0% found this document useful (0 votes)
3 views

Essential Introduction To Computers Notes

no description

Uploaded by

hanzalarehman125
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Essential Introduction To Computers Notes

no description

Uploaded by

hanzalarehman125
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 68

Basic Information Technology Concepts

ESSENTIAL INTRODUCTION TO COMPUTERS

Objectives
 Define the term computer and discuss the four basic computer operations: input,
processing, output, and storage
 Define data and information
 Explain the principle components of the computer and their use
 Describe the use and handling of floppy disks and hard disks
 Discuss computer software and explain the difference between system software and
application software
 Identify several types of personal computer application software
 Discuss computer communications channels and equipment and the Internet and World
Wide Web
 Explain how to purchase, install, and maintain a personal computer, a notebook
computer, and a handheld computer
 Define e-commerce

Computer: Input, Processing, Output, and Storage


In today's world, computers are used for almost every task imaginable. Routine activities
such as paying bills, buying groceries, or communicating with a friend can be done with a
computer. That is why it is important not only to know how to use a computer, but also to
understand the components of a computer and what they do.

Recent studies report that almost 40% of homes surveyed have personal computers, and this
number is growing. Given the widespread use of computers, computer literacy - a knowledge
and understanding of computers and computer uses - has become an essential ingredient in
the recipe for success in today's world. Florida was the first state to demand computer
literacy of all students by grade 12.

Collectively, the electric, electronic, and mechanical equipment that makes up a personal
computer is called hardware. Devices that surround the system unit (i.e., the keyboard,
mouse, speakers, monitor, and so on) sometimes are known as peripheral devices.

Computers manipulate (process) data (input) to produce information (output) and hold (store)
that information for future use. These operations are completed incredibly quickly. Today's
supercomputer can perform 72 trillion operations per second. If a person did one arithmetic
operation a second without stopping, it would take more than 31,000 years to perform the
number of operations a supercomputer can do in one second.

Data and Information


A major part of understanding computers is to know what goes into them (data), what comes
out of them (information), and to understand the process of turning data into information, also
known as the information processing cycle.

1
Basic Information Technology Concepts

Understanding the difference between data and information is important. Clifford Stoll -
lecturer, computer security expert, and author (The Cuckoo's Egg: Tracking a Spy through
the Maze of Computer Espionage and Silicon Snake Oil: Second Thoughts on the
Information Superhighway are two of his most popular works) - notes a wide gap between
data and information. Information has a pedigree, or lineage. Its source is known, whether a
respected professor or a seventh grader. "The Internet has great gobs of data," Stoll
maintains, "and little, little information."

Components of the Computer and Their Use


A computer consists of five primary hardware components: input devices, the central
processing unit (CPU), memory, output devices, and storage devices. These components
work together with software to perform calculations, organize data, and communicate with
other computers.

Different types of input devices transmit different types of data or transmit data in different
ways. A keyboard is used to transmit alpha/numeric data by typing. In addition to the
standard keys in the typing area, an enhanced keyboard contains:

Function keys that can be programmed to perform specific tasks


Status lights that indicate modes that can be turned on and off by toggle keys (e.g., caps
lock and num lock)
A numeric keypad that allows for rapid entry of numbers
Arrow keys and other cursor-control keys (e.g., home, end, page up, and page down) that
control the on-screen movement of the insertion point
Special keys such as esc, shift, ctrl, and alt that have varying functions depending on the
software

The mouse, like a trackball or joystick, is called a pointing device because it controls the
movement of a pointer, or mouse pointer, on the computer screen. The first mouse was a
one-button, rectangle shaped device invented by Doug Engelbart in 1964. A mouse is very
easy to use. It requires empty desk space, however, and forces the user to remove a hand
from the keyboard to give a command.

Different CPUs function at different speeds. The rate at which computer operations take
place is measured in gig hertz (GHz), or billions of electronic pulses per second. This rate
varies among computers and should be a consideration when purchasing a personal
computer. Computers have two basic types of memory. RAM (random access memory) is
volatile, meaning that its contents are lost when the computer is turned off. ROM (read-only
memory) is non-volatile because it retains its contents even when the power is turned off.
ROM stores information that does not change, such as the instructions and data used to start
the computer when it is first turned on.
Like input devices, different types of output devices convey different types of information or
convey information in different ways. Printer output sometimes is called hard copy because
of its physical, touchable character. Monitor output, on the other hand, is called soft copy
because it has only an electronic, intangible existence.

Non-impact printers represent the fastest growing segment of the printer market. The drops
of ink that form an ink-jet printer character are similar to the dots that form a dot matrix
character figure, but there are many more of them. Good quality paper must be used with

2
Basic Information Technology Concepts

ink-jet printers so that the ink does not bleed. The speed quoted for impact printers often is
measured in characters per second (cps). Like ink-jet printers, laser printer speed is
measured in pages per minute (ppm). Although they are fast, all printers are much slower
than computers. Because of this, most printers have a buffer that temporarily stores a few
pages, allowing the computer to dump output into the buffer and continue processing. The
most widely used PC monitors are 14- or 17-inch (measured from one corner to the
diagonally opposite corner). With the growing popularity of portable computers, the clarity of
LCD displays continues to improve. The quality of a monitor's display depends largely on
three factors:

 Resolution - the number of pixels displayed


 Dot pitch - the distance between pixels
 Refresh rate - the speed with which images are redrawn on the screen
 Storage devices are different from memory. Memory, sometimes called primary storage,
is fast, short-term, volatile, and relatively expensive. Storage devices, on the other hand,
are slower, long-term, non-volatile, and less expensive.

Floppy Disks and Hard Disks


The data and information used in a computer needs to be stored for future use. The memory
of a computer only holds items temporarily while they are being processed. When not being
processed, these items must be stored in auxiliary storage devices. These devices include
floppy disks, hard disks, CD-ROM, and DVD-ROM. When selecting a storage device it is
important to know that each device holds different amounts of information.

Although floppy disks once were available in two sizes, the 5.25-inch floppy disk rarely is
used today, and some believe it is destined for the same fate as the eight-track tape.
Because of its rigid plastic shell, it may be difficult to see the 3.5-inch disk as "floppy." The
name is justified, however, not only by the disk's ancestry but also by the flexible character of
the disk itself. When a floppy disk drive is reading from or writing to a floppy disk, a light turns
on next to the drive. Floppy disks never should be inserted into or removed from the drive
when this light is on. Most magnetic disks are read/write storage media. Some optical discs,
such as CD-ROMs, usually can be read from but not written to. Each track on a formatted
floppy disk is very narrow. To see how narrow, try to draw 80 lines in a 11/4-inch space (the
approximate radius of the floppy disk surface). Floppy disks are soft-sectored, meaning that
the number of sectors is not predetermined. Floppy disk access time depends on the time
needed to locate the correct track, the time required to rotate the disk to the proper sector,
and the time necessary to transfer the data into main memory.
Although personal computer hard disks usually are fixed (i.e., not removable), some portable
computers have removable hard disk drives. Unlike floppy disks, hard disks constantly are
spinning, at a rate 10 to 20 times faster than floppy disks. Therefore, access time for hard
disks is significantly less than access time for floppy disks. While a floppy disk read/write
head rests on the disk, the read/write head for a hard disk hovers about 10 millionths of an
inch above the disk surface. Contamination on the disk - a speck of dust (about 1550
millionths of an inch), a fingerprint (about 600 millionths of an inch), or a particle of smoke
(about 250 millionths of an inch) - can cause a "head crash," destroying data and rendering
the disk drive unusable. For this reason, hard disk drives are sealed and manufactured in an
environment that typically is cleaner than a hospital operating room. Storage capacity can be
increased on both hard disks and floppy disks with compression programs such as Stacker,
WinZip, or PKZIP.

3
Basic Information Technology Concepts

Computer Software: System Software and Application


Software
There are two categories of computer software: system software and application software.
System software serves as the interface between a user and the computer's hardware. An
example of system software would be an operating system such as Microsoft Windows.
Application software consists of programs designed to perform specific tasks. An example of
application software would be a spreadsheet program, such as Microsoft Excel.

A 3.5-inch floppy disk is computer hardware, but the programs stored on it are computer
software. Although there are two types of software, system software and application software
are designed to work hand-in-glove; that is, application software packages are designed to
work with specific kinds of system software. By telling the computer how to perform common
functions, the operating system frees application software to concentrate on producing
information. Popular operating systems include Windows, the Mac OS, OS/2, UNIX, Linux,
DOS, and NetWare. Operating systems that have a graphical user interface (GUI) often are
called user-friendly. Studies have found that GUI users generally complete tasks more
accurately, work faster, are more productive, and feel less fatigue.

To understand the relationship between application software and system software, draw four
concentric circles. Label the innermost circle CPU, the next operating system, the next
application software, and the last user. The resultant diagram illustrates how the operating
system helps to insulate the user and application program from computer hardware.

Types of Personal Computer Application Software


Many types of application software are available. The more popular application software
includes word processing software, electronic spreadsheet software, database software,
presentation graphics software, communications software, and electronic mail software.
Knowing the function of each type of application software is one of the most important
ingredients of being computer literate.

Several years ago, a survey of large and small businesses showed that the most often used
applications were:
 Word processing and spreadsheet (used by 100% of those surveyed)
 Communications, electronic mail, database, and presentation graphics (used by about
95%)
 Desktop publishing (used by about 85%)
 Project management (used by about 70%)
 Personal information management (used by about 50%)

In word processing, any work developed through the writing process is a document. Word
processing software makes it easier to create, edit, format, and print documents. Many word
processing packages include a spell checker, grammar checker, and thesaurus.

The first spreadsheet software, VisiCalc, was introduced in 1979. By immediately displaying
the results of changes, electronic spreadsheet packages provide a capability called what-if
analysis. Another powerful capability, called goal-seek, finds what value is needed to reach a
specified goal.

A database file is a collection of related data called records, each of which consists of a
group of related facts called fields. The data can be manipulated, or a report, called a query,

4
Basic Information Technology Concepts

can be created based on user-specified criteria. Although most spreadsheet packages can
manage data tables of a few thousand records, database software can efficiently handle
much larger data tables.

Word processing and spreadsheet software came out around 1980. Presentation graphics
software was not introduced until the mid to late 1980s. Nevertheless, it can be argued that
presentation graphics software has had almost as great an impact on business, and on how
people do business, as either of the older applications. Presentation graphics packages
include libraries of clip art that can be inserted into slides and a slide sorter that can be used
to organize the order effectively in which slides are presented.

Computer Communications Channels and Equipment and the


Internet and World Wide Web

Communicating with a computer is becoming the standard today for both business and
personal use. The communications channels are constantly being upgraded in order to send
information faster. Communications technologies have changed the way people interact
through the use of e-mail, videoconferencing, and the Internet.
Many vendors sell network versions of their software. The network version resides on the
network server and can be accessed by each computer on the network. When a network
version is purchased, a site license is obtained from the vendor. The fee for the site license,
usually based on the number of computers on the network, is less than the purchase of
individual packages for each computer.

The number of people using the Internet is growing by 5% each month. Paul Moritz, a vice
president at Microsoft, maintains that, "In the long run, it's hard to exaggerate the importance
of the Internet." The Web, an innovation of Tim Berners-Lee, debuted in 1989. Since then,
the Web has experienced astounding growth. Some experts claim that the size of the Web
doubles every 60 days. Using links to move from one document to another often is called
surfing the Web. Two popular Web browsers are Netscape Navigator and Microsoft Internet
Explorer.

How to Purchase, Install, and Maintain a Computer


At some point in your life, you will probably decide to purchase a computer. Aside from
understanding the components discussed earlier, it also is important to be able to find the
computer that best fits your needs. For example, most new computers come with application
software already installed. If you do not use this software, then it is of no value even though
you got it for "free." There are several things to look for when purchasing a new computer. If
possible, speak to someone who is familiar with the purchasing process and can guide you
along.

For most people, buying a computer is an expensive experience. Despite this, many people
are woefully uninformed when they set out to purchase a computer. Although desktop
computer systems remain popular, since 1993 sales of laptop, notebook, and smaller
computers have rivalled sales of larger systems, partly because of their enhanced
capabilities and increased use by field sales forces. Be careful when setting up a computer
system. Failure to follow health guidelines can lead to painful, and even permanent,
disabilities. Government studies indicate repetitive stress disorder (RSI) and cumulative
trauma disorder (CTD), the most commonly reported problems associated with prolonged
keyboard use, are responsible for half of work-related illnesses. Computer security is an

5
Basic Information Technology Concepts

increasingly important issue. A survey of American companies with more than 200 personal
computers showed that over 60% had suffered at least one virus attack. Two of the major
sources of viruses, free software and illegally copied software, more commonly are used by
small companies and private individuals, so the percentage of PC users affected by viruses
may be much higher. E-mail attachments have been the carriers of several recent virus
attacks that have infected both business and home computer users.

E-Commerce
Conducting business online is known as electronic commerce, or e-commerce, and includes
such commercial activities as shopping and investing. The three types of e-commerce that
exist today are business to consumer (B2C), consumer to consumer (C2C), and business to
business (B2B).

If you have access to a computer, an Internet connection, and a means to pay for products or
services, you can participate in e-commerce. Today, users can participate in e-commerce not
only through desktop computers, but also through mobile devices such as laptop and
handheld computers, pagers, and cellular phones. M-commerce (mobile commerce) is the
term some people use to describe e-commerce activities that take place using mobile
devices.

The more popular uses of e-commerce include shopping and investing. On the Web, you can
buy and sell stocks, order flowers, purchase groceries and airline tickets, and even buy a car!

Three types of e-commerce exist: business to consumer (B2C), consumer to consumer


(C2C), and business to business (B2B). Of the three, most e-commerce takes place between
businesses, making B2B e-commerce transactions the most common.

6
Basic Information Technology Concepts

CHAPTER 1: INTRODUCTION TO COMPUTERS

Overview
 Explain the importance of computer literacy
 Define the term computer
 Identify the components of a computer
 Explain why a computer is a powerful tool
 Differentiate among the various types of software
 Explain the purpose of a network
 Discuss the uses of the Internet and the World Wide Web
 Describe the categories of computers and their uses
 Identify the various types of computer users
 Understand how a user can be a Web publisher

This chapter presents a broad survey of concepts and terminology related to computers. The
idea of computer literacy is introduced. You discover what a computer is and what it does.
You learn about the components of a computer, the power of computers, computer software,
and networks and the Internet. Categories of computers are identified, including personal
computers, minicomputers, mainframe computers, and supercomputers.

You discover how people employ computers, from home users to large business users.
Finally, you learn how people use computers to provide information. Reading and
understanding the material in this chapter should help you better understand these topics as
they are presented in more detail in the following chapters.

Explain the importance of computer literacy


Computers have touched every part of our lives: the way we work, the way we learn, the way
we live, even the way we play. It almost is impossible to go through a single day without
encountering a computer, a device dependent on a computer, information produced by a
computer, or a word that was introduced or whose meaning has changed with the advent of
computers. Because of the significance of computers in today’s world, it is important to be
computer literate. Being computer literate means you have knowledge and understanding of
computers and their uses.

Define the term computer


A computer is an electronic machine, operating under the control of instructions stored in its
own memory that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
Computers process data to create information.

Data is a collection of raw unprocessed facts, figures, and symbols.

7
Basic Information Technology Concepts

Information is data that is organized, meaningful, and useful.

To process data into information, a computer uses hardware and software.

Hardware is the electric, electronic, and mechanical equipment that makes up a computer.

Software is the series of instructions that tells the hardware how to perform tasks.

Identify the components of a computer

Computer hardware components include input devices, output devices, a system unit,
storage devices, and communications devices.

An input device is any hardware component that allows a user to enter data and instructions
into a computer. Six commonly used input devices are the keyboard, mouse, microphone,
scanner, digital camera, and PC camera.

An output device is any hardware component that can convey information to a user. Three
commonly used output devices are a printer, a monitor, and speakers.

The system unit is a box-like case made from metal or plastic that protects the internal
electronic components of the computer from damage. The system unit contains the central
processing unit and memory. The central processing unit (CPU) is the electronic device that
interprets and carries out the basic instructions that operate the computer. Memory is a
temporary holding place for data and instructions.

A storage device records and retrieves data to and from a storage medium. Six common
storage devices are a floppy disk drive, a Zip® drive, a hard disk drive, a CD-ROM drive, a
CD-RW drive, a DVD-ROM drive, and a DVD+RW drive.

A communications device enables computer users to communicate and exchange items such
as data, instructions, and information with another computer. A modem is a communications
device that enables computers to communicate usually via telephone lines or cable.

Explain why a computer is a powerful tool


A computer is a powerful tool because it is able to perform the information processing cycle
operations (input, process, output, and storage) with amazing speed, reliability, and
accuracy; store huge amounts of data and information; and communicate with other
computers. Computers allow users to generate correct information quickly, hold the
information so it is available at any time, and share the information with other computer
users.
Differentiate among the various types of software

There are two categories of computer software: system software and application software.

System software consists of the programs that control the operations of a computer and its
devices. Two types of system software are the operating system and utility programs.

8
Basic Information Technology Concepts

An operating system (OS) coordinates all activities among hardware devices and contains
instructions that allow you to run application software.

A utility program performs specific tasks, usually related to managing a computer, its devices,
or its programs. You interact with software through its user interface.

Application software consists of programs that perform specific tasks for users. Popular
application software includes word processing software, spreadsheet software, database
software, and presentation graphics software. Application software can be

 Packaged software (copyrighted software that meets the needs of a variety of users),
 In-house/Custom software (tailor-made software developed at a user’s request),
 Freeware (copyrighted software provided at no cost),
 Public-domain software (software donated for public use with no copyright
restrictions), or
 Shareware (copyrighted software distributed free for a trial period).

Explain the purpose of a network

A network is a collection of computers and devices connected together via communications


devices, such as a modem, and communications media, such as cables, telephone lines,
cellular radio, and satellites. Networks allow users to share resources, such as hardware
devices, software devices, data, and information. Most business computers are networked,
either by a local area network (LAN) in a limited geographic area or by a wide area network
(WAN) in a large geographical area.

Discuss the uses of the Internet and the World Wide Web

The world’s largest network is the Internet, which is a worldwide collection of networks that
links together millions of businesses, government agencies, educational institutions, and
individuals. Users connect to the Internet to send messages, access information, shop for
goods and services, meet or converse with other users, and access sources of entertainment
and leisure. Most users connect to the Internet through an Internet service provider (ISP) or
an online service provider (OSP). The World Wide Web is a popular segment of the Internet
that contains billions of documents called Web pages. These documents can contain text,
graphics, sound, video, and built-in connections, or links, to other Web pages stored on
computers throughout the world.

Describe the categories of computers and their uses


The six major categories of computers are personal computers, handheld computers,
Internet appliances, mid-range servers, mainframes, and supercomputers. These categories
are based on differences in size, speed, processing capabilities, and price.

A personal computer can perform all of its input, processing, output, and storage activities by
itself. Personal computers include desktop computers and notebook computers.

A desktop computer is designed so the system unit, input devices, output devices, and any
other devices fit entirely on or under a desk or table. Variations of desktop computers include

9
Basic Information Technology Concepts

 Tower models (computers with tall and narrow system units that can sit vertically on
the floor),
 All-in-one computers (less expensive computers that combine the monitor and system
unit into a single device), and
 Workstations (more expensive and powerful computers designed for work that
requires intense calculation and graphics capabilities).

A notebook computer is a portable personal computer small enough fit on your lap.
Notebook and desktop computers are used at home or in the office to perform application
software-related tasks or to access the Internet.

A handheld computer is a small computer that fits in your hand. Handheld computers can
perform specific, industry-related functions, or can be general-purpose. A PDA (personal
digital assistant) is a handheld computer that provides personal organizer functions, such as
a calendar, appointment book, and notepad.

An Internet appliance is a computer with limited functionality whose main purpose is to


connect to the Internet from home.

A mid-range server is more powerful and larger than a workstation computer. Users
typically access a mid-range server through a personal computer or a terminal, which is a
device with a monitor and a keyboard that usually has no stand-alone processing power.

A mainframe is a large, expensive, very powerful computer that can handle hundreds or
thousands of connected users simultaneously.

A supercomputer is the fastest, most powerful, and most expensive category of computer.

Identify the various types of computer users


Computer users can be divided into five categories: home user, small office/home office
users, mobile users, large business users, and power users.

A home user spends time on the computer for personal and business communications,
budgeting and personal financial management, entertainment, and Web access.

A small office/home office (SOHO) user includes any company with fewer than 50
employees, as well as self-employed people that work out of their home.

A mobile user travels to and from a main office or school to conduct business,
communicate, or do homework.

A large business user works for a company that has a large number of employees and
computers usually connected to a network.

The power user – such as an engineer, architect, or desktop publisher – typically works with
multimedia, which combines several media elements into one application, and requires the
capabilities of a workstation or other powerful computer.

Understand how a user can be a Web publisher

10
Basic Information Technology Concepts

In addition to being a recipient of information, Internet users have the ability to provide
information to other connected users around the world. Users can create a Web page with
word processing software or with Web page authoring software. Publishing a Web page is
the process of making it available on the Internet.

Expand Your Knowledge


 Computer literacy
 Computer
 Computer components
 Computer power
 Computer software
 Networks
 The Internet
 Computer categories
 Types of computer users
 Web publishing

Here you will find additional information that will expand and enhance your knowledge
beyond that contained in your textbook. Compare this information to what may be provided in
a traditional classroom by your instructor or peers.

Computer Literacy
It is difficult to think of a field in which computers are not used. In addition to general-purpose
computers, special-purpose computers are used in everything from automobiles to electric
razors. Consider how computers have influenced our daily lives, both positively and
negatively. (“To err is human, but to really foul things up requires a computer.” – Anonymous,
from a BBC Radio broadcast.) List ways in which computers are being used today. What is
the most common use? What is the most unusual use? As a result of the expanding use of
computers, in 1986 Florida became the first state to demand computer literacy of all students
by grade 12.

Computer
Although computers are thought of as a relatively recent innovation, the term computer has a
long history. Prior to 1940, “computer” was a job title that referred to anyone performing
calculations.

Consider how data is different from information. Data is processed into information. Clifford
Stoll – lecturer, computer security expert, and author of Silicon Snake Oil: Second Thoughts
on the Information Superhighway – notes a wide gap between data and information. Stoll
insists that information has a pedigree, or lineage. Its source is known, whether by a
respected professor or a seventh grader. “The Internet has great gobs of data,” Stoll
maintains, “and little, little information.”

The first three operations in the information processing cycle — input, process, and output —
are performed to process data into information, while the fourth operation — storage —
refers to a computer’s electronic reservoir capability. Think about how we perform each
phase in the information processing cycle in the “human computer” (i.e., the human brain)
while completing a common task, such as learning a telephone number.

11
Basic Information Technology Concepts

Computer Components
Different types of input devices are designed to transmit different types of data or to transmit
data in different ways. Think of other input devices (joysticks, scanners, digital cameras, and
so on) and the different types of data they transmit or the different ways they transmit data.

Because it is more lasting than output from a monitor or speaker, the printer’s output often is
called hard copy. Think of other output devices with which you are familiar (data projectors,
computer output microfilm, and so on).

Some computer components are considered internal, while others are considered external.
External components are called peripherals. Input, output, and communications devices
often are peripheral devices.

The difference between the temporary character of memory and permanent nature of storage
will be made painfully clear the first time you experience a power failure while working on a
computer. Think of other examples of storage devices (magnetic tape, PC Cards, and so on).

The capability to communicate may be one of the most significant factors influencing how
computers are used now and in the future.

Computer Power
In one billionth of a second, an electronic signal travels almost 12 inches. This means that
today’s supercomputer (the fastest, most powerful, and most expensive category of
computers) can perform 1.8 trillion operations per second. If a person did one arithmetic
operation a second without stopping, it would take more than 31,000 years to perform the
number of operations a supercomputer can do in one second. Researchers predict that one
day computer speed will be measured in exaflops, or one quintillion (1 x 1018) calculations
per second.

The reliability of computer components often is measured in MTBF (mean time between
failure, in hours). A typical component might be rated 10,000 MTBF.

Although the term “computer error” is widespread, most computer errors can be traced to
human mistakes. Consider instances of computer error with which you are familiar. How
might human blunders have resulted in the computer error? Why are people apt to blame
computers?

Supercomputers have more than 600 gigabytes of memory, meaning that they can store
more than 600 billion letters, numbers, and special characters, and have 2 terabytes (2
trillion bytes) of disk space. Equally important is the speed at which data can be retrieved,
processed, and stored again.

Connected computers can share each operation in the information processing cycle. To
recognize the value of communication, imagine trying to solve a problem individually, and
then trying to solve the same problem with the assistance of several classmates.

Computer Software

12
Basic Information Technology Concepts

The difference between computer hardware and computer software is important. A 3½-inch
floppy disk is hardware; however the programs stored on it are software. Programs or
software, like data, are input into the computer.

Because you interact with it directly, you may be more consciously aware of application
software than system software. Remember that system software determines how you interact
with application software. Popular operating systems include DOS (Disk Operating System),
Windows 3.x (technically, not an operating system but an operating environment that makes
DOS easier to use), Windows 95, Windows 98, Windows 2000, Windows XP, Mac OS, OS/2,
UNIX, Linux (rhymes with cynics), and NetWare. DOS was developed by Microsoft for IBM
personal computers. DOS started Microsoft’s climb to the top of the software world -- at one
time, versions of DOS were used worldwide by more than 100 million people. DOS has a
command-line interface, meaning that people have to memorize and type instructions.

Today, operating systems with a graphical user interface, such as Microsoft’s Windows, are
far more popular.

Most application software packages are designed to be used with specific operating systems.
Much of the software with which you are familiar is packaged software. Because of their
complexity, most software programs are written by teams of programmers working together.
Just as people understand a variety of spoken languages (English, French, Chinese, and so
on), computers recognize a number of programming languages.

Networks
A network with which you might be familiar is the school computer lab. Consider resources
that can be shared on a network. For example, the school computer lab may share a single
printer. Think of advantages of sharing resources. Why are most business computers part of
a network?

The Internet
Estimates claim that more than 50 percent of U.S. homes are connected to the Internet, and
more than 13 million do so through an online service provider. Although the growth rate of
the Internet and online services has slowed from a peak of more than 140 percent in 1994-
95, the growth rate still is around 20 percent annually. Surveys show the number of Web site
visitors continues to expand rapidly, practically doubling every year. Interestingly, surveys
show that teenage boys and girls are accessing the Internet for different reasons. While boys
seem to focus on entertainment, girls use the Internet more for schoolwork and chat.

Computer Categories
In addition to differences in size, speed, processing capabilities, and price, other factors,
such as the size of main memory and number of peripheral devices, also can be considered
when categorizing computers. Rapid changes in technology make it difficult to define
categories precisely. As a rule of thumb, today’s PCs have about as much memory and
processing power as the mainframes of a decade ago.

Think of personal computers with which you are familiar. How is the computer used? What
factors influence the choice of a personal computer? In addition to such obvious
considerations as processing speed and amount of memory, less apparent factors, such as
available software or even the computer’s “footprint” (the amount of space it occupies on the
work surface) also may be important. A desktop computer monitor often is placed on top of

13
Basic Information Technology Concepts

the system unit case. This sometimes can be an ergonomic problem, forcing users to look
up. Server computers often are used in academic environments. What features of server
computers would make them particularly attractive to schools? In today’s mobile society,
notebook computers have become indispensable tools. Since 1993, sales of notebooks and
smaller computers have rivalled sales of larger systems, partly because of their enhanced
capabilities and increased use by field sales forces. The capabilities of handheld computers
also continue to expand. Visor, a new handheld computer from Handspring, is an electronic
organizer but also offers video games, a cell phone, a modem, an MP3 player, and a two-
way pager. Called the “Swiss Army knife of handheld computers,” Visor uses the Palm
operating system, which is the same operating system used by the Palm Pilot, a popular
handheld computer from 3Com, and is available for about $200.
The growing movement toward decentralization in business, coupled with the increasing
power of mid-range servers, has led to a recent trend away from mainframe computers and
toward mid-range servers. What advantages might mid-range servers have over mainframe
computers for a business?

Organizations that deal with huge, constantly changing collections of data accessed
simultaneously by many users, such as banks, insurance companies, universities, and
government agencies, often use mainframe computers. Despite this, mainframe sales are
declining approximately 10 percent per year.

One of the most important features of supercomputers is their capability to create complex,
three-dimensional images almost instantaneously. Television networks often use
supercomputers to generate complicated images and then give viewers the sense of “going
through” the image. Due to their size and expense, only large businesses and government
agencies use supercomputers. IBM’s Option Blue supercomputer was used by the
Department of Energy to simulate nuclear explosions, allowing the effects of aging and
adverse conditions on nuclear weapons to be explored without underground detonations.

Types of Computer Users


A major concern related to the home user is the digital divide, which is the idea that the
people of the world can be separated into two distinct groups: those that have access to
technology with the ability to use it and those that do not have access to technology or are
without the ability to use it. Recent reports suggest that the digital divide exists on several
levels:

Individuals in higher income levels have greater access to the Internet than people in lower
levels and the gap may be growing.

Women are under-represented in today’s computer classes and technology jobs.

A number of efforts are being made to narrow the digital divide.

Networks have changed the face of both small and large business. In the 1970s, executives
usually worked with monthly reports; in the 1980s, they used weekly reports; today, daily or
even hourly reports are available. How have computers affected the efficiency of
businesses? What impact have computers had on the “interpersonal” side of business (i.e.,
employee and customer relationships)? How have computers changed people’s jobs? Have
computers cost any people their jobs?

14
Basic Information Technology Concepts

Web Publishing
With today’s Web page authoring software, children as young as 10 years old, and
sometimes younger, can create and publish their own Web pages. If you created a Web
page, what type of information would you provide? Why? Would you be interested in seeing
someone else’s Web page? Why or why not? If you have created a Web page, what type of
software did you use? What was the most difficult part of creating your Web page?

15
Basic Information Technology Concepts

CHAPTER 2

THE INTERNET AND WORLD WIDE WEB

Overview
 Discuss how the Internet works
 Understand ways to access the Internet
 Identify a URL
 Search for information on the Web
 Describe the types of Web pages
 Recognize how Web pages use graphics, animation, audio, video, and virtual reality
 Define Webcasting
 Describe the uses of electronic commerce (e-commerce)
 Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms,
and instant messaging work
 Identify the rules of netiquette

This chapter introduces one of the most significant innovations of the past half century – the
Internet. The Internet is defined, and the history of the Internet is detailed. You discover how
the Internet works and learn about Internet service providers and online services, connecting
to the Internet, how data travels the Internet, and Internet addresses. The World Wide Web,
search engines, and multimedia on the Web are explained. You become familiar with
Webcasting, electronic commerce, Web publishing, and other Internet services including e-
mail, FTP, Telnet, newsgroups, mailing lists, chat rooms, instant messaging and VOIP.
Finally, netiquette, the Internet code of acceptable behaviour by users, is described.

Discuss how the Internet works


The Internet is a worldwide collection of networks that links millions of businesses,
government offices, educational institutions, and individuals. Data is transferred over the
Internet using servers, which are computers that manage network resources and provide
centralized storage areas, and clients, which are computers that can access the contents of
the storage areas. The data travels over communications lines. Each computer or device on
a communications line has a numeric address called an IP (Internet protocol) address, the
text version of which is called a domain name. Every time you specify a domain name, a
DNS (domain name system) server translates the domain name into its associated IP
address, so data can route to the correct computer.

Understand ways to access the Internet


You can access the Internet through an Internet service provider, an online service provider,
or a wireless service provider.

An Internet service provider (ISP) provides temporary Internet connections to individuals and
companies.

An online service provider (OSP) also supplies Internet access, in addition to a variety of
special content and services.

A wireless service provider (WSP) provides wireless Internet access to users with wireless
modems or Web-enabled handheld computers or devices.

16
Basic Information Technology Concepts

Employees and students often connect to the Internet through a business or school network
that connects to a service provider. For home or small business users, dial-up access
provides an easy and inexpensive way to connect to the Internet.

With dial-up access, you use a computer, a modem, and a regular telephone line to dial into
an ISP or OSP. Some home and small business users opt for newer, high-speed
technologies.

DSL (digital subscriber line) provides high-speed connections over a regular copper
telephone line.

A cable modem provides high-speed Internet connections through a cable television network.

Identify a URL
The most widely used service on the Internet is the World Wide Web. The World Wide Web
(WWW or Web) consists of a worldwide collection of electronic documents called Web
pages. A browser is a software program used to access and view Web pages. Each Web
page has a unique address, called a URL (Uniform Resource Locator) that tells a browser
where to locate the Web page. A URL consists of a protocol, domain name, and sometimes
the path to a specific Web page or location on a Web page. Most URLs begin with http://,
which stands for hypertext transfer protocol, the communications standard that enables
pages to transfer on the Web.

Search for information on the Web


A search engine is a software program you can use to find Web sites, Web pages, and
Internet files. To find a Web page or pages, you enter a relevant word or phrase, called
search text or keywords, in the search engine’s text box. Many search engines then use a
program called a spider to read pages on Web sites and create a list of pages that contain
the keywords. Any Web page that is listed as the result of the search is called a hit. Each hit
is a link that can be clicked to display the associated Web site or Web page.

Describe the types of Web pages


There are six basic types of Web pages.

An advocacy Web page contains content that describes a cause, opinion, or idea.

A business/marketing Web page contains content that promotes or sells products or


services.

An informational Web page contains factual information.

A news Web page contains newsworthy material including stories and articles relating to
current events, life, money, sports, and the weather.

A portal Web page offers a variety of Internet services from a single, convenient location.

A personal Web page is maintained by a private individual who normally is not associated
with any organization.

17
Basic Information Technology Concepts

Recognize how Web pages use graphics, animation, audio,


video, and virtual reality
Many exciting Web pages use multimedia. Multimedia refers to any application that
integrates text with one of the following elements: graphics, sound, video, virtual reality, or
other media elements.

A graphic is a digital representation of information such as a drawing, chart, or photograph.


Two common file formats for graphical images on the Web are JPEG (Joint Photographic
Experts Group) and GIF (Graphics Interchange Format), which use compression techniques
to reduce the size of graphics files and thus speed downloading.
Animation is the appearance of motion created by displaying a series of still images in rapid
sequence. One popular type of animation, called an animated GIF, uses computer animation
and graphics software to combine several images into a single GIF file.

Audio is music, speech, or any other sound. A common format for audio files on the Web is
MP3, a popular technology that compresses audio. More advanced Web audio applications
use streaming audio, which transfers audio data in a continuous and even flow, allowing
users to listen to the sound as it downloads.

Video consists of full-motion images that are played back at various speeds. Video files often
are quite large in size. The Moving Pictures Experts Group (MPEG) defines a popular video
compression standard. Streaming video allows you to view longer or live video images as
they are downloaded.

Virtual reality (VR) is the use of computers to simulate a real or imagined environment that
appears as a three-dimensional (3-D) space. A VR world is an entire 3-D site that contains
infinite space and depth.

Define Webcasting
Pull technology is a method of obtaining information that relies on a client such as your
computer to request a Web page from a server. On the other hand, Webcasting, also called
push technology, is a method of obtaining information in which a server automatically
downloads content to your computer at regular intervals or whenever updates are made to
the site. Webcasting saves time by delivering information at regular intervals and allows
users to view Web content when they are offline, that is, when they are not connected to the
Internet.
Describe the uses of electronic commerce (e-commerce)
Electronic commerce (e-commerce) is a financial business transaction that occurs over an
electronic network such as the Internet. Today, there are three types of e-commerce.

Business to consumer (B-to-B or B2C) e-commerce consists of the sale of goods to the
general public. Customers visit an online business through an electronic storefront, which
contains descriptions, graphics, and a shopping cart that allows customers to collect their
purchases.

Consumer to consumer (C-to-C or C2C) e-commerce occurs when one consumer sells
directly to another. An online auction is an example of consumer to consumer e-commerce.

18
Basic Information Technology Concepts

Business to business (B-to-B or B2B) e-commerce, which is the most prevalent type of e-
commerce, takes place between businesses, with businesses typically providing services to
other businesses.

Explain how e-mail, FTP, newsgroups and message boards,


mailing lists, chat rooms, and instant messaging work
A variety of services are used widely on the Internet, including e-mail, FTP, newsgroups and
message boards, mailing lists, chat rooms, and instant messaging.

E-mail (electronic mail) is the transmission of messages and files via a computer network.
You use an e-mail program to create, send, receive, forward, store, print, and delete
messages. To receive messages, you need an e-mail address, which is a combination of a
username and a domain name that identifies a user.

FTP (File Transfer Protocol) is an Internet standard that allows you to upload and download
files with other computers on the Internet. An FTP server is a computer that allows you to use
FTP to upload files to, and download files from, an FTP site. With anonymous FTP, anyone
can transfer some, if not all, available files.

A newsgroup is an online area in which users conduct written discussions about a particular
subject. The computer that stores and distributes newsgroup messages is called a news
server. You use a program called a newsreader to access a newsgroup, read previously
entered messages (called articles), and add (post) messages of your own. A thread consists
of the original article and all subsequent related replies. In a moderated newsgroup, a
moderator reviews articles and posts them, if appropriate.

A message board is a popular Web-based type of discussion group that does not require a
newsreader and typically is easier to use than a newsgroup.

A mailing list is a group of e-mail names and addresses given a single name. To add your
e-mail name and address to a mailing list you subscribe to it; to remove your name, you
unsubscribe.

A chat is real-time (meaning everyone involved in the chat is online at the same time) typed
conversation that takes place on a computer. A location on an Internet server that permits
users to chat is called a chat room. Some chat rooms support voice chats and video chats,
where you can hear or see others and they can hear or see you as you chat. A chat client is
a program on your computer that allows you to connect to a chat server and start a chat
session.

Instant messaging (IM) is a real-time Internet communications service that notifies you
when one or more people are online and then allows you to exchange messages or join a
private chat room.

Identify the rules of netiquette


Netiquette, which is short for Internet etiquette, is the code of acceptable behaviours users
should follow while on the Internet. Rules for e-mail, newsgroups, and chat rooms include:

 Keep messages brief and use proper grammar and spelling.


 Be careful when using sarcasm and humour.

19
Basic Information Technology Concepts

 Be polite and avoid offensive language.


 Avoid sending flames (abusive messages) and spam (unsolicited junk mail).
 Do not use all capital letters, which is the equivalent of SHOUTING!
 Use emoticons (such as :) for smile) to express emotion.
 Use abbreviations (such as BTW for by the way) for popular phrases.
 Clearly identify a spoiler, which is a message that reveals a solution to a game or an
ending to a movie or program.
 Read the FAQ (frequently asked questions) document.
 Do not assume all material is accurate or up-to-date.
 Never read someone’s private e-mail.

Expand Your Knowledge


 The Internet
 Accessing the Internet
 URLs
 Searching the Web
 Types of Web Pages
 How Web Pages Use Multimedia
 Webcasting
 E-Commerce
 Web Publishing
 Internet Services
 Netiquette

The Internet
The Internet has had a profound affect on the world of computers. Microsoft CEO Bill Gates
claims, “The Internet is pervasive in everything we’re doing.” The Internet also has assumed
an increasing prominence in the world at large. Today, the letters “www” seem an
omnipresent part of advertisements on buses, billboards, and magazines.

The Internet, as it is known today, was born in 1983 when ARPANET was split into two
interconnected networks: ARPANET and MILNET. The size of the Internet doubled when
NSFnet joined the Internet in 1986.

The Internet has proven to be a reliable means of transmitting data. Occasionally, however,
transmission problems do occur. For 30 minutes in the spring of 1995, all of the traffic
destined for MIT was sent through a small wire in Florida, a situation described as equivalent
to routing all of the flights bound for O’Hare to a driveway.

Accessing the Internet


National ISPs include AT&T, Earthlink, and WorldCom. Two popular OSPs are America
Online (AOL) and the Microsoft Network (MSN). Some online services supply specific types
of information. For example, Dow Jones provides financial and business news, and
Imagination offers games and entertainment. WSPs include GoAmerica Communications,
OmniSky, and SprintPCS. The role of WSP is expected to grow. Industry analysts predict
that by 2003, more than 60 million people will use wireless Web-enabled devices to connect
to the Internet. The CEO of Amazon.com goes even farther, projecting that in 10 years all
Internet connections be wireless.

20
Basic Information Technology Concepts

Although most ISPs charge a standard fee for dial-up access, to attract users (who view
advertisements on an ISP’s home page) some ISPs now are providing free service.
Following this lead, a California-based DSL recently advertised free, high-speed Internet
access (a service that usually costs $50 a month) to users who agree to ads aimed at their
demographic group.

URLs
On a Web page, a link is a built-in connection to another related Web page or part of a Web
page. A link can be a word, phrase, or image. URLs make it possible to navigate using links,
because each link is connected to a URL. When you click a link, the Web site or document
associated with the URL is displayed. Some people refer to this activity of jumping from one
Web page to another as surfing the Web.

URLs are registered for a standard fee (usually about $70). To acquire an appropriate URL,
some companies are willing to spend a great deal more for a URL that already has been
registered. Recently, eCompanies paid an entrepreneur $7.5 million for a Web address. This
more than doubled the previous record – Compaq’s purchase of altavista.com for $3 million.

Searching the Web


The World Wide Web is an incredible source of information on almost any topic. There are
almost 2.5 billion Web pages. Exploring this vast reservoir for the answer to a search engine
user’s query, which usually is expressed in just a few keywords, is a daunting task. No
wonder an engineering head at AltaVista described search engines as a combination of
“wizardry and witchcraft.”

Often, simple search queries yield an overwhelming number of results. This is attributed to
several factors:

The limitations of search engines. A query about mustangs on the American plains might
produce results involving Southern Methodist University's football team and the Ford car.
The nature of queries. While a traditional researcher, such as a librarian, uses queries
averaging 14 words, the typical Internet query is just over one word.
The creators of Web pages. Developers of commercial Web pages sometimes distort
results by repeating frequently requested keywords in the background, where spiders see
them but people do not.

Despite these difficulties, search engines are among the most popular sites on the Web.
When choosing a search engine, experts suggest that novice users, and users looking for
obscure information, turn first to the larger search engines (AltaVista, Yahoo!, Lycos, and so
on) because they are easiest to use and cast the largest net.

Types of Web Pages


Advocacy Web pages established for political candidates, called “e-campaigning,” has
become an important part of politics. Surveys show that more than 50 percent of Internet
users turn to the Web for information about political topics.

Business/marketing Web pages used for shopping on the Internet are increasingly popular.
In 1999, 17 million households shopped online. This figure is expected to grow to 49 million
by 2004. A survey of back-to-school shoppers 34 years old and younger showed that 17
percent planned to shop online for their children’s school needs. Perhaps more significant,

21
Basic Information Technology Concepts

only 6 percent of surveyed shoppers reported being uncomfortable with buying on the
Internet.

Educational institutions frequently publish informational Web pages. Today, most colleges
have Web sites that offer course descriptions, information about the student population, and
registration costs and deadlines. When shopping for college, surveys show that high school
seniors use the Web more than catalogues or guidebooks; about 80 percent of college-
bound students start looking at college Web sites as sophomores.

News Web pages are the most popular Web sites among Americans with access to the
Internet. Although these Web sites often are associated with newspapers, magazines,
television stations, or radio stations, some are published only online, without a related print or
broadcast media.

Portal Web pages often offer the following free services: search engine, news, sports and
weather, free personal Web pages, reference tools, shopping malls, e-mail, instant
messaging, newsgroups, and chat rooms. The dictionary defines a “portal” as a door or
gateway. Portal Web pages are gateways to a host of services.
Personal Web pages sometimes use Web cams to provide minute-by-minute views of life in
a dorm room, an apartment, a new-born baby’s crib, or even the inside of a refrigerator. One
devotee of these personal Web pages says visitors often develop a sort of “relationship” with
the Web page developer. Perhaps this observation is true; some personal Web pages
receive more than 1,000 hits a day.

How Web Pages Use Multimedia


Multimedia can bring a Web page to life, increase the types of information available on the
Web, expand on the Web’s potential uses, and make the Internet a more entertaining place
to explore. Because Web pages with multimedia take longer to download, most browsers
allow users to turn off some multimedia elements (such as graphics) and show a text-only
version, speeding the display of a Web page.

Choose a topic for a Web page, such as your school or your class. How could multimedia
enhance the page? What multimedia elements would you use? How?

Webcasting
Some people use Webcasting to download copyrighted material, such as music, from Web
sites. Many young, unknown musicians see music Web sites as a way to gain exposure, but
some already-popular musicians see sharing music on Web sites as little more than theft.
The heavy metal rock band Metallica sued Napster (a music Web site) for copyright
violations. A number of colleges have placed a ban on music Web sites. These schools
maintain that students downloading and sharing music creates a tremendous amount of
traffic, clogging the school’s computer systems. As a result, the schools are using filtering
software to deny access to music Web sites. Several student groups have formed to protest
this response.

E-Commerce
Today, more than 50 percent of Web sites are commercial. Online product sales total more
than $6 billion, which represents a twelve-fold increase in just five years. These numbers
should be kept in perspective – in 1999, e-commerce still represented only 0.5 percent of
U.S. consumer spending.

22
Basic Information Technology Concepts

Business to consumer e-commerce often allows buyers to purchase directly from


businesses, eliminating the middleman and thus providing goods and services at lower costs.
Other advantages of e-commerce include:

 Twenty-four hour access


 Global presence
 Two-way communication
 Decreased costs
 Lower product display and storage costs
 Reduced salesperson costs
Businesses advertise with their own Web site or on another company’s Web site. The most
successful Web advertisements are on popular sites, such as search engines. In terms of
audience, advertising on the Web is expensive. The cost to reach 1,000 consumers is about
$75 on the Web, $60 in a newspaper, $44 in a magazine, and $5 on television. Yet, Web
advertisements do offer advantages:

Unlike traditional media advertising, which is passive (and often ignored by the audience),
Web advertising is interactive. The audience expresses an interest in the product by clicking
a hyperlink and choosing to view a Web ad.

For many products, Web users are the ideal customers. Web users tend to be students or
highly educated consumers in their late 30s, with average incomes of about $55,000.

What products could benefit most from advertising on the


Web. Why?

Web Publishing
Deciding upon the purpose of the Web site and the audience for whom it is intended will
make it easier to determine what should and should not be included on the Web site. Web
publishing is an increasingly commonplace Internet activity. With the assistance of word
processing packages, Web page authoring software, or Web sites that assist in the creation
of Web pages, even elementary school children are developing personal Web pages.

Internet Services
It is estimated that the number of e-mail users has increased 300 percent during the past five
years, and the number of e-mail messages sent per day has increased 400 percent. While its
growth has been phenomenal, not everyone is happy with e-mail’s ever-increasing use. In a
business setting, some feel that e-mail can be counter-productive. They contend that
employees spend too much time writing and reading e-mail on inconsequential topics –
subjects they never would commit to paper. In a social setting, some wonder if e-mail is fitting
in every situation. Although e-mail is suitable for casual messages, most believe it is
inappropriate for more serious or formal communication, such as a wedding invitation. How
do you feel about these reservations regarding e-mail?

Many files on anonymous FTP sites are public domain software, freeware, or shareware.
Public domain software is not copyrighted and therefore can be distributed at no cost.

23
Basic Information Technology Concepts

Freeware also is available at no cost but, because it is copyrighted, it cannot be resold.


Shareware can be downloaded and tried for free, but a license fee must be paid if the
software is kept. Shareware users who pay the license fee may receive a manual, notification
of new releases or tips, and access to technical support. The quality of freeware, public
domain software, and shareware varies greatly.

The real-time character of chat makes chat rooms different from newsgroups or mailing lists.
The extent to which a chat room is monitored varies. In some chat rooms, particularly those
aimed at adults, a monitor’s presence hardly is noticed. Chat rooms intended for minors,
however, often are monitored closely. Chat rooms can be an invaluable experience for
children, letting them share thoughts and ideas with people their own age from around the
country, or even around the world. Yet, to ensure that content is appropriate, parents may
want to oversee a child’s first few chat room visits.

Netiquette
Netiquette can be applied to all aspects of the Internet. Which netiquette rules are most
important? Which rules are least important? Why? What rules, if any, would you add? In her
book, Guide for the Turn-of-the-Millennium, syndicated columnist Judith Martin (Miss
Manners) offers guidelines for use of the Internet and other technological innovations. Web
sites such as http://www.fau.edu/netiquette/netiquette.html also offer advice on Internet
manners.

24
Basic Information Technology Concepts

CHAPTER 3

APPLICATION SOFTWARE

Overview
 Define application software

 Understand how system software interacts with application software


 Identify the role of the user interface
 Explain how to start a software application
 Identify the widely used products and explain the key features of different software
applications
 Identify various products available as Web applications
 Describe the learning aids available with many software applications

This chapter discusses the role of the system software with respect to application software. It
then presents an overview of several productivity software applications, graphic
design/multimedia software applications, home/personal/educational software applications,
and communications software applications. The chapter then identifies various Web
applications. Finally, learning aids and supports tools within application software products are
presented.

Define application software


Application software consists of programs designed to perform specific tasks for users.
Application software can be used as a productivity/business tool; to assist with graphics and
multimedia projects; to support home, personal, and educational activities; and to facilitate
communications. Specific application software products, called software packages, are
available from software vendors. Although application software also is available as
shareware, freeware, and public-domain software, these usually have fewer capabilities than
retail software packages.

Understand how system software interacts with application


software
System software consists of programs that control the operations of a computer and its
devices. System software serves as the interface between a user, the application software,
and the computer’s hardware. One type of system software is the operating system. Before
application software can be run, the operating system, which contains instructions that
coordinate the activities among computer hardware devices, must be loaded from the hard
disk into the computer’s memory.

Identify the role of the user interface


The user interface controls how you enter data or instructions and how information displays
on the computer screen. Many of today’s software programs have a graphical user interface.

25
Basic Information Technology Concepts

A graphical user interface (GUI) combines text, graphics, and other visual images to make
software easier to use.

Explain how to start a software application


Both the Microsoft Windows and the Apple Macintosh operating systems use the concept of
a desktop. The desktop is an on-screen work area with common graphical elements such as
icons, buttons, menus, links, windows, and dialog boxes. A software application can be
started by clicking its program name on a menu, or list of commands. Clicking the program
name instructs the operating system to transfer the program’s instructions from a storage
medium into memory. Once started, the application displays in a window on the desktop. A
window is a rectangular area of the screen that is used to show the program, data, and/or
information. At the top of the window is a title bar that contains the window’s name.

Identify the widely used products and explain the key


features of
 productivity/business software applications
 graphic design/multimedia software applications
 home/personal/educational software applications
 communications software applications

People use productivity software to become more effective and efficient while performing
daily activities.

 Word processing software allows users to create and manipulate documents that
contain text and graphics. With word processing software, you can insert clip art into a
document; change margins; find and replace text; use a spelling checker to check
spelling; place a header and footer at the top and the bottom of a page; and vary font
(character design), font size (character scale), and font style (character appearance).
 With spreadsheet software, data is organized in rows and columns, which collectively
are called a worksheet. The intersection of a row and column, called a cell, can contain a
label (text), a value (number), or a formula or function that performs calculations on the
data and displays the result.
 Database software allows you to create and manage a database. A database is a
collection of data organized to allow access, retrieval, and use of that data. A query is
used to retrieve data according to specified criteria, which are restrictions the data must
meet.
 Presentation graphics software is used to create presentations that communicate
ideas, messages, and other information to a group through a slide show. You can use a
clip gallery to enhance your presentation with clip art images, pictures, video clips, and
audio clips.
 A personal information manager (PIM) is software that includes an appointment
calendar to schedule activities, an address book to maintain names and addresses, and a
notepad to record ideas, reminders, and important information. A software suite is a
collection of individual applications sold as a single package.
 Project management software allows you to plan, schedule, track, and analyze the
progress of a project. Accounting software helps companies record and report their
financial transactions.
 Power users often use software that allows them to work with graphics and multimedia.
 Computer-aided design (CAD) software assists in creating engineering, architectural,
and scientific designs.

26
Basic Information Technology Concepts

 Desktop publishing (DTP) software is used to design and produce sophisticated


documents. DTP is developed specifically to support page layout, which is the process of
arranging text and graphics in a document.
 Paint software is used to draw graphical images with various on-screen tools.
 Image editing software provides the capability to modify existing images.
 Video editing software and audio editing software can be used to modify video and audio
segments.
 Multimedia authoring software is used to create electronic interactive presentations that
can include text, images, video, audio, and animation. Web page authoring software is
designed to create Web pages and to organize, manage, and maintain Web sites.
Many software applications are designed specifically for use at home or for personal or
educational use.
 Integrated software combines several productivity software applications that share a
similar interface and common features into a single package.
 Personal finance software is an accounting program that helps pay bills, balance a
check book, track income and expenses, follow investments, and evaluate financial plans.
 Legal software assists in the creation of legal documents and provides legal advice.
 Tax preparation software guides users through the process of filing federal taxes.
 Personal DTP software helps develop conventional documents by asking questions,
presenting predefined layouts, and supplying standard text.
 Photo-editing software is used to edit digital photographs.
 A clip art/image gallery is a collection of clip art and photographs that can be used in all
types of documents.
 Home design/landscaping software assists with planning or remodelling.
 Educational software teaches a particular skill and exists for about any subject.
 Reference software provides valuable and thorough information for all individuals.
 Entertainment software includes interactive games, videos, and other programs
designed to support a hobby or provide amusement.

One of the main reasons people use computers is to communicate and share information.

 E-mail software is used to create, send, receive, forward, store, print, and delete e-mail
(electronic mail).
 A Web browser is a software application used to access and view Web pages.
 A chat client is software that allows you to connect to a chat room, which permits users
to chat via the computer.
 A newsreader is a software program used to participate in a newsgroup, which is an
online area on the Web where users conduct written discussion about a particular subject.
 An instant messenger is a software program installed to use instant messaging (IM), a
real-time communications service that notifies you when one or more people are online
and then allows you to exchange messages or files.
 Groupware is a software application that helps groups of people on a network work
together and share information.
A videoconference is a meeting between two or more geographically separated people who
use a network or the Internet to transmit audio and video data.

Identify various products available as Web applications

A Web application is a software application that exists on a Web site. To access the Web
application, you visit the Web site that offers the program. Some Web applications are free;

27
Basic Information Technology Concepts

for others, you pay for use, service, support, or when a certain action occurs. Web-based
training (WBT) is a type of CBT (computer-based training) that uses Internet technology.
Many Web sites offer WBT to the general public. An application service provider (ASP) is a
third-party organization that manages and distributes software and services on the Web.

Describe the learning aids available with many software


applications

Many software applications and Web sites provide learning aids.

Online Help is the electronic equivalent of a user manual. Usually integrated into an
application software package, online Help often is context-sensitive, meaning that the Help
information is related to the current task being attempted. Most online Help also provide links
to Web sites that have a FAQs page.

FAQs (Frequently Asked Questions) supply answers to common queries. Many books are
available to help you learn to use the features of a personal computer application package.
A wizard is an automated assistant that helps complete a task by asking questions and then
performing actions based on the answers.

Expand Your Knowledge


 Application software
 System software
 The user interface
 Starting an application
 Software
 Web applications
 Learning aids

Application Software
Popular types of application software can be categorized by their general use: productivity
software, graphics design/multimedia software, home/personal/educational software, and
communications software. An application can belong to more than one category. For
example, an e-mail program can be considered both productivity software and
communications software.

System Software
Many application programs are designed to run with a specific operating system. When
shopping for an application software package, buyers must make sure they have a
compatible operating system. A software package designed to be used with the Macintosh
operating system may not work with the Windows operating system. The operating system
version also is important. An application designed for Windows XP may not work with
Windows 3.1. Yet, because most operating systems are downward compatible, software
written for earlier versions of an operating system (such as Windows 98) usually can be used
with recent versions of the operating system (such as Windows XP).

The User Interface


The user interface plays a key role in application software. Studies have found that GUI
users generally complete tasks more accurately, work faster, are more productive, and feel

28
Basic Information Technology Concepts

less fatigue than users of a text interface. The Macintosh operating system – the first popular
GUI – actually was developed from an earlier GUI-based operating system created by Xerox.

The first version of Windows (1985) imitated the Macintosh’s GUI (Apple sued Microsoft,
unsuccessfully, for copyright infringement). Although some users still feel the Macintosh
interface is superior, today some form of Windows is used on almost 90 percent of personal
computers. Because of this, even competitive products often use similar features, such as
the same menu names.

Starting an Application
To click an object on the screen, you move the pointer to the object and then press and
release a button on the mouse. Often, applications also can be started by double-clicking the
icon that represents the application.

When an application is started, the right-hand corner of the application window title bar
usually displays three buttons:

 Minimize – When clicked, this button reduces a window to a button on the taskbar.
 Restore – When clicked, this button returns a window to its initial size. When a window
does not fill the desktop, the Restore button is replaced by a Maximize button that, when
clicked, enlarges the window so it covers the entire desktop.
 Close – When clicked, this button closes the window. The Close button removes the
window from the desktop and its button from the taskbar.

A dialog box can contain option buttons, check boxes, text boxes, and command buttons.
Option buttons stipulate desired alternatives; check boxes turn specific capabilities on or off;
text boxes allow text to be entered; and command buttons immediately perform an action,
such as implementing (OK) or ignoring (Cancel) the choices made in a dialog box. Shortcut
menus can change depending on where the pointer rests when the mouse is right-clicked.
Dimmed commands on a menu or shortcut menu are unavailable.

Some applications use automatically display a smart tag when you perform a certain action.
Clicking the smart tag displays a menu of commands related to the action.

Software
Word processing software is used for creating, editing, formatting, saving, and printing
documents. In the modern office, word processing software has replaced the typewriter for
almost all written work. The editing capabilities of word processing software have altered the
creative process. The freedom to express yourself without reservation, knowing you easily
can revise what you have written, can improve the quality of written work. It is good practice
to save a document before printing it. When a document is saved, it exists as a file, or named
collection of data, instructions, or information. A file name uniquely identifies each file.
Restrictions on file names once were severe; file names could be no more than eight
characters long, and many characters, including spaces, could not be used. In Windows XP,
however, a file name can have up to 255 characters, including spaces.

Some spreadsheet programs offer more than 200 internal functions. When creating a
spreadsheet, formulas and functions usually must be preceded by a special character (such
as =, +, or @) to distinguish them from labels or values. Formulas use cell references, or
addresses, of cells that contain values. When formulas are copied from one cell to another,

29
Basic Information Technology Concepts

the cell references change to reflect the new location. This update is called relative
referencing. Another powerful capability, called goal-seek, finds what value is needed to
reach a specified goal.

While spreadsheet packages can manage data tables of a few thousand records, database
software can efficiently handle much larger data tables. In a database, common data types
include text, numeric, currency, date, memo, hyperlink, and object. When identifying data
types, numbers treated as text (such as zip codes, Social Security numbers, or telephone
numbers) sometimes are referred to as alphanumeric data because they are not used in
calculations. The results of a database query are placed in an ANSWER table.

Although introduced years after word processing and spreadsheet software, presentation
graphics software has had almost as great an impact on business, and on how people do
business, as either of the older applications. Presentations often include an outline with the
text from each slide, audience handouts that can be distributed to the audience, and a notes
page with additional notes for the presenter. Some presentation graphics packages offer
templates for various presentations (company meeting, financial report, marketing plan,
progress report, employee orientation, training, and so on).

PIMs essentially are “free style” database managers. They are very popular with people who
spend much of their time in business travel. These people, often called road warriors, find
PIMs a valuable part of the arsenal they bring to their daily battles. Like a daily planner, PIMs
must be reviewed regularly to be effective.

Unlike word processing software, DTP software increases hardware requirements. Because
of its relatively low cost (an advanced DTP system can be purchased for less than $10,000)
and the speed, control, security, and flexibility offered by desktop publishing, many
companies are using DTP instead of outside printing firms for their publishing needs.

Paint software and image editing software have had a tremendous impact on commercial art.
Commercial artists praise the capabilities offered by these applications. At the same time,
many feel these applications have led clients to demand more, both in terms of time and
expectations. As a result, some commercial artists believe their income, actually has dropped
because of graphic software.

Most software for home, personal, and educational use is relatively inexpensive. It still pays
to shop around. Prices for some software for home/personal use, such as integrated
software, can vary greatly for the same brand depending on the vendor. Some personal
finance packages can prepare reports on income and expenses, budget, net worth, taxes,
and investments.

Personal finance software wizards (automated assistants) can help to balance accounts,
prepare budgets, plan mortgages, calculate savings, and arrange retirements. Legal software
is designed to facilitate creation of standard documents; unusual circumstances might still
demand the services of a lawyer. Tax preparation software also is best used by people in
fairly common circumstances.

For some students, educational software is a welcome alternative to traditional classes,


allowing them to work privately at their own pace. Reference software articles often include

30
Basic Information Technology Concepts

links that, when clicked, display related articles. Because referenced material can change
frequently, some reference software packages can be updated via the World Wide Web.

Computer communications touch everyone’s life. Consider the ATM that “knows” a bank
balance even though it is located 500 miles from the bank. Many e-mail programs allow
users to send “registered mail” with a return receipt guaranteeing the recipient received the
message. E-mail and personal information management (PIM) software sometimes also are
considered part of groupware. Although e-mail has assumed an important role in business
messages, traditional paper letters and memos still are used In fact, some maintain that the
amount of paper correspondence has increased.

Web Applications
Web applications can be a better buy than packaged applications. For example, a $50
packaged antivirus program can be replaced by a Web application that costs less than $30
annually, is updated frequently, and uses less space on a hard disk. In addition, packaged
software might include features you will never use, which increases the cost of the package.
Often, you can use the standard version of a similar Web application for less money or even
for free, and only pay more for the additional features you want. Web applications can save
businesses money with reduced installation, upgrade, and maintenance costs. Some social
analysts believe that the lower cost of Web applications also can help close the “digital
divide.”

For Web application vendors, benefits include easier updating and debugging (error
correcting), removal of packaging and distribution costs, and elimination of software piracy
(the illegal copying and selling of software). Despite their advantages, analysts point out that
Web applications may not be right for everyone. For some consumers, paying a monthly fee
ultimately costs more than the one-time purchase of packaged software. Also, many
households do not have the fast Internet connection needed for certain Web applications to
run smoothly. Finally, some people worry that files stored at a Web application site can be
infected with viruses. Web application vendors believe these worries are groundless and that
Web applications benefit both buyers and sellers.

Learning Aids
In many applications, an audible “beep” indicates an error, and the last entry should be
reviewed. Function key f1 often is used to activate the Help feature. Some applications have
a Help button that, when clicked, changes the mouse pointer to a Help arrow. This arrow can
be used to obtain help on a command, button, or bar by pointing at the item and clicking.
Many software developers have eliminated user’s manuals in favor of extensive online Help.
Computer stores occasionally carry a few trade books, but entire aisles of computer-related
books can be found in most large book stores.

For some applications, other learning aids, such as tutorials or keyboard templates, are
available. Tutorials are step-by-step instructions using real examples that show how to use
an application. Tutorials can be printed, software-based, or Internet-based. Keyboard
templates (plastic sheets that fit around a portion of the keyboard) illustrate the keyboard
commands for various tasks. Wizards can be used to help create memorandums, meeting
agendas, fax cover sheets, flyers, letters, resumes, charts, forms, reports, awards, pleadings,
calendars, postcards, envelopes, mailing labels, newsletters, and Web pages. Some
applications also offer document templates, which are special documents that provide basic

31
Basic Information Technology Concepts

tools for shaping a final document. The availability of learning aids and support tools is an
important consideration in selecting an application package.

32
Basic Information Technology Concepts

CHAPTER 4

THE COMPONENTS OF THE SYSTEM UNIT

Overview
 Describe the components in the system unit

 Explain how the CPU uses the four steps of a machine cycle to process data
 Define a bit and describe how a series of bits represents data
 Differentiate between the various types of memory
 Describe the types of expansion slots and cards in the system unit
 Explain the difference between a serial, a parallel, and a USB port
 Describe how buses contribute to a computer's processing speed
 Identify components in a notebook computer
 Identify components in a handheld computer

Chapter presents the components in the system unit, described how memory stores data,
instructions, and information, and discusses the sequence of operations that occur when a
computer executes an instruction. The chapter included a comparison of various
microprocessors on the market today.

Describe the components in the system unit


The system unit, sometimes called the chassis, is a box-like case housing the electronic
components of a computer that are used to process data. System unit components include
the processor, memory module, cards, ports, and connectors. Many of the system unit’s
components reside on a circuit board called the motherboard. The motherboard contains
many different types of chips, or small pieces of semiconducting material, on which one or
more integrated circuits (IC) are etched. An integrated circuit is a microscopic pathway
capable of carrying electronic current. Each IC can contain millions of transistors, which act
as switches for electronic signals.

Explain how the CPU uses the four steps of a machine cycle
to process data
The central processing unit (CPU), also called a processor, significantly impacts overall
computing power and manages most of a computer’s operations. The CPU contains the
control unit and the arithmetic/logic unit.

The control unit directs and coordinates most of the operations in the computer. For every
instruction, the control unit repeats a set of four basic operations called the machine cycle:

 fetching the instruction or data item from memory,

 decoding the instruction into commands the computer understands,

 executing the commands, and, if necessary,

33
Basic Information Technology Concepts

 Storing, or writing the result to memory.

The arithmetic/logic unit (ALU) performs the execution part of the machine cycle. Specifically,
the ALU carries out three operations:

Arithmetic operations – performing calculations, which include addition, subtraction,


multiplication, and division
Comparison operations – comparing data items to determine if the first item is greater than,
equal to, or less than the other item
Logical operations – working with conditions and logical operators such as AND, OR, and
NOT

Compare and contrast various personal computer processors


on the market today

A personal computer’s CPU usually is contained on a single chip, which some call a
microprocessor.

Intel is a leading manufacturer of personal computer processors.


Most high-performance PCs use a processor from Intel called the Pentium® processor.

A second Intel brand, called the Celeron™, is designed for less expensive PCs.

Two more brands, called the Xeon™ and Itanium™ processors, are ideal for workstations
and low-end servers. Intel-compatible processors have the same internal design as Intel
processors and perform the same functions, but are made by other companies and often are
less expensive.

An alternative design to the Intel-style processor, the Motorola processor, is found in Apple
Macintosh and Power Macintosh systems.

A new type of processor designed for lower-costing personal computers and Internet
appliances, called an integrated CPU, combines functions of a processor, memory, and a
video card on a single chip.

Today’s processors are equipped with MMX™ technology, a built-in set of instructions that
manipulates and processes multimedia data more efficiently. Intel’s SSE instructions and
AMD’s 3DNow!™ are two other technologies that improve a processor’s performance of
multimedia, the Web, and 3-D graphics. To optimize and extend battery life for notebook
computers, Intel® mobile processors use SpeedStep™ technology and AMD processors use
PowerNow!™ technology.

Define a bit and describe how a series of bits represents


data
Most computers are digital, meaning they understand only two discrete states: on and off.
These states are represented using two digits, 0 (off) and 1 (on). Each on or off value is
called a bit (short for binary digit), the smallest unit of data a computer can handle. Eight bits
grouped together as a unit form a byte. A byte provides enough different combinations of 0s

34
Basic Information Technology Concepts

and 1s to represent 256 individual characters including numbers, letters of the alphabet,
punctuation marks, and other characters.

The combinations of 0s and 1s used to represent data are defined by patterns called coding
schemes. Popular coding schemes are ASCII, EBCDIC, and Unicode. Coding schemes
make it possible for humans to interact with a digital computer that recognizes only bits.
Every character you type on a keyboard is converted into a corresponding byte, a series of
on/off electrical states the computer can process.

Differentiate between the various types of memory

Memory is a temporary storage place for data, instructions, and information. Memory stores
the operating system, application programs, and the data processed by application
programs. A byte is the basic storage unit in memory. Memory size is measured by the
number of bytes available for use.

 A kilobyte (KB or K) of memory is approximately one thousand bytes,

 a megabyte (MB) is approximately one million bytes, and

 a gigabyte (GB) is approximately one billion bytes.

The system unit contains several types of memory.

RAM (random access memory) consists of memory chips that the processor can read from
and write to. Most RAM is volatile memory, meaning that its contents are lost when the
computer’s power is turned off. Two basic types of RAM chips are dynamic RAM and static
RAM.
Dynamic RAM (DRAM) must be re-energized constantly or it loses its contents.

Static RAM (SRAM) is faster and more reliable than DRAM and has to be re-energized less
often, but it is much more expensive.

Memory cache, also called a cache store or RAM cache, improves processing time by storing
frequently used instructions and data.
ROM (read-only memory) refers to memory chips that only can be read and used; that is,
they cannot be modified. ROM is non-volatile memory (NVM), meaning that its contents are
not lost when the computer’s power is turned off. A variation of the ROM chip, called
programmable read-only memory (PROM), is a blank chip on which you can place items
permanently.

Flash memory, also known as flash ROM or flash RAM, is non-volatile memory that can be
erased electronically and reprogrammed.

Complementary metal-oxide semiconductor (CMOS) memory, another type of memory chip,


stores configuration information about the computer and uses battery power to retain
information when the power to the computer is off.

35
Basic Information Technology Concepts

Describe the types of expansion slots and cards in the


system unit

An expansion slot is an opening, or socket, where you can insert a circuit board into the
motherboard. These circuit boards – called cards, expansion cards, boards, expansion
boards, adapters, adapter cards, interface cards, add-ins, or add-ons -- add new devices or
capabilities to the computer. Four types of expansion cards found in most computers are a
video card, a sound card, a network interface card, and a modem card.

A video card converts computer output into a video signal that is sent through a cable to the
monitor, which displays an image.

A sound card enhances the sound-generating capabilities of a personal computer by


allowing sound to be input through a microphone and output through speakers.

A network interface card (NIC) is a communications device that allows the computer to
communicate via a network.

A modem card is a communications device that enables computers to communicate via


telephone lines or other means. Many of today’s computers support Plug and Play, a
capability with which the computer automatically can configure expansion boards and other
devices as you install them.

Notebook and other portable computers have a special type of expansion slot used for
installing a PC Card, which is a thin credit card-sized device that adds memory, disk drives,
sound, fax/modem, and communications capabilities to a mobile computer.

Explain the difference between a serial, a parallel, and a


USB port

A cable often attaches external devices to the system unit. A port is the interface, or point of
attachment, to the system unit. Ports have different types of connectors, which are used to
join a cable to a device. Male connectors have one or more exposed pins, while female
connectors have matching holes to accept the pins.

Most computers have three types of ports: serial, parallel, and USB.

A serial port is a type of interface that connects a device to the system unit by transmitting
data only one bit at a time. Serial ports usually connect devices that do not require fast data
transmission rates, such as a mouse, keyboard, or modem.

A parallel port is an interface that connects devices by transferring more than one bit at a
time. Many printers connect to the system unit using a parallel port.

A universal serial bus (USB) port can connect up to 127 different peripheral devices with a
single connector type, greatly simplifying the process of attaching devices to a personal
computer.

36
Basic Information Technology Concepts

Describe how buses contribute to a computer's processing


speed
Bits are transferred internally within the circuitry of the computer along electrical channels.
Each channel, called a bus, allows various devices inside and attached to the system unit to
communicate with each other.

The bus width, or size of the bus, determines the number of bits that can be transferred at
one time. The larger the bus width, the fewer number of transfer steps required and the
faster the transfer of data.

In most computers word size (the number of bits the CPU can process at a given time) is the
same as the bus width.

Every bus also has a clock speed. The higher the bus clock speed, the faster the
transmission of data, which results in applications running faster.

A computer has two basic types of buses.

A system bus connects the CPU to main memory.

An expansion bus allows the CPU to communicate with peripheral devices.

Identify components in a notebook computer


Users with mobile computing needs often have a mobile computer, such as a notebook
computer and/or handheld computer. A notebook computer, also called a laptop computer,
can run either using batteries or using a standard power supply. In addition to the
motherboard, processor, memory, sound card, PC Card slot, and drive bay, the system unit
for a notebook computer also houses other devices, such as the keyboard, pointing device,
speakers, and display.
Identify components in a handheld computer
Handheld computers run strictly on battery. Similar to desktop and notebook computers,
handheld computers have a system unit that contains electronic components that process
data. A handheld computer’s system unit also contains a display and may house speakers
and some form of keyboard and/or pointing device. Handheld computers often have an IrDA
port so you can communicate wirelessly with other computers. Many also include a serial
port.

Expand Your Knowledge


 The system unit
 The CPU
 Processor comparison
 Data representation
 Memory
 Expansion slots and expansion cards
 Ports
 Buses
 Notebook computers

37
Basic Information Technology Concepts

 Handheld computers

The System Unit


The motherboard in the system unit contains different types of chips. Manufacturers package
chips so the chips can be attached to circuit boards, such as the motherboard.

Types of chip packages include:

Dual inline package (DIP), which consists of two parallel rows of downward-pointing thin
metal feet (pins)

Pin grid array (PGA) package, which holds a larger number of pins because the pins are
mounted on the surface of the package

Flip chip-PGA (FC-PGA) package, which places chips on the opposite side (flip side) of the
pins

Single edge contact (SEC) cartridge, which connects to the motherboard on one of its
edges

The CPU
The power of personal computer processor chips (the chips that contain the CPU) has grown
at an astounding rate. As chips become older and more widely used, price cuts usually are
introduced.

Several factors affect CPU processing speed. CPUs in most of today’s personal computers
use pipelining, a technique that increases processing speed by beginning execution of a
second machine cycle instruction before the first instruction is completed. CPUs also use
high-speed storage locations, called registers, to hold data and instructions temporarily. The
control unit relies on a small chip called the system clock to synchronize all computer
operations. The speed at which a processor executes instructions is called clock speed, or
clock rate, and is measured in megahertz (MHz). The system clock is a major factor affecting
processor speed. A higher clock speed means the CPU can process more instructions per
second.

Processor Comparison

Although once frequently used, the term “microprocessor” is much less common today.
Sometimes you can upgrade your processor to increase the computer’s performance. There
are three forms of upgrades:

 With a chip for chip upgrade, the existing processor chip is replaced with a new one

 With a piggyback upgrade, the new processor is stacked on top of the old one

 With a daughterboard upgrade, the new processor is on a small circuit board (the
daughterboard) that plugs into the motherboard

The past three years have seen a steady drop in the cost of computers. PC prices plunged
as a result of lower prices for processors, memory chips, and hard drives. Consumers also

38
Basic Information Technology Concepts

are showing increased interest in new less powerful, but less expensive, personal computers
that work perfectly well for the most popular uses – word processing, Internet access, and
spreadsheet applications. The surge in low-priced computer sales has had an impact on
Intel, the world’s largest processor manufacturer. By focusing on making inexpensive
processor chips, rivals AMD and Cyrix are making inroads into Intel’s dominance. Intel’s
response, the Celeron™, has proven popular, but the lower-priced chip offers a smaller profit
margin.

Data Representation

Just as the decimal system (10 digits) is suited to human anatomy (10 fingers), the binary
system (2 digits) is perfect to represent the on-off states (2 states) of a computer. Basic
coding standards make it possible for components within computers to communicate, allow
manufacturers to be confident that the components they produce will operate correctly in a
computer, and enable consumers to purchase components that are compatible with their
systems. In the ASCII-8 and EBCDIC codes, the first four characters represent the zone, and
the last four characters represent the digits 1 through 8. ASCII, originally a seven-bit code,
was expanded to eight bits in an effort to provide for symbols used in other nations. Unicode,
a 2-byte (16-bit) code, can represent 216, or 65,536, characters. The system employs the
codes used by ASCII and also includes other alphabets (such as Cyrillic and Hebrew),
special characters (including religious symbols), and some of the “word writing” symbols
used by various Asian countries.

Memory
Because computers use the binary number system, the actual values for the units in which
memory and storage are measured are based on powers of 2. For example, one kilobyte =
210 = 1,024.

RAM’s volatility, and its ability to be changed, are its most distinguishing characteristics.
When RAM is purchased it comes in banks of nine chips – eight are needed to represent a
byte and the ninth is needed for parity. RAM chips usually are packaged on small circuit
boards called single inline memory modules (SIMMs) or dual inline memory modules
(DIMMs) that are inserted into the motherboard. During the past 20 years, the price of RAM
has dropped an average of 20 percent each year, but its capacity has more than doubled
every two years.

Similar to flash ROM, another variation of ROM, called EEPROM (electrically erasable
programmable read-only memory), can be erased electrically and rewritten. Because of its
non-volatile nature, EEPROM is used in electronic cash registers to store item prices.

The amount of time it takes the processor to read data from memory, called access time,
directly affects how fast the computer can process data. Memory access time is measured in
terms of nanoseconds, or billionths of a second.

39
Basic Information Technology Concepts

CHAPTER 5

INPUT

Overview

 Describe the two types of input


 List the characteristics of a keyboard
 Identify various types of keyboards
 Identify various types of pointing devices
 Explain how a mouse works
 Describe different mouse types
 Explain how voice recognition works
 Understand how to input data into a handheld computer
 Identify the uses of a digital camera
 Describe the various techniques used for video input
 Describe the uses of PC video cameras and web cams
 Explain how scanners and other reading devices work
 Identify alternative input devices for physically challenged users

In this chapter, you learn what input is and what input devices are. The keyboard is
presented and different keyboard types are described. You are introduced to various pointing
devices, such as the mouse, trackball, touchpad, pointing stick, joystick, touch screen, and
pen input. Scanners and reading devices, including optical scanners, optical readers,
magnetic ink character recognition readers, and data collection devices are explained. You
learn about digital cameras, audio input, speech recognition, video input, and
videoconferencing. Finally, input devices for physically challenged users are explored.

Describe the two types of input

Input is any data or instructions entered into the memory of a computer. Two types of input
are data and instructions.

Data is a collection of unorganized items that can include words, numbers, pictures, sounds,
and video. A computer processes data into information, which is organized, meaningful, and
useful.
Instructions can be in the form of programs, commands, or user responses.

A program is a series of instructions that tells a computer how to perform the tasks
necessary to process data into information.

40
Basic Information Technology Concepts

A command is an instruction given to a computer program.

A user response is an instruction you issue to the computer by responding to a question


posed by a computer program.

Any hardware component that allows you to enter data, programs, commands, and user
responses into a computer is an input device.

List the characteristics of a keyboard

The keyboard is an input device that contains keys you press to enter data into a computer.
Desktop computer keyboards usually have from 101 to 105 keys, while keyboards for smaller
computers contain fewer keys.

All keyboards have a typing area used to type letters of the alphabet, numbers, punctuation
marks, and other basic characters.
Many desktop computer keyboards also have

 a numeric keypad designed to make it easier to enter numbers,


 function keys programmed to issue commands and accomplish certain tasks,
 arrow keys used to move the insertion point (a symbol on the screen that indicates where
the next typed character will display), and
 Toggle keys that can be switched between two different states.

Identify various types of keyboards

A standard computer keyboard sometimes is called a QWERTY keyboard because of the


layout of its typing area.

An enhanced keyboard has 12 function keys along the top row, 2 ctrl keys, 2 alt keys, and a
set of arrow and additional keys between the typing area and the numeric keypad.

Cordless keyboards transmit data via infrared light waves.

Keyboards for notebook and handheld computers usually have smaller and fewer keys than
desktop computers.

A portable keyboard is a full-sized keyboard you can attach to and remove from a handheld
computer.

Some manufacturers have designed ergonomic keyboards to reduce the chance of


workplace injuries. The goal of ergonomics is to incorporate comfort, efficiency, and safety
into the design of workplace items.
Identify various types of pointing devices
In a graphical user interface, the pointer is a small symbol on the screen. A pointing device is
an input device that allows you to control the pointer. Common pointing devices include the
mouse, trackball, touchpad, pointing stick, joystick, touch screen, light pen, and a stylus.

 A mouse is a pointing device, designed to fit comfortably under the palm of your hand,
that is moved across a flat surface.

41
Basic Information Technology Concepts

 A trackball is a stationary pointing device with a ball mechanism on its top.


 A touchpad is a flat, rectangular pointing device that is sensitive to pressure and motion.
 A pointing-stick is a pressure-sensitive pointing device shaped like a pencil eraser that is
positioned between keys on the keyboard.
 A joystick is a vertical lever mounted on a base.
 A light pen is a handheld device that contains a light source or can detect light.
 A touch screen is a touch-sensitive display on the screen.
 A stylus looks like a ballpoint pen but uses pressure, instead of ink, to write text and draw
lines.
 An electronic pen can be used on a graphics tablet, which consists of a flat, rectangular,
electronic plastic board used to input graphical data.

Explain how a mouse works


As you move a mouse across a flat surface, the movement is translated into signals that are
sent to the computer, and the pointer on the screen also moves. When you move the mouse
to the right, the pointer moves to the right on the screen. For Windows users, the top of a
mouse has at least two buttons and sometimes also a wheel. Generally, you use a mouse to
move the pointer on the screen to an object and then press a button, or click, to perform a
certain action on that object. Other operations you can perform using a mouse include right-
click, double-click, drag, right-drag, rotate wheel, and press wheel button.

Describe different mouse types

A mechanical mouse has a rubber or metal ball on its underside. When the ball rolls in a
certain direction, electronic circuits in the mouse translate the movement into signals that are
sent to the computer. For better traction, you should place a mechanical mouse on a mouse
pad.

An optical mouse has no moving parts; instead it uses devices that emit and sense light to
detect the mouse’s movement. An optical mouse can be used on nearly all surfaces, is more
precise than a mechanical mouse, and does not require cleaning.

A cordless mouse, or wireless mouse, is a battery powered device that transmits data using
wireless technology, such as radio waves or infrared light waves. A cordless mouse uses
technology very similar to that of a cordless keyboard.

Explain how voice recognition works

Voice input is the process of entering data by speaking into a microphone that is attached to
the sound card on a computer. Voice recognition is the computer’s capability of
distinguishing spoken words. The first voice recognition programs were speaker dependent.
With speaker-dependent software, the computer makes a profile of your voice, which means
you have to train the computer to recognize your voice. Today, most voice recognition
programs use speaker-independent software, which has a built-in set of word patterns and
does not have to be trained to recognize your voice. Some voice recognition software
requires discrete speech, meaning that you have to speak slowly and separate each word
with a short pause. Most voice recognition products, however, support continuous speech,
allowing you to speak in a flowing conversational tone.

Understand how to input data into a handheld computer

42
Basic Information Technology Concepts

To satisfy the input needs of many different types of users, handheld computers provide
many different ways to input data. A handheld computer typically includes a basic stylus.
With the stylus, you can enter data using an on-screen keyboard or using handwriting
recognition software that translates handwritten letters and characters into symbols the
computer understands. Other input alternatives available with some handheld computers
include attaching a full-sized keyboard, transferring data from a desktop computer, using
voice input, and attaching a digital camera.

Identify the uses of a digital camera

A digital camera is used to take pictures and store the photographed images digitally instead
of on traditional film. Pictures are stored on a storage medium, such as a floppy disk,
SuperDisk, Clik! disk, PC Card, compact flash card, memory stick, mini-CD, or microdrive.
Many digital cameras allow you to review and edit the images while they are in the camera.
You also can download, or transfer a copy of, the stored image to a computer. Once on a
computer, the pictures can be edited with photo-editing software, printed, faxed, sent via
electronic mail, included in another document, or posted to a Web site.

There are three basic types of digital cameras.

A studio camera is a stationary digital camera used for professional studio work.

A field camera is a portable camera, often used by photojournalists, that has many lenses
and other attachments.

A point-and-shoot camera is more affordable and lightweight and provides acceptable


quality photographic images for the home or small business user.

Describe the various techniques used for video input

Video input, or video capture, is the process of entering a full-motion recording into a
computer and storing the video on a storage medium.

Many video devices use analogue video signals. To input video from these devices, the
device is plugged into a video capture card, an expansion card that converts the analogue
signal into a digital signal the computer can understand.

A digital video (DV) camera is a new generation of video camera that records video as digital
signals, instead of using analogue signals, and therefore does not require a video capture
card. Video files can demand huge amounts of storage space.

Video compression reduces the size of video files by recognizing that only a small portion of
an image changes from frame to frame. Instead of storing every frame in its entirety, a video
compression program might store an initial frame and then store only the changes from one
frame to the next.

43
Basic Information Technology Concepts

A video decoder is a card that decompresses video. A video digitizer can be used to capture
an individual frame from a video and save the still picture in a file.

Describe the uses of PC video cameras and Web cams

A PC camera is a DV camera that allows home users to record, edit, capture video and still
images, and make video telephone calls on the Internet. During a video telephone call, both
parties can see each other as they talk. Although usually placed on top of the monitor and
attached to a computer’s USB port, some PC cameras are portable and can be used
anywhere.

44
Basic Information Technology Concepts

CHAPTER 6

OUTPUT

Overview

 Define the four categories of output


 Identify the different types of display devices
 Describe factors that affect the quality of a display device
 Identify monitor ergonomic issues
 Explain the differences among various types of printers
 Describe the uses of speakers and headsets
 Identify the purpose of data projectors, fax machines, and multifunction devices
 Explain how a terminal is both an input and output device
 Identify output options for physically challenged users

In this chapter, you learn what is output and what are output devices. Display devices are
introduced, including CRT monitors, flat-panel displays, video cards, and high-definition
television. You explore monitor quality and monitor ergonomics. Various types of printers are
presented, such as impact printers, non-impact printers, portable printers, plotters and large-
format printers, and special-purpose printers. You find out about audio output and other
output devices, including data projectors, facsimile machines, and multifunction devices.
Finally, you become acquainted with terminals and output devices for physically challenged
users.

Define the four categories of output


Output is data that has been processed into a useful form called information. Four types of
output are text, graphics, audio, and video.

Text consists of characters (letters, numbers, punctuation marks, or any other symbol
requiring one byte of computer storage space) that are used to create words, sentences, and
paragraphs.

Graphics are digital representations of non-text information such as drawings, charts,


photographs, and animation (a series of still images in rapid sequence that gives the illusion
of motion).

Audio is music, speech, or any other sound.

Video consists of images played back at speeds to provide the appearance of full motion.
An output device is any computer component capable of conveying information to a user.

Identify the different types of display devices

45
Basic Information Technology Concepts

A display device is an output device that visually conveys text, graphics, and video
information. Information shown on a display device is called soft copy because the
information exists electronically and is displayed for a temporary period of time. Display
devices include CRT monitors, LCD monitors and displays, gas plasma monitors, and
televisions.

A CRT monitor is a monitor that is similar to a standard television set because it contains a
cathode ray tube. A cathode ray tube (CRT) is a large, sealed, glass tube. The front of the
tube is a screen coated with phosphor material that glows as an electron beam moves back
and forth, which produces an image on the screen.

LCD monitors and LCD displays use liquid crystal to present information on the screen. A
liquid crystal display (LCD) has liquid crystals between two sheets of material. When an
electric current passes through the crystals, they twist, causing some light waves to be
blocked and allowing others to pass through, which creates the images.

Similar to an LCD display, a gas plasma monitor is a flat-panel display. A gas plasma
monitor, however, substitutes a layer of gas for the liquid crystal material. When voltage is
applied, the gas releases ultraviolet light that causes pixels on the screen to glow and form
an image.

An NTSC converter converts a computer’s digital signal into an analogue signal that a
standard television set can display. High-definition television (HDTV) is a type of television
set that works with digital broadcasting signals and supports a wider screen and higher
resolution than a standard television set.

Describe factors that affect the quality of a display device

The quality of a CRT monitor depends largely on its resolution, dot pitch, and refresh rate.
The quality of an LCD monitor or display depends primarily on its resolution.

A CRT monitor’s screen is coated with tiny dots of phosphor material, called pixels, that glow
when electrically charged to produce an image.

Resolution, which describes the sharpness and clearness of that image, is related directly to
the number of pixels a monitor can display. The greater the number of pixels the display
uses, the better the quality of the image.

Dot pitch, a measure of image clarity, is the distance between each pixel on a display. The
smaller the distance between pixels (dot pitch), the sharper the image.

Refresh rate is the speed that a monitor redraws images on the screen. Refresh rate should
be fast enough to maintain a constant, flicker-free image.

The resolution of an LCD monitor or display generally is proportional to the size of the
monitor or display. That is, the resolution increases for larger monitors and devices.

Identify monitor ergonomic issues

46
Basic Information Technology Concepts

The goal of ergonomics is to incorporate comfort, efficiency, and safety into the design of
items in the workplace. Features that address monitor ergonomic issues include controls to
adjust the brightness, contrast, positioning, and height and width of images. Newer monitors
have digital controls that allow you to fine-tune the display. Many monitors also have a tilt
and swivel base so the angle of the screen can be altered to minimize neck strain and glare.
Monitors produce a small amount of electromagnetic radiation (EMR), which is a magnetic
field that travels at the speed of light. High-quality monitors should comply with MPR II, a
standard that defines acceptable levels of EMR for a monitor.

Explain the differences among various types of printers

A printer is an output device that produces text and graphics on a physical medium such as
paper or transparency film. Printed information is called hard copy because the information
exists physically and is a more permanent from of output. Printers can be grouped in two
categories: impact and non-impact.

Impact printers form characters and graphics by striking a mechanism against an ink ribbon
that physically contacts the paper.

A dot-matrix printer is an impact printer that prints images when tiny wire pins on a print
head mechanism strike an inked ribbon.

A line printer is an impact printer that prints an entire line at one time. Two popular types of
line printers are band printers and shuttle-matrix printers.

Non-impact printers form characters and graphics without actually striking the paper.

An ink-jet printer is a non-impact printer that sprays drops of ink onto a piece of paper.

A laser printer is a non-impact printer that creates images using a laser beam and powdered
ink, called toner.

A thermal printer is a non-impact printer that generates images by pushing electrically


heated pins against heat-sensitive paper. Although the print quality of standard thermal
printers generally is low, two special types of thermal printers, thermal wax-transfer printers
and dye-sublimation printers, have a much higher print quality.

Some printers are used for special purposes.

A photo printer is a colour printer that can produce photo lab quality pictures as well as
printing everyday documents.

A label printer is a small printer that prints on an adhesive type material that can be placed
on a variety of items.

A portable printer is a small, lightweight printer that allows a mobile user to print from a
notebook or handheld computer while travelling.

Plotters are sophisticated printers used to produce high-quality drawings such as blueprints,
maps, and circuit diagrams.

47
Basic Information Technology Concepts

A large-format printer, which operates like an ink-jet printer but on a larger scale, creates
photo-realistic quality colour prints.

Describe the uses of speakers and headsets


An audio output device produces music, speech, or other sounds. Two commonly used audio
output devices are speakers and headsets.

Most personal computers have an internal speaker that outputs low-quality sound. Many
users add high-quality stereo speakers or purchase PCs with larger speakers built into the
sides of the monitor. A woofer can be added to boost low bass sounds.

A headset plugged into a port on the sound card allows only the user to hear sound from the
computer.

Identify the purpose of data projectors, fax machines, and


multifunction devices

A data projector takes the image on a computer screen and projects it onto a large screen
so that an audience of people can see the image. Two smaller, lower priced data projectors
are an LCD projector, which uses liquid crystal display technology, and a digital light
processing (DLP) projector, which uses tiny mirrors.

A facsimile (fax) machine transmits and receives documents over telephone lines. A fax
modem is a communication device that allows you to send (and sometimes receive)
electronic documents as faxes.

A multifunction device (MFD) is a single piece of equipment that looks like a copy machine
but provides the functionality of a printer, scanner, copy machine, and sometimes a fax
machine.

CHAPTER 7

STORAGE

Overview
 Differentiate between storage and memory

 Identify various types of storage media and storage devices


 Explain how a floppy disk stores data
 Identify the advantages of using high-capacity disks
 Describe how a hard disk organizes data
 Identify the advantages of using an Internet hard drive

48
Basic Information Technology Concepts

 Explain how a compact disc stores data


 Understand how to care for a compact disc
 Differentiate between CD-ROMs, CD-RWs, and DVD-ROMs
 Identify the uses of tape
 Understand how an enterprise storage system works
 Explain how to use PC cards and other miniature storage media
 Identify uses of microfilm and microfiche

This chapter explains various storage media and storage devices. Students discover how
memory is different from storage. Floppy disks are introduced, and characteristics of a floppy
disk, floppy disk drives, care of floppy disks, and high-capacity floppy disks are presented.
Hard disks are explained, and students find out about characteristics of a hard disk, how a
hard disk works, removable hard disks, hard disk controllers, RAID, and maintaining data on
a hard disk. Compact discs, including CD-ROMs and DVD-ROMs, are described. Finally,
students learn about tapes, PC Cards, and other types of storage such as smart cards,
microfilm and microfiche.

Differentiate between storage and memory

Memory, which is composed of one or more chips on the motherboard, is a temporary


holding place for data and instructions during processing. The contents of volatile memory,
such as RAM, are lost when the power to the computer is turned off. The contents of
nonvolatile memory, such as ROM, are not lost when power is removed from the computer.

Storage holds items such as data, instructions, and information for future use; that is, storage
holds these items while they are not being processed. Storage is nonvolatile, which means
the items in storage are retained even when power is removed from the computer. Compared
to memory, the access time (the time it takes to locate a single item) for storage is slow.

Identify various types of storage media and storage devices

A storage medium (media is the plural) is the physical material on which items are kept. A
storage device is the computer hardware that records and retrieves items to and from a
storage medium. Storage devices can function as sources of input and output.

When storage devices transfer items from a storage medium into memory – a process called
reading – they function as sources of input.

When storage devices transfer items from memory to a storage medium – a process called
writing – they function as sources of output.

Types of storage media include floppy disks, hard disks, compact discs, tape, PC Cards,
microfilm, and microfiche.

49
Basic Information Technology Concepts

Explain how a floppy disk stores data

A floppy disk is a portable, inexpensive storage medium that consists of a thin, circular,
flexible plastic disk with a magnetic coating enclosed in a square-shaped plastic shell. A
floppy disk drive (FDD) is a device that can read from and write on a floppy disk. When you
insert a floppy disk into a floppy disk drive, a shutter on the disk’s plastic shell slides to the
side to expose the disk’s recording surface. A floppy disk is a type of magnetic media
because it uses magnetic patterns to store items.

Data is stored in tracks and sectors. A track is a narrow recording band that forms a full circle
on the surface of the disk. The disk’s storage locations consist of pie-shaped sections, which
break the track into small arcs called sectors. For reading and writing purposes, sectors are
grouped into clusters. A cluster consists of two to eight sectors and is the smallest unit of
space used to store data. Formatting is the process of preparing a disk for reading and
writing.

Identify the advantages of using high-capacity disks

A high-capacity disk drive is a disk drive that uses disks with capacities of 100 MB and
greater (remember, a typical floppy disk can store only up to 1.44 MB). High-capacity disks
are used to store large graphics, audio, or video files and for backup. A backup is a duplicate
of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.

Three high-capacity disk drives are the SuperDisk™ drive, the HiFD™ drive, and the Zip®
drive.

The SuperDisk™ drive reads from and writes on a 120 MB or 250 MB SuperDisk™.

The HiFD™ (High-Capacity FD) drive reads from and writes on a 200 MB HiFD™ disk.

The Zip® drive is a high-capacity disk drive that uses a Zip® disk. The Zip® disk is larger
and thicker than a 3.5-inch floppy disk and can store 100 MB or 250 MB of data.

Describe how a hard disk organizes data

A hard disk, or hard disk drive, consists of several inflexible, circular platters that store items
electronically. A platter in a hard disk is made of aluminium, glass, or ceramic and is coated
with a material that allows items to be recorded magnetically on its surface. Each platter has
two read/write heads, one for each side. Because of the stacked arrangement of the platters,
the location of the read/write heads often is referred to by its cylinder, which is the location of
a single track through all platters. Some computers improve hard disk access time by using a
disk cache, which is a portion of memory that the processor uses to store frequently
accessed items. A hard disk can be divided into separate areas, called partitions, each of
which functions as if it were a separate hard disk drive.

Identify the advantages of using an Internet hard drive

50
Basic Information Technology Concepts

An Internet hard drive is a service on the Web that provides storage to computer users.
People use Internet hard drives to:

Eliminate the need to transport files when away from a desktop computer

Instantaneously save large audio, video, and graphics files when surfing the Web

Make audio files, video clips, or pictures available to family, friends, co-workers, and
customers

Immediately view time-critical data and images while away from a main office or location

Store offsite backups of data

Explain how a compact disc stores data

A compact disc (CD) is a flat, round, portable metal storage medium that usually is 4.75
inches in diameter and less than one-twentieth of an inch thick. Compact discs store items
using microscopic pits (indentations) and land (flat areas) that are in the middle layer of the
disc. A high-powered laser light creates the pits in a single track, divided into evenly spaced
sectors, that spirals from the centre to the edge of the disc. A low-powered laser reads items
by reflecting light off the disc surface. The reflected light is converted into a series of bits that
the computer can process.

Understand how to care for a compact disc

With proper care, a compact disc is guaranteed to last five years, but could last up to 50
years. Compact discs should not be stacked or exposed to excessive heat, cold, sunlight, or
contaminants. A compact disc should be held by its edges (do not touch the underside of the
disc) and placed in its protective case, called a jewel box, when it is not being used. You can
clean the bottom surface with a soft cloth and warm water or a specialized CD cleaning kit,
and you can repair scratches on the bottom surface with a specialized compact disc repair
kit.

Differentiate between CD-ROMs, CD-RWs, and DVD-ROMs

A CD-ROM, or compact disc read-only memory, is a compact disc that uses the same laser
technology as audio CDs. For a computer to read items stored on a CD-ROM, you insert the
disc into a CD-ROM drive or CD-ROM player. When viewing animation or video, the speed of
a CD-ROM drive, or data transfer rate, is important. A higher the data transfer rate, results in
smoother playback of images and sounds.

Most standard CDs are single-session because manufacturers record (write) all items to the
disc at one time. Variations of standard CD-ROMs, such as PhotoCD, CD-R (compact disc-
recordable), and CD-RW (compact disc-rewritable), are multisession, which means additional
data, instructions, and information can be written at a later time.

51
Basic Information Technology Concepts

A PhotoCD is a compact disc that contains digital photographic images.

A CD-R (compact disc-recordable) is a multisession compact disc onto which you can
record your own items.

A CD-RW (compact disc-rewritable) is an erasable disc you can write on multiple times.

A DVD-ROM (digital video disc-ROM) is an extremely high-capacity compact disc capable


of storing from 4.7 GB to 17 GB. In order to read a DVD-ROM, you must have a DVD-ROM
drive. You also can obtain recordable and rewritable versions of DVD.

A DVD-R (DVD-recordable) allows you to write on it once and read (play) it many times.

With the new rewritable DVD, called a DVD+RW, you can erase and record on the disc
multiple times.

Identify the uses of tape

Tape, one of the first storage media used with mainframe computers, is a magnetically-
coated ribbon of plastic capable of storing large amounts of data and information at low cost.
Because it requires sequential access, or consecutive reading and writing of data, tape is
used for long-term storage and backup. (Floppy disks, hard disks, and compact discs all use
direct access, which means you can locate a data item immediately, without having to move
through all the items stored in front of it.)

Understand how an enterprise storage system works

An enterprise storage system is a strategy that focuses on the availability, protection,


organization, and backup of storage in a company. To implement an enterprise storage
system, a company uses a combination of techniques.

 A server stores items needed by users on a network. A RAID system ensures that
data is not lost.

 A tape library is a high-capacity tape system that works with multiple tape cartridges
for storing backups of data, information, and instructions.

 A CD-ROM jukebox holds hundreds of CD-ROMs that can contain application


programs and data.

 An Internet backup can store data, information, and instructions on the Web.

 A network attached storage (NAC) is an easy way to add hard disk space to a
network.

 A storage area network (SAN) is a high-speed network that connects storage devices.

52
Basic Information Technology Concepts

Explain how to use PC Cards and other miniature storage


media

A PC Card is a thin, credit card-sized device that fits into a PC Card slot on a notebook or
personal computer. PC Cards are used to add storage, memory, communications, and sound
capabilities.

A smart card stores data on a thin microprocessor embedded in a card similar in size to an
ATM card. Two types of smart cards exist: intelligent and memory.

An intelligent smart card contains a processor and has input, process, output, and storage
capabilities.
A memory card has only storage capabilities.

Identify uses of microfilm and microfiche

Microfilm and microfiche store microscopic images of documents on roll or sheet film.
Microfilm uses a 100- to 215-foot roll of film. Microfiche uses a small sheet of film, usually
about four inches by six inches. Libraries and large organizations use microfilm and
microfiche to archive relatively inactive documents and files.

Expand Your Knowledge


 Memory vs. storage
 Storage media and devices
 Floppy disks
 High-capacity disks
 Hard disks
 Advantages of an Internet Hard Drive
 Compact discs
 Caring for compact discs
 CD-ROMs, CD-RWs, and DVD-ROM
 Tape
 Enterprise storage systems
 PC cards and miniature storage media
 Microfilm and microfiche

Memory vs. Storage


In general, memory (RAM) is fast, short-term, and volatile. Storage, on the other hand, is
slower, long-term, and non-volatile. Like non-volatile memory, the contents of storage are
retained when a computer’s power is turned off. Unlike most non-volatile memory, however,
the contents of storage usually can be erased or changed.

Storage Media and Devices


The first computer storage medium was a punched card. Herman Hollerith’s punched card
tabulating machine helped complete the 1890 census in just 2½ years (compared to 8 years
for the 1880 census) at a savings of more than $5 million. Hollerith later founded the
Tabulating Machine Company, which eventually became known as International Business

53
Basic Information Technology Concepts

Machines (IBM). An understanding of storage terms is very important for purchasers, and
users, of storage devices.

 1 Kilobyte (KB) ≈ 1 thousand bytes


 1 Megabyte (MB) ≈ 1 million bytes
 1 Gigabyte (GB) ≈ 1 billion bytes
 1 Terabyte (TB) ≈ 1 trillion bytes
 1 Petabyte (PB) ≈ 1 quadrillion bytes

1 KB stores approximately ½ page of text. Depending on speed and size, rough costs for
RAM are about $40 to $50 per megabyte, while hard disk storage costs are around $0.20 per
megabyte.

Floppy Disks

Although the 5.25-inch floppy disk is physically larger, the storage capacity for a 5.25-inch
floppy disk is less than for a comparable 3.5-inch floppy disk. Because of the 3.5-inch floppy
disk’s greater durability and superior storage capacity, the 5.25-inch floppy disk at best can
be considered a very endangered species. With its rigid plastic shell, it may be difficult to see
the 3.5-inch disk as “floppy.” The name is justified, however, by the disk’s ancestry and the
fact that, if the protective shell is removed, the disk on which the data is written is indeed
floppy. Today, most new computers (although not the new Apple iMac) come with a 3.5-inch
floppy disk drive; a few manufacturers still will, for a price, add a 5.25-inch floppy disk drive.

The procedure for formatting a floppy disk depends on the operating system. Floppy disks
are soft-sectored, meaning that the number of sectors is not predetermined. The cluster
concept creates an odd situation: one file with 100,000 bytes requires less disk space (about
25 clusters at 8 sectors per cluster and 512 bytes per sector) than 1,000 small files of 100
bytes each (1,000 clusters).

A floppy disk spins at about 300 revolutions per minute. When writing data, the floppy disk
drive’s read/write head generates electronic impulses that change the magnetic polarity of
areas along a track to represent the 1 or 0 bits being recorded. When reading data, the
read/write head senses the magnetic areas that have been recorded.

High-Capacity Disks

The three types of high-capacity disks were developed by three different manufacturers:
SuperDisk™ is from Imation, HiFD™ is from Sony Electronics, Inc, and the Zip® drive is from
Iomega.

Although manufacturers always are concerned about software piracy (unlawfully duplicating
or distributing proprietary software), many recommend that users create a backup of
programs before installing them on a computer. Backup guards against system failures, such
as a head crash, and human errors, such as inadvertently deleting key files. If you ever
accidentally delete a file, seek help immediately from a computer support person who
sometimes can recover the “erased” file.

54
Basic Information Technology Concepts

Hard Disks

In the early 1980s, hard disk drives were called “Winchester” drives because they had two
30-megabyte disks, a characteristic reminiscent of the Winchester 30-30 rifle. In addition to
making hard disks more efficient and allowing the installation of multiple operating systems,
large hard disks may be partitioned to:

 Limit software disasters (which usually are confined to one partition)


 Shorten path lengths and assist in file keeping
 Save keystrokes (operating systems usually return to the directory they left)
 Enhance security (different partitions may warrant different safety levels)
 Permit variable frequencies of backup
 Allow unattended backups (smaller partitions may fit on a single tape)

Unlike floppy disk read/write heads, hard disk read/write heads do not touch the disk surface.
Because of the close tolerance between the disk head and the rotating disk surface, hard
disk drives are manufactured in an extremely clean setting, typically cleaner than a hospital
operating room. Many hard disk drives are warranted for five years, but most warranties are
prorated, meaning that if it fails in the first year it can be replaced at 20 percent of the original
cost. All warranties are void, however, if the drive is opened, because contaminated air and
dust render the drive unusable.

On a personal computer, a hard disk controller (HDC) is the interface for the hard disk. Many
external hard drives use a USB port as their interface. Two other types of HDCs are the EIDE
(Enhanced Integrated Drive Electronics) controller, which can support up to four hard disks,
and SCSI (small computer system interface) controllers, which can support multiple disk
drives as well as other peripherals.

A removable hard disk is a disk drive in which a plastic or metal case surrounds the hard disk
so that you can remove it from the drive. Two reasonably priced, removable hard disks are
the Jaz® disk, which can store up to 2 GB, and the Peerless™ disk, which can store up to 20
GB.

A RAID (redundant array of independent disks) system integrates two or more hard disks,
duplicating data, instructions, and information to improve data reliability.

Advantages of an Internet Hard Drive

When your computer’s hard disk is full, an Internet hard drive can provide additional storage
space. Ease of use, number of features, and amount of storage space varies, based on the
specific Internet hard drive Web site. Do you trust the security of online storage services?
What types of information might you store online? What are other advantages and
disadvantages of Internet hard drives?

Compact Discs

Laser disks first were developed by RCA for showing home movies. The 14-inch optical disk
was a derivative of these early 1980s video disks. Advantages that compact discs offer over

55
Basic Information Technology Concepts

hard disks include: greater data density, less expense (bit for bit), increased durability, and
no head crashing.

Caring for Compact Discs

Compare the proper care guidelines for using floppy disks (page 7.9) with the proper care
guidelines for using compact discs (page 7.19). How are the guidelines similar? How are they
different?

CD-ROMs, CD-RWs, and DVD-ROM

On a computer, screen displays for software used to play audio CDs resemble typical CD
players, but the controls are accessed with a pointing device. A single CD-ROM can store the
entire Encyclopedia Britannica with room left over. You write on a CD-R using a CD recorder
or a CD-R drive and special software. To write on a CD-RW disc, you must have CD-RW
software and a CD-RW drive. A multiread CD-ROM drive can read audio CDs, data CDs,
CD-Rs, and CD-RWs.

On one side, a DVD-ROM can store up to 13 times the amount of information that can be
stored on a CD-ROM. Double-sided DVD-ROMs (DVD-ROMs that store data on both sides),
can store up to 26 times the amount of information stored on a CD-ROM.

A DVD+RW is similar to a CD-RW, except it has storage capacities up to 4.7 GB. To write on
DVD+RW discs, you must have a DVD writer.

Along with processor speed, amount of memory, and hard disk capacity, CD-ROM drive
speed is a featured element of almost every personal computer advertisement. Like CD-
ROM drives, DVD-ROM drive speeds are indicated with the letter X to represent the standard
speed of a DVD drive. That speed, however, is considerably faster than the data transfer rate
of the original CD-ROM. While a 24X CD-ROM drive has a data transfer rate of 3,600 KB per
second, a 5X DVD-ROM has a data transfer rate of 6,750 KB per second.

Tape

Magnetic tape was developed in the mid-1950s to replace the earlier method of storing data
on punched cards. To better understand the difference between sequential access and direct
access (or random access), compare an audio cassette tape to a CD-ROM. An audio
cassette tape is sequential; to listen to the fourth song it is necessary to listen to (or fast-
forward through) the first three songs. A CD is direct; it is possible to go straight to the fourth
song. For what applications would sequential storage be appropriate? For what applications
would it be unsuitable? Tape cartridges can be purchased formatted or unformatted. One-
quarter-inch wide cartridge tapes typically are 600 feet long. Unattended tape backup is a
great time saver. Consider how many 1.44 MB floppy disks are needed and how much time
is required (removing disks as they become full and inserting new disks) to back up 150 MB
of data. With tape backup, you can press a key, go about other business, and return to
remove the finished backup tape.

56
Basic Information Technology Concepts

Enterprise Storage Systems


Large business users often utilize an enterprise storage system strategy. Why? What makes
an enterprise storage system strategy attractive to large business users?

PC Cards and Miniature Storage Media


Smart cards can hold the equivalent of 30 typewritten pages of data and cost from $5 to $50.
Smart card readers are about $100. As a storage media for an individual’s medical history,
smart cards offer obvious benefits. The cards can be carried in a wallet with, or in lieu of, an
insurance card, providing both insurance records and an immediate, up-to-date medical
history. A form of smart cards, called Personal Information Carriers (PICs) is being adopted
by the army to replace dog tags. Think of other ways that smart cards and electronic money
(e-money) could be used. Will digital cash someday replace conventional currency? Why or
why not?

Microfilm and Microfiche


Microfilm and microfiche images are so small that they can be read only with a microfilm and
microfiche reader. Large organizations use microfilm and microfiche to archive inactive files.

57
Basic Information Technology Concepts

CHAPTER 8

OPERATING SYSTEMS AND UTILITY PROGRAMS

Overview
 Describe the two types of software
 Understand the startup process for a personal computer
 Describe the term user interface
 Explain features common to most operating systems
 Know the difference between stand-alone operating systems and network operating
systems
 Identify various stand-alone operating systems
 Identify various network operating systems
 Recognize devices that use embedded operating systems
 Discuss the purpose of the following utilities: file viewer, file compression, diagnostic,
uninstaller, disk scanner, disk defragmenter, backup, and screen saver

System software is an essential part of a computer system. This chapter defines system
software and discusses two types of system software: operating systems and utility
programs. You learn what an operating system is and explore user interfaces, operating
systems features, and operating system functions. A variety of popular operating systems are
described including DOS, Windows 3.x, Windows 95, Windows 98, Windows 2000, Windows
XP, Windows CE, the Mac OS, OS/2, UNIX, Linux, and NetWare. You discover what
happens when they start a computer and why a boot disk is important. Finally, a number of
utility programs are explained.

Describe the two types of software

Two types of software are application software and system software.

Application software consists of programs that perform specific tasks for users, such as a
word processing program, e-mail program, or Web browser.

System software consists of the programs that control the operations of a computer and its
devices. The two types of system software are operating systems and utility programs.

An operating system (OS) is a set of programs containing instructions that coordinate all the
activities among computer hardware devices.

A utility program performs a specific task, usually related to managing a computer, its
devices, or its programs.

58
Basic Information Technology Concepts

Understand the start-up process for a personal computer

Booting is the process of starting or restarting a computer.

 When you turn on the computer, the power supply sends an electrical signal to devices
located in the system unit.

 The processor chip resets itself and looks for the ROM chip that contains the BIOS (basic
input/output system), which is firmware that holds the startup instructions.

 The BIOS executes the power-on self test (POST) to make sure hardware is connected
properly and operating correctly.

 The POST results are compared with data in a CMOS chip on the motherboard. If the
POST completes successfully, the BIOS searches for specific operating system files
called system files.

 Once located, the boot drive (the drive from which your personal computer starts), loads
the system files from storage (the hard disk – usually drive C) into memory (RAM) and
executes them.

 Next, the kernel of the operating system loads into memory and takes control of the
computer.

 The operating system loads configuration information. In Windows XP, the registry
consists of several file that contain the system configuration information.

 When complete, the Windows XP desktop and icons display, and programs in the Start-
Up folder are executed.

Describe the term user interface

A user interface controls how you enter data and instructions and how information displays
on the screen. Two types of user interfaces are command-line and graphical.

 With a command-line interface, you type keywords or press special keys to enter data or
instructions.

 A graphical user interface (GUI) allows you to use menus and visual images such as
icons, buttons, and other graphical objects to issue commands.

 A menu is a set of commands from which you can choose.

 An icon is a small image that represents a program, an instruction, a file, or some other
object.

Explain features common to most operating systems

Most operating systems perform similar functions that include managing programs, managing
memory, scheduling jobs, configuring devices, accessing the Web, monitoring performance,

59
Basic Information Technology Concepts

providing housekeeping services, and administering security. Managing programs directly


affects your productivity.

 A single user/single tasking operating system allows only one user to run one program at
a time.

 A multitasking operating system allows a single user to work on two or more applications
that reside in memory at the same time.

 A multi-user operating system enables two or more users to run a program


simultaneously.

 A multiprocessing operating system can support two or more CPUs running programs at
the same time. Managing memory involves assigning items to an area of memory while
they are being processed. The purpose of memory management is to optimize use of
random access memory (RAM).

 With virtual memory (VM), the operating system optimizes memory by allocating a portion
of a storage medium, usually the hard disk, to function as additional RAM.

 Scheduling jobs (operations the processor manages) involves determining the order in
which jobs are processed.

Spooling increases efficiency by placing print jobs in a buffer (an area of memory or storage
where data resides while waiting to be transferred) until the printer is ready, freeing the
processor for other tasks. Configuring devices establishes communication with each device
in the computer. A device driver is a small program that tells the operating system how to
communicate with a device. Accessing the Web may entail including a Web browser and e-
mail program in the operating system. Monitoring performance helps to identify and solve
system problems.

A performance monitor is a program that assesses and reports information about various
system resources and devices. Providing housekeeping services entails performing storage
and file management functions. A file manager performs such functions as formatting and
copying disks; listing the files on a storage medium; checking the amount of used and
unused space on a storage medium; organizing, copying, deleting, moving, and sorting files;
and creating shortcuts (icons on the desktop that run a program when clicked).
Administering security involves establishing user accounts on a network. Each account
typically requires a user name and a password to log on, or access, the network.

Know the difference between stand-alone operating systems


and network operating systems

A stand-alone operating system is a complete operating system that works on a desktop or


notebook computer. A network operating system (also called network OS or NOS) is an
operating system that supports a network. A network is a collection of computers and
devices connected together via communications media and devices such as cables,
telephone lines, and modems. In some networks, the server is the computer that controls
access to the hardware and software on a network and provides a centralized storage area.
The other computers on the network, called clients, rely on the server(s) for resources.

60
Basic Information Technology Concepts

Identify various stand-alone operating systems

Stand-alone operating systems include DOS, Windows 3.x, Windows 95, Windows NT
Workstation, Windows 98, Windows 2000 Professional, Windows Millennium Edition,
Windows XP Home Edition, Windows XP Professional Edition, Mac OS, OS/2 Warp Client,
UNIX, and Linux. UNIX and Linux also function as network operating systems.

 DOS (Disk Operating System) refers to several single user, command-line and menu-
driven operating systems developed in the early 1980s for personal computers.

 Windows 3.x refers to early operating environments that, although not operating
systems, provided a graphical user interface to work in combination with DOS and
simplify its use.

 Windows 95 is a true multitasking operating system – not an operating environment –


with an improved graphical interface.

 Windows NT Workstation is a client operating system that can connect to a Windows NT


Server.

 Developed as an upgrade to Windows 95, the Windows 98 operating system is easier to


use and more integrated with the Internet. Windows 98 includes Microsoft Internet
Explorer, a popular Web browser, Windows Explorer, a file manager, and an Active
Desktop™ that works similarly to Web links.

 Windows 2000 Professional is a complete, reliable multitasking client operating system


for business desktop and business notebook computers.
 Windows Millennium Edition is an operating system that has features specifically for
the home user.
 Windows XP is Microsoft’s fastest, most reliable Windows operating system, providing
quicker startup, better performance, and a new, simplified visual look.
 Windows XP Home Edition is an upgrade to Windows Millennium Edition, while
Windows XP Professional Edition is an upgrade to Windows 2000 Professional.
 The Mac OS, the latest version of the Macintosh operating system (the first commercially
successful graphical user interface), is a multitasking operating system available only on
Apple computers.
 OS/2 Warp Client is IBM’s GUI multitasking client operating system that supports
networking, Java, the Internet, and speech recognition.

Identify various network operating systems

Network operating systems include NetWare, Windows NT Server, Windows 2000 Server,
Windows .NET Server, OS/2 Warp Server for E-business, UNIX, Linux, and Solaris™.

 Novell’s NetWare is a widely used network operating system designed for client/server
networks.
 Windows NT Server is the operating system used by servers in the Windows NT
client/server network environment.

61
Basic Information Technology Concepts

 The Windows 2000 Server family consists of three products:


 Windows 2000 Server (for the typical business network),
 Windows 2000 Advanced Server (for e-commerce applications), and
 Windows 2000 Database server (for demanding, large-scale applications).
 Windows .NET Server is an upgrade to Windows 2000 Server. The Windows .NET
Server family includes four products:
 Windows .NET Standard Server (for the typical small- to medium-sized business
network),
 Windows .NET Enterprise Server (for medium- to large-sized businesses, including
those with e-commerce applications),
 Windows .NET Datacenter (for business with huge volumes of transactions and large-
scale databases), and
 Windows .NET Web Server (for Web server and Web hosting businesses).
 OS/2 Warp Server for E-business is IBM’s network operating system designed for all
sizes of business.
 UNIX is a multitasking, command-line operating system implemented on many different
types of computers. Because it is both a stand-alone operating system and a network
operating system, some call UNIX a multipurpose operating system.
 Linux is a popular, free, multitasking UNIX-type operating system.
 Solaris™, a version of UNIX developed by Sun Microsystems, is a network operating
system designed for e-commerce applications.

Recognize devices that use embedded operating systems

The operating system on most handheld computers and small devices, called an embedded
operating system, resides on a ROM chip. Popular embedded operating systems include
Windows CE, Pocket PC OS, and Palm OS®.

Windows CE is a scaled-down Windows operating system designed for use on wireless


communications devices and smaller computers such as handheld computers, in-vehicle
devices, and Web-enabled devices.

Pocket PC OS is a scaled-down operating system developed by Microsoft that works on a


specific type of handheld computer, called a Pocket PC.

The Palm OS® is the operating system used on Palm handheld computers from Palm, Inc.,
and Visor handheld computers from Handspring™.

Discuss the purpose of the following utilities: file viewer, file compression, diagnostic,
uninstaller, disk scanner, disk defragmenter, backup, and screen saver
Most operating systems include several utility programs that perform specific tasks related to
managing a computer, its devices, or its programs.

 File viewer is a utility that allows you to display and copy the contents of a file.
 A file compression utility shrinks the size of a file.

62
Basic Information Technology Concepts

 A diagnostic utility compiles technical information about a computer’s hardware and


certain system software programs and then prepares a report outlining any identified
problems.
 An uninstaller is a utility that removes an application, as well as any associated entries in
the system files.
 A disk scanner is a utility that (1) detects and corrects both physical and logical problems
on a hard disk, and (2) searches for and removes unnecessary files.
 A disk defragmenter is a utility that reorganizes files and unused space on a computer’s
hard disk so data can be accessed more quickly and programs can run faster.
 A backup utility copies, or backs up, selected files or an entire hard drive onto another
disk or tape.
 A screen saver is a utility that causes the monitor’s screen to display a moving image on
a blank screen if no keyboard activity occurs for a specified period.

Expand Your Knowledge

 System software
 Starting a computer
 User interface
 Features of operating systems
 Stand-alone and network operating system
 Stand-alone operating systems
 Network operating systems
 Embedded operating systems
 Utility programs

System Software

Software is a key component of any information system. Of the total number of corporate
dollars spent on computing, the software share is increasing while the hardware share is
decreasing. Typically, different sizes of computers use different operating systems, and even
the same types of computers may not use the same operating system. The operating system
that a computer uses sometimes is called the software platform, or platform. Application
software packages often require a specific software platform. A cross-platform application,
however, is one that runs on multiple operating systems.

Starting a Computer

When you turn on a computer after it has been powered off, you are performing a cold boot.
When you restart a computer that already has been powered on, you are performing a warm
boot. Your typically can perform a warm boot by pressing a combination of keys on the
keyboard (in Windows, CTRL+ALT+DEL), selecting options from a menu, or pressing a
Reset button on the computer.

If you watch the screen closely as the POST is conducted, the value for the total amount of
memory can be seen to change as it is measured in the memory test. If the POST results do
not match the data on the CMOS chip, an appropriate message should appear. The boot
program typically is the first side, first track, and first sector of the hard disk. When you install

63
Basic Information Technology Concepts

an operating system, one of the installation steps involves making an emergency disk from
which you can start your computer if the hard disk is damaged.

User Interface

You can interact with an operating system directly (as you do when copying files, moving
files, formatting disks, and so on) or indirectly (as you do when working with an application
program). An operating system is intended to be transparent; that is, it does not have to be
understood, considered, or even known. The operating system with which an application
program will work is specified on the application software package. The application programs
you want to use should be considered before deciding on an operating system, and the
operating system must be considered when choosing application software.

A graphical user interface is designed to be easier to use (more user-friendly) than a


command-line interface. As an example of this user-friendly nature, consider how a relatively
simple task, such as deleting a file, is performed with a command-line interface and with a
GUI. With a command-line interface, you might type DEL followed by the file name in
quotation marks. Therefore, you must remember the command, type it correctly, and use the
proper syntax. On the other hand, with a GUI you need only select (click) the file name in the
file manager window and then click the Delete command on a menu or the Delete button on
a toolbar. Although most people find a GUI the easiest interface to use, some long-time
computer virtuosos still feel a command-line user interface is more efficient.

Features of Operating Systems

Early operating systems were single user/single tasking, but today most operating system
are multitasking. Multitasking can be cooperative, in which programs switch when they
reach a logical break point, or pre-emptive, in which programs switch based on priority and
an allocated amount of time. Early versions of Windows used cooperative multitasking;
Windows 95 and subsequent versions use pre-emptive multitasking. Upon termination, most
programs relinquish their space in memory, which then is reallocated by the operating
system. Some programs, however, stay in memory after they terminate. As a class, these
programs are called TSR (Terminate and Stay Resident) programs.

Virtual memory is employed with multitasking operating systems to maximize the number of
programs that can use memory at one time. Paging, or the technique of swapping items
between memory and storage, was developed before processors could address directly
more than 1 MB of memory. All printers have buffers, and printer manufacturers are eager to
sell DRAM. The term spooling comes from the observation that placing print jobs temporarily
in a buffer is somewhat like winding thread onto a spool so that it can be used at a later time.
Today, adding and configuring devices is easier because most devices support Plug and
Play, which means the computer can recognize a new device and automatically load the
necessary drivers. A feature of Windows 95, Plug and Play initially was greeted with mixed
reviews. In fact, some wags claimed the new technology was more accurately called, “Plug
and Pray.”

Processor utilization – the amount of time that the processor is working and not idle – is
one way of monitoring system performance. In addition to the programs that come with most
operating systems, several utility programs are available to monitor system performance.
Formatting a disk is the process of preparing it for reading and writing. Today, most floppy

64
Basic Information Technology Concepts

and hard disks are preformatted by the manufacturer. If you format a disk that already
contains data, the formatting process erases the file location information, but it does not
erase the actual files on the disk. Therefore, if you accidentally format a disk, often you can
unformat it with a utility program. System security usually is most important for large systems
or networks. For single-user PCs, adequate system security can be a key in the user’s
pocket.

Stand-Alone and Network Operating System

Many early operating systems were device dependent and proprietary. Device-dependent
operating systems run only on a specific type of computer. Proprietary software is privately
owned and limited to a specific vendor or computer mode. Today, the trend is towards
device-independent operating systems that run on many manufacturers’ computers. Software
that is not proprietary (i.e., that can work with a variety of computer models) sometimes is
called portable or generic. Most of the operating systems discussed in this section are
portable. When an operating system is proprietary, usually it is to boost hardware sales.

Operating systems for Apple computers and most mainframes initially were proprietary.
Steve Wozniak, cofounder of Apple Computers, believes the decision to make its innovative
Macintosh operating system proprietary was one of the company’s greatest mistakes. “We
had the most beautiful operating system,” Wozniak writes, “but to get it you had to buy our
hardware at twice the price.” Wozniak now feels the operating system should have been
licensed.

Stand-Alone Operating Systems

Bill Gates, founder of Microsoft and one of the wealthiest men in the world, began his fortune
with the MS-DOS operating system. Although developed for IBM, Microsoft retained the
rights to the operating system and licensed the source code to several hardware
manufacturers, which resulted in multiple variations. An application written for one type of
DOS, however, will work with any other variation. A number follows each version of PC-DOS
or MS-DOS. The integer portion of the number indicates a major release, while the decimal
portion indicates updates. Thus, MS-DOS 6.2 means major version six, which has been
updated twice. To a great extent, the popularity of DOS was a result of the large number of
applications written to work with the operating system.

Windows 1.0, released in 1985, was Microsoft’s first attempt with a graphical user interface. It
was not until five years later, however, with the release of Windows 3.0, that computer users
began to take Windows seriously. Windows required 2 MB of memory (with 4 MB
recommended) and an 80386 or newer processor, so it could not be used with many older
PCs. Nevertheless, because Windows 3.0 was easier to use than DOS, eventually most
software was written, and many popular DOS programs were rewritten, to work with
Windows.

Despite the advantages of Windows 95 and a heavily-funded promotional campaign, a poll of


DOS and Windows 3.x users showed not everyone immediately embraced the new operating
system. When asked how likely they were to adopt Windows 95 within the next six months,
respondents replied:

65
Basic Information Technology Concepts

 extremely likely 10%


 possible 35%
 not likely 53%
 don’t know 2%

Why are people often reluctant to adopt a new operating


system?
The inclusion of Internet Explorer in the Windows 98 operating system led to an antitrust suit
against Microsoft. Prosecutors insisted that the incorporation of a browser was an attempt by
Microsoft to eliminate competition from rival Web browsers (such as Netscape Navigator).
Microsoft maintained that the addition simply was an enhancement to the operating system.
Although Microsoft advertised Windows 98 less heavily than Windows 95, many vendors
took up the slack. One retailer offered Windows 98 with the opportunity to buy a new
computer for $98. The promotion evidently worked. A buyer waited in line 11 hours for a
chance to buy the new operating system and discount computer. When asked if he would
have come out simply for Windows 98 (his current computer ran Windows 3.1), he replied,
“Not a chance.”

Windows 2000 was released in February, 2000 and was touted as a boon for all businesses,
from small companies with no more than two desktop computers to large corporations with
vast networks. Windows Millennium is a result of Microsoft’s recognition that the needs of
business and home users are different.

For years, the Macintosh operating system had features that made it far easier to use than
other operating systems. For example, people could give files sensible names (like “Letter to
Grandma”) instead of the cryptic, eight-character strings (like “letgrand.txt”) demanded by
DOS and Windows 3.x. While Windows 95 incorporated many of these features, Macintosh
devotees still feel their operating system is easier to use. Until recently, the Macintosh
operating system was proprietary. In 1994 the operating system was licensed, but experts
feel Apple’s promotion has been lukewarm. New standards let IBM computers run Apple
software. More than 4,000 applications are designed to run under the Mac OS. Microsoft has
developed the more popular Mac OS applications.

IBM supplies OS/2 (Operating System/2) Warp with its high-end personal computers. OS/2
originally was developed jointly by IBM and Microsoft to replace MS-DOS. As an interim
measure, Microsoft developed Windows, an operating environment to work with DOS. The
eventual popularity of Windows, coupled with the initial poor sales of OS/2, resulted in
Microsoft and IBM going their separate ways, with Microsoft concentrating on Windows and
IBM continuing to develop OS/2. Features offered in OS/2 Warp include:

 An enhanced graphical user interface


 Integrated business application software
 Speaker-independent speech recognition software
 Desktop objects that allow users to connect directly to the Internet
 Integrated Java programming language that allows Java applications to run without a
Web browser
 Support for multiple CPUs using multiprocessing

66
Basic Information Technology Concepts

Network Operating Systems


Many consider UNIX to be the most portable operating system. Although it has some
shortcomings, UNIX often is used in “turnkey” systems designed for retail stores, doctors,
dentists, veterinarians, and other small- to medium-businesses. Do you know what operating
system is mentioned in the film Jurassic Park? UNIX.

Despite the current dominance of Windows, some believe Linux is the operating system of
the future. Because Linux is freeware, users can modify and improve the program code. In
addition, Linux is capable of running efficiently with less powerful processors, even the
80386. The story of Linux’s originator, Linus Torvalds, is told in the Technology Trailblazer on
page 8.25.

Embedded Operating Systems

The latest Palm handheld computer, Palm IIIC, offers a colour screen. When paired with a
portable, expandable, attachable, nearly full-sized keyboard and file compression software,
some reviewers say the Palm IIIC almost can replace a laptop. The Visor handheld computer
runs the same operating system as the Palm but offers several additional features –
videogames, cell telephone, modem, MP3 player, and two-way pager – at about half the
cost.

Utility Programs

Utilities generally reside in storage until summoned by the user or operating system kernel.
Microsoft was the target of several lawsuits for allegedly incorporating utility programs
developed by others into their DOS operating system. Some versions of DOS were modified
because of this litigation. In light of the ever-increasing number of utility programs included
with operating systems, will a market remain for separate utility programs?

In addition to the utilities mentioned in this chapter, other Windows 98 utilities include:

 DirectX – Enhances multimedia capabilities on the computer, providing better playback of


different types of multimedia and managing 3-D graphics better than console computers.
 Drive Converter (FAT 32) – Converts the hard drive to the FAT32 file system, an
enhancement that stores data more efficiently, creating extra disk space and helping
programs run faster.
 Registry Checker – Finds and fixes registry problems each time the computer is started,
automatically scanning the registry for inconsistent data structures.
 System File Checker – Keeps track of critical files that make the computer run, restoring
the files if they are moved or changed.
 Microsoft Magnifier – Makes the screen more readable by displaying a magnified portion
in a separate window and making it possible to alter the colour scheme and contrast of
the magnification window for easier visibility.

Some stand-alone utilities include:


 Desktop enhancers – Change the desktop look and organization, allowing users to create
and switch between multiple desktops.

67
Basic Information Technology Concepts

 File conversion – Converts from one file format to another so that a file can be used by
another application.
 Internet organizers – Helps in the management and use of favorite Web sites, searching
the Web and reporting on site changes.
 Antivirus programs – Prevent, detect, and remove computer viruses.

Some utility programs are used primarily by select groups. For example, text editors -- utility
programs that make it easy to work with lists and records -- are popular with programmers
and people who work with databases. PC Tools and Norton Utilities are popular utility
software packages for personal computers.

68

You might also like