individuals together. The World Wide Web
is a collection of electronic documents on the Internet that
users can access through a Web browser.
An Internet Service Provider (ISP) is an organization that
enables computer users to access the Internet and Web e.g.
Mobile Telecommunication Network (MTN), Orange, Airtel,
Smile, Vodafone, Infocom, AFSAT, etc.
b) Electronic Mail (E-Mail) Transmission:
This is the transmission of electronic messages and files via
a computer network from one computer to another by use of
e-mail servers and e-mail accounts.
f) Use of Chat Rooms: Chat rooms are virtual rooms that offer
real-time typed conversation services that take place on
computers connected to the Internet.
m) Video Conferencing:
Video conferencing is a real time meeting between two or
more geographically separated people who use a network or
the Internet to transmit audio and video data. To participate
in a video conference, you need video conferencing software
along with a microphone, speakers, and a video camera
attached to a computer. As you speak, members of the
meeting hear your voice on their speakers. Users with
higher-speed broadband internet connections experience
much better video performance.
Typing Text
Whenever you need to type something in a program, e-mail
message, or text box, you will see a blinking vertical line (I).
That’s the insertion point, also called the cursor. It shows where
the character that you type will appear. You can move the cursor
by using the navigation keys.
In addition to alphabetical letters, numbers, punctuation marks,
and symbols, the typing keys also include SHIFT, CAPS LOCK,
the TAB key, ENTER, the SPACEBAR, and BACKSPACE keys.
Below is a table with a sample of keys and their respective
functions.
KEY NAME HOW TO USE IT
SHIFT Press SHIFT in combination with a letter to type
an uppercase letter.
Press SHIFT in combination with another key to
type the symbol shown on the upper part of that
key.
ENTER Press ENTER to move the cursor to the beginning
of the next line. In a dialog box, press ENTER to
select the highlighted button.
SPACEBAR Press the SPACEBAR to move the cursor one
space forward and leave space between words.
BACKSPACE Press BACKSPACE to delete (erase) the
character before or to the left of the cursor, or the
selected text.
CAPS LOCK Press CAPS LOCK once to type all letters as
uppercase. Press CAPS LOCK again to turn this
function off. Your keyboard may have a light
indicating whether CAPS LOCK is on.
TAB Press the TAB key to move the cursor several
spaces forward. You can also press the TAB key
to move to the next text box on a form.
Using keyboard shortcuts
Keyboard shortcuts are ways to perform actions faster by using your keyboard. In fact,
almost any action or command you can perform with a mouse can be performed faster
using one or more keys on your keyboard.
A plus sign (+) between two or more keys indicates that those keys should be pressed
in combination. For example, CTRL + A means press and hold CTRL and then press A.
CTRL + SHIFT + A means press and hold CTRL and SHIFT and then press A.
Program shortcuts
You can do things in most programs by using the keyboard. To see which commands
have keyboard shortcuts, open a menu. The shortcuts (if available) are shown next to
the menu items.
USEFUL SHORTCUTS
The following table lists some of the most useful keyboard shortcuts.
To use the numeric keypad to enter numbers, press NUM LOCK. Most keyboards have
a light that indicates whether NUM LOCK is on or off. When NUM LOCK is off, the
numeric keypad functions as a second set of navigation keys (these functions are
printed on the keys next to the numerals or symbols.)
PAUSE/BREAK
This key is rarely used. In some older programs, pressing this key pauses the program
or, in combination with CTRL, stops it from running.
HOT KEYS
Some modern keyboards come with “hot keys” or buttons that give you quick, one-press
access to programs, files, or commands. Other models have volume controls, scroll
wheels, zoom wheels, and other gadgets.
a) Analog Computers:
An analog device uses continuously changing values to
represent data. Analog devices generally deal with physical
variables. An example of analog data is human speech.
Others include electrical voltages, pressure, temperature,
time, speed, weight etc. Examples of analog devices include:
Analog thermometers, barometers, analog clocks and
watches, analog speedometers, weighing scales, etc
b) Digital Computers
Computer equipment is designed to process data as digital
signals. A digital device or computer is a tool that performs
calculations and logical operations using binary digits (0,1) to
represent information. Digital Computers perform their
operations or calculations using the binary system by
sending digital signals. A digital signal consists of individual
electrical signals (pulses) that represent the bits grouped
together into bytes.
b) According to Size
Computers can be classified according to their size namely:
i) Micro Computers:
Microcomputers are small computer systems basically found
in homes, offices, schools and small businesses. They are
single-user computers. They are also referred to as
Personal Computers (PC).
iv) Server
A server is the host or central computer in a network that
manages and provides services to client computers in a
network. Such services include internet access, print access,
file access and storage, etc. Examples of servers include:
File server
Print server
Database server
Network server
v) Real-time systems:
A real time system is a system that responds to an event that
has occurred within a specified fixed time. Real-time means
that after an event has occurred, a system or application has
to react to that event within a certain time period or deadline
i.e. computers for a banking system are real time systems.
b) Software:
These are sets of instructions that direct hardware to
perform tasks necessary to process data into meaningful
information. A computer program is another term used to
mean software. A computer program consists of step-by-
step instructions that tell a computer how to do its work.
c) Data:
Data are raw, unprocessed facts including text, numbers,
images and sounds. Processed data becomes information.
When stored electronically in files, data can be used directly
as input for an information system. Four common types of
files are:
i) Document files: created by word processing
programs to store documents such as memos, term
papers and letters.
ii) Worksheet files: created by electronic spreadsheets
to analyze budgets and to predict sales.
iii) Database files: created by database management
programs that store databases (a set of records).
iv) Presentation files: created by presentation programs
to store presentations consisting of slides, handouts
and speaker notes.
A Peripheral Device:
A peripheral device is any device attached to a computer in order
to expand the computer’s functionality. Some of the more
common peripheral devices are printers, scanners, disk drives,
tape drives, microphones, speakers, digital cameras, etc.
TEXT ENTRY
The Keyboard:
The keyboard converts letters, numbers and special characters
that people understand into electric signals which are sent to and
processed by the system unit. The keyboard is the primary input
device that contains keys etched with characters that a user
presses to enter data into a computer.
The characters include alphabetical, numerical, and special
characters as well as keys with special words on them. Most
keyboards use an arrangement of keys given the name QWERTY
which reflects the keyboard layout by taking the letters of the first
six alphabetical characters found on the fourth row of keys.
As you enter data through the keyboard, it is temporarily stored in
the computer’s memory (RAM) and displayed on the screen of the
monitor. The keyboard is basically divided into the following
divisions based on function:
i) Alphanumeric key area:
This area contains alphabetic keys, numbers and special
characters. They are arranged like those of a typewriter.
ii) Numeric keypad area:
Located on the right hand side of most keyboards, it has
numeric keys arranged in a calculator format to allow you to
enter numeric data rapidly.
iii) Arrow Keys/Cursor control movement keys:
These keys are used to move the insertion point or cursor on
the screen in the direction indicated on the arrow key. An
insertion point is a blinking vertical bar while a cursor is a
blinking underline character that indicates where the next
character you type will be displayed on screen. Arrow keys
are also called directional keys or navigation keys.
iv) Function keys:
These keys are located at the top of most keyboards. They
perform specific tasks in different application programs. They
are used alone or in conjunction with other keys i.e.
CTRL+F6. They are labeled F1 - F12.
Keyboard Designs:
The most common types of keyboard designs include:
i) Traditional keyboards: these are full sized, rigid,
rectangular keyboards that include function, navigational and
numeric keys.
ii) Flexible keyboards: these keyboards fold or roll up for easy
packing or storage. They are designed to provide mobile
users with a full-sized keyboard with minimal storage
requirements.
iii) Ergonomic keyboards: The keyboard arrangement
however is not rectangular and a palm rest is provided. They
are designed specifically to alleviate wrist strain associated
with the repetitive movements of typing.
iv) Wireless keyboards: these transmit input to the system
through the air. By eliminating connecting wires to the
system unit, these keyboards provide greater flexibility and
convenience.
v) PDA keyboards: these are miniature keyboards for PDAs
and smart phones used for sending e-mail, creating
documents and more.
Keyboard Connections:
There are basically three ways of connecting a keyboard to the
system unit. They include:
a) PS/2 Keyboard Connection: This is attached via a cable to
a serial port, a keyboard port at the back of the computer.
POINTING DEVICES
Pointing devices provide a comfortable interface with the system
unit by accepting pointing gestures and converting them into
machine readable input. Pointing devices allow you to control an
on-screen symbol called a pointer that is usually represented by
an arrow shaped head mark. A wide variety of pointing devices
include:
a) Mouse:
A mouse is a small palm sized pointing input device that you
move across a flat surface such as the top of a desk to control the
movement of the pointer on the monitor. The mouse is used to
select items on the screen such as icons, text, images, menus
and buttons; draw objects, etc. The mouse often rests on a
mouse pad, which is a rectangular piece of cushioned material
that provides better movement for the mouse.
The top of the mouse contains one or more buttons that are used
to perform the following operations:
i) Clicking: This is the action of pressing the mouse button.
The methods of clicking include:
a) Single click: This is when a mouse button is pressed
once for example to select a menu, image, document or
icon.
b) Double click: This is when a mouse button is pressed
twice for example to start a program, open a document,
etc.
c) Right Clicking: This is the action of pressing and
releasing a right mouse button.
ii) Dragging: This is the process of moving data, images,
text and icons from one location of the screen to another.
Although there are several different mouse types, there are three
basic designs:
i) Mechanical Mouse:
A mechanical mouse has a rubber ball underneath it. When
the ball rolls in a certain direction, electronic circuits in the
mouse translate the movement of the mouse into signals the
computer can process. A mechanical mouse should be
placed on a mouse pad which protects the ball from getting
dust and dirt.
Mouse Connections:
There are basically three ways of connecting a mouse to the
system unit. They include:
a) PS/2 Mouse Connection: This is attached via a cable to a
serial port, a mouse port at the back of the computer.
b) USB Mouse Connection: This is attached via a cable to a
Universal Serial Bus (USB) port, a port at the back of the
computer.
c) Wireless Mouse Connection: It uses wireless technology
to transmit data. Cordless mice communicate with an
adapter attached to a USB port on the system unit.
b) Pointing Stick
A pointing stick is a pressure-sensitive device shaped like a pencil
eraser that is positioned between keys on a keyboard. To move
the pointer using a pointing stick, you push the pointing stick with
a finger. The pointer on the screen moves in the direction you
push the pointing stick.
c) Joystick
Users running game software or flight and driving simulation
software often use a joystick or wheel as a pointing device. A
joystick is a vertical lever mounted on a base. You move the lever
in different directions to control the actions of the simulated
vehicle or player. The lever usually includes buttons called
triggers that you press to activate certain events. A joystick
typically attaches via a cable to the game port on a sound card or
to a USB port.
d) Light Pen
A light pen is a hand held light sensitive pen-like device that can
detect the presence of light. Some light pens require a specially
designed monitor, while others work with a standard monitor. To
select objects on the screen, a user presses the light pen against
the surface of the monitor and then presses a button on the pen.
Light pens are also used to edit digital images
e) Touch Screen
A touch screen is a touch sensitive display device with a clear
plastic outer layer. Behind the layer are criss-crossed invisible
beams of infrared light. Users interact with these devices by
touching areas of the screen with a finger to select actions or
commands, words, pictures, numbers, or locations identified on
the screen.
f) Touchpad
A touchpad is a small, flat, rectangular device that is sensitive to
pressure and motion. To move the pointer using a touch pad,
slide your fingertip across the surface of the pad. Some touch
pads have one or more buttons around the edge of the pad that
work like mouse buttons. On many touch pads, you also can tap
the pad’s surface to imitate mouse operations such as clicking.
Touch pads are found most often on notebook computers.
a) Optical scanners:
An optical scanner is an input device that accepts documents
consisting of text and/or images and converts them into a
machine readable form. They recognize light, dark and colored
areas that make up individual letters or images. The scanned
documents are saved in files that can further be processed,
printed, displayed, merged with another document or stored for
later use.
Most digital still cameras have a rear Liquid Crystal Display (LCD)
for viewing digital images. They typically save pictures in only the
JPEG file format but other formats such as TIFF, PNG are also
used.
QUESTION
Mention at least five advantages of digital cameras over a
traditional film.
TERMINALS
A terminal is a combination of devices that consists of a keyboard,
a monitor, a video card, and memory. Often, these components
are housed in a single unit. Terminals fall into three basic
categories: dumb terminals, smart terminals, and special purpose
terminals.
a) Dumb Terminal
A dumb terminal is a device that has no processing power, thus,
can not function as an independent device. Users enter data into
a dumb terminal and then transmit the data to a host computer
over a network. The host computer processes the data and then,
if necessary, sends information back to the dumb terminal. The
host computer is usually a midrange server or main frame.
VIDEO INPUT
Video input is a process of capturing full motion images into a
computer and storing them into a storage medium such as a hard
disk or DVD. Some digital devices use analog video signals. To
input video from an analog device, the analog device must be
converted to a digital signal.
i) PC Video Cameras
ii) Webcams
a) Voice Input
Voice input is the process of entering data by speaking into a
microphone, tape players, CD/DVD players, or radios, each of
which plugs into a port on the sound card. The microphone may
be a stand-alone peripheral that sits on top of a desk, or is built
into the computer or device, or is in a headset. Some external
microphones have a cable that attaches to a port on the sound
card on the computer. Others communicate using wireless
technology such as IrDA or Bluetooth. Voice input is an
alternative for using a keyboard to input data.
b) Music Input
Some users also input music and other sound effects using
external MIDI devices such as an electronic piano or keyboard. In
addition to being a port, MIDI (musical instrument digital interface)
is the electronic music industry’s standard that defines how digital
musical devices represent sounds electronically. Software that
conforms to the MIDI standard allows users to compose and edit
music and many other sounds. For example, you can change the
speed, add notes, or rearrange the scores to produce an entirely
new sound.
BIOMETRIC INPUT
Biometrics refers to the technology of authenticating (confirming)
a person’s identity by verifying their personal characteristic.
Biometric devices allow users access to programs, computer
systems or rooms by checking some biometric identifier such as a
physical or behavioural characteristic like fingerprint patterns,
voice, eye patterns and others. Biometric devices translate the
personal characteristics (input) into a digital code stored in the
computer. Some examples of biometric input devices and
technology include:
a) Fingerprint scanner which captures curves and marks of a
fingerprint.
b) A face recognition system which captures a facial image
and makes a comparison with a stored image in the
computer.
c) A hand geometry system that measures the shape and
size of a person’s hand.
d) A voice verification system which compares a person’s
live speech with their stored voice pattern.
e) A signature verification system that recognizes the shape
of your handwritten signature while measuring the pressure
exerted and motion used to write the signature.
f) An iris recognition system that reads patterns in the iris of
the eye using iris recognition technology.
2.2 OUTPUT DEVICES:
What is output?
Output is the result obtained from the computer after processing
data. Output could either be in form of a hard copy (printed
material) or a soft copy (a display on the monitor). The type of
output generated from the computer depends on the needs of a
user, the hardware used plus the software used. Examples of
categories of output include: text (word, sentences, paragraphs
and reports), graphics (images, clipart), audio (speech, music)
and video (movies).
Output devices:
Output devices are hardware tools or a machine that are used to
send output from the computer after processing. They translate
information that has been processed into a form that is
understood by humans. The basic types of output devices
include:
- Visual Display Devices
- Printing Devices
- Plotting Devices
- Audio output devices
a) Visual Display Devices:
A visual display device is an output device that conveys text,
graphics and video information from a computer. Display devices
produce a temporary output called a soft copy. Display devices
consist of a screen and components that produce the information.
The most widely used display devices are monitors and data
projectors.
a) Monitors
A monitor also called a visual display unit (VDU) has a display
surface called a screen and a plastic casing that is used to
present visual images of text and graphics and video. Today
monitors are manufactured in a variety of sizes i.e. 14 inch, 15
inch, 17 inch, and 19 inch, etc. There are two categories of
monitors:
i) Cathode Ray Tube Monitors:
These monitors use a cathode tube to display an image made of
tiny dots by firing an electron beam against the surface of the
phosphor screen. Each dot is colored red, green and blue (RGB)
of different intensities which produce a vast amount of different
colors. To display high quality color on CRT monitors, a desktop
computer sends a signal through a video card on the
motherboard.
Advantages of CRT Monitors:
1. Can be used with light pens to create drawings on the
screen.
2. Produce a larger range of colors than Thin Film Resistor
monitors.
3. The display angle is better than with the TFTs
4. They are cheaper to buy than flat panel displays.
Disadvantages of CRT monitors
1. They are very large and bulky which means they take up
large amounts of desk space.
2. They create a lot of heat and have been known to cause
fires.
3. Screen glare when in direct light makes viewing difficult.
4. They need more power than TFTs to operate.
ii) Flat Panel Display Monitors:
A flat panel monitor is a thin flat screen surface, which uses the
LCD technology or gas plasma technology or Thin Film resistor
technology.
LCD (Liquid Crystal Display) Monitors:
LCD monitors or screens use the liquid crystal display technology
to output data and images on the screen. The liquid display
technology uses two sheets of plastic or glass material with a
liquid crystal solution deposited between them. An electric current
passes through the liquid crystal solution causing the crystals to
align (position in line with each other) so that light cannot pass
through the crystals.
Liquid crystal displays are used in digital watches, calculators,
portable computers such as notebooks and laptops, smart
phones, PDAs and other devices.
Advantages of Flat Panel Displays
i) Flat panel displays are smaller in size as compared to the
Cathode ray tube that occupies a large space.
ii) Flat panel displays use less power as compared to CRT
monitors that use too much power.
iii) Flat panel displays are more portable while CRTs are
bulky.
iv) Flat panel displays are very compact and light.
v) Flat panel displays emit less electromagnetic radiation
than a CRT monitor
vi) Flat panel displays produce a very sharp image (clear
image) as compared to a CRT monitor.
Disadvantages of Flat Panel Displays
i) The soft surface of the screen is easy to damage and is
difficult to clean.
ii) Flat panel displays are still more expensive than the CRT
monitors.
iv) Flat panel displays are high security risk devices because
they can easily be carried away by thieves since they are
lightweight
v) Flat panel displays have a low refresh rate. This means that
the images don’t change frequently.
vi) Flat panel displays have a problem with the viewing angle
since a user cannot view text or images from an angle.
vii) Once they are pressed hard, they can break.
viii) Flat panel displays don’t last for long if you leave them on,
they lose brightness.
Monitor Resolution:
Text and images are displayed on the monitor using patterns of
lighted dots. Each dot that is lighted is called a picture element
or pixel. The resolution of a monitor is the number of pixels the
monitor can display and the distance between each pixel. The
greater the number of pixels, and the smaller the distance
between the pixels, the better the resolution of a monitor.
1. Impact Printers:
Impact printers use a print mechanism whereby the
print head comes into contact with the print ribbon and
the paper to form characters. Impact printers are
relatively cheap and the cost of printing is low because
the ink ribbons are not expensive. Impact printers use a
continuous form paper for printing purposes. The speed
of impact printers is too low and is measured in
characters per second (cps) or lines per minute (lpm).
Examples of impact printers include: dot matrix printers,
daisy wheel printers, drum printers, chain printers, etc.
2. Non-impact printers:
Non-impact printers transfer text and images without making
any contact on the paper and use one of the following
printing methods:
Ink is released from an ink cartridge by heat or pressure
through ink nozzles and spread onto a paper as fine ink
droplets forming characters. Examples of printers that
use ink are: Inkjet printers and DeskJet printers.
Toner (fine black powder) is released from a toner
cartridge by heat or pressure through a drum and is
fused onto a piece of paper to form characters. Laser
printers are the most widely used toner printers. They
use a laser beam to print data onto a piece of paper.
c) Plotters
A plotter is an output device used to produce high quality line
drawings such as building plans or electronic circuits. These
drawings can be quite large; some plotters are designed to
handle up to 40 inches by 48 inches, much larger than would
fit in a standard printer. Plotters can be identified by the way
they create drawings that is pen plotters and electrostatic
plotters.
d) Speakers:
A speaker is an output device used to produce audio output
from the computer. Most computers are fitted with a small
internal speaker that will beep to draw your attention to an
error, for example if you hit the wrong key. On multimedia
personal computers additional speakers are attached to the
computer to provide better quality sound. A sound card
enables the computer to output sound through the speakers.
The computer you are using probably has a Sound Blaster
sound card.
e) Fax Machines:
A fax machine short for facsimile machine is a device that
transmits and receives documents over telephone lines. The
documents can contain text, drawings or images. The term
fax refers to a document that you send or receive via a fax
machine
f) Multifunction Devices:
Multifunction devices or peripherals combine the capabilities
of a scanner, printer, copier and fax machine. Small offices
and home offices (SOHO) use these devices widely due to:
They use less space used than having a separate
printer, scanner, copy machine and fax machine
They are significantly less expensive than if you
purchase each device separately
However their disadvantages include:
If one device breaks down, you can lose all the other
functions of the machine
The quality and functionality are not quite as good as
those of the separate single-purpose devices.
5) Bays
A bay is an open area inside the system unit used to install
additional equipment such as disk drives.
6) Processor
In personal computers, the micro processor or Central
Processing Unit (CPU) interprets and carries out the basic
operations that run a computer. The central processing unit is
contained on a single chip called the microprocessor.
Microprocessors are mounted onto a CPU socket, which is a
special slot on the system board. The microprocessor is referred
to as the “brain” or “heart” of the computer system.
Microprocessors control the logic of almost all digital devices such
as clock radios, fuel-injection pumps for vehicles, microwave
ovens, washing machines, mobile and smart phones, etc.
i) Control unit:
The control is the component of the processor that directs and
coordinates most of the operations in the computer. It directs the
movement of electric signals between memory and the arithmetic
and logic unit. It also directs the signals between the CPU and the
input and output devices. The control unit interprets each
instruction issued by a program and then initiates the appropriate
action to carry out the instruction.
ii) The Arithmetic and Logic Unit (ALU):
The ALU contains electronic circuits necessary to perform
arithmetic, comparison and logical operations on data. The
arithmetic operations include basic calculations such as addition,
subtraction, multiplication and division. Comparison operations
involve comparing one data item with another to determine if the
first data item is greater than, less than or equal to the other item.
The logical operations include conditions along with logical
operators such as AND, OR and NOT.
Registers:
Processors contain high speed storage locations called registers
that temporarily hold data and instructions for specific types of
data in the system unit during processing. The specific functions
of registers include:
Storing the location from where the instruction was fetched.
Storing an instruction while it’s being decoded by the control
unit.
Storing data while the ALU computes it.
Storing the results of a calculation.
The System Clock
A system clock is a small quartz crystal circuit that controls the
timing of all computer operations. It generates regular electronic
pulses or ticks that set the operating pace of system unit
components. The pace of the system clock measured by the
number of ticks per second is called the clock speed. Today’s
PCs have clock speeds in the gigahertz range. A Giga is a prefix
that stands for billion, and a hertz is one cycle per second. A
computer operating at 2.8 GHz has 2.8 billion (giga) clock cycles
in one second (hertz).
Coprocessors:
A coprocessor is a special additional processor chip that assists
the processor in performing specific tasks and increases the
performance of the computer.
h) Memory
Memory is a small chip that temporarily stores program
instructions and data during processing. Memory chips are
basically installed on the motherboard and today many devices
such as printers, monitors have small circuit boards with memory
installed on them.
The basic unit of measuring memory is a byte. Each byte is
stored in memory in a unique location called a memory address.
STORAGE TECHNOLOGIES
Storage technologies refer to the storage devices and their
respective storage media used in storing data in a computer
system. There are a variety of storage devices and storage media
such as disk drives and tape drives, as well as disks, tapes,
microfilms, PC Cards, Smart Cards, etc.
There are a variety of storage devices that are used to store data
such as the floppy disc drive (FDD), hard disk drive (HDD),
magnetic tape drives and others.
Most computers have more than one storage device. A drive letter
(C) and a colon (:) i.e. C: identify each storage device in the
computer system as outlined in the following table:
Floppy disk drives access data slower than say hard disks
because they are in motion or spin only when they are
selected for data retrieval. A Read-write head is a recording
mechanism in each drive that rests on the top and bottom
surface of media to record and retrieve data from the media.
A read-write head performs the process of reading
(retrieving) and storing (saving) data.
ii) Optical Disk Drives
Compact disks drives record and retrieve data on compact
disks using laser light technology. An optical read-write head
burns and retrieves the data from the optical disk. Today
modern optical disk drives can perform both the writing and
reading functions on optical disks. Optical disk drives are
broken down into the following categories:
a) Compact Disk Read Only Memory (CD-ROM) drives:
This type of drive can only read or retrieve data from a
compact disk to memory for processing. It can read
data from CD-ROM and CD-R disks as well as audio
disks.
b) Compact Disk Rewritable (CD-RW) drives:
This type of drive can read and write data from and to a
compact disk during processing. It can read data from
CD-ROM, CD-R and CD-RW disks as well as audio
disks. It can write data to both CD-R and CD-RW disks.
c) Digital Video (Versatile) Disk-ROM Drive:
This type of drive can only read or retrieve data from a
compact disk to memory for processing. It can read
data from CD-ROM, CD-R, CD-RW and DVD-ROM
disks as well as audio disks.
d) Digital Video (Versatile) Disk-RW Drive:
This type of drive can read and write data from and to a
compact disk during processing. It can read data from
CD-ROM, CD-R, CD-RW and DVD-ROM disks as well
as audio disks. It can write data to CD-R, CD-RW,
DVD-R, DVD-RW and DVD-RAM disks.
e) Combo Drives:
This type of drive combines both the DVD-ROM and
CD-RW abilities during processing. It can read data
from CD-ROM, CD-R, CD-RW and DVD-ROM disks as
well as audio disks. It can write data to CD-R, and CD-
RW disks.
Compact disk drives are the second fastest secondary
storage devices after the hard disk drives in accessing data
off the storage media. This is because they use laser light to
retrieve data from the compact disks.
v) Zip Drive
The zip drive records and retrieves data from a zip disk. Zip
drives offer faster storage and retrieval of data from zip
disks.
The hard, floppy, optical, zip and flash drives are random
access storage devices. A random access storage device
has the ability to read or write data to any sector of the
storage surface on a disk in any order. The tape drives are
sequential access storage devices. A sequential access
storage device has the ability to read or write data to the
storage surface one record after another in sequence.
Hard disks are permanently fixed inside the system unit and
are not removable hence the term a fixed disk. For a
computer to function, it requires a hard disk to store
programs and data. Storage capacity of a hard disk is
measured in megabytes and gigabytes. Today common hard
disk capacities range from 500 MB to 400 GB of data
storage.
Disk Capacity
The capacity of the hard disc is determined from the number of
platters it contains, together with the composition of magnetic
coating on the platters.
Storage medium
A typical disk has multiple platters stacked on top of one another
on which data is stored. Each platter has two read/write heads, for
each side. On desktop computers, platters have a formal factor,
or size, 3.5 inches in diameter.
The location of the read/write head is always referred to by its
cylinder. A cylinder is the vertical section of the track that passes
through all the platters.
Revolution Speed
While the computer is running, the platters in the hard disk rotate
at a high speed. The spinning is usually 5400 to 7200
revolutions per second (rps), and allows for instant access to all
track and sectors on the platters. The platters typically continue to
spin until power is removed from the computer. A head crash
occurs when a read/write head touches the surface of a platter,
usually resulting in a loss of data or sometimes loss of the entire
drive.
Access Time
Depending on the type of hard disk, transfer rates normally
range from 15 Mbps to 320 Mbps. Access time for today’s hard
disks ranges from approximately 4 to 12 ms (milliseconds). The
average hard disk access time is at least seven times faster than
the average floppy disk drive.
External hard disks and removable hard disks offer the following
advantages over internal hard disks (fixed disks):
1. Transport a large number of files.
2. Back up important files or an entire internal hard disk.
3. Easily store large audio and video files.
4. Secure your data; for example, at the end of a work
session, remove the hard disk and lock it up, leaving no
data in the computer.
5. Add storage space to the desktop computer without having
to open the system unit.
6. Add storage space to the notebook computer or Tablet PC.
7. Share a drive with multiple computers.
v) Flash Memory
Flash memory disks are small mass storage media
technology integrated with a USB interface that uses flash
memory (non volatile computer memory) to store large
volumes of data. A flash drive consists of a small printed
circuit board encased in a plastic or metal casing. They are
typically small, lightweight, removable and rewritable. They
hold between 32 MB to 64 GB of data.
Formatting Disks:
Formatting is the process of preparing a storage media
usually a disk for storage purposes. The formatting process
creates tracks, sectors, clusters and cylinders on the storage
surface.
Storage Capacity:
Storage Capacity refers to the maximum amount of data that
a storage media can store. Storage capacity is measured in
kilobytes, megabytes or gigabytes. The amount of data a
media will store depends on the way the disk was formatted.
Media Failure
Media failure is a problem that affects the storage media
resulting in data loss. Magnetic storage media are mostly
affected when they lose their magnetic charge, hence
leading to data loss.
Device Failure:
A device failure is a problem with a mechanical device such
as a disk drive. Storage devices fail as a result of power or
circuitry problems.
SYSTEM SOFTWARE
System software consists of programs that control the operations
of the computer and its devices. System software also serves as
the interface between the user, the application software and
hardware.
UTILITY PROGRAMS
A utility program is a type of system software that performs a
specific task, usually related to managing a computer, its devices,
or its programs. Utility programs are also referred to as service
programs.
b) Memory Management
The purpose of memory management is to optimize the
use of RAM. The operating system has to allocate, or assign
items to areas of memory, called buffers, while they are
being processed; to monitor carefully the contents of these
items in memory; and to clear these items from memory
when they are no longer required by the CPU. Some
operating systems use virtual memory to optimize RAM.
d) Administering Security:
Most multi-user operating systems require each user to log
on to establish permission to use computer resources. The
permissions define who can access certain resources and
when they can access those resources. Both successful and
unsuccessful log on attempts are often recorded in a file so
the system administrator can review who is using or
attempting to use the computer. Some operating systems
also allow a user to assign user ID (Identification) and
passwords to files so that only authorized users can open
them.
A user ID is a unique set of letters and numbers that
identifies a particular user on a PC. i.e. your initials, identity
card number, employee registration number, etc.
A password is a unique set of letters and numbers known
only to the PC and the user. Passwords are set by
administrators of computer systems and later changed by
individual users.
e) Managing Storage Media and Files
Most operating systems include a file manager program that
performs functions related to storage and file management.
A file manager is a program that performs functions related
to storage and file management. The file manager arranges
files on storage media in a File Allocation Table (FAT)
Functions performed by a file manager include:
Formatting and copying disks.
Displaying a list of files on a storage medium.
Checking the amount of used or free space on a storage
medium.
Copying, renaming, deleting, moving, and sorting files.
e) Configuring Devices
A driver, short for device driver is a small program that tells
the operating system how to communicate with a specific
device. Each device on a computer e.g. a mouse, keyboard
has its own specialized set of commands and thus requires
its own specific driver. When a computer is booted, the
operating system loads each device’s driver. Many device
drivers are included in the OS.
Today installation of drivers is easy because most devices
and OS support Plug and Play.
The OS monitors each hardware device and detects failures.
During the booting process the OS detects any faults in each
device and displays error messages to the user such as
keyboard failure, mouse not attached, Bad CMOS, to
indicate a fault in the system. In other instances it produces
sounds called beeps to indicate an error during booting.
f) Monitors performance
The operating system monitors the systems’ performance
using a program called a performance monitor. A
performance monitor is a program that assesses and
reports information about various computer resources and
devices. For example users can monitor the processor,
disks, memory and network usage to detect the status of
each device and report failures and other information about
various system resource and devices. The information in
these reports can help users to identify system problems.
Types of Operating Systems
1. Single-user, single task operating systems allow one user
to do one thing at a time. This operating system is designed
to manage the computer so that one user can effectively do
one thing at a time. An example of a single-user, single task
operating system is the operating system used by personal
digital assistants (PDAs), also known as handheld
computers.
2. Single-user, multi-tasking - This is the type of operating
system most people use on their desktop and laptop
computers today. Microsoft's Windows and Apple's
Macintosh OS platforms are both examples of operating
systems that will let a single user have several programs in
operation at the same time. For example, it's entirely
possible for a Windows user to be writing a note in a word
processor while downloading a file from the Internet while
printing the text of an e-mail message.
3. Multi-user - A multi-user operating system allows many
different users to take advantage of the computer's
resources simultaneously. Multi-user operating system
allows for multiple users to use the same computer at the
same time and different times. Examples of operating
systems that would fall into this category are:
Linux, Unix, Windows 2000
4. Multiprocessing - An operating system capable of
supporting and utilizing more than one computer processor.
Examples of operating systems that would fall into this
category are:
Linux, Unix, Windows XP
5. Multitasking - An operating system that is capable of
allowing multiple software processes to run at the same
time. Examples of operating systems that would fall into this
category are:
Linux, Unix, Windows 8, Windows 10
APPLICATION SOFTWARE
Application software refers to programs that perform specific
tasks for users. Most application software is available as
packaged software that can be purchased in retail stores or on
the Web. Many application software packages are also available
as shareware, freeware, and public-domain software. However,
such packages usually have fewer capabilities than packaged
software.
Various application software programs are used to design letters,
posters, cards, produce budgets and financial statements, store
records in a database etc. Application software is further broken
down into the following:
Internet Telephony
Internet telephony, some times called voice over IP (VolP),
enables users to talk to other users over the internet. That is,
Internet telephony uses internet (instead of public switched
telephone network) to connect a calling party and one or more
called parties.
To place an internet telephone call, you need internet telephone
software. As you speak into a computer microphone, the internet
telephone software and the computer’s sound card digitize and
compress your spoken words (the audio) and then transmit the
digitized audio over the internet to the called parties. Software
and the equipment at the receiving end reverse the process so
the receiving parties can hear what you have said, just as if you
were speaking on the telephone.
Internet Printing
Most network printers have Web addresses built into them. This
feature allows users to send a print job to the printer from
anywhere in the world. Instead of printing to local printer, with
internet printing, users print to a Web address that is associated
with a particular printer.
With the necessary software, a printer with Internet printing
capability can receive print instructions from desktop computers,
mobile computers, or mobile devices such as PDAs and smart
phones. Many hotels use internet printing, which enables guests
to print to print to the hotel printer- as long as they have the
printer’s Web address. Airlines also use internet printing so air
travelers can print while in flight and pick up their printed
documents when they arrive at an air port. Some industry experts
predict that internet printing will replace the need for faxes.
Web Services
Web services describe standardized software that enables
programmers to create applications that communicate with other
remote computers over the Internet or an internal business net
work. Businesses are the primary uses of Web services because
this technology provides a means for departments to
communicate with each other, suppliers, vendors, and with
clients. For example, third-party vendors can use Web services to
communicate with their on line retailer’s Web site to manage their
inventory levels.
Collaboration
Many software products provide a means to collaborate, or to
work on line, with other users connected to the server. With
Microsoft Office 2003, for example, users can conduct online
meetings. An on line meeting allows users to share documents
with others in real time. That is, all participants see the document
at the same time. As someone changes the document, everyone
in the meeting sees the changes being made. During the online
meeting, participants have the ability to open a separate window
and type messages to one another. Some programs refer to this
window as a chat room.
Instead of interacting in a live meeting, users often collaborate via
e-mail. For example, if users want others to review a document,
they can attach a routing slip to the document and send it via e-
mail to everyone on the routing slip. When the first person on the
routing slip receives the document, he or she may add comments
to the document. As changes care made to the document, both
the original text and the changes are displayed. When
subsequent persons on the routing slip receive the document via
e-mail, they see all the previous users’ changes and can make
additional changes. Once everyone on the routing slip has
reviewed the document, it automatically returns to the sender.
Groupware
Groupware is a software application that helps groups no people
work together on projects and share information over a network.
Groupware is a component of a board concept called workgroup
computing, which includes network hardware and software that
enables group members to communicate, manage projects,
schedule meetings, and make decisions. To assist with these
activities, most groupware provides personal manager (PIM)
functions, such as an electronic appointment calendar, an
address book, and a note pad. A major feature of groupware is
group scheduling, in which a group calendar tracks the schedules
of multiple users and helps coordinate appointments and meeting
times.
Cybercafés
More than 6,000 cybercafés exist in cities around the world. A
cybercafé is a coffee house or restaurant that provide free internet
access, most charge per hour or a per minute fee. Cybercafés
allow the mobile to access the e-mail, the web, and other services
on the Internet when traveling without a computer. Internet
connection fees at a cybercafé usually range from $10.00 per
hour. To print, the fees range from $0.25 per page to $3.00 per
page. Printing fees depending on black and white versus color
print outs and the type of paper used (e.g., plain paper, photo
paper). Some cybercafés offer lower or waived rates to customers
who purchase food or become a member of the café
Voicemail
Voicemail, which functions much like an answering machine,
allows someone to leave a voice message for one or more
people. Unlike answering machines, however, a computer in the
voicemail system converts an analog voice into a digital form.
Once digitized, the message is stored in a voicemail box. A
voicemail box is a storage location on a hard disk in the voice mail
system.
A voice mail system usually provides individual voice mail boxes
for many users (for example, employees in a company or
students and faculty at a college). By accessing their mail boxes,
recipients of a call listen to messages, may add comments to a
message, and reply or forward a message to another voice mail
box in the voice mail system. Some voice mail systems allow
users to broadcast a message, which sends the same message
to a group of people or to everyone listed in the system’s
database. Colleges, for example, might use voice mail to notify
every student of registration deadlines and weather-related school
closings.
Text messaging
With text messaging, also called SMS (short message service),
users type and send short text messages from a smart phone,
PDA, or a personal computer to a smart phone or PDA with a
compatible text messaging service. Most text messages have a
limit about 160 characters per message.
Instant messaging
Instant messaging is the real time Internet communications
service that allows you to exchange messages with one or more
online users. Some wireless Internet service providers partner
with instant messaging service providers to help users send
instant messages using their smart phones and PDAs i.e. Yahoo
Messenger, Windows messenger offered by AT&T wireless. With
instant messaging you can send instant messages to other online
computer users as long as both the sender and receiver have
identical and compatible IM software.
Picture Messaging
Picture messaging allows users to send graphics, video, digital
images as well as sound files combined with text messages.
Picture messaging is also referred to as Multimedia Message
Service (MMS). Such a messaging option can be exchanged with
another phone or PDA with picture messaging capability. A digital
camera is usually built into a smart phone or PDA with picture
messaging.
COMPUTER NETWORKS
A network is a collection of computers and devices connected
together via communications devices and transmission media.
Many businesses network their computers together to facilitate
communications, share hardware, share data and information,
share software and transfer funds. Businesses use networks to
facilitate communications, share hardware, share data and
information, share software, and transfer funds.
A network can be internal to an organization or span the world by
connecting its self to the internet. Networks facilitate
communication among the users and allow Fusers to share
resources with other users. Some examples of resources are
data, information, hardware, and soft ware.
LAN
A Local area network (LAN) is a network that connects computers
and devices in a limited geographical area such as a home,
school computer laboratory, office building, or loosely positioned
group of buildings. Each computer or device on a network, called
a node, often shares resources such as printers, large hard disk,
and programs. Often the nodes are connected via the cables. A
wireless LAN (WLAN), by contrast, is a LAN that uses no physical
wires.
MAN
A metropolitan area network (MAN) is a high speed network that
connects local area network in a metropolitan area such as a city
or town and handles the bulk of communications activity across
that region. A MAN typically includes one or more LANs, but
covers a smaller geographical area than a WAN. The state of
Pennsylvania, for example, has a MAN that connects agencies
and individual users in the region around the state capital. A MAN
usually is managed by a consortium of users or by a single
network provider that sells the services to the users. Local and
state governments, for example, regulate some MANs. Telephone
companies, cable television operators, and other organization
provide users with connections to the MAN
WAN
A wide area network (WAN) is a network that covers a large
geographic area (such as a city, country, or the world) using a
communication channel that combines many types of media such
as telephone lines, cables and radio waves. A WAN can be one
large network or can consist of two or more LANs connected
together. The Internet is the worlds largest WAN.
Network Architectures
The design of computers, devices and media in a network,
sometimes called the network architecture is categorized as either
client/ server or peer to peer. The following paragraphs discuss
these network architectures.
Client/Server
On a client/ server network, one or more computers act as
server, and the other computers on the network request services
from the server. A server sometimes called a host computer,
controls access to the hardware, software, and other resources
on the network and provides a centralized storage area for
programs, data, and information. The clients are other computers
on the network that rely on the server for its resources. For
example a server might store a database of customers. Clients on
the network (company employees) access the customer database
on the server.
Peer to peer networks are ideal for very small business and home
users. Some operating systems such as Windows include a peer
to peer networking utility that allows users to set up a peer to peer
network.
WIRELESS NETWORKS
Whether you want to make a phone call from your mobile,
received a message on your pager, checked your email from a
PDA we have come across a wireless data or voice network. If a
user or a company wants to make a data portable then Wireless
networking is the answer. A wireless networking system can avoid
the downtime, which may be caused in the wired network. A
wireless network is also save your time and efforts in installing the
lot of cables. Also, if you need to relocate a client machine in your
office, you only need to move the computer with wireless network
card.
Wireless networking is very useful in the public places, libraries,
hotels, schools, airports, railway stations where one might find
wireless access to the internet. A drawback in the wireless
internet is that quality of service (QOS) is not guaranteed if there
is any interference then the connection may be dropped.
Bluetooth
Bluetooth is a simple type of the wireless networking that
operates in the digital devices, like mobiles phones, personal
computers, PDA, Laptops, digital camera, MP3 players and other
Bluetooth enabled devices to form a small network. In the
Bluetooth technology eight devices can be connected to each
other at the same time. Bluetooth can also be found in the
headsets, hands-free kits, wireless keyboards and mouse.
Bluetooth technology was invented by Ericsson in 1994 and after
four years in 1998 some major mobile phone companies such as
Nokia, Ericsson, Intel and Toshiba formed a group to promote this
technology.
NETWORK TOPOLOGIES
A net work topology refers to the layout or design of computers
and devices in a communications network. Network Topologies
can be physical or logical. Physical Topology means the physical
design of a network including the devices, location and cable
installation. Logical Topology refers to the fact that how data
actually transfers in a network as opposed to its design. Topology
can be considered as a virtual shape or structure of a network.
This shape actually does not correspond to the actual physical
design of the devices on the computer network. The computers
on the home network can be arranged in a circle shape but it
does not necessarily mean that it presents a ring topology.
Three commonly used net work topologies are bus, ring, and star.
Others include hybrid, mesh and trees networks. Networks
normally use a combination of these topologies. The following
pages discuss each of these topologies.
Tree Topology
Tree topologies are comprised of the multiple star topologies on a
bus. Tree topologies integrate multiple star topologies together
onto a bus. Only the hub devices can connect directly with the
tree bus and each Hub functions as a root of a tree of the network
devices. This bus/star/hybrid combination supports future
expandability of the computer networks, much better than a bus
or star.
Mesh Topology
Mesh topology work on the concept of routes. In Mesh topology,
message sent to the destination can take any possible shortest,
easiest route to reach its destination. In the previous topologies
star and bus, messages are usually broadcasted to every
computer, especially in bus topology. Similarly in the Ring
topology message can travel in only one direction i.e clockwise or
anticlockwise. Internet employs the Mesh topology and the
message finds its route for its destination. Router works in find the
routes for the messages and in reaching them to their
destinations. The topology in which every device connects to
every other device is called a full Mesh topology unlike in the
partial mesh in which every device is indirectly connected to the
other devices.
Ethernet
Ethernet is a network technology that allows nodes to contend for
access to the network. If two computers on the Ethernet attempt
to send data at the same time, a collision will occur and the
computers will attempt to send their messages again. Ethernet is
based on a bus topology, but Ethernet networks can be wired in a
star pattern. Today Ethernet is the most popular LAN technology
because it is relatively inexpensive and easy to install and
maintain.
Token Ring
The second most popular LAN technology is token ring which
controls access to the network by requiring that the devices on
the network share or passes a special sign called token A token is
a special series of bits that function like a ticket. The device with
the token can transmit data over the network. Only one token
exists per second. This ensures that only one computer transmits
data at a time. Token ring is based on ring topology although it
can use a star topology. Some token ring networks connect up to
72 devices. Others use a special type of wiring that allows up to
260 connections. The data transfer rate on a token ring network
can be 4Mbps, 16 Mbps or up to 100 Mbps
Intranets
Recognizing the efficiency and power of the internet, many
organizations apply internet and Web technologies to their own
internet net-works. An intranet (intra means within) is an internet
network that uses Internet technologies. Intranets generally make
company information accessible to employees and facilitate
working in groups. Simple intranets applications include electronic
publishing of organizational materials such as telephone
directories, event calendars, procedure manuals, employee
benefits information, and job postings. Additionally, an intranet
typically includes a connection to the Internet. More sophisticated
uses of intranets include groupware applications such as project
management, chat rooms, newsgroups, group scheduling, and
video conferencing.
COMMUNICATIONS SOFTWARE
Communications software consists of programs that
1. Help users establish a connection to another computer or
network;
2. Manage the transmission of data, instructions, and
information; and
3. Provide an interface for users to communicate with one
another.
The first two are system software and the third is application
software. Some communications devices are preprogrammed to
accomplish communications tasks. Other communications
devices require separate communications software to ensure
proper transmission of data. For two computers to communicate,
they must have compatible communications software.
Communications software usually is bundled with the operating
system or purchased network devices.
Dial-up Lines
A dial-up line is a temporary connection that uses one or more
analog telephone lines for communications. A dial-up connection
is not permanent. Using a dial-up line to transmit data is similar to
using the telephone to make a call. A modem at the sending end
dials the telephone number of a modem at the receiving end.
When the modem at the receiving end answers the call, a
connection is established and the data can be transmitted. When
either modem hangs up, the communications end.
Dedicated lines
A dedicated line is a type of always-on connection that is
established between two communications devices (unlike a dial-
up line where the connection is reestablished each time it is
used). The quality and consistency of the connection on a
dedicated line are better than a dial –up line because dedicated
lines provide constant connection.
Four popular types of digital dedicated lines are ISDN lines, DSL,
T-carrier lines, and ATM. Although cable television (CATV) lines
are not a type of standard telephone line, they are a very popular
type of dedicated line that allows the home user to connect to the
internet. A later section in these chapter discuses the use of
CATV lines to connect to the internet.
The table lists the transfer rates (speeds), as compared with dial-
up lines.
ISDN lines
For the small business and home user, an ISDN line provides
faster transfer rates than dial-up lines. With ISDN (integrated
services digital network) is a set of standards for digital
transmission of data over standard copper telephone lines. With
ISDN, the same telephone line that could carry three or more
signals at once through the same line, using a technique called
multiplexing.
T-carrier lines
A T-carrier line is any several types of long – distance digital
telephone lines that carry multiple signals over a single
communications line. Whereas a standard dial-up telephone line
carries only one signal, digital T-carrier lines use multiplexing so
that multiple signals share the line. T-carrier lines provide very
fast transfer rates. Only medium to large companies usually can
afford the investment in T-carrier lines because these lines are so
expensive.
The most popular T-carrier lines are the T1 line. Business often
uses TI lines to connect to the internet. Many internet access
providers use TI lines to connect to the internet backbone. Home
and small business users purchase fractional T1, in which they
share a connection to the T1 line with other users. Fractional T1 is
slower than dedicated T1 line, but it is also less expensive. Users
who do not have other high speed internet access in their areas
can opt for fractional T1.
ATM
ATM (asynchronous transfer mode) is a service that carries
voice, data, video, and multimedia at very high speeds.
Telephone networks, the Internet and other networks with large
amounts of traffic use ATM. some experts predict that ATM
eventually will become standard for data transmission, replacing
T3 lines
COMMUNICATIONS DEVICES
A communication device is any type of hardware capable of
transmitting data, instructions, and information between a sending
device and receiving device. At the sending end, a
communications device sends the data, instructions, or
information from the sending device to a communications
channel. At the receiving end, a communications device receives
signals from the communications channel. Sometimes, the
communications device also converts the data, instructions, and
information from digital to analog signals or vice versa, depending
on the devices and media involved.
Dial-Up Modems
As previously discussed, a computer’s digital signals must be
converted to analog signals before they are transmitted over
standard telephone lines. The communications device that
performs this conversion is a modem, some times called a dial up
modem. The word modem is derived from the combination of
words, modulate, to change into analog signals, and demodulate,
to convert an analog signal into a digital signal. Both the sending
and receiving ends of a standard telephone line (communications
channel) must have a dial-up modem for data transmission to
occur. For example a dial-up modem connected to a sending
computer converts the computer’s digital signals into analog
signals. The analog signals then can travel over a standard
telephone line. At the receiving end, another dial-up modem
converts the analog signals back into digital signals that a
receiving computer can process.
Cable Modems
A cable modem, sometimes called broadband modem, is a digital
modem that sends and receives digital data over the cable
television (CATV) network. With more than one million homes
hired for cable television, cable modems provide a faster internet
alternative to dial up for the home user and have speeds similar to
DSL. Cable modems currently transmit data at speeds that are
much faster than either a dial-up modem or ISDN. Home and
business users may be able to take the advantage of the
resources available on the internet and other networks with high-
speed cable service provided the CATV uses digital cable
capable of providing internet service.
CATV service enters a building through a single line. To access
the internet using the CATV service, the CATV Company installs
a splitter inside your house. From the splitter, one part of the
cable runs to your television and the other connects to the
modem. Most CATV operators provide a cable modem as part of
the installation; others require that you purchase one separately.
A cable modem usually is an external (separate) device, in which
one end of a cable connects to a CATV wall outlet and the other
end plugs into a port, such as on an Ethernet card, in the system
unit. An Ethernet card is a type of network card.
Network cards
A network card sometimes called a Network Interface Card
(NIC) is an adapter card, PC card or compact flash card that
enables a computer or device to access a network. Personal
computers on a LAN typically contain a network card .The
network card coordinates the transmission and receipt of data,
instructions and information to and from the Computer or device
containing a network card
Routers
A router is a device that connects multiple computers or other
routers together and transmits data to its correct destination on
the network. All sizes of networks use routers. On the largest
scale, routers along the backbone forward data pockets to their
destination using the fastest available path. For smaller business
and home networks, a router allows multiple computers to share a
single high speed Internet connection such as through a cable
modem or DSL modem. These routers connect from 2 to 250
computers.
Hubs
Hub is a LAN networking device and every computer in an
Ethernet based network is directly connected with the hub. All the
computers that are connected to the network share the same
bandwidth. When a hub receives the data packets at one of its
port, it distributes the data signals to all the ports in a network.
When two or more computers try to send the data signals at the
same time, a collision occurs and the process is known as Carrier
Sense Multiple Access / Collision Detection. Hubs are usually
come with the 4, 8, 16 and 24 ports. In the data communications,
a hub is a place for the convergence where data arrives from
multiple directions and forward to the multiple directions. The
most advanced form of the hub is the intelligent or smart hub that
contains the management software which is used to troubleshoot
the most common problems.
Bridges
Bridges are the networking devices that divided up the network
into different segments to reduce the amount of traffic on each
network. A bridge blocks and forwards the data packets based on
their MAC addressees. Be blocking the unnecessary traffic to
enter the other part of the network segments, it reduces the
amount of traffic and the other issues such network congestions
and the bottleneck. There are following three common types of
the bridges.
a) Transparent Bridge
A Transparent bride is invisible to the other part of the
computer network and it performs the functions of blocking
and forwarding the data packets based on the MAC
addressees. They are the most popular types of the bridges.
b) Translational Bridge
Translation bridges are used to connect the two different
networks such as Ethernet and Token Ring. It translates the
data and forward to the other network.
c) Source-Route Bridge
Source-Route bridges are designed for the Token Ring
networks. In the Source-Route Bridge, the entire route of
the network frame is embedded into the frame.
Switches
A network switch is a LAN/WAN communication device. It joins
the multiple computers together in the LAN and WAN. In the
LAN, the switches do not broadcast the data to all the connected
computers like the hub. Based on the IP/MAC addresses of the
computer, a switch sends data only to the destined computer.
Switches operate on the data link and network layers of the OSI
layers model. Different models of the switches support the
different number of the connected devices. In the LAN, switches
support 10mbps 10/100 mbps or 100mbps data transmission
speed. A switch conserves the bandwidth and offers the grater
performance than the hub.
CONNECTING NETWORKS
Today thousands of computer networks exist, ranging from small
networks operated by small home users to global networks
operated by numerous telecommunications firms.
Interconnecting these various types of communications networks
requires various types of communications devices. For example,
a hub is a device that provides a point for cables in a network.
Some hubs include routers. That is, the hub receives data from
many directions and then forwards it to one or more destinations
Home Networks
An estimated 20 million homes have more than one computer.
Thus, many home users are connecting multiple computers and
devices in a home network. Home networking saves the user
money and provides many conveniences. For example, an older
computer that does not have a CD drive can access the CD drive
on a newer computer. Instead of using floppy disks to transfer
files from one computer to another, a home net work allows users
to access files on other computers in the home. Each net worked
computer in the home has the following capabilities:
Connect to the internet at the same time
Share a single high speed internet connection
Access files and programs on other computers in the house
Share peripheral devices such as printers, a scanner,
external hard disk, or DVD drive
Play multiplayer games with players on other computers in
the house
Ethernet
Some home users have an Ethernet network. As discussed
earlier, traditional Ethernet networks require that each computer
contain a network card, which connects to a central network hub
or similar device with a physical cable. This may involve running
cable through walls, ceilings, and floors in the house. For the
average home user, the hardware and software of an Ethernet
network can be difficult to configure.
By and through this utility you can configure your whole network.
You can select this utility in the Programs > Accessories >
Communications > Network setup wizard.
Software/Hardware Requirements
How many computers do you want to connect with each
other? Computers with LAN Cards are required. (Number
of computers is based on the number of users).
Hub or Switch. (Switch is recommended and the number of
ports in the switch is related to the number of computers in
your network.
UTP/STP Straight Cable. Each piece of cable is required
between a computer and the hub/switch.
DSL Router to share the internet with the computers.
What type of operating systems you are running on your
computer.
Windows based operating system CDs (Windows 2000
Professional is recommended for the client computers) and
Windows 2000/2003 Server is for the Server computer.
All other required software.
Whether networked computers will be located in one room or
hall or inside a building.
What are your security requirements?
What’s your main purpose of networking the computers?
What type of internet connection will be used?
The following configuration steps will tell you that how to setup
peer to peer network.
COMMUNICATIONS CHANNEL
Twisted-Pair Cable
One of the more widely used transmission media for network
cabling and telephone system is twisted-pair cable. Twisted-pair
cable consists of one or more twisted-pair wires bundled together
(figure Twisted Pair Cable). Each twisted-pair wire consists of
two separate insulated copper wires that are twisted together. The
wires are twisted together to reduce noise. Noise is an electrical
disturbance that can degrade communication.
Coaxial Cable
Often referred to as coax (pronounce KO-ax), consists of a single
copper wire surrounded by at least three layers:
(1) An insulation material,
(2) A woven or braided metal, and
(3) a plastic coating.
Fiber-Optic Cable
The core of fiber-optic cable consists of dozens or hundreds of
thin strands of glass or plastic that use light to transmit signals.
Each strand, called an optical fiber, is as thin as a human hair.
Inside the fiber-optic cable, an insulating glass cladding and a
protective coating surround each optical fiber.
Infrared
As discussed earlier, Infrared (IR) is a wireless transmission
medium that sends signals using infrared light waves. Mobile
computers and devices such as a mouse, printers and smart
phones often have an IrDA port that enables the transfer data
from one device to another using infrared light waves. If your
notebook computer has an IrDA port, simply position the port in
front of the IrDA port on a printer to print the document wirelessly.
Many PDAs also have IrDA ports that allow users to transfer data
to another PDA wirelessly or to a network.
Broadcast Radio
Broadcasting radio is a wireless transmission medium that
distributes radio signals through the air over a long distance such
as through cities, regions and countries and short distances such
as within an office or home. For radio transmissions, you need a
transmitter to send the broadcast signal and a receiver to accept
it. To receive the broadcast signal, the receiver has an antenna
that is located in the range of the signal. Some networks use a
transceiver, which both sends and receives signals from wireless
devices. Broadcast radio is slower and more susceptible to noise
than physical transmission media but it provides flexibility and
portability.
Cellular Radio
Cellular radio is a form of broadcast radio that is used widely for
mobile telecommunication, specifically wireless modems and
cellular telephone. A cellular telephone is a device that uses high
frequency radio waves to transmit voice and digital data
messages. Some mobile users connect their note book
computers to cellular phone to access the web, send and receive
e-mails, enter a chat room or connect a school or an office.
Microwaves
Microwaves are radio waves that provide-speed signal
transmission. Microwaves transmission, sometimes called fixed-
point wireless, involves sending signals from one microwave
station to another. Microwaves transmit data at rates up to 4500
times faster than a dial-up modem. A microwave station is an
earth-based reflective dish that contains the antenna,
transceivers, and other equipment necessary for microwave
communication. To avoid possible obstructions, such as buildings
or mountains, microwave stations often no the tops of buildings,
towers, or mountains.
Communications Satellite
A communication satellite is a space station that receives
microwave signals from an earth-based station, amplifiers
(strengthens) the signals, and broadcasts the signals back over a
wide area to any number of earth-based stations. These earth-
based stations often are microwave stations. Other devices, such
as PDAs and GPS receivers, also can function as earth- based
stations. Transmission from an earth-based station to a satellite is
an uplink. Transmission from a satellite to an earth-based station
is a downlink.
ARPANET
In August 1969, separate from the military project, the
experimental network ARPANET was created by ARPA
(Advanced Research Projects Agency, a division of the United
States Department of Defense) in order to link four universities
together:
The Stanford Research Institute;
The University of California at Los Angeles;
The University of California at Santa Barbara;
The University of Utah.
The ARPANET is now considered the precursor to the Internet. At
that time, it already included several fundamental characteristics
of the current network:
One or several cores could be destroyed without disrupting
the network's
operation;
Communication between machines could take place without
the direction of a
central machine;
The protocols used were basic.
E-mail
In 1971, Ray Tomlinson developed a new means of
communication: electronic mail. The contents of the first e-mail
were: QWERTYUIOP. Additionally, the character "@" was
already being used to separate the user's name from the rest of
the address. In July 1972, Lawrence G. Roberts improved upon
the horizons pioneered by Tomlinson by developing the first
application for listing, selectively reading, archiving, and
responding to or forwarding an e-mail. Since then, e-mail has
never stopped growing in influence, becoming the most common
use of the Internet at the turn of the 21st century.
RFCs
In 1969, Steve Crocker (then at the University of California)
perfected the "Request for Comments" (RFC) system. It was a
group of documents in memorandum form, allowing researchers
to share their work. Jon Postel (6 August 1943 - 16 October 1998)
was in charge of administrating these documents until his death.
Websites
A website consists of one or more web pages that relate to a
common theme, such as a person, business, organization, or a
subject, such as news or sports. The first page is called the home
page, which acts like an index, indicating the content on the site.
From the home page, you can click links to access other pages
on the site or other resources on the Web. A link is a connection
from one webpage to another webpage.
b) Internet connection
An Internet connection is somewhat similar to having cable TV or
telephone service. What you are paying for is the connection to
the service. The equipment needed to use the service is
additional. You can get an Internet connection at your home or
business using a regular dial-up phone line for around $20 month.
Much faster but more expensive service includes DSL ($40-$60
per month) or cable ($40-$50 per month).
To use the Web, you will need a connection with at least the
following features:
Dial-up networking
Internet Service provider
Internet programs such as a Web browser (Internet Explorer
or Netscape are the most common) and Email (Outlook
Express and Netscape are the most common)
Good technical support and customer service
c) Web "browser"
A Web "browser" is simply the software used to view and navigate
the Web. A browser (also known as client software) retrieves data
from remote web servers, assembles it, then displays a web
page. Examples of popular browsers are Microsoft Internet
Explorer, Mozilla Firefox, Netscape Navigator and Opera.
Browsers basically work the same way. Once you know one, you
can easily use others.
Web browsers come in many different varieties, made by different
companies, though they all perform the same basic functions. Any
browser will allow you to view and navigate simple, text-based
pages. The better browsers will also display graphics and more
complex pages. Most Web browsers are very easy to use. If you
can use other software for the operating system you're running
(Windows, Macintosh, etc.), chances are that you can quickly
learn to use the browser with minimal instruction or practice
required. Knowing a few basic techniques will make your Web
experience more enjoyable and productive.
http://www.bbc.com
The home page for the British Broadcasting Corporation website.
http://amkhan.blogspot.com
Blogs or weblogs for an individual.
ftp://rtfm.mit.edu/pub/
A directory of files at the Massachusetts Institute of Technology
(MIT) that you can download.
news:rec.gardens.roses
A newsgroup about rose gardening.
Anatomy of a URL
Here's how to interpret the various parts of a URL: http:// www.
shack.com /english/ start.htm
http://
Short for Hypertext Transfer Protocol, this indicates a Web
document or directory.
www.
This indicates the presence of a web page on the World Wide
Web. (These days, the "www" is optional.)
shack.com/
Called the domain name, it often indicates the name of a
company, university, organization or individual who owns the
website. It can also tell you the country of origin.
www.shack.com/
Together, these indicate the web server name.
english/
This is directory or folder on the web server that contains a
group of related web pages within the website.
start.htm
This is a web page inside the folder. (The same file can be
named start.html) A URL doesn't always include the name of the
web page.
http://www.bisznet.net/resources/index.html
Web server
protocol directory filename
name
http www.bisznet.net resources index.html
The last part of the Web site name often specifies what type of
organization operates the site. Some common ones are:
Hyperlinks
A hyperlink commonly called a link is a word, symbol, image, or
other element in a hypertext document that electronically
connects one web page to other web pages on the same web
site, or web pages located on another web site. More specifically,
a hyperlink is a connection between one page of a hypertext
document to another. A hyperlink is a navigation element on a
webpage.
Identifying a Hyperlink
Text links are usually underlined and in a different color from the
rest of the text.
Back Button – The Back button returns you to the previous page.
Forward Button – The Forward button returns you to the page
you have backed up from.
For example, say you are looking at the Yahoo web page, and
then you go to the Alta Vista page. Clicking on Internet Explorer’s
Back button will return you to the Yahoo page. From Yahoo, the
Forward button will take you again to Alta Vista.
Note that this is not the same as the "Go Back" or "Next Page"
buttons found on many Web pages (including this one). The
difference is that the browser's buttons will take you back (or
forward) to where you have been. The buttons on Web pages
take you to the previous or next pages in a series of pages at that
Web site, depending on how the Web site is organized.
Home button
The Home button takes you to the home page specified in the
browser preferences.
Status bar
The Status bar at the bottom of browser window reports on the
progress of the data downloaded from a web server
History Button
The History button produces a History Explorer bar and lets you
select a web page you have previously accessed.
Internet Explorer gives you more choices. When you pull up the
screen, it will actually save the complete web page - pictures and
all! If you don't want everything, you can change the "Save as
Type" to web page only.
Some web pages are divided into multiple sections called frames.
You can only print one frame at a time. To print a particular frame,
first select it by clicking it. Then click the Print button or select
Print Frame from the File menu.
Saving an Image from the Web
Place your cursor over the graphic you want to save.
Select (highlight) the text on the web page that you wish to
copy
Copy the selected text by pressing the Ctrl and C keys at the
same time
Go to the program you want to paste the text into (e.g.,
WordPerfect or e-mail)
Move the cursor to where the text should go, and click the
mouse once
Paste the text by pressing the Ctrl and V keys at the same
time
Downloading files
Downloading a file simply means to transfer a copy the file from a
remote computer (a server) to your computer. Many files are
available for downloading on the Internet, using a Web browser.
These include shareware software programs, multimedia files
(such as sound, video and graphics), and document files of all
types.
Overview
E-mail was one of the first uses of the Internet and is still the most
popular. This chapter looks at the different features of e-mail and
how it is used for communication between individuals and groups.
It also looks at how the Internet can be used to search for
information, including Internet search engines, the main features
of browser software and how to navigate large websites.
E-mail
You have probably used e-mail at school or college, and
increasingly more people are using e-mail at home. If you go on
work experience or when you srtart your first job after school or
college, you will almost certainly find that e-mail plays an
important role in business. In fact, nowadays, few businesses
would be able to function without it.
What is e-mail?
E-mail Addresses
In order to send an e-mail, you have to know the e-mail address
of the person you wish to e-mail. This is usually a short code,
often made up of the users name followed by the Internet
Service Provider’s (ISP) code, but this can vary. Look at the
three e-mail addresses below.
From: PhillipDavey@globalnet.co.uk
To: RosalindaDavey@aol.com
Cc: G.Davey@freeserve.co.uk
Each has a different ISP-Globalnet, AOL and Freeserve
To send an e-mail via the internet, you have to connect the ISP’s
server. Once you are connected, you can send the e-mail. The e-
mail is then sent from your ISP server to the destination ISP
server
Check point
An Internet Service Provider (ISP) provides access to the
internet via it’s services. Examples of ISP’s are Btopenworld,
pipex, freeserve and AOL
INTRODUCTION TO WEBSITE DESIGNING AND PUBLISHING
A website (also called an Internet site) is a group of HTML files
connected by hypertext links and stored on a web server, i.e. a
computer that hosts webpages and is permanently connected to
the Internet.
What is Webmastering?
A webmaster is a person in charge of a website, i.e. the
individual who designs a website and updates it.
The website's life is made up of two different facets, both of which
can be broken down into specific phases:
Designing
Most books about website creation only deal with the mainly
technical "fulfillment" phase (creating webpages with HTML) and
generally neglect all of the the pilot study stages.
Building a website does not only involve creating the webpages. It
is a strategic and creative collective endeavour that must involve
all stakeholders (employees, management, clients, etc.).
Therefore, website design is of utmost importance. This step
involves reflecting first on what the overall goals of the site are
and who the target audience might be and then on the structure,
ergonomics and navigation.
Fulfillment
The fulfillment step involves the act of creating the webpages and
graphic elements. Creating webpages consists of creating HTML
files. There are two ways to create this type of file:
Promotion
A website will only be visited only after some type of promotional
campaign has been conducted. Once a website is well known, the
promotion campaign will run itself thanks to hypertext links
inserted on other pages by webmasters, provided that the
website's content is of interest to enough people
Website Design
Website design must be a user-oriented collective effort. This
means that, when possible, the design process must include
participation of a group of representatives from the business or
organization and their beneficiaries, with the common goal of
obtaining maximum satisfaction among users. Thus, the design
process must mainly focus on the user and must take place in
close collaboration with a representative panel of users, at a
brainstorming session, for example.
The main goal of the design phase is to analyse all of the needs
and then imagine the contexts for use. Analysing needs falls into
two categories:
Goal Strategy
Before starting any website project, it is necessary to go over the
website's goals. For a business or organization, this involves
analyzing how the website will help the organization meet its own
strategic goals. It is a good idea to make a list of the website's
goals and define the operational and quantifiable criteria that will
allow the organization to measure whether or not the desired goal
was truly met.
Target Strategy
A website is generally intended for a category of users. Precisely
targeting the user type in question will allow the business or
organization to establish a user profile and thus focus the content
on a specific type of information. Thus, it is necessary to think
about the type of information that target users are likely to search
for and try to determine their main questions and the type of
responses they are expecting to receive. This step can be done
by interviewing a business's clients or an organization’s
beneficiaries, or, in the case of a personal website, through
conversations with the website owner's friends and family.
Competitive Intelligence
Competitive Intelligence consists of determining a website's
main competitors, analyzing how they serve their clientele and
finding any possible weaknesses in order to offer a service that
fills in the competition's gaps. This involves performing a
competitive analysis, based on one business sector that will be
used to draw up a comprehensive picture of the existing offer and
the needs to be satisfied, in order to establish a website that
offers something more to future visitors.
Scenarios
Writing up scenarios involves a business or organization putting
themselves in the user's shoes and imaging the different possible
use cases for a website.
Specifications
Specifications are an all-encompassing contractual document that
allows the client to specify his needs to the project manager
(service provider). Even if a service provider is not hired to build
the website, writing up even a small list of specifications in order
to formalize ideas is still useful procedure for a business or
organization.
Planning
The planning step consists of:
making a list of the people working on the website project
dividing up the tasks according to skills
establishing a schedule for each task
figuring out the cost of the project by calculating the time
spent by each
person and multiplying it by their hourly (or daily) cost
Feasibility Study
When designing a website, the project must be analyzed in terms
of budget and time, as well. The project must include long-term
plans, i.e. the organization must anticipate the means necessary
for creating the site but also for maintaining and updating it. As
such, if the website is not regularly updated, the company's brand
image may suffer rather than increase in value. During this step,
the initial goals can be reviewed and prioritized in order to
choose, depending on the budget and deadlines, only those that
are most important.
Website Ergonomics
Navigating Websites
Structuring a Website
Structuring a website consists of building the website's overall
architecture by organizing the different pieces of information.
The first step is to make a list of the website's content and group
the content together by theme in order to form sections. This is
sometimes called section building.
As soon as the main sections are identified (no more than a
dozen main sections should be used), they must be organized
and divided into subsections. Most of the time, a website's
structure is like the shape of the tree, with the home page at the
roots:
Standard Elements
Some elements are found on almost every website:
Elements of Navigation
Elements of navigation are tools that help visitors to know where
they are on the website, go back, and move between sections.
There are several methods for setting up navigation elements:
Breadcrumb Trail
Tab navigation
Site map
Breadcrumb Trail
A breadcrumb trail is a navigation tool made up of a series of
hierarchical links. A breadcrumb trail represents the navigation
path and allows users to:
see where they are on the website
easily return to the main sections
Tab Navigation
Tabs are useful navigation tools that help visitors to make out the
sections of a website and easily move from one section to
another. Colour codes can also be used to reinforce the
difference between sections.
Site Map
A site plan gives Internet users a global view of a website. In
addition, a "you are here" label can help internet users to figure
out where they are on a website.
Navigation Arrows
Navigation arrows (next, previous, return to chapter, return to
home page) are intuitive natigation tools for the user.
Necessary Inspiration
Designing a webpage is above all an artistic endeavour that
combines inventiveness and creativity. The goal of this guide is to
list several key elements used to obtain an effective design.
However, inspiration can also be found by visiting reference
websites, especially professional websites. It is especially
interesting to study how each website arranges information, how
the menus and blocks of information are presented and, in
general, determine what gives a website a "professional"
appearance.
Page Layout
Generally, templates are created and used as patterns when
designing a website. Templates are "carbon copy" images or
webpages that represent the graphic skeleton of a model page.
The traditional structure of a webpage is as follows:
Graphic Charter
A "graphic charter" is the comprehensive document that lists the
presentation rules for the graphic elements that convey a
website's visual identity.
The graphic charter defines a webpage's graphic outfitting,
especially the sizes, colours and appearance of text, the site's
images and buttons, as well as their position in relation to other
objects on the page.
Mock-up
A mock-up is a model or prototype of a website that presents the
website's graphics and navigation. Mock-ups allow designers to
formalise a website's design and are generally used to validate
the design phase before moving to the "fulfillment" phase.
A mock-up includes static pages representing the website's main
pages (without content), which are used to simulate navigation. In
simulation, dynamic elements such as the search engine may
lead to a page presenting made-up results, for example.
Page Sizes
The size of a webpage depends mainly on the user screen
definition (not resolution).
In terms of width, it is better to choose a value that is less than
most visitors' horizontal definition so that they do not have to
scroll the screen with the horizontal scroll bar. A short page allows
visitors to easily skim information to find the items that interest
them.
Concerning length, it is best to not exceed three to five times the
height of the screen. Indeed, excessively long pages run the risk
of not being read fully and take longer to load.
There are several strategies that exist to guarantee optimum page
display on most visitors' computers:
Choice of Colours
It is recommended to use no more than three different colours on
a website in order to meet the criteria for simplicity. The colours
should correspond to the organisation's colours (especially those
of the logo) and should express a particular feeling.
No matter what colours are chosen, a dominant colour should be
picked and used as the webpage's main colour. One or several
more dynamic (brighter) secondary colours should be chosen and
used in smaller proportions to underline the page's elements.
Colours possess implicite symbolism. Therefore, it is important to
choose them with a goal in mind. Colours influence individual
behaviour:
The table below lists the meanings that are classically associated
with specific colours:
Negative
Colour Positive Meanings Areas
Meanings
calm, trust,
authorisation,
appeasement, sailing, new
Blue serenity, protection, cold, sleep technologies, IT,
seriousness, medicine
mysticism, kindness,
water, space, peace
delicacy, passion, melancholy,
Purple discretion, modesty, sadness, grief, culture, politics
religion dissatisfaction
charm, intimacy, private journal,
Pink naivety
woman, beauty women
heat, strength, violence, anger, luxury, fashion,
courage, dynamism, danger, urgency, sports,
Red
triumph, love, restriction, blood, marketing,
enthousiasm hell media
lukewarmness,
comfort, glory,
entertainment,
Orange happiness, wealth, fire, warning
sports, travel
pleasure, fruit, smell,
energy, vitality
light, cheerfulness, deceit,
sun, life, power, selfishness,
Yellow tourism
dignity, gold, wealth, jealousy, pride,
immortality warning
nature, plant life, help,
balance, faith, discovery,
Green appeasement, rest, nature, travel,
trust, tolerance, hope, education
pride, youth, charity
calmness, philosophy,
Brown filth environment
countryside
purity, innocence,
White snow, cleanliness, fashion, news
freshness, wealth
design,
associations,
Grey neutrality, respect
not-for-profit
organisations
death, darkness, cinema, art,
Black simplicity, luxury, night sadness, photography,
monotony restriction
Colour composition also influences how volumes are perceived.
Colour composition can give of a feeling of well-being, both when
in a nicely decorated house as well as on a website.
The colour circle is a good tool for understanding how colours
interact. The colour circle is a circular representation of colours. It
includes the following colours:
Colours are also divided up into "warm" colours (with tones closer
to red) and "cool" colours (with tones closer to blue).
There are universal rules that govern colour harmony that are due
to the eye's physical properties. When the eye sees one colour, it
automatically creates a filter of the complementary colour around
it. This is called "simultaneous contrast". With this, how colours
are perceived depends on the surrounding colours. Thus, yellow
will appear more orangish when it is grouped with blue and the
blue will appear more purple. Blue next to red will appear more
green, etc.
Moreover, neighboring colours on the chromaticity diagram create
a feeling of balance for the eye because of the absence of
contrast; this is called "color harmony".
Generally there are two ways of choosing harmonising colours:
Choosing Images
Images help to liven up a website and make it more cheery. That
said, misused images can disturb visual comfort as well as page
loading.
Novice webmasters like to liven up their website with fun
animated images picked up on the web. However, this should be
avoided as much as possible because such images can annoy
readers and give a website an amateur feel.
Background Colour
Correctly choosing a background colour is vital because a poorly
chosen background can hamper readability. Good contrast
between the foreground colour and the dominant background
colour is essential. For this reason, it is better not to choose a
graphic background because it can hinder readability and project
a general feeling of amateurism. Generally, the background
colour should be rather pale.
Typography
It is strongly recommended that no more than two types of font be
used on a website. Stylised fonts should be used sparingly (e.g.
for a title) and most of the webpage should use a classic font
(Arial, Verdana, Helvetica, etc.)
For traditional printed texts, serif fonts generally facilitate reading
because the serifs help readers to follow the text.
Using serifs on the Internet is not recommended because,
depending on the user's screen definition, serifs can easily
become a spidery scrawl that hinder reading. It is better to opt for
rounder, sans-serif fonts.
Finally, please note that texts with non-standard fonts run the risk
of not displaying correctly on some screens. In order to create
titles that use these fonts, this limitation can be avoided by
creating transparent images that contain the text.
Graphic Symbols
Using pictogrammes and icons to establish visual signs is highly
recommended. Be careful though when choosing symbols
because users may misinterpret them, especially in the case of
international websites. The following pictogrammes are commonly
used:
WEBSITE CONTENT
Editorial Style
The editorial style of a website should be adapted to the type of
readers who are going to visit it. The website's editorial policy is
the policy used when writing articles. A well-defined editorial
policy helps to guarantee cohesiveness between articles as well
as a certain kind of content harmony throughout the website.
In most cases, given the diverse nature of a website's readership,
businesses and organizations are advised to adopt an editorial
style close to that of a journalist, i.e. particularly following these
rules:
Calibration
Calibration refers to determining the length of an article. Studies
have shown that people read text on screen 25% more slowly
than text on paper. Considering the difficulty reading on screen, it
is highly recommended to write concise articles.
WEB LANGUAGES
Introduction to the Web
The term "web" refers to the Internet service that allows users to
browse through webpages. The protocol used for this type of
communication is
HTTP Protocol (HyperText Transfer Protocol), which explains why
the URLs that you type into a browser begin with http://.
Version 1.1 of HTTP protocol is currently being used (specified by
the W3C consortium). More and more, however, HTTPS protocol
(secure HTTP protocol) is being used along with electronic
commerce systems because it is a secure protocol that enables
encrypted requests to be exchanged between the browser and
the server.
Today, the WAP protocol (Wireless Application Protocol) allows
WAP compatible mobile phones to communicate with the mobile
telephony operator's WAP gateway. Then the communications
are converted according to HTTP protocol by the gateway. The
latest version of the WAP protocol specified by the WAP Forum
(the authority in charge of defining the WAP standard) is version
1.1 (beginning of 2001).
Dynamic Webpages
A "static webpage" is a webpage made up of a text file
containing HTML code and possibly some images and links to
other documents. A website made up of static webpages is thus
defined as a "static website". A static website will work fine if it
contains less than a couple dozen pages. However, operating and
updating it may run up against the following limitations:
XML
HTML quickly showed its limitations not only because of its limited
number of tags but especially because it is impossible to separate
content and presentation, which leads to problems when making
even minor adjustments to presentation. Thus, XML was
introduced as a meta language, i.e. a language used to define a
new language (comprised of new tags).
Moreover, given that XML separates the presentation from the
data, it is possible to exchange documents in XML format without
influencing their form. This makes adapting content to a browser
and other display devices simple (in that way, WML (Wireless
Markup Language) is an XML implementation option for
displaying webpages on mobile terminals).
XSL (eXtensible StyleSheet Language) is used to format an XML
document with the help of formatting rules in order to compose a
document in another format (HTML, WML, PDF, LaTeX, etc.)
XML organises information according to a tree structure defined
by the DOM (Document Object Model). Thus, it is possible to read
an XML document by using a parser (also called a syntactic
analyzer), i.e. a programme that uses a function library (API, for
Application Programmable Interface) to read and modify an XML
document.
be pronouncable
have a meaning, if possible
be available
Redirection
It is possible to choose a redirection, i.e. a domain name that
redirects the Internet user to a specific URL. This type of solution
is a compromise that allows webmasters using free hosting
services to benefit from an easy-to-remember name.
Nevertheless, this system does not make the domain name
appear in the browser address bar.
Warning: providers who offer free domain name redirection also
become the owners of those domain names, too!
Grabbing
Some crafty Internet users take pleasure in buying large numbers
of domain names. This process is called grabbing and consists
of buying the domain names that certain companies could use
before the companies buy them (e.g. the .com, .net and .org
versions of the same domain name. This process is not
controlled).
In the past, many unscrupulous individuals grabbed domain
names and were successful at reselling these domain names
(which often are brand names) to companies at very high prices
(sometimes several million dollars). Since then, legislation
regarding the Internet has become more rigid and only on rare
occasions do courts side with cybersquatters.
Free Hosting
Professional Hosting
Shared Hosting: when a server hosts a large number of
websites
Dedicated Hosting: when a client leases an entire server
Colocation: when a client rents a hosting bay that can
house its servers.
Free Hosting
In their plans, Internet Access Providers generally offer a website
hosting option with fairly limited storage space. A large number of
sites offering free services exist, but the conditions of service
must be studied in detail.
These hosting services are often funded by advertisements
displayed on the website either in a corner or in the form of pop-
ups. Moreover, access time for this type of service is fairly
average and website availability is not guaranteed. It is important
to note that while it is relatively rare to be able to set up a domain
name with this type of hosting offer, it is nevertheless possible to
set up an automatic redirection from a domain name to the URL
the free host offers (such as http://perso.my-
provider.com/mywebpage).
Shared Hosting
Shared hosting involves hosting several websites on the same
server. This solution is relatively inexpensive and allows clients to
benefit from a high-quality service at a reasonable price.
This type of option offers a server with a set configuration and a
software offer (server, databases, email accounts, distribution lists
server, etc.) as well as a specific amount of storage space.
In this type of solution, clients do not have direct access to the
server as an administrator. The server is configured through web
interfaces. Therefore, it is important to verify which configuration
parameters can be set (configuration of the domain name server,
web server, database management system, etc.).
Dedicated Hosting
Dedicated hosting consists of putting an entire server at the
client's disposal.
The difficulty of this process does not lie in promoting the website
to search engines but rather in structuring the content so that the
page is positionned high in the results for the chosen keywords.
Indeed, a majority of Internet users use search engines in order to
find information and search for this information with the help of
keywords. Therefore companies and organisations must first
focus on the content that their websites offer in order to best meet
the needs of Internet users and then identify the keywords that
are likely to be entered by these users.
Webpage Content
Search engines seek above all to give their users a quality service
by giving them the results that best match their search. So before
companies and organisations even think about web positionning,
they must endeavour to create consistent and original content.
Original content does not mean content that is offered by no other
website; that would be virtually impossible. It is however possible
to deal with a subject and give it an added bonus by going more
in-depth on certain points, organising the information in an original
way or relating different pieces of information.
On the other hand, still with the goal of supplying visitors with
better content in mind, search engines attach importance to
updating information. Updating a website's pages serves to either
increase the rating given by the engine to the website or how
often the indexing robot visits the site.
Page Title
The title is the best element for describing the page contents in
just a few words. Because it is the first information that the visitor
reads on the search engine's results page, special importance
must be attached to it. The title of a webpage is described in the
webpage's header in between the tags <TITLE> and </TITLE>.
The title must describe the webpage's content as precisely as
possible (in under 7 words and 60 characters).
The title is all the more important because it will appear in the
user's favorites as well as in the search history.
Page URL
Some search engines attach major importance to keywords
present in the URL, especially to keywords that appear in the
domain name. Companies and organisations are advised to use a
fitting file name that contains one or two keywords for each of the
websites files rather than names like page1.html, page2.html, etc.
Meta Tags
Meta tags are non-displayed tags that are inserted at the
beginning of an HTML document in order to subtly describe the
document. Among these tags, keywords and description tags
are ways to add keywords and a description to the page without
displaying them to visitors (e.g. terms in the plurial form and even
with intentional spelling mistakes). HTML codes should be used
for letters with accents. No more than 20 keywords should be
included.
Meta robots help define what a robot should do on a page,
notably by indicating whether or not the page must be indexed
and if the robot is authorised to follow the links.
Given the abusive use of meta tags in a large number of
websites, search engines now use this information less and less
when indexing pages.
Hypertext Links
In order to give each of your pages maximum visibility, you should
set up internal links between your pages to allow indexing robots,
or crawlers, to browse your entire website structure. Thus,
creating a page that presents your website's architecture and
contains links to each of your pages might be a very good idea.
In addition, it is important to have external links pointing to your
website because this increases your site's traffic and visibility and
because some search engines take into account the number and
quality of the links pointing to a site when defining relevancy (this
is true for Google, which has a PageRank index).
iii) Spyware:
Spyware is a program placed on a computer without the
user’s knowledge that secretly collects information
about the user. Spyware can enter a computer as a
virus or as a result of a user installing a new program.
The Spyware program communicates information it
collects to some outside source while you are online.
Your home computer can be the easiest target for the hackers if
no security mechanisms have been implemented. Computer
security is required for every home computer or business
computer for preventing it from the attacks of viruses, hackers,
spyware, intruders and software vulnerabilities. For protecting the
home computer it is important to use strong passwords, run up-to-
dated antivirus and anti spyware programs, apply security
patches and backup your important data regularly.
Hackers
A hacker is a person who breaks into the computer and network
security of the online computer users. Hacking is an act of
exploiting the vulnerabilities of the operating system without the
user’s notice.
Viruses
A computer virus is a piece of code or a self-replicating, malicious
software program that exploit the computer by attacking on it.
Computer viruses are specifically designed to perform a number
of harmful effects from annoying to destroying. There are different
types of the computer viruses and the most dangerous viruses
can crash your computer’s hard disk and motherboard. A most
common way of spreading the viruses is through emails. A
computer once attacked by the viruses can quickly spread the
viruses to all other connected computers.
Spyware
A spyware is a privacy invading program that is designed to steal
the personal and confidential from the computer users. Spyware
can be delivered in a variety of ways including being attached with
the legitimate software.
Adware
Adware is an advertising-supporting program that automatically
downloads, displays and performs at the user’s computer who
downloads the adware-supported software.
Malware
Malware is malicious software or a program such as viruses and
spyware that is designed to damage or disrupt the computer
system. The other types of the malware are Trojan horses, logic
bombs, popups and spam.
Trojans
Trojan is a destructive program that is contained in the harmless
program and gets control of all programs. Like the viruses the
Trojan do not replicate itself. Trojan can redistribute itself as the
part of the computer viruses. There are different types of the
Trojans like remote access Trojans, destructive Trojans, proxy
Trojans, FTP Trojans and denial-of-service (DOS) Trojans.
Phishing
Phishing is an act of tricking someone by emails to steal the
confidential and personal information.
Keylogger
A keylogger is a malicious program that is secretly installed on
your computer to record the keys that you type on your keyboard.
Keyloggers are used to collect the secret and personal
information such as user name, password, credit card information
and others. Once the data is collected it can be transferred to the
destination by the variety of ways.
The above mentioned security risks are the biggest threats for
every online user. Following solutions can help you to protect your
data, privacy and identity on the internet.
Security Solutions
Install an up-to-dated antivirus program on your computer.
Install anti spyware program.
Install and configure software or hardware firewall on your
gateway computer.
Update your operating system regularly by installing latest
security patches and hot fixes.
Encryption your data while transmitting over the internet.
Never open an email attachment from the unauthorized
source.
Never download a software program from the websites who
has no integrity.
Do not open any website links that you receive through the
messenger programs from known users.
PC Troubleshooting Guide
Computer troubleshooting is the process of fixing hardware and
software errors and networking. Troubleshooting the computer
problems is a very vital role of the system administrators,
hardware technicians and system specialists. Every hardware
component in the computer system has its own configurations
methods and troubleshooting techniques.
5. Empty Recycle Bin: When you delete a file or a folder form your
computer it first goes to the recycle bin and it covers the disk area
of your C drive. It is imperative, to delete all the files and folders
from the recycle bin and you will get the space of C drive for
reusability.
5. Event viewer: Use the event viewer utility by going to Start >
Control panel > Administrative tools > Event viewer. In the event
viewer you will find the error or warning messages associated
with any faulty hardware or software.
Following are some of the major computer security tips and you
can protect your computer from known online and offline threats
with these tips.
Online Security Tips
1. Install an up-to-dated antivirus program such as Norton
Antivirus, McAfee, Trend Micro, Panda Antivirus and PcCillin etc.
2. Install and configure good firewall software on your computer
because if you are behind a firewall then it would not be easy for
the hackers to access your computer.
3. Clear out the cookies from your web browsers regularly.
3. Don’t ignore the error messages and noises that come from
your computer.
4. Try to put your computer in a humid free environment.
Controlling the humidity
near your computer is important because more the humidity
the more static charges with build up near your PC.
Government offices use the computers and the web to provide the
public with a means to access their facilities. For example people
in the United States use computers to file taxes, apply for permits
and licenses, pay parking tickets, buy stamps, report crimes,
apply for financial aid, and renew vehicle registrations and driver’s
licenses.
The computer equipment industry also is well known for the many
start up companies that appear each year. These new companies
take advantage of rapid changes in equipment technology, such
as wireless communications, networking, multi media, and fiber
optics, to create new products and new job opportunities. Often
these companies offer stock options to influence college
graduates to join their firms instead of the larger, more
established companies.
Finance
Many people and companies use computers to help manage their
finances. Some use finance software to balance checkbooks, pay
bills, track personal income and expenses, manage investments,
and evaluate financial plans. This software usually includes a
variety of online services. For example, computer users can track
investments, compare insurance rates from leading insurance
companies, and do online banking. With online banking, users
access account balances, pay bills, and copy monthly
transactions from the bank’s computer right into their computers.
Many financial institutions’ Web sites also offer online banking.
When using a Web site instead of finance software on your
computer, all your account information is stored on the bank’s
computer. The advantage is you can access your financial
records from anywhere in the world. Web-based financial
institutions often allow you to transfer cash from a credit card,
debit card, or checking account to another person’s credit card or
bank account. Some people use this service for monetary gifts.
Companies use it for rebates and refunds.
Investors often use online investing to buy and sell stocks and
bonds-without using a broker. With online investing, the
transaction fee for each trade usually is much less than when
trading through a broker.
Government
A government provides society with direction by making and
administering policies. Many people associate government with
executive, judicial, and legislative offices. The United States
government also includes areas such as law enforcement,
employment, military, national security, taxes, and state and local
agencies. To provide citizens with up-to-date information, most
government offices have Web sites. A recent survey estimated
that about 62 percent of people in the United States access
government Web sites. They file taxes, apply for permits and
licenses, pay parking tickets, buy stamps, report crimes, apply for
financial aid, and renew vehicle registrations and driver’s licenses.
Employees of government agencies use computers as part of
their daily routine. North American 911 call centers use computers
to dispatch calls for fire, police, and medical assistance. Law
enforcement officers have online access to the FBI’s National
Crime Information Center (NCIC) in police cars that have
computers and fingerprint scanners. The NCIC contains more
than 39 million criminal records, including names, fingerprints,
parole/probation records, mug shots, and other information.
Health Care
Nearly every area of health care uses computers. Whether you
are visiting a family doctor for a checkup, having lab work or an
outpatient test, or being rushed in for emergency surgery, the
medical staff around you will be using computers for various
purposes:
Hospitals and doctors use computers to maintain patient
records.
Computers monitor patients’ vital signs in hospital rooms and
at home.
Computers and computerized devices assist doctors,
nurses, and technicians with medical tests.
Doctors use the Web and medical software to assist with
researching and diagnosing health conditions.
Doctors use e-mail to correspond with patients.
Pharmacists use computers to file insurance claims.
Surgeons implant computerized devices such as
peacemakers that allow patients to live longer.
Surgeons use computer-controlled devices to provide them
with greater precision during operations, such as for laser
eye surgery and robot-assisted heart surgery.
These Web sites also maintain lists of doctors and dentists to help
you find the one that suits your needs. They have chat rooms, so
you can talk to others diagnosed with similar conditions. Some
Web sites even allow you to order prescriptions online.
Science
All braches of science, from Biology to astronomy to meteorology,
use computers to assist them with collecting, analyzing, and
modeling data. Scientists also use the internet to communicate
with colleagues around the world.
Publishing
Publishing is the process of making works available to the public.
These works include books, magazines, and newspapers. Special
software assists publishers in designing pages that include text,
graphics, and photographs. Journalists carry notebook
computers, mobile devices, and digital cameras to capture and
record news as it occurs.
Main memory:
o very closely connected to the processor.
o the contents are quickly and easily changed.
o holds the programs and data that the processor is
actively working with.
o interacts with the processor millions of times per
second.
Secondary memory:
o connected to main memory through the bus and a
controller.
o the contents are easily changed, but this is very slow
compared to main memory.
o used for long-term storage of programs and data.
o The processor only occasionally interacts with
secondary memory.
Main memory is where programs and data are kept when the
processor is actively using them. When programs and data
become active, they are copied from secondary memory into
main memory where the processor can interact with them. A
copy remains in secondary memory. Main memory is intimately
connected to the processor, so moving instructions from the
program and data into and out of the processor is very fast.
Main memory is sometimes called RAM. RAM stands for
Random Access Memory. "Random" means that the memory
cells can be accessed in any order.
Secondary Memory
SYSTEM CARE:
One very important category of preventive maintenance is caring
for your system hardware. This includes maintaining the various
components that make up your PC, along with looking at overall
factors that affect the system as a whole. There are many aspects
to system care and maintenance that affect the system as a
whole, or every component in the system, as opposed to being
specific to a particular component. These factors are discussed
below:
Here are some tips that you can use to ensure that the flow
of air in your system is good, and to increase air flow in your
case:
i) Keep the Cover On: Running the system with the case
cover removed makes cooling worse. When you remove the
case, the air that the power supply fan is pushing out the
back of the case is replaced by air drawn from the room
instead of being drawn across the components. As a result,
many components will sit in stagnant air and get little
cooling.
vi) Keep the Inside of the Case Clean: Good airflow in the
box doesn't help very much if none of the cool air can reach
the components because they are covered with a thick layer
of dust.
b) Component Cooling
There are several key components inside the PC that require
specific attention when it comes to cooling:
iii) Hard Disk Drives: Some of the high-end hard disks that
run at high revolutions per minute (RPM) speeds can
generate a great deal of heat. It is not generally practical to
cool these directly, so the use of proper air flow through the
case is key especially when using multiple devices. It is also
essential to space them so that they are not near each other.
c) External Ventilation
In order for system cooling to be effective, it is mandatory
that there be good air flow not only within the system case
but also immediately outside it as well. If the PC is located
somewhere where it will not get adequate ventilation, it can
overheat no matter how many fans you have on the inside of
the box. The best environment for the computer is one with
regulated temperature settings, air conditioning, and active
ventilation of the entire room. The most important part of this
is simply making sure that you provide space for the power
supply fan to blow, without blocking it off.
iii) Don't Cut Corners With Power: Due to being either lazy or,
uh, "excessively fiscally conservative", some people like to do
things like snipping off the grounding plug on their PC's power
cable so they can make use of a 2-pronged extension cord. Again
here, you are asking for trouble if you do this sort of thing, and it
isn't just your computer you are risking.
The basic question is: you have a PC on your desk at the office.
You use it all day. When you go home for the night, should you
turn off the PC or leave it running? This is not a simple question to
answer because there are so many different factors involved in
the decision in most cases. And the decision also depends on the
type of PC: a high-end server is more likely to be left on 24 hours
a day than a PC used twice a week at home:
Convenience: For many people who run multiple applications at a
time, having to reboot the PC every morning is a pain in the rear
end. It can take me a good 10 minutes in the morning to boot my
machine and get my working environment set up the way I like it.
Also, I like to run maintenance tasks during the day while I am at
work. I will concede that not turning off the PC because you don't
want to restart all your applications may be laziness on my part,
but it is a significant reason why many people leave their
machines on overnight.
Thermal Stress: After your PC has been off for many hours the
components will be at room temperature. When the PC is turned
on, the components will heat up, sometimes to much higher
temperatures than 70 degrees F, causing them to expand. Then
when you turn off the PC they cool down again, and contract. This
cycle of heating and cooling causes thermal stress in the
components that make up the PC, and is a leading cause of
system failure (this is also what normally causes light bulbs to fail,
which is why they usually pop when you turn them on, and not out
of the blue). Leaving the PC on all the time greatly reduces
thermal stress, which can lead to increased life for the system.
Strange as it may seem, most components last longer if you leave
then running 24 hours a day for years than if you leave them off
for 22 hours a day and on for only 2 (but this isn't true of all
components.)
While ESD won't kill you, it can certainly kill your computer
components. Especially sensitive to ESD are integrated circuits:
processors, memory, cache chips, and expansion cards. You can
deal with ESD in two basic ways: reducing its buildup, and
draining it away so it cannot cause any damage.