Introduction to Computers
Introduction to Computers
INTRODUCTION TO
COMPUTERS
TRAINING NOTES
Introduction to Computers
As long as people have needed to count and calculate sums, they have been
inventing tools to help make these things easier and faster. Today’s powerful
computers can do ‘number crunching’ at lightening speed. What are some of
their ancestors?
Abacus: To help with arithmetic, beads are slid along parallel rods. This is one of
the oldest methods of carrying out calculations.
Early Calculators: Like the abacus, calculations were done by hand using a
system of interlocking cogs and pulley.
What is a Computer?
Types of Computers
These are the present day computers given in the order of the most expensive to
the least expensive.
Super Computers: these are very expensive, very fast, and the most powerful
computers in the world. They are quite rare as they are mainly used in scientific
research stations i.e. nuclear stations and weather forecasting stations.
Mainframes: they are large and very powerful computers. They can serve
hundreds of people and do many jobs at the same time.
2 ‘Introduction to Computers’
TSkills
An example of a Microcomputer
Advantages of Computers
Accurate – This is because written down instructions are followed when performing
a task.
Available/Reliable – Its always available for duties, never gets bored because of
repetitive jobs.
Compact Storage – Saves a lot of space in terms of document storage and number
clerical staff.
Disadvantages of Computers
Social unrest – They need special training of staff and at times cause redundancy.
Components of a Computer
The Input Devices i.e. keyboards for entering data and instructions.
STORAGE
1. Input Devices
Input devices are used to communicate with a computer. They offer an interface
between the user and the computer. They also let users enter information and
issue commands.
Examples include:
4 TSkills Training Notes ‘Introduction to Computers’
TSkills
Keyboard
Various keys on the keyboard let you enter information into a computer.
Mouse
A mouse is a hand-held device that lets you select and move items on your screen.
A mouse can come in various shapes, colors and sizes.
Joystick
Scanner
Plastic Cards
Used as a means of identification especially by banks (as credit or debit cards) and
post offices e.g. phone cards.
Smart Card
This is a credit card with a built-in microprocessor and memory used for
identification or financial transactions. More secure than plastic cards and can be
programmed to self-destruct if the wrong password is entered too many times.
Mainly used by banks. Customer or User is provided with a plastic emborsed card
with information encoded on a magnetic strip.
This technology is mainly used by banks. Characters are printed in ink that can be
magnetized so that after being subjected to a magnetic field, they can be read and
decoded automatically. Read using a device called Magnetic Ink Character Reader
(MICR).
Others include:
Tracker Ball – used on modern portable computers, where there may be no space
on which to use a mouse.
Touch Pad – stationary pointing device used mainly on laptop computers. Provide a
small, flat surface that you slide your finger over using the same movements as you
would use a mouse.
Touch Screen – an input device that allows user to interact with the computer by
touching the display screen. Often this uses beams of infrared light that are
projected across the screen surface.
Light Pen – a light-sensitive stylus wired to a video terminal used to draw pictures
or select menu options. Provide a very precise pointing capability directly on the
screen.
The CPU is the main chip in a computer. It is housed inside the System Unit. It
processes instructions, performs calculations and manages the flow on information
through a computer system. It communicates with the input, output and storage
devices to perform tasks. The CPU is also called the microprocessor or processor.
There are several factors that determine the performance of a CPU.
Manufacturer
6 TSkills Training Notes ‘Introduction to Computers’
TSkills
CPUs for personal computers are made by companies such as Intel, AMD, Cyrix
and Motorola. Intel chips are the most popular.
Generation
Each new generation of CPU’s is more powerful than the one before. Newer CPU’s
can process more instructions at a time. CPU generations include the 486, Pentium
(586) and Pentium Pro (686). The older 386 and 486 generations are now obsolete
as they are not Y2K compliant.
Speed
Each CPU generation is available in several speeds. The CPU speed is a major
factor in determining how fast a computer operates. The faster the speed, the
faster the computer operates. The speed of the CPU is measured in megahertz
(MHz) or millions of cycles per second.
Note:
When buying a new computer do not consider anything less than a Pentium chip.
You can increase the processing power of a computer by replacing the CPU chip
with a new one i.e. only if they are compatible.
Storage refers to the semi-permanent or permanent holding place for digital data.
There are two kinds of storage in computers:
Primary storage stores data temporarily while secondary storage stores data
permanently. An example is the Computer Memory. Examples of secondary storage
are hard disk, floppy disk, CD-ROM e.t.c.
Bytes are used to measure the amount of information a device can store. One byte
is one character. A character can be a number, letter or symbol. One byte consists
of eight bits (binary digits). A bit is the smallest unit of information a computer can
process.
Instructions are stored in the main memory and can be fetched from it. The
process of storing information in main memory is normally referred to as writing.
The process of getting instructions is normally referred to as reading. Therefore
RAM is a read/write memory.
It is volatile memory i.e. it retains information so long as power is on. When power
is turned off all the information in RAM is lost. This is why you always have to save
your work on disk as the data storage on dist does not depend on availability of
power. RAM allows performance to be optimum.
Cache Memory
This is a new development where a small and extremely fast “cache” memory is
use.
The memory cache is constantly updated i.e. it always contains the most recently
ROM stores the instructions that help prepare the computer for use each time you
turn on the computer.
The user can “burn in” data as required i.e. you are allowed to write in your data-
once.
Similar to PROM but the “burning in” process is reversible. Erased by exposure to
Ultra-violet light. This means that you can write data into this type of disk and
erase this data whey you need to write some other data to it.
Notes:
The common secondary storage devices are hard disk drive, floppy disk drive, tape
drive and CD-ROM drives.
Floppy Drive
Transfer data
9 TSkills Training Notes ‘Introduction to Computers’
TSkills
Floppy Disk Drive and a Diskette
Note:
You can prevent erasing and recording information on a diskette by sliding the tab
to the write-protected position.
Keep diskettes away from magnets as they can damage the information stored.
CD-ROM Drive
CD-ROM stands for Compact Disk Read Only Memory. Read Only means that you
cannot change the information stored on a disk.
A single CD-ROM disk can store more than 600 MB of data. This is equivalent to
over 600 floppy diskettes.
Advantages of a CD
The large storage capacity makes installing new programs on the computer easier.
When handling a CD-ROM disk, hold the disk around the edges.
Do not remove the disk or move the computer when the light on the CD-ROM drive
in on.
Speed – Its also called the data transfer rate. The speed of the CD-ROM determines
how fast a disc spins. With faster speeds, a disk can transfer information to the
computer more quickly, which results in better performance. The available speeds
are:
Average Access Time – the average access time indicates how quickly a CD-ROM
drive can find information stored on a disk.
DVD-ROM Drive
Zip Disk
A zip disk holds 100MB and suitable for backup, mass storage or for moving files
between computers. The drive is bundled with software that can catalog the disks
and lock files for security.
Tape Drive
CD – ROM Approx. 1 GB
DVD-ROM 4.7 GB
Tape Drive 4 – 10 GB
For a drive to read data from a disk, the read/write head must move in or out
to align with the correct track. Then it must wait until the correct sector
approaches the head. The time it takes to do both these things is called the
disk or data access time. Floppy disks rotate more slowly than hard disks i.e.
only six revolutions per second. Therefore floppy disks and CD-ROMs have
longer access times than hard disks.
4. Output Devices
They let the computer communicate with the user. Once information has
been input within the computer it is in electronic form. This is in a form that
can be handled and understood only by the computer. But the information is
in a form that human beings cannot understand. The information will
therefore need to be converted into a form that is understood by the human
being. This is mostly done in two ways.
If you are using a machine with multimedia, you can have sound as an
output. The sound emitted on speakers.
There are several types of monitors in use today. They come in color or
monochrome (one color). They are referred to as monochrome as the text
they display is not always white. The other difference in screens are their
sizes.
Resolution
Video Card
The video card is a circuit board that plugs into an expansion slot inside the
computer. The video card does the following:
It determines the number of colors a monitor can display. The more colors
displayed, the more realistic the resulting images.
These monitors display more colors and higher resolutions than VGA
monitors. Most new computer systems offer SVGA. The colors offered by
SVGA are 256 colors, High color, and True color. This setting is called True
Color because it displays more colors than the human eye can distinguish.
Dot Pitch
The dot pitch is the distance between tiny dots on a screen. The dot pitch
determines the sharpness of images on the screen. The smaller the dot pitch,
the crisper the images.
Printers are the main output devices used to produce paper copies (hard-
copies) of the information on the screen. You can buy a printer that produces
black-and-white or color images.
Speed
Print quality
Cost
Printers can also be classified according to how they print. That is whether
they are Impact or Non-Impact printers.
Laser Cartridges
Ribbon Cartridge Toner Cartridge
Impact Printers
This kind of printer “physically strikes” the paper through an inked ribbon to
produce the desired output, just like a typewriter does. They print one
character at a time and are used for low volume printing jobs. The printers
in this category include Dot-matrix printers and Daisy-wheel printers. Other
less common types are Drum printers and Chain/band printers.
Non-Impact Printers
Thermal Printers
These are character matrix printers which print onto special paper using a
heated print head. As the paper passes through the printer, heat is
generated by rods that melt small dots of ink on to the paper. By selective
heating of rods, characters can be formed from the matrix. They produce
high quality color images.
Ink-Jet Printers
An Ink-jet printer has a print head that sprays ink through small holes onto a
page. They produce good quality copies and are much slower than laser but
can print in color at much lower cost. They are very quiet and are ideal for
routine business and personal documents. Though affordable and quite
popular ink jet printers do not provide the color quality or text resolution of
color laser printers.
Laser Printers
Plotters
A plotter is a graphics printer that draws images with ink pens. The plotter
was the first computer output device that could print graphics as well as
accommodate full-size engineering and architectural drawings and is
therefore an appropriate output from a CAD (Computer-Aided design)
package. Pen plotters are still the most affordable printing device for CAD
use and offer resolution unlike any other printer. The lines are not made up
of dots. They are actually drawn, providing finite resolution. We have drum
and flatbed plotters.
iii) Speakers
A sound card lets a computer play and record high quality sound. It is a
circuit board that plugs into an expansion slot in the computer. A sound card
is also called a soundboard or audio card. You need speakers to hear sound
generated by a sound card. The best speakers have built-in amplifiers, which
should be between 10 and 30 watts.
A sound card lets you hear music, speech and sound effects during games
and multimedia presentations
You can use a sound card to record music, speech and sound effects. You can
then add the sounds to documents and presentations. You can also use a
sound card to compose music on your computer.
These are programs with their associated documentation that are found on a
computer system. They facilitate the use of a computer (hardware) by the
user installation.
SOFTWARE
System Software
These are programs that control the various hardware parts and make them
available to the user. They also control the various programs that we use to
achieve a particular kind of work i.e. application software. Within the set of
system software for a given computer there is usually a program or a suite of
programs that are called the operating systems.
The O/S controls the performance of the computer by doing a variety of jobs
to ensure the proper, orderly and efficient use of hardware by application
programs.
Most application programs can only work in conjunction with the operating
systems.
Examples of system software include: Windows 95, Windows 98, Unix, MS-
DOS, Windows NT, Windows 2000, Windows Me, Windows XP, Be Os,
Mackintosh, Solaris, Linux
Application Software
A computer can function without application software but one will not be
able to do much with it. The type of software one needs depends on the kind
of work that needs to be done.
You can create tables to organize information. You can also add colors and
borders to enhance the appearance of a table.
You can create documents such as letters, reports, manuals, newsletters and
brochures. You can style the document or add pictures to make them
attractive.
You can quickly produce personalized letters, envelopes and mailing labels
for each person in a mailing list using a feature called ‘merge’.
You can be able to create charts that let you display the data in a
spreadsheet for easy analysis.
Features of a Database
You can use the database program to keep large collections of information
organized and up-to-date.
You can use the information in the database to create reports and
presentations.
You can locate specific information in a database. i.e. searching for the name
of a particular employee.
You can enter text directly into a desktop publishing document. You can also
add text into a word processor and then place the text into the document.
Graphics can also be created in a separate program then incorporated into a
desktop publishing program.
You can use a scanner (a device that reads text and images into a computer)
to copy images, such as photographs and drawings, into a desktop
publishing document.
A DTP gives you control over the graphics in a document i.e. you can move
(change the position of a graphic on a page), size (make a graphic larger or
smaller), rotate (turn or spin a graphic) and crop (trim part of a graphic).
You can also incorporate ClipArt (already made graphics you can add to your
presentation) pictures in a slide.
You can draw maps and decorate them to your satisfaction using the
drawing tools available.
Hardware
The hardware are the parts of computer itself including the Central Processing
Unit (CPU) and related microchips and micro-circuitry, keyboards, monitors,
case and drives (floppy, hard, CD, DVD, optical, tape, etc...). Other extra parts
called peripheral components or devices include mouse, printers, modems,
scanners, digital cameras and cards (sound, colour, video) etc... Together they
are often referred to as a personal computers or PCs.
Central Processing Unit (CPU) - Though the term relates to a specific chip or the
processor a CPU's performance is determined by the the rest of the computers
circuitry and chips.
Currently the Pentium chip or processor, made by Intel, is the most common CPU
though there are many other companies that produce processors for personal
computers. One example is the CPU made by Motorola which is used in Apple
computers.
With faster processors the clock speed becomes more important. Compared to
some of the first computers which operated at below 30 megahertz (MHz) the
Pentium chips began at 75 MHz in the late 1990's. As of mid 2003 speeds now
exceed 3000+ MHz or 3 gigahertz (GHz) (check your local computer store for the
latest speed). It depends on the circuit board that the chip is housed in, or the
motherboard, as to whether you are able to upgrade to a faster chip. The
motherboard contains the circuitry and connections that allow the various
component to communicate with each other.
Monitors - The monitor shows information on the screen when you type. This is
called outputting information. When the computer needs more information it will
display a message on the screen, usually through a dialog box. Monitors come in
many types and sizes from the simple monochrome (one colour) screen to full
colour screens.
Sound cards allow computers to produce sound like music and voice.
The older sound cards were 8 bit then 16 bit then 32 bit. Though
human ear can't distinguish the fine difference between sounds
produced by the more powerful sound card they allow for more
complex music and music production.
Software
The software is the information that the computer uses to get the job done.
Software needs to be accessed before it can be used. There are many terms used
for process of accessing software including running, executing, starting up,
opening, and others.
Computer programs allow users to complete tasks. A program can also be referred
to as an application and the two words are used interchangeably.
Examples of software programs or applications would be the Operating System
(DOS, Windows 9x/Millenium/XP, O/S2, UNIX, MacOS 9.x/10.x and various others),
Wordprocessor (typing letters), Spreadsheet (financial info), Database
(inventory control and address book), Graphics program, Internet Browser,
Email and many others.
As well any document that you create, graphic you design, sound you compose, file
you make, letter you write, email you send or anything that you create on your
computer is referred to as software. All software is stored in files.
Software is stored on a disk or tape whether that disk is a floppy, hard disk, CD,
tape or one of the dozens of other storage devices available.
There are millions of different pieces of software available for almost
every conceivable need. Software is available commercially through
stores and mail order and also available on the Internet. Software is also
available through an Open Source license which allows anyone to use the
Open Source software free of charge as long as the license is maintained.
If you can't find the application that you need software development
companies can custom design software for you.
The largest software companies offer packages of software or suites that include
many of the programs that the average person or business needs. Software
packages or suites contain programs that work together and share information,
making it easier to combine that information in versatile ways. For example when
writing a letter you can get the mailing address from an address book, include a
letterhead from a graphics program and included a financial chart from a
spreadsheet and combine this collection of information in the body of the letter.
The three basic types of software are; commercial, shareware and open
source software. Some software is also release into the public domain without a
license.
Operating Systems
All computers need some sort of Operating System (OS). The majority of modern
home computers use some form of Microsoft's operating systems. The original
Microsoft operating system was called DOS (Disk Operating System) though most
computers use Windows. Windows comes in various versions beginning with version
3.x then 95, 98, ME and currently XP. A few computers use IBM's O/S2. Apple's
Mac use their own operating system beginning with OS 1 though most modern
Macs use version 8.x or 9.x. Apple's latest version is OS 10.1.x. In the past large
companies and institutions would have an operating system design exclusively for
them but as the commercial operating systems become more sophisticated the
benefits of this practice is becoming less apparent. Some computer professionals,
Internet Service Providers (ISP) and mainframe computer users use an
operating system such as UNIX (or a variant such as Linux), Windows NT or 2000
(Win2k) or one of the other network or server based operating systems.
There are many smaller operating systems out there. The problem is that software
is currently being developed only for the main operating systems and only the
newest versions of these OS. Many older computers with unique operating systems
have lots of software already developed for them but there is very little new
software being developed for the older computers. The older proprietary operating
systems are less likely to offer technical support than the more modern operating
systems.
The operating system controls the input and output or directs the flow of
information to and from the CPU. Much of this is done automatically by the system
but it is possible to modify and control your system if you need to.
When you turn your computer on it first needs to load the operating system
sometimes referred to a booting up. Basically the computer starts from scratch
every time you turn the power on.
It checks all its components and will usually display a message if there is a problem.
Loading the system is usually automatic.
Once the system is loaded the user can start the application or program that they
are going to use.
Most computer users will run Microsoft Windows, Mac OS or Linux as their
operating system. These OS are Graphic User Interface (GUI) which allows the
user to control or run the computer using a Mouse and Icons. The user simply
moves the mouse on a flat surface, rolls the trackball, or moves their hand over the
touchpad to control a pointer. They then choose the option they want by pressing a
button or touching the pad.
Disks are used to store information. All information on computers are stored in
files. The size of a file is measured in bytes.
A byte is approximately one character (letter 'a', number '1', symbol '?' etc....).
About a thousand bytes is a kilobyte (KB).
About a million bytes is a megabyte (MB).
About a billion bytes is a gigabyte (GB).
Floppy disk are still a common way of transporting information (such as bringing
files home from work) but compact disks (CDs) and Digital Video Devices (DVDs)
are becoming more popular. Most software is sold on a CD. Hard disks are the
most common storage device.
Compact disks or CDs can store large amounts of information. One disk will store
650 Mb or about 70 or 80 minutes of music. One type is a CD-ROM which stand for
Compact Disk Read Only Memory. Another type is a CD-RW
which stands for Compact Disk - Read/Write. CD drives can
copy information or burn information on to a blank CD. Common
Read Only CD blanks can only be written to once though more
expensive Read/Write CD's can be used over and over again.
DVD disks can store over 4 gigabytes. DVD recorders allow you
to store large files, such as movies, on a single disk.
Floppy disk or diskette comes in two basic sizes; 5.25 inch (almost obsolete) and
3.5 inch. Both have a low and high density versions though 3.5 inch high density
disks are the most common.
There are many other storage devices including tapes, Panasonic's LS120 3.5
inch diskettes, Iomega's Zip & Jazz disks, VCR tape and many others.
Innovation in storage technology is currently advancing rapidly.
Information is stored in an electromagnetic form much like a cassette or video
tape.
Note: Keep disks away from strong electric or magnetic fields including x-
rays. Be aware of high electromagnetic areas in the room such as televisions,
speakers, high tension wires, etc... Use disks only at room temperature and
keep them out of direct sunlight. If possible avoid passing electromagnetic
storage devices through airport x-rays. In theory information stored on a disk
will last indefinitely but the physical storage device will wear out with usage
and time so be sure to back up (copy) your important files to a second disk.
Input: Information and programs are entered into the computer through Input
devices such as the keyboard, disks, or through other computers via network
connections or modems connected to the Internet. The input device also retrieves
information off disks.
ENTER or RETURN - Moves the cursor down one line and to the left margin. Enter
also process commands such as choosing an option in a dialog (message) boxes and
submitting a form.
DEL or DELETE - Deletes the character at cursor and/or characters to the right of
the cursor and all highlighted (or selected) text.
BKSP or BACKSPACE - Deletes the character to the left of cursor and all
hightlighted text.
SPACE BAR - Moves the cursor one space at a time to the right
SHIFT KEY - Use the shift keys to type capital letters and to type the upper
character on keys with two characters on them
CAPS LOCK - Locks the keyboard so it types capital letters (a light goes on when
caps lock is on)
TAB - Moves the cursor five spaces to the right (number of spaces are usually
adjustable). Tab moves to the next field in a form or table (Shift-Tab for previous
field).
ESC or ESCAPE - Cancels a menu or dialog box
ARROW KEYS - Moves the cursor around document without changing text
FUNCTION KEYS or F KEYS - Access commands by themselves or in combination
with the three command keys; CTRL, SHIFT, and ALT
Command keys normally do nothing on their own but work in combination with
other keys. Each piece of software uses the command keys differently though there
is a move to standardize some functions. The Control key or Ctrl is often used to
access commands. The Alternative key or Alt is often used to access menus. The
Shift key is used to type CAPITAL LETTERS. As well the command keys are all
used to move through documents and edit text faster and easier. As well many
Place one space between each word, after a punctuation mark and at the end of a
sentence. Always start a sentence with a capital letter. Use capitals for names,
addresses, provinces and countries, places, organizations, businesses, associations,
schools, colleges, universities, days of the week, months, holidays, nationalities,
ethnic groups and languages.
Learning the keyboard is the first step to learning computers. Learning involves
practice. It really is as simple as that. There are two kinds of typing.
The first is called Touch Typing. The Touch Typist uses the Home Keys (asdf for
the left hand and jkl; for the right) and all the fingers on both hands as well as the
thumbs for the Space Bar while typing. There are many commercial and public
domain programs that are designed to teach this method.
The other method is some times called 'Hunt and Peck' or depending on finger
strength 'Search and Destroy'. This involves using one or more fingers on one or
two hands to type. It is a perfectly acceptable way of using a computer and many
people get along fine with this technique.
Saving Files
In order to save a new document or file you must first choose the Save
command. Most modern software place this command in a menu which
you access with the mouse button or Alt key. Each file must be given a
filename so it can be found easily the next time it is needed.
Computers using DOS 6.X or older must follow the 8.3 rule: a filename
can only be 1 to 8 characters long followed by a 1 to 3 character
extension separated by a dot (period or full stop).
Modern operating systems allow computer users to use filenames up to
256 characters. Mac users, Windows 9X & NT/2000 and UNIX/LINUX
(along with a few other) use long file names but names using over 32
characters get unwieldy. It is better to use a directory or folder to help
describe them and keep common files together.
Many modern software programs (applications) add their own extension
to filenames. These extensions allow operating systems to recognize
certain filenames and associate (match) them to the program that
created it.
As well as choosing a filename, users must choose a directory and/or disk
to store the file in. Make sure that you are consistent and use a logical
structure. Once you are sure you know where the file is going to be
stored press Enter on the keyboard or press the left mouse button over
the word Save or Okay to store the document on a disk, in the
directory with the filename you have chosen. Some software programs
will automatically save files in specific directory that is created when the
program is installed (default settings). You can easily changed these
settings permanently using the applications Preferences or temporarily
at the point of saving the file.
Some common rules are:
All files are saved on a disk or storage device.
A disk is usually broken up into directories and sometimes into
partitions.
A directory or folder is a way of keeping like files in a common
area.
Printing
Exit or Quit
Menus
The Internet was born and has mushroomed outward from that point.
There are 4 things that are necessary to "get on the net" with a full
graphic interface (picture, sounds, animation, etc...).
Once you have purchased an account with an ISP you will be given an
account name. This is often your email address as well. You will also
be given a password and should also be provided with instructions on
how to change the password to a unique and personalized. The generic
password provided with your account should be change to one of your
own. Protect your password as you would any personal identification
number (PIN) number.
top
The ISP will also provide information on how to configure your
software. This can be simple or difficult depending on your Operating
System. Once configured you simply run the software to connect your
computer's modem to the ISP's modem, giving you access to the Internet.
There are a number of pieces of software that work together to connect
you to the Internet.
top
The first and most complicated is the dialer or socket software. This is
the software that makes the physical connection with the ISP's computer
and the internet. This needs to be configured only once but you will need
instructions from your ISP on how to do this as each ISP has a different
setup.
top
The second piece is an Internet browser. This is the program that
locates websites for you and allows users to maneuver around (surf) the
World Wide Web and view web pages. The two most popular today are
the account name (often the users first initial and then the last
name (sometimes only 8 characters)
then the @ symbol
then the name of the user's ISP
the last 2 or 3 characters describe the type of service called the
top level domain name. For example .com stand for commercial
site, .ca - noncommercial site in Canada, .mil - U.S. military, .gov -
U.S. government, .au - noncommercial site in Australia, .net -
network, etc... Recently 2 new TLDs were added; .biz, .info.
ugAAANAAAAALAAAAAgD//zQAQgBvAGQAeQAgAFQAZQB4AHQAAABCAG8AZAB5ACA
AVABlAHgAdAAA
ANMFCwAAAQAACwDT0wQdAAATAAD//wUAsAQAmA0AEA4AaBAAK5sdANPUGxkAgAE
AAAgAigIAAAAA
AACKAooCGQDU1BpXAIABAQAIAAAAAAAAAAAAHAD0GlwSGgkAABEJAAAAYAAYEQAA
ECoAVABpAG0A
ZQBzACAATgBlAHcAIABSAG8AbQBhAG4AAAAAAAAAVABUAAAAVwDU1AILAAABAAEL
ANTUAwsAAAEA
These lines are all printable or lower-ASCII characters and can be sent
via email. When it gets to your computer and you want to view the
document, it first must be decoded or converted back to it's binary
format before it can be opened. Today this is typically handled by your
Email program.
There are several common encoding standards, the most popular being
uuencoding, mime, and binhex. Not all email packages support even
these three, let along all the non-standard ones. If someone sends you a
document encoded in a format that your email program doesn't support
the email program will not decode the attachment.
The attached file must be loaded into a program to be viewed. If the
attached document was originally created in MS-Word you need MS-
Word on your computer to work with the document. Most modern
There are thousands of news groups covering as many topics. Some are
moderated, meaning that a person who has knowledge or an interest in
a certain topic will receive the message and read it before posting it. This
keeps the discussion on topic. Most are not moderated and the discussion
can go anywhere but it can be a great way to get a quick reply to your
questions.
One problem with posting a message to a public newsgroup is that
unscrupulous companies mine the newsgroups for email addresses and
then send unsolicited email (spam) to the poster. It is recommended
that you disguise your email address using your newsgroup software's
preferences.
Many newsgroups have a publicly accessible faq. A faq is a collection of
frequently asked questions that have been posted many times to a
newsgroup. You may get a gentle reminder or a completely rude and
insulting comment if you post a question that is on the faq. It is
acceptable to post a question as where the faq is located and you may
find that frequent posters will mention the faq in their message.
Different search engines will display different results and sort those
results differently. If you don't find the information you want on one
search site try another. Some search companies offer meta searches
which are compiled from a number of different search engines' results.
The results from a search are a list of pages with links to the documents
that match your search. Each search engine has a different way of
displaying the results but generally you will see a list with the name of
the organization or title of the page. You may also see a short description
of that web page. Clicking on the title will take you to that page.
Though there are hundreds of search engines on the Internet there are
only a couple dozen that the majority of people use. If you choose
"customize" in your browsers search tool you will see a list of some of
these search engines.
Website Search
Though still in its infancy, many billing companies have begun Internet
transaction projects using the SET model to allow their customers to pay
their bills, check their account status and much more.
Setting up security
As the most people won't be setting up their own secure server the scope
of this section is limited to the topics of protecting email and small
business or organizational transactions.
Email can be protected using a service or an application (program).
There are others but the two that stand out currently are S/MIME and
PGP. S/MIME requires the user to register with a 3 party service which
issues a digital id that you attach to your message. Though this is usually
a commercial service there is often a free introductory period. PGP is free
for personal use or a commercial application for business use and is run
from your own computer.
Both methods allow users to sign or attach a digital identification to
the email message which verifies, to the recipient, that the message is
from the original person or organization and that the information wasn't
tampered with in transit. These methods also allow the user to encrypt
their message so that anyone intercepting the message wouldn't be able
to read it. You can also decide the level of encryption from low; in which a
nerd with some good software and enough time on their hands could
possibly decrypt to high (128 bit) which would take a whole mountain of
experts weeks to decrypt if even then. Most of us will choose somewhere
in between as this process involves increased time and file size.
Both methods use key pairs of public and private keys. Your public keys
is sent to everyone that you communicate through email with. Your public
key can be sent through various methods including posting it to an
internet service or sending it as part of an email message. Public keys
can also be post on your website in a file. Your friends and associated can
add your public key to a file called a key ring). When someone wants to
send you a secure email the sender encrypts their messages with your
public key. When you receive the email you must decrypt it using your
private key. Many email programs will automatically verify that the
message is authentic. You will need to type in your password to view the
message.
Encryption also involves using the key pair but in reverse. Once your
message is completed you encrypt the file using the recipient's public key
ensuring that only the recipient can ever access that message with their
private key. (Editor's note: Don't lose your private key!).
Small businesses and organizations that wish to offer transactions over
the Internet or Ecommerce can take their chances and set up an
unsecured system, set up their own secure server or purchase a
service from a third party. There are various types including service that
take a percentage of the transaction and/or charge a service fee and/or
charge for each transaction. Some organizations are more reliable and
you should always shop around before committing to a service. Because
this type of service is so new the length of time a company has been
operating is not always a way to decide. Things to watch for is downtime.
Account Security
Server Security
Software Security
Copyright
Is Security Necessary?
Though you may think that it is not necessary to setup security systems
there are many reason to consider it. I have come across a number of
examples of people forging documents and email. A digital signature will
be the only way to verify whether a document is genuine or not.
Many organizations need to discuss draft articles, changes to bylaws and
other documents that could cause problems if they were made public
before they are approved. A secure directory within your website is an
ideal spot to store sensitive material making it available for members and
people who have the proper password.
I would be remiss to not point out and as all articles on the subject also
point out mining the Internet with malicious intent is also possible. One
common malicious acts is to search websites for email addresses and
then add them to spam distribution lists. Unfortunately there is very little
that can be done to counter this other than removing your email address
from your web site but this makes it difficult for your customers to
contact you.
Whether you decide to add a security component to your web site project
initially it is a good idea to think about or have a discussion about web
site security when planning the site. You should also review your security
systems periodically whether that is changing your password or
reviewing and updating your security system.
Networks
TSkills® – Introduction to Computers
Page 57
Most people working in office with more than a couple of computers will
be using some form of network. As networks become easier to setup and
maintain more home users are also setting up networks to share resource
such as disk space, printers, Internet connections and access to software.
A network is basically two or more computers connected through a cable
or wire which share resources. Network software controls how the
computers communicate.
There are dozens of different types of networks which are impossible to
cover in an introduction article. This article focuses on home and small
business networks using some version of the Window operating system.
To connect computers each of the computers needs a network card with a
connection that allows a cable to be connected to it. Computers can be
connected directly through a bi-directional cable or through an other
piece of hardware called a hub. The hub then connects all the computers
in your local network together. Both solutions cost about the same but a
hub allows more than two computers to connect. A hub can also be used
to connect two local area networks together to create a wide area
network.
Some form of network software is required. This network protocol
software is installed through the network preferences. NetBIOS was
commonly used though recently a secure TCP/IP protocol has been
developed. The network protocol determines how computers become part
of the network and how they are recognized. The network must have a
name and you can use some creativity at this point. Each computer must
also have a unique name that other computers on the network can access
them with.
If all goes well this is all you need but often there will be a conflict that
can be resolved by establishing exactly how the computer will
communicate. To solve these types of conflict your network needs a set
DNS server address and each computer in the network needs to be
assigned a unique IP address. The addresses usually are in the range of
192.168.x.x where x means any number between 0 and 255. Once these
numbers have been entered your network should be functioning with
each computer able to see the other computers on the network.
You must also decide which resources you want to share. You may want
to make a disk or folder available, a printer or tape backup system so that
everyone can use it. You may also want to have parts of the network that
are either not accessible or accessible only through a password. File and
print sharing must be enable on the computer that will share it's
resources or host computer and they determine how they are accessed by
other computers or clients.
A computer with an Internet connection can also share that connection
with other computers on the network but you should check with your ISP
what their policy on sharing Internet connections is. Sharing an Internet
connection also raises some serious security issues. Many cable high
speed Internet connections use the Network Neighborhood settings to
create the Internet connection and connecting your home or office
network to this existing system can cause problems. Though you may
want to allow a computer in another room of the house to access files or
run programs on your computer you probably don't want the kid down
the block to have that same access.
Security on networks begin with passwords. Everyone who wishes to
access the network must logon with a username and password. If
someone cancels the password challenge they will be able to access the